Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) - Configuring Internal Power Supplies [Cisco Catalyst 3650 Series Switches] - Cisco
Oct 30, 2013 · ... 529. Interoperability with IEEE 802.1D STP 529. RSTP Overview 529. Port ... AC power cord into the switch and a grounded 100 to 240 VAC ...
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) First Published: 2013-10-30 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2013 Cisco Systems, Inc. All rights reserved. CONTENTS PREFACE CHAPTER 1 CHAPTER 2 Preface xcv Document Conventions xcv Related Documentation xcvii Obtaining Documentation and Submitting a Service Request xcvii Using the Command-Line Interface 1 Information About Using the Command-Line Interface 1 Command Modes 1 Using the Help System 3 Understanding Abbreviated Commands 4 No and Default Forms of Commands 4 CLI Error Messages 4 Configuration Logging 5 How to Use the CLI to Configure Features 5 Configuring the Command History 5 Changing the Command History Buffer Size 5 Recalling Commands 5 Disabling the Command History Feature 6 Enabling and Disabling Editing Features 6 Editing Commands Through Keystrokes 7 Editing Command Lines That Wrap 8 Searching and Filtering Output of show and more Commands 9 Accessing the CLI on a Switch Stack 9 Accessing the CLI Through a Console Connection or Through Telnet 10 Using the Web Graphical User Interface 11 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) iii Contents PART I CHAPTER 3 Prerequisites for Using the Web GUI 11 Information About Using The Web GUI 11 Web GUI Features 11 Connecting the Console Port of the Switch 12 Logging On to the Web GUI 13 Enabling Web and Secure Web Modes 13 Configuring the Switch Web GUI 13 Cisco Flexible NetFlow 17 Configuring Flexible NetFlow 19 Finding Feature Information 19 Prerequisites for Flexible NetFlow 19 Prerequisites for Wireless Flexible NetFlow 19 Restrictions for Flexible NetFlow 20 Information About NetFlow 21 Flexible NetFlow Overview 21 Wireless Flexible NetFlow Overview 22 Flow Records 23 Flexible NetFlow Match Parameters 23 Flexible NetFlow Collect Parameters 24 Exporters 25 Export Formats 26 Monitors 26 Samplers 27 Supported Flexible NetFlow Fields 27 Default Settings 31 How to Configure Flexible NetFlow 31 Creating a Flow Record 32 Creating a Flow Exporter 33 Creating a Flow Monitor 36 Creating a Sampler 37 Applying a Flow to an Interface 39 Configuring a Bridged NetFlow on a VLAN 40 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) iv Contents PART II CHAPTER 4 Configuring Layer 2 NetFlow 41 Configuring WLAN to Apply Flow Monitor in Data Link Input/Output Direction 42 Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction 43 Monitoring Flexible NetFlow 44 Configuration Examples for Flexible NetFlow 45 Example: Configuring a Flow 45 Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction) 46 Example: Configuring IPv6 and Transport Flag Flexible NetFlow in WLAN (Egress Direction) 46 Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions) 47 Additional References 48 Feature Information for Flexible NetFlow 49 CleanAir 51 Configuring Cisco CleanAir 53 Finding Feature Information 53 Prerequisites for CleanAir 53 Restrictions for CleanAir 54 Information About CleanAir 55 Cisco CleanAir Components 55 Terms Used in Cisco CleanAir 57 Interference Types that Cisco CleanAir can Detect 57 Interference Device Merging 58 Persistent Devices 59 Persistent Devices Detection 59 Persistent Device Avoidance 59 EDRRM and AQR Update Mode 59 CleanAir High Availability 59 How to Configure CleanAir 60 Enabling CleanAir for 2.4-GHz Band 60 Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices 60 Configuring Interference Reporting for 2.4-GHz Devices 62 Enabling CleanAir for 5-GHz Band 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices 64 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) v Contents PART III CHAPTER 5 Configuring Interference Reporting for 5-GHz devices 65 Configuring EDRRM for CleanAir-Events 67 Configuring Persistent Device Avoidance 67 Configuring Cisco CleanAir using the Controller GUI 68 Configuring Cisco CleanAir on the Cisco Wireless LAN Controller (GUI) 68 Configuring Cisco CleanAir on an Access Point (GUI) 70 Configuring Cisco Spectrum Expert 70 Configuring Spectrum Expert (GUI) 70 Configuring Spectrum Expert (CLI) 72 Monitoring CleanAir Parameters 73 Monitoring the Interference Devices 76 Monitoring the Interference Devices (GUI) 76 Monitoring the Worst Air Quality of Radio Bands (GUI) 77 Configuration Examples for Configuring CleanAir 77 CleanAir FAQs 78 Additional References 80 Interface and Hardware Component 81 Configuring Interface Characteristics 83 Finding Feature Information 83 Information About Configuring Interface Characteristics 83 Interface Types 83 Port-Based VLANs 83 Switch Ports 84 Routed Ports 85 Switch Virtual Interfaces 86 EtherChannel Port Groups 87 Power over Ethernet Ports 87 Using the Switch USB Ports 87 USB Mini-Type B Console Port 87 Interface Connections 88 Default Ethernet Interface Configuration 89 Interface Speed and Duplex Mode 90 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) vi Contents CHAPTER 6 Speed and Duplex Configuration Guidelines 90 IEEE 802.3x Flow Control 91 Layer 3 Interfaces 92 How to Configure Interface Characteristics 93 Configuring Interfaces Procedure 93 Adding a Description for an Interface 93 Configuring a Range of Interfaces 94 Configuring and Using Interface Range Macros 95 Configuring Ethernet Interfaces 97 Setting the Interface Speed and Duplex Parameters 97 Configuring IEEE 802.3x Flow Control 98 Configuring Layer 3 Interfaces 99 Configuring Logical Layer 3 GRE Tunnel Interfaces 100 Configuring SVI Autostate Exclude 102 Shutting Down and Restarting the Interface 102 Configuring the Console Media Type 103 Configuring the USB Inactivity Timeout 104 Monitoring Interface Characteristics 105 Monitoring Interface Status 105 Clearing and Resetting Interfaces and Counters 106 Configuration Examples for Interface Characteristics 107 Adding a Description to an Interface: Example 107 Configuring a Range of Interfaces: Examples 107 Configuring and Using Interface Range Macros: Examples 107 Setting Interface Speed and Duplex Mode: Example 108 Configuring Layer 3 Interfaces: Example 108 Configuring the Console Media Type: Example 108 Configuring the USB Inactivity Timeout: Example 109 Additional References for the Interface Characteristics Feature 110 Feature History and Information for Configuring Interface Characteristics 110 Configuring Auto-MDIX 111 Prerequisites for Auto-MDIX 111 Restrictions for Auto-MDIX 111 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) vii Contents CHAPTER 7 CHAPTER 8 Information about Configuring Auto-MDIX 112 Auto-MDIX on an Interface 112 How to Configure Auto-MDIX 112 Configuring Auto-MDIX on an Interface 112 Monitoring Auto-MDIX 114 Example for Configuring Auto-MDIX 114 Additional References 114 Feature History and Information for Auto-MDIX 115 Configuring Ethernet Management Port 117 Finding Feature Information 117 Prerequisites for Ethernet Management Ports 117 Information about the Ethernet Management Port 117 Ethernet Management Port Direct Connection to a Switch 118 Ethernet Management Port Connection to Stack Switches using a Hub 118 Ethernet Management Port and Routing 118 Supported Features on the Ethernet Management Port 119 How to Configure the Ethernet Management Port 120 Disabling and Enabling the Ethernet Management Port 120 Additional References 121 Feature Information for Ethernet Management Ports 122 Configuring LLDP, LLDP-MED, and Wired Location Service 123 Finding Feature Information 123 LLDP, LLDP-MED, and Wired Location Service Overview 123 LLDP 123 LLDP Supported TLVs 124 LLDP and Cisco Switch Stacks 124 LLDP and Cisco Medianet 124 LLDP-MED 124 LLDP-MED Supported TLVs 124 Wired Location Service 126 Default LLDP Configuration 127 Configuration Guidelines 127 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) viii Contents CHAPTER 9 CHAPTER 10 How to Configure LLDP, LLDP-MED, and Wired Location Service 127 Enabling LLDP 127 Configuring LLDP Characteristics 129 Configuring LLDP-MED TLVs 131 Configuring Network-Policy TLV 132 Configuring Location TLV and Wired Location Service 134 Enabling Wired Location Service on the Switch 137 Configuration Examples for LLDP, LLDP-MED, and Wired Location Service 138 Configuring Network-Policy TLV: Examples 138 Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service 138 Additional References for LLDP, LLDP-MED, and Wired Location Service 140 Feature Information for LLDP, LLDP-MED, and Wired Location Service 140 Configuring System MTU 141 Configuring System MTU 141 Finding Feature Information 141 Information about the MTU 141 Restrictions for System MTU 141 System MTU Value Application 141 Configuring the System MTU 142 Configuring the System MTU 142 Configuring Protocol-Specific MTU 142 Configuration Examples for System MTU 143 Example: Configuring the System MTU 143 Example: Configuring Protocol-Specific MTU 144 Additional References for System MTU 144 Feature Information for System MTU 145 Configuring Internal Power Supplies 147 Information About Internal Power Supplies 147 How to Configure Internal Power Supplies 147 Configuring an Internal Power Supply 147 Monitoring Internal Power Supplies 148 Configuration Examples for Internal Power Supplies 148 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) ix Contents CHAPTER 11 CHAPTER 12 PART IV CHAPTER 13 Additional References 149 Feature History and Information for Internal Power Supplies 150 Configuring PoE 151 Finding Feature Information 151 Information about PoE 151 Power over Ethernet Ports 151 Supported Protocols and Standards 152 Powered-Device Detection and Initial Power Allocation 152 Power Management Modes 153 How to Configure PoE 156 Configuring a Power Management Mode on a PoE Port 156 Configuring Power Policing 157 Monitoring Power Status 159 Additional References 160 Feature Information for PoE 160 Configuring EEE 161 Finding Feature Information 161 Information About EEE 161 EEE Overview 161 Default EEE Configuration 161 Restrictions for EEE 162 How to Configure EEE 162 Enabling or Disabling EEE 162 Monitoring EEE 163 Configuration Examples for Configuring EEE 163 Additional References 164 Feature History and Information for Configuring EEE 164 IP Multicast Routing 165 Configuring IGMP 167 Finding Feature Information 167 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) x Contents Restrictions for Configuring IGMP 167 Information About IGMP 168 IP Multicast Group Addresses 168 IGMP Versions 168 IGMP Version 1 169 IGMP Version 2 169 IGMP Version 3 169 IGMPv3 Host Signalling 169 IGMP Snooping 169 Joining a Multicast Group 170 Leaving a Multicast Group 172 Immediate Leave 172 IGMP Configurable-Leave Timer 173 IGMP Report Suppression 173 IGMP Snooping and Switch Stacks 173 IGMP Filtering and Throttling Overview 174 Default IGMP Configuration 174 Default IGMP Snooping Configuration 175 Default IGMP Filtering and Throttling Configuration 175 How to Configure IGMP 176 Configuring the Switch as a Member of a Group (CLI) 176 Controlling Access to IP Multicast Group (CLI) 178 Modifying the IGMP Host-Query Message Interval (CLI) 179 Changing the IGMP Query Timeout for IGMPv2 (CLI) 181 Changing the Maximum Query Response Time for IGMPv2 (CLI) 183 Configuring the Switch as a Statically Connected Member (CLI) 185 Configuring IGMP Profiles (CLI) 187 Applying IGMP Profiles (CLI) 188 Setting the Maximum Number of IGMP Groups (CLI) 190 Configuring the IGMP Throttling Action (CLI) 191 How to Configure IGMP Snooping 193 Enabling or Disabling IGMP Snooping on a Switch (CLI) 193 Enabling or Disabling IGMP Snooping on a VLAN Interface (CLI) 194 Setting the Snooping Method (CLI) 195 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xi Contents CHAPTER 14 Configuring a Multicast Router Port (CLI) 197 Configuring a Host Statically to Join a Group (CLI) 198 Enabling IGMP Immediate Leave (CLI) 199 Configuring the IGMP Leave Timer (CLI) 200 Configuring the IGMP Robustness-Variable (CLI) 202 Configuring the IGMP Last Member Query Count (CLI) 203 Configuring TCN-Related Commands 205 Configuring the IGMP Snooping Querier (CLI) 209 Disabling IGMP Report Suppression (CLI) 211 Monitoring IGMP 212 Displaying IGMP Snooping Information 213 Displaying IGMP Filtering and Throttling Configuration 214 Configuration Examples for IGMP 215 Example: Configuring the Switch as a Member of a Multicast Group 215 Example: Controlling Access to Multicast Groups 215 Examples: Configuring IGMP Snooping 216 Examples: Configuring Filtering and Throttling 217 Example: Interface Configuration as a Routed Port 217 Example: Interface Configuration as an SVI 218 Where to Go Next for IGMP 218 Additional References 218 Feature History and Information for IGMP 220 Configuring Wireless Multicast 221 Finding Feature Information 221 Prerequisites for Configuring Wireless Multicast 221 Restrictions for Configuring Wireless Multicast 221 Information About Wireless Multicast 222 Information About Multicast Optimization 222 How to Configure Wireless Multicast 223 Configuring Wireless Multicast-MCMC Mode (CLI) 223 Configuring Wireless Multicast-MCUC Mode (CLI) 224 Configuring IPv6 Snooping (CLI) 225 Configuring IPv6 Snooping Policy (CLI) 225 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xii CHAPTER 15 Configuring Layer 2 Port as Multicast Router Port (CLI) 226 Configuring RA Guard (CLI) 227 Configuring Non-IP Wireless Multicast (CLI) 228 Configuring Wireless Broadcast (CLI) 229 Configuring IP Multicast VLAN for WLAN (CLI) 230 Monitoring Wireless Multicast 231 Where to Go Next for Wireless Multicast 231 Additional References 232 Configuring PIM 235 Finding Feature Information 235 Prerequisites for Configuring PIM 235 Restrictions for Configuring PIM 236 Restrictions for Configuring Auto-RP 236 Restrictions for Configuring Auto-RP and BSR 236 Information About PIM 237 PIM Versions 238 PIMv1 and PIMv2 Interoperability 238 PIM Modes 239 PIM DM 239 PIM-SM 239 PIM Stub Routing 240 IGMP Helper 241 Auto-RP 241 Auto-RP Benefits 242 PIM v2 BSR 242 Multicast Forwarding and Reverse Path Check 243 PIM Shared Tree and Source Tree 244 Default PIM Routing Configuration 246 How to Configure PIM 246 Enabling PIM Stub Routing (CLI) 246 Configuring a Rendezvous Point 248 Manually Assigning an RP to Multicast Groups (CLI) 249 Setting Up Auto-RP in a New Internetwork (CLI) 251 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xiii Contents CHAPTER 16 Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI) 254 Preventing Join Messages to False RPs (CLI) 257 Filtering Incoming RP Announcement Messages (CLI) 257 Configuring PIMv2 BSR 259 Defining the PIM Domain Border (CLI) 259 Defining the IP Multicast Boundary (CLI) 262 Configuring Candidate BSRs (CLI) 264 Configuring the Candidate RPs (CLI) 265 Configuring Auto-RP and BSR for the Network (CLI) 267 Delaying the Use of PIM Shortest-Path Tree (CLI) 268 Modifying the PIM Router-Query Message Interval (CLI) 270 Monitoring PIM 272 Monitoring RP Mapping 273 Troubleshooting PIMv1 and PIMv2 Interoperability Problems 273 Configuration Examples for PIM 273 Example: Enabling PIM Stub Routing 273 Example: Verifying PIM Stub Routing 274 Example: Manually Assigning an RP to Multicast Groups 274 Example: Configuring Auto-RP 274 Example: Defining the IP Multicast Boundary to Deny Auto-RP Information 275 Example: Filtering Incoming RP Announcement Messages 275 Example: Preventing Join Messages to False RPs 275 Example: Configuring Candidate BSRs 276 Example: Configuring Candidate RPs 276 Where to Go Next for PIM 276 Additional References 277 Feature History and Information for PIM 279 Configuring SSM 281 Finding Feature Information 281 Prerequisites for Configuring SSM 281 Restrictions for Configuring SSM 282 Information About SSM 283 SSM Components Overview 283 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xiv CHAPTER 17 SSM and Internet Standard Multicast (ISM) 283 SSM IP Address Range 284 SSM Operations 284 SSM Mapping 284 Static SSM Mapping 285 DNS-Based SSM Mapping 285 How to Configure SSM 286 Configuring SSM (CLI) 286 Configuring Source Specific Multicast Mapping 288 Configuring Static SSM Mapping (CLI) 288 Configuring DNS-Based SSM Mapping (CLI) 289 Configuring Static Traffic Forwarding with SSM Mapping (CLI) 291 Monitoring SSM 293 Monitoring SSM Mapping 294 Where to Go Next for SSM 294 Additional References 294 Feature History and Information for SSM 296 Configuring IP Multicast Routing 297 Finding Feature Information 297 Prerequisites for Configuring IP Multicast Routing 297 Restrictions for Configuring IP Multicast Routing 298 Information About IP Multicast Routing 298 Cisco's Implementation of IP Multicast Routing 298 Multicast Forwarding Information Base Overview 299 Multicast Group Concept 300 Multicast Boundaries 300 Multicast Routing and Switch Stacks 301 Default Multicast Routing Configuration 301 How to Configure Basic IP Multicast Routing 301 Configuring Basic IP Multicast Routing (CLI) 301 Configuring IP Multicast Forwarding (CLI) 304 Configuring a Static Multicast Route (mroute) (CLI) 305 Configuring sdr Listener Support 307 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xv Contents CHAPTER 18 Enabling sdr Listener Support (CLI) 307 Limiting How Long an sdr Cache Entry Exists (CLI) 309 Configuring an IP Multicast Boundary (CLI) 310 Monitoring and Maintaining IP Multicast Routing 313 Clearing Caches, Tables, and Databases 313 Displaying System and Network Statistics 314 Monitoring IP Multicast Routing 316 Configuration Examples for IP Multicast Routing 316 Example: Configuring an IP Multicast Boundary 316 Example: Responding to mrinfo Requests 317 Where to Go Next for IP Multicast 317 Additional References 318 Feature History and Information for IP Multicast 319 Configuring the Service Discovery Gateway 321 Finding Feature Information 321 Restrictions for Configuring the Service Discovery Gateway 321 Information about the Service Discovery Gateway and mDNS 322 mDNS 322 mDNS-SD 322 Service Discovery Gateway 323 mDNS Gateway and Subnets 323 Filtering 324 How to Configure the Service Discovery Gateway 325 Configuring the Service List (CLI) 325 Configuring Service List (GUI) 327 Enabling mDNS Gateway and Redistributing Services (CLI) 329 Enabling Multicast DNS Gateway (GUI) 331 Monitoring Service Discovery Gateway 332 Configuration Examples 332 Example: Specify Alternative Source Interface for Outgoing mDNS Packets 332 Example: Redistribute Service Announcements 333 Example: Disable Bridging of mDNS Packets to Wireless Clients 333 Example: Creating a Service-List, Applying a Filter and Configuring Parameters 333 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xvi PART V CHAPTER 19 Example: Enabling mDNS Gateway and Redistributing Services 333 Example: Global mDNS Configuration 334 Example: Interface mDNS Configuration 334 Where to Go Next for Configuring Services Discovery Gateway 335 Additional References 335 Feature History and Information for Services Discovery Gateway 336 IPv6 337 Configuring MLD Snooping 339 Finding Feature Information 339 Information About Configuring IPv6 MLD Snooping 339 Understanding MLD Snooping 340 MLD Messages 340 MLD Queries 341 Multicast Client Aging Robustness 341 Multicast Router Discovery 341 MLD Reports 342 MLD Done Messages and Immediate-Leave 342 Topology Change Notification Processing 343 MLD Snooping in Switch Stacks 343 How to Configure IPv6 MLD Snooping 343 Default MLD Snooping Configuration 343 MLD Snooping Configuration Guidelines 344 Enabling or Disabling MLD Snooping on the Switch (CLI) 344 Enabling or Disabling MLD Snooping on a VLAN (CLI) 345 Configuring a Static Multicast Group (CLI) 346 Configuring a Multicast Router Port (CLI) 347 Enabling MLD Immediate Leave (CLI) 348 Configuring MLD Snooping Queries (CLI) 348 Disabling MLD Listener Message Suppression (CLI) 350 Displaying MLD Snooping Information 351 Configuration Examples for Configuring MLD Snooping 351 Configuring a Static Multicast Group: Example 351 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xvii Contents CHAPTER 20 Configuring a Multicast Router Port: Example 352 Enabling MLD Immediate Leave: Example 352 Configuring MLD Snooping Queries: Example 352 Configuring IPv6 Unicast Routing 353 Finding Feature Information 353 Information About Configuring IPv6 Unicast Routing 353 Understanding IPv6 353 IPv6 Addresses 354 Supported IPv6 Unicast Routing Features 354 Unsupported IPv6 Unicast Routing Features 358 IPv6 Feature Limitations 359 IPv6 and Switch Stacks 359 Default IPv6 Configuration 360 Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI) 360 Configuring IPv4 and IPv6 Protocol Stacks (CLI) 363 Configuring Default Router Preference (CLI) 365 Configuring IPv6 ICMP Rate Limiting (CLI) 366 Configuring CEF and dCEF for IPv6 367 Configuring Static Routing for IPv6 (CLI) 368 Configuring RIP for IPv6 (CLI) 370 Configuring OSPF for IPv6 (CLI) 371 Configuring EIGRP for IPv6 374 Displaying IPv6 374 Configuring DHCP for IPv6 Address Assignment 375 Default DHCPv6 Address Assignment Configuration 375 DHCPv6 Address Assignment Configuration Guidelines 375 Enabling DHCPv6 Server Function (CLI) 376 Enabling DHCPv6 Client Function (CLI) 378 Configuration Examples for IPv6 Unicast Routing 379 Configuring IPv6 Addressing and Enabling IPv6 Routing: Example 379 Configuring Default Router Preference: Example 379 Configuring IPv4 and IPv6 Protocol Stacks: Example 380 Enabling DHCPv6 Server Function: Example 380 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xviii Contents CHAPTER 21 Enabling DHCPv6 Client Function: Example 381 Configuring IPv6 ICMP Rate Limiting: Example 381 Configuring Static Routing for IPv6: Example 381 Configuring RIP for IPv6: Example 381 Displaying IPv6: Example 381 Configuring IPv6 Client IP Address Learning 383 Prerequisites for IPv6 Client Address Learning 383 Information About IPv6 Client Address Learning 383 SLAAC Address Assignment 384 Stateful DHCPv6 Address Assignment 385 Static IP Address Assignment 386 Router Solicitation 386 Router Advertisement 386 Neighbor Discovery 387 Neighbor Discovery Suppression 387 RA Guard 387 RA Throttling 388 Configuring IPv6 Unicast (CLI) 388 Configuring RA Guard Policy (CLI) 389 Applying RA Guard Policy (CLI) 390 Configuring RA Throttle Policy (CLI) 391 Applying RA Throttle Policy on VLAN (CLI) 392 Configuring IPv6 Snooping (CLI) 393 Configuring IPv6 ND Suppress Policy (CLI) 394 Configuring IPv6 Snooping on VLAN/PortChannel 395 Configuring IPv6 on Switch (CLI) 396 Configuring DHCP Pool (CLI) 396 Configuring Stateless Auto Address Configuration Without DHCP (CLI) 397 Configuring Stateless Auto Address Configuration With DHCP (CLI) 399 Configuring Stateful DHCP Locally (CLI) 400 Configuring Stateful DHCP Externally (CLI) 402 Monitoring IPv6 Clients (GUI) 404 Verifying IPv6 Address Learning Configuration 404 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xix Contents CHAPTER 22 CHAPTER 23 Additional References 405 Feature Information for IPv6 Client Address Learning 406 Configuring IPv6 WLAN Security 407 Prerequisites for IPv6 WLAN Security 407 Restrictions for IPv6 WLAN Security 407 Information About IPv6 WLAN Security 407 How to Configure IPv6 WLAN Security 410 Configuring Local Authentication 410 Creating a Local User 410 Creating an Client VLAN and Interface 410 Configuring a EAP Profile 412 Creating a Local Authentication Model 414 Creating a Client WLAN 416 Configuring Local Authentication with WPA2+AES 417 Configuring External RADIUS Server 421 Configuring RADIUS Authentication Server Host 421 Configuring RADIUS Authentication Server Group 422 Creating a Client VLAN 424 Creating 802.1x WLAN Using an External RADIUS Server 425 Additional References 426 Feature Information for IPv6 WLAN Security 427 Configuring IPv6 ACL 429 Prerequisites for IPv6 ACL 429 Restrictions for IPv6 ACL 429 Information About IPv6 ACL 430 Understanding IPv6 ACLs 430 Types of ACL 431 Per User IPv6 ACL 431 Filter ID IPv6 ACL 431 Downloadable IPv6 ACL 431 IPv6 ACLs and Switch Stacks 432 Configuring IPv6 ACLs 432 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xx CHAPTER 24 Default IPv6 ACL Configuration 433 Interaction with Other Features and Switches 433 How To Configure an IPv6 ACL 433 Creating IPv6 ACL 433 Applying an IPv6 to an Interface 437 Creating WLAN IPv6 ACL 438 Verifying IPv6 ACL 439 Displaying IPv6 ACLs 439 Configuration Examples for IPv6 ACL 439 Example: Creating IPv6 ACL 439 Example: Applying IPv6 ACLs 440 Example: Displaying IPv6 ACLs 440 Example: Configuring RA Throttling and NS Suppression 440 Example: Configuring RA Guard Policy 442 Example: Configuring IPv6 Neighbor Binding 443 Additional References 444 Feature Information for IPv6 ACLs 444 Configuring IPv6 Web Authentication 447 Prerequisites for IPv6 Web Authentication 447 Restrictions for IPv6 Web Authentication 447 Information About IPv6 Web Authentication 448 Web Authentication Process 448 How to Configure IPv6 Web Authentication 449 Disabling WPA 449 Enabling Security on the WLAN 450 Enabling a Parameter Map on the WLAN 451 Enabling Authentication List on WLAN 451 Configuring a Global WebAuth WLAN Parameter Map 451 Configuring the WLAN 452 Enabling IPv6 in Global Configuration Mode 453 Verifying IPv6 Web Authentication 454 Verifying the Parameter Map 454 Verifying Authentication List 455 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxi Contents CHAPTER 25 CHAPTER 26 CHAPTER 27 Additional References 456 Feature Information for IPv6 Web Authentication 456 Configuring IPv6 Client Mobility 459 Prerequisites for IPv6 Client Mobility 459 Restrictions For IPv6 Client Mobility 459 Information About IPv6 Client Mobility 460 Using Router Advertisment 460 RA Throttling and NS suppression 461 IPv6 Address Learning 462 Handling Multiple IP Addresses 462 IPv6 Configuration 462 High Availability 463 Verifying IPv6 Client Mobility 463 Monitoring IPv6 Client Mobility 463 Additional References 464 Feature Information For IPv6 Client Mobility 465 Configuring IPv6 Mobility 467 Pre-requisites for IPv6 Mobility 467 Information About IPv6 Mobility 467 Inter Controller Roaming 467 Intra Subnet Roaming with Sticky Anchoring, and Inter Subnet Roaming 468 How to Configure IPv6 Mobility 468 Monitoring IPv6 Mobility 468 Additional References 470 Feature Information for IPv6 Mobility 471 Configuring IPv6 NetFlow 473 Prerequisites For IPv6 Netflow 473 Restrictions For IPv6 Netflow 473 Information About IPv6 Netflow 474 Understanding Flexible Netflow 474 IPv6 Netflow 475 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxii PART VI CHAPTER 28 How To Configure IPv6 Netflow 475 Configuring a Customized Flow Record 475 Configuring the Flow Exporters 478 Configuring a Customized Flow Monitor 480 Applying a Flow Monitor to an Interface 482 Configuring and Enabling Flow Sampling 484 Verifying IPv6 Netflow 486 Monitoring IPv6 Netflow 486 Additional References 486 Feature Information for IPv6 NetFlow 487 Layer 2/3 489 Configuring Spanning Tree Protocol 491 Finding Feature Information 491 Restrictions for STP 491 Information About Spanning Tree Protocol 492 Spanning Tree Protocol 492 Spanning-Tree Topology and BPDUs 492 Bridge ID, Device Priority, and Extended System ID 494 Port Priority Versus Path Cost 495 Spanning-Tree Interface States 496 How a Switch or Port Becomes the Root Switch or Root Port 499 Spanning Tree and Redundant Connectivity 499 Spanning-Tree Address Management 500 Accelerated Aging to Retain Connectivity 500 Spanning-Tree Modes and Protocols 500 Supported Spanning-Tree Instances 501 Spanning-Tree Interoperability and Backward Compatibility 501 STP and IEEE 802.1Q Trunks 502 VLAN-Bridge Spanning Tree 502 Spanning Tree and Switch Stacks 502 Default Spanning-Tree Configuration 503 How to Configure Spanning-Tree Features 504 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxiii Contents CHAPTER 29 Changing the Spanning-Tree Mode (CLI) 504 Disabling Spanning Tree (CLI) 505 Configuring the Root Switch (CLI) 506 Configuring a Secondary Root Device (CLI) 507 Configuring Port Priority (CLI) 508 Configuring Path Cost (CLI) 510 Configuring the Device Priority of a VLAN (CLI) 511 Configuring the Hello Time (CLI) 512 Configuring the Forwarding-Delay Time for a VLAN (CLI) 513 Configuring the Maximum-Aging Time for a VLAN (CLI) 513 Configuring the Transmit Hold-Count (CLI) 514 Monitoring Spanning-Tree Status 515 Additional References for Spanning-Tree Protocol 516 Feature Information for STP 517 Configuring Multiple Spanning-Tree Protocol 519 Finding Feature Information 519 Prerequisites for MSTP 519 Restrictions for MSTP 520 Information About MSTP 521 MSTP Configuration 521 MSTP Configuration Guidelines 521 Root Switch 522 Multiple Spanning-Tree Regions 523 IST, CIST, and CST 523 Operations Within an MST Region 524 Operations Between MST Regions 524 IEEE 802.1s Terminology 525 Illustration of MST Regions 525 Hop Count 526 Boundary Ports 527 IEEE 802.1s Implementation 527 Port Role Naming Change 527 Interoperation Between Legacy and Standard Switches 528 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxiv Contents CHAPTER 30 Detecting Unidirectional Link Failure 528 MSTP and Switch Stacks 529 Interoperability with IEEE 802.1D STP 529 RSTP Overview 529 Port Roles and the Active Topology 530 Rapid Convergence 530 Synchronization of Port Roles 532 Bridge Protocol Data Unit Format and Processing 533 Topology Changes 534 Protocol Migration Process 535 Default MSTP Configuration 535 How to Configure MSTP Features 536 Specifying the MST Region Configuration and Enabling MSTP (CLI) 536 Configuring the Root Switch (CLI) 538 Configuring a Secondary Root Switch (CLI) 539 Configuring Port Priority (CLI) 540 Configuring Path Cost (CLI) 542 Configuring the Switch Priority (CLI) 543 Configuring the Hello Time (CLI) 544 Configuring the Forwarding-Delay Time (CLI) 545 Configuring the Maximum-Aging Time (CLI) 546 Configuring the Maximum-Hop Count (CLI) 547 Specifying the Link Type to Ensure Rapid Transitions (CLI) 548 Designating the Neighbor Type (CLI) 549 Restarting the Protocol Migration Process (CLI) 550 Monitoring MST Configuration and Status 551 Additional References for MSTP 551 Feature Information for MSTP 552 Configuring Optional Spanning-Tree Features 553 Finding Feature Information 553 Restriction for Optional Spanning-Tree Features 553 Information About Optional Spanning-Tree Features 554 PortFast 554 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxv Contents CHAPTER 31 BPDU Guard 554 BPDU Filtering 555 UplinkFast 555 Cross-Stack UplinkFast 557 How Cross-Stack UplinkFast Works 558 Events That Cause Fast Convergence 559 BackboneFast 560 EtherChannel Guard 562 Root Guard 562 Loop Guard 563 How to Configure Optional Spanning-Tree Features 564 Enabling PortFast (CLI) 564 Enabling BPDU Guard (CLI) 565 Enabling BPDU Filtering (CLI) 566 Enabling UplinkFast for Use with Redundant Links (CLI) 568 Disabling UplinkFast (CLI) 569 Enabling BackboneFast (CLI) 570 Enabling EtherChannel Guard (CLI) 571 Enabling Root Guard (CLI) 572 Enabling Loop Guard (CLI) 573 Monitoring the Spanning-Tree Status 574 Additional References for Optional Spanning Tree Features 575 Feature Information for Optional Spanning-Tree Features 576 Configuring EtherChannels 577 Finding Feature Information 577 Restrictions for EtherChannels 577 Information About EtherChannels 578 EtherChannel Overview 578 EtherChannel Modes 579 EtherChannel on Switches 579 EtherChannel Link Failover 580 Channel Groups and Port-Channel Interfaces 580 Port Aggregation Protocol 581 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxvi PAgP Modes 582 PAgP Learn Method and Priority 583 PAgP Interaction with Other Features 584 Link Aggregation Control Protocol 584 LACP Modes 584 LACP and Link Redundancy 585 LACP Interaction with Other Features 585 EtherChannel On Mode 585 Load-Balancing and Forwarding Methods 586 MAC Address Forwarding 586 IP Address Forwarding 587 Load-Balancing Advantages 587 EtherChannel and Switch Stacks 588 Switch Stack and PAgP 589 Switch Stacks and LACP 589 Default EtherChannel Configuration 589 EtherChannel Configuration Guidelines 590 Layer 2 EtherChannel Configuration Guidelines 591 Layer 3 EtherChannel Configuration Guidelines 592 How to Configure EtherChannels 592 Configuring Layer 2 EtherChannels (CLI) 592 Configuring Layer 3 EtherChannels (CLI) 595 Configuring EtherChannel Load-Balancing (CLI) 596 Configuring EtherChannel Extended Load-Balancing (CLI) 598 Configuring the PAgP Learn Method and Priority (CLI) 599 Configuring LACP Hot-Standby Ports 600 Configuring the LACP Max Bundle Feature (CLI) 601 Configuring the Port Channel Min-Links Feature (CLI) 602 Configuring the LACP System Priority (CLI) 603 Configuring the LACP Port Priority (CLI) 604 Monitoring EtherChannel, PAgP, and LACP Status 605 Configuration Examples for Configuring EtherChannels 606 Configuring Layer 2 EtherChannels: Examples 606 Configuring Layer 3 EtherChannels: Examples 607 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxvii Contents CHAPTER 32 Configuring LACP Hot-Standby Ports: Example 607 Additional References for EtherChannels 608 Feature Information for EtherChannels 609 Configuring Flex Links and the MAC Address-Table Move Update Feature 611 Finding Feature Information 611 Restrictions for Configuring Flex Links and MAC Address-Table Move Update 611 Information About Flex Links and MAC Address-Table Move Update 612 Flex Links 612 Flex Links Configuration 612 VLAN Flex Links Load Balancing and Support 613 Multicast Fast Convergence with Flex Links Failover 613 Learning the Other Flex Links Port as the mrouter Port 613 Generating IGMP Reports 614 Leaking IGMP Reports 614 MAC Address-Table Move Update 614 Flex Links VLAN Load Balancing Configuration Guidelines 616 MAC Address-Table Move Update Configuration Guidelines 616 Default Flex Links and MAC Address-Table Move Update Configuration 616 How to Configure Flex Links and the MAC Address-Table Move Update Feature 616 Configuring Flex Links (CLI) 616 Configuring a Preemption Scheme for a Pair of Flex Links (CLI) 617 Configuring VLAN Load Balancing on Flex Links (CLI) 619 Configuring MAC Address-Table Move Update (CLI) 619 Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages (CLI) 621 Monitoring Flex Links, Multicast Fast Convergence, and MAC Address-Table Move Update 621 Configuration Examples for Flex Links 622 Configuring Flex Links: Examples 622 Configuring VLAN Load Balancing on Flex Links: Examples 622 Configuring the MAC Address-Table Move Update: Examples 623 Configuring Multicast Fast Convergence with Flex Links Failover: Examples 624 Additional References for Flex Links and MAC Address-Table Move Update 626 Feature Information for Flex Links and MAC Address-Table Move Update 627 xxviii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents CHAPTER 33 PART VII CHAPTER 34 Configuring UniDirectional Link Detection 629 Finding Feature Information 629 Restrictions for Configuring UDLD 629 Information About UDLD 630 Modes of Operation 630 Normal Mode 630 Aggressive Mode 630 Methods to Detect Unidirectional Links 631 Neighbor Database Maintenance 631 Event-Driven Detection and Echoing 631 UDLD Reset Options 632 Default UDLD Configuration 632 How to Configure UDLD 632 Enabling UDLD Globally (CLI) 632 Enabling UDLD on an Interface (CLI) 634 Monitoring and Maintaining UDLD 635 Additional References for UDLD 635 Feature Information for UDLD 636 Lightweight Access Point 637 Configuring the Switch for Access Point Discovery 639 Finding Feature Information 639 Prerequisites for Configuring the Switch for Access Point Discovery 639 Restrictions for Configuring the Switch for Access Point Discovery 640 Information About Configuring the Switch for Access Point Discovery 640 Access Point Communication Protocols 640 Viewing Access Point Join Information 641 Troubleshooting the Access Point Join Process 641 How to Configure Access Point Discovery 642 Configuring the Syslog Server for Access Points (CLI) 642 Monitoring Access Point Join Information (CLI) 643 Searching for Access Point Radios (GUI) 644 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxix Contents CHAPTER 35 CHAPTER 36 CHAPTER 37 Monitoring the Interface Details (GUI) 644 Configuration Examples for Configuring the Switch for Access Point Discovery 645 Displaying the MAC Addresses of all Access Points: Example 645 DHCP Option 43 for Lightweight Cisco Aironet Access Points Configuration Example 646 Configuring Data Encryption 647 Finding Feature Information 647 Prerequisites for Configuring Data Encryption 647 Restrictions for Configuring Data Encryption 647 Information About Data Encryption 648 How to Configure Data Encryption 648 Configuring Data Encryption (CLI) 648 Configuring Data Encryption (GUI) 649 Configuration Examples for Configuring Data Encryption 649 Displaying Data Encryption States for all Access Points: Examples 649 Configuring Retransmission Interval and Retry Count 651 Finding Feature Information 651 Prerequisites for Configuring the Access Point Retransmission Interval and Retry Count 651 Information About Retransmission Interval and Retry Count 652 How to Configure Access Point Retransmission Interval and Retry Count 652 Configuring the Access Point Retransmission Interval and Retry Count (CLI) 652 Configuring the Access Point Retransmission Interval and Retry Count (GUI) 653 Viewing CAPWAP Maximum Transmission Unit Information (CLI) 654 Viewing CAPWAP Maximum Transmission Unit Information (GUI) 655 Configuration Examples for Configuring Access Point Retransmission Interval and Retry Count 655 Viewing the CAPWAP Retransmission Details: Example 655 Viewing Maximum Transmission Unit Information: Example 655 Configuring Adaptive Wireless Intrusion Prevention System 657 Finding Feature Information 657 Prerequisites for Configuring wIPS 657 How to Configure wIPS on Access Points 657 Configuring wIPS on an Access Point (CLI) 657 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxx Contents CHAPTER 38 CHAPTER 39 Configuring wIPS on an Access Point (GUI) 659 Monitoring wIPS Information 659 Configuration Examples for Configuring wIPS on Access Points 660 Displaying the Monitor Configuration Channel Set: Example 660 Displaying wIPS Information: Examples 661 Configuring Authentication for Access Points 663 Finding Feature Information 663 Prerequisites for Configuring Authentication for Access Points 663 Restrictions for Configuring Authentication for Access Points 664 Information about Configuring Authentication for Access Points 664 How to Configure Authentication for Access Points 664 Configuring Global Credentials for Access Points (CLI) 664 Configuring Global Credentials for Access Points (GUI) 666 Configuring Authentication for Access Points (CLI) 667 Configuring Authentication for Access Points (GUI) 669 Configuring the Switch for Authentication (CLI) 670 Configuration Examples for Configuring Authentication for Access Points 672 Displaying the Authentication Settings for Access Points: Examples 672 Converting Autonomous Access Points to Lightweight Mode 673 Finding Feature Information 673 Prerequisites for Converting Autonomous Access Points to Lightweight Mode 673 Information About Autonomous Access Points Converted to Lightweight Mode 674 Reverting from Lightweight Mode to Autonomous Mode 674 Using DHCP Option 43 and DHCP Option 60 674 How Converted Access Points Send Crash Information to the Switch 675 Uploading Memory Core Dumps from Converted Access Points 675 Displaying MAC Addresses for Converted Access Points 675 Configuring a Static IP Address for a Lightweight Access Point 675 How to Convert a Lightweight Access Point Back to an Autonomous Access Point 676 Converting a Lightweight Access Point Back to an Autonomous Access Point (CLI) 676 Converting a Lightweight Access Point Back to an Autonomous Access Point (Using the Mode Button and a TFTP Server) 676 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxxi Contents CHAPTER 40 CHAPTER 41 CHAPTER 42 CHAPTER 43 Authorizing Access Points (CLI) 677 Authorizing Access Points (GUI) 678 Disabling the Reset Button on Converted Access Points (CLI) 679 Monitoring the AP Crash Log Information 680 How to Configure a Static IP Address on an Access Point 680 Configuring a Static IP Address on an Access Point (CLI) 680 Configuring a Static IP Address on an Access Point (GUI) 682 Recovering the Access Point Using the TFTP Recovery Procedure 683 Configuration Examples for Converting Autonomous Access Points to Lightweight Mode 683 Displaying the IP Address Configuration for Access Points: Example 683 Displaying Access Point Crash File Information: Example 683 Using Cisco Workgroup Bridges 685 Finding Feature Information 685 Information About Cisco Workgroup Bridges and non-Cisco Workgroup bridges 685 Monitoring the Status of Workgroup Bridges 686 Debugging WGB Issues (CLI) 686 Configuration Examples for Configuring Workgroup Bridges 688 WGB Configuration: Example 688 Configuring Probe Request Forwarding 689 Finding Feature Information 689 Information About Configuring Probe Request Forwarding 689 How to Configure Probe Request Forwarding (CLI) 689 Optimizing RFID Tracking 691 Finding Feature Information 691 Optimizing RFID Tracking on Access Points 691 How to Optimize RFID Tracking on Access Points 691 Optimizing RFID Tracking on Access Points (CLI) 691 Configuration Examples for Optimizing RFID Tracking 693 Displaying all the Access Points in Monitor Mode: Example 693 Configuring Country Codes 695 xxxii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) CHAPTER 44 CHAPTER 45 Finding Feature Information 695 Prerequisites for Configuring Country Codes 695 Information About Configuring Country Codes 696 How to Configure Country Codes (CLI) 696 Configuration Examples for Configuring Country Codes 699 Displaying Channel List for Country Codes: Example 699 Configuring Link Latency 701 Finding Feature Information 701 Prerequisites for Configuring Link Latency 701 Restrictions for Configuring Link Latency 701 Information About Configuring Link Latency 702 TCP MSS 702 Link Tests 702 How to Configure Link Latency 703 Configuring Link Latency (CLI) 703 Configuring Link Latency (GUI) 705 How to Configure TCP MSS 706 Configuring TCP MSS (CLI) 706 Configuring TCP MSS (GUI) 706 Performing a Link Test (CLI) 707 Configuration Examples for Configuring Link Latency 708 Running a Link Test: Example 708 Displaying Link Latency Information: Example 708 Displaying TCP MSS Settings: Example 709 Configuring Power over Ethernet 711 Finding Feature Information 711 Information About Configuring Power over Ethernet 711 How to Configure Power over Ethernet 711 Configuring Power over Ethernet (CLI) 711 Configuring Power over Ethernet (GUI) 712 Configuration Examples for Configuring Power over Ethernet 714 Displaying Power over Ethernet Information: Example 714 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxxiii Contents PART VIII CHAPTER 46 CHAPTER 47 CHAPTER 48 CHAPTER 49 Mobility 715 Information About Mobility 717 Overview 717 Wired and Wireless Mobility 718 Features of Mobility 718 Sticky Anchoring for Low Latency Roaming 719 Bridge Domain ID and L2/L3 Roaming 720 Link Down Behavior 720 Platform Specific Scale Requirement for the Mobility Controller 720 Mobility Network Elements 723 Mobility Agent 723 Mobility Controller 724 Mobility Oracle 725 Guest Controller 725 Mobility Control Protocols 727 About Mobility Control Protocols 727 Initial Association and Roaming 727 Initial Association 728 Intra Switch Handoff 729 Intra Switch Peer Group Handoff 729 Inter Switch Peer Group Handoff 730 Inter Sub Domain Handoff 731 Inter Mobility Group Handoff 733 Configuring Mobility 735 Configuring Mobility Controller 735 Configuring Converged Access Controllers 735 Creating Peer Groups, Peer Group Member, and Bridge Domain ID (CLI) 735 Creating Peer Groups, Peer Group Member, and Bridge Domain ID (GUI) 737 Configuring Local Mobility Group (CLI) 737 xxxiv Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents PART IX CHAPTER 50 Configuring Local Mobility Group (GUI) 738 Adding a Peer Mobility Group (CLI) 739 Adding a Peer Mobility Group (GUI) 739 Configuring Optional Parameters for Roaming Behavior 740 Pointing the Mobility Controller to a Mobility Oracle (CLI) 740 Pointing the Mobility Controller to a Mobility Oracle (GUI) 741 Configuring Guest Controller 741 Configuring Guest Anchor 742 Configuring Mobility Agent 743 Configuring Mobility Agent by Pointing to Mobility Controller (CLI) 743 Configuring Mobility Agent by Pointing to Mobility Controller (GUI) 744 Configuring the Mobility Controller for the Mobility Agent (CLI) 745 Adding a Mobility Controller Role to the Mobility Agent 745 Configuring Optional Parameters on a Mobility Agent (CLI) 746 Network Management 747 Configuring Cisco IOS Configuration Engine 749 Finding Feature Information 749 Prerequisites for Configuring the Configuration Engine 749 Restrictions for Configuring the Configuration Engine 750 Information About Configuring the Configuration Engine 750 Cisco Configuration Engine Software 750 Configuration Service 751 Event Service 751 NameSpace Mapper 752 Cisco Networking Services IDs and Device Hostnames 752 ConfigID 752 DeviceID 752 Hostname and DeviceID 753 Hostname, DeviceID, and ConfigID 753 Cisco IOS CNS Agents 753 Initial Configuration 753 Incremental (Partial) Configuration 754 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxxv Contents CHAPTER 51 CHAPTER 52 Synchronized Configuration 754 Automated CNS Configuration 755 How to Configure the Configuration Engine 756 Enabling the CNS Event Agent 756 Enabling the Cisco IOS CNS Agent 757 Enabling an Initial Configuration for Cisco IOS CNS Agent 758 Refreshing DeviceIDs 763 Enabling a Partial Configuration for Cisco IOS CNS Agent 765 Monitoring CNS Configurations 766 Additional References 767 Feature History and Information for the Configuration Engine 767 Configuring the Cisco Discovery Protocol 769 Finding Feature Information 769 Information About CDP 769 CDP Overview 769 CDP and Stacks 770 Default CDP Configuration 770 How to Configure CDP 770 Configuring CDP Characteristics 770 Disabling CDP 772 Enabling CDP 772 Disabling CDP on an Interface 774 Enabling CDP on an Interface 775 Monitoring and Maintaining CDP 776 Additional References 777 Feature History and Information for Cisco Discovery Protocol 777 Configuring Simple Network Management Protocol 779 Finding Feature Information 779 Prerequisites for SNMP 779 Restrictions for SNMP 781 Information About SNMP 781 SNMP Overview 781 xxxvi Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) CHAPTER 53 SNMP Manager Functions 782 SNMP Agent Functions 782 SNMP Community Strings 783 SNMP MIB Variables Access 783 SNMP Notifications 783 SNMP ifIndex MIB Object Values 784 Default SNMP Configuration 784 SNMP Configuration Guidelines 785 How to Configure SNMP 786 Disabling the SNMP Agent 786 Configuring Community Strings 786 Configuring SNMP Groups and Users 789 Configuring SNMP Notifications 791 Setting the Agent Contact and Location Information 795 Limiting TFTP Servers Used Through SNMP 796 Configuring Trap Flags for SNMP 797 Enabling SNMP Wireless Trap Notification 799 Monitoring SNMP Status 800 SNMP Examples 800 Configuring Service Level Agreements 803 Finding Feature Information 803 Restrictions on SLAs 803 Information About SLAs 804 Cisco IOS IP Service Level Agreements (SLAs) 804 Network Performance Measurement with Cisco IOS IP SLAs 805 IP SLA Responder and IP SLA Control Protocol 805 Response Time Computation for IP SLAs 806 IP SLAs Operation Scheduling 806 IP SLA Operation Threshold Monitoring 807 UDP Jitter 807 Configuration Guidelines 808 How to Configure IP SLAs Operations 809 Configuring the IP SLA Responder 809 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxxvii Contents CHAPTER 54 Implementing IP SLA Network Performance Measurement 810 Analyzing IP Service Levels by Using the UDP Jitter Operation 814 Analyzing IP Service Levels by Using the ICMP Echo Operation 817 Monitoring IP SLA Operations 820 Monitoring IP SLA Operation Examples 821 Feature History and Information for Service Level Agreements 822 Configuring SPAN and RSPAN 823 Finding Feature Information 823 Prerequisites for SPAN and RSPAN 823 Restrictions for SPAN and RSPAN 824 Information About SPAN and RSPAN 825 SPAN and RSPAN 825 Local SPAN 826 Remote SPAN 827 SPAN and RSPAN Concepts and Terminology 827 SPAN and RSPAN Interaction with Other Features 833 SPAN and RSPAN and Device Stacks 834 Flow-Based SPAN 834 Default SPAN and RSPAN Configuration 835 Configuration Guidelines 835 SPAN Configuration Guidelines 835 RSPAN Configuration Guidelines 836 FSPAN and FRSPAN Configuration Guidelines 836 How to Configure SPAN and RSPAN 837 Creating a Local SPAN Session 837 Creating a Local SPAN Session and Configuring Incoming Traffic 839 Specifying VLANs to Filter 841 Configuring a VLAN as an RSPAN VLAN 842 Creating an RSPAN Source Session 844 Specifying VLANs to Filter 845 Creating an RSPAN Destination Session 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic 848 Configuring an FSPAN Session 850 xxxviii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) CHAPTER 55 Configuring an FRSPAN Session 853 Monitoring SPAN and RSPAN Operations 855 SPAN and RSPAN Configuration Examples 855 Example: Configuring Local SPAN 855 Examples: Creating an RSPAN VLAN 857 Additional References 858 Feature History and Information for SPAN and RSPAN 859 Configuring Wireshark 861 Finding Feature Information 861 Prerequisites for Wireshark 861 Restrictions for Wireshark 861 Information About Wireshark 863 Wireshark Overview 863 Capture Points 863 Attachment Points 863 Filters 864 Actions 864 Storage of Captured Packets to Buffer in Memory 865 Storage of Captured Packets to a .pcap File 865 Packet Decoding and Display 866 Packet Storage and Display 866 Wireshark Capture Point Activation and Deactivation 866 Wireshark Features 867 Guidelines for Wireshark 869 Default Wireshark Configuration 871 How to Configure Wireshark 872 Defining a Capture Point 872 Adding or Modifying Capture Point Parameters 876 Deleting Capture Point Parameters 878 Deleting a Capture Point 879 Activating and Deactivating a Capture Point 880 Clearing the Capture Point Buffer 881 Monitoring Wireshark 882 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxxix Contents PART X CHAPTER 56 Configuration Examples for Wireshark 882 Example: Displaying a Brief Output from a .pcap File 882 Example: Displaying Detailed Output from a .pcap File 884 Example: Simple Capture and Display 887 Example: Simple Capture and Store 888 Example: Using Buffer Capture 889 Example: Capture Sessions 893 Example: Capture and Store in Lock-step Mode 894 Example: Simple Capture and Store of Packets in Egress Direction 895 Additional References 897 Feature History and Information for WireShark 898 QoS 899 Configuring QoS 901 Finding Feature Information 901 Prerequisites for QoS 901 QoS Components 902 QoS Terminology 902 Information About QoS 903 QoS Overview 903 Modular QoS Command-Line Interface 903 Wireless QoS Overview 903 QoS and IPv6 for Wireless 904 Wired and Wireless Access Supported Features 905 Supported QoS Features on Wireless Targets 906 Port Policies 907 Radio Policies 909 SSID Policies 909 Client Policies 910 Hierarchical QoS 911 Hierarchical Wireless QoS 911 QoS Implementation 912 Layer 2 Frame Prioritization Bits 913 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xl Layer 3 Packet Prioritization Bits 914 End-to-End QoS Solution Using Classification 914 Packet Classification 914 QoS Wired Model 917 Ingress Port Activity 917 Egress Port Activity 917 Classification 918 Access Control Lists 918 Class Maps 918 Policy Maps 919 Policing 921 Token-Bucket Algorithm 921 Marking 922 Packet Header Marking 922 Switch Specific Information Marking 922 Table Map Marking 922 Traffic Conditioning 924 Policing 924 Shaping 926 Queueing and Scheduling 927 Bandwidth 927 Weighted Tail Drop 928 Priority Queues 929 Queue Buffer 929 Queuing in Wireless 931 Trust Behavior 931 Trust Behavior for Wired and Wireless Ports 931 Port Security on a Trusted Boundary for Cisco IP Phones 932 Wireless QoS Mobility 933 Inter-Switch Roaming 933 Intra-Switch Roaming 934 Precious Metal Policies for Wireless QoS 934 Standard QoS Default Settings 935 Default Wired QoS Configuration 935 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xli Contents Default Wireless QoS Configuration 936 Restrictions for QoS on Wired Targets 936 Restrictions for QoS on Wireless Targets 939 How to Configure QoS 942 Configuring Class, Policy, and Table Maps 942 Creating a Traffic Class (CLI) 942 Creating a Traffic Policy (CLI) 944 Configuring Client Policies (GUI) 949 Configuring Class-Based Packet Marking (CLI) 950 Configuring Class Maps for Voice and Video (CLI) 955 Attaching a Traffic Policy to an Interface (CLI) 956 Configuring SSID Policies (GUI) 958 Applying an SSID or Client Policy on a WLAN (CLI) 959 Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI) 960 Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI) 964 Configuring Table Maps (CLI) 967 Configuring Trust 970 Configuring Trust Behavior for Wireless Traffic (CLI) 970 Configuring QoS Features and Functionality 970 Configuring Call Admission Control (CLI) 970 Configuring Bandwidth (CLI) 977 Configuring Police (CLI) 979 Configuring Priority (CLI) 982 Configuring Queues and Shaping 984 Configuring Egress Queue Characteristics 984 Configuring Queue Buffers (CLI) 984 Configuring Queue Limits (CLI) 987 Configuring Shaping (CLI) 989 Configuring Precious Metal Policies (CLI) 991 Configuring QoS Policies for Multicast Traffic (CLI) 992 Applying a QoS Policy on a WLAN (GUI) 993 Monitoring QoS 994 Configuration Examples for QoS 996 Examples: Classification by Access Control Lists 996 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlii Contents CHAPTER 57 Examples: Class of Service Layer 2 Classification 997 Examples: Class of Service DSCP Classification 997 Examples: VLAN ID Layer 2 Classification 997 Examples: Classification by DSCP or Precedence Values 997 Examples: Hierarchical Classification 998 Examples: Hierarchical Policy Configuration 998 Examples: Classification for Voice and Video 999 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic 1000 Examples: Configuring Downstream SSID Policy 1001 Examples: Client Policies 1002 Examples: Average Rate Shaping Configuration 1004 Examples: Queue-limit Configuration 1004 Examples: Queue Buffers Configuration 1005 Examples: Policing Action Configuration 1006 Examples: Policer VLAN Configuration 1006 Examples: Policing Units 1007 Examples: Single-Rate Two-Color Policing Configuration 1007 Examples: Dual-Rate Three-Color Policing Configuration 1008 Examples: Table Map Marking Configuration 1008 Example: Table Map Configuration to Retain CoS Markings 1009 Where to Go Next 1010 Additional References for QoS 1010 Feature History and Information for QoS 1011 Configuring Auto-QoS 1013 Finding Feature Information 1013 Prerequisites for Auto-QoS 1013 Restrictions for Auto-QoS 1013 Information About Configuring Auto-QoS 1014 Auto-QoS Overview 1014 Auto-QoS Global Configuration Templates 1015 Auto-QoS Policy and Class Maps 1015 Effects of Auto-QoS on Running Configuration 1015 How to Configure Auto-QoS 1016 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xliii Contents PART XI CHAPTER 58 Configuring Auto-QoS (CLI) 1016 Upgrading Auto-QoS (CLI) 1018 Monitoring Auto-QoS 1020 Troubleshooting Auto-QoS 1021 Configuration Examples for Auto-QoS 1021 Example: auto qos trust cos 1021 Example: auto qos trust dscp 1024 Example: auto qos video cts 1026 Example: auto qos video ip-camera 1029 Example: auto qos video media-player 1032 Example: auto qos voip trust 1035 Example: auto qos voip cisco-phone 1037 Example: auto qos voip cisco-softphone 1041 auto qos classify police 1046 Where to Go Next for Auto-QoS 1050 Additional References for Auto-QoS 1050 Feature History and Information for Auto-QoS 1051 Radio Resource Management 1053 Configuring Radio Resource Management 1055 Finding Feature Information 1055 Prerequisites for Configuring Radio Resource Management 1055 Restrictions for Radio Resource Management 1056 Information About Radio Resource Management 1056 Radio Resource Monitoring 1056 Information About RF Groups 1057 RF Group Leader 1057 RF Group Name 1059 Mobility Controller 1059 Mobility Agent 1059 Information About Rogue Access Point Detection in RF Groups 1060 Transmit Power Control 1060 Overriding the TPC Algorithm with Minimum and Maximum Transmit Power Settings 1060 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xliv Contents Dynamic Channel Assignment 1061 Coverage Hole Detection and Correction 1062 How to Configure RRM 1063 Configuring Advanced RRM CCX Parameters (CLI) 1063 Configuring Neighbor Discovery Type (CLI) 1063 Configuring RRM Profile Thresholds, Monitoring Channels, and Monitoring Intervals (GUI) 1064 Configuring RF Groups 1065 Configuring the RF Group Mode (GUI) 1066 Configuring RF Group Selection Mode (CLI) 1066 Configuring an RF Group Name (CLI) 1067 Configuring an RF Group Name (GUI) 1068 Configuring Members in a 802.11 Static RF Group (CLI) 1068 Configuring Transmit Power Control 1069 Configuring the Tx-Power Control Threshold (CLI) 1069 Configuring the Tx-Power Level (CLI) 1069 Configuring Transmit Power Control (GUI) 1070 Configuring 802.11 RRM Parameters 1071 Configuring Advanced 802.11 Channel Assignment Parameters (CLI) 1071 Configuring Dynamic Channel Assignment (GUI) 1073 Configuring 802.11 Coverage Hole Detection (CLI) 1075 Configuring Coverage Hole Detection (GUI) 1076 Configuring 802.11 Event Logging (CLI) 1077 Configuring 802.11 Statistics Monitoring (CLI) 1078 Configuring the 802.11 Performance Profile (CLI) 1079 Configuring Rogue Access Point Detection in RF Groups 1080 Configuring Rogue Access Point Detection in RF Groups (CLI) 1080 Enabling Rogue Access Point Detection in RF Groups (GUI) 1082 Monitoring RRM Parameters and RF Group Status 1082 Monitoring RRM Parameters 1082 Monitoring RF Group Status (CLI) 1083 Monitoring RF Group Status (GUI) 1084 Examples: RF Group Configuration 1084 Information About ED-RRM 1084 Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI) 1085 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlv Contents PART XII CHAPTER 59 Configuring ED-RRM (GUI) 1085 Additional References for Radio Resource Management 1086 Feature History and Information For Performing Radio Resource Management Configuration 1087 Routing 1089 Configuring MSDP 1091 Finding Feature Information 1091 Information About Configuring MSDP 1091 Understanding MSDP 1091 MSDP Operation 1092 MSDP Benefits 1092 How to Configure MSDP 1093 Default MSDP Configuration 1093 Configuring a Default MSDP Peer 1093 Caching Source-Active State 1095 Controlling Source Information that Your Switch Originates 1096 Redistributing Sources 1096 Filtering Source-Active Request Messages 1098 Controlling Source Information that Your Switch Forwards 1100 Using a Filter 1100 Using TTL to Limit the Multicast Data Sent in SA Messages 1102 Controlling Source Information that Your Switch Receives 1103 Configuring an MSDP Mesh Group 1104 Shutting Down an MSDP Peer 1105 Including a Bordering PIM Dense-Mode Region in MSDP 1106 Configuring an Originating Address other than the RP Address 1107 Monitoring and Maintaining MSDP 1108 Configuration Examples for Configuring MSDP 1109 Configuring a Default MSDP Peer: Example 1109 Caching Source-Active State: Example 1110 Controlling Source Information that Your Switch Originates: Example 1110 Controlling Source Information that Your Switch Forwards: Example 1110 Controlling Source Information that Your Switch Receives: Example 1110 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlvi Contents CHAPTER 60 Configuring IP Unicast Routing 1111 Finding Feature Information 1112 Information About Configuring IP Unicast Routing 1112 Information About IP Routing 1112 Types of Routing 1113 IP Routing and Switch Stacks 1114 Classless Routing 1115 Address Resolution 1116 Proxy ARP 1117 ICMP Router Discovery Protocol 1117 UDP Broadcast Packets and Protocols 1118 Broadcast Packet Handling 1118 IP Broadcast Flooding 1118 How to Configure IP Routing 1119 How to Configure IP Addressing 1120 Default IP Addressing Configuration 1120 Assigning IP Addresses to Network Interfaces 1121 Using Subnet Zero 1123 Enabling Classless Routing 1123 Configuring Address Resolution Methods 1124 Defining a Static ARP Cache 1124 Setting ARP Encapsulation 1126 Enabling Proxy ARP 1127 Routing Assistance When IP Routing is Disabled 1127 Proxy ARP 1128 Default Gateway 1128 ICMP Router Discovery Protocol (IRDP) 1128 Configuring Broadcast Packet Handling 1130 Enabling Directed Broadcast-to-Physical Broadcast Translation 1130 Forwarding UDP Broadcast Packets and Protocols 1132 Establishing an IP Broadcast Address 1133 Flooding IP Broadcasts 1134 Monitoring and Maintaining IP Addressing 1135 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlvii Contents How to Configure IP Unicast Routing 1136 Enabling IP Unicast Routing 1136 Example of Enabling IP Routing 1137 What to Do Next 1137 Information About RIP 1137 Summary Addresses and Split Horizon 1138 How to Configure RIP 1138 Default RIP Configuration 1138 Configuring Basic RIP Parameters 1139 Configuring RIP Authentication 1141 Configuring Summary Addresses and Split Horizon 1142 Configuring Split Horizon 1143 Configuration Example for Summary Addresses and Split Horizon 1144 Information About OSPF 1145 OSPF Nonstop Forwarding 1145 OSPF NSF Awareness 1146 OSPF NSF Capability 1146 OSPF Area Parameters 1147 Other OSPF Parameters 1147 LSA Group Pacing 1148 Loopback Interfaces 1148 How to Configure OSPF 1148 Default OSPF Configuration 1148 Configuring Basic OSPF Parameters 1150 Configuring OSPF Interfaces 1151 Configuring OSPF Area Parameters 1153 Configuring Other OSPF Parameters 1155 Changing LSA Group Pacing 1157 Configuring a Loopback Interface 1158 Monitoring OSPF 1158 Configuration Examples for OSPF 1159 Example: Configuring Basic OSPF Parameters 1159 Information About EIGRP 1160 EIGRP Features 1160 xlviii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) EIGRP Components 1160 EIGRP Nonstop Forwarding 1161 EIGRP NSF Awareness 1161 EIGRP NSF Capability 1161 EIGRP Stub Routing 1162 How to Configure EIGRP 1163 Default EIGRP Configuration 1163 Configuring Basic EIGRP Parameters 1165 Configuring EIGRP Interfaces 1166 Configuring EIGRP Route Authentication 1168 Monitoring and Maintaining EIGRP 1169 Information About BGP 1170 BGP Network Topology 1170 Nonstop Forwarding Awareness 1172 Information About BGP Routing 1172 Routing Policy Changes 1172 BGP Decision Attributes 1173 Route Maps 1174 BGP Filtering 1174 Prefix List for BGP Filtering 1175 BGP Community Filtering 1175 BGP Neighbors and Peer Groups 1176 Aggregate Routes 1176 Routing Domain Confederations 1176 BGP Route Reflectors 1176 Route Dampening 1177 More BGP Information 1177 How to Configure BGP 1177 Default BGP Configuration 1177 Enabling BGP Routing 1181 Managing Routing Policy Changes 1183 Configuring BGP Decision Attributes 1184 Configuring BGP Filtering with Route Maps 1186 Configuring BGP Filtering by Neighbor 1187 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlix Contents Configuring BGP Filtering by Access Lists and Neighbors 1188 Configuring Prefix Lists for BGP Filtering 1189 Configuring BGP Community Filtering 1190 Configuring BGP Neighbors and Peer Groups 1191 Configuring Aggregate Addresses in a Routing Table 1193 Configuring Routing Domain Confederations 1195 Configuring BGP Route Reflectors 1196 Configuring Route Dampening 1197 Monitoring and Maintaining BGP 1198 Configuration Examples for BGP 1199 Example: Configuring BGP on Routers 1199 Information About ISO CLNS Routing 1200 Connectionless Routing 1200 IS-IS Dynamic Routing 1201 Nonstop Forwarding Awareness 1202 IS-IS Global Parameters 1202 IS-IS Interface Parameters 1203 How to Configure ISO CLNS Routing 1203 Default IS-IS Configuration 1203 Enabling IS-IS Routing 1205 Configuring IS-IS Global Parameters 1207 Configuring IS-IS Interface Parameters 1210 Monitoring and Maintaining ISO IGRP and IS-IS 1212 Configuration Examples for ISO CLNS Routing 1213 Example: Configuring IS-IS Routing 1213 Information About Multi-VRF CE 1214 Understanding Multi-VRF CE 1214 Network Topology 1215 Packet-Forwarding Process 1216 Network Components 1216 VRF-Aware Services 1216 How to Configure Multi-VRF CE 1217 Default Multi-VRF CE Configuration 1217 Multi-VRF CE Configuration Guidelines 1218 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) l Configuring VRFs 1218 Configuring VRF-Aware Services 1220 Configuring VRF-Aware Services for ARP 1220 Configuring VRF-Aware Services for Ping 1221 Configuring VRF-Aware Services for SNMP 1221 Configuring VRF-Aware Servcies for uRPF 1222 Configuring VRF-Aware RADIUS 1223 Configuring VRF-Aware Services for Syslog 1223 Configuring VRF-Aware Services for Traceroute 1224 Configuring VRF-Aware Services for FTP and TFTP 1224 Configuring Multicast VRFs 1225 Configuring a VPN Routing Session 1227 Configuring BGP PE to CE Routing Sessions 1228 Monitoring Multi-VRF CE 1230 Configuration Examples for Multi-VRF CE 1230 Multi-VRF CE Configuration Example 1230 Configuring Unicast Reverse Path Forwarding 1234 Protocol-Independent Features 1234 Distributed Cisco Express Forwarding 1235 Information About Cisco Express Forwarding 1235 How to Configure Cisco Express Forwarding 1235 Number of Equal-Cost Routing Paths 1237 Information About Equal-Cost Routing Paths 1237 How to Configure Equal-Cost Routing Paths 1237 Static Unicast Routes 1238 Information About Static Unicast Routes 1238 Configuring Static Unicast Routes 1239 Default Routes and Networks 1240 Information About Default Routes and Networks 1240 How to Configure Default Routes and Networks 1240 Route Maps to Redistribute Routing Information 1241 Information About Route Maps 1241 How to Configure a Route Map 1242 How to Control Route Distribution 1245 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) li Contents PART XIII CHAPTER 61 CHAPTER 62 Policy-Based Routing 1247 Information About Policy-Based Routing 1247 How to Configure PBR 1248 Filtering Routing Information 1251 Setting Passive Interfaces 1251 Controlling Advertising and Processing in Routing Updates 1253 Filtering Sources of Routing Information 1253 Managing Authentication Keys 1255 Prerequisites 1255 How to Configure Authentication Keys 1255 Monitoring and Maintaining the IP Network 1256 Security 1259 Preventing Unauthorized Access 1261 Finding Feature Information 1261 Preventing Unauthorized Access 1261 Controlling Switch Access with Passwords and Privilege Levels 1263 Finding Feature Information 1263 Restrictions for Controlling Switch Access with Passwords and Privileges 1263 Information About Passwords and Privilege Levels 1264 Default Password and Privilege Level Configuration 1264 Additional Password Security 1264 Password Recovery 1264 Terminal Line Telnet Configuration 1265 Username and Password Pairs 1265 Privilege Levels 1265 How to Control Switch Access with Passwords and Privilege Levels 1266 Setting or Changing a Static Enable Password 1266 Protecting Enable and Enable Secret Passwords with Encryption 1267 Disabling Password Recovery 1269 Setting a Telnet Password for a Terminal Line 1270 Configuring Username and Password Pairs 1271 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lii Contents CHAPTER 63 Setting the Privilege Level for a Command 1272 Changing the Default Privilege Level for Lines 1273 Logging into and Exiting a Privilege Level 1274 Monitoring Switch Access 1275 Configuration Examples for Setting Passwords and Privilege Levels 1275 Example: Setting or Changing a Static Enable Password 1275 Example: Protecting Enable and Enable Secret Passwords with Encryption 1276 Example: Setting a Telnet Password for a Terminal Line 1276 Example: Setting the Privilege Level for a Command 1276 Additional References 1276 Configuring TACACS+ 1279 Finding Feature Information 1279 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) 1279 Information About TACACS+ 1281 TACACS+ and Switch Access 1281 TACACS+ Overview 1281 TACACS+ Operation 1283 Method List Description 1283 TACACS+ Configuration Options 1284 TACACS+ Login Authentication 1284 TACACS+ Authorization for Privileged EXEC Access and Network Services 1284 TACACS+ Accounting 1284 Default TACACS+ Configuration 1285 How to Configure TACACS+ 1285 Identifying the TACACS+ Server Host and Setting the Authentication Key 1285 Configuring TACACS+ Login Authentication 1286 Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services 1289 Starting TACACS+ Accounting 1290 Establishing a Session with a Router if the AAA Server is Unreachable 1291 Monitoring TACACS+ 1291 Additional References 1292 Feature Information for TACACS+ 1293 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) liii Contents CHAPTER 64 Configuring RADIUS 1295 Finding Feature Information 1295 Prerequisites for Controlling Switch Access with RADIUS 1295 Restrictions for Controlling Switch Access with RADIUS 1296 Information about RADIUS 1296 RADIUS and Switch Access 1296 RADIUS Overview 1297 RADIUS Operation 1298 RADIUS Change of Authorization 1299 Change-of-Authorization Requests 1299 CoA Request Response Code 1301 CoA Request Commands 1302 Stacking Guidelines for Session Termination 1304 Default RADIUS Configuration 1305 RADIUS Server Host 1305 RADIUS Login Authentication 1306 AAA Server Groups 1306 AAA Authorization 1307 RADIUS Accounting 1307 Vendor-Specific RADIUS Attributes 1307 Vendor-Proprietary RADIUS Server Communication 1307 How to Configure RADIUS 1308 Identifying the RADIUS Server Host 1308 Configuring RADIUS Login Authentication 1310 Defining AAA Server Groups 1312 Configuring RADIUS Authorization for User Privileged Access and Network Services 1314 Starting RADIUS Accounting 1315 Establishing a Session with a Router if the AAA Server is Unreachable 1316 Configuring Settings for All RADIUS Servers 1317 Configuring the Switch to Use Vendor-Specific RADIUS Attributes 1318 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 1319 Configuring CoA on the Switch 1320 Configuring RADIUS Server Load Balancing 1322 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) liv Contents CHAPTER 65 CHAPTER 66 CHAPTER 67 Monitoring CoA Functionality 1322 Configuration Examples for Controlling Switch Access with RADIUS 1323 Examples: Identifying the RADIUS Server Host 1323 Examples: Configuring the Switch to Use Vendor-Specific RADIUS Attributes 1323 Example: Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 1324 Additional References 1324 Feature Information for RADIUS 1325 Configuring Kerberos 1327 Finding Feature Information 1327 Prerequisites for Controlling Switch Access with Kerberos 1327 Restrictions for Controlling Switch Access with Kerberos 1328 Information about Kerberos 1328 Kerberos and Switch Access 1328 Kerberos Overview 1328 Kerberos Operation 1330 Authenticating to a Boundary Switch 1330 Obtaining a TGT from a KDC 1331 Authenticating to Network Services 1331 How to Configure Kerberos 1331 Monitoring the Kerberos Configuration 1331 Additional References 1332 Feature Information for Kerberos 1333 Configuring Local Authentication and Authorization 1335 Finding Feature Information 1335 How to Configure Local Authentication and Authorization 1335 Configuring the Switch for Local Authentication and Authorization 1335 Monitoring Local Authentication and Authorization 1337 Additional References 1337 Feature Information for Local Authentication and Authorization 1338 Configuring Secure Shell (SSH) 1339 Finding Feature Information 1339 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lv Contents CHAPTER 68 CHAPTER 69 Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP) 1339 Restrictions for Configuring the Switch for SSH 1340 Information about SSH 1340 SSH and Switch Access 1340 SSH Servers, Integrated Clients, and Supported Versions 1341 SSH Configuration Guidelines 1341 Secure Copy Protocol Overview 1342 Secure Copy Protocol Concepts 1342 How to Configure SSH 1343 Setting Up the Switch to Run SSH 1343 Configuring the SSH Server 1344 Monitoring the SSH Configuration and Status 1346 Additional References 1346 Feature Information for SSH 1347 Configuring Secure Socket Layer HTTP 1349 Finding Feature Information 1349 Information about Secure Sockets Layer (SSL) HTTP 1349 Certificate Authority Trustpoints 1350 CipherSuites 1351 Default SSL Configuration 1352 SSL Configuration Guidelines 1352 Secure HTTP Servers and Clients Overview 1352 How to Configure Secure HTTP Servers and Clients 1352 Configuring a CA Trustpoint 1352 Configuring the Secure HTTP Server 1355 Configuring the Secure HTTP Client 1358 How to Configure Secure HTTP Servers and Clients 1359 Monitoring Secure HTTP Server and Client Status 1359 Additional References 1359 Feature Information for SSL HTTP 1360 Configuring IPv4 ACLs 1361 Finding Feature Information 1361 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lvi Prerequisites for Configuring Network Security with ACLs 1361 Restrictions for Configuring Network Security with ACLs 1361 Information about Network Security with ACLs 1363 Cisco TrustSec and ACLs 1363 ACL Overview 1363 Access Control Entries 1364 ACL Supported Types 1364 Supported ACLs 1364 ACL Precedence 1364 Port ACLs 1365 Router ACLs 1366 VLAN Maps 1366 ACEs and Fragmented and Unfragmented Traffic 1367 Example: ACEs and Fragmented and Unfragmented Traffic 1367 ACLs and Switch Stacks 1368 Active Switch and ACL Functions 1368 Stack Member and ACL Functions 1368 Active Switch Failure and ACLs 1368 Standard and Extended IPv4 ACLs 1369 IPv4 ACL Switch Unsupported Features 1369 Access List Numbers 1369 Numbered Standard IPv4 ACLs 1370 Numbered Extended IPv4 ACLs 1370 Named IPv4 ACLs 1371 ACL Logging 1372 Smart Logging 1372 Hardware and Software Treatment of IP ACLs 1372 VLAN Map Configuration Guidelines 1373 VLAN Maps with Router ACLs 1374 VLAN Maps and Router ACL Configuration Guidelines 1374 Time Ranges for ACLs 1375 IPv4 ACL Interface Considerations 1375 How to Configure ACLs 1376 Configuring IPv4 ACLs 1376 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lvii Contents Creating a Numbered Standard ACL 1376 Creating a Numbered Extended ACL 1378 Creating Named Standard ACLs 1381 Creating Extended Named ACLs 1383 Configuring Time Ranges for ACLs 1384 Applying an IPv4 ACL to a Terminal Line 1385 Applying an IPv4 ACL to an Interface 1386 Creating Named MAC Extended ACLs 1388 Applying a MAC ACL to a Layer 2 Interface 1389 Configuring VLAN Maps 1390 Creating a VLAN Map 1392 Applying a VLAN Map to a VLAN 1394 Configuring VACL Logging 1395 Monitoring IPv4 ACLs 1396 Configuration Examples for ACLs 1397 Examples: Using Time Ranges with ACLs 1397 Examples: Including Comments in ACLs 1398 Examples: Troubleshooting ACLs 1399 IPv4 ACL Configuration Examples 1400 ACLs in a Small Networked Office 1400 Examples: ACLs in a Small Networked Office 1400 Example: Numbered ACLs 1401 Examples: Extended ACLs 1401 Examples: Named ACLs 1402 Examples: Time Range Applied to an IP ACL 1403 Examples: Commented IP ACL Entries 1403 Examples: ACL Logging 1403 Configuration Examples for ACLs and VLAN Maps 1405 Example: Creating an ACL and a VLAN Map to Deny a Packet 1405 Example: Creating an ACL and a VLAN Map to Permit a Packet 1405 Example: Default Action of Dropping IP Packets and Forwarding MAC Packets 1405 Example: Default Action of Dropping MAC Packets and Forwarding IP Packets 1406 Example: Default Action of Dropping All Packets 1406 Configuration Examples for Using VLAN Maps in Your Network 1407 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lviii Contents CHAPTER 70 CHAPTER 71 Example: Wiring Closet Configuration 1407 Example: Restricting Access to a Server on Another VLAN 1408 Example: Denying Access to a Server on Another VLAN 1408 Configuration Examples of Router ACLs and VLAN Maps Applied to VLANs 1409 Example: ACLs and Switched Packets 1409 Example: ACLs and Bridged Packets 1410 Example: ACLs and Routed Packets 1410 Example: ACLs and Multicast Packets 1411 Additional References 1412 Feature Information for ACLs 1412 Configuring IPv6 ACLs 1413 Finding Feature Information 1413 Information about IPv6 ACLs 1413 Switch Stacks and IPv6 ACLs 1414 Interactions with Other Features and Switches 1414 Restrictions for IPv6 ACLs 1414 Default Configuration for IPv6 ACLs 1415 How to Configure IPv6 ACLs 1415 How to Attach an IPv6 ACL to an Interface 1419 Monitoring IPv6 ACLs 1420 Additional References 1421 Configuring DHCP 1423 Finding Feature Information 1423 Information About DHCP 1423 DHCP Server 1423 DHCP Relay Agent 1423 DHCP Snooping 1424 Option-82 Data Insertion 1425 Cisco IOS DHCP Server Database 1428 DHCP Snooping Binding Database 1428 DHCP Snooping and Switch Stacks 1429 How to Configure DHCP Features 1430 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lix Contents CHAPTER 72 CHAPTER 73 Default DHCP Snooping Configuration 1430 DHCP Snooping Configuration Guidelines 1431 Configuring the DHCP Server 1431 DHCP Server and Switch Stacks 1431 Configuring the DHCP Relay Agent 1431 Specifying the Packet Forwarding Address 1432 Prerequisites for Configuring DHCP Snooping and Option 82 1434 Enabling DHCP Snooping and Option 82 1435 Enabling the Cisco IOS DHCP Server Database 1438 Monitoring DHCP Snooping Information 1438 Configuring DHCP Server Port-Based Address Allocation 1439 Information About Configuring DHCP Server Port-Based Address Allocation 1439 Default Port-Based Address Allocation Configuration 1439 Port-Based Address Allocation Configuration Guidelines 1439 Enabling the DHCP Snooping Binding Database Agent 1439 Enabling DHCP Server Port-Based Address Allocation 1441 Monitoring DHCP Server Port-Based Address Allocation 1442 Additional References 1442 Feature Information for DHCP Snooping and Option 82 1443 Configuring IP Source Guard 1445 Finding Feature Information 1445 Information About IP Source Guard 1445 IP Source Guard 1445 IP Source Guard for Static Hosts 1446 IP Source Guard Configuration Guidelines 1447 How to Configure IP Source Guard 1447 Enabling IP Source Guard 1447 Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port 1449 Monitoring IP Source Guard 1453 Additional References 1454 Configuring Dynamic ARP Inspection 1455 Finding Feature Information 1455 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lx CHAPTER 74 Restrictions for Dynamic ARP Inspection 1455 Understanding Dynamic ARP Inspection 1457 Interface Trust States and Network Security 1458 Rate Limiting of ARP Packets 1459 Relative Priority of ARP ACLs and DHCP Snooping Entries 1460 Logging of Dropped Packets 1460 Default Dynamic ARP Inspection Configuration 1460 Relative Priority of ARP ACLs and DHCP Snooping Entries 1461 Configuring ARP ACLs for Non-DHCP Environments 1461 Configuring Dynamic ARP Inspection in DHCP Environments 1463 How to Limit the Rate of Incoming ARP Packets 1466 How to Perform Validation Checks 1467 Monitoring DAI 1469 Verifying the DAI Configuration 1469 Additional References 1470 Configuring IEEE 802.1x Port-Based Authentication 1471 Finding Feature Information 1471 Information About 802.1x Port-Based Authentication 1471 Port-Based Authentication Process 1472 Port-Based Authentication Initiation and Message Exchange 1474 Authentication Manager for Port-Based Authentication 1475 Port-Based Authentication Methods 1475 Per-User ACLs and Filter-Ids 1476 Port-Based Authentication Manager CLI Commands 1476 Ports in Authorized and Unauthorized States 1478 Port-Based Authentication and Switch Stacks 1479 802.1x Host Mode 1480 802.1x Multiple Authentication Mode 1480 Multi-auth Per User VLAN assignment 1481 MAC Move 1482 MAC Replace 1483 802.1x Accounting 1483 802.1x Accounting Attribute-Value Pairs 1484 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxi Contents 802.1x Readiness Check 1485 Switch-to-RADIUS-Server Communication 1485 802.1x Authentication with VLAN Assignment 1485 802.1x Authentication with Per-User ACLs 1487 802.1x Authentication with Downloadable ACLs and Redirect URLs 1488 Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL 1489 Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs 1490 VLAN ID-based MAC Authentication 1490 802.1x Authentication with Guest VLAN 1490 802.1x Authentication with Restricted VLAN 1491 802.1x Authentication with Inaccessible Authentication Bypass 1492 Inaccessible Authentication Bypass Support on Multiple-Authentication Ports 1493 Inaccessible Authentication Bypass Authentication Results 1493 Inaccessible Authentication Bypass Feature Interactions 1493 802.1x Critical Voice VLAN 1494 802.1x User Distribution 1494 802.1x User Distribution Configuration Guidelines 1495 IEEE 802.1x Authentication with Voice VLAN Ports 1495 IEEE 802.1x Authentication with Port Security 1496 IEEE 802.1x Authentication with Wake-on-LAN 1496 IEEE 802.1x Authentication with MAC Authentication Bypass 1497 Network Admission Control Layer 2 IEEE 802.1x Validation 1498 Flexible Authentication Ordering 1498 Open1x Authentication 1498 Multidomain Authentication 1499 802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) 1500 Voice Aware 802.1x Security 1501 Common Session ID 1501 How to Configure 802.1x Port-Based Authentication 1502 Default 802.1x Authentication Configuration 1502 802.1x Authentication Configuration Guidelines 1504 802.1x Authentication 1504 VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass 1505 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxii Contents MAC Authentication Bypass 1506 Maximum Number of Allowed Devices Per Port 1506 Configuring 802.1x Readiness Check 1506 Configuring Voice Aware 802.1x Security 1507 Configuring 802.1x Violation Modes 1509 Configuring 802.1x Authentication 1510 Configuring 802.1x Port-Based Authentication 1511 Configuring the Switch-to-RADIUS-Server Communication 1513 Configuring the Host Mode 1515 Configuring Periodic Re-Authentication 1516 Changing the Quiet Period 1517 Changing the Switch-to-Client Retransmission Time 1519 Setting the Switch-to-Client Frame-Retransmission Number 1520 Setting the Re-Authentication Number 1521 Enabling MAC Move 1522 Enabling MAC Replace 1523 Configuring 802.1x Accounting 1524 Configuring a Guest VLAN 1526 Configuring a Restricted VLAN 1527 Configuring Number of Authentication Attempts on a Restricted VLAN 1529 Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN 1530 Example of Configuring Inaccessible Authentication Bypass 1534 Configuring 802.1x Authentication with WoL 1534 Configuring MAC Authentication Bypass 1535 Formatting a MAC Authentication Bypass Username and Password 1536 Configuring 802.1x User Distribution 1537 Example of Configuring VLAN Groups 1538 Configuring NAC Layer 2 802.1x Validation 1539 Configuring an Authenticator Switch with NEAT 1541 Configuring a Supplicant Switch with NEAT 1543 Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs 1545 Configuring Downloadable ACLs 1545 Configuring a Downloadable Policy 1547 Configuring VLAN ID-based MAC Authentication 1549 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxiii Contents CHAPTER 75 Configuring Flexible Authentication Ordering 1550 Configuring Open1x 1551 Disabling 802.1x Authentication on the Port 1553 Resetting the 802.1x Authentication Configuration to the Default Values 1554 Monitoring 802.1x Statistics and Status 1555 Additional References 1556 Feature Information for 802.1x Port-Based Authentication 1557 Configuring Web-Based Authentication 1559 Finding Feature Information 1559 Information About Web-Based Authentication 1559 Device Roles 1560 Host Detection 1560 Session Creation 1561 Authentication Process 1561 Local Web Authentication Banner 1561 Web Authentication Customizable Web Pages 1564 Guidelines 1564 Authentication Proxy Web Page Guidelines 1565 Redirection URL for Successful Login Guidelines 1566 Web-based Authentication Interactions with Other Features 1566 Port Security 1566 LAN Port IP 1566 Gateway IP 1567 ACLs 1567 Context-Based Access Control 1567 EtherChannel 1567 How to Configure Web-Based Authentication 1567 Default Web-Based Authentication Configuration 1567 Web-Based Authentication Configuration Guidelines and Restrictions 1568 Web-Based Authentication Configuration Task List 1569 Configuring the Authentication Rule and Interfaces 1569 Configuring AAA Authentication 1571 Configuring Switch-to-RADIUS-Server Communication 1573 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxiv CHAPTER 76 Configuring the HTTP Server 1575 Customizing the Authentication Proxy Web Pages 1576 Specifying a Redirection URL for Successful Login 1578 Configuring the Web-Based Authentication Parameters 1579 Configuring a Web Authentication Local Banner 1579 Removing Web-Based Authentication Cache Entries 1580 Monitoring Web-Based Authentication Status 1581 Feature Information for Web-Based Authentication 1581 Configuring Port-Based Traffic Control 1583 Overview of Port-Based Traffic Control 1584 Finding Feature Information 1584 Information About Storm Control 1584 Storm Control 1584 How Traffic Activity is Measured 1584 Traffic Patterns 1585 How to Configure Storm Control 1586 Configuring Storm Control and Threshold Levels 1586 Finding Feature Information 1588 Information About Protected Ports 1588 Protected Ports 1588 Default Protected Port Configuration 1589 Protected Ports Guidelines 1589 How to Configure Protected Ports 1589 Configuring a Protected Port 1589 Monitoring Protected Ports 1590 Where to Go Next 1590 Additional References 1591 Feature Information 1591 Finding Feature Information 1591 Information About Port Blocking 1592 Port Blocking 1592 How to Configure Port Blocking 1592 Blocking Flooded Traffic on an Interface 1592 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxv Contents CHAPTER 77 Monitoring Port Blocking 1594 Where to Go Next 1594 Additional References 1594 Feature Information 1595 Prerequisites for Port Security 1595 Restrictions for Port Security 1595 Information About Port Security 1595 Port Security 1595 Types of Secure MAC Addresses 1596 Sticky Secure MAC Addresses 1596 Security Violations 1596 Port Security Aging 1598 Port Security and Switch Stacks 1598 Default Port Security Configuration 1598 Port Security Configuration Guidelines 1598 Overview of Port-Based Traffic Control 1600 How to Configure Port Security 1600 Enabling and Configuring Port Security 1600 Enabling and Configuring Port Security Aging 1605 Configuration Examples for Port Security 1606 Additional References 1607 Finding Feature Information 1608 Information About Protocol Storm Protection 1608 Protocol Storm Protection 1608 Default Protocol Storm Protection Configuration 1609 How to Configure Protocol Storm Protection 1609 Enabling Protocol Storm Protection 1609 Monitoring Protocol Storm Protection 1610 Additional References 1610 Configuring IPv6 First Hop Security 1613 Finding Feature Information 1613 Prerequisites for First Hop Security in IPv6 1613 Restrictions for First Hop Security in IPv6 1613 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxvi Contents CHAPTER 78 CHAPTER 79 Information about First Hop Security in IPv6 1614 How to Configure an IPv6 Snooping Policy 1616 How to Attach an IPv6 Snooping Policy to an Interface 1618 How to Attach an IPv6 Snooping Policy to a Layer 2 EtherChannel Interface 1619 How to Attach an IPv6 Snooping Policy to VLANs Globally 1620 How to Configure the IPv6 Binding Table Content 1621 How to Configure an IPv6 Neighbor Discovery Inspection Policy 1622 How to Attach an IPv6 Neighbor Discovery Inspection Policy to an Interface 1624 How to Attach an IPv6 Neighbor Discovery Inspection Policy to a Layer 2 EtherChannel Interface 1625 How to Attach an IPv6 Neighbor Discovery Inspection Policy to VLANs Globally 1626 How to Configure an IPv6 Router Advertisement Guard Policy 1627 How to Attach an IPv6 Router Advertisement Guard Policy to an Interface 1629 How to Attach an IPv6 Router Advertisement Guard Policy to a Layer 2 EtherChannel Interface 1630 How to Attach an IPv6 Router Advertisement Guard Policy to VLANs Globally 1631 How to Configure an IPv6 DHCP Guard Policy 1632 How to Attach an IPv6 DHCP Guard Policy to an Interface or a VLAN on an Interface 1634 How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface 1635 How to Attach an IPv6 DHCP Guard Policy to VLANs Globally 1637 Additional References 1637 Configuring Cisco TrustSec 1639 Configuring Cisco TrustSec 1639 Finding Feature Information 1639 Information About Cisco TrustSec 1640 Restrictions for Cisco TrustSec 1641 Feature Information for Cisco TrustSec 1642 Additional References 1642 Configuring Wireless Guest Access 1645 Finding Feature Information 1645 Prerequisites for Guest Access 1645 Restrictions for Guess Access 1646 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxvii Contents Information about Wireless Guest Access 1646 Fast Secure Roaming 1646 How to Configure Guest Access 1647 Creating a Lobby Administrator Account 1647 Configuring Guest User Accounts 1648 Configuring Mobility Agent (MA) 1649 Configuring Mobility Controller 1650 Obtaining a Web Authentication Certificate 1652 Displaying a Web Authentication Certificate 1652 Choosing the Default Web Authentication Login Page 1653 Choosing a Customized Web Authentication Login Page from an External Web Server 1654 Assigning Login, Login Failure, and Logout Pages per WLAN 1656 Configuring AAA-Override 1657 Configuring Client Load Balancing 1658 Configuring Preauthentication ACL 1659 Configuring IOS ACL Definition 1660 Configuring Webpassthrough 1661 Configuration Examples for Guest Access 1662 Example: Creating a Lobby Ambassador Account 1662 Example: Obtaining Web Authentication Certificate 1662 Example: Displaying a Web Authentication Certificate 1664 Example: Configuring Guest User Accounts 1664 Example: Configuring Mobility Controller 1665 Example: Choosing the Default Web Authentication Login Page 1665 Example: Choosing a Customized Web Authentication Login Page from an External Web Server 1666 Example: Assigning Login, Login Failure, and Logout Pages per WLAN 1666 Example: Configuring AAA-Override 1667 Example: Configuring Client Load Balancing 1667 Example: Configuring Preauthentication ACL 1667 Example: Configuring IOS ACL Definition 1668 Example: Configuring Webpassthrough 1668 Additional References for Guest Access 1668 Feature History and Information for Guest Access 1669 lxviii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents CHAPTER 80 CHAPTER 81 CHAPTER 82 Managing Rogue Devices 1671 Finding Feature Information 1671 Information About Rogue Devices 1671 How to Configure Rogue Detection 1674 Configuring Rogue Detection (CLI) 1674 Configuring Rogue Detection (GUI) 1675 Monitoring Rogue Detection 1676 Examples: Rogue Detection Configuration 1677 Additional References for Rogue Detection 1677 Feature History and Information For Performing Rogue Detection Configuration 1678 Classifying Rogue Access Points 1679 Finding Feature Information 1679 Information About Classifying Rogue Access Points 1679 Restrictions for Classifying Rogue Access Points 1682 How to Classify Rogue Access Points 1683 Configuring Rogue Classification Rules (CLI) 1683 Configuring Rogue Classification Rules (GUI) 1686 Viewing and Classifying Rogue Devices (GUI) 1688 Examples: Classifying Rogue Access Points 1690 Additional References for Classifying Rogue Access Points 1690 Feature History and Information For Classifying Rogue Access Points 1691 Configuring wIPS 1693 Finding Feature Information 1693 Information About wIPS 1693 How to Configure wIPS on an Access Point 1700 Configuring wIPS on an Access Point (CLI) 1700 Configuring wIPS on an Access Point (GUI) 1701 Monitoring wIPS Information 1701 Examples: wIPS Configuration 1701 Additional References for Configuring wIPS 1702 Feature History for Performing wIPS Configuration 1702 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxix Contents CHAPTER 83 PART XIV CHAPTER 84 Configuring Intrusion Detection System 1703 Finding Feature Information 1703 Information About Intrusion Detection System 1703 How to Configure Intrusion Detection System 1704 Configuring IDS Sensors 1704 Monitoring Intrusion Detection System 1705 Stack Manager and High Availability 1707 Managing Switch Stacks 1709 Finding Feature Information 1709 Prerequisites for Switch Stacks 1709 Restrictions for Switch Stacks 1709 Information About Switch Stacks 1710 Switch Stack Overview 1710 Supported Features in a Switch Stack 1710 Switch Stack Membership 1711 Changes to Switch Stack Membership 1711 Stack Member Numbers 1712 Stack Member Priority Values 1713 Switch Stack Bridge ID and MAC Address 1713 Persistent MAC Address on the Switch Stack 1713 Active and Standby Switch Election and Reelection 1713 Switch Stack Configuration Files 1714 Offline Configuration to Provision a Stack Member 1715 Effects of Adding a Provisioned Switch to a Switch Stack 1716 Effects of Replacing a Provisioned Switch in a Switch Stack 1717 Effects of Removing a Provisioned Switch from a Switch Stack 1717 Upgrading a Switch Running Incompatible Software 1717 Auto-Upgrade 1717 Auto-Advise 1718 SDM Template Mismatch in Switch Stacks 1719 Switch Stack Management Connectivity 1720 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxx Contents CHAPTER 85 Connectivity to Specific Stack Members 1720 Connectivity to the Switch Stack Through an IP Address 1720 Connectivity to the Switch Stack Through Console Ports or Ethernet Management Ports 1720 How to Configure a Switch Stack 1721 Default Switch Stack Configuration 1721 Enabling the Persistent MAC Address Feature 1721 Assigning a Stack Member Number 1722 Setting the Stack Member Priority Value 1723 Provisioning a New Member for a Switch Stack 1724 Removing Provisioned Switch Information 1725 Displaying Incompatible Switches in the Switch Stack 1726 Upgrading an Incompatible Switch in the Switch Stack 1727 Troubleshooting the Switch Stack 1727 Accessing the Diagnostic Console of a Stack Member 1727 Temporarily Disabling a Stack Port 1728 Reenabling a Stack Port While Another Member Starts 1729 Monitoring the Switch Stack 1729 Configuration Examples for Switch Stacks 1730 Switch Stack Configuration Scenarios 1730 Enabling the Persistent MAC Address Feature: Example 1731 Provisioning a New Member for a Switch Stack: Example 1732 show switch stack-ports summary Command Output: Example 1732 Software Loopback: Examples 1734 Software Loopback with Connected Stack Cables: Examples 1735 Software Loopback with no Connected Stack Cable: Example 1735 Finding a Disconnected Stack Cable: Example 1735 Fixing a Bad Connection Between Stack Ports: Example 1736 Additional References for Switch Stacks 1737 Feature History and Information for Switch Stacks 1738 Configuring Cisco NSF with SSO 1739 Finding Feature Information 1739 Prerequisites for NSF with SSO 1739 Restrictions for NSF with SSO 1740 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxi Contents CHAPTER 86 Information About NSF with SSO 1740 Overview of NSF with SSO 1740 SSO Operation 1740 NSF Operation 1742 Cisco Express Forwarding 1742 BGP Operation 1743 OSPF Operation 1744 EIGRP Operation 1744 How to Configure Cisco NSF with SSO 1745 Configuring SSO 1745 Configuring SSO Example 1746 Configuring CEF NSF 1746 Verifying CEF NSF 1746 Configuring BGP for NSF 1747 Verifying BGP NSF 1748 Configuring OSPF NSF 1749 Verifying OSPF NSF 1749 Configuring EIGRP NSF 1750 Verifying EIGRP NSF 1751 Additional References for NSF with SSO 1752 Feature History and Information for NSF with SSO 1753 Configuring Wireless High Availability 1755 Finding Feature Information 1755 Information about High Availability 1755 Information about Access Point Stateful Switch Over 1755 Initiating Graceful Switchover 1756 Configuring EtherChannels 1756 Configuring LACP 1756 Troubleshooting High Availability 1758 Access the Standby Console 1758 Before a Switchover 1759 After a Switchover 1760 Monitoring the Switch Stack 1761 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxii PART XV CHAPTER 87 LACP Configuration: Example 1761 Flex Link Configuration: Example 1763 Viewing Redundancy Switchover History (GUI) 1765 Viewing Switchover States (GUI) 1766 System Management 1769 Administering the System 1771 Finding Feature Information 1771 Information About Administering the Switch 1771 System Time and Date Management 1771 System Clock 1771 Network Time Protocol 1772 NTP Stratum 1772 NTP Associations 1772 NTP Security 1772 NTP Implementation 1773 NTP Version 4 1773 System Name and Prompt 1774 Stack System Name and Prompt 1774 Default System Name and Prompt Configuration 1774 DNS 1774 Default DNS Settings 1774 Login Banners 1775 Default Banner Configuration 1775 MAC Address Table 1775 MAC Address Table Creation 1775 MAC Addresses and VLANs 1776 MAC Addresses and Switch Stacks 1776 Default MAC Address Table Settings 1776 ARP Table Management 1776 How to Administer the Switch 1777 Configuring the Time and Date Manually 1777 Setting the System Clock 1777 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxiii Contents CHAPTER 88 Configuring the Time Zone 1777 Configuring Summer Time (Daylight Saving Time) 1778 Configuring a System Name 1779 Setting Up DNS 1780 Configuring a Message-of-the-Day Login Banner 1781 Configuring a Login Banner 1782 Managing the MAC Address Table 1783 Changing the Address Aging Time 1783 Configuring MAC Address Change Notification Traps 1784 Configuring MAC Address Move Notification Traps 1785 Configuring MAC Threshold Notification Traps 1787 Adding and Removing Static Address Entries 1788 Configuring Unicast MAC Address Filtering 1789 Monitoring and Maintaining Administration of the Switch 1790 Configuration Examples for Switch Administration 1791 Example: Setting the System Clock 1791 Examples: Configuring Summer Time 1791 Example: Configuring a MOTD Banner 1791 Example: Configuring a Login Banner 1792 Example: Configuring MAC Address Change Notification Traps 1792 Example: Configuring MAC Threshold Notification Traps 1792 Example: Adding the Static Address to the MAC Address Table 1792 Example: Configuring Unicast MAC Address Filtering 1793 Additional References for Switch Administration 1793 Feature History and Information for Switch Administration 1794 Performing Switch Setup Configuration 1795 Finding Feature Information 1795 Information About Performing Switch Setup Configuration 1795 Switch Boot Process 1795 Software Installer Features 1796 Software Boot Modes 1797 Installed Boot Mode 1797 Bundle Boot Mode 1797 lxxiv Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents Boot Mode for a Switch Stack 1798 Switches Information Assignment 1798 Default Switch Information 1799 DHCP-Based Autoconfiguration Overview 1799 DHCP Client Request Process 1800 DHCP-based Autoconfiguration and Image Update 1801 Restrictions for DHCP-based Autoconfiguration 1801 DHCP Autoconfiguration 1801 DHCP Auto-Image Update 1802 DHCP Server Configuration Guidelines 1802 Purpose of the TFTP Server 1803 Purpose of the DNS Server 1803 How to Obtain Configuration Files 1803 How to Control Environment Variables 1804 Common Environment Variables 1805 Environment Variables for TFTP 1806 Scheduled Reload of the Software Image 1807 How to Perform Switch Setup Configuration 1807 Configuring DHCP Autoconfiguration (Only Configuration File) 1807 Configuring DHCP Auto-Image Update (Configuration File and Image) 1809 Configuring the Client to Download Files from DHCP Server 1813 Manually Assigning IP Information to Multiple SVIs 1814 Modifying the Switch Startup Configuration 1816 Specifying the Filename to Read and Write the System Configuration 1816 Manually Booting the Switch 1817 Booting the Switch in Installed Mode 1818 Booting the Switch in Bundle Mode 1820 Booting a Specific Software Image On a Switch Stack 1820 Configuring a Scheduled Software Image Reload 1821 Monitoring Switch Setup Configuration 1823 Example: Verifying the Switch Running Configuration 1823 Examples: Displaying Software Bootup in Install Mode 1823 Example: Emergency Installation 1825 Configuration Examples for Performing Switch Setup 1827 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxv Contents CHAPTER 89 Example: Configuring a Switch as a DHCP Server 1827 Example: Configuring DHCP Auto-Image Update 1827 Example: Configuring a Switch to Download Configurations from a DHCP Server 1827 Examples: Scheduling Software Image Reload 1828 Additional References For Performing Switch Setup 1828 Feature History and Information For Performing Switch Setup Configuration 1829 Configuring Right-To-Use Licenses 1831 Finding Feature Information 1831 Restrictions for Configuring RTU Licenses 1831 Information About Configuring RTU Licenses 1832 Right-To-Use Licensing 1832 Right-To-Use Image Based Licenses 1832 Right-To-Use License States 1832 License Activation for Switch Stacks 1833 Mobility Controller Mode 1833 Right-To-Use AP-Count Licensing 1833 Right-to-Use AP-Count Evaluation Licenses 1834 Right-To-Use Adder AP-Count Rehosting Licenses 1835 How to Configure RTU Licenses 1835 Activating an Imaged Based License 1835 Activating an AP-Count License 1836 Obtaining an Upgrade or Capacity Adder License 1837 Rehosting a License 1838 Changing Mobility Mode 1838 Monitoring and Maintaining RTU Licenses 1840 Configuration Examples for RTU Licensing 1840 Examples: Activating RTU Image Based Licenses 1840 Examples: Displaying RTU Licensing Information 1841 Example: Displaying RTU License Details 1842 Example: Displaying RTU License Mismatch 1843 Example: Displaying RTU Licensing Usage 1843 Additional References for RTU Licensing 1844 Feature History and Information for RTU Licensing 1845 lxxvi Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents CHAPTER 90 CHAPTER 91 Configuring Administrator Usernames and Passwords 1847 Finding Feature Information 1847 Information About Configuring Administrator Usernames and Passwords 1847 Configuring Administrator Usernames and Passwords 1848 Examples: Administrator Usernames and Passwords Configuration 1850 Additional References for Administrator Usernames and Passwords 1850 Feature History and Information For Performing Administrator Usernames and Passwords Configuration 1851 Configuring 802.11 parameters and Band Selection 1853 Finding Feature Information 1853 Restrictions on Band Selection, 802.11 Bands, and Parameters 1853 Information About Configuring Band Selection, 802.11 Bands, and Parameters 1854 Band Selection 1854 802.11 Bands 1854 802.11n Parameter 1854 802.11h Parameter 1855 How to Configure 802.11 Bands and Parameters 1855 Configuring Band Selection (CLI) 1855 Configuring the 802.11 Bands (CLI) 1856 Configuring the 802.11 Bands (GUI) 1859 Configuring 802.11n Parameters (CLI) 1860 Configuring the 802.11n Parameters (GUI) 1862 Configuring 802.11h Parameters (CLI) 1864 Configuring the 802.11h Parameters (GUI) 1864 Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters 1865 Monitoring Configuration Settings Using Band Selection and 802.11 Bands Commands 1865 Example: Viewing the Configuration Settings for 5-GHz Band 1865 Example: Viewing the Configuration Settings for 24-GHz Band 1867 Example: Viewing the status of 802.11h Parameters 1869 Example: Verifying the Band Selection Settings 1869 Configuration Examples for Band Selection, 802.11 Bands, and Parameters 1869 Examples: Band Selection Configuration 1869 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxvii Contents CHAPTER 92 CHAPTER 93 Examples: 802.11 Bands Configuration 1870 Examples: 802.11n Configuration 1870 Examples: 802.11h Configuration 1871 Additional References for 802.11 Parameters and Band Selection 1871 Feature History and Information For Performing 802.11 parameters and Band Selection Configuration 1872 Configuring Aggressive Load Balancing 1873 Finding Feature Information 1873 Restrictions for Aggressive Load Balancing 1873 Information for Configuring Aggressive Load Balancing Parameters 1874 Aggressive Load Balancing 1874 How to Configure Aggressive Load Balancing 1875 Configuring Aggressive Load Balancing 1875 Monitoring Aggressive Load Balancing 1876 Examples: Aggressive Load Balancing Configuration 1876 Additional References for Aggressive Load Balancing 1877 Feature History and Information For Performing Aggressive Load Balancing Configuration 1878 Configuring Client Roaming 1879 Finding Feature Information 1879 Restrictions for Configuring Client Roaming 1879 Information About Client Roaming 1879 Inter-Subnet Roaming 1881 Voice-over-IP Telephone Roaming 1881 CCX Layer 2 Client Roaming 1881 How to Configure Layer 2 or Layer 3 Roaming 1882 Configuring Layer 2 or Layer 3 Roaming 1882 Configuring CCX Client Roaming Parameters (CLI) 1883 Configuring Mobility Oracle 1885 Configuring Mobility Controller 1885 Configuring Mobility Agent 1888 Monitoring Client Roaming Parameters 1889 Monitoring Mobility Configurations 1889 lxxviii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents CHAPTER 94 CHAPTER 95 Additional References for Configuring Client Roaming 1890 Feature History and Information For Performing Client Roaming Configuration 1891 Configuring Application Visibility and Control 1893 Finding Feature Information 1893 Information About Application Visibility and Control 1893 Supported AVC Class Map and Policy Map Formats 1894 Prerequisites for Application Visibility and Control 1896 Guidelines for Inter-Switch Roaming with Application Visibility and Control 1896 Restrictions for Application Visibility and Control 1897 How to Configure Application Visibility and Control 1897 Configuring Application Visibility and Control (CLI) 1897 Creating a Flow Record 1897 Creating a Flow Exporter (Optional) 1899 Creating a Flow Monitor 1901 Creating AVC QoS Policy 1902 Configuring WLAN to Apply Flow Monitor in IPV4 Input/Output Direction 1912 Configuring Application Visibility and Control (GUI) 1912 Configuring Application Visibility (GUI) 1912 Configuring Application Visibility and Control (GUI) 1913 Monitoring Application Visibility and Control 1914 Monitoring Application Visibility and Control (CLI) 1914 Monitoring Application Visibility and Control (GUI) 1916 Monitoring SSID and Client Policies Statistics (GUI) 1917 Examples: Application Visibility and Control 1917 Examples: Application Visibility Configuration 1917 Examples: Application Visibility and Control QoS Configuration 1918 Example: Configuring QoS Attribute for Local Profiling Policy 1920 Additional References for Application Visibility and Control 1920 Feature History and Information For Application Visibility and Control 1921 Configuring Voice and Video Parameters 1923 Finding Feature Information 1923 Prerequisites for Voice and Video Parameters 1923 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxix Contents CHAPTER 96 CHAPTER 97 Restrictions for Voice and Video Parameters 1923 Information About Configuring Voice and Video Parameters 1924 Call Admission Control 1924 Static-Based CAC 1924 Load-Based CAC 1925 IOSd Call Admission Control 1925 Expedited Bandwidth Requests 1926 U-APSD 1926 Traffic Stream Metrics 1927 Information About Configuring Voice Prioritization Using Preferred Call Numbers 1927 Information About EDCA Parameters 1928 How to Configure Voice and Video Parameters 1928 Configuring Voice Parameters (CLI) 1928 Configuring Video Parameters (CLI) 1931 Configuring SIP-Based CAC (CLI) 1934 Configuring a Preferred Call Number (CLI) 1936 Configuring EDCA Parameters (CLI) 1937 Configuring EDCA Parameters (GUI) 1939 Monitoring Voice and Video Parameters 1939 Additional References for Voice and Video Parameters 1942 Feature History and Information For Performing Voice and Video Parameters Configuration 1943 Configuring RFID Tag Tracking 1945 Finding Feature Information 1945 Information About Configuring RFID Tag Tracking 1945 How to Configure RFID Tag Tracking 1945 Configuring RFID Tag Tracking (CLI) 1945 Monitoring RFID Tag Tracking Information 1946 Additional References RFID Tag Tracking 1947 Feature History and Information For Performing RFID Tag Tracking Configuration 1948 Configuring Location Settings 1949 Finding Feature Information 1949 Information About Configuring Location Settings 1949 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxx Contents CHAPTER 98 CHAPTER 99 How to Configure Location Settings 1950 Configuring Location Settings (CLI) 1950 Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues (CLI) 1952 Modifying the NMSP Notification threshold for Clients, RFID Tags, and Rogues (CLI) 1953 Monitoring Location Settings and NMSP Settings 1954 Monitoring Location Settings (CLI) 1954 Monitoring NMSP Settings (CLI) 1954 Examples: Location Settings Configuration 1955 Examples: NMSP Settings Configuration 1955 Additional References for Location Settings 1956 Feature History and Information For Performing Location Settings Configuration 1957 Monitoring Flow Control 1959 Finding Feature Information 1959 Information About Flow Control 1959 Monitoring Flow Control 1959 Examples: Monitoring Flow Control 1960 Additional References for Monitoring Flow Control 1961 Feature History and Information For Monitoring Flow Control 1961 Configuring SDM Templates 1963 Finding Feature Information 1963 Information About Configuring SDM Templates 1963 SDM Templates 1963 SDM Templates and Switch Stacks 1965 How to Configure SDM Templates 1965 Configuring SDM Templates 1965 Configuring the Switch SDM Template 1965 Monitoring and Maintaining SDM Templates 1966 Configuration Examples for Configuring SDM Templates 1966 Examples: Configuring SDM Templates 1966 Examples: Displaying SDM Templates 1966 Feature History and Information for Configuring SDM Templates 1967 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxxi Contents CHAPTER 100 Configuring System Message Logs 1969 Finding Feature Information 1969 Restrictions for Configuring System Message Logs 1969 Information About Configuring System Message Logs 1969 System Messsage Logging 1969 System Log Message Format 1970 Default System Message Logging Settings 1971 Syslog Message Limits 1972 Enabling Syslog Trap Messages 1972 How to Configure System Message Logs 1972 Setting the Message Display Destination Device 1972 Synchronizing Log Messages 1974 Disabling Message Logging 1975 Enabling and Disabling Time Stamps on Log Messages 1976 Enabling and Disabling Sequence Numbers in Log Messages 1977 Defining the Message Severity Level 1978 Limiting Syslog Messages Sent to the History Table and to SNMP 1979 Logging Messages to a UNIX Syslog Daemon 1980 Monitoring and Maintaining System Message Logs 1981 Monitoring Configuration Archive Logs 1981 Configuration Examples for System Message Logs 1981 Example: Stacking System Message 1981 Example: Switch System Message 1982 Additional References for System Message Logs 1982 Feature History and Information For System Message Logs 1983 CHAPTER 101 Configuring Online Diagnostics 1985 Finding Feature Information 1985 Information About Configuring Online Diagnostics 1985 Online Diagnostics 1985 How to Configure Online Diagnostics 1986 Starting Online Diagnostic Tests 1986 Configuring Online Diagnostics 1987 lxxxii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents Scheduling Online Diagnostics 1987 Configuring Health-Monitoring Diagnostics 1988 Monitoring and Maintaining Online Diagnostics 1990 Displaying Online Diagnostic Tests and Test Results 1990 Configuration Examples for Online Diagnostic Tests 1991 Examples: Start Diagnostic Tests 1991 Example: Configure a Health Monitoring Test 1991 Examples: Schedule Diagnostic Test 1991 Examples: Displaying Online Diagnostics 1991 Additional References for Online Diagnostics 1993 Feature History and Information for Configuring Online Diagnostics 1994 CHAPTER 102 Managing Configuration Files 1995 Prerequisites for Managing Configuration Files 1995 Restrictions for Managing Configuration Files 1995 Information About Managing Configuration Files 1995 Types of Configuration Files 1995 Configuration Mode and Selecting a Configuration Source 1996 Configuration File Changes Using the CLI 1996 Location of Configuration Files 1996 Copy Configuration Files from a Network Server to the Switch 1997 Copying a Configuration File from the Switch to a TFTP Server 1997 Copying a Configuration File from the Switch to an RCP Server 1997 Copying a Configuration File from the Switch to an FTP Server 1999 Configuration Files Larger than NVRAM 2000 Compressing the Configuration File 2000 Storing the Configuration in Flash Memory on Class A Flash File Systems 2000 Loading the Configuration Commands from the Network 2001 Configuring the Switch to Download Configuration Files 2001 Network Versus Host Configuration Files 2001 How to Manage Configuration File Information 2001 Displaying Configuration File Information (CLI) 2001 Modifying the Configuration File (CLI) 2002 Copying a Configuration File from the Switch to a TFTP Server (CLI) 2004 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxxiii Contents What to Do Next 2005 Copying a Configuration File from the Switch to an RCP Server (CLI) 2005 Examples 2006 What to Do Next 2007 Copying a Configuration File from the Switch to the FTP Server (CLI) 2007 Examples 2008 What to Do Next 2009 Copying a Configuration File from a TFTP Server to the Switch (CLI) 2009 What to Do Next 2010 Copying a Configuration File from the rcp Server to the Switch (CLI) 2010 Examples 2011 What to Do Next 2012 Copying a Configuration File from an FTP Server to the Switch (CLI) 2012 Examples 2013 What to Do Next 2014 Maintaining Configuration Files Larger than NVRAM 2014 Compressing the Configuration File (CLI) 2014 Storing the Configuration in Flash Memory on Class A Flash File Systems (CLI) 2015 Loading the Configuration Commands from the Network (CLI) 2017 Copying Configuration Files from Flash Memory to the Startup or Running Configuration (CLI) 2018 Copying Configuration Files Between Flash Memory File Systems (CLI) 2019 Copying a Configuration File from an FTP Server to Flash Memory Devices (CLI) 2021 What to Do Next 2022 Copying a Configuration File from an RCP Server to Flash Memory Devices (CLI) 2022 Copying a Configuration File from a TFTP Server to Flash Memory Devices (CLI) 2023 Re-executing the Configuration Commands in the Startup Configuration File (CLI) 2023 Clearing the Startup Configuration (CLI) 2024 Deleting a Specified Configuration File (CLI) 2025 Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI) 2025 What to Do Next 2027 Configuring the Switch to Download Configuration Files 2027 Configuring the Switch to Download the Network Configuration File (CLI) 2028 Configuring the Switch to Download the Host Configuration File (CLI) 2029 lxxxiv Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents Additional References 2030 CHAPTER 103 Configuration Replace and Configuration Rollback 2033 Prerequisites for Configuration Replace and Configuration Rollback 2033 Restrictions for Configuration Replace and Configuration Rollback 2034 Information About Configuration Replace and Configuration Rollback 2034 Configuration Archive 2034 Configuration Replace 2035 Configuration Rollback 2036 Configuration Rollback Confirmed Change 2036 Benefits of Configuration Replace and Configuration Rollback 2036 How to Use Configuration Replace and Configuration Rollback 2037 Creating a Configuration Archive (CLI) 2037 Performing a Configuration Replace or Configuration Rollback Operation (CLI) 2039 Monitoring and Troubleshooting the Feature (CLI) 2041 Configuration Examples for Configuration Replace and Configuration Rollback 2043 Creating a Configuration Archive 2043 Replacing the Current Running Configuration with a Saved Cisco IOS Configuration File 2043 Reverting to the Startup Configuration File 2044 Performing a Configuration Replace Operation with the configure confirm Command 2044 Performing a Configuration Rollback Operation 2044 Additional References 2045 CHAPTER 104 Working with the Flash File System 2049 Information About the Flash File System 2049 Displaying Available File Systems 2049 Setting the Default File System 2052 Displaying Information About Files on a File System 2052 Changing Directories and Displaying the Working Directory (CLI) 2053 Creating Directories (CLI) 2054 Removing Directories 2055 Copying Files 2055 Copying Files from One Switch in a Stack to Another Switch in the Same Stack 2055 Deleting Files 2057 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxxv Contents Creating, Displaying and Extracting Files (CLI) 2057 Additional References 2059 CHAPTER 105 Working with Cisco IOS XE Software Bundles 2061 About Software Bundles and Packages 2061 Bundle and Package File Location on the Switch 2061 Upgrading Cisco IOS XE Software 2062 Upgrading Cisco IOS XE Software: Install Mode 2062 Upgrading Cisco IOS XE Software Install Mode Example 2062 Upgrading Cisco IOS XE Software: Bundle Mode 2063 Upgrading Cisco IOS XE Software Bundle Mode Example 2063 Converting from the Bundle Running Mode to the Install Running Mode 2064 Converting from the Bundle Running Mode to the Install Running Mode Example 2064 Copying IOS XE Package and Bundle Files from One Stack Member to Another 2065 Copying IOS XE Package and Bundle Files from One Stack Member to Another Example 2065 Upgrading a Switch Running Incompatible Software 2067 Upgrading a Switch Running Incompatible Software Example 2067 Upgrading a Switch Running in Incompatible Running Mode 2068 Upgrading a Switch Running in Incompatible Running Mode Example 2068 Additional References 2070 CHAPTER 106 Troubleshooting the Software Configuration 2073 Finding Feature Information 2073 Information About Troubleshooting the Software Configuration 2073 Software Failure on a Switch 2073 Lost or Forgotten Password on a Switch 2074 Power over Ethernet Ports 2074 Disabled Port Caused by Power Loss 2074 Disabled Port Caused by False Link-Up 2075 Ping 2075 Layer 2 Traceroute 2075 Layer 2 Traceroute Guidelines 2075 IP Traceroute 2076 Time Domain Reflector Guidelines 2077 lxxxvi Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) Contents Debug Commands 2078 Crashinfo Files 2078 System Reports 2079 Onboard Failure Logging on the Switch 2079 Fan Failures 2080 Possible Symptoms of High CPU Utilization 2080 How to Troubleshoot the Software Configuration 2081 Recovering from a Software Failure 2081 Recovering from a Lost or Forgotten Password 2083 Procedure with Password Recovery Enabled 2084 Procedure with Password Recovery Disabled 2086 Preventing Switch Stack Problems 2087 Preventing Autonegotiation Mismatches 2088 Troubleshooting SFP Module Security and Identification 2089 Monitoring SFP Module Status 2089 Executing Ping 2089 Monitoring Temperature 2090 Monitoring the Physical Path 2090 Executing IP Traceroute 2090 Running TDR and Displaying the Results 2091 Redirecting Debug and Error Message Output 2091 Using the show platform forward Command 2091 Configuring OBFL 2091 Verifying Troubleshooting of the Software Configuration 2092 Displaying OBFL Information 2092 Example: Verifying the Problem and Cause for High CPU Utilization 2093 Scenarios for Troubleshooting the Software Configuration 2094 Scenarios to Troubleshoot Power over Ethernet (PoE) 2094 Configuration Examples for Troubleshooting Software 2096 Example: Pinging an IP Host 2096 Example: Performing a Traceroute to an IP Host 2097 Example: Enabling All System Diagnostics 2098 Additional References for Troubleshooting Software Configuration 2098 Feature History and Information for Troubleshooting Software Configuration 2099 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxxvii Contents PART XVI CHAPTER 107 VideoStream 2101 Configuring VideoStream 2103 Finding Feature Information 2103 Prerequisites for VideoStream 2103 Restrictions for Configuring VideoStream 2103 Information about VideoStream 2104 How to Configure VideoStream 2104 Configuring Multicast-Direct Globally for Media-Stream 2104 Configuring Media-Stream for 802.11 bands 2105 Configuring WLAN to Stream Video 2107 Deleting a Media-Stream 2108 Monitoring Media Streams 2109 CHAPTER 108 Configuring VideoStream GUI 2111 Configuring VideoStream (GUI) 2111 PART XVII CHAPTER 109 VLAN 2115 Configuring VTP 2117 Finding Feature Information 2117 Prerequisites for VTP 2117 Restrictions for VTP 2118 Information About VTP 2118 VTP 2118 VTP Domain 2119 VTP Modes 2120 VTP Advertisements 2121 VTP Version 2 2122 VTP Version 3 2122 VTP Pruning 2123 VTP and Switch Stacks 2124 VTP Configuration Guidelines 2125 lxxxviii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) VTP Configuration Requirements 2125 VTP Settings 2125 Domain Names for Configuring VTP 2125 Passwords for the VTP Domain 2126 VTP Version 2126 How to Configure VTP 2128 Configuring VTP Mode (CLI) 2128 Configuring a VTP Version 3 Password (CLI) 2129 Configuring a VTP Version 3 Primary Server (CLI) 2131 Enabling the VTP Version (CLI) 2131 Enabling VTP Pruning (CLI) 2133 Configuring VTP on a Per-Port Basis (CLI) 2134 Adding a VTP Client Switch to a VTP Domain (CLI) 2135 Monitoring VTP 2137 Configuration Examples for VTP 2138 Example: Configuring a Switch as the Primary Server 2138 Where to Go Next 2138 Additional References 2139 Feature History and Information for VTP 2140 CHAPTER 110 Configuring VLANs 2141 Finding Feature Information 2141 Prerequisites for VLANs 2141 Restrictions for VLANs 2142 Information About VLANs 2142 Logical Networks 2142 Supported VLANs 2143 VLAN Port Membership Modes 2144 VLAN Configuration Files 2145 Normal-Range VLAN Configuration Guidelines 2145 Extended-Range VLAN Configuration Guidelines 2146 How to Configure VLANs 2147 How to Configure Normal-Range VLANs 2147 Creating or Modifying an Ethernet VLAN (CLI) 2147 Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxxix Contents Deleting a VLAN (CLI) 2150 Assigning Static-Access Ports to a VLAN (CLI) 2151 How to Configure Extended-Range VLANs 2153 Creating an Extended-Range VLAN (CLI) 2153 How to Configure VLANs (GUI) 2155 Creating Layer2 VLAN (GUI) 2155 Creating Layer3 Interface (GUI) 2155 Viewing Layer2 VLAN (GUI) 2156 Viewing Layer3 Interface (GUI) 2156 Removing Layer2 VLAN (GUI) 2156 Removing Layer3 Interface (GUI) 2157 Monitoring VLANs 2158 Where to Go Next 2158 Additional References 2159 Feature History and Information for VLANs 2160 CHAPTER 111 Configuring VLAN Groups 2161 Finding Feature Information 2161 Prerequisites for VLAN Groups 2161 Restrictions for VLAN Groups 2161 Information About VLAN Groups 2162 How to Configure VLAN Groups 2162 Creating VLAN Groups (CLI) 2162 Removing VLAN Group (CLI) 2163 Creating VLAN Groups (GUI) 2163 Adding a VLAN Group to WLAN (CLI) 2164 Adding a VLAN Group to WLAN (GUI) 2164 Removing VLAN Groups (GUI) 2165 Viewing VLANs in VLAN Groups (CLI) 2165 Viewing VLAN Groups (GUI) 2165 Where to Go Next 2166 Additional References 2166 Feature History and Information for VLAN Groups 2167 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xc Contents CHAPTER 112 Configuring VLAN Trunks 2169 Finding Feature Information 2169 Prerequisites for VLAN Trunks 2169 Restrictions for VLAN Trunks 2170 Information About VLAN Trunks 2170 Trunking Overview 2170 Trunking Modes 2170 Layer 2 Interface Modes 2171 Allowed VLANs on a Trunk 2171 Load Sharing on Trunk Ports 2172 Network Load Sharing Using STP Priorities 2172 Network Load Sharing Using STP Path Cost 2173 Feature Interactions 2173 How to Configure VLAN Trunks 2174 Configuring an Ethernet Interface as a Trunk Port 2174 Configuring a Trunk Port (CLI) 2174 Defining the Allowed VLANs on a Trunk (CLI) 2176 Changing the Pruning-Eligible List (CLI) 2178 Configuring the Native VLAN for Untagged Traffic (CLI) 2179 Configuring Trunk Ports for Load Sharing 2180 Configuring Load Sharing Using STP Port Priorities (CLI) 2180 Configuring Load Sharing Using STP Path Cost (CLI) 2184 Where to Go Next 2187 Additional References 2187 Feature History and Information for VLAN Trunks 2188 CHAPTER 113 Configuring Voice VLANs 2189 Finding Feature Information 2189 Prerequisites for Voice VLANs 2189 Restrictions for Voice VLANs 2190 Information About Voice VLAN 2190 Voice VLANs 2190 Cisco IP Phone Voice Traffic 2191 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xci Contents Cisco IP Phone Data Traffic 2191 Voice VLAN Configuration Guidelines 2191 How to Configure Voice VLAN 2193 Configuring Cisco IP Phone Voice Traffic (CLI) 2193 Configuring the Priority of Incoming Data Frames (CLI) 2195 Monitoring Voice VLAN 2196 Where to Go Next 2196 Additional References 2197 Feature History and Information for Voice VLAN 2198 PART XVIII CHAPTER 114 WLAN 2199 Configuring DHCP for WLANs 2201 Finding Feature Information 2201 Prerequisites for Configuring DHCP for WLANs 2201 Restrictions for Configuring DHCP for WLANs 2202 Information About the Dynamic Host Configuration Protocol 2202 Internal DHCP Servers 2203 External DHCP Servers 2203 DHCP Assignments 2204 Information About DHCP Option 82 2204 Configuring DHCP Scopes 2205 Information About DHCP Scopes 2205 How to Configure DHCP for WLANs 2206 Configuring DHCP for WLANs (CLI) 2206 Configuring DHCP Scopes (CLI) 2208 Additional References 2209 Feature Information for DHCP for WLANs 2209 CHAPTER 115 Configuring WLAN Security 2211 Finding Feature Information 2211 Prerequisites for Layer 2 Security 2211 Information About AAA Override 2212 How to Configure WLAN Security 2212 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xcii Contents Configuring Static WEP + 802.1X Layer 2 Security Parameters (CLI) 2212 Configuring Static WEP Layer 2 Security Parameters (CLI) 2213 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) 2214 Configuring 802.1X Layer 2 Security Parameters (CLI) 2216 Configuring Layer 2 Parameters (GUI) 2217 Additional References 2220 Feature Information about WLAN Layer 2 Security 2221 CHAPTER 116 Configuring Access Point Groups 2223 Finding Feature Information 2223 Prerequisites for Configuring AP Groups 2223 Restrictions for Configuring Access Point Groups 2224 Information About Access Point Groups 2224 How to Configure Access Point Groups 2225 Creating Access Point Groups 2225 Assigning an Access Point to an AP Group 2227 Viewing Access Point Group 2227 Additional References 2228 Feature History and Information for Access Point Groups 2229 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xciii Contents Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xciv Preface · Document Conventions, on page xcv · Related Documentation, on page xcvii · Obtaining Documentation and Submitting a Service Request, on page xcvii Document Conventions This document uses the following conventions: Convention ^ or Ctrl Description Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For example, the key combination ^D or Ctrl-D means that you hold down the Control key while you press the D key. (Keys are indicated in capital letters but are not case sensitive.) bold font Commands and keywords and user-entered text appear in bold font. Italic font Document titles, new or emphasized terms, and arguments for which you supply values are in italic font. Courier font Bold Courier font [x] Terminal sessions and information the system displays appear in courier font. Bold Courier font indicates text that the user must enter. Elements in square brackets are optional. ... | [x | y] An ellipsis (three consecutive nonbolded periods without spaces) after a syntax element indicates that the element can be repeated. A vertical line, called a pipe, indicates a choice within a set of keywords or arguments. Optional alternative keywords are grouped in brackets and separated by vertical bars. {x | y} Required alternative keywords are grouped in braces and separated by vertical bars. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xcv Preface Preface Convention [x {y | z}] string <> [] !, # Description Nested set of square brackets or braces indicate optional or required choices within optional or required elements. Braces and a vertical bar within square brackets indicate a required choice within an optional element. A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks. Nonprinting characters such as passwords are in angle brackets. Default responses to system prompts are in square brackets. An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line. Reader Alert Conventions This document may use the following conventions for reader alerts: Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual. Tip Means the following information will help you solve a problem. Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph. Warning IMPORTANT SAFETY INSTRUCTIONS This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the translated safety warnings that accompanied this device. Statement 1071 SAVE THESE INSTRUCTIONS Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xcvi Preface Related Documentation Related Documentation Note Before installing or upgrading the switch, refer to the switch release notes. · Cisco Catalyst 3650 Switch documentation, located at: http://www.cisco.com/go/cat3650_docs · Cisco SFP, SFP+, and QSFP+ modules documentation, including compatibility matrixes, located at: http://www.cisco.com/en/US/products/hw/modules/ps5455/tsd_products_support_series_home.html · Error Message Decoder, located at: https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xcvii Obtaining Documentation and Submitting a Service Request Preface xcviii Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1 C H A P T E R Using the Command-Line Interface · Information About Using the Command-Line Interface, on page 1 · How to Use the CLI to Configure Features, on page 5 Information About Using the Command-Line Interface Command Modes The Cisco IOS user interface is divided into many different modes. The commands available to you depend on which mode you are currently in. Enter a question mark (?) at the system prompt to obtain a list of commands available for each command mode. You can start a CLI session through a console connection, through Telnet, a SSH, or by using the browser. When you start a session, you begin in user mode, often called user EXEC mode. Only a limited subset of the commands are available in user EXEC mode. For example, most of the user EXEC commands are one-time commands, such as show commands, which show the current configuration status, and clear commands, which clear counters or interfaces. The user EXEC commands are not saved when the switch reboots. To have access to all commands, you must enter privileged EXEC mode. Normally, you must enter a password to enter privileged EXEC mode. From this mode, you can enter any privileged EXEC command or enter global configuration mode. Using the configuration modes (global, interface, and line), you can make changes to the running configuration. If you save the configuration, these commands are stored and used when the switch reboots. To access the various configuration modes, you must start at global configuration mode. From global configuration mode, you can enter interface configuration mode and line configuration mode. This table describes the main command modes, how to access each one, the prompt you see in that mode, and how to exit the mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1 Command Modes Using the Command-Line Interface Table 1: Command Mode Summary Mode Access Method Prompt User EXEC Begin a session using Telnet, SSH, Switch> or console. Exit Method About This Mode Enter logout or quit. Use this mode to · Change terminal settings. · Perform basic tests. · Display system information. Privileged While in user EXEC EXEC mode, enter the Switch# enable command. Enter disable to exit. Use this mode to verify commands that you have entered. Use a password to protect access to this mode. Global While in privileged configuration EXEC mode, enter the configure command. Switch(config)# To exit to privileged EXEC mode, enter exit or end, or press Ctrl-Z. Use this mode to configure parameters that apply to the entire switch. VLAN While in global To exit to global configuration configuration mode, Switch(config-vlan)# configuration mode, enter the vlan enter the exit vlan-id command. command. To return to privileged EXEC mode, press Ctrl-Z or enter end. Use this mode to configure VLAN parameters. When VTP mode is transparent, you can create extended-range VLANs (VLAN IDs greater than 1005) and save configurations in the switch startup configuration file. Interface While in global configuration configuration mode, Switch(config-if)# enter the interface command (with a specific interface). To exit to global configuration mode, enter exit. To return to privileged EXEC mode, press Ctrl-Z or enter end. Use this mode to configure parameters for the Ethernet ports. Line While in global To exit to global configuration configuration mode, Switch(config-line)# configuration mode, specify a line with enter exit. the line vty or line console command. To return to privileged EXEC mode, press Ctrl-Z or enter end. Use this mode to configure parameters for the terminal line. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2 Using the Command-Line Interface Using the Help System Using the Help System You can enter a question mark (?) at the system prompt to display a list of commands available for each command mode. You can also obtain a list of associated keywords and arguments for any command. SUMMARY STEPS 1. help 2. abbreviated-command-entry ? 3. abbreviated-command-entry <Tab> 4. ? 5. command ? 6. command keyword ? DETAILED STEPS Step 1 Command or Action help Example: Switch# help Step 2 abbreviated-command-entry ? Example: Switch# di? dir disable disconnect Step 3 abbreviated-command-entry <Tab> Example: Switch# sh conf<tab> Switch# show configuration Purpose Obtains a brief description of the help system in any command mode. Obtains a list of commands that begin with a particular character string. Completes a partial command name. Step 4 ? Example: Switch> ? Lists all commands available for a particular command mode. Step 5 command ? Example: Switch> show ? Lists the associated keywords for a command. Step 6 command keyword ? Lists the associated arguments for a keyword. Example: Switch(config)# cdp holdtime ? <10-255> Length of time (in sec) that receiver must keep this packet Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 3 Understanding Abbreviated Commands Using the Command-Line Interface Understanding Abbreviated Commands You need to enter only enough characters for the switch to recognize the command as unique. This example shows how to enter the show configuration privileged EXEC command in an abbreviated form: Switch# show conf No and Default Forms of Commands Almost every configuration command also has a no form. In general, use the no form to disable a feature or function or reverse the action of a command. For example, the no shutdown interface configuration command reverses the shutdown of an interface. Use the command without the keyword no to reenable a disabled feature or to enable a feature that is disabled by default. Configuration commands can also have a default form. The default form of a command returns the command setting to its default. Most commands are disabled by default, so the default form is the same as the no form. However, some commands are enabled by default and have variables set to certain default values. In these cases, the default command enables the command and sets variables to their default values. CLI Error Messages This table lists some error messages that you might encounter while using the CLI to configure your switch. Table 2: Common CLI Error Messages Error Message Meaning How to Get Help % Ambiguous command: "show con" You did not enter enough characters for your switch to recognize the command. Reenter the command followed by a question mark (?) without any space between the command and the question mark. The possible keywords that you can enter with the command appear. % Incomplete command. You did not enter all of the Reenter the command followed by a question mark keywords or values required by (?) with a space between the command and the this command. question mark. The possible keywords that you can enter with the command appear. % Invalid input detected at `^' marker. You entered the command incorrectly. The caret (^) marks the point of the error. Enter a question mark (?) to display all of the commands that are available in this command mode. The possible keywords that you can enter with the command appear. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 4 Using the Command-Line Interface Configuration Logging Configuration Logging You can log and view changes to the switch configuration. You can use the Configuration Change Logging and Notification feature to track changes on a per-session and per-user basis. The logger tracks each configuration command that is applied, the user who entered the command, the time that the command was entered, and the parser return code for the command. This feature includes a mechanism for asynchronous notification to registered applications whenever the configuration changes. You can choose to have the notifications sent to the syslog. Note Only CLI or HTTP changes are logged. How to Use the CLI to Configure Features Configuring the Command History The software provides a history or record of commands that you have entered. The command history feature is particularly useful for recalling long or complex commands or entries, including access lists. You can customize this feature to suit your needs. Changing the Command History Buffer Size By default, the switch records ten command lines in its history buffer. You can alter this number for a current terminal session or for all sessions on a particular line. This procedure is optional. SUMMARY STEPS 1. terminal history [size number-of-lines] DETAILED STEPS Step 1 Command or Action terminal history [size number-of-lines] Example: Switch# terminal history size 200 Purpose Changes the number of command lines that the switch records during the current terminal session in privileged EXEC mode. You can configure the size from 0 to 256. Recalling Commands To recall commands from the history buffer, perform one of the actions listed in this table. These actions are optional. Note The arrow keys function only on ANSI-compatible terminals such as VT100s. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 5 Disabling the Command History Feature Using the Command-Line Interface SUMMARY STEPS 1. Ctrl-P or use the up arrow key 2. Ctrl-N or use the down arrow key 3. show history DETAILED STEPS Step 1 Command or Action Ctrl-P or use the up arrow key Step 2 Ctrl-N or use the down arrow key Step 3 show history Example: Switch# show history Purpose Recalls commands in the history buffer, beginning with the most recent command. Repeat the key sequence to recall successively older commands. Returns to more recent commands in the history buffer after recalling commands with Ctrl-P or the up arrow key. Repeat the key sequence to recall successively more recent commands. Lists the last several commands that you just entered in privileged EXEC mode. The number of commands that appear is controlled by the setting of the terminal history global configuration command and the history line configuration command. Disabling the Command History Feature The command history feature is automatically enabled. You can disable it for the current terminal session or for the command line. This procedure is optional. SUMMARY STEPS 1. terminal no history DETAILED STEPS Step 1 Command or Action terminal no history Example: Switch# terminal no history Purpose Disables the feature during the current terminal session in privileged EXEC mode. Enabling and Disabling Editing Features Although enhanced editing mode is automatically enabled, you can disable it and reenable it. SUMMARY STEPS 1. terminal editing 2. terminal no editing Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 6 Using the Command-Line Interface Editing Commands Through Keystrokes DETAILED STEPS Step 1 Command or Action terminal editing Example: Switch# terminal editing Step 2 terminal no editing Example: Switch# terminal no editing Purpose Reenables the enhanced editing mode for the current terminal session in privileged EXEC mode. Disables the enhanced editing mode for the current terminal session in privileged EXEC mode. Editing Commands Through Keystrokes The keystrokes help you to edit the command lines. These keystrokes are optional. Note The arrow keys function only on ANSI-compatible terminals such as VT100s. Table 3: Editing Commands Editing Commands Description Ctrl-B or use the left arrow key Moves the cursor back one character. Ctrl-F or use the right arrow Moves the cursor forward one character. key Ctrl-A Moves the cursor to the beginning of the command line. Ctrl-E Moves the cursor to the end of the command line. Esc B Moves the cursor back one word. Esc F Moves the cursor forward one word. Ctrl-T Transposes the character to the left of the cursor with the character located at the cursor. Delete or Backspace key Erases the character to the left of the cursor. Ctrl-D Deletes the character at the cursor. Ctrl-K Deletes all characters from the cursor to the end of the command line. Ctrl-U or Ctrl-X Deletes all characters from the cursor to the beginning of the command line. Ctrl-W Deletes the word to the left of the cursor. Esc D Deletes from the cursor to the end of the word. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 7 Editing Command Lines That Wrap Using the Command-Line Interface Esc C Esc L Esc U Ctrl-V or Esc Q Return key Space bar Ctrl-L or Ctrl-R Capitalizes at the cursor. Changes the word at the cursor to lowercase. Capitalizes letters from the cursor to the end of the word. Designates a particular keystroke as an executable command, perhaps as a shortcut. Scrolls down a line or screen on displays that are longer than the terminal screen can display. Note The More prompt is used for any output that has more lines than can be displayed on the terminal screen, including show command output. You can use the Return and Space bar keystrokes whenever you see the More prompt. Scrolls down one screen. Redisplays the current command line if the switch suddenly sends a message to your screen. Editing Command Lines That Wrap You can use a wraparound feature for commands that extend beyond a single line on the screen. When the cursor reaches the right margin, the command line shifts ten spaces to the left. You cannot see the first ten characters of the line, but you can scroll back and check the syntax at the beginning of the command. The keystroke actions are optional. To scroll back to the beginning of the command entry, press Ctrl-B or the left arrow key repeatedly. You can also press Ctrl-A to immediately move to the beginning of the line. Note The arrow keys function only on ANSI-compatible terminals such as VT100s. The following example shows how to wrap a command line that extends beyond a single line on the screen. SUMMARY STEPS 1. access-list 2. Ctrl-A 3. Return key DETAILED STEPS Step 1 Command or Action access-list Example: Switch(config)# access-list 101 permit tcp 10.15.22.25 255.255.255.0 10.15.22.35 Purpose Displays the global configuration command entry that extends beyond one line. When the cursor first reaches the end of the line, the line is shifted ten spaces to the left and redisplayed. The dollar Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 8 Using the Command-Line Interface Searching and Filtering Output of show and more Commands Command or Action Purpose Switch(config)# $ 101 permit tcp 10.15.22.25 sign ($) shows that the line has been scrolled to the left. 255.255.255.0 10.15.22.35 255.25 Each time the cursor reaches the end of the line, the line is Switch(config)# $t tcp 10.15.22.25 255.255.255.0 131.108.1.20 255.255.255.0 eq again shifted ten spaces to the left. Switch(config)# $15.22.25 255.255.255.0 10.15.22.35 255.255.255.0 eq 45 Step 2 Ctrl-A Example: Switch(config)# access-list 101 permit tcp 10.15.22.25 255.255.255.0 10.15.2$ Checks the complete syntax. The dollar sign ($) appears at the end of the line to show that the line has been scrolled to the right. Step 3 Return key Execute the commands. The software assumes that you have a terminal screen that is 80 columns wide. If you have a different width, use the terminal width privileged EXEC command to set the width of your terminal. Use line wrapping with the command history feature to recall and modify previous complex command entries. Searching and Filtering Output of show and more Commands You can search and filter the output for show and more commands. This is useful when you need to sort through large amounts of output or if you want to exclude output that you do not need to see. Using these commands is optional. SUMMARY STEPS 1. {show | more} command | {begin | include | exclude} regular-expression DETAILED STEPS Step 1 Command or Action Purpose {show | more} command | {begin | include | exclude} Searches and filters the output. regular-expression Expressions are case sensitive. For example, if you enter Example: | exclude output, the lines that contain output are not Switch# show interfaces | include protocol displayed, but the lines that contain output appear. Vlan1 is up, line protocol is up Vlan10 is up, line protocol is down GigabitEthernet1/0/1 is up, line protocol is down GigabitEthernet1/0/2 is up, line protocol is up Accessing the CLI on a Switch Stack You can access the CLI through a console connection, through Telnet, a SSH, or by using the browser. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 9 Accessing the CLI Through a Console Connection or Through Telnet Using the Command-Line Interface You manage the switch stack and the stack member interfaces through the active switch. You cannot manage stack members on an individual switch basis. You can connect to the active switch through the console port or the Ethernet management port of one or more stack members. Be careful with using multiple CLI sessions on the active switch. Commands that you enter in one session are not displayed in the other sessions. Therefore, it is possible to lose track of the session from which you entered commands. Note We recommend using one CLI session when managing the switch stack. If you want to configure a specific stack member port, you must include the stack member number in the CLI command interface notation. To debug the standby switch, use the session standby ios privileged EXEC command from the active switch to access the IOS console of the standby switch. To debug a specific stack member, use the session switch stack-member-number privileged EXEC command from the active switch to access the diagnostic shell of the stack member. For more information about these commands, see the switch command reference. Accessing the CLI Through a Console Connection or Through Telnet Before you can access the CLI, you must connect a terminal or a PC to the switch console or connect a PC to the Ethernet management port and then power on the switch, as described in the hardware installation guide that shipped with your switch. If your switch is already configured, you can access the CLI through a local console connection or through a remote Telnet session, but your switch must first be configured for this type of access. You can use one of these methods to establish a connection with the switch: Procedure · Connect the switch console port to a management station or dial-up modem, or connect the Ethernet management port to a PC. For information about connecting to the console or Ethernet management port, see the switch hardware installation guide. · Use any Telnet TCP/IP or encrypted Secure Shell (SSH) package from a remote management station. The switch must have network connectivity with the Telnet or SSH client, and the switch must have an enable secret password configured. · The switch supports up to 16 simultaneous Telnet sessions. Changes made by one Telnet user are reflected in all other Telnet sessions. · The switch supports up to five simultaneous secure SSH sessions. After you connect through the console port, through the Ethernet management port, through a Telnet session or through an SSH session, the user EXEC prompt appears on the management station. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 10 2 C H A P T E R Using the Web Graphical User Interface · Prerequisites for Using the Web GUI, on page 11 · Information About Using The Web GUI, on page 11 · Connecting the Console Port of the Switch , on page 12 · Logging On to the Web GUI, on page 13 · Enabling Web and Secure Web Modes , on page 13 · Configuring the Switch Web GUI, on page 13 Prerequisites for Using the Web GUI · The GUI must be used on a PC running Windows 7, Windows XP SP1 (or later releases), or Windows 2000 SP4 (or later releases). · The switch GUI is compatible with Microsoft Internet Explorer version 10.x, Mozilla Firefox 20.x, or Google Chrome 26.x. Information About Using The Web GUI A web browser, or graphical user interface (GUI), is built into each switch. You can use either the service port interface or the management interface to access the GUI. We recommend that you use the service-port interface. Click Help at the top of any page in the GUI to display online help. You might need to disable your browser's pop-up blocker to view the online help. Web GUI Features The switch web GUI supports the following: The Configuration Wizard--After initial configuration of the IP address and the local username/password or auth via the authentication server (privilege 15 needed), the wizard provides a method to complete the initial wireless configuration. Start the wizard through Configuration -> Wizard and follow the nine-step process to configure the following: · Admin Users · SNMP System Summary · Management Port Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 11 Connecting the Console Port of the Switch Using the Web Graphical User Interface · Wireless Management · RF Mobility and Country code · Mobility configuration · WLANs · 802.11 Configuration · Set Time The Monitor tab: · Displays summary details of switch, clients, and access points. · Displays all radio and AP join statistics. · Displays air quality on access points. · Displays list of all Cisco Discovery Protocol (CDP) neighbors on all interfaces and the CDP traffic information. · Displays all rogue access points based on their classification-friendly, malicious, ad hoc, classified, and unclassified. The Configuration tab: · Enables you to configure the switch for all initial operation using the web Configuration Wizard. The wizard allows you to configure user details, management interface, and so on. · Enables you to configure the system, internal DHCP server, management, and mobility management parameters. · Enables you to configure the switch, WLAN, and radios. · Enables you to configure and set security policies on your switch. · Enables you to access the switch operating system software management commands. The Administration tab enables you to configure system logs. Connecting the Console Port of the Switch Before you begin Before you can configure the switch for basic operations, you need to connect it to a PC that uses a VT-100 terminal emulation program (such as HyperTerminal, ProComm, Minicom, or Tip). Step 1 Step 2 Step 3 Connect one end of a null-modem serial cable to the switch's RJ-45 console port and the other end to your PC's serial port. Plug the AC power cord into the switch and a grounded 100 to 240 VAC, 50/60-Hz electrical outlet. Turn on the power supply. The bootup script displays operating system software initialization (code download and power-on self-test verification) and basic configuration. If the switch passes the power-on self-test, the bootup script runs the configuration wizard, which prompts you for basic configuration input. Enter yes. Proceed with basic initial setup configuration parameters in the CLI setup wizard. Specify the IP address for the service port which is the gigabitethernet 0/0 interface. After entering the configuration parameters in the configuration wizard, you can access the Web GUI. Now, the switch is configured with the IP address for service port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 12 Using the Web Graphical User Interface Logging On to the Web GUI Logging On to the Web GUI Enter the switch IP address in your browser's address bar. For a secure connection, enter https://ip-address. For a less secure connection, enter http://ip-address. Enabling Web and Secure Web Modes Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Switch > Management > Protocol Management > HTTP-HTTPS. The HTTP-HTTPS Configuration page appears. To enable web mode, which allows users to access the switch GUI using "http://ip-address," choose Enabled from the HTTP Access drop-down list. Otherwise, choose Disabled. Web mode (HTTP) is not a secure connection. To enable secure web mode, which allows users to access the switch GUI using "https://ip-address," choose Enabled from the HTTPS Access drop-down list. Otherwise, choose Disabled. Secure web mode (HTTPS) is a secure connection. Choose to track the device in the IP Device Tracking check box. Choose to enable the trust point in the Enable check box. Choose the trustpoints from the Trustpoints drop-down list. Enter the amount of time, in seconds, before the web session times out due to inactivity in the HTTP Timeout-policy (1 to 600 sec) text box. The valid range is from 1 to 600 seconds. Enter the server life time in the Server Life Time (1 to 86400 sec) text box. The valid range is from1 to 86400 seconds. Enter the maximum number of connection requests that the server can accept in the Maximum number of Requests (1 to 86400) text box. The valid range is from 1 to 86400 connections. Click Apply. Click Save Configuration. Configuring the Switch Web GUI The configuration wizard enables you to configure basic settings on the switch. You can run the wizard after you receive the switch from the factory or after the switch has been reset to factory defaults. The configuration wizard is available in both GUI and CLI formats. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 13 Configuring the Switch Web GUI Using the Web Graphical User Interface Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Connect your PC to the service port and configure an IPv4 address to use the same subnet as the switch. The switch is loaded with IOS XE image and the service port interface is configured as gigabitethernet 0/0. Start Internet Explorer 10 (or later), Firefox 2.0.0.11 (or later), or Google Chrome on your PC and enter the management interface IP address on the browser window. The management interface IP address is same as the gigabitethernet 0/0 (also known as service port interface). When you log in for the first time, you need to enter HTTP username and password. By default, the username is admin and the password is cisco. You can use both HTTP and HTTPS when using the service port interface. HTTPS is enabled by default and HTTP can also be enabled. When you log in for the first time, the Accessing Cisco Switch <Model Number> <Hostname> page appears. On the Accessing Cisco Switch page, click the Wireless Web GUI link to access switch web GUI Home page. Choose Configuration > Wizard to perform all steps that you need to configure the switch initially. The Admin Users page appears. On the Admin Users page, enter the administrative username to be assigned to this switch in the User Name text box and the administrative password to be assigned to this switch in the Password and Confirm Password text boxes. Click Next. The default username is admin and the default password is cisco. You can also create a new administrator user for the switch. You can enter up to 24 ASCII characters for username and password. The SNMP System Summary page appears. On the SNMP System Summary page, enter the following SNMP system parameters for the switch, and click Next: · Customer-definable switch location in the Location text box. · Customer-definable contact details such as phone number with names in the Contact text box. · Choose enabled to send SNMP notifications for various SNMP traps or disabled not to send SNMP notifications for various SNMP traps from the SNMP Global Trap drop-down list. · Choose enabled to send system log messages or disabled not to send system log messages from the SNMP Logging drop-down list. Note The SNMP trap server, must be reachable through the distribution ports (and not through the gigabitethernet0/0 service or management interface). The Management Port page appears. In the Management Port page, enter the following parameters for the management port interface (gigabitethernet 0/0) and click Next. · Interface IP address that you assigned for the service port in the IP Address text box. · Network mask address of the management port interface in the Netmask text box. · The IPv4 Dynamic Host Configuration Protocol (DHCP) address for the selected port in the IPv4 DHCP Server text box. The Wireless Management page appears. In the Wireless Management page, enter the following wireless interface management details, and click Next. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 14 Using the Web Graphical User Interface Configuring the Switch Web GUI Step 9 Step 10 · Choose the interface--VLAN, or Ten Gigabit Ethernet from the Select Interface drop-down list. · VLAN tag identifier, or 0 for no VLAN tag in the VLAN id text box. · IP address of wireless management interface where access points are connected in the IP Address text box. · Network mask address of the wireless management interface in the Netmask text box. · DHCP IPv4 IP address in the IPv4 DHCP Server text box. When selecting VLAN as interface, you can specify the ports as Trunk or Access ports from the selected list displayed in the Switch Port Configuration text box. The RF Mobility and Country Code page appears. In the RF Mobility and Country Code page, enter the RF mobility domain name in the RF Mobility text box, choose current country code from the Country Code drop-down list, and click Next. From the GUI, you can select only one country code. Note Before configuring RF grouping parameters and mobility configuration, ensure that you refer to the relevant conceptual content and then proceed with the configuration. The Mobility Configuration page with mobility global configuration settings appears. In the Mobility Configuration page, view and enter the following mobility global configuration settings, and click Next. · Choose Mobility Controller or Mobility Agent from the Mobility Role drop-down list: · If Mobility Agent is chosen, enter the mobility controller IP address in the Mobility Controller IP Address text box and mobility controller IP address in the Mobility Controller Public IP Address text box. · If Mobility Controller is chosen, then the mobility controller IP address and mobility controller public IP address are displayed in the respective text boxes. · Displays mobility protocol port number in the Mobility Protocol Port text box. · Displays the mobility switch peer group name in the Mobility Switch Peer Group Name text box. · Displays whether DTLS is enabled in the DTLS Mode text box. DTLS is a standards-track Internet Engineering Task Force (IETF) protocol based on TLS. · Displays mobility domain identifier for 802.11 radios in the Mobility Domain ID for 802.11 radios text box. · The amount of time (in seconds) between each ping request sent to an peer switch in the Mobility Keepalive Interval (1-30)sec text box. Valid range is from 1 to 30 seconds, and the default value is 10 seconds. · Number of times a ping request is sent to an peer switch before the peer is considered to be unreachable in the Mobility Keepalive Count (3-20) text box. The valid range is from 3 to 20, and the default value is 3. · The DSCP value that you can set for the mobility switch in the Mobility Control Message DSCP Value (0-63) text box. The valid range is 0 to 63, and the default value is 0. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 15 Configuring the Switch Web GUI Using the Web Graphical User Interface Step 11 Step 12 Step 13 Step 14 · Displays the number of mobility switch peer group member configured in the Switch Peer Group Members Configured text box. The WLANs page appears. In the WLANs page, enter the following WLAN configuration parameters, and click Next. · WLAN identifier in the WLAN ID text box. · SSID of the WLAN that the client is associated with in the SSID text box. · Name of the WLAN used by the client in the Profile Name text box. The 802.11 Configuration page appears. In the 802.11 Configuration page, check either one or both 802.11a/n/ac and 802.11b/g/n check boxes to enable the 802.11 radios, and click Next. The Set Time page appears. In the Set Time page, you can configure the time and date on the switch based on the following parameters, and click Next. · Displays current timestamp on the switch in the Current Time text box. · Choose either Manual or NTP from the Mode drop-down list. On using the NTP server, all access points connected to the switch, synchronizes its time based on the NTP server settings available. · Choose date on the switch from the Year, Month, and Day drop-down list. · Choose time from the Hours, Minutes, and Seconds drop-down list. · Enter the time zone in the Zone text box and select the off setting required when compared to the current time configured on the switch from the Offset drop-down list. The Save Wizard page appears. In the Save Wizard page, you can review the configuration settings performed on the switch using these steps, and if you wish to change any configuration value, click Previous and navigate to that page. You can save the switch configuration created using the wizard only if a success message is displayed for all the wizards. If the Save Wizard page displays errors, you must recreate the wizard for initial configuration of the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 16 I P A R T Cisco Flexible NetFlow · Configuring Flexible NetFlow, on page 19 3 C H A P T E R Configuring Flexible NetFlow · Finding Feature Information, on page 19 · Prerequisites for Flexible NetFlow, on page 19 · Restrictions for Flexible NetFlow, on page 20 · Information About NetFlow, on page 21 · How to Configure Flexible NetFlow, on page 31 · Monitoring Flexible NetFlow, on page 44 · Configuration Examples for Flexible NetFlow, on page 45 · Additional References, on page 48 · Feature Information for Flexible NetFlow, on page 49 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Flexible NetFlow The following are prerequisites for your Flexible NetFlow configuration: · You must configure a source interface. If you do not configure a source interface, the exporter will remain in a disabled state. · You must configure a valid record name for every flow monitor. Prerequisites for Wireless Flexible NetFlow The following are the prerequisites for wireless Flexible NetFlow: · Ensure that the networking device is running a Cisco release that supports wireless Flexible NetFlow. · Ensure that the target is connected to a WLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 19 Restrictions for Flexible NetFlow Cisco Flexible NetFlow · The networking device must be configured to support protocol types such as IP, IPv6, and datalink. · Valid flow record and monitor are required before generating the flow. Restrictions for Flexible NetFlow The following are restrictions for Flexible NetFlow: · Traditional NetFlow (TNF) accounting is not supported. · Flexible NetFlow v5 export format is not supported, only NetFlow v9 export format is supported. · Both ingress and egress NetFlow accounting is supported. · Microflow policing feature shares the NetFlow hardware resource with FNF. · Only one flow monitor per interface and per direction is supported. · Layer 2, IPv4, and IPv6 traffic types are supported; however, the switch can apply a flow monitor to only one of these types at a time for a given direction and interface. · Layer 2, VLAN, WLAN and Layer 3 interfaces are supported, but the switch does not support SVI and tunnels. · The following NetFlow table sizes are supported: Trim Level Ingress NetFlow Table Egress NetFlow Table LAN Base Not supported Not supported IP Base 8K 16 K IP Services 8K 16 K · Depending on the switch type, a switch will have one or two forwarding ASICs. The capacities listed in the above table are on a per-ASIC basis. · The switch can support either one or two ASICs. Each ASIC has 8K ingress and 16 K egress entries. · The NetFlow tables are on separate compartments and cannot be combined. Depending on which ASIC processed the packet, the flows will be created in the table in the corresponding ASIC. · Both full flow accounting and sampled NetFlow accounting are supported. · NetFlow hardware implementation supports four hardware samplers. You can select a sampler rate from 1 out of 2 to 1 out of 1024. Only random sampling mode is supported. · With the microflow policing feature (which is enabled only for wireless implementation), NetFlow can and should be used only in full flow mode i.e. NetFlow policing cannot be used. For wireless traffic, applying a sampler is not permitted, as it hinders microflow QoS. · Only full flow accounting is supported for wireless traffic. · NetFlow hardware uses hash tables internally. Hash collisions can occur in the hardware. Therefore, in spite of the internal overflow Content Addressable Memory (CAM), the actual NetFlow table utilization could be about 80 percent. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 20 Cisco Flexible NetFlow Information About NetFlow · Depending on what fields are used for the flow, a single flow could take two consecutive entries. IPv6 flows also take two entries. In these situations, the effective usage of NetFlow entries is half the table size, which is separate from the above hash collision limitation. · The switch supports up to 16 flow monitors. · Microflow policing uses a separate set of flow monitors (limit 3). · SSID-based NetFlow accounting is supported. SSID is treated in a manner similar to an interface. However, certain fields are not supported (such as AP MAC address and user ID ). · NetFlow v9 format NetFlow export is supported. · The NetFlow software implementation supports distributed NetFlow export, so the flows are exported from the same switch in which the flow was created. · Ingress flows are present in the ASIC that first received the packets for the flow. Egress flows are present in the ASIC from which the packets actually left the switch set up. · The reported value for the bytes count field (called "bytes long") is Layer-2-packet-size--18 bytes. For classic Ethernet traffic (802.3), this will be accurate. For all other Ethernet types, this field will not be accurate. Use the "bytes layer2" field, which always reports the accurate Layer 2 packet size. For information about supported Flexible NetFlow fields, see Supported Flexible NetFlow Fields, on page 27. Information About NetFlow NetFlow is a Cisco technology that provides statistics on packets flowing through the switch. NetFlow is the standard for acquiring IP operational data from IP networks. NetFlow provides data to enable network and security monitoring, network planning, traffic analysis, and IP accounting. Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis parameters for your specific requirements. Flexible NetFlow facilitates the creation of more complex configurations for traffic analysis and data export through the use of reusable configuration components. Flexible NetFlow Overview Flexible NetFlow uses flows to provide statistics for accounting, network monitoring, and network planning. A flow is a unidirectional stream of packets that arrives on a source interface and has the same values for the keys. A key is an identified value for a field within the packet. You create a flow using a flow record to define the unique keys for your flow. The switch supports the Flexible NetFlow feature that enables enhanced network anomalies and security detection. Flexible NetFlow allows you to define an optimal flow record for a particular application by selecting the keys from a large collection of predefined fields. All key values must match for the packet to count in a given flow. A flow might gather other fields of interest, depending on the export record version that you configure. Flows are stored in the Flexible NetFlow cache. You can export the data that Flexible NetFlow gathers for your flow by using an exporter and export this data to a remote Flexible NetFlow collector. You define the size of the data that you want to collect for a flow using a monitor. The monitor combines the flow record and exporter with the Flexible NetFlow cache information. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 21 Wireless Flexible NetFlow Overview Cisco Flexible NetFlow Wireless Flexible NetFlow Overview The wireless Flexible NetFlow infrastructure supports the following: · Flexible NetFlow Version 9.0 · User-based rate limiting · Microflow policing · Voice and video flow monitoring · Reflexive access control list (ACL) Microflow Policing and User-Based Rate Limiting Microflow policing associates a 2-color 1-rate policer and related drop statistics to each flow present in the NetFlow table. When the flow mask comprises all packet fields, this functionality is known as microflow policing. When the flow mask comprises either source or destination only, this functionality is known as user-based rate limiting. Voice and Video Flow Monitoring Voice and video flows are full flow mask-based entries. The ASIC provides the flexibility to program the policer parameters, share policers across multiple flows and rewrite the IP address and Layer 4 port numbers of these flows. Note For dynamic entries, the NetFlow engine will use the policer parameters that are derived for the flow based on the policy (ACL/QoS-based policies). Dynamic entries cannot share policer across multiple flows. Reflexive ACL Reflexive ACLs allow IP packets to be filtered based on upper-layer session information. The ACLs allow outbound traffic and limit inbound traffic in response to the sessions that originate inside the trusted network. The reflexive ACLs are transparent to the filtering mechanism until a data packet that matches the reflexive entry activates it. At this time, a temporary ACL entry is created and added to the IP-named access lists. The information obtained from the data packet to generate the reflexive ACL entry is permit/deny bit, the source IP address and port, the destination IP address, port, and the protocol type. During reflexive ACL entry evaluation, if the protocol type is either TCP or UDP, then the port information must match exactly. For other protocols, there is no port information to match. After this ACL is installed, the firewall is then opened for the reply packets to pass through. At this time, a potential hacker could have access to the network behind the firewall. To narrow this window, an idle timeout period can be defined. However, in the case of TCP, if two FIN bits or an RST is detected, the ACL entry can be removed. Related Topics Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction, on page 43 Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction), on page 46 Example: Configuring IPv6 and Transport Flag Flexible NetFlow in WLAN (Egress Direction), on page 46 Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions), on page 47 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 22 Cisco Flexible NetFlow Flow Records Flow Records A flow record defines the keys that Flexible NetFlow uses to identify packets in the flow, as well as other fields of interest that Flexible NetFlow gathers for the flow. You can define a flow record with any combination of keys and fields of interest. The switch supports a rich set of keys. A flow record also defines the types of counters gathered per flow. You can configure 64-bit packet or byte counters. The switch enables the following match fields as the defaults when you create a flow record: · match datalink--Layer 2 attributes · match flow--Flow identifying attributes · match interface--Interface attributes · match ipv4--IPv4 attributes · match ipv6--IPv6 attributes · match transport--Transport layer fields Related Topics Creating a Flow Record, on page 32 Flexible NetFlow Match Parameters The following table describes Flexible NetFlow match parameters. You must configure at least one of the following match parameters for the flow records. Table 4: Match Parameters Command Purpose match datalink {dot1q | ethertype | mac | vlan } Specifies a match to datalink or Layer 2 fields. The following command options are available: · dot1q--Matches to the dot1q field. · ethertype--Matches to the ethertype of the packet. · mac--Matches the source or destination MAC fields. · vlan--Matches to the VLAN that the packet is located on (input or output). match flow direction match interface {input | output} Specifies a match to the flow identifying fields. Specifies a match to the interface fields. The following command options are available: · input--Matches to the input interface. · output--Matches to the output interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 23 Flexible NetFlow Collect Parameters Cisco Flexible NetFlow Command Purpose match ipv4 {destination | protocol | source | tos | ttl | version} Specifies a match to the IPv4 fields. The following command options are available: · destination--Matches to the IPv4 destination address-based fields. · protocol--Matches to the IPv4 protocols. · source--Matches to the IPv4 source address based fields. · tos--Matches to the IPv4 Type of Service fields. · ttl--Matches to the IPv4 Time To Live fields. · version--Matches to the IP version from the IPv4 header. match ipv6 {destination | hop-limit | protocol | source | traffic-class | version } Specifies a match to the IPv6 fields. The following command options are available: · destination--Matches to the IPv6 destination address-based fields. · hop-limit--Matches to the IPv6 hop limit fields. · protocol--Matches to the IPv6 payload protocol fields. · source--Matches to the IPv6 source address based fields. · traffic-class--Matches to the IPv6 traffic class. · version--Matches to the IP version from the IPv6 header. match transport {destination-port | igmp | icmp | Specifies a match to the Transport Layer fields. The source-port} following command options are available: · destination-port--Matches to the transport destination port. · icmp--Matches to ICMP fields, including ICMP IPv4 and IPv6 fields. · igmp--Matches to IGMP fields. · source-port--Matches to the transport source port. Flexible NetFlow Collect Parameters The following table describes the Flexible NetFlow collect parameters. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 24 Cisco Flexible NetFlow Exporters Table 5: Collect Parameters Command Purpose collect counter { bytes { layer2 { long } | long } | Collects the counter fields total bytes and total packets { long } } packets. collect interface {input | output} Collects the fields from the input or output interface. collect timestamp absolute {first | last} Collects the fields for the absolute time the first packet was seen or the absolute time the most recent packet was last seen (in milliseconds). collect transport tcp flags Collects the following transport TCP flags: · ack--TCP acknowledgement flag · cwr--TCP congestion window reduced flag · ece--TCP ECN echo flag · fin--TCP finish flag · psh--TCP push flag · rst--TCP reset flag · syn--TCP synchronize flag · urg--TCP urgent flag Note On the switch, you cannot specify which TCP flag to collect. You can only specify to collect transport TCP flags. All TCP flags will be collected with this command. Exporters An exporter contains network layer and transport layer details for the Flexible NetFlow export packet. The following table lists the configuration options for an exporter. Table 6: Flexible NetFlow Exporter Configuration Options Exporter Configuration default description destination dscp exit Description Sets a command to its default values. Provides a description for the flow exporter. Export destination. Optional DSCP value. Exits from the flow exporter configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 25 Export Formats Cisco Flexible NetFlow Exporter Configuration export-protocol no option source template transport ttl Description Export protocol version. Negates the command or its default. Selects option for exporting. Originating interface for the net flow. Flow exporter template configuration. Transport protocol. Optional TTL or hop limit. The switch exports data to the collector whenever a timeout occurs or when the flow is terminated (TCP Fin or Rst received, for example). You can configure the following timers to force a flow export: · Active timeout--The flow continues to have the packets for the past m seconds since the flow was created. · Inactive timeout--The flow does not have any packets for the past n seconds. Related Topics Creating a Flow Exporter, on page 33 Export Formats The switch supports only NetFlow Version 9 export formats. NetFlow Version 9 export format provides the following features and functionality: · Variable field specification format · Support for IPv4 destination address export · More efficient network utilization Note For information about the Version 9 export format, see RFC 3954. Monitors A monitor references the flow record and flow exporter. You apply a monitor to an interface on the switch. Note the following when applying a flow monitor to an interface: · If you apply a flow monitor in the input direction: · Use the match keyword and use the input interface as a key field. · Use the collect keyword and use the output interface as a collect field. This field will be present in the exported records but with a value of 0. · If you apply a flow monitor in the output direction: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 26 Cisco Flexible NetFlow Samplers · Use the match keyword and use the output interface as a key field. · Use the collect keyword and use the input interface as a collect field. This field will be present in the exported records but with a value of 0. Related Topics Creating a Flow Monitor, on page 36 Samplers If you are using sampled mode, you use the sampler to specify the rate at which packets are sampled. Related Topics Creating a Sampler, on page 37 Supported Flexible NetFlow Fields The following tables provide a consolidated list of supported fields in Flexible NetFlow (FNF) for various traffic types and traffic direction. Note If the packet has a VLAN field, then that length is not accounted for. Field Layer 2 Layer 2 In Out Key or Collect Fields Interface Yes -- input IPv4 In IP v4 Out IPv6 In IPv6 Out Notes Yes -- Yes -- If you apply a flow monitor in the input direction: · Use the match keyword and use the input interface as a key field. · Use the collect keyword and use the output interface as a collect field. This field will be present in the exported records but with a value of 0. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 27 Supported Flexible NetFlow Fields Cisco Flexible NetFlow Field Layer 2 Layer 2 In Out Interface -- Yes output IPv4 In IP v4 Out IPv6 In IPv6 Out Notes -- Yes -- Yes If you apply a flow monitor in the output direction: · Use the match keyword and use the output interface as a key field. · Use the collect keyword and use the input interface as a collect field. This field will be present in the exported records but with a value of 0. Field Layer 2 In Layer 2 Out IPv4 In Key Fields Flow Yes Yes Yes direction Ethertype Yes Yes -- VLAN Yes -- Yes input VLAN -- output Yes -- dot1q Yes -- Yes VLAN input dot1q -- VLAN output Yes -- dot1q Yes Yes Yes priority MAC Yes Yes Yes source address input IP v4 Out IPv6 In Yes Yes -- -- -- Yes Yes -- -- Yes Yes -- Yes Yes Yes Yes IPv6 Out Notes Yes -- -- Supported only for a switch port. Yes Supported only for a switch port. -- Supported only for a switch port. Yes Supported only for a switch port. Yes Supported only for a switch port. Yes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 28 Cisco Flexible NetFlow Supported Flexible NetFlow Fields Field Layer 2 In Layer 2 Out IPv4 In MAC -- -- -- source address output MAC Yes -- Yes destination address input MAC -- destination address output Yes -- IPv4 -- -- Yes version IPv4 TOS -- -- Yes IPv4 -- -- Yes protocol IPv4 TTL -- -- Yes IPv4 source -- -- Yes address IPv4 -- -- Yes destination address ICMP IPv4 -- -- Yes type ICMP IPv4 -- -- Yes code IGMP type -- -- Yes Field Layer 2 In Layer 2 Out IPv4 In Key Fields continued IP v4 Out -- IPv6 In -- -- Yes Yes -- Yes Yes Yes Yes Yes Yes Yes Yes Yes -- Yes -- Yes -- Yes -- Yes -- IP v4 Out IPv6 In IPv6 Out -- Notes -- Yes Yes Yes Yes Must use if any of src/dest port, ICMP code/type, IGMP type or TCP flags are used. Yes -- -- -- -- -- IPv6 Out Notes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 29 Supported Flexible NetFlow Fields Cisco Flexible NetFlow Field IPv6 version IPv6 protocol Layer 2 In Layer 2 Out IPv4 In -- -- Yes -- -- Yes IPv6 source -- -- -- address IPv6 -- -- -- destination address IPv6 -- -- Yes traffic-class IPv6 -- -- Yes hop-limit ICMP IPv6 -- -- -- type ICMP IPv6 -- -- -- code source-port -- -- Yes dest-port -- -- Yes Field Collect Fields Layer 2 In Layer 2 Out IPv4 In IP v4 Out Yes IPv6 In Yes Yes Yes -- Yes -- Yes Yes Yes Yes Yes -- Yes -- Yes Yes Yes Yes Yes IP v4 Out IPv6 In IPv6 Out Yes Yes Yes Notes Same as IP version. Same as IP protocol. Must use if any of src/dest port, ICMP code/type, IGMP type or TCP flags are used. Yes Yes Same as IP TOS. Yes Same as IP TTL. Yes Yes Yes Yes IPv6 Out Notes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 30 Cisco Flexible NetFlow Default Settings Field Layer 2 In Layer 2 Out IPv4 In Bytes long Yes Yes Yes Packets Yes Yes Yes long Timestamp Yes Yes Yes absolute first Timestamp Yes Yes Yes absolute last TCP flags Yes Yes Yes Bytes Yes Yes Yes layer2 long IP v4 Out Yes IPv6 In Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes IPv6 Out Yes Yes Notes Packet size = (Ethernet frame size including FCS - 18 bytes) Recommended: Avoid this field and use Bytes layer2 long. Yes Yes Yes Collects all flags. Yes Default Settings The following table lists the Flexible NetFlow default settings for the switch. Table 7: Default Flexible NetFlow Settings Setting Flow active timeout Flow timeout inactive Default 1800 seconds 15 seconds How to Configure Flexible NetFlow To configure Flexible NetFlow, follow these general steps: 1. Create a flow record by specifying keys and non-key fields to the flow. 2. Create an optional flow exporter by specifying the protocol and transport destination port, destination, and other parameters. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 31 Creating a Flow Record Cisco Flexible NetFlow 3. Create a flow monitor based on the flow record and flow exporter. 4. Create an optional sampler. 5. Apply the flow monitor to a Layer 2 port, Layer 3 port, or VLAN. 6. If applicable to your configuration, configure a WLAN to apply a flow monitor to. Creating a Flow Record You can create a flow record and add keys to match on and fields to collect in the flow. SUMMARY STEPS 1. configure terminal 2. flow record name 3. description string 4. match type 5. collect type 6. end 7. show flow record [name record-name] 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 flow record name Example: Switch(config)# flow record test Switch(config-flow-record)# Creates a flow record and enters flow record configuration mode. Step 3 description string Example: (Optional) Describes this flow record as a maximum 63-character string. Switch(config-flow-record)# description Ipv4Flow Step 4 match type Example: Switch(config-flow-record)# match ipv4 source address Specifies a match key. For information about possible match key values, see Flexible NetFlow Match Parameters, on page 23. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 32 Cisco Flexible NetFlow Creating a Flow Exporter Command or Action Purpose Switch(config-flow-record)# match ipv4 destination address Switch(config-flow-record)# match flow direction Step 5 collect type Example: Specifies the collection field. For information about possible collection field values, see Flexible NetFlow Collect Parameters, on page 24. Switch(config-flow-record)# collect counter bytes layer2 long Switch(config-flow-record)# collect counter bytes long Switch(config-flow-record)# collect timestamp absolute first Switch(config-flow-record)# collect transport tcp flags Step 6 end Example: Switch(config-flow-record)# end Returns to privileged EXEC mode. Step 7 show flow record [name record-name] Example: Switch show flow record test (Optional) Displays information about NetFlow flow records. Step 8 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. What to do next Define an optional flow exporter by specifying the export format, protocol, destination, and other parameters. Related Topics Flow Records, on page 23 Creating a Flow Exporter You can create a flow export to define the export parameters for a flow. SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 33 Creating a Flow Exporter Cisco Flexible NetFlow 2. flow exporter name 3. description string 4. dscp value 5. destination { ipv4-address } 6. source { source type } 7. transport udp number 8. end 9. show flow exporter [name record-name] 10. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 flow exporter name Example: Switch(config)# flow exporter ExportTest Switch (config-flow-exporter)# Creates a flow exporter and enters flow exporter configuration mode. Step 3 description string Example: (Optional) Describes this flow record as a maximum 63-character string. Switch(config-flow-exporter)# description ExportV9 Step 4 dscp value Example: Switch(config-flow-exporter)# dscp 0 (Optional) Specifies the differentiated services codepoint value. The range is from 0 to 63. Step 5 destination { ipv4-address } Example: Switch(config-flow-exporter)# destination 192.0.2.1 Sets the destination IPv4 address or hostname for this exporter. Step 6 source { source type } Example: Switch(config-flow-exporter)# source (Optional) Specifies the interface to use to reach the NetFlow collector at the configured destination. The following interfaces can be configured as source: · Auto Template--Auto-Template interface Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 34 Cisco Flexible NetFlow Creating a Flow Exporter Step 7 Step 8 Step 9 Step 10 Command or Action gigabitEthernet1/0/1 Purpose · Capwap--CAPWAP tunnel interface · GigabitEthernet--Gigabit Ethernet IEEE 802 · GroupVI--Group virtual interface · Internal Interface--Internal interface · Loopback--Loopback interface · Null--Null interface · Port-channel--Ethernet Channel of interface · TenGigabitEthernet--10-Gigabit Ethernet · Tunnel--Tunnel interface · Vlan--Catalyst VLANs transport udp number Example: (Optional) Specifies the UDP port to use to reach the NetFlow collector. The range is from 0 to 65535. Switch(config-flow-exporter)# transport udp 200 end Example: Switch(config-flow-record)# end Returns to privileged EXEC mode. show flow exporter [name record-name] Example: Switch show flow exporter ExportTest (Optional) Displays information about NetFlow flow exporters. copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. What to do next Define a flow monitor based on the flow record and flow exporter. Related Topics Exporters, on page 25 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 35 Creating a Flow Monitor Cisco Flexible NetFlow Creating a Flow Monitor You can create a flow monitor and associate it with a flow record and a flow exporter. SUMMARY STEPS 1. configure terminal 2. flow monitor name 3. description string 4. exporter name 5. record name 6. cache { timeout {active | inactive} seconds | type normal } 7. end 8. show flow monitor [name record-name] 9. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 flow monitor name Example: Switch(config)# flow monitor MonitorTest Switch (config-flow-monitor)# Creates a flow monitor and enters flow monitor configuration mode. Step 3 description string Example: Switch(config-flow-monitor)# description Ipv4Monitor (Optional) Describes this flow record as a maximum 63-character string. Step 4 exporter name Example: Associates a flow exporter with this flow monitor. Switch(config-flow-monitor)# exporter ExportTest Step 5 record name Example: Associates a flow record with the specified flow monitor. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 36 Cisco Flexible NetFlow Creating a Sampler Command or Action Switch(config-flow-monitor)# record test Purpose Step 6 cache { timeout {active | inactive} seconds | type normal Associates a flow cache with the specified flow monitor. } Example: Switch(config-flow-monitor)# cache timeout active 15000 Step 7 end Example: Switch(config-flow-monitor)# end Returns to privileged EXEC mode. Step 8 show flow monitor [name record-name] Example: Switch show flow monitor name MonitorTest (Optional) Displays information about NetFlow flow monitors. Step 9 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. What to do next Apply the flow monitor to a Layer 2 interface, Layer 3 interface, or VLAN. Related Topics Monitors, on page 26 Creating a Sampler You can create a sampler to define the NetFlow sampling rate for a flow. SUMMARY STEPS 1. configure terminal 2. sampler name 3. description string 4. mode {random} 5. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 37 Creating a Sampler Cisco Flexible NetFlow 6. show sampler [name] 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 sampler name Example: Switch(config)# sampler SampleTest Switch(config-flow-sampler)# Creates a sampler and enters flow sampler configuration mode. Step 3 description string Example: (Optional) Describes this flow record as a maximum 63-character string. Switch(config-flow-sampler)# description samples Step 4 mode {random} Defines the random sample mode. Example: Switch(config-flow-sampler)# mode random 1 out-of 1024 Step 5 end Example: Switch(config-flow-sampler)# end Returns to privileged EXEC mode. Step 6 show sampler [name] Example: Switch show sample SampleTest (Optional) Displays information about NetFlow samplers. Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 38 Cisco Flexible NetFlow Applying a Flow to an Interface What to do next Apply the flow monitor to a source interface, subinterface, VLAN interface, or a VLAN. Related Topics Samplers, on page 27 Applying a Flow to an Interface You can apply a flow monitor and an optional sampler to an interface. SUMMARY STEPS 1. configure terminal 2. interface type 3. {ip flow monitor | ipv6 flow monitor}name [sampler name] { input |output } 4. end 5. show flow interface [interface-type number] 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface type Example: Switch(config)# interface GigabitEthernet1/0/1 Switch(config-if)# Enters interface configuration mode and configures an interface. Command parameters for the interface configuration include: · Auto-- Auto-Template interface · Capwap--CAPWAP tunnel interface · GigabitEthernet--GigabitEthernet IEEE 802 · GroupVI--Group Virtual interface · Internal Interface--Internal Interface · Loopback--Loopback interface · Null--Null interface · Port-channel--Ethernet channel of interface · TenGigabitEthernet--10- Gigabit Ethernet · Tunnel--Tunnel interface Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 39 Configuring a Bridged NetFlow on a VLAN Cisco Flexible NetFlow Step 3 Command or Action Purpose · Vlan--Catalyst VLANs · Range--Interface range {ip flow monitor | ipv6 flow monitor}name [sampler name] { input |output } Example: Associate an IPv4 or an IPv6 flow monitor, and an optional sampler to the interface for input or output packets. Switch(config-if)# ip flow monitor MonitorTest input Step 4 end Example: Switch(config-flow-monitor)# end Returns to privileged EXEC mode. Step 5 show flow interface [interface-type number] Example: Switch# show flow interface (Optional) Displays information about NetFlow on an interface. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring a Bridged NetFlow on a VLAN You can apply a flow monitor and an optional sampler to a VLAN. SUMMARY STEPS 1. configure terminal 2. vlan [configuration] vlan-id 3. ip flow monitor name [sampler name] {input |output} 4. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 40 Cisco Flexible NetFlow Configuring Layer 2 NetFlow Command or Action Switch# configure terminal Purpose Step 2 vlan [configuration] vlan-id Example: Switch(config)# vlan configuration 30 Switch(config-vlan-config)# Enters VLAN or VLAN configuration mode. Step 3 ip flow monitor name [sampler name] {input |output} Associates a flow monitor and an optional sampler to the Example: VLAN for input or output packets. Switch(config-vlan-config)# ip flow monitor MonitorTest input Step 4 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring Layer 2 NetFlow You can define Layer 2 keys in Flexible NetFlow records that you can use to capture flows in Layer 2 interfaces. SUMMARY STEPS 1. configure terminal 2. flow record name 3. match datalink {dot1q |ethertype | mac | vlan} 4. end 5. show flow record [name ] 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 flow record name Enters flow record configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 41 Configuring WLAN to Apply Flow Monitor in Data Link Input/Output Direction Cisco Flexible NetFlow Command or Action Example: Switch(config)# flow record L2_record Switch(config-flow-record)# Step 3 match datalink {dot1q |ethertype | mac | vlan} Example: Switch(config-flow-record)# match datalink ethertype Step 4 end Example: Switch(config-flow-record)# end Step 5 show flow record [name ] Example: Switch# show flow record Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Specifies the Layer 2 attribute as a key. Returns to privileged EXEC mode. (Optional) Displays information about NetFlow on an interface. (Optional) Saves your entries in the configuration file. Configuring WLAN to Apply Flow Monitor in Data Link Input/Output Direction SUMMARY STEPS 1. configure terminal 2. wlan wlan-name 3. datalink flow monitor monitor-name {input | output} 4. end 5. show wlan wlan-name DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 42 Cisco Flexible NetFlow Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction Step 2 Step 3 Step 4 Step 5 Command or Action wlan wlan-name Example: Purpose Enters WLAN configuration submode. For wlan-name, enter the profile name. The range is 1 to 32 characters. Switch (config) # wlan mywlan datalink flow monitor monitor-name {input | output} Applies flow monitor to Layer 2 traffic in the direction of Example: interest. Switch (config-wlan) # datalink flow monitor flow-monitor-1 {input | output} end Example: Returns to privileged EXEC mode. Switch (config) # end show wlan wlan-name Example: (Optional) Verifies your configuration. Switch # show wlan mywlan Example Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction SUMMARY STEPS 1. configure terminal 2. wlan wlan-id 3. {ip | ipv6} flow monitor monitor-name {input | output} 4. end 5. show wlan wlan-name DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 43 Monitoring Flexible NetFlow Cisco Flexible NetFlow Step 2 Step 3 Step 4 Step 5 Command or Action wlan wlan-id Example: Purpose Enters WLAN configuration submode. For wlan-id, enter the WLAN ID. The range is 1 to 64. Switch (config) # wlan 1 {ip | ipv6} flow monitor monitor-name {input | output} Associates a flow monitor to the WLAN for input or output Example: packets. Switch (config-wlan) # ip flow monitor flow-monitor-1 input end Example: Returns to privileged EXEC mode. Switch (config) # end show wlan wlan-name Example: (Optional) Verifies your configuration. Switch # show wlan mywlan Example Related Topics Wireless Flexible NetFlow Overview, on page 22 Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction), on page 46 Example: Configuring IPv6 and Transport Flag Flexible NetFlow in WLAN (Egress Direction), on page 46 Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions), on page 47 Monitoring Flexible NetFlow The commands in the following table can be used to monitor Flexible NetFlow. Table 8: Flexible NetFlow Monitoring Commands Command Purpose show flow exporter [broker | export-ids | name | Displays information about NetFlow flow exporters name | statistics | templates] and statistics. show flow exporter [ name exporter-name] Displays information about NetFlow flow exporters and statistics. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 44 Cisco Flexible NetFlow Configuration Examples for Flexible NetFlow Command Purpose show flow interface Displays information about NetFlow interfaces. show flow monitor [ name exporter-name] Displays information about NetFlow flow monitors and statistics. show flow monitor statistics Displays the statistics for the flow monitor show flow monitor cache format {table | record | Displays the contents of the cache for the flow csv} monitor, in the format specified. show flow record [ name record-name] Displays information about NetFlow flow records. show flow ssid Displays NetFlow monitor installation status for a WLAN. show sampler [broker | name | name] Displays information about NetFlow samplers. show wlan wlan-name Displays the WLAN configured on the device. Configuration Examples for Flexible NetFlow Example: Configuring a Flow This example shows how to create a flow and apply it to an interface: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# flow export export1 Switch(config-flow-exporter)# destination 10.0.101.254 Switch(config-flow-exporter)# transport udp 2055 Switch(config-flow-exporter)# exit Switch(config)# flow record record1 Switch(config-flow-record)# match ipv4 source address Switch(config-flow-record)# match ipv4 destination address Switch(config-flow-record)# match ipv4 protocol Switch(config-flow-record)# match transport source-port Switch(config-flow-record)# match transport destination-port Switch(config-flow-record)# collect counter byte long Switch(config-flow-record)# collect counter packet long Switch(config-flow-record)# collect timestamp absolute first Switch(config-flow-record)# collect timestamp absolute last Switch(config-flow-record)# exit Switch(config)# flow monitor monitor1 Switch(config-flow-monitor)# record record1 Switch(config-flow-monitor)# exporter export1 Switch(config-flow-monitor)# exit Switch(config)# interface tenGigabitEthernet 1/0/1 Switch(config-if)# ip flow monitor monitor1 input Switch(config-if)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 45 Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction) Cisco Flexible NetFlow Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction) The following example shows how to configure IPv4 Flexible NetFlow on WLAN ingress direction: Switch# configure terminal Switch(config)# flow record fr_v4 Switch(config-flow-record)# match ipv4 destination address Switch(config-flow-record)# match ipv4 source address Switch(config-flow-record)# match ipv4 protocol Switch(config-flow-record)# match ipv4 tos Switch(config-flow-record)# match ipv4 ttl Switch(config-flow-record)# match ipv4 version Switch(config-flow-record)# match wireless ssid Switch(config-flow-record)# collect wireless ap mac address Switch(config-flow-record)# collect counter packets long Switch(config-flow-record)# collect counter bytes long Switch(config-flow-record)# collect timestamp absolute first Switch(config-flow-record)# collect timestamp absolute last Switch(config-flow-record)# exit Switch(config)# flow monitor fm_v4 Switch(config-flow-monitor)# record fr_v4 Switch(config-flow-record)# exit Switch(config)# wlan 1 Switch(config-wlan)# ip flow monitor fm_v4 in Switch(config-wlan)# end Switch# show flow monitor fm_v4 cache Related Topics Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction, on page 43 Wireless Flexible NetFlow Overview, on page 22 Example: Configuring IPv6 and Transport Flag Flexible NetFlow in WLAN (Egress Direction) The following example shows how to configure IPv6 and transport flag Flexible NetFlow on WLAN egress direction: Switch# configure terminal Switch(config)# flow record fr_v6 Switch(config-flow-record)# match ipv6 destination address Switch(config-flow-record)# match ipv6 source address Switch(config-flow-record)# match ipv6 hop-limit Switch(config-flow-record)# match ipv6 protocol Switch(config-flow-record)# match ipv6 traffic Switch(config-flow-record)# match ipv6 version Switch(config-flow-record)# match wireless ssid Switch(config-flow-record)# collect wireless ap mac address Switch(config-flow-record)# collect counter bytes long Switch(config-flow-record)# collect transport tcp flags Switch(config-flow-record)# exit Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 46 Cisco Flexible NetFlow Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions) Switch(config)# flow monitor fm_v6 Switch(config-flow-monitor)# record fr_v6 Switch(config-flow-monitor)# exit Switch(config)# wlan 1 Switch(config-wlan)# ipv6 flow monitor fm_v6 out Switch(config-wlan)# end Switch# show flow monitor fm_v6 cache Note On the switch, you cannot specify which TCP flag to collect. You can only specify to collect transport TCP flags. Related Topics Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction, on page 43 Wireless Flexible NetFlow Overview, on page 22 Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions) The following example shows how to configure IPv6 Flexible NetFlow on WLAN in both directions: Switch# configure terminal Switch (config)# flow record fr_v6 Switch (config-flow-record)# match ipv6 destination address Switch (config-flow-record)# match ipv6 source address Switch (config-flow-record)# match ipv6 hop-limit Switch (config-flow-record)# match ipv6 protocol Switch (config-flow-record)# match ipv6 traffic Switch (config-flow-record)# match ipv6 version Switch (config-flow-record)# match wireless ssid Switch (config-flow-record)# collect wireless ap mac address Switch (config-flow-record)# collect counter packets long Switch (config-flow-record)# exit Switch (config)# flow monitor fm_v6 Switch (config-flow-monitor)# record fr_v6 Switch (config-flow-monitor)# exit Switch (config)# wlan 1 Switch (config-wlan)# ipv6 flow monitor fm_v6 in Switch (config-wlan)# ipv6 flow monitor fm_v6 out Switch (config-wlan)# end Switch# show flow monitor fm_v6 cache Related Topics Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction, on page 43 Wireless Flexible NetFlow Overview, on page 22 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 47 Additional References Cisco Flexible NetFlow Additional References Related Documents Related Topic Platform-independent command references Platform-independent configuration information Flexible NetFlow CLI Commands Document Title Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Cisco Flexible NetFlow Command Reference (Catalyst 3650 Switches) Flexible NetFlow Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title RFC 3954 Cisco Systems NetFlow Services Export Version 9 MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 48 Cisco Flexible NetFlow Feature Information for Flexible NetFlow Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for Flexible NetFlow Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 49 Feature Information for Flexible NetFlow Cisco Flexible NetFlow Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 50 I I P A R T CleanAir · Configuring Cisco CleanAir, on page 53 4 C H A P T E R Configuring Cisco CleanAir · Finding Feature Information, on page 53 · Prerequisites for CleanAir, on page 53 · Restrictions for CleanAir, on page 54 · Information About CleanAir, on page 55 · How to Configure CleanAir, on page 60 · Configuring Cisco CleanAir using the Controller GUI, on page 68 · Configuring Cisco Spectrum Expert, on page 70 · Monitoring CleanAir Parameters, on page 73 · Configuration Examples for Configuring CleanAir, on page 77 · CleanAir FAQs, on page 78 · Additional References, on page 80 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for CleanAir You can configure Cisco CleanAir only on CleanAir-enabled access points. Only Cisco CleanAir-enabled access points using the following access point modes can perform Cisco CleanAir spectrum monitoring: · Local--In this mode, each Cisco CleanAir-enabled access point radio provides air quality and interference detection reports for the current operating channel only. · Monitor--When Cisco CleanAir is enabled in monitor mode, the access point provides air quality and interference detection reports for all monitored channels. The following options are available: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 53 Restrictions for CleanAir CleanAir · All-- All channels · DCA--Channel selection governed by the DCA list · Country--All channel legal within a regulatory domain Note The access point does not participate in AQ HeatMap in Prime Infrastructure. · SE-Connect--This mode enables a user to connect a Spectrum Expert application running on an external Microsoft Windows XP or Vista PC to a Cisco CleanAir-enabled access point in order to display and analyze detailed spectrum data. The Spectrum Expert application connects directly to the access point, bypassing the switch. An access point in SE-Connect mode does not provide any Wi-Fi, RF, or spectrum data to the switch. All CleanAir system functionality is suspended while the AP is in this mode, and no clients are served. This mode is intended for remote troubleshooting only. Up to three active Spectrum Expert connections are possible. Related Topics Enabling CleanAir for 2.4-GHz Band, on page 60 Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices, on page 60 Configuring Interference Reporting for 2.4-GHz Devices, on page 62 Enabling CleanAir for 5-GHz Band, on page 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices, on page 64 Configuring Interference Reporting for 5-GHz devices, on page 65 Restrictions for CleanAir · Access points in monitor mode do not transmit Wi-Fi traffic or 802.11 packets. They are excluded from radio resource management (RRM) planning and are not included in the neighbor access point list. IDR clustering depends on the switch's ability to detect neighboring in-network access points. Correlating interference device detections from multiple access points is limited between monitor-mode access points. · Cisco recommends a ratio of 1 monitor mode access point for every 5 local mode access points, this may also vary based on the network design and expert guidance for best coverage. · Spectrum Expert (Windows XP laptop client) and AP should be pingable, otherwise; it will not work. Related Topics Enabling CleanAir for 2.4-GHz Band, on page 60 Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices, on page 60 Configuring Interference Reporting for 2.4-GHz Devices, on page 62 Enabling CleanAir for 5-GHz Band, on page 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices, on page 64 Configuring Interference Reporting for 5-GHz devices, on page 65 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 54 CleanAir Information About CleanAir Information About CleanAir Cisco CleanAir is a spectrum intelligence solution designed to proactively manage the challenges of a shared wireless spectrum. All of the users of the shared spectrum can be seen (both native devices and foreign interferers). It also enables the network to act upon this information. For example, the interfering device can be manually removed or the system can automatically change the channel away from the interference. A Cisco CleanAir system consists of CleanAir-enabled access points, wireless controller modules, mobility controllers, mobility anchors and next generation switches. The access points join the mobility controller directly or through the mobility anchor. They collect information about all devices that operate in the industrial, scientific, and medical (ISM) bands, identify and evaluate the information as a potential interference source, and forward it to the switch. The switch controls the access points, collects spectrum data, and forwards information to Cisco Prime Infrastructure (PI) or a Cisco Mobility Services Engine (MSE) upon request. Any networking configurations can be performed only on the mobility controller, configurations cannot be performed in the MA mode. However, any radio level CleanAir configurations can be done using mobility anchor. For every device operating in the unlicensed band, Cisco CleanAir tells what it is, where it is, how it is impacting the wireless network, and what actions should be taken. It simplifies RF. Wireless LAN systems operate in unlicensed 2.4-GHz and 5-GHz ISM bands. Many devices like microwave ovens, cordless phones, and Bluetooth devices also operate in these bands and can negatively affect the Wi-Fi operations. Some of the most advanced WLAN services, such as voice over wireless and IEEE 802.11n radio communications, could be significantly impaired by the interference caused by other legal users of the ISM bands. The integration of Cisco CleanAir functionality addresses this problem of radio frequency (RF) interference. Cisco CleanAir Components The basic Cisco CleanAir architecture consists of Cisco CleanAir-enabled APs and switch. Cisco Prime Infrastructure (PI), Mobility Services Engine (MSE) and Cisco Spectrum Expert are optional system components. Cisco PI and MSE provide user interfaces for advanced spectrum capabilities such as historic charts, tracking interference devices, location services and impact analysis. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 55 Cisco CleanAir Components Figure 1: Cisco CleanAir Solution CleanAir An access point equipped with Cisco CleanAir technology collects information about non-Wi-Fi interference sources, processes it, and forwards it to the MA. The access point sends AQR and IDR reports to the controller. The mobility controller (MC) controls and configures CleanAir-capable access points, collects and processes spectrum data, and provides it to the PI and/or the MSE. The MC provides local user interfaces (GUI and CLI) to configure basic CleanAir features and services and display current spectrum information. The MC also does detection, merging and mitigation of interference devices using RRM TPC and DCM. For details on Interference Device Merging, see Interference Device Merging, on page 58. Cisco PI provides advanced user interfaces for CleanAir that include feature enabling and configuration, consolidated display information, historic AQ records and reporting engines. PI also shows charts of interference devices, AQ trends, and alerts. Cisco MSE is required for location and historic tracking of interference devices, and provides coordination and consolidation of interference reports across multiple controllers. MSE also provides adaptive Wireless Intrusion Prevention System (WIPS) service that provides comprehensive over-the-air threat detection, location and mitigation. MSE also merges all the interference data. To obtain detailed spectrum data that can be used to generate RF analysis plots similar to those provided by a spectrum analyzer, you can configure a Cisco CleanAir-enabled access point to connect directly to a Microsoft Windows XP or Vista PC running the Cisco Spectrum Expert application. The switch performs the following tasks in a Cisco CleanAir system: · Configures Cisco CleanAir capabilities on the access point. · Provides interfaces (GUI, CLI, and SNMP) for configuring Cisco CleanAir features and retrieving data. · Displays spectrum data. · Collects and processes AQRs from the access point and stores them in the air quality database. AQRs contains information about the total interference from all identified sources represented by Air Quality Index (AQI) and summary for the most severe interference categories. The CleanAir system can also Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 56 CleanAir Terms Used in Cisco CleanAir include unclassified interference information under per interference type reports which enable you to take action in cases where the interference due to unclassified interfering devices is frequent. · Collects and processes Interference Device Reports (IDRs) from the access point and stores them in the interference device database. · Forwards spectrum data to Prime Infrastructure and the MSE. Terms Used in Cisco CleanAir Table 9: CleanAir-related Terms Term AQI AQR DC EDRRM IDR ISI MA MC RSSI Decription Air Quality Index. The AQI is an indicator of air quality, based on the air pollutants. An AQI of 0 is bad and an AQI > 85 is good. Air Quality Report. AQRs contain information about the total interference from all identified sources represented by AQI and summary of the most severe interference categories. AQRs are sent every 15 minutes to the Mobility Controller and every 30 seconds in the Rapid mode. Duty Cycle. Percentage of time that the channel is utilized by a device. EDRRM Event Driven RRM. EDRRM allows an access point in distress to bypass normal RRM intervals and immediately change channels. Interference Device Reports that the access point sends to the controller. Interference Severity Index. The ISI is an indicator of the severity of the interference. Mobility Agent. An MA is either an access switch that has a wireless module running on it or an MC with an internal MA running on it. An MA is the wireless component that maintains client mobility state machine for a mobile client that is connected to an access point to the device that the MA is running on. Mobility Controller. An MC provides mobility management services for inter-peer group roaming events. The MC provides a central point of contact for management and sends the configuration to all the mobility agents under its sub-domain of their mobility configuration, peer group membership and list of members. Received Signal Strength Indicator. RSSI is a measurement of the power present in a received radio signal. It is the power at which an access point sees the interferer device. Interference Types that Cisco CleanAir can Detect Cisco CleanAir can detect interference, report on the location and severity of the interference, and recommend different mitigation strategies. Two such mitigation strategies are persistent device avoidance and spectrum event-driven RRM. New Wi-Fi chip-based RF management systems share these characteristics: · Any RF energy that cannot be identified as a Wi-Fi signal is reported as noise. · Noise measurements that are used to assign a channel plan tend to be averaged over a period of time to avoid instability or rapid changes that can be disruptive to certain client devices. · Averaging measurements reduces the resolution of the measurement. As such, a signal that disrupts clients might not look like it needs to be mitigated after averaging. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 57 Interference Device Merging CleanAir · All RF management systems available today are reactive in nature. Cisco CleanAir is different and can positively identify not only the source of the noise but also its location and potential impact to a WLAN. Having this information allows you to consider the noise within the context of the network and make intelligent and, where possible, proactive decisions. For CleanAir, two types of interference events are common: · Persistent interference · Spontaneous interference Persistent interference events are created by devices that are stationary in nature and have intermittent but largely repeatable patterns of interference. For example, consider the case of a microwave oven located in a break room. Such a device might be active for only 1 or 2 minutes at a time. When operating, however, it can be disruptive to the performance of the wireless network and associated clients. Using Cisco CleanAir, you can positively identify the device as a microwave oven rather than indiscriminate noise. You can also determine exactly which part of the band is affected by the device, and because you can locate it, you can understand which access points are most severely affected. You can then use this information to direct RRM in selecting a channel plan that avoids this source of interference for the access points within its range. Because this interference is not active for a large portion of the day, existing RF management applications might attempt to again change the channels of the affected access points. Persistent device avoidance is unique, however, in that it remains in effect as long as the source of interference is periodically detected to refresh the persistent status. The Cisco CleanAir system knows that the microwave oven exists and includes it in all future planning. If you move either the microwave oven or the surrounding access points, the algorithm updates RRM automatically. Note Spectrum event-driven RRM can be triggered only by Cisco CleanAir-enabled access points in local mode. Spontaneous interference is interference that appears suddenly on a network, perhaps jamming a channel or a range of channels completely. The Cisco CleanAir spectrum event-driven RRM feature allows you to set a threshold for air quality (AQ) that, if exceeded, triggers an immediate channel change for the affected access point. Most RF management systems can avoid interference, but this information takes time to propagate through the system. Cisco CleanAir relies on AQ measurements to continuously evaluate the spectrum and can trigger a move within 30 seconds. For example, if an access point detects interference from a video camera, it can recover by changing channels within 30 seconds of the camera becoming active. Cisco CleanAir also identifies and locates the source of interference so that more permanent mitigation of the device can be performed at a later time. In the case of Bluetooth devices, Cisco CleanAir-enabled access points can detect and report interference only if the devices are actively transmitting. Bluetooth devices have extensive power save modes. For example, interference can be detected when data or voice is being streamed between the connected devices. Interference Device Merging The Interference Devices (ID) messages are processed on a Mobility Controller (MC). The Mobility Anchor (MA) forwards the ID messages from APs and hence they are processed on the MC. The MC has visibility of the neighbor information across APs connected to different MAs. ID merging logic requires AP neighbor information. Neighbor information is obtained from the RRM module. This api only gives neighbor information to the APs directly connected to MC. Currently the AP neighbor list on MA is synced to MC once every 3 minutes; hence the AP neighbor list obtained by this api could be at most 3 mins old. This delay results in delay in merging of Devices as they Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 58 CleanAir Persistent Devices are discovered. The subsequent periodic merge will pick up the updated neighbor information and merge is performed Persistent Devices Some interference devices such as outdoor bridges and Microwave Ovens only transmit when needed. These devices can cause significant interference to the local WLAN due to short duration and periodic operation remain largely undetected by normal RF management metrics. With CleanAir the RRM DCA algorithm can detect, measure, register and remember the impact and adjust the DCA algorithm. This minimizes the use of channels affected by the persistent devices in the channel plan local to the interference source. Cisco CleanAir detects and stores the persistent device information in the switch and this information is used to mitigate interfering channels. Persistent Devices Detection CleanAir-capable Monitor Mode access point collects information about persistent devices on all configured channels and store the information in controller. Local/Bridge mode AP detects interference devices on the serving channels only. Persistent Device Avoidance When a Persistent Device (PD) is detected in the CleanAir module, it is reported to the RRM module on the MA. This information is used in the channel selection by the subsequent EDRRM Event Driven RRM (ED-RRM) signal sent to the RRM module. EDRRM and AQR Update Mode EDRRM is a feature that allows an access point that is in distress to bypass normal RRM intervals and immediately change channels. A CleanAir access point always monitors AQ and reports the AQ every 15 minutes. AQ only reports classified interference devices. The key benefit of EDRRM is very fast action time. If an interfering device is operating on an active channel and causes enough AQ degradation to trigger an EDRRM, then no clients will be able to use that channel or the access point. You must remove the access point from the channel. EDRRM is not enabled by default, you must first enable CleanAir and then enable EDRRM. AQRs are only available on the MC. The mode configuration and timers are held in Radio Control Block (RCB) on MA (for APs connected to MA). There is no change to the current API available for EMS/NMS. No change is required for directly connected APs as RCB (spectrum config and timers) is available locally. For remote APs (APs connected to MA), three new control messages are added. These three messages are for enable, restart timer and disable rapid update mode for a given AP MAC address and slot. Related Topics Configuring EDRRM for CleanAir-Events, on page 67 CleanAir High Availability CleanAir configuration (network and radio) is stateful during the switchover. On the MC, Embedded Instrumentation Core (EICORE) provides the sync on network configurations across active and standby nodes. The radio configurations are synced using the HA Infrastructre. The CleanAir configurations on MA are pulled from the MC upon joining. The network configuration is not stored in the EICORE on MA, hence it is synced using HA Infrastructure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 59 How to Configure CleanAir CleanAir CleanAir Data (AQ and IDR) reports are not stateful, that is, the standby and active nodes are not synced. On switchover, the APs send the reports to the current active slot. The RRM Client (HA Infra Client) is used for CleanAir HA sync. How to Configure CleanAir Enabling CleanAir for 2.4-GHz Band SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz cleanair 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 24ghz cleanair Example: Step 3 Switch(config)#ap dot11 24ghz cleanair Switch(config)#no ap dot11 24ghz cleanair end Example: Switch(config)# end Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78 Purpose Enters global configuration mode. Enables the CleanAir feature on 802.11b network. Add no in the command to disable CleanAir on the 802.11b network. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz cleanair alarm air-quality threshold threshold_value Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 60 CleanAir Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices 3. ap dot11 24ghz cleanair alarm device {bt-discovery | bt-link | canopy | cont-tx | dect-like | fh | inv | jammer | mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee } 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 24ghz cleanair alarm air-quality threshold threshold_value Example: Purpose Enters global configuration mode. Configures the alarm for the threshold value for air-quality for all the 2.4-GHz devices. Add the no form of this command to disable the alarm. Step 3 Switch(config)#ap dot11 24ghz cleanair alarm air-quality threshold 50 ap dot11 24ghz cleanair alarm device {bt-discovery | Configures the alarm for the 2.4-GHz devices. Add the no bt-link | canopy | cont-tx | dect-like | fh | inv | jammer | form command to disable the alarm. mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee } · bt-discovery--Bluetooth Discovery. Example: · bt-link--Bluetooth Link. Switch(config)#ap dot11 24ghz cleanair alarm device canopy · canopy--Canopy devices. · cont-tx--Continuous Transmitter. · dect-like--Digital Enhanced Cordless Communication (DECT)-like phone. · fh--802.11 frequency hopping devices. · inv--Devices using spectrally inverted WiFi signals. · jammer--Jammer. · mw-oven--Microwave oven. · nonstd--Devices using non standard Wi-Fi channels. · report--Interference device reporting. · superag--802.11 SuperAG devices. · tdd-tx--TDD Transmitter. · video--Video cameras. · wimax-fixed--WiMax Fixed. · wimax-mobile--WiMax Mobile. · xbox--Xbox. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 61 Configuring Interference Reporting for 2.4-GHz Devices CleanAir Step 4 Command or Action end Example: Switch(config)# end Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78 Purpose · zigbee--802.15.4 devices. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Interference Reporting for 2.4-GHz Devices SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz cleanair device{bt-discovery | bt-link | canopy | cont-tx | dect-like | fh | inv | jammer | mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee } 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz cleanair device{bt-discovery | bt-link | Configures the 2.4 GHz interference devices to report to canopy | cont-tx | dect-like | fh | inv | jammer | mw-oven the switch. Use the no form of this command to disable the | nonstd | report | superag | tdd-tx | video | wimax-fixed configuration. | wimax-mobile | xbox | zigbee } · bt-discovery--Bluetooth Discovery Example: · bt-link--Bluetooth Link Switch(config)# ap dot11 24ghz cleanair device bt-discovery Switch(config)# ap dot11 24ghz cleanair device bt-link Switch(config)# ap dot11 24ghz cleanair device canopy Switch(config)# ap dot11 24ghz cleanair device cont-tx Switch(config)# ap dot11 24ghz cleanair device dect-like · canopy--Canopy devices · cont-tx- Continuous Transmitter · dect-like- Digital Enhanced Cordless Communication (DECT) like phone · fh- 802.11 frequency hopping devices · inv- Devices using spectrally inverted WiFi signals · jammer- Jammer · mw-oven- Microwave Oven Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 62 CleanAir Enabling CleanAir for 5-GHz Band Step 3 Command or Action Purpose Switch(config)# ap dot11 24ghz cleanair device fh · nonstd- Devices using non-standard WiFi channels Switch(config)# ap dot11 24ghz cleanair device inv · report- no description Switch(config)# ap dot11 24ghz cleanair device jammer Switch(config)# ap dot11 24ghz cleanair device mw-oven · superag- 802.11 SuperAG devices · tdd-tx- TDD Transmitter · video- Video cameras Switch(config)# ap dot11 24ghz cleanair device nonstd Switch(config)# ap dot11 24ghz cleanair device report · wimax-fixed- WiMax Fixed · wimax-mobile- WiMax Mobile · xbox- Xbox Switch(config)# ap dot11 24ghz cleanair device superag · zigbee- 802.15.4 devices Switch(config)# ap dot11 24ghz cleanair device tdd-tx Switch(config)# ap dot11 24ghz cleanair device video Switch(config)# ap dot11 24ghz cleanair device wimax-fixed Switch(config)# ap dot11 24ghz cleanair device wimax-mobile Switch(config)# ap dot11 24ghz cleanair device xbox Switch(config)# ap dot11 24ghz cleanair device zigbee end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78 Monitoring the Interference Devices (GUI), on page 76 Enabling CleanAir for 5-GHz Band SUMMARY STEPS 1. configure terminal 2. ap dot11 5ghz cleanair 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices CleanAir DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 5ghz cleanair Example: Switch(config)#ap dot11 5ghz cleanair Switch(config)#no ap dot11 5ghz cleanair Step 3 end Example: Switch(config)# end Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78 Purpose Enters global configuration mode. Enables the CleanAir feature on 802.11a network. Add no in the command to disable CleanAir on the 802.11a network. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices SUMMARY STEPS 1. configure terminal 2. ap dot11 5ghz cleanair alarm air-quality threshold threshold_value 3. ap dot11 5ghz cleanair alarm device{canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile} 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 5ghz cleanair alarm air-quality threshold threshold_value Example: Purpose Enters global configuration mode. Configures the alarm for the threshold value for air-quality for all the 5-GHz devices. Add the No form of the command to disable the alarm. Switch(config)#ap dot11 5ghz cleanair alarm air-quality threshold 50 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 64 CleanAir Configuring Interference Reporting for 5-GHz devices Step 3 Step 4 Command or Action Purpose ap dot11 5ghz cleanair alarm device{canopy | cont-tx | Configures the alarm for the 5-GHz devices. Add the no dect-like | inv | jammer | nonstd | radar | report | superag form of the command to disable the alarm. | tdd-tx | video | wimax-fixed | wimax-mobile} · canopy--Canopy devices. Example: · cont-tx--Continuous Transmitter. Switch(config)#ap dot11 5ghz cleanair alarm device · dect-like--Digital Enhanced Cordless Communication (DECT) like phone. · fh--802.11 frequency hopping devices. · inv--Devices using spectrally inverted WiFi signals. · jammer--Jammer. · nonstd--Devices using non-standard WiFi channels. · radar--Radars. · report--Interference device reporting. · superag--802.11 SuperAG devices. · tdd-tx--TDD Transmitter. · video--Video cameras. · wimax-fixed--WiMax Fixed. · wimax-mobile--WiMax Mobile. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78 Configuring Interference Reporting for 5-GHz devices SUMMARY STEPS 1. configure terminal 2. ap dot11 5ghz cleanair device{canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile} 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 65 Configuring Interference Reporting for 5-GHz devices CleanAir DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 5ghz cleanair device{canopy | cont-tx | dect-like Configures the 5-GHz interference devices to report to the | inv | jammer | nonstd | radar | report | superag | tdd-tx switch. Add the no form of the command to disable | video | wimax-fixed | wimax-mobile} interference device reporting. Example: · canopy--Canopy devices Switch(config)#ap dot11 5ghz cleanair device canopy Switch(config)#ap dot11 5ghz cleanair device cont-tx Switch(config)#ap dot11 5ghz cleanair device dect-like Switch(config)#ap dot11 5ghz cleanair device inv Switch(config)#ap dot11 5ghz cleanair device jammer Switch(config)#ap dot11 5ghz cleanair device nonstd Switch(config)#ap dot11 5ghz cleanair device radar Switch(config)#ap dot11 5ghz cleanair device report Switch(config)#ap dot11 5ghz cleanair device superag Switch(config)#ap dot11 5ghz cleanair device tdd-tx Switch(config)#ap dot11 5ghz cleanair device video Switch(config)#ap dot11 5ghz cleanair device wimax-fixed · cont-tx--Continuous Transmitter · dect-like--Digital Enhanced Cordless Communication (DECT) like phone · fh--802.11 frequency hopping devices · inv--Devices using spectrally inverted WiFi signals · jammer--Jammer · nonstd--Devices using non-standard WiFi channels · radar--Radars · report--Interference device reporting · superag--802.11 SuperAG devices · tdd-tx--TDD Transmitter · video--Video cameras · wimax-fixed--WiMax Fixed · wimax-mobile--WiMax Mobile Switch(config)#ap dot11 5ghz cleanair device wimax-mobile Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78 Monitoring the Interference Devices (GUI), on page 76 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 66 CleanAir Configuring EDRRM for CleanAir-Events Configuring EDRRM for CleanAir-Events SUMMARY STEPS 1. configure terminal 2. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event 3. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event [sensitivity {high | low | medium}] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz} rrm channel cleanair-event Enables EDRRM cleanair-event. Add the no form of the Example: command to disable EDRRM. Step 3 Switch(config)#ap dot11 24ghz rrm channel cleanair-event Switch(config)#no ap dot11 24ghz rrm channel cleanair-event ap dot11 {24ghz | 5ghz} rrm channel cleanair-event Configures the EDRRM sensitivity of cleanair-event. [sensitivity {high | low | medium}] · High--Specifies the most sensitivity to non WiFi Example: interference as indicated by the air quality (AQ) value. Switch(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high · Low--Specifies the least sensitivity to non WiFi interference as indicated by the AQ value. · Medium--Specifies medium sensitivity to non WiFi interference as indicated by the AQ value. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics EDRRM and AQR Update Mode, on page 59 Configuring Persistent Device Avoidance SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 67 Configuring Cisco CleanAir using the Controller GUI CleanAir 2. ap dot11 {24ghz | 5ghz} rrm channel device 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz} rrm channel device Example: Enables the persistent non WiFi device avoidance in the 802.11 channel assignment. Add the no form of the command to disable the persistent device avoidance. Switch(config)#ap dot11 24ghz rrm channel device Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Cisco CleanAir using the Controller GUI Configuring Cisco CleanAir on the Cisco Wireless LAN Controller (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > 802.11a/n or 802.11b/g/n > CleanAir to open the 802.11a (or 802.11b) > CleanAir page. Select the CleanAir check box to enable Cisco CleanAir functionality on the 802.11a/n or 802.11b/g/n network, or unselect it to prevent the switch from detecting spectrum interference. By default, the Cisco CleanAir is disabled. Select the Report Interferers check box to enable the Cisco CleanAir system to report any detected sources of interference, or unselect it to prevent the switch from reporting interferers. The default value is selected. Note Device Security alarms, Event Driven RRM, and the Persistence Device Avoidance algorithm do not work if Report Interferers are disabled. Select the Persistent Device Propagation check box to enable propagation of information about persistent devices that can be detected by CleanAir. Persistent device propagation enables you to propagate information about persistent devices to the neighboring access points connected to the same switch. Persistent interferers are present at the location and interfere with the WLAN operations even if they are not detectable at all times. Ensure that any sources of interference that need to be detected and reported by the Cisco CleanAir system appear in the Interferences to Detect box and any that do not need to be detected appear in the Interferences to Ignore box. Use the > and < buttons to move interference sources between these two boxes. By default, all interference sources are detected. The sources of interference that you can choose depend on the type of radio, 802.11a/n/ac or 802.11b/g/n, and are as follows: · 802.11 FH--A 802.11 FH device Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 68 CleanAir Configuring Cisco CleanAir on the Cisco Wireless LAN Controller (GUI) Step 6 Step 7 Step 8 · 802.15.4--A 802.15.4 or ZigBee device · Continuous Transmitter--A continuous transmitter · Bluetooth Discovery--A Bluetooth device · DECT-like Phone--A digital enhanced cordless communication (DECT)-compatible phone · Microsoft--A Microsoft device · SuperAG--A 802.11a/g SuperAG device · Microwave Phone--A microwave phone · Jammer--A jamming device · Canopy--A canopy bridge device · TDD Transmitter--A time division duplex (TDD) transmitter device · Video Camera--An analog video camera · WiFi Invalid Channel--A WiFi invalid channel · WiFi Inverted--A device using spectrally inverted Wi-Fi signals (I and Q signals of the RF signal are inverted) · WiMAX Fixed--A WiMAX fixed device (802.11a/n only) · WiMAX Mobile--A WiMAX mobile device (802.11a/n only) Note Access points that are associated to the switch send interference reports only for the interferers that appear in the Interferences to Detect box. This functionality allows you to filter out interferers that you do not want as well as any that may be flooding the network and causing performance problems for the switch or Prime Infrastructure. Filtering allows the system to resume normal performance levels. Configure Cisco CleanAir alarms as follows: a) Select the Enable AQI (Air Quality Index) Trap check box to enable the triggering of air quality alarms, or unselect the box to disable this feature. The default value is selected. b) If you selected the Enable AQI Trap check box in Step a, enter a value between 1 and 100 (inclusive) in the AQI Alarm Threshold text box to specify the threshold at which you want the air quality alarm to be triggered. When the air quality falls below the threshold level, the alarm is triggered. A value of 1 represents the worst air quality, and 100 represents the best. The default value is 35. c) Enter the AQI threshold in the AQI Alarm Threshold text box. An alarm is generated when the air quality reaches a threshold value. The default is 35. The range is from 1 and 100. d) Select the Enable Interference For Security Alarm check box to trigger interferer alarms when the switch detects specified device types, or unselect it to disable this feature. The default value is selected e) Make sure that any sources of interference that need to trigger interferer alarms appear in the Trap on These Types box and any that do not need to trigger interferer alarms appear in the Do Not Trap on These Types box. Use the > and < buttons to move interference sources between these two boxes. By default, all interference sources trigger interferer alarms. For example, if you want the switch to send an alarm when it detects a jamming device, select the Enable Interference For Security Alarm check box and move the jamming device to the Trap on These Types box. Click Apply. Trigger spectrum event-driven radio resource management (RRM) to run when a Cisco CleanAir-enabled access point detects a significant level of interference as follows: a) Look at the EDRRM field to see the current status of spectrum event-driven RRM and, if enabled, the Sensitivity Threshold field to see the threshold level at which event-driven RRM is invoked. b) If you want to change the current status of event-driven RRM or the sensitivity level, go to the 802.11a (or 802.11b) > RRM > Dynamic Channel Assignment (DCA) page. c) Select the EDRRM check box to trigger RRM to run when an access point detects a certain level of interference, or unselect it to disable this feature. The default value is selected. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 69 Configuring Cisco CleanAir on an Access Point (GUI) CleanAir Step 9 d) If you selected the EDRRM check box in Step c, choose Low, Medium, High , or Custom from the Sensitivity Threshold drop-down list to specify the threshold at which you want RRM to be triggered. When the interference for the access point rises above the threshold level, RRM initiates a local dynamic channel assignment (DCA) run and changes the channel of the affected access point radio if possible to improve network performance. EDRRM prevents the access point from returning to the original channel for three hours after the event. High--Represents an increased sensitivity to changes in the environment. Custom--Allows you to set a threshold value in the Custom Sensitivity Threshold field. The default sensitivity is 35. Low--Represents a decreased sensitivity to changes in the environment. The EDRRM AQ threshold value for low sensitivity is 35, medium sensitivity is 50, and high sensitivity is 60. e) Click Apply. Click Save Configuration. Configuring Cisco CleanAir on an Access Point (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points > Radios > 802.11a/n or 802.11b/g/n to open the 802.11a/n (or 802.11b/g/n) Radios page. Select the check box adjacent to the desired access point and click Configure. The 802.11a/n (or 802.11b/g/n) Radios page appears. The CleanAir Capable field shows whether this access point can support CleanAir functionality. If it can, go to the next step to enable or disable CleanAir for this access point. If the access point cannot support CleanAir functionality, you cannot enable CleanAir for this access point. Note By default, the Cisco CleanAir functionality is enabled on the radios. Enable Cisco CleanAir functionality for this access point by choosing Enable from the CleanAir Admin Status drop-down list. To disable CleanAir functionality for this access point, choose Disable. The default value is Enable. This setting overrides the global CleanAir configuration for this access point. Click Apply. Click Save Configuration. Configuring Cisco Spectrum Expert Configuring Spectrum Expert (GUI) Before you begin · Spectrum Expert (Windows XP laptop client) and access point should be pingable, otherwise; it will not work. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 70 CleanAir Configuring Spectrum Expert (GUI) · Prior to establishing a connection between the Spectrum Expert console and the access point, make sure that IP address routing is properly configured and the network spectrum interface (NSI) ports are open in any intervening firewalls. · The access point must be a TCP server listening on ports 37540 for 2.4 GHz and 37550 for 5 GHz frequencies. These ports must be opened for the spectrum expert application to connect to the access point using the NSI protocol. · You can view the NSI key from the switch CLI by using the show ap name ap_name config dot11 {24ghz | 5ghz} command. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Ensure that Cisco CleanAir functionality is enabled for the access point that will be connected to the Spectrum Expert console. Note The SE-Connect mode is set for the entire access point, not just a single radio. However, the Spectrum Expert console connects to a single radio at a time. Choose Configuration > Wireless > Access Points > All APs to open the All APs page. Click the name of the desired access point to open the All APs > Details page. Choose SE-Connect from the AP Mode drop-down list. This mode is available only for access points that are capable of supporting Cisco CleanAir functionality. For the SE-Connect mode to appear as an available option, the access point must have at least one spectrum-capable radio in the Enable state. Click Apply to commit your changes. Click OK when prompted to reboot the access point. On the Windows PC, access the Cisco Software Center from this URL: http://www.cisco.com/cisco/software/navigator.html Click Product > Wireless > Cisco Spectrum Intelligence > Cisco Spectrum Expert > Cisco Spectrum Expert Wi-Fi, and then download the Spectrum Expert 4.1.11 executable (*.exe) file. Run the Spectrum Expert application on the PC. When the Connect to Sensor dialog box appears, enter the IP address of the access point, choose the access point radio, and enter the 16-byte network spectrum interface (NSI) key to authenticate. The Spectrum Expert application opens a TCP/IP connection directly to the access point using the NSI protocol. When an access point in SE-Connect mode joins a switch, it sends a Spectrum Capabilities notification message, and the switch responds with a Spectrum Configuration Request. The request contains the 16-byte random NSI key generated by the switch for NSI authentication. The switch generates one key per access point, which the access point stores until it is rebooted. Note You can establish up to three Spectrum Expert console connections per access point radio. Verify that the Spectrum Expert console is connected to the access point by selecting the Slave Remote Sensor text box in the bottom right corner of the Spectrum Expert application. If the two devices are connected, the IP address of the access point appears in this text box. Use the Spectrum Expert application to view and analyze spectrum data from the access point. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 71 Configuring Spectrum Expert (CLI) CleanAir Configuring Spectrum Expert (CLI) Before you begin · Spectrum Expert (Windows XP laptop client) and access point should be pingable, otherwise; it will not work. · Prior to establishing a connection between the Spectrum Expert console and the access point, make sure that IP address routing is properly configured and the network spectrum interface (NSI) ports are open in any intervening firewalls. · The access point must be a TCP server listening on ports 37540 for 2.4-GHz and 37550 for 5-GHz frequencies. These ports must be opened for the spectrum expert application to connect to the access point using the NSI protocol. · You can view the NSI key from the switch CLI by using the show ap name ap_name config dot11 {24ghz | 5ghz} command. Step 1 Step 2 Step 3 To configure the access point for SE-Connect mode, enter this command: ap name ap_name mode se-connect Example: Switch#ap name Cisco_AP3500 mode se-connect When prompted to reboot the access point, enter Y. To view the NSI key for the access point, enter this command: show ap name ap_name config dot11 {24ghz | 5ghz} Example: Switch#show ap name Cisco_AP3500 config dot11 24ghz <snippet> CleanAir Management Information CleanAir Capable CleanAir Management Admin State CleanAir Management Operation State CleanAir NSI Key CleanAir Sensor State : Yes : Enabled : Up : 274F1F9B1A5206683FAF57D87BFFBC9B : Configured <snippet> What to do next On the Windows PC, download Cisco Spectrum Expert: · Access the Cisco Software Center from this URL: http://www.cisco.com/cisco/software/navigator.html · Click Product > Wireless > Cisco Spectrum Intelligence > Cisco Spectrum Expert > Cisco Spectrum Expert Wi-Fi, and then download the Spectrum Expert 4.1.11 executable (*.exe) file. · Run the Spectrum Expert application on the PC. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 72 CleanAir Monitoring CleanAir Parameters · When the Connect to Sensor dialog box appears, enter the IP address of the access point, choose the access point radio, and enter the 16-byte network spectrum interface (NSI) key to authenticate. The Spectrum Expert application opens a TCP/IP connection directly to the access point using the NSI protocol. When an access point in SE-Connect mode joins a switch, it sends a Spectrum Capabilities notification message, and the switch responds with a Spectrum Configuration Request. The request contains the 16-byte random NSI key generated by the switch for use in NSI authentication. The switch generates one key per access point, which the access point stores until it is rebooted. Note You can establish up to three Spectrum Expert console connections per access point radio. · Verify that the Spectrum Expert console is connected to the access point by selecting the Slave Remote Sensor text box in the bottom right corner of the Spectrum Expert application. If the two devices are connected, the IP address of the access point appears in this text box. · Use the Spectrum Expert application to view and analyze spectrum data from the access point. Monitoring CleanAir Parameters You can monitor CleanAir parameters using the following commands: Table 10: Commands for Monitoring CleanAir Commands Description show ap dot11 24ghz cleanair air-quality summary Displays CleanAir Air Quality (AQ) data for 2.4-GHz band show ap dot11 24ghz cleanair air-quality worst Displays CleanAir Air Quality (AQ) worst data for 2.4-GHz band show ap dot11 24ghz cleanair config Displays CleanAir Configuration for 2.4-GHz band show ap dot11 24ghz cleanair device type all Displays all CleanAir Interferers for 2.4-GHz band show ap dot11 24ghz cleanair device type bt-discovery Displays CleanAir Interferers of type BT Discovery for 2.4-GHz band show ap dot11 24ghz cleanair device type bt-link Displays CleanAir Interferers of type BT Link for 2.4-GHz band show ap dot11 24ghz cleanair device type canopy Displays CleanAir Interferers of type Canopy for 2.4-GHz band show ap dot11 24ghz cleanair device type cont-tx Displays CleanAir Interferers of type Continuous transmitter for 2.4-GHz band show ap dot11 24ghz cleanair device type dect-like Displays CleanAir Interferers of type DECT Like for 2.4-GHz band Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 73 Monitoring CleanAir Parameters CleanAir Commands show ap dot11 24ghz cleanair device type fh Description Displays CleanAir Interferers of type 802.11FH for 2.4-GHz band show ap dot11 24ghz cleanair device type inv Displays CleanAir Interferers of type WiFi Inverted for 2.4-GHz band show ap dot11 24ghz cleanair device type jammer Displays CleanAir Interferers of type Jammer for 2.4-GHz band show ap dot11 24ghz cleanair device type mw-oven Displays CleanAir Interferers of type MW Oven for 2.4-GHz band show ap dot11 24ghz cleanair device type nonstd Displays CleanAir Interferers of type WiFi Inv. Ch for 2.4-GHz band show ap dot11 24ghz cleanair device type persistent Displays CleanAir Interferers of type Persistent for 2.4-GHz band show ap dot11 24ghz cleanair device type superag Displays CleanAir Interferers of type SuperAG for 2.4-GHz band show ap dot11 24ghz cleanair device type tdd-tx Displays CleanAir Interferers of type TDD Transmit for 2.4-GHz band show ap dot11 24ghz cleanair device type video Displays CleanAir Interferers of type Video Camera for 2.4-GHz band show ap dot11 24ghz cleanair device type wimax-fixed Displays CleanAir Interferers of type WiMax Fixed for 2.4-GHz band show ap dot11 24ghz cleanair device type wimax-mobile Displays CleanAir Interferers of type WiMax Mobile for 2.4-GHz band show ap dot11 24ghz cleanair device type xbox Displays CleanAir Interferers of type Xbox for 2.4-GHz band show ap dot11 24ghz cleanair device type zigbee Displays CleanAir Interferers of type zigbee for 2.4-GHz band show ap dot11 5ghz cleanair air-quality summary Displays CleanAir Air Quality (AQ) data for 5-GHz band show ap dot11 5ghz cleanair air-quality worst Displays CleanAir Air Quality (AQ) worst data for 5-GHz band show ap dot11 5ghz cleanair config Displays CleanAir Configuration for 5-GHz band show ap dot11 5ghz cleanair device type all Displays all CleanAir Interferers for 5-GHz band show ap dot11 5ghz cleanair device type canopy Displays CleanAir Interferers of type Canopy for 5-GHz band show ap dot11 5ghz cleanair device type cont-tx Displays CleanAir Interferers of type Continuous TX for 5-GHz band Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 74 CleanAir Monitoring CleanAir Parameters Commands Description show ap dot11 5ghz cleanair device type dect-like Displays CleanAir Interferers of type DECT Like for 5-GHz band show ap dot11 5ghz cleanair device type inv Displays CleanAir Interferers of type WiFi Inverted for 5-GHz band show ap dot11 5ghz cleanair device type jammer Displays CleanAir Interferers of type Jammer for 5-GHz band show ap dot11 5ghz cleanair device type nonstd Displays CleanAir Interferers of type WiFi Inv. Ch for 5-GHz band show ap dot11 5ghz cleanair device type persistent Displays CleanAir Interferers of type Persistent for 5-GHz band show ap dot11 5ghz cleanair device type superag Displays CleanAir Interferers of type SuperAG for 5-GHz band show ap dot11 5ghz cleanair device type tdd-tx Displays CleanAir Interferers of type TDD Transmit for 5-GHz band show ap dot11 5ghz cleanair device type video Displays CleanAir Interferers of type Video Camera for 5-GHz band show ap dot11 5ghz cleanair device type wimax-fixed Displays CleanAir Interferers of type WiMax Fixed for 5-GHz band show ap dot11 5ghz cleanair device type wimax-mobile Displays CleanAir Interferers of type WiMax Mobile for 5-GHz band You can also check the CleanAir status of the access points using the switch GUI: Choose Monitor > Wireless > Access Points > 802.11 a/n/acor 802.11 b/g/n. The Radios page is displayed showing a list of access points that are associated with the switch. You can see the CleanAir Admin and CleanAir Status. The Cisco CleanAir status is one of the following: · UP--The spectrum sensor for the access point radio is currently operational (error code 0). · DOWN--The spectrum sensor for the access point radio is currently not operational because an error has occurred. The most likely reason for the error is that the access point radio is disabled (error code 8). To correct this error, enable the radio. · ERROR--The spectrum sensor for the access point radio has crashed (error code 128), making CleanAir monitoring nonoperational for this radio. If this error occurs, reboot the access point. If the error continues to appear, you might want to disable Cisco CleanAir functionality on the radio. · N/A--This access point radio is not capable of supporting Cisco CleanAir functionality. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 75 Monitoring the Interference Devices CleanAir Monitoring the Interference Devices When a CleanAir-enabled access point detects interference devices, detections of the same device from multiple sensors are merged together to create clusters. Each cluster is given a unique ID. Some devices conserve power by limiting the transmit time until actually needed which results in the spectrum sensor to temporarily stop detecting the device. This device is then correctly marked as down. A down device is correctly removed from the spectrum database. In cases when all the interferer detections for a specific devices are reported, the cluster ID is kept alive for an extended period of time to prevent possible device detection bouncing. If the same device is detected again, it is merged with the original cluster ID and the device detection history is preserved. For example, some bluetooth headsets operate on battery power. These devices employ methods to reduce power consumption, such as turning off the transmitter when not actually needed. Such devices can appear to come and go from the classification. To manage these devices, CleanAir keeps the cluster IDs longer and they are remerged into a single record upon detection. This process smoothens the user records and accurately represents the device history. Monitoring the Interference Devices (GUI) Before you begin You can configure Cisco CleanAir only on CleanAir-enabled access points. Step 1 Step 2 Choose Monitor > Interferers > Cisco CleanAir > 802.11a/n or 802.11b/g/n > Interference Devices to open the Cisco APs > Interference Devices page. This page shows the following information: · AP Name--The name of the access point where the interference device is detected. · Interferer Type--Type of the interferer. · Affected Channel--Channel that the device affects. · Severity--Severity index of the interfering device. · Duty Cycle (%)--Proportion of time during which the interfering device was active. · RSSI--Receive signal strength indicator (RSSI) of the access point. · DevID--Device identification number that uniquely identified the interfering device. · ClusterID--Cluster identification number that uniquely identifies the type of the devices. Click the Filter icon or choose the Quick Filter option from the Show drop-down list to display the information about interference devices based on a particular criteria. Related Topics Configuring Interference Reporting for 2.4-GHz Devices, on page 62 Configuring Interference Reporting for 5-GHz devices, on page 65 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 76 CleanAir Monitoring the Worst Air Quality of Radio Bands (GUI) Monitoring the Worst Air Quality of Radio Bands (GUI) Choose Monitor > Cisco CleanAir > Worst Air-Quality to open the Air Quality Report page. This page shows the air quality of both the 802.11a/n and 802.11b/g/n radio bands. This page displays the following information: · AP Name--Name of the access point that reported the worst air quality for the 802.11 radio band. · Channel Number--Radio channel with the worst reported air quality. · Minimum Air Quality Index--Minimum air quality for this radio channel. The range is from 1 to 100. An air quality index (AQI) value of 100 is the best, and 1 is the worst. · Average Air Quality Index--Average air quality for this radio channel. The range is from 1 to 100. An air quality index (AQI) value of 100 is the best, and 1 is the worst. · Interference Device Count--Number of interferers detected by the radios on the 802.11 radio band. Configuration Examples for Configuring CleanAir Enabling CleanAir on 2.4-GHz Band and an Access Point: Example This example shows how to enable CleanAir on the 2.4-GHz band and an access point operating in the channel: Switch#configure terminal Switch(config)#ap dot11 24ghz cleanair Switch(config)#exit Switch#ap name TAP1 dot11 24ghz cleanair Switch#end Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices: Example This example shows how to configure a CleanAir Alarm for 2.4-GHz Air-Quality threshold of 50 dBm and an Xbox device: Switch#configure terminal Switch(config)#ap dot11 24ghz cleanair alarm air-quality threshold 50 Switch(config)#ap dot11 24ghz cleanair alarm device xbox Switch(config)#end Configuring Interference Reporting for 5-GHz Devices: Example This example shows how to configure interference reporting for 5-GHz devices: Switch#configure terminal Switch(config)#ap dot11 5ghz cleanair alarm device xbox Switch(config)#end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 77 CleanAir FAQs CleanAir Configuring EDRRM for CleanAir-Events: Example This example shows how to enable an EDRRM cleanair-event in the 2.4-GHz band and configure high sensitivity to non WiFi interference: Switch#configure terminal Switch(config)#ap dot11 24ghz rrm channel cleanair-event Switch(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high Switch(config)#end Configuring Persistent Device Avoidance: Example This example shows how to enable persistent non WiFi device avoidance in the 2.4-GHz band: Switch#configure terminal Switch(config)#ap dot11 24ghz rrm channel device Switch(config)#end Configuring an Access Point for SE-Connect Mode: Example This example shows how to configure an access point in the SE-Connect mode: Switch#ap name Cisco_AP3500 mode se-connect CleanAir FAQs Q. How do I check if my MC is up? A. To check if the MC is up, use the command: show wireless mobility summary. This example shows how to display the mobility summary: Switch#show wireless mobility summary Mobility Controller Summary: Mobility Role : Mobility Controller Mobility Protocol Port : 16666 Mobility Group Name : MG-AK Mobility Oracle : Disabled Mobility Oracle IP Address : 0.0.0.0 DTLS Mode : Enabled Mobility Domain ID for 802.11r : 0x39b2 Mobility Keepalive Interval : 10 Mobility Keepalive Count :3 Mobility Control Message DSCP Value : 48 Mobility Domain Member Count :2 Link Status is Control Link Status : Data Link Status Controllers configured in the Mobility Domain: IP Public IP Group Name Multicast IP Link Status ------------------------------------------------------------------------------- 9.6.136.10 - MG-AK 0.0.0.0 UP : UP Q. Multiple access points detect the same interference device, however, the switch shows them as separate clusters or different suspected devices clustered together. Why does this happen? A. Access points must be RF neighbors for the switch to consider the merging of devices that are detected by these access points. The access point takes time to establish neighbor relationships. A few minutes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 78 CleanAir CleanAir FAQs after the switch reboots or a change in the RF group and similar events, clustering will not be very accurate. Q. Can I merge two monitor mode access points using a switch? A. No, you cannot merge two monitor mode access points using a switch. You can merge the monitor mode access points only using MSE. Q. How do I view neighbor access points? A. To view neighbor access points, use the command: show ap ap_name auto-rf dot11{24ghz | 5ghz} This example shows how to display the neighbor access points: Switch#show ap name AS-5508-5-AP3 auto-rf dot11 24ghz <snippet> Nearby APs AP 0C85.259E.C350 slot 0 AP 0C85.25AB.CCA0 slot 0 AP 0C85.25C7.B7A0 slot 0 AP 0C85.25DE.2C10 slot 0 AP 0C85.25DE.C8E0 slot 0 AP 0C85.25DF.3280 slot 0 AP 0CD9.96BA.5600 slot 0 AP 24B6.5734.C570 slot 0 <snippet> : -12 dBm on 1 (10.10.0.5) : -24 dBm on 6 (10.10.0.5) : -26 dBm on 11 (10.10.0.5) : -24 dBm on 6 (10.10.0.5) : -14 dBm on 11 (10.10.0.5) : -31 dBm on 6 (10.10.0.5) : -44 dBm on 6 (10.0.0.2) : -48 dBm on 11 (10.0.0.2) Q. What are the debug commands available for CleanAir? A. The debug commands for CleanAir are: debug cleanair {all | error | event | internal-event | nmsp | packet} debug rrm {all | channel | detail | error | group | ha | manager | message | packet | power | prealarm | profile | radar | rf-change | scale | spectrum} Q. Why are CleanAir Alarms not generated for interferer devices? A. Verify that the access points are CleanAir-capable and CleanAir is enabled both on the access point and the switch. Q. Can the Cisco Catalyst 3850 and 3650 Series Switches function as a Mobility Agent (MA)? A. Yes, the Cisco Catalyst 3850 and 3650 Series Switches can function as an MA. Q. Are CleanAir configurations available on the MA? A. From Release 3.3 SE, CleanAir configurations are available on the MA. You can use the following two CleanAir commands on the MA: · show ap dot11 5ghz cleanair config · show ap dot11 24ghz cleanair config Related Topics Enabling CleanAir for 2.4-GHz Band, on page 60 Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices, on page 60 Configuring Interference Reporting for 2.4-GHz Devices, on page 62 Enabling CleanAir for 5-GHz Band, on page 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices, on page 64 Configuring Interference Reporting for 5-GHz devices, on page 65 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 79 Additional References CleanAir Additional References Related Documents Related Topic CleanAir commands and their details High Availability configurations High Availability commands and their details Document Title CleanAir Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) High Availability Configuration Guide, Cisco IOS XE Release 3SE (Cisco 5700 Series Wireless Controllers) High Availability Command Reference, Cisco IOS XE Release 3SE (Cisco 5700 Series Wireless Controllers) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 80 I I I PA R T Interface and Hardware Component · Configuring Interface Characteristics, on page 83 · Configuring Auto-MDIX, on page 111 · Configuring Ethernet Management Port, on page 117 · Configuring LLDP, LLDP-MED, and Wired Location Service, on page 123 · Configuring System MTU, on page 141 · Configuring Internal Power Supplies, on page 147 · Configuring PoE, on page 151 · Configuring EEE, on page 161 5 C H A P T E R Configuring Interface Characteristics · Finding Feature Information, on page 83 · Information About Configuring Interface Characteristics, on page 83 · How to Configure Interface Characteristics, on page 93 · Monitoring Interface Characteristics, on page 105 · Configuration Examples for Interface Characteristics, on page 107 · Additional References for the Interface Characteristics Feature, on page 110 · Feature History and Information for Configuring Interface Characteristics, on page 110 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring Interface Characteristics Interface Types This section describes the different types of interfaces supported by the switch. The rest of the chapter describes configuration procedures for physical interface characteristics. Note The stack ports on the rear of the stacking-capable switches are not Ethernet ports and cannot be configured. Port-Based VLANs A VLAN is a switched network that is logically segmented by function, team, or application, without regard to the physical location of the users. Packets received on a port are forwarded only to ports that belong to the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 83 Switch Ports Interface and Hardware Component same VLAN as the receiving port. Network devices in different VLANs cannot communicate with one another without a Layer 3 device to route traffic between the VLANs. VLAN partitions provide hard firewalls for traffic in the VLAN, and each VLAN has its own MAC address table. A VLAN comes into existence when a local port is configured to be associated with the VLAN, when the VLAN Trunking Protocol (VTP) learns of its existence from a neighbor on a trunk, or when a user creates a VLAN. VLANs can be formed with ports across the stack. To configure VLANs, use the vlan vlan-id global configuration command to enter VLAN configuration mode. The VLAN configurations for normal-range VLANs (VLAN IDs 1 to 1005) are saved in the VLAN database. If VTP is version 1 or 2, to configure extended-range VLANs (VLAN IDs 1006 to 4094), you must first set VTP mode to transparent. Extended-range VLANs created in transparent mode are not added to the VLAN database but are saved in the switch running configuration. With VTP version 3, you can create extended-range VLANs in client or server mode. These VLANs are saved in the VLAN database. In a switch stack, the VLAN database is downloaded to all switches in a stack, and all switches in the stack build the same VLAN database. The running configuration and the saved configuration are the same for all switches in a stack. Add ports to a VLAN by using the switchport interface configuration commands: · Identify the interface. · For a trunk port, set trunk characteristics, and, if desired, define the VLANs to which it can belong. · For an access port, set and define the VLAN to which it belongs. Switch Ports Access Ports Trunk Ports Switch ports are Layer 2-only interfaces associated with a physical port. Switch ports belong to one or more VLANs. A switch port can be an access port or a trunk port. You can configure a port as an access port or trunk port or let the Dynamic Trunking Protocol (DTP) operate on a per-port basis to set the switchport mode by negotiating with the port on the other end of the link. Switch ports are used for managing the physical interface and associated Layer 2 protocols and do not handle routing or bridging. Configure switch ports by using the switchport interface configuration commands. An access port belongs to and carries the traffic of only one VLAN (unless it is configured as a voice VLAN port). Traffic is received and sent in native formats with no VLAN tagging. Traffic arriving on an access port is assumed to belong to the VLAN assigned to the port. If an access port receives a tagged packet (Inter-Switch Link [ISL] or IEEE 802.1Q tagged), the packet is dropped, and the source address is not learned. The types of access ports supported are: · Static access ports are manually assigned to a VLAN (or through a RADIUS server for use with IEEE 802.1x. You can also configure an access port with an attached Cisco IP Phone to use one VLAN for voice traffic and another VLAN for data traffic from a device attached to the phone. A trunk port carries the traffic of multiple VLANs and by default is a member of all VLANs in the VLAN database. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 84 Interface and Hardware Component Tunnel Ports Tunnel Ports Routed Ports Although by default, a trunk port is a member of every VLAN known to the VTP, you can limit VLAN membership by configuring an allowed list of VLANs for each trunk port. The list of allowed VLANs does not affect any other port but the associated trunk port. By default, all possible VLANs (VLAN ID 1 to 4094) are in the allowed list. A trunk port can become a member of a VLAN only if VTP knows of the VLAN and if the VLAN is in the enabled state. If VTP learns of a new, enabled VLAN and the VLAN is in the allowed list for a trunk port, the trunk port automatically becomes a member of that VLAN and traffic is forwarded to and from the trunk port for that VLAN. If VTP learns of a new, enabled VLAN that is not in the allowed list for a trunk port, the port does not become a member of the VLAN, and no traffic for the VLAN is forwarded to or from the port. Tunnel ports are used in IEEE 802.1Q tunneling to segregate the traffic of customers in a service-provider network from other customers who are using the same VLAN number. You configure an asymmetric link from a tunnel port on a service-provider edge switch to an IEEE 802.1Q trunk port on the customer switch. Packets entering the tunnel port on the edge switch, already IEEE 802.1Q-tagged with the customer VLANs, are encapsulated with another layer of an IEEE 802.1Q tag (called the metro tag), containing a VLAN ID unique in the service-provider network, for each customer. The double-tagged packets go through the service-provider network keeping the original customer VLANs separate from those of other customers. At the outbound interface, also a tunnel port, the metro tag is removed, and the original VLAN numbers from the customer network are retrieved. Tunnel ports cannot be trunk ports or access ports and must belong to a VLAN unique to each customer. A routed port is a physical port that acts like a port on a router; it does not have to be connected to a router. A routed port is not associated with a particular VLAN, as is an access port. A routed port behaves like a regular router interface, except that it does not support VLAN subinterfaces. Routed ports can be configured with a Layer 3 routing protocol. A routed port is a Layer 3 interface only and does not support Layer 2 protocols, such as DTP and STP. Configure routed ports by putting the interface into Layer 3 mode with the no switchport interface configuration command. Then assign an IP address to the port, enable routing, and assign routing protocol characteristics by using the ip routing and router protocol global configuration commands. Note Entering a no switchport interface configuration command shuts down the interface and then re-enables it, which might generate messages on the device to which the interface is connected. When you put an interface that is in Layer 2 mode into Layer 3 mode, the previous configuration information related to the affected interface might be lost. The number of routed ports that you can configure is not limited by software. However, the interrelationship between this number and the number of other features being configured might impact CPU performance because of hardware limitations. Note The IP base feature set supports static routing and the Routing Information Protocol (RIP). For full Layer 3 routing or for fallback bridging, you must enable the IP services feature set on the standalone switch, or the active switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 85 Switch Virtual Interfaces Interface and Hardware Component Switch Virtual Interfaces A switch virtual interface (SVI) represents a VLAN of switch ports as one interface to the routing or bridging function in the system. You can associate only one SVI with a VLAN. You configure an SVI for a VLAN only to route between VLANs or to provide IP host connectivity to the switch. By default, an SVI is created for the default VLAN (VLAN 1) to permit remote switch administration. Additional SVIs must be explicitly configured. Note You cannot delete interface VLAN 1. SVIs provide IP host connectivity only to the system. Although the switch stack or switch supports a total of 1005 VLANs and SVIs, the interrelationship between the number of SVIs and routed ports and the number of other features being configured might impact CPU performance because of hardware limitations. SVIs are created the first time that you enter the vlan interface configuration command for a VLAN interface. The VLAN corresponds to the VLAN tag associated with data frames on an ISL or IEEE 802.1Q encapsulated trunk or the VLAN ID configured for an access port. Configure a VLAN interface for each VLAN for which you want to route traffic, and assign it an IP address. Note When you create an SVI, it does not become active until it is associated with a physical port. SVI Autostate Exclude The line state of an SVI with multiple ports on a VLAN is in the up state when it meets these conditions: · The VLAN exists and is active in the VLAN database on the switch · The VLAN interface exists and is not administratively down. · At least one Layer 2 (access or trunk) port exists, has a link in the up state on this VLAN, and is in the spanning-tree forwarding state on the VLAN. Note The protocol link state for VLAN interfaces come up when the first switchport belonging to the corresponding VLAN link comes up and is in STP forwarding state. The default action, when a VLAN has multiple ports, is that the SVI goes down when all ports in the VLAN go down. You can use the SVI autostate exclude feature to configure a port so that it is not included in the SVI line-state up-or-down calculation. For example, if the only active port on the VLAN is a monitoring port, you might configure autostate exclude on that port so that the VLAN goes down when all other ports go down. When enabled on a port, autostate exclude applies to all VLANs that are enabled on that port. The VLAN interface is brought up when one Layer 2 port in the VLAN has had time to converge (transition from STP listening-learning state to forwarding state). This prevents features such as routing protocols from using the VLAN interface as if it were fully operational and minimizes other problems, such as routing black holes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 86 Interface and Hardware Component EtherChannel Port Groups EtherChannel Port Groups EtherChannel port groups treat multiple switch ports as one switch port. These port groups act as a single logical port for high-bandwidth connections between switches or between switches and servers. An EtherChannel balances the traffic load across the links in the channel. If a link within the EtherChannel fails, traffic previously carried over the failed link changes to the remaining links. You can group multiple trunk ports into one logical trunk port, group multiple access ports into one logical access port, group multiple tunnel ports into one logical tunnel port, or group multiple routed ports into one logical routed port. Most protocols operate over either single ports or aggregated switch ports and do not recognize the physical ports within the port group. Exceptions are the DTP, the Cisco Discovery Protocol (CDP), and the Port Aggregation Protocol (PAgP), which operate only on physical ports. When you configure an EtherChannel, you create a port-channel logical interface and assign an interface to the EtherChannel. For Layer 3 interfaces, you manually create the logical interface by using the interface port-channel global configuration command. Then you manually assign an interface to the EtherChannel by using the channel-group interface configuration command. For Layer 2 interfaces, use the channel-group interface configuration command to dynamically create the port-channel logical interface. This command binds the physical and logical ports together. Power over Ethernet Ports A PoE-capable switch port automatically supplies power to one of these connected devices if the switch senses that there is no power on the circuit: · a Cisco pre-standard powered device (such as a Cisco IP Phone or a Cisco Aironet Access Point) · an IEEE 802.3af-compliant powered device · an IEEE 802.3at-compliant powered device A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power source. The device does not receive redundant power when it is only connected to the PoE port. After the switch detects a powered device, the switch determines the device power requirements and then grants or denies power to the device. The switch can also sense the real-time power consumption of the device by monitoring and policing the power usage. Using the Switch USB Ports USB Mini-Type B Console Port The switch has the following console ports available on its front panel: · USB mini-Type B console connection · RJ-45 console port Console output appears on devices connected to both ports, but console input is active on only one port at a time. By default, the USB connector takes precedence over the RJ-45 connector. Note Windows PCs require a driver for the USB port. See the hardware installation guide for driver installation instructions. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 87 Console Port Change Logs Interface and Hardware Component Use the supplied USB Type A-to-USB mini-Type B cable to connect a PC or other device to the switch. The connected device must include a terminal emulation application. When the switch detects a valid USB connection to a powered-on device that supports host functionality (such as a PC), input from the RJ-45 console is immediately disabled, and input from the USB console is enabled. Removing the USB connection immediately reenables input from the RJ-45 console connection. An LED on the switch shows which console connection is in use. Console Port Change Logs At software startup, a log shows whether the USB or the RJ-45 console is active. Each switch in a stack issues this log. Every switch always first displays the RJ-45 media type. In the sample output, switch 1 has a connected USB console cable. Because the bootloader did not change to the USB console, the first log from switch 1 shows the RJ-45 console. A short time later, the console changes and the USB console log appears. Switch 2 and switch 3 have connected RJ-45 console cables. switch-stack-1 *Mar 1 00:01:00.171: %USB_CONSOLE-6-MEDIA_RJ45: Console media-type is RJ45. *Mar 1 00:01:00.431: %USB_CONSOLE-6-MEDIA_USB: Console media-type is USB. switch-stack-2 *Mar 1 00:01:09.835: %USB_CONSOLE-6-MEDIA_RJ45: Console media-type is RJ45. switch-stack-3 *Mar 1 00:01:10.523: %USB_CONSOLE-6-MEDIA_RJ45: Console media-type is RJ45. When the USB cable is removed or the PC de-activates the USB connection, the hardware automatically changes to the RJ-45 console interface: switch-stack-1 Mar 1 00:20:48.635: %USB_CONSOLE-6-MEDIA_RJ45: Console media-type is RJ45. You can configure the console type to always be RJ-45, and you can configure an inactivity timeout for the USB connector. Interface Connections Devices within a single VLAN can communicate directly through any switch. Ports in different VLANs cannot exchange data without going through a routing device. With a standard Layer 2 switch, ports in different VLANs have to exchange information through a router. By using the switch with routing enabled, when you configure both VLAN 20 and VLAN 30 with an SVI to which an IP address is assigned, packets can be sent from Host A to Host B directly through the switch with no need for an external router. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 88 Interface and Hardware Component Figure 2: Connecting VLANs with the Switch Default Ethernet Interface Configuration Note Switches running the LAN base feature set support configuring only 16 static routes on SVIs. Default Ethernet Interface Configuration To configure Layer 2 parameters, if the interface is in Layer 3 mode, you must enter the switchport interface configuration command without any parameters to put the interface into Layer 2 mode. This shuts down the interface and then re-enables it, which might generate messages on the device to which the interface is connected. When you put an interface that is in Layer 3 mode into Layer 2 mode, the previous configuration information related to the affected interface might be lost, and the interface is returned to its default configuration. This table shows the Ethernet interface default configuration, including some features that apply only to Layer 2 interfaces. Table 11: Default Layer 2 Ethernet Interface Configuration Feature Default Setting Operating mode Layer 2 or switching mode (switchport command). Allowed VLAN range VLANs 1 4094. Default VLAN (for access ports) VLAN 1 (Layer 2 interfaces only). Native VLAN (for IEEE 802.1Q trunks) VLAN 1 (Layer 2 interfaces only). VLAN trunking Switchport mode dynamic auto (supports DTP) (Layer 2 interfaces only). Port enable state All ports are enabled. Port description None defined. Speed Autonegotiate. (Not supported on the 10-Gigabit interfaces.) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 89 Interface Speed and Duplex Mode Interface and Hardware Component Feature Default Setting Duplex mode Autonegotiate. (Not supported on the 10-Gigabit interfaces.) Flow control Flow control is set to receive: off. It is always off for sent packets. EtherChannel (PAgP) Disabled on all Ethernet ports. Port blocking (unknown multicast and Disabled (not blocked) (Layer 2 interfaces only). unknown unicast traffic) Broadcast, multicast, and unicast storm Disabled. control Protected port Disabled (Layer 2 interfaces only). Port security Disabled (Layer 2 interfaces only). Port Fast Disabled. Auto-MDIX Enabled. Note The switch might not support a pre-standard powered device--such as Cisco IP phones and access points that do not fully support IEEE 802.3af--if that powered device is connected to the switch through a crossover cable. This is regardless of whether auto-MIDX is enabled on the switch port. Power over Ethernet (PoE) Enabled (auto). Interface Speed and Duplex Mode Ethernet interfaces on the switch operate at 10, 100, 1000, or 10,000 Mb/s and in either full- or half-duplex mode. In full-duplex mode, two stations can send and receive traffic at the same time. Normally, 10-Mb/s ports operate in half-duplex mode, which means that stations can either receive or send traffic. Switch models include Gigabit Ethernet (10/100/1000-Mb/s) ports, 10-Gigabit Ethernet ports, and small form-factor pluggable (SFP) module slots supporting SFP modules. Speed and Duplex Configuration Guidelines When configuring an interface speed and duplex mode, note these guidelines: · The 10-Gigabit Ethernet ports do not support the speed and duplex features. These ports operate only at 10,000 Mb/s and in full-duplex mode. · Gigabit Ethernet (10/100/1000-Mb/s) ports support all speed options and all duplex options (auto, half, and full). However, Gigabit Ethernet ports operating at 1000 Mb/s do not support half-duplex mode. · For SFP module ports, the speed and duplex CLI options change depending on the SFP module type: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 90 Interface and Hardware Component IEEE 802.3x Flow Control · The 1000BASE-x (where -x is -BX, -CWDM, -LX, -SX, and -ZX) SFP module ports support the nonegotiate keyword in the speed interface configuration command. Duplex options are not supported. · The 1000BASE-T SFP module ports support the same speed and duplex options as the 10/100/1000-Mb/s ports. For information about which SFP modules are supported on your switch, see the product release notes. · If both ends of the line support autonegotiation, we highly recommend the default setting of auto negotiation. · If one interface supports autonegotiation and the other end does not, configure duplex and speed on both interfaces; do not use the auto setting on the supported side. · When STP is enabled and a port is reconfigured, the switch can take up to 30 seconds to check for loops. The port LED is amber while STP reconfigures. Caution Changing the interface speed and duplex mode configuration might shut down and re-enable the interface during the reconfiguration. IEEE 802.3x Flow Control Flow control enables connected Ethernet ports to control traffic rates during congestion by allowing congested nodes to pause link operation at the other end. If one port experiences congestion and cannot receive any more traffic, it notifies the other port by sending a pause frame to stop sending until the condition clears. Upon receipt of a pause frame, the sending device stops sending any data packets, which prevents any loss of data packets during the congestion period. Note Flow control is not supported on Catalyst 3850 and Catalyst 3650 Series Switches (CSCul33405). Note The switch ports can receive, but not send, pause frames. You use the flowcontrol interface configuration command to set the interface's ability to receive pause frames to on, off, or desired. The default state is off. When set to desired, an interface can operate with an attached device that is required to send flow-control packets or with an attached device that is not required to but can send flow-control packets. These rules apply to flow control settings on the device: · receive on (or desired): The port cannot send pause frames but can operate with an attached device that is required to or can send pause frames; the port can receive pause frames. · receive off: Flow control does not operate in either direction. In case of congestion, no indication is given to the link partner, and no pause frames are sent or received by either device. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 91 Layer 3 Interfaces Interface and Hardware Component Layer 3 Interfaces The switch supports these types of Layer 3 interfaces: · SVIs: You should configure SVIs for any VLANs for which you want to route traffic. SVIs are created when you enter a VLAN ID following the interface vlan global configuration command. To delete an SVI, use the no interface vlan global configuration command. You cannot delete interface VLAN 1. Note When you create an SVI, it does not become active until it is associated with a physical port. When configuring SVIs, you can also configure SVI autostate exclude on a port in the SVI to exclude that port from being included in determining SVI line-state status. · Routed ports: Routed ports are physical ports configured to be in Layer 3 mode by using the no switchport interface configuration command. · Layer 3 EtherChannel ports: EtherChannel interfaces made up of routed ports. A Layer 3 switch can have an IP address assigned to each routed port and SVI. There is no defined limit to the number of SVIs and routed ports that can be configured in a switch or in a switch stack. However, the interrelationship between the number of SVIs and routed ports and the number of other features being configured might have an impact on CPU usage because of hardware limitations. If the switch is using its maximum hardware resources, attempts to create a routed port or SVI have these results: · If you try to create a new routed port, the switch generates a message that there are not enough resources to convert the interface to a routed port, and the interface remains as a switchport. · If you try to create an extended-range VLAN, an error message is generated, and the extended-range VLAN is rejected. · If the switch is notified by VLAN Trunking Protocol (VTP) of a new VLAN, it sends a message that there are not enough hardware resources available and shuts down the VLAN. The output of the show vlan user EXEC command shows the VLAN in a suspended state. · If the switch attempts to boot up with a configuration that has more VLANs and routed ports than hardware can support, the VLANs are created, but the routed ports are shut down, and the switch sends a message that this was due to insufficient hardware resources. All Layer 3 interfaces require an IP address to route traffic. This procedure shows how to configure an interface as a Layer 3 interface and how to assign an IP address to an interface. Note If the physical port is in Layer 2 mode (the default), you must enter the no switchport interface configuration command to put the interface into Layer 3 mode. Entering a no switchport command disables and then re-enables the interface, which might generate messages on the device to which the interface is connected. Furthermore, when you put an interface that is in Layer 2 mode into Layer 3 mode, the previous configuration information related to the affected interface might be lost, and the interface is returned to its default configuration Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 92 Interface and Hardware Component How to Configure Interface Characteristics How to Configure Interface Characteristics Configuring Interfaces Procedure These general instructions apply to all interface configuration processes. Step 1 Procedure Command or Action Purpose Enter the configure terminal command at the privileged EXEC prompt: Example: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# Step 2 Enter the interface global configuration command. Identify Note the interface type, the switch number (only on stacking-capable switches), and the number of the connector. In this example, Gigabit Ethernet port 1 on switch 1 is selected: Example: Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# You do not need to add a space between the interface type and the interface number. For example, in the preceding line, you can specify either gigabitethernet 1/0/1, gigabitethernet1/0/1, gi 1/0/1, or gi1/0/1. Step 3 Step 4 Follow each interface command with the interface You can also configure a range of interfaces by using the configuration commands that the interface requires. The interface range or interface range macro global commands that you enter define the protocols and configuration commands. Interfaces configured in a range applications that will run on the interface. The commands must be the same type and must be configured with the are collected and applied to the interface when you enter same feature options. another interface command or enter end to return to privileged EXEC mode. After you configure an interface, verify its status by using Enter the show interfaces privileged EXEC command to the show privileged EXEC commands. see a list of all interfaces on or configured for the switch. Example: A report is provided for each interface that the device supports or for the specified interface. Adding a Description for an Interface SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 93 Configuring a Range of Interfaces Interface and Hardware Component 2. interface interface-id 3. description string 4. end 5. show interfaces interface-id description DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the interface for which you are adding a description, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 Step 3 description string Example: Switch(config-if)# description Connects to Marketing Adds a description (up to 240 characters) for an interface. Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 5 show interfaces interface-id description Verifies your entry. Configuring a Range of Interfaces To configure multiple interfaces with the same configuration parameters, use the interface range global configuration command. When you enter the interface-range configuration mode, all command parameters that you enter are attributed to all interfaces within that range until you exit this mode. SUMMARY STEPS 1. configure terminal 2. interface range {port-range | macro macro_name} 3. end 4. show interfaces [interface-id] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 94 Interface and Hardware Component Configuring and Using Interface Range Macros DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 interface range {port-range | macro macro_name} Example: Switch(config)# interface range macro Step 3 end Example: Switch(config)# end Step 4 show interfaces [interface-id] Example: Switch# show interfaces Purpose Enters global configuration mode. Specifies the range of interfaces (VLANs or physical ports) to be configured, and enter interface-range configuration mode. · You can use the interface range command to configure up to five port ranges or a previously defined macro. · The macro variable is explained in the Configuring and Using Interface Range Macros, on page 95. · In a comma-separated port-range, you must enter the interface type for each entry and enter spaces before and after the comma. · In a hyphen-separated port-range, you do not need to re-enter the interface type, but you must enter a space before the hyphen. Note Use the normal configuration commands to apply the configuration parameters to all interfaces in the range. Each command is executed as it is entered. Returns to privileged EXEC mode. Verifies the configuration of the interfaces in the range. Configuring and Using Interface Range Macros You can create an interface range macro to automatically select a range of interfaces for configuration. Before you can use the macro keyword in the interface range macro global configuration command string, you must use the define interface-range global configuration command to define the macro. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 95 Configuring and Using Interface Range Macros Interface and Hardware Component SUMMARY STEPS 1. configure terminal 2. define interface-range macro_name interface-range 3. interface range macro macro_name 4. end 5. show running-config | include define DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 define interface-range macro_name interface-range Defines the interface-range macro, and save it in NVRAM. Example: Switch(config)# define interface-range enet_list gigabitethernet1/0/1 - 2 · The macro_name is a 32-character maximum character string. · A macro can contain up to five comma-separated interface ranges. · Each interface-range must consist of the same port type. Note Before you can use the macro keyword in the interface range macro global configuration command string, you must use the define interface-range global configuration command to define the macro. interface range macro macro_name Example: Switch(config)# interface range macro enet_list Selects the interface range to be configured using the values saved in the interface-range macro called macro_name. You can now use the normal configuration commands to apply the configuration to all interfaces in the defined macro. end Example: Returns to privileged EXEC mode. Switch(config)# end Step 5 show running-config | include define Example: Switch# show running-config | include define Shows the defined interface range macro configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 96 Interface and Hardware Component Configuring Ethernet Interfaces Configuring Ethernet Interfaces Setting the Interface Speed and Duplex Parameters SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. speed {10 | 100 | 1000 | auto [10 | 100 | 1000] | nonegotiate} 4. duplex {auto | full | half} 5. end 6. show interfaces interface-id 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the physical interface to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/3 Step 3 speed {10 | 100 | 1000 | auto [10 | 100 | 1000] | nonegotiate} Example: Switch(config-if)# speed 10 This command is not available on a 10-Gigabit Ethernet interface. Enter the appropriate speed parameter for the interface: · Enter 10, 100, or 1000 to set a specific speed for the interface. The 1000 keyword is available only for 10/100/1000 Mb/s ports. · Enter auto to enable the interface to autonegotiate speed with the connected device. If you use the 10, 100, or the 1000 keywords with the auto keyword, the port autonegotiates only at the specified speeds. · The nonegotiate keyword is available only for SFP module ports. SFP module ports operate only at 1000 Mb/s but can be configured to not negotiate if connected to a device that does not support autonegotiation. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 97 Configuring IEEE 802.3x Flow Control Interface and Hardware Component Step 4 Command or Action duplex {auto | full | half} Example: Switch(config-if)# duplex half Step 5 end Example: Switch(config-if)# end Step 6 show interfaces interface-id Example: Switch# show interfaces gigabitethernet1/0/3 Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose This command is not available on a 10-Gigabit Ethernet interface. Enter the duplex parameter for the interface. Enable half-duplex mode (for interfaces operating only at 10 or 100 Mb/s). You cannot configure half-duplex mode for interfaces operating at 1000 Mb/s. You can configure the duplex setting when the speed is set to auto. Returns to privileged EXEC mode. Displays the interface speed and duplex mode configuration. (Optional) Saves your entries in the configuration file. Configuring IEEE 802.3x Flow Control SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. flowcontrol {receive} {on | off | desired} 4. end 5. show interfaces interface-id DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 98 Interface and Hardware Component Configuring Layer 3 Interfaces Step 2 Command or Action interface interface-id Example: Purpose Specifies the physical interface to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 flowcontrol {receive} {on | off | desired} Example: Switch(config-if)# flowcontrol receive on Configures the flow control mode for the port. Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 5 show interfaces interface-id Example: Switch# show interfaces gigabitethernet1/0/1 Verifies the interface flow control settings. Configuring Layer 3 Interfaces SUMMARY STEPS 1. configure terminal 2. interface {gigabitethernet interface-id} | {vlan vlan-id} | {port-channel port-channel-number} 3. no switchport 4. ip address ip_address subnet_mask 5. no shutdown 6. end 7. show interfaces [interface-id] DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 99 Configuring Logical Layer 3 GRE Tunnel Interfaces Interface and Hardware Component Step 2 Command or Action Purpose interface {gigabitethernet interface-id} | {vlan vlan-id} Specifies the interface to be configured as a Layer 3 | {port-channel port-channel-number} interface, and enter interface configuration mode. Example: Switch(config)# interface gigabitethernet1/0/2 Step 3 no switchport Example: Switch(config-if)# no switchport For physical ports only, enters Layer 3 mode. Step 4 ip address ip_address subnet_mask Example: Switch(config-if)# ip address 192.20.135.21 255.255.255.0 Configures the IP address and IP subnet. Step 5 no shutdown Example: Switch(config-if)# no shutdown Enables the interface. Step 6 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 7 show interfaces [interface-id] Verifies the configuration. Configuring Logical Layer 3 GRE Tunnel Interfaces Before you begin Generic Routing Encapsulation (GRE) is a tunneling protocol used to encapsulate network layer protocols inside virtual point-to-point links. A GRE tunnel only provides encapsulation and not encryption. Attention Beginning in Cisco IOS XE Release 3.7.2E, GRE tunnels are supported on the hardware on Cisco Catalyst switches. When GRE is configured without tunnel options, packets are hardware-switched. When GRE is configured with tunnel options (such as key, checksum, etc.), packets are switched in the software. A maximum of 10 GRE tunnels are supported. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 100 Interface and Hardware Component Configuring Logical Layer 3 GRE Tunnel Interfaces Note Other features like Access Control Lists (ACL) and Quality of Service (QoS) are not supported for the GRE tunnels. To configure a GRE tunnel, perform this task: SUMMARY STEPS 1. interface tunnel number 2. ip addressip_addresssubnet_mask 3. tunnel source{ip_address |type_number} 4. tunnel destination{host_name | ip_address} 5. tunnel mode gre ip 6. end DETAILED STEPS Step 1 Command or Action interface tunnel number Example: Switch(config)#interface tunnel 2 Purpose Enables tunneling on the interface. Step 2 ip addressip_addresssubnet_mask Configures the IP address and IP subnet. Example: Switch(config)#ip address 100.1.1.1 255.255.255.0 Step 3 tunnel source{ip_address |type_number} Example: Switch(config)#tunnel source 10.10.10.1 Configures the tunnel source. Step 4 tunnel destination{host_name | ip_address} Example: Switch(config)#tunnel destination 10.10.10.2 Configures the tunnel destination. Step 5 tunnel mode gre ip Example: Switch(config)#tunnel mode gre ip Configures the tunnel mode. Step 6 end Example: Switch(config)#end Exist configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 101 Configuring SVI Autostate Exclude Interface and Hardware Component Configuring SVI Autostate Exclude SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport autostate exclude 4. end 5. show running config interface interface-id DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies a Layer 2 interface (physical port or port channel), and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 Step 3 switchport autostate exclude Example: Excludes the access or trunk port when defining the status of an SVI line state (up or down) Switch(config-if)# switchport autostate exclude Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 5 show running config interface interface-id (Optional) Shows the running configuration. Verifies the configuration. Shutting Down and Restarting the Interface Shutting down an interface disables all functions on the specified interface and marks the interface as unavailable on all monitoring command displays. This information is communicated to other network servers through all dynamic routing protocols. The interface is not mentioned in any routing updates. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 102 Interface and Hardware Component Configuring the Console Media Type SUMMARY STEPS 1. configure terminal 2. interface {vlan vlan-id} | {gigabitethernet interface-id} | {port-channel port-channel-number} 3. shutdown 4. no shutdown 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface {vlan vlan-id} | {gigabitethernet interface-id} Selects the interface to be configured. | {port-channel port-channel-number} Example: Switch(config)# interface gigabitethernet1/0/2 Step 3 shutdown Example: Switch(config-if)# shutdown Shuts down an interface. Step 4 no shutdown Example: Switch(config-if)# no shutdown Restarts an interface. Step 5 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Configuring the Console Media Type Beginning in privileged EXEC mode, follow these steps to set the console media type to RJ-45. If you configure the console as RJ-45, USB console operation is disabled, and input comes only through the RJ-45 connector. This configuration applies to all switches in a stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 103 Configuring the USB Inactivity Timeout Interface and Hardware Component SUMMARY STEPS 1. configure terminal 2. line console 0 3. media-type rj45 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 line console 0 Example: Switch(config)# line console 0 Step 3 media-type rj45 Example: Switch(config-line)# media-type rj45 Step 4 end Example: Switch(config)# end Purpose Enters the global configuration mode. Configures the console and enters line configuration mode. Configures the console media type to be only RJ-45 port. If you do not enter this command and both types are connected, the USB port is used by default. Returns to privileged EXEC mode. Configuring the USB Inactivity Timeout The configurable inactivity timeout reactivates the RJ-45 console port if the USB console port is activated but no input activity occurs on it for a specified time period. When the USB console port is deactivated due to a timeout, you can restore its operation by disconnecting and reconnecting the USB cable. Note The configured inactivity timeout applies to all switches in a stack. However, a timeout on one switch does not cause a timeout on other switches in the stack. Beginning in privileged EXEC mode, follow these steps to configure an inactivity timeout. SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 104 Interface and Hardware Component Monitoring Interface Characteristics 2. line console 0 3. usb-inactivity-timeout timeout-minutes DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 line console 0 Example: Switch(config)# line console 0 Configures the console and enters line configuration mode. Step 3 usb-inactivity-timeout timeout-minutes Example: Switch(config-line)# usb-inactivity-timeout 30 Specify an inactivity timeout for the console port. The range is 1 to 240 minutes. The default is to have no timeout configured. Monitoring Interface Characteristics Monitoring Interface Status Commands entered at the privileged EXEC prompt display information about the interface, including the versions of the software and the hardware, the configuration, and statistics about the interfaces. This table lists some of the available interface monitoring commands. Table 12: Show Commands for Interfaces Command Purpose show interfaces [interface-id] Displays the status and configuration of all interfaces or a specific interface. show interfaces interface-id status [err-disabled] Displays interface status or a list of interfaces in the error-disabled state. show interfaces [interface-id] switchport Displays administrative and operational status of switching (nonrouting) ports. You can use this command to find out if a port is in routing or in switching mode. show interfaces [interface-id] description Displays the description configured on an interface or all interfaces and the interface status. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 105 Clearing and Resetting Interfaces and Counters Interface and Hardware Component Command Purpose show ip interface [interface-id] Displays the usability status of all interfaces configured for IP routing or the specified interface. show interface [interface-id] stats Displays the input and output packets by the switching path for the interface. show interfaces interface-id (Optional) Displays speed and duplex on the interface. show interfaces transceiver dom-supported-list (Optional) Displays Digital Optical Monitoring (DOM) status on the connect SFP modules. show interfaces transceiver properties (Optional) Displays temperature, voltage, or amount of current on the interface. show interfaces [interface-id] [{transceiver Displays physical and operational status about an SFP module. properties | detail}] module number] show running-config interface [interface-id] Displays the running configuration in RAM for the interface. show version Displays the hardware configuration, software version, the names and sources of configuration files, and the boot images. show controllers ethernet-controller interface-id phy Displays the operational state of the auto-MDIX feature on the interface. Clearing and Resetting Interfaces and Counters Table 13: Clear Commands for Interfaces Command Purpose clear counters [interface-id] Clears interface counters. clear interface interface-id Resets the hardware logic on an interface. clear line [number | console 0 | vty number] Resets the hardware logic on an asynchronous serial line. Note The clear counters privileged EXEC command does not clear counters retrieved by using Simple Network Management Protocol (SNMP), but only those seen with the show interface privileged EXEC command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 106 Interface and Hardware Component Configuration Examples for Interface Characteristics Configuration Examples for Interface Characteristics Adding a Description to an Interface: Example Switch# configure terminal Enter configuration commands, one per line. End with CNTRL/Z. Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# description Connects to Marketing Switch(config-if)# end Switch# show interfaces gigabitethernet1/0/2 description Interface Status Protocol Description Gi1/0/2 admin down down Connects to Marketing Configuring a Range of Interfaces: Examples This example shows how to use the interface range global configuration command to set the speed to 100 Mb/s on ports 1 to 4 on switch 1: Switch# configure terminal Switch(config)# interface range gigabitethernet1/0/1 - 4 Switch(config-if-range)# speed 100 This example shows how to use a comma to add different interface type strings to the range to enable Gigabit Ethernet ports 1 to 3 and 10-Gigabit Ethernet ports 1 and 2 to receive flow-control pause frames: Switch# configure terminal Switch(config)# interface range gigabitethernet1/0/1 - 3 , tengigabitethernet1/0/1 - 2 Switch(config-if-range)# flowcontrol receive on If you enter multiple configuration commands while you are in interface-range mode, each command is executed as it is entered. The commands are not batched and executed after you exit interface-range mode. If you exit interface-range configuration mode while the commands are being executed, some commands might not be executed on all interfaces in the range. Wait until the command prompt reappears before exiting interface-range configuration mode. Configuring and Using Interface Range Macros: Examples This example shows how to define an interface-range named enet_list to include ports 1 and 2 on switch 1 and to verify the macro configuration: Switch# configure terminal Switch(config)# define interface-range enet_list gigabitethernet1/0/1 - 2 Switch(config)# end Switch# show running-config | include define define interface-range enet_list GigabitEthernet1/0/1 - 2 This example shows how to create a multiple-interface macro named macro1: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 107 Setting Interface Speed and Duplex Mode: Example Interface and Hardware Component Switch# configure terminal Switch(config)# define interface-range macro1 gigabitethernet1/0/1 - 2, gigabitethernet1/0/5 - 7, tengigabitethernet1/0/1 -2 Switch(config)# end This example shows how to enter interface-range configuration mode for the interface-range macro enet_list: Switch# configure terminal Switch(config)# interface range macro enet_list Switch(config-if-range)# This example shows how to delete the interface-range macro enet_list and to verify that it was deleted. Switch# configure terminal Switch(config)# no define interface-range enet_list Switch(config)# end Switch# show run | include define Switch# Setting Interface Speed and Duplex Mode: Example This example shows how to set the interface speed to 100 Mb/s and the duplex mode to half on a 10/100/1000 Mb/s port: Switch# configure terminal Switch(config)# interface gigabitethernet1/0/3 Switch(config-if)# speed 10 Switch(config-if)# duplex half This example shows how to set the interface speed to 100 Mb/s on a 10/100/1000 Mb/s port: Switch# configure terminal Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# speed 100 Configuring Layer 3 Interfaces: Example Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# no switchport Switch(config-if)# ip address 192.20.135.21 255.255.255.0 Switch(config-if)# no shutdown Configuring the Console Media Type: Example This example disables the USB console media type and enables the RJ-45 console media type. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 108 Interface and Hardware Component Configuring the USB Inactivity Timeout: Example Switch# configure terminal Switch(config)# line console 0 Switch(config-line)# media-type rj45 This configuration terminates any active USB console media type in the stack. A log shows that this termination has occurred. This example shows that the console on switch 1 reverted to RJ-45. *Mar 1 00:25:36.860: %USB_CONSOLE-6-CONFIG_DISABLE: Console media-type USB disabled by system configuration, media-type reverted to RJ45. At this point no switches in the stack allow a USB console to have input. A log entry shows when a console cable is attached. If a USB console cable is connected to switch 2, it is prevented from providing input. *Mar 1 00:34:27.498: %USB_CONSOLE-6-CONFIG_DISALLOW: Console media-type USB is disallowed by system configuration, media-type remains RJ45. (switch-stk-2) This example reverses the previous configuration and immediately activates any USB console that is connected. Switch# configure terminal Switch(config)# line console 0 Switch(config-line)# no media-type rj45 Configuring the USB Inactivity Timeout: Example This example configures the inactivity timeout to 30 minutes: Switch# configure terminal Switch(config)# line console 0 Switch(config-line)# usb-inactivity-timeout 30 To disable the configuration, use these commands: Switch# configure terminal Switch(config)# line console 0 Switch(config-line)# no usb-inactivity-timeout If there is no (input) activity on a USB console port for the configured number of minutes, the inactivity timeout setting applies to the RJ-45 port, and a log shows this occurrence: *Mar 1 00:47:25.625: %USB_CONSOLE-6-INACTIVITY_DISABLE: Console media-type USB disabled due to inactivity, media-type reverted to RJ45. At this point, the only way to reactivate the USB console port is to disconnect and reconnect the cable. When the USB cable on the switch has been disconnected and reconnected, a log similar to this appears: *Mar 1 00:48:28.640: %USB_CONSOLE-6-MEDIA_USB: Console media-type is USB. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 109 Additional References for the Interface Characteristics Feature Interface and Hardware Component Additional References for the Interface Characteristics Feature Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Configuring Interface Characteristics Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 110 6 C H A P T E R Configuring Auto-MDIX · Prerequisites for Auto-MDIX, on page 111 · Restrictions for Auto-MDIX, on page 111 · Information about Configuring Auto-MDIX, on page 112 · How to Configure Auto-MDIX, on page 112 · Monitoring Auto-MDIX, on page 114 · Example for Configuring Auto-MDIX, on page 114 · Additional References, on page 114 · Feature History and Information for Auto-MDIX, on page 115 Prerequisites for Auto-MDIX To configure Layer 2 parameters, if the interface is in Layer 3 mode, you must enter the switchport interface configuration command without any parameters to put the interface into Layer 2 mode. This shuts down the interface and then re-enables it, which might generate messages on the device to which the interface is connected. When you put an interface that is in Layer 3 mode into Layer 2 mode, the previous configuration information related to the affected interface might be lost, and the interface is returned to its default configuration. Automatic medium-dependent interface crossover (auto-MDIX) is enabled by default. Auto-MDIX is supported on all 10/100/1000-Mb/s and on 10/100/1000BASE-TX small form-factor pluggable (SFP)-module interfaces. It is not supported on 1000BASE-SX or -LX SFP module interfaces. Restrictions for Auto-MDIX The switch might not support a pre-standard powered device--such as Cisco IP phones and access points that do not fully support IEEE 802.3af--if that powered device is connected to the switch through a crossover cable. This is regardless of whether auto-MIDX is enabled on the switch port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 111 Information about Configuring Auto-MDIX Interface and Hardware Component Information about Configuring Auto-MDIX Auto-MDIX on an Interface When automatic medium-dependent interface crossover (auto-MDIX) is enabled on an interface, the interface automatically detects the required cable connection type (straight through or crossover) and configures the connection appropriately. When connecting switches without the auto-MDIX feature, you must use straight-through cables to connect to devices such as servers, workstations, or routers and crossover cables to connect to other switches or repeaters. With auto-MDIX enabled, you can use either type of cable to connect to other devices, and the interface automatically corrects for any incorrect cabling. For more information about cabling requirements, see the hardware installation guide. This table shows the link states that result from auto-MDIX settings and correct and incorrect cabling. Table 14: Link Conditions and Auto-MDIX Settings Local Side Auto-MDIX Remote Side Auto-MDIX On On On Off Off On Off Off With Correct Cabling Link up Link up Link up Link up With Incorrect Cabling Link up Link up Link up Link down How to Configure Auto-MDIX Configuring Auto-MDIX on an Interface SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. speed auto 5. duplex auto 6. end 7. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 112 Interface and Hardware Component Configuring Auto-MDIX on an Interface DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet1/0/1 Step 4 speed auto Example: Switch(config-if)# speed auto Step 5 duplex auto Example: Switch(config-if)# duplex auto Step 6 end Example: Switch(config-if)# end Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode Specifies the physical interface to be configured, and enter interface configuration mode. Configures the interface to autonegotiate speed with the connected device. Configures the interface to autonegotiate duplex mode with the connected device. Returns to privileged EXEC mode. (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 113 Monitoring Auto-MDIX Interface and Hardware Component Monitoring Auto-MDIX Command Purpose show controllers ethernet-controllerinterface-id Verifies the operational state of the auto-MDIX phy feature on the interface. Example for Configuring Auto-MDIX This example shows how to enable auto-MDIX on a port: Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# speed auto Switch(config-if)# duplex auto Switch(config-if)# mdix auto Switch(config-if)# end Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 114 Interface and Hardware Component Feature History and Information for Auto-MDIX Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Auto-MDIX Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 115 Feature History and Information for Auto-MDIX Interface and Hardware Component Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 116 7 C H A P T E R Configuring Ethernet Management Port · Finding Feature Information, on page 117 · Prerequisites for Ethernet Management Ports, on page 117 · Information about the Ethernet Management Port, on page 117 · How to Configure the Ethernet Management Port, on page 120 · Additional References, on page 121 · Feature Information for Ethernet Management Ports, on page 122 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Ethernet Management Ports When connecting a PC to the Ethernet management port, you must first assign an IP address. Information about the Ethernet Management Port The Ethernet management port, also referred to as the Gi0/0 or GigabitEthernet0/0 port, is a VRF (VPN routing/forwarding) interface to which you can connect a PC. You can use the Ethernet management port instead of the switch console port for network management. When managing a switch stack, connect the PC to the Ethernet management port on a stack member. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 117 Ethernet Management Port Direct Connection to a Switch Interface and Hardware Component Ethernet Management Port Direct Connection to a Switch Figure 3: Connecting a Switch to a PC This figure displays how to connect the Ethernet management port to the PC for a switch or a standalone switch. Ethernet Management Port Connection to Stack Switches using a Hub In a stack with only stack switches, all the Ethernet management ports on the stack members are connected to a hub to which the PC is connected. The active link is from the Ethernet management port on the active switchthrough the hub, to the PC. If the active switch fails and a new active switch is elected, the active link is now from the Ethernet management port on the new active switch to the PC. Figure 4: Connecting a Switch Stack to a PC This figure displays how a PC uses a hub to connect to a switch stack. Ethernet Management Port and Routing By default, the Ethernet management port is enabled. The switch cannot route packets from the Ethernet management port to a network port, and the reverse. Even though the Ethernet management port does not support routing, you may need to enable routing protocols on the port. Figure 5: Network Example with Routing Protocols Enabled In the following figure, you must enable routing protocols on the Ethernet management port when the PC is multiple hops away from the switch and the packets must pass through multiple Layer 3 devices to reach the PC. In the above figure , if the Ethernet management port and the network ports are associated with the same routing process, the routes are propagated as follows: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 118 Interface and Hardware Component Supported Features on the Ethernet Management Port · The routes from the Ethernet management port are propagated through the network ports to the network. · The routes from the network ports are propagated through the Ethernet management port to the network. Because routing is not supported between the Ethernet management port and the network ports, traffic between these ports cannot be sent or received. If this happens, data packet loops occur between the ports, which disrupt the switch and network operation. To prevent the loops, configure route filters to avoid routes between the Ethernet management port and the network ports. Supported Features on the Ethernet Management Port The Ethernet management port supports these features: · Express Setup (only in switch stacks) · Network Assistant · Telnet with passwords · TFTP · Secure Shell (SSH) · DHCP-based autoconfiguration · SMNP (only the ENTITY-MIB and the IF-MIB) · IP ping · Interface features · Speed--10 Mb/s, 100 Mb/s, and autonegotiation · Duplex mode--Full, half, and autonegotiation · Loopback detection · Cisco Discovery Protocol (CDP) · DHCP relay agent · IPv4 and IPv6 access control lists (ACLs) · Routing protocols Caution Before enabling a feature on the Ethernet management port, make sure that the feature is supported. If you try to configure an unsupported feature on the Ethernet Management port, the feature might not work properly, and the switch might fail. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 119 How to Configure the Ethernet Management Port Interface and Hardware Component How to Configure the Ethernet Management Port Disabling and Enabling the Ethernet Management Port To disable or enable the Ethernet management port in the CLI, follow this procedure. SUMMARY STEPS 1. configure terminal 2. interface gigabitethernet0/0 3. shutdown 4. no shutdown 5. exit 6. show interfaces gigabitethernet0/0 DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 interface gigabitethernet0/0 Example: Switch(config)# interface gigabitethernet0/0 Step 3 shutdown Example: Switch(config-if)# shutdown Step 4 no shutdown Example: Switch(config-if)# no shutdown Step 5 exit Example: Switch(config-if)# exit Step 6 show interfaces gigabitethernet0/0 Example: Switch# show interfaces gigabitethernet0/0 Purpose Enters global configuration mode. Specifies the Ethernet management port in the CLI. Disables the Ethernet management port. Enables the Ethernet management port. Exits interface configuration mode. Displays the link status. To find out the link status to the PC, you can monitor the LED for the Ethernet management port. The LED is green (on) when the link is active, and the LED is off when the link is down. The LED is amber when there is a POST failure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 120 Interface and Hardware Component Additional References What to do next Proceed to manage or configure your switch using the Ethernet management port. Refer to the Network Management Configuration Guide (Catalyst 3650 Switches). Additional References Related Documents Related Topic Document Title Bootloader configuration System Management Configuration Guide (Catalyst 3650 Switches) Bootloader commands System Management Command Reference (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 121 Feature Information for Ethernet Management Ports Interface and Hardware Component Feature Information for Ethernet Management Ports Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 122 8 C H A P T E R Configuring LLDP, LLDP-MED, and Wired Location Service · Finding Feature Information, on page 123 · LLDP, LLDP-MED, and Wired Location Service Overview, on page 123 · How to Configure LLDP, LLDP-MED, and Wired Location Service, on page 127 · Configuration Examples for LLDP, LLDP-MED, and Wired Location Service, on page 138 · Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service, on page 138 · Additional References for LLDP, LLDP-MED, and Wired Location Service, on page 140 · Feature Information for LLDP, LLDP-MED, and Wired Location Service, on page 140 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. LLDP, LLDP-MED, and Wired Location Service Overview LLDP The Cisco Discovery Protocol (CDP) is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches). CDP allows network management applications to automatically discover and learn about other Cisco devices connected to the network. To support non-Cisco devices and to allow for interoperability between other devices, the switch supports the IEEE 802.1AB Link Layer Discovery Protocol (LLDP). LLDP is a neighbor discovery protocol that is used for network devices to advertise information about themselves to other devices on the network. This protocol runs over the data-link layer, which allows two systems running different network layer protocols to learn about each other. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 123 LLDP Supported TLVs Interface and Hardware Component LLDP Supported TLVs LLDP supports a set of attributes that it uses to discover neighbor devices. These attributes contain type, length, and value descriptions and are referred to as TLVs. LLDP supported devices can use TLVs to receive and send information to their neighbors. This protocol can advertise details such as configuration information, device capabilities, and device identity. The switch supports these basic management TLVs. These are mandatory LLDP TLVs. · Port description TLV · System name TLV · System description TLV · System capabilities TLV · Management address TLV These organizationally specific LLDP TLVs are also advertised to support LLDP-MED. · Port VLAN ID TLV (IEEE 802.1 organizationally specific TLVs) · MAC/PHY configuration/status TLV (IEEE 802.3 organizationally specific TLVs) LLDP and Cisco Switch Stacks A switch stack appears as a single switch in the network. Therefore, LLDP discovers the switch stack, not the individual stack members. LLDP and Cisco Medianet When you configure LLDP or CDP location information on a per-port basis, remote devices can send Cisco Medianet location information to the switch. For information, go to http://www.cisco.com/en/US/docs/ios/netmgmt/configuration/guide/nm_cdp_discover.html. LLDP-MED LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint devices such as IP phones and network devices such as switches. It specifically provides support for voice over IP (VoIP) applications and provides additional TLVs for capabilities discovery, network policy, Power over Ethernet, inventory management and location information. By default, all LLDP-MED TLVs are enabled. LLDP-MED Supported TLVs LLDP-MED supports these TLVs: · LLDP-MED capabilities TLV Allows LLDP-MED endpoints to determine the capabilities that the connected device supports and has enabled. · Network policy TLV Allows both network connectivity devices and endpoints to advertise VLAN configurations and associated Layer 2 and Layer 3 attributes for the specific application on that port. For example, the switch can notify Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 124 Interface and Hardware Component LLDP-MED Supported TLVs a phone of the VLAN number that it should use. The phone can connect to any switch, obtain its VLAN number, and then start communicating with the call control. By defining a network-policy profile TLV, you can create a profile for voice and voice-signaling by specifying the values for VLAN, class of service (CoS), differentiated services code point (DSCP), and tagging mode. These profile attributes are then maintained centrally on the switch and propagated to the phone. · Power management TLV Enables advanced power management between LLDP-MED endpoint and network connectivity devices. Allows switches and phones to convey power information, such as how the device is powered, power priority, and how much power the device needs. LLDP-MED also supports an extended power TLV to advertise fine-grained power requirements, end-point power priority, and end-point and network connectivity-device power status. LLDP is enabled and power is applied to a port, the power TLV determines the actual power requirement of the endpoint device so that the system power budget can be adjusted accordingly. The switch processes the requests and either grants or denies power based on the current power budget. If the request is granted, the switch updates the power budget. If the request is denied, the switch turns off power to the port, generates a syslog message, and updates the power budget. If LLDP-MED is disabled or if the endpoint does not support the LLDP-MED power TLV, the initial allocation value is used throughout the duration of the connection. You can change power settings by entering the power inline {auto [max max-wattage] | never | static [max max-wattage]} interface configuration command. By default the PoE interface is in auto mode; If no value is specified, the maximum is allowed (30 W). · Inventory management TLV Allows an endpoint to send detailed inventory information about itself to the switch, including information hardware revision, firmware version, software version, serial number, manufacturer name, model name, and asset ID TLV. · Location TLV Provides location information from the switch to the endpoint device. The location TLV can send this information: · Civic location information Provides the civic address information and postal information. Examples of civic location information are street address, road name, and postal community name information. · ELIN location information Provides the location information of a caller. The location is determined by the Emergency location identifier number (ELIN), which is a phone number that routes an emergency call to the local public safety answering point (PSAP) and which the PSAP can use to call back the emergency caller. · Geographic location information Provides the geographical details of a switch location such as latitude, longitude, and altitude of a switch. · custom location Provides customized name and value of a switch location. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 125 Wired Location Service Interface and Hardware Component Wired Location Service The switch uses the location service feature to send location and attachment tracking information for its connected devices to a Cisco Mobility Services Engine (MSE). The tracked device can be a wireless endpoint, a wired endpoint, or a wired switch or controller. The switch notifies the MSE of device link up and link down events through the Network Mobility Services Protocol (NMSP) location and attachment notifications. The MSE starts the NMSP connection to the switch, which opens a server port. When the MSE connects to the switch there are a set of message exchanges to establish version compatibility and service exchange information followed by location information synchronization. After connection, the switch periodically sends location and attachment notifications to the MSE. Any link up or link down events detected during an interval are aggregated and sent at the end of the interval. When the switch determines the presence or absence of a device on a link-up or link-down event, it obtains the client-specific information such as the MAC address, IP address, and username. If the client is LLDP-MEDor CDP-capable, the switch obtains the serial number and UDI through the LLDP-MED location TLV or CDP. Depending on the device capabilities, the switch obtains this client information at link up: · Slot and port specified in port connection · MAC address specified in the client MAC address · IP address specified in port connection · 802.1X username if applicable · Device category is specified as a wired station · State is specified as new · Serial number, UDI · Model number · Time in seconds since the switch detected the association Depending on the device capabilities, the switch obtains this client information at link down: · Slot and port that was disconnected · MAC address · IP address · 802.1X username if applicable · Device category is specified as a wired station · State is specified as delete · Serial number, UDI · Time in seconds since the switch detected the disassociation When the switch shuts down, it sends an attachment notification with the state delete and the IP address before closing the NMSP connection to the MSE. The MSE interprets this notification as disassociation for all the wired clients associated with the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 126 Interface and Hardware Component Default LLDP Configuration If you change a location address on the switch, the switch sends an NMSP location notification message that identifies the affected ports and the changed address information. Default LLDP Configuration Table 15: Default LLDP Configuration Feature LLDP global state LLDP holdtime (before discarding) LLDP timer (packet update frequency) LLDP reinitialization delay LLDP tlv-select LLDP interface state LLDP receive LLDP transmit LLDP med-tlv-select Default Setting Disabled 120 seconds 30 seconds 2 seconds Disabled to send and receive all TLVs Disabled Disabled Disabled Disabled to send all LLDP-MED TLVs. When LLDP is globally enabled, LLDP-MED-TLV is also enabled. Configuration Guidelines · If the interface is configured as a tunnel port, LLDP is automatically disabled. · If you first configure a network-policy profile on an interface, you cannot apply the switchport voice vlan command on the interface. If the switchport voice vlan vlan-id is already configured on an interface, you can apply a network-policy profile on the interface. This way the interface has the voice or voice-signaling VLAN network-policy profile applied on the interface. · You cannot configure static secure MAC addresses on an interface that has a network-policy profile. · You cannot configure a network-policy profile on a private-VLAN port. · For wired location to function, you must first enter the ip device tracking global configuration command. How to Configure LLDP, LLDP-MED, and Wired Location Service Enabling LLDP Beginning in privileged EXEC mode, follow these steps to enable LLDP: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 127 Enabling LLDP Interface and Hardware Component SUMMARY STEPS 1. configure terminal 2. lldp run 3. interface interface-id 4. lldp transmit 5. lldp receive 6. end 7. show lldp 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 lldp run Example: Switch (config)# lldp run Step 3 interface interface-id Example: Switch (config)# interface gigabitethernet2/0/1 Step 4 lldp transmit Example: Switch(config-if)# lldp transmit Step 5 lldp receive Example: Switch(config-if)# lldp receive Step 6 end Example: Switch(config-if)# end Purpose Enters global configuration mode. Enables LLDP globally on the switch. Specifies the interface on which you are enabling LLDP, and enter interface configuration mode. Enables the interface to send LLDP packets. Enables the interface to receive LLDP packets. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 128 Interface and Hardware Component Configuring LLDP Characteristics Step 7 Command or Action show lldp Example: Switch# show lldp Step 8 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies the configuration. (Optional) Saves your entries in the configuration file. Configuring LLDP Characteristics You can configure the frequency of LLDP updates, the amount of time to hold the information before discarding it, and the initialization delay time. You can also select the LLDP and LLDP-MED TLVs to send and receive. Beginning in privileged EXEC mode, follow these steps to configure the LLDP characteristics. Note Steps 2 through 5 are optional and can be performed in any order. SUMMARY STEPS 1. configure terminal 2. lldp holdtime seconds 3. lldp reinit delay 4. lldp timer rate 5. lldp tlv-select 6. interface interface-id 7. lldp med-tlv-select 8. end 9. show lldp 10. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 129 Configuring LLDP Characteristics Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action lldp holdtime seconds Example: Switch(config)# lldp holdtime 120 lldp reinit delay Example: Switch(config)# lldp reinit 2 lldp timer rate Example: Switch(config)# lldp timer 30 lldp tlv-select Example: Switch(config)# tlv-select interface interface-id Example: Switch (config)# interface gigabitethernet2/0/1 lldp med-tlv-select Example: Switch (config-if)# lldp med-tlv-select inventory management end Example: Switch (config-if)# end show lldp Example: Switch# show lldp Interface and Hardware Component Purpose (Optional) Specifies the amount of time a receiving device should hold the information from your device before discarding it. The range is 0 to 65535 seconds; the default is 120 seconds. (Optional) Specifies the delay time in seconds for LLDP to initialize on an interface. The range is 2 to 5 seconds; the default is 2 seconds. (Optional) Sets the sending frequency of LLDP updates in seconds. The range is 5 to 65534 seconds; the default is 30 seconds. (Optional) Specifies the LLDP TLVs to send or receive. Specifies the interface on which you are enabling LLDP, and enter interface configuration mode. (Optional) Specifies the LLDP-MED TLVs to send or receive. Returns to privileged EXEC mode. Verifies the configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 130 Interface and Hardware Component Configuring LLDP-MED TLVs Step 10 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Configuring LLDP-MED TLVs By default, the switch only sends LLDP packets until it receives LLDP-MED packets from the end device. It then sends LLDP packets with MED TLVs, as well. When the LLDP-MED entry has been aged out, it again only sends LLDP packets. By using the lldp interface configuration command, you can configure the interface not to send the TLVs listed in the following table. Table 16: LLDP-MED TLVs LLDP-MED TLV inventory-management location network-policy power-management Description LLDP-MED inventory management TLV LLDP-MED location TLV LLDP-MED network policy TLV LLDP-MED power management TLV Beginning in privileged EXEC mode, follow these steps to enable a TLV on an interface: SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. lldp med-tlv-select 4. end 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 131 Configuring Network-Policy TLV Interface and Hardware Component Step 2 Command or Action interface interface-id Example: Switch(config)# interface gigabitethernet2/0/1 Step 3 lldp med-tlv-select Example: Switch(config-if)# lldp med-tlv-select inventory management Step 4 end Example: Switch(config-if)# end Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Specifies the interface on which you are configuring an LLDP-MED TLV, and enter interface configuration mode. Specifies the TLV to enable. Returns to privileged EXEC mode. (Optional) Saves your entries in the configuration file. Configuring Network-Policy TLV Beginning in privileged EXEC mode, follow these steps to create a network-policy profile, configure the policy attributes, and apply it to an interface. SUMMARY STEPS 1. configure terminal 2. network-policy profile profile number 3. {voice | voice-signaling} vlan [vlan-id {cos cvalue | dscp dvalue}] | [[dot1p {cos cvalue | dscp dvalue}] | none | untagged] 4. exit 5. interface interface-id 6. network-policy profile number 7. lldp med-tlv-select network-policy 8. end 9. show network-policy profile 10. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 132 Interface and Hardware Component Configuring Network-Policy TLV DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 network-policy profile profile number Example: Switch(config)# network-policy profile 1 Specifies the network-policy profile number, and enter network-policy configuration mode. The range is 1 to 4294967295. Step 3 Step 4 {voice | voice-signaling} vlan [vlan-id {cos cvalue | dscp Configures the policy attributes: dvalue}] | [[dot1p {cos cvalue | dscp dvalue}] | none | untagged] · voice--Specifies the voice application type. Example: · voice-signaling--Specifies the voice-signaling application type. Switch(config-network-policy)# voice vlan 100 cos 4 · vlan--Specifies the native VLAN for voice traffic. · vlan-id--(Optional) Specifies the VLAN for voice traffic. The range is 1 to 4094. · cos cvalue--(Optional) Specifies the Layer 2 priority class of service (CoS) for the configured VLAN. The range is 0 to 7; the default is 5. · dscp dvalue--(Optional) Specifies the differentiated services code point (DSCP) value for the configured VLAN. The range is 0 to 63; the default is 46. · dot1p--(Optional) Configures the telephone to use IEEE 802.1p priority tagging and use VLAN 0 (the native VLAN). · none--(Optional) Do not instruct the IP telephone about the voice VLAN. The telephone uses the configuration from the telephone key pad. · untagged--(Optional) Configures the telephone to send untagged voice traffic. This is the default for the telephone. · untagged--(Optional) Configures the telephone to send untagged voice traffic. This is the default for the telephone. exit Example: Returns to global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 133 Configuring Location TLV and Wired Location Service Interface and Hardware Component Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Switch(config)# exit Purpose interface interface-id Example: Specifies the interface on which you are configuring a network-policy profile, and enter interface configuration mode. Switch (config)# interface gigabitethernet2/0/1 network-policy profile number Example: Switch(config-if)# network-policy 1 Specifies the network-policy profile number. lldp med-tlv-select network-policy Example: Switch(config-if)# lldp med-tlv-select network-policy Specifies the network-policy TLV. end Example: Switch(config)# end Returns to privileged EXEC mode. show network-policy profile Example: Switch# show network-policy profile Verifies the configuration. copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring Location TLV and Wired Location Service Beginning in privileged EXEC mode, follow these steps to configure location information for an endpoint and to apply it to an interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 134 Interface and Hardware Component Configuring Location TLV and Wired Location Service SUMMARY STEPS 1. configure terminal 2. location {admin-tag string | civic-location identifier {id | host} | elin-location string identifier id | custom-location identifier {id | host} | geo-location identifier {id | host}} 3. exit 4. interface interface-id 5. location {additional-location-information word | civic-location-id {id | host} | elin-location-id id | custom-location-id {id | host} | geo-location-id {id | host} } 6. end 7. Use one of the following: · show location admin-tag string · show location civic-location identifier id · show location elin-location identifier id 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 location {admin-tag string | civic-location identifier {id Specifies the location information for an endpoint. | host} | elin-location string identifier id | custom-location identifier {id | host} | geo-location identifier {id | host}} · admin-tag--Specifies an administrative tag or site information. Example: · civic-location--Specifies civic location information. Switch(config)# location civic-location identifier 1 Switch(config-civic)# number 3550 Switch(config-civic)# primary-road-name "Cisco Way" Switch(config-civic)# city "San Jose" Switch(config-civic)# state CA Switch(config-civic)# building 19 Switch(config-civic)# room C6 Switch(config-civic)# county "Santa Clara" Switch(config-civic)# country US · elin-location--Specifies emergency location information (ELIN). · custom-location--Specifies custom location information. · geo-location--Specifies geo-spatial location information. · identifier id--Specifies the ID for the civic, ELIN, custom, or geo location. · host--Specifies the host civic, custom, or geo location. · string--Specifies the site or location information in alphanumeric format. exit Example: Returns to global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 135 Configuring Location TLV and Wired Location Service Interface and Hardware Component Command or Action Switch(config-civic)# exit Purpose Step 4 interface interface-id Example: Specifies the interface on which you are configuring the location information, and enter interface configuration mode. Switch (config)# interface gigabitethernet2/0/1 Step 5 Step 6 location {additional-location-information word | Enters location information for an interface: civic-location-id {id | host} | elin-location-id id | custom-location-id {id | host} | geo-location-id {id | host} } · additional-location-information--Specifies additional information for a location or place. Example: · civic-location-id--Specifies global civic location information for an interface. Switch(config-if)# location elin-location-id 1 · elin-location-id--Specifies emergency location information for an interface. · custom-location-id--Specifies custom location information for an interface. · geo-location-id--Specifies geo-spatial location information for an interface. · host--Specifies the host location identifier. · word--Specifies a word or phrase with additional location information. · id--Specifies the ID for the civic, ELIN, custom, or geo location. The ID range is 1 to 4095. end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 7 Use one of the following: · show location admin-tag string · show location civic-location identifier id · show location elin-location identifier id Example: Switch# show location admin-tag or Verifies the configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 136 Interface and Hardware Component Enabling Wired Location Service on the Switch Command or Action Switch# show location civic-location identifier or Switch# show location elin-location identifier Step 8 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Enabling Wired Location Service on the Switch Beginning in privileged EXEC mode, follow these steps to enable wired location service on the switch. SUMMARY STEPS 1. configure terminal 2. nmsp notification interval {attachment | location} interval-seconds 3. end 4. show network-policy profile 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 nmsp notification interval {attachment | location} interval-seconds Example: Specifies the NMSP notification interval. attachment--Specifies the attachment notification interval. location--Specifies the location notification interval. Switch(config)# nmsp notification interval location interval-seconds--Duration in seconds before the switch 10 sends the MSE the location or attachment updates. The range is 1 to 30; the default is 30. end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 137 Configuration Examples for LLDP, LLDP-MED, and Wired Location Service Interface and Hardware Component Command or Action Switch(config)# end Step 4 show network-policy profile Example: Switch# show network-policy profile Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies the configuration. (Optional) Saves your entries in the configuration file. Configuration Examples for LLDP, LLDP-MED, and Wired Location Service Configuring Network-Policy TLV: Examples This example shows how to configure VLAN 100 for voice application with CoS and to enable the network-policy profile and network-policy TLV on an interface: Switch# configure terminal Switch(config)# network-policy 1 Switch(config-network-policy)# voice vlan 100 cos 4 Switch(config-network-policy)# exit Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# network-policy profile 1 Switch(config-if)# lldp med-tlv-select network-policy This example shows how to configure the voice application type for the native VLAN with priority tagging: Switchconfig-network-policy)# voice vlan dot1p cos 4 Switchconfig-network-policy)# voice vlan dot1p dscp 34 Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service Commands for monitoring and maintaining LLDP, LLDP-MED, and wired location service. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 138 Interface and Hardware Component Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service Command clear lldp counters clear lldp table clear nmsp statistics show lldp show lldp entry entry-name show lldp interface [interface-id] show lldp neighbors [interface-id] [detail] show lldp traffic show location admin-tag string show location civic-location identifier id show location elin-location identifier id show network-policy profile show nmsp Description Resets the traffic counters to zero. Deletes the LLDP neighbor information table. Clears the NMSP statistic counters. Displays global information, such as frequency of transmissions, the holdtime for packets being sent, and the delay time before LLDP initializes on an interface. Displays information about a specific neighbor. You can enter an asterisk (*) to display all neighbors, or you can enter the neighbor name. Displays information about interfaces with LLDP enabled. You can limit the display to a specific interface. Displays information about neighbors, including device type, interface type and number, holdtime settings, capabilities, and port ID. You can limit the display to neighbors of a specific interface or expand the display for more detailed information. Displays LLDP counters, including the number of packets sent and received, number of packets discarded, and number of unrecognized TLVs. Displays the location information for the specified administrative tag or site. Displays the location information for a specific global civic location. Displays the location information for an emergency location Displays the configured network-policy profiles. Displays the NMSP information Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 139 Additional References for LLDP, LLDP-MED, and Wired Location Service Interface and Hardware Component Additional References for LLDP, LLDP-MED, and Wired Location Service Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for LLDP, LLDP-MED, and Wired Location Service Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 140 9 C H A P T E R Configuring System MTU · Configuring System MTU, on page 141 Configuring System MTU This module describes how to configure the Maximum Transmission Unit for a system on Catalyst 3650 Series Switches and Catalyst 3850 Series Switches. Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information about the MTU The default maximum transmission unit (MTU) size for frames received and sent on all switch interfaces is 1500 bytes. Restrictions for System MTU When configuring the system MTU values, follow these guidelines: · The switch does not support the MTU on a per-interface basis. · If you enter the system mtu bytes global configuration command, the command does not take effect on the switch. This command only affects the system MTU size on Fast Ethernet switch ports. System MTU Value Application In a switch stack, the MTU values applied to member switches depends upon the stack configuration. The following stack configurations are supported: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 141 Configuring the System MTU Interface and Hardware Component The upper limit of the IP or IPv6 MTU value is based on the switch or switch stack configuration and refers to the currently applied system MTU or the system jumbo MTU value. For more information about setting the MTU sizes, see the system mtu global configuration command in the command reference for this release. Configuring the System MTU Configuring the System MTU SUMMARY STEPS 1. enable 2. configure terminal 3. system mtu bytes 4. exit 5. show system mtu DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 system mtu bytes Example: Switch(config)# system mtu 1600 Step 4 Step 5 exit Example: Switch(config)# exit show system mtu Example: Switch# show system mtu Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters global configuration mode. Applies the Maximum Transmission Unit (MTU) size for all Ethernet interfaces on the switch or the switch stack. · The MTU range is from 1500 to 9198. The default is 1500. Exits global configuration mode and returns to privileged EXEC mode. Displays the configured global MTU size. Configuring Protocol-Specific MTU When system MTU changes, the range for the ip mtu command for interface also changes. SUMMARY STEPS 1. enable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 142 Interface and Hardware Component Configuration Examples for System MTU 2. configure terminal 3. interface type number 4. ip mtu bytes 5. ipv6 mtu bytes 6. end 7. show system mtu DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 interface type number Example: Switch(config)# interface gigabitethernet 0/0 Step 4 ip mtu bytes Example: Switch(config-if)# ip mtu 900 Step 5 Step 6 Step 7 ipv6 mtu bytes Example: Switch(config-if)# ipv6 mtu 1300 end Example: Switch(config-if)# end show system mtu Example: Switch# show system mtu Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters global configuration mode. Configures an interface and enters interface configuration mode. Sets the maximum transmission unit (MTU) size of IP packets sent on an interface. · The range is from 832 to 1500. Set the MTU size of IPv6 packets sent on an interface. · The range is from 1280 to 1500. Exits interface configuration mode and returns to privileged EXEC mode. Displays the configured global MTU size. Configuration Examples for System MTU Example: Configuring the System MTU Switch# configure terminal Switch(config)# system mtu 1600 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 143 Example: Configuring Protocol-Specific MTU Interface and Hardware Component Switch(config)# exit Example: Configuring Protocol-Specific MTU Switch# configure terminal Switch(config)# interface gigabitethernet 0/0 Switch(config-if)# ip mtu 900 Switch(config-if)# ipv6 mtu 1286 Switch(config-if)# end Additional References for System MTU Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 144 Interface and Hardware Component Feature Information for System MTU Feature Information for System MTU Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 145 Feature Information for System MTU Interface and Hardware Component Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 146 1 0 C H A P T E R Configuring Internal Power Supplies · Information About Internal Power Supplies , on page 147 · How to Configure Internal Power Supplies, on page 147 · Monitoring Internal Power Supplies, on page 148 · Configuration Examples for Internal Power Supplies, on page 148 · Additional References, on page 149 · Feature History and Information for Internal Power Supplies, on page 150 Information About Internal Power Supplies See the switch installation guide for information about the power supplies. How to Configure Internal Power Supplies Configuring an Internal Power Supply You can use the power supply EXEC command to configure and manage the internal power supply on the switch. The switch does not support the no power supply EXEC command. SUMMARY STEPS 1. power supply switch_number slot{A | B} { off | on } 2. show environment power DETAILED STEPS Step 1 Command or Action power supply switch_number slot{A | B} { off | on } Example: Switch# power supply 1 slot A on Purpose Sets the specified power supply to off or on by using one of these keywords: · A --Selects the power supply in slot A. · B --Selects power supply in slot B. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 147 Monitoring Internal Power Supplies Interface and Hardware Component Command or Action Step 2 show environment power Example: Switch# show environment power Purpose Note Power supply slot B is the closest to the outer edge of the switch. · off --Set the power supply off. · on --Set the power supply on. By default, the switch power supply is on. Verifies your settings. Monitoring Internal Power Supplies Table 17: Show Commands for Power Supplies Command Purpose show environment power [ all | switch switch_number ] (Optional) Displays the status of the internal power supplies for each switch in the stack or for the specified switch. The range is 1 to 9, depending on the switch member numbers in the stack. The switch keywords are available only on stacking-capable switches. Configuration Examples for Internal Power Supplies This example shows how to set the power supply in slot A to off: Switch# power supply 1 slot A off Disabling Power supply A may result in a power loss to PoE devices and/or switches ... Continue? (yes/[no]): yes Switch# Jun 10 04:52:54.389: %PLATFORM_ENV-6-FRU_PS_OIR: FRU Power Supply 1 powered off Jun 10 04:52:56.717: %PLATFORM_ENV-1-FAN_NOT_PRESENT: Fan is not present Switch# This example shows how to set the power supply in slot A to on: Switch# power supply 1 slot A on Jun 10 04:54:39.600: %PLATFORM_ENV-6-FRU_PS_OIR: FRU Power Supply 1 powered on This example shows the output of the show env power command: Switch# show env power Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 148 Interface and Hardware Component Additional References SW PID --- -----------------1A PWR-C2-640WAC 1B Not Present Serial# Status ---------- --------------- DCB1705B05B OK Sys Pwr ------Good PoE Pwr ------Good Watts ----640 Switch# Table 18: show env power Status Descriptions Field OK Not Present No Input Power Disabled Not Responding Failure-Fan Description The power supply is present and power is good. No power supply is installed. The power supply is present but there is no input power. The power supply and input power are present, but power supply is switched off by CLI. The power supply is not recognizable or is faulty. The power supply fan is faulty. Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 149 Feature History and Information for Internal Power Supplies Interface and Hardware Component Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Internal Power Supplies Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 150 1 1 C H A P T E R Configuring PoE · Finding Feature Information, on page 151 · Information about PoE, on page 151 · How to Configure PoE, on page 156 · Monitoring Power Status, on page 159 · Additional References, on page 160 · Feature Information for PoE, on page 160 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information about PoE Power over Ethernet Ports A PoE-capable switch port automatically supplies power to one of these connected devices if the switch senses that there is no power on the circuit: · a Cisco pre-standard powered device (such as a Cisco IP Phone or a Cisco Aironet Access Point) · an IEEE 802.3af-compliant powered device · an IEEE 802.3at-compliant powered device A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power source. The device does not receive redundant power when it is only connected to the PoE port. After the switch detects a powered device, the switch determines the device power requirements and then grants or denies power to the device. The switch can also sense the real-time power consumption of the device by monitoring and policing the power usage. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 151 Supported Protocols and Standards Interface and Hardware Component Supported Protocols and Standards The switch uses these protocols and standards to support PoE: · CDP with power consumption--The powered device notifies the switch of the amount of power it is consuming. The switch does not reply to the power-consumption messages. The switch can only supply power to or remove power from the PoE port. · Cisco intelligent power management--The powered device and the switch negotiate through power-negotiation CDP messages for an agreed-upon power-consumption level. The negotiation allows a high-power Cisco powered device, which consumes more than 7 W, to operate at its highest power mode. The powered device first boots up in low-power mode, consumes less than 7 W, and negotiates to obtain enough power to operate in high-power mode. The device changes to high-power mode only when it receives confirmation from the switch. High-power devices can operate in low-power mode on switches that do not support power-negotiation CDP. Cisco intelligent power management is backward-compatible with CDP with power consumption; the switch responds according to the CDP message that it receives. CDP is not supported on third-party powered devices; therefore, the switch uses the IEEE classification to determine the power usage of the device. · IEEE 802.3af--The major features of this standard are powered-device discovery, power administration, disconnect detection, and optional powered-device power classification. For more information, see the standard. · IEEE 802.3at--The PoE+ standard increases the maximum power that can be drawn by a powered device from 15.4 W per port to 30 W per port. Powered-Device Detection and Initial Power Allocation The switch detects a Cisco pre-standard or an IEEE-compliant powered device when the PoE-capable port is in the no-shutdown state, PoE is enabled (the default), and the connected device is not being powered by an AC adaptor. After device detection, the switch determines the device power requirements based on its type: · A Cisco prestandard powered device does not provide its power requirement when the switch detects it, so the switch allocates 15.4 W as the initial allocation for power budgeting. The initial power allocation is the maximum amount of power that a powered device requires. The switch initially allocates this amount of power when it detects and powers the powered device. As the switch receives CDP messages from the powered device and as the powered device negotiates power levels with the switch through CDP power-negotiation messages, the initial power allocation might be adjusted. · The switch classifies the detected IEEE device within a power consumption class. Based on the available power in the power budget, the switch determines if a port can be powered. Table 19: IEEE Power Classifications, on page 152 lists these levels. Table 19: IEEE Power Classifications Class Maximum Power Level Required from the Switch 0 (class status unknown) 15.4 W Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 152 Interface and Hardware Component Power Management Modes Class 1 2 3 4 Maximum Power Level Required from the Switch 4W 7W 15.4 W 30 W (For IEEE 802.3at Type 2 powered devices) The switch monitors and tracks requests for power and grants power only when it is available. The switch tracks its power budget (the amount of power available on the switch for PoE). The switch performs power-accounting calculations when a port is granted or denied power to keep the power budget up to date. After power is applied to the port, the switch uses CDP to determine the CDP-specific power consumption requirement of the connected Cisco powered devices, which is the amount of power to allocate based on the CDP messages. The switch adjusts the power budget accordingly. This does not apply to third-party PoE devices. The switch processes a request and either grants or denies power. If the request is granted, the switch updates the power budget. If the request is denied, the switch ensures that power to the port is turned off, generates a syslog message, and updates the LEDs. Powered devices can also negotiate with the switch for more power. With PoE+, powered devices use IEEE 802.3at and LLDP power with media dependent interface (MDI) type, length, and value descriptions (TLVs), Power-via-MDI TLVs, for negotiating power up to 30 W. Cisco pre-standard devices and Cisco IEEE powered devices can use CDP or the IEEE 802.3at power-via-MDI power negotiation mechanism to request power levels up to 30 W. Note The initial allocation for Class 0, Class 3, and Class 4 powered devices is 15.4 W. When a device starts up and uses CDP or LLDP to send a request for more than 15.4 W, it can be allocated up to the maximum of 30 W. Note The CDP-specific power consumption requirement is referred to as the actual power consumption requirement in the software configuration guides and command references. If the switch detects a fault caused by an undervoltage, overvoltage, overtemperature, oscillator-fault, or short-circuit condition, it turns off power to the port, generates a syslog message, and updates the power budget and LEDs. The PoE feature operates the same whether or not the switch is a stack member. The power budget is per-switch and independent of any other switch in the stack. Election of a new active switch does not affect PoE operation. The active switch keeps track of the PoE status for all switches and ports in the stack and includes the status in output displays. Power Management Modes The switch supports these PoE modes: · auto--The switch automatically detects if the connected device requires power. If the switch discovers a powered device connected to the port and if the switch has enough power, it grants power, updates the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 153 Power Management Modes Interface and Hardware Component power budget, turns on power to the port on a first-come, first-served basis, and updates the LEDs. For LED information, see the hardware installation guide. If the switch has enough power for all the powered devices, they all come up. If enough power is available for all powered devices connected to the switch, power is turned on to all devices. If there is not enough available PoE, or if a device is disconnected and reconnected while other devices are waiting for power, it cannot be determined which devices are granted or are denied power. If granting power would exceed the system power budget, the switch denies power, ensures that power to the port is turned off, generates a syslog message, and updates the LEDs. After power has been denied, the switch periodically rechecks the power budget and continues to attempt to grant the request for power. If a device being powered by the switch is then connected to wall power, the switch might continue to power the device. The switch might continue to report that it is still powering the device whether the device is being powered by the switch or receiving power from an AC power source. If a powered device is removed, the switch automatically detects the disconnect and removes power from the port. You can connect a nonpowered device without damaging it. You can specify the maximum wattage that is allowed on the port. If the IEEE class maximum wattage of the powered device is greater than the configured maximum value, the switch does not provide power to the port. If the switch powers a powered device, but the powered device later requests through CDP messages more than the configured maximum value, the switch removes power to the port. The power that was allocated to the powered device is reclaimed into the global power budget. If you do not specify a wattage, the switch delivers the maximum value. Use the auto setting on any PoE port. The auto mode is the default setting. · static--The switch pre-allocates power to the port (even when no powered device is connected) and guarantees that power will be available for the port. The switch allocates the port configured maximum wattage, and the amount is never adjusted through the IEEE class or by CDP messages from the powered device. Because power is pre-allocated, any powered device that uses less than or equal to the maximum wattage is guaranteed to be powered when it is connected to the static port. The port no longer participates in the first-come, first-served model. However, if the powered-device IEEE class is greater than the maximum wattage, the switch does not supply power to it. If the switch learns through CDP messages that the powered device is consuming more than the maximum wattage, the switch shuts down the powered device. If you do not specify a wattage, the switch pre-allocates the maximum value. The switch powers the port only if it discovers a powered device. Use the static setting on a high-priority interface. · never--The switch disables powered-device detection and never powers the PoE port even if an unpowered device is connected. Use this mode only when you want to make sure that power is never applied to a PoE-capable port, making the port a data-only port. For most situations, the default configuration (auto mode) works well, providing plug-and-play operation. No further configuration is required. However, perform this task to configure a PoE port for a higher priority, to make it data only, or to specify a maximum wattage to disallow high-power powered devices on a port. When you make PoE configuration changes, the port being configured drops power. Depending on the new configuration, the state of the other PoE ports, and the state of the power budget, the port might not be powered up again. For example, port 1 is in the auto and on state, and you configure it for static mode. The switch removes power from port 1, detects the powered device, and repowers the port. If port 1 is in the auto and on state and you configure it with a maximum wattage of 10 W, the switch removes power from the port and then redetects the powered device. The switch repowers the port only if the powered device is a class 1, class 2, or a Cisco-only powered device. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 154 Interface and Hardware Component Power Monitoring and Power Policing Power Monitoring and Power Policing When policing of the real-time power consumption is enabled, the switch takes action when a powered device consumes more power than the maximum amount allocated, also referred to as the cutoff-power value. When PoE is enabled, the switch senses the real-time power consumption of the powered device. The switch monitors the real-time power consumption of the connected powered device; this is called power monitoring or power sensing. The switch also polices the power usage with the power policing feature. Power monitoring is backward-compatible with Cisco intelligent power management and CDP-based power consumption. It works with these features to ensure that the PoE port can supply power to the powered device. The switch senses the real-time power consumption of the connected device as follows: 1. The switch monitors the real-time power consumption on individual ports. 2. The switch records the power consumption, including peak power usage. The switch reports the information through the CISCO-POWER-ETHERNET-EXT-MIB. 3. If power policing is enabled, the switch polices power usage by comparing the real-time power consumption to the maximum power allocated to the device. The maximum power consumption is also referred to as the cutoff power on a PoE port. If the device uses more than the maximum power allocation on the port, the switch can either turn off power to the port, or the switch can generate a syslog message and update the LEDs (the port LED is now blinking amber) while still providing power to the device based on the switch configuration. By default, power-usage policing is disabled on all PoE ports. If error recovery from the PoE error-disabled state is enabled, the switch automatically takes the PoE port out of the error-disabled state after the specified amount of time. If error recovery is disabled, you can manually re-enable the PoE port by using the shutdown and no shutdown interface configuration commands. 4. If policing is disabled, no action occurs when the powered device consumes more than the maximum power allocation on the PoE port, which could adversely affect the switch. Power Consumption Values You can configure the initial power allocation and the maximum power allocation on a port. However, these values are only the configured values that determine when the switch should turn on or turn off power on the PoE port. The maximum power allocation is not the same as the actual power consumption of the powered device. The actual cutoff power value that the switch uses for power policing is not equal to the configured power value. When power policing is enabled, the switch polices the power usage at the switch port, which is greater than the power consumption of the device. When you are manually set the maximum power allocation, you must consider the power loss over the cable from the switch port to the powered device. The cutoff power is the sum of the rated power consumption of the powered device and the worst-case power loss over the cable. We recommend that you enable power policing when PoE is enabled on your switch. For example, if policing is disabled and you set the cutoff-power value by using the power inline auto max 6300 interface configuration command, the configured maximum power allocation on the PoE port is 6.3 W (6300 mW). The switch provides power to the connected devices on the port if the device needs up to 6.3 W. If the CDP-power negotiated value or the IEEE classification value exceeds the configured cutoff value, the switch does not provide power to the connected device. After the switch turns on power on the PoE port, the switch does not police the real-time power consumption of the device, and the device can consume more power than the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 155 How to Configure PoE Interface and Hardware Component maximum allocated amount, which could adversely affect the switch and the devices connected to the other PoE ports. Because a standalone switch supports internal power supplies, the total amount of power available for the powered devices varies depending on the power supply configuration. · If a power supply is removed and replaced by a new power supply with less power and the switch does not have enough power for the powered devices, the switch denies power to the PoE ports in auto mode in descending order of the port numbers. If the switch still does not have enough power, the switch then denies power to the PoE ports in static mode in descending order of the port numbers. · If the new power supply supports more power than the previous one and the switch now has more power available, the switch grants power to the PoE ports in static mode in ascending order of the port numbers. If it still has power available, the switch then grants power to the PoE ports in auto mode in ascending order of the port numbers. How to Configure PoE Configuring a Power Management Mode on a PoE Port SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. power inline {auto [max max-wattage] | never | static [max max-wattage]} 4. end 5. show power inline [interface-id | module switch-number] DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 interface interface-id Example: Switch(config)# interface gigabitethernet2/0/1 Step 3 power inline {auto [max max-wattage] | never | static [max max-wattage]} Example: Switch(config-if)# power inline auto Purpose Enters global configuration mode. Specifies the physical port to be configured, and enters interface configuration mode. Configures the PoE mode on the port. The keywords have these meanings: · auto--Enables powered-device detection. If enough power is available, automatically allocates power to the PoE port after device detection. This is the default setting. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 156 Interface and Hardware Component Configuring Power Policing Step 4 Step 5 Command or Action Purpose · max max-wattage--Limits the power allowed on the port. The range for PoE+ ports is 4000 to 30000 mW. If no value is specified, the maximum is allowed. · never --Disables device detection, and disable power to the port. Note If a port has a Cisco powered device connected to it, do not use the power inline never command to configure the port. A false link-up can occur, placing the port into the error-disabled state. · static--Enables powered-device detection. Pre-allocate (reserve) power for a port before the switch discovers the powered device. The switch reserves power for this port even when no device is connected and guarantees that power will be provided upon device detection. The switch allocates power to a port configured in static mode before it allocates power to a port configured in auto mode. end Example: Switch(config-if)# end Returns to privileged EXEC mode. show power inline [interface-id | module switch-number] Displays PoE status for a switch or a switch stack, for the Example: specified interface, or for a specified stack member. Switch# show power inline The module switch-number keywords are supported only on stacking-capable switches. Configuring Power Policing By default, the switch monitors the real-time power consumption of connected powered devices. You can configure the switch to police the power usage. By default, policing is disabled. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. power inline police [action{log | errdisable}] 4. exit 5. Use one of the following: · errdisable detect cause inline-power · errdisable recovery cause inline-power Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 157 Configuring Power Policing Interface and Hardware Component · errdisable recovery interval interval 6. exit 7. Use one of the following: · show power inline police · show errdisable recovery DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 interface interface-id Example: Switch(config)# interface gigabitethernet2/0/1 Step 3 power inline police [action{log | errdisable}] Example: Switch(config-if)# power inline police Purpose Enters global configuration mode. Specifies the physical port to be configured, and enter interface configuration mode. If the real-time power consumption exceeds the maximum power allocation on the port, configures the switch to take one of these actions: · power inline police--Shuts down the PoE port, turns off power to it, and puts it in the error-disabled state. Note You can enable error detection for the PoE error-disabled cause by using the errdisable detect cause inline-power global configuration command. You can also enable the timer to recover from the PoE error-disabled state by using the errdisable recovery cause inline-power interval interval global configuration command. · power inline police action errdisable--Turns off power to the port if the real-time power consumption exceeds the maximum power allocation on the port. · power inline police action log--Generates a syslog message while still providing power to the port. Step 4 exit Example: Switch(config-if)# exit If you do not enter the action log keywords, the default action shuts down the port and puts the port in the error-disabled state. Returns to global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 158 Interface and Hardware Component Monitoring Power Status Step 5 Command or Action Use one of the following: · errdisable detect cause inline-power · errdisable recovery cause inline-power · errdisable recovery interval interval Example: Switch(config)# errdisable detect cause inline-power Purpose (Optional) Enables error recovery from the PoE error-disabled state, and configures the PoE recover mechanism variables. By default, the recovery interval is 300 seconds. For interval interval, specifies the time in seconds to recover from the error-disabled state. The range is 30 to 86400. Switch(config)# errdisable recovery cause inline-power Switch(config)# errdisable recovery interval 100 Step 6 Step 7 exit Example: Switch(config)# exit Use one of the following: · show power inline police · show errdisable recovery Example: Switch# show power inline police Switch# show errdisable recovery Returns to privileged EXEC mode. Displays the power monitoring status, and verify the error recovery settings. Monitoring Power Status Table 20: Show Commands for Power Status Command show env power switch [switch-number] show power inline [interface-id | module switch-number] show power inline police Purpose (Optional) Displays the status of the internal power supplies for each switch in the stack or for the specified switch. The range is 1 to 9, depending on the switch member numbers in the stack. These keywords are available only on stacking-capable switches. Displays PoE status for a switch or switch stack, for an interface, or for a specific switch in the stack. Displays the power policing data. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 159 Additional References Interface and Hardware Component Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for PoE Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 160 1 2 C H A P T E R Configuring EEE · Finding Feature Information, on page 161 · Information About EEE, on page 161 · Restrictions for EEE, on page 162 · How to Configure EEE, on page 162 · Monitoring EEE, on page 163 · Configuration Examples for Configuring EEE, on page 163 · Additional References, on page 164 · Feature History and Information for Configuring EEE, on page 164 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About EEE EEE Overview Energy Efficient Ethernet (EEE) is an IEEE 802.3az standard that is designed to reduce power consumption in Ethernet networks during idle periods. EEE can be enabled on devices that support low power idle (LPI) mode. Such devices can save power by entering LPI mode during periods of low utilization. In LPI mode, systems on both ends of the link can save power by shutting down certain services. EEE provides the protocol needed to transition into and out of LPI mode in a way that is transparent to upper layer protocols and applications. Default EEE Configuration EEE is disabled by default. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 161 Restrictions for EEE Interface and Hardware Component Restrictions for EEE EEE has the following restrictions: · Changing the EEE configuration resets the interface because the device has to restart Layer 1 autonegotiation. · You might want to enable the Link Layer Discovery Protocol (LLDP) for devices that require longer wakeup times before they are able to accept data on their receive paths. Doing so enables the device to negotiate for extended system wakeup times from the transmitting link partner. How to Configure EEE You can enable or disable EEE on an interface that is connected to an EEE-capable link partner. Enabling or Disabling EEE SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. power efficient-ethernet auto 4. no power efficient-ethernet auto 5. end 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 interface interface-id Example: Specifies the interface to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 power efficient-ethernet auto Example: Enables EEE on the specified interface. When EEE is enabled, the device advertises and autonegotiates EEE to its link partner. Switch(config-if)# power efficient-ethernet auto Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 162 Interface and Hardware Component Monitoring EEE Step 4 Command or Action no power efficient-ethernet auto Example: Purpose Disables EEE on the specified interface. Switch(config-if)# no power efficient-ethernet auto Step 5 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Monitoring EEE Table 21: Commands for Displaying EEE Settings Command show eee capabilities interface interface-id show eee status interface interface-id Purpose Displays EEE capabilities for the specified interface. Displays EEE status information for the specified interface. Configuration Examples for Configuring EEE This example shows how to enable EEE for an interface: Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# power efficient-ethernet auto This example shows how to disable EEE for an interface: Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# no power efficient-ethernet auto Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 163 Additional References Interface and Hardware Component Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Configuring EEE Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 164 I V P A R T IP Multicast Routing · Configuring IGMP, on page 167 · Configuring Wireless Multicast, on page 221 · Configuring PIM, on page 235 · Configuring SSM, on page 281 · Configuring IP Multicast Routing, on page 297 · Configuring the Service Discovery Gateway, on page 321 1 3 C H A P T E R Configuring IGMP · Finding Feature Information, on page 167 · Restrictions for Configuring IGMP, on page 167 · Information About IGMP, on page 168 · How to Configure IGMP, on page 176 · Monitoring IGMP, on page 212 · Configuration Examples for IGMP, on page 215 · Where to Go Next for IGMP, on page 218 · Additional References, on page 218 · Feature History and Information for IGMP, on page 220 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Configuring IGMP The following are the restrictions for configuring IGMP: · The switch supports IGMP Versions 1, 2 , and 3. Note For IGMP Version 3, only IGMP Version 3 BISS (Basic IGMPv3 Snooping Support) is supported. · IGMP Version 3 uses new membership report messages that might not be correctly recognized by older IGMP snooping switches. · IGMP filtering and throttling is not supported under the WLAN. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 167 Information About IGMP IP Multicast Routing Information About IGMP To participate in IP multicasting, multicast hosts, routers, and multilayer switches must have the Internet Group Management Protocol (IGMP) operating. This protocol defines the querier and host roles: · A querier is a network device that sends query messages to discover which network devices are members of a given multicast group. · A host is a receiver that sends report messages (in response to query messages) to inform a querier of a host membership. A set of queriers and hosts that receive multicast data streams from the same source is called a multicast group. Queriers and hosts use IGMP messages to join and leave multicast groups. Any host, regardless of whether it is a member of a group, can send to a group. However, only the members of a group receive the message. Membership in a multicast group is dynamic; hosts can join and leave at any time. There is no restriction on the location or number of members in a multicast group. A host can be a member of more than one multicast group at a time. How active a multicast group is and what members it has can vary from group to group and from time to time. A multicast group can be active for a long time, or it can be very short-lived. Membership in a group can constantly change. IP Multicast Group Addresses IP multicast traffic uses group addresses, which are class D addresses. The high-order bits of a Class D address are 1110. Therefore, host group addresses can be in the range 224.0.0.0 through 239.255.255.255. Multicast addresses in the range 224.0.0.0 to 224.0.0.255 are reserved for use by routing protocols and other network control traffic. The address 224.0.0.0 is guaranteed not to be assigned to any group. IGMP packets are sent using these IP multicast group addresses: · IGMP general queries are destined to the address 224.0.0.1 (all systems on a subnet). · IGMP group-specific queries are destined to the group IP address for which the switch is querying. · IGMP group membership reports are destined to the group IP address for which the switch is reporting. · IGMP Version 2 (IGMPv2) leave messages are destined to the address 224.0.0.2 (all multicast routers on a subnet). In some old host IP stacks, leave messages might be destined to the group IP address rather than to the all-routers address. Related Topics Configuring the Switch as a Member of a Group (CLI), on page 176 Example: Configuring the Switch as a Member of a Multicast Group, on page 215 IGMP Versions The switch supports IGMP version 1, IGMP version 2, and IGMP version 3. These versions are interoperable on the switch. For example, if IGMP snooping is enabled and the querier's version is IGMPv2, and the switch receives an IGMPv3 report from a host, then the switch can forward the IGMPv3 report to the multicast router. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 168 IP Multicast Routing IGMP Version 1 IGMP Version 1 IGMP version 1 (IGMPv1) primarily uses a query-response model that enables the multicast router and multilayer switch to find which multicast groups are active (have one or more hosts interested in a multicast group) on the local subnet. IGMPv1 has other processes that enable a host to join and leave a multicast group. For more information, see RFC 1112. IGMP Version 2 IGMPv2 extends IGMP functionality by providing such features as the IGMP leave process to reduce leave latency, group-specific queries, and an explicit maximum query response time. IGMPv2 also adds the capability for routers to elect the IGMP querier without depending on the multicast protocol to perform this task. For more information, see RFC 2236. Note IGMP version 2 is the default version for the switch. IGMP Version 3 The switch supports IGMP version 3. The following are considerations for the switch and IGMP version 3: · An IGMPv3 switch supports Basic IGMPv3 Snooping Support (BISS), which includes support for the snooping features on IGMPv1 and IGMPv2 switches and for IGMPv3 membership report messages. BISS constrains the flooding of multicast traffic when your network includes IGMPv3 hosts. It constrains traffic to approximately the same set of ports as the IGMP snooping feature on IGMPv2 or IGMPv1 hosts. · The switch supports IGMPv3 snooping based only on the destination multicast IP address. It does not support snooping based on a source IP address or proxy report. · IGMPv3 join and leave messages are not supported on switches running IGMP filtering or Multicast VLAN registration (MVR). · An IGMPv3 switch can receive messages from and forward messages to a device running the Source Specific Multicast (SSM) feature. IGMPv3 Host Signalling In IGMPv3, hosts signal membership to last hop routers of multicast groups. Hosts can signal group membership with filtering capabilities with respect to sources. A host can either signal that it wants to receive traffic from all sources sending to a group except for some specific sources (called exclude mode), or that it wants to receive traffic only from some specific sources sending to the group (called include mode). IGMPv3 can operate with both Internet Standard Multicast (ISM) and Source Specific Multicast (SSM). In ISM, both exclude and include mode reports are applicable. In SSM, only include mode reports are accepted by the last-hop router. Exclude mode reports are ignored. IGMP Snooping Layer 2 switches can use IGMP snooping to constrain the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast devices. As the name implies, IGMP snooping requires the LAN switch to snoop on the IGMP Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 169 Joining a Multicast Group IP Multicast Routing transmissions between the host and the router and to keep track of multicast groups and member ports. When the switch receives an IGMP report from a host for a particular multicast group, the switch adds the host port number to the forwarding table entry; when it receives an IGMP Leave Group message from a host, it removes the host port from the table entry. It also periodically deletes entries if it does not receive IGMP membership reports from the multicast clients. Note For more information on IP multicast and IGMP, see RFC 1112 and RFC 2236. The multicast router (which could be a switch with the IP services feature set on the active switch) sends out periodic general queries to all VLANs. All hosts interested in this multicast traffic send join requests and are added to the forwarding table entry. The switch creates one entry per VLAN in the IGMP snooping IP multicast forwarding table for each group from which it receives an IGMP join request. The switch supports IP multicast group-based bridging, instead of MAC-addressed based groups. With multicast MAC address-based groups, if an IP address being configured translates (aliases) to a previously configured MAC address or to any reserved multicast MAC addresses (in the range 224.0.0.xxx), the command fails. Because the switch uses IP multicast groups, there are no address aliasing issues. The IP multicast groups learned through IGMP snooping are dynamic. However, you can statically configure multicast groups by using the ip igmp snooping vlan vlan-id static ip_address interface interface-id global configuration command. If you specify group membership for a multicast group address statically, your setting supersedes any automatic manipulation by IGMP snooping. Multicast group membership lists can consist of both user-defined and IGMP snooping-learned settings. You can configure an IGMP snooping querier to support IGMP snooping in subnets without multicast interfaces because the multicast traffic does not need to be routed. If a port spanning-tree, a port group, or a VLAN ID change occurs, the IGMP snooping-learned multicast groups from this port on the VLAN are deleted. Related Topics Enabling or Disabling IGMP Snooping on a Switch (CLI), on page 193 Examples: Configuring IGMP Snooping, on page 216 Joining a Multicast Group Figure 6: Initial IGMP Join Message When a host connected to the switch wants to join an IP multicast group and it is an IGMP version 2 client, it sends an unsolicited IGMP join message, specifying the IP multicast group to join. Alternatively, when the switch receives a general query from the router, it forwards the query to all ports in the VLAN. IGMP version 1 or version 2 hosts wanting to join the multicast group respond by sending a join message to the switch. The switch CPU creates a multicast forwarding-table entry for the group if it is not already present. The CPU also adds the interface where the join message was received to the forwarding-table entry. The host associated with that interface receives multicast traffic for that multicast group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 170 IP Multicast Routing Joining a Multicast Group Router A sends a general query to the switch, which forwards the query to ports 2 through 5, which are all members of the same VLAN. Host 1 wants to join multicast group 224.1.2.3 and multicasts an IGMP membership report (IGMP join message) to the group. The switch CPU uses the information in the IGMP report to set up a forwarding-table entry that includes the port numbers connected to Host 1 and to the router. Table 22: IGMP Snooping Forwarding Table Destination Address 224.1.2.3 Type of Packet IGMP Ports 1, 2 The switch hardware can distinguish IGMP information packets from other packets for the multicast group. The information in the table tells the switching engine to send frames addressed to the 224.1.2.3 multicast IP address that are not IGMP packets to the router and to the host that has joined the group. Figure 7: Second Host Joining a Multicast Group If another host (for example, Host 4) sends an unsolicited IGMP join message for the same group, the CPU receives that message and adds the port number of Host 4 to the forwarding table. Because the forwarding table directs IGMP messages only to the CPU, the message is not flooded to other ports on the switch. Any Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 171 Leaving a Multicast Group known multicast traffic is forwarded to the group and not to the IP Multicast Routing CPU. Table 23: Updated IGMP Snooping Forwarding Table Destination Address 224.1.2.3 Type of Packet IGMP Ports 1, 2, 5 Related Topics Configuring the Switch as a Member of a Group (CLI), on page 176 Example: Configuring the Switch as a Member of a Multicast Group, on page 215 Leaving a Multicast Group The router sends periodic multicast general queries, and the switch forwards these queries through all ports in the VLAN. Interested hosts respond to the queries. If at least one host in the VLAN wants to receive multicast traffic, the router continues forwarding the multicast traffic to the VLAN. The switch forwards multicast group traffic only to those hosts listed in the forwarding table for that IP multicast group maintained by IGMP snooping. When hosts want to leave a multicast group, they can silently leave, or they can send a leave message. When the switch receives a leave message from a host, it sends a group-specific query to learn if any other devices connected to that interface are interested in traffic for the specific multicast group. The switch then updates the forwarding table for that MAC group so that only those hosts interested in receiving multicast traffic for the group are listed in the forwarding table. If the router receives no reports from a VLAN, it removes the group for the VLAN from its IGMP cache. Immediate Leave The switch uses IGMP snooping Immediate Leave to remove from the forwarding table an interface that sends a leave message without the switch sending group-specific queries to the interface. The VLAN interface is pruned from the multicast tree for the multicast group specified in the original leave message. Immediate Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 172 IP Multicast Routing IGMP Configurable-Leave Timer Leave ensures optimal bandwidth management for all hosts on a switched network, even when multiple multicast groups are simultaneously in use. Immediate Leave is only supported on IGMP version 2 hosts. IGMP version 2 is the default version for the switch. Note You should only use the Immediate Leave feature on VLANs where a single host is connected to each port. If Immediate Leave is enabled in VLANs where more than one host is connected to a port, some hosts might inadvertently be dropped. IGMP Configurable-Leave Timer You can configure the time that the switch waits after sending a group-specific query to determine if hosts are still interested in a specific multicast group. The IGMP leave response time can be configured from 100 to 5000 milliseconds. The timer can be set either globally or on a per-VLAN basis. The VLAN configuration of the leave time overrides the global configuration. Related Topics Configuring the IGMP Leave Timer (CLI), on page 200 IGMP Report Suppression Note IGMP report suppression is supported only when the multicast query has IGMPv1 and IGMPv2 reports. This feature is not supported when the query includes IGMPv3 reports. The switch uses IGMP report suppression to forward only one IGMP report per multicast router query to multicast devices. When IGMP report suppression is enabled (the default), the switch sends the first IGMP report from all hosts for a group to all the multicast routers. The switch does not send the remaining IGMP reports for the group to the multicast routers. This feature prevents duplicate reports from being sent to the multicast devices. If the multicast router query includes requests only for IGMPv1 and IGMPv2 reports, the switch forwards only the first IGMPv1 or IGMPv2 report from all hosts for a group to all the multicast routers. If the multicast router query also includes requests for IGMPv3 reports, the switch forwards all IGMPv1, IGMPv2, and IGMPv3 reports for a group to the multicast devices. If you disable IGMP report suppression, all IGMP reports are forwarded to the multicast routers. IGMP Snooping and Switch Stacks IGMP snooping functions across the switch stack; that is, IGMP control information from one switch is distributed to all switches in the stack. Regardless of the stack member through which IGMP multicast data enters the stack, the data reaches the hosts that have registered for that group. If a switch in the stack fails or is removed from the stack, only the members of the multicast group that are on that switch will not receive the multicast data. All other members of a multicast group on other switches in the stack continue to receive multicast data streams. However, multicast groups that are common for both Layer 2 and Layer 3 (IP multicast routing) might take longer to converge if the active switch is removed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 173 IGMP Filtering and Throttling Overview IP Multicast Routing IGMP Filtering and Throttling Overview In some environments, for example, metropolitan or multiple-dwelling unit (MDU) installations, you might want to control the set of multicast groups to which a user on a switch port can belong. You can control the distribution of multicast services, such as IP/TV, based on some type of subscription or service plan. You might also want to limit the number of multicast groups to which a user on a switch port can belong. With the IGMP filtering feature, you can filter multicast joins on a per-port basis by configuring IP multicast profiles and associating them with individual switch ports. An IGMP profile can contain one or more multicast groups and specifies whether access to the group is permitted or denied. If an IGMP profile denying access to a multicast group is applied to a switch port, the IGMP join report requesting the stream of IP multicast traffic is dropped, and the port is not allowed to receive IP multicast traffic from that group. If the filtering action permits access to the multicast group, the IGMP report from the port is forwarded for normal processing. You can also set the maximum number of IGMP groups that a Layer 2 interface can join. IGMP filtering controls only group-specific query and membership reports, including join and leave reports. It does not control general IGMP queries. IGMP filtering has no relationship with the function that directs the forwarding of IP multicast traffic. The filtering feature operates in the same manner whether CGMP or MVR is used to forward the multicast traffic. IGMP filtering applies only to the dynamic learning of IP multicast group addresses, not static configuration. With the IGMP throttling feature, you can set the maximum number of IGMP groups that a Layer 2 interface can join. If the maximum number of IGMP groups is set, the IGMP snooping forwarding table contains the maximum number of entries, and the interface receives an IGMP join report, you can configure an interface to drop the IGMP report or to replace the randomly selected multicast entry with the received IGMP report. Note IGMPv3 join and leave messages are not supported on switches running IGMP filtering. Related Topics Configuring the IGMP Throttling Action (CLI), on page 191 Examples: Configuring Filtering and Throttling, on page 217 Default IGMP Configuration This table displays the default IGMP configuration for the switch. Table 24: Default IGMP Configuration Feature Default Setting Multilayer switch as a member of a multicast group No group memberships are defined. Access to multicast groups All groups are allowed on an interface. IGMP version Version 2 on all interfaces. IGMP host-query message interval 60 seconds on all interfaces. IGMP query timeout 60 seconds on all interfaces. IGMP maximum query response time 10 seconds on all interfaces. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 174 IP Multicast Routing Default IGMP Snooping Configuration Feature Default Setting Multilayer switch as a statically connected member Disabled. Default IGMP Snooping Configuration This table displays the default IGMP snooping configuration for the switch. Table 25: Default IGMP Snooping Configuration Feature IGMP snooping Multicast routers IGMP snooping Immediate Leave Static groups TCN1 flood query count TCN query solicitation IGMP snooping querier IGMP report suppression 1 (1) TCN = Topology Change Notification Default Setting Enabled globally and per VLAN None configured Disabled None configured 2 Disabled Disabled Enabled Default IGMP Filtering and Throttling Configuration This table displays the default IGMP filtering and throttling configuration for the switch. Table 26: Default IGMP Filtering Configuration Feature IGMP filters IGMP maximum number of IGMP groups Default Setting None applied. No maximum set. Note When the maximum number of groups is in the forwarding table, the default IGMP throttling action is to deny the IGMP report. IGMP profiles IGMP profile action None defined. Deny the range addresses. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 175 How to Configure IGMP IP Multicast Routing How to Configure IGMP Configuring the Switch as a Member of a Group (CLI) You can configure the switch as a member of a multicast group and discover multicast reachability in a network. If all the multicast-capable routers and multilayer switches that you administer are members of a multicast group, pinging that group causes all of these devices to respond. The devices respond to ICMP echo-request packets addressed to a group of which they are members. Another example is the multicast trace-route tools provided in the software. Caution Performing this procedure might impact the CPU performance because the CPU will receive all data traffic for the group address. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip igmp join-group group-address 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 interface interface-id Example: Switch(config)# interface Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 176 IP Multicast Routing Configuring the Switch as a Member of a Group (CLI) Command or Action gigabitethernet 1/0/1 Step 4 ip igmp join-group group-address Example: Switch(config-if)# ip igmp join-group 225.2.2.2 Step 5 end Example: Switch(config-if)# end Step 6 show ip igmp interface [interface-id] Example: Switch# show ip igmp interface Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217. · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218. These interfaces must have IP addresses assigned to them. Configures the switch to join a multicast group. By default, no group memberships are defined. For group-address, specify the multicast IP address in dotted decimal notation. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics Joining a Multicast Group, on page 170 Example: Configuring the Switch as a Member of a Multicast Group, on page 215 IP Multicast Group Addresses, on page 168 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 177 Controlling Access to IP Multicast Group (CLI) IP Multicast Routing Controlling Access to IP Multicast Group (CLI) The switch sends IGMP host-query messages to find which multicast groups have members on attached local networks. The switch then forwards to these group members all packets addressed to the multicast group. You can place a filter on each interface to restrict the multicast groups that hosts on the subnet serviced by the interface can join. To limit the number of joins on the interface, configure the port for the filter which associates with the IGMP profile. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp profile 4. permit 5. exit 6. interface interface-id 7. ip igmp filter filter_number 8. end 9. show ip igmp interface [interface-id] DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 ip igmp profile Example: Switch(config)# ip igmp profile 10 Switch(config-igmp-profile)# ? permit Example: Switch(config-igmp-profile)# Enters an IGMP filter profile number from 1 to 4294967295. For additional information about configuring IGMP filter profiles, see Configuring IGMP Profiles (CLI), on page 187. Enters an IGMP profile configuration action. The following IGMP profile configuration actions are supported: · deny--Matching IP addresses are denied. · exit--Exits from the IGMP profile configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 178 IP Multicast Routing Modifying the IGMP Host-Query Message Interval (CLI) Command or Action permit 229.9.9.0 Step 5 exit Example: Switch(config-igmp-profile)# exit Step 6 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Step 7 ip igmp filter filter_number Example: Switch(config-if)# ip igmp filter 10 Step 8 end Example: Switch(config-igmp-profile)# end Step 9 show ip igmp interface [interface-id] Example: Switch# show ip igmp interface Purpose · no--Negates a command or set its defaults. · permit--Matching addresses are permitted. · range--Adds a range to the set. Returns to global configuration mode. Specifies the interface to be configured, and enters interface configuration mode. Specifies the IGMP filter profile number. For additional information about applying IGMP filter profiles, see Applying IGMP Profiles (CLI), on page 188. Returns to privileged EXEC mode. Verifies your entries. Related Topics Example: Controlling Access to Multicast Groups, on page 215 Modifying the IGMP Host-Query Message Interval (CLI) The switch periodically sends IGMP host-query messages to discover which multicast groups are present on attached networks. These messages are sent to the all-hosts multicast group (224.0.0.1) with a time-to-live (TTL) of 1. The switch sends host-query messages to refresh its knowledge of memberships present on the network. If, after some number of queries, the software discovers that no local hosts are members of a multicast group, the software stops forwarding multicast packets to the local network from remote origins for that group and sends a prune message upstream toward the source. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 179 Modifying the IGMP Host-Query Message Interval (CLI) IP Multicast Routing The switch elects a PIM designated router (DR) for the LAN (subnet). The DR is the router or multilayer switch with the highest IP address for IGMPv2. For IGMPv1, the DR is elected according to the multicast routing protocol that runs on the LAN. The designated router is responsible for sending IGMP host-query messages to all hosts on the LAN. In sparse mode, the designated router also sends PIM register and PIM join messages toward the RP router. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip igmp query-interval seconds 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217. · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 180 IP Multicast Routing Changing the IGMP Query Timeout for IGMPv2 (CLI) Command or Action Step 4 ip igmp query-interval seconds Example: Switch(config-if)# ip igmp query-interval 75 Step 5 end Example: Switch(config-if)# end Step 6 show ip igmp interface [interface-id] Example: Switch# show ip igmp interface Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218. These interfaces must have IP addresses assigned to them. Configures the frequency at which the designated router sends IGMP host-query messages. By default, the designated router sends IGMP host-query messages every 60 seconds to keep the IGMP overhead very low on hosts and networks. The range is 1 to 65535. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Changing the IGMP Query Timeout for IGMPv2 (CLI) If you are using IGMPv2, you can specify the period of time before the switch takes over as the querier for the interface. By default, the switch waits twice the query interval period controlled by the ip igmp query-interval interface configuration command. After that time, if the switch has received no queries, it becomes the querier. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip igmp querier-timeout seconds Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 181 Changing the IGMP Query Timeout for IGMPv2 (CLI) IP Multicast Routing 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Step 4 ip igmp querier-timeout seconds Example: Switch(config-if)# ip igmp querier-timeout 120 Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217. · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218. These interfaces must have IP addresses assigned to them. Specifies the IGMP query timeout. The default is 60 seconds (twice the query interval). The range is 60 to 300. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 182 IP Multicast Routing Changing the Maximum Query Response Time for IGMPv2 (CLI) Step 5 Command or Action end Example: Switch(config-if)# end Step 6 show ip igmp interface [interface-id] Example: Switch# show ip igmp interface Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Changing the Maximum Query Response Time for IGMPv2 (CLI) If you are using IGMPv2, you can change the maximum query response time advertised in IGMP queries. The maximum query response time enables the switch to quickly detect that there are no more directly connected group members on a LAN. Decreasing the value enables the switch to prune groups faster. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip igmp query-max-response-time seconds 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 183 Changing the Maximum Query Response Time for IGMPv2 (CLI) Step 2 Command or Action configure terminal Example: Switch# configure terminal Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Step 4 ip igmp query-max-response-time seconds Example: Switch(config-if)# ip igmp query-max-response-time 15 Step 5 end Example: Switch(config-if)# end Step 6 show ip igmp interface [interface-id] Example: Switch# show ip igmp interface IP Multicast Routing Purpose Enters the global configuration mode. Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217. · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218. These interfaces must have IP addresses assigned to them. Changes the maximum query response time advertised in IGMP queries. The default is 10 seconds. The range is 1 to 25. Returns to privileged EXEC mode. Verifies your entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 184 IP Multicast Routing Configuring the Switch as a Statically Connected Member (CLI) Step 7 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Configuring the Switch as a Statically Connected Member (CLI) At various times, either there is not a group member on a network segment or a host that cannot report its group membership by using IGMP. However, you may want multicast traffic to be sent to that network segment. The following commands are used to pull multicast traffic down to a network segment: · ip igmp join-group--The switch accepts the multicast packets in addition to forwarding them. Accepting the multicast packets prevents the switch from fast switching. · ip igmp static-group--The switch does not accept the packets itself, but only forwards them. This method enables fast switching. The outgoing interface appears in the IGMP cache, but the switch itself is not a member, as evidenced by lack of an L (local) flag in the multicast route entry. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip igmp static-group group-address 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 185 Configuring the Switch as a Statically Connected Member (CLI) IP Multicast Routing Step 3 Command or Action interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Step 4 ip igmp static-group group-address Example: Switch(config-if)# ip igmp static-group 239.100.100.101 Step 5 end Example: Switch(config-if)# end Step 6 show ip igmp interface [interface-id] Example: Switch# show ip igmp interface gigabitethernet 1/0/1 Step 7 copy running-config startup-config Example: Switch# copy running-config Purpose Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217. · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218. These interfaces must have IP addresses assigned to them. Configures the switch as a statically connected member of a group. By default, this feature is disabled. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 186 IP Multicast Routing Configuring IGMP Profiles (CLI) Command or Action startup-config Purpose Configuring IGMP Profiles (CLI) To configure an IGMP profile, use the ip igmp profile global configuration command with a profile number to create an IGMP profile and to enter IGMP profile configuration mode. From this mode, you can specify the parameters of the IGMP profile to be used for filtering IGMP join requests from a port. When you are in IGMP profile configuration mode, you can create the profile by using these commands: · deny--Specifies that matching addresses are denied; this is the default. · exit--Exits from igmp-profile configuration mode. · no--Negates a command or returns to its defaults. · permit--Specifies that matching addresses are permitted. · range--Specifies a range of IP addresses for the profile. You can enter a single IP address or a range with a start and an end address. The default is for the switch to have no IGMP profiles configured. When a profile is configured, if neither the permit nor deny keyword is included, the default is to deny access to the range of IP addresses. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp profile profile number 4. permit | deny 5. range ip multicast address 6. end 7. show ip igmp profile profile number 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 187 Applying IGMP Profiles (CLI) IP Multicast Routing Step 3 Command or Action ip igmp profile profile number Example: Switch(config)# ip igmp profile 3 Step 4 permit | deny Example: Switch(config-igmp-profile)# permit Step 5 range ip multicast address Example: Switch(config-igmp-profile)# range 229.9.9.0 Step 6 end Example: Switch(config-igmp-profile)# end Step 7 show ip igmp profile profile number Example: Switch# show ip igmp profile 3 Step 8 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Assigns a number to the profile you are configuring, and enters IGMP profile configuration mode. The profile number range is 1 to 4294967295. Note To delete a profile, use the no ip igmp profile profile number global configuration command. (Optional) Sets the action to permit or deny access to the IP multicast address. If no action is configured, the default for the profile is to deny access. Enters the IP multicast address or range of IP multicast addresses to which access is being controlled. If entering a range, enter the low IP multicast address, a space, and the high IP multicast address. You can use the range command multiple times to enter multiple addresses or ranges of addresses. Note To delete an IP multicast address or range of IP multicast addresses, use the no range ip multicast address IGMP profile configuration command. Returns to privileged EXEC mode. Verifies the profile configuration. (Optional) Saves your entries in the configuration file. Applying IGMP Profiles (CLI) To control access as defined in an IGMP profile, use the ip igmp filter interface configuration command to apply the profile to the appropriate interfaces. You can apply IGMP profiles only to Layer 2 access ports; you cannot apply IGMP profiles to routed ports or SVIs. You cannot apply profiles to ports that belong to an Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 188 IP Multicast Routing Applying IGMP Profiles (CLI) EtherChannel port group. You can apply a profile to multiple interfaces, but each interface can have only one profile applied to it. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip igmp filter profile number 5. end 6. show running-config interface interface-id 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet1/0/1 Specifies the physical interface, and enters interface configuration mode. The interface must be a Layer 2 port that does not belong to an EtherChannel port group. Step 4 ip igmp filter profile number Example: Switch(config-if)# ip igmp filter 321 Step 5 end Example: Switch(config-if)# end Applies the specified IGMP profile to the interface. The range is 1 to 4294967295. Note To remove a profile from an interface, use the no ip igmp filter profile number interface configuration command. Returns to privileged EXEC mode. Step 6 show running-config interface interface-id Example: Verifies the configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 189 Setting the Maximum Number of IGMP Groups (CLI) IP Multicast Routing Command or Action Switch# show running-config interface gigabitethernet1/0/1 Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Setting the Maximum Number of IGMP Groups (CLI) You can set the maximum number of IGMP groups that a Layer 2 interface can join by using the ip igmp max-groups interface configuration command. Use the no form of this command to set the maximum back to the default, which is no limit. This restriction can be applied to Layer 2 ports only; you cannot set a maximum number of IGMP groups on routed ports or SVIs. You also can use this command on a logical EtherChannel interface but cannot use it on ports that belong to an EtherChannel port group. Beginning in privileged EXEC mode, follow these steps to set the maximum number of IGMP groups in the forwarding table: SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip igmp max-groups number 5. end 6. show running-config interface interface-id 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 190 IP Multicast Routing Configuring the IGMP Throttling Action (CLI) Step 3 Command or Action interface interface-id Example: Switch(config)# interface gigabitethernet1/0/2 Purpose Specifies the interface to be configured, and enters interface configuration mode. The interface can be a Layer 2 port that does not belong to an EtherChannel group or a EtherChannel interface. Step 4 ip igmp max-groups number Example: Switch(config-if)# ip igmp max-groups 20 Step 5 end Example: Switch(config-if)# end Sets the maximum number of IGMP groups that the interface can join. The range is 0 to 4294967294. The default is to have no maximum set. Note The switch supports a maximum number of 4096 Layer 2 IGMP groups and 2048 Layer 3 IGMP groups. Returns to privileged EXEC mode. Step 6 show running-config interface interface-id Example: Switch# show running-config interface gigabitethernet1/0/1 Verifies your entries. Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring the IGMP Throttling Action (CLI) After you set the maximum number of IGMP groups that a Layer 2 interface can join, you can configure an interface to replace the existing group with the new group for which the IGMP report was received by using the ip igmp max-groups action replace interface configuration command. Use the no form of this command to return to the default, which is to drop the IGMP join report. Follow these guidelines when configuring the IGMP throttling action: · This restriction can be applied only to Layer 2 ports. You can use this command on a logical EtherChannel interface but cannot use it on ports that belong to an EtherChannel port group. · When the maximum group limitation is set to the default (no maximum), entering the ip igmp max-groups action {deny | replace} command has no effect. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 191 Configuring the IGMP Throttling Action (CLI) IP Multicast Routing · If you configure the throttling action and set the maximum group limitation after an interface has added multicast entries to the forwarding table, the forwarding-table entries are either aged out or removed, depending on the throttling action. · If you configure the throttling action as deny, the entries that were previously in the forwarding table are not removed but are aged out. After these entries are aged out and the maximum number of entries is in the forwarding table, the switch drops the next IGMP report received on the interface. · If you configure the throttling action as replace, the entries that were previously in the forwarding table are removed. When the maximum number of entries is in the forwarding table, the switch replaces a randomly selected entry with the received IGMP report. To prevent the switch from removing the forwarding-table entries, you can configure the IGMP throttling action before an interface adds entries to the forwarding table. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip igmp max-groups action {deny | replace} 5. end 6. show running-config interface interface-id 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Specifies the physical interface to be configured, and enters interface configuration mode. The interface can be a Layer 2 port that does not belong to an EtherChannel group or an EtherChannel interface. The interface cannot be a trunk port. ip igmp max-groups action {deny | replace} Example: Switch(config-if)# ip igmp max-groups action When an interface receives an IGMP report and the maximum number of entries is in the forwarding table, specifies the action that the interface takes: · deny--Drops the report. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 192 IP Multicast Routing How to Configure IGMP Snooping Command or Action replace Step 5 end Example: Switch(config-if)# end Step 6 show running-config interface interface-id Example: Switch# show running-config interface gigabitethernet1/0/1 Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose · replace--Replaces the existing group with the new group for which the IGMP report was received. Note To return to the default action of dropping the report, use the no ip igmp max-groups action interface configuration command. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics IGMP Filtering and Throttling Overview, on page 174 Examples: Configuring Filtering and Throttling, on page 217 How to Configure IGMP Snooping Enabling or Disabling IGMP Snooping on a Switch (CLI) By default, IGMP snooping is globally enabled on the switch. When globally enabled or disabled, it is also enabled or disabled in all existing VLAN interfaces. IGMP snooping is by default enabled on all VLANs, but can be enabled and disabled on a per-VLAN basis. Global IGMP snooping overrides the VLAN IGMP snooping. If global snooping is disabled, you cannot enable VLAN snooping. If global snooping is enabled, you can enable or disable VLAN snooping. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping 4. end 5. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 193 Enabling or Disabling IGMP Snooping on a VLAN Interface (CLI) IP Multicast Routing DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 ip igmp snooping Example: Switch(config)# ip igmp snooping Step 4 end Example: Switch(config)# end Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Globally enables IGMP snooping in all existing VLAN interfaces. Note To globally disable IGMP snooping on all VLAN interfaces, use the no ip igmp snooping global configuration command. Returns to privileged EXEC mode. (Optional) Saves your entries in the configuration file. Related Topics IGMP Snooping, on page 169 Examples: Configuring IGMP Snooping, on page 216 Enabling or Disabling IGMP Snooping on a VLAN Interface (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id 4. end 5. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 194 IP Multicast Routing Setting the Snooping Method (CLI) DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 ip igmp snooping vlan vlan-id Example: Switch(config)# ip igmp snooping vlan 7 Step 4 end Example: Switch(config)# end Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Enables IGMP snooping on the VLAN interface. The VLAN ID range is 1 to 1001 and 1006 to 4094. IGMP snooping must be globally enabled before you can enable VLAN snooping. Note To disable IGMP snooping on a VLAN interface, use the no ip igmp snooping vlan vlan-id global configuration command for the specified VLAN number. Returns to privileged EXEC mode. (Optional) Saves your entries in the configuration file. Setting the Snooping Method (CLI) Multicast-capable router ports are added to the forwarding table for every Layer 2 multicast entry. The switch learns of the ports through one of these methods: · Snooping on IGMP queries · Statically connecting to a multicast router port using the ip igmp snooping mrouter global configuration command Beginning in privileged EXEC mode, follow these steps to alter the method in which a VLAN interface accesses a multicast router: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 195 Setting the Snooping Method (CLI) IP Multicast Routing SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id mrouter interface {GigabitEthernet | Port-Channel | TenGigabitEthernet} 4. end 5. show ip igmp snooping 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 ip igmp snooping vlan vlan-id mrouter interface Enables IGMP snooping on a VLAN. The VLAN ID range {GigabitEthernet | Port-Channel | TenGigabitEthernet} is 1 to 1001 and 1006 to 4094. Example: Switch(config)# ip igmp snooping vlan 1 mrouter interface GigabitEthernet1/0/3 Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 5 show ip igmp snooping Example: Switch# show ip igmp snooping Verifies the configuration. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 196 IP Multicast Routing Configuring a Multicast Router Port (CLI) Configuring a Multicast Router Port (CLI) To add a multicast router port (add a static connection to a multicast router), use the ip igmp snooping vlan mrouter global configuration command on the switch. Note Static connections to multicast routers are supported only on switch ports. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id mrouter interface interface-id 4. end 5. show ip igmp snooping mrouter [vlan vlan-id] 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 ip igmp snooping vlan vlan-id mrouter interface interface-id Example: Specifies the multicast router VLAN ID and the interface to the multicast router. · The VLAN ID range is 1 to 1001 and 1006 to 4094. Switch(config)# ip igmp snooping vlan 5 mrouter interface gigabitethernet1/0/1 · The interface can be a physical interface or a port channel. The port-channel range is 1 to 128. Note To remove a multicast router port from the VLAN, use the no ip igmp snooping vlan vlan-id mrouter interface interface-id global configuration command. end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 197 Configuring a Host Statically to Join a Group (CLI) IP Multicast Routing Command or Action Switch(config)# end Step 5 show ip igmp snooping mrouter [vlan vlan-id] Example: Switch# show ip igmp snooping mrouter vlan 5 Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies that IGMP snooping is enabled on the VLAN interface. (Optional) Saves your entries in the configuration file. Configuring a Host Statically to Join a Group (CLI) Hosts or Layer 2 ports normally join multicast groups dynamically, but you can also statically configure a host on an interface. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id static ip_address interface interface-id 4. end 5. show ip igmp snooping groups 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 ip igmp snooping vlan vlan-id static ip_address interface Statically configures a Layer 2 port as a member of a interface-id multicast group: Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 198 IP Multicast Routing Enabling IGMP Immediate Leave (CLI) Step 4 Command or Action Purpose Switch(config)# ip igmp snooping vlan 105 static 230.0.0.1 interface gigabitethernet1/0/1 · vlan-id is the multicast group VLAN ID. The range is 1 to 1001 and 1006 to 4094. · ip-address is the group IP address. · interface-id is the member port. It can be a physical interface or a port channel (1 to 128). Note To remove the Layer 2 port from the multicast group, use the no ip igmp snooping vlan vlan-id static mac-address interface interface-id global configuration command. end Example: Switch(config)# end Returns to privileged EXEC mode. Step 5 show ip igmp snooping groups Example: Switch# show ip igmp snooping groups Verifies the member port and the IP address. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Enabling IGMP Immediate Leave (CLI) When you enable IGMP Immediate Leave, the switch immediately removes a port when it detects an IGMP Version 2 leave message on that port. You should only use the Immediate-Leave feature when there is a single receiver present on every port in the VLAN. Note Immediate Leave is supported only on IGMP Version 2 hosts. IGMP Version 2 is the default version for the switch. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id immediate-leave 4. end 5. show ip igmp snooping vlan vlan-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 199 Configuring the IGMP Leave Timer (CLI) IP Multicast Routing 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 ip igmp snooping vlan vlan-id immediate-leave Example: Switch(config)# ip igmp snooping vlan 21 immediate-leave Step 4 end Example: Switch(config)# end Step 5 show ip igmp snooping vlan vlan-id Example: Switch# show ip igmp snooping vlan 21 Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Enables IGMP Immediate Leave on the VLAN interface. Note To disable IGMP Immediate Leave on a VLAN, use the no ip igmp snooping vlan vlan-id immediate-leave global configuration command. Returns to privileged EXEC mode. Verifies that Immediate Leave is enabled on the VLAN interface. (Optional) Saves your entries in the configuration file. Configuring the IGMP Leave Timer (CLI) Follow these guidelines when configuring the IGMP leave timer: · You can configure the leave time globally or on a per-VLAN basis. · Configuring the leave time on a VLAN overrides the global setting. · The default leave time is 1000 milliseconds. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 200 IP Multicast Routing Configuring the IGMP Leave Timer (CLI) · The IGMP configurable leave time is only supported on hosts running IGMP Version 2. IGMP version 2 is the default version for the switch. · The actual leave latency in the network is usually the configured leave time. However, the leave time might vary around the configured time, depending on real-time CPU load conditions, network delays and the amount of traffic sent through the interface. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping last-member-query-interval time 4. ip igmp snooping vlan vlan-id last-member-query-interval time 5. end 6. show ip igmp snooping 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 ip igmp snooping last-member-query-interval time Example: Switch(config)# ip igmp snooping last-member-query-interval 1000 ip igmp snooping vlan vlan-id last-member-query-interval time Example: Switch(config)# ip igmp snooping vlan 210 last-member-query-interval 1000 Configures the IGMP leave timer globally. The range is 100 to 32768 milliseconds. The default is 1000 seconds. Note To globally reset the IGMP leave timer to the default setting, use the no ip igmp snooping last-member-query-interval global configuration command. (Optional) Configures the IGMP leave time on the VLAN interface. The range is 100 to 32768 milliseconds. Note Configuring the leave time on a VLAN overrides the globally configured timer. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 201 Configuring the IGMP Robustness-Variable (CLI) IP Multicast Routing Command or Action Step 5 end Example: Switch(config)# end Step 6 show ip igmp snooping Example: Switch# show ip igmp snooping Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Note To remove the configured IGMP leave-time setting from the specified VLAN, use the no ip igmp snooping vlan vlan-id last-member-query-interval global configuration command. Returns to privileged EXEC mode. (Optional) Displays the configured IGMP leave time. (Optional) Saves your entries in the configuration file. Related Topics IGMP Configurable-Leave Timer, on page 173 Configuring the IGMP Robustness-Variable (CLI) Use the following procedure to configure the IGMP robustness variable on the switch. The robustness variable is the integer used by IGMP snooping during calculations for IGMP messages. The robustness variable provides fine tuning to allow for expected packet loss. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping robustness-variable count 4. ip igmp snooping vlan vlan-id robustness-variable count 5. end 6. show ip igmp snooping 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Purpose Enables privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 202 IP Multicast Routing Configuring the IGMP Last Member Query Count (CLI) Command or Action Example: Switch> enable Purpose · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 ip igmp snooping robustness-variable count Example: Switch(config)# ip igmp snooping robustness-variable 3 Configures the IGMP robustness variable. The range is 1 to 3 times. The recommended value for the robustness variable is 2. Use this command to change the value of the robustness variable for IGMP snooping from the default (2) to a specified value. ip igmp snooping vlan vlan-id robustness-variable count (Optional) Configures the IGMP robustness variable on the Example: VLAN interface. The range is 1 to 3 times. The recommended value for the robustness variable is 2. Switch(config)#ip igmp snooping vlan 100 robustness-variable 3 Note Configuring the robustness variable count on a VLAN overrides the globally configured value. Step 5 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 6 show ip igmp snooping Example: Switch# show ip igmp snooping (Optional) Displays the configured IGMP robustness variable count. Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring the IGMP Last Member Query Count (CLI) To configure the number of times the switch sends IGMP group-specific or group-source-specific (with IGMP version 3) query messages in response to receiving a group-specific or group-source-specific leave message, use this command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 203 Configuring the IGMP Last Member Query Count (CLI) IP Multicast Routing SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping last-member-query-count count 4. ip igmp snooping vlan vlan-id last-member-query-count count 5. end 6. show ip igmp snooping 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 ip igmp snooping last-member-query-count count Example: Switch(config)# ip igmp snooping last-member-query-count 3 Configures the IGMP last member query count. The range is 1 to 7 messages. The default is 2 messages. Step 4 ip igmp snooping vlan vlan-id last-member-query-count (Optional) Configures the IGMP last member query count count on the VLAN interface. The range is 1 to 7 messages. Example: Switch(config)#ip igmp snooping vlan 100 last-member-query-count 3 Note Configuring the last member query count on a VLAN overrides the globally configured timer. Step 5 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 6 show ip igmp snooping Example: (Optional) Displays the configured IGMP last member query count. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 204 IP Multicast Routing Configuring TCN-Related Commands Command or Action Switch# show ip igmp snooping Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Configuring TCN-Related Commands Controlling the Multicast Flooding Time After a TCN Event (CLI) You can control the time that multicast traffic is flooded after a topology change notification (TCN) event by using the ip igmp snooping tcn flood query count global configuration command. This command configures the number of general queries for which multicast data traffic is flooded after a TCN event. Some examples of TCN events are when the client changed its location and the receiver is on same port that was blocked but is now forwarding, and when a port went down without sending a leave message. If you set the TCN flood query count to 1 by using the ip igmp snooping tcn flood query count command, the flooding stops after receiving 1 general query. If you set the count to 7, the flooding continues until 7 general queries are received. Groups are relearned based on the general queries received during the TCN event. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping tcn flood query count count 4. end 5. show ip igmp snooping 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 205 Recovering from Flood Mode (CLI) IP Multicast Routing Step 3 Step 4 Command or Action Purpose ip igmp snooping tcn flood query count count Example: Specifies the number of IGMP general queries for which the multicast traffic is flooded. The range is 1 to 10. By default, the flooding query count is 2. Switch(config)# ip igmp snooping tcn flood query Note count 3 To return to the default flooding query count, use the no ip igmp snooping tcn flood query count global configuration command. end Example: Switch(config)# end Returns to privileged EXEC mode. Step 5 show ip igmp snooping Example: Switch# show ip igmp snooping Verifies the TCN settings. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Recovering from Flood Mode (CLI) When a topology change occurs, the spanning-tree root sends a special IGMP leave message (also known as global leave) with the group multicast address 0.0.0.0. However, when you enable the ip igmp snooping tcn query solicit global configuration command, the switch sends the global leave message whether or not it is the spanning-tree root. When the router receives this special leave, it immediately sends general queries, which expedite the process of recovering from the flood mode during the TCN event. Leaves are always sent if the switch is the spanning-tree root regardless of this configuration command. By default, query solicitation is disabled. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping tcn query solicit 4. end 5. show ip igmp snooping 6. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 206 IP Multicast Routing Disabling Multicast Flooding During a TCN Event (CLI) DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 ip igmp snooping tcn query solicit Example: Sends an IGMP leave message (global leave) to speed the process of recovering from the flood mode caused during a TCN event. By default, query solicitation is disabled. Switch(config)# ip igmp snooping tcn query solicit Note To return to the default query solicitation, use the no ip igmp snooping tcn query solicit global configuration command. end Example: Returns to privileged EXEC mode. Switch(config)# end Step 5 show ip igmp snooping Example: Switch# show ip igmp snooping Verifies the TCN settings. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Disabling Multicast Flooding During a TCN Event (CLI) When the switch receives a TCN, multicast traffic is flooded to all the ports until 2 general queries are received. If the switch has many ports with attached hosts that are subscribed to different multicast groups, this flooding might exceed the capacity of the link and cause packet loss. You can use the ip igmp snooping tcn flood interface configuration command to control this operation function. SUMMARY STEPS 1. enable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 207 Disabling Multicast Flooding During a TCN Event (CLI) IP Multicast Routing 2. configure terminal 3. interface interface-id 4. no ip igmp snooping tcn flood 5. end 6. show ip igmp snooping 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 interface interface-id Example: Specifies the interface to be configured, and enters interface configuration mode. Switch(config)# interface gigabitethernet 1/0/1 Step 4 Step 5 no ip igmp snooping tcn flood Example: Disables the flooding of multicast traffic during a spanning-tree TCN event. By default, multicast flooding is enabled on an interface. Switch(config-if)# no ip igmp snooping tcn flood Note To re-enable multicast flooding on an interface, use the ip igmp snooping tcn flood interface configuration command. end Example: Returns to privileged EXEC mode. Switch(config)# end Step 6 show ip igmp snooping Example: Switch# show ip igmp snooping Verifies the TCN settings. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 208 IP Multicast Routing Configuring the IGMP Snooping Querier (CLI) Step 7 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Configuring the IGMP Snooping Querier (CLI) Follow these guidelines when configuring the IGMP snooping querier: · Configure the VLAN in global configuration mode. · Configure an IP address on the VLAN interface. When enabled, the IGMP snooping querier uses the IP address as the query source address. · If there is no IP address configured on the VLAN interface, the IGMP snooping querier tries to use the configured global IP address for the IGMP querier. If there is no global IP address specified, the IGMP querier tries to use the VLAN switch virtual interface (SVI) IP address (if one exists). If there is no SVI IP address, the switch uses the first available IP address configured on the switch. The first IP address available appears in the output of the show ip interface privileged EXEC command. The IGMP snooping querier does not generate an IGMP general query if it cannot find an available IP address on the switch. · The IGMP snooping querier supports IGMP Versions 1 and 2. · When administratively enabled, the IGMP snooping querier moves to the nonquerier state if it detects the presence of a multicast router in the network. · When it is administratively enabled, the IGMP snooping querier moves to the operationally disabled state under these conditions: · IGMP snooping is disabled in the VLAN. · PIM is enabled on the SVI of the corresponding VLAN. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp snooping querier 4. ip igmp snooping querier address ip_address 5. ip igmp snooping querier query-interval interval-count 6. ip igmp snooping querier tcn query [count count | interval interval] 7. ip igmp snooping querier timer expiry timeout 8. ip igmp snooping querier version version 9. end 10. show ip igmp snooping vlan vlan-id 11. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 209 Configuring the IGMP Snooping Querier (CLI) IP Multicast Routing DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 ip igmp snooping querier Example: Switch(config)# ip igmp snooping querier Enables the IGMP snooping querier. Step 4 Step 5 ip igmp snooping querier address ip_address (Optional) Specifies an IP address for the IGMP snooping Example: querier. If you do not specify an IP address, the querier tries to use the global IP address configured for the IGMP querier. Switch(config)# ip igmp snooping querier address 172.16.24.1 Note The IGMP snooping querier does not generate an IGMP general query if it cannot find an IP address on the switch. ip igmp snooping querier query-interval interval-count (Optional) Sets the interval between IGMP queriers. The Example: range is 1 to 18000 seconds. Switch(config)# ip igmp snooping querier query-interval 30 Step 6 ip igmp snooping querier tcn query [count count | interval interval] Example: (Optional) Sets the time between Topology Change Notification (TCN) queries. The count range is 1 to 10. The interval range is 1 to 255 seconds. Switch(config)# ip igmp snooping querier tcn query interval 20 Step 7 ip igmp snooping querier timer expiry timeout Example: (Optional) Sets the length of time until the IGMP querier expires. The range is 60 to 300 seconds. Switch(config)# ip igmp snooping querier timer expiry 180 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 210 IP Multicast Routing Disabling IGMP Report Suppression (CLI) Step 8 Step 9 Step 10 Step 11 Command or Action ip igmp snooping querier version version Example: Purpose (Optional) Selects the IGMP version number that the querier feature uses. Select 1 or 2. Switch(config)# ip igmp snooping querier version 2 end Example: Switch(config)# end Returns to privileged EXEC mode. show ip igmp snooping vlan vlan-id Example: Switch# show ip igmp snooping vlan 30 (Optional) Verifies that the IGMP snooping querier is enabled on the VLAN interface. The VLAN ID range is 1 to 1001 and 1006 to 4094. copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Disabling IGMP Report Suppression (CLI) Note IGMP report suppression is supported only when the multicast query has IGMPv1 and IGMPv2 reports. This feature is not supported when the query includes IGMPv3 reports. IGMP report suppression is enabled by default. When it is enabled, the switch forwards only one IGMP report per multicast router query. When report suppression is disabled, all IGMP reports are forwarded to the multicast routers. SUMMARY STEPS 1. enable 2. configure terminal 3. no ip igmp snooping report-suppression 4. end 5. show ip igmp snooping 6. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 211 Monitoring IGMP IP Multicast Routing DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 no ip igmp snooping report-suppression Example: Switch(config)# no ip igmp snooping report-suppression Step 4 end Example: Switch(config)# end Step 5 show ip igmp snooping Example: Switch# show ip igmp snooping Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Disables IGMP report suppression. Note To re-enable IGMP report suppression, use the ip igmp snooping report-suppression global configuration command. Returns to privileged EXEC mode. Verifies that IGMP report suppression is disabled. (Optional) Saves your entries in the configuration file. Monitoring IGMP You can display specific statistics, such as the contents of IP routing tables, caches, and databases. Note This release does not support per-route statistics. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 212 IP Multicast Routing Displaying IGMP Snooping Information You can display information to learn resource usage and solve network problems. You can also display information about node reachability and discover the routing path that packets of your device are taking through the network. You can use any of the privileged EXEC commands in the following table to display various routing statistics. Table 27: Commands for Displaying System and Network Statistics Command Purpose ping [group-name | group-address] Sends an ICMP Echo Request to a multicast group address. show ip igmp filter Displays IGMP filter information. show ip igmp groups [type-number | detail ] Displays the multicast groups that are directly connected to the switch and that were learned through IGMP. show ip igmp interface [type number] Displays multicast-related information about an interface. show ip igmp membership [ name/group address | Displays IGMP membership information for all | tracked ] forwarding. show ip igmp profile [ profile_number] Displays IGMP profile information. show ip igmp ssm-mapping [ hostname/IP address Displays IGMP SSM mapping information. ] show ip igmp static-group {class-map [ interface Displays static group information. [ type ] ] show ip igmp vrf Displays the selected VPN routing/forwarding instance by name. Displaying IGMP Snooping Information You can display IGMP snooping information for dynamically learned and statically configured router ports and VLAN interfaces. You can also display MAC address multicast entries for a VLAN configured for IGMP snooping. Table 28: Commands for Displaying IGMP Snooping Information Command show ip igmp snooping detail Purpose Displays the operational state information. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 213 Displaying IGMP Filtering and Throttling Configuration IP Multicast Routing Command show ip igmp snooping groups [ count | [vlan vlan-id [A.B.C.D | count ] ] Purpose Displays multicast table information for the switch or about a specific parameter: · count--Displays the total number of groups. · vlan--Displays group information by VLAN ID. show ip igmp snooping igmpv2-tracking Displays the IGMP snooping tracking. Note This command displays group and IP address entries only for wireless multicast IGMP joins and not for wired IGMP joins. Wireless IP multicast must be enabled for this command to display. show ip igmp snooping mrouter [vlan vlan-id] show ip igmp snooping querier [ detail | vlan vlan-id] show ip igmp snooping [vlan vlan-id [ detail ] ] show ip igmp snooping wireless mgid Displays information on dynamically learned and manually configured multicast router interfaces. Note When you enable IGMP snooping, the switch automatically learns the interface to which a multicast router is connected. These are dynamically learned interfaces. (Optional) Enter vlan vlan-id to display information for a single VLAN. Displays information about the IP address and receiving port for the most-recently received IGMP query messages in the VLAN. (Optional) Enter detail to display the detailed IGMP querier information in a VLAN. (Optional) Enter vlan vlan-id to display information for a single VLAN. Displays the snooping configuration information for all VLANs on the switch or for a specified VLAN. (Optional) Enter vlan vlan-id to display information for a single VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094. Displays wireless-related events. Displaying IGMP Filtering and Throttling Configuration You can display IGMP profile characteristics, and you can display the IGMP profile and maximum group configuration for all interfaces on the switch or for a specified interface. You can also display the IGMP throttling configuration for all interfaces on the switch or for a specified interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 214 IP Multicast Routing Configuration Examples for IGMP Table 29: Commands for Displaying IGMP Filtering and Throttling Configuration Command show ip igmp profile [profile number] show running-config [interface interface-id] Purpose Displays the specified IGMP profile or all the IGMP profiles defined on the switch. Displays the configuration of the specified interface or the configuration of all interfaces on the switch, including (if configured) the maximum number of IGMP groups to which an interface can belong and the IGMP profile applied to the interface. Configuration Examples for IGMP Example: Configuring the Switch as a Member of a Multicast Group This example shows how to enable the switch to join multicast group 255.2.2.2: Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip igmp join-group 255.2.2.2 Switch(config-if)# Related Topics Configuring the Switch as a Member of a Group (CLI), on page 176 Joining a Multicast Group, on page 170 IP Multicast Group Addresses, on page 168 Example: Controlling Access to Multicast Groups To limit the number of joins on the interface, configure the port for filter which associates with the IGMP profile. Switch# configure terminal Switch(config)# ip igmp profile 10 Switch(config-igmp-profile)# ? IGMP profile configuration commands: deny matching addresses are denied exit Exit from igmp profile configuration mode no Negate a command or set its defaults permit matching addresses are permitted range add a range to the set Switch(config-igmp-profile)# range 172.16.5.1 Switch(config-igmp-profile)# exit Switch(config)# Switch(config)# interface gigabitEthernet 2/0/10 Switch(config-if)# ip igmp filter 10 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 215 Examples: Configuring IGMP Snooping IP Multicast Routing Related Topics Controlling Access to IP Multicast Group (CLI), on page 178 Examples: Configuring IGMP Snooping This example shows how to enable a static connection to a multicast router: Switch# configure terminal Switch(config)# ip igmp snooping vlan 200 mrouter interface gigabitethernet1/0/2 Switch(config)# end This example shows how to statically configure a host on a port: Switch# configure terminal Switch(config)# ip igmp snooping vlan 105 static 224.2.4.12 interface gigabitethernet1/0/1 Switch(config)# end This example shows how to enable IGMP Immediate Leave on VLAN 130: Switch# configure terminal Switch(config)# ip igmp snooping vlan 130 immediate-leave Switch(config)# end This example shows how to set the IGMP snooping querier source address to 10.0.0.64: Switch# configure terminal Switch(config)# ip igmp snooping querier 10.0.0.64 Switch(config)# end This example shows how to set the IGMP snooping querier maximum response time to 25 seconds: Switch# configure terminal Switch(config)# ip igmp snooping querier query-interval 25 Switch(config)# end This example shows how to set the IGMP snooping querier timeout to 60 seconds: Switch# configure terminal Switch(config)# ip igmp snooping querier timer expiry 60 Switch(config)# end This example shows how to set the IGMP snooping querier feature to Version 2: Switch# configure terminal Switch(config)# no ip igmp snooping querier version 2 Switch(config)# end Related Topics Enabling or Disabling IGMP Snooping on a Switch (CLI), on page 193 IGMP Snooping, on page 169 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 216 IP Multicast Routing Examples: Configuring Filtering and Throttling Examples: Configuring Filtering and Throttling This example shows how to create IGMP profile 4 allowing access to the single IP multicast address and how to verify the configuration. If the action was to deny (the default), it would not appear in the show ip igmp profile output display. Switch(config)# ip igmp profile 4 Switch(config-igmp-profile)# permit Switch(config-igmp-profile)# range 229.9.9.0 Switch(config-igmp-profile)# end Switch# show ip igmp profile 4 IGMP Profile 4 permit range 229.9.9.0 229.9.9.0 This example shows how to apply IGMP profile 4 to a port: Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip igmp filter 4 Switch(config-if)# end This example shows how to limit to 25 the number of IGMP groups that a port can join: Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip igmp max-groups 25 Switch(config-if)# end Related Topics Configuring the IGMP Throttling Action (CLI), on page 191 IGMP Filtering and Throttling Overview, on page 174 Example: Interface Configuration as a Routed Port This example shows how to configure an interface on the switch as a routed port. This configuration is required on the interface for several IP multicast routing configuration procedures that require running the no switchport command. Switch configure terminal Switch(config)# interface GigabitEthernet1/0/9 Switch(config-if)# description interface to be use as routed port Switch(config-if)# no switchport Switch(config-if)# ip address 20.20.20.1 255.255.255.0 Switch(config-if)# ip pim sparse-dense-mode Switch(config-if)# ip igmp join-group 224.1.2.3 source 15.15.15.2 Switch(config-if)# end Switch# configure terminal Switch# show run interface gigabitEthernet 1/0/9 Current configuration : 166 bytes ! interface GigabitEthernet1/0/9 no switchport ip address 20.20.20.1 255.255.255.0 ip pim sparse-dense-mode Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 217 Example: Interface Configuration as an SVI IP Multicast Routing ip igmp static-group 224.1.2.3 source 15.15.15.2 end Example: Interface Configuration as an SVI This example shows how to configure an interface on the switch as an SVI. This configuration is required on the interface for several IP multicast routing configuration procedures that require running the no switchport command. Switch(config)# interface vlan 150 Switch(config-if)# ip address 20.20.20.1 255.255.255.0 Switch(config-if)# ip pim sparse-dense-mode Switch(config-if)# ip igmp join-group 224.1.2.3 source 15.15.15.2 Switch(config-if)# end Switch# configure terminal Switch(config)# ip igmp snooping vlan 20 static 224.1.2.3 interface gigabitEthernet 1/0/9 Switch# show run interface vlan 150 Current configuration : 137 bytes ! interface Vlan150 ip address 20.20.20.1 255.255.255.0 ip pim sparse-dense-mode ip igmp static-group 224.1.2.3 source 15.15.15.2 end Where to Go Next for IGMP You can configure the following: · Wireless Multicast · PIM · SSM · IP Multicast Routing · Service Discovery Gateway Additional References Related Documents Related Topic Document Title For complete syntax and usage IP Multicast Routing Command Reference (Catalyst 3650 Switches) information for the commands used in this chapter. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 218 IP Multicast Routing Additional References Related Topic Platform-independent configuration information Document Title · IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title RFC 1112 Host Extensions for IP Multicasting RFC 2236 Internet Group Management Protocol, Version 2 MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 219 Feature History and Information for IGMP IP Multicast Routing Feature History and Information for IGMP Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 220 1 4 C H A P T E R Configuring Wireless Multicast · Finding Feature Information, on page 221 · Prerequisites for Configuring Wireless Multicast, on page 221 · Restrictions for Configuring Wireless Multicast, on page 221 · Information About Wireless Multicast, on page 222 · How to Configure Wireless Multicast, on page 223 · Monitoring Wireless Multicast, on page 231 · Where to Go Next for Wireless Multicast, on page 231 · Additional References, on page 232 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring Wireless Multicast · The IP multicast routing must be enabled and the PIM version and PIM mode must be configured. The default routes should be available in the device. After performing these tasks, the device can then forward multicast packets and can populate its multicast routing table. · To participate in IP multicasting, the multicast hosts, routers, and multilayer switches must have IGMP operating. · When enabling multicast mode on the switch, a CAPWAP multicast group address should also be configured. Access points listen to the CAPWAP multicast group using IGMP. Restrictions for Configuring Wireless Multicast The following are the restrictions for configuring IP multicast routing: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 221 Information About Wireless Multicast IP Multicast Routing · Access points in monitor mode, sniffer mode, or rogue detector mode do not join the CAPWAP multicast group address. · The CAPWAP multicast group configured on the switch should be different for different switches. · Multicast routing should not be enabled for the management interface. Information About Wireless Multicast If the network supports packet multicasting, the multicast method that the switch uses can be configured. The switch performs multicasting in two modes: · Unicast mode--The switch unicasts every multicast packet to every access point associated to the switch. This mode is inefficient but might be required on networks that do not support multicasting. · Multicast mode--The switch sends multicast packets to a CAPWAP multicast group. This method reduces overhead on the switch processor and shifts the work of packet replication to the network, which is much more efficient than the unicast method. When the multicast mode is enabled and the switch receives a multicast packet from the wired LAN, the switch encapsulates the packet using CAPWAP and forwards the packet to the CAPWAP multicast group address. The switch always uses the management VLAN for sending multicast packets. Access points in the multicast group receive the packet and forward it to all the BSSIDs mapped to the VLAN on which clients receive multicast traffic. The switch supports all the capabilities of v1 including Multicast Listener Discovery (MLD) v1 snooping but the v2 and v3 capabilities are limited. This feature keeps track of and delivers IPv6 multicast flows to the clients that request them. To support IPv6 multicast, global multicast mode should be enabled. Internet Group Management Protocol (IGMP) snooping is introduced to better direct multicast packets. When this feature is enabled, the switch snooping gathers IGMP reports from the clients, processes them, creates unique multicast group IDs (MGIDs) based on the Layer 3 multicast address and the VLAN number, and sends the IGMP reports to the IGMP querier. The switch then updates the access point MGID table on the access point with the client MAC address. When the switch receives multicast traffic for a particular multicast group, it forwards it to all the access points, but only those access points that have active clients listening or subscribed to that multicast group send multicast traffic on that particular WLAN. IP packets are forwarded with an MGID that is unique for an ingress VLAN and the destination multicast group. Layer 2 multicast packets are forwarded with an MGID that is unique for the ingress VLAN. MGID is a 14-bit value filled in the 16-bit reserved field of wireless information in CAPWAP header. The remaining 2 bits should be set to zero. Related Topics Configuring Wireless Multicast-MCMC Mode (CLI), on page 223 Configuring Wireless Multicast-MCUC Mode (CLI), on page 224 Information About Multicast Optimization Multicast used to be based on the group of the multicast addresses and the VLAN as one entity, MGID. With the VLAN group, duplicate packets might increase. Using the VLAN group feature, every client listens to the multicast stream on a different VLAN. As a result, the switch creates different MGIDs for each multicast address and VLAN. Therefore, in a worst case situation, the upstream router sends one copy for each VLAN, Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 222 IP Multicast Routing How to Configure Wireless Multicast which results in as many copies as the number of VLANs in the group. Because the WLAN remains the same for all clients, multiple copies of the multicast packet are sent over the wireless network. To suppress the duplication of a multicast stream on the wireless medium between the switch and the access points, the multicast optimization feature can be used. Multicast optimization enables you to create a multicast VLAN that can be used for multicast traffic. One of the VLANs in the switch can be configured as a multicast VLAN where multicast groups are registered. The clients are allowed to listen to a multicast stream on the multicast VLAN. The MGID is generated using the mulicast VLAN and multicast IP addresses. If multiple clients on different VLANs of the same WLAN are listening to a single multicast IP address, a single MGID is generated. The switch makes sure that all multicast streams from the clients on this VLAN group always go out on the multicast VLAN to ensure that the upstream router has one entry for all the VLANs of the VLAN group. Only one multicast stream hits the VLAN group even if the clients are on different VLANs. Therefore, the multicast packets that are sent out over the network is just one stream. Related Topics Configuring IP Multicast VLAN for WLAN (CLI), on page 230 How to Configure Wireless Multicast Configuring Wireless Multicast-MCMC Mode (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. wireless multicast 4. ap capwap multicast ipaddr 5. end DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters global command mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 223 Configuring Wireless Multicast-MCUC Mode (CLI) IP Multicast Routing Step 3 Step 4 Step 5 Command or Action wireless multicast Example: Switch(config)# wireless multicast Purpose Enables the multicast traffic for wireless clients. The default value is disable. Add no in the command to disable the multicast traffic for wireless clients. Switch(config)# no wireless multicast ap capwap multicast ipaddr Example: Switch(config)# ap capwap multicast 231.1.1.1 Enables the forwarding mode in multicast. Add no in the command to disable the multicast mode. Switch(config)# no ap capwap multicast 231.1.1.1 end Example: Switch(config)# end Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode. Related Topics Information About Wireless Multicast, on page 222 Configuring Wireless Multicast-MCUC Mode (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. wireless multicast 4. no ap capwap multicast ipaddr 5. end DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Step 3 configure terminal Example: Switch# configure terminal wireless multicast Example: Enters global command mode. Enables the multicast traffic for wireless clients and enables mDNS bridging. The default value is disable. Add no in Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 224 IP Multicast Routing Configuring IPv6 Snooping (CLI) Step 4 Step 5 Command or Action Switch(config)# wireless multicast Purpose the command to disable the multicast traffic for wireless clients and disable mDNS bridging. no ap capwap multicast ipaddr Example: Enables forwarding mode in multicast. Add no in the command to disable the multicast mode. Switch(config)# no ap capwap multicast 231.1.1.1 end Example: Switch(config)# end Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode. Related Topics Information About Wireless Multicast, on page 222 Configuring IPv6 Snooping (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ipv6 mld snooping DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Step 3 configure terminal Example: Switch# configure terminal ipv6 mld snooping Example: Switch(config)# ipv6 mld snooping Enters global command mode. Enables MLD snooping. Configuring IPv6 Snooping Policy (CLI) SUMMARY STEPS 1. enable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 225 Configuring Layer 2 Port as Multicast Router Port (CLI) IP Multicast Routing 2. configure terminal 3. ipv6 snooping policy policy-name 4. security-level guard 5. device-role node 6. protocol {dhcp | ndp} DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Step 3 Step 4 configure terminal Example: Switch# configure terminal Enters global command mode. ipv6 snooping policy policy-name Example: Switch(config)# ipv6 snooping policy mypolicy Configures an IPv6 snooping policy with a name. security-level guard Example: Configures security level to inspect and drop any unauthorized messages. Switch(config-ipv6-snooping)# security-level guard Step 5 Step 6 device-role node Example: Switch(config-ipv6-snooping)# device-role node protocol {dhcp | ndp} Example: Switch(config-ipv6-snooping)# protocol ndp Configures the role of the device, which is a node, to the attached port. Sets the protocol to glean addresses in DHCP or NDP packets. Configuring Layer 2 Port as Multicast Router Port (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ipv6 mld snooping vlan vlan-id mrouter interface Port-channel port-channel-interface-number Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 226 IP Multicast Routing Configuring RA Guard (CLI) DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Step 3 configure terminal Example: Switch# configure terminal Enters global command mode. ipv6 mld snooping vlan vlan-id mrouter interface Port-channel port-channel-interface-number Configures a Layer 2 port as a Multicast router port. The VLAN is the client VLAN. Example: Switch(config)# ipv6 mld snooping vlan 2 mrouter interface Port-channel 22 Configuring RA Guard (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ipv6 nd raguard policy policy-name 4. trusted-port 5. device-role {host | monitor | router | switch} DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 Step 3 configure terminal Example: Switch# configure terminal ipv6 nd raguard policy policy-name Example: Switch(config)# ipv6 nd raguard policy myraguardpolicy Enters global command mode. Configures a policy for RA Guard. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 227 Configuring Non-IP Wireless Multicast (CLI) IP Multicast Routing Step 4 Step 5 Command or Action trusted-port Example: Switch(config-nd-raguard)# trusted-port device-role {host | monitor | router | switch} Example: Switch(config-nd-raguard)# device-role router Purpose Sets up a trusted port. Sets the role of the device attached to the port. Configuring Non-IP Wireless Multicast (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. wireless multicast non-ip 4. wireless multicast non-ip vlanid 5. end DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Step 3 Step 4 Step 5 configure terminal Example: Switch# configure terminal wireless multicast non-ip Example: Switch(config)# wireless multicast non-ip Switch(config)# no wireless multicast non-ip wireless multicast non-ip vlanid Example: Switch(config)# wireless multicast non-ip 5 Switch(config)# no wireless multicast non-ip 5 end Example: Enters global command mode. Enables non-IP multicast in all VLANs. Default value is enable. Wireless multicast must be enabled for the traffic to pass. Add no in the command to disable the non-IP multicast in all VLANs. Enables non-IP multicast per VLAN. Default value is enable. Both wireless multicast and wireless multicast non-IP must be enabled for traffic to pass. Add no in the command to disable the non-IP multicast per VLAN. Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 228 IP Multicast Routing Configuring Wireless Broadcast (CLI) Command or Action Switch(config)# end Purpose Configuring Wireless Broadcast (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. wireless broadcast 4. wireless broadcast vlan vlanid 5. end DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 Step 3 Step 4 Step 5 configure terminal Example: Switch# configure terminal wireless broadcast Example: Switch(config)# wireless broadcast Switch(config)# no wireless broadcast wireless broadcast vlan vlanid Example: Switch(config)# wireless broadcast vlan 3 Switch(config)# no wireless broadcast vlan 3 end Example: Switch(config)# end Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters global command mode. Enables broadcast packets for wireless clients. Default value is disable. Enabling wireless broadcast enables broadcast traffic for each VLAN. Add no in the command to disable broadcasting packets. Enables broadcast packets for single VLAN. Default value is enable. Wireless broadcast must be enabled for broadcasting. Add no in the command to disable the broadcast traffic for each VLAN. Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 229 Configuring IP Multicast VLAN for WLAN (CLI) IP Multicast Routing Configuring IP Multicast VLAN for WLAN (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. wlan wlan_name 4. shutdown 5. ip multicast vlan {vlan_name vlan_id} 6. no shutdown 7. end DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 configure terminal Example: Switch# configure terminal wlan wlan_name Example: Switch(config)# wlan test 1 shutdown Example: Switch(config-wlan)# shutdown ip multicast vlan {vlan_name vlan_id} Example: Switch(config-wlan)# ip multicast vlan 5 Switch(config-wlan)# no ip multicast vlan 5 no shutdown Example: Switch(config-wlan)# no shutdown end Example: Enters global command mode. Enters the configuration mode to configure various parameters in the WLAN. Disables WLAN. Configures multicast VLAN for WLAN. Add no in the command to disable the multicast VLAN for WLAN. Enables the disabled WLAN. Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 230 IP Multicast Routing Monitoring Wireless Multicast Command or Action Switch(config)# end Purpose Related Topics Information About Multicast Optimization, on page 222 Monitoring Wireless Multicast Table 30: Commands for Monitoring Wireless Multicast Commands show wireless multicast Description Displays the multicast status and IP multicast mode, each VLAN's broadcast and non-IP multicast status. Also displays the mDNS bridging state. show wireless multicast group summary Displays all (Source, Group and VLAN) lists and the corresponding MGID value. show wireless multicast [source source] group group vlan vlanid show ip igmp snooping wireless mcast-spi-count Displays details of the given (S,G,V) and shows all of the clients associated with it and their MC2UC status . Displays statistics of the number of multicast SPIs per MGID sent between IOS and the Wireless Controller Module. show ip igmp snooping wireless mgid Displays the MGID mappings. show ip igmp snooping igmpv2-tracking Displays the client-to-SGV mappings and SGV-to-client mappings. show ip igmp snooping querier vlan vlanid Displays IGMP querier information for the specified VLAN. show ip igmp snooping querier detail Displays detailed IGMP querier information of all the VLANs. show ipv6 mld snooping querier vlan vlanid Displays MLD querier information for the specified VLAN. show ipv6 mld snooping wireless mgid Displays MGIDs for IPv6 multicast group. Where to Go Next for Wireless Multicast You can configure the following: · IGMP · PIM · SSM · IP Multicast Routing Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 231 Additional References IP Multicast Routing · Service Discovery Gateway Additional References Related Documents Related Topic Document Title For complete syntax and usage IP Multicast Routing Command Reference (Catalyst 3650 Switches) information for the commands used in this chapter. Platform-independent configuration information · IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 232 IP Multicast Routing Additional References Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 233 Additional References IP Multicast Routing Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 234 1 5 C H A P T E R Configuring PIM · Finding Feature Information, on page 235 · Prerequisites for Configuring PIM, on page 235 · Restrictions for Configuring PIM, on page 236 · Restrictions for Configuring Auto-RP, on page 236 · Restrictions for Configuring Auto-RP and BSR, on page 236 · Information About PIM, on page 237 · How to Configure PIM, on page 246 · Monitoring PIM , on page 272 · Troubleshooting PIMv1 and PIMv2 Interoperability Problems, on page 273 · Configuration Examples for PIM, on page 273 · Where to Go Next for PIM , on page 276 · Additional References, on page 277 · Feature History and Information for PIM, on page 279 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring PIM The following are the prerequisites for configuring PIM and PIM stub routing: · Before configuring PIM stub routing, you must have IP multicast routing configured on both the stub router and the central router. You must also have PIM mode (dense-mode, sparse-mode, or sparse-dense-mode) configured on the uplink interface of the stub router. · Before configuring PIM stub routing, you must also configure either Enhanced Interior Gateway Routing Protocol (EIGRP) stub routing or Open Shortest Path First (OSPF) stub routing on the switch. The PIM stub router does not route the transit traffic between the distribution routers. Unicast (EIGRP) stub routing enforces this behavior. You must configure unicast stub routing to assist the PIM stub router behavior. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 235 Restrictions for Configuring PIM IP Multicast Routing Note For information about EIGRP or OSPF configurations, see the Catalyst 3650 Routing Configuration Guide, Release 3SE. Restrictions for Configuring PIM The following are the restrictions for configuring PIM: · PIM · PIM is not supported when running the LAN Base feature set. · PIM stub routing · The IP Services image contains complete multicast routing. · In a network using PIM stub routing, the only allowable route for IP traffic to the user is through a switch that is configured with PIM stub routing. · The redundant PIM stub router topology is not supported. Only the nonredundant access router topology is supported by the PIM stub feature. · Only directly connected multicast (IGMP) receivers and sources are allowed in the Layer 2 access domains. The PIM protocol is not supported in access domains. · PIM stub routing is supported when running the IP Base and IP Services feature sets. Restrictions for Configuring Auto-RP The following are restrictions for configuring Auto-RP (if used in your network configuration): · Auto-RP is not supported when running the LAN Base feature set. · If you configure PIM in sparse mode or sparse-dense mode and do not configure Auto-RP, you must manually configure an RP. · If routed interfaces are configured in sparse mode, Auto-RP can still be used if all devices are configured with a manual RP address for the Auto-RP groups. · If routed interfaces are configured in sparse mode and you enter the ip pim autorp listener global configuration command, Auto-RP can still be used even if all devices are not configured with a manual RP address for the Auto-RP groups. Restrictions for Configuring Auto-RP and BSR The following are restrictions for configuring Auto-RP and BSR (if used in your network configuration): · If your network is all Cisco routers and multilayer switches, you can use either Auto-RP or BSR. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 236 IP Multicast Routing Information About PIM · If you have non-Cisco routers in your network, you must use BSR. · If you have Cisco PIMv1 and PIMv2 routers and multilayer switches and non-Cisco routers, you must use both Auto-RP and BSR. If your network includes routers from other vendors, configure the Auto-RP mapping agent and the BSR on a Cisco PIMv2 device. Ensure that no PIMv1 device is located in the path a between the BSR and a non-Cisco PIMv2 device. Note There are two approaches to using PIMv2. You can use Version 2 exclusively in your network or migrate to Version 2 by employing a mixed PIM version environment. · Because bootstrap messages are sent hop-by-hop, a PIMv1 device prevents these messages from reaching all routers and multilayer switches in your network. Therefore, if your network has a PIMv1 device in it and only Cisco routers and multilayer switches, it is best to use Auto-RP. · If you have a network that includes non-Cisco routers, configure the Auto-RP mapping agent and the BSR on a Cisco PIMv2 router or multilayer switch. Ensure that no PIMv1 device is on the path between the BSR and a non-Cisco PIMv2 router. · If you have non-Cisco PIMv2 routers that need to interoperate with Cisco PIMv1 routers and multilayer switches, both Auto-RP and a BSR are required. We recommend that a Cisco PIMv2 device be both the Auto-RP mapping agent and the BSR. Information About PIM Protocol-Independent Multicast (PIM) is called protocol-independent because regardless of the unicast routing protocols used to populate the unicast routing table, PIM uses this information to perform multicast forwarding instead of maintaining a separate multicast routing table. PIM can leverage whichever unicast routing protocols are used to populate the unicast routing table, including EIGRP, OSPF, BGP, or static routes. PIM uses this unicast routing information to perform the multicast forwarding function, so it is IP protocol independent. Although PIM is called a multicast routing protocol, it actually uses the unicast routing table to perform the reverse path forwarding (RPF) check function instead of building up a completely independent multicast routing table. PIM does not send and receive multicast routing updates between routers as the other routing protocols do. PIM is defined in RFC 4601, Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification. PIM is defined in these Internet Engineering Task Force (IETF) Internet drafts: · Protocol Independent Multicast (PIM): Motivation and Architecture · Protocol Independent Multicast (PIM), Dense Mode Protocol Specification · Protocol Independent Multicast (PIM), Sparse Mode Protocol Specification · draft-ietf-idmr-igmp-v2-06.txt, Internet Group Management Protocol, Version 2 · draft-ietf-pim-v2-dm-03.txt, PIM Version 2 Dense Mode Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 237 PIM Versions IP Multicast Routing PIM Versions PIMv2 includes these improvements over PIMv1: · A single, active rendezvous point (RP) exists per multicast group, with multiple backup RPs. This single RP compares to multiple active RPs for the same group in PIMv1. · A bootstrap router (BSR) provides a fault-tolerant, automated RP discovery and distribution function that enables routers and multilayer switches to dynamically learn the group-to-RP mappings. · Sparse mode and dense mode are properties of a group, as opposed to an interface. Note We strongly recommend using sparse-dense mode as opposed to either sparse mode or dense mode only. · PIM join and prune messages have more flexible encoding for multiple address families. · A more flexible hello packet format replaces the query packet to encode current and future capability options. · Register messages sent to an RP specify whether they are sent by a border router or a designated router. · PIM packets are no longer inside IGMP packets; they are standalone packets. PIMv1 and PIMv2 Interoperability To avoid misconfiguring multicast routing on your switch, review the information in this section. The Cisco PIMv2 implementation provides interoperability and transition between Version 1 and Version 2, although there might be some minor problems. You can upgrade to PIMv2 incrementally. PIM Versions 1 and 2 can be configured on different routers and multilayer switches within one network. Internally, all routers and multilayer switches on a shared media network must run the same PIM version. Therefore, if a PIMv2 device detects a PIMv1 device, the Version 2 device downgrades itself to Version 1 until all Version 1 devices have been shut down or upgraded. PIMv2 uses the BSR to discover and announce RP-set information for each group prefix to all the routers and multilayer switches in a PIM domain. PIMv1, together with the Auto-RP feature, can perform the same tasks as the PIMv2 BSR. However, Auto-RP is a standalone protocol, separate from PIMv1, and is a proprietary Cisco protocol. PIMv2 is a standards track protocol in the IETF. Note We recommend that you use PIMv2. The BSR function interoperates with Auto-RP on Cisco routers and multilayer switches. When PIMv2 devices interoperate with PIMv1 devices, Auto-RP should have already been deployed. A PIMv2 BSR that is also an Auto-RP mapping agent automatically advertises the RP elected by Auto-RP. That is, Auto-RP sets its single RP on every router or multilayer switch in the group. Not all routers and switches in the domain use the PIMv2 hash function to select multiple RPs. Dense-mode groups in a mixed PIMv1 and PIMv2 region need no special configuration; they automatically interoperate. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 238 IP Multicast Routing PIM Modes Sparse-mode groups in a mixed PIMv1 and PIMv2 region are possible because the Auto-RP feature in PIMv1 interoperates with the PIMv2 RP feature. Although all PIMv2 devices can also use PIMv1, we recommend that the RPs be upgraded to PIMv2. To ease the transition to PIMv2, we recommend: · Using Auto-RP throughout the region. · Configuring sparse-dense mode throughout the region. If Auto-RP is not already configured in the PIMv1 regions, configure Auto-RP. PIM Modes PIM can operate in dense mode (DM), sparse mode (SM), or in sparse-dense mode (PIM DM-SM), which handles both sparse groups and dense groups at the same time. PIM DM PIM DM builds source-based multicast distribution trees. In dense mode, a PIM DM router or multilayer switch assumes that all other routers or multilayer switches forward multicast packets for a group. If a PIM DM device receives a multicast packet and has no directly connected members or PIM neighbors present, a prune message is sent back to the source to stop unwanted multicast traffic. Subsequent multicast packets are not flooded to this router or switch on this pruned branch because branches without receivers are pruned from the distribution tree, leaving only branches that contain receivers. When a new receiver on a previously pruned branch of the tree joins a multicast group, the PIM DM device detects the new receiver and immediately sends a graft message up the distribution tree toward the source. When the upstream PIM DM device receives the graft message, it immediately puts the interface on which the graft was received into the forwarding state so that the multicast traffic begins flowing to the receiver. PIM-SM PIM-SM uses shared trees and shortest-path-trees (SPTs) to distribute multicast traffic to multicast receivers in the network. In PIM-SM, a router or multilayer switch assumes that other routers or switches do not forward multicast packets for a group, unless there is an explicit request for the traffic (join message). When a host joins a multicast group using IGMP, its directly connected PIM-SM device sends PIM join messages toward the root, also known as the rendezvous point (RP). This join message travels router-by-router toward the root, constructing a branch of the shared tree as it goes. The RP keeps track of multicast receivers. It also registers sources through register messages received from the source's first-hop router (designated router [DR]) to complete the shared tree path from the source to the receiver. When using a shared tree, sources must send their traffic to the RP so that the traffic reaches all receivers. Prune messages are sent up the distribution tree to prune multicast group traffic. This action permits branches of the shared tree or SPT that were created with explicit join messages to be torn down when they are no longer needed. When the number of PIM-enabled interfaces exceeds the hardware capacity and PIM-SM is enabled with the SPT threshold is set to infinity, the switch does not create (source, group (S, G) ) entries in the multicast routing table for the some directly connected interfaces if they are not already in the table. The switch might not correctly forward traffic from these interfaces. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 239 Multicast Source Discovery Protocol (MSDP) IP Multicast Routing Multicast Source Discovery Protocol (MSDP) Multicast Source Discovery Protocol (MSDP) is used for inter-domain source discovery when PIM SM is used. Each PIM administrative domain has its own RP. In order for the RP in one domain to signal new sources to the RP in the other domain, MSDP is used. When RP in a domain receives a PIM register message for a new source, with MSDP configured it sends a new source-active (SA) message to all its MSDP peers in other domains. Each intermediate MSDP peer floods this SA message away from the originating RP. The MSDP peers install this SA message in their MSDP sa-cache. If the RPs in other domains have any join requests for the group in the SA message (indicated by the presence of a (*,G) entry with non empty outgoing interface list), the domain is interested in the group, and the RP triggers an (S,G) join toward the source. PIM Stub Routing The PIM stub routing feature, available in all of the switch software images, reduces resource usage by moving routed traffic closer to the end user. The PIM stub routing feature supports multicast routing between the distribution layer and the access layer. It supports two types of PIM interfaces: uplink PIM interfaces and PIM passive interfaces. A routed interface configured with the PIM passive mode does not pass or forward PIM control traffic, it only passes and forwards IGMP traffic. In a network using PIM stub routing, the only allowable route for IP traffic to the user is through a switch that is configured with PIM stub routing. PIM passive interfaces are connected to Layer 2 access domains, such as VLANs, or to interfaces that are connected to other Layer 2 devices. Only directly connected multicast (IGMP) receivers and sources are allowed in the Layer 2 access domains. The PIM passive interfaces do not send or process any received PIM control packets. When using PIM stub routing, you should configure the distribution and remote routers to use IP multicast routing and configure only the switch as a PIM stub router. The switch does not route transit traffic between distribution routers. You also need to configure a routed uplink port on the switch. The switch uplink port cannot be used with SVIs. If you need PIM for an SVI uplink port, you should upgrade to the IP Services feature set. You must also configure EIGRP stub routing when configuring PIM stub routing on the switch. For information about this procedure, refer to the Catalyst 3850 IP Routing Configuration Guide. The redundant PIM stub router topology is not supported. The redundant topology exists when there is more than one PIM router forwarding multicast traffic to a single access domain. PIM messages are blocked, and the PIM asset and designated router election mechanisms are not supported on the PIM passive interfaces. Only the nonredundant access router topology is supported by the PIM stub feature. By using a nonredundant topology, the PIM passive interface assumes that it is the only interface and designated router on that access domain. Figure 8: PIM Stub Router Configuration In the following figure, Switch A routed uplink port 25 is connected to the router and PIM stub routing is enabled on the VLAN 100 interfaces and on Host 3. This configuration allows the directly connected hosts Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 240 IP Multicast Routing to receive traffic from multicast source IGMP Helper 200.1.1.3. Related Topics Enabling PIM Stub Routing (CLI), on page 246 Example: Enabling PIM Stub Routing, on page 273 IGMP Helper PIM stub routing moves routed traffic closer to the end user and reduces network traffic. You can also reduce traffic by configuring a stub router (switch) with the IGMP helper feature. You can configure a stub router (switch) with the ip igmp helper help-address interface configuration command to enable the switch to send reports to the next-hop interface. Hosts that are not directly connected to a downstream router can then join a multicast group sourced from an upstream network. The IGMP packets from a host wanting to join a multicast stream are forwarded upstream to the next-hop device when this feature is configured. When the upstream central router receives the helper IGMP reports or leaves, it adds or removes the interfaces from its outgoing interface list for that group. For complete syntax and usage information for the ip igmp helper-address command, see the IP Multicast Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches). Auto-RP The PIM-SM protocols require the presence of a rendezvous point (RP) in the network. An RP acts as the meeting place for sources and receivers of multicast data. If a static RP configuration is used, then the configuration needs to be applied on all the routers in the multicast network. To automate this process, the Auto-RP protocol was devised. This Cisco proprietary feature eliminates the need to manually configure the RP information in every router and multilayer switch in the network. For Auto-RP to work, you configure a Cisco router or multilayer switch as the mapping agent. It uses IP multicast to learn which routers or switches in the network are possible candidate RPs to receive candidate RP announcements. Candidate RPs periodically send multicast RP-announce messages to a particular group or group range to announce their availability. Mapping agents listen to these candidate RP announcements and use the information to create entries in their group-to-RP mapping caches. Only one mapping cache entry is created for any group-to-RP range received, even if multiple candidate RPs are sending RP announcements for the same range. As the RP-announce messages arrive, the mapping agent selects the router or switch with the highest IP address as the active RP and stores this RP address in the group-to-RP mapping cache. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 241 Auto-RP Benefits IP Multicast Routing Mapping agents periodically multicast the contents of their group-to-RP mapping caches. Thus, all routers and switches automatically discover which RP to use for the groups that they support. If a router or switch fails to receive RP-discovery messages and the group-to-RP mapping information expires, it changes to a statically configured RP that was defined with the ip pim rp-address global configuration command. If no statically configured RP exists, the router or switch changes the group to dense-mode operation. Multiple RPs serve different group ranges or serve as hot backups of each other. Related Topics Setting Up Auto-RP in a New Internetwork (CLI), on page 251 Example: Configuring Auto-RP, on page 274 Auto-RP Benefits Auto-RP uses IP multicast to automate the distribution of group-to-RP mappings to all Cisco routers and multilayer switches in a PIM network. Auto-RP has these benefits: · Easy to use multiple RPs within a network to serve different group ranges. · Provides load splitting among different RPs and arrangement of RPs according to the location of group participants. · Avoids inconsistent, manual RP configurations on every router and multilayer switch in a PIM network, which can cause connectivity problems. PIM v2 BSR PIMv2 BSR (Bootstrap Router) is another method to distribute group-to-RP mapping information to all PIM routers and multilayer switches in the network. It eliminates the need to manually configure RP information in every router and switch in the network. However, instead of using IP multicast to distribute group-to-RP mapping information, BSR uses hop-by-hop flooding of special BSR messages to distribute the mapping information. The BSR is elected from a set of candidate routers and switches in the domain that have been configured to function as BSRs. The election mechanism is similar to the root-bridge election mechanism used in bridged LANs. The BSR election is based on the BSR priority of the device contained in the BSR messages that are sent hop-by-hop through the network. Each BSR device examines the message and forwards out all interfaces only the message that has either a higher BSR priority than its BSR priority or the same BSR priority, but with a higher BSR IP address. Using this method, the BSR is elected. The elected BSR sends BSR messages with a TTL of 1. Neighboring PIMv2 routers or multilayer switches receive the BSR message and multicast it out all other interfaces (except the one on which it was received) with a TTL of 1. In this way, BSR messages travel hop-by-hop throughout the PIM domain. Because BSR messages contain the IP address of the current BSR, the flooding mechanism enables candidate RPs to automatically learn which device is the elected BSR. Candidate RPs send candidate RP advertisements showing the group range for which they are responsible to the BSR, which stores this information in its local candidate-RP cache. The BSR periodically advertises the contents of this cache in BSR messages to all other PIM devices in the domain. These messages travel hop-by-hop through the network to all routers and switches, which store the RP information in the BSR message in their local RP cache. The routers and switches select the same RP for a given group because they all use a common RP hashing algorithm. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 242 IP Multicast Routing Multicast Forwarding and Reverse Path Check Related Topics Configuring Candidate BSRs (CLI), on page 264 Example: Configuring Candidate BSRs, on page 276 Multicast Forwarding and Reverse Path Check With unicast routing, routers and multilayer switches forward traffic through the network along a single path from the source to the destination host whose IP address appears in the destination address field of the IP packet. Each router and switch along the way makes a unicast forwarding decision, using the destination IP address in the packet, by looking up the destination address in the unicast routing table and forwarding the packet through the specified interface to the next hop toward the destination. With multicasting, the source is sending traffic to an arbitrary group of hosts represented by a multicast group address in the destination address field of the IP packet. To decide whether to forward or drop an incoming multicast packet, the router or multilayer switch uses a reverse path forwarding (RPF) check on the packet as follows: 1. The router or multilayer switch examines the source address of the arriving multicast packet to decide whether the packet arrived on an interface that is on the reverse path back to the source. 2. If the packet arrives on the interface leading back to the source, the RPF check is successful and the packet is forwarded to all interfaces in the outgoing interface list (which might not be all interfaces on the router). 3. If the RPF check fails, the packet is discarded. Some multicast routing protocols, such as DVMRP, maintain a separate multicast routing table and use it for the RPF check. However, PIM uses the unicast routing table to perform the RPF check. Note DVMRP is not supported on the switch. Figure 9: RPF Check The following figure shows port 2 receiving a multicast packet from source 151.10.3.21. The following table shows that the port on the reverse path to the source is port 1, not port 2. Because the RPF check fails, the multilayer switch discards the packet. Another multicast packet from source 151.10.3.21 is received on port 1, and the routing table shows this port is on the reverse path to the source. Because the RPF check passes, the switch forwards the packet to all port in the outgoing port list Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 243 PIM Shared Tree and Source Tree IP Multicast Routing Table 31: Routing Table Example for an RPF Check Network 151.10.0.0/16 198.14.32.0/32 204.1.16.0/24 Port Gigabit Ethernet 1/0/1 Gigabit Ethernet 1/0/3 Gigabit Ethernet 1/0/4 PIM uses both source trees and RP-rooted shared trees to forward datagrams. The RPF check is performed differently for each: · If a PIM router or multilayer switch has a source-tree state (that is, an (S, G) entry is present in the multicast routing table), it performs the RPF check against the IP address of the source of the multicast packet. · If a PIM router or multilayer switch has a shared-tree state (and no explicit source-tree state), it performs the RPF check on the RP address (which is known when members join the group). Sparse-mode PIM uses the RPF lookup function to decide where it needs to send joins and prunes: · (S, G) joins (which are source-tree states) are sent toward the source. · (*,G) joins (which are shared-tree states) are sent toward the RP. Note DVMRP is not supported on the switch. PIM Shared Tree and Source Tree By default, members of a group receive data from senders to the group across a single data-distribution tree rooted at the RP. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 244 IP Multicast Routing PIM Shared Tree and Source Tree Figure 10: Shared Tree and Source Tree (Shortest-Path Tree) The following figure shows this type of shared-distribution tree. Data from senders is delivered to the RP for distribution to group members joined to the shared tree. If the data rate warrants, leaf routers (routers without any downstream connections) on the shared tree can use the data distribution tree rooted at the source. This type of distribution tree is called a shortest-path tree or source tree. By default, the software switches to a source tree upon receiving the first data packet from a source. This process describes the move from a shared tree to a source tree: 1. A receiver joins a group; leaf Router C sends a join message toward the RP. 2. The RP puts a link to Router C in its outgoing interface list. 3. A source sends data; Router A encapsulates the data in a register message and sends it to the RP. 4. The RP forwards the data down the shared tree to Router C and sends a join message toward the source. At this point, data might arrive twice at Router C, once encapsulated and once natively. 5. When data arrives natively (unencapsulated) at the RP, it sends a register-stop message to Router A. 6. By default, reception of the first data packet prompts Router C to send a join message toward the source. 7. When Router C receives data on (S, G), it sends a prune message for the source up the shared tree. 8. The RP deletes the link to Router C from the outgoing interface of (S, G). The RP triggers a prune message toward the source. Join and prune messages are sent for sources and RPs. They are sent hop-by-hop and are processed by each PIM device along the path to the source or RP. Register and register-stop messages are not sent hop-by-hop. They are sent by the designated router that is directly connected to a source and are received by the RP for the group. Multiple sources sending to groups use the shared tree. You can configure the PIM device to stay on the shared tree. You can configure the PIM device to stay on the shared tree. For more information, see Delaying the Use of PIM Shortest-Path Tree (CLI), on page 268. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 245 Default PIM Routing Configuration IP Multicast Routing Default PIM Routing Configuration This table displays the default PIM routing configuration for the switch. Table 32: Default Multicast Routing Configuration Feature Multicast routing PIM version PIM mode PIM stub routing PIM RP address PIM domain border PIM multicast boundary Candidate BSRs Candidate RPs Shortest-path tree threshold rate PIM router query message interval Default Setting Disabled on all interfaces. Version 2. No mode is defined. None configured. None configured. Disabled. None. Disabled. Disabled. 0 kb/s. 30 seconds. How to Configure PIM Enabling PIM Stub Routing (CLI) This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip pim passive 5. end 6. show ip pim interface 7. show ip igmp groups detail 8. show ip mroute 9. show running-config 10. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 246 IP Multicast Routing DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Step 4 Step 5 ip pim passive Example: Switch(config-if)# ip pim passive end Example: Switch(config-if)# end Enabling PIM Stub Routing (CLI) Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Specifies the interface on which you want to enable PIM stub routing, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 These interfaces must have IP addresses assigned to them. Configures the PIM stub feature on the interface. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 247 Configuring a Rendezvous Point IP Multicast Routing Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action show ip pim interface Example: Switch# show ip pim interface show ip igmp groups detail Example: Switch# show ip igmp groups detail show ip mroute Example: Switch# show ip mroute show running-config Example: Switch# show running-config copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Displays the PIM stub that is enabled on each interface. (Optional) Displays the interested clients that have joined the specific multicast source group. (Optional) Displays the IP multicast routing table. (Optional) Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics PIM Stub Routing, on page 240 Example: Enabling PIM Stub Routing, on page 273 Configuring a Rendezvous Point You must have a rendezvous point (RP), if the interface is in sparse-dense mode and if you want to handle the group as a sparse group. You can use several methods, as described in these sections: · Manual assignment For information about this procedure, see Manually Assigning an RP to Multicast Groups (CLI), on page 249. · As a standalone, Cisco-proprietary protocol separate from PIMv1 For information about these procedures, see the following sections: · Setting Up Auto-RP in a New Internetwork (CLI), on page 251 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 248 IP Multicast Routing Manually Assigning an RP to Multicast Groups (CLI) · Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI), on page 254 · Preventing Join Messages to False RPs (CLI), on page 257 · Filtering Incoming RP Announcement Messages (CLI), on page 257 · Using a standards track protocol in the Internet Engineering Task Force (IETF) For information about this procedure, see Configuring PIMv2 BSR, on page 259. Note You can use Auto-RP, BSR, or a combination of both, depending on the PIM version that you are running and the types of routers in your network. For information about working with different PIM versions in your network, see PIMv1 and PIMv2 Interoperability, on page 238. Manually Assigning an RP to Multicast Groups (CLI) If the rendezvous point (RP) for a group is learned through a dynamic mechanism (such as Auto-RP or BSR), you need not perform this task for that RP. Senders of multicast traffic announce their existence through register messages received from the source first-hop router (designated router) and forwarded to the RP. Receivers of multicast packets use RPs to join a multicast group by using explicit join messages. Note RPs are not members of the multicast group; they serve as a meeting place for multicast sources and group members. You can configure a single RP for multiple groups defined by an access list. If there is no RP configured for a group, the multilayer switch responds to the group as dense and uses the dense-mode PIM techniques. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. ip pim rp-address ip-address [access-list-number] [override] 4. access-list access-list-number {deny | permit} source [source-wildcard] 5. end 6. show running-config 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 249 Manually Assigning an RP to Multicast Groups (CLI) IP Multicast Routing Command or Action Switch> enable Purpose Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 ip pim rp-address ip-address [access-list-number] [override] Example: Switch(config)# ip pim rp-address 10.1.1.1 20 override access-list access-list-number {deny | permit} source [source-wildcard] Example: Switch(config)# access-list 25 permit 10.5.0.1 255.224.0.0 Configures the address of a PIM RP. By default, no PIM RP address is configured. You must configure the IP address of RPs on all routers and multilayer switches (including the RP). Note If there is no RP configured for a group, the switch treats the group as dense, using the dense-mode PIM techniques. A PIM device can be an RP for more than one group. Only one RP address can be used at a time within a PIM domain. The access list conditions specify for which groups the device is an RP. · For ip-address, enter the unicast address of the RP in dotted-decimal notation. · (Optional) For access-list-number, enter an IP standard access list number from 1 to 99. If no access list is configured, the RP is used for all groups. · (Optional) The override keyword indicates that if there is a conflict between the RP configured with this command and one learned by Auto-RP or BSR, the RP configured with this command prevails. Creates a standard access list, repeating the command as many times as necessary. · For access-list-number, enter the access list number specified in Step 2. · The deny keyword denies access if the conditions are matched. · The permit keyword permits access if the conditions are matched. · For source, enter the multicast group address for which the RP should be used. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 250 IP Multicast Routing Setting Up Auto-RP in a New Internetwork (CLI) Command or Action Step 5 end Example: Switch(config)# end Step 6 show running-config Example: Switch# show running-config Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose source. Place ones in the bit positions that you want to ignore. The access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Setting Up Auto-RP in a New Internetwork (CLI) If you are setting up Auto-RP in a new internetwork, you do not need a default RP because you configure all the interfaces for sparse-dense mode. Note Omit Step 3 in the following procedure, if you want to configure a PIM router as the RP for the local group. SUMMARY STEPS 1. enable 2. show running-config 3. configure terminal 4. ip pim send-rp-announce interface-id scope ttl group-list access-list-number interval seconds 5. access-list access-list-number {deny | permit} source [source-wildcard] 6. ip pim send-rp-discovery scope ttl 7. end 8. show running-config 9. show ip pim rp mapping 10. show ip pim rp 11. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 251 Setting Up Auto-RP in a New Internetwork (CLI) IP Multicast Routing DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 show running-config Example: Switch# show running-config Step 3 configure terminal Example: Switch# configure terminal Verifies that a default RP is already configured on all PIM devices and the RP in the sparse-mode network. It was previously configured with the ip pim rp-address global configuration command. Note This step is not required for spare-dense-mode environments. The selected RP should have good connectivity and be available across the network. Use this RP for the global groups (for example, 224.x.x.x and other global groups). Do not reconfigure the group address range that this RP serves. RPs dynamically discovered through Auto-RP take precedence over statically configured RPs. Assume that it is desirable to use a second RP for the local groups. Enters the global configuration mode. Step 4 ip pim send-rp-announce interface-id scope ttl group-list Configures another PIM device to be the candidate RP for access-list-number interval seconds local groups. Example: Switch(config)# ip pim send-rp-announce gigabitethernet 1/0/5 scope 20 group-list 10 interval 120 · For interface-id, enter the interface type and number that identifies the RP address. Valid interfaces include physical ports, port channels, and VLANs. · For scope ttl, specify the time-to-live value in hops. Enter a hop count that is high enough so that the RP-announce messages reach all mapping agents in the network. There is no default setting. The range is 1 to 255. · For group-list access-list-number, enter an IP standard access list number from 1 to 99. If no access list is configured, the RP is used for all groups. · For interval seconds, specify how often the announcement messages must be sent. The default is 60 seconds. The range is 1 to 16383. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 252 IP Multicast Routing Setting Up Auto-RP in a New Internetwork (CLI) Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose access-list access-list-number {deny | permit} source Creates a standard access list, repeating the command as [source-wildcard] many times as necessary. Example: Switch(config)# access-list 10 permit 10.10.0.0 · For access-list-number, enter the access list number specified in Step 3. · The deny keyword denies access if the conditions are matched. · The permit keyword permits access if the conditions are matched. · For source, enter the multicast group address range for which the RP should be used. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. Note Recall that the access list is always terminated by an implicit deny statement for everything. ip pim send-rp-discovery scope ttl Finds a switch whose connectivity is not likely to be Example: interrupted, and assign it the role of RP-mapping agent. For scope ttl, specify the time-to-live value in hops to limit Switch(config)# ip pim send-rp-discovery scope 50 the RP discovery packets. All devices within the hop count from the source device receive the Auto-RP discovery messages. These messages tell other devices which group-to-RP mapping to use to avoid conflicts (such as overlapping group-to-RP ranges). There is no default setting. The range is 1 to 255. end Example: Returns to privileged EXEC mode. Switch(config)# end show running-config Example: Switch# show running-config Verifies your entries. show ip pim rp mapping Example: Switch# show ip pim rp mapping Displays active RPs that are cached with associated multicast routing entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 253 Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI) IP Multicast Routing Step 10 Step 11 Command or Action show ip pim rp Example: Switch# show ip pim rp copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Displays the information cached in the routing table. (Optional) Saves your entries in the configuration file. Related Topics Auto-RP, on page 241 Example: Configuring Auto-RP, on page 274 Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI) This section contains suggestions for the initial deployment of Auto-RP into an existing sparse-mode cloud to minimize disruption of the existing multicast infrastructure. This procedure is optional. SUMMARY STEPS 1. enable 2. show running-config 3. configure terminal 4. ip pim send-rp-announce interface-id scope ttl group-list access-list-number interval seconds 5. access-list access-list-number {deny | permit} source [source-wildcard] 6. ip pim send-rp-discovery scope ttl 7. end 8. show running-config 9. show ip pim rp mapping 10. show ip pim rp 11. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 254 IP Multicast Routing Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI) Step 2 Step 3 Step 4 Step 5 Command or Action show running-config Example: Switch# show running-config configure terminal Example: Switch# configure terminal Purpose Verifies that a default RP is already configured on all PIM devices and the RP in the sparse-mode network. It was previously configured with the ip pim rp-address global configuration command. Note This step is not required for spare-dense-mode environments. The selected RP should have good connectivity and be available across the network. Use this RP for the global groups (for example, 224.x.x.x and other global groups). Do not reconfigure the group address range that this RP serves. RPs dynamically discovered through Auto-RP take precedence over statically configured RPs. Assume that it is desirable to use a second RP for the local groups. Enters the global configuration mode. ip pim send-rp-announce interface-id scope ttl group-list Configures another PIM device to be the candidate RP for access-list-number interval seconds local groups. Example: Switch(config)# ip pim send-rp-announce gigabitethernet 1/0/5 scope 20 group-list 10 interval 120 · For interface-id, enter the interface type and number that identifies the RP address. Valid interfaces include physical ports, port channels, and VLANs. · For scope ttl, specify the time-to-live value in hops. Enter a hop count that is high enough so that the RP-announce messages reach all mapping agents in the network. There is no default setting. The range is 1 to 255. · For group-list access-list-number, enter an IP standard access list number from 1 to 99. If no access list is configured, the RP is used for all groups. · For interval seconds, specify how often the announcement messages must be sent. The default is 60 seconds. The range is 1 to 16383. access-list access-list-number {deny | permit} source [source-wildcard] Example: Switch(config)# access-list 10 permit 224.0.0.0 15.255.255.255 Creates a standard access list, repeating the command as many times as necessary. · For access-list-number, enter the access list number specified in Step 3. · The deny keyword denies access if the conditions are matched. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 255 Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI) IP Multicast Routing Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose · The permit keyword permits access if the conditions are matched. · For source, enter the multicast group address range for which the RP should be used. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. Recall that the access list is always terminated by an implicit deny statement for everything. ip pim send-rp-discovery scope ttl Finds a switch whose connectivity is not likely to be Example: interrupted, and assigns it the role of RP-mapping agent. For scope ttl, specify the time-to-live value in hops to limit Switch(config)# ip pim send-rp-discovery scope 50 the RP discovery packets. All devices within the hop count from the source device receive the Auto-RP discovery messages. These messages tell other devices which group-to-RP mapping to use to avoid conflicts (such as overlapping group-to-RP ranges). There is no default setting. The range is 1 to 255. Note To remove the switch as the RP-mapping agent, use the no ip pim send-rp-discovery global configuration command. end Example: Switch(config)# end Returns to privileged EXEC mode. show running-config Example: Switch# show running-config Verifies your entries. show ip pim rp mapping Example: Switch# show ip pim rp mapping Displays active RPs that are cached with associated multicast routing entries. show ip pim rp Example: Displays the information cached in the routing table. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 256 IP Multicast Routing Preventing Join Messages to False RPs (CLI) Step 11 Command or Action Switch# show ip pim rp copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Preventing Join Messages to False RPs (CLI) Determine whether the ip pim accept-rp command was previously configured throughout the network by using the show running-config privileged EXEC command. If the ip pim accept-rp command is not configured on any device, this problem can be addressed later. In those routers or multilayer switches already configured with the ip pim accept-rp command, you must enter the command again to accept the newly advertised RP. To accept all RPs advertised with Auto-RP and reject all other RPs by default, use the ip pim accept-rp auto-rp global configuration command. This procedure is optional. Related Topics Example: Preventing Join Messages to False RPs, on page 275 Filtering Incoming RP Announcement Messages (CLI) You can add configuration commands to the mapping agents to prevent a maliciously configured router from masquerading as a candidate RP and causing problems. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. ip pim rp-announce-filter rp-list access-list-number group-list access-list-number 4. access-list access-list-number {deny | permit} source [source-wildcard] 5. end 6. show running-config 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 257 Filtering Incoming RP Announcement Messages (CLI) IP Multicast Routing Step 2 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 3 Step 4 ip pim rp-announce-filter rp-list access-list-number Filters incoming RP announcement messages. group-list access-list-number Example: Enter this command on each mapping agent in the network. Without this command, all incoming RP-announce messages are accepted by default. Switch(config)# ip 10 group-list 14 pim rp-announce-filter rp-list For rp-list access-list-number, configure an access list of candidate RP addresses that, if permitted, is accepted for the group ranges supplied in the group-list access-list-number variable. If this variable is omitted, the filter applies to all multicast groups. If more than one mapping agent is used, the filters must be consistent across all mapping agents to ensure that no conflicts occur in the group-to-RP mapping information. access-list access-list-number {deny | permit} source [source-wildcard] Example: Switch(config)# access-list 10 permit 10.8.1.0 255.255.224.0 Creates a standard access list, repeating the command as many times as necessary. · For access-list-number, enter the access list number specified in Step 2. · The deny keyword denies access if the conditions are matched. · The permit keyword permits access if the conditions are matched. · Create an access list that specifies from which routers and multilayer switches the mapping agent accepts candidate RP announcements (rp-list ACL). · Create an access list that specifies the range of multicast groups from which to accept or deny (group-list ACL). · For source, enter the multicast group address range for which the RP should be used. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. The access list is always terminated by an implicit deny statement for everything. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 258 IP Multicast Routing Configuring PIMv2 BSR Step 5 Command or Action end Example: Switch(config)# end Step 6 show running-config Example: Switch# show running-config Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics Example: Filtering Incoming RP Announcement Messages, on page 275 Configuring PIMv2 BSR The process for configuring PIMv2 BSR may involve the following optional tasks: · Defining the PIM domain border · Defining the IP multicast boundary · Configuring candidate BSRs · Configuring candidate RPs Defining the PIM Domain Border (CLI) As IP multicast becomes more widespread, the chance of one PIMv2 domain bordering another PIMv2 domain increases. Because two domains probably do not share the same set of RPs, BSR, candidate RPs, and candidate BSRs, you need to constrain PIMv2 BSR messages from flowing into or out of the domain. Allowing messages to leak across the domain borders could adversely affect the normal BSR election mechanism and elect a single BSR across all bordering domains and comingle candidate RP advertisements, resulting in the election of RPs in the wrong domain. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 259 Defining the PIM Domain Border (CLI) IP Multicast Routing Figure 11: Constraining PIMv2 BSR Messages This figure displays how you can configure the PIM domain border by using the ip pim bsr-border command. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id 4. ip pim bsr-border 5. end 6. show running-config 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Specifies the interface to be configured, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 260 IP Multicast Routing Defining the PIM Domain Border (CLI) Command or Action Step 4 ip pim bsr-border Example: Switch(config-if)# ip pim bsr-border Step 5 end Example: Switch(config)# end Step 6 show running-config Example: Switch# show running-config Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 These interfaces must have IP addresses assigned to them. Defines a PIM bootstrap message boundary for the PIM domain. Enter this command on each interface that connects to other bordering PIM domains. This command instructs the switch to neither send nor receive PIMv2 BSR messages on this interface. Note To remove the PIM border, use the no ip pim bsr-border interface configuration command. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 261 Defining the IP Multicast Boundary (CLI) IP Multicast Routing Defining the IP Multicast Boundary (CLI) You define a multicast boundary to prevent Auto-RP messages from entering the PIM domain. You create an access list to deny packets destined for 224.0.1.39 and 224.0.1.40, which carry Auto-RP information. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. access-list access-list-number deny source [source-wildcard] 4. interface interface-id 5. ip multicast boundary access-list-number 6. end 7. show running-config 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 access-list access-list-number deny source [source-wildcard] Example: Switch(config)# access-list 12 deny 224.0.1.39 access-list 12 deny 224.0.1.40 Creates a standard access list, repeating the command as many times as necessary. · For access-list-number, the range is 1 to 99. · The deny keyword denies access if the conditions are matched. · For source, enter multicast addresses 224.0.1.39 and 224.0.1.40, which carry Auto-RP information. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. The access list is always terminated by an implicit deny statement for everything. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 262 IP Multicast Routing Defining the IP Multicast Boundary (CLI) Step 4 Step 5 Command or Action Purpose interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Specifies the interface to be configured, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 ip multicast boundary access-list-number Example: These interfaces must have IP addresses assigned to them. Configures the boundary, specifying the access list you created in Step 2. Switch(config-if)# ip multicast boundary 12 Step 6 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 7 show running-config Example: Switch# show running-config Verifies your entries. Step 8 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 263 Configuring Candidate BSRs (CLI) IP Multicast Routing Related Topics Example: Defining the IP Multicast Boundary to Deny Auto-RP Information, on page 275 Configuring Candidate BSRs (CLI) You can configure one or more candidate BSRs. The devices serving as candidate BSRs should have good connectivity to other devices and be in the backbone portion of the network. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. ip pim bsr-candidate interface-id hash-mask-length [priority] 4. end 5. show running-config 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 ip pim bsr-candidate interface-id hash-mask-length [priority] Example: Switch(config)# ip pim bsr-candidate gigabitethernet 1/0/3 28 100 Configures your switch to be a candidate BSR. · For interface-id, enter the interface on this switch from which the BSR address is derived to make it a candidate. This interface must be enabled with PIM. Valid interfaces include physical ports, port channels, and VLANs. · For hash-mask-length, specify the mask length (32 bits maximum) that is to be ANDed with the group address before the hash function is called. All groups with the same seed hash correspond to the same RP. For example, if this value is 24, only the first 24 bits of the group addresses matter. · (Optional) For priority, enter a number from 0 to 255. The BSR with the larger priority is preferred. If the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 264 IP Multicast Routing Configuring the Candidate RPs (CLI) Command or Action Step 4 end Example: Switch(config-if)# end Step 5 show running-config Example: Switch# show running-config Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose priority values are the same, the device with the highest IP address is selected as the BSR. The default is 0. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics PIM v2 BSR, on page 242 Example: Configuring Candidate BSRs, on page 276 Configuring the Candidate RPs (CLI) You can configure one or more candidate RPs. Similar to BSRs, the RPs should also have good connectivity to other devices and be in the backbone portion of the network. An RP can serve the entire IP multicast address space or a portion of it. Candidate RPs send candidate RP advertisements to the BSR. When deciding which devices should be RPs, consider these options: · In a network of Cisco routers and multilayer switches where only Auto-RP is used, any device can be configured as an RP. · In a network that includes only Cisco PIMv2 routers and multilayer switches and with routers from other vendors, any device can be used as an RP. · In a network of Cisco PIMv1 routers, Cisco PIMv2 routers, and routers from other vendors, configure only Cisco PIMv2 routers and multilayer switches as RPs. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. ip pim rp-candidate interface-id [group-list access-list-number] 4. access-list access-list-number {deny | permit} source [source-wildcard] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 265 Configuring the Candidate RPs (CLI) IP Multicast Routing 5. end 6. show running-config 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 Step 5 ip pim rp-candidate interface-id [group-list Configures your switch to be a candidate RP. access-list-number] · For interface-id, specify the interface whose associated Example: IP address is advertised as a candidate RP address. Valid interfaces include physical ports, port channels, Switch(config)# ip pim rp-candidate gigabitethernet and VLANs. 1/0/5 group-list 10 · (Optional) For group-list access-list-number, enter an IP standard access list number from 1 to 99. If no group-list is specified, the switch is a candidate RP for all groups. access-list access-list-number {deny | permit} source [source-wildcard] Example: Switch(config)# access-list 10 permit 239.0.0.0 0.255.255.255 Creates a standard access list, repeating the command as many times as necessary. · For access-list-number, enter the access list number specified in Step 2. · The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. · For source, enter the number of the network or host from which the packet is being sent. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. The access list is always terminated by an implicit deny statement for everything. end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 266 IP Multicast Routing Configuring Auto-RP and BSR for the Network (CLI) Command or Action Example: Switch(config-if)# end Step 6 show running-config Example: Switch# show running-config Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies your entries (Optional) Saves your entries in the configuration file Related Topics Example: Configuring Candidate RPs, on page 276 Configuring Auto-RP and BSR for the Network (CLI) If there are only Cisco devices in your network (no routers from other vendors), there is no need to configure a BSR. Configure Auto-RP in a network that is running both PIMv1 and PIMv2. If you have non-Cisco PIMv2 routers that need to interoperate with Cisco PIMv1 routers and multilayer switches, both Auto-RP and a BSR are required. We recommend that a Cisco PIMv2 router or multilayer switch be both the Auto-RP mapping agent and the BSR. If you must have one or more BSRs, we have these recommendations: · Configure the candidate BSRs as the RP-mapping agents for Auto-RP. For information about these procedures, see: · Configuring a Rendezvous Point, on page 248 · Configuring Candidate BSRs (CLI), on page 264 · For group prefixes advertised through Auto-RP, the PIMv2 BSR mechanism should not advertise a subrange of these group prefixes served by a different set of RPs. In a mixed PIMv1 and PIMv2 domain, backup RPs should serve the same group prefixes. This prevents the PIMv2 DRs from selecting a different RP from those PIMv1 DRs, due to the longest match lookup in the RP-mapping database. Before you begin Beginning in privileged EXEC mode, follow these steps to verify the consistency of group-to-RP mappings. This procedure is optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 267 Delaying the Use of PIM Shortest-Path Tree (CLI) IP Multicast Routing SUMMARY STEPS 1. show ip pim rp [ hostname or IP address | mapping [ hostname or IP address | elected | in-use ] | metric [ hostname or IP address ] ] 2. show ip pim rp-hash group DETAILED STEPS Step 1 Command or Action show ip pim rp [ hostname or IP address | mapping [ hostname or IP address | elected | in-use ] | metric [ hostname or IP address ] ] Example: Switch# show ip pim rp mapping Purpose On any Cisco device, displays available RP mappings and metrics: · (Optional) For the hostname, specify the IP name of the group about which to display RPs. · (Optional) For the IP address, specify the IP address of the group about which to display RPs. · (Optional) Use the mapping keyword to display all group-to-RP mappings of which the Cisco device is aware (either configured or learned from Auto-RP). · (Optional) Use the metric keyword to display the RP RPF metric. Step 2 show ip pim rp-hash group Example: Switch# show ip pim rp-hash 239.1.1.1 On a PIMv2 router or multilayer switch, confirms that the same RP is the one that a PIMv1 system chooses. For group, enter the group address for which to display RP information. Delaying the Use of PIM Shortest-Path Tree (CLI) The change from shared to source tree happens when the first data packet arrives at the last-hop router. This change occurs because the ip pim spt-threshold global configuration command controls that timing. The shortest-path tree requires more memory than the shared tree but reduces delay. You might want to postpone its use. Instead of allowing the leaf router to immediately move to the shortest-path tree, you can specify that the traffic must first reach a threshold. You can configure when a PIM leaf router should join the shortest-path tree for a specified group. If a source sends at a rate greater than or equal to the specified kbps rate, the multilayer switch triggers a PIM join message toward the source to construct a source tree (shortest-path tree). If the traffic rate from the source drops below the threshold value, the leaf router switches back to the shared tree and sends a prune message toward the source. You can specify to which groups the shortest-path tree threshold applies by using a group list (a standard access list). If a value of 0 is specified or if the group list is not used, the threshold applies to all groups. This procedure is optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 268 IP Multicast Routing Delaying the Use of PIM Shortest-Path Tree (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. access-list access-list-number {deny | permit} source [source-wildcard] 4. ip pim spt-threshold {kbps | infinity} [group-list access-list-number] 5. end 6. show running-config 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 3 Step 4 access-list access-list-number {deny | permit} source [source-wildcard] Example: Switch(config)# access-list 16 permit 225.0.0.0 0.255.255.255 Creates a standard access list. · For access-list-number, the range is 1 to 99. · The deny keyword denies access if the conditions are matched. · The permit keyword permits access if the conditions are matched. · For source, specify the multicast group to which the threshold will apply. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. ip pim spt-threshold {kbps | infinity} [group-list access-list-number] Example: Switch(config)# ip pim spt-threshold The access list is always terminated by an implicit deny statement for everything. Specifies the threshold that must be reached before moving to shortest-path tree (spt). · For kbps, specify the traffic rate in kilobits per second. The default is 0 kbps. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 269 Modifying the PIM Router-Query Message Interval (CLI) IP Multicast Routing Command or Action infinity group-list 16 Step 5 end Example: Switch(config)# end Step 6 show running-config Example: Switch# show running-config Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Note Because of switch hardware limitations, 0 kbps is the only valid entry even though the range is 0 to 4294967. · Specify infinity if you want all sources for the specified group to use the shared tree, never switching to the source tree. · (Optional) For group-list access-list-number, specify the access list created in Step 2. If the value is 0 or if the group list is not used, the threshold applies to all groups. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Modifying the PIM Router-Query Message Interval (CLI) PIM routers and multilayer switches send PIM router-query messages to find which device will be the designated router (DR) for each LAN segment (subnet). The DR is responsible for sending IGMP host-query messages to all hosts on the directly connected LAN. With PIM DM operation, the DR has meaning only if IGMPv1 is in use. IGMPv1 does not have an IGMP querier election process, so the elected DR functions as the IGMP querier. With PIM-SM operation, the DR is the device that is directly connected to the multicast source. It sends PIM register messages to notify the RP that multicast traffic from a source needs to be forwarded down the shared tree. In this case, the DR is the device with the highest IP address. This procedure is optional. SUMMARY STEPS 1. enable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 270 IP Multicast Routing Modifying the PIM Router-Query Message Interval (CLI) 2. configure terminal 3. interface interface-id 4. ip pim query-interval seconds 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Step 4 ip pim query-interval seconds Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Specifies the interface to be configured, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 These interfaces must have IP addresses assigned to them. Configures the frequency at which the switch sends PIM router-query messages. The default is 30 seconds. The range is 1 to 65535. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 271 Monitoring PIM IP Multicast Routing Command or Action Switch(config-if)# ip pim query-interval 45 Step 5 end Example: Switch(config-if)# end Step 6 show ip igmp interface [interface-id] Example: Switch# show ip igmp interface Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Monitoring PIM Use the privileged EXEC commands in the following table to monitor your PIM configurations. Table 33: PIM Monitoring Commands Command Purpose show ip pim all-vrfs tunnel [tunnel tunnel_number Displays all VRFs. | verbose] show ip pim autorp Displays global auto-RP information. show ip pim boundary Displays information about mroutes filtered by administratively scoped IPv4 multicast boundaries configured on an interface. show ip pim interface Displays information about interfaces configured for Protocol Independent Multicast (PIM). show ip pim neighbor Displays the PIM neighbor information. show ip pim tunnel [tunnel | verbose] Displays information about Protocol Independent Multicast (PIM) tunnel interfaces Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 272 IP Multicast Routing Monitoring RP Mapping Command Purpose show ip pim vrf { word { all-vrfs | autorp | Displays the VPN routing/forwarding instance. boundary | bsr-router | interface | mdt | neighbor | rp | rp-hash | tunnel } } Monitoring RP Mapping Use the privileged EXEC commands in the following table to monitor RP mapping. Table 34: RP Mapping Monitoring Commands Command Purpose show ip pim bsr Displays information about the elected BSR. show ip pim bsr-router Displays information about the BSRv2. show ip pim rp [ hostname or IP address | mapping Displays how the switch learns of the RP (through [ hostname or IP address | elected [hostname or IP the BSR or the Auto-RP mechanism). address] | in-use [hostname or IP address] ] | metric [ hostname or IP address ] ] show ip pim rp-hash hostname or IP group address Displays the RP that was selected for the specified group. Troubleshooting PIMv1 and PIMv2 Interoperability Problems When debugging interoperability problems between PIMv1 and PIMv2, check these in the order shown: 1. Verify RP mapping with the show ip pim rp-hash privileged EXEC command, making sure that all systems agree on the same RP for the same group. 2. Verify interoperability between different versions of DRs and RPs. Make sure that the RPs are interacting with the DRs properly (by responding with register-stops and forwarding decapsulated data packets from registers). Configuration Examples for PIM Example: Enabling PIM Stub Routing In this example, IP multicast routing is enabled, Switch A PIM uplink port 25 is configured as a routed uplink port with spare-dense-mode enabled. PIM stub routing is enabled on the VLAN 100 interfaces and on Gigabit Ethernet port 20. Switch(config)# ip multicast-routing distributed Switch(config)# interface GigabitEthernet3/0/25 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 273 Example: Verifying PIM Stub Routing IP Multicast Routing Switch(config-if)# no switchport Switch(config-if)# ip address 3.1.1.2 255.255.255.0 Switch(config-if)# ip pim sparse-dense-mode Switch(config-if)# exit Switch(config)# interface vlan100 Switch(config-if)# ip pim passive Switch(config-if)# exit Switch(config)# interface GigabitEthernet3/0/20 Switch(config-if)# ip pim passive Switch(config-if)# exit Switch(config)# interface vlan100 Switch(config-if)# ip address 100.1.1.1 255.255.255.0 Switch(config-if)# ip pim passive Switch(config-if)# exit Switch(config)# interface GigabitEthernet3/0/20 Switch(config-if)# no switchport Switch(config-if)# ip address 10.1.1.1 255.255.255.0 Switch(config-if)# ip pim passive Switch(config-if)# end Related Topics Enabling PIM Stub Routing (CLI), on page 246 PIM Stub Routing, on page 240 Example: Verifying PIM Stub Routing To verify that PIM stub is enabled for each interface, use the show ip pim interface privileged EXEC command: Switch# show ip pim interface Address Interface Ver/ Nbr Query DR DR Mode Count Intvl Prior 3.1.1.2 GigabitEthernet3/0/25 v2/SD 1 30 1 3.1.1.2 100.1.1.1 Vlan100 v2/P 0 30 1 100.1.1.1 10.1.1.1 GigabitEthernet3/0/20 v2/P 0 30 1 10.1.1.1 Example: Manually Assigning an RP to Multicast Groups This example shows how to configure the address of the RP to 147.106.6.22 for multicast group 225.2.2.2 only: Switch(config)# access-list 1 permit 225.2.2.2 0.0.0.0 Switch(config)# ip pim rp-address 147.106.6.22 1 Example: Configuring Auto-RP This example shows how to send RP announcements out all PIM-enabled interfaces for a maximum of 31 hops. The IP address of port 1 is the RP. Access list 5 describes the group for which this switch serves as RP: Switch(config)# ip pim send-rp-announce gigabitethernet1/0/1 scope 31 group-list 5 Switch(config)# access-list 5 permit 224.0.0.0 15.255.255.255 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 274 IP Multicast Routing Example: Defining the IP Multicast Boundary to Deny Auto-RP Information Related Topics Setting Up Auto-RP in a New Internetwork (CLI), on page 251 Auto-RP, on page 241 Example: Defining the IP Multicast Boundary to Deny Auto-RP Information This example shows a portion of an IP multicast boundary configuration that denies Auto-RP information: Switch(config)# access-list 1 deny 224.0.1.39 Switch(config)# access-list 1 deny 224.0.1.40 Switch(config)# access-list 1 permit all Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip multicast boundary 1 Related Topics Defining the IP Multicast Boundary (CLI), on page 262 Example: Filtering Incoming RP Announcement Messages This example shows a sample configuration on an Auto-RP mapping agent that is used to prevent candidate RP announcements from being accepted from unauthorized candidate RPs: Switch(config)# ip pim rp-announce-filter rp-list 10 group-list 20 Switch(config)# access-list 10 permit host 172.16.5.1 Switch(config)# access-list 10 permit host 172.16.2.1 Switch(config)# access-list 20 deny 239.0.0.0 0.0.255.255 Switch(config)# access-list 20 permit 224.0.0.0 15.255.255.255 The mapping agent accepts candidate RP announcements from only two devices, 172.16.5.1 and 172.16.2.1. The mapping agent accepts candidate RP announcements from these two devices only for multicast groups that fall in the group range of 224.0.0.0 to 239.255.255.255. The mapping agent does not accept candidate RP announcements from any other devices in the network. Furthermore, the mapping agent does not accept candidate RP announcements from 172.16.5.1 or 172.16.2.1 if the announcements are for any groups in the 239.0.0.0 through 239.255.255.255 range. This range is the administratively scoped address range. Related Topics Filtering Incoming RP Announcement Messages (CLI), on page 257 Example: Preventing Join Messages to False RPs If all interfaces are in sparse mode, use a default-configured RP to support the two well-known groups 224.0.1.39 and 224.0.1.40. Auto-RP uses these two well-known groups to collect and distribute RP-mapping information. When this is the case and the ip pim accept-rp auto-rp command is configured, another ip pim accept-rp command accepting the RP must be configured as follows: Switch(config)# ip pim accept-rp 172.10.20.1 1 Switch(config)# access-list 1 permit 224.0.1.39 Switch(config)# access-list 1 permit 224.0.1.40 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 275 Example: Configuring Candidate BSRs IP Multicast Routing Related Topics Preventing Join Messages to False RPs (CLI), on page 257 Example: Configuring Candidate BSRs This example shows how to configure a candidate BSR, which uses the IP address 172.21.24.18 on a port as the advertised BSR address, uses 30 bits as the hash-mask-length, and has a priority of 10. Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip address 172.21.24.18 255.255.255.0 Switch(config-if)# ip pim sparse-dense-mode Switch(config-if)# ip pim bsr-candidate gigabitethernet1/0/2 30 10 Related Topics Configuring Candidate BSRs (CLI), on page 264 PIM v2 BSR, on page 242 Example: Configuring Candidate RPs This example shows how to configure the switch to advertise itself as a candidate RP to the BSR in its PIM domain. Standard access list number 4 specifies the group prefix associated with the RP that has the address identified by a port. That RP is responsible for the groups with the prefix 239. Switch(config)# ip pim rp-candidate gigabitethernet1/0/2 group-list 4 Switch(config)# access-list 4 permit 239.0.0.0 0.255.255.255 Related Topics Configuring the Candidate RPs (CLI), on page 265 Where to Go Next for PIM You can configure the following: · IGMP · Wireless Multicast · SSM · IP Multicast Routing · Service Discovery Gateway Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 276 IP Multicast Routing Additional References Additional References Related Documents Related Topic PIM is defined in RFC 4601 and in these Internet Engineering Task Force (IETF) Internet drafts. Document Title · Protocol Independent Multicast (PIM): Motivation and Architecture · Protocol Independent Multicast (PIM), Dense Mode Protocol Specification · Protocol Independent Multicast (PIM), Sparse Mode Protocol Specification · draft-ietf-idmr-igmp-v2-06.txt, Internet Group Management Protocol, Version 2 · draft-ietf-pim-v2-dm-03.txt, PIM Version 2 Dense Mode For complete syntax and usage information for the commands used in IP Multicast Routing Command this chapter. Reference (Catalyst 3650 Switches) IGMP Helper command syntax and usage information. IP Multicast Routing Command Reference (Catalyst 3650 Switches) Multicast Source Discovery Protocol (MSDP) IP Routing: Protocol-Independent Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Enhanced Interior Gateway Routing Protocol (EIGRP) stub routing IP Routing: EIGRP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Open Shortest Path First (OSPF) stub routing IP Routing: OSPF Configuration Guide, Cisco IOS XE 3SE (Catalyst 3650 Switches) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 277 Additional References IP Multicast Routing Related Topic Platform-independent configuration information Document Title · IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title RFC 4601 Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 278 IP Multicast Routing Feature History and Information for PIM Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for PIM Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 279 Feature History and Information for PIM IP Multicast Routing Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 280 1 6 C H A P T E R Configuring SSM · Finding Feature Information, on page 281 · Prerequisites for Configuring SSM, on page 281 · Restrictions for Configuring SSM, on page 282 · Information About SSM, on page 283 · How to Configure SSM, on page 286 · Monitoring SSM, on page 293 · Where to Go Next for SSM, on page 294 · Additional References, on page 294 · Feature History and Information for SSM, on page 296 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring SSM The following are the prerequisites for configuring source-specific multicast (SSM) and SSM mapping: · Before you configure SSM mapping, you must perform the following tasks: · Enable IP multicast routing. For information about this procedure, see Configuring Basic IP Multicast Routing (CLI), on page 301. · Enable PIM sparse mode. For information about this procedure, see How to Configure PIM, on page 246. · Configure SSM. For information about this procedure, see Configuring SSM (CLI), on page 286. · Before you configure static SSM mapping, you must configure access control lists (ACLs) that define the group ranges to be mapped to source addresses. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 281 Restrictions for Configuring SSM IP Multicast Routing · Before you can configure and use SSM mapping with DNS look ups, you must be able to add records to a running DNS server. If you do not already have a DNS server running, you need to install one. Note You can use a product such as Cisco Network Registrar to add records to a running DNS server. Restrictions for Configuring SSM The following are the restrictions for configuring SSM: · To run SSM with IGMPv3, SSM must be supported in the Cisco IOS router, the host where the application is running, and the application itself. · The SSM mapping feature does not have all the benefits of full SSM. Because SSM mapping takes a group join from a host and identifies this group with an application associated with one or more sources, it can only support one such application per group. Full SSM applications can still share the same group as in SSM mapping. · Enable IGMPv3 carefully on the last hop router when you rely solely on SSM mapping as a transition solution for full SSM. When you enable both SSM mapping and IGMPv3 and the hosts already support IGMPv3 (but not SSM), the hosts send IGMPv3 group reports. SSM mapping does not support these IGMPv3 group reports, and the router does not correctly associate sources with these reports. · Existing applications in a network predating SSM do not work within the SSM range unless they are modified to support (S, G) channel subscriptions. Therefore, enabling SSM in a network can cause problems for existing applications if they use addresses within the designated SSM range. · IGMPv3 uses new membership report messages that might not be correctly recognized by older IGMP snooping switches. · Address management is still necessary to some degree when SSM is used with Layer 2 switching mechanisms. Cisco Group Management Protocol (CGMP), IGMP snooping, or Router-Port Group Management Protocol (RGMP) support only group-specific filtering, not (S, G) channel-specific filtering. If different receivers in a switched network request different (S, G) channels sharing the same group, they do not benefit from these existing mechanisms. Instead, both receivers receive all (S, G) channel traffic and filter out the unwanted traffic on input. Because SSM can re-use the group addresses in the SSM range for many independent applications, this situation can lead to decreased traffic filtering in a switched network. For this reason, it is important to use random IP addresses from the SSM range for an application to minimize the chance for re-use of a single address within the SSM range between different applications. For example, an application service providing a set of television channels should, even with SSM, use a different group for each television (S, G) channel. This setup guarantees that multiple receivers to different channels within the same application service never experience traffic aliasing in networks that include Layer 2 switches. · In PIM-SSM, the last hop router continues to periodically send (S, G) join messages if appropriate (S, G) subscriptions are on the interfaces. Therefore, as long as receivers send (S, G) subscriptions, the shortest path tree (SPT) state from the receivers to the source is maintained, even if the source does not send traffic for longer periods of time (or even never). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 282 IP Multicast Routing Information About SSM The opposite situation occurs with PIM-SM, where (S, G) state is maintained only if the source is sending traffic and receivers are joining the group. If a source stops sending traffic for more than 3 minutes in PIM-SM, the (S, G) state is deleted and only reestablished after packets from the source arrive again through the RPT (rendezvous point tree). Because no mechanism in PIM-SSM notifies a receiver that a source is active, the network must maintain the (S, G) state in PIM-SSM as long as receivers are requesting receipt of that channel. Information About SSM The source-specific multicast (SSM) feature is an extension of IP multicast in which datagram traffic is forwarded to receivers from only those multicast sources that the receivers have explicitly joined. For multicast groups configured for SSM, only SSM distribution trees (no shared trees) are created. This section describes how to configure source-specific multicast (SSM). For a complete description of the SSM commands in this section, refer to the IP Multicast Command Reference. To locate documentation for other commands that appear in this chapter, use the command reference master index, or search online. SSM Components Overview SSM is a datagram delivery model that best supports one-to-many applications, also known as broadcast applications. SSM is a core networking technology for the Cisco implementation of IP multicast solutions targeted for audio and video broadcast application environments. The switch supports the following components that support SSM implementation: · Protocol independent multicast source-specific mode (PIM-SSM) PIM-SSM is the routing protocol that supports the implementation of SSM and is derived from PIM sparse mode (PIM-SM). · Internet Group Management Protocol version 3 (IGMPv3) SSM and Internet Standard Multicast (ISM) The current IP multicast infrastructure in the Internet and many enterprise intranets is based on the PIM-SM protocol and Multicast Source Discovery Protocol (MSDP). These protocols have the limitations of the Internet Standard Multicast (ISM) service model. For example, with ISM, the network must maintain knowledge about which hosts in the network are actively sending multicast traffic. The ISM service consists of the delivery of IP datagrams from any source to a group of receivers called the multicast host group. The datagram traffic for the multicast host group consists of datagrams with an arbitrary IP unicast source address (S) and the multicast group address (G) as the IP destination address. Systems receive this traffic by becoming members of the host group. Membership in a host group simply requires signaling the host group through IGMP version 1, 2, or 3. In SSM, delivery of datagrams is based on (S, G) channels. In both SSM and ISM, no signaling is required to become a source. However, in SSM, receivers must subscribe or unsubscribe to (S, G) channels to receive or not receive traffic from specific sources. In other words, receivers can receive traffic only from (S, G) channels to which they are subscribed, whereas in ISM, receivers need not know the IP addresses of sources from which they receive their traffic. The proposed standard approach for channel subscription signaling uses IGMP and includes modes membership reports, which are supported only in IGMP version 3. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 283 SSM IP Address Range IP Multicast Routing SSM IP Address Range SSM can coexist with the ISM service by applying the SSM delivery model to a configured subset of the IP multicast group address range. Cisco IOS software allows SSM configuration for the IP multicast address range of 224.0.0.0 through 239.255.255.255. When an SSM range is defined, existing IP multicast receiver applications do not receive any traffic when they try to use an address in the SSM range (unless the application is modified to use an explicit (S, G) channel subscription). SSM Operations An established network, in which IP multicast service is based on PIM-SM, can support SSM services. SSM can also be deployed alone in a network without the full range of protocols required for interdomain PIM-SM (for example, MSDP, Auto-RP, or bootstrap router [BSR]) if only SSM service is needed. If SSM is deployed in a network already configured for PIM-SM, only the last-hop routers support SSM. Routers that are not directly connected to receivers do not require support for SSM. In general, these not-last-hop routers must only run PIM-SM in the SSM range and might need additional access control configuration to suppress MSDP signalling, registering, or PIM-SM shared tree operations from occurring within the SSM range. Use the ip pim ssm global configuration command to configure the SSM range and to enable SSM. This configuration has the following effects: · For groups within the SSM range, (S, G) channel subscriptions are accepted through IGMPv3 include-mode membership reports. · PIM operations within the SSM range of addresses change to PIM-SSM, a mode derived from PIM-SM. In this mode, only PIM (S, G) join and prune messages are generated by the router, and no (S, G) rendezvous point tree (RPT) or (*, G) RPT messages are generated. Incoming messages related to RPT operations are ignored or rejected, and incoming PIM register messages are immediately answered with register-stop messages. PIM-SSM is backward-compatible with PIM-SM unless a router is a last-hop router. Therefore, routers that are not last-hop routers can run PIM-SM for SSM groups (for example, if they do not yet support SSM). · No MSDP source-active (SA) messages within the SSM range are accepted, generated, or forwarded. SSM Mapping In a typical set-top box (STB) deployment, each TV channel uses one separate IP multicast group and has one active server host sending the TV channel. A single server can send multiple TV channels, but each to a different group. In this network environment, if a router receives an IGMPv1 or IGMPv2 membership report for a particular group, the report addresses the well-known TV server for the TV channel associated with the multicast group. When SSM mapping is configured, if a router receives an IGMPv1 or IGMPv2 membership report for a particular group, the router translates this report into one or more channel memberships for the well-known sources associated with this group. When the router receives an IGMPv1 or IGMPv2 membership report for a group, the router uses SSM mapping to determine one or more source IP addresses for the group. SSM mapping then translates the membership report as an IGMPv3 report and continues as if it had received an IGMPv3 report. The router then sends PIM joins and continues to be joined to these groups as long as it continues to receive the IGMPv1 or IGMPv2 membership reports, and the SSM mapping for the group remains the same. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 284 IP Multicast Routing Static SSM Mapping SSM mapping enables the last hop router to determine the source addresses either by a statically configured table on the router or through a DNS server. When the statically configured table or the DNS mapping changes, the router leaves the current sources associated with the joined groups. Static SSM Mapping With static SSM mapping, you can configure the last hop router to use a static map to determine the sources that are sending to groups. Static SSM mapping requires that you configure ACLs to define group ranges. After configuring the ACLs to define group ranges, you can then map the groups permitted by those ACLs to sources by using the ip igmp ssm-map static global configuration command. You can configure static SSM mapping in smaller networks when a DNS is not needed or to locally override DNS mappings. When configured, static SSM mappings take precedence over DNS mappings. Related Topics Configuring Static SSM Mapping (CLI), on page 288 Configuring Static Traffic Forwarding with SSM Mapping (CLI), on page 291 DNS-Based SSM Mapping You can use DNS-based SSM mapping to configure the last hop router to perform a reverse DNS lookup to determine sources sending to groups. When DNS-based SSM mapping is configured, the router constructs a domain name that includes the group address and performs a reverse lookup into the DNS. The router looks up IP address resource records and uses them as the source addresses associated with this group. SSM mapping supports up to 20 sources for each group. The router joins all sources configured for a group. Figure 12: DNS-Based SSM Mapping The following figure displays DNS-based SSM mapping. The SSM mapping mechanism that enables the last hop router to join multiple sources for a group can provide source redundancy for a TV broadcast. In this context, the last hop router provides redundancy using SSM mapping to simultaneously join two video sources for the same TV channel. However, to prevent the last hop Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 285 How to Configure SSM IP Multicast Routing router from duplicating the video traffic, the video sources must use a server-side switchover mechanism. One video source is active, and the other backup video source is passive. The passive source waits until an active source failure is detected before sending the video traffic for the TV channel. Thus, the server-side switchover mechanism ensures that only one of the servers is actively sending video traffic for the TV channel. To look up one or more source addresses for a group that includes G1, G2, G3, and G4, you must configure these DNS records on the DNS server: G4.G3.G2.G1 [multicast-domain] [timeout] IN A source-address-1 IN A source-address-2 IN A source-address-n See your DNS server documentation for more information about configuring DNS resource records. Related Topics Configuring DNS-Based SSM Mapping (CLI), on page 289 How to Configure SSM For a complete description of the source-specific multicast (SSM) commands in this section, see the IP Multicast Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches). To locate documentation for other commands that appear in this chapter, use the command reference master index, or search online. Configuring SSM (CLI) This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. ip pim ssm [default | range access-list] 4. interface type number 5. ip pim {sparse-mode | sparse-dense-mode} 6. ip igmp version 3 DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 286 IP Multicast Routing Configuring SSM (CLI) Command or Action Switch# configure terminal Step 3 ip pim ssm [default | range access-list] Example: Switch(config)# ip pim ssm range 20 Step 4 interface type number Example: Switch(config)# interface gigabitethernet 1/0/1 Step 5 ip pim {sparse-mode | sparse-dense-mode} Example: Switch(config-if)# ip pim sparse-dense-mode Step 6 ip igmp version 3 Example: Switch(config-if)# ip igmp version 3 Purpose Defines the SSM range of IP multicast addresses. Selects an interface that is connected to hosts on which IGMPv3 can be enabled, and enters the interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 These interfaces must have IP addresses assigned to them. Enables PIM on an interface. You must use either sparse mode or sparse-dense mode. Enables IGMPv3 on this interface. The default version of IGMP is set to Version 2. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 287 Configuring Source Specific Multicast Mapping IP Multicast Routing Configuring Source Specific Multicast Mapping The Source Specific Multicast (SSM) mapping feature supports SSM transition when supporting SSM on the end system is impossible or unwanted due to administrative or technical reasons. You can use SSM mapping to leverage SSM for video delivery to legacy STBs that do not support IGMPv3 or for applications that do not use the IGMPv3 host stack. Configuring Static SSM Mapping (CLI) The following procedure describes how to configure static SSM mapping. SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp ssm-map enable 4. no ip igmp ssm-map query dns 5. ip igmp ssm-map static access-list source-address 6. Repeat Step 4 to configure additional static SSM mappings, if required. 7. end 8. show running-config 9. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 ip igmp ssm-map enable Example: Switch(config)# ip igmp ssm-map enable Enables SSM mapping for groups in the configured SSM range. Note By default, this command enables DNS-based SSM mapping. Step 4 no ip igmp ssm-map query dns Example: Switch(config)# no ip igmp ssm-map dns (Optional) Disables DNS-based SSM mapping. Note Disable DNS-based SSM mapping if you only want to rely on static SSM mapping. By default, the ip igmp ssm-map global configuration command enables DNS-based SSM mapping. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 288 IP Multicast Routing Configuring DNS-Based SSM Mapping (CLI) Step 5 Step 6 Step 7 Command or Action ip igmp ssm-map static access-list source-address Example: Switch(config)# ip igmp ssm-map static 11 172.16.8.11 Purpose Configures static SSM mapping. The ACL supplied for access-list defines the groups to be mapped to the source IP address entered for the source-address. Note You can configure additional static SSM mappings. If additional SSM mappings are configured and the router receives an IGMPv1 or IGMPv2 membership report for a group in the SSM range, the switch determines the source addresses associated with the group by using each configured ip igmp ssm-map static command. The switch associates up to 20 sources per group. Repeat Step 4 to configure additional static SSM mappings, -- if required. end Returns to privileged EXEC mode. Example: Switch(config)# end Step 8 show running-config Example: Switch# show running-config Verifies your entries. Step 9 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Related Topics Static SSM Mapping, on page 285 Configuring DNS-Based SSM Mapping (CLI) To configure DNS-based SSM mapping, you need to create a DNS server zone or add records to an existing zone. If the routers that are using DNS-based SSM mapping are also using DNS for other purposes, you should use a normally configured DNS server. If DNS-based SSM mapping is the only DNS implementation being used on the router, you can configure a false DNS setup with an empty root zone or a root zone that points back to itself. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 289 Configuring DNS-Based SSM Mapping (CLI) IP Multicast Routing SUMMARY STEPS 1. enable 2. configure terminal 3. ip igmp ssm-map enable 4. ip igmp ssm-map query dns 5. ip domain multicast domain-prefix 6. ip name-server server-address1 [server-address2... server-address6] 7. Repeat Step 5 to configure additional DNS servers for redundancy, if required. 8. end 9. show running-config 10. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 ip igmp ssm-map enable Example: Switch(config)# ip igmp ssm-map enable Enables SSM mapping for groups in a configured SSM range. Step 4 ip igmp ssm-map query dns Example: Switch(config)# ip igmp ssm-map query dns Step 5 ip domain multicast domain-prefix Example: Switch(config)# ip domain multicast (Optional) Enables DNS-based SSM mapping. By default, the ip igmp ssm-map command enables DNS-based SSM mapping. Only the no form of this command is saved to the running configuration. Note Use this command to reenable DNS-based SSM mapping if DNS-based SSM mapping is disabled. (Optional) Changes the domain prefix used by the switch for DNS-based SSM mapping. By default, the switch uses the ip-addr.arpa domain prefix. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 290 IP Multicast Routing Configuring Static Traffic Forwarding with SSM Mapping (CLI) Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action ssm-map.cisco.com Purpose ip name-server server-address1 [server-address2... server-address6] Example: Switch(config)# ip name-server 172.16.1.111 172.16.1.2 Specifies the address of one or more name servers to use for name and address resolution. Repeat Step 5 to configure additional DNS servers for redundancy, if required. end Example: -- Returns to privileged EXEC mode. Switch(config)# end show running-config Example: Switch# show running-config Verifies your entries. copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Related Topics DNS-Based SSM Mapping, on page 285 Configuring Static Traffic Forwarding with SSM Mapping (CLI) Use static traffic forwarding with SSM mapping to statically forward SSM traffic for certain groups. SUMMARY STEPS 1. enable 2. configure terminal 3. interface type number 4. ip igmp static-group group-address source ssm-map 5. end 6. show running-config 7. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 291 Configuring Static Traffic Forwarding with SSM Mapping (CLI) IP Multicast Routing DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 interface type number Example: Switch(config)# interface gigabitethernet 1/0/1 ip igmp static-group group-address source ssm-map Example: Switch(config-if)# ip igmp static-group 239.1.2.1 source Selects an interface on which to statically forward traffic for a multicast group using SSM mapping, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 These interfaces must have IP addresses assigned to them. Note Static forwarding of traffic with SSM mapping works with either DNS-based SSM mapping or statically configured SSM mapping. Configures SSM mapping to statically forward a (S, G) channel from the interface. Use this command if you want to statically forward SSM traffic for certain groups. Use DNS-based SSM mapping to determine the source addresses of the channels. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 292 IP Multicast Routing Monitoring SSM Command or Action ssm-map Step 5 end Example: Switch(config-if)# end Step 6 show running-config Example: Switch# show running-config Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics Static SSM Mapping, on page 285 Monitoring SSM Use the privileged EXEC commands in the following table to monitor SSM. Table 35: Commands for Monitoring SSM Command show ip igmp groups detail show ip mroute Purpose Displays the (S, G) channel subscription through IGMPv3. Displays whether a multicast group supports SSM service or whether a source-specific host report was received. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 293 Monitoring SSM Mapping IP Multicast Routing Monitoring SSM Mapping Use the privileged EXEC commands in the following table to monitor SSM mapping. Table 36: SSM Mapping Monitoring Commands Command Purpose show ip igmp ssm-mapping Displays information about SSM mapping. show ip igmp ssm-mapping group-address Displays the sources that SSM mapping uses for a particular group. show ip igmp groups [group-name | group-address Displays the multicast groups with receivers that are | interface-type interface-number] [detail] directly connected to the router and that were learned through IGMP. show host Displays the default domain name, the style of name lookup service, a list of name server hosts, and the cached list of hostnames and addresses. debug ip igmp group-address Displays the IGMP packets received and sent and IGMP host-related events. Where to Go Next for SSM You can configure the following: · IGMP · Wireless Multicast · PIM · IP Multicast Routing · Service Discovery Gateway Additional References Related Documents Related Topic Document Title For complete syntax and usage IP Multicast Routing Command Reference (Catalyst 3650 Switches) information for the commands used in this chapter. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 294 IP Multicast Routing Additional References Related Topic Platform-independent configuration information Document Title · IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title RFC 4601 Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 295 Feature History and Information for SSM IP Multicast Routing Feature History and Information for SSM Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 296 1 7 C H A P T E R Configuring IP Multicast Routing · Finding Feature Information, on page 297 · Prerequisites for Configuring IP Multicast Routing, on page 297 · Restrictions for Configuring IP Multicast Routing, on page 298 · Information About IP Multicast Routing, on page 298 · How to Configure Basic IP Multicast Routing, on page 301 · Monitoring and Maintaining IP Multicast Routing, on page 313 · Configuration Examples for IP Multicast Routing, on page 316 · Where to Go Next for IP Multicast, on page 317 · Additional References, on page 318 · Feature History and Information for IP Multicast, on page 319 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring IP Multicast Routing The following are the prerequisites for configuring IP multicast routing: · To use the IP multicast routing feature on the switch, the switch or active switch must be running the IP Services feature set. · You must enable IP multicast routing and configure the PIM version and PIM mode on the switch. After performing these tasks, the switch can then forward multicast packets and can populate its multicast routing table. · To participate in IP multicasting, the multicast hosts, routers, and multilayer switch must have IGMP operating. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 297 Restrictions for Configuring IP Multicast Routing IP Multicast Routing Restrictions for Configuring IP Multicast Routing The following are the restrictions for configuring IP multicast routing: · IP multicast routing is not supported on switches running the LAN Base feature set. · Layer 3 IPv6 multicast routing is not supported on the switch. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Information About IP Multicast Routing IP multicasting is an efficient way to use network resources, especially for bandwidth-intensive services such as audio and video. IP multicast routing enables a host (source) to send packets to a group of hosts (receivers) anywhere within the IP network by using a special form of IP address called the IP multicast group address. The sending host inserts the multicast group address into the IP destination address field of the packet, and IP multicast routers and multilayer switches forward incoming IP multicast packets out all interfaces that lead to members of the multicast group. Any host, regardless of whether it is a member of a group, can send to a group. However, only the members of a group receive the message. Cisco's Implementation of IP Multicast Routing Cisco IOS software supports the following protocols to implement IP multicast routing: · Internet Group Management Protocol (IGMP) is used among hosts on a LAN and the routers (and multilayer switches) on that LAN to track the multicast groups of which hosts are members. · Protocol-Independent Multicast (PIM) protocol is used among routers and multilayer switches to track which multicast packets to forward to each other and to their directly connected LANs. Note The switch does not support the Distance Vector Multicast Routing Protocol (DVMRP) nor the Cisco Group Management Protocol (CGMP). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 298 IP Multicast Routing Multicast Forwarding Information Base Overview Figure 13: IP Multicast Routing Protocols The following figure shows where the Cisco-supported protocols for the switch operate within the IP multicast environment. According to IPv4 multicast standards, the MAC destination multicast address begins with 0100:5e and is appended by the last 23 bits of the IP address. For example, if the IP destination address is 239.1.1.39, the MAC destination address is 0100:5e01:0127. A multicast packet is unmatched when the destination IPv4 address does not match the destination MAC address. The switch forwards the unmatched packet in hardware based upon the MAC address table. If the destination MAC address is not in the MAC address table, the switch floods the packet to the all port in the same VLAN as the receiving port. Related Topics Configuring Basic IP Multicast Routing (CLI), on page 301 Multicast Forwarding Information Base Overview The switch uses the Multicast Forwarding Information Base (MFIB) architecture and the Multicast Routing Information Base (MRIB) for IP multicast. The MFIB architecture provides both modularity and separation between the multicast control plane (Protocol Independent Multicast [PIM] and Internet Group Management Protocol [IGMP]) and the multicast forwarding plane (MFIB). This architecture is used in Cisco IOS IPv6 multicast implementations. MFIB itself is a multicast routing protocol independent forwarding engine; that is, it does not depend on PIM or any other multicast routing protocol. It is responsible for: · Forwarding multicast packets · Registering with the MRIB to learn the entry and interface flags set by the control plane · Handling data-driven events that must be sent to the control plane · Maintaining counts, rates, and bytes of received, dropped, and forwarded multicast packets The MRIB is the communication channel between MRIB clients. Examples of MRIB clients are PIM, IGMP, the multicast routing (mroute) table, and the MFIB. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 299 Multicast Group Concept IP Multicast Routing Related Topics Configuring IP Multicast Forwarding (CLI), on page 304 Multicast Group Concept Multicast is based on the concept of a group. An arbitrary group of receivers expresses an interest in receiving a particular data stream. This group does not have any physical or geographical boundaries. The hosts can be located anywhere on the Internet. Hosts that are interested in receiving data flowing to a particular group must join the group using IGMP. Hosts must be a member of the group to receive the data stream. Related Topics Configuring an IP Multicast Boundary (CLI), on page 310 Example: Configuring an IP Multicast Boundary, on page 316 Multicast Boundaries Administratively-scoped boundaries can be used to limit the forwarding of multicast traffic outside of a domain or subdomain. This approach uses a special range of multicast addresses, called administratively-scoped addresses, as the boundary mechanism. If you configure an administratively-scoped boundary on a routed interface, multicast traffic whose multicast group addresses fall in this range cannot enter or exit this interface, which provides a firewall for multicast traffic in this address range. Note Multicast boundaries and TTL thresholds control the scoping of multicast domains; however, TTL thresholds are not supported by the switch. You should use multicast boundaries instead of TTL thresholds to limit the forwarding of multicast traffic outside of a domain or a subdomain. Figure 14: Administratively-Scoped Boundaries The following figure shows that Company XYZ has an administratively-scoped boundary set for the multicast address range 239.0.0.0/8 on all routed interfaces at the perimeter of its network. This boundary prevents any multicast traffic in the range 239.0.0.0 through 239.255.255.255 from entering or leaving the network. Similarly, the engineering and marketing departments have an administratively-scoped boundary of 239.128.0.0/16 around the perimeter of their networks. This boundary prevents multicast traffic in the range of 239.128.0.0 through 239.128.255.255 from entering or leaving their respective networks. You can define an administratively-scoped boundary on a routed interface for multicast group addresses. A standard access list defines the range of addresses affected. When a boundary is defined, no multicast data Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 300 IP Multicast Routing Multicast Routing and Switch Stacks packets are allowed to flow across the boundary from either direction. The boundary allows the same multicast group address to be reused in different administrative domains. The IANA has designated the multicast address range 239.0.0.0 to 239.255.255.255 as the administratively-scoped addresses. This range of addresses can then be reused in domains administered by different organizations. The addresses would be considered local, not globally unique. Related Topics Configuring an IP Multicast Boundary (CLI), on page 310 Example: Configuring an IP Multicast Boundary, on page 316 Multicast Routing and Switch Stacks For all multicast routing protocols, the entire stack appears as a single router to the network and operates as a single multicast router. In a switch stack, the active switch performs these functions: · It is responsible for completing the IP multicast routing functions of the stack. It fully initializes and runs the IP multicast routing protocols. · It builds and maintains the multicast routing table for the entire stack. · It is responsible for distributing the multicast routing table to all stack members. The stack members perform these functions: · They act as multicast routing standby devices and are ready to take over if there is a active switch failure. If the active switch fails, all stack members delete their multicast routing tables. The newly elected active switch starts building the routing tables and distributes them to the stack members. · They do not build multicast routing tables. Instead, they use the multicast routing table that is distributed by the active switch. Default Multicast Routing Configuration This table describes the default multicast routing configuration for the switch. Table 37: Default Multicast Routing Configuration Feature Multicast routing Default Setting Disabled on all interfaces. How to Configure Basic IP Multicast Routing Configuring Basic IP Multicast Routing (CLI) You must enable IP multicast routing and configure the PIM version and mode. After performing these tasks, the software can then forward multicast packets, and the switch can populate its multicast routing table. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 301 Configuring Basic IP Multicast Routing (CLI) IP Multicast Routing You can configure an interface to be in PIM dense mode, sparse mode, or sparse-dense mode. The switch populates its multicast routing table and forwards multicast packets it receives from its directly connected LANs according to the mode setting. You must enable PIM in one of these modes for an interface to perform IP multicast routing. Enabling PIM on an interface also enables IGMP operation on that interface. Note If you enable PIM on multiple interfaces, when most of these interfaces are not on the outgoing interface list, and IGMP snooping is disabled, the outgoing interface might not be able to sustain line rate for multicast traffic because of the extra replication. In populating the multicast routing table, dense-mode interfaces are always added to the table. Sparse-mode interfaces are added to the table only when periodic join messages are received from downstream devices or when there is a directly connected member on the interface. When forwarding from a LAN, sparse-mode operation occurs if there is a rendezvous point (RP) known for the group. An RP acts as the meeting place for sources and receivers of multicast data. If an RP exists, the packets are encapsulated and sent toward the RP. When no RP is known, the packet is flooded in a dense-mode fashion. If the multicast traffic from a specific source is sufficient, the receiver's first-hop router might send join messages toward the source to build a source-based distribution tree. By default, multicast routing is disabled, and there is no default mode setting. This procedure is required. SUMMARY STEPS 1. enable 2. configure terminal 3. ip multicast-routing 4. interface interface-id 5. ip pim {dense-mode | sparse-mode | sparse-dense-mode} 6. end 7. show running-config 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 302 IP Multicast Routing Configuring Basic IP Multicast Routing (CLI) Step 3 Command or Action ip multicast-routing Example: Switch(config)# ip multicast-routing Purpose Enables IP multicast routing. IP multicast routing is supported with Multicast Forwarding Information Base (MFIB) and Multicast Routing Information Base (MRIB). Step 4 Step 5 Step 6 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 These interfaces must have IP addresses assigned to them. ip pim {dense-mode | sparse-mode | sparse-dense-mode} Enables a PIM mode on the interface. Example: By default, no mode is configured. Switch(config-if)# ip pim sparse-dense-mode The keywords have these meanings: · dense-mode--Enables dense mode of operation. · sparse-mode--Enables sparse mode of operation. If you configure sparse mode, you must also configure an RP. · sparse-dense-mode--Causes the interface to be treated in the mode in which the group belongs. Sparse-dense mode is the recommended setting. · state-refresh--PM dense mode state-refresh configuration. end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 303 Configuring IP Multicast Forwarding (CLI) IP Multicast Routing Command or Action Switch(config-if)# end Step 7 show running-config Example: Switch# show running-config Step 8 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics Cisco's Implementation of IP Multicast Routing, on page 298 Configuring IP Multicast Forwarding (CLI) You can use the following procedure to configure IPv4 Multicast Forwarding Information Base (MFIB) interrupt-level IP multicast forwarding of incoming packets or outgoing packets on the switch. Note After you have enabled IP multicast routing by using the ip multicast-routing command, IPv4 multicast forwarding is enabled. Because IPv4 multicast forwarding is enabled by default, you can use the no form of the ip mfib command to disable IPv4 multicast forwarding. SUMMARY STEPS 1. enable 2. configure terminal 3. ip mfib 4. exit 5. show running-config 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 304 IP Multicast Routing Configuring a Static Multicast Route (mroute) (CLI) Command or Action Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 ip mfib Example: Switch(config)# ip mfib Step 4 exit Example: Switch(config)# exit Step 5 show running-config Example: Switch# show running-config Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enters the global configuration mode. Enables IP multicast forwarding. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics Multicast Forwarding Information Base Overview , on page 299 Configuring a Static Multicast Route (mroute) (CLI) You can use the following procedure to configure static mroutes. Static mroutes are similar to unicast static routes but differ in the following ways: · Static mroutes are used to calculate RPF information, not to forward traffic. · Static mroutes cannot be redistributed. Static mroutes are strictly local to the switch on which they are defined. Because Protocol Independent Multicast (PIM) does not have its own routing protocol, there is no mechanism to distribute static mroutes throughout the network. Consequently, the administration of static mroutes tends to be more complicated than the administration of unicast static routes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 305 Configuring a Static Multicast Route (mroute) (CLI) IP Multicast Routing When static mroutes are configured, they are stored on the switch in a separate table referred to as the static mroute table. When configured, the ip mroute command enters a static mroute into the static mroute table for the source address or source address range specified for the source-address and mask arguments. Sources that match the source address or that fall in the source address range specified for the source-address argument will RPF to either the interface associated with the IP address specified for the rpf-address argument or the local interface on the switch specified for the interface-type and interface-number arguments. If an IP address is specified for the rpf-address argument, a recursive lookup is done from the unicast routing table on this address to find the directly connected neighbor. If there are multiple static mroutes configured, the switch performs a longest-match lookup of the mroute table. When the mroute with the longest match (of the source-address) is found, the search terminates and the information in the matching static mroute is used. The order in which the static mroutes are configured is not important. The administrative distance of an mroute may be specified for the optional distance argument. If a value is not specified for the distance argument, the distance of the mroute defaults to zero. If the static mroute has the same distance as another RPF source, the static mroute will take precedence. There are only two exceptions to this rule: directly connected routes and the default unicast route. SUMMARY STEPS 1. enable 2. configure terminal 3. ip mroute [vrf vrf-name] source-address mask { fallback-lookup {global | vrf vrf-name }[ protocol ] {rpf-address | interface-type interface-number}} [distance] 4. exit 5. show running-config 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 ip mroute [vrf vrf-name] source-address mask { The source IP address 10.1.1.1 is configured to be reachable fallback-lookup {global | vrf vrf-name }[ protocol ] through the interface associated with IP address 10.2.2.2. {rpf-address | interface-type interface-number}} [distance] Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 306 IP Multicast Routing Configuring sdr Listener Support Command or Action Switch(configure)# ip mroute 10.1.1.1 255.255.255.255 10.2.2.2 Step 4 exit Example: Switch(config)# exit Step 5 show running-config Example: Switch# show running-config Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Returns to privileged EXEC mode. (Optional) Verifies your entries. (Optional) Saves your entries in the configuration file. Configuring sdr Listener Support The MBONE is the small subset of Internet routers and hosts that are interconnected and capable of forwarding IP multicast traffic. Other multimedia content is often broadcast over the MBONE. Before you can join a multimedia session, you need to know what multicast group address and port are being used for the session, when the session is going to be active, and what sort of applications (audio, video, and so forth) are required on your workstation. The MBONE Session Directory Version 2 (sdr) tool provides this information. This freeware application can be downloaded from several sites on the World Wide Web, one of which is http://www.video.ja.net/mice/index.html. SDR is a multicast application that listens to a well-known multicast group address and port for Session Announcement Protocol (SAP) multicast packets from SAP clients, which announce their conference sessions. These SAP packets contain a session description, the time the session is active, its IP multicast group addresses, media format, contact person, and other information about the advertised multimedia session. The information in the SAP packet is displayed in the SDR Session Announcement window. Enabling sdr Listener Support (CLI) By default, the switch does not listen to session directory advertisements. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. interface interface-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 307 Enabling sdr Listener Support (CLI) IP Multicast Routing 4. ip sap listen 5. end 6. show running-config 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Step 2 configure terminal Example: Switch# configure terminal Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Step 4 ip sap listen Example: Switch(config-if)# ip sap listen Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Specifies the interface to be enabled for sdr, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 These interfaces must have IP addresses assigned to them. Enables the switch software to listen to session directory announcements. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 308 IP Multicast Routing Limiting How Long an sdr Cache Entry Exists (CLI) Step 5 Command or Action end Example: Switch(config-if)# end Step 6 show running-config Example: Switch# show running-config Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Limiting How Long an sdr Cache Entry Exists (CLI) By default, entries are never deleted from the sdr cache. You can limit how long the entry remains active so that if a source stops advertising SAP information, old advertisements are not unnecessarily kept. This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. ip sap cache-timeout minutes 4. end 5. show running-config 6. show ip sap 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 309 Configuring an IP Multicast Boundary (CLI) IP Multicast Routing Command or Action Switch# configure terminal Step 3 ip sap cache-timeout minutes Example: Switch(config)# ip sap cache-timeout 30 Step 4 end Example: Switch(config)# end Step 5 show running-config Example: Switch# show running-config Step 6 show ip sap Example: Switch# show ip sap Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Limits how long a Session Announcement Protocol (SAP) cache entry stays active in the cache. By default, entries are never deleted from the cache. For minutes, the range is 1 to 1440 minutes (24 hours). Returns to privileged EXEC mode. Verifies your entries. Displays the SAP cache. (Optional) Saves your entries in the configuration file. Configuring an IP Multicast Boundary (CLI) This procedure is optional. SUMMARY STEPS 1. enable 2. configure terminal 3. access-list {access-list-number 1-99 | access-list-number 100-199 | access-list-number 1300-1999 |access-list-number 2000-2699 | dynamic-extended | rate-limit} 4. interface interface-id 5. ip multicast boundary access-list-number 6. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 310 IP Multicast Routing Configuring an IP Multicast Boundary (CLI) 7. show running-config 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 Step 4 access-list {access-list-number 1-99 | access-list-number Creates a standard access list, repeating the command as 100-199 | access-list-number 1300-1999 many times as necessary. |access-list-number 2000-2699 | dynamic-extended | rate-limit} · For access-list-number, the ranges are as follows: Example: · access-list-number 1--99 (IP standard access list) · access-list-number 100--199 ( IP extended access Switch(config)# access-list 99 permit any list) · access-list-number 1300--1999 (IP standard access list - expanded range) · access-list-number 2000--2699 (IP extended access list - expanded range) · The dynamic-extended keyword extends the dynamic ACL absolute timer. · The rate-limit keyword permits a simple rate-limit specific access list. interface interface-id Example: Switch(config)# interface gigabitEthernet1/0/1 The access list is always terminated by an implicit deny statement for everything. Specifies the interface to be configured, and enters interface configuration mode. The specified interface must be one of the following: · A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 311 Configuring an IP Multicast Boundary (CLI) IP Multicast Routing Command or Action Step 5 ip multicast boundary access-list-number Example: Switch(config-if)# ip multicast boundary 99 Step 6 end Example: Switch(config-if)# end Step 7 show running-config Example: Switch# show running-config Purpose configuration example, see Example: Interface Configuration as a Routed Port, on page 217 · An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218 These interfaces must have IP addresses assigned to them. Configures the boundary, specifying the access list you created in Step 2. Additional command options include: · For access-list-number, the ranges are as follows: · access-list-number 1--99 (IP standard access list) · access-list-number 100--199 ( IP extended access list) · access-list-number 1300--1999 (IP standard access list - expanded range) · access-list-number 2000--2699 (IP extended access list - expanded range) · Word--IP named access list. · filter-autorp--Filter AutoRP packet contents. · in--Restrict (s,g) creation when this interface is the RPF. · out--Restrict interface addition to outgoing list. Returns to privileged EXEC mode. Verifies your entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 312 IP Multicast Routing Monitoring and Maintaining IP Multicast Routing Step 8 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. What to do next Proceed to the other supported IP multicast routing procedures. Related Topics Multicast Boundaries, on page 300 Multicast Group Concept, on page 300 Example: Configuring an IP Multicast Boundary, on page 316 Monitoring and Maintaining IP Multicast Routing Clearing Caches, Tables, and Databases You can remove all contents of a particular cache, table, or database. Clearing a cache, table, or database might be necessary when the contents of the particular structure are or suspected to be invalid. You can use any of the privileged EXEC commands in the following table to clear IP multicast caches, tables, and databases. Table 38: Commands for Clearing Caches, Tables, and Databases Command Purpose clear ip igmp group {group [ hostname | IP address] Deletes entries from the IGMP cache. | vrf name group [ hostname | IP address] } clear ip mfib { counters [group | source] | global Clears all active IPv4 Multicast Forwarding counters [group | source] | vrf * } Information Base (MFIB) traffic counters. clear ip mrm {status-report [ source ] } IP multicast routing clear commands. clear ip mroute { * | [hostname | IP address] | vrf Deletes entries from the IP multicast routing table. name group [ hostname | IP address] } clear ip msdp { peer | sa-cache | statistics | vrf } Clears the Multicast Source Discovery Protocol (MSDP) cache. clear ip multicast { limit | redundancy statistics } Clears the IP multicast information. clear ip pim { df [ int | rp rp address ] | interface | Clears the PIM cache. rp-mapping [rp address] | vrf vpn name { df | interface | rp-mapping } Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 313 Displaying System and Network Statistics IP Multicast Routing Command clear ip sap [group-address | "session-name"] Purpose Deletes the Session Directory Protocol Version 2 cache or an sdr cache entry. Displaying System and Network Statistics You can display specific statistics, such as the contents of IP routing tables, caches, and databases. Note This release does not support per-route statistics. You can display information to learn resource usage and solve network problems. You can also display information about node reachability and discover the routing path that packets of your device are taking through the network. You can use any of the privileged EXEC commands in the following table to display various routing statistics. Table 39: Commands for Displaying System and Network Statistics Command Purpose ping [group-name | group-address] Sends an ICMP Echo Request to a multicast group address. show ip igmp filter Displays IGMP filter information. show ip igmp groups [type-number | detail ] Displays the multicast groups that are directly connected to the switch and that were learned through IGMP. show ip igmp interface [type number] Displays multicast-related information about an interface. show ip igmp membership [ name/group address | Displays IGMP membership information for all | tracked ] forwarding. show ip igmp profile [ profile_number] Displays IGMP profile information. show ip igmp ssm-mapping [ hostname/IP address Displays IGMP SSM mapping information. ] show ip igmp static-group {class-map [ interface Displays static group information. [ type ] ] show ip igmp vrf Displays the selected VPN Routing/Forwarding instance by name. show ip mfib [ type number ] Displays the IP multicast forwarding information base. show ip mrib { client | route | vrf } Displays the multicast routing information base. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 314 IP Multicast Routing Displaying System and Network Statistics Command Purpose show ip mrm { interface | manager | status-report Displays the IP multicast routing monitor information. } show ip mroute [group-name | group-address] [source] [ count | interface | proxy | pruned | summary | verbose] Displays the contents of the IP multicast routing table. show ip msdp { count | peer | rpf-peer | sa-cache | Displays the Multicast Source Discovery Protocol summary | vrf } (MSDP) information. show ip multicast [ interface | limit | mpls | redundancy | vrf ] Displays global multicast information. show ip pim interface [type number] [count | detail Displays information about interfaces configured for | df | stats ] PIM. This command is available in all software images. show ip pim all-vrfs { tunnel } Display all VRFs. show ip pim autorp Display global auto-RP information. show ip pim boundary [ type number ] Displays boundary information. show ip pim bsr-router Display bootstrap router information (version 2). show ip pim interface [ type number ] Displays PIM interface information. show ip pim mdt [ bgp ] Displays multicast tunnel information. show ip pim neighbor [type number] Lists the PIM neighbors discovered by the switch. This command is available in all software images. show ip pim rp [group-name | group-address] Displays the RP routers associated with a sparse-mode multicast group. This command is available in all software images. show ip pim rp-hash [group-name | group-address] Displays the RP to be chosen based upon the group selected. show ip pim tunnel [ tunnel | verbose ] Displays the registered tunnels. show ip pim vrf name Displays VPN routing and forwarding instances. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 315 Monitoring IP Multicast Routing IP Multicast Routing Command show ip rpf {source-address | name} show ip sap [group | "session-name" | detail] Purpose Displays how the switch is doing Reverse-Path Forwarding (that is, from the unicast routing table, DVMRP routing table, or static mroutes). Command parameters include: · Host name or IP address--IP name or group address. · Select--Group-based VRF select information. · vrf--Selects VPN Routing/Forwarding instance. Displays the Session Announcement Protocol (SAP) Version 2 cache. Command parameters include: · A.B.C.D--IP group address. · WORD--Session name (in double quotes). · detail--Session details. Monitoring IP Multicast Routing You can use the privileged EXEC commands in the following table to monitor IP multicast routers, packets, and paths. Table 40: Commands for Monitoring IP Multicast Routing Command mrinfo { [hostname | address] | vrf } mstat { [hostname | address] | vrf } mtrace { [hostname | address] | vrf } Purpose Queries a multicast router or multilayer switch about which neighboring multicast devices are peering with it. Displays IP multicast packet rate and loss information. Traces the path from a source to a destination branch for a multicast distribution tree for a given group. Configuration Examples for IP Multicast Routing Example: Configuring an IP Multicast Boundary This example shows how to set up a boundary for all administratively-scoped addresses: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 316 IP Multicast Routing Example: Responding to mrinfo Requests Switch(config)# access-list 1 deny 239.0.0.0 0.255.255.255 Switch(config)# access-list 1 permit 224.0.0.0 15.255.255.255 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip multicast boundary 1 Related Topics Configuring an IP Multicast Boundary (CLI), on page 310 Multicast Boundaries, on page 300 Multicast Group Concept, on page 300 Example: Responding to mrinfo Requests The software answers mrinfo requests sent by mrouted systems and Cisco routers and multilayer switches. The software returns information about neighbors through DVMRP tunnels and all the routed interfaces. This information includes the metric (always set to 1), the configured TTL threshold, the status of the interface, and various flags. You can also use the mrinfo privileged EXEC command to query the router or switch itself, as in this example: Switch# mrinfo 171.69.214.27 (mm1-7kd.cisco.com) [version cisco 11.1] [flags: PMS]: 171.69.214.27 -> 171.69.214.26 (mm1-r7kb.cisco.com) [1/0/pim/querier] 171.69.214.27 -> 171.69.214.25 (mm1-45a.cisco.com) [1/0/pim/querier] 171.69.214.33 -> 171.69.214.34 (mm1-45c.cisco.com) [1/0/pim] 171.69.214.137 -> 0.0.0.0 [1/0/pim/querier/down/leaf] 171.69.214.203 -> 0.0.0.0 [1/0/pim/querier/down/leaf] 171.69.214.18 -> 171.69.214.20 (mm1-45e.cisco.com) [1/0/pim] 171.69.214.18 -> 171.69.214.19 (mm1-45c.cisco.com) [1/0/pim] 171.69.214.18 -> 171.69.214.17 (mm1-45a.cisco.com) [1/0/pim] Where to Go Next for IP Multicast You can configure the following: · IGMP · Wireless Multicast · PIM · SSM · Service Discovery Gateway Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 317 Additional References IP Multicast Routing Additional References Related Documents Related Topic Document Title For complete syntax and usage information IP Multicast Routing Command Reference (Catalyst 3650 for the commands used in this chapter. Switches) For information on configuring the Multicast Routing Command Reference (Catalyst 3650 Switches) Source Discovery Protocol (MSDP). Platform-independent configuration information · IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) · IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC RFC 1112 RFC 2236 RFC 4601 Title Host Extensions for IP Multicasting Internet Group Management Protocol, Version 2 Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 318 IP Multicast Routing Feature History and Information for IP Multicast Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for IP Multicast Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 319 Feature History and Information for IP Multicast IP Multicast Routing Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 320 1 8 C H A P T E R Configuring the Service Discovery Gateway · Finding Feature Information, on page 321 · Restrictions for Configuring the Service Discovery Gateway, on page 321 · Information about the Service Discovery Gateway and mDNS, on page 322 · How to Configure the Service Discovery Gateway, on page 325 · Monitoring Service Discovery Gateway, on page 332 · Configuration Examples, on page 332 · Where to Go Next for Configuring Services Discovery Gateway, on page 335 · Additional References, on page 335 · Feature History and Information for Services Discovery Gateway, on page 336 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Configuring the Service Discovery Gateway The following are restrictions for configuring the Service Discovery Gateway: · The Service Discovery Gateway does not support topologies with multiple hops. All network segments must be connected directly to it. The Service Discovery Gateway can learn services from all connected segments to build its cache and respond to requests acting as a proxy. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 321 Information about the Service Discovery Gateway and mDNS IP Multicast Routing Information about the Service Discovery Gateway and mDNS mDNS mDNS was defined to achieve zero configuration, with zero configuration being defined as providing the following features: · Addressing--Allocating IP addresses to hosts · Naming--Using names to refer to hosts instead of IP addresses · Service discovery--Finding services automatically on the network With mDNS, network users no longer have to assign IP addresses, assign host names, or type in names to access services on the network. Users only need to ask to see what network services are available, and choose from a list. With mDNS, addressing is accomplished through the use of DHCP/DHCPv6 or IPv4 and IPv6 Link Local scoped addresses. The benefit of zero-configuration occurs when no infrastructure services such as DHCP or DNS are present and self-assigned link-local addressing can be used. The client can then select a random IPv4 address in the link-local range (169.254.0.0/24) or use its IPv6 link-local address (FE80::/10) for communication. With mDNS, naming (name-to-address translation on a local network using mDNS) queries are sent over the local network using link-local scoped IP multicast. Because these DNS queries are sent to a multicast address (IPv4 address 224.0.0.251 or IPv6 address FF02::FB), no single DNS server with global knowledge is required to answer the queries. When a service or device sees a query for any service it is aware of, it provides a DNS response with the information from its cache. With mDNS, service discovery is accomplished by browsing. An mDNS query is sent out for a given service type and domain, and any device that is aware of matching services replies with service information. The result is a list of available services for the user to choose from. The mDNS protocol (mDNS-RFC), together with DNS Service Discovery (DNS-SD-RFC) achieves the zero-configuration addressing, naming, and service discovery. mDNS-SD Multicast DNS Service Discovery (mDNS-SD) uses DNS protocol semantics and multicast over well-known multicast addresses to achieve zero configuration service discovery. DNS packets are sent to and received on port 5353 using a multicast address of 224.0.0.251 and its IPv6 equivalent FF02::FB. Because mDNS uses a link-local multicast address, its scope is limited to a single physical or logical LAN. If the networking reach needs to be extended to a distributed campus or to a wide-area environment consisting of many different networking technologies, mDNS gateway is implemented. An mDNS gateway provides a transport for mDNS packets across Layer 3 boundaries by filtering, caching, and redistributing services from one Layer 3 domain to another. mDNS-SD Considerations for Wireless Clients · mDNS packets can be sent out of Layer 3 interfaces that might not have an IP address. · Packets with mDNS multicast IP and multicast MAC are sent on a multicast CAPWAP tunnel, if multicast-multicast mode is enabled. A multicast CAPWAP tunnel is a special CAPWAP tunnel used Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 322 IP Multicast Routing Service Discovery Gateway for reducing the number of copies of multicast packet that are required to be generated for each AP CAPWAP tunnel. Sending packets on the multicast CAPWAP tunnel requires the outer IP header to be destined to the multicast CAPWAP tunnel's address, which all APs are subscribed to. · All mDNS packet handling is done at a foreign switch for roamed clients. A foreign switch is the new switch that a roamed wireless client is actually attached to, which is called the point of attachment. Service Discovery Gateway The Service Discovery Gateway feature enables multicast Domain Name System (mDNS) to operate across Layer 3 boundaries (different subnets). An mDNS gateway provides transport for service discovery across Layer 3 boundaries by filtering, caching, and redistributing services from one Layer 3 domain (subnet) to another. Prior to implementation of this feature, mDNS was limited in scope to within a subnet because of the use of link-local scoped multicast addresses. This feature enhances Bring Your Own Device (BYOD). Related Topics Configuring the Service List (CLI), on page 325 Example: Creating a Service-List, Applying a Filter and Configuring Parameters, on page 333 Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Example: Specify Alternative Source Interface for Outgoing mDNS Packets, on page 332 Example: Redistribute Service Announcements, on page 333 Example: Disable Bridging of mDNS Packets to Wireless Clients, on page 333 Example: Enabling mDNS Gateway and Redistributing Services, on page 333 Example: Global mDNS Configuration, on page 334 Example: Interface mDNS Configuration, on page 334 mDNS Gateway and Subnets You need to enable an mDNS gateway for service discovery to operate across subnets. You can enable mDNS gateway for a device or for an interface. Note You need to configure service routing globally before configuring at the interface level. After the device or interface is enabled, you can redistribute service discovery information across subnets. You can create service policies and apply filters on either incoming service discovery information (called IN-bound filtering) or outgoing service discovery information (called OUT-bound filtering). Note If redistribution is enabled globally, global configuration is given higher priority than interface configuration. Figure 15: Sample Networking Scenario For example, if the mDNS gateway functionality is enabled on the router in this figure, then service information can be sent from one subnet to another and vice-versa. For example, the printer and fax service information being advertised in the network with IP address 192.0.2.6 are redistributed to the network with IP address 198.51.100.4. The printer and fax service information in the network with IP address 192.0.2.6 is learned by Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 323 Filtering mDNS-enabled hosts and devices in the other network. IP Multicast Routing Filtering After configuring the mDNS gateway and subnets, you can filter services that you want to redistribute. While creating a service list, the permit or deny command options are used: · The permit command option allows you to permit or transport specific service list information. · The deny option allows you to deny service list information that is available to be transported to other subnets. You need to include a sequence number when using the permit or deny command option. The same service list name can be associated with multiple sequence numbers and each sequence number will be mapped to a rule. Note If no filters are configured, then the default action is to deny service list information to be transported through the device or interface. Query is another option provided when creating service lists. You can create queries using a service list. If you want to browse for a service, then active queries can be used. This function is helpful to keep the records refreshed in the cache. Note Active queries can only be used globally and cannot be used at the interface level. A service end-point (such as a printer or fax) sends unsolicited announcements when a service starts up. After that, it sends unsolicited announcements whenever a network change event occurs (such as an interface coming up or going down). The device always respond to queries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 324 IP Multicast Routing How to Configure the Service Discovery Gateway After creating a service list and using the permit or deny command options, you can filter using match statements (commands) based on service-instance, service-type, or message-type (announcement or query). Related Topics Configuring the Service List (CLI), on page 325 Example: Creating a Service-List, Applying a Filter and Configuring Parameters, on page 333 Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Example: Specify Alternative Source Interface for Outgoing mDNS Packets, on page 332 Example: Redistribute Service Announcements, on page 333 Example: Disable Bridging of mDNS Packets to Wireless Clients, on page 333 Example: Enabling mDNS Gateway and Redistributing Services, on page 333 Example: Global mDNS Configuration, on page 334 Example: Interface mDNS Configuration, on page 334 How to Configure the Service Discovery Gateway Configuring the Service List (CLI) This procedure describes how to create a service list, apply a filter for the service list, and configure parameters for the service list name. SUMMARY STEPS 1. enable 2. configure terminal 3. service-list mdns-sd service-list-name {deny sequence-number | permit sequence-number | query} 4. match message-type {announcement | any | query} 5. match service-instance { LINE } 6. match service-type {LINE } 7. end DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 325 Configuring the Service List (CLI) IP Multicast Routing Step 3 Step 4 Command or Action Purpose service-list mdns-sd service-list-name {deny sequence-number | permit sequence-number | query} Enters mDNS service discovery service list mode. In this mode, you can: Example: Switch(config)# service-list mdns-sd sl1 permit 3 · Create a service list and apply a filter on the service list according to the permit or deny option applied to the sequence number. Switch(config)# service-list mdns-sd sl4 query · Create a service list and associate a query for the service list name if the query option is used. Note The sequence number sets the priority of the rule. A rule with a lower sequence number is selected first and the service announcement or query is allowed or denied accordingly. You define the sequence number as per your network requirements. match message-type {announcement | any | query} Example: Switch(config-mdns-sd-sl)# match message-type announcement (Optional) Sets the message type to match. You can match the following message types: · announcement · any · query These commands configure the parameters for the service list name that is created in step 2. If the match message-type is an announcement, then the service list rule only allows service advertisements or announcements for the device. If the match message-type is a query, then only a query from the client for a certain service in the network is allowed. Multiple service maps of the same name with different sequence numbers can be created and the evaluation of the filters will be ordered on the sequence number. Service lists are an ordered sequence of individual statements, each one has a permit or deny result. Evaluation of service list consists of a list scan, in a predetermined order, and an evaluation of the criteria of each statement that matches. A list scan is stopped once the first statement match is found and an action permit/deny associated with the statement match is performed. The default action after scanning through the entire list is to deny. Note You cannot use the match command if you have used the query option in the previous step. The match command can be used only for the permit or deny option. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 326 IP Multicast Routing Configuring Service List (GUI) Step 5 Step 6 Step 7 Command or Action Purpose match service-instance { LINE } (Optional) Sets the service instance to match. Example: This command configures the parameters for the service list name that is created in step 2. Switch(config-mdns-sd-sl)## servInst 1 match service-instance Note You cannot use the match command if you have used the query option in the previous step. The match command can be used only for the permit or deny option. match service-type {LINE } Example: Switch(config-mdns-sd-sl)# match service-type _ipp._tcp (Optional) Sets the value of the mDNS service type string to match. This command configures the parameters for the service list name that is created in step 2. Note You cannot use the match command if you have used the query option in the previous step. The match command can be used only for the permit or deny option. end Example: Switch(config-mdns-sd-sl)# end Returns to privileged EXEC mode. What to do next Proceed to enable the mDNS gateway and redistribution of services. Related Topics Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Creating a Service-List, Applying a Filter and Configuring Parameters, on page 333 Configuring Service List (GUI) SUMMARY STEPS 1. Choose Configuration > Controller > mDNS > Service List. 2. Click Create Service. 3. In the Service List Name text box, enter the service list name. 4. From the Service rule drop-down list, choose from the following options: · permit--permits the service list. · deny--denies the service list. 5. In the Sequence number text box, enter the priority of the rule. 6. From the Message type drop-down list, choose the message type to match from the following options: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 327 Configuring Service List (GUI) IP Multicast Routing DETAILED STEPS · announcement--The service list rule allows only service advertisements or announcements for the device. · query--The service list rule allows only a query from the client for a service in the network. · any--The service list rule allows any type of message. 7. In the Service instance text box, enter the service instance to match. 8. In the Custom text box, enter the mDNS service type string to match. 9. Click Apply. 10. Click Save Configuration. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Configuration > Controller > mDNS > Service List. Click Create Service. The Service List > Create Service page is displayed. In the Service List Name text box, enter the service list name. From the Service rule drop-down list, choose from the following options: · permit--permits the service list. · deny--denies the service list. In the Sequence number text box, enter the priority of the rule. A rule with a lower sequence number is selected first and the service announcement or query is allowed or denied accordingly. You define the sequence number as per your network requirements. From the Message type drop-down list, choose the message type to match from the following options: · announcement--The service list rule allows only service advertisements or announcements for the device. · query--The service list rule allows only a query from the client for a service in the network. · any--The service list rule allows any type of message. Multiple service maps of the same name with different sequence numbers can be created and the evaluation of the filters will be ordered on the sequence number. Service lists are an ordered sequence of individual statements, each one has a permit or deny result. Evaluation of service list consists of a list scan, in a predetermined order, and an evaluation of the criteria of each statement that matches. A list scan is stopped once the first statement match is found and an action permit/deny associated with the statement match is performed. The default action after scanning through the entire list is to deny. In the Service instance text box, enter the service instance to match. In the Custom text box, enter the mDNS service type string to match. The Learned Service box shows the services that are added after enabling the learned service type configured by navigating to Configuration > Controller > mDNS > Global. For example, _roap._tcp.local. The Selected Service box shows the learned service that you have selected for an mDNS service. Click Apply. Click Save Configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 328 IP Multicast Routing Enabling mDNS Gateway and Redistributing Services (CLI) What to do next Proceed to enable the mDNS gateway and redistribution of services. Enabling mDNS Gateway and Redistributing Services (CLI) After enabling mDNS gateway for a device, you can apply filters (apply IN-bound filtering or OUT-bound filtering) and active queries by using service-policy and service-policy-query commands, respectively. You can redistribute services and service announcements using the redistribute mdns-sd command, and set some part of the system memory for cache using the cache-memory-max command. Note By default, mDNS gateway is disabled on all interfaces. SUMMARY STEPS 1. enable 2. configure terminal 3. service-routing mdns-sd 4. service-policy service-policy-name {IN | OUT} 5. redistribute mdns-sd 6. cache-memory-max cache-config-percentage 7. service-policy-query service-list-query-name service-list-query-periodicity 8. exit 9. wireless multicast 10. no wireless mdns-bridging 11. end DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Switch> enable Step 2 configure terminal Example: Switch# configure terminal Enters the global configuration mode. Step 3 service-routing mdns-sd Example: Switch (config)# service-routing mdns-sd Enables mDNS gateway functionality for a device and enters multicast DNS configuration (config-mdns) mode. Note This command enables the mDNS function globally. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 329 Enabling mDNS Gateway and Redistributing Services (CLI) IP Multicast Routing Step 4 Command or Action Purpose Note Enter the service-routing mdns-sd source-interface if-name command in either global-config or interface-config mode, to specify an alternate source interface for outgoing mDNS packets, so its IP address can be used when there is none configured on the outgoing interface. service-policy service-policy-name {IN | OUT} (Optional) For a service list, applies a filter on incoming Example: service discovery information (IN-bound filtering) or outgoing service discovery information (OUT-bound filtering). Switch (config-mdns)# service-policy serv-pol1 IN Step 5 redistribute mdns-sd Example: Switch (config-mdns)# redistribute mdns-sd Step 6 cache-memory-max cache-config-percentage Example: Switch (config-mdns)# cache-memory-max 20 Step 7 Step 8 Step 9 service-policy-query service-list-query-name service-list-query-periodicity Example: Switch (config-mdns)# service-policy-query sl-query1 100 exit Example: Switch (config-mdns)#exit wireless multicast Example: Switch (config)# wireless multicast (Optional) Redistributes services or service announcements across subnets. Note If redistribution is enabled globally, global configuration is given higher priority than interface configuration. (Optional) Sets some part of the system memory (in percentage) for cache. Note By default, 10 percent of the system memory is set aside for cache. You can override the default value by using this command. (Optional) Configures service list-query periodicity. (Optional) Returns to global configuration mode. (Optional) Enables wireless Ethernet multicast support. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 330 IP Multicast Routing Enabling Multicast DNS Gateway (GUI) Step 10 Command or Action no wireless mdns-bridging Example: Purpose (Optional) Disables bridging of mDNS packets to wireless clients. Switch (config)# no wireless mdns-bridging Step 11 end Example: Switch(config)# end Returns to privileged EXEC mode. Related Topics Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Specify Alternative Source Interface for Outgoing mDNS Packets, on page 332 Example: Redistribute Service Announcements, on page 333 Example: Disable Bridging of mDNS Packets to Wireless Clients, on page 333 Example: Enabling mDNS Gateway and Redistributing Services, on page 333 Example: Global mDNS Configuration, on page 334 Example: Interface mDNS Configuration, on page 334 Enabling Multicast DNS Gateway (GUI) SUMMARY STEPS 1. Choose Configuration > Controller > mDNS > Global. 2. Select the mDNS gateway check box. 3. From the Learn Service drop-down list, choose from the following options: · Enable-- Allows the switch to learn all the announced services. It is used to learn services by enabling all announcement/queries by using Service Policy IN of type GUI-permit-all and in Service Policy OUT of type GUI-deny-all. · Disable-- Denies all the traffics IN and OUT. It is used to deny services by disabling all announcement/queries by using Service Policy IN of type GUI-deny-all and in Service Policy OUT of type GUI-deny-all. · Custom-- You can set your own IN and OUT policy. It allows you to define a custom service list. 4. Click Apply. 5. Click Save Configuration. DETAILED STEPS Step 1 Choose Configuration > Controller > mDNS > Global. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 331 Monitoring Service Discovery Gateway IP Multicast Routing Step 2 Step 3 Step 4 Step 5 The Global Service Rules page is displayed. Select the mDNS gateway check box. From the Learn Service drop-down list, choose from the following options: · Enable-- Allows the switch to learn all the announced services. It is used to learn services by enabling all announcement/queries by using Service Policy IN of type GUI-permit-all and in Service Policy OUT of type GUI-deny-all. · Disable-- Denies all the traffics IN and OUT. It is used to deny services by disabling all announcement/queries by using Service Policy IN of type GUI-deny-all and in Service Policy OUT of type GUI-deny-all. · Custom-- You can set your own IN and OUT policy. It allows you to define a custom service list. Click Apply. Click Save Configuration. Monitoring Service Discovery Gateway Table 41: Monitoring Service Discovery Gateway Command Purpose show mdns requests [detail | name record-name| type record-type [ name record-name]] This command displays information for outstanding mDNS requests, including record name and record type information. show mdns cache [interface type number | name This command displays mDNS cache information. record-name [type record-type]| type record-type] show mdns statistics {all | service-list list-name | This command displays mDNS statistics. service-policy {all | interface type number }} Configuration Examples Example: Specify Alternative Source Interface for Outgoing mDNS Packets The following example displays how to specify an alternate source interface for outgoing mDNS packets, so its IP address can be used when there is none configured on the outgoing interface. Switch(config)# service-routing mdns-sd Switch(config-mdns)# source-interface if-name Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 332 IP Multicast Routing Example: Redistribute Service Announcements Example: Redistribute Service Announcements The following example displays how to redistribute service announcements received on one interface over all the interfaces or over a specific interface. Switch(config)# service-routing mdns-sd Switch(config-mdns)# Redistribute mdns-sd if-name Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Disable Bridging of mDNS Packets to Wireless Clients The following example displays how to disable bridging of mDNS packets to wireless clients. Switch(config)# wireless multicast Switch(config)# no wireless mdns-bridging Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Creating a Service-List, Applying a Filter and Configuring Parameters The following example shows the creation of a service-list sl1. The permit command option is being applied on sequence number 3 and all services with message-type announcement are filtered and available for transport across various subnets associated with the device. Switch# configure terminal Switch(config)# service-list mdns-sd sl1 permit 3 Switch(config-mdns-sd-sl)#match message-type announcement Switch(config-mdns)# exit Related Topics Configuring the Service List (CLI), on page 325 Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Enabling mDNS Gateway and Redistributing Services The following example shows how to enable an mDNS gateway for a device and enable redistribution of services across subnets. IN-bound filtering is applied on the service-list serv-pol1. Twenty percent of system memory is made available for cache and service-list-query periodicity is configured at 100 seconds. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 333 Example: Global mDNS Configuration IP Multicast Routing Switch# configure terminal Switch# service-routing mdns-sd Switch(config-mdns)# service-policy serv-pol1 IN Switch(config-mdns)# redistribute mdns-sd Switch(config-mdns)# cache-memory-max 20 Switch(config-mdns)# service-policy-query sl-query1 100 Switch(config-mdns)# exit Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Global mDNS Configuration The following example displays how to globally configure mDNS. Switch# configure terminal Switch(config)# service-list mdns-sd mypermit-all permit 10 Switch(config-mdns-sd-s1)# exit Switch(config)# service-list mdns-sd querier query Switch(config-mdns-sd-s1)# service-type _dns._udp Switch(config-mdns-sd-s1)# end Switch# configure terminal Switch(config)# service-routing mdns-sd Switch(config-mdns)# service-policy mypermit-all IN Switch(config-mdns)# service-policy mypermit-all OUT Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Interface mDNS Configuration The following example displays how to configure mDNS for an interface. Switch(config)#interface Vlan136 Switch(config-if)# description *** Mgmt VLAN *** Switch(config-if)# ip address 9.7.136.10 255.255.255.0 Switch(config-if)# ip helper-address 9.1.0.100 Switch(config-if)# service-routing mdns-sd Switch(config-if-mdns-sd)# service-policy mypermit-all IN Switch(config-if-mdns-sd)# service-policy mypermit-all OUT Switch(config-if-mdns-sd)# service-policy-query querier 60 Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 334 IP Multicast Routing Where to Go Next for Configuring Services Discovery Gateway Where to Go Next for Configuring Services Discovery Gateway You can configure the following: · IGMP · Wireless Multicast · PIM · SSM · IP Multicast Routing Additional References Related Documents Related Topic Configuring DNS DNS conceptual information Platform-independent configuration information Document Title IP Addressing: DNS Configuration Guide, Cisco IOS XE Release 3SE 'Information About DNS' section in IP Addressing: DNS Configuration Guide, Cisco IOS XE Release 3SE IP Addressing: DNS Configuration Guide, Cisco IOS XE Release 3SE Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC RFC 6763 Title DNS-Based Service Discovery Multicast DNS Internet-Draft Multicast Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 335 Feature History and Information for Services Discovery Gateway IP Multicast Routing MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Services Discovery Gateway Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 336 V P A R T IPv6 · Configuring MLD Snooping, on page 339 · Configuring IPv6 Unicast Routing, on page 353 · Configuring IPv6 Client IP Address Learning, on page 383 · Configuring IPv6 WLAN Security, on page 407 · Configuring IPv6 ACL, on page 429 · Configuring IPv6 Web Authentication , on page 447 · Configuring IPv6 Client Mobility, on page 459 · Configuring IPv6 Mobility, on page 467 · Configuring IPv6 NetFlow, on page 473 1 9 C H A P T E R Configuring MLD Snooping This module contains details of configuring MLD snooping · Finding Feature Information, on page 339 · Information About Configuring IPv6 MLD Snooping, on page 339 · How to Configure IPv6 MLD Snooping, on page 343 · Displaying MLD Snooping Information, on page 351 · Configuration Examples for Configuring MLD Snooping, on page 351 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring IPv6 MLD Snooping You can use Multicast Listener Discovery (MLD) snooping to enable efficient distribution of IP Version 6 (IPv6) multicast data to clients and routers in a switched network on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. Note To use IPv6 on a Catalyst 2960-XR switch, you must configure the dual IPv4 and IPv6 Switch Database Management (SDM) template on the switch. Note For complete syntax and usage information for the commands used in this chapter, see the command reference for this release or the Cisco IOS documentation referenced in the procedures. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 339 IPv6 Understanding MLD Snooping Understanding MLD Snooping In IP Version 4 (IPv4), Layer 2 switches can use Internet Group Management Protocol (IGMP) snooping to limit the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast devices. In IPv6, MLD snooping performs a similar function. With MLD snooping, IPv6 multicast data is selectively forwarded to a list of ports that want to receive the data, instead of being flooded to all ports in a VLAN. This list is constructed by snooping IPv6 multicast control packets. MLD is a protocol used by IPv6 multicast routers to discover the presence of multicast listeners (nodes wishing to receive IPv6 multicast packets) on the links that are directly attached to the routers and to discover which multicast packets are of interest to neighboring nodes. MLD is derived from IGMP; MLD Version 1 (MLDv1) is equivalent to IGMPv2, and MLD Version 2 (MLDv2) is equivalent to IGMPv3. MLD is a subprotocol of Internet Control Message Protocol Version 6 (ICMPv6), and MLD messages are a subset of ICMPv6 messages, identified in IPv6 packets by a preceding Next Header value of 58. The switch supports two versions of MLD snooping: · MLDv1 snooping detects MLDv1 control packets and sets up traffic bridging based on IPv6 destination multicast addresses. · MLDv2 basic snooping (MBSS) uses MLDv2 control packets to set up traffic forwarding based on IPv6 destination multicast addresses. The switch can snoop on both MLDv1 and MLDv2 protocol packets and bridge IPv6 multicast data based on destination IPv6 multicast addresses. Note The switch does not support MLDv2 enhanced snooping, which sets up IPv6 source and destination multicast address-based forwarding. MLD snooping can be enabled or disabled globally or per VLAN. When MLD snooping is enabled, a per-VLAN IPv6 multicast address table is constructed in software and hardware. The switch then performs IPv6 multicast-address based bridging in hardware. According to IPv6 multicast standards, the switch derives the MAC multicast address by performing a logical-OR of the four low-order octets of the switch MAC address with the MAC address of 33:33:00:00:00:00. For example, the IPv6 MAC address of FF02:DEAD:BEEF:1:3 maps to the Ethernet MAC address of 33:33:00:01:00:03. A multicast packet is unmatched when the destination IPv6 address does not match the destination MAC address. The switch forwards the unmatched packet in hardware based the MAC address table. If the destination MAC address is not in the MAC address table, the switch floods the packet to all ports in the same VLAN as the receiving port. MLD Messages MLDv1 supports three types of messages: · Listener Queries are the equivalent of IGMPv2 queries and are either General Queries or Multicast-Address-Specific Queries (MASQs). · Multicast Listener Reports are the equivalent of IGMPv2 reports · Multicast Listener Done messages are the equivalent of IGMPv2 leave messages. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 340 IPv6 MLD Queries MLD Queries MLDv2 supports MLDv2 queries and reports, as well as MLDv1 Report and Done messages. Message timers and state transitions resulting from messages being sent or received are the same as those of IGMPv2 messages. MLD messages that do not have valid link-local IPv6 source addresses are ignored by MLD routers and switches. The switch sends out MLD queries, constructs an IPv6 multicast address database, and generates MLD group-specific and MLD group-and-source-specific queries in response to MLD Done messages. The switch also supports report suppression, report proxying, Immediate-Leave functionality, and static IPv6 multicast group address configuration. When MLD snooping is disabled, all MLD queries are flooded in the ingress VLAN. When MLD snooping is enabled, received MLD queries are flooded in the ingress VLAN, and a copy of the query is sent to the CPU for processing. From the received query, MLD snooping builds the IPv6 multicast address database. It detects multicast router ports, maintains timers, sets report response time, learns the querier IP source address for the VLAN, learns the querier port in the VLAN, and maintains multicast-address aging. Note When the IPv6 multicast router is a Catalyst 6500 switch and you are using extended VLANs (in the range 1006 to 4094), IPv6 MLD snooping must be enabled on the extended VLAN on the Catalyst 6500 switch in order for the Catalyst 2960, 2960-S, 2960-C, or 2960-X switch to receive queries on the VLAN. For normal-range VLANs (1 to 1005), it is not necessary to enable IPv6 MLD snooping on the VLAN on the Catalyst 6500 switch. When a group exists in the MLD snooping database, the switch responds to a group-specific query by sending an MLDv1 report. When the group is unknown, the group-specific query is flooded to the ingress VLAN. When a host wants to leave a multicast group, it can send out an MLD Done message (equivalent to IGMP Leave message). When the switch receives an MLDv1 Done message, if Immediate- Leave is not enabled, the switch sends an MASQ to the port from which the message was received to determine if other devices connected to the port should remain in the multicast group. Multicast Client Aging Robustness You can configure port membership removal from addresses based on the number of queries. A port is removed from membership to an address only when there are no reports to the address on the port for the configured number of queries. The default number is 2. Multicast Router Discovery Like IGMP snooping, MLD snooping performs multicast router discovery, with these characteristics: · Ports configured by a user never age out. · Dynamic port learning results from MLDv1 snooping queries and IPv6 PIMv2 packets. · If there are multiple routers on the same Layer 2 interface, MLD snooping tracks a single multicast router on the port (the router that most recently sent a router control packet). · Dynamic multicast router port aging is based on a default timer of 5 minutes; the multicast router is deleted from the router port list if no control packet is received on the port for 5 minutes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 341 IPv6 MLD Reports · IPv6 multicast router discovery only takes place when MLD snooping is enabled on the switch. · Received IPv6 multicast router control packets are always flooded to the ingress VLAN, whether or not MLD snooping is enabled on the switch. · After the discovery of the first IPv6 multicast router port, unknown IPv6 multicast data is forwarded only to the discovered router ports (before that time, all IPv6 multicast data is flooded to the ingress VLAN). MLD Reports The processing of MLDv1 join messages is essentially the same as with IGMPv2. When no IPv6 multicast routers are detected in a VLAN, reports are not processed or forwarded from the switch. When IPv6 multicast routers are detected and an MLDv1 report is received, an IPv6 multicast group address is entered in the VLAN MLD database. Then all IPv6 multicast traffic to the group within the VLAN is forwarded using this address. When MLD snooping is disabled, reports are flooded in the ingress VLAN. When MLD snooping is enabled, MLD report suppression, called listener message suppression, is automatically enabled. With report suppression, the switch forwards the first MLDv1 report received by a group to IPv6 multicast routers; subsequent reports for the group are not sent to the routers. When MLD snooping is disabled, report suppression is disabled, and all MLDv1 reports are flooded to the ingress VLAN. The switch also supports MLDv1 proxy reporting. When an MLDv1 MASQ is received, the switch responds with MLDv1 reports for the address on which the query arrived if the group exists in the switch on another port and if the port on which the query arrived is not the last member port for the address. MLD Done Messages and Immediate-Leave When the Immediate-Leave feature is enabled and a host sends an MLDv1 Done message (equivalent to an IGMP leave message), the port on which the Done message was received is immediately deleted from the group.You enable Immediate-Leave on VLANs and (as with IGMP snooping), you should only use the feature on VLANs where a single host is connected to the port. If the port was the last member of a group, the group is also deleted, and the leave information is forwarded to the detected IPv6 multicast routers. When Immediate Leave is not enabled in a VLAN (which would be the case when there are multiple clients for a group on the same port) and a Done message is received on a port, an MASQ is generated on that port. The user can control when a port membership is removed for an existing address in terms of the number of MASQs. A port is removed from membership to an address when there are no MLDv1 reports to the address on the port for the configured number of queries. The number of MASQs generated is configured by using the ipv6 mld snooping last-listener-query count global configuration command. The default number is 2. The MASQ is sent to the IPv6 multicast address for which the Done message was sent. If there are no reports sent to the IPv6 multicast address specified in the MASQ during the switch maximum response time, the port on which the MASQ was sent is deleted from the IPv6 multicast address database. The maximum response time is the time configured by using the ipv6 mld snooping last-listener-query-interval global configuration command. If the deleted port is the last member of the multicast address, the multicast address is also deleted, and the switch sends the address leave information to all detected multicast routers. When Immediate Leave is not enabled and a port receives an MLD Done message, the switch generates MASQs on the port and sends them to the IPv6 multicast address for which the Done message was sent. You can optionally configure the number of MASQs that are sent and the length of time the switch waits for a response before deleting the port from the multicast group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 342 IPv6 Topology Change Notification Processing When you enable MLDv1 Immediate Leave, the switch immediately removes a port from a multicast group when it detects an MLD Done message on that port. You should only use the Immediate-Leave feature when there is a single receiver present on every port in the VLAN. When there are multiple clients for a multicast group on the same port, you should not enable Immediate-Leave in a VLAN. Topology Change Notification Processing When topology change notification (TCN) solicitation is enabled by using the ipv6 mld snooping tcn query solicit global configuration command, MLDv1 snooping sets the VLAN to flood all IPv6 multicast traffic with a configured number of MLDv1 queries before it begins sending multicast data only to selected ports. You set this value by using the ipv6 mld snooping tcn flood query count global configuration command. The default is to send two queries. The switch also generates MLDv1 global Done messages with valid link-local IPv6 source addresses when the switch becomes the STP root in the VLAN or when it is configured by the user. This is same as done in IGMP snooping. MLD Snooping in Switch Stacks The MLD IPv6 group address databases are maintained on all switches in the stack, regardless of which switch learns of an IPv6 multicast group. Report suppression and proxy reporting are done stack-wide. During the maximum response time, only one received report for a group is forwarded to the multicast routers, regardless of which switch the report arrives on. The election of a new stack master does not affect the learning or bridging of IPv6 multicast data; bridging of IPv6 multicast data does not stop during a stack master re-election. When a new switch is added to the stack, it synchronizes the learned IPv6 multicast information from the stack master. Until the synchronization is complete, data ingress on the newly added switch is treated as unknown multicast data. How to Configure IPv6 MLD Snooping Default MLD Snooping Configuration Table 42: Default MLD Snooping Configuration Feature MLD snooping (Global) MLD snooping (per VLAN) IPv6 Multicast addresses IPv6 Multicast router ports MLD snooping Immediate Leave MLD snooping robustness variable Default Setting Disabled. Enabled. MLD snooping must be globally enabled for VLAN MLD snooping to take place. None configured. None configured. Disabled. Global: 2; Per VLAN: 0. Note The VLAN value overrides the global setting. When the VLAN value is 0, the VLAN uses the global count. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 343 IPv6 MLD Snooping Configuration Guidelines Feature Last listener query count Last listener query interval TCN query solicit TCN query count MLD listener suppression Default Setting Global: 2; Per VLAN: 0. Note The VLAN value overrides the global setting. When the VLAN value is 0, the VLAN uses the global count. Global: 1000 (1 second); VLAN: 0. Note The VLAN value overrides the global setting. When the VLAN value is 0, the VLAN uses the global interval. Disabled. 2. Disabled. MLD Snooping Configuration Guidelines When configuring MLD snooping, consider these guidelines: · You can configure MLD snooping characteristics at any time, but you must globally enable MLD snooping by using the ipv6 mld snooping global configuration command for the configuration to take effect. · When the IPv6 multicast router is a Catalyst 6500 switch and you are using extended VLANs (in the range 1006 to 4094), IPv6 MLD snooping must be enabled on the extended VLAN on the Catalyst 6500 switch in order for the switch to receive queries on the VLAN. For normal-range VLANs (1 to 1005), it is not necessary to enable IPv6 MLD snooping on the VLAN on the Catalyst 6500 switch. · MLD snooping and IGMP snooping act independently of each other. You can enable both features at the same time on the switch. · The maximum number of multicast entries allowed on the switch or switch stack is determined by the configured SDM template. · · The maximum number of address entries allowed for the switch or switch stack is 4000. Enabling or Disabling MLD Snooping on the Switch (CLI) By default, IPv6 MLD snooping is globally disabled on the switch and enabled on all VLANs. When MLD snooping is globally disabled, it is also disabled on all VLANs. When you globally enable MLD snooping, the VLAN configuration overrides the global configuration. That is, MLD snooping is enabled only on VLAN interfaces in the default state (enabled). You can enable and disable MLD snooping on a per-VLAN basis or for a range of VLANs, but if you globally disable MLD snooping, it is disabled in all VLANs. If global snooping is enabled, you can enable or disable VLAN snooping. Beginning in privileged EXEC mode, follow these steps to globally enable MLD snooping on the switch: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 344 IPv6 Enabling or Disabling MLD Snooping on a VLAN (CLI) Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ipv6 mld snooping Example: Switch(config)# ipv6 mld snooping Enables MLD snooping on the switch. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 copy running-config startup-config Example: (Optional) Save your entries in the configuration file. Switch(config)# copy running-config startup-config Step 5 reload Example: Switch(config)# reload Reload the operating system. Enabling or Disabling MLD Snooping on a VLAN (CLI) Beginning in privileged EXEC mode, follow these steps to enable MLD snooping on a VLAN. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 345 IPv6 Configuring a Static Multicast Group (CLI) Step 2 Command or Action ipv6 mld snooping Example: Switch(config)# ipv6 mld snooping Step 3 ipv6 mld snooping vlan vlan-id Example: Switch(config)# ipv6 mld snooping vlan 1 Step 4 end Example: Switch(config)# ipv6 mld snooping vlan 1 Purpose Enables MLD snooping on the switch. Enables MLD snooping on the VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094. Note MLD snooping must be globally enabled for VLAN snooping to be enabled. Returns to privileged EXEC mode. Configuring a Static Multicast Group (CLI) Hosts or Layer 2 ports normally join multicast groups dynamically, but you can also statically configure an IPv6 multicast address and member ports for a VLAN. Beginning in privileged EXEC mode, follow these steps to add a Layer 2 port as a member of a multicast group: Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode Switch# configure terminal Step 2 ipv6 mld snooping vlan vlan-id static ipv6_multicast_address interface interface-id Example: Switch(config)# ipv6 mld snooping vlan 1 static FF12::3 interface gigabitethernet 0/1 Configures a multicast group with a Layer 2 port as a member of a multicast group: · vlan-id is the multicast group VLAN ID. The VLAN ID range is 1 to 1001 and 1006 to 4094. · ipv6_multicast_address is the 128-bit group IPv6 address. The address must be in the form specified in RFC 2373. · interface-id is the member port. It can be a physical interface or a port channel (1 to 48). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 346 IPv6 Configuring a Multicast Router Port (CLI) Step 3 Command or Action end Example: Switch(config)# end Step 4 Use one of the following: · show ipv6 mld snooping address · show ipv6 mld snooping address vlan vlan-id Example: Switch# show ipv6 mld snooping address or Switch# show ipv6 mld snooping vlan 1 Purpose Returns to privileged EXEC mode. Verifies the static member port and the IPv6 address. Configuring a Multicast Router Port (CLI) Step 1 Note Static connections to multicast routers are supported only on switch ports. Beginning in privileged EXEC mode, follow these steps to add a multicast router port to a VLAN: Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ipv6 mld snooping vlan vlan-id mrouter interface interface-id Specifies the multicast router VLAN ID, and specify the interface to the multicast router. Example: · The VLAN ID range is 1 to 1001 and 1006 to 4094. Switch(config)# ipv6 mld snooping vlan 1 mrouter interface gigabitethernet 0/2 · The interface can be a physical interface or a port channel. The port-channel range is 1 to 48. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 347 IPv6 Enabling MLD Immediate Leave (CLI) Step 4 Command or Action show ipv6 mld snooping mrouter [ vlan vlan-id ] Example: Switch# show ipv6 mld snooping mrouter vlan 1 Purpose Verifies that IPv6 MLD snooping is enabled on the VLAN interface. Enabling MLD Immediate Leave (CLI) Beginning in privileged EXEC mode, follow these steps to enable MLDv1 Immediate Leave: Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ipv6 mld snooping vlan vlan-id immediate-leave Example: Switch(config)# ipv6 mld snooping vlan 1 immediate-leave Enables MLD Immediate Leave on the VLAN interface. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 show ipv6 mld snooping vlan vlan-id Example: Switch# show ipv6 mld snooping vlan 1 Verifies that Immediate Leave is enabled on the VLAN interface. Configuring MLD Snooping Queries (CLI) Beginning in privileged EXEC mode, follow these steps to configure MLD snooping query characteristics for the switch or for a VLAN: Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 348 IPv6 Configuring MLD Snooping Queries (CLI) Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action ipv6 mld snooping robustness-variable value Example: Switch(config)# ipv6 mld snooping robustness-variable 3 Purpose (Optional) Sets the number of queries that are sent before switch will deletes a listener (port) that does not respond to a general query. The range is 1 to 3; the default is 2. ipv6 mld snooping vlan vlan-id robustness-variable (Optional) Sets the robustness variable on a VLAN basis, value which determines the number of general queries that MLD Example: snooping sends before aging out a multicast address when there is no MLD report response. The range is 1 to 3; the Switch(config)# ipv6 mld snooping vlan 1 robustness-variable 3 default is 0. When set to 0, the number used is the global robustness variable value. ipv6 mld snooping last-listener-query-count count Example: Switch(config)# ipv6 mld snooping last-listener-query-count 7 (Optional) Sets the number of MASQs that the switch sends before aging out an MLD client. The range is 1 to 7; the default is 2. The queries are sent 1 second apart. ipv6 mld snooping vlan vlan-id last-listener-query-count count Example: Switch(config)# ipv6 mld snooping vlan 1 last-listener-query-count 7 (Optional) Sets the last-listener query count on a VLAN basis. This value overrides the value configured globally. The range is 1 to 7; the default is 0. When set to 0, the global count value is used. Queries are sent 1 second apart. ipv6 mld snooping last-listener-query-interval interval (Optional) Sets the maximum response time that the switch Example: waits after sending out a MASQ before deleting a port from the multicast group. The range is 100 to 32,768 Switch(config)# ipv6 mld snooping last-listener-query-interval 2000 thousands of a second. The default is 1000 (1 second). ipv6 mld snooping vlan vlan-id last-listener-query-interval interval Example: Switch(config)# ipv6 mld snooping vlan 1 last-listener-query-interval 2000 (Optional) Sets the last-listener query interval on a VLAN basis. This value overrides the value configured globally. The range is 0 to 32,768 thousands of a second. The default is 0. When set to 0, the global last-listener query interval is used. ipv6 mld snooping tcn query solicit Example: Switch(config)# ipv6 mld snooping tcn query solicit (Optional) Enables topology change notification (TCN) solicitation, which means that VLANs flood all IPv6 multicast traffic for the configured number of queries before sending multicast data to only those ports requesting to receive it. The default is for TCN to be disabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 349 IPv6 Disabling MLD Listener Message Suppression (CLI) Step 9 Step 10 Step 11 Command or Action Purpose ipv6 mld snooping tcn flood query count count (Optional) When TCN is enabled, specifies the number of Example: TCN queries to be sent. The range is from 1 to 10; the default is 2. Switch(config)# ipv6 mld snooping tcn flood query count 5 end Returns to privileged EXEC mode. show ipv6 mld snooping querier [ vlan vlan-id] Example: Switch(config)# show ipv6 mld snooping querier vlan 1 (Optional) Verifies that the MLD snooping querier information for the switch or for the VLAN. Disabling MLD Listener Message Suppression (CLI) MLD snooping listener message suppression is enabled by default. When it is enabled, the switch forwards only one MLD report per multicast router query. When message suppression is disabled, multiple MLD reports could be forwarded to the multicast routers. Beginning in privileged EXEC mode, follow these steps to disable MLD listener message suppression: Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enter global configuration mode. Step 2 no ipv6 mld snooping listener-message-suppression Example: Switch(config)# no ipv6 mld snooping listener-message-suppression Disable MLD message suppression. Step 3 end Example: Switch(config)# end Return to privileged EXEC mode. Step 4 show ipv6 mld snooping Example: Switch# show ipv6 mld snooping Verify that IPv6 MLD snooping report suppression is disabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 350 IPv6 Displaying MLD Snooping Information Displaying MLD Snooping Information You can display MLD snooping information for dynamically learned and statically configured router ports and VLAN interfaces. You can also display IPv6 group address multicast entries for a VLAN configured for MLD snooping. Table 43: Commands for Displaying MLD Snooping Information Command Purpose show ipv6 mld snooping [ vlan Displays the MLD snooping configuration information for all VLANs vlan-id ] on the switch or for a specified VLAN. (Optional) Enter vlan vlan-id to display information for a single VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094. show ipv6 mld snooping mrouter Displays information on dynamically learned and manually configured [ vlan vlan-id ] multicast router interfaces. When you enable MLD snooping, the switch automatically learns the interface to which a multicast router is connected. These are dynamically learned interfaces. (Optional) Enters vlan vlan-id to display information for a single VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094. show ipv6 mld snooping querier Displays information about the IPv6 address and incoming port for the [ vlan vlan-id ] most-recently received MLD query messages in the VLAN. (Optional) Enters vlan vlan-id to display information for a single VLAN.The VLAN ID range is 1 to 1001 and 1006 to 4094. show ipv6 mld snooping address Displays all IPv6 multicast address information or specific IPv6 multicast [ vlan vlan-id ] [ count | address information for the switch or a VLAN. dynamic | user ] · Enters count to show the group count on the switch or in a VLAN. · Enters dynamic to display MLD snooping learned group information for the switch or for a VLAN. · Entesr user to display MLD snooping user-configured group information for the switch or for a VLAN. show ipv6 mld snooping address Displays MLD snooping for the specified VLAN and IPv6 multicast vlan vlan-id [ address. ipv6-multicast-address ] Configuration Examples for Configuring MLD Snooping Configuring a Static Multicast Group: Example This example shows how to statically configure an IPv6 multicast group: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 351 IPv6 Configuring a Multicast Router Port: Example Switch# configure terminal Switch(config)# ipv6 mld snooping vlan 2 static FF12::3 interface gigabitethernet 1/0/1 Switch(config)# end Configuring a Multicast Router Port: Example This example shows how to add a multicast router port to VLAN 200: Switch# configure terminal Switch(config)# ipv6 mld snooping vlan 200 mrouter interface gigabitethernet 0/2 Switch(config)# exit Enabling MLD Immediate Leave: Example This example shows how to enable MLD Immediate Leave on VLAN 130: Switch# configure terminal Switch(config)# ipv6 mld snooping vlan 130 immediate-leave Switch(config)# exit Configuring MLD Snooping Queries: Example This example shows how to set the MLD snooping global robustness variable to 3: Switch# configure terminal Switch(config)# ipv6 mld snooping robustness-variable 3 Switch(config)# exit This example shows how to set the MLD snooping last-listener query count for a VLAN to 3: Switch# configure terminal Switch(config)# ipv6 mld snooping vlan 200 last-listener-query-count 3 Switch(config)# exit This example shows how to set the MLD snooping last-listener query interval (maximum response time) to 2000 (2 seconds): Switch# configure terminal Switch(config)# ipv6 mld snooping last-listener-query-interval 2000 Switch(config)# exit Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 352 2 0 C H A P T E R Configuring IPv6 Unicast Routing · Finding Feature Information, on page 353 · Information About Configuring IPv6 Unicast Routing, on page 353 · Configuring DHCP for IPv6 Address Assignment, on page 375 · Configuration Examples for IPv6 Unicast Routing, on page 379 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring IPv6 Unicast Routing This chapter describes how to configure IPv6 unicast routing on the switch. Note To use all IPv6 features in this chapter, the switch or stack master must be running the IP services feature set. Switches running the IP base feature set support IPv6 static routing, RIP for IPv6, and OSPF. Switches running the LAN base feature set support only IPv6 host functionality. Understanding IPv6 IPv4 users can move to IPv6 and receive services such as end-to-end security, quality of service (QoS), and globally unique addresses. The IPv6 address space reduces the need for private addresses and Network Address Translation (NAT) processing by border routers at network edges. For information about how Cisco Systems implements IPv6, go to: http://www.cisco.com/en/US/products/ps6553/products_ios_technology_home.html For information about IPv6 and other features in this chapter Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 353 IPv6 IPv6 Addresses · See the Cisco IOS IPv6 Configuration Library. · Use the Search field on Cisco.com to locate the Cisco IOS software documentation. For example, if you want information about static routes, you can enter Implementing Static Routes for IPv6 in the search field to learn about static routes. IPv6 Addresses The switch supports only IPv6 unicast addresses. It does not support site-local unicast addresses, or anycast addresses. The IPv6 128-bit addresses are represented as a series of eight 16-bit hexadecimal fields separated by colons in the format: n:n:n:n:n:n:n:n. This is an example of an IPv6 address: 2031:0000:130F:0000:0000:09C0:080F:130B For easier implementation, leading zeros in each field are optional. This is the same address without leading zeros: 2031:0:130F:0:0:9C0:80F:130B You can also use two colons (::) to represent successive hexadecimal fields of zeros, but you can use this short version only once in each address: 2031:0:130F::09C0:080F:130B For more information about IPv6 address formats, address types, and the IPv6 packet header, see the "Implementing IPv6 Addressing and Basic Connectivity" chapter of Cisco IOS IPv6 Configuration Library on Cisco.com. In the "Information About Implementing Basic Connectivity for IPv6" chapter, these sections apply to the switch: · IPv6 Address Formats · IPv6 Address Type: Unicast · IPv6 Address Type: Multicast · IPv6 Address Output Display · Simplified IPv6 Packet Header Supported IPv6 Unicast Routing Features The switch supports hop-by-hop extension header packets, which are routed in software. The switch provides IPv6 routing capability over Routing Information Protocol (RIP) for IPv6, and Open Shortest Path First (OSPF) Version 3 Protocol. It supports up to 16 equal-cost routes and can simultaneously forward IPv4 and IPv6 frames at line rate. 128-Bit Wide Unicast Addresses The switch supports aggregatable global unicast addresses and link-local unicast addresses. It does not support site-local unicast addresses. · Aggregatable global unicast addresses are IPv6 addresses from the aggregatable global unicast prefix. The address structure enables strict aggregation of routing prefixes and limits the number of routing table Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 354 IPv6 DNS for IPv6 entries in the global routing table. These addresses are used on links that are aggregated through organizations and eventually to the Internet service provider. These addresses are defined by a global routing prefix, a subnet ID, and an interface ID. Current global unicast address allocation uses the range of addresses that start with binary value 001 (2000::/3). Addresses with a prefix of 2000::/3(001) through E000::/3(111) must have 64-bit interface identifiers in the extended unique identifier (EUI)-64 format. · Link local unicast addresses can be automatically configured on any interface by using the link-local prefix FE80::/10(1111 1110 10) and the interface identifier in the modified EUI format. Link-local addresses are used in the neighbor discovery protocol (NDP) and the stateless autoconfiguration process. Nodes on a local link use link-local addresses and do not require globally unique addresses to communicate. IPv6 routers do not forward packets with link-local source or destination addresses to other links. For more information, see the section about IPv6 unicast addresses in the "Implementing IPv6 Addressing and Basic Connectivity" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. DNS for IPv6 IPv6 supports Domain Name System (DNS) record types in the DNS name-to-address and address-to-name lookup processes. The DNS AAAA resource record types support IPv6 addresses and are equivalent to an A address record in IPv4. The switch supports DNS resolution for IPv4 and IPv6. Path MTU Discovery for IPv6 Unicast The switch supports advertising the system maximum transmission unit (MTU) to IPv6 nodes and path MTU discovery. Path MTU discovery allows a host to dynamically discover and adjust to differences in the MTU size of every link along a given data path. In IPv6, if a link along the path is not large enough to accommodate the packet size, the source of the packet handles the fragmentation. ICMPv6 The Internet Control Message Protocol (ICMP) in IPv6 generates error messages, such as ICMP destination unreachable messages, to report errors during processing and other diagnostic functions. In IPv6, ICMP packets are also used in the neighbor discovery protocol and path MTU discovery. Neighbor Discovery The switch supports NDP for IPv6, a protocol running on top of ICMPv6, and static neighbor entries for IPv6 stations that do not support NDP. The IPv6 neighbor discovery process uses ICMP messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local link), to verify the reachability of the neighbor, and to keep track of neighboring routers. The switch supports ICMPv6 redirect for routes with mask lengths less than 64 bits. ICMP redirect is not supported for host routes or for summarized routes with mask lengths greater than 64 bits. Neighbor discovery throttling ensures that the switch CPU is not unnecessarily burdened while it is in the process of obtaining the next hop forwarding information to route an IPv6 packet. The switch drops any additional IPv6 packets whose next hop is the same neighbor that the switch is actively trying to resolve. This drop avoids further load on the CPU. Default Router Preference The switch supports IPv6 default router preference (DRP), an extension in router advertisement messages. DRP improves the ability of a host to select an appropriate router, especially when the host is multihomed and the routers are on different links. The switch does not support the Route Information Option in RFC 4191. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 355 IPv6 IPv6 Stateless Autoconfiguration and Duplicate Address Detection An IPv6 host maintains a default router list from which it selects a router for traffic to offlink destinations. The selected router for a destination is then cached in the destination cache. NDP for IPv6 specifies that routers that are reachable or probably reachable are preferred over routers whose reachability is unknown or suspect. For reachable or probably reachable routers, NDP can either select the same router every time or cycle through the router list. By using DRP, you can configure an IPv6 host to prefer one router over another, provided both are reachable or probably reachable. For more information about DRP for IPv6, see the Cisco IOS IPv6 Configuration Library on Cisco.com. IPv6 Stateless Autoconfiguration and Duplicate Address Detection The switch uses stateless autoconfiguration to manage link, subnet, and site addressing changes, such as management of host and mobile IP addresses. A host autonomously configures its own link-local address, and booting nodes send router solicitations to request router advertisements for configuring interfaces. For more information about autoconfiguration and duplicate address detection, see the "Implementing IPv6 Addressing and Basic Connectivity" chapter of Cisco IOS IPv6 Configuration Library on Cisco.com. IPv6 Applications The switch has IPv6 support for these applications: · Ping, traceroute, Telnet, and TFTP · Secure Shell (SSH) over an IPv6 transport · HTTP server access over IPv6 transport · DNS resolver for AAAA over IPv4 transport · Cisco Discovery Protocol (CDP) support for IPv6 addresses For more information about managing these applications, see the Cisco IOS IPv6 Configuration Library on Cisco.com. DHCP for IPv6 Address Assignment DHCPv6 enables DHCP servers to pass configuration parameters, such as IPv6 network addresses, to IPv6 clients. The address assignment feature manages non-duplicate address assignment in the correct prefix based on the network where the host is connected. Assigned addresses can be from one or multiple prefix pools. Additional options, such as default domain and DNS name-server address, can be passed back to the client. Address pools can be assigned for use on a specific interface, on multiple interfaces, or the server can automatically find the appropriate pool. For more information and to configure these features, see the Cisco IOS IPv6 Configuration Guide. This document describes only the DHCPv6 address assignment. For more information about configuring the DHCPv6 client, server, or relay agent functions, see the "Implementing DHCP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Static Routes for IPv6 Static routes are manually configured and define an explicit route between two networking devices. Static routes are useful for smaller networks with only one path to an outside network or to provide security for certain types of traffic in a larger network. For more information about static routes, see the "Implementing Static Routes for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 356 IPv6 RIP for IPv6 RIP for IPv6 OSPF for IPv6 HSRP for IPv6 EIGRP IPv6 Routing Information Protocol (RIP) for IPv6 is a distance-vector protocol that uses hop count as a routing metric. It includes support for IPv6 addresses and prefixes and the all-RIP-routers multicast group address FF02::9 as the destination address for RIP update messages. For more information about RIP for IPv6, see the "Implementing RIP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. The switch running the IP Base feature set supports Open Shortest Path First (OSPF) for IPv6, a link-state protocol for IP. For more information, seeCisco IOS IPv6 Configuration Library on Cisco.com. Switches running the IPServices and IPBase feature set support the Hot Standby Router Protocol (HSRP) for IPv6. HSRP provides routing redundancy for routing IPv6 traffic not dependent on the availability of any single router. IPv6 hosts learn of available routers through IPv6 neighbor discovery router advertisement messages. These messages are multicast periodically or are solicited by hosts. An HSRP IPv6 group has a virtual MAC address that is derived from the HSRP group number and a virtual IPv6 link-local address that is, by default, derived from the HSRP virtual MAC address. Periodic messages are sent for the HSRP virtual IPv6 link-local address when the HSRP group is active. These messages stop after a final one is sent when the group leaves the active state. For more information about configuring HSRP for IPv6, see the "HSRP for IPv6" section. For more information about configuring HSRP for IPv4, see the "Configuring HSRP" section. Switches running the IP services feature set support the Enhanced Interior Gateway Routing Protocol (EIGRP) for IPv6. It is configured on the interfaces on which it runs and does not require a global IPv6 address. Note Switches running the IP base feature set do not support any IPv6 EIGRP features, including IPv6 EIGRP stub routing. Before running, an instance of EIGRP IPv6 requires an implicit or explicit router ID. An implicit router ID is derived from a local IPv4 address, so any IPv4 node always has an available router ID. However, EIGRP IPv6 might be running in a network with only IPv6 nodes and therefore might not have an available IPv4 router ID. For more information about EIGRP for IPv6, see the "Implementing EIGRP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. SNMP and Syslog Over IPv6 To support both IPv4 and IPv6, IPv6 network management requires both IPv6 and IPv4 transports. Syslog over IPv6 supports address data types for these transports. SNMP and syslog over IPv6 provide these features: · Support for both IPv4 and IPv6 · IPv6 transport for SNMP and to modify the SNMP agent to support traps for an IPv6 host Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 357 IPv6 HTTP(S) Over IPv6 · SNMP- and syslog-related MIBs to support IPv6 addressing · Configuration of IPv6 hosts as trap receivers For support over IPv6, SNMP modifies the existing IP transport mapping to simultaneously support IPv4 and IPv6. These SNMP actions support IPv6 transport management: · Opens User Datagram Protocol (UDP) SNMP socket with default settings · Provides a new transport mechanism called SR_IPV6_TRANSPORT · Sends SNMP notifications over IPv6 transport · Supports SNMP-named access lists for IPv6 transport · Supports SNMP proxy forwarding using IPv6 transport · Verifies SNMP Manager feature works with IPv6 transport For information on SNMP over IPv6, including configuration procedures, see the "Managing Cisco IOS Applications over IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. For information about syslog over IPv6, including configuration procedures, see the "Implementing IPv6 Addressing and Basic Connectivity" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. HTTP(S) Over IPv6 The HTTP client sends requests to both IPv4 and IPv6 HTTP servers, which respond to requests from both IPv4 and IPv6 HTTP clients. URLs with literal IPv6 addresses must be specified in hexadecimal using 16-bit values between colons. The accept socket call chooses an IPv4 or IPv6 address family. The accept socket is either an IPv4 or IPv6 socket. The listening socket continues to listen for both IPv4 and IPv6 signals that indicate a connection. The IPv6 listening socket is bound to an IPv6 wildcard address. The underlying TCP/IP stack supports a dual-stack environment. HTTP relies on the TCP/IP stack and the sockets for processing network-layer interactions. Basic network connectivity (ping) must exist between the client and the server hosts before HTTP connections can be made. For more information, see the "Managing Cisco IOS Applications over IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Unsupported IPv6 Unicast Routing Features The switch does not support these IPv6 features: · IPv6 policy-based routing · IPv6 virtual private network (VPN) routing and forwarding (VRF) table support · Support for IPv6 routing protocols: multiprotocol Border Gateway Protocol (BGP) and Intermediate System-to-Intermediate System (IS-IS) routing · IPv6 packets destined to site-local addresses · Tunneling protocols, such as IPv4-to-IPv6 or IPv6-to-IPv4 · The switch as a tunnel endpoint supporting IPv4-to-IPv6 or IPv6-to-IPv4 tunneling protocols Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 358 IPv6 IPv6 Feature Limitations · IPv6 unicast reverse-path forwarding · IPv6 Web Cache Communication Protocol (WCCP) IPv6 Feature Limitations Because IPv6 is implemented in switch hardware, some limitations occur due to the IPv6 compressed addresses in the hardware memory. These hardware limitations result in some loss of functionality and limits some features. These are feature limitations. · The switch cannot forward SNAP-encapsulated IPv6 packets in hardware. They are forwarded in software. · The switch cannot apply QoS classification on source-routed IPv6 packets in hardware. IPv6 and Switch Stacks The switch supports IPv6 forwarding across the stack and IPv6 host functionality on the stack master. The stack master runs the IPv6 unicast routing protocols and computes the routing tables. They receive the tables and create hardware IPv6 routes for forwarding. The stack master also runs all IPv6 applications. Note To route IPv6 packets in a stack, all switches in the stack should be running the IP Base feature set. If a new switch becomes the stack master, it recomputes the IPv6 routing tables and distributes them to the member switches. While the new stack master is being elected and is resetting, the switch stack does not forward IPv6 packets. The stack MAC address changes, which also changes the IPv6 address. When you specify the stack IPv6 address with an extended unique identifier (EUI) by using the ipv6 address ipv6-prefix/prefix length eui-64 interface configuration command, the address is based on the interface MAC address. See the Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI), on page 360. If you configure the persistent MAC address feature on the stack and the stack master changes, the stack MAC address does not change for approximately 4 minutes. These are the functions of IPv6 stack master and members: · Stack master: · runs IPv6 routing protocols · generates routing tables · distributes routing tables to stack members that use dCEFv6 · runs IPv6 host functionality and IPv6 applications · Stack member (must be running the IP services feature set): · receives CEFv6 routing tables from the stack master · programs the routes into hardware Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 359 IPv6 Default IPv6 Configuration Note IPv6 packets are routed in hardware across the stack if the packet does not have exceptions (IPv6Options) and the switches in the stack have not run out of hardware resources. · flushes the CEFv6 tables on master re-election Default IPv6 Configuration Table 44: Default IPv6 Configuration Feature SDM template IPv6 routing CEFv6 or dCEFv6 Default Setting Advance desktop. Default is advanced template Disabled globally and on all interfaces Note When IPv6 routing is enabled, CEFv6 and dCEF6 are automatically enabled. IPv6 addresses None configured Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI) This section describes how to assign IPv6 addresses to individual Layer 3 interfaces and to globally forward IPv6 traffic on the switch. Before configuring IPv6 on the switch, consider these guidelines: · Not all features discussed in this chapter are supported by the switch. See the Unsupported IPv6 Unicast Routing Features, on page 358. · · In the ipv6 address interface configuration command, you must enter the ipv6-address and ipv6-prefix variables with the address specified in hexadecimal using 16-bit values between colons. The prefix-length variable (preceded by a slash [/]) is a decimal value that shows how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). To forward IPv6 traffic on an interface, you must configure a global IPv6 address on that interface. Configuring an IPv6 address on an interface automatically configures a link-local address and activates IPv6 for the interface. The configured interface automatically joins these required multicast groups for that link: · solicited-node multicast group FF02:0:0:0:0:1:ff00::/104 for each unicast address assigned to the interface (this address is used in the neighbor discovery process.) · all-nodes link-local multicast group FF02::1 · all-routers link-local multicast group FF02::2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 360 IPv6 Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI) Step 1 Step 2 Step 3 Step 4 Step 5 To remove an IPv6 address from an interface, use the no ipv6 address ipv6-prefix/prefix length eui-64 or no ipv6 address ipv6-address link-local interface configuration command. To remove all manually configured IPv6 addresses from an interface, use the no ipv6 address interface configuration command without arguments. To disable IPv6 processing on an interface that has not been explicitly configured with an IPv6 address, use the no ipv6 enable interface configuration command. To globally disable IPv6 routing, use the no ipv6 unicast-routing global configuration command. For more information about configuring IPv6 routing, see the "Implementing Addressing and Basic Connectivity for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Beginning in privileged EXEC mode, follow these steps to assign an IPv6 address to a Layer 3 interface and enable IPv6 routing: Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal sdm prefer dual-ipv4-and-ipv6 {advanced | vlan} Example: Switch(config)# sdm prefer dual-ipv4-and-ipv6 default Selects an SDM template that supports IPv4 and IPv6. · advanced--Sets the switch to the default template to balance system resources. · vlan--Maximizes VLAN configuration on the switch with no routing supported in hardware. end Example: Note Advanced is available at all license levels. VLAN template is available only in lanbase. Returns to privileged EXEC mode. Switch(config)# end reload Example: Switch# reload Reloads the operating system. configure terminal Example: Switch# configure terminal Enters global configuration mode after the switch reloads. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 361 IPv6 Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI) Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Enters interface configuration mode, and specifies the Layer 3 interface to configure. The interface can be a physical interface, a switch virtual interface (SVI), or a Layer 3 EtherChannel. no switchport Example: Switch(config-if)# no switchport Removes the interface from Layer 2 configuration mode (if it is a physical interface). Use one of the following: · ipv6 address ipv6-prefix/prefix length eui-64 · ipv6 address ipv6-address/prefix length · ipv6 address ipv6-address link-local · ipv6 enable · ipv6 addressWORD · ipv6 addressautoconfig · ipv6 addressdhcp Example: Switch(config-if)# ipv6 address 2001:0DB8:c18:1::/64 eui 64 Switch(config-if)# ipv6 address 2001:0DB8:c18:1::/64 Switch(config-if)# ipv6 address 2001:0DB8:c18:1:: link-local · Specifies a global IPv6 address with an extended unique identifier (EUI) in the low-order 64 bits of the IPv6 address. Specify only the network prefix; the last 64 bits are automatically computed from the switch MAC address. This enables IPv6 processing on the interface. · Manually configures an IPv6 address on the interface. · Specifies a link-local address on the interface to be used instead of the link-local address that is automatically configured when IPv6 is enabled on the interface. This command enables IPv6 processing on the interface. · Automatically configures an IPv6 link-local address on the interface, and enables the interface for IPv6 processing. The link-local address can only be used to communicate with nodes on the same link. Switch(config-if)# ipv6 enable exit Example: Switch(config-if)# exit Returns to global configuration mode. ip routing Example: Switch(config)# ip routing Enables IP routing on the switch. ipv6 unicast-routing Example: Enables forwarding of IPv6 unicast data packets. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 362 IPv6 Configuring IPv4 and IPv6 Protocol Stacks (CLI) Step 12 Step 13 Command or Action Switch(config)# ipv6 unicast-routing Purpose end Example: Switch(config)# end Returns to privileged EXEC mode. show ipv6 interface interface-id Example: Verifies your entries. Switch# show ipv6 interface gigabitethernet 1/0/1 Step 14 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring IPv4 and IPv6 Protocol Stacks (CLI) Beginning in privileged EXEC mode, follow these steps to configure a Layer 3 interface to support both IPv4 and IPv6 and to enable IPv6 routing. Note To disable IPv6 processing on an interface that has not been configured with an IPv6 address, use the no ipv6 enable interface configuration command. SUMMARY STEPS 1. configure terminal 2. ip routing 3. ipv6 unicast-routing 4. interface interface-id 5. no switchport 6. ip address ip-address mask [secondary] 7. Use one of the following: · ipv6 address ipv6-prefix/prefix length eui-64 · ipv6 address ipv6-address/prefix length · ipv6 address ipv6-address link-local · ipv6 enable · ipv6 addressWORD · ipv6 addressautoconfig Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 363 IPv6 Configuring IPv4 and IPv6 Protocol Stacks (CLI) · ipv6 addressdhcp 8. end 9. Use one of the following: · show interface interface-id · show ip interface interface-id · show ipv6 interface interface-id 10. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ip routing Example: Switch(config)# ip routing Enables routing on the switch. Step 3 ipv6 unicast-routing Example: Switch(config)# ipv6 unicast-routing Enables forwarding of IPv6 data packets on the switch. Step 4 interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Switch(config)# interface gigabitethernet 1/0/1 Step 5 no switchport Example: Switch(config-if)# no switchport Removes the interface from Layer 2 configuration mode (if it is a physical interface). Step 6 ip address ip-address mask [secondary] Example: Specifies a primary or secondary IPv4 address for the interface. Switch(config-if)# ip address 10.1.2.3 255.255.255 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 364 IPv6 Configuring Default Router Preference (CLI) Step 7 Command or Action Use one of the following: · ipv6 address ipv6-prefix/prefix length eui-64 · ipv6 address ipv6-address/prefix length · ipv6 address ipv6-address link-local · ipv6 enable · ipv6 addressWORD · ipv6 addressautoconfig · ipv6 addressdhcp Step 8 Step 9 Step 10 end Example: Switch(config)# end Use one of the following: · show interface interface-id · show ip interface interface-id · show ipv6 interface interface-id copy running-config startup-config Example: Switch# copy running-config startup-config Purpose · Specifies a global IPv6 address. Specify only the network prefix; the last 64 bits are automatically computed from the switch MAC address. · Specifies a link-local address on the interface to be used instead of the automatically configured link-local address when IPv6 is enabled on the interface. · Automatically configures an IPv6 link-local address on the interface, and enables the interface for IPv6 processing. The link-local address can only be used to communicate with nodes on the same link. Note To remove all manually configured IPv6 addresses from an interface, use the no ipv6 address interface configuration command without arguments. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Configuring Default Router Preference (CLI) Router advertisement messages are sent with the default router preference (DRP) configured by the ipv6 nd router-preference interface configuration command. If no DRP is configured, RAs are sent with a medium preference. A DRP is useful when two routers on a link might provide equivalent, but not equal-cost routing, and policy might dictate that hosts should prefer one of the routers. For more information about configuring DRP for IPv6, see the "Implementing IPv6 Addresses and Basic Connectivity" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Beginning in privileged EXEC mode, follow these steps to configure a DRP for a router on an interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 365 IPv6 Configuring IPv6 ICMP Rate Limiting (CLI) Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 interface interface-id Example: Enters interface configuration mode and identifies the Layer 3 interface on which you want to specify the DRP. Switch(config)# interface gigabitethernet 1/0/1 Step 3 ipv6 nd router-preference {high | medium | low} Example: Specifies a DRP for the router on the switch interface. Switch(config-if)# ipv6 nd router-preference medium Step 4 end Example: Switch(config)# end Step 5 show ipv6 interface Example: Switch# show ipv6 interface Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Returns to privileged EXEC mode. Verifies the configuration. (Optional) Saves your entries in the configuration file. Configuring IPv6 ICMP Rate Limiting (CLI) ICMP rate limiting is enabled by default with a default interval between error messages of 100 milliseconds and a bucket size (maximum number of tokens to be stored in a bucket) of 10. Beginning in privileged EXEC mode, follow these steps to change the ICMP rate-limiting parameters: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 366 IPv6 Configuring CEF and dCEF for IPv6 Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 ipv6 icmp error-interval interval [bucketsize] Example: Switch(config)# ipv6 icmp error-interval 50 20 Configures the interval and bucket size for IPv6 ICMP error messages: · interval--The interval (in milliseconds) between tokens being added to the bucket. The range is from 0 to 2147483647 milliseconds. · bucketsize--(Optional) The maximum number of tokens stored in the bucket. The range is from 1 to 200. end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 show ipv6 interface [interface-id] Example: Verifies your entries. Switch# show ipv6 interface gigabitethernet 1/0/1 Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring CEF and dCEF for IPv6 Cisco Express Forwarding (CEF) is a Layer 3 IP switching technology to improve network performance. CEF implements an advanced IP look-up and forwarding algorithm to deliver maximum Layer 3 switching performance. It is less CPU-intensive than fast-switching route-caching, allowing more CPU processing power to be dedicated to packet forwarding. In a switch stack, the hardware uses distributed CEF (dCEF) in the stack. IPv4 CEF and dCEF are enabled by default. IPv6 CEF and dCEF are disabled by default, but automatically enabled when you configure IPv6 routing. IPv6 CEF and dCEF are automatically disabled when IPv6 routing is unconfigured. IPv6 CEF and dCEF cannot disabled through configuration. You can verify the IPv6 state by entering the show ipv6 cef privileged EXEC command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 367 IPv6 Configuring Static Routing for IPv6 (CLI) To route IPv6 unicast packets, you must first globally configure forwarding of IPv6 unicast packets by using the ipv6 unicast-routing global configuration command, and you must configure an IPv6 address and IPv6 processing on an interface by using the ipv6 address interface configuration command. For more information about configuring CEF and dCEF, see Cisco IOS IPv6 Configuration Library on Cisco.com. Configuring Static Routing for IPv6 (CLI) Before configuring a static IPv6 route, you must enable routing by using the ip routing global configuration command, enable the forwarding of IPv6 packets by using the ipv6 unicast-routing global configuration command, and enable IPv6 on at least one Layer 3 interface by configuring an IPv6 address on the interface. For more information about configuring static IPv6 routing, see the "Implementing Static Routes for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 ipv6 route ipv6-prefix/prefix length {ipv6-address | interface-id [ipv6-address]} [administrative distance] Example: Switch(config)# ipv6 route 2001:0DB8::/32 gigabitethernet2/0/1 130 Configures a static IPv6 route. · ipv6-prefix--The IPv6 network that is the destination of the static route. It can also be a hostname when static host routes are configured. · /prefix length--The length of the IPv6 prefix. A decimal value that shows how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). A slash mark must precede the decimal value. · ipv6-address--The IPv6 address of the next hop that can be used to reach the specified network. The IPv6 address of the next hop need not be directly connected; recursion is done to find the IPv6 address of the directly connected next hop. The address must be in the form documented in RFC 2373, specified in hexadecimal using 16-bit values between colons. · interface-id--Specifies direct static routes from point-to-point and broadcast interfaces. With point-to-point interfaces, there is no need to specify the IPv6 address of the next hop. With broadcast interfaces, you should always specify the IPv6 address of the next hop, or ensure that the specified prefix is assigned to the link, specifying a link-local address as Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 368 IPv6 Configuring Static Routing for IPv6 (CLI) Command or Action Step 3 end Example: Switch(config)# end Purpose the next hop. You can optionally specify the IPv6 address of the next hop to which packets are sent. Note You must specify an interface-id when using a link-local address as the next hop (the link-local next hop must also be an adjacent router). · administrative distance--(Optional) An administrative distance. The range is 1 to 254; the default value is 1, which gives static routes precedence over any other type of route except connected routes. To configure a floating static route, use an administrative distance greater than that of the dynamic routing protocol. Returns to privileged EXEC mode. Step 4 Use one of the following: Verifies your entries by displaying the contents of the IPv6 · show ipv6 static [ ipv6-address | ipv6-prefix/prefix routing table. length ] [interface interface-id ] [detail]][recursive] · interface interface-id--(Optional) Displays only those [detail] static routes with the specified interface as an egress · show ipv6 route static [updated] interface. Example: Switch# show ipv6 static 2001:0DB8::/32 interface gigabitethernet2/0/1 or · recursive--(Optional) Displays only recursive static routes. The recursive keyword is mutually exclusive with the interface keyword, but it can be used with or without the IPv6 prefix included in the command syntax. Switch# show ipv6 route static · detail--(Optional) Displays this additional information: · For valid recursive routes, the output path set, and maximum resolution depth. · For invalid routes, the reason why the route is not valid. Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 369 IPv6 Configuring RIP for IPv6 (CLI) Configuring RIP for IPv6 (CLI) Before configuring the switch to run IPv6 RIP, you must enable routing by using the ip routing global configuration command, enable the forwarding of IPv6 packets by using the ipv6 unicast-routing global configuration command, and enable IPv6 on any Layer 3 interfaces on which IPv6 RIP is to be enabled. For more information about configuring RIP routing for IPv6, see the "Implementing RIP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com, Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 ipv6 router rip name Example: Switch(config)# ipv6 router rip cisco Configures an IPv6 RIP routing process, and enters router configuration mode for the process. Step 3 maximum-paths number-paths Example: Switch(config-router)# maximum-paths 6 (Optional) Define the maximum number of equal-cost routes that IPv6 RIP can support. The range is from 1 to 32, and the default is 16 routes. Step 4 exit Example: Switch(config-router)# exit Returns to global configuration mode. Step 5 interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Switch(config)# interface gigabitethernet 1/0/1 Step 6 ipv6 rip name enable Example: Switch(config-if)# ipv6 rip cisco enable Enables the specified IPv6 RIP routing process on the interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 370 IPv6 Configuring OSPF for IPv6 (CLI) Step 7 Step 8 Step 9 Step 10 Command or Action ipv6 rip name default-information {only | originate} Example: Switch(config-if)# ipv6 rip cisco default-information only Purpose (Optional) Originates the IPv6 default route (::/0) into the RIP routing process updates sent from the specified interface. Note To avoid routing loops after the IPv6 default route (::/0) is originated from any interface, the routing process ignores all default routes received on any interface. · only--Select to originate the default route, but suppress all other routes in the updates sent on this interface. · originate--Select to originate the default route in addition to all other routes in the updates sent on this interface. end Example: Returns to privileged EXEC mode. Switch(config)# end Use one of the following: · show ipv6 rip [name] [ interfaceinterface-id] [ database ] [ next-hops ] · show ipv6 rip Example: Switch# show ipv6 rip cisco interface gigabitethernet2/0/1 or Switch# show ipv6 rip · Displays information about current IPv6 RIP processes. · Displays the current contents of the IPv6 routing table. copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring OSPF for IPv6 (CLI) You can customize OSPF for IPv6 for your network. However, the defaults for OSPF in IPv6 are set to meet the requirements of most customers and features. Follow these guidelines: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 371 IPv6 Configuring OSPF for IPv6 (CLI) Step 1 Step 2 Step 3 · Be careful when changing the defaults for IPv6 commands. Changing the defaults might adversely affect OSPF for the IPv6 network. · Before you enable IPv6 OSPF on an interface, you must enable routing by using the ip routing global configuration command, enable the forwarding of IPv6 packets by using the ipv6 unicast-routing global configuration command, and enable IPv6 on Layer 3 interfaces on which you are enabling IPv6 OSPF. For more information about configuring OSPF routing for IPv6, see the "Implementing OSPF for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal ipv6 router ospf process-id Example: Switch(config)# ipv6 router ospf 21 Enables OSPF router configuration mode for the process. The process ID is the number assigned administratively when enabling the OSPF for IPv6 routing process. It is locally assigned and can be a positive integer from 1 to 65535. area area-id range {ipv6-prefix/prefix length} [advertise (Optional) Consolidates and summarizes routes at an area | not-advertise] [cost cost] boundary. Example: Switch(config)# area .3 range 2001:0DB8::/32 not-advertise · area-id--Identifier of the area about which routes are to be summarized. It can be specified as either a decimal value or as an IPv6 prefix. · ipv6-prefix/prefix length--The destination IPv6 network and a decimal value that shows how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). A slash mark (/) must precede the decimal value. · advertise--(Optional) Sets the address range status to advertise and generate a Type 3 summary link-state advertisement (LSA). · not-advertise--(Optional) Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is suppressed, and component networks remain hidden from other networks. · cost cost--(Optional) Sets the metric or cost for this summary route, which is used during OSPF SPF calculation to determine the shortest paths to the destination. The value can be 0 to 16777215. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 372 IPv6 Configuring OSPF for IPv6 (CLI) Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action maximum paths number-paths Example: Switch(config)# maximum paths 16 Purpose (Optional) Defines the maximum number of equal-cost routes to the same destination that IPv6 OSPF should enter in the routing table. The range is from 1 to 32, and the default is 16 paths. exit Example: Switch(config-if)# exit Returns to global configuration mode. interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Switch(config)# interface gigabitethernet 1/0/1 ipv6 ospf process-id area area-id [instance instance-id] Enables OSPF for IPv6 on the interface. Example: · instance instance-id--(Optional) Instance identifier. Switch(config-if)# ipv6 ospf 21 area .3 end Example: Switch(config)# end Returns to privileged EXEC mode. Use one of the following: · show ipv6 ospf [ process-id ] [ area-id ] interface [ interface-id ] · show ipv6 ospf [ process-id ] [ area-id ] Example: Switch# show ipv6 ospf 21 interface gigabitethernet2/0/1 or Switch# show ipv6 ospf 21 · Displays information about OSPF interfaces. · Displays general information about OSPF routing processes. copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 373 IPv6 Configuring EIGRP for IPv6 Configuring EIGRP for IPv6 Before configuring the switch to run IPv6 EIGRP, enable routing by entering the ip routing global configuration command, enable the forwarding of IPv6 packets by entering the ipv6 unicast-routing global configuration command, and enable IPv6 on any Layer 3 interfaces on which you want to enable IPv6 EIGRP. To set an explicit router ID, use the show ipv6 eigrp command to see the configured router IDs, and then use the router-id command. As with EIGRP IPv4, you can use EIGRPv6 to specify your EIGRP IPv6 interfaces and to select a subset of those as passive interfaces. Use the passive-interface command to make an interface passive, and then use the no passive-interface command on selected interfaces to make them active. EIGRP IPv6 does not need to be configured on a passive interface. For more configuration procedures, see the "Implementing EIGRP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Displaying IPv6 For complete syntax and usage information on these commands, see the Cisco IOS command reference publications. Table 45: Commands for Monitoring IPv6 Command Purpose show ipv6 access-list Displays a summary of access lists. show ipv6 cef Displays Cisco Express Forwarding for IPv6. show ipv6 interface interface-id Displays IPv6 interface status and configuration. show ipv6 mtu Displays IPv6 MTU per destination cache. show ipv6 neighbors Displays IPv6 neighbor cache entries. show ipv6 ospf Displays IPv6 OSPF information. show ipv6 prefix-list Displays a list of IPv6 prefix lists. show ipv6 protocols Displays IPv6 routing protocols on the switch. show ipv6 rip Displays IPv6 RIP routing protocol status. show ipv6 route Displays the IPv6 route table entries. show ipv6 routers Displays the local IPv6 routers. show ipv6 static Displays IPv6 static routes. show ipv6 traffic Displays IPv6 traffic statistics. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 374 IPv6 Configuring DHCP for IPv6 Address Assignment Table 46: Commands for Displaying EIGRP IPv6 Information Command Purpose show ipv6 eigrp [as-number] interface Displays information about interfaces configured for EIGRP IPv6. show ipv6 eigrp [as-number] neighbor Displays the neighbors discovered by EIGRP IPv6. show ipv6 eigrp [as-number] traffic Displays the number of EIGRP IPv6 packets sent and received. show ipv6 eigrp topology [as-number | ipv6-address] Displays EIGRP entries in the IPv6 topology table. [active | all-links | detail-links | pending | summary | zero-successors| Base] Configuring DHCP for IPv6 Address Assignment This section describes only the DHCPv6 address assignment. For more information about configuring the DHCPv6 client, server, or relay agent functions, see the "Implementing DHCP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com. Default DHCPv6 Address Assignment Configuration By default, no DHCPv6 features are configured on the switch. DHCPv6 Address Assignment Configuration Guidelines When configuring DHCPv6 address assignment, consider these guidelines: · In the procedures, the specified interface must be one of these Layer 3 interfaces: · DHCPv6 IPv6 routing must be enabled on a Layer 3 interface. · SVI: a VLAN interface created by using the interface vlan vlan_id command. · EtherChannel port channel in Layer 3 mode: a port-channel logical interface created by using the interface port-channel port-channel-number command. · The switch can act as a DHCPv6 client, server, or relay agent. The DHCPv6 client, server, and relay function are mutually exclusive on an interface. · The DHCPv6 client, server, or relay agent runs only on the master switch. When there is a stack master re-election, the new master switch retains the DHCPv6 configuration. However, the local RAM copy of the DHCP server database lease information is not retained. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 375 IPv6 Enabling DHCPv6 Server Function (CLI) Enabling DHCPv6 Server Function (CLI) Use the no form of the DHCP pool configuration mode commands to change the DHCPv6 pool characteristics. To disable the DHCPv6 server function on an interface, use the no ipv6 dhcp server interface configuration command. Beginning in privileged EXEC mode, follow these steps to enable the DHCPv6 server function on an interface. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 ipv6 dhcp pool poolname Example: Switch(config)# ipv6 dhcp pool 7 Enters DHCP pool configuration mode, and define the name for the IPv6 DHCP pool. The pool name can be a symbolic string (such as Engineering) or an integer (such as 0). Step 3 Step 4 Step 5 address prefix IPv6-prefix {lifetime} {t1 t1 | infinite} Example: Switch(config-dhcpv6)# address prefix 2001:1000::0/64 lifetime 3600 (Optional) Specifies an address prefix for address assignment. This address must be in hexadecimal, using 16-bit values between colons. lifetime t1 t1--Specifies a time interval (in seconds) that an IPv6 address prefix remains in the valid state. The range is 5 to 4294967295 seconds. Specify infinite for no time interval. link-address IPv6-prefix Example: Switch(config-dhcpv6)# link-address 2001:1002::0/64 (Optional) Specifies a link-address IPv6 prefix. When an address on the incoming interface or a link-address in the packet matches the specified IPv6 prefix, the server uses the configuration information pool. This address must be in hexadecimal, using 16-bit values between colons. vendor-specific vendor-id Example: Switch(config-dhcpv6)# vendor-specific 9 (Optional) Enters vendor-specific configuration mode and specifies a vendor-specific identification number. This number is the vendor IANA Private Enterprise Number. The range is 1 to 4294967295. Step 6 suboption number {address IPv6-address | ascii ASCII-string | hex hex-string} Example: (Optional) Enters a vendor-specific suboption number. The range is 1 to 65535. Enter an IPv6 address, ASCII text, or a hex string as defined by the suboption parameters. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 376 IPv6 Enabling DHCPv6 Server Function (CLI) Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action Purpose Switch(config-dhcpv6-vs)# suboption 1 address 1000:235D:: exit Example: Switch(config-dhcpv6-vs)# exit Returns to DHCP pool configuration mode. exit Example: Switch(config-dhcpv6)# exit Returns to global configuration mode. interface interface-id Example: Enters interface configuration mode, and specifies the interface to configure. Switch(config)# interface gigabitethernet 1/0/1 ipv6 dhcp server [poolname | automatic] [rapid-commit] Enables DHCPv6 server function on an interface. [preference value] [allow-hint] · poolname--(Optional) User-defined name for the Example: IPv6 DHCP pool. The pool name can be a symbolic string (such as Engineering) or an integer (such as 0). Switch(config-if)# ipv6 dhcp server automatic · automatic--(Optional) Enables the system to automatically determine which pool to use when allocating addresses for a client. · rapid-commit--(Optional) Allows two-message exchange method. · preference value--(Optional) Configures the preference value carried in the preference option in the advertise message sent by the server. The range is from 0 to 255. The preference value default is 0. · allow-hint--(Optional) Specifies whether the server should consider client suggestions in the SOLICIT message. By default, the server ignores client hints. end Example: Returns to privileged EXEC mode. Switch(config)# end Do one of the following: · Verifies DHCPv6 pool configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 377 IPv6 Enabling DHCPv6 Client Function (CLI) Step 13 Command or Action · show ipv6 dhcp pool · show ipv6 dhcp interface Example: Switch# show ipv6 dhcp pool or Switch# show ipv6 dhcp interface copy running-config startup-config Example: Switch# copy running-config startup-config Purpose · Verifies that the DHCPv6 server function is enabled on an interface. (Optional) Saves your entries in the configuration file. Enabling DHCPv6 Client Function (CLI) This task explains how to enable the DHCPv6 client on an interface. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Enters interface configuration mode, and specifies the interface to configure. Switch(config)# interface gigabitethernet 1/0/1 Step 3 ipv6 address dhcp [rapid-commit] Enables the interface to acquire an IPv6 address from the Example: DHCPv6 server. rapid-commit--(Optional) Allow two-message exchange Switch(config-if)# ipv6 address dhcp rapid-commit method for address assignment. Step 4 ipv6 dhcp client request [vendor-specific] Example: Switch(config-if)# ipv6 dhcp client request vendor-specific (Optional) Enables the interface to request the vendor-specific option. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 378 IPv6 Configuration Examples for IPv6 Unicast Routing Step 5 Command or Action end Example: Switch(config)# end Step 6 show ipv6 dhcp interface Example: Switch# show ipv6 dhcp interface Purpose Returns to privileged EXEC mode. Verifies that the DHCPv6 client is enabled on an interface. Configuration Examples for IPv6 Unicast Routing Configuring IPv6 Addressing and Enabling IPv6 Routing: Example This example shows how to enable IPv6 with both a link-local address and a global address based on the IPv6 prefix 2001:0DB8:c18:1::/64. The EUI-64 interface ID is used in the low-order 64 bits of both addresses. Output from the show ipv6 interface EXEC command is included to show how the interface ID (20B:46FF:FE2F:D940) is appended to the link-local prefix FE80::/64 of the interface. Switch(config)# ipv6 unicast-routing Switch(config)# interface gigabitethernet1/0/11 Switch(config-if)# no switchport Switch(config-if)# ipv6 address 2001:0DB8:c18:1::/64 eui 64 Switch(config-if)# end Switch# show ipv6 interface gigabitethernet1/0/11 GigabitEthernet1/0/11 is up, line protocol is up IPv6 is enabled, link-local address is FE80::20B:46FF:FE2F:D940 Global unicast address(es): 2001:0DB8:c18:1:20B:46FF:FE2F:D940, subnet is 2001:0DB8:c18:1::/64 [EUI] Joined group address(es): FF02::1 FF02::2 FF02::1:FF2F:D940 MTU is 1500 bytes ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds ND advertised reachable time is 0 milliseconds ND advertised retransmit interval is 0 milliseconds ND router advertisements are sent every 200 seconds ND router advertisements live for 1800 seconds Hosts use stateless autoconfig for addresses. Configuring Default Router Preference: Example This example shows how to configure a DRP of high for the router on an interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 379 IPv6 Configuring IPv4 and IPv6 Protocol Stacks: Example Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ipv6 nd router-preference high Switch(config-if)# end Configuring IPv4 and IPv6 Protocol Stacks: Example This example shows how to enable IPv4 and IPv6 routing on an interface. Switch(config)# ip routing Switch(config)# ipv6 unicast-routing Switch(config)# interface fastethernet1/0/11 Switch(config-if)# no switchport Switch(config-if)# ip address 192.168.99.1 255.255.255.0 Switch(config-if)# ipv6 address 2001:0DB8:c18:1::/64 eui 64 Switch(config-if)# end Enabling DHCPv6 Server Function: Example This example shows how to configure a pool called engineering with an IPv6 address prefix: Switch# configure terminal Switch(config)# ipv6 dhcp pool engineering Switch(config-dhcpv6)#address prefix 2001:1000::0/64 Switch(config-dhcpv6)# end This example shows how to configure a pool called testgroup with three link-addresses and an IPv6 address prefix: Switch# configure terminal Switch(config)# ipv6 dhcp pool testgroup Switch(config-dhcpv6)# link-address 2001:1001::0/64 Switch(config-dhcpv6)# link-address 2001:1002::0/64 Switch(config-dhcpv6)# link-address 2001:2000::0/48 Switch(config-dhcpv6)# address prefix 2001:1003::0/64 Switch(config-dhcpv6)# end This example shows how to configure a pool called 350 with vendor-specific options: Switch# configure terminal Switch(config)# ipv6 dhcp pool 350 Switch(config-dhcpv6)# address prefix 2001:1005::0/48 Switch(config-dhcpv6)# vendor-specific 9 Switch(config-dhcpv6-vs)# suboption 1 address 1000:235D::1 Switch(config-dhcpv6-vs)# suboption 2 ascii "IP-Phone" Switch(config-dhcpv6-vs)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 380 IPv6 Enabling DHCPv6 Client Function: Example Enabling DHCPv6 Client Function: Example This example shows how to acquire an IPv6 address and to enable the rapid-commit option: Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ipv6 address dhcp rapid-commit Configuring IPv6 ICMP Rate Limiting: Example This example shows how to configure an IPv6 ICMP error message interval of 50 milliseconds and a bucket size of 20 tokens. Switch(config)#ipv6 icmp error-interval 50 20 Configuring Static Routing for IPv6: Example This example shows how to configure a floating static route to an interface with an administrative distance of 130: Switch(config)# ipv6 route 2001:0DB8::/32 gigabitethernet2/0/1 130 Configuring RIP for IPv6: Example This example shows how to enable the RIP routing process cisco with a maximum of eight equal-cost routes and to enable it on an interface: Switch(config)# ipv6 router rip cisco Switch(config-router)# maximum-paths 8 Switch(config)# exit Switch(config)# interface gigabitethernet2/0/11 Switch(config-if)# ipv6 rip cisco enable Displaying IPv6: Example This is an example of the output from the show ipv6 interface privileged EXEC command: Switch# show ipv6 interface Vlan1 is up, line protocol is up IPv6 is enabled, link-local address is FE80::20B:46FF:FE2F:D940 Global unicast address(es): 3FFE:C000:0:1:20B:46FF:FE2F:D940, subnet is 3FFE:C000:0:1::/64 [EUI] Joined group address(es): FF02::1 FF02::2 FF02::1:FF2F:D940 MTU is 1500 bytes ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 381 IPv6 Displaying IPv6: Example ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds ND advertised reachable time is 0 milliseconds ND advertised retransmit interval is 0 milliseconds ND router advertisements are sent every 200 seconds ND router advertisements live for 1800 seconds <output truncated> Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 382 2 1 C H A P T E R Configuring IPv6 Client IP Address Learning · Prerequisites for IPv6 Client Address Learning, on page 383 · Information About IPv6 Client Address Learning, on page 383 · Configuring IPv6 Unicast (CLI), on page 388 · Configuring RA Guard Policy (CLI), on page 389 · Applying RA Guard Policy (CLI), on page 390 · Configuring RA Throttle Policy (CLI), on page 391 · Applying RA Throttle Policy on VLAN (CLI), on page 392 · Configuring IPv6 Snooping (CLI), on page 393 · Configuring IPv6 ND Suppress Policy (CLI), on page 394 · Configuring IPv6 Snooping on VLAN/PortChannel, on page 395 · Configuring IPv6 on Switch (CLI), on page 396 · Configuring DHCP Pool (CLI), on page 396 · Configuring Stateless Auto Address Configuration Without DHCP (CLI), on page 397 · Configuring Stateless Auto Address Configuration With DHCP (CLI), on page 399 · Configuring Stateful DHCP Locally (CLI), on page 400 · Configuring Stateful DHCP Externally (CLI), on page 402 · Monitoring IPv6 Clients (GUI), on page 404 · Verifying IPv6 Address Learning Configuration, on page 404 · Additional References, on page 405 · Feature Information for IPv6 Client Address Learning, on page 406 Prerequisites for IPv6 Client Address Learning Before configuring IPv6 client address learning, configure the wireless clients to support IPv6. Related Topics Configuring RA Guard Policy (CLI), on page 389 Information About IPv6 Client Address Learning Client Address Learning is configured on switch to learn the wireless client's IPv4 and IPv6 address and clients transition state maintained by the switch on an association, re-association, de-authentication and timeout. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 383 IPv6 SLAAC Address Assignment There are three ways for IPv6 client to acquire IPv6 addresses: · Stateless Address Auto-Configuration (SLACC) · Stateful DHCPv6 · Static Configuration For all of these methods, the IPv6 client always sends neighbor solicitation DAD (Duplicate Address Detection) request to ensure there is no duplicate IP address on the network. The switch snoops the client's NDP and DHCPv6 packets to learn about its client IP addresses. SLAAC Address Assignment The most common method for IPv6 client address assignment is Stateless Address Auto-Configuration (SLAAC). SLAAC provides simple plug-and-play connectivity where clients self-assign an address based on the IPv6 prefix. This process is achieved Stateless Address Auto-Configuration (SLAAC) is configured as follows: · Host sends a router solicitation message. · Hosts waits for a Router Advertisement message. · Hosts take the first 64 bits of the IPv6 prefix from the Router Advertisement message and combines it with the 64 bit EUI-64 address (in the case of ethernet, this is created from the MAC Address) to create a global unicast message. The host also uses the source IP address, in the IP header, of the Router Advertisement message, as its default gateway. · Duplicate Address Detection is performed by IPv6 clients in order to ensure that random addresses that are picked do not collide with other clients. · The choice of algorithm is up to the client and is often configurable. The last 64 bits of the IP v6 address can be learned based on the following 2 algorithms: · EUI-64 which is based on the MAC address of the interface, or · Private addresses that are randomly generated. Figure 16: SLAAC Address Assignment The following Cisco IOS configuration commands from a Cisco-capable IPv6 router are used to enable SLAAC addressing and router advertisements: ipv6 unicast-routing interface Vlan20 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 384 IPv6 Stateful DHCPv6 Address Assignment description IPv6-SLAAC ip address 192.168.20.1 255.255.255.0 ipv6 address FE80:DB8:0:20::1 linklocal ipv6 address 2001:DB8:0:20::1/64 ipv6 enable end Related Topics Configuring IPv6 Snooping (CLI), on page 393 Configuring DHCP Pool (CLI), on page 396 Configuring Stateless Auto Address Configuration Without DHCP (CLI), on page 397 Configuring Stateless Auto Address Configuration With DHCP (CLI), on page 399 Configuring Stateful DHCP Locally (CLI), on page 400 Configuring Stateful DHCP Externally (CLI), on page 402 Stateful DHCPv6 Address Assignment Figure 17: Stateful DHCPv6 Address Assignment The use of DHCPv6 is not required for IPv6 client connectivity if SLAAC is already deployed. There are two modes of operation for DHCPv6 called Stateless and Stateful. The DHCPv6 Stateless mode is used to provide clients with additional network information that is not available in the router advertisement, but not an IPv6 address as this is already provided by SLAAC. This information can include the DNS domain name, DNS server(s), and other DHCP vendor-specific options. This interface configuration is for a Cisco IOS IPv6 router implementing stateless DHCPv6 with SLAAC enabled: ipv6 unicast-routing ipv6 dhcp pool IPV6_DHCPPOOL address prefix 2001:db8:5:10::/64 domain-name cisco.com dns-server 2001:db8:6:6::1 interface Vlan20 description IPv6-DHCP-Stateless ip address 192.168.20.1 255.255.255.0 ipv6 nd other-config-flag ipv6 dhcp server IPV6_DHCPPOOL ipv6 address 2001:DB8:0:20::1/64 end The DHCPv6 Stateful option, also known as managed mode, operates similarly to DHCPv4 in that it assigns unique addresses to each client instead of the client generating the last 64 bits of the address as in SLAAC. This interface configuration is for a Cisco IOS IPv6 router implementing stateful DHCPv6 on a local Switch: ipv6 unicast-routing ipv6 dhcp pool IPV6_DHCPPOOL address prefix 2001:db8:5:10::/64 domain-name cisco.com dns-server 2001:db8:6:6::1 interface Vlan20 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 385 IPv6 Static IP Address Assignment description IPv6-DHCP-Stateful ip address 192.168.20.1 255.255.255.0 ipv6 address 2001:DB8:0:20::1/64 ipv6 nd prefix 2001:DB8:0:20::/64 no-advertise ipv6 nd managed-config-flag ipv6 nd other-config-flag ipv6 dhcp server IPV6_DHCPPOOL end This interface configuration is for a Cisco IOS IPv6 router implementing stateful DHCPv6 on an external DHCP server: ipv6 unicast-routing domain-name cisco.com dns-server 2001:db8:6:6::1 interface Vlan20 description IPv6-DHCP-Stateful ip address 192.168.20.1 255.255.255.0 ipv6 address 2001:DB8:0:20::1/64 ipv6 nd prefix 2001:DB8:0:20::/64 no-advertise ipv6 nd managed-config-flag ipv6 nd other-config-flag ipv6 dhcp_relay destination 2001:DB8:0:20::2 end Related Topics Configuring IPv6 Snooping (CLI), on page 393 Configuring DHCP Pool (CLI), on page 396 Configuring Stateless Auto Address Configuration Without DHCP (CLI), on page 397 Configuring Stateless Auto Address Configuration With DHCP (CLI), on page 399 Configuring Stateful DHCP Locally (CLI), on page 400 Configuring Stateful DHCP Externally (CLI), on page 402 Static IP Address Assignment Statically configured address on a client. Router Solicitation A Router Solicitation message is issued by a host controller to facilitate local routers to transmit Router Advertisement from which it can obtain information about local routing or perform Stateless Auto-configuration. Router Advertisements are transmitted periodically and the host prompts with an immediate Router Advertisement using a Router Solicitation such as - when it boots or following a restart operation. Related Topics Configuring IPv6 ND Suppress Policy (CLI), on page 394 Router Advertisement A Router Advertisement message is issued periodically by a router or in response to a Router Solicitation message from a host. The information contained in these messages is used by hosts to perform Stateless Auto-configuration and to modify its routing table. Related Topics Configuring IPv6 ND Suppress Policy (CLI), on page 394 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 386 IPv6 Neighbor Discovery Neighbor Discovery IPv6 Neighbor Discovery is a set of messages and processes that determine relationships between neighboring nodes. Neighbor Discovery replaces ARP, ICMP Router Discovery, and ICMP Redirect used in IPv4. IPv6 Neighbor Discovery inspection analyzes neighbor discovery messages in order to build a trusted binding table database, and IPv6 neighbor discovery packets that do not comply are dropped. The neighbor binding table in the switch tracks each IPv6 address and its associated MAC address. Clients are expired from the table according to Neighbor Binding timers. Related Topics Configuring IPv6 ND Suppress Policy (CLI), on page 394 Neighbor Discovery Suppression The IPv6 addresses of wireless clients are cached by the switch. When the switch receives an NS multicast looking for an IPv6 address, and if the target address is known to the switch and belongs to one of its clients, the switch will reply with an NA message on behalf of the client. The result of this process generates the equivalent of the Address Resolution Protocol (ARP) table of IPv4 but is more efficient - uses generally fewer messages. Note The switch acts like proxy and respond with NA, only when the ipv6 nd suppress command is configured If the switch does not have the IPv6 address of a wireless client, the switch will not respond with NA and forward the NS packet to the wireless side. To resolve this, an NS Multicast Forwarding knob is provided. If this knob is enabled, the switch gets the NS packet for the IPv6 address that it does not have (cache miss) and forwards it to the wireless side. This packet reaches the intended wireless client and the client replies with NA. This cache miss scenario occurs rarely, and only very few clients which do not implement complete IPv6 stack may not advertise their IPv6 address during NDP. Related Topics Configuring IPv6 ND Suppress Policy (CLI), on page 394 RA Guard IPv6 clients configure IPv6 addresses and populate their router tables based on IPv6 router advertisement (RA) packets. The RA guard feature is similar to the RA guard feature of wired networks. RA guard increases the security of the IPv6 network by dropping the unwanted or rogue RA packets that come from wireless clients. If this feature is not configured, malicious IPv6 wireless clients announce themselves as the router for the network often with high priority, which would take higher precedence over legitimate IPv6 routers. RA-Guard also examines the incoming RA's and decides whether to switch or block them based solely on information found in the message or in the switch configuration. The information available in the frames received is useful for RA validation: · Port on which the frame is received · IPv6 source address Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 387 IPv6 RA Throttling · Prefix list The following configuration information created on the switch is available to RA-Guard to validate against the information found in the received RA frame: · Trusted/Untrusted ports for receiving RA-guard messages · Trusted/Untrusted IPv6 source addresses of RA-sender · Trusted/Untrusted Prefix list and Prefix ranges · Router Preference RA guard occurs at the switch. You can configure the switch to drop RA messages at the switch. All IPv6 RA messages are dropped, which protects other wireless clients and upstream wired network from malicious IPv6 clients. //Create a policy for RA Guard// ipv6 nd raguard policy raguard-router trusted-port device-role router //Applying the RA Guard Policy on port/interface// interface tengigabitethernet1/0/1 (Katana) interface gigabitethernet1/0/1 (Edison) ipv6 nd raguard attach-policy raguard-router Related Topics Configuring RA Guard Policy (CLI), on page 389 Applying RA Guard Policy (CLI), on page 390 Configuring RA Throttle Policy (CLI), on page 391 Applying RA Throttle Policy on VLAN (CLI), on page 392 RA Throttling RA throttling allows the controller to enforce limits to RA packets headed toward the wireless network. By enabling RA throttling, routers that send many RA packets can be trimmed to a minimum frequency that will still maintain an IPv6 client connectivity. If a client sends an RS packet, an RA is sent back to the client. This RA is allowed through the controller and unicasted to the client. This process ensures that the new clients or roaming clients are not affected by the RA throttling. Related Topics Configuring RA Guard Policy (CLI), on page 389 Applying RA Guard Policy (CLI), on page 390 Configuring RA Throttle Policy (CLI), on page 391 Applying RA Throttle Policy on VLAN (CLI), on page 392 Configuring IPv6 Unicast (CLI) IPv6 unicasting must always be enabled on the switch and the controller. IPv6 unicast routing is disabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 388 IPv6 Configuring RA Guard Policy (CLI) Before you begin To enable the forwarding of IPv6 unicast datagrams, use the ipv6 unicast-routing command in global configuration mode. To disable the forwarding of IPv6 unicast datagrams, use the no form of this command. SUMMARY STEPS 1. configure terminal 2. ipv6 unicast routing DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ipv6 unicast routing Example: Switch (config)# ipv6 unicast routing enable the forwarding of IPv6 unicast datagrams Configuring RA Guard Policy (CLI) Configure RA Guard policy on the switch to add IPv6 client addresses and populate the router table based on IPv6 router advertisement packets. SUMMARY STEPS 1. configure terminal 2. ipv6 nd raguard policy raguard-router 3. trustedport 4. device-role router 5. exit DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ipv6 nd raguard policy raguard-router Example: Defines the RA guard policy name and enters RA guard policy configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 389 IPv6 Applying RA Guard Policy (CLI) Step 3 Step 4 Step 5 Command or Action Switch(config)# ipv6 nd raguard policy raguard-router trustedport Example: Switch(config-ra-guard)# trustedport device-role router Example: Switch(config-ra-guard)# device-role router exit Example: Switch(config-ra-guard)# exit Purpose (Optional) Specifies that this policy is being applied to trusted ports. Specifies the role of the device attached to the port. Exits RA guard policy configuration mode and returns to global configuration mode. Related Topics Prerequisites for IPv6 Client Address Learning, on page 383 RA Guard, on page 387 RA Throttling, on page 388 Applying RA Guard Policy (CLI), on page 390 Configuring RA Throttle Policy (CLI), on page 391 Applying RA Throttle Policy on VLAN (CLI), on page 392 Applying RA Guard Policy (CLI) Applying the RA Guard policy on the switch will block all the untrusted RA's. SUMMARY STEPS 1. configure terminal 2. interface tengigabitethernet 1/0/1 3. ipv6 nd raguard attach-policy raguard-router 4. exit DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface tengigabitethernet 1/0/1 Example: Specifies an interface type and number, and places the device in interface configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 390 IPv6 Configuring RA Throttle Policy (CLI) Step 3 Step 4 Command or Action Purpose Switch (config)# interface tengigabitethernet 1/0/1 ipv6 nd raguard attach-policy raguard-router Applies the IPv6 RA Guard feature to a specified interface. Example: Switch(config-if)# ipv6 nd raguard attach-policy raguard-router exit Example: Switch(config-if)# exit Exits interface configuration mode. Related Topics Configuring RA Guard Policy (CLI), on page 389 RA Guard, on page 387 RA Throttling, on page 388 Configuring RA Throttle Policy (CLI), on page 391 Applying RA Throttle Policy on VLAN (CLI), on page 392 Configuring RA Throttle Policy (CLI) Configure RA Throttle policy to allow the enforce the limits SUMMARY STEPS 1. configure terminal 2. ipv6 nd ra-throttler policy ra-throttler1 3. throttleperiod500 4. max-through10 5. allow-atleast 5 at-most 10 DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ipv6 nd ra-throttler policy ra-throttler1 Example: Switch(config)# ipv6 nd ra-throttler policy ra-throttler1 Define the router advertisement (RA) throttler policy name and enter IPv6 RA throttle policy configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 391 IPv6 Applying RA Throttle Policy on VLAN (CLI) Step 3 Step 4 Step 5 Command or Action Purpose throttleperiod500 Configures the throttle period in an IPv6 RA throttler policy. Example: Switch(config-nd-ra-throttle)# throttleperiod 500 max-through10 Example: Switch(config-nd-ra-throttle)# max-through 500 Limits multicast RAs per VLAN per throttle period. allow-atleast 5 at-most 10 Example: Switch(config-nd-ra-throttle)# allow-atleast 5 at-most 10 Limits the number of multicast RAs per device per throttle period in an RA throttler policy. Related Topics Configuring RA Guard Policy (CLI), on page 389 Applying RA Guard Policy (CLI), on page 390 RA Guard, on page 387 RA Throttling, on page 388 Applying RA Throttle Policy on VLAN (CLI), on page 392 Applying RA Throttle Policy on VLAN (CLI) Applying the RA Throttle policy on a VLAN. By enabling RA throttling, routers that send many RA packets can be trimmed to a minimum frequency that will still maintain an IPv6 client connectivity. SUMMARY STEPS 1. configure terminal 2. vlan configuration 1 3. ipv6 nd ra throttler attach-policy ra-throttler1 DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 vlan configuration 1 Example: Switch(config)# vlan configuration 1 Configures a VLAN or a collection of VLANs and enters VLAN configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 392 IPv6 Configuring IPv6 Snooping (CLI) Step 3 Command or Action ipv6 nd ra throttler attach-policy ra-throttler1 Example: Switch(config-vlan)# ipv6 nd ra throttler attach-policy ra-throttler1 Purpose Attaches an IPv6 RA throttler policy to a VLAN or a collection of VLANs. Related Topics Configuring RA Guard Policy (CLI), on page 389 Applying RA Guard Policy (CLI), on page 390 Configuring RA Throttle Policy (CLI), on page 391 RA Guard, on page 387 RA Throttling, on page 388 Configuring IPv6 Snooping (CLI) IPv6 snooping must always be enabled on the switch and the controller. Before you begin Enable IPv6 on the client machine. SUMMARY STEPS 1. vlan configuration 1 2. ipv6 snooping 3. ipv6 nd suppress 4. exit DETAILED STEPS Step 1 Command or Action vlan configuration 1 Example: Switch(config)# vlan configuration 1 Step 2 ipv6 snooping Example: Purpose Enters Vlan configuration mode. Enables IPv6 snooping on the Vlan. Step 3 Switch(config-vlan)# ipv6 snooping ipv6 nd suppress Example: Enables the IPv6 ND suppress on the Vlan. Switch(config-vlan-config)# ipv6 nd suppress Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 393 IPv6 Configuring IPv6 ND Suppress Policy (CLI) Step 4 Command or Action exit Example: Switch(config-vlan-config)# exit Purpose Saves the configuration and comes out of the Vlan configuration mode. Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385 Configuring IPv6 ND Suppress Policy (CLI) The IPv6 neighbor discovery (ND) multicast suppress feature stops as many ND multicast neighbor solicit (NS) messages as possible by dropping them (and responding to solicitations on behalf of the targets) or converting them into unicast traffic. This feature runs on a layer 2 switch or a wireless controller and is used to reduce the amount of control traffic necessary for proper link operations. When an address is inserted into the binding table, an address resolution request sent to a multicast address is intercepted, and the device either responds on behalf of the address owner or, at layer 2, converts the request into a unicast message and forwards it to its destination. SUMMARY STEPS 1. enable 2. configure terminal 3. ipv6 nd suppress policy DETAILED STEPS Step 1 Command or Action enable Example: Switch(config)# enable Step 2 configure terminal Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters the global configuration mode. Switch# configure terminal Step 3 ipv6 nd suppress policy Example: Switch (config)# ipv6 nd suppress policy Related Topics Router Solicitation, on page 386 Router Advertisement, on page 386 Defines the ND suppress policy name and enters ND suppress policy configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 394 IPv6 Configuring IPv6 Snooping on VLAN/PortChannel Neighbor Discovery, on page 387 Neighbor Discovery Suppression, on page 387 Configuring IPv6 Snooping on VLAN/PortChannel Neighbor Discover (ND) suppress can be enabled or disabled on either the VLAN or a switchport. Before you begin SUMMARY STEPS 1. vlan config901 2. ipv6 nd suppress 3. end 4. interface gi1/0/1 5. ipv6 nd suppress 6. end DETAILED STEPS Step 1 Command or Action vlan config901 Example: Switch(config)# vlan config901 Step 2 ipv6 nd suppress Example: Switch(config-vlan)# ipv6 nd suppress Step 3 end Example: Switch(config-vlan)# end Step 4 interface gi1/0/1 Example: Switch (config)# interface gi1/0/1 Step 5 ipv6 nd suppress Example: Switch(config-vlan)# ipv6 nd suppress Step 6 end Example: Switch(config-vlan)# end Purpose Creates a VLAN and enter the VLAN configuration mode Applies the IPv6 nd suppress on VLAN. Exits vlan configuration mode and enters the global configuration mode. Creates a gigabitethernet port interface. Applies the IPv6 nd suppress on the interface. Exits vlan configuration mode and enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 395 IPv6 Configuring IPv6 on Switch (CLI) Configuring IPv6 on Switch (CLI) Use this configuration example to configure IPv6 on an interface. Before you begin Enable IPv6 on the client and IPv6 support on the wired infrastructure. SUMMARY STEPS 1. interface vlan 1 2. ip address fe80::1 link-local 3. ipv6 enable 4. end DETAILED STEPS Step 1 Command or Action interface vlan 1 Example: Switch(config)# interface vlan 1 Step 2 ip address fe80::1 link-local Example: Switch(config-if)# ip address 198.51.100.1 255.255.255.0 Switch(config-if)# ipv6 address fe80::1 link-local Switch(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64 Switch(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64 Step 3 ipv6 enable Example: Switch(config)# ipv6 enable Step 4 end Example: Switch(config)# end Purpose Creates a interface and enters interface configuration mode. Configures IPv6 address on the interface using the link-local option. (Optional) Enables IPv6 on the interface. Exits from the interface mode. Configuring DHCP Pool (CLI) SUMMARY STEPS 1. ipv6 dhcp pool Vlan21 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 396 IPv6 Configuring Stateless Auto Address Configuration Without DHCP (CLI) 2. address prefix 2001:DB8:0:1:FFFF:1234::/64 lifetime 300 10 3. dns-server 2001:100:0:1::1 4. domain-name example.com 5. end DETAILED STEPS Step 1 Command or Action ipv6 dhcp pool Vlan21 Example: Switch(config)# ipv6 dhcp pool vlan1 Purpose Enters the configuration mode and configures the IPv6 DHCP pool on the Vlan. Step 2 address prefix 2001:DB8:0:1:FFFF:1234::/64 lifetime 300 10 Example: Switch(config-dhcpv6)# address prefix 2001:DB8:0:1:FFFF:1234::/64 lifetime 300 10 Enters the configuration-dhcp mode and configures the address pool and its lifetime on a Vlan. Step 3 dns-server 2001:100:0:1::1 Example: Switch(config-dhcpv6)# dns-server 2001:20:21::1 Configures the DNS servers for the DHCP pool. Step 4 domain-name example.com Example: Switch(config-dhcpv6)# domain-name example.com Configures the domain name to complete unqualified host names. Step 5 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385 ConfiguringStatelessAutoAddressConfigurationWithoutDHCP (CLI) SUMMARY STEPS 1. interface vlan 1 2. ip address fe80::1 link-local 3. ipv6 enable 4. no ipv6 nd managed-config-flag 5. no ipv6 nd other-config-flag Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 397 IPv6 Configuring Stateless Auto Address Configuration Without DHCP (CLI) 6. end DETAILED STEPS Step 1 Command or Action interface vlan 1 Example: Switch(config)# interface vlan 1 Purpose Creates a interface and enters interface configuration mode. Step 2 ip address fe80::1 link-local Example: Switch(config-if)# ip address 198.51.100.1 255.255.255.0 Switch(config-if)# ipv6 address fe80::1 link-local Switch(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64 Switch(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64 Configures IPv6 address on the interface using the link-local option. Step 3 ipv6 enable Example: Switch(config)# ipv6 enable (Optional) Enables IPv6 on the interface. Step 4 no ipv6 nd managed-config-flag Example: Ensures the attached hosts do not use stateful autoconfiguration to obtain addresses. Switch(config)#interface vlan 1 Switch(config-if)# no ipv6 nd managed-config-flag Step 5 no ipv6 nd other-config-flag Example: Switch(config-if)# no ipv6 nd other-config-flag Ensures the attached hosts do not use stateful autoconfiguration to obtain non-address options from DHCP (domain etc). Step 6 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 398 IPv6 Configuring Stateless Auto Address Configuration With DHCP (CLI) Configuring Stateless Auto Address Configuration With DHCP (CLI) SUMMARY STEPS 1. interface vlan 1 2. ip address fe80::1 link-local 3. ipv6 enable 4. no ipv6 nd managed-config-flag 5. ipv6 nd other-config-flag 6. end DETAILED STEPS Step 1 Command or Action interface vlan 1 Example: Switch(config)# interface vlan 1 Purpose Creates a interface and enters interface configuration mode. Step 2 ip address fe80::1 link-local Example: Switch(config-if)# ip address 198.51.100.1 255.255.255.0 Switch(config-if)# ipv6 address fe80::1 link-local Switch(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64 Switch(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64 Configures IPv6 address on the interface using the link-local option. Step 3 ipv6 enable Example: Switch(config)# ipv6 enable (Optional) Enables IPv6 on the interface. Step 4 no ipv6 nd managed-config-flag Example: Ensures the attached hosts do not use stateful autoconfiguration to obtain addresses. Switch(config)#interface vlan 1 Switch(config-if)# no ipv6 nd managed-config-flag Step 5 ipv6 nd other-config-flag Example: Switch(config-if)# no ipv6 nd other-config-flag Ensures the attached hosts do not use stateful autoconfiguration to obtain non-address options from DHCP (domain etc). Step 6 end Example: Switch(config)# end Exits from the interface mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 399 IPv6 Configuring Stateful DHCP Locally (CLI) Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385 Configuring Stateful DHCP Locally (CLI) This interface configuration is for a Cisco IOS IPv6 router implementing stateful DHCPv6 on a local Switch SUMMARY STEPS 1. configure terminal 2. ipv6 unicast-routing 3. ipv6 dhcp pool IPv6_DHCPPOOL 4. address prefix 2001:DB8:0:1:FFFF:1234::/64 5. dns-server 2001:100:0:1::1 6. domain-name example.com 7. exit 8. interface vlan1 9. description IPv6-DHCP-Stateful 10. ipv6 address 2001:DB8:0:20::1/64 11. ip address 192.168.20.1 255.255.255.0 12. ipv6 nd prefix 2001:db8::/64 no-advertise 13. ipv6 nd managed-config-flag 14. ipv6 nd other-config-flag 15. ipv6 dhcp server IPv6_DHCPPOOL DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 ipv6 unicast-routing Example: Switch(config)# ipv6 unicast-routing Configures IPv6 for unicasting. ipv6 dhcp pool IPv6_DHCPPOOL Example: Switch (config)# ipv6 dhcp pool IPv6_DHCPPOOL Enters the configuration mode and configures the IPv6 DHCP pool on the VLAN. address prefix 2001:DB8:0:1:FFFF:1234::/64 Specifies the address range to provide in the pool. Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 400 IPv6 Configuring Stateful DHCP Locally (CLI) Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Switch (config-dhcpv6)# address prefix 2001:DB8:0:1:FFFF:1234::/64 Purpose dns-server 2001:100:0:1::1 Provides the DNS server option to DHCP clients. Example: Switch (config-dhcpv6)# dns-server 2001:100:0:1::1 domain-name example.com Provides the domain name option to DHCP clients. Example: Switch (config-dhcpv6)# domain-name example.com exit Example: Switch (config-dhcpv6)# exit Returns to the previous mode. interface vlan1 Example: Switch (config)# interface vlan 1 Enters the interface mode to configure the stateful DHCP. description IPv6-DHCP-Stateful Enter description for the stateful IPv6 DHCP. Example: Switch (config-if)# description IPv6-DHCP-Stateful ipv6 address 2001:DB8:0:20::1/64 Example: Switch (config-if)# ipv6 address 2001:DB8:0:20::1/64 Enters the IPv6 address for the stateful IPv6 DHCP. ip address 192.168.20.1 255.255.255.0 Example: Switch (config-if)# ip address 192.168.20.1 255.255.255.0 Enters the IPv6 address for the stateful IPv6 DHCP. ipv6 nd prefix 2001:db8::/64 no-advertise Example: Configures the IPv6 routing prefix advertisement that must not be advertised. Switch (config-if)# ipv6 nd prefix 2001:db8::/64 no-advertise ipv6 nd managed-config-flag Example: Configures IPv6 interfaces neighbor discovery to allow the hosts to uses DHCP for address configuration. Switch (config-if)# ipv6 nd managed-config-flag ipv6 nd other-config-flag Example: Switch (config-if)# ipv6 nd other-config-flag Configures IPv6 interfaces neighbor discovery to allow the hosts to uses DHCP for non-address configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 401 IPv6 Configuring Stateful DHCP Externally (CLI) Step 15 Command or Action Purpose ipv6 dhcp server IPv6_DHCPPOOL Configures the DHCP server on the interface. Example: Switch (config-if)# ipv6 dhcp server IPv6_DHCPPOOL Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385 Configuring Stateful DHCP Externally (CLI) This interface configuration is for a Cisco IOS IPv6 router implementing stateful DHCPv6 on an external DHCP server. SUMMARY STEPS 1. configure terminal 2. ipv6 unicast-routing 3. dns-server 2001:100:0:1::1 4. domain-name example.com 5. exit 6. interface vlan1 7. description IPv6-DHCP-Stateful 8. ipv6 address 2001:DB8:0:20::1/64 9. ip address 192.168.20.1 255.255.255.0 10. ipv6 nd prefix 2001:db8::/64 no-advertise 11. ipv6 nd managed-config-flag 12. ipv6 nd other-config-flag 13. ipv6 dhcp_relaydestination 2001:DB8:0:20::2 DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ipv6 unicast-routing Example: Switch(config)# ipv6 unicast-routing Configures the IPv6 for unicasting. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 402 IPv6 Configuring Stateful DHCP Externally (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action Purpose dns-server 2001:100:0:1::1 Provides the DNS server option to DHCP clients. Example: Switch (config-dhcpv6)# dns-server 2001:100:0:1::1 domain-name example.com Provides the domain name option to DHCP clients. Example: Switch (config-dhcpv6)# domain-name example.com exit Example: Switch (config-dhcpv6)# exit Returns to the previous mode. interface vlan1 Example: Switch (config)# interface vlan 1 Enters the interface mode to configure the stateful DHCP. description IPv6-DHCP-Stateful Enter description for the stateful IPv6 DHCP. Example: Switch (config-if)# description IPv6-DHCP-Stateful ipv6 address 2001:DB8:0:20::1/64 Example: Switch (config-if)# ipv6 address 2001:DB8:0:20::1/64 Enters the IPv6 address for the stateful IPv6 DHCP. ip address 192.168.20.1 255.255.255.0 Example: Switch (config-if)# ip address 192.168.20.1 255.255.255.0 Enters the IPv6 address for the stateful IPv6 DHCP. ipv6 nd prefix 2001:db8::/64 no-advertise Example: Configures the IPv6 routing prefix advertisement that must not be advertised. Switch (config-if)# ipv6 nd prefix 2001:db8::/64 no-advertise ipv6 nd managed-config-flag Example: Configures IPv6 interfaces neighbor discovery to allow the hosts to uses DHCP for address configuration. Switch (config-if)# ipv6 nd managed-config-flag ipv6 nd other-config-flag Example: Switch (config-if)# ipv6 nd other-config-flag Configures IPv6 interfaces neighbor discovery to allow the hosts to uses DHCP for non-address configuration. ipv6 dhcp_relaydestination 2001:DB8:0:20::2 Example: Configures the DHCP server on the interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 403 IPv6 Monitoring IPv6 Clients (GUI) Command or Action Purpose Switch (config-if)# ipv6 dhcp_relay destination 2001:DB8:0:20::2 Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385 Monitoring IPv6 Clients (GUI) To view the IPv6 clients associated with the Switch Select Monitor > Clients The Clients page is displayed. The Clients page contains the following details: · Client MAC Address-- Displays the MAC address of the client. · AP Name-- Displays the access point name to which the client is connected to. · WLAN-- Displays the WLAN associated with the client. · State-- Displays the client authentication. · Protocol-- Displays the protocol used. To view the client related general details, click the Client MAC Address parameter in the Clients page. The Client > Detail page displays IPv6 addresses of the client under the General tab. Verifying IPv6 Address Learning Configuration This example displays the output of the show ipv6 dhcp pool command. This command displays the IPv6 service configuration on the switch. The vlan 21 configured pool detail displays 6 clients that are currently using addresses from the pool. SUMMARY STEPS 1. show ipv6 dhcp pool DETAILED STEPS Step 1 Command or Action Purpose show ipv6 dhcp pool Displays the IPv6 service configuration on the switch. Example: Switchshow ipv6 dhcp pool DHCPv6 pool: vlan21 Address allocation prefix: 2001:DB8:0:1:FFFF:1234::/64 valid 86400 preferred 86400 (6 in use, 0 conflicts) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 404 IPv6 Additional References Command or Action DNS server: 2001:100:0:1::1 Domain name: example.com Active clients: 6 Purpose Additional References Related Documents Related Topic Document Title IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches) IP command reference IP Command Reference (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 405 IPv6 Feature Information for IPv6 Client Address Learning Feature Information for IPv6 Client Address Learning This table lists the features in this module and provides links to specific configuration information: Feature Release Modification IPv6 Client Address Learning Functionality Cisco IOS XE 3.3SE This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 406 2 2 C H A P T E R Configuring IPv6 WLAN Security · Prerequisites for IPv6 WLAN Security, on page 407 · Restrictions for IPv6 WLAN Security, on page 407 · Information About IPv6 WLAN Security, on page 407 · How to Configure IPv6 WLAN Security, on page 410 · Additional References , on page 426 · Feature Information for IPv6 WLAN Security, on page 427 Prerequisites for IPv6 WLAN Security A client VLAN must be mapped to the WLAN configured on the switch Restrictions for IPv6 WLAN Security RADIUS Server Support · If multiple RADIUS servers are configured for redundancy, the user database must be identical in all the servers for the backup to work properly. Radius ACS Support · You must configure RADIUS on both your Cisco Secure Access Control Server (ACS) and your switch · RADIUS is supported on Cisco Secure ACS version 3.2 and later releases. Information About IPv6 WLAN Security Information About RADIUS Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol that provides centralized security for users attempting to gain management access to a network. It serves as a back-end database similar to Local EAP and provides authentication and accounting services. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 407 IPv6 Information About IPv6 WLAN Security · Authentication--The process of verifying users when they attempt to log into the switch Users must enter a valid username and password for the switch to authenticate users to the RADIUS server. If multiple databases are configured, then specify the sequence in which the backend database must be tried. · Accounting-- The process of recording user actions and changes. Whenever a user successfully executes an action, the RADIUS accounting server logs the changed attributes, the user ID of the person who made the change, the remote host where the user is logged in, the date and time when the command was executed, the authorization level of the user, and a description of the action performed and the values provided. If the RADIUS accounting server is unreachable, the users can continue their sessions uninterrupted. User Datagram Protocol-- RADIUS uses User Datagram Protocol (UDP) for its transport. It maintains a database and listens on UDP port 1812 for incoming authentication requests and UDP port 1813 for incoming accounting requests. The switch, which requires access control, acts as the client and requests AAA services from the server. The traffic between the switch and the server is encrypted by an algorithm defined in the protocol and a shared secret key configured on both devices. Configures multiple RADIUS accounting and authentication servers. For example, you can have one central RADIUS authentication server but several RADIUS accounting servers in different regions. If you configure multiple servers of the same type and the first one fails or becomes unreachable, the controller automatically tries the second one, then the third one if necessary, and so on. When RADIUS method is configured for the WLAN, the switch will use the RADIUS method configured for the WLAN. When the WLAN is configured to use local EAP, the RADIUS method configured on the WLAN points to Local. The WLAN must also be configured with the name of the local EAP profile to use. If no RADIUS method is configured in the WLAN, the switch will use the default RADIUS method defined in global mode. Information About Local EAP Local EAP is an authentication method that allows users and wireless clients to be authenticated locally. It is designed for use in remote offices that maintain connectivity to wireless clients when the back-end system is disrupted or the external authentication server goes down. When you enable local EAP, the switch serves as the authentication server and the local user database, which removes dependence on an external authentication server. Local EAP retrieves user credentials from the local user database or the LDAP back-end database to authenticate users. Local EAP supports LEAP, EAP-FAST, EAP-TLS, PEAPv0/MSCHAPv2, and PEAPv1/GTC authentication between the controller and wireless clients. Note The LDAP back-end database supports these local EAP methods: EAP-TLS, EAP-FAST/GTC, and PEAPv1/GTC. LEAP, EAP-FAST/MSCHAPv2, and PEAPv0. MSCHAPv2 is supported only if the LDAP server is set up to return a clear-text password. Note Switch support Local EAP authentication against external LDAP databases such as Microsoft Active Directory and Novell's eDirectory. For more information about configuring the controller for Local EAP authentication against Novell's eDirectory, see the Configure Unified Wireless Network for Authentication Against Novell's eDirectory Database whitepaper. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 408 IPv6 Figure 18: Local EAP Example Information About IPv6 WLAN Security Related Topics Creating a Local User, on page 410 Creating an Client VLAN and Interface, on page 410 Configuring a EAP Profile, on page 412 Creating a Client VLAN, on page 424 Creating 802.1x WLAN Using an External RADIUS Server, on page 425 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 409 IPv6 How to Configure IPv6 WLAN Security How to Configure IPv6 WLAN Security Configuring Local Authentication Creating a Local User SUMMARY STEPS 1. configure terminal 2. username aaa_test 3. password 0 aaa_test 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 username aaa_test Example: Switch(config)# username aaa_test Creates a username. Step 3 password 0 aaa_test Assigns a password for the username. Example: Switch(config)# usernameaaa_test password 0 aaa_test Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode. Switch# configure terminal Switch(config)# username aaa_test password 0 aaa_test Switch(config)# end Related Topics Information About IPv6 WLAN Security, on page 407 Creating an Client VLAN and Interface SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 410 IPv6 Creating an Client VLAN and Interface 2. vlan 3. exit 4. interface vlan vlan_ID 5. ip address 6. ipv6 address 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 vlan Example: Switch(config)# vlan 137 Creates a VLAN. Step 3 exit Example: Switch (config-vlan)# exit Exits VLAN configuration mode. Step 4 interface vlan vlan_ID Example: Switch (config)# interface vlan 137 Associates the VLAN to an interface. Step 5 ip address Example: Switch(config-if)# ip address 10.7.137.10 255.255.255.0 Assigns an IP address to the VLAN interface. Step 6 ipv6 address Assigns an IPv6 address to the VLAN interface. Example: Switch(config-if)#ipv6 address 2001:db8::20:1/64 Step 7 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode. Example Switch# configure terminal Switch(config)# vlan 137 Switch(config-vlan)#exit Switch(config)#interface vlan 137 Switch(config-if)#ip address 10.7.137.10 255.255.255.0 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 411 IPv6 Configuring a EAP Profile Switch(config-if)#ipv6 address 2001:db8::20:1/64 Switch(config-if)#end Related Topics Information About IPv6 WLAN Security, on page 407 Configuring a EAP Profile SUMMARY STEPS 1. eap profile name 2. method leap 3. method tls 4. method peap 5. method mschapv2 6. method md5 7. method gtc 8. method fast profile my-fast 9. description my_localeap profile 10. exit 11. eap method fast profilemyFast 12. authority-id [identity|information] 13. local-key 0 key-name 14. pac-password 0 password 15. end DETAILED STEPS Step 1 Command or Action eap profile name Example: Switch(config)# eap profile wcm_eap_prof Step 2 method leap Example: Switch(config-eap-profile)# method leap Step 3 method tls Example: Switch(config-eap-profile)# method tls Step 4 method peap Example: Switch(config-eap-profile)# method peap Purpose Creates a EAP profile. Configures EAP-LEAP method on the profile. Configures EAP-TLS method on the profile. Configures PEAP method on the profile. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 412 IPv6 Configuring a EAP Profile Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action method mschapv2 Example: Switch(config-eap-profile)# method mschapv2 Purpose Configures EAP-MSCHAPV2 method on the profile. method md5 Example: Switch(config-eap-profile)# method md5 Configures EAP-MD5 method on the profile. method gtc Example: Switch(config-eap-profile)# method gtc Configures EAP-GTC method on the profile. method fast profile my-fast Creates a EAP profile named my-fast. Example: Switch(config-eap-profile)# eap method fast profile my-fast Switch (config-eap-profile)#description my_local eap profile description my_localeap profile Provides a description for the local profile. Example: Switch (config-eap-profile)#description my_local eap profile exit Example: Switch (config-eap-profile)# exit Exits the eap-profile configuration mode. eap method fast profilemyFast Configures the EAP method profile. Example: Switch (config)# eap method fast profile myFast authority-id [identity|information] Example: Configure the authority ID and information for the EAP method profile. Switch(config-eap-method-profile)# authority-id identity my_identity Switch(config-eap-method-profile)#authority-id information my_information local-key 0 key-name Example: Switch(config-eap-method-profile)# local-key 0 test Configures the local server key. pac-password 0 password Example: Configures the PAC password for manual PAC provisioning. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 413 IPv6 Creating a Local Authentication Model Step 15 Command or Action Purpose Switch(config-eap-method-profile)# pac-password 0 test end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode. Example Switch(config)#eap profile wcm_eap_prof Switch(config-eap-profile)#method leap Switch(config-eap-profile)#method tls Switch(config-eap-profile)#method peap Switch(config-eap-profile)#method mschapv2 Switch(config-eap-profile)#method md5 Switch(config-eap-profile)#method gtc Switch(config-eap-profile)#eap method fast profile my-fast Switch (config-eap-profile)#description my_local eap profile Switch(config-eap-profile)# exit Switch (config)# eap method fast profile myFast Switch(config-eap-method-profile)#authority-id identity my_identity Switch(config-eap-method-profile)#authority-id information my_information Switch(config-eap-method-profile)#local-key 0 test Switch(config-eap-method-profile)#pac-password 0 test Switch(config-eap-method-profile)# end Related Topics Information About IPv6 WLAN Security, on page 407 Creating a Local Authentication Model SUMMARY STEPS 1. aaa new-model 2. authentication dot1x default local 3. dot1x method_list local 4. aaa authentication dot1x dot1x_name local 5. aaa authorization credential-download name local 6. aaa local authentication auth-name authorization authorization-name 7. session ID 8. dot1x system-auth-control DETAILED STEPS Step 1 Command or Action aaa new-model Example: Switch(config)# aaa new-model Purpose Creates a AAA authentication model. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 414 IPv6 Creating a Local Authentication Model Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose authentication dot1x default local Example: Implies that the dot1x must use the default local RADIUS when no other method is found. Switch(config)# aaa authentication dot1x default local dot1x method_list local Assigns the local authentication for wcm_local method list. Example: Switch(config)# aaa authentication dot1x wcm_local local aaa authentication dot1x dot1x_name local Configures the local authentication for the dot1x method. Example: Switch(config)# aaa authentication dot1x aaa_auth local aaa authorization credential-download name local Example: Switch(config)# aaa authorization credential-download wcm_author local Configures local database to download EAP credentials from Local/RADIUS/LDAP. aaa local authentication auth-name authorization Selects local authentication and authorization. authorization-name Example: Switch(config)# aaa local authentication wcm_local authorization wcm_author session ID Example: Switch(config)# aaa session-id common Configures a session ID for AAA. dot1x system-auth-control Example: Switch(config)# dot1x system-auth-control Enables dot.1x system authentication control. Example Switch(config)# aaa new-model Switch(config)# aaa authentication dot1x default local Switch(config)# aaa authentication dot1x wcm-local local Switch(config)# aaa authentication dot1x aaa_auth local Switch(config)# aaa authorization credential-download wcm_author local Switch(config)# aaa local authentication wcm_local authorization wcm_author Switch(config)# aaa session-id common Switch(config)# dot1x system-auth-control Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 415 IPv6 Creating a Client WLAN Creating a Client WLAN Note This example uses 802.1x with dynamic WEP. You can use any other security mechanism supported by the wireless client and configurable on the switch SUMMARY STEPS 1. configure terminal 2. wlan wlan name <identifier> SSID 3. broadcast-ssid 4. no security wpa 5. security dot1x 6. security dot1x authentication-list wcm-local 7. local-auth wcm_eap_prof 8. client vlan 137 9. no shutdown 10. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 wlan wlan name <identifier> SSID Creates a WLAN. Example: Switch(config)# wlan wlanProfileName 1 ngwcSSID Step 3 broadcast-ssid Example: Switch(config-wlan)# broadcast-ssid Configures to broadcast the SSID on a WLAN. Step 4 no security wpa Example: Switch(config-wlan)# no security wpa Disables the wpa for WLAN to enable 802.1x. Step 5 security dot1x Example: Switch(config-wlan)# security dot1x Configures the 802.1x encryption security for the WLAN. Step 6 security dot1x authentication-list wcm-local Example: Configures the server group mapping to the WLAN for dot1x authentication. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 416 IPv6 Configuring Local Authentication with WPA2+AES Step 7 Step 8 Step 9 Step 10 Command or Action Switch(config-wlan)# security dot1x authentication-list wcm-local Purpose local-auth wcm_eap_prof Example: Configures the eap profile on the WLAN for local authentication. Switch (config-wlan)# local-auth wcm_eap_profile client vlan 137 Example: Switch(config-wlan)# client vlan 137 Associates the VLAN to a WLAN. no shutdown Example: Switch(config-wlan)# no shutdown Enables the WLAN. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode. Example Switch# config terminal Switch(config)#wlan wlanProfileName 1 ngwcSSID Switch(config-wlan)#broadcast-ssid Switch(config-wlan)#no security wpa Switch(config-wlan)#security dot1x Switch(config-wlan)#security dot1x authentication-list wcm-local Switch (config-wlan)# local-auth wcm_eap_prof Switch(config-wlan)#client vlan 137 Switch(config-wlan)#no shutdown Switch(config-wlan)#end Switch# Related Topics Creating Client VLAN for WPA2+AES, on page 419 Configuring Local Authentication with WPA2+AES SUMMARY STEPS 1. configure terminal 2. aaa new model 3. dot1x system-auth-control 4. aaa authentication dot1x default local 5. aaa local authorization credential-download default local 6. aaa local authentication default authorization default 7. eap profile wcm_eap_profile 8. method leap Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 417 IPv6 Configuring Local Authentication with WPA2+AES 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 aaa new model Example: Switch(config)# aaa new-model Creates a AAA authentication model. Step 3 dot1x system-auth-control Example: Switch(config)# dot1x system-auth-control Enables dot1x system authentication control. Step 4 aaa authentication dot1x default local Example: Configures the local authentication for the default dot1x method. Switch(config)# aaa authentication dot1x default local Step 5 aaa local authorization credential-download default local Example: Switch(config)# aaa authorization credential-download default local Configures default database to download EAP credentials from local server. Step 6 aaa local authentication default authorization default Selects the default local authentication and authorization. Example: Switch(config)# aaa local authentication default authorization default Step 7 eap profile wcm_eap_profile Example: Switch(config)#eap profile wcm_eap_profile Creates an EAP profile. Step 8 method leap Example: Switch(config)# method leap Configures EAP-LEAP method on the profile. Step 9 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode. Switch# configure terminal Switch(config)# aaa new-model Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 418 IPv6 Creating Client VLAN for WPA2+AES Switch(config)# dot1x system-auth-control Switch(config)# aaa authentication dot1x default local Switch(config)# aaa authorization credential-download default local Switch(config)# aaa local authentication default authorization default Switch(config)#eap profile wcm_eap_profile Switch(config)# method leap Switch(config)# end Creating Client VLAN for WPA2+AES Create a VLAN for the WPA2+AES type of local authentication. This VLAN is later mapped to a WLAN. SUMMARY STEPS 1. configure terminal 2. vlan vlan_ID 3. exit 4. interface vlan vlan_ID 5. ip address 6. ipv6 address 7. exit DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 vlan vlan_ID Example: Switch (config)# vlan 105 Creates a VLAN. Step 3 exit Example: Switch (config-vlan)# exit Exits from the VLAN mode. Step 4 interface vlan vlan_ID Example: Switch(config)# interface vlan 105 Associates the VLAN to the interface. Step 5 ip address Example: Switch(config-if)# ip address 10.8.105.10 255.255.255.0 Assigns IP address to the VLAN interface. Step 6 ipv6 address Assigns IPv6 address to the VLAN interface. Example: Switch(config-if)#ipv6 address 2001:db8::10:1/64 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 419 IPv6 Creating WLAN for WPA2+AES Step 7 Command or Action exit Example: Switch (config-if)# exit Purpose Exits from the interface mode. Switch# configure terminal Switch(config)# vlan105 Switch (config-vlan)# exit Switch (config)# interface vlan 105 Switch(config-if)#ip address 10.8.105.10 255.255.255.0 Switch(config-if)#ipv6 address 2001:db8::10:1/64 Switch(config-if)#exit Switch(config)# Related Topics Creating a Client WLAN , on page 416 Creating WLAN for WPA2+AES Create a WLAN and map it to the client VLAN created for WPA2+AES. SUMMARY STEPS 1. configure terminal 2. wlan wpas2-aes-wlan 1 wpas2-aes-wlan 3. client vlan 105 4. local-auth wcm_eap_profile 5. security dot1x authentication-list default 6. no shutdown 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 wlan wpas2-aes-wlan 1 wpas2-aes-wlan Creates a WLAN. Example: Switch(config)#wlan wpa2-aes-wlan 1 wpa2-aes-wlan Switch(config-wlan)# Step 3 client vlan 105 Example: Switch(config-wlan)#client vlan 105 Switch(config-wlan)# Maps the WLAN to the client VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 420 IPv6 Configuring External RADIUS Server Step 4 Step 5 Step 6 Step 7 Command or Action local-auth wcm_eap_profile Example: Switch(config-wlan)#local-auth wcm_eap_profile security dot1x authentication-list default Example: Switch(config-wlan)#security dot1x authentication-list default no shutdown Example: Switch(config-wlan)#no shutdown Switch(config-wlan)# end Example: Switch(config)# end Purpose Creates and sets the EAP profile on the WLAN. Uses the default dot1x authentication list. Enables the WLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Switch# configure terminal Switch(config)#wlan wpa2-aes-wlan 1 wpa2-aes-wlan Switch(config-wlan)#client vlan 105 Switch(config-wlan)#local-auth wcm_eap_profile Switch(config-wlan)#security dot1x authentication-list default Switch(config-wlan)#no shutdown Switch(config-wlan)# exit Configuring External RADIUS Server Configuring RADIUS Authentication Server Host SUMMARY STEPS 1. configure terminal 2. radius server One 3. address ipv4 address auth-portauth_port_number acct-port acct_port_number 4. address ipv6 address auth-portauth_port_number acct-port acct_port_number 5. key 0cisco 6. DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 421 IPv6 Configuring RADIUS Authentication Server Group Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action radius server One Example: Switch (config)# radius server One Purpose Creates a radius server. address ipv4 address auth-portauth_port_number Configures the IPv4 address for the radius server. acct-port acct_port_number Example: Switch (config-radius-server)# address ipv4 10.10.10.10 auth-port 1812 acct-port 1813 address ipv6 address auth-portauth_port_number Configures the IPv6 address for the radius server. acct-port acct_port_number Example: Switch (config-radius-server)# address ipv6 2001:db8::25:2 auth-port 1812 acct-port 1813 key 0cisco exit Example: Switch (config-radius-server)# key 0 cisco Example: Switch (config-radius-server)# exit Exits from the radius server mode. Switch# configure terminal Switch (config)# radius server One Switch (config-radius-server)# address ipv4 10.10.10.10 auth-port 1812 acct-port 1813 Switch (config-radius-server)# address ipv6 2001:db8::25:2 auth-port 1812 acct-port 1813 Switch (config-radius-server)# key 0 cisco Switch (config-radius-server)#exit Related Topics Configuring RADIUS Authentication Server Group , on page 422 Configuring RADIUS Authentication Server Group SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. aaa group server radius wcm_rad 4. server <ip address>auth-port1812acct-port1813 5. aaa authentication dot1x method_list group wcm_rad 6. dot1x system-auth-control 7. aaa session-idcommon Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 422 IPv6 Configuring RADIUS Authentication Server Group DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 aaa new-model Example: Switch(config)#aaa new-model Creates a AAA authentication model. Step 3 aaa group server radius wcm_rad Example: Switch(config)# aaa group server radius wcm_rad Switch(config-sg-radius)# Creates an radius server-group. Step 4 server <ip address>auth-port1812acct-port1813 Adds servers to the radius group created in Step 3. Example: Configures the UDP port for RADIUS accounting server and authentication server. Switch(config-sg-radius)# server One auth-port 1812 acct-port 1813 Switch(config-sg-radius)# server Two auth-port 1812 acct-port 1813 Switch(config-sg-radius)# server Three auth-port 1812 acct-port 1813 Step 5 aaa authentication dot1x method_list group wcm_rad Example: Switch(config)# aaa authentication dot1x method_list group wcm_rad Maps the method list to the radius group. Step 6 dot1x system-auth-control Example: Switch(config)# dot1x system-auth-control Enables the system authorization control for the radius group. Step 7 aaa session-idcommon Example: Switch(config)# aaa session-id common Ensures that all session IDs information sent out, from the radius group, for a given call are identical. Switch# configure terminal Switch(config)# aaa new-model Switch(config)# aaa group server radius wcm_rad Switch(config-sg-radius)# server One auth-port 1812 acct-port 1813 Switch(config-sg-radius)# server Two auth-port 1812 acct-port 1813 Switch(config-sg-radius)# server Three auth-port 1812 acct-port 1813 Switch(config)# aaa authentication dot1x method_list group wcm_rad Switch(config)# dot1x system-auth-control Switch(config)# aaa session-id common Switch(config)# Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 423 IPv6 Creating a Client VLAN Related Topics Configuring RADIUS Authentication Server Host , on page 421 Creating a Client VLAN SUMMARY STEPS 1. configure terminal 2. vlan 137 3. exit 4. interface vlan 137 5. ip address 10.7.137.10 255.255.255.0 6. ipv6 address 2001:db8::30:1/64 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 vlan 137 Example: Switch(config)# vlan 137 Creates a VLAN and associate it to the interface. Step 3 exit Example: Switch (config-vlan)# exit Exits from the VLAN mode. Step 4 interface vlan 137 Example: Switch (config)# interface vlan 137 Assigns a VLAN to an interface. Step 5 ip address 10.7.137.10 255.255.255.0 Example: Switch(config-if)# ip address 10.7.137.10 255.255.255.0 Assigns an IPv4 address to the VLAN interface. Step 6 ipv6 address 2001:db8::30:1/64 Assigns an IPv6 address to the VLAN interface. Example: Switch(config-if)# ipv6 address 2001:db8::30:1/64 Step 7 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 424 IPv6 Creating 802.1x WLAN Using an External RADIUS Server Switch# configure terminal Switch(config)# vlan137 Switch(config-vlan)# exit Switch(config)# interface vlan137 Switch(config-if)# ip address 10.7.137.10 255.255.255.0 Switch(config-if)# ipv6 address 2001:db8::30:1/64 Switch(config-if)# end Related Topics Information About IPv6 WLAN Security, on page 407 Creating 802.1x WLAN Using an External RADIUS Server, on page 425 Creating 802.1x WLAN Using an External RADIUS Server SUMMARY STEPS 1. configure terminal 2. wlan ngwc-1x<ssid>ngwc-1x 3. broadcast-ssid 4. no security wpa 5. security dot1x 6. security dot1x authentication-list wcm-rad 7. client vlan 137 8. no shutdown 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan ngwc-1x<ssid>ngwc-1x Example: Switch(config)# wlan ngwc_8021x 2 ngwc_8021x Step 3 broadcast-ssid Example: Switch(config-wlan)# broadcast-ssid Step 4 no security wpa Example: Switch(config-wlan)# no security wpa Step 5 security dot1x Example: Switch(config-wlan)# security dot1x Purpose Enters global command mode. Creates a new WLAN for 802.1x authentication. Configures to broadcast the SSID on WLAN. Disables the WPA for WLAN to enable 802.1x. Configures the 802.1x encryption security for the WLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 425 IPv6 Additional References Step 6 Step 7 Step 8 Step 9 Command or Action security dot1x authentication-list wcm-rad Example: Switch(config-wlan)# security dot1x authentication-list wcm-rad client vlan 137 Example: Switch(config-wlan)# client vlan 137 no shutdown Example: Switch(config-wlan)# no shutdown end Example: Switch(config)# end Purpose Configures the server group mapping to the WLAN for dot1x authentication. Associates the VLAN to a WLAN. Enables the WLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode. Example Switch# configure terminal Switch(config)#wlan ngwc_8021x 2 ngwc_8021x Switch(config-wlan)# broadcast-ssid Switch(config-wlan)# no security wpa Switch(config-wlan)# security dot1x Switch(config-wlan)# security dot1x authentication-list wcm-rad Switch(config-wlan)# client vlan 137 Switch(config-wlan)# no shutdown Switch(config-wlan)# end Related Topics Creating a Client VLAN, on page 424 Information About IPv6 WLAN Security, on page 407 Additional References Related Documents Related Topic Document Title IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches) WLAN command reference WLAN Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) WLAN configuration WLAN Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 426 IPv6 Feature Information for IPv6 WLAN Security Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for IPv6 WLAN Security This table lists the features in this module and provides links to specific configuration information: Feature Release Modification IPv6 WLAN Security Functionality Cisco IOS XE 3.3SE This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 427 IPv6 Feature Information for IPv6 WLAN Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 428 2 3 C H A P T E R Configuring IPv6 ACL · Prerequisites for IPv6 ACL, on page 429 · Restrictions for IPv6 ACL, on page 429 · Information About IPv6 ACL, on page 430 · Configuring IPv6 ACLs , on page 432 · How To Configure an IPv6 ACL, on page 433 · Verifying IPv6 ACL, on page 439 · Configuration Examples for IPv6 ACL, on page 439 · Additional References, on page 444 · Feature Information for IPv6 ACLs, on page 444 Prerequisites for IPv6 ACL You can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them to interfaces similarly to the way that you create and apply IP Version 4 (IPv4) named ACLs. You can also create and apply input router ACLs to filter Layer 3 management traffic when the switch is running the IP base feature set. Related Topics Creating IPv6 ACL, on page 433 Restrictions for IPv6 ACL With IPv4, you can configure standard and extended numbered IP ACLs, named IP ACLs, and MAC ACLs. IPv6 supports only named ACLs. The switch supports most of the Cisco IOS-supported IPv6 ACLs with some exceptions: · The switch does not support matching on these keywords: flowlabel, routing header, and undetermined-transport. · The switch does not support reflexive ACLs (the reflect keyword). · The switch does not apply MAC-based ACLs on IPv6 frames. · When configuring an ACL, there is no restriction on keywords entered in the ACL, regardless of whether or not they are supported on the platform. When you apply the ACL to an interface that requires hardware Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 429 IPv6 Information About IPv6 ACL forwarding (physical ports or SVIs), the switch checks to determine whether or not the ACL can be supported on the interface. If not, attaching the ACL is rejected. · If an ACL is applied to an interface and you attempt to add an access control entry (ACE) with an unsupported keyword, the switch does not allow the ACE to be added to the ACL that is currently attached to the interface Information About IPv6 ACL An access control list (ACL) is a set of rules used to limit access to a particular interface (for example, if you want to restrict a wireless client from pinging the management interface of the controller). ACLs are configured on the switchnd applied to the management interface, the AP-manager interface, any of the dynamic interfaces, or a WLAN to control data traffic to and from wireless clients or to the controller central processing unit (CPU) to control all traffic destined for the CPU. You can also create a preauthentication ACL for web authentication. Such an ACL is used to allow certain types of traffic before authentication is complete. IPv6 ACLs support the same options as IPv4 ACLs including source, destination, source and destination ports. Note You can enable only IPv4 traffic in your network by blocking IPv6 traffic. That is, you can configure an IPv6 ACL to deny all IPv6 traffic and apply it on specific or all WLANs. Understanding IPv6 ACLs A switch supports two types of IPv6 ACLs: · IPv6 router ACLs are supported on outbound or inbound traffic on Layer 3 interfaces, which can be routed ports, switch virtual interfaces (SVIs), or Layer 3 EtherChannels. IPv6 router ACLs apply only to IPv6 packets that are routed. · IPv6 port ACLs are supported on inbound traffic on Layer 2 interfaces only. IPv6 port ACLs are applied to all IPv6 packets entering the interface. A switch running the IP base feature set supports only input router IPv6 ACLs. It does not support port ACLs or output IPv6 router ACLs. Note If you configure unsupported IPv6 ACLs, an error message appears and the configuration does not take affect. The switch does not support VLAN ACLs (VLAN maps) for IPv6 traffic. You can apply both IPv4 and IPv6 ACLs to an interface. As with IPv4 ACLs, IPv6 port ACLs take precedence over router ACLs: · When an input router ACL and input port ACL exist in an SVI, packets received on ports to which a port ACL is applied are filtered by the port ACL. Routed IP packets received on other ports are filtered by the router ACL. Other packets are not filtered. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 430 IPv6 Types of ACL · When an output router ACL and input port ACL exist in an SVI, packets received on the ports to which a port ACL is applied are filtered by the port ACL. Outgoing routed IPv6 packets are filtered by the router ACL. Other packets are not filtered. Note If any port ACL (IPv4, IPv6, or MAC) is applied to an interface, that port ACL is used to filter packets, and any router ACLs attached to the SVI of the port VLAN are ignored. Related Topics Creating IPv6 ACL, on page 433 Applying an IPv6 to an Interface, on page 437 Creating WLAN IPv6 ACL, on page 438 Displaying IPv6 ACLs, on page 439 Types of ACL Per User IPv6 ACL For the per-user ACL, the full access control entries (ACE) as the text strings are configured on the ACS. The ACE is not configured on the Controller. The ACE is sent to the switch in the ACCESS-Accept attribute and applies it directly for the client. When a wireless client roams into an foreign switch, the ACEs are sent to the foreign switch as an AAA attribute in the mobility Handoff message. Filter ID IPv6 ACL For the filter-Id ACL, the full ACEs and the acl name(filter-id) is configured on the switch and only the filter-id is configured on the ACS. The filter-id is sent to the switch in the ACCESS-Accept attribute, and the switch looks up the filter-id for the ACEs, and then applies the ACEs to the client. When the client L2 roams to the foreign switch, only the filter-id is sent to the foreign switch in the mobility Handoff message. The foreign switch has to configure the filter-id and ACEs beforehand. Downloadable IPv6 ACL For the downloadable ACL(dACL), the full ACEs and the dacl name are all configured on the ACS only. Note The controller does not configure any ACL. The ACS sends the dacl name to the switch in its ACCESS-Accept attribute, which takes the dacl name and sends the dACL name back to the ACS, for the ACEs, using the access-request attribute. The ACS responds to the corresponding ACEs of the switch in the access-accept attribute. When the wireless client roams to an foreign switch, only the dacl name is sent to the foreign switch in the mobility Handoff message. The foreign switch contacts the ACS server with the dacl name to retrieve the ACEs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 431 IPv6 IPv6 ACLs and Switch Stacks IPv6 ACLs and Switch Stacks The stack master supports IPv6 ACLs in hardware and distributes the IPv6 ACLs to the stack members. Note For full IPv6 functionality in a switch stack, all stack members must be running the IP services feature set. If a new switch takes over as stack master, it distributes the ACL configuration to all stack members. The member switches sync up the configuration distributed by the new stack master and flush out entries that member switches sync up the configuration distributed by the new stack master and flush out entries that are not required. When an ACL is modified, attached to, or detached from an interface, the stack master distributes the change to all stack members. Configuring IPv6 ACLs To filter IPv6 traffic, you perform these steps: Before you begin Before configuring IPv6 ACLs, you must select one of the dual IPv4 and IPv6 SDM templates. SUMMARY STEPS 1. Create an IPv6 ACL, and enter IPv6 access list configuration mode. 2. Configure the IPv6 ACL to block (deny) or pass (permit) traffic. 3. Apply the IPv6 ACL to the interface where the traffic needs to be filtered. 4. Apply the IPv6 ACL to an interface. For router ACLs, you must also configure an IPv6 address on the Layer 3 interface to which the ACL is applied. DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Command or Action Purpose Create an IPv6 ACL, and enter IPv6 access list configuration mode. Configure the IPv6 ACL to block (deny) or pass (permit) traffic. Apply the IPv6 ACL to the interface where the traffic needs to be filtered. Apply the IPv6 ACL to an interface. For router ACLs, you must also configure an IPv6 address on the Layer 3 interface to which the ACL is applied. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 432 IPv6 Default IPv6 ACL Configuration Default IPv6 ACL Configuration There are no IPv6 ACLs configured or applied. Interaction with Other Features and Switches · If an IPv6 router ACL is configured to deny a packet, the packet is not routed. A copy of the packet is sent to the Internet Control Message Protocol (ICMP) queue to generate an ICMP unreachable message for the frame. · If a bridged frame is to be dropped due to a port ACL, the frame is not bridged. · You can create both IPv4 and IPv6 ACLs on a switch or switch stack, and you can apply both IPv4 and IPv6 ACLs to the same interface. Each ACL must have a unique name; an error message appears if you try to use a name that is already configured. You use different commands to create IPv4 and IPv6 ACLs and to attach IPv4 or IPv6 ACLs to the same Layer 2 or Layer 3 interface. If you use the wrong command to attach an ACL (for example, an IPv4 command to attach an IPv6 ACL), you receive an error message. · You cannot use MAC ACLs to filter IPv6 frames. MAC ACLs can only filter non-IP frames. · If the hardware memory is full, for any additional configured ACLs, packets are dropped to the CPU, and the ACLs are applied in software. When the hardware is full a message is printed to the console indicating the ACL has been unloaded and the packets will be dropped on the interface. Note Only packets of the same type as the ACL that could not be added (ipv4, ipv6, MAC) will be dropped on the interface. How To Configure an IPv6 ACL Creating IPv6 ACL Beginning in privileged EXEC mode, follow these steps to create an IPv6 ACL: SUMMARY STEPS 1. configure terminal 2. ipv6 access-list acl_name 3. {deny|permit} protocol 4. {deny|permit} tcp 5. {deny|permit} udp 6. {deny|permit} icmp 7. end 8. show ipv6 access-list 9. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 433 IPv6 Creating IPv6 ACL DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ipv6 access-list acl_name Example: ipv6 access-list access-list-name Use a name to define an IPv6 access list and enter IPv6 access-list configuration mode. Step 3 {deny|permit} protocol Enter deny or permit to specify whether to deny or permit Example: {deny | permit} protocol {source-ipv6-prefix/prefix-length | any | host the packet if conditions are matched. These are the conditions: · For protocol, enter the name or number of an Internet source-ipv6-address} [operator [port-number]]{destination-ipv6-prefix/prefix-length | any |host destination-ipv6-address} protocol: ahp, esp, icmp, ipv6, pcp, stcp, tcp, or udp, or an integer in the range 0 to 255 representing an IPv6 protocol number. [operator [port-number]][dscp value] [fragments][log] [log-input] [routing][sequence value] · The source-ipv6-prefix/prefix-length or destination-ipv6-prefix/ prefix-length is the source or [time-range name] destination IPv6 network or class of networks for which to set deny or permit conditions, specified in hexadecimal and using 16-bit values between colons (see RFC 2373). · Enter any as an abbreviation for the IPv6 prefix ::/0. · For host source-ipv6-address or destination-ipv6-address, enter the source or destination IPv6 host address for which to set deny or permit conditions, specified in hexadecimal using 16-bit values between colons. · (Optional) For operator, specify an operand that compares the source or destination ports of the specified protocol. Operands are lt (less than), gt (greater than), eq (equal), neq (not equal), and range. If the operator follows the source-ipv6-prefix/prefix-length argument, it must match the source port. If the operator follows the destination-ipv6- prefix/prefix-length argument, it must match the destination port. · (Optional) The port-number is a decimal number from 0 to 65535 or the name of a TCP or UDP port. You can use TCP port names only when filtering TCP. You can use UDP port names only when filtering UDP. · (Optional) Enter dscp value to match a differentiated services code point value against the traffic class value Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 434 IPv6 Creating IPv6 ACL Step 4 Step 5 Command or Action Purpose in the Traffic Class field of each IPv6 packet header. The acceptable range is from 0 to 63. · (Optional) Enter fragments to check noninitial fragments. This keyword is visible only if the protocol is ipv6. · (Optional) Enter log to cause an logging message to be sent to the console about the packet that matches the entry. Enter log-input to include the input interface in the log entry. Logging is supported only for router ACLs. · (Optional) Enter routing to specify that IPv6 packets be routed. · (Optional) Enter sequence value to specify the sequence number for the access list statement. The acceptable range is from 1 to 4294967295 · (Optional) Enter time-range name to specify the time range that applies to the deny or permit statement. {deny|permit} tcp (Optional) Define a TCP access list and the access Example: conditions. {deny | permit} tcp {source-ipv6-prefix/prefix-length | any | Enter tcp for Transmission Control Protocol. The parameters are the same as those described in Step 3, with these hostsource-ipv6-address} [operator additional optional parameters: [port-number]]{destination-ipv6-prefix/prefix-length · ack--Acknowledgment bit set. | any |hostdestination-ipv6-address} [operator [port-number]][ack] [dscp value][established] [fin] [log][log-input] [neq {port |protocol}] [psh] [range{port | protocol}] [rst][routing] [sequence · established--An established connection. A match occurs if the TCP datagram has the ACK or RST bits set. value] [syn] [time-range name][urg] · fin--Finished bit set; no more data from sender. · neq {port | protocol}--Matches only packets that are not on a given port number. · psh--Push function bit set. · range {port | protocol}--Matches only packets in the port number range. · rst--Reset bit set. · syn--Synchronize bit set. · urg--Urgent pointer bit set. {deny|permit} udp Example: (Optional) Define a UDP access list and the access conditions. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 435 IPv6 Creating IPv6 ACL Step 6 Step 7 Step 8 Step 9 Command or Action Purpose {deny | permit} udp Enter udp for the User Datagram Protocol. The UDP {source-ipv6-prefix/prefix-length | any | parameters are the same as those described for TCP, except hostsource-ipv6-address} [operator that the operator [port]] port number or name must be a [port-number]]{destination-ipv6-prefix/prefix-length UDP port number or name, and the established parameter | any | hostdestination-ipv6-address} is not valid for UDP. [operator [port-number]][dscp value] [log][log-input] [neq {port |protocol}] [range {port |protocol}] [routing][sequence value][time-range name] {deny|permit} icmp Example: {deny | permit} icmp {source-ipv6-prefix/prefix-length | any | hostsource-ipv6-address} [operator [port-number]] {destination-ipv6-prefix/prefix-length | any | hostdestination-ipv6-address} [operator [port-number]][icmp-type [icmp-code] |icmp-message] [dscpvalue] [log] [log-input] [routing] [sequence value][time-range name] (Optional) Define an ICMP access list and the access conditions. Enter icmp for Internet Control Message Protocol. The ICMP parameters are the same as those described for most IP protocols in Step 3a, with the addition of the ICMP message type and code parameters. These optional keywords have these meanings: · icmp-type--Enter to filter by ICMP message type, a number from 0 to 255. · icmp-code--Enter to filter ICMP packets that are filtered by the ICMP message code type, a number from 0 to 255. · icmp-message--Enter to filter ICMP packets by the ICMP message type name or the ICMP message type and code name. To see a list of ICMP message type names and code names, use the ? key or see command reference for this release. end Example: Switch(config)# end show ipv6 access-list Example: show ipv6 access-list copy running-config startup-config Example: copy running-config startup-config Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verify the access list configuration. (Optional) Save your entries in the configuration file. Related Topics Prerequisites for IPv6 ACL, on page 429 Understanding IPv6 ACLs, on page 430 Applying an IPv6 to an Interface, on page 437 Creating WLAN IPv6 ACL, on page 438 Displaying IPv6 ACLs, on page 439 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 436 IPv6 Applying an IPv6 to an Interface Applying an IPv6 to an Interface This section describes how to apply IPv6 ACLs to network interfaces. You can apply an IPv6 ACL to outbound or inbound traffic on layer 2 and Layer 3 interfaces. You can apply IPv6 ACLs only to inbound management traffic on Layer 3 interfaces. Beginning in privileged EXEC mode, follow these steps to control access to an interface: SUMMARY STEPS 1. configure terminal 2. interface interface_id 3. no switchport 4. ipv6 address ipv6_address 5. ipv6 traffic-filter acl_name 6. end 7. show running-config interface tenGigabitEthernet 1/0/3 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 interface interface_id Example: Switch# interface interface-id Identifies a Layer 2 interface (for port ACLs) or Layer 3 Switch Virtual interface (for router ACLs) on which to apply an access list, and enters interface configuration mode. Step 3 no switchport Example: Switch# no switchport Changes the interface from Layer 2 mode (the default) to Layer 3 mode (only if applying a router ACL). Step 4 ipv6 address ipv6_address Example: Switch# ipv6 address ipv6-address Configures an IPv6 address on a Layer 3 interface (for router ACLs). Note This command is not required on Layer 2 interfaces or if the interface has already been configured with an explicit IPv6 address. Step 5 ipv6 traffic-filter acl_name Example: Applies the access list to incoming or outgoing traffic on the interface. Switch# ipv6 traffic-filter access-list-name {in | out} Step 6 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 437 IPv6 Creating WLAN IPv6 ACL Step 7 Step 8 Command or Action Purpose show running-config interface tenGigabitEthernet 1/0/3 Shows the configuration summary. Example: Switch# show running-config interface tenGigabitEthernet 1/0/3 .......................... .......................... Building configuration ............ .......................... Current configuration : 98 bytes ! interface TenGigabitEthernet1/0/3 switchport mode trunk ipv6 traffic-filter MyFilter out end copy running-config startup-config Example: copy running-config startup-config (Optional) Saves your entries in the configuration file. Related Topics Creating IPv6 ACL, on page 433 Understanding IPv6 ACLs, on page 430 Creating WLAN IPv6 ACL, on page 438 Displaying IPv6 ACLs, on page 439 Creating WLAN IPv6 ACL SUMMARY STEPS 1. ipv6 traffic-filter acl acl_name 2. ipv6 traffic-filter acl web DETAILED STEPS Step 1 Command or Action ipv6 traffic-filter acl acl_name Example: Switch(config-wlan)# ipv6 traffic-filter acl <acl_name> Purpose Creates a named WLAN ACL. Step 2 ipv6 traffic-filter acl web Creates a pre-authentication for WLAN ACL. Example: Switch(config-wlan)# ipv6 traffic-filter acl web <acl_name-preauth> Switch(config-wlan)# ipv6 traffic-filter acl <acl_name> Switch(config-wlan)#ipv6 traffic-filter acl web <acl_name-preauth> Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 438 IPv6 Verifying IPv6 ACL Related Topics Creating IPv6 ACL, on page 433 Applying an IPv6 to an Interface, on page 437 Understanding IPv6 ACLs, on page 430 Displaying IPv6 ACLs, on page 439 Verifying IPv6 ACL Displaying IPv6 ACLs You can display information about all configured access lists, all IPv6 access lists, or a specific access list by using one or more of the privileged EXEC commands. Step 1 Step 2 Procedure Command or Action show access-list Example: Switch# show access-lists Purpose Displays all access lists configured on the switch show ipv6 access-list acl_name Example: Displays all configured IPv6 access list or the access list specified by name. Switch# show ipv6 access-list [access-list-name] Related Topics Creating IPv6 ACL, on page 433 Applying an IPv6 to an Interface, on page 437 Creating WLAN IPv6 ACL, on page 438 Understanding IPv6 ACLs, on page 430 Configuration Examples for IPv6 ACL Example: Creating IPv6 ACL This example configures the IPv6 access list named CISCO. The first deny entry in the list denies all packets that have a destination TCP port number greater than 5000. The second deny entry denies packets that have a source UDP port number less than 5000. The second deny also logs all matches to the console. The first permit entry in the list permits all ICMP packets. The second permit entry in the list permits all other traffic. The second permit entry is necessary because an implicit deny -all condition is at the end of each IPv6 access list. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 439 IPv6 Example: Applying IPv6 ACLs Note Logging is supported only on Layer 3 interfaces. Switch(config)# ipv6 access-list CISCO Switch(config-ipv6-acl)# deny tcp any any gt 5000 Switch (config-ipv6-acl)# deny ::/0 lt 5000 ::/0 log Switch(config-ipv6-acl)# permit icmp any any Switch(config-ipv6-acl)# permit any any Example: Applying IPv6 ACLs This example shows how to apply the access list Cisco to outbound traffic on a Layer 3 interface. Switch(config)# interface TenGigabitEthernet 1/0/3 Switch(config-if)# no switchport Switch(config-if)# ipv6 address 2001::/64 eui-64 Switch(config-if)# ipv6 traffic-filter CISCO out Example: Displaying IPv6 ACLs This is an example of the output from the show access-lists privileged EXEC command. The output shows all access lists that are configured on the switch or switch stack. Switch #show access-lists Extended IP access list hello 10 permit ip any any IPv6 access list ipv6 permit ipv6 any any sequence 10 This is an example of the output from the show ipv6 access-lists privileged EXEC command. The output shows only IPv6 access lists configured on the switch or switch stack. Switch# show ipv6 access-list IPv6 access list inbound permit tcp any any eq bgp (8 matches) sequence 10 permit tcp any any eq telnet (15 matches) sequence 20 permit udp any any sequence 30 IPv6 access list outbound deny udp any any sequence 10 deny tcp any any eq telnet sequence 20 Example: Configuring RA Throttling and NS Suppression This task describes how to create an RA throttle policy in order to help the power-saving wireless clients from being disturbed by frequent unsolicited periodic RA's. The unsolicited multicast RA is throttled by the controller. Before you begin Enable IPv6 on the client machine. SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 440 IPv6 Example: Configuring RA Throttling and NS Suppression 2. ipv6 nd ra-throttler policy Mythrottle 3. throttle-period 20 4. max-through 5 5. allow at-least 3 at-most 5 6. switch (config)# vlan configuration 100 7. ipv6 nd suppress 8. ipv6 nd ra-th attach-policy attach-policy_name 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ipv6 nd ra-throttler policy Mythrottle Example: Switch (config)# ipv6 nd ra-throttler policy Mythrottle Creates a RA throttler policy called Mythrottle. Step 3 throttle-period 20 Example: Determines the time interval segment during which throttling applies. Switch (config-nd-ra-throttle)# throttle-period 20 Step 4 max-through 5 Example: Switch (config-nd-ra-throttle)# max-through 5 Determines how many initial RA's are allowed. Step 5 allow at-least 3 at-most 5 Example: Switch (config-nd-ra-throttle)# allow at-least 3 at-most 5 Determines how many RA's are allowed after the initial RAs have been transmitted, until the end of the interval segment. Step 6 switch (config)# vlan configuration 100 Example: Switch (config)# vlan configuration 100 Creates a per vlan configuration. Step 7 ipv6 nd suppress Example: Switch (config)# ipv6 nd suppress Disables the neighbor discovery on the Vlan. Step 8 ipv6 nd ra-th attach-policy attach-policy_name Enables the router advertisement throttling. Example: Switch (config)# ipv6 nd ra-throttle attach-policy attach-policy_name Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 441 IPv6 Example: Configuring RA Guard Policy Step 9 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example: Configuring RA Guard Policy SUMMARY STEPS 1. ipv6 nd raguard policy MyPloicy 2. trusted-port 3. device-role router 4. interface tenGigabitEthernet 1/0/1 5. ipv6 nd raguard attach-policyMyPolicy 6. vlan configuration 19-21,23 7. ipv6 nd suppress 8. ipv6 snooping 9. ipv6 nd raguard attach-policy MyPolicy 10. ipv6 nd ra-throttler attach-policy Mythrottle DETAILED STEPS Step 1 Command or Action Purpose ipv6 nd raguard policy MyPloicy Example: Switch (config)# ipv6 nd raguard policy MyPolicy Step 2 trusted-port Example: Switch (config-nd-raguard)# trusted-port Configures the trusted port for the policy created above. Step 3 device-role router Example: Switch (config-nd-raguard)# device-role [host|monitor|router|switch] Switch (config-nd-raguard)# device-role router Defines the trusted device that can send RAs to the trusted port created above. Step 4 interface tenGigabitEthernet 1/0/1 Example: Switch (config)# interface tenGigabitEthernet 1/0/1 Configures the interface to the trusted device. Step 5 ipv6 nd raguard attach-policyMyPolicy Example: Configures and attaches the policy to trust the RA's received from the port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 442 IPv6 Example: Configuring IPv6 Neighbor Binding Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose Switch (config-if)# ipv6 nd raguard attach-policy Mypolicy vlan configuration 19-21,23 Example: Switch (config)# vlan configuration 19-21,23 Configures the wireless client vlans. ipv6 nd suppress Example: Switch (config-vlan-config)# ipv6 nd suppress Suppresses the ND messages over wireless. ipv6 snooping Example: Switch (config-vlan-config)# ipv6 snooping Captures IPv6 traffic. ipv6 nd raguard attach-policy MyPolicy Example: Switch (config-vlan-config)# ipv6 nd raguard attach-policy Mypolicy Attaches the RA Guard policy to the wireless client vlans. ipv6 nd ra-throttler attach-policy Mythrottle Example: Attaches the RA throttling policy to the wireless client vlans. Switch (config-vlan-config)#ipv6 nd ra-throttler attach-policy Mythrottle Example: Configuring IPv6 Neighbor Binding SUMMARY STEPS 1. ipv6 neighbor binding [vlan ]19 2001:db8::25:4 interface tenGigabitEthernet 1/0/3 aaa.bbb.ccc DETAILED STEPS Step 1 Command or Action Purpose ipv6 neighbor binding [vlan ]19 2001:db8::25:4 Sets and validates the neighbor 2001:db8::25: 4 only valid interface tenGigabitEthernet 1/0/3 aaa.bbb.ccc when transmitting on VLAN 19 through interface te1/0/3 Example: with the source mac-address as aaa.bbb.ccc. Switch (config)# ipv6 neighbor binding vlan 19 2001:db8::25:4 interface tenGigabitEthernet 1/0/3 aaa.bbb.ccc Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 443 IPv6 Additional References Additional References Related Documents Related Topic Document Title IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches) ACL configuration Security Configuration Guide (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for IPv6 ACLs This table lists the features in this module and provides links to specific configuration information: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 444 IPv6 Feature IPv6 ACL Functionality Feature Information for IPv6 ACLs Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 445 IPv6 Feature Information for IPv6 ACLs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 446 2 4 C H A P T E R Configuring IPv6 Web Authentication · Prerequisites for IPv6 Web Authentication, on page 447 · Restrictions for IPv6 Web Authentication, on page 447 · Information About IPv6 Web Authentication, on page 448 · How to Configure IPv6 Web Authentication, on page 449 · Verifying IPv6 Web Authentication, on page 454 · Additional References , on page 456 · Feature Information for IPv6 Web Authentication, on page 456 Prerequisites for IPv6 Web Authentication The following configurations must be in place before you start with IPv6 Web Authentication: · IPv6 Device Tracking. · IPv6 DHCP Snooping. · Disable security of type 802.1x on the wlan. · Each WLAN must have a vlan associated to it. · Change the default wlan setting from shutdown to no shutdown. Related Topics Enabling Security on the WLAN, on page 450 Restrictions for IPv6 Web Authentication The following restrictions are implied when using IPv6 web authentication: Related Topics Enabling Security on the WLAN, on page 450 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 447 IPv6 Information About IPv6 Web Authentication Information About IPv6 Web Authentication Web authentication is a Layer 3 security feature and the switch disallows IP traffic (except DHCP and DNS -related packets) from a particular client until it supplies a valid username and password. It is a simple authentication method without the need for a supplicant or client utility. Web authentication is typically used by customers who deploy a guest-access network. Traffic from both, HTTP and HTTPS, page is allowed to display the login page. Note Web authentication does not provide data encryption and is typically used as simple guest access for either a hot spot or campus atmosphere, where connectivity is always a factor. A WLAN is configured as security webauth for web based authentication. The switch supports the following types of web based authentication: · Web Authentication The client enters the credentials in a web page which is then validated by the Wlan controller. · Web Consent The Wlan controller presents a policy page with Accept/Deny buttons. Click Accept button to access the network. A Wlan is typically configured for open authentication, that is without Layer 2 authentication, when web-based authentication mechanism is used. Web Authentication Process The following events occur when a WLAN is configured for web authentication: · The user opens a web browser and enters a URL address, for example, http://www.example.com. The client sends out a DNS request for this URL to get the IP address for the destination. The switch bypasses the DNS request to the DNS server, which in turn responds with a DNS reply that contains the IP address of the destination www.example.com. This, in turn, is forwarded to the wireless clients. · The client then tries to open a TCP connection with the destination IP address. It sends out a TCP SYN packet destined to the IP address of www.example.com. · The switch has rules configured for the client and cannot act as a proxy for www.example.com. It sends back a TCP SYN-ACK packet to the client with source as the IP address of www.example.com. The client sends back a TCP ACK packet in order to complete the three-way TCP handshake and the TCP connection is fully established. · The client sends an HTTP GET packet destined to www.example.com. The switch intercepts this packet and sends it for redirection handling. The HTTP application gateway prepares an HTML body and sends it back as the reply to the HTTP GET requested by the client. This HTML makes the client go to the default web-page of the switch, for example, http://<Virtual-Server-IP>/login.html. · The client closes the TCP connection with the IP address, for example, www.example.com. · If the client wants to go to virtual IP, the client tries to open a TCP connection with the virtual IP address of the switch. It sends a TCP SYN packet for virtual IP to the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 448 IPv6 How to Configure IPv6 Web Authentication · The switch responds back with a TCP SYN-ACK and the client sends back a TCP ACK to the switch in order to complete the handshake. · The client sends an HTTP GET for /login.html destined to virtual IP in order to request for the login page. · This request is allowed to the web server of the switch, and the server responds with the default login page. The client receives the login page in the browser window where the user can log in. Related Topics Disabling WPA, on page 449 Enabling Security on the WLAN, on page 450 Enabling a Parameter Map on the WLAN, on page 451 Enabling Authentication List on WLAN, on page 451 Configuring a Global WebAuth WLAN Parameter Map, on page 451 Configuring the WLAN, on page 452 Enabling IPv6 in Global Configuration Mode, on page 453 Verifying the Parameter Map, on page 454 Verifying Authentication List, on page 455 How to Configure IPv6 Web Authentication Disabling WPA Before you begin Disable 802.1x. A typical web authentication does not use Layer 2 security. Use this configuration to remove Layer 2 security. SUMMARY STEPS 1. configure terminal 2. wlan test1 2 test1 3. no security wpa DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 wlan test1 2 test1 Example: Creates a WLAN and assign an SSID to it. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 449 IPv6 Enabling Security on the WLAN Step 3 Command or Action Switch(config)# wlan test1 2 test1 no security wpa Example: Switch(config-wlan)# no security wpa Purpose Disables the WPA support for Wlan. What to do next Enable the following: · Security Web Authentication. · Parameter Local. · Authentication List. Related Topics Web Authentication Process, on page 448 Enabling Security on the WLAN SUMMARY STEPS 1. parameter-map type web-auth global 2. virtual-ip ipv4 192.0.2.1 3. virtual-ip ipv6 2001:db8::24:2 DETAILED STEPS Step 1 Command or Action Purpose parameter-map type web-auth global Applies the parameter map to all the web-auth wlans. Example: Switch(config)# parameter-map type web-auth global Step 2 virtual-ip ipv4 192.0.2.1 Example: Switch(config-params-parameter-map)# virtual-ip ipv4 192.0.2.1 Defines the virtual gateway IPv4 address. Step 3 virtual-ip ipv6 2001:db8::24:2 Example: Switch(config-params-parameter-map)# virtual-ip ipv6 2001:db8::24:2 Defines the virtual gateway IPv6 address. Related Topics Prerequisites for IPv6 Web Authentication, on page 447 Restrictions for IPv6 Web Authentication, on page 447 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 450 IPv6 Enabling a Parameter Map on the WLAN Web Authentication Process, on page 448 Enabling a Parameter Map on the WLAN SUMMARY STEPS 1. security web-auth parameter-map <mapname> DETAILED STEPS Step 1 Command or Action security web-auth parameter-map <mapname> Example: Switch(config-wlan)# security web-auth parameter-map webparalocal Purpose Enables web authentication for the wlan and creates a parameter map. Related Topics Web Authentication Process, on page 448 Enabling Authentication List on WLAN SUMMARY STEPS 1. security web-auth authentication-list webauthlistlocal DETAILED STEPS Step 1 Command or Action security web-auth authentication-list webauthlistlocal Example: Switch(config-wlan)# security web-auth Purpose Enables web authentication for the wlan and creates a local web authentication list. Related Topics Web Authentication Process, on page 448 Configuring a Global WebAuth WLAN Parameter Map Use this example to configure a global web auth WLAN and add a parameter map to it. SUMMARY STEPS 1. parameter-map type webauth global 2. virtual-ip ipv6 2001:db8:4::1 3. ratelimit init-state-sessions 120 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 451 IPv6 Configuring the WLAN 4. max-https-conns 70 DETAILED STEPS Step 1 Command or Action Purpose parameter-map type webauth global Example: Configures a global webauth and adds a parameter map to it. Switch (config)# parameter-map type webauth global Step 2 virtual-ip ipv6 2001:db8:4::1 Example: Defines a virtual gateway IP address that appears to the wireless clients for authentication. Switch (config-params-parameter-map)# virtual-ip ipv6 2001:db8:4::1 Step 3 ratelimit init-state-sessions 120 Example: Switch (config-params-parameter-map)# ratelimit init-state-sessions 120 Sets the global ratelimit to limit the bandwidth that the web clients can use on the switch to avoid over-flooding attacks. Step 4 max-https-conns 70 Example: Switch (config-params-parameter-map)# max-http-conns 70 Sets the maximum number of attempted http connections on the switch to avoid over-flooding atatcks. Related Topics Web Authentication Process, on page 448 Configuring the WLAN, on page 452 Configuring the WLAN Before you begin · The WLAN must have a Vlan associated with it. By default, a new Wlan is always associated with Vlan 1, which can be changed as per the configuration requirements. · Configure and enable the WLAN to no shutdown. By default, the Wlan is configured with the shutdown parameter and is disabled. SUMMARY STEPS 1. wlan 1 2. client vlan interface ID 3. security web-auth authentication list webauthlistlocal 4. security web-auth parameter-map global 5. no security wpa 6. no shutdown 7. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 452 IPv6 Enabling IPv6 in Global Configuration Mode DETAILED STEPS Step 1 Command or Action Purpose wlan 1 Creates a wlan and assign an SSID to it. Example: Switch(config-wlan)# wlan 1 name vicweb ssid vicweb Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 client vlan interface ID Example: Switch(config-wlan)# client vlan VLAN0136 security web-auth authentication list webauthlistlocal Example: Switch(config-wlan)# security web-auth authentication-list webauthlistlocal security web-auth parameter-map global Example: Switch(config-wlan)# security web-auth parameter-map global no security wpa Example: Switch(config-wlan)# no security wpa no shutdown Example: Switch(config-wlan)# no shutdown end Example: Switch(config)# end Assigns the client to vlan interface. Configures web authentication for the wlan. Configures the parameter map on the wlan. Configures the security policy for a wlan. This enables the wlan. Configures and enables the Wlan. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Configuring a Global WebAuth WLAN Parameter Map, on page 451 Web Authentication Process, on page 448 Enabling IPv6 in Global Configuration Mode, on page 453 Enabling IPv6 in Global Configuration Mode Enable IPv6 in global configuration for web authentication. SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 453 IPv6 Verifying IPv6 Web Authentication 2. web-auth global 3. virtual IPv6 DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 web-auth global Example: Globally configures the parameter map type as web authentication. Switch(config)# parameter-map type webauth global Step 3 virtual IPv6 Example: Switch(config-params-parameter-map)# virtual-ip ipv6 Selects IPv6 as the virtaul IP for web authentication. Note You can also select IPv4 as the preferred IP for web authentication. Related Topics Configuring the WLAN, on page 452 Web Authentication Process, on page 448 Verifying the Parameter Map, on page 454 Verifying IPv6 Web Authentication Verifying the Parameter Map Use the show running configuration command to verify the parameter map configured for Wlan. SUMMARY STEPS 1. show running config DETAILED STEPS Step 1 Command or Action show running config Example: Switchshow running config Purpose Displays the entire running configuration for the switch. Grep for parameter map to view the result. wlan alpha 2 alpha no security wpa no security wpa akm dot1x no security wpa wpa2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 454 IPv6 Verifying Authentication List no security wpa wpa2 ciphers aes security web-auth security web-auth authentication-list webauthlistlocal security web-auth parameter-map webparalocal Related Topics Enabling IPv6 in Global Configuration Mode, on page 453 Web Authentication Process, on page 448 Verifying Authentication List, on page 455 Verifying Authentication List Use the show running configuration command to verify the authentication list configured for the Wlan. SUMMARY STEPS 1. show running configuration 2. end DETAILED STEPS Step 1 Command or Action show running configuration Example: Switch#show running-config Step 2 end Example: Switch(config)# end Purpose Displays the Wlan configuration. Switch# show running-config Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Switch#show running-config .................................. .................................. .................................. wlan alpha 2 alpha no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes security web-auth security web-auth authentication-list webauthlistlocal security web-auth parameter-map webparalocal .................................. .................................. .................................. Related Topics Verifying the Parameter Map, on page 454 Web Authentication Process, on page 448 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 455 IPv6 Additional References Additional References Related Documents Related Topic Document Title IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches) Web Authentication configuration Security Configuration Guide (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for IPv6 Web Authentication This table lists the features in this module and provides links to specific configuration information: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 456 IPv6 Feature Information for IPv6 Web Authentication Feature IPv6 Web Authentication Functionality Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 457 IPv6 Feature Information for IPv6 Web Authentication Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 458 2 5 C H A P T E R Configuring IPv6 Client Mobility · Prerequisites for IPv6 Client Mobility, on page 459 · Restrictions For IPv6 Client Mobility, on page 459 · Information About IPv6 Client Mobility, on page 460 · Verifying IPv6 Client Mobility, on page 463 · Monitoring IPv6 Client Mobility, on page 463 · Additional References, on page 464 · Feature Information For IPv6 Client Mobility, on page 465 Prerequisites for IPv6 Client Mobility To enable wireless IPv6 client connectivity, the underlying wired network must support IPv6 routing and an address assignment mechanism such as SLAAC or DHCPv6. The switch must have L2 adjacency to the IPv6 router, and the VLAN needs to be tagged when the packets enter the switch. APs do not require connectivity on an IPv6 network, as all traffic is encapsulated inside the IPv4 CAPWAP tunnel between the AP and switch. Restrictions For IPv6 Client Mobility · When using the IPv6 Client Mobility, clients must support IPv6 with either static stateless auto configuration (such as Windows XP clients) or stateful DHCPv6 IP addressing (such as Windows 7 clients). · To allow smooth operation of stateful DHCPv6 IP addressing, you must have a switch or router that supports the DHCP for IPv6 feature (such as the switch) that is configured to act like a DHCPv6 server, or you need a dedicated server such as a Windows 2008 server with a built-in DHCPv6 server. Cisco Catalyst 3850 switch and Cisco Catalyst 5700 switch can act as (internal) a DHCPv6 server. Note To load the SDM IPv6 template in the Cisco Catalyst 3850 switch, enter the sdm prefer dual-ipv4 and v6 default command and then reset the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 459 IPv6 Information About IPv6 Client Mobility Information About IPv6 Client Mobility The Switch supports IPv6 mobility for IPv6-only or dual-stack nodes. The IPv6 Client Mobility is divided into: · Link Layer and · Network Layer The link layer is handled by the 802.11 protocol which enables the client to roam to any AP in the same BSS (basic service set) identified by the same SSID without losing the link layer connectivity. However, link layer mobility is not enough to make wireless client Layer 3 applications continue to work seamlessly while roaming. Cisco IOSd's wireless mobility module uses mobility tunneling to retain seamless connectivity for the client's Layer 3 PoP (point of presence) when the client roams across different subnets on different switches. IPv6 is the next-generation network layer Internet protocol intended to replace IPv4 in the TCP/IP suite of protocols. This new version increases the internet global address space to accommodate users and applications that require unique global IP addresses. IPv6 incorporates 128-bit source and destination addresses, which provide significantly more addresses than the 32-bit IPv4 addresses. To support IPv6 clients across controllers, ICMPv6 messages must be dealt with specially to ensure the IPv6 client remains on the same Layer 3 network. The switch keep track of IPv6 clients by intercepting the ICMPv6 messages to provide seamless mobility and protect the network from network attacks. The NDP (neighbor discovery packets) packets are converted from multicast to unicast and delivered individually per client. This unique solution ensures that Neighbor Discovery and Router Advertisement packets are not leaked across Vlans. Clients can receive specific Neighbor Discovery and Router Advertisement packets ensuring correct IPv6 addressing and avoids unnecessary multicast traffic. The configuration for IPv6 mobility is the same as IPv4 mobility and requires no separate software on the client side to achieve seamless roaming. The switch must be part of the same mobility group. Both IPv4 and IPv6 client mobility are enabled by default. IPv6 client mobility is used for the following: · Retaining the client IPv6 multiple addresses in Layer-2 and Layer-3 roaming. · IPv6 Neighbor Discovery Prootcol (NDP) packet management. · Client IPv6 addresses learning. Using Router Advertisment The Neighbor Discovery Protocol(NDP) operates in the link-layer and is responsible for the discovery of other nodes on the link. It determines the link-layer addresses of other nodes, finds the available routers, and maintains reachability information about the paths to other active neighbor nodes. Router Advertisement (RA) is one of the IPv6 Neighbor Discovery Protocol (NDP) packets that is used by the hosts to discover available routers, acquire the network prefix to generate the IPv6 addresses, link MTU, and so on. The routers send RA on a regular basis, or in response to hosts Router Solicitation messages. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 460 IPv6 RA Throttling and NS suppression IPv6 wireless client mobility manages the IPv6 RA packet . The converged access switch forwards the link-local all-nodes multicast RA packets to the local and roaming wireless nodes mapped on same VLAN the RA was received on. Figure 1 illustrates the link-local all-nodes mcast RA forwarding issue in the wireless node mobility. Figure 19: Roaming Client Receiving Invalid RA from Router 2 Figure 2 illustrates how a roaming client "MN" receives RA from VLAN 200 in a foreign switch and how it acquires an new IP address and breaks into L3 mobility's point of presence. Figure 20: Roaming Client Receives Valid RA from Router 1 Related Topics Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463 RA Throttling and NS suppression To safeguard the power-saving wireless clients form being disturbed by frequent unsolicited periodic RAs, the controller can throttle the unsolicited multicast RA. Related Topics Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 461 IPv6 IPv6 Address Learning IPv6 Address Learning There are three ways for IPv6 client to acquire IPv6 addresses: · Stateless Address Auto-Configuration (SLAAC) · Stateful DHCPv6 · Static configuration For these methods, the IPv6 client always sends NS DAD (duplicate address detection) to ensure that there is no duplicated IP address on the network. The switch snoops the clients NDP and DHCPv6 packets to learn about its client IP addresses and then updates the controllers database. The database then informs the controller for the clients new IP address. Related Topics Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463 Handling Multiple IP Addresses In the case when the new IP address is received after RUN state, whether an addition or removal, the controller updates the new IP addresses on its local database for display purposes. Essentially, the IPv6 uses the existing or same PEM state machine code flow as in IPv4. When the IP addresses are requested by external entities, for example, from Prime Infrastructure, the controller will include all the available IP addresses, IPv4 and IPv6, in the API/SPI interface to the external entities. An IPv6 client can acquire multiple IP addresses from stack for different purposes. For example, a link-local address for link local traffic, and a routable unique local or global address. When the client is in the DHCP request state and the controller receives the first IP address notification from the database for either an IPv4 or IPv6 address, the PEM moves the client into the RUN state. When a new IP address is received after the RUN state, either for addition or removal, the controller updates the new IP addresses on its local database for display purposes. When the IP addresses are requested by external entities, for example, from Prime Infrastructure, the controller provides the available IP addresses, both IPv4 and IPv6, to the external entities. Related Topics Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463 IPv6 Configuration The switch supports IPv6 client as seamlessly as the IPv4 clients. The administrator must manually configure the Vlans to enable the IPV6, IPv6's snooping and throttling functionality. This will enable the NDP packets to throttle between the switch and its various clients Related Topics Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 462 IPv6 High Availability High Availability The switch will sync with the wireless clients when the clients IP address is hard to learn. When a switchover happens, the IPv6 neighbor binding table is synced to standby state. However, the wireless client will itself disassociate and reassociate to a new active state once the switchover is complete and the neighbor binding table is updated with latest information for that client. If, during the reassociation, the client moves to another AP then the original entry in the binding table is marked as down for sometime and will be aged-out. For the new entries joining the switch from another AP, the new IP address is learned and notified to the controller's database. Note This feature is available only for the Cisco Catalyst 3850 Switch. Related Topics Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463 Verifying IPv6 Client Mobility The commands listed in the Table 1 applies to the IPv6 client mobility. Table 47: Commands for Verifying IPv6 Client Mobility on Cisco 5760 WLC Command debug mobility ipv6 debug client mac-address (mac-addr) Description Enables all the wireless client IPv6 mobility debugs. Displays wireless client debugging. Enter a MAC address for debugging information. Related Topics Using Router Advertisment, on page 460 RA Throttling and NS suppression, on page 461 IPv6 Address Learning, on page 462 Handling Multiple IP Addresses, on page 462 IPv6 Configuration, on page 462 Monitoring IPv6 Client Mobility, on page 463 High Availability, on page 463 Monitoring IPv6 Client Mobility The commands in Table 2 are used to monitor IPv6 Client mobility on the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 463 IPv6 Additional References Table 48: Monitoring IPv6 Client Mobility Commands Commands show wireless client summary show wireless client mac-address (mac-addr) Description Displays the wireless specific configuration of active clients. Displays the wireless specific configuration of active clients based on their MAC address. Related Topics Verifying IPv6 Client Mobility, on page 463 Using Router Advertisment, on page 460 RA Throttling and NS suppression, on page 461 IPv6 Address Learning, on page 462 Handling Multiple IP Addresses, on page 462 IPv6 Configuration, on page 462 High Availability, on page 463 Additional References Related Documents Related Topic Document Title IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches) Mobility configuration Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 464 IPv6 Feature Information For IPv6 Client Mobility Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information For IPv6 Client Mobility This table lists the features in this module and provides links to specific configuration information: Feature Release Modification IPv6 Client Mobility Functionality Cisco IOS XE 3.3SE This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 465 IPv6 Feature Information For IPv6 Client Mobility Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 466 2 6 C H A P T E R Configuring IPv6 Mobility · Pre-requisites for IPv6 Mobility, on page 467 · Information About IPv6 Mobility, on page 467 · How to Configure IPv6 Mobility, on page 468 · Monitoring IPv6 Mobility, on page 468 · Additional References, on page 470 · Feature Information for IPv6 Mobility, on page 471 Pre-requisites for IPv6 Mobility The mobility and its related infrastructure must be configured and ready for use. Information About IPv6 Mobility Mobility, or roaming, is a wireless LAN client's ability to maintain its association seamlessly from one access point to another securely and with as little latency as possible. This section explains how mobility works whenswitch are included in a wireless network. When a wireless client associates and authenticates to an access point, the access point's switch places an entry for that client in its client database. This entry includes the client's MAC and IP addresses, security context and associations, quality of service (QoS) contexts, the WLAN, and the associated access point. The switch uses this information to forward frames and manage traffic to and from the wireless client. When the wireless client moves its association from one access point to another, the switch simply updates the client database with the newly associated access point. If necessary, new security context and associations are established as well. The process becomes more complicated, however, when a client roams from an access point joined to one switch to an access point joined to a different switch. It also varies based on whether theswitch are operating on the same subnet. Inter Controller Roaming When the client associates to an access point joined to a new switch, the new switch exchanges mobility messages with the original switch, and the client database entry is moved to the new switch if sticky anchoring is disabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 467 IPv6 Intra Subnet Roaming with Sticky Anchoring, and Inter Subnet Roaming Related Topics Monitoring IPv6 Mobility, on page 468 Intra Subnet Roaming with Sticky Anchoring, and Inter Subnet Roaming Inter-subnet roaming is similar to inter-controller roaming in that the switch exchange mobility messages on the client roam. However, instead of moving the client database entry to the new switch, the original switch marks the client with an "Anchor" entry in its own client database. The database entry is copied to the new switch client database and marked with a "Foreign" entry in the new switch. The roam remains transparent to the wireless client, and the client maintains its original IP address. In inter-subnet roaming, WLANs on both anchor and foreign switch need to have the same network access privileges and no source-based routing or source-based firewalls in place. Otherwise, the clients may have network connectivity issues after the handoff. For more information on configuring mobility see, the Cisco 5700 Wireless LAN Controller Mobility Configuration Guide, Cisco IOS XE, Release 3.2SE. Related Topics Monitoring IPv6 Mobility, on page 468 How to Configure IPv6 Mobility Monitoring IPv6 Mobility This chapter displays the mobility related IPv6 configuration. To see the mobility related configurations refer to the Cisco 5700 Wireless LAN Controller Mobility Configuration Guide, Cisco IOS XE 3.2SE. SUMMARY STEPS 1. show ipv6 neighbors binding mac C0C1.C06B.C4E2 DETAILED STEPS Step 1 Command or Action Purpose show ipv6 neighbors binding mac C0C1.C06B.C4E2 Displays the IPv6 related mobility configurations. Example: Switch# show ipv6 neighbors binding mac C0C1.C06B.C4E2 Example Switch# show ipv6 neighbors binding mac C0C1.C06B.C4E2 Binding Table has 45 entries, 37 dynamic (limit 100) Codes: L - Local, S - Static, ND - Neighbor Discovery, DH - DHCP, PKT - Other Packet, API - API created Preflevel flags (prlvl): 0001:MAC and LLA match 0002:Orig trunk 0004:Orig access Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 468 IPv6 Monitoring IPv6 Mobility 0008:Orig trusted trunk 0040:Cga authenticated 0010:Orig trusted access 0020:DHCP assigned 0080:Cert authenticated 0100:Statically assigned IPv6 address state Time left L FE80:20:25::16 REACHABLE L FE80:20:24::16 REACHABLE L FE80:20:23::16 REACHABLE ND FE80:20:23::13 REACHABLE 223 s try 0 ND FE80:20:22::17 REACHABLE 92 s try 0 L FE80:20:22::16 REACHABLE ND FE80:20:22::13 REACHABLE 136 s try 0 ND FE80:20:22::12 REACHABLE 281 s try 0 ND FE80:20:22::2 REACHABLE 295 s try 0 ND FE80:20:21::17 REACHABLE 60 s try 0 L FE80:20:21::16 REACHABLE ND FE80:20:21::13 REACHABLE 252 s try 0 ND FE80:20:21::12 REACHABLE 297 s ND FE80:20:21::2 REACHABLE 307 s try 0 ND FE80::F866:8BE0:12E4:39CF REACHABLE 89 s try 0 ND FE80::6D0A:DB33:D69E:91C7 REACHABLE 171 s try 0 ND FE80::985:8189:9937:BB05 REACHABLE 287 s ND FE80::20:24:13 REACHABLE 145 s try 0 L 2001:20:23::16 REACHABLE DH 2001:20:22:0:C96C:AF29:5DDC:2689 REACHABLE 286 s try 0(16574 DH 2001:20:22:0:A46B:90B2:F0DB:F952 STALE 32401 s DH 2001:20:22:0:7DFD:14EC:B1E4:1172 STALE 24394 s DH 2001:20:22:0:7CB3:D6DD:FD6A:50F STALE 29195 s DH 2001:20:22:0:6D32:AF24:FDE1:2504 STALE 118821 s DH 2001:20:22:0:5106:5AD:FE98:A2F0 STALE 31362 s ND 2001:20:22::201:13 REACHABLE 264 s try 0 L 2001:20:22::16 REACHABLE ND 2001:20:22::13 REACHABLE 131 s try 0 ND 2001:20:22::2 REACHABLE 274 s try 0 Link-Layer addr Interface vlan prlvl age 2037.064C.BA71 Vl25 25 0100 3137mn 2037.064C.BA41 Vl24 24 0100 3137mn 2037.064C.BA44 Vl23 23 0100 3137mn 2037.0653.6BC4 Te1/0/1 23 0005 85s 2037.064D.06F6 Te1/0/1 22 0005 3mn 2037.064C.BA76 Vl22 22 0100 3137mn 2037.0653.6BF6 Te1/0/1 22 0005 165s 2037.064C.94F6 Te1/0/1 22 0005 23s 0022.550E.8FC3 Te1/0/1 22 0005 18s 2037.064D.06E8 Te1/0/1 21 0005 4mn 2037.064C.BA68 Vl21 21 0100 3137mn 2037.0653.6BE8 Te1/0/1 21 0005 57s 2037.064C.94E8 Te1/0/1 21 0005 4s 0022.550E.8FC2 Te1/0/1 21 0005 2s C0C1.C06B.C4E2 Ca4 21 0005 3mn 0050.B606.A6CE Te1/0/1 22 0005 135s 8CA9.8295.09CC Ca0 21 0005 15s 2037.0653.6BC1 Te1/0/1 24 0005 155s 2037.064C.BA44 Vl23 23 0100 3137mn 0050.B606.A6CE Te1/0/1 22 0024 19s 0050.B606.A6CE Te1/0/1 22 0024 2339mn 0050.B606.A6CE Te1/0/1 22 0024 2339mn 0050.B606.A6CE Te1/0/1 22 0024 2333mn 0050.B606.A6CE Te1/0/1 22 0024 509mn 0050.B606.A6CE Te1/0/1 22 0024 2328mn 0050.B606.A6CE Te1/0/1 22 0005 49s 2037.064C.BA76 Vl22 22 0100 3137mn 2037.0653.6BF6 Te1/0/1 22 0005 175s 0022.550E.8FC3 Te1/0/1 22 0005 28s Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 469 IPv6 Additional References ND 2001:20:21:0:F866:8BE0:12E4:39CF REACHABLE 21 s try 0 ND 2001:20:21:0:C085:9D4C:4521:B777 REACHABLE 290 s try 0 ND 2001:20:21:0:6233:4BFF:FE1A:744C REACHABLE 108 s try 0 ND 2001:20:21:0:447E:745D:2F48:1C68 REACHABLE 276 s ND 2001:20:21:0:3920:DDE8:B29:AD51 REACHABLE 87 s try 0 ND 2001:20:21:0:1016:A333:FAD5:6E66 REACHABLE 18 s try 0 ND 2001:20:21:0:C42:E317:BA9B:EB17 REACHABLE 61 s try 0 ND 2001:20:21:0:985:8189:9937:BB05 REACHABLE 173 s try 0 ND 2001:20:21::201:20 REACHABLE 43 s try 0 ND 2001:20:21::17 REACHABLE 50 s try 0 L 2001:20:21::16 REACHABLE ND 2001:20:21::13 REACHABLE 237 s try 0 ND 2001:20:21::12 REACHABLE 512 ms try 0 ND 2001:20:21::2 REACHABLE 294 s try 0 C0C1.C06B.C4E2 Ca4 0021.CC73.AA17 Te1/0/1 6033.4B1A.744C Ca4 8CA9.8295.09CC Ca0 C0C1.C06B.C4E2 Ca4 0021.CC73.AA17 Te1/0/1 6033.4B1A.744C Ca4 8CA9.8295.09CC Ca0 0021.CC73.AA17 Te1/0/1 2037.064D.06E8 Te1/0/1 2037.064C.BA68 Vl21 2037.0653.6BE8 Te1/0/1 2037.064C.94E8 Te1/0/1 0022.550E.8FC2 Te1/0/1 21 0005 4mn 21 0005 11s 21 0005 3mn 21 0005 34s 21 0005 3mn 21 0005 4mn 21 0005 4mn 21 0005 135s 21 0005 4mn 21 0005 4mn 21 0100 3137mn 21 0005 67s 21 0005 5mn 21 0005 12s Related Topics Inter Controller Roaming, on page 467 Intra Subnet Roaming with Sticky Anchoring, and Inter Subnet Roaming, on page 468 Additional References Related Documents Related Topic Document Title IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches) Mobility configurations Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 470 IPv6 Feature Information for IPv6 Mobility MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for IPv6 Mobility This table lists the features in this module and provides links to specific configuration information: Feature Release Modification IPv6 Mobility Functionality Cisco IOS XE 3.3SE This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 471 IPv6 Feature Information for IPv6 Mobility Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 472 2 7 C H A P T E R Configuring IPv6 NetFlow · Prerequisites For IPv6 Netflow, on page 473 · Restrictions For IPv6 Netflow, on page 473 · Information About IPv6 Netflow, on page 474 · How To Configure IPv6 Netflow, on page 475 · Verifying IPv6 Netflow, on page 486 · Monitoring IPv6 Netflow, on page 486 · Additional References, on page 486 · Feature Information for IPv6 NetFlow, on page 487 Prerequisites For IPv6 Netflow The networking device must be running a Cisco IOSd release that supports Cisco IOS Flexible NetFlow. IPv6 Traffic · One of the following must be enabled on your router and on any interfaces on which you want to enable Flexible NetFlow: · Cisco Express Forwarding IPv6 or · Distributed Cisco Express Forwarding IPv6. Restrictions For IPv6 Netflow The following restrictions apply to IPv6 Netflow configurations: · Locally generated traffic (traffic that is generated by the router, Cisco WLC 5760, on which the Flexible NetFlow Output Accounting feature is configured) is not counted as flow traffic for the Output Flexible NetFlow Accounting feature. · The Flexible NetFlow Output Accounting feature counts CEF-switched packets only. Process switched transit packets are not counted. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 473 IPv6 Information About IPv6 Netflow Information About IPv6 Netflow NetFlow is a monitoring feature used on customer applications for network monitoring, user monitoring and profiling, network planning, security analysis, billing and accounting, and data warehousing and mining. You can use Flexible NetFlow on uplink ports to monitor user-defined flows, collect flow statistics, and perform per-flow policing. It collects and exports flow statistics to a collector device. Note Flexible NetFlow is supported only on the Catalyst 3750-X and 3560-X switch running the IP base or IP services feature set and equipped with the network services module. It is not supported on switches running the NPE or the LAN base image. Note Not all of the Flexible NetFlow commands in the command reference are available on the switch. Unsupported commands are either not visible or generate an error message if entered. Understanding Flexible Netflow With Flexible NetFlow, traffic is processed and packets are classified into flows. New flows are inserted in the NetFlow table, and statistics are automatically updated. You must configure both ingress and egress NetFlow monitoring. The network services module supports one monitor per interface per direction. Flexible NetFlow consists of the following components: · Records-- These are combinations of key and non-key fields assigned to monitor Flexible NetFlow monitors to define the cache used to store data. · Flow monitors-- These are applied to interfaces to perform network traffic monitoring. A flow monitor includes a user-defined record, an optional flow exporter, and a cache that is automatically created when the monitor is applied to the first interface. The switch supports normal caches that age out according to settings. · Flow exporters-- These export the data in the flow monitor cache to a remote system, such as a server running NetFlow collector. · Flow samplers-- These reduce the load that Flexible NetFlow puts on the networking device to monitor traffic by limiting the number of packets that are analyzed. You can configure unidirectional flow (destination or source-address based flows), and flow aging. The following features are supported on the network services module: · Configuring collection statistics for Layer 2-switched (non-routing) traffic, Layer 3 (CAPWAP) IPv4 and IPv6 traffic, and Layer 4 TCP, IGMP, and ICMP traffic. · NetFlow counting, maintenance, troubleshooting (debugging commands). · NetFlow analysis is performed on traffic crossing the physical interfaces on the network services module. The switch processes egress (outbound) traffic after forwarding decisions are performed. Locally switched or routed traffic is forced through service module ports by configuring private VLANs or protected ports. The following NetFlow characteristics are not supported: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 474 IPv6 IPv6 Netflow IPv6 Netflow · Netflow-5 protocol · Predefined flow records · ISL · Policy-based NetFlow · Cisco TrustSec monitoring Though other modules that can be installed in the switch have 1-Gigabit and 10-Gigabit uplink interfaces, NetFlow is supported only on the network services module. Flexible Netflow (FNF) allows the user to define a flow record (a particular set of key, non-key, counter and time-stamp fields of interest) that is optimal for a particular application by selecting the fields from a big collection of pre-defined fields, using CLI configuration commands. The collection of the pre-defined fields includes the following fields: · Data-link layer (L2) header fields · IPv6 header fields · Transport layer (L4) header fields · Application layer (L5) header fields · Routing attributes (generic, IPv4, IPv6) · Interface fields · Counter fields · Timestamp fields Related Topics Configuring a Customized Flow Record , on page 475 Configuring the Flow Exporters , on page 478 Configuring a Customized Flow Monitor, on page 480 Applying a Flow Monitor to an Interface, on page 482 Configuring and Enabling Flow Sampling , on page 484 How To Configure IPv6 Netflow Configuring a Customized Flow Record You can match the following fields for the flow record: · IPv4 or IPv6 destination address · Datalink fields, to identify Layer 2 source and destination address and VLAN for traffic entering or leaving the interfaces, providing the MAC address of the directly connected host. Class of Service (CoS) and Ethertype datalink header fields are also available. · Transport field source and destination ports, to identify the type of application: ICMP, IGMP, or TCP traffic. You can collect the following fields for the flow record: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 475 IPv6 Configuring a Customized Flow Record · The total number of bytes, flows or packets sent by the exporter (exporter) or the number of bytes or packets in a 64-bit counter (long). The timestamp based on system uptime from the time the first packet was sent or from the time the most recent (last) packet was seen. · The SNMP index of the input or output interface. The interface for traffic entering or leaving the service module is based on the switch forwarding cache. This field is typically used in conjunction with datalink, IPv4, and IPv6 addresses, and provides the actual first-hop interface for directly connected hosts. · A value of 0 means that interface information is not available in the cache. · Some NetFlow collectors require this information in the flow record. The following steps configure the customized flow record: SUMMARY STEPS 1. configure terminal 2. flow record recordname 3. description description 4. match{ipv4 | ipv6}{destination | hop-limit | protocol | source | traffic-class| version} address 5. match datalink [dot1q | ethertype | mac | vlan] 6. match transport [destination-port | icmp | source-port] 7. match interface [input |output] 8. match flow direction 9. collect counter {bytes [ layer2 | long] | packets [ long]} 10. collect timestamp absolute [first | last] 11. collect interface [input | output] 12. collect transport tcp flags {ack | cwr | ece | fin | psh | rst | syn | urg} 13. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 flow record recordname Example: Switch(config)# flow record TestRecordName Step 3 description description Example: Switch(config-flow-record)# description SampleNetflowDescription Step 4 match{ipv4 | ipv6}{destination | hop-limit | protocol | source | traffic-class| version} address Example: Purpose Enters global configuration mode. Creates a flow record and enters Flexible NetFlow flow record configuration mode. This command can also modify an existing flow record. (Optional) Creates a description for the flow record. Configures key ipv4 and ipv6 fields for the flow record. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 476 IPv6 Configuring a Customized Flow Record Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action Purpose Switch(config-flow-record)# match ipv6 destination address match datalink [dot1q | ethertype | mac | vlan] Configures key datalink (layer 2) fields for the flow record. Example: Switch(config-flow-record)# match datalink [dot1q | ethertype | mac | vlan] match transport [destination-port | icmp | source-port] Example: Switch(config-flow-record)# match transport [destination-port | icmp | source-port] Configures key transport layer fields for the flow record. match interface [input |output] Configures key interface fields for the flow record. Example: Switch(config-flow-record)# match interface input match flow direction Configures key flow identity fields for the flow record. Example: Switch(config-flow-record)# match flow direction collect counter {bytes [ layer2 | long] | packets [ long]} Configures the counter key field for the flow record. Example: Switch(config-flow-record)#collect counter bytes layer2 long collect timestamp absolute [first | last] Example: Switch(config-flow-record)# collect timestamp absolute [first | last ] Configures the timestamp key field for the flow record. collect interface [input | output] Example: Switch(config-flow-record)# collect interface [input | output] Configures the interface key field for the flow record. collect transport tcp flags {ack | cwr | ece | fin | psh | rst Configures transports tcp flag fields for the flow record. | syn | urg} Example: Switch(config-flow-record)# collect transport tcp flags ack end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 477 IPv6 Configuring the Flow Exporters Example Switch(config)# flow record Switch(config-flow-record)# description record to monitor network traffic Switch(config-flow-record)# match ipv6 destination address Switch(config-flow-record)# match datalink [dot1q | ethertype | mac | vlan] Switch(config-flow-record)# match transport [destination-port | icmp |igmp | source-port] Switch(config-flow-record)# match interface input Switch(config-flow-record)# match flow direction Switch(config-flow-record)#collect counter bytes layer2 long Switch(config-flow-record)# collect timestamp absolute first Switch(config-flow-record)# collect interface [input | output] Switch(config-flow-record)# collect transport tcp flags ack Switch(config-flow-record)# end Related Topics IPv6 Netflow, on page 475 Configuring the Flow Exporters , on page 478 Configuring a Customized Flow Monitor, on page 480 Applying a Flow Monitor to an Interface, on page 482 Configuring and Enabling Flow Sampling , on page 484 Configuring the Flow Exporters The following steps are used to configure the NetFlow exporter. Note The optional export-protocol flow exporter configuration command specifies the NetFlow export protocol used by the exporter. The switch supports only netflow-v9. Though visible in the CLI help, netflow-5 is not supported. SUMMARY STEPS 1. configure terminal 2. flow exporter exporter-name 3. description description 4. destination {hostname | ip-address} vrf vrf-name 5. dscp <0-63> 6. source interface-id 7. option {exporter-stats | interface-table | sampler-table} timeout seconds] 8. export-protocolnetflow-v9 9. template data timeout seconds 10. transport udp udp-port 11. ttl seconds 12. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 478 IPv6 Configuring the Flow Exporters DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 flow exporter exporter-name Example: Switch(config)# flow exporter TestNetFlowExporterName Creates the flow exporter and enters Flexible NetFlow flow exporter configuration mode. This command can also modify an existing flow exporter. Step 3 description description Example: Switch(config-flow-exporter)# description SampleNetFlowExporterDescription (Optional) Configures a description for the exporter that appears in the configuration and in the display of the show flow exporter command. Step 4 destination {hostname | ip-address} vrf vrf-name Example: Switch(config-flow-exporter)# destination 198.51.100.120 vrf SampleVrfName (Optional) Configures the flow exports destination. Step 5 dscp <0-63> Example: Switch(config-flow-exporter)# dscp 23 (Optional) Configures differentiated services code point (DSCP) parameters for datagrams sent by the exporter. The DSCP range is from 0 to 63. The default is 0. Step 6 source interface-id (Optional) Specifies the local interface from which the Example: exporter uses the IP address as the source IP address for exported datagrams. Switch(config-flow-exporter)# source { Auto-Template|Capwap|GigabitEthernet|GroupVI|InternalInterface|Loopback|Null|Port-channel|TenGigabitEthernet|Tunnel|Vlan} Step 7 option {exporter-stats | interface-table | sampler-table} timeout seconds] Example: Switch(config-flow-exporter)# option exporter-stats timeout 600 (Optional) Configures options data parameters for the exporter. You can configure all three options concurrently. The range for the timeout is 1 to 86400 seconds. The default is 600. Step 8 export-protocolnetflow-v9 Example: Switch(config-flow-exporter)# export-protocol netflow-v9 Configures export-protocol parameters for the exporter. Step 9 template data timeout seconds Example: Switch(config-flow-exporter)# template data timeout 600 Switch(config-flow-exporter)# (Optional) Configures re-sending of templates based on a timeout. The range is 1 to 86400 seconds (86400 seconds equals 24 hours). The default is 600. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 479 IPv6 Configuring a Customized Flow Monitor Step 10 Step 11 Step 12 Command or Action transport udp udp-port Example: Switch(config-flow-exporter)# transport udp 67 Purpose Specifies the UDP port on which the destination system is listening for exported datagrams. The range for udp-port is from 1 to 65536. ttl seconds Example: Switch(config-flow-exporter)# ttl 100 (Optional) Configures the time-to-live (TTL) value for datagrams sent by the exporter. The range is from 1 to 255 seconds. The default is 255. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Switch(config)# flow exporter QoS-Collector Switch(config-flow-exporter)# description QoS Collector Bldg 19 Switch(config-flow-exporter)# destination 172.20.244.28 Switch(config-flow-exporter)# source vlan 1 Switch(config-flow-exporter)# dscp 3 Switch(config-flow-exporter)# transport udp 2055 Switch(config-flow-exporter)# end What to do next Configuring a Customized Flow Monitor. Related Topics Configuring a Customized Flow Record , on page 475 IPv6 Netflow, on page 475 Configuring a Customized Flow Monitor, on page 480 Applying a Flow Monitor to an Interface, on page 482 Configuring and Enabling Flow Sampling , on page 484 Configuring a Customized Flow Monitor The following steps are used to configure a NetFlow monitor. SUMMARY STEPS 1. configure terminal 2. flow monitor monitor -name 3. description description 4. record {TestNetflowRecordName|TestRecord} 5. cache {timeout [active| inactive|update] (seconds) | type (normal)} 6. cache {timeout [active| inactive|update] (seconds) | type (normal)} 7. exporter TestNetFlowExporterName Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 480 IPv6 Configuring a Customized Flow Monitor 8. cache {timeout [active| inactive|update] (seconds) | type (normal)} 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 flow monitor monitor -name Example: Switch(config)# flow monitor SampleMonitorName Creates a flow monitor and enters Flexible NetFlow flow monitor configuration mode. You can also use this command to modify an existing flow monitor. Step 3 description description Example: Switch(config-flow-monitor)# Description SampleNetFlowMonitorName (Optional) Configures a description for the flow monitor. Step 4 record {TestNetflowRecordName|TestRecord} Example: Switch(config-flow-monitor)#record TestNetflowRecordName Specifies the record for the flow monitor. Step 5 cache {timeout [active| inactive|update] (seconds) | type (normal)} Example: Switch(config-flow-monitor)# cache type normal (Optional) Modifies the flow monitor cache parameters such as timeout values, number of cache entries, and the cache type. · timeout active seconds--Configures the active flow timeout. This defines the granularity of the traffic analysis. The range is from 1 to 604800 seconds. The default is 1800. Typical values are 60 or 300 seconds. See the Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters document for recommended values. · type normal--Configures normal flow removal from the flow cache. Note Although visible in the command line help, the entries keyword and inactive and update timeouts are not supported. Step 6 cache {timeout [active| inactive|update] (seconds) | type (normal)} Example: Switch(config-flow-monitor)# cache type normal Repeat step 5 to configure additional cache parameters for the flow monitor. Step 7 exporter TestNetFlowExporterName Example: (Optional) Specifies the name of an exporter that was created previously. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 481 IPv6 Applying a Flow Monitor to an Interface Step 8 Step 9 Command or Action Switch(config-flow-monitor)# exporter TestNetFlowExporterName Purpose cache {timeout [active| inactive|update] (seconds) | type (normal)} Example: Switch(config-flow-monitor)# cache type normal Repeat step 5 to configure additional cache parameters for the flow monitor. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Switch(config)# flow monitor FLOW-MONITOR-1 Switch(config-flow-monitor)# Used for ipv6 traffic analysis Switch(config-flow-monitor)# record FLOW-RECORD-1 Switch(config-flow-monitor)# cache timeout active 300 Switch(config-flow-monitor)# cache type normal Switch(config-flow-monitor)# exporter EXPORTER-1 Switch(config-flow-monitor)# exit What to do next Apply a flow monitor to an interface Related Topics Configuring a Customized Flow Record , on page 475 Configuring the Flow Exporters , on page 478 IPv6 Netflow, on page 475 Applying a Flow Monitor to an Interface, on page 482 Configuring and Enabling Flow Sampling , on page 484 Applying a Flow Monitor to an Interface The following are used to configure a NetFlow monitor to an interface. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. wlan ssid 4. [ ip | ipv6 | datalink] flow monitor monitor -name sampler [sampler | input | output] 5. exit 6. Repeat steps 2 and 3 7. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 482 IPv6 Applying a Flow Monitor to an Interface DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 interface interface-id Identifies an interface and enters interface configuration Example: mode. Flexible Net Flow is supported only on the service module 1-Gigabit or 10-Gigabit Ethernet interfaces. Switch(config)# interface tengigabitEthernet 1/0/1 Note You cannot attach a NetFlow monitor to a port channel interface. If both service module interfaces are part of an EtherChannel, you should attach the monitor to both physical interfaces. Step 3 wlan ssid Example: Switch (config)# wlan test 1 test Configures the flow monitor on WLAN. Step 4 [ ip | ipv6 | datalink] flow monitor monitor Activates a previously created flow monitor by assigning -name sampler [sampler | input | output] it to the interface to analyze incoming or outgoing traffic. Example: Switch(config-if)# ipv6 flow monitor SampleMonitorName input · ip--Enters record matching IPv4 IP addresses. · ipv6--Enters record matching IPv6 IP addresses. Note This keyword is visible only when the dual IPv4 and IPv6 Switch Database Management (SDM) template is configured on the switch. · input--Applies the flow monitor on input traffic. · output--Applies the flow monitor on output traffic. · sampler--(Optional) Applies the flow monitor sampler. Step 5 exit Example: Switch(config-if)# exit Switch(config)# Returns to global configuration mode. Step 6 Repeat steps 2 and 3 Example: Configures additional cache parameters for the flow monitor. Step 7 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 483 IPv6 Configuring and Enabling Flow Sampling Example Switch(config)# interface tengigabitethernet 1/0/1 Switch(config-if)# ip flow monitor FLOW-MONITOR-1 input Switch(config-if)# ip flow monitor FLOW-MONITOR-2 output Switch(config-if)# end Related Topics Configuring a Customized Flow Record , on page 475 Configuring the Flow Exporters , on page 478 Configuring a Customized Flow Monitor, on page 480 IPv6 Netflow, on page 475 Configuring and Enabling Flow Sampling , on page 484 Configuring and Enabling Flow Sampling The following steps are used to configure and enable flow sampling. SUMMARY STEPS 1. configure terminal 2. sampler sampler -name 3. description description 4. mode {deterministic|random} (<1-1> )out-of <2-1024> 5. end 6. interface interface-id 7. wlan ssid 8. {ip | ipv6 | datalink] flow monitor monitor-name sampler sampler-name {input | output} 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 sampler sampler -name Example: Switch(config)# sampler SampleNameForSAMPLER Creates a flow monitor and enters Flexible NetFlow sampler configuration mode. You can also use this command to modify an existing sampler. Step 3 description description (Optional) Configures a description for the sampler. Example: Switch(config-sampler)#description SamplerName_1 Step 4 mode {deterministic|random} (<1-1> )out-of <2-1024> Specifies the mode and window size from which to select packets. The window size range is from 2 to 1024. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 484 IPv6 Configuring and Enabling Flow Sampling Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Example: Switch(config-sampler)#mode random 1 out-of 2 Purpose Note Although visible in the CLI help, the mode deterministic keyword is not supported. end Example: Switch(config-sampler)# end Returns to global configuration mode. interface interface-id Example: Identifies an interface and enters interface configuration mode. Switch(config)# interface tengigabitethernet 1/0/1 wlan ssid Example: Switch(config)# wlan test 1 test Configures to apply flow sampler on WLAN. {ip | ipv6 | datalink] flow monitor monitor-name sampler sampler-name {input | output} Activates a previously created IPv4 or IPv6 flow monitor by assigning it to the interface to analyze traffic. Example: Switch(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLE-1 input end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Switch(config)# sampler SAMPLER-1 Switch(config-sampler)# description Sample at 50 Switch(config-sampler)# mode random 1 out-of 2 Switch(config-sampler)# exit Switch(config)# interface tengigabitethernet 1/0/1 Switch(config)# wlan test 1 test Switch(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLE-1 input What to do next How to configure netflow v9 for IPv6. Related Topics Configuring a Customized Flow Record , on page 475 Configuring the Flow Exporters , on page 478 Configuring a Customized Flow Monitor, on page 480 Applying a Flow Monitor to an Interface, on page 482 IPv6 Netflow, on page 475 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 485 IPv6 Verifying IPv6 Netflow Verifying IPv6 Netflow This section describes the Netflow related show commands for IPv6. The following commands can be used to verify Netflow on the switch. Command show flow record Purpose Displays the status of the flow records. show flow ssid <ssid_name> Displays SSID interface information. show flow monitor {monitor name} {cache|provisioning|statistics} Displays the flow monitor information. show flow exporter exporter-name Displays the status of a flow exporter. show flow monitor monitor -name Displays the current status of a flow monitor. show flow interface interface-id Verifies that the Flexible NetFlow is configured on the interface. show flow monitor monitor -name cache format Displays data in the flow monitor cache. [csv | record | table} show sampler sampler -name Displays the current status of a flow sampler. Monitoring IPv6 Netflow This section describes the Netflow commands for IPv6.The following commands can be used to monitor Netflow on the switch. Command show running-config flow record Purpose Displays the configured flow records. show running-config flow exporter exporter-name Verifies the configured flow exporter. show running-config flow monitor monitor -name Verifies the flow monitor configuration. Additional References Related Documents Related Topic Document Title IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches) Flexible NetFlow command reference Cisco Flexible NetFlow Command Reference (Catalyst 3650 Switches) Flexible NetFlow configuration Cisco Flexible NetFlow Configuration Guide (Catalyst 3650 Switches) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 486 IPv6 Feature Information for IPv6 NetFlow Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for IPv6 NetFlow This table lists the features in this module and provides links to specific configuration information: Feature Release Modification IPv6 NetFlow Functionality Cisco IOS XE 3.3SE This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 487 IPv6 Feature Information for IPv6 NetFlow Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 488 V I P A R T Layer 2/3 · Configuring Spanning Tree Protocol, on page 491 · Configuring Multiple Spanning-Tree Protocol, on page 519 · Configuring Optional Spanning-Tree Features, on page 553 · Configuring EtherChannels, on page 577 · Configuring Flex Links and the MAC Address-Table Move Update Feature, on page 611 · Configuring UniDirectional Link Detection, on page 629 2 8 C H A P T E R Configuring Spanning Tree Protocol · Finding Feature Information, on page 491 · Restrictions for STP, on page 491 · Information About Spanning Tree Protocol, on page 492 · How to Configure Spanning-Tree Features, on page 504 · Monitoring Spanning-Tree Status, on page 515 · Additional References for Spanning-Tree Protocol, on page 516 · Feature Information for STP, on page 517 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for STP · An attempt to configure a switch as the root switch fails if the value necessary to be the root switch is less than 1. · If your network consists of switches that support and do not support the extended system ID, it is unlikely that the switch with the extended system ID support will become the root switch. The extended system ID increases the switch priority value every time the VLAN number is greater than the priority of the connected switches running older software. · The root switch for each spanning-tree instance should be a backbone or distribution switch. Do not configure an access switch as the spanning-tree primary root. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Related Topics Configuring the Root Switch (CLI), on page 506 Bridge ID, Device Priority, and Extended System ID, on page 494 Spanning-Tree Topology and BPDUs, on page 492 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 491 Information About Spanning Tree Protocol Layer 2/3 Accelerated Aging to Retain Connectivity, on page 500 Information About Spanning Tree Protocol Spanning Tree Protocol Spanning Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing loops in the network. For a Layer 2 Ethernet network to function properly, only one active path can exist between any two stations. Multiple active paths among end stations cause loops in the network. If a loop exists in the network, end stations might receive duplicate messages. Switches might also learn end-station MAC addresses on multiple Layer 2 interfaces. These conditions result in an unstable network. Spanning-tree operation is transparent to end stations, which cannot detect whether they are connected to a single LAN segment or a switched LAN of multiple segments. The STP uses a spanning-tree algorithm to select one switch of a redundantly connected network as the root of the spanning tree. The algorithm calculates the best loop-free path through a switched Layer 2 network by assigning a role to each port based on the role of the port in the active topology: · Root--A forwarding port elected for the spanning-tree topology · Designated--A forwarding port elected for every switched LAN segment · Alternate--A blocked port providing an alternate path to the root bridge in the spanning tree · Backup--A blocked port in a loopback configuration The switch that has all of its ports as the designated role or as the backup role is the root switch. The switch that has at least one of its ports in the designated role is called the designated switch. Spanning tree forces redundant data paths into a standby (blocked) state. If a network segment in the spanning tree fails and a redundant path exists, the spanning-tree algorithm recalculates the spanning-tree topology and activates the standby path. Switches send and receive spanning-tree frames, called bridge protocol data units (BPDUs), at regular intervals. The switches do not forward these frames but use them to construct a loop-free path. BPDUs contain information about the sending switch and its ports, including switch and MAC addresses, switch priority, port priority, and path cost. Spanning tree uses this information to elect the root switch and root port for the switched network and the root port and designated port for each switched segment. When two ports on a switch are part of a loop, the spanning-tree and path cost settings control which port is put in the forwarding state and which is put in the blocking state. The spanning-tree port priority value represents the location of a port in the network topology and how well it is located to pass traffic. The path cost value represents the media speed. Note By default, the switch sends keepalive messages (to ensure the connection is up) only on interfaces that do not have small form-factor pluggable (SFP) modules. You can change the default for an interface by entering the [no] keepalive interface configuration command with no keywords. Spanning-Tree Topology and BPDUs The stable, active spanning-tree topology of a switched network is controlled by these elements: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 492 Layer 2/3 Spanning-Tree Topology and BPDUs · The unique bridge ID (switch priority and MAC address) associated with each VLAN on each switch. In a switch stack, all switches use the same bridge ID for a given spanning-tree instance. · The spanning-tree path cost to the root switch. · The port identifier (port priority and MAC address) associated with each Layer 2 interface. When the switches in a network are powered up, each functions as the root switch. Each switch sends a configuration BPDU through all of its ports. The BPDUs communicate and compute the spanning-tree topology. Each configuration BPDU contains this information: · The unique bridge ID of the switch that the sending switch identifies as the root switch · The spanning-tree path cost to the root · The bridge ID of the sending switch · Message age · The identifier of the sending interface · Values for the hello, forward delay, and max-age protocol timers When a switch receives a configuration BPDU that contains superior information (lower bridge ID, lower path cost, and so forth), it stores the information for that port. If this BPDU is received on the root port of the switch, the switch also forwards it with an updated message to all attached LANs for which it is the designated switch. If a switch receives a configuration BPDU that contains inferior information to that currently stored for that port, it discards the BPDU. If the switch is a designated switch for the LAN from which the inferior BPDU was received, it sends that LAN a BPDU containing the up-to-date information stored for that port. In this way, inferior information is discarded, and superior information is propagated on the network. A BPDU exchange results in these actions: · One switch in the network is elected as the root switch (the logical center of the spanning-tree topology in a switched network). See the figure following the bullets. For each VLAN, the switch with the highest switch priority (the lowest numerical priority value) is elected as the root switch. If all switches are configured with the default priority (32768), the switch with the lowest MAC address in the VLAN becomes the root switch. The switch priority value occupies the most significant bits of the bridge ID, as shown in the following figure. · A root port is selected for each switch (except the root switch). This port provides the best path (lowest cost) when the switch forwards packets to the root switch. When selecting the root port on a switch stack, spanning tree follows this sequence: · Selects the lowest root bridge ID · Selects the lowest path cost to the root switch · Selects the lowest designated bridge ID · Selects the lowest designated path cost · Selects the lowest port ID Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 493 Bridge ID, Device Priority, and Extended System ID Layer 2/3 · Only one outgoing port on the stack root switch is selected as the root port. The remaining switches in the stack become its designated switches (Switch 2 and Switch 3) as shown in the following figure. · The shortest distance to the root switch is calculated for each switch based on the path cost. · A designated switch for each LAN segment is selected. The designated switch incurs the lowest path cost when forwarding packets from that LAN to the root switch. The port through which the designated switch is attached to the LAN is called the designated port. Figure 21: Spanning-Tree Port States in a Switch Stack One stack member is elected as the stack root switch. The stack root switch contains the outgoing root port (Switch1). All paths that are not needed to reach the root switch from anywhere in the switched network are placed in the spanning-tree blocking mode. Related Topics Configuring the Root Switch (CLI), on page 506 Restrictions for STP, on page 491 Bridge ID, Device Priority, and Extended System ID The IEEE 802.1D standard requires that each switch has an unique bridge identifier (bridge ID), which controls the selection of the root switch. Because each VLAN is considered as a different logical bridge with PVST+ and Rapid PVST+, the same switch must have a different bridge ID for each configured VLAN. Each VLAN on the switch has a unique 8-byte bridge ID. The 2 most-significant bytes are used for the switch priority, and the remaining 6 bytes are derived from the switch MAC address. The switch supports the IEEE 802.1t spanning-tree extensions, and some of the bits previously used for the switch priority are now used as the VLAN identifier. The result is that fewer MAC addresses are reserved for Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 494 Layer 2/3 Port Priority Versus Path Cost the switch, and a larger range of VLAN IDs can be supported, all while maintaining the uniqueness of the bridge ID. The 2 bytes previously used for the switch priority are reallocated into a 4-bit priority value and a 12-bit extended system ID value equal to the VLAN ID. Table 49: Device Priority Value and Extended System ID Priority Value Extended System ID (Set Equal to the VLAN ID) Bit Bit Bit Bit Bit Bit Bit Bit 9 Bit 8 Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 16 15 14 13 12 11 10 32768 16384 8192 4096 2048 1024 512 256 128 64 32 16 8 4 2 1 Spanning tree uses the extended system ID, the switch priority, and the allocated spanning-tree MAC address to make the bridge ID unique for each VLAN. Because the switch stack appears as a single switch to the rest of the network, all switches in the stack use the same bridge ID for a given spanning tree. If the stack master fails, the stack members recalculate their bridge IDs of all running spanning trees based on the new MAC address of the new stack master. Support for the extended system ID affects how you manually configure the root switch, the secondary root switch, and the switch priority of a VLAN. For example, when you change the switch priority value, you change the probability that the switch will be elected as the root switch. Configuring a higher value decreases the probability; a lower value increases the probability. If any root switch for the specified VLAN has a switch priority lower than 24576, the switch sets its own priority for the specified VLAN to 4096 less than the lowest switch priority. 4096 is the value of the least-significant bit of a 4-bit switch priority value as shown in the table. Related Topics Configuring the Root Switch (CLI), on page 506 Restrictions for STP, on page 491 Configuring the Root Switch (CLI), on page 538 Root Switch, on page 522 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Port Priority Versus Path Cost If a loop occurs, spanning tree uses port priority when selecting an interface to put into the forwarding state. You can assign higher priority values (lower numerical values) to interfaces that you want selected first and lower priority values (higher numerical values) that you want selected last. If all interfaces have the same priority value, spanning tree puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces. The spanning-tree path cost default value is derived from the media speed of an interface. If a loop occurs, spanning tree uses cost when selecting an interface to put in the forwarding state. You can assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last. If all interfaces have the same cost value, spanning tree puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces. If your switch is a member of a switch stack, you must assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last instead of adjusting its port priority. For details, see Related Topics. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 495 Spanning-Tree Interface States Layer 2/3 Related Topics Configuring Port Priority (CLI), on page 508 Configuring Path Cost (CLI), on page 510 Spanning-Tree Interface States Propagation delays can occur when protocol information passes through a switched LAN. As a result, topology changes can take place at different times and at different places in a switched network. When an interface transitions directly from nonparticipation in the spanning-tree topology to the forwarding state, it can create temporary data loops. Interfaces must wait for new topology information to propagate through the switched LAN before starting to forward frames. They must allow the frame lifetime to expire for forwarded frames that have used the old topology. Each Layer 2 interface on a switch using spanning tree exists in one of these states: · Blocking--The interface does not participate in frame forwarding. · Listening--The first transitional state after the blocking state when the spanning tree decides that the interface should participate in frame forwarding. · Learning--The interface prepares to participate in frame forwarding. · Forwarding--The interface forwards frames. · Disabled--The interface is not participating in spanning tree because of a shutdown port, no link on the port, or no spanning-tree instance running on the port. An interface moves through these states: · From initialization to blocking · From blocking to listening or to disabled · From listening to learning or to disabled · From learning to forwarding or to disabled · From forwarding to disabled Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 496 Layer 2/3 Figure 22: Spanning-Tree Interface States Blocking State Blocking State An interface moves through the states. When you power up the switch, spanning tree is enabled by default, and every interface in the switch, VLAN, or network goes through the blocking state and the transitory states of listening and learning. Spanning tree stabilizes each interface at the forwarding or blocking state. When the spanning-tree algorithm places a Layer 2 interface in the forwarding state, this process occurs: 1. The interface is in the listening state while spanning tree waits for protocol information to move the interface to the blocking state. 2. While spanning tree waits for the forward-delay timer to expire, it moves the interface to the learning state and resets the forward-delay timer. 3. In the learning state, the interface continues to block frame forwarding as the switch learns end-station location information for the forwarding database. 4. When the forward-delay timer expires, spanning tree moves the interface to the forwarding state, where both learning and frame forwarding are enabled. A Layer 2 interface in the blocking state does not participate in frame forwarding. After initialization, a BPDU is sent to each switch interface. A switch initially functions as the root until it exchanges BPDUs with other switches. This exchange establishes which switch in the network is the root or root switch. If there is only one switch in the network, no exchange occurs, the forward-delay timer expires, and the interface moves to the listening state. An interface always enters the blocking state after switch initialization. An interface in the blocking state performs these functions: · Discards frames received on the interface · Discards frames switched from another interface for forwarding · Does not learn addresses · Receives BPDUs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 497 Listening State Layer 2/3 Listening State The listening state is the first state a Layer 2 interface enters after the blocking state. The interface enters this state when the spanning tree decides that the interface should participate in frame forwarding. An interface in the listening state performs these functions: · Discards frames received on the interface · Discards frames switched from another interface for forwarding · Does not learn addresses · Receives BPDUs Learning State A Layer 2 interface in the learning state prepares to participate in frame forwarding. The interface enters the learning state from the listening state. An interface in the learning state performs these functions: · Discards frames received on the interface · Discards frames switched from another interface for forwarding · Learns addresses · Receives BPDUs Forwarding State A Layer 2 interface in the forwarding state forwards frames. The interface enters the forwarding state from the learning state. An interface in the forwarding state performs these functions: · Receives and forwards frames received on the interface · Forwards frames switched from another interface · Learns addresses · Receives BPDUs Disabled State A Layer 2 interface in the disabled state does not participate in frame forwarding or in the spanning tree. An interface in the disabled state is nonoperational. A disabled interface performs these functions: · Discards frames received on the interface · Discards frames switched from another interface for forwarding · Does not learn addresses · Does not receive BPDUs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 498 Layer 2/3 How a Switch or Port Becomes the Root Switch or Root Port How a Switch or Port Becomes the Root Switch or Root Port If all switches in a network are enabled with default spanning-tree settings, the switch with the lowest MAC address becomes the root switch. Figure 23: Spanning-Tree Topology Switch A is elected as the root switch because the switch priority of all the switches is set to the default (32768) and Switch A has the lowest MAC address. However, because of traffic patterns, number of forwarding interfaces, or link types, Switch A might not be the ideal root switch. By increasing the priority (lowering the numerical value) of the ideal switch so that it becomes the root switch, you force a spanning-tree recalculation to form a new topology with the ideal switch as the root. When the spanning-tree topology is calculated based on default parameters, the path between source and destination end stations in a switched network might not be ideal. For instance, connecting higher-speed links to an interface that has a higher number than the root port can cause a root-port change. The goal is to make the fastest link the root port. For example, assume that one port on Switch B is a Gigabit Ethernet link and that another port on Switch B (a 10/100 link) is the root port. Network traffic might be more efficient over the Gigabit Ethernet link. By changing the spanning-tree port priority on the Gigabit Ethernet port to a higher priority (lower numerical value) than the root port, the Gigabit Ethernet port becomes the new root port. Related Topics Configuring Port Priority (CLI), on page 508 Spanning Tree and Redundant Connectivity Figure 24: Spanning Tree and Redundant Connectivity You can create a redundant backbone with spanning tree by connecting two switch interfaces to another device or to two different devices. Spanning tree automatically disables one interface but enables it if the other one fails. If one link is high-speed and the other is low-speed, the low-speed link is always disabled. If the speeds Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 499 Spanning-Tree Address Management Layer 2/3 are the same, the port priority and port ID are added together, and spanning tree disables the link with the highest value. You can also create redundant links between switches by using EtherChannel groups. Spanning-Tree Address Management IEEE 802.1D specifies 17 multicast addresses, ranging from 0x00180C2000000 to 0x0180C2000010, to be used by different bridge protocols. These addresses are static addresses that cannot be removed. Regardless of the spanning-tree state, each switch in the stack receives but does not forward packets destined for addresses between 0x0180C2000000 and 0x0180C200000F. If spanning tree is enabled, the CPU on the switch or on each switch in the stack receives packets destined for 0x0180C2000000 and 0x0180C2000010. If spanning tree is disabled, the switch or each switch in the stack forwards those packets as unknown multicast addresses. Accelerated Aging to Retain Connectivity The default for aging dynamic addresses is 5 minutes, the default setting of the mac address-table aging-time global configuration command. However, a spanning-tree reconfiguration can cause many station locations to change. Because these stations could be unreachable for 5 minutes or more during a reconfiguration, the address-aging time is accelerated so that station addresses can be dropped from the address table and then relearned. The accelerated aging is the same as the forward-delay parameter value (spanning-tree vlan vlan-id forward-time seconds global configuration command) when the spanning tree reconfigures. Because each VLAN is a separate spanning-tree instance, the switch accelerates aging on a per-VLAN basis. A spanning-tree reconfiguration on one VLAN can cause the dynamic addresses learned on that VLAN to be subject to accelerated aging. Dynamic addresses on other VLANs can be unaffected and remain subject to the aging interval entered for the switch. Related Topics Configuring the Root Switch (CLI), on page 506 Restrictions for STP, on page 491 Spanning-Tree Modes and Protocols The switch supports these spanning-tree modes and protocols: · PVST+--This spanning-tree mode is based on the IEEE 802.1D standard and Cisco proprietary extensions. It is the default spanning-tree mode used on all Ethernet port-based VLANs. The PVST+ runs on each Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 500 Layer 2/3 Supported Spanning-Tree Instances VLAN on the switch up to the maximum supported, ensuring that each has a loop-free path through the network. The PVST+ provides Layer 2 load-balancing for the VLAN on which it runs. You can create different logical topologies by using the VLANs on your network to ensure that all of your links are used but that no one link is oversubscribed. Each instance of PVST+ on a VLAN has a single root switch. This root switch propagates the spanning-tree information associated with that VLAN to all other switches in the network. Because each switch has the same information about the network, this process ensures that the network topology is maintained. · Rapid PVST+--This spanning-tree mode is the same as PVST+ except that is uses a rapid convergence based on the IEEE 802.1w standard. To provide rapid convergence, the Rapid PVST+ immediately deletes dynamically learned MAC address entries on a per-port basis upon receiving a topology change. By contrast, PVST+ uses a short aging time for dynamically learned MAC address entries. Rapid PVST+ uses the same configuration as PVST+ (except where noted), and the switch needs only minimal extra configuration. The benefit of Rapid PVST+ is that you can migrate a large PVST+ install base to Rapid PVST+ without having to learn the complexities of the Multiple Spanning Tree Protocol (MSTP) configuration and without having to reprovision your network. In Rapid PVST+ mode, each VLAN runs its own spanning-tree instance up to the maximum supported. · MSTP--This spanning-tree mode is based on the IEEE 802.1s standard. You can map multiple VLANs to the same spanning-tree instance, which reduces the number of spanning-tree instances required to support a large number of VLANs. The MSTP runs on top of the RSTP (based on IEEE 802.1w), which provides for rapid convergence of the spanning tree by eliminating the forward delay and by quickly transitioning root ports and designated ports to the forwarding state. In a switch stack, the cross-stack rapid transition (CSRT) feature performs the same function as RSTP. You cannot run MSTP without RSTP or CSRT. Related Topics Changing the Spanning-Tree Mode (CLI), on page 504 Supported Spanning-Tree Instances In PVST+ or Rapid PVST+ mode, the switch or switch stack supports up to 128 spanning-tree instances. In MSTP mode, the switch or switch stack supports up to 65 MST instances. The number of VLANs that can be mapped to a particular MST instance is unlimited. Related Topics Disabling Spanning Tree (CLI), on page 505 Default Spanning-Tree Configuration, on page 503 Default MSTP Configuration, on page 535 Spanning-Tree Interoperability and Backward Compatibility In a mixed MSTP and PVST+ network, the common spanning-tree (CST) root must be inside the MST backbone, and a PVST+ switch cannot connect to multiple MST regions. When a network contains switches running Rapid PVST+ and switches running PVST+, we recommend that the Rapid PVST+ switches and PVST+ switches be configured for different spanning-tree instances. In the Rapid PVST+ spanning-tree instances, the root switch must be a Rapid PVST+ switch. In the PVST+ instances, the root switch must be a PVST+ switch. The PVST+ switches should be at the edge of the network. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 501 STP and IEEE 802.1Q Trunks Layer 2/3 All stack members run the same version of spanning tree (all PVST+, all Rapid PVST+, or all MSTP). Table 50: PVST+, MSTP, and Rapid-PVST+ Interoperability and Compatibility PVST+ MSTP Rapid PVST+ PVST+ MSTP Rapid PVST+ Yes Yes (with restrictions) Yes (reverts to PVST+) Yes (with restrictions) Yes Yes (reverts to PVST+) Yes (reverts to PVST+) Yes (reverts to PVST+) Yes Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523 STP and IEEE 802.1Q Trunks The IEEE 802.1Q standard for VLAN trunks imposes some limitations on the spanning-tree strategy for a network. The standard requires only one spanning-tree instance for all VLANs allowed on the trunks. However, in a network of Cisco switches connected through IEEE 802.1Q trunks, the switches maintain one spanning-tree instance for each VLAN allowed on the trunks. When you connect a Cisco switch to a non-Cisco device through an IEEE 802.1Q trunk, the Cisco switch uses PVST+ to provide spanning-tree interoperability. If Rapid PVST+ is enabled, the switch uses it instead of PVST+. The switch combines the spanning-tree instance of the IEEE 802.1Q VLAN of the trunk with the spanning-tree instance of the non-Cisco IEEE 802.1Q switch. However, all PVST+ or Rapid PVST+ information is maintained by Cisco switches separated by a cloud of non-Cisco IEEE 802.1Q switches. The non-Cisco IEEE 802.1Q cloud separating the Cisco switches is treated as a single trunk link between the switches. PVST+ is automatically enabled on IEEE 802.1Q trunks, and no user configuration is required. The external spanning-tree behavior on access ports and Inter-Switch Link (ISL) trunk ports is not affected by PVST+. VLAN-Bridge Spanning Tree Cisco VLAN-bridge spanning tree is used with the fallback bridging feature (bridge groups), which forwards non-IP protocols such as DECnet between two or more VLAN bridge domains or routed ports. The VLAN-bridge spanning tree allows the bridge groups to form a spanning tree on top of the individual VLAN spanning trees to prevent loops from forming if there are multiple connections among VLANs. It also prevents the individual spanning trees from the VLANs being bridged from collapsing into a single spanning tree. To support VLAN-bridge spanning tree, some of the spanning-tree timers are increased. To use the fallback bridging feature, you must have the IP services feature set enabled on your switch. Spanning Tree and Switch Stacks When the switch stack is operating in PVST+ or Rapid PVST+ mode: · A switch stack appears as a single spanning-tree node to the rest of the network, and all stack members use the same bridge ID for a given spanning tree. The bridge ID is derived from the MAC address of the active switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 502 Layer 2/3 Default Spanning-Tree Configuration · When a new switch joins the stack, it sets its bridge ID to the active switch bridge ID. If the newly added switch has the lowest ID and if the root path cost is the same among all stack members, the newly added switch becomes the stack root. · When a stack member leaves the stack, spanning-tree reconvergence occurs within the stack (and possibly outside the stack). The remaining stack member with the lowest stack port ID becomes the stack root. · If a neighboring switch external to the switch stack fails or is powered down, normal spanning-tree processing occurs. Spanning-tree reconvergence might occur as a result of losing a switch in the active topology. · If a new switch external to the switch stack is added to the network, normal spanning-tree processing occurs. Spanning-tree reconvergence might occur as a result of adding a switch in the network. Default Spanning-Tree Configuration Table 51: Default Spanning-Tree Configuration Feature Default Setting Enable state Enabled on VLAN 1. Spanning-tree mode PVST+. (Rapid PVST+ and MSTP are disabled.) Switch priority 32768 Spanning-tree port priority (configurable on a 128 per-interface basis) Spanning-tree port cost (configurable on a per-interface basis) 1000 Mb/s: 4 100 Mb/s: 19 10 Mb/s: 100 Spanning-tree VLAN port priority (configurable on 128 a per-VLAN basis) Spanning-tree VLAN port cost (configurable on a per-VLAN basis) 1000 Mb/s: 4 100 Mb/s: 19 10 Mb/s: 100 Spanning-tree timers Hello time: 2 seconds Forward-delay time: 15 seconds Maximum-aging time: 20 seconds Transmit hold count: 6 BPDUs Related Topics Disabling Spanning Tree (CLI), on page 505 Supported Spanning-Tree Instances, on page 501 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 503 How to Configure Spanning-Tree Features Layer 2/3 How to Configure Spanning-Tree Features Changing the Spanning-Tree Mode (CLI) The switch supports three spanning-tree modes: per-VLAN spanning tree plus (PVST+), Rapid PVST+, or multiple spanning tree protocol (MSTP). By default, the switch runs the PVST+ protocol. If you want to enable a mode that is different from the default mode, this procedure is required. Beginning in privileged EXEC mode, follow these steps to change the spanning-tree mode: SUMMARY STEPS 1. configure terminal 2. spanning-tree mode {pvst | mst | rapid-pvst} 3. interface interface-id 4. spanning-tree link-type point-to-point 5. end 6. clear spanning-tree detected-protocols DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 spanning-tree mode {pvst | mst | rapid-pvst} Example: Switch(config)# spanning-tree mode pvst Configures a spanning-tree mode. All stack members run the same version of spanning tree. · Select pvst to enable PVST+ (the default setting). · Select mst to enable MSTP (and RSTP). · Select rapid-pvst to enable rapid PVST+. interface interface-id Example: Switch(config)# interface GigabitEthernet1/0/1 spanning-tree link-type point-to-point Example: Switch(config-if)# spanning-tree link-type point-to-point (Recommended for Rapid PVST+ mode only) Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports, VLANs, and port channels. The VLAN ID range is 1 to 4094. The port-channel range is 1 to 48. (Recommended for Rapid PVST+ mode only) Specifies that the link type for this port is point-to-point. If you connect this port (local port) to a remote port through a point-to-point link and the local port becomes a designated Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 504 Layer 2/3 Disabling Spanning Tree (CLI) Step 5 Step 6 Command or Action end Example: Purpose port, the switch negotiates with the remote port and rapidly changes the local port to the forwarding state. Returns to privileged EXEC mode. Switch(config-if)# end clear spanning-tree detected-protocols Example: Switch# clear spanning-tree detected-protocols (Recommended for Rapid PVST+ mode only) If any port on the switch is connected to a port on a legacy IEEE 802.1D switch, this command restarts the protocol migration process on the entire switch. This step is optional if the designated switch detects that this switch is running rapid PVST+. Related Topics Spanning-Tree Modes and Protocols, on page 500 Disabling Spanning Tree (CLI) Spanning tree is enabled by default on VLAN 1 and on all newly created VLANs up to the spanning-tree limit. Disable spanning tree only if you are sure there are no loops in the network topology. Caution When spanning tree is disabled and loops are present in the topology, excessive traffic and indefinite packet duplication can drastically reduce network performance. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to disable a spanning tree: SUMMARY STEPS 1. configure terminal 2. no spanning-tree vlan vlan-id 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 505 Configuring the Root Switch (CLI) Layer 2/3 Step 2 Step 3 Command or Action no spanning-tree vlan vlan-id Example: Switch(config)# no spanning-tree vlan 300 end Example: Switch(config)# end Purpose For vlan-id, the range is 1 to 4094. Returns to privileged EXEC mode. Related Topics Supported Spanning-Tree Instances, on page 501 Default Spanning-Tree Configuration, on page 503 Configuring the Root Switch (CLI) To configure a switch as the root for the specified VLAN, use the spanning-tree vlan vlan-id root global configuration command to modify the switch priority from the default value (32768) to a significantly lower value. When you enter this command, the software checks the switch priority of the root switches for each VLAN. Because of the extended system ID support, the switch sets its own priority for the specified VLAN to 24576 if this value will cause this switch to become the root for the specified VLAN. Use the diameter keyword to specify the Layer 2 network diameter (that is, the maximum number of switch hops between any two end stations in the Layer 2 network). When you specify the network diameter, the switch automatically sets an optimal hello time, forward-delay time, and maximum-age time for a network of that diameter, which can significantly reduce the convergence time. You can use the hello keyword to override the automatically calculated hello time. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure a switch to become the root for the specified VLAN: SUMMARY STEPS 1. configure terminal 2. spanning-tree vlan vlan-id root primary [diameter net-diameter ] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 506 Layer 2/3 Configuring a Secondary Root Device (CLI) Step 2 Step 3 Command or Action spanning-tree vlan vlan-id root primary [diameter net-diameter ] Example: Switch(config)# spanning-tree vlan 20-24 root primary diameter 4 end Example: Switch(config)# end Purpose Configures a switch to become the root for the specified VLAN. · For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. · (Optional) For diameter net-diameter, specify the maximum number of switches between any two end stations. The range is 2 to 7. Returns to privileged EXEC mode. What to do next After configuring the switch as the root switch, we recommend that you avoid manually configuring the hello time, forward-delay time, and maximum-age time through the spanning-tree vlan vlan-id hello-time, spanning-tree vlan vlan-id forward-time, and the spanning-tree vlan vlan-id max-age global configuration commands. Related Topics Bridge ID, Device Priority, and Extended System ID, on page 494 Spanning-Tree Topology and BPDUs, on page 492 Accelerated Aging to Retain Connectivity, on page 500 Restrictions for STP, on page 491 Configuring a Secondary Root Device (CLI) When you configure a switch as the secondary root, the switch priority is modified from the default value (32768) to 28672. With this priority, the switch is likely to become the root switch for the specified VLAN if the primary root switch fails. This is assuming that the other network switches use the default switch priority of 32768, and therefore, are unlikely to become the root switch. You can execute this command on more than one switch to configure multiple backup root switches. Use the same network diameter and hello-time values that you used when you configured the primary root switch with the spanning-tree vlan vlan-id root primary global configuration command. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure a switch to become a secondary root for the specified VLAN: SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 507 Configuring Port Priority (CLI) Layer 2/3 2. spanning-tree vlan vlan-id root secondary [diameter net-diameter] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 spanning-tree vlan vlan-id root secondary [diameter net-diameter] Example: Switch(config)# spanning-tree vlan 20-24 root secondary diameter 4 end Example: Configures a switch to become the secondary root for the specified VLAN. · For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. · (Optional) For diameter net-diameter, specify the maximum number of switches between any two end stations. The range is 2 to 7. Use the same network diameter value that you used when configuring the primary root switch. Returns to privileged EXEC mode. Switch(config)# end Configuring Port Priority (CLI) Note If your switch is a member of a switch stack, you must use the spanning-tree [vlan vlan-id] cost cost interface configuration command instead of the spanning-tree [vlan vlan-id] port-priority priority interface configuration command to select an interface to put in the forwarding state. Assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure port priority: SUMMARY STEPS 1. configure terminal 2. interface interface-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 508 Layer 2/3 Configuring Port Priority (CLI) 3. spanning-tree port-priority priority 4. spanning-tree vlan vlan-id port-priority priority 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 Step 5 interface interface-id Example: Switch(config)# interface gigabitethernet1/0/2 Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports and port-channel logical interfaces (port-channel port-channel-number). spanning-tree port-priority priority Configures the port priority for an interface. Example: Switch(config-if)# spanning-tree port-priority 0 For priority, the range is 0 to 240, in increments of 16; the default is 128. Valid values are 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, and 240. All other values are rejected. The lower the number, the higher the priority. spanning-tree vlan vlan-id port-priority priority Example: Switch(config-if)# spanning-tree vlan 20-25 port-priority 0 Configures the port priority for a VLAN. · For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. · For priority, the range is 0 to 240, in increments of 16; the default is 128. Valid values are 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, and 240. All other values are rejected. The lower the number, the higher the priority. end Example: Returns to privileged EXEC mode. Switch(config-if)# end Related Topics Port Priority Versus Path Cost, on page 495 How a Switch or Port Becomes the Root Switch or Root Port, on page 499 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 509 Configuring Path Cost (CLI) Layer 2/3 Configuring Path Cost (CLI) This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure path cost: SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. spanning-tree cost cost 4. spanning-tree vlan vlan-id cost cost 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 interface interface-id Example: Switch(config)# interface gigabitethernet1/0/1 Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports and port-channel logical interfaces (port-channel port-channel-number). spanning-tree cost cost Example: Switch(config-if)# spanning-tree cost 250 Configures the cost for an interface. If a loop occurs, spanning tree uses the path cost when selecting an interface to place into the forwarding state. A lower path cost represents higher-speed transmission. For cost, the range is 1 to 200000000; the default value is derived from the media speed of the interface. spanning-tree vlan vlan-id cost cost Configures the cost for a VLAN. Example: If a loop occurs, spanning tree uses the path cost when selecting an interface to place into the forwarding state. A Switch(config-if)# spanning-tree vlan 10,12-15,20 lower path cost represents higher-speed transmission. cost 300 · For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. · For cost, the range is 1 to 200000000; the default value is derived from the media speed of the interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 510 Layer 2/3 Configuring the Device Priority of a VLAN (CLI) Step 5 Command or Action end Example: Switch(config-if)# end Purpose Returns to privileged EXEC mode. The show spanning-tree interface interface-id privileged EXEC command displays information only for ports that are in a link-up operative state. Otherwise, you can use the show running-config privileged EXEC command to confirm the configuration. Related Topics Port Priority Versus Path Cost, on page 495 Configuring the Device Priority of a VLAN (CLI) You can configure the switch priority and make it more likely that a standalone switch or a switch in the stack will be chosen as the root switch. Note Exercise care when using this command. For most situations, we recommend that you use the spanning-tree vlan vlan-id root primary and the spanning-tree vlan vlan-id root secondary global configuration commands to modify the switch priority. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the switch priority of a VLAN: SUMMARY STEPS 1. configure terminal 2. spanning-tree vlan vlan-id priority priority 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 spanning-tree vlan vlan-id priority priority Configures the switch priority of a VLAN. Example: Switch(config)# spanning-tree vlan 20 priority 8192 · For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 511 Configuring the Hello Time (CLI) Layer 2/3 Command or Action Step 3 end Example: Switch(config-if)# end Purpose · For priority, the range is 0 to 61440 in increments of 4096; the default is 32768. The lower the number, the more likely the switch will be chosen as the root switch. Valid priority values are 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344, and 61440. All other values are rejected. Returns to privileged EXEC mode. Configuring the Hello Time (CLI) The hello time is the time interval between configuration messages generated and sent by the root switch. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure hello time: SUMMARY STEPS 1. spanning-tree vlan vlan-id hello-time seconds 2. end DETAILED STEPS Step 1 Command or Action Purpose spanning-tree vlan vlan-id hello-time seconds Configures the hello time of a VLAN. The hello time is the Example: time interval between configuration messages generated and sent by the root switch. These messages mean that the switch is alive. Switch(config)# spanning-tree vlan 20-24 hello-time 3 · For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. · For seconds, the range is 1 to 10; the default is 2. Step 2 end Example: Returns to privileged EXEC mode. Switch(config-if)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 512 Layer 2/3 Configuring the Forwarding-Delay Time for a VLAN (CLI) Configuring the Forwarding-Delay Time for a VLAN (CLI) This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the forwarding delay time for a VLAN: SUMMARY STEPS 1. configure terminal 2. spanning-tree vlan vlan-id forward-time seconds 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 spanning-tree vlan vlan-id forward-time seconds Example: Switch(config)# spanning-tree vlan 20,25 forward-time 18 Step 3 end Example: Switch(config)# end Configures the forward time of a VLAN. The forwarding delay is the number of seconds an interface waits before changing from its spanning-tree learning and listening states to the forwarding state. · For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. · For seconds, the range is 4 to 30; the default is 15. Returns to privileged EXEC mode. Configuring the Maximum-Aging Time for a VLAN (CLI) This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the maximum-aging time for a VLAN: SUMMARY STEPS 1. configure terminal 2. spanning-tree vlan vlan-id max-age seconds 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 513 Configuring the Transmit Hold-Count (CLI) Layer 2/3 DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 spanning-tree vlan vlan-id max-age seconds Example: Switch(config)# spanning-tree vlan 20 max-age 30 Configures the maximum-aging time of a VLAN. The maximum-aging time is the number of seconds a switch waits without receiving spanning-tree configuration messages before attempting a reconfiguration. · For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. · For seconds, the range is 6 to 40; the default is 20. end Example: Switch(config-if)# end Returns to privileged EXEC mode. Configuring the Transmit Hold-Count (CLI) You can configure the BPDU burst size by changing the transmit hold count value. Note Changing this parameter to a higher value can have a significant impact on CPU utilization, especially in Rapid PVST+ mode. Lowering this value can slow down convergence in certain scenarios. We recommend that you maintain the default setting. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure transmit hold-count: SUMMARY STEPS 1. configure terminal 2. spanning-tree transmit hold-count value 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 514 Layer 2/3 Monitoring Spanning-Tree Status DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 spanning-tree transmit hold-count value Example: Configures the number of BPDUs that can be sent before pausing for 1 second. For value, the range is 1 to 20; the default is 6. Switch(config)# spanning-tree transmit hold-count 6 end Example: Returns to privileged EXEC mode. Switch(config)# end Monitoring Spanning-Tree Status Table 52: Commands for Displaying Spanning-Tree Status show spanning-tree active Displays spanning-tree information on active interfaces only. show spanning-tree detail Displays a detailed summary of interface information. show spanning-tree vlan vlan-id Displays spanning-tree information for the specified VLAN. show spanning-tree interface interface-id Displays spanning-tree information for the specified interface. show spanning-tree interface interface-id portfast Displays spanning-tree portfast information for the specified interface. show spanning-tree summary [totals] Displays a summary of interface states or displays the total lines of the STP state section. To clear spanning-tree counters, use the clear spanning-tree [interface interface-id] privileged EXEC command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 515 Additional References for Spanning-Tree Protocol Layer 2/3 Additional References for Spanning-Tree Protocol Related Documents Related Topic Spanning tree protocol commands Document Title LAN Switching Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 516 Layer 2/3 Feature Information for STP Release Cisco IOS XE 3.3SE Feature Information for STP Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 517 Feature Information for STP Layer 2/3 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 518 2 9 C H A P T E R Configuring Multiple Spanning-Tree Protocol · Finding Feature Information, on page 519 · Prerequisites for MSTP, on page 519 · Restrictions for MSTP, on page 520 · Information About MSTP, on page 521 · How to Configure MSTP Features, on page 536 · Monitoring MST Configuration and Status, on page 551 · Additional References for MSTP, on page 551 · Feature Information for MSTP, on page 552 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for MSTP · For two or more switches to be in the same multiple spanning tree (MST) region, they must have the same VLAN-to-instance map, the same configuration revision number, and the same name. · For two or more stacked switches to be in the same MST region, they must have the same VLAN-to-instance map, the same configuration revision number, and the same name. · For load-balancing across redundant paths in the network to work, all VLAN-to-instance mapping assignments must match; otherwise, all traffic flows on a single link. You can achieve load-balancing across a switch stack by manually configuring the path cost. · For load-balancing between a per-VLAN spanning tree plus (PVST+) and an MST cloud or between a rapid-PVST+ and an MST cloud to work, all MST boundary ports must be forwarding. MST boundary ports are forwarding when the internal spanning tree (IST) master of the MST cloud is the root of the common spanning tree (CST). If the MST cloud consists of multiple MST regions, one of the MST regions must contain the CST root, and all of the other MST regions must have a better path to the root Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 519 Restrictions for MSTP Layer 2/3 contained within the MST cloud than a path through the PVST+ or rapid-PVST+ cloud. You might have to manually configure the switches in the clouds. Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523 Restrictions for MSTP · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. · The switch stack supports up to 65 MST instances. The number of VLANs that can be mapped to a particular MST instance is unlimited. · PVST+, Rapid PVST+, and MSTP are supported, but only one version can be active at any time. (For example, all VLANs run PVST+, all VLANs run Rapid PVST+, or all VLANs run MSTP.) · All stack members must run the same version of spanning tree (all PVST+, Rapid PVST+, or MSTP). · VLAN Trunking Protocol (VTP) propagation of the MST configuration is not supported. However, you can manually configure the MST configuration (region name, revision number, and VLAN-to-instance mapping) on each switch within the MST region by using the command-line interface (CLI) or through the Simple Network Management Protocol (SNMP) support. · Partitioning the network into a large number of regions is not recommended. However, if this situation is unavoidable, we recommend that you partition the switched LAN into smaller LANs interconnected by routers or non-Layer 2 devices. · A region can have one member or multiple members with the same MST configuration; each member must be capable of processing rapid spanning tree protocol (RSTP) Bridge Protocol Data Units (BPDUs). There is no limit to the number of MST regions in a network, but each region can only support up to 65 spanning-tree instances. You can assign a VLAN to only one spanning-tree instance at a time. · After configuring a switch as the root switch, we recommend that you avoid manually configuring the hello time, forward-delay time, and maximum-age time through the spanning-tree mst hello-time, spanning-tree mst forward-time, and the spanning-tree mst max-age global configuration commands. Table 53: PVST+, MSTP, and Rapid PVST+ Interoperability and Compatibility PVST+ MSTP Rapid PVST+ PVST+ MSTP Rapid PVST+ Yes Yes (with restrictions) Yes (reverts to PVST+) Yes (with restrictions) Yes Yes (reverts to PVST+) Yes (reverts to PVST+) Yes (reverts to PVST+) Yes Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 520 Layer 2/3 Information About MSTP Configuring the Root Switch (CLI), on page 538 Root Switch, on page 522 Information About MSTP MSTP Configuration MSTP, which uses RSTP for rapid convergence, enables multiple VLANs to be grouped into and mapped to the same spanning-tree instance, reducing the number of spanning-tree instances needed to support a large number of VLANs. The MSTP provides for multiple forwarding paths for data traffic, enables load balancing, and reduces the number of spanning-tree instances required to support a large number of VLANs. It improves the fault tolerance of the network because a failure in one instance (forwarding path) does not affect other instances (forwarding paths). Note The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard. The most common initial deployment of MSTP is in the backbone and distribution layers of a Layer 2 switched network. This deployment provides the highly available network required in a service-provider environment. When the switch is in the MST mode, the RSTP, which is based on IEEE 802.1w, is automatically enabled. The RSTP provides rapid convergence of the spanning tree through explicit handshaking that eliminates the IEEE 802.1D forwarding delay and quickly transitions root ports and designated ports to the forwarding state. Both MSTP and RSTP improve the spanning-tree operation and maintain backward compatibility with equipment that is based on the (original) IEEE 802.1D spanning tree, with existing Cisco-proprietary Multiple Instance STP (MISTP), and with existing Cisco PVST+ and rapid per-VLAN spanning-tree plus (Rapid PVST+). A switch stack appears as a single spanning-tree node to the rest of the network, and all stack members use the same switch ID. MSTP Configuration Guidelines · When you enable MST by using the spanning-tree mode mst global configuration command, RSTP is automatically enabled. · For configuration guidelines about UplinkFast, BackboneFast, and cross-stack UplinkFast, see the relevant sections in the Related Topics section. · When the switch is in MST mode, it uses the long path-cost calculation method (32 bits) to compute the path cost values. With the long path-cost calculation method, the following path cost values are supported: Speed 10 Mb/s 100 Mb/s 1 Gb/s Path Cost Value 2,000,000 200,000 20,000 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 521 Root Switch Layer 2/3 Speed 10 Gb/s 100 Gb/s Path Cost Value 2,000 200 Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Prerequisites for MSTP, on page 519 Restrictions for MSTP, on page 520 Spanning-Tree Interoperability and Backward Compatibility, on page 501 Optional Spanning-Tree Configuration Guidelines BackboneFast, on page 560 UplinkFast, on page 555 Root Switch The switch maintains a spanning-tree instance for the group of VLANs mapped to it. A switch ID, consisting of the switch priority and the switch MAC address, is associated with each instance. For a group of VLANs, the switch with the lowest switch ID becomes the root switch. When you configure a switch as the root, you modify the switch priority from the default value (32768) to a significantly lower value so that the switch becomes the root switch for the specified spanning-tree instance. When you enter this command, the switch checks the switch priorities of the root switches. Because of the extended system ID support, the switch sets its own priority for the specified instance to 24576 if this value will cause this switches to become the root for the specified spanning-tree instance. If any root switch for the specified instance has a switch priority lower than 24576, the switch sets its own priority to 4096 less than the lowest switch priority. (4096 is the value of the least-significant bit of a 4-bit switch priority value. For more information, select "Bridge ID, Switch Priority, and Extended System ID" link in Related Topics. If your network consists of switches that support and do not support the extended system ID, it is unlikely that the switch with the extended system ID support will become the root switch. The extended system ID increases the switch priority value every time the VLAN number is greater than the priority of the connected switches running older software. The root switch for each spanning-tree instance should be a backbone or distribution switch. Do not configure an access switch as the spanning-tree primary root. Use the diameter keyword, which is available only for MST instance 0, to specify the Layer 2 network diameter (that is, the maximum number of switch hops between any two end stations in the Layer 2 network). When you specify the network diameter, the switch automatically sets an optimal hello time, forward-delay time, and maximum-age time for a network of that diameter, which can significantly reduce the convergence time. You can use the hello keyword to override the automatically calculated hello time. Related Topics Configuring the Root Switch (CLI), on page 538 Restrictions for MSTP, on page 520 Bridge ID, Device Priority, and Extended System ID, on page 494 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 522 Layer 2/3 Multiple Spanning-Tree Regions Multiple Spanning-Tree Regions For switches to participate in multiple spanning-tree (MST) instances, you must consistently configure the switches with the same MST configuration information. A collection of interconnected switches that have the same MST configuration comprises an MST region. The MST configuration controls to which MST region each switch belongs. The configuration includes the name of the region, the revision number, and the MST VLAN-to-instance assignment map. You configure the switch for a region by specifying the MST region configuration on it. You can map VLANs to an MST instance, specify the region name, and set the revision number. For instructions and an example, select the "Specifying the MST Region Configuration and Enabling MSTP" link in Related Topics. A region can have one or multiple members with the same MST configuration. Each member must be capable of processing RSTP bridge protocol data units (BPDUs). There is no limit to the number of MST regions in a network, but each region can support up to 65 spanning-tree instances. Instances can be identified by any number in the range from 0 to 4094. You can assign a VLAN to only one spanning-tree instance at a time. Related Topics Illustration of MST Regions, on page 525 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Prerequisites for MSTP, on page 519 Restrictions for MSTP, on page 520 Spanning-Tree Interoperability and Backward Compatibility, on page 501 Optional Spanning-Tree Configuration Guidelines BackboneFast, on page 560 UplinkFast, on page 555 IST, CIST, and CST Unlike PVST+ and Rapid PVST+ in which all the spanning-tree instances are independent, the MSTP establishes and maintains two types of spanning trees: · An internal spanning tree (IST), which is the spanning tree that runs in an MST region. Within each MST region, the MSTP maintains multiple spanning-tree instances. Instance 0 is a special instance for a region, known as the internal spanning tree (IST). All other MST instances are numbered from 1 to 4094. The IST is the only spanning-tree instance that sends and receives BPDUs. All of the other spanning-tree instance information is contained in M-records, which are encapsulated within MSTP BPDUs. Because the MSTP BPDU carries information for all instances, the number of BPDUs that need to be processed to support multiple spanning-tree instances is significantly reduced. All MST instances within the same region share the same protocol timers, but each MST instance has its own topology parameters, such as root switch ID, root path cost, and so forth. By default, all VLANs are assigned to the IST. An MST instance is local to the region; for example, MST instance 1 in region A is independent of MST instance 1 in region B, even if regions A and B are interconnected. · A common and internal spanning tree (CIST), which is a collection of the ISTs in each MST region, and the common spanning tree (CST) that interconnects the MST regions and single spanning trees. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 523 Operations Within an MST Region Layer 2/3 The spanning tree computed in a region appears as a subtree in the CST that encompasses the entire switched domain. The CIST is formed by the spanning-tree algorithm running among switches that support the IEEE 802.1w, IEEE 802.1s, and IEEE 802.1D standards. The CIST inside an MST region is the same as the CST outside a region. Operations Within an MST Region The IST connects all the MSTP switches in a region. When the IST converges, the root of the IST becomes the CIST regional root (called the IST master before the implementation of the IEEE 802.1s standard). It is the switch within the region with the lowest switch ID and path cost to the CIST root. The CIST regional root is also the CIST root if there is only one region in the network. If the CIST root is outside the region, one of the MSTP switches at the boundary of the region is selected as the CIST regional root. When an MSTP switch initializes, it sends BPDUs claiming itself as the root of the CIST and the CIST regional root, with both of the path costs to the CIST root and to the CIST regional root set to zero. The switch also initializes all of its MST instances and claims to be the root for all of them. If the switch receives superior MST root information (lower switch ID, lower path cost, and so forth) than currently stored for the port, it relinquishes its claim as the CIST regional root. During initialization, a region might have many subregions, each with its own CIST regional root. As switches receive superior IST information, they leave their old subregions and join the new subregion that contains the true CIST regional root. All subregions shrink except for the one that contains the true CIST regional root. For correct operation, all switches in the MST region must agree on the same CIST regional root. Therefore, any two switches in the region only synchronize their port roles for an MST instance if they converge to a common CIST regional root. Related Topics Illustration of MST Regions, on page 525 Operations Between MST Regions If there are multiple regions or legacy IEEE 802.1D switches within the network, MSTP establishes and maintains the CST, which includes all MST regions and all legacy STP switches in the network. The MST instances combine with the IST at the boundary of the region to become the CST. The IST connects all the MSTP switches in the region and appears as a subtree in the CIST that encompasses the entire switched domain. The root of the subtree is the CIST regional root. The MST region appears as a virtual switch to adjacent STP switches and MST regions. Only the CST instance sends and receives BPDUs, and MST instances add their spanning-tree information into the BPDUs to interact with neighboring switches and compute the final spanning-tree topology. Because of this, the spanning-tree parameters related to BPDU transmission (for example, hello time, forward time, max-age, and max-hops) are configured only on the CST instance but affect all MST instances. Parameters related to the spanning-tree topology (for example, switch priority, port VLAN cost, and port VLAN priority) can be configured on both the CST instance and the MST instance. MSTP switches use Version 3 RSTP BPDUs or IEEE 802.1D STP BPDUs to communicate with legacy IEEE 802.1D switches. MSTP switches use MSTP BPDUs to communicate with MSTP switches. Related Topics Illustration of MST Regions, on page 525 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 524 Layer 2/3 IEEE 802.1s Terminology IEEE 802.1s Terminology Some MST naming conventions used in Cisco's prestandard implementation have been changed to identify some internal or regional parameters. These parameters are significant only within an MST region, as opposed to external parameters that are relevant to the whole network. Because the CIST is the only spanning-tree instance that spans the whole network, only the CIST parameters require the external rather than the internal or regional qualifiers. · The CIST root is the root switch for the unique instance that spans the whole network, the CIST. · The CIST external root path cost is the cost to the CIST root. This cost is left unchanged within an MST region. Remember that an MST region looks like a single switch for the CIST. The CIST external root path cost is the root path cost calculated between these virtual switches and switches that do not belong to any region. · The CIST regional root was called the IST master in the prestandard implementation. If the CIST root is in the region, the CIST regional root is the CIST root. Otherwise, the CIST regional root is the closest switch to the CIST root in the region. The CIST regional root acts as a root switch for the IST. · The CIST internal root path cost is the cost to the CIST regional root in a region. This cost is only relevant to the IST, instance 0. Table 54: Prestandard and Standard Terminology IEEE Standard CIST regional root CIST internal root path cost CIST external root path cost MSTI regional root MSTI internal root path cost Cisco Prestandard IST master IST master path cost Root path cost Instance root Root path cost Cisco Standard CIST regional root CIST internal path cost Root path cost Instance root Root path cost Illustration of MST Regions This figure displays three MST regions and a legacy IEEE 802.1D switch (D). The CIST regional root for region 1 (A) is also the CIST root. The CIST regional root for region 2 (B) and the CIST regional root for region 3 (C) are the roots for their respective subtrees within the CIST. The RSTP runs in all regions. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 525 Hop Count Figure 25: MST Regions, CIST Masters, and CST Root Layer 2/3 Related Topics Multiple Spanning-Tree Regions, on page 523 Operations Within an MST Region, on page 524 Operations Between MST Regions, on page 524 Hop Count The IST and MST instances do not use the message-age and maximum-age information in the configuration BPDU to compute the spanning-tree topology. Instead, they use the path cost to the root and a hop-count mechanism similar to the IP time-to-live (TTL) mechanism. By using the spanning-tree mst max-hops global configuration command, you can configure the maximum hops inside the region and apply it to the IST and all MST instances in that region. The hop count achieves the same result as the message-age information (triggers a reconfiguration). The root switch of the instance always sends a BPDU (or M-record) with a cost of 0 and the hop count set to the maximum value. When a switch receives this BPDU, it decrements the received remaining hop count by one and propagates this value as the remaining hop count in the BPDUs it generates. When the count reaches zero, the switch discards the BPDU and ages the information held for the port. The message-age and maximum-age information in the RSTP portion of the BPDU remain the same throughout the region, and the same values are propagated by the region designated ports at the boundary. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 526 Layer 2/3 Boundary Ports Boundary Ports In the Cisco prestandard implementation, a boundary port connects an MST region to a single spanning-tree region running RSTP, to a single spanning-tree region running PVST+ or rapid PVST+, or to another MST region with a different MST configuration. A boundary port also connects to a LAN, the designated switch of which is either a single spanning-tree switch or a switch with a different MST configuration. There is no definition of a boundary port in the IEEE 802.1s standard. The IEEE 802.1Q-2002 standard identifies two kinds of messages that a port can receive: · internal (coming from the same region) · external (coming from another region) When a message is internal, the CIST part is received by the CIST, and each MST instance receives its respective M-record. When a message is external, it is received only by the CIST. If the CIST role is root or alternate, or if the external BPDU is a topology change, it could have an impact on the MST instances. An MST region includes both switches and LANs. A segment belongs to the region of its designated port. Therefore, a port in a different region than the designated port for a segment is a boundary port. This definition allows two ports internal to a region to share a segment with a port belonging to a different region, creating the possibility of a port receiving both internal and external messages. The primary change from the Cisco prestandard implementation is that a designated port is not defined as boundary, unless it is running in an STP-compatible mode. Note If there is a legacy STP switch on the segment, messages are always considered external. The other change from the Cisco prestandard implementation is that the CIST regional root switch ID field is now inserted where an RSTP or legacy IEEE 802.1Q switch has the sender switch ID. The whole region performs like a single virtual switch by sending a consistent sender switch ID to neighboring switches. In this example, switch C would receive a BPDU with the same consistent sender switch ID of root, whether or not A or B is designated for the segment. IEEE 802.1s Implementation The Cisco implementation of the IEEE MST standard includes features required to meet the standard, as well as some of the desirable prestandard functionality that is not yet incorporated into the published standard. Port Role Naming Change The boundary role is no longer in the final MST standard, but this boundary concept is maintained in Cisco's implementation. However, an MST instance port at a boundary of the region might not follow the state of the corresponding CIST port. Two boundary roles currently exist: · The boundary port is the root port of the CIST regional root--When the CIST instance port is proposed and is in sync, it can send back an agreement and move to the forwarding state only after all the corresponding MSTI ports are in sync (and thus forwarding). The MSTI ports now have a special master role. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 527 Interoperation Between Legacy and Standard Switches Layer 2/3 · The boundary port is not the root port of the CIST regional root--The MSTI ports follow the state and role of the CIST port. The standard provides less information, and it might be difficult to understand why an MSTI port can be alternately blocking when it receives no BPDUs (MRecords). In this case, although the boundary role no longer exists, the show commands identify a port as boundary in the type column of the output. Interoperation Between Legacy and Standard Switches Because automatic detection of prestandard switches can fail, you can use an interface configuration command to identify prestandard ports. A region cannot be formed between a standard and a prestandard switch, but they can interoperate by using the CIST. Only the capability of load-balancing over different instances is lost in that particular case. The CLI displays different flags depending on the port configuration when a port receives prestandard BPDUs. A syslog message also appears the first time a switch receives a prestandard BPDU on a port that has not been configured for prestandard BPDU transmission. Figure 26: Standard and Prestandard Switch Interoperation Assume that A is a standard switch and B a prestandard switch, both configured to be in the same region. A is the root switch for the CIST, and B has a root port (BX) on segment X and an alternate port (BY) on segment Y. If segment Y flaps, and the port on BY becomes the alternate before sending out a single prestandard BPDU, AY cannot detect that a prestandard switch is connected to Y and continues to send standard BPDUs. The port BY is fixed in a boundary, and no load balancing is possible between A and B. The same problem exists on segment X, but B might transmit topology changes. Note We recommend that you minimize the interaction between standard and prestandard MST implementations. Detecting Unidirectional Link Failure This feature is not yet present in the IEEE MST standard, but it is included in this Cisco IOS release. The software checks the consistency of the port role and state in the received BPDUs to detect unidirectional link failures that could cause bridging loops. When a designated port detects a conflict, it keeps its role, but reverts to the discarding state because disrupting connectivity in case of inconsistency is preferable to opening a bridging loop. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 528 Layer 2/3 MSTP and Switch Stacks Figure 27: Detecting Unidirectional Link Failure This figure illustrates a unidirectional link failure that typically creates a bridging loop. Switch A is the root switch, and its BPDUs are lost on the link leading to switch B. RSTP and MST BPDUs include the role and state of the sending port. With this information, switch A can detect that switch B does not react to the superior BPDUs it sends and that switch B is the designated, not root switch. As a result, switch A blocks (or keeps blocking) its port, which prevents the bridging loop. MSTP and Switch Stacks A switch stack appears as a single spanning-tree node to the rest of the network, and all stack members use the same bridge ID for a given spanning tree. The bridge ID is derived from the MAC address of the active switch. If a switch that does not support MSTP is added to a switch stack that does support MSTP or the reverse, the switch is put into a version mismatch state. If possible, the switch is automatically upgraded or downgraded to the same version of software that is running on the switch stack. Interoperability with IEEE 802.1D STP A switch running MSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy IEEE 802.1D switches. If this switch receives a legacy IEEE 802.1D configuration BPDU (a BPDU with the protocol version set to 0), it sends only IEEE 802.1D BPDUs on that port. An MSTP switch also can detect that a port is at the boundary of a region when it receives a legacy BPDU, an MSTP BPDU (Version 3) associated with a different region, or an RSTP BPDU (Version 2). However, the switch does not automatically revert to the MSTP mode if it no longer receives IEEE 802.1D BPDUs because it cannot detect whether the legacy switch has been removed from the link unless the legacy switch is the designated switch. A switch might also continue to assign a boundary role to a port when the switch to which this switch is connected has joined the region. To restart the protocol migration process (force the renegotiation with neighboring switches), use the clear spanning-tree detected-protocols privileged EXEC command. If all the legacy switches on the link are RSTP switches, they can process MSTP BPDUs as if they are RSTP BPDUs. Therefore, MSTP switches send either a Version 0 configuration and TCN BPDUs or Version 3 MSTP BPDUs on a boundary port. A boundary port connects to a LAN, the designated switch of which is either a single spanning-tree switch or a switch with a different MST configuration. RSTP Overview The RSTP takes advantage of point-to-point wiring and provides rapid convergence of the spanning tree. Reconfiguration of the spanning tree can occur in less than 1 second (in contrast to 50 seconds with the default settings in the IEEE 802.1D spanning tree). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 529 Port Roles and the Active Topology Layer 2/3 Port Roles and the Active Topology The RSTP provides rapid convergence of the spanning tree by assigning port roles and by learning the active topology. The RSTP builds upon the IEEE 802.1D STP to select the switch with the highest switch priority (lowest numerical priority value) as the root switch. The RSTP then assigns one of these port roles to individual ports: · Root port--Provides the best path (lowest cost) when the switch forwards packets to the root switch. · Designated port--Connects to the designated switch, which incurs the lowest path cost when forwarding packets from that LAN to the root switch. The port through which the designated switch is attached to the LAN is called the designated port. · Alternate port--Offers an alternate path toward the root switch to that provided by the current root port. · Backup port--Acts as a backup for the path provided by a designated port toward the leaves of the spanning tree. A backup port can exist only when two ports are connected in a loopback by a point-to-point link or when a switch has two or more connections to a shared LAN segment. · Disabled port--Has no role within the operation of the spanning tree. A port with the root or a designated port role is included in the active topology. A port with the alternate or backup port role is excluded from the active topology. In a stable topology with consistent port roles throughout the network, the RSTP ensures that every root port and designated port immediately transition to the forwarding state while all alternate and backup ports are always in the discarding state (equivalent to blocking in IEEE 802.1D). The port state controls the operation of the forwarding and learning processes. Table 55: Port State Comparison Operational Status Enabled Enabled Enabled Enabled Disabled STP Port State (IEEE 802.1D) Blocking Listening Learning Forwarding Disabled RSTP Port State Discarding Discarding Learning Forwarding Discarding Is Port Included in the Active Topology? No No Yes Yes No To be consistent with Cisco STP implementations, this guide defines the port state as blocking instead of discarding. Designated ports start in the listening state. Rapid Convergence The RSTP provides for rapid recovery of connectivity following the failure of a switch, a switch port, or a LAN. It provides rapid convergence for edge ports, new root ports, and ports connected through point-to-point links as follows: · Edge ports--If you configure a port as an edge port on an RSTP switch by using the spanning-tree portfast interface configuration command, the edge port immediately transitions to the forwarding state. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 530 Layer 2/3 Rapid Convergence An edge port is the same as a Port Fast-enabled port, and you should enable it only on ports that connect to a single end station. · Root ports--If the RSTP selects a new root port, it blocks the old root port and immediately transitions the new root port to the forwarding state. · Point-to-point links--If you connect a port to another port through a point-to-point link and the local port becomes a designated port, it negotiates a rapid transition with the other port by using the proposal-agreement handshake to ensure a loop-free topology. Figure 28: Proposal and Agreement Handshaking for Rapid Convergence Switch A is connected to Switch B through a point-to-point link, and all of the ports are in the blocking state. Assume that the priority of Switch A is a smaller numerical value than the priority of Switch B. Switch A sends a proposal message (a configuration BPDU with the proposal flag set) to Switch B, proposing itself as the designated switch. After receiving the proposal message, Switch B selects as its new root port the port from which the proposal message was received, forces all nonedge ports to the blocking state, and sends an agreement message (a BPDU with the agreement flag set) through its new root port. After receiving Switch B's agreement message, Switch A also immediately transitions its designated port to the forwarding state. No loops in the network are formed because Switch B blocked all of its nonedge ports and because there is a point-to-point link between Switches A and B. When Switch C is connected to Switch B, a similar set of handshaking messages are exchanged. Switch C selects the port connected to Switch B as its root port, and both ends immediately transition to the forwarding state. With each iteration of this handshaking process, one more switch joins the active topology. As the network converges, this proposal-agreement handshaking progresses from the root toward the leaves of the spanning tree. In a switch stack, the cross-stack rapid transition (CSRT) feature ensures that a stack member receives acknowledgments from all stack members during the proposal-agreement handshaking before moving the port to the forwarding state. CSRT is automatically enabled when the switch is in MST mode. The switch learns the link type from the port duplex mode: a full-duplex port is considered to have a point-to-point connection; a half-duplex port is considered to have a shared connection. You can override the default setting that is controlled by the duplex setting by using the spanning-tree link-type interface configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 531 Synchronization of Port Roles Layer 2/3 Synchronization of Port Roles When the switch receives a proposal message on one of its ports and that port is selected as the new root port, the RSTP forces all other ports to synchronize with the new root information. The switch is synchronized with superior root information received on the root port if all other ports are synchronized. An individual port on the switch is synchronized if · That port is in the blocking state. · It is an edge port (a port configured to be at the edge of the network). If a designated port is in the forwarding state and is not configured as an edge port, it transitions to the blocking state when the RSTP forces it to synchronize with new root information. In general, when the RSTP forces a port to synchronize with root information and the port does not satisfy any of the above conditions, its port state is set to blocking. Figure 29: Sequence of Events During Rapid Convergence After ensuring that all of the ports are synchronized, the switch sends an agreement message to the designated switch corresponding to its root port. When the switches connected by a point-to-point link are in agreement about their port roles, the RSTP immediately transitions the port states to forwarding. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 532 Layer 2/3 Bridge Protocol Data Unit Format and Processing Bridge Protocol Data Unit Format and Processing The RSTP BPDU format is the same as the IEEE 802.1D BPDU format except that the protocol version is set to 2. A new 1-byte Version 1 Length field is set to zero, which means that no version 1 protocol information is present. Table 56: RSTP BPDU Flags Bit Function 0 Topology change (TC) 1 Proposal 23: Port role: 00 Unknown 01 Alternate port 10 Root port 11 Designated port 4 Learning 5 Forwarding 6 Agreement 7 Topology change acknowledgement (TCA) The sending switch sets the proposal flag in the RSTP BPDU to propose itself as the designated switch on that LAN. The port role in the proposal message is always set to the designated port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 533 Processing Superior BPDU Information Layer 2/3 The sending switch sets the agreement flag in the RSTP BPDU to accept the previous proposal. The port role in the agreement message is always set to the root port. The RSTP does not have a separate topology change notification (TCN) BPDU. It uses the topology change (TC) flag to show the topology changes. However, for interoperability with IEEE 802.1D switches, the RSTP switch processes and generates TCN BPDUs. The learning and forwarding flags are set according to the state of the sending port. Processing Superior BPDU Information If a port receives superior root information (lower switch ID, lower path cost, and so forth) than currently stored for the port, the RSTP triggers a reconfiguration. If the port is proposed and is selected as the new root port, RSTP forces all the other ports to synchronize. If the BPDU received is an RSTP BPDU with the proposal flag set, the switch sends an agreement message after all of the other ports are synchronized. If the BPDU is an IEEE 802.1D BPDU, the switch does not set the proposal flag and starts the forward-delay timer for the port. The new root port requires twice the forward-delay time to transition to the forwarding state. If the superior information received on the port causes the port to become a backup or alternate port, RSTP sets the port to the blocking state but does not send the agreement message. The designated port continues sending BPDUs with the proposal flag set until the forward-delay timer expires, at which time the port transitions to the forwarding state. Processing Inferior BPDU Information If a designated port receives an inferior BPDU (such as a higher switch ID or a higher path cost than currently stored for the port) with a designated port role, it immediately replies with its own information. Topology Changes This section describes the differences between the RSTP and the IEEE 802.1D in handling spanning-tree topology changes. · Detection--Unlike IEEE 802.1D in which any transition between the blocking and the forwarding state causes a topology change, only transitions from the blocking to the forwarding state cause a topology change with RSTP (only an increase in connectivity is considered a topology change). State changes on an edge port do not cause a topology change. When an RSTP switch detects a topology change, it deletes the learned information on all of its nonedge ports except on those from which it received the TC notification. · Notification--Unlike IEEE 802.1D, which uses TCN BPDUs, the RSTP does not use them. However, for IEEE 802.1D interoperability, an RSTP switch processes and generates TCN BPDUs. · Acknowledgement--When an RSTP switch receives a TCN message on a designated port from an IEEE 802.1D switch, it replies with an IEEE 802.1D configuration BPDU with the TCA bit set. However, if the TC-while timer (the same as the topology-change timer in IEEE 802.1D) is active on a root port connected to an IEEE 802.1D switch and a configuration BPDU with the TCA bit set is received, the TC-while timer is reset. This behavior is only required to support IEEE 802.1D switches. The RSTP BPDUs never have the TCA bit set. · Propagation--When an RSTP switch receives a TC message from another switch through a designated or root port, it propagates the change to all of its nonedge, designated ports and to the root port (excluding Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 534 Layer 2/3 Protocol Migration Process the port on which it is received). The switch starts the TC-while timer for all such ports and flushes the information learned on them. · Protocol migration--For backward compatibility with IEEE 802.1D switches, RSTP selectively sends IEEE 802.1D configuration BPDUs and TCN BPDUs on a per-port basis. When a port is initialized, the migrate-delay timer is started (specifies the minimum time during which RSTP BPDUs are sent), and RSTP BPDUs are sent. While this timer is active, the switch processes all BPDUs received on that port and ignores the protocol type. If the switch receives an IEEE 802.1D BPDU after the port migration-delay timer has expired, it assumes that it is connected to an IEEE 802.1D switch and starts using only IEEE 802.1D BPDUs. However, if the RSTP switch is using IEEE 802.1D BPDUs on a port and receives an RSTP BPDU after the timer has expired, it restarts the timer and starts using RSTP BPDUs on that port. Protocol Migration Process A switch running MSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy IEEE 802.1D switches. If this switch receives a legacy IEEE 802.1D configuration BPDU (a BPDU with the protocol version set to 0), it sends only IEEE 802.1D BPDUs on that port. An MSTP switch also can detect that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (Version 3) associated with a different region, or an RST BPDU (Version 2). However, the switch does not automatically revert to the MSTP mode if it no longer receives IEEE 802.1D BPDUs because it cannot detect whether the legacy switch has been removed from the link unless the legacy switch is the designated switch. A switch also might continue to assign a boundary role to a port when the switch to which it is connected has joined the region. Related Topics Restarting the Protocol Migration Process (CLI), on page 550 Default MSTP Configuration Table 57: Default MSTP Configuration Feature Default Setting Spanning-tree mode MSTP Switch priority (configurable on a per-CIST port basis) 32768 Spanning-tree port priority (configurable on a 128 per-CIST port basis) Spanning-tree port cost (configurable on a per-CIST 1000 Mb/s: 20000 port basis) 100 Mb/s: 20000 10 Mb/s: 20000 Hello time 3 seconds Forward-delay time 20 seconds Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 535 How to Configure MSTP Features Layer 2/3 Feature Maximum-aging time Maximum hop count Default Setting 20 seconds 20 hops Related Topics Supported Spanning-Tree Instances, on page 501 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 How to Configure MSTP Features Specifying the MST Region Configuration and Enabling MSTP (CLI) This procedure is required. SUMMARY STEPS 1. configure terminal 2. spanning-tree mst configuration 3. instance instance-id vlan vlan-range 4. name name 5. revision version 6. show pending 7. exit 8. spanning-tree mode mst 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 spanning-tree mst configuration Example: Enters MST configuration mode. Switch(config)# spanning-tree mst configuration instance instance-id vlan vlan-range Example: Maps VLANs to an MST instance. · For instance-id, the range is 0 to 4094. Switch(config-mst)# instance 1 vlan 10-20 · For vlan vlan-range, the range is 1 to 4094. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 536 Layer 2/3 Specifying the MST Region Configuration and Enabling MSTP (CLI) Command or Action Step 4 Step 5 Step 6 Step 7 Step 8 name name Example: Switch(config-mst)# name region1 revision version Example: Switch(config-mst)# revision 1 show pending Example: Switch(config-mst)# show pending exit Example: Switch(config-mst)# exit spanning-tree mode mst Example: Switch(config)# spanning-tree mode mst Step 9 end Example: Switch(config)# end Purpose When you map VLANs to an MST instance, the mapping is incremental, and the VLANs specified in the command are added to or removed from the VLANs that were previously mapped. To specify a VLAN range, use a hyphen; for example, instance 1 vlan 1-63 maps VLANs 1 through 63 to MST instance 1. To specify a VLAN series, use a comma; for example, instance 1 vlan 10, 20, 30 maps VLANs 10, 20, and 30 to MST instance 1. Specifies the configuration name. The name string has a maximum length of 32 characters and is case sensitive. Specifies the configuration revision number. The range is 0 to 65535. Verifies your configuration by displaying the pending configuration. Applies all changes, and returns to global configuration mode. Enables MSTP. RSTP is also enabled. Changing spanning-tree modes can disrupt traffic because all spanning-tree instances are stopped for the previous mode and restarted in the new mode. You cannot run both MSTP and PVST+ or both MSTP and Rapid PVST+ at the same time. Returns to privileged EXEC mode. Related Topics MSTP Configuration Guidelines, on page 521 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 537 Configuring the Root Switch (CLI) Layer 2/3 Multiple Spanning-Tree Regions, on page 523 Prerequisites for MSTP, on page 519 Restrictions for MSTP, on page 520 Spanning-Tree Interoperability and Backward Compatibility, on page 501 Optional Spanning-Tree Configuration Guidelines BackboneFast, on page 560 UplinkFast, on page 555 Default MSTP Configuration, on page 535 Configuring the Root Switch (CLI), on page 538 Bridge ID, Device Priority, and Extended System ID, on page 494 Configuring a Secondary Root Switch (CLI), on page 539 Configuring Port Priority (CLI), on page 540 Configuring Path Cost (CLI), on page 542 Configuring the Switch Priority (CLI), on page 543 Configuring the Hello Time (CLI), on page 544 Configuring the Forwarding-Delay Time (CLI), on page 545 Configuring the Maximum-Aging Time (CLI), on page 546 Configuring the Maximum-Hop Count (CLI), on page 547 Specifying the Link Type to Ensure Rapid Transitions (CLI), on page 548 Designating the Neighbor Type (CLI), on page 549 Restarting the Protocol Migration Process (CLI), on page 550 Configuring the Root Switch (CLI) This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the root switch. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. You must also know the specified MST instance ID. Step 2 in the example uses 0 as the instance ID because that was the instance ID set up by the instructions listed under Related Topics. SUMMARY STEPS 1. configure terminal 2. spanning-tree mst instance-id root primary 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 538 Layer 2/3 Configuring a Secondary Root Switch (CLI) Command or Action Switch# configure terminal Purpose Step 2 Step 3 spanning-tree mst instance-id root primary Configures a switch as the root switch. Example: For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series of instances Switch(config)# spanning-tree mst 0 root primary separated by a comma. The range is 0 to 4094. end Example: Returns to privileged EXEC mode. Switch(config)# end Related Topics Root Switch, on page 522 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Restrictions for MSTP, on page 520 Bridge ID, Device Priority, and Extended System ID, on page 494 Configuring a Secondary Root Switch (CLI), on page 539 Configuring a Secondary Root Switch (CLI) When you configure a switch with the extended system ID support as the secondary root, the switch priority is modified from the default value (32768) to 28672. The switch is then likely to become the root switch for the specified instance if the primary root switch fails. This is assuming that the other network switches use the default switch priority of 32768 and therefore are unlikely to become the root switch. You can execute this command on more than one switch to configure multiple backup root switches. Use the same network diameter and hello-time values that you used when you configured the primary root switch with the spanning-tree mst instance-id root primary global configuration command. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure a secondary root switch. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. You must also know the specified MST instance ID. This example uses 0 as the instance ID because that was the instance ID set up by the instructions listed under Related Topics. SUMMARY STEPS 1. configure terminal 2. spanning-tree mst instance-id root secondary 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 539 Configuring Port Priority (CLI) Layer 2/3 DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 spanning-tree mst instance-id root secondary Configures a switch as the secondary root switch. Example: For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series of instances Switch(config)# spanning-tree mst 0 root secondary separated by a comma. The range is 0 to 4094. end Example: Returns to privileged EXEC mode. Switch(config)# end Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Configuring the Root Switch (CLI), on page 538 Configuring Port Priority (CLI) If a loop occurs, the MSTP uses the port priority when selecting an interface to put into the forwarding state. You can assign higher priority values (lower numerical values) to interfaces that you want selected first and lower priority values (higher numerical values) that you want selected last. If all interfaces have the same priority value, the MSTP puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces. Note If the switch is a member of a switch stack, you must use the spanning-tree mst [instance-id] cost cost interface configuration command instead of the spanning-tree mst [instance-id] port-priority priority interface configuration command to select a port to put in the forwarding state. Assign lower cost values to ports that you want selected first and higher cost values to ports that you want selected last. For more information, see the path costs topic listed under Related Topics. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure a different port priority for the switch. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 540 Layer 2/3 Configuring Port Priority (CLI) You must also know the specified MST instance ID and the interface used. This example uses 0 as the instance ID and GigabitEthernet1/0/1 as the interface because that was the instance ID and interface set up by the instructions listed under Related Topics. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. spanning-tree mst instance-id port-priority priority 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 interface interface-id Example: Specifies an interface to configure, and enters interface configuration mode. Switch(config)# interface GigabitEthernet1/0/1 spanning-tree mst instance-id port-priority priority Example: Switch(config-if)# spanning-tree mst 0 port-priority 64 Configures port priority. · For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series of instances separated by a comma. The range is 0 to 4094. · For priority, the range is 0 to 240 in increments of 16. The default is 128. The lower the number, the higher the priority. The priority values are 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, and 240. All other values are rejected. end Example: Switch(config-if)# end Returns to privileged EXEC mode. The show spanning-tree mst interface interface-id privileged EXEC command displays information only if the port is in a link-up operative state. Otherwise, you can use the show running-config interface privileged EXEC command to confirm the configuration. Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 541 Configuring Path Cost (CLI) Layer 2/3 Configuring Path Cost (CLI), on page 542 Configuring Path Cost (CLI) The MSTP path cost default value is derived from the media speed of an interface. If a loop occurs, the MSTP uses cost when selecting an interface to put in the forwarding state. You can assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last. If all interfaces have the same cost value, the MSTP puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure a different path cost for the switch. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. You must also know the specified MST instance ID and the interface used. This example uses 0 as the instance ID and GigabitEthernet1/0/1 as the interface because that was the instance ID and interface set up by the instructions listed under Related Topics. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. spanning-tree mst instance-id cost cost 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet1/0/1 spanning-tree mst instance-id cost cost Example: Switch(config-if)# spanning-tree mst 0 cost 17031970 Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports and port-channel logical interfaces. The port-channel range is 1 to 48. Configures the cost. If a loop occurs, the MSTP uses the path cost when selecting an interface to place into the forwarding state. A lower path cost represents higher-speed transmission. · For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 542 Layer 2/3 Configuring the Switch Priority (CLI) Command or Action Step 4 end Example: Switch(config-if)# end Purpose of instances separated by a comma. The range is 0 to 4094. · For cost, the range is 1 to 200000000; the default value is derived from the media speed of the interface. Returns to privileged EXEC mode. The show spanning-tree mst interface interface-id privileged EXEC command displays information only for ports that are in a link-up operative state. Otherwise, you can use the show running-config privileged EXEC command to confirm the configuration. Related Topics Configuring Port Priority (CLI), on page 540 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Configuring the Switch Priority (CLI) Changing the priority of a switch makes it more likely to be chosen as the root switch whether it is a standalone switch or a switch in the stack. Note Exercise care when using this command. For normal network configurations, we recommend that you use the spanning-tree mst instance-id root primary and the spanning-tree mst instance-id root secondary global configuration commands to specify a switch as the root or secondary root switch. You should modify the switch priority only in circumstances where these commands do not work. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure a different switch priority for the switch. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. You must also know the specified MST instance ID used. This example uses 0 as the instance ID because that was the instance ID set up by the instructions listed under Related Topics. SUMMARY STEPS 1. configure terminal 2. spanning-tree mst instance-id priority priority 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 543 Configuring the Hello Time (CLI) Layer 2/3 DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 spanning-tree mst instance-id priority priority Configures the switch priority. Example: Switch(config)# spanning-tree mst 0 priority 40960 · For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series of instances separated by a comma. The range is 0 to 4094. · For priority, the range is 0 to 61440 in increments of 4096; the default is 32768. The lower the number, the more likely the switch will be chosen as the root switch. Priority values are 0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344, and 61440. These are the only acceptable values. end Example: Switch(config-if)# end Returns to privileged EXEC mode. Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Configuring the Hello Time (CLI) The hello time is the time interval between configuration messages generated and sent by the root switch. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the hello time for all MST instances. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. SUMMARY STEPS 1. configure terminal 2. spanning-tree mst hello-time seconds 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 544 Layer 2/3 Configuring the Forwarding-Delay Time (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 spanning-tree mst hello-time seconds Example: Switch(config)# spanning-tree mst hello-time 4 end Example: Configures the hello time for all MST instances. The hello time is the time interval between configuration messages generated and sent by the root switch. These messages indicate that the switch is alive. For seconds, the range is 1 to 10; the default is 3. Returns to privileged EXEC mode. Switch(config)# end Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Configuring the Forwarding-Delay Time (CLI) Beginning in privileged EXEC mode, follow these steps to configure the forwarding-delay time for all MST instances. This procedure is optional. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. SUMMARY STEPS 1. configure terminal 2. spanning-tree mst forward-time seconds 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 545 Configuring the Maximum-Aging Time (CLI) Layer 2/3 Step 2 Step 3 Command or Action Purpose spanning-tree mst forward-time seconds Configures the forward time for all MST instances. The Example: forwarding delay is the number of seconds a port waits before changing from its spanning-tree learning and listening states to the forwarding state. Switch(config)# spanning-tree mst forward-time 25 For seconds, the range is 4 to 30; the default is 20. end Example: Returns to privileged EXEC mode. Switch(config)# end Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Configuring the Maximum-Aging Time (CLI) Beginning in privileged EXEC mode, follow these steps to configure the maximum-aging time for all MST instances. This procedure is optional. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. SUMMARY STEPS 1. configure terminal 2. spanning-tree mst max-age seconds 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 spanning-tree mst max-age seconds Example: Switch(config)# spanning-tree mst max-age 40 Configures the maximum-aging time for all MST instances. The maximum-aging time is the number of seconds a switch waits without receiving spanning-tree configuration messages before attempting a reconfiguration. For seconds, the range is 6 to 40; the default is 20. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 546 Layer 2/3 Configuring the Maximum-Hop Count (CLI) Step 3 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Configuring the Maximum-Hop Count (CLI) Beginning in privileged EXEC mode, follow these steps to configure the maximum-hop count for all MST instances. This procedure is optional. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. SUMMARY STEPS 1. configure terminal 2. spanning-tree mst max-hops hop-count 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 spanning-tree mst max-hops hop-count Example: Switch(config)# spanning-tree mst max-hops 25 end Example: Switch(config)# end Specifies the number of hops in a region before the BPDU is discarded, and the information held for a port is aged. For hop-count, the range is 1 to 255; the default is 20. Returns to privileged EXEC mode. Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 547 Specifying the Link Type to Ensure Rapid Transitions (CLI) Layer 2/3 Specifying the Link Type to Ensure Rapid Transitions (CLI) If you connect a port to another port through a point-to-point link and the local port becomes a designated port, the RSTP negotiates a rapid transition with the other port by using the proposal-agreement handshake to ensure a loop-free topology. By default, the link type is controlled from the duplex mode of the interface: a full-duplex port is considered to have a point-to-point connection; a half-duplex port is considered to have a shared connection. If you have a half-duplex link physically connected point-to-point to a single port on a remote switch running MSTP, you can override the default setting of the link type and enable rapid transitions to the forwarding state. Beginning in privileged EXEC mode, follow these steps to override the default link-type setting. This procedure is optional. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. You must also know the specified MST instance ID and the interface used. This example uses 0 as the instance ID and GigabitEthernet1/0/1 as the interface because that was the instance ID and interface set up by the instructions listed under Related Topics. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. spanning-tree link-type point-to-point 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 interface interface-id Example: Switch(config)# interface GigabitEthernet1/0/1 spanning-tree link-type point-to-point Example: Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports, VLANs, and port-channel logical interfaces. The VLAN ID range is 1 to 4094. The port-channel range is 1 to 48. Specifies that the link type of a port is point-to-point. Switch(config-if)# spanning-tree link-type point-to-point Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 548 Layer 2/3 Designating the Neighbor Type (CLI) Step 4 Command or Action end Example: Purpose Returns to privileged EXEC mode. Switch(config-if)# end Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Designating the Neighbor Type (CLI) A topology could contain both prestandard and IEEE 802.1s standard compliant devices. By default, ports can automatically detect prestandard devices, but they can still receive both standard and prestandard BPDUs. When there is a mismatch between a device and its neighbor, only the CIST runs on the interface. You can choose to set a port to send only prestandard BPDUs. The prestandard flag appears in all the show commands, even if the port is in STP compatibility mode. Beginning in privileged EXEC mode, follow these steps to override the default link-type setting. This procedure is optional. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. spanning-tree mst pre-standard 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports. Switch(config)# interface GigabitEthernet1/0/1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 549 Restarting the Protocol Migration Process (CLI) Layer 2/3 Step 3 Step 4 Command or Action spanning-tree mst pre-standard Example: Purpose Specifies that the port can send only prestandard BPDUs. Switch(config-if)# spanning-tree mst pre-standard end Example: Returns to privileged EXEC mode. Switch(config-if)# end Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Restarting the Protocol Migration Process (CLI) This procedure restarts the protocol migration process and forces renegotiation with neighboring switches. It reverts the switch to MST mode. It is needed when the switch no longer receives IEEE 802.1D BPDUs after it has been receiving them. Beginning in privileged EXEC mode, follow these steps to restart the protocol migration process (force the renegotiation with neighboring switches) on the switch. Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics. If you want to use the interface version of the command, you must also know the MST interface used. This example uses GigabitEthernet1/0/1 as the interface because that was the interface set up by the instructions listed under Related Topics. SUMMARY STEPS 1. Enter one of the following commands: · clear spanning-tree detected-protocols · clear spanning-tree detected-protocols interface interface-id DETAILED STEPS Step 1 Command or Action Enter one of the following commands: · clear spanning-tree detected-protocols · clear spanning-tree detected-protocols interface interface-id Example: Switch# clear spanning-tree detected-protocols Purpose The switch reverts to the MSTP mode, and the protocol migration process restarts. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 550 Layer 2/3 Monitoring MST Configuration and Status Command or Action or Switch# clear spanning-tree detected-protocols interface GigabitEthernet1/0/1 Purpose What to do next This procedure may need to be repeated if the switch receives more legacy IEEE 802.1D configuration BPDUs (BPDUs with the protocol version set to 0). Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Protocol Migration Process, on page 535 Monitoring MST Configuration and Status Table 58: Commands for Displaying MST Status show spanning-tree mst configuration show spanning-tree mst configuration digest show spanning-tree mst Displays the MST region configuration. Displays the MD5 digest included in the current MSTCI. Displays MST information for the all instances. Note This command displays information for ports in a link-up operative state. show spanning-tree mst instance-id Displays MST information for the specified instance. Note This command displays information only if the port is in a link-up operative state. show spanning-tree mst interface interface-id Displays MST information for the specified interface. Additional References for MSTP Related Documents Related Topic Spanning tree protocol commands Document Title LAN Switching Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 551 Feature Information for MSTP Layer 2/3 Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for MSTP Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 552 3 0 C H A P T E R Configuring Optional Spanning-Tree Features · Finding Feature Information, on page 553 · Restriction for Optional Spanning-Tree Features, on page 553 · Information About Optional Spanning-Tree Features, on page 554 · How to Configure Optional Spanning-Tree Features, on page 564 · Monitoring the Spanning-Tree Status, on page 574 · Additional References for Optional Spanning Tree Features, on page 575 · Feature Information for Optional Spanning-Tree Features, on page 576 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restriction for Optional Spanning-Tree Features · PortFast minimizes the time that interfaces must wait for spanning tree to converge, so it is effective only when used on interfaces connected to end stations. If you enable PortFast on an interface connecting to another switch, you risk creating a spanning-tree loop. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Related Topics Enabling PortFast (CLI), on page 564 PortFast, on page 554 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 553 Information About Optional Spanning-Tree Features Layer 2/3 Information About Optional Spanning-Tree Features PortFast PortFast immediately brings an interface configured as an access or trunk port to the forwarding state from a blocking state, bypassing the listening and learning states. Figure 30: PortFast-Enabled Interfaces You can use PortFast on interfaces connected to a single workstation or server to allow those devices to immediately connect to the network, rather than waiting for the spanning tree to converge. Interfaces connected to a single workstation or server should not receive bridge protocol data units (BPDUs). An interface with PortFast enabled goes through the normal cycle of spanning-tree status changes when the switch is restarted. You can enable this feature by enabling it on either the interface or on all nontrunking ports. Related Topics Enabling PortFast (CLI), on page 564 Restriction for Optional Spanning-Tree Features, on page 553 BPDU Guard The Bridge Protocol Data Unit (BPDU) guard feature can be globally enabled on the switch or can be enabled per port, but the feature operates with some differences. When you enable BPDU guard at the global level on PortFast-enabled ports, spanning tree shuts down ports that are in a PortFast-operational state if any BPDU is received on them. In a valid configuration, PortFast-enabled ports do not receive BPDUs. Receiving a BPDU on a Port Fast-enabled port means an invalid configuration, such as the connection of an unauthorized device, and the BPDU guard feature puts the port in the error-disabled state. When this happens, the switch shuts down the entire port on which the violation occurred. When you enable BPDU guard at the interface level on any port without also enabling the PortFast feature, and the port receives a BPDU, it is put in the error-disabled state. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 554 Layer 2/3 BPDU Filtering The BPDU guard feature provides a secure response to invalid configurations because you must manually put the interface back in service. Use the BPDU guard feature in a service-provider network to prevent an access port from participating in the spanning tree. Related Topics Enabling BPDU Guard (CLI), on page 565 BPDU Filtering The BPDU filtering feature can be globally enabled on the switch or can be enabled per interface, but the feature operates with some differences. Enabling BPDU filtering on PortFast-enabled interfaces at the global level keeps those interfaces that are in a PortFast-operational state from sending or receiving BPDUs. The interfaces still send a few BPDUs at link-up before the switch begins to filter outbound BPDUs. You should globally enable BPDU filtering on a switch so that hosts connected to these interfaces do not receive BPDUs. If a BPDU is received on a PortFast-enabled interface, the interface loses its PortFast-operational status, and BPDU filtering is disabled. Enabling BPDU filtering on an interface without also enabling the PortFast feature keeps the interface from sending or receiving BPDUs. Caution Enabling BPDU filtering on an interface is the same as disabling spanning tree on it and can result in spanning-tree loops. You can enable the BPDU filtering feature for the entire switch or for an interface. Related Topics Enabling BPDU Filtering (CLI), on page 566 UplinkFast Figure 31: Switches in a Hierarchical Network Switches in hierarchical networks can be grouped into backbone switches, distribution switches, and access switches. This complex network has distribution switches and access switches that each have at least one Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 555 UplinkFast redundant link that spanning tree blocks to prevent Layer 2/3 loops. If a switch loses connectivity, it begins using the alternate paths as soon as the spanning tree selects a new root port. You can accelerate the choice of a new root port when a link or switch fails or when the spanning tree reconfigures itself by enabling UplinkFast. The root port transitions to the forwarding state immediately without going through the listening and learning states, as it would with the normal spanning-tree procedures. When the spanning tree reconfigures the new root port, other interfaces flood the network with multicast packets, one for each address that was learned on the interface. You can limit these bursts of multicast traffic by reducing the max-update-rate parameter (the default for this parameter is 150 packets per second). However, if you enter zero, station-learning frames are not generated, so the spanning-tree topology converges more slowly after a loss of connectivity. Note UplinkFast is most useful in wiring-closet switches at the access or edge of the network. It is not appropriate for backbone devices. This feature might not be useful for other types of applications. UplinkFast provides fast convergence after a direct link failure and achieves load-balancing between redundant Layer 2 links using uplink groups. An uplink group is a set of Layer 2 interfaces (per VLAN), only one of which is forwarding at any given time. Specifically, an uplink group consists of the root port (which is forwarding) and a set of blocked ports, except for self-looping ports. The uplink group provides an alternate path in case the currently forwarding link fails. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 556 Layer 2/3 Cross-Stack UplinkFast Figure 32: UplinkFast Example Before Direct Link Failure This topology has no link failures. Switch A, the root switch, is connected directly to Switch B over link L1 and to Switch C over link L2. The Layer 2 interface on Switch C that is connected directly to Switch B is in a blocking state. Figure 33: UplinkFast Example After Direct Link Failure If Switch C detects a link failure on the currently active link L2 on the root port (a direct link failure), UplinkFast unblocks the blocked interface on Switch C and transitions it to the forwarding state without going through the listening and learning states. This change takes approximately 1 to 5 seconds. Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523 Enabling UplinkFast for Use with Redundant Links (CLI), on page 568 Events That Cause Fast Convergence, on page 559 Cross-Stack UplinkFast Cross-Stack UplinkFast (CSUF) provides a fast spanning-tree transition (fast convergence in less than 1 second under normal network conditions) across a switch stack. During the fast transition, an alternate redundant link on the switch stack is placed in the forwarding state without causing temporary spanning-tree loops or loss of connectivity to the backbone. With this feature, you can have a redundant and resilient network in some configurations. CSUF is automatically enabled when you enable the UplinkFast feature. CSUF might not provide a fast transition all the time; in these cases, the normal spanning-tree transition occurs, completing in 30 to 40 seconds. For more information, see Related Topics. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 557 How Cross-Stack UplinkFast Works Layer 2/3 Related Topics Enabling UplinkFast for Use with Redundant Links (CLI), on page 568 Events That Cause Fast Convergence, on page 559 How Cross-Stack UplinkFast Works Cross-Stack UplinkFast (CSUF) ensures that one link in the stack is elected as the path to the root. Figure 34: Cross-Stack UplinkFast Topology The stack-root port on Switch 1 provides the path to the root of the spanning tree. The alternate stack-root ports on Switches 2 and 3 can provide an alternate path to the spanning-tree root if the current stack-root switch fails or if its link to the spanning-tree root fails. Link 1, the root link, is in the spanning-tree forwarding state. Links 2 and 3 are alternate redundant links that are in the spanning-tree blocking state. If Switch 1 fails, if its stack-root port fails, or if Link 1 fails, CSUF selects either the alternate stack-root port on Switch 2 or Switch 3 and puts it into the forwarding state in less than 1 second. When certain link loss or spanning-tree events occur (described in the following topic), the Fast Uplink Transition Protocol uses the neighbor list to send fast-transition requests to stack members. The switch sending the fast-transition request needs to do a fast transition to the forwarding state of a port that it has chosen as the root port, and it must obtain an acknowledgment from each stack switch before performing the fast transition. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 558 Layer 2/3 Events That Cause Fast Convergence Each switch in the stack decides if the sending switch is a better choice than itself to be the stack root of this spanning-tree instance by comparing the root, cost, and bridge ID. If the sending switch is the best choice as the stack root, each switch in the stack returns an acknowledgment; otherwise, it sends a fast-transition request. The sending switch then has not received acknowledgments from all stack switches. When acknowledgments are received from all stack switches, the Fast Uplink Transition Protocol on the sending switch immediately transitions its alternate stack-root port to the forwarding state. If acknowledgments from all stack switches are not obtained by the sending switch, the normal spanning-tree transitions (blocking, listening, learning, and forwarding) take place, and the spanning-tree topology converges at its normal rate (2 * forward-delay time + max-age time). The Fast Uplink Transition Protocol is implemented on a per-VLAN basis and affects only one spanning-tree instance at a time. Related Topics Enabling UplinkFast for Use with Redundant Links (CLI), on page 568 Events That Cause Fast Convergence, on page 559 Events That Cause Fast Convergence Depending on the network event or failure, the CSUF fast convergence might or might not occur. Fast convergence (less than 1 second under normal network conditions) occurs under these circumstances: · The stack-root port link fails. If two switches in the stack have alternate paths to the root, only one of the switches performs the fast transition. · The failed link, which connects the stack root to the spanning-tree root, recovers. · A network reconfiguration causes a new stack-root switch to be selected. · A network reconfiguration causes a new port on the current stack-root switch to be chosen as the stack-root port. Note The fast transition might not occur if multiple events occur simultaneously. For example, if a stack member is powered off, and at the same time, the link connecting the stack root to the spanning-tree root comes back up, the normal spanning-tree convergence occurs. Normal spanning-tree convergence (30 to 40 seconds) occurs under these conditions: · The stack-root switch is powered off, or the software failed. · The stack-root switch, which was powered off or failed, is powered on. · A new switch, which might become the stack root, is added to the stack. Related Topics Enabling UplinkFast for Use with Redundant Links (CLI), on page 568 UplinkFast, on page 555 Cross-Stack UplinkFast, on page 557 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 559 BackboneFast Layer 2/3 How Cross-Stack UplinkFast Works, on page 558 BackboneFast BackboneFast detects indirect failures in the core of the backbone. BackboneFast is a complementary technology to the UplinkFast feature, which responds to failures on links directly connected to access switches. BackboneFast optimizes the maximum-age timer, which controls the amount of time the switch stores protocol information received on an interface. When a switch receives an inferior BPDU from the designated port of another switch, the BPDU is a signal that the other switch might have lost its path to the root, and BackboneFast tries to find an alternate path to the root. BackboneFast starts when a root port or blocked interface on a switch receives inferior BPDUs from its designated switch. An inferior BPDU identifies a switch that declares itself as both the root bridge and the designated switch. When a switch receives an inferior BPDU, it means that a link to which the switch is not directly connected (an indirect link) has failed (that is, the designated switch has lost its connection to the root switch). Under spanning-tree rules, the switch ignores inferior BPDUs for the maximum aging time (default is 20 seconds). The switch tries to find if it has an alternate path to the root switch. If the inferior BPDU arrives on a blocked interface, the root port and other blocked interfaces on the switch become alternate paths to the root switch. (Self-looped ports are not considered alternate paths to the root switch.) If the inferior BPDU arrives on the root port, all blocked interfaces become alternate paths to the root switch. If the inferior BPDU arrives on the root port and there are no blocked interfaces, the switch assumes that it has lost connectivity to the root switch, causes the maximum aging time on the root port to expire, and becomes the root switch according to normal spanning-tree rules. If the switch has alternate paths to the root switch, it uses these alternate paths to send a root link query (RLQ) request. The switch sends the RLQ request on all alternate paths to learn if any stack member has an alternate root to the root switch and waits for an RLQ reply from other switches in the network and in the stack. The switch sends the RLQ request on all alternate paths and waits for an RLQ reply from other switches in the network. When a stack member receives an RLQ reply from a nonstack member on a blocked interface and the reply is destined for another nonstacked switch, it forwards the reply packet, regardless of the spanning-tree interface state. When a stack member receives an RLQ reply from a nonstack member and the response is destined for the stack, the stack member forwards the reply so that all the other stack members receive it. If the switch discovers that it still has an alternate path to the root, it expires the maximum aging time on the interface that received the inferior BPDU. If all the alternate paths to the root switch indicate that the switch has lost connectivity to the root switch, the switch expires the maximum aging time on the interface that received the RLQ reply. If one or more alternate paths can still connect to the root switch, the switch makes all interfaces on which it received an inferior BPDU its designated ports and moves them from the blocking state (if they were in the blocking state), through the listening and learning states, and into the forwarding state. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 560 Layer 2/3 BackboneFast Figure 35: BackboneFast Example Before Indirect Link Failure This is an example topology with no link failures. Switch A, the root switch, connects directly to Switch B over link L1 and to Switch C over link L2. The Layer 2 interface on Switch C that connects directly to Switch B is in the blocking state. Figure 36: BackboneFast Example After Indirect Link Failure If link L1 fails, Switch C cannot detect this failure because it is not connected directly to link L1. However, because Switch B is directly connected to the root switch over L1, it detects the failure, elects itself the root, and begins sending BPDUs to Switch C, identifying itself as the root. When Switch C receives the inferior BPDUs from Switch B, Switch C assumes that an indirect failure has occurred. At that point, BackboneFast allows the blocked interface on Switch C to move immediately to the listening state without waiting for the maximum aging time for the interface to expire. BackboneFast then transitions the Layer 2 interface on Switch C to the forwarding state, providing a path from Switch B to Switch A. The root-switch election takes approximately 30 seconds, twice the Forward Delay time if the default Forward Delay time of 15 seconds is set. BackboneFast reconfigures the topology to account for the failure of link L1. Figure 37: Adding a Switch in a Shared-Medium Topology If a new switch is introduced into a shared-medium topology, BackboneFast is not activated because the inferior BPDUs did not come from the recognized designated switch (Switch B). The new switch begins sending inferior BPDUs that indicate it is the root switch. However, the other switches ignore these inferior Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 561 EtherChannel Guard Layer 2/3 BPDUs, and the new switch learns that Switch B is the designated switch to Switch A, the root switch. Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523 Enabling BackboneFast (CLI), on page 570 EtherChannel Guard You can use EtherChannel guard to detect an EtherChannel misconfiguration between the switch and a connected device. A misconfiguration can occur if the switch interfaces are configured in an EtherChannel, but the interfaces on the other device are not. A misconfiguration can also occur if the channel parameters are not the same at both ends of the EtherChannel. If the switch detects a misconfiguration on the other device, EtherChannel guard places the switch interfaces in the error-disabled state, and displays an error message. Related Topics Enabling EtherChannel Guard (CLI), on page 571 Root Guard Figure 38: Root Guard in a Service-Provider Network The Layer 2 network of a service provider (SP) can include many connections to switches that are not owned by the SP. In such a topology, the spanning tree can reconfigure itself and select a customer switch as the root switch. You can avoid this situation by enabling root guard on SP switch interfaces that connect to switches in your customer's network. If spanning-tree calculations cause an interface in the customer network to be selected as the root port, root guard then places the interface in the root-inconsistent (blocked) state to prevent the customer's switch from becoming the root switch or being in the path to the root. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 562 Layer 2/3 Loop Guard If a switch outside the SP network becomes the root switch, the interface is blocked (root-inconsistent state), and spanning tree selects a new root switch. The customer's switch does not become the root switch and is not in the path to the root. If the switch is operating in multiple spanning-tree (MST) mode, root guard forces the interface to be a designated port. If a boundary port is blocked in an internal spanning-tree (IST) instance because of root guard, the interface also is blocked in all MST instances. A boundary port is an interface that connects to a LAN, the designated switch of which is either an IEEE 802.1D switch or a switch with a different MST region configuration. Root guard enabled on an interface applies to all the VLANs to which the interface belongs. VLANs can be grouped and mapped to an MST instance. Caution Misuse of the root guard feature can cause a loss of connectivity. Related Topics Enabling Root Guard (CLI), on page 572 Loop Guard You can use loop guard to prevent alternate or root ports from becoming designated ports because of a failure that leads to a unidirectional link. This feature is most effective when it is enabled on the entire switched network. Loop guard prevents alternate and root ports from becoming designated ports, and spanning tree does not send BPDUs on root or alternate ports. When the switch is operating in PVST+ or rapid-PVST+ mode, loop guard prevents alternate and root ports from becoming designated ports, and spanning tree does not send BPDUs on root or alternate ports. When the switch is operating in MST mode, BPDUs are not sent on nonboundary ports only if the interface is blocked by loop guard in all MST instances. On a boundary port, loop guard blocks the interface in all MST instances. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 563 How to Configure Optional Spanning-Tree Features Layer 2/3 Related Topics Enabling Loop Guard (CLI), on page 573 How to Configure Optional Spanning-Tree Features Enabling PortFast (CLI) An interface with the PortFast feature enabled is moved directly to the spanning-tree forwarding state without waiting for the standard forward-time delay. If you enable the voice VLAN feature, the PortFast feature is automatically enabled. When you disable voice VLAN, the PortFast feature is not automatically disabled. You can enable this feature if your switch is running PVST+, Rapid PVST+, or MSTP. Caution Use PortFast only when connecting a single end station to an access or trunk port. Enabling this feature on an interface connected to a switch or hub could prevent spanning tree from detecting and disabling loops in your network, which could cause broadcast storms and address-learning problems. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable PortFast on the switch. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. spanning-tree portfast [trunk] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies an interface to configure, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 564 Layer 2/3 Enabling BPDU Guard (CLI) Step 3 Step 4 Command or Action Purpose spanning-tree portfast [trunk] Example: Enables PortFast on an access port connected to a single workstation or server. By specifying the trunk keyword, you can enable PortFast on a trunk port. Switch(config-if)# spanning-tree portfast trunk Note To enable PortFast on trunk ports, you must use the spanning-tree portfast trunk interface configuration command. The spanning-tree portfast command will not work on trunk ports. Make sure that there are no loops in the network between the trunk port and the workstation or server before you enable PortFast on a trunk port. end Example: By default, PortFast is disabled on all interfaces. Returns to privileged EXEC mode. Switch(config-if)# end What to do next You can use the spanning-tree portfast default global configuration command to globally enable the PortFast feature on all nontrunking ports. Related Topics PortFast, on page 554 Restriction for Optional Spanning-Tree Features, on page 553 Enabling BPDU Guard (CLI) You can enable the BPDU guard feature if your switch is running PVST+, Rapid PVST+, or MSTP. Caution Configure PortFast only on ports that connect to end stations; otherwise, an accidental topology loop could cause a data packet loop and disrupt switch and network operation. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable BPDU guard on the switch. SUMMARY STEPS 1. configure terminal 2. spanning-tree portfast bpduguard default 3. interface interface-id 4. spanning-tree portfast 5. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 565 Enabling BPDU Filtering (CLI) Layer 2/3 DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 Step 4 Step 5 spanning-tree portfast bpduguard default Example: Globally enables BPDU guard. By default, BPDU guard is disabled. Switch(config)# spanning-tree portfast bpduguard default interface interface-id Example: Specifies the interface connected to an end station, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 spanning-tree portfast Example: Enables the PortFast feature. Switch(config-if)# spanning-tree portfast end Example: Returns to privileged EXEC mode. Switch(config-if)# end What to do next To prevent the port from shutting down, you can use the errdisable detect cause bpduguard shutdown vlan global configuration command to shut down just the offending VLAN on the port where the violation occurred. You also can use the spanning-tree bpduguard enable interface configuration command to enable BPDU guard on any port without also enabling the PortFast feature. When the port receives a BPDU, it is put it in the error-disabled state. Related Topics BPDU Guard, on page 554 Enabling BPDU Filtering (CLI) You can also use the spanning-tree bpdufilter enable interface configuration command to enable BPDU filtering on any interface without also enabling the PortFast feature. This command prevents the interface from sending or receiving BPDUs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 566 Layer 2/3 Enabling BPDU Filtering (CLI) Caution Enabling BPDU filtering on an interface is the same as disabling spanning tree on it and can result in spanning-tree loops. You can enable the BPDU filtering feature if your switch is running PVST+, Rapid PVST+, or MSTP. Caution Configure PortFast only on interfaces that connect to end stations; otherwise, an accidental topology loop could cause a data packet loop and disrupt switch and network operation. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable BPDU filtering on the switch. SUMMARY STEPS 1. configure terminal 2. spanning-tree portfast bpdufilter default 3. interface interface-id 4. spanning-tree portfast 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 spanning-tree portfast bpdufilter default Example: Globally enables BPDU filtering. By default, BPDU filtering is disabled. Switch(config)# spanning-tree portfast bpdufilter default interface interface-id Example: Specifies the interface connected to an end station, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 spanning-tree portfast Example: Enables the PortFast feature on the specified interface. Switch(config-if)# spanning-tree portfast Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 567 Enabling UplinkFast for Use with Redundant Links (CLI) Layer 2/3 Step 5 Command or Action end Example: Switch(config-if)# end Purpose Returns to privileged EXEC mode. Related Topics BPDU Filtering, on page 555 Enabling UplinkFast for Use with Redundant Links (CLI) Note When you enable UplinkFast, it affects all VLANs on the switch or switch stack. You cannot configure UplinkFast on an individual VLAN. You can configure the UplinkFast or the Cross-Stack UplinkFast (CSUF) feature for Rapid PVST+ or for the MSTP, but the feature remains disabled (inactive) until you change the spanning-tree mode to PVST+. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable UplinkFast and CSUF. Before you begin UplinkFast cannot be enabled on VLANs that have been configured with a switch priority. To enable UplinkFast on a VLAN with switch priority configured, first restore the switch priority on the VLAN to the default value using the no spanning-tree vlan vlan-id priority global configuration command. SUMMARY STEPS 1. configure terminal 2. spanning-tree uplinkfast [max-update-rate pkts-per-second] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 spanning-tree uplinkfast [max-update-rate pkts-per-second] Example: Enables UplinkFast. (Optional) For pkts-per-second, the range is 0 to 32000 packets per second; the default is 150. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 568 Layer 2/3 Disabling UplinkFast (CLI) Command or Action Switch(config)# spanning-tree uplinkfast max-update-rate 200 Step 3 end Example: Switch(config)# end Purpose If you set the rate to 0, station-learning frames are not generated, and the spanning-tree topology converges more slowly after a loss of connectivity. When you enter this command, CSUF also is enabled on all nonstack port interfaces. Returns to privileged EXEC mode. When UplinkFast is enabled, the switch priority of all VLANs is set to 49152. If you change the path cost to a value less than 3000 and you enable UplinkFast or UplinkFast is already enabled, the path cost of all interfaces and VLAN trunks is increased by 3000 (if you change the path cost to 3000 or above, the path cost is not altered). The changes to the switch priority and the path cost reduce the chance that a switch will become the root switch. When UplinkFast is disabled, the switch priorities of all VLANs and path costs of all interfaces are set to default values if you did not modify them from their defaults. When you enable the UplinkFast feature using these instructions, CSUF is automatically globally enabled on nonstack port interfaces. Related Topics UplinkFast, on page 555 Cross-Stack UplinkFast, on page 557 How Cross-Stack UplinkFast Works, on page 558 Events That Cause Fast Convergence, on page 559 Disabling UplinkFast (CLI) This procedure is optional. Beginning in privileged EXEC mode, follow these steps to disable UplinkFast and Cross-Stack UplinkFast (CSUF). Before you begin UplinkFast must be enabled. SUMMARY STEPS 1. configure terminal 2. no spanning-tree uplinkfast 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 569 Enabling BackboneFast (CLI) Layer 2/3 DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 Step 3 no spanning-tree uplinkfast Example: Switch(config)# no spanning-tree uplinkfast end Example: Switch(config)# end Purpose Enters the global configuration mode. Disables UplinkFast and CSUF on the switch and all of its VLANs. Returns to privileged EXEC mode. When UplinkFast is disabled, the switch priorities of all VLANs and path costs of all interfaces are set to default values if you did not modify them from their defaults. When you disable the UplinkFast feature using these instructions, CSUF is automatically globally disabled on nonstack port interfaces. Enabling BackboneFast (CLI) You can enable BackboneFast to detect indirect link failures and to start the spanning-tree reconfiguration sooner. You can configure the BackboneFast feature for Rapid PVST+ or for the MSTP, but the feature remains disabled (inactive) until you change the spanning-tree mode to PVST+. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable BackboneFast on the switch. Before you begin If you use BackboneFast, you must enable it on all switches in the network. BackboneFast is not supported on Token Ring VLANs. This feature is supported for use with third-party switches. SUMMARY STEPS 1. configure terminal 2. spanning-tree backbonefast 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 570 Layer 2/3 Enabling EtherChannel Guard (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 Step 3 spanning-tree backbonefast Example: Switch(config)# spanning-tree backbonefast end Example: Switch(config)# end Purpose Enters the global configuration mode. Enables BackboneFast. Returns to privileged EXEC mode. Related Topics BackboneFast, on page 560 Enabling EtherChannel Guard (CLI) You can enable EtherChannel guard to detect an EtherChannel misconfiguration if your switch is running PVST+, Rapid PVST+, or MSTP. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable EtherChannel Guard on the switch. SUMMARY STEPS 1. configure terminal 2. spanning-tree etherchannel guard misconfig 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 spanning-tree etherchannel guard misconfig Example: Enables EtherChannel guard. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 571 Enabling Root Guard (CLI) Layer 2/3 Step 3 Command or Action Purpose Switch(config)# spanning-tree etherchannel guard misconfig end Example: Returns to privileged EXEC mode. Switch(config)# end What to do next You can use the show interfaces status err-disabled privileged EXEC command to show which switch ports are disabled because of an EtherChannel misconfiguration. On the remote device, you can enter the show etherchannel summary privileged EXEC command to verify the EtherChannel configuration. After the configuration is corrected, enter the shutdown and no shutdown interface configuration commands on the port-channel interfaces that were misconfigured. Related Topics EtherChannel Guard, on page 562 Enabling Root Guard (CLI) Root guard enabled on an interface applies to all the VLANs to which the interface belongs. Do not enable the root guard on interfaces to be used by the UplinkFast feature. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the case of a failure. However, if root guard is also enabled, all the backup interfaces used by the UplinkFast feature are placed in the root-inconsistent state (blocked) and are prevented from reaching the forwarding state. Note You cannot enable both root guard and loop guard at the same time. You can enable this feature if your switch is running PVST+, Rapid PVST+, or MSTP. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable root guard on the switch. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. spanning-tree guard root 4. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 572 Layer 2/3 Enabling Loop Guard (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 Step 4 interface interface-id Example: Specifies an interface to configure, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 spanning-tree guard root Example: Enables root guard on the interface. By default, root guard is disabled on all interfaces. Switch(config-if)# spanning-tree guard root end Example: Returns to privileged EXEC mode. Switch(config-if)# end Related Topics Root Guard, on page 562 Enabling Loop Guard (CLI) You can use loop guard to prevent alternate or root ports from becoming designated ports because of a failure that leads to a unidirectional link. This feature is most effective when it is configured on the entire switched network. Loop guard operates only on interfaces that are considered point-to-point by the spanning tree. Note You cannot enable both loop guard and root guard at the same time. You can enable this feature if your switch is running PVST+, Rapid PVST+, or MSTP. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable loop guard on the switch. SUMMARY STEPS 1. Enter one of the following commands: · show spanning-tree active · show spanning-tree mst 2. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 573 Monitoring the Spanning-Tree Status Layer 2/3 3. spanning-tree loopguard default 4. end DETAILED STEPS Step 1 Command or Action Enter one of the following commands: · show spanning-tree active · show spanning-tree mst Example: Switch# show spanning-tree active or Purpose Verifies which interfaces are alternate or root ports. Step 2 Switch# show spanning-tree mst configure terminal Example: Enters global configuration mode. Step 3 Step 4 Switch# configure terminal spanning-tree loopguard default Example: Enables loop guard. By default, loop guard is disabled. Switch(config)# spanning-tree loopguard default end Example: Returns to privileged EXEC mode. Switch(config)# end Related Topics Loop Guard, on page 563 Monitoring the Spanning-Tree Status Table 59: Commands for Monitoring the Spanning-Tree Status show spanning-tree active show spanning-tree detail show spanning-tree interface interface-id Displays spanning-tree information on active interfaces only. Displays a detailed summary of interface information. Displays spanning-tree information for the specified interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 574 Layer 2/3 Additional References for Optional Spanning Tree Features show spanning-tree mst interface interface-id show spanning-tree summary [totals] Displays MST information for the specified interface. Displays a summary of interface states or displays the total lines of the spanning-tree state section. Additional References for Optional Spanning Tree Features Related Documents Related Topic Spanning tree protocol commands Document Title LAN Switching Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 575 Feature Information for Optional Spanning-Tree Features Layer 2/3 Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for Optional Spanning-Tree Features Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 576 3 1 C H A P T E R Configuring EtherChannels · Finding Feature Information, on page 577 · Restrictions for EtherChannels, on page 577 · Information About EtherChannels, on page 578 · How to Configure EtherChannels, on page 592 · Monitoring EtherChannel, PAgP, and LACP Status, on page 605 · Configuration Examples for Configuring EtherChannels, on page 606 · Additional References for EtherChannels, on page 608 · Feature Information for EtherChannels, on page 609 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for EtherChannels The following are restrictions for EtherChannels: · All ports in an EtherChannel must be assigned to the same VLAN or they must be configured as trunk ports. · Layer 3 EtherChannels are not supported if running the LAN Base license feature set. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 577 Information About EtherChannels Layer 2/3 Information About EtherChannels EtherChannel Overview An EtherChannel consists of individual Ethernet links bundled into a single logical link. Figure 39: Typical EtherChannel Configuration The EtherChannel provides full-duplex bandwidth up to 8 Gb/s (Gigabit EtherChannel) or 80 Gb/s (10-Gigabit EtherChannel) between your switch and another switch or host. Each EtherChannel can consist of up to eight compatibly configured Ethernet ports. The number of EtherChannels is limited to 128. The LAN Base feature set supports up to 24 EtherChannels. All ports in each EtherChannel must be configured as either Layer 2 or Layer 3 ports. The EtherChannel Layer 3 ports are made up of routed ports. Routed ports are physical ports configured to be in Layer 3 mode by using the no switchport interface configuration command. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 578 Layer 2/3 EtherChannel Modes EtherChannel Modes You can configure an EtherChannel in one of these modes: Port Aggregation Protocol (PAgP), Link Aggregation Control Protocol (LACP), or On. Configure both ends of the EtherChannel in the same mode: · When you configure one end of an EtherChannel in either PAgP or LACP mode, the system negotiates with the other end of the channel to determine which ports should become active. If the remote port cannot negotiate an EtherChannel, the local port is put into an independent state and continues to carry data traffic as would any other single link. The port configuration does not change, but the port does not participate in the EtherChannel. · When you configure an EtherChannel in the on mode, no negotiations take place. The switch forces all compatible ports to become active in the EtherChannel. The other end of the channel (on the other switch) must also be configured in the on mode; otherwise, packet loss can occur. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 EtherChannel on Switches You can create an EtherChannel on a switch, on a single switch in the stack, or on multiple switches in the stack (known as cross-stack EtherChannel). Figure 40: Single-Switch EtherChannel Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 579 EtherChannel Link Failover Figure 41: Cross-Stack EtherChannel Layer 2/3 Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 EtherChannel Link Failover If a link within an EtherChannel fails, traffic previously carried over that failed link moves to the remaining links within the EtherChannel. If traps are enabled on the switch, a trap is sent for a failure that identifies the switch, the EtherChannel, and the failed link. Inbound broadcast and multicast packets on one link in an EtherChannel are blocked from returning on any other link of the EtherChannel. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Channel Groups and Port-Channel Interfaces An EtherChannel comprises a channel group and a port-channel interface. The channel group binds physical ports to the port-channel interface. Configuration changes applied to the port-channel interface apply to all the physical ports bound together in the channel group. Figure 42: Relationship of Physical Ports, Channel Group and Port-Channel Interface The channel-group command binds the physical port and the port-channel interface together. Each EtherChannel has a port-channel logical interface numbered from 1 to 128. This port-channel interface number corresponds to the one specified with the channel-group interface configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 580 Layer 2/3 Port Aggregation Protocol · With Layer 2 ports, use the channel-group interface configuration command to dynamically create the port-channel interface. You also can use the interface port-channel port-channel-number global configuration command to manually create the port-channel interface, but then you must use the channel-group channel-group-number command to bind the logical interface to a physical port. The channel-group-number can be the same as the port-channel-number, or you can use a new number. If you use a new number, the channel-group command dynamically creates a new port channel. · With Layer 3 ports, you should manually create the logical interface by using the interface port-channel global configuration command followed by the no switchport interface configuration command. You then manually assign an interface to the EtherChannel by using the channel-group interface configuration command. · With Layer 3 ports, use the no switchport interface command to configure the interface as a Layer 3 interface, and then use the channel-group interface configuration command to dynamically create the port-channel interface. Related Topics Creating Port-Channel Logical Interfaces (CLI) EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Configuring the Physical Interfaces (CLI) Port Aggregation Protocol The Port Aggregation Protocol (PAgP) is a Cisco-proprietary protocol that can be run only on Cisco switches and on those switches licensed by vendors to support PAgP. PAgP facilitates the automatic creation of EtherChannels by exchanging PAgP packets between Ethernet ports. PAgP can be enabled on cross-stack EtherChannels. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 581 PAgP Modes Layer 2/3 PAgP Modes Silent Mode By using PAgP, the switch or switch stack learns the identity of partners capable of supporting PAgP and the capabilities of each port. It then dynamically groups similarly configured ports (on a single switch in the stack) into a single logical link (channel or aggregate port). Similarly configured ports are grouped based on hardware, administrative, and port parameter constraints. For example, PAgP groups the ports with the same speed, duplex mode, native VLAN, VLAN range, and trunking status and type. After grouping the links into an EtherChannel, PAgP adds the group to the spanning tree as a single switch port. PAgP modes specify whether a port can send PAgP packets, which start PAgP negotiations, or only respond to PAgP packets received. Table 60: EtherChannel PAgP Modes Mode auto desirable Description Places a port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. This setting minimizes the transmission of PAgP packets. Places a port into an active negotiating state, in which the port starts negotiations with other ports by sending PAgP packets. This mode is supported when the EtherChannel members are from different switches in the switch stack (cross-stack EtherChannel). Switch ports exchange PAgP packets only with partner ports configured in the auto or desirable modes. Ports configured in the on mode do not exchange PAgP packets. Both the auto and desirable modes enable ports to negotiate with partner ports to form an EtherChannel based on criteria such as port speed. and for Layer 2 EtherChannels, based on trunk state and VLAN numbers. Ports can form an EtherChannel when they are in different PAgP modes as long as the modes are compatible. For example: · A port in the desirable mode can form an EtherChannel with another port that is in the desirable or auto mode. · A port in the auto mode can form an EtherChannel with another port in the desirable mode. A port in the auto mode cannot form an EtherChannel with another port that is also in the auto mode because neither port starts PAgP negotiation. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Creating Port-Channel Logical Interfaces (CLI) Configuring the Physical Interfaces (CLI) If your switch is connected to a partner that is PAgP-capable, you can configure the switch port for nonsilent operation by using the non-silent keyword. If you do not specify non-silent with the auto or desirable mode, silent mode is assumed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 582 Layer 2/3 PAgP Learn Method and Priority Use the silent mode when the switch is connected to a device that is not PAgP-capable and seldom, if ever, sends packets. An example of a silent partner is a file server or a packet analyzer that is not generating traffic. In this case, running PAgP on a physical port connected to a silent partner prevents that switch port from ever becoming operational. However, the silent setting allows PAgP to operate, to attach the port to a channel group, and to use the port for transmission. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Creating Port-Channel Logical Interfaces (CLI) Configuring the Physical Interfaces (CLI) PAgP Learn Method and Priority Network devices are classified as PAgP physical learners or aggregate-port learners. A device is a physical learner if it learns addresses by physical ports and directs transmissions based on that knowledge. A device is an aggregate-port learner if it learns addresses by aggregate (logical) ports. The learn method must be configured the same at both ends of the link. When a device and its partner are both aggregate-port learners, they learn the address on the logical port-channel. The device sends packets to the source by using any of the ports in the EtherChannel. With aggregate-port learning, it is not important on which physical port the packet arrives. PAgP cannot automatically detect when the partner device is a physical learner and when the local device is an aggregate-port learner. Therefore, you must manually set the learning method on the local device to learn addresses by physical ports. You also must set the load-distribution method to source-based distribution, so that any given source MAC address is always sent on the same physical port. You also can configure a single port within the group for all transmissions and use other ports for hot-standby. The unused ports in the group can be swapped into operation in just a few seconds if the selected single port loses hardware-signal detection. You can configure which port is always selected for packet transmission by changing its priority with the pagp port-priority interface configuration command. The higher the priority, the more likely that the port will be selected. Note The switch supports address learning only on aggregate ports even though the physical-port keyword is provided in the CLI. The pagp learn-method command and the pagp port-priority command have no effect on the switch hardware, but they are required for PAgP interoperability with devices that only support address learning by physical ports, such as the Catalyst 1900 switch. When the link partner of the switch is a physical learner, we recommend that you configure the switch as a physical-port learner by using the pagp learn-method physical-port interface configuration command. Set the load-distribution method based on the source MAC address by using the port-channel load-balance src-mac global configuration command. The switch then sends packets to the physcial learner using the same port in the EtherChannel from which it learned the source address. Only use the pagp learn-method command in this situation. Related Topics Configuring the PAgP Learn Method and Priority (CLI), on page 599 EtherChannel Configuration Guidelines, on page 590 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 583 PAgP Interaction with Other Features Layer 2/3 Default EtherChannel Configuration, on page 589 Monitoring EtherChannel, PAgP, and LACP Status, on page 605 Layer 2 EtherChannel Configuration Guidelines, on page 591 PAgP Interaction with Other Features The Dynamic Trunking Protocol (DTP) and the Cisco Discovery Protocol (CDP) send and receive packets over the physical ports in the EtherChannel. Trunk ports send and receive PAgP protocol data units (PDUs) on the lowest numbered VLAN. In Layer 2 EtherChannels, the first port in the channel that comes up provides its MAC address to the EtherChannel. If this port is removed from the bundle, one of the remaining ports in the bundle provides its MAC address to the EtherChannel. For Layer 3 EtherChannels, the MAC address is allocated by the active switch as soon as the interface is created (through the interface port-channel global configuration command). PAgP sends and receives PAgP PDUs only from ports that are up and have PAgP enabled for the auto or desirable mode. Link Aggregation Control Protocol The LACP is defined in IEEE 802.3ad and enables Cisco switches to manage Ethernet channels between switches that conform to the IEEE 802.3ad protocol. LACP facilitates the automatic creation of EtherChannels by exchanging LACP packets between Ethernet ports. By using LACP, the switch or switch stack learns the identity of partners capable of supporting LACP and the capabilities of each port. It then dynamically groups similarly configured ports into a single logical link (channel or aggregate port). Similarly configured ports are grouped based on hardware, administrative, and port parameter constraints. For example, LACP groups the ports with the same speed, duplex mode, native VLAN, VLAN range, and trunking status and type. After grouping the links into an EtherChannel, LACP adds the group to the spanning tree as a single switch port. LACP Modes LACP modes specify whether a port can send LACP packets or only receive LACP packets. Table 61: EtherChannel LACP Modes Mode active passive Description Places a port into an active negotiating state in which the port starts negotiations with other ports by sending LACP packets. Places a port into a passive negotiating state in which the port responds to LACP packets that it receives, but does not start LACP packet negotiation. This setting minimizes the transmission of LACP packets. Both the active and passive LACP modes enable ports to negotiate with partner ports to an EtherChannel based on criteria such as port speed, and for Layer 2 EtherChannels, based on trunk state and VLAN numbers. Ports can form an EtherChannel when they are in different LACP modes as long as the modes are compatible. For example: · A port in the active mode can form an EtherChannel with another port that is in the active or passive mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 584 Layer 2/3 LACP and Link Redundancy · A port in the passive mode cannot form an EtherChannel with another port that is also in the passive mode because neither port starts LACP negotiation. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 LACP and Link Redundancy LACP port-channel operation, bandwidth availability, and link redundancy can be further refined with the LACP port-channel min-links and the LACP max-bundle features. The LACP port-channel min-links feature: · Configures the minimum number of ports that must be linked up and bundled in the LACP port channel. · Prevents a low-bandwidth LACP port channel from becoming active. · Causes an LACP port channel to become inactive if there are too few active members ports to supply the required minimum bandwidth. The LACP max-bundle feature: · Defines an upper limit on the number of bundled ports in an LACP port channel. · Allows hot-standby ports with fewer bundled ports. For example, in an LACP port channel with five ports, you can specify a max-bundle of three, and the two remaining ports are designated as hot-standby ports. Related Topics Configuring the LACP Max Bundle Feature (CLI), on page 601 Configuring LACP Hot-Standby Ports: Example, on page 607 Configuring the Port Channel Min-Links Feature (CLI), on page 602 LACP Interaction with Other Features The DTP and the CDP send and receive packets over the physical ports in the EtherChannel. Trunk ports send and receive LACP PDUs on the lowest numbered VLAN. In Layer 2 EtherChannels, the first port in the channel that comes up provides its MAC address to the EtherChannel. If this port is removed from the bundle, one of the remaining ports in the bundle provides its MAC address to the EtherChannel. For Layer 3 EtherChannels, the MAC address is allocated by the active switch as soon as the interface is created through the interface port-channel global configuration command. LACP sends and receives LACP PDUs only from ports that are up and have LACP enabled for the active or passive mode. EtherChannel On Mode EtherChannel on mode can be used to manually configure an EtherChannel. The on mode forces a port to join an EtherChannel without negotiations. The on mode can be useful if the remote device does not support Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 585 Load-Balancing and Forwarding Methods Layer 2/3 PAgP or LACP. In the on mode, a usable EtherChannel exists only when the switches at both ends of the link are configured in the on mode. Ports that are configured in the on mode in the same channel group must have compatible port characteristics, such as speed and duplex. Ports that are not compatible are suspended, even though they are configured in the on mode. Caution You should use care when using the on mode. This is a manual configuration, and ports on both ends of the EtherChannel must have the same configuration. If the group is misconfigured, packet loss or spanning-tree loops can occur. Load-Balancing and Forwarding Methods EtherChannel balances the traffic load across the links in a channel by reducing part of the binary pattern formed from the addresses in the frame to a numerical value that selects one of the links in the channel. You can specify one of several different load-balancing modes, including load distribution based on MAC addresses, IP addresses, source addresses, destination addresses, or both source and destination addresses. The selected mode applies to all EtherChannels configured on the switch. You configure the load-balancing and forwarding method by using the port-channel load-balance and the port-channel load-balance extendedglobal configuration commands. Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 EtherChannel Configuration Guidelines, on page 590 Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592 MAC Address Forwarding With source-MAC address forwarding, when packets are forwarded to an EtherChannel, they are distributed across the ports in the channel based on the source-MAC address of the incoming packet. Therefore, to provide load-balancing, packets from different hosts use different ports in the channel, but packets from the same host use the same port in the channel. With destination-MAC address forwarding, when packets are forwarded to an EtherChannel, they are distributed across the ports in the channel based on the destination host's MAC address of the incoming packet. Therefore, packets to the same destination are forwarded over the same port, and packets to a different destination are sent on a different port in the channel. With source-and-destination MAC address forwarding, when packets are forwarded to an EtherChannel, they are distributed across the ports in the channel based on both the source and destination MAC addresses. This forwarding method, a combination source-MAC and destination-MAC address forwarding methods of load distribution, can be used if it is not clear whether source-MAC or destination-MAC address forwarding is better suited on a particular switch. With source-and-destination MAC-address forwarding, packets sent from host A to host B, host A to host C, and host C to host B could all use different ports in the channel. Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 EtherChannel Configuration Guidelines, on page 590 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 586 Layer 2/3 IP Address Forwarding Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592 IP Address Forwarding With source-IP address-based forwarding, packets are distributed across the ports in the EtherChannel based on the source-IP address of the incoming packet. To provide load balancing, packets from different IP addresses use different ports in the channel, and packets from the same IP address use the same port in the channel. With destination-IP address-based forwarding, packets are distributed across the ports in the EtherChannel based on the destination-IP address of the incoming packet. To provide load balancing, packets from the same IP source address sent to different IP destination addresses could be sent on different ports in the channel. Packets sent from different source IP addresses to the same destination IP address are always sent on the same port in the channel. With source-and-destination IP address-based forwarding, packets are distributed across the ports in the EtherChannel based on both the source and destination IP addresses of the incoming packet. This forwarding method, a combination of source-IP and destination-IP address-based forwarding, can be used if it is not clear whether source-IP or destination-IP address-based forwarding is better suited on a particular switch. In this method, packets sent from the IP address A to IP address B, from IP address A to IP address C, and from IP address C to IP address B could all use different ports in the channel. Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 EtherChannel Configuration Guidelines, on page 590 Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592 Load-Balancing Advantages Different load-balancing methods have different advantages, and the choice of a particular load-balancing method should be based on the position of the switch in the network and the kind of traffic that needs to be load-distributed. Figure 43: Load Distribution and Forwarding Methods In the following figure, an EtherChannel of four workstations communicates with a router. Because the router is a single MAC-address device, source-based forwarding on the switch EtherChannel ensures that the switch uses all available bandwidth to the router. The router is configured for destination-based forwarding because Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 587 EtherChannel and Switch Stacks Layer 2/3 the large number of workstations ensures that the traffic is evenly distributed from the router EtherChannel. Use the option that provides the greatest variety in your configuration. For example, if the traffic on a channel is going only to a single MAC address, using the destination-MAC address always chooses the same link in the channel. Using source addresses or IP addresses might result in better load-balancing. Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 EtherChannel Configuration Guidelines, on page 590 Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592 EtherChannel and Switch Stacks If a stack member that has ports participating in an EtherChannel fails or leaves the stack, the active switch removes the failed stack member switch ports from the EtherChannel. The remaining ports of the EtherChannel, if any, continue to provide connectivity. When a switch is added to an existing stack, the new switch receives the running configuration from the active switch and updates itself with the EtherChannel-related stack configuration. The stack member also receives the operational information (the list of ports that are up and are members of a channel). When two stacks merge that have EtherChannels configured between them, self-looped ports result. Spanning tree detects this condition and acts accordingly. Any PAgP or LACP configuration on a winning switch stack is not affected, but the PAgP or LACP configuration on the losing switch stack is lost after the stack reboots. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 588 Layer 2/3 Switch Stack and PAgP Switch Stack and PAgP With PAgP, if the active switch fails or leaves the stack, the standby switch becomes the new active switch. A spanning-tree reconvergence is not triggered unless there is a change in the EtherChannel bandwidth. The new active switch synchronizes the configuration of the stack members to that of the active switch. The PAgP configuration is not affected after an active switch change unless the EtherChannel has ports residing on the old active switch. Switch Stacks and LACP With LACP, the system ID uses the stack MAC address from the active switch. When an active switch fails or leaves the stack and the standby switch becomes the new active switch change, the LACP system ID is unchanged. By default, the LACP configuration is not affected after the active switch changes. Default EtherChannel Configuration The default EtherChannel configuration is described in this table. Table 62: Default EtherChannel Configuration Feature Channel groups Port-channel logical interface PAgP mode PAgP learn method PAgP priority LACP mode LACP learn method LACP port priority LACP system priority LACP system ID Load-balancing Default Setting None assigned. None defined. No default. Aggregate-port learning on all ports. 128 on all ports. No default. Aggregate-port learning on all ports. 32768 on all ports. 32768. LACP system priority and the switch or stack MAC address. Load distribution on the switch is based on the source-MAC address of the incoming packet. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Overview, on page 578 EtherChannel Modes, on page 579 EtherChannel on Switches, on page 579 EtherChannel Link Failover, on page 580 LACP Modes, on page 584 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 589 EtherChannel Configuration Guidelines Layer 2/3 PAgP Modes , on page 582 Silent Mode, on page 582 Creating Port-Channel Logical Interfaces (CLI) Channel Groups and Port-Channel Interfaces, on page 580 Configuring the Physical Interfaces (CLI) Configuring EtherChannel Load-Balancing (CLI), on page 596 Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 Configuring the PAgP Learn Method and Priority (CLI), on page 599 PAgP Learn Method and Priority, on page 583 Configuring the LACP System Priority (CLI), on page 603 Configuring the LACP Port Priority (CLI), on page 604 EtherChannel Configuration Guidelines If improperly configured, some EtherChannel ports are automatically disabled to avoid network loops and other problems. Follow these guidelines to avoid configuration problems: · Do not try to configure more than 128 EtherChannels on the switch or switch stack. · Configure a PAgP EtherChannel with up to eight Ethernet ports of the same type. · Configure a LACP EtherChannel with up to 16 Ethernet ports of the same type. Up to eight ports can be active, and up to eight ports can be in standby mode. · Configure all ports in an EtherChannel to operate at the same speeds and duplex modes. · Enable all ports in an EtherChannel. A port in an EtherChannel that is disabled by using the shutdown interface configuration command is treated as a link failure, and its traffic is transferred to one of the remaining ports in the EtherChannel. · When a group is first created, all ports follow the parameters set for the first port to be added to the group. If you change the configuration of one of these parameters, you must also make the changes to all ports in the group: · Allowed-VLAN list · Spanning-tree path cost for each VLAN · Spanning-tree port priority for each VLAN · Spanning-tree Port Fast setting · Do not configure a port to be a member of more than one EtherChannel group. · Do not configure an EtherChannel in both the PAgP and LACP modes. EtherChannel groups running PAgP and LACP can coexist on the same switch or on different switches in the stack. Individual EtherChannel groups can run either PAgP or LACP, but they cannot interoperate. · Do not configure a secure port as part of an EtherChannel or the reverse. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 590 Layer 2/3 Layer 2 EtherChannel Configuration Guidelines · Do not configure a port that is an active or a not-yet-active member of an EtherChannel as an IEEE 802.1x port. If you try to enable IEEE 802.1x on an EtherChannel port, an error message appears, and IEEE 802.1x is not enabled. · If EtherChannels are configured on switch interfaces, remove the EtherChannel configuration from the interfaces before globally enabling IEEE 802.1x on a switch by using the dot1x system-auth-control global configuration command. · If cross-stack EtherChannel is configured and the switch stack partitions, loops and forwarding issues can occur. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Overview, on page 578 EtherChannel Modes, on page 579 EtherChannel on Switches, on page 579 EtherChannel Link Failover, on page 580 LACP Modes, on page 584 PAgP Modes , on page 582 Silent Mode, on page 582 Creating Port-Channel Logical Interfaces (CLI) Channel Groups and Port-Channel Interfaces, on page 580 Configuring the Physical Interfaces (CLI) Configuring EtherChannel Load-Balancing (CLI), on page 596 Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 Configuring the PAgP Learn Method and Priority (CLI), on page 599 PAgP Learn Method and Priority, on page 583 Configuring the LACP System Priority (CLI), on page 603 Configuring the LACP Port Priority (CLI), on page 604 Layer 2 EtherChannel Configuration Guidelines When configuring Layer 2 EtherChannels, follow these guidelines: · Assign all ports in the EtherChannel to the same VLAN, or configure them as trunks. Ports with different native VLANs cannot form an EtherChannel. · An EtherChannel supports the same allowed range of VLANs on all the ports in a trunking Layer 2 EtherChannel. If the allowed range of VLANs is not the same, the ports do not form an EtherChannel even when PAgP is set to the auto or desirable mode. · Ports with different spanning-tree path costs can form an EtherChannel if they are otherwise compatibly configured. Setting different spanning-tree path costs does not, by itself, make ports incompatible for the formation of an EtherChannel. Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 591 Layer 3 EtherChannel Configuration Guidelines Layer 2/3 EtherChannel Overview, on page 578 EtherChannel Modes, on page 579 EtherChannel on Switches, on page 579 EtherChannel Link Failover, on page 580 LACP Modes, on page 584 PAgP Modes , on page 582 Silent Mode, on page 582 Creating Port-Channel Logical Interfaces (CLI) Channel Groups and Port-Channel Interfaces, on page 580 Configuring the Physical Interfaces (CLI) Configuring EtherChannel Load-Balancing (CLI), on page 596 Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 Configuring the PAgP Learn Method and Priority (CLI), on page 599 PAgP Learn Method and Priority, on page 583 Configuring the LACP System Priority (CLI), on page 603 Configuring the LACP Port Priority (CLI), on page 604 Layer 3 EtherChannel Configuration Guidelines · For Layer 3 EtherChannels, assign the Layer 3 address to the port-channel logical interface, not to the physical ports in the channel. Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 How to Configure EtherChannels After you configure an EtherChannel, configuration changes applied to the port-channel interface apply to all the physical ports assigned to the port-channel interface, and configuration changes applied to the physical port affect only the port where you apply the configuration. Configuring Layer 2 EtherChannels (CLI) You configure Layer 2 EtherChannels by assigning ports to a channel group with the channel-group interface configuration command. This command automatically creates the port-channel logical interface. SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 592 Layer 2/3 Configuring Layer 2 EtherChannels (CLI) 2. interface interface-id 3. switchport mode {access | trunk} 4. switchport access vlan vlan-id 5. channel-group channel-group-number mode {auto [non-silent] | desirable [non-silent ] | on } | { active | passive} 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet2/0/1 switchport mode {access | trunk} Example: Switch(config-if)# switchport mode access Specifies a physical port, and enters interface configuration mode. Valid interfaces are physical ports. For a PAgP EtherChannel, you can configure up to eight ports of the same type and speed for the same group. For a LACP EtherChannel, you can configure up to 16 Ethernet ports of the same type. Up to eight ports can be active, and up to eight ports can be in standby mode. Assigns all ports as static-access ports in the same VLAN, or configure them as trunks. If you configure the port as a static-access port, assign it to only one VLAN. The range is 1 to 4094. Step 4 switchport access vlan vlan-id Example: Switch(config-if)# switchport access vlan 22 (Optional) If you configure the port as a static-access port, assign it to only one VLAN. The range is 1 to 4094. Step 5 channel-group channel-group-number mode {auto [non-silent] | desirable [non-silent ] | on } | { active | passive} Example: Switch(config-if)# channel-group 5 mode auto Assigns the port to a channel group, and specifies the PAgP or the LACP mode. For mode, select one of these keywords: · auto --Enables PAgP only if a PAgP device is detected. It places the port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. This keyword is not supported when EtherChannel members are from different switches in the switch stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 593 Configuring Layer 2 EtherChannels (CLI) Layer 2/3 Command or Action Step 6 end Example: Switch(config-if)# end Purpose · desirable --Unconditionally enables PAgP. It places the port into an active negotiating state, in which the port starts negotiations with other ports by sending PAgP packets. This keyword is not supported when EtherChannel members are from different switches in the switch stack. · on --Forces the port to channel without PAgP or LACP. In the on mode, an EtherChannel exists only when a port group in the on mode is connected to another port group in the on mode. · non-silent --(Optional) If your switch is connected to a partner that is PAgP-capable, configures the switch port for nonsilent operation when the port is in the auto or desirable mode. If you do not specify non-silent, silent is assumed. The silent setting is for connections to file servers or packet analyzers. This setting allows PAgP to operate, to attach the port to a channel group, and to use the port for transmission. · active--Enables LACP only if a LACP device is detected. It places the port into an active negotiating state in which the port starts negotiations with other ports by sending LACP packets. · passive --Enables LACP on the port and places it into a passive negotiating state in which the port responds to LACP packets that it receives, but does not start LACP packet negotiation. Returns to privileged EXEC mode. Related Topics EtherChannel Overview, on page 578 EtherChannel Modes, on page 579 EtherChannel on Switches, on page 579 EtherChannel Link Failover, on page 580 LACP Modes, on page 584 PAgP Modes , on page 582 Silent Mode, on page 582 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 594 Layer 2/3 Configuring Layer 3 EtherChannels (CLI) Configuring Layer 3 EtherChannels (CLI) Beginning in privileged EXEC mode, follow these steps to assign an Ethernet port to a Layer 3 EtherChannel. This procedure is required. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. no ip address 4. no switchport 5. channel-group channel-group-number mode { auto [ non-silent ] | desirable [ non-silent ] | on } | { active | passive } 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/2 Specifies a physical port, and enters interface configuration mode. Valid interfaces include physical ports. For a PAgP EtherChannel, you can configure up to eight ports of the same type and speed for the same group. For a LACP EtherChannel, you can configure up to 16 Ethernet ports of the same type. Up to eight ports can be active, and up to eight ports can be in standby mode. no ip address Example: Ensures that there is no IP address assigned to the physical port. Switch(config-if)# no ip address Step 4 no switchport Example: Switch(config-if)# no switchport Puts the port into Layer 3 mode. Step 5 channel-group channel-group-number mode { auto [ Assigns the port to a channel group, and specifies the PAgP non-silent ] | desirable [ non-silent ] | on } | or the LACP mode. { active | passive } For mode, select one of these keywords: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 595 Configuring EtherChannel Load-Balancing (CLI) Layer 2/3 Command or Action Example: Switch(config-if)# channel-group 5 mode auto Step 6 end Example: Switch(config-if)# end Purpose · auto--Enables PAgP only if a PAgP device is detected. It places the port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. This keyword is not supported when EtherChannel members are from different switches in the switch stack. · desirable--Unconditionally enables PAgP. It places the port into an active negotiating state, in which the port starts negotiations with other ports by sending PAgP packets. This keyword is not supported when EtherChannel members are from different switches in the switch stack. · on--Forces the port to channel without PAgP or LACP. In the on mode, an EtherChannel exists only when a port group in the on mode is connected to another port group in the on mode. · non-silent--(Optional) If your switch is connected to a partner that is PAgP capable, configures the switch port for nonsilent operation when the port is in the auto or desirable mode. If you do not specify non-silent, silent is assumed. The silent setting is for connections to file servers or packet analyzers. This setting allows PAgP to operate, to attach the port to a channel group, and to use the port for transmission. · active--Enables LACP only if a LACP device is detected. It places the port into an active negotiating state in which the port starts negotiations with other ports by sending LACP packets. · passive --Enables LACP on the port and places it into a passive negotiating state in which the port responds to LACP packets that it receives, but does not start LACP packet negotiation. Returns to privileged EXEC mode. Configuring EtherChannel Load-Balancing (CLI) You can configure EtherChannel load-balancing to use one of several different forwarding methods. This task is optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 596 Layer 2/3 Configuring EtherChannel Load-Balancing (CLI) SUMMARY STEPS 1. configure terminal 2. port-channel load-balance { dst-ip | dst-mac | dst-mixed-ip-port | dst-port | extended [dst-ip | dst-mac | dst-port | ipv6-label | l3-proto | src-ip | src-mac | src-port ] | src-dst-ip | src-dst-mac src-dst-mixed-ip-port src-dst-portsrc-ip | src-mac | src-mixed-ip-port | src-port} 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 port-channel load-balance { dst-ip | dst-mac | Configures an EtherChannel load-balancing method. dst-mixed-ip-port | dst-port | extended [dst-ip | The default is src-mac. dst-mac | dst-port | ipv6-label | l3-proto | src-ip | src-mac | src-port ] | src-dst-ip | Select one of these load-distribution methods: src-dst-mac src-dst-mixed-ip-port src-dst-portsrc-ip | src-mac | src-mixed-ip-port | src-port} · dst-ip--Specifies destination-host IP address. Example: · dst-mac--Specifies the destination-host MAC address of the incoming packet. Switch(config)# port-channel load-balance src-mac · dst-mixed-ip-port--Specifies the host IP address and TCP/UDP port. · dst-port--Specifies the destination TCP/UDP port. · extended--Specifies extended load balance methods--combinations of source and destination methods beyond those available with the standard command. · ipv6-label--Specifies the IPv6 flow label. · l3-proto--Specifies the Layer 3 protocol. · src-dst-ip--Specifies the source and destination host IP address. · src-dst-mac--Specifies the source and destination host MAC address. · src-dst-mixed-ip-port--Specifies the source and destination host IP address and TCP/UDP port. · src-dst-port--Specifies the source and destination TCP/UDP port. · src-ip--Specifies the source host IP address. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 597 Configuring EtherChannel Extended Load-Balancing (CLI) Layer 2/3 Command or Action Step 3 end Example: Switch(config)# end Purpose · src-mac--Specifies the source MAC address of the incoming packet. · src-mixed-ip-port--Specifies the source host IP address and TCP/UDP port. · src-port--Specifies the source TCP/UDP port. Returns to privileged EXEC mode. Related Topics Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 EtherChannel Configuration Guidelines, on page 590 Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592 Configuring EtherChannel Extended Load-Balancing (CLI) Configure EtherChannel extended load-balancing when you want to use a combination of load-balancing methods. This task is optional. SUMMARY STEPS 1. configure terminal 2. port-channel load-balance extended [ dst-ip | dst-mac dst-port | ipv6-label | l3-proto | src-ip | src-mac | src-port ] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 598 Layer 2/3 Configuring the PAgP Learn Method and Priority (CLI) Step 2 Step 3 Command or Action Purpose port-channel load-balance extended [ dst-ip | Configures an EtherChannel extended load-balancing dst-mac dst-port | ipv6-label | l3-proto | src-ip method. | src-mac | src-port ] The default is src-mac. Example: Select one of these load-distribution methods: Switch(config)# port-channel load-balance extended dst-ip dst-mac src-ip · dst-ip--Specifies destination-host IP address. · dst-mac--Specifies the destination-host MAC address of the incoming packet. · dst-port--Specifies the destination TCP/UDP port. · ipv6-label--Specifies the IPv6 flow label. · l3-proto--Specifies the Layer 3 protocol. · src-ip--Specifies the source host IP address. · src-mac--Specifies the source MAC address of the incoming packet. · src-port--Specifies the source TCP/UDP port. end Example: Returns to privileged EXEC mode. Switch(config)# end Configuring the PAgP Learn Method and Priority (CLI) This task is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. pagp learn-method physical-port 4. pagp port-priority priority 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 599 Configuring LACP Hot-Standby Ports Layer 2/3 Step 2 Command or Action interface interface-id Example: Purpose Specifies the port for transmission, and enters interface configuration mode. Switch(config)# interface gigabitethernet 1/0/2 Step 3 Step 4 Step 5 pagp learn-method physical-port Selects the PAgP learning method. Example: By default, aggregation-port learning is selected, which means the switch sends packets to the source by using any Switch(config-if)# pagp learn-method physical port of the ports in the EtherChannel. With aggregate-port learning, it is not important on which physical port the packet arrives. Selects physical-port to connect with another switch that is a physical learner. Make sure to configure the port-channel load-balance global configuration command to src-mac. The learning method must be configured the same at both ends of the link. pagp port-priority priority Example: Switch(config-if)# pagp port-priority 200 Assigns a priority so that the selected port is chosen for packet transmission. For priority, the range is 0 to 255. The default is 128. The higher the priority, the more likely that the port will be used for PAgP transmission. end Example: Returns to privileged EXEC mode. Switch(config-if)# end Related Topics PAgP Learn Method and Priority, on page 583 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Monitoring EtherChannel, PAgP, and LACP Status, on page 605 Layer 2 EtherChannel Configuration Guidelines, on page 591 Configuring LACP Hot-Standby Ports When LACP is enabled, the software, by default, tries to configure the maximum number of LACP-compatible ports in a channel, up to a maximum of 16 ports. Only eight LACP links can be active at one time; the remaining eight links are placed in hot-standby mode. If one of the active links becomes inactive, a link that is in the hot-standby mode becomes active in its place. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 600 Layer 2/3 Configuring the LACP Max Bundle Feature (CLI) You can override the default behavior by specifying the maximum number of active ports in a channel, in which case, the remaining ports become hot-standby ports. For example, if you specify a maximum of five ports in a channel, up to 11 ports become hot-standby ports. If you configure more than eight links for an EtherChannel group, the software automatically decides which of the hot-standby ports to make active based on the LACP priority. To every link between systems that operate LACP, the software assigns a unique priority made up of these elements (in priority order): · LACP system priority · System ID (the switch MAC address) · LACP port priority · Port number In priority comparisons, numerically lower values have higher priority. The priority decides which ports should be put in standby mode when there is a hardware limitation that prevents all compatible ports from aggregating. Determining which ports are active and which are hot standby is a two-step procedure. First the system with a numerically lower system priority and system ID is placed in charge of the decision. Next, that system decides which ports are active and which are hot standby, based on its values for port priority and port number. The port priority and port number values for the other system are not used. You can change the default values of the LACP system priority and the LACP port priority to affect how the software selects active and standby links. Configuring the LACP Max Bundle Feature (CLI) When you specify the maximum number of bundled LACP ports allowed in a port channel, the remaining ports in the port channel are designated as hot-standby ports. Beginning in privileged EXEC mode, follow these steps to configure the maximum number of LACP ports in a port channel. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface port-channel channel-number 3. lacp max-bundle max-bundle-number 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface port-channel channel-number Example: Enters interface configuration mode for a port channel. The range is 1 to 128. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 601 Configuring the Port Channel Min-Links Feature (CLI) Layer 2/3 Command or Action Switch(config)# interface port-channel 2 Step 3 lacp max-bundle max-bundle-number Example: Switch(config-if)# lacp max-bundle 3 Step 4 end Example: Switch(config)# end Purpose Specifies the maximum number of LACP ports in the port-channel bundle. The range is 1 to 8. Returns to privileged EXEC mode. Related Topics LACP and Link Redundancy , on page 585 Configuring LACP Hot-Standby Ports: Example, on page 607 Configuring the Port Channel Min-Links Feature (CLI) You can specify the minimum number of active ports that must be in the link-up state and bundled in an EtherChannel for the port channel interface to transition to the link-up state. Beginning in privileged EXEC mode, follow these steps to configure the minimum number of links that are required for a port channel. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface port-channel channel-number 3. port-channel min-links min-links-number 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface port-channel channel-number Example: Switch(config)# interface port-channel 2 Enters interface configuration mode for a port-channel. For channel-number, the range is 1 to 128. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 602 Layer 2/3 Configuring the LACP System Priority (CLI) Step 3 Command or Action port-channel min-links min-links-number Example: Switch(config-if)# port-channel min-links 3 Step 4 end Example: Switch(config)# end Purpose Specifies the minimum number of member ports that must be in the link-up state and bundled in the EtherChannel for the port channel interface to transition to the link-up state. For min-links-number , the range is 2 to 8. Returns to privileged EXEC mode. Related Topics LACP and Link Redundancy , on page 585 Configuring LACP Hot-Standby Ports: Example, on page 607 Configuring the LACP System Priority (CLI) You can configure the system priority for all the EtherChannels that are enabled for LACP by using the lacp system-priority global configuration command. You cannot configure a system priority for each LACP-configured channel. By changing this value from the default, you can affect how the software selects active and standby links. You can use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby mode (denoted with an H port-state flag). Beginning in privileged EXEC mode, follow these steps to configure the LACP system priority. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. lacp system-priority priority 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 lacp system-priority priority Example: Switch(config)# lacp system-priority 32000 Configures the LACP system priority. The range is 1 to 65535. The default is 32768. The lower the value, the higher the system priority. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 603 Configuring the LACP Port Priority (CLI) Layer 2/3 Step 3 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Related Topics EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Monitoring EtherChannel, PAgP, and LACP Status, on page 605 Configuring the LACP Port Priority (CLI) By default, all ports use the same port priority. If the local system has a lower value for the system priority and the system ID than the remote system, you can affect which of the hot-standby links become active first by changing the port priority of LACP EtherChannel ports to a lower value than the default. The hot-standby ports that have lower port numbers become active in the channel first. You can use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby mode (denoted with an H port-state flag). Note If LACP is not able to aggregate all the ports that are compatible (for example, the remote system might have more restrictive hardware limitations), all the ports that cannot be actively included in the EtherChannel are put in the hot-standby state and are used only if one of the channeled ports fails. Beginning in privileged EXEC mode, follow these steps to configure the LACP port priority. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. lacp port-priority priority 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 604 Layer 2/3 Monitoring EtherChannel, PAgP, and LACP Status Step 2 Command or Action interface interface-id Example: Purpose Specifies the port to be configured, and enters interface configuration mode. Switch(config)# interface gigabitethernet 1/0/2 Step 3 lacp port-priority priority Example: Switch(config-if)# lacp port-priority 32000 Configures the LACP port priority. The range is 1 to 65535. The default is 32768. The lower the value, the more likely that the port will be used for LACP transmission. Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Related Topics EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Monitoring EtherChannel, PAgP, and LACP Status, on page 605 Monitoring EtherChannel, PAgP, and LACP Status You can display EtherChannel, PAgP, and LACP status using the commands listed in this table. Table 63: Commands for Monitoring EtherChannel, PAgP, and LACP Status Command Description clear lacp { channel-group-number counters Clears LACP channel-group information and traffic | counters } counters. clear pagp { channel-group-number counters Clears PAgP channel-group information and traffic | counters } counters. show etherchannel [ channel-group-number { Displays EtherChannel information in a brief, detailed, detail | port | port-channel | protocol and one-line summary form. Also displays the | summary }] [ detail | load-balance | load-balance or frame-distribution scheme, port, port | port-channel | protocol | summary port-channel, and protocol information. ] show pagp [ channel-group-number ] { counters Displays PAgP information such as traffic | internal | neighbor } information, the internal PAgP configuration, and neighbor information. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 605 Configuration Examples for Configuring EtherChannels Layer 2/3 Command Description show pagp [ channel-group-number ] dual-active Displays the dual-active detection status. show lacp [ channel-group-number ] { counters | Displays LACP information such as traffic internal | neighbor | sys-id} information, the internal LACP configuration, and neighbor information. show running-config Verifies your configuration entries. show etherchannel load-balance Displays the load balance or frame distribution scheme among ports in the port channel. Related Topics Configuring the PAgP Learn Method and Priority (CLI), on page 599 PAgP Learn Method and Priority, on page 583 Configuring the LACP System Priority (CLI), on page 603 Configuring the LACP Port Priority (CLI), on page 604 Configuration Examples for Configuring EtherChannels Configuring Layer 2 EtherChannels: Examples This example shows how to configure an EtherChannel on a single switch in the stack. It assigns two ports as static-access ports in VLAN 10 to channel 5 with the PAgP mode desirable: Switch# configure terminal Switch(config)# interface range gigabitethernet2/0/1 -2 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# channel-group 5 mode desirable non-silent Switch(config-if-range)# end This example shows how to configure an EtherChannel on a single switch in the stack. It assigns two ports as static-access ports in VLAN 10 to channel 5 with the LACP mode active: Switch# configure terminal Switch(config)# interface range gigabitethernet2/0/1 -2 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# channel-group 5 mode active Switch(config-if-range)# end This example shows how to configure a cross-stack EtherChannel. It uses LACP passive mode and assigns two ports on stack member 1 and one port on stack member 2 as static-access ports in VLAN 10 to channel 5: Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 606 Layer 2/3 Configuring Layer 3 EtherChannels: Examples Switch(config)# interface range gigabitethernet2/0/4 -5 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# channel-group 5 mode passive Switch(config-if-range)# exit Switch(config)# interface gigabitethernet3/0/3 Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan 10 Switch(config-if)# channel-group 5 mode passive Switch(config-if)# exit Configuring Layer 3 EtherChannels: Examples This example shows how to configure a Layer 3 EtherChannel. It assigns two ports to channel 5 with the LACP mode active: Switch# configure terminal Switch(config)# interface range gigabitethernet2/0/1 -2 Switch(config-if-range)# no ip address Switch(config-if-range)# no switchport Switch(config-if-range)# channel-group 5 mode active Switch(config-if-range)# end This example shows how to configure a cross-stack Layer 3 EtherChannel. It assigns two ports on stack member 2 and one port on stack member 3 to channel 7 using LACP active mode: Switch# configure terminal Switch(config)# interface range gigabitethernet2/0/4 -5 Switch(config-if-range)# no ip address Switch(config-if-range)# no switchport Switch(config-if-range)# channel-group 7 mode active Switch(config-if-range)# exit Switch(config)# interface gigabitethernet3/0/3 Switch(config-if)# no ip address Switch(config-if)# no switchport Switch(config-if)# channel-group 7 mode active Switch(config-if)# exit Configuring LACP Hot-Standby Ports: Example This example shows how to configure an Etherchannel (port channel 2) that will be active when there are at least three active ports, will comprise up to seven active ports and the remaining ports (up to nine) as hot-standby ports : Switch# configure terminal Switch(config)# interface port-channel 2 Switch(config-if)# port-channel min-links 3 Switch(config-if)# lacp max-bundle 7 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 607 Additional References for EtherChannels Layer 2/3 Related Topics Configuring the LACP Max Bundle Feature (CLI), on page 601 LACP and Link Redundancy , on page 585 Configuring the Port Channel Min-Links Feature (CLI), on page 602 Additional References for EtherChannels Related Documents Related Topic Layer 2 command reference Document Title Layer 2/3 Command Reference (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 608 Layer 2/3 Feature Information for EtherChannels Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for EtherChannels Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 609 Feature Information for EtherChannels Layer 2/3 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 610 3 2 C H A P T E R Configuring Flex Links and the MAC Address-Table Move Update Feature · Finding Feature Information, on page 611 · Restrictions for Configuring Flex Links and MAC Address-Table Move Update, on page 611 · Information About Flex Links and MAC Address-Table Move Update, on page 612 · How to Configure Flex Links and the MAC Address-Table Move Update Feature, on page 616 · Monitoring Flex Links, Multicast Fast Convergence, and MAC Address-Table Move Update, on page 621 · Configuration Examples for Flex Links, on page 622 · Additional References for Flex Links and MAC Address-Table Move Update, on page 626 · Feature Information for Flex Links and MAC Address-Table Move Update, on page 627 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Configuring Flex Links and MAC Address-Table Move Update · Flex Links are supported only on Layer 2 ports and port channels. · You can configure up to 16 backup links. · You can configure only one Flex Links backup link for any active link, and it must be a different interface from the active interface. · An interface can belong to only one Flex Links pair. An interface can be a backup link for only one active link. An active link cannot belong to another Flex Links pair. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 611 Information About Flex Links and MAC Address-Table Move Update Layer 2/3 · Neither of the links can be a port that belongs to an EtherChannel. However, you can configure two port channels (EtherChannel logical interfaces) as Flex Links, and you can configure a port channel and a physical interface as Flex Links, with either the port channel or the physical interface as the active link. · A backup link does not have to be the same type (Gigabit Ethernet or port channel) as the active link. However, you should configure both Flex Links with similar characteristics so that there are no loops or changes in behavior if the standby link begins to forward traffic. · STP is disabled on Flex Links ports. A Flex Links port does not participate in STP, even if the VLANs present on the port are configured for STP. When STP is not enabled, be sure that there are no loops in the configured topology. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Information About Flex Links and MAC Address-Table Move Update Flex Links Flex Links are a pair of a Layer 2 interfaces (switch ports or port channels) where one interface is configured to act as a backup to the other. The feature provides an alternative solution to the Spanning Tree Protocol (STP). Users can disable STP and still retain basic link redundancy. Flex Links are typically configured in service provider or enterprise networks where customers do not want to run STP on the switch. If the switch is running STP, Flex Links are not necessary because STP already provides link-level redundancy or backup. You configure Flex Links on one Layer 2 interface (the active link) by assigning another Layer 2 interface as the Flex Links or backup link. On switches, the Flex Links can be on the same switch or on another switch in the stack. When one of the links is up and forwarding traffic, the other link is in standby mode, ready to begin forwarding traffic if the other link shuts down. At any given time, only one of the interfaces is in the linkup state and forwarding traffic. If the primary link shuts down, the standby link starts forwarding traffic. When the active link comes back up, it goes into standby mode and does not forward traffic. STP is disabled on Flex Links interfaces. Flex Links Configuration In the following figure, ports 1 and 2 on switch A are connected to uplink switches B and C. Because they are configured as Flex Links, only one of the interfaces is forwarding traffic; the other is in standby mode. If port 1 is the active link, it begins forwarding traffic between port 1 and switch B; the link between port 2 (the backup link) and switch C is not forwarding traffic. If port 1 goes down, port 2 comes up and starts forwarding traffic to switch C. When port 1 comes back up, it goes into standby mode and does not forward traffic; port 2 continues forwarding traffic. You can also configure a preemption function, specifying the preferred port for forwarding traffic. For example, you can configure the Flex Links pair with preemption mode. In the scenario shown, when port 1 comes back up and has more bandwidth than port 2, port 1 begins forwarding traffic after 60 seconds. Port 2 becomes the standby port. You do this by entering the switchport backup interface preemption mode bandwidth and switchport backup interface preemption delay interface configuration commands. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 612 Layer 2/3 Figure 44: Flex Links Configuration Example VLAN Flex Links Load Balancing and Support If a primary (forwarding) link goes down, a trap notifies the network management stations. If the standby link goes down, a trap notifies the users. Flex Links are supported only on Layer 2 ports and port channels, not on VLANs or on Layer 3 ports. VLAN Flex Links Load Balancing and Support VLAN Flex Links load balancing allows users to configure a Flex Links pair so that both ports simultaneously forward the traffic for some mutually exclusive VLANs. For example, if Flex Links ports are configured for 1 to 100 VLANs, the traffic of the first 50 VLANs can be forwarded on one port and the rest on the other port. If one of the ports fail, the other active port forwards all the traffic. When the failed port comes back up, it resumes forwarding traffic in the preferred VLANs. In addition to providing the redundancy, this Flex Links pair can be used for load balancing. Flex Links VLAN load balancing does not impose any restrictions on uplink switches. Figure 45: VLAN Flex Links Load-Balancing Configuration Example The following figure displays a VLAN Flex Links load-balancing configuration. Multicast Fast Convergence with Flex Links Failover Multicast fast convergence reduces the multicast traffic convergence time after a Flex Links failure. Multicast fast convergence is implemented by a combination of learning the backup link as an mrouter port, generating IGMP reports, and leaking IGMP reports. Learning the Other Flex Links Port as the mrouter Port In a typical multicast network, there is a querier for each VLAN. A switch deployed at the edge of a network has one of its Flex Links ports receiving queries. Flex Links ports are also always forwarding at any given time. A port that receives queries is added as an mrouter port on the switch. An mrouter port is part of all the multicast groups learned by the switch. After a changeover, queries are received by the other Flex Links port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 613 Generating IGMP Reports Layer 2/3 The other Flex Links port is then learned as the mrouter port. After changeover, multicast traffic then flows through the other Flex Links port. To achieve faster convergence of traffic, both Flex Links ports are learned as mrouter ports whenever either Flex Links port is learned as the mrouter port. Both Flex Links ports are always part of multicast groups. Although both Flex Links ports are part of the groups in normal operation mode, all traffic on the backup port is blocked. The normal multicast data flow is not affected by the addition of the backup port as an mrouter port. When the changeover happens, the backup port is unblocked, allowing the traffic to flow. In this case, the upstream multicast data flows as soon as the backup port is unblocked. Generating IGMP Reports When the backup link comes up after the changeover, the upstream new distribution switch does not start forwarding multicast data, because the port on the upstream router, which is connected to the blocked Flex Links port, is not part of any multicast group. The reports for the multicast groups were not forwarded by the downstream switch because the backup link is blocked. The data does not flow on this port, until it learns the multicast groups, which occurs only after it receives reports. The reports are sent by hosts when a general query is received, and a general query is sent within 60 seconds in normal scenarios. When the backup link starts forwarding, to achieve faster convergence of multicast data, the downstream switch immediately sends proxy reports for all the learned groups on this port without waiting for a general query. Leaking IGMP Reports To achieve multicast traffic convergence with minimal loss, a redundant data path must be set up before the Flex Links active link goes down. This can be achieved by leaking only IGMP report packets on the Flex Links backup link. These leaked IGMP report messages are processed by upstream distribution routers, so multicast data traffic gets forwarded to the backup interface. Because all incoming traffic on the backup interface is dropped at the ingress of the access switch, no duplicate multicast traffic is received by the host. When the Flex Links active link fails, the access switch starts accepting traffic from the backup link immediately. The only disadvantage of this scheme is that it consumes bandwidth on the link between the distribution switches and on the backup link between the distribution and access switches. This feature is disabled by default and can be configured by using the switchport backup interface interface-id multicast fast-convergence command. When this feature has been enabled at changeover, the switch does not generate the proxy reports on the backup port, which became the forwarding port. MAC Address-Table Move Update The MAC address-table move update feature allows the switch to provide rapid bidirectional convergence when a primary (forwarding) link goes down and the standby link begins forwarding traffic. Figure 46: MAC Address-Table Move Update Example In the following figure, switch A is an access switch, and ports 1 and 2 on switch A are connected to uplink switches B and D through a Flex Links pair. Port 1 is forwarding traffic, and port 2 is in the backup state. Traffic from the PC to the server is forwarded from port 1 to port 3. The MAC address of the PC has been Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 614 Layer 2/3 MAC Address-Table Move Update learned on port 3 of switch C. Traffic from the server to the PC is forwarded from port 3 to port 1. If the MAC address-table move update feature is not configured and port 1 goes down, port 2 starts forwarding traffic. However, for a short time, switch C keeps forwarding traffic from the server to the PC through port 3, and the PC does not get the traffic because port 1 is down. If switch C removes the MAC address of the PC on port 3 and relearns it on port 4, traffic can then be forwarded from the server to the PC through port 2. If the MAC address-table move update feature is configured and enabled on the switches, and port 1 goes down, port 2 starts forwarding traffic from the PC to the server. The switch sends a MAC address-table move update packet from port 2. Switch C gets this packet on port 4 and immediately learns the MAC address of the PC on port 4, which reduces the reconvergence time. You can configure the access switch, switch A, to send MAC address-table move update messages. You can also configure the uplink switches B, C, and D to get and process the MAC address-table move update messages. When switch C gets a MAC address-table move update message from switch A, switch C learns the MAC address of the PC on port 4. Switch C updates the MAC address table, including the forwarding table entry for the PC. Switch A does not need to wait for the MAC address-table update. The switch detects a failure on port 1 and immediately starts forwarding server traffic from port 2, the new forwarding port. This change occurs in less than 100 milliseconds (ms). The PC is directly connected to switch A, and the connection status does not change. Switch A does not need to update the PC entry in the MAC address table. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 615 Flex Links VLAN Load Balancing Configuration Guidelines Layer 2/3 Flex Links VLAN Load Balancing Configuration Guidelines · For Flex Links VLAN load balancing, you must choose the preferred VLANs on the backup interface. · You cannot configure a preemption mechanism and VLAN load balancing for the same Flex Links pair. MAC Address-Table Move Update Configuration Guidelines · You can enable and configure this feature on the access switch to send the MAC address-table move updates. · You can enable and configure this feature on the uplink switches to get the MAC address-table move updates. Default Flex Links and MAC Address-Table Move Update Configuration · Flex Links is not configured, and there are no backup interfaces defined. · The preemption mode is off. · The preemption delay is 35 seconds. · The MAC address-table move update feature is not configured on the switch. How to Configure Flex Links and the MAC Address-Table Move Update Feature Configuring Flex Links (CLI) SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport backup interface interface-id 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 616 Layer 2/3 Configuring a Preemption Scheme for a Pair of Flex Links (CLI) Step 2 Command or Action interface interface-id Example: Switch(conf)# interface gigabitethernet1/0/1 Step 3 switchport backup interface interface-id Example: Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 Step 4 end Example: Switch(conf-if)# end Purpose Specifies the interface, and enters interface configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface). Configures a physical Layer 2 interface (or port channel) as part of a Flex Links pair with the interface. When one link is forwarding traffic, the other interface is in standby mode. Returns to privileged EXEC mode. Configuring a Preemption Scheme for a Pair of Flex Links (CLI) SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport backup interface interface-id 4. switchport backup interface interface-id preemption mode [forced | bandwidth | off] 5. switchport backup interface interface-id preemption delay delay-time 6. end 7. show interface [interface-id] switchport backup 8. copy running-config startup config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode Switch# configure terminal Step 2 interface interface-id Example: Switch(conf)# interface gigabitethernet1/0/1 Specifies the interface, and enters interface configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface). The port-channel range is 1 to 128. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 617 Configuring a Preemption Scheme for a Pair of Flex Links (CLI) Layer 2/3 Step 3 Command or Action switchport backup interface interface-id Example: Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 Purpose Configures a physical Layer 2 interface (or port channel) as part of a Flex Links pair with the interface. When one link is forwarding traffic, the other interface is in standby mode. Step 4 Step 5 switchport backup interface interface-id preemption mode [forced | bandwidth | off] Example: Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 preemption mode forced Configures a preemption mechanism and delay for a Flex Links interface pair. You can configure the preemption as: · forced--(Optional) The active interface always preempts the backup. · bandwidth--(Optional) The interface with the higher bandwidth always acts as the active interface. · off--(Optional) No preemption occurs from active to backup. switchport backup interface interface-id preemption delay delay-time Example: Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 preemption delay 50 Configures the time delay until a port preempts another port. Note Setting a delay time only works with forced and bandwidth modes. Step 6 end Example: Switch(conf-if)# end Returns to privileged EXEC mode. Step 7 show interface [interface-id] switchport backup Example: Switch# show interface gigabitethernet1/0/2 switchport backup Verifies the configuration. Step 8 copy running-config startup config Example: Switch# copy running-config startup config (Optional) Saves your entries in the switch startup configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 618 Layer 2/3 Configuring VLAN Load Balancing on Flex Links (CLI) Configuring VLAN Load Balancing on Flex Links (CLI) SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport backup interface interface-id prefer vlan vlan-range 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Switch (config)# interface gigabitethernet2/0/6 Specifies the interface, and enters interface configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface). The port-channel range is 1 to 128. Step 3 switchport backup interface interface-id prefer vlan vlan-range Example: Configures a physical Layer 2 interface (or port channel) as part of a Flex Links pair with the interface and specifies the VLANs carried on the interface. The VLAN ID range is 1 to 4094. Switch (config-if)# switchport backup interface gigabitethernet2/0/8 prefer vlan 2 Step 4 end Example: Switch (config-if)# end Returns to privileged EXEC mode. Configuring MAC Address-Table Move Update (CLI) SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. Use one of the following: · switchport backup interface interface-id · switchport backup interface interface-id mmu primary vlan vlan-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 619 Configuring MAC Address-Table Move Update (CLI) Layer 2/3 4. end 5. mac address-table move update transmit 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Switch#interface gigabitethernet1/0/1 Specifies the interface, and enters interface configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface). The port-channel range is 1 to 128. Step 3 Step 4 Use one of the following: · switchport backup interface interface-id · switchport backup interface interface-id mmu primary vlan vlan-id Example: Switch(config-if)# switchport backup interface gigabitethernet0/2 mmu primary vlan 2 end Example: Configures a physical Layer 2 interface (or port channel), as part of a Flex Links pair with the interface. The MAC address-table move update VLAN is the lowest VLAN ID on the interface. Configure a physical Layer 2 interface (or port channel) and specifies the VLAN ID on the interface, which is used for sending the MAC address-table move update. When one link is forwarding traffic, the other interface is in standby mode. Returns to global configuration mode. Switch(config-if)# end Step 5 mac address-table move update transmit Example: Switch(config)# mac address-table move update transmit Enables the access switch to send MAC address-table move updates to other switches in the network if the primary link goes down and the switch starts forwarding traffic through the standby link. Step 6 end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 620 Layer 2/3 Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages (CLI) Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages (CLI) SUMMARY STEPS 1. configure terminal 2. mac address-table move update receive 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode Switch# configure terminal Step 2 mac address-table move update receive Example: Enables the switch to obtain and processes the MAC address-table move updates. Switch (config)# mac address-table move update receive Step 3 end Example: Switch (config)# end Returns to privileged EXEC mode. Monitoring Flex Links, Multicast Fast Convergence, and MAC Address-Table Move Update Command Purpose show interface [interface-id] switchport backup Displays the Flex Links backup interface configured for an interface or all the configured Flex Links and the state of each active and backup interface (up or standby mode). show ip igmp profile address-table move update Displays the specified IGMP profile or all the IGMP profile-id profiles defined on the switch. show mac address-table move update Displays the MAC address-table move update information on the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 621 Configuration Examples for Flex Links Layer 2/3 Configuration Examples for Flex Links Configuring Flex Links: Examples This example shows how to verify the configuration after you configure an interface with a backup interface: Switch# show interface switchport backup Switch Backup Interface Pairs: Active Interface Backup Interface State -----------------------------------------------------------------------GigabitEthernet1/0/1 GigabitEthernet1/0/2 Active Up/Backup Standby This example shows how to verify the configuration after you configure the preemption mode as forced for a backup interface pair: Switch# show interface switchport backup detail Switch Backup Interface Pairs: Active Interface Backup Interface State -----------------------------------------------------------------------GigabitEthernet1/0/211 GigabitEthernet1/0/2 Active Up/Backup Standby Interface Pair : Gi1/0/1, Gi1/0/2 Preemption Mode : forced Preemption Delay : 50 seconds Bandwidth : 100000 Kbit (Gi1/0/1), 100000 Kbit (Gi1/0/2) Mac Address Move Update Vlan : auto Configuring VLAN Load Balancing on Flex Links: Examples In the following example, VLANs 1 to 50, 60, and 100 to 120 are configured on the switch: Switch(config)# interface gigabitethernet 2/0/6 Switch(config-if)# switchport backup interface gigabitethernet 2/0/8 prefer vlan 60,100-120 When both interfaces are up, Gi2/0/8 forwards traffic for VLANs 60 and 100 to 120 and Gi2/0/6 forwards traffic for VLANs 1 to 50. Switch# show interfaces switchport backup Switch Backup Interface Pairs: Active Interface Backup Interface State ------------------------------------------------------------------------ GigabitEthernet2/0/6 GigabitEthernet2/0/8 Active Up/Backup Standby Vlans Preferred on Active Interface: 1-50 Vlans Preferred on Backup Interface: 60, 100-120 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 622 Layer 2/3 Configuring the MAC Address-Table Move Update: Examples When a Flex Links interface goes down (LINK_DOWN), VLANs preferred on this interface are moved to the peer interface of the Flex Links pair. In this example, if interface Gi2/0/6 goes down, Gi2/0/8 carries all VLANs of the Flex Links pair. Switch# show interfaces switchport backup Switch Backup Interface Pairs: Active Interface Backup Interface State ------------------------------------------------------------------------ GigabitEthernet2/0/6 GigabitEthernet2/0/8 Active Down/Backup Up Vlans Preferred on Active Interface: 1-50 Vlans Preferred on Backup Interface: 60, 100-120 When a Flex Links interface comes up, VLANs preferred on this interface are blocked on the peer interface and moved to the forwarding state on the interface that has just come up. In this example, if interface Gi2/0/6 comes up, VLANs preferred on this interface are blocked on the peer interface Gi2/0/8 and forwarded on Gi2/0/6. Switch# show interfaces switchport backup Switch Backup Interface Pairs: Active Interface Backup Interface State ------------------------------------------------------------------------ GigabitEthernet2/0/6 GigabitEthernet2/0/8 Active Up/Backup Standby Vlans Preferred on Active Interface: 1-50 Vlans Preferred on Backup Interface: 60, 100-120 Switch# show interfaces switchport backup detail Switch Backup Interface Pairs: Active Interface Backup Interface State ------------------------------------------------------------------------ FastEthernet1/0/3 FastEthernet1/0/4 Active Down/Backup Up Vlans Preferred on Active Interface: 1-2,5-4094 Vlans Preferred on Backup Interface: 3-4 Preemption Mode : off Bandwidth : 10000 Kbit (Fa1/0/3), 100000 Kbit (Fa1/0/4) Mac Address Move Update Vlan : auto Configuring the MAC Address-Table Move Update: Examples This example shows how to verify the configuration after you configure an access switch to send MAC address-table move updates: Switch# show mac address-table move update Switch-ID : 010b.4630.1780 Dst mac-address : 0180.c200.0010 Vlans/Macs supported : 1023/8320 Default/Current settings: Rcv Off/On, Xmt Off/On Max packets per min : Rcv 40, Xmt 60 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 623 Configuring Multicast Fast Convergence with Flex Links Failover: Examples Layer 2/3 Rcv packet count : 5 Rcv conforming packet count : 5 Rcv invalid packet count : 0 Rcv packet count this min : 0 Rcv threshold exceed count : 0 Rcv last sequence# this min : 0 Rcv last interface : Po2 Rcv last src-mac-address : 000b.462d.c502 Rcv last switch-ID : 0403.fd6a.8700 Xmt packet count : 0 Xmt packet count this min : 0 Xmt threshold exceed count : 0 Xmt pak buf unavail cnt : 0 Xmt last interface : None Configuring Multicast Fast Convergence with Flex Links Failover: Examples These are configuration examples for learning the other Flex Links port as the mrouter port when Flex Links is configured on GigabitEthernet1/0/11 and GigabitEthernet1/0/12, and output for the show interfaces switchport backup command: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface GigabitEthernet1/0/11 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport mode trunk Switch(config-if)# switchport backup interface GigabitEthernet1/0/12 Switch(config-if)# exit Switch(config)# interface GigabitEthernet1/0/12 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport mode trunk Switch(config-if)# end Switch# show interfaces switchport backup detail Switch Backup Interface Pairs: Active Interface Backup Interface State GigabitEthernet1/0/11 GigabitEthernet1/0/12 Active Up/Backup Standby Preemption Mode : off Multicast Fast Convergence : Off Bandwidth : 100000 Kbit (Gi1/0/11), 100000 Kbit (Gi1/0/12) Mac Address Move Update Vlan : auto This output shows a querier for VLANs 1 and 401, with their queries reaching the switch through GigabitEthernet1/0/11: Switch# show ip igmp snooping querier Vlan IP Address IGMP Version Port ------------------------------------------------------------- 1 1.1.1.1 v2 Gi1/0/11 401 41.41.41.1 v2 Gi1/0/11 This example is output for the show ip igmp snooping mrouter command for VLANs 1 and 401: Switch# show ip igmp snooping mrouter Vlan ports ---- ----- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 624 Layer 2/3 Configuring Multicast Fast Convergence with Flex Links Failover: Examples 1 Gi1/0/11(dynamic), Gi1/0/12(dynamic) 401 Gi1/0/11(dynamic), Gi1/0/12(dynamic) Similarly, both Flex Links ports are part of learned groups. In this example, GigabitEthernet2/0/11 is a receiver/host in VLAN 1, which is interested in two multicast groups: Switch# show ip igmp snooping groups Vlan Group Type Version Port List ----------------------------------------------------------------------1 228.1.5.1 igmp v2 Gi1/0/11, Gi1/0/12, Gi2/0/11 1 228.1.5.2 igmp v2 Gi1/0/11, Gi1/0/12, Gi2/0/11 When a host responds to the general query, the switch forwards this report on all the mrouter ports. In this example, when a host sends a report for the group 228.1.5.1, it is forwarded only on GigabitEthernet1/0/11, because the backup port GigabitEthernet1/0/12 is blocked. When the active link, GigabitEthernet1/0/11, goes down, the backup port, GigabitEthernet1/0/12, begins forwarding. As soon as this port starts forwarding, the switch sends proxy reports for the groups 228.1.5.1 and 228.1.5.2 on behalf of the host. The upstream router learns the groups and starts forwarding multicast data. This is the default behavior of Flex Links. This behavior changes when the user configures fast convergence using the switchport backup interface gigabitEthernet 1/0/12 multicast fast-convergence command. This example shows turning on this feature: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface gigabitEthernet 1/0/11 Switch(config-if)# switchport backup interface gigabitEthernet 1/0/12 multicast fast-convergence Switch(config-if)# exit Switch# show interfaces switchport backup detail Switch Backup Interface Pairs: Active Interface Backup Interface State ------------------------------------------------------------------------ GigabitEthernet1/0/11 GigabitEthernet1/0/12 Active Up/Backup Standby Preemption Mode : off Multicast Fast Convergence : On Bandwidth : 100000 Kbit (Gi1/0/11), 100000 Kbit (Gi1/0/12) Mac Address Move Update Vlan : auto This output shows a querier for VLAN 1 and 401 with their queries reaching the switch through GigabitEthernet1/0/11: Switch# show ip igmp snooping querier Vlan IP Address IGMP Version Port ------------------------------------------------------------- 1 1.1.1.1 v2 Gi1/0/11 401 41.41.41.1 v2 Gi1/0/11 This is output for the show ip igmp snooping mrouter command for VLAN 1 and 401: Switch# show ip igmp snooping mrouter Vlan ports Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 625 Additional References for Flex Links and MAC Address-Table Move Update Layer 2/3 ---- ----1 Gi1/0/11(dynamic), Gi1/0/12(dynamic) 401 Gi1/0/11(dynamic), Gi1/0/12(dynamic) Similarly, both the Flex Links ports are a part of the learned groups. In this example, GigabitEthernet2/0/11 is a receiver/host in VLAN 1, which is interested in two multicast groups: Switch# show ip igmp snooping groups Vlan Group Type Version Port List ----------------------------------------------------------------------1 228.1.5.1 igmp v2 Gi1/0/11, Gi1/0/12, Gi2/0/11 1 228.1.5.2 igmp v2 Gi1/0/11, Gi1/0/12, Gi2/0/11 Whenever a host responds to the general query, the switch forwards this report on all the mrouter ports. When you turn on this feature through the command-line port, and when a report is forwarded by the switch on GigabitEthernet1/0/11, it is also leaked to the backup port GigabitEthernet1/0/12. The upstream router learns the groups and starts forwarding multicast data, which is dropped at the ingress because GigabitEthernet1/0/12 is blocked. When the active link, GigabitEthernet1/0/11, goes down, the backup port, GigabitEthernet1/0/12, begins forwarding. You do not need to send any proxy reports as the multicast data is already being forwarded by the upstream router. By leaking reports to the backup port, a redundant multicast path has been set up, and the time taken for the multicast traffic convergence is very minimal. Additional References for Flex Links and MAC Address-Table Move Update Related Documents Related Topic Layer 2 command reference Document Title Layer 2/3 Command Reference (Catalyst 3650 Switches) switchport backup interface command Interface and Hardware Component Command Reference (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 626 Layer 2/3 Feature Information for Flex Links and MAC Address-Table Move Update MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for Flex Links and MAC Address-Table Move Update Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 627 Feature Information for Flex Links and MAC Address-Table Move Update Layer 2/3 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 628 3 3 C H A P T E R Configuring UniDirectional Link Detection · Finding Feature Information, on page 629 · Restrictions for Configuring UDLD, on page 629 · Information About UDLD, on page 630 · How to Configure UDLD, on page 632 · Monitoring and Maintaining UDLD, on page 635 · Additional References for UDLD, on page 635 · Feature Information for UDLD, on page 636 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Configuring UDLD The following are restrictions for configuring UniDirectional Link Detection (UDLD): · A UDLD-capable port cannot detect a unidirectional link if it is connected to a UDLD-incapable port of another switch. · When configuring the mode (normal or aggressive), make sure that the same mode is configured on both sides of the link. Caution Loop guard works only on point-to-point links. We recommend that each end of the link has a directly connected device that is running STP. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 629 Information About UDLD Layer 2/3 Information About UDLD UniDirectional Link Detection (UDLD) is a Layer 2 protocol that enables devices connected through fiber-optic or twisted-pair Ethernet cables to monitor the physical configuration of the cables and detect when a unidirectional link exists. All connected devices must support UDLD for the protocol to successfully identify and disable unidirectional links. When UDLD detects a unidirectional link, it disables the affected port and alerts you. Unidirectional links can cause a variety of problems, including spanning-tree topology loops. Modes of Operation UDLD supports two modes of operation: normal (the default) and aggressive. In normal mode, UDLD can detect unidirectional links due to misconnected ports on fiber-optic connections. In aggressive mode, UDLD can also detect unidirectional links due to one-way traffic on fiber-optic and twisted-pair links and to misconnected ports on fiber-optic links. In normal and aggressive modes, UDLD works with the Layer 1 mechanisms to learn the physical status of a link. At Layer 1, autonegotiation takes care of physical signaling and fault detection. UDLD performs tasks that autonegotiation cannot perform, such as detecting the identities of neighbors and shutting down misconnected ports. When you enable both autonegotiation and UDLD, the Layer 1 and Layer 2 detections work together to prevent physical and logical unidirectional connections and the malfunctioning of other protocols. A unidirectional link occurs whenever traffic sent by a local device is received by its neighbor but traffic from the neighbor is not received by the local device. Normal Mode In normal mode, UDLD detects a unidirectional link when fiber strands in a fiber-optic port are misconnected and the Layer 1 mechanisms do not detect this misconnection. If the ports are connected correctly but the traffic is one way, UDLD does not detect the unidirectional link because the Layer 1 mechanism, which is supposed to detect this condition, does not do so. In this case, the logical link is considered undetermined, and UDLD does not disable the port. When UDLD is in normal mode, if one of the fiber strands in a pair is disconnected, as long as autonegotiation is active, the link does not stay up because the Layer 1 mechanisms detects a physical problem with the link. In this case, UDLD does not take any action and the logical link is considered undetermined. Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634 Aggressive Mode In aggressive mode, UDLD detects a unidirectional link by using the previous detection methods. UDLD in aggressive mode can also detect a unidirectional link on a point-to-point link on which no failure between the two devices is allowed. It can also detect a unidirectional link when one of these problems exists: · On fiber-optic or twisted-pair links, one of the ports cannot send or receive traffic. · On fiber-optic or twisted-pair links, one of the ports is down while the other is up. · One of the fiber strands in the cable is disconnected. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 630 Layer 2/3 Methods to Detect Unidirectional Links In these cases, UDLD disables the affected port. In a point-to-point link, UDLD hello packets can be considered as a heart beat whose presence guarantees the health of the link. Conversely, the loss of the heart beat means that the link must be shut down if it is not possible to reestablish a bidirectional link. If both fiber strands in a cable are working normally from a Layer 1 perspective, UDLD in aggressive mode detects whether those fiber strands are connected correctly and whether traffic is flowing bidirectionally between the correct neighbors. This check cannot be performed by autonegotiation because autonegotiation operates at Layer 1. Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634 Methods to Detect Unidirectional Links UDLD operates by using two methods: · Neighbor database maintenance · Event-driven detection and echoing Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634 Neighbor Database Maintenance UDLD learns about other UDLD-capable neighbors by periodically sending a hello packet (also called an advertisement or probe) on every active port to keep each device informed about its neighbors. When the switch receives a hello message, it caches the information until the age time (hold time or time-to-live) expires. If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the new one. Whenever a port is disabled and UDLD is running, whenever UDLD is disabled on a port, or whenever the switch is reset, UDLD clears all existing cache entries for the ports affected by the configuration change. UDLD sends at least one message to inform the neighbors to flush the part of their caches affected by the status change. The message is intended to keep the caches synchronized. Event-Driven Detection and Echoing UDLD relies on echoing as its detection operation. Whenever a UDLD device learns about a new neighbor or receives a resynchronization request from an out-of-sync neighbor, it restarts the detection window on its side of the connection and sends echo messages in reply. Because this behavior is the same on all UDLD neighbors, the sender of the echoes expects to receive an echo in reply. If the detection window ends and no valid reply message is received, the link might shut down, depending on the UDLD mode. When UDLD is in normal mode, the link might be considered undetermined and might not be shut down. When UDLD is in aggressive mode, the link is considered unidirectional, and the port is disabled. Related Topics Enabling UDLD Globally (CLI), on page 632 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 631 UDLD Reset Options Layer 2/3 Enabling UDLD on an Interface (CLI), on page 634 UDLD Reset Options If an interface becomes disabled by UDLD, you can use one of the following options to reset UDLD: · The udld reset interface configuration command. · The shutdown interface configuration command followed by the no shutdown interface configuration command restarts the disabled port. · The no udld {aggressive | enable} global configuration command followed by the udld {aggressive | enable} global configuration command reenables the disabled ports. · The no udld port interface configuration command followed by the udld port [aggressive] interface configuration command reenables the disabled fiber-optic port. · The errdisable recovery cause udld global configuration command enables the timer to automatically recover from the UDLD error-disabled state, and the errdisable recovery interval interval global configuration command specifies the time to recover from the UDLD error-disabled state. Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634 Default UDLD Configuration Table 64: Default UDLD Configuration Feature Default Setting UDLD global enable state Globally disabled UDLD per-port enable state for fiber-optic media Disabled on all Ethernet fiber-optic ports UDLD per-port enable state for twisted-pair (copper) Disabled on all Ethernet 10/100 and 1000BASE-TX media ports UDLD aggressive mode Disabled Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634 How to Configure UDLD Enabling UDLD Globally (CLI) Follow these steps to enable UDLD in the aggressive or normal mode and to set the configurable message timer on all fiber-optic ports on the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 632 Layer 2/3 Enabling UDLD Globally (CLI) SUMMARY STEPS 1. configure terminal 2. udld {aggressive | enable | message time message-timer-interval} 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 udld {aggressive | enable | message time message-timer-interval} Example: Switch(config)# udld enable message time 10 Specifies the UDLD mode of operation: · aggressive--Enables UDLD in aggressive mode on all fiber-optic ports. · enable--Enables UDLD in normal mode on all fiber-optic ports on the switch. UDLD is disabled by default. An individual interface configuration overrides the setting of the udld enable global configuration command. · message time message-timer-interval--Configures the period of time between UDLD probe messages on ports that are in the advertisement phase and are detected to be bidirectional. The range is from 1 to 90 seconds; the default value is 15. Note This command affects fiber-optic ports only. Use the udld interface configuration command to enable UDLD on other port types. Step 3 end Example: Switch(config)# end Use the no form of this command, to disable UDLD. Returns to privileged EXEC mode. Related Topics Monitoring and Maintaing UDLD Aggressive Mode, on page 630 Normal Mode, on page 630 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 633 Enabling UDLD on an Interface (CLI) Layer 2/3 Methods to Detect Unidirectional Links, on page 631 Event-Driven Detection and Echoing, on page 631 UDLD Reset Options, on page 632 Default UDLD Configuration, on page 632 Enabling UDLD on an Interface (CLI) Follow these steps either to enable UDLD in the aggressive or normal mode or to disable UDLD on a port. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. udld port [aggressive] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Specifies the port to be enabled for UDLD, and enters interface configuration mode. Step 3 udld port [aggressive] Example: Switch(config-if)# udld port aggressive Step 4 end Example: Switch(config-if)# end UDLD is disabled by default. · udld port--Enables UDLD in normal mode on the specified port. · udld port aggressive--(Optional) Enables UDLD in aggressive mode on the specified port. Note Use the no udld port interface configuration command to disable UDLD on a specified fiber-optic port. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 634 Layer 2/3 Monitoring and Maintaining UDLD Related Topics Monitoring and Maintaing UDLD Aggressive Mode, on page 630 Normal Mode, on page 630 Methods to Detect Unidirectional Links, on page 631 Event-Driven Detection and Echoing, on page 631 UDLD Reset Options, on page 632 Default UDLD Configuration, on page 632 Monitoring and Maintaining UDLD Command show udld [interface-id | neighbors] Purpose Displays the UDLD status for the specified port or for all ports. Additional References for UDLD Related Documents Related Topic Layer 2 command reference Document Title Layer 2/3 Command Reference (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 635 Feature Information for UDLD Layer 2/3 Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for UDLD Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 636 V I I PA R T Lightweight Access Point · Configuring the Switch for Access Point Discovery, on page 639 · Configuring Data Encryption, on page 647 · Configuring Retransmission Interval and Retry Count, on page 651 · Configuring Adaptive Wireless Intrusion Prevention System, on page 657 · Configuring Authentication for Access Points, on page 663 · Converting Autonomous Access Points to Lightweight Mode, on page 673 · Using Cisco Workgroup Bridges, on page 685 · Configuring Probe Request Forwarding, on page 689 · Optimizing RFID Tracking, on page 691 · Configuring Country Codes, on page 695 · Configuring Link Latency, on page 701 · Configuring Power over Ethernet, on page 711 3 4 C H A P T E R Configuring the Switch for Access Point Discovery · Finding Feature Information, on page 639 · Prerequisites for Configuring the Switch for Access Point Discovery, on page 639 · Restrictions for Configuring the Switch for Access Point Discovery, on page 640 · Information About Configuring the Switch for Access Point Discovery, on page 640 · How to Configure Access Point Discovery, on page 642 · Configuration Examples for Configuring the Switch for Access Point Discovery, on page 645 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring the Switch for Access Point Discovery · Ensure that the Control and Provisioning of Wireless Access Points (CAPWAP) UDP ports 5246 and 5247 (similar to the Lightweight Access Point Protocol (LWAPP) UDP ports 12222 and 12223) are enabled and are not blocked by an intermediate device that could prevent an access point from joining the switch. · If access control lists (ACLs) are in the control path between the switch and its access points, you must open new protocol ports to prevent access points from being stranded. · If an access point is in the UP state and its IP address changes, the access point tears down the existing CAPWAP tunnel and rejoins the switch. · Access points must be discovered by a switch before they can become an active part of the network. The lightweight access points support the following switch discovery processes: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 639 Restrictions for Configuring the Switch for Access Point Discovery Lightweight Access Point · Layer 3 CAPWAP discovery--You can enable this feature on different subnets from the access point. This feature uses IP addresses and UDP packets rather the MAC addresses used by Layer 2 discovery. · Locally stored switch IP address discovery--If the access point was previously associated to a switch, the IP addresses of the primary, secondary, and tertiary switchs are stored in the access point's nonvolatile memory. This process of storing switch IP addresses on an access point for later deployment is called priming the access point. · DHCP server discovery--This feature uses DHCP option 43 to provide switch IP addresses to the access points. Cisco switches support a DHCP server option that is typically used for this capability. · DNS discovery--The access point can discover switchs through your domain name server (DNS). You must configure your DNS to return switch IP addresses in response to CISCO-CAPWAP-CONTROLLER.localdomain, where localdomain is the access point domain name. When an access point receives an IP address and DNS information from a DHCP server, it contacts the DNS to resolve CISCO-CAPWAP-CONTROLLER.localdomain. When the DNS sends a list of switch IP addresses, the access point sends discovery requests to the switchs. Restrictions for Configuring the Switch for Access Point Discovery · Ensure that the switchs are configured with the correct date and time. If the date and time configured on the switch precedes the creation and installation date of certificates on the access points, the access point fails to join the switch. · During the discovery process, access points that are supported by the Cisco switch, such as the 1140, 1260, 3500, 1040,1600, 2600, or 3600 query only for Cisco switchs. Information About Configuring the Switch for Access Point Discovery In a CAPWAP environment, a lightweight access point discovers a switch by using CAPWAP discovery mechanisms and then sends a CAPWAP join request to the switch. The switch sends a CAPWAP join response to the access point that allows the access point to join the switch. When the access point joins the switch, the switch manages its configuration, firmware, control transactions, and data transactions. Access Point Communication Protocols Cisco lightweight access points use the IETF standard CAPWAP to communicate with the switch and other lightweight access points on the network. CAPWAP, which is based on LWAPP, is a standard, interoperable protocol that enables a switch to manage a collection of wireless access points. CAPWAP is implemented in switch for these reasons: · To provide an upgrade path from Cisco products that use LWAPP to next-generation Cisco products that use CAPWAP Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 640 Lightweight Access Point Viewing Access Point Join Information · To manage RFID readers and similar devices · To enable switchs to interoperate with third-party access points in the future Viewing Access Point Join Information Join statistics for an access point that sends a CAPWAP discovery request to the switch at least once are maintained on the switch even if the access point is rebooted or disconnected. These statistics are removed only when the switch is rebooted or when you choose to clear the statistics. Troubleshooting the Access Point Join Process Access points can fail to join a switch for many reasons such as a RADIUS authorization is pending, self-signed certificates are not enabled on the switch, the access point and switch's regulatory domains do not match, and so on. You can configure the access points to send all CAPWAP-related errors to a syslog server. You do not need to enable any debug commands on the switch because all of the CAPWAP error messages can be viewed from the syslog server itself. The state of the access point is not maintained on the switch until it receives a CAPWAP join request from the access point, so it can be difficult to determine why the CAPWAP discovery request from a certain access point was rejected. In order to troubleshoot such joining issues without enabling CAPWAP debug commands on the switch, the switch collects information for all access points that send a discovery message to this switch and maintains information for any access points that have successfully joined this switch. The switch collects all join-related information for each access point that sends a CAPWAP discovery request to the switch. Collection begins when the first discovery message is received from the access point and ends when the last configuration payload is sent from the switch to the access point. When the switch is maintaining join-related information for the maximum number of access points, it does not collect information for any more access points. You can also configure a DHCP server to return a syslog server IP address to the access point using option 7 on the server. The access point then starts sending all syslog messages to this IP address. You can configure the syslog server IP address through the access point CLI, if the access point is not connected to the switch by entering the capwap ap log-server syslog_server_IP_address command. When the access point joins a switch for the first time, the switch pushes the global syslog server IP address (the default is 255.255.255.255) to the access point. After that, the access point sends all syslog messages to this IP address, until it is overridden by one of the following scenarios: · The access point is still connected to the same switch, and you changed the global syslog server IP address configuration on the switch by using the ap syslog host Syslog_Server_IP_Address command. In this case, the switch pushes the new global syslog server IP address to the access point. · The access point is still connected to the same switch, and you configured a specific syslog server IP address for the access point on the switch by using the ap name Cisco_AP syslog host Syslog_Host_IP_Address command. In this case, the switch pushes the new specific syslog server IP address to the access point. · The access point gets disconnected from the switch, and you configured the syslog server IP address from the access point CLI by using the capwap ap log-server syslog_server_IP_address command. This command works only if the access point is not connected to any switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 641 How to Configure Access Point Discovery Lightweight Access Point · The access point gets disconnected from the switch and joins another switch. In this case, the new switch pushes its global syslog server IP address to the access point. Whenever a new syslog server IP address overrides the existing syslog server IP address, the old address is erased from persistent storage, and the new address is stored in its place. The access point also starts sending all syslog messages to the new IP address, if the access point can reach the syslog server IP address. How to Configure Access Point Discovery Configuring the Syslog Server for Access Points (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ap syslog host host_ip_address 4. end 5. show ap config global 6. show ap name Cisco_AP config general DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 configure terminal Example: Switch# configure terminal Step 3 ap syslog host host_ip_address Example: Switch(config)# ap syslog host 10.9.9.16 Purpose Enters privileged EXEC mode. Enters global configuration mode. Configures the global syslog server for all access points that join this switch. Note By default, the global syslog server IP address for all access points is 255.255.255.255. Make sure that the access points can reach the subnet on which the syslog server resides before configuring the syslog server on the switch. If the access points cannot reach this subnet, the access points are unable to send out syslog messages. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 642 Lightweight Access Point Monitoring Access Point Join Information (CLI) Step 5 Step 6 Command or Action show ap config global Example: Switch# show ap config global show ap name Cisco_AP config general Example: Switch# show ap name AP03 config general Purpose Displays the global syslog server settings for all access points that join the switch. Displays the syslog server settings for a specific access point. Monitoring Access Point Join Information (CLI) Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. enable 2. show ap join stats summary 3. show ap mac-address mac_address join stats summary 4. show ap mac-address mac_address join stats detailed 5. clear ap join statistics DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 show ap join stats summary Example: Switch# show ap join stats summary Step 3 show ap mac-address mac_address join stats summary Example: Switch# show ap mac-address 000.2000.0400 join stats summary Step 4 show ap mac-address mac_address join stats detailed Example: Switch# show ap mac-address 000.2000.0400 join stats detailed Purpose Enters privileged EXEC mode. Displays the MAC addresses of all the access points that are joined to the switch or that have tried to join. Displays all the statistics for the AP including the last join error detail. Displays all join-related statistics collected for a specific access point. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 643 Searching for Access Point Radios (GUI) Lightweight Access Point Step 5 Command or Action clear ap join statistics Example: Switch# clear ap join statistics Purpose Clears the join statistics for all access points. Note To clear the join statistics that correspond to specific access points, enter the clear ap mac-address mac_address join statistics command. Related Topics Displaying the MAC Addresses of all Access Points: Example, on page 645 DHCP Option 43 for Lightweight Cisco Aironet Access Points Configuration Example, on page 646 Searching for Access Point Radios (GUI) Step 1 Step 2 Step 3 Choose Monitor > Wireless > Access Points and click 802.11a/n/ac Statistics or 802.11b/g/n Statistics. The 802.11 Radio pages are displayed. These pages show all of the 802.11a/n/ac or 802.11b/g/n access point radios that are associated with the switch and their current settings. Note In a Cisco converged access environment, the 802.11a/n/ac and 802.11b/g/n radios should not be differentiated based on their Base Radio MAC addresses, because they might have the same addresses. Instead, the radios should be differentiated based on their physical addresses. From the Show drop-down list, choose Quick Filter. The filter options (text boxes) appear in each of the column header in the table. Enter a keyword in the corresponding text boxes to specify the filter criteria based on which you want to search, and click the Filter icon. Monitoring the Interface Details (GUI) Step 1 Step 2 Step 3 Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed showing a list of access points that are associated with the switch. Click the access point name. The AP > Edit page is displayed. Click the Interface tab. The interface details are displayed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 644 Lightweight Access Point Configuration Examples for Configuring the Switch for Access Point Discovery Configuration Examples for Configuring the Switch for Access Point Discovery Displaying the MAC Addresses of all Access Points: Example This example shows how to display MAC addresses of all the access points that are joined to the switch: Switch# show ap join stats summary Number of APs.......................................... 4 Base Mac EthernetMac AP Name IP Address Status ----------------- ----------------- ------- ------------- ---------- 00:0b:85:57:bc:c0 00:0b:85:57:bc:c0 AP1130 10.10.163.217 Joined 00:1c:0f:81:db:80 00:1c:63:23:ac:a0 AP1140 10.10.163.216 Not joined 00:1c:0f:81:fc:20 00:1b:d5:9f:7d:b2 AP1 10.10.163.215 Joined 00:21:1b:ea:36:60 00:0c:d4:8a:6b:c1 AP2 10.10.163.214 Not joined This example shows how to display the last join error details for a specific access point: Switch# show ap mac-address 000.2000.0400 join stats summary Is the AP currently connected to controller................ Yes Time at which the AP joined this controller last time................................. Aug 21 12:50:36.061 Type of error that occurred last.................. AP got or has been disconnected Reason for error that occurred last........... The AP has been reset by the controller Time at which the last join error occurred......... Aug 21 12:50:34.374 This example shows how to display all join-related statistics collected for a specific access point: Switch# show ap mac-address 000.2000.0400 join stats detailed Discovery phase statistics - Discovery requests received........................ 2 - Successful discovery responses sent................ 2 - Unsuccessful discovery request processing.......... 0 - Reason for last unsuccessful discovery attempt..... Not applicable - Time at last successful discovery attempt.......... Aug 21 12:50:23.335 - Time at last unsuccessful discovery attempt........ Not applicable Join phase statistics - Join requests received............................. 1 - Successful join responses sent..................... 1 - Unsuccessful join request processing............... 1 - Reason for last unsuccessful join attempt..... RADIUS authorization is pending for the AP - Time at last successful join attempt............... Aug 21 12:50:34.481 - Time at last unsuccessful join attempt............. Aug 21 12:50:34.374 Configuration phase statistics - Configuration requests received..................... 1 - Successful configuration responses sent............. 1 - Unsuccessful configuration request processing....... 0 - Reason for last unsuccessful configuration attempt.. Not applicable - Time at last successful configuration attempt....... Aug 21 12:50:34.374 - Time at last unsuccessful configuration attempt..... Not applicable Last AP message decryption failure details Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 645 DHCP Option 43 for Lightweight Cisco Aironet Access Points Configuration Example Lightweight Access Point - Reason for last message decryption failure.......... Not applicable Last AP disconnect details - Reason for last AP connection failure............... The AP has been reset by the controller Last join error summary - Type of error that occurred last.................... AP got or has been disconnected - Reason for error that occurred last................. The AP has been reset by the controller - Time at which the last join error occurred.......... Aug 21 12:50:34.374 DHCP Option 43 for Lightweight Cisco Aironet Access Points Configuration Example For more information about the AP join process, see DHCP OPTION 43 for Lightweight Cisco Aironet Access Points Configuration Example at http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a00808714fe.shtml. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 646 3 5 C H A P T E R Configuring Data Encryption · Finding Feature Information, on page 647 · Prerequisites for Configuring Data Encryption, on page 647 · Restrictions for Configuring Data Encryption, on page 647 · Information About Data Encryption, on page 648 · How to Configure Data Encryption, on page 648 · Configuration Examples for Configuring Data Encryption, on page 649 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring Data Encryption · Cisco 1260, 3500, 3600, 801, 1140, 1310, and 1520 series access points support Datagram Transport Layer Security (DTLS) data encryption. · You can use the switch to enable or disable DTLS data encryption for a specific access point or for all access points. · Non-Russian customers who use the Cisco switch do not need a data DTLS license. Restrictions for Configuring Data Encryption · Encryption limits throughput at both the switch and the access point, and maximum throughput is desired for most enterprise networks. · If your switch does not have a data DTLS license and if the access point associated with the switch has DTLS enabled, the data path will be unencrypted. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 647 Information About Data Encryption Lightweight Access Point · In images that do not have a DTLS license, the DTLS commands are not available. Information About Data Encryption The switch enables you to encrypt Control and Provisioning of Wireless Access Points (CAPWAP) control packets (and optionally, CAPWAP data packets) that are sent between the access point and the switch using DTLS. DTLS is a standards-track Internet Engineering Task Force (IETF) protocol based on TLS. CAPWAP control packets are management packets exchanged between a switch and an access point while CAPWAP data packets encapsulate forwarded wireless frames. CAPWAP control and data packets are sent over separate UDP ports: 5246 (control) and 5247 (data). If an access point does not support DTLS data encryption, DTLS is enabled only for the control plane, and a DTLS session for the data plane is not established. How to Configure Data Encryption Configuring Data Encryption (CLI) SUMMARY STEPS 1. configure terminal 2. ap link-encryption 3. end 4. show ap link-encryption 5. show wireless dtls connections DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap link-encryption Example: Switch(config)# ap link-encryption Step 3 Step 4 end Example: Switch(config)# end show ap link-encryption Example: Purpose Enters global configuration mode. Enables data encryption for all access points or a specific access point by entering this command. The default value is disabled. Changing the data encryption mode requires the access points to rejoin the switch. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Displays the encryption state of all access points or a specific access point. This command also shows authentication errors, which track the number of integrity Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 648 Lightweight Access Point Configuring Data Encryption (GUI) Command or Action Switch# show ap link-encryption Step 5 show wireless dtls connections Example: Switch# show wireless dtls connections Purpose check failures and replay errors. Relay errors help in tracking the number of times the access point receives the same packet. Displays a summary of all active DTLS connections. Note If you experience any problems with DTLS data encryption, enter the debug dtls ap {all | event | trace} command to debug all DTLS messages, events, or traces. Related Topics Displaying Data Encryption States for all Access Points: Examples, on page 649 Configuring Data Encryption (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed. Click the name of the access point for which you want to enable data encryption. The AP > Edit page is displayed. Click the Advanced tab. Select or unselect the Data Encryption check box. Note Changing the data encryption mode requires the access points to reassociate with the switch. Click Apply. Click Save Configuration. Configuration Examples for Configuring Data Encryption Displaying Data Encryption States for all Access Points: Examples This example shows how to display the encryption state of all access points or a specific access point. This command also shows authentication errors, which track the number of integrity check failures and replay errors. Relay errors help in tracking the number of times the access point receives the same packet: Switch# show ap link-encryption Encryption Dnstream AP Name State Count ------------------ ---------- -------- 3602a Enabled 0 Upstream Count -------0 Last Update ------ Never Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 649 Displaying Data Encryption States for all Access Points: Examples Lightweight Access Point This example shows how to display a summary of all active DTLS connections: Switch# show wireless dtls connections AP Name Local Port Peer IP Peer Port Ciphersuite --------------- ------------ ------------- ---------- -------------------- 3602a Capwap_Ctrl 10.10.21.213 46075 TLS_RSA_WITH_AES_128_CBC_SHA 3602a Capwap_Data 10.10.21.213 46075 TLS_RSA_WITH_AES_128_CBC_SHA Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 650 3 6 C H A P T E R Configuring Retransmission Interval and Retry Count · Finding Feature Information, on page 651 · Prerequisites for Configuring the Access Point Retransmission Interval and Retry Count, on page 651 · Information About Retransmission Interval and Retry Count, on page 652 · How to Configure Access Point Retransmission Interval and Retry Count, on page 652 · Viewing CAPWAP Maximum Transmission Unit Information (CLI), on page 654 · Viewing CAPWAP Maximum Transmission Unit Information (GUI), on page 655 · Configuration Examples for Configuring Access Point Retransmission Interval and Retry Count, on page 655 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring the Access Point Retransmission Interval and Retry Count · You can configure the retransmission intervals and retry count both at a global and a specific access point level. A global configuration applies these configuration parameters to all the access points. Alternatively, when you configure the retransmission level and retry count at a specific access point level, the values are applied to that particular access point. The access point specific configuration has a higher precedence than the global configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 651 Information About Retransmission Interval and Retry Count Lightweight Access Point Information About Retransmission Interval and Retry Count The switch and the access points exchange packets using the Control and Provisioning of Wireless Access Points (CAPWAP) reliable transport protocol. For each request, a response is defined. This response is used to acknowledge the receipt of the request message. Response messages are not explicitly acknowledged; therefore, if a response message is not received, the original request message is retransmitted after the retransmit interval. If the request is not acknowledged after a maximum number of retransmissions, the session is closed and the access points reassociate with another switch. How to Configure Access Point Retransmission Interval and Retry Count Configuring the Access Point Retransmission Interval and Retry Count (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ap capwap retransmit interval interval_time 4. ap capwap retransmit count count_value 5. end 6. ap name Cisco_AP capwap retransmit interval interval_time 7. ap name Cisco_AP capwap retransmit count count_value 8. show ap capwap retransmit DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 3 ap capwap retransmit interval interval_time Example: Switch(config)# ap capwap retransmit interval 2 Configures the control packet retransmit interval for all access points globally. Note The range for the interval parameter is from 2 to 5. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 652 Lightweight Access Point Configuring the Access Point Retransmission Interval and Retry Count (GUI) Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action ap capwap retransmit count count_value Example: Switch(config)# ap capwap retransmit count 3 end Example: Switch(config)# end ap name Cisco_AP capwap retransmit interval interval_time Example: Switch# ap name AP02 capwap retransmit interval 2 ap name Cisco_AP capwap retransmit count count_value Example: Switch# ap name AP02 capwap retransmit count 3 show ap capwap retransmit Example: Switch# show ap capwap retransmit Purpose Configures the control packet retry count for all access points globally. Note The range for the count is from 3 to 8. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configures the control packet retransmit interval for the individual access point that you specify. Note The range for the interval is from 2 to 5. Note You must be in privileged EXEC mode to use the ap name commands. Configures the control packet retry count for the individual access point that you specify. Note The range for the retry count is from 3 to 8. Displays the CAPWAP retransmit details. Configuring the Access Point Retransmission Interval and Retry Count (GUI) Procedure · Global configuration applicable to all APs: a) Choose Configuration > Wireless > Access Points > Global AP Configuration. The Global Configuration page is displayed. b) In the AP Retransmit Config Parameters area, enter the values for the following parameters: · AP Retransmit Count--Number of times you want the access point to retransmit the request to the switch. The valid range is between 3 and 8. · AP Retransmit Interval--Duration between the retransmission of requests. The valid range is between 2 and 5. c) Click Apply. d) Click Save Configuration. · Configuration that is applicable to a specific AP: a) Choose Configuration > Wireless > Access Points > All APs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 653 Viewing CAPWAP Maximum Transmission Unit Information (CLI) Lightweight Access Point The All APs page is displayed with a list of access points. b) Click the access point name. The AP > Edit page is displayed. c) Click the Advanced tab. d) In the AP Retransmit Config Parameters area, enter the values for the following AP Retransmit Count and AP Retransmit Interval parameters: · AP Retransmit Count--Number of times you want the access point to retransmit the request to the switch. The valid range is between 3 and 8. · AP Retransmit Interval--Duration between the retransmission of requests. The valid range is between 2 and 5. e) Click Apply. f) Click Save Configuration. Viewing CAPWAP Maximum Transmission Unit Information (CLI) SUMMARY STEPS 1. enable 2. show ap name Cisco_AP config general DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Purpose Enters privileged EXEC mode. Step 2 show ap name Cisco_AP config general Example: Switch# show ap name Maria-1250 config general | include MTU Displays the maximum transmission unit (MTU) for the CAPWAP path on the switch. The MTU specifies the maximum size of any packet (in bytes) in a transmission. Related Topics Viewing the CAPWAP Retransmission Details: Example, on page 655 Viewing Maximum Transmission Unit Information: Example, on page 655 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 654 Lightweight Access Point Viewing CAPWAP Maximum Transmission Unit Information (GUI) Viewing CAPWAP Maximum Transmission Unit Information (GUI) Step 1 Step 2 Step 3 Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed. Click the AP name. The AP > Edit page is displayed. Click the Advanced tab. The CAPWAP MTU field shows the CAPWAP maximum retransmission unit information. Configuration Examples for Configuring Access Point Retransmission Interval and Retry Count Viewing the CAPWAP Retransmission Details: Example Enter the following command: Switch# show ap capwap retransmit Global control packet retransmit interval : 3 Global control packet retransmit count : 5 AP Name Retransmit Interval Retransmit Count --------------------------------- ------------------------------- -------------------------------- 3602a 5 3 Viewing Maximum Transmission Unit Information: Example This example shows how to view the maximum transmission unit (MTU) for the CAPWAP path on the switch. The MTU specifies the maximum size of any packet (in bytes) in a transmission: Switch# show ap name cisco-ap-name config general | include MTU CAPWAP Path MTU.................................. 1500 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 655 Viewing Maximum Transmission Unit Information: Example Lightweight Access Point Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 656 3 7 C H A P T E R Configuring Adaptive Wireless Intrusion Prevention System · Finding Feature Information, on page 657 · Prerequisites for Configuring wIPS, on page 657 · How to Configure wIPS on Access Points, on page 657 · Monitoring wIPS Information, on page 659 · Configuration Examples for Configuring wIPS on Access Points, on page 660 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring wIPS · The regular local mode access point has been extended with a subset of Wireless Intrusion Prevention System (wIPS) capabilities. This feature enables you to deploy your access points to provide protection without needing a separate overlay network. How to Configure wIPS on Access Points Configuring wIPS on an Access Point (CLI) SUMMARY STEPS 1. ap name Cisco_AP mode local 2. ap name Cisco_AP dot11 5ghz shutdown Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 657 Configuring wIPS on an Access Point (CLI) Lightweight Access Point 3. ap name Cisco_AP dot11 24ghz shutdown 4. ap name Cisco_AP mode monitor submode wips 5. ap name Cisco_AP monitor-mode wips-optimized 6. show ap dot11 24ghz monitor 7. ap name Cisco_AP no dot11 5ghz shutdown 8. ap name Cisco_AP no dot11 24ghz shutdown DETAILED STEPS Step 1 Command or Action ap name Cisco_AP mode local Example: Switch# ap name AP01 mode local Step 2 ap name Cisco_AP dot11 5ghz shutdown Example: Purpose Configures an access point for monitor mode. A message appears that indicates that changing the AP's mode causes the access point to reboot. This message also displays a prompt that enables you to specify whether or not you want to continue with changing the AP mode. Enter y at the prompt to continue. Disables the 802.11a radio on the access point. Step 3 Switch# ap name AP01 dot11 5ghz shutdown ap name Cisco_AP dot11 24ghz shutdown Example: Disables the 802.11b radio on the access point. Step 4 Switch# ap name AP02 dot11 24ghz shutdown ap name Cisco_AP mode monitor submode wips Example: Switch# ap name AP01 mode monitor submode wips Configures the wIPS submode on the access point. Note To disable wIPS on the access point, enter the ap name Cisco_AP modemonitor submode none command. Step 5 ap name Cisco_AP monitor-mode wips-optimized Example: Switch# ap name AP01 monitor-mode wips-optimized Enables wIPS optimized channel scanning for the access point. The access point scans each channel for 250 milliseconds. It derives the list of channels to be scanned from the monitor configuration. You can choose the following options: · All--All channels supported by the access point's radio. · Country--Only the channels supported by the access point's country of operation. · DCA--Only the channel set used by the dynamic channel assignment (DCA) algorithm, which by default includes all of the nonoverlapping channels allowed in the access point's country of operation. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 658 Lightweight Access Point Configuring wIPS on an Access Point (GUI) Step 6 Command or Action show ap dot11 24ghz monitor Example: Switch# show ap dot11 24ghz monitor Step 7 Step 8 ap name Cisco_AP no dot11 5ghz shutdown Example: Switch# ap name AP01 no dot11 5ghz shutdown ap name Cisco_AP no dot11 24ghz shutdown Example: Switch# ap name AP01 no dot11 24ghz shutdown Purpose Displays the monitor configuration channel set. Note The 802.11b Monitor Channels value in the output of the command indicates the monitor configuration channel set. Enables the 802.11a radio on the access point. Enables the 802.11b radio on the access point. Configuring wIPS on an Access Point (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Access Points > All APs The All APs page is displayed. Click the access point name. The AP > Edit page is displayed. From the AP Mode drop-down list, choose one of the following options to configure the AP mode parameters: · Local · Monitor From the AP Sub Mode drop-down list, choose WIPS. Click Apply. Click Save Configuration. Monitoring wIPS Information Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. show ap name Cisco_AP config general Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 659 Configuration Examples for Configuring wIPS on Access Points Lightweight Access Point 2. show ap monitor-mode summary 3. show wireless wps wips summary 4. show wireless wps wips statistics 5. clear wireless wips statistics DETAILED STEPS Step 1 Command or Action show ap name Cisco_AP config general Example: Switch# show ap name AP01 config general Step 2 show ap monitor-mode summary Example: Switch# show ap monitor-mode summary Step 3 show wireless wps wips summary Example: Switch# show wireless wps wips summary Step 4 show wireless wps wips statistics Example: Switch# show wireless wps wips statistics Step 5 clear wireless wips statistics Example: Switch# clear wireless wips statistics Purpose Displays information on the wIPS submode on the access point. Displays the wIPS optimized channel scanning configuration on the access point. Displays the wIPS configuration forwarded by NCS or Prime to the switch. Displays the current state of wIPS operation on the switch. Clears the wIPS statistics on the switch. Related Topics Displaying the Monitor Configuration Channel Set: Example, on page 660 Displaying wIPS Information: Examples, on page 661 Configuration Examples for Configuring wIPS on Access Points Displaying the Monitor Configuration Channel Set: Example This example shows how to display the monitor configuration channel set: Switch# show ap dot11 24ghz monitor Default 802.11b AP monitoring 802.11b Monitor Mode........................... enable 802.11b Monitor Channels....................... Country channels 802.11b AP Coverage Interval................... 180 seconds 802.11b AP Load Interval....................... 60 seconds 802.11b AP Noise Interval...................... 180 seconds 802.11b AP Signal Strength Interval............ 60 seconds Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 660 Lightweight Access Point Displaying wIPS Information: Examples Displaying wIPS Information: Examples This example shows how to display information on the wIPS submode on the access point: Switch# show ap name AP01 config general Cisco AP Identifier.............. 3 Cisco AP Name.................... AP1131:46f2.98ac ... AP Mode ......................... Monitor Public Safety ................... Disabled Disabled AP SubMode ...................... WIPS This example shows how to display the wIPS optimized channel scanning configuration on the access point: Switch# show ap monitor-mode summary AP Name Ethernet MAC Status Scanning Channel List ------------- -------------- -------- --------- AP1131:4f2.9a 00:16:4:f2:9:a WIPS 1,6,NA,NA This example shows how to display the wIPS configuration forwarded by WCS to the switch: Switch# show wireless wps wips summary Policy Name.............. Default Policy Version........... 3 This example shows how to display the current state of wIPS operation on the switch: Switch# show wireless wps wips statistics Policy Assignment Requests............ 1 Policy Assignment Responses........... 1 Policy Update Requests................ 0 Policy Update Responses............... 0 Policy Delete Requests................ 0 Policy Delete Responses............... 0 Alarm Updates......................... 13572 Device Updates........................ 8376 Device Update Requests................ 0 Device Update Responses............... 0 Forensic Updates...................... 1001 Invalid WIPS Payloads................. 0 Invalid Messages Received............. 0 CAPWAP Enqueue Failed................. 0 NMSP Enqueue Failed................... 0 NMSP Transmitted Packets.............. 22950 NMSP Transmit Packets Dropped......... 0 NMSP Largest Packet................... 1377 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 661 Displaying wIPS Information: Examples Lightweight Access Point Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 662 3 8 C H A P T E R Configuring Authentication for Access Points · Finding Feature Information, on page 663 · Prerequisites for Configuring Authentication for Access Points, on page 663 · Restrictions for Configuring Authentication for Access Points, on page 664 · Information about Configuring Authentication for Access Points, on page 664 · How to Configure Authentication for Access Points, on page 664 · Configuration Examples for Configuring Authentication for Access Points, on page 672 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring Authentication for Access Points · You can set a global username, password, and enable password for all access points that are currently joined to the switch and any that join in the future inherit as they join the switch. If desired, you can override the global credentials and assign a unique username, password, and enable password for a specific access point. · After an access point joins the switch, the access point enables console port security, and you are prompted for your username and password whenever you log into the access point's console port. When you log in, you are in nonprivileged mode, and you must enter the enable password in order to use the privileged mode. · The global credentials that you configure on the switch are retained across switch and access point reboots. They are overwritten only if the access point joins a new switch that is configured with a global username and password. If the new switch is not configured with global credentials, the access point retains the global username and password configured for the first switch. · You must track the credentials used by the access points. Otherwise, you might not be able to log into an access point's console port. If you need to return the access points to the default Cisco/Cisco username Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 663 Restrictions for Configuring Authentication for Access Points Lightweight Access Point and password, you must clear the switch's configuration and the access point's configuration to return them to factory-default settings. To reset the default access point configuration, enter the ap name Cisco_AP mgmtuser username Cisco password Cisco command. Entering the command does not clear the static IP address of the access point. Once the access point rejoins a switch, it adopts the default Cisco/Cisco username and password. · You can configure global authentication settings for all access points that are currently joined to the switch and any that join in the future. If desired, you can override the global authentication settings and assign unique authentication settings for a specific access point. · This feature is supported on the following hardware: · All Cisco switches that support authentication. · Cisco Aironet 1140, 1260, 1310, 1520, 1600, 2600, 3500, and 3600 access points Restrictions for Configuring Authentication for Access Points · The switch name in the AP configuration is case sensitive. Therefore, make sure to configure the exact system name on the AP configuration. Failure to do this results in the AP fallback not working. Information about Configuring Authentication for Access Points Cisco IOS access points are shipped from the factory with Cisco as the default enable password. This password allows users to log into the nonprivileged mode and enter the show and debug commands that pose a security threat to your network. You must change the default enable password to prevent unauthorized access and to enable users to enter configuration commands from the access point's console port. You can configure 802.1X authentication between a lightweight access point and a Cisco switch. The access point acts as an 802.1X supplicant and is authenticated by the switch where it uses EAP-FAST with anonymous PAC provisioning. How to Configure Authentication for Access Points Configuring Global Credentials for Access Points (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ap mgmtuser username user_name password 0 passsword secret 0 secret_value 4. end 5. ap name Cisco_AP mgmtuser username user_name password password secret secret 6. show ap summary 7. show ap name Cisco_AP config general Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 664 Lightweight Access Point Configuring Global Credentials for Access Points (CLI) DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 3 ap mgmtuser username user_name password 0 passsword secret 0 secret_value Example: Switch(config)# ap mgmtuser apusr1 password appass 0 secret 0 appass1 Configures the global username and password and enables the password for all access points that are currently joined to the switch and any access points that join the switch in the future. In the command, the parameter 0 specifies that an unencrypted password will follow and 8 specifies that an AES encrypted password will follow. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Step 5 ap name Cisco_AP mgmtuser username user_name Overrides the global credentials for a specific access point password password secret secret and assigns a unique username and password and enables Example: password to this access point. Switch(config)# ap name TSIM_AP-2 mgmtuser apusr1 password appass secret secret The credentials that you enter in this command are retained across switch and access point reboots and if the access point joins a new switch. Note If you want to force this access point to use the switch's global credentials, enter the ap name Cisco_AP no mgmtuser command. The following message appears after you execute this command: "AP reverted to global username configuration." Step 6 show ap summary Example: Displays a summary of all connected Cisco APs. Step 7 Switch# show ap summary show ap name Cisco_AP config general Example: Switch# show ap name AP02 config general Displays the global credentials configuration for a specific access point. Note If this access point is configured for global credentials, the AP User Mode text boxes shows "Automatic." If the global credentials have been overwritten for this access point, the AP User Mode text box shows "Customized." Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 665 Configuring Global Credentials for Access Points (GUI) Lightweight Access Point Configuring Global Credentials for Access Points (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points > Global AP Configuration. The Global Configuration page is displayed. In the Login Credentials area, enter the following parameters: · User Name · Password · Confirm Password · Secret Password · Confirm Secret Password The password should contain characters from at least three of the following classes: lowercase letters, uppercase letters, digits, and special characters. No character in the password can be repeated more than three times consecutively. The password should not contain the management username or the reverse of the username. The password should not contain words like Cisco, oscic, admin, nimda or any variant obtained by changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for s. Click Apply. The global username and password are applied to all the access points that are associated with the switches Click Save Configuration. (Optional) You can override the global credentials for a specific access point and assign a unique username and password by following these steps: a) Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed. b) Click the name of an access point. The AP > Edit page is displayed. c) Click the Credentials tab. d) In the Login Credentials area, select the Over-ride Global Credentials check box. e) Enter the values for the following parameters: · Username · Password · Enable Password f) Click Apply. g) Click Save Configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 666 Lightweight Access Point Configuring Authentication for Access Points (CLI) Configuring Authentication for Access Points (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ap dot1x username user_name_value password 0 password_value 4. end 5. ap name Cisco_AP dot1x-user username username_value password password_value 6. configure terminal 7. no ap dot1x username user_name_value password 0 password_value 8. end 9. show ap summary 10. show ap name Cisco_AP config general DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 3 ap dot1x username user_name_value password 0 Configures the global authentication username and password_value password for all access points that are currently joined to Example: the switch and any access points that join the switch in the future. This command contains the following keywords Switch(config)# ap dot1x username AP3 password 0 and arguments: password · username--Specifies an 802.1X username for all access points. · user-id--Username. · password--Specifies an 802.1X password for all access points. · 0--Specifies an unencrypted password. · 8--Specifies an AES encrypted password. · passwd--Password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 667 Configuring Authentication for Access Points (CLI) Lightweight Access Point Step 4 Step 5 Step 6 Step 7 Command or Action Purpose Note You must enter a strong password for the password parameter. Strong passwords are at least eight characters long, contain a combination of uppercase and lowercase letters, numbers, and symbols, and are not a word in any language. end Example: Switch(config)# end ap name Cisco_AP dot1x-user username username_value password password_value Example: Switch# ap name AP03 dot1x-user username apuser1 password appass Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Overrides the global authentication settings and assigns a unique username and password to a specific access point. This command contains the following keywords and arguments: · username--Specifies to add a username. · user-id--Username. · password--Specifies to add a password. · 0--Specifies an unencrypted password. · 8--Specifies an AES encrypted password. · passwd--Password. Note You must enter a strong password for the password parameter. See the note in Step 2 for the characteristics of strong passwords. The authentication settings that you enter in this command are retained across switch and access point reboots and whenever the access point joins a new switch. configure terminal Example: Switch# configure terminal Enters global configuration mode. no ap dot1x username user_name_value password Disables 802.1X authentication for all access points or for 0 password_value a specific access point. Example: Switch(config)# no ap dot1x username dot1xusr password 0 dot1xpass The following message appears after you execute this command: "AP reverted to global username configuration." Note You can disable 802.1X authentication for a specific access point only if global 802.1X authentication is not enabled. If global 802.1X authentication is enabled, you can disable 802.1X for all access points only. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 668 Lightweight Access Point Configuring Authentication for Access Points (GUI) Step 8 Step 9 Command or Action end Example: Switch(config)# end show ap summary Example: Switch# show ap summary Step 10 show ap name Cisco_AP config general Example: Switch# show ap name AP02 config general Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Displays the authentication settings for all access points that join the switch. Note If global authentication settings are not configured, the Global AP Dot1x User Name text box shows "Not Configured." Displays the authentication settings for a specific access point. Note If this access point is configured for global authentication, the AP Dot1x User Mode text boxes shows "Automatic." If the global authentication settings have been overwritten for this access point, the AP Dot1x User Mode text box shows "Customized." Related Topics Displaying the Authentication Settings for Access Points: Examples, on page 672 Configuring Authentication for Access Points (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Access Points > Global AP Configuration. The Global Configuration page is displayed. In the 802.1x Supplicant Credentials area, select the Credentials Required check box. Enter the username and password details. Note You must enter a strong password in these text boxes. Strong passwords have the following characteristics: · They are at least eight characters long · They contain a combination of uppercase and lowercase letters, numbers, and symbols · They are not a word in any language Click Apply. Click Save Configuration. (Optional) You can override the global configuration and assign a unique username and password to a specific access point by following these steps: a) Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 669 Configuring the Switch for Authentication (CLI) Lightweight Access Point Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Click the name of an access point. The AP > Edit is displayed. Click the Credentials tab. In the 802.1x Supplicant Credentials area, select the Over-ride Global Credentials check box. Enter the username and password details. Click Apply. Click Save Configuration. Configuring the Switch for Authentication (CLI) Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. enable 2. configure terminal 3. dot1x system-auth-control 4. aaa new-model 5. aaa authentication dot1x default group radius 6. radius-server host host_ip_adress acct-port port_number auth-port port_number key 0 unencryptied_server_key 7. interface TenGigabitEthernet1/0/1 8. switch mode access 9. dot1x pae authenticator 10. end DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 configure terminal Example: Switch# configure terminal Step 3 dot1x system-auth-control Example: Switch(config)# dot1x system-auth-control Purpose Enters privileged EXEC mode. Enters global configuration mode. Enables system authentication control. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 670 Lightweight Access Point Configuring the Switch for Authentication (CLI) Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action aaa new-model Example: Switch(config)# aaa new-model aaa authentication dot1x default group radius Example: Switch(config)# aaa authentication dot1x default group radius radius-server host host_ip_adress acct-port port_number auth-port port_number key 0 unencryptied_server_key Example: Switch(config)# radius-server host 10.1.1.1 acct-port 1813 auth-port 6225 key 0 encryptkey interface TenGigabitEthernet1/0/1 Example: Switch(config)# interface TenGigabitEthernet1/0/1 switch mode access Example: Switch(config-if)# switch mode access dot1x pae authenticator Example: Switch(config-if)# dot1x pae authenticator end Example: Switch(config)# end Purpose Enables new access control commands and functions. Sets the default authentications lists for IEEE 802.1X by using all the radius hosts in a server group. Sets a clear text encryption key for the RADIUS authentication server. Sets the 10-Gigbit Ethernet interface. The command prompt changes from Controller(config)# to Controller(config-if)#. Sets the unconditional truncking mode access to the interface. Sets the 802.1X interface PAE type as the authenticator. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Displaying the Authentication Settings for Access Points: Examples, on page 672 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 671 Configuration Examples for Configuring Authentication for Access Points Lightweight Access Point Configuration Examples for Configuring Authentication for Access Points Displaying the Authentication Settings for Access Points: Examples This example shows how to display the authentication settings for all access points that join the switch: Switch# show ap summary Number of APs.................................... 1 Global AP User Name.............................. globalap Global AP Dot1x User Name........................ globalDot1x This example shows how to display the authentication settings for a specific access point: Switch# show ap name AP02 config dot11 24ghz general Cisco AP Identifier.............................. 0 Cisco AP Name.................................... TSIM_AP2 ... AP Dot1x User Mode............................... AUTOMATIC AP Dot1x User Name............................... globalDot1x Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 672 3 9 C H A P T E R Converting Autonomous Access Points to Lightweight Mode · Finding Feature Information, on page 673 · Prerequisites for Converting Autonomous Access Points to Lightweight Mode, on page 673 · Information About Autonomous Access Points Converted to Lightweight Mode, on page 674 · How to Convert a Lightweight Access Point Back to an Autonomous Access Point, on page 676 · Authorizing Access Points (CLI), on page 677 · Authorizing Access Points (GUI), on page 678 · Disabling the Reset Button on Converted Access Points (CLI), on page 679 · Monitoring the AP Crash Log Information, on page 680 · How to Configure a Static IP Address on an Access Point, on page 680 · Recovering the Access Point Using the TFTP Recovery Procedure, on page 683 · Configuration Examples for Converting Autonomous Access Points to Lightweight Mode, on page 683 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Converting Autonomous Access Points to Lightweight Mode · Access points that are converted to lightweight mode do not support Wireless Domain Services (WDS). Converted access points communicate only with Cisco wireless LAN switchs and cannot communicate with WDS devices. However, the switch provides functionality that is equivalent to WDS when the access point associates to it. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 673 Information About Autonomous Access Points Converted to Lightweight Mode Lightweight Access Point · All Cisco lightweight access points support 16 Basic Service Set Identifiers (BSSIDs) per radio and a total of 16 wireless LANs per access point. When a converted access point associates to a switch, only wireless LANs with IDs 1 through 16 are pushed to the access point unless the access point is a member of an access point group. · Access points that are converted to lightweight mode must get an IP address and discover the switch using DHCP, DNS, or IP subnet broadcast. Information About Autonomous Access Points Converted to Lightweight Mode You can convert autonomous Cisco Aironet access points to lightweight mode. When you upgrade the access points to lightweight mode, the access point communicates with the switch and receives a configuration and software image from the switch. See the Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode document for instructions to upgrade an autonomous access point to lightweight mode: http://www.cisco.com/en/US/docs/wireless/access_point/conversion/lwapp/upgrade/guide/lwapnote.html Reverting from Lightweight Mode to Autonomous Mode After you convert an autonomous access point to lightweight mode, you can convert the access point from a lightweight unit back to an autonomous unit by loading a Cisco IOS release that supports autonomous mode (Cisco IOS Release 12.3(7)JA or earlier releases). If the access point is associated with a switch, you can use the switch to load the Cisco IOS release. If the access point is not associated to a switch, you can load the Cisco IOS release using TFTP. In either method, the access point must be able to access a TFTP server that contains the Cisco IOS release to be loaded. Using DHCP Option 43 and DHCP Option 60 Cisco Aironet access points use the type-length-value (TLV) format for DHCP option 43. You must program the DHCP servers to return the option based on the access point's DHCP Vendor Class Identifier (VCI) string (DHCP option 60). For more information about DHCP VCI strings of access points, see http://www.cisco.com/en/US/tech/tk722/ tk809/technologies_configuration_example09186a00808714fe.shtml. See the product documentation for your DHCP server for instructions on configuring DHCP option 43. The Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode document contains example steps for configuring option 43 on a DHCP server. If the access point is ordered with the Service Provider Option - AIR-OPT60-DHCP selected, the VCI string for that access point will be different than those strings listed in the previous table. The VCI string has the following suffix: ServiceProvider. For example, a 1260 with this option returns this VCI string: Cisco AP c1260-ServiceProvider. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 674 Lightweight Access Point How Converted Access Points Send Crash Information to the Switch Note The switch IP address that you obtain from the DHCP server should be a unicast IP address. Do not configure the switch IP address as a multicast address when configuring DHCP option 43. How Converted Access Points Send Crash Information to the Switch When a converted access point unexpectedly reboots, the access point stores a crash file on its local flash memory at the time of the crash. After the unit reboots, it sends the reason for the reboot to the switch. If the unit rebooted because of a crash, the switch pulls up the crash file using existing CAPWAP messages and stores it in the switch flash memory. The crash information copy is removed from the access point flash memory when the switch pulls it from the access point. Uploading Memory Core Dumps from Converted Access Points By default, access points converted to lightweight mode do not send memory core dumps to the switch. This section provides instructions to upload access point core dumps using the switch GUI or CLI. Displaying MAC Addresses for Converted Access Points There are some differences in the way that controllers display the MAC addresses of converted access points on information pages in the controller GUI: · On the AP Summary page, the controller lists the Ethernet MAC addresses of converted access points. · On the AP Detail page, the controller lists the BSS MAC addresses and Ethernet MAC addresses of converted access points. · On the Radio Summary page, the switch lists converted access points by the radio MAC address. Configuring a Static IP Address for a Lightweight Access Point If you want to specify an IP address for an access point rather than having one assigned automatically by a DHCP server, you can use the controller GUI or CLI to configure a static IP address for the access point. Static IP addresses are generally used only for deployments with a limited number of users. An access point cannot discover the switch using domain name system (DNS) resolution if a static IP address is configured for the access point, unless you specify a DNS server and the domain to which the access point belongs. You can configure these parameters using either the switch CLI or the GUI. Note If you configure an access point to use a static IP address that is not on the same subnet on which the access point's previous DHCP address was, the access point falls back to a DHCP address after the access point reboots. If the access point falls back to a DHCP address, enter the show ap config general Cisco_AP CLI command to show that the access point is using a fallback IP address. However, the GUI shows both the static IP address and the DHCP address, but it does not identify the DHCP address as a fallback address. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 675 How to Convert a Lightweight Access Point Back to an Autonomous Access Point Lightweight Access Point How to Convert a Lightweight Access Point Back to an Autonomous Access Point Converting a Lightweight Access Point Back to an Autonomous Access Point (CLI) SUMMARY STEPS 1. enable 2. ap name Cisco_AP tftp-downgrade tftp_server_ip_address tftp_server_image_filename DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 ap name Cisco_AP tftp-downgrade tftp_server_ip_address tftp_server_image_filename Example: Switch# ap name AP02 tftp-downgrade 10.0.0.1 tsrvname Purpose Enters privileged EXEC mode. Converts the lightweight access point back to autonomous mode. Note After entering this command, you must wait until the access point reboots and then reconfigure the access point using the CLI or GUI. Converting a Lightweight Access Point Back to an Autonomous Access Point (Using the Mode Button and a TFTP Server) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Configure the PC on which your TFTP server software runs with a static IP address in the range of 10.0.0.2 to 10.0.0.30. Make sure that the PC contains the access point image file (such as c1140-k9w7-tar.123-7.JA.tar for a 1140 series access point) in the TFTP server folder and that the TFTP server is activated. Rename the access point image file in the TFTP server folder to c1140-k9w7-tar.default for a 1140 series access point. Connect the PC to the access point using a Category 5 (CAT5) Ethernet cable. Disconnect power from the access point. Press and hold the MODE button while you reconnect power to the access point. Note The MODE button on the access point must be enabled. Hold the MODE button until the status LED turns red (approximately 20 to 30 seconds), and release the MODE button. Wait until the access point reboots as indicated by all LEDs turning green followed by the Status LED blinking green. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 676 Lightweight Access Point Authorizing Access Points (CLI) Step 9 After the access point reboots, reconfigure the access point using the GUI or the CLI. Authorizing Access Points (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ap auth-list ap-policy authorize-ap 4. username user_name mac aaa attribute list list_name 5. aaa new-model 6. aaa authorization credential-download auth_list local 7. aaa attribute list list 8. aaa session-id common 9. aaa local authentication default authorization default 10. show ap name Cisco_AP config general DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 configure terminal Example: Switch# configure terminal Step 3 ap auth-list ap-policy authorize-ap Example: Switch(config)# ap auth-list ap-policy authorize-ap Step 4 username user_name mac aaa attribute list list_name Example: Switch(config)# username aaa.bbb.ccc mac aaa attribute list attrlist Step 5 aaa new-model Example: Switch(config)# aaa new-model Purpose Enters privileged EXEC mode. Enters global configuration mode. Configures an access point authorization policy. Configures the MAC address of an access point locally. Enables new access control commands and functions. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 677 Authorizing Access Points (GUI) Lightweight Access Point Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action aaa authorization credential-download auth_list local Example: Switch(config)# aaa authorization credential-download auth_download local Purpose Downloads EAP credentials from the local server. aaa attribute list list Example: Switch(config)# aaa attribute list alist Configures AAA attribute list definitions. aaa session-id common Example: Switch(config)# aaa session-id common Configures the AAA common session ID. aaa local authentication default authorization default Configures the local authentication method list. Example: Switch(config)# aaa local authentication default authorization default show ap name Cisco_AP config general Example: Displays the configuration information that corresponds to a specific access point. Switch(config)# show ap name AP01 config general Authorizing Access Points (GUI) Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > AAA > AP Policy. The AP Policy page is displayed. In the Policy Configuration area, enable or disable the following parameters: · Authorize LSC APs against Auth-List · AP with Self-Signed Certificate · Authorize MIC APs against AAA · AP with Manufacturing Installed Certificate Click Apply. Click Save Configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 678 Lightweight Access Point Disabling the Reset Button on Converted Access Points (CLI) Disabling the Reset Button on Converted Access Points (CLI) You can enable or disable the Reset button on access points that are converted to lightweight mode. The Reset button is labeled MODE on the outside of the access point. Note The procedure to perform this task using the controller GUI is not currently available. SUMMARY STEPS 1. enable 2. configure terminal 3. no ap reset-button 4. end 5. ap name Cisco_AP reset-button DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 configure terminal Example: Switch# configure terminal Step 3 no ap reset-button Example: Switch(config)# no ap reset-button Step 4 Step 5 end Example: Switch(config)# end ap name Cisco_AP reset-button Example: Switch# ap name AP02 reset-button Purpose Enters privileged EXEC mode. Enters global configuration mode. Disables the Reset buttons on all converted access points that are associated to the switch. Note To enable the Reset buttons on all converted access points that are associated to the switch, enter the ap reset-button command. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enables the Reset button on the converted access point that you specify. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 679 Monitoring the AP Crash Log Information Lightweight Access Point Monitoring the AP Crash Log Information Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. enable 2. show ap crash-file DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 show ap crash-file Example: Switch# show ap crash-file Purpose Enters privileged EXEC mode. Verifies whether the crash file is downloaded to the switch. How to Configure a Static IP Address on an Access Point Configuring a Static IP Address on an Access Point (CLI) SUMMARY STEPS 1. enable 2. ap name Cisco_AP static-ip ip-address static_ap_address netmask static_ip_netmask gateway static_ip_gateway 3. enable 4. configure terminal 5. ap static-ip name-server nameserver_ip_address 6. ap static-ip domain static_ip_domain 7. end 8. show ap name Cisco_AP config general Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 680 Lightweight Access Point Configuring a Static IP Address on an Access Point (CLI) DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Purpose Enters privileged EXEC mode. Step 2 ap name Cisco_AP static-ip ip-address Configures a static IP address on the access point. This static_ap_address netmask static_ip_netmask gateway command contains the following keywords and arguments: static_ip_gateway · ip-address-- Specifies the Cisco access point static Example: IP address. Switch# ap name AP03 static-ip ip-address 9.9.9.16 netmask 255.255.0.0 gateway 9.9.9.2 · ip-address-- Cisco access point static IP address. · netmask--Specifies the Cisco access point static IP netmask. · netmask-- Cisco access point static IP netmask. · gateway--Specifies the Cisco access point gateway. · gateway-- IP address of the Cisco access point gateway. Step 3 Step 4 Step 5 enable Example: Switch# enable configure terminal Example: Switch# configure terminal ap static-ip name-server nameserver_ip_address Example: Switch(config)# ap static-ip name-server 10.10.10.205 The access point reboots and rejoins the switch, and the static IP address that you specify is pushed to the access point. After the static IP address has been sent to the access point, you can configure the DNS server IP address and domain name. You must perform Steps 3 and 4 after the access points reboot. Enters privileged EXEC mode. Enters global configuration mode. Configures a DNS server so that a specific access point or all access points can discover the switch using DNS resolution. Note To undo the DNS server configuration, enter the no ap static-ip name-server nameserver_ip_address command. Step 6 ap static-ip domain static_ip_domain Example: Configures the domain to which a specific access point or all access points belong. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 681 Configuring a Static IP Address on an Access Point (GUI) Lightweight Access Point Command or Action Switch(config)# ap static-ip domain domain1 Step 7 Step 8 end Example: Switch(config)# end show ap name Cisco_AP config general Example: Switch# show ap name AP03 config general Purpose Note To undo the domain name configuration, enter the no ap static-ip domain static_ip_domain command. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Displays the IP address configuration for the access point. Configuring a Static IP Address on an Access Point (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed. Click the name of the access point. The AP > Edit page is displayed. In the General tab, in the IP Config area, select the Static IP check box if you want to assign a static IP address to the access point. Enter the following details: · Static IP · Netmask · Gateway Click Apply. The access point reboots and rejoins the switch, and the static IP address that you specified is sent to the access point. After the static IP address has been sent to the access point, configure the DNS IP Address and Domain Name. Click Apply. Click Save Configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 682 Lightweight Access Point Recovering the Access Point Using the TFTP Recovery Procedure Recovering the Access Point Using the TFTP Recovery Procedure Step 1 Step 2 Step 3 Download the required recovery image from Cisco.com (ap3g2-k9w8-tar.152-2.JA.tar) and install it in the root directory of your TFTP server. Connect the TFTP server to the same subnet as the target access point and power-cycle the access point. The access point boots from the TFTP image and then joins the switch to download the oversized access point image and complete the upgrade procedure. After the access point has been recovered, you can remove the TFTP server. Configuration Examples for Converting Autonomous Access Points to Lightweight Mode Displaying the IP Address Configuration for Access Points: Example This example shows how to display the IP address configuration for the access point: Switch# show ap name AP03 dot11 24ghz config general Cisco AP Identifier.............. 4 Cisco AP Name............................. AP6 IP Address Configuration.................. Static IP assigned IP Address................................ 10.10.10.118 IP NetMask................................ 255.255.255.0 Gateway IP Addr........................... 10.10.10.1 Domain.................................... Domain1 Name Server............................... 10.10.10.205 ... Displaying Access Point Crash File Information: Example This example shows how to display access point crash file information. Using this command, you can verify whether the file is downloaded to the switch: Switch# show ap crash-file Local Core Files: lrad_AP1130.rdump0 (156) The number in parentheses indicates the size of the file. The size should be greater than zero if a core dump file is available. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 683 Displaying Access Point Crash File Information: Example Lightweight Access Point Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 684 4 0 C H A P T E R Using Cisco Workgroup Bridges · Finding Feature Information, on page 685 · Information About Cisco Workgroup Bridges and non-Cisco Workgroup bridges, on page 685 · Monitoring the Status of Workgroup Bridges, on page 686 · Debugging WGB Issues (CLI), on page 686 · Configuration Examples for Configuring Workgroup Bridges, on page 688 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Cisco Workgroup Bridges and non-Cisco Workgroup bridges A WGB is a mode that can be configured on an autonomous Cisco IOS access point to provide wireless connectivity to a lightweight access point on behalf of clients that are connected by Ethernet to the WGB access point. A WGB connects a wired network over a single wireless segment by learning the MAC addresses of its wired clients on the Ethernet interface and reporting them to the lightweight access point using Internet Access Point Protocol (IAPP) messaging. The WGB provides wireless access connectivity to wired clients by establishing a single wireless connection to the lightweight access point. When a Cisco WGB is used, the WGB informs the access points of all the clients that it is associated with. The switch is aware of the clients that are associated with the access point. When non-Cisco WGBs are used, the switch has no information about the IP address of the clients on the wired segment behind the WGB. Without this information, the switch drops the following types of messages: · ARP REQ from the distribution system for the WGB client. · ARP RPLY from the WGB client. · DHCP REQ from the WGB client. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 685 Monitoring the Status of Workgroup Bridges Lightweight Access Point · DHCP RPLY for the WGB client. Monitoring the Status of Workgroup Bridges Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. enable 2. show wireless wgb summary 3. show wireless wgb mac-address wgb_mac_address detail DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Purpose Enters privileged EXEC mode. Step 2 show wireless wgb summary Example: Switch# show wireless wgb summary Displays the WGBs on your network. Step 3 show wireless wgb mac-address wgb_mac_address detail Example: Switch# show wireless wgb mac-address 00:0d:ed:dd:25:82 detail Displays the details of any wired clients that are connected to a particular WGB. Debugging WGB Issues (CLI) Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. enable 2. debug iapp all 3. debug iapp error 4. debug iapp packet Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 686 Lightweight Access Point Debugging WGB Issues (CLI) 5. debug mobility handoff [switch switch_number] 6. debug dhcp 7. debug dot11 mobile 8. debug dot11 state DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 debug iapp all Example: Purpose Enters privileged EXEC mode. Enables debugging for IAPP messages. Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Switch# debug iapp all debug iapp error Example: Switch# debug iapp error debug iapp packet Example: Switch# debug iapp packet debug mobility handoff [switch switch_number] Example: Switch# debug mobility handoff debug dhcp Example: Switch# debug dhcp debug dot11 mobile Example: Switch# debug dot11 mobile debug dot11 state Example: Switch# debug dot11 state Enables debugging for IAPP error events. Enables debugging for IAPP packets. Enables debugging for any roaming issues. Debug an IP assignment issue when DHCP is used. Enables dot11/mobile debugging. Debug an IP assignment issue when static IP is used. Enables dot11/state debugging. Debug an IP assignment issue when static IP is used. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 687 Configuration Examples for Configuring Workgroup Bridges Lightweight Access Point Configuration Examples for Configuring Workgroup Bridges WGB Configuration: Example This example shows how to configure a WGB access point using static WEP with a 40-bit WEP key: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# dot11 ssid WGB_with_static_WEP Switch(config-ssid)# authentication open Switch(config-ssid)# guest-mode Switch(config-ssid)# exit Switch(config)# interface dot11Radio 0 Switch(config)# station-role workgroup-bridge Switch(config-if)# encry mode wep 40 Switch(config-if)# encry key 1 size 40 0 1234567890 Switch(config-if)# ssid WGB_with_static_WEP Switch(config-if)# end Verify that the WGB is associated to an access point by entering this command on the WGB: show dot11 association Information similar to the following appears: Switch# show dot11 associations 802.11 Client Stations on Dot11Radio0: SSID [FCVTESTING] : MAC Address IP address Device 000b.8581.6aee 10.11.12.1 WGB-client ap# Name map1 Parent - State Assoc Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 688 4 1 C H A P T E R Configuring Probe Request Forwarding · Finding Feature Information, on page 689 · Information About Configuring Probe Request Forwarding, on page 689 · How to Configure Probe Request Forwarding (CLI), on page 689 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring Probe Request Forwarding Probe requests are 802.11 management frames that are sent by clients to request information about the capabilities of Service Set Identifiers (SSIDs). By default, access points forward acknowledged probe requests to the switch for processing. Acknowledged probe requests are probe requests for SSIDs that are supported by the access point. If desired, you can configure access points to forward both acknowledged and unacknowledged probe requests to the switch. The switch can use the information from unacknowledged probe requests to improve the location accuracy. How to Configure Probe Request Forwarding (CLI) Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. configure terminal 2. wireless probe filter 3. wireless probe filter num_probes interval Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 689 How to Configure Probe Request Forwarding (CLI) Lightweight Access Point 4. end 5. show wireless probe DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wireless probe filter Example: Switch(config)# wireless probe filter Step 3 wireless probe filter num_probes interval Example: Switch(config)# wireless probe filter 5 5 Step 4 Step 5 end Example: Switch(config)# end show wireless probe Example: Switch# show wireless probe Purpose Enters global configuration mode. Enables or disables the filtering of probe requests forwarded from an access point to the switch. Note If you enable probe filtering, the default filter setting, the access point forwards only acknowledged probe requests to the switch. If you disable probe filtering, the access point forwards both acknowledged and unacknowledged probe requests to the switch. Limits the number of probe requests sent to the switch per client per access point radio in a given interval. You must specify the following arguments with this command: · num_probes--Number of probe requests forwarded to the switch per client per access point radio in a given interval. The range is from 1 to 100. · interval--Probe limit interval in milliseconds. The range is from 100 to 10000. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Displays the advanced probe request configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 690 4 2 C H A P T E R Optimizing RFID Tracking · Finding Feature Information, on page 691 · Optimizing RFID Tracking on Access Points, on page 691 · How to Optimize RFID Tracking on Access Points, on page 691 · Configuration Examples for Optimizing RFID Tracking, on page 693 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Optimizing RFID Tracking on Access Points To optimize the monitoring and location calculation of RFID tags, you can enable tracking optimization on up to four channels within the 2.4-GHz band of an 802.11b/g access point radio. This feature allows you to scan only the channels on which tags are usually programmed to operate (such as channels 1, 6, and 11). How to Optimize RFID Tracking on Access Points Optimizing RFID Tracking on Access Points (CLI) SUMMARY STEPS 1. ap name Cisco_AP mode monitor submode none 2. ap name Cisco_AP dot11 24ghz shutdown 3. ap name Cisco_AP monitor-mode tracking-opt 4. ap name Cisco_AP monitor-mode dot11b {fast-channel [first_channel second_channel third_channel fourth_channel]} Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 691 Optimizing RFID Tracking on Access Points (CLI) Lightweight Access Point 5. ap name Cisco_AP no dot11 24ghz shutdown 6. show ap monitor-mode summary DETAILED STEPS Step 1 Command or Action Purpose ap name Cisco_AP mode monitor submode none Specifies the monitor submode for the access point as none. Example: Switch# ap name 3602a mode monitor submode none Note A warning message indicates that changing the access point's mode will cause the access point to reboot and prompts you to specify whether you want to continue by entering Y. Step 2 Step 3 ap name Cisco_AP dot11 24ghz shutdown Example: Switch# ap name AP01 dot11 24ghz shutdown ap name Cisco_AP monitor-mode tracking-opt Example: Switch# ap name TSIM_AP1 monitor-mode tracking-opt After you enter Y, the access point reboots. Disables the access point radio. Configures the access point to scan only the Dynamic Channel Assignment (DCA) channels supported by its country of operation. Note To disable tracking optimization for an access point, enter the ap name Cisco_AP monitor-mode tracking-opt no-optimization command. Step 4 ap name Cisco_AP monitor-mode dot11b {fast-channel [first_channel second_channel third_channel fourth_channel]} Example: Switch# ap name AP01 monitor-mode dot11b fast-channel 1 2 3 4 Chooses up to four specific 802.11b channels to be scanned by the access point. Note In the United States, you can assign any value from 1 to 11 (inclusive) to the channel variable. Other countries support additional channels. You must assign at least one channel. Step 5 Step 6 ap name Cisco_AP no dot11 24ghz shutdown Example: Switch# ap name AP01 no dot11 24ghz shutdown show ap monitor-mode summary Example: Switch# show ap monitor-mode summary Enables the access point radio. Displays all the access points in monitor mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 692 Lightweight Access Point Configuration Examples for Optimizing RFID Tracking Configuration Examples for Optimizing RFID Tracking Displaying all the Access Points in Monitor Mode: Example This example shows how to display all the access points in monitor mode: Switch# show ap monitor-mode summary AP Name Ethernet MAC Status Scanning Channel List ------------- -------------- -------- --------- AP1131:4f2.9a 00:16:4:f2:9:a Tracking 1,6,NA,NA Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 693 Displaying all the Access Points in Monitor Mode: Example Lightweight Access Point Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 694 4 3 C H A P T E R Configuring Country Codes · Finding Feature Information, on page 695 · Prerequisites for Configuring Country Codes, on page 695 · Information About Configuring Country Codes, on page 696 · How to Configure Country Codes (CLI), on page 696 · Configuration Examples for Configuring Country Codes, on page 699 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring Country Codes · Generally, you configure one country code per switch; you configure one code that matches the physical location of the switch and its access points. You can configure up to 20 country codes per switch. This multiple-country support enables you to manage access points in various countries from a single switch. · When the multiple-country feature is used, all switchs that are going to join the same RF group must be configured with the same set of countries, configured in the same order. · Access points are capable of using all the available legal frequencies. However, access points are assigned to the frequencies that are supported in their relevant domains. · The country list configured on the RF group leader determines which channels the members would operate on. This list is independent of which countries have been configured on the RF group members. · For switchs in the Japan regulatory domain, you must have had one or more Japan country codes (JP, J2, or J3) configured on your switch at the time you last booted your switch. · For switchs in the Japan regulatory domain, you must have at least one access point with a -J regulatory domain joined to your switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 695 Information About Configuring Country Codes Lightweight Access Point Information About Configuring Country Codes Controllers and access points are designed for use in many countries with varying regulatory requirements. The radios within the access points are assigned to a specific regulatory domain at the factory (such as -E for Europe), but the country code enables you to specify a particular country of operation (such as FR for France or ES for Spain). Configuring a country code ensures that each radio's broadcast frequency bands, interfaces, channels, and transmit power levels are compliant with country-specific regulations. Information About Japanese Country Codes Country codes define the channels that can be used legally in each country. These country codes are available for Japan: · JP--Allows only -J radios to join the controller · J2--Allows only -P radios to join the controller · J3--Uses the -U frequencies but allows -U, -P and -Q (other than 1550/1600/2600/3600) radios to join the controller · J4--Allows 2.4G JPQU and 5G PQU to join the controller. Note The 1550, 1600, 2600, and 3600 APs require J4. See the Channels and Maximum Power Settings for Cisco Aironet Lightweight Access Points document for the list of channels and power levels supported by access points in the Japanese regulatory domains. How to Configure Country Codes (CLI) Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. enable 2. show wireless country supported 3. configure terminal 4. ap dot11 24ghz shutdown 5. ap dot11 5ghz shutdown 6. ap country country_code 7. end 8. show wireless country channels 9. configure terminal 10. no ap dot11 5ghz shutdown Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 696 Lightweight Access Point How to Configure Country Codes (CLI) 11. no ap dot11 24ghz shutdown 12. end 13. ap name Cisco_AP shutdown 14. configure terminal 15. ap country country_code 16. end 17. ap name Cisco_AP no shutdown DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 show wireless country supported Example: Switch# show wireless country supported Step 3 configure terminal Example: Switch# configure terminal Step 4 ap dot11 24ghz shutdown Example: Switch(config)# ap dot11 5ghz shutdown Step 5 ap dot11 5ghz shutdown Example: Switch(config)# ap dot11 24ghz shutdown Step 6 ap country country_code Example: Switch(config)# ap country IN Step 7 Step 8 end Example: Switch(config)# end show wireless country channels Example: Switch# show wireless country channels Purpose Enters privileged EXEC mode. Displays a list of all available country codes. Enters global configuration mode. Disables the 802.11a network. Disables the 802.11b/g network. Assigns access points to a specific country. Note Make sure that the country code you choose is compatible with the regulatory domain of at least one of the access point's radios. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Displays the list of available channels for the country codes configured on your switch. Note Perform Steps 9 through 17 only if you have configured multiple country codes in Step 6. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 697 How to Configure Country Codes (CLI) Lightweight Access Point Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Command or Action configure terminal Example: Switch# configure terminal no ap dot11 5ghz shutdown Example: Switch(config)# no ap dot11 5ghz shutdown no ap dot11 24ghz shutdown Example: Switch(config)# no ap dot11 24ghz shutdown end Example: Switch(config)# end ap name Cisco_AP shutdown Example: Switch# ap name AP02 shutdown configure terminal Example: Switch# configure terminal ap country country_code Example: Switch# ap country IN Step 16 Step 17 end Example: Switch(config)# end ap name Cisco_AP no shutdown Example: Switch# ap name AP02 no shutdown Purpose Enters global configuration mode. Enables the 802.11a network. Enables the 802.11b/g network. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Disables the access point. Note Ensure that you disable only the access point for which you are configuring country codes. Enters global configuration mode. Assigns an access point to a specific country. Note Ensure that the country code that you choose is compatible with the regulatory domain of at least one of the access point's radios. Note If you enabled the networks and disabled some access points and then enter the ap country country_code command, the specified country code is configured on only the disabled access points. All other access points are ignored. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enables the access point. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 698 Lightweight Access Point Configuration Examples for Configuring Country Codes Configuration Examples for Configuring Country Codes Displaying Channel List for Country Codes: Example This example shows how to display the list of available channels for the country codes configured on your switch: Switch# show wireless country channels Configured Country........................: US - United States KEY: * = Channel is legal in this country and may be configured manually. A = Channel is the Auto-RF default in this country. . = Channel is not legal in this country. C = Channel has been configured for use by Auto-RF. x = Channel is available to be configured for use by Auto-RF. (-,-) = (indoor, outdoor) regulatory domain allowed by this country. -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+802.11bg : Channels : 1 1 1 1 1 :12345678901234 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+(-A ,-AB ) US : A * * * * A * * * * A . . . Auto-RF : . . . . . . . . . . . . . . -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+802.11a : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Channels : 3 3 3 4 4 4 4 4 5 5 6 6 0 0 0 1 1 2 2 2 3 3 4 4 5 5 6 6 :4680246826040482604826093715 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+(-A ,-AB ) US : . A . A . A . A A A A A * * * * * . . . * * * A A A A * Auto-RF : . . . . . . . . . . . . . . . . . . . . . . . . . . . . -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+4.9GHz 802.11a : Channels : 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 :12345678901234567890123456 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+US (-A ,-AB ): * * * * * * * * * * * * * * * * * * * A * * * * * A Auto-RF : . . . . . . . . . . . . . . . . . . . . . . . . . . -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 699 Displaying Channel List for Country Codes: Example Lightweight Access Point Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 700 4 4 C H A P T E R Configuring Link Latency · Finding Feature Information, on page 701 · Prerequisites for Configuring Link Latency, on page 701 · Restrictions for Configuring Link Latency, on page 701 · Information About Configuring Link Latency, on page 702 · How to Configure Link Latency, on page 703 · How to Configure TCP MSS, on page 706 · Performing a Link Test (CLI), on page 707 · Configuration Examples for Configuring Link Latency, on page 708 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring Link Latency · The switch displays the current round-trip time as well as a running minimum and maximum round-trip time. The minimum and maximum times continue to run as long as the switch is up or can be cleared and allowed to restart. · You can configure link latency for a specific access point using the switch GUI or CLI or for all access points joined to the switch using the CLI. Restrictions for Configuring Link Latency · Link latency calculates the Control and Provisioning of Wireless Access Points (CAPWAP) response time between the access point and the switch. It does not measure network latency or ping responses. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 701 Information About Configuring Link Latency Lightweight Access Point Information About Configuring Link Latency You can configure link latency on the switch to measure the link between an access point and the switch. You can use this feature with all access points that are joined to the switch where the link can be a slow or unreliable WAN connection. TCP MSS If the client's maximum segment size (MSS) in a Transmission Control Protocol (TCP) three-way handshake is greater than the maximum transmission unit can handle, the client might experience reduced throughput and the fragmentation of packets. To avoid this problem, you can specify the MSS for all access points that are joined to the switch or for a specific access point. When you enable this feature, the access point selects the MSS for TCP packets to and from wireless clients in its data path. If the MSS of these packets is greater than the value that you configured or greater than the default value for the CAPWAP tunnel, the access point changes the MSS to the new configured value. Link Tests A link test is used to determine the quality of the radio link between two devices. Two types of link-test packets are transmitted during a link test: request and response. Any radio receiving a link-test request packet fills in the appropriate text boxes and echoes the packet back to the sender with the response type set. The radio link quality in the client-to-access point direction can differ from that in the access point-to-client direction due to the asymmetrical distribution of the transmit power and receive sensitivity on both sides. Two types of link tests can be performed: a ping test and a CCX link test. With the ping link test, the controller can test link quality only in the client-to-access point direction. The RF parameters of the ping reply packets received by the access point are polled by the controller to determine the client-to-access point link quality. With the CCX link test, the switch can also test the link quality in the access point-to-client direction. The switch issues link-test requests to the client, and the client records the RF parameters (received signal strength indicator [RSSI], signal-to-noise ratio [SNR], and so on) of the received request packet in the response packet. Both the link-test requestor and responder roles are implemented on the access point and switch. Not only can the access point or switch initiate a link test to a CCX v4 or v5 client, but a CCX v4 or v5 client can initiate a link test to the access point or switch. The switch shows the link-quality metrics for CCX link tests in both directions (out-- the access point to the client; in-- the client to the access point): · Signal strength in the form of RSSI (minimum, maximum, and average) · Signal quality in the form of SNR (minimum, maximum, and average) · Total number of packets that are retried · Maximum retry count for a single packet · Number of lost packets · Data rate of a successfully transmitted packet Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 702 Lightweight Access Point How to Configure Link Latency The controller shows this metric regardless of direction: · Link test request/reply round-trip time (minimum, maximum, and average) The controller software supports CCX versions 1 through 5. CCX support is enabled automatically for every WLAN on the controller and cannot be disabled. The controller stores the CCX version of the client in its client database and uses it to limit the features for this client. If a client does not support CCXv4 or v5, the controller performs a ping link test on the client. If a client supports CCXv4 or v5, the controller performs a CCX link test on the client. If a client times out during a CCX link test, the controller switches to the ping link test automatically. How to Configure Link Latency Configuring Link Latency (CLI) SUMMARY STEPS 1. enable 2. configure terminal 3. ap link-latency 4. ap tcp-adjust-mss size size 5. show ap name Cisco_AP config general 6. ap name Cisco_AP link-latency [reset] 7. show ap name Cisco_AP config general DETAILED STEPS Step 1 Command or Action enable Example: Switch# enable Step 2 configure terminal Example: Switch# configure terminal Step 3 ap link-latency Example: Switch(config)# ap link-latency Purpose Enters privileged EXEC mode. Enters global configuration mode. Enables link latency for all access points that are currently associated with the switch. Note To disable link latency for all the access points that are associated with the switch, use the no ap link-latency command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 703 Configuring Link Latency (CLI) Lightweight Access Point Command or Action Purpose Note These commands enable or disable link latency only for access points that are currently joined to the switch. You have to enable or disable link latency for the access points that join in the future. Note To enable or disable link latency for specific access points that are associated with the switch, enter the following commands in Priveleged EXEC mode: · ap name Cisco_AP link-latency--Enables link latency. · ap name Cisco_AP no link-latency--Disables link latency. Step 4 Step 5 Step 6 ap tcp-adjust-mss size size Example: Switch(config)# ap tcp-adjust-mss size 537 Configures TCP MSS adjust size for all access points. The range is from 536 to 1363. show ap name Cisco_AP config general Example: Switch(config)# show ap name AP02 config general Displays the general configuration details of the access point. These configuration details contain the link latency results that correspond to the access point that you specify in the command. The output of this command contains the following link latency results: · Current Delay--The current round-trip time (in milliseconds) of CAPWAP heartbeat packets from the access point to the switch and back. · Maximum Delay--Since the time that link latency has been enabled or reset, the maximum round-trip time (in milliseconds) of CAPWAP heartbeat packets from the access point to the switch and back. · Minimum Delay--Since the time that link latency has been enabled or reset, the minimum round-trip time (in milliseconds) of CAPWAP heartbeat packets from the access point to the switch and back. ap name Cisco_AP link-latency [reset] Example: Switch(config)# ap name AP02 link-latency reset Clears the current, minimum, and maximum link latency statistics on the switch for a specific access point. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 704 Lightweight Access Point Configuring Link Latency (GUI) Step 7 Command or Action Purpose show ap name Cisco_AP config general Displays the general configuration details of the access Example: point. Use this command to see the result of the reset operation. Switch(config)# show ap name AP02 config general Configuring Link Latency (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Wireless > Access Points > All APs. The All APs page appears with a list of access points. Click the name of the access point. The AP > Edit page appears. Click the Advanced tab. In the Link Latency area, select or unselect the Enable Link Latency check box. Note You can select the Enable Link Latency check box to enable link latency for this access point or unselect it to prevent the access point from sending the round-trip time to the switch after every echo response is received. The default state is unselected. Click Apply. When a message box appears that indicates that AP Parameters are modified successfully, click OK. When the All APs page is displayed, click the access point that you have modified earlier. The AP > Edit page appears. Click the Advanced tab. In the Link Latency area, the following link latency and data latency results are displayed: · Current(mSec)--The current round-trip time (in milliseconds) of CAPWAP heartbeat packets or data packets from the access point to the switch and back. · Minimum(mSec)--Since the time that link latency has been enabled or reset, the minimum round-trip time (in milliseconds) of CAPWAP heartbeat packets or data packets from the access point to the switch and back. · Maximum(mSec)--Since the time that link latency has been enabled or reset, the maximum round-trip time (in milliseconds) of CAPWAP heartbeat packets or data packets from the access point to the switch and back. Click Reset Link Latency to clear the current, minimum, and maximum link latency and data latency statistics on the switch for this access point. Note After the page refreshes and the All APs page is displayed again, click the Advanced tab. The updated statistics appear in the Minimum and Maximum text boxes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 705 How to Configure TCP MSS Lightweight Access Point How to Configure TCP MSS Configuring TCP MSS (CLI) SUMMARY STEPS 1. configure terminal 2. ap tcp-adjust-mss size size_value 3. reload 4. show ap tcp-adjust-mss DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap tcp-adjust-mss size size_value Example: Switch(config)# ap tcp-adjust-mss size 537 Step 3 Step 4 reload Example: Switch# reload show ap tcp-adjust-mss Example: Switch# show ap tcp-adjust-mss Purpose Enters global configuration mode. Enables the TCP MSS on the particular access point that you specify. Note To enable TCP MSS on all the access points that are associated with the switch, enter the ap tcp-adjust-mss size size_value command, where the size parameter is from 536 to 1363 bytes. The default value varies for different clients. Reboots the switch in order for your change to take effect. Displays the current TCP MSS setting for all the access points that are associated with the switch. Note To display the TCP MSS settings that correspond to a specific access point, enter the show ap name Cisco_AP tcp-adjust-mss command. Configuring TCP MSS (GUI) Step 1 Choose Configuration > Wireless > Access Points > Global AP Configuration. The Global Configuration page is displayed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 706 Lightweight Access Point Performing a Link Test (CLI) Step 2 Step 3 Step 4 In the TCP MSS area, select the Global TCP Adjust MSS check box and set the MSS for all access points that are associated with the switch. The valid range is from 536 to 1363 bytes. Click Apply. Click Save Configuration. Performing a Link Test (CLI) Note The procedure to perform this task using the switch GUI is not currently available. SUMMARY STEPS 1. test wireless linktest mac_address 2. configure terminal 3. wireless linktest frame-size frame_size 4. wireless linktest number-of-frames number_of_frames 5. end DETAILED STEPS Step 1 Command or Action test wireless linktest mac_address Example: Switch# test wireless linktest 00:0d:88:c5:8a:d1 Purpose Runs a link test. Step 2 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 3 wireless linktest frame-size frame_size Example: Switch(config)# wireless linktest frame-size 41 Configures the link test frame size for each packet. Step 4 wireless linktest number-of-frames number_of_frames Configures the number of frames to send for the link test. Example: Switch(config)# wireless linktest number-of-frames 50 Step 5 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 707 Configuration Examples for Configuring Link Latency Lightweight Access Point Configuration Examples for Configuring Link Latency Running a Link Test: Example This example shows how to run a link test: Switch# test wireless linktest 00:0d:88:c5:8a:d1 When CCX v4 or later releases is enabled on both the controller and the client being tested, information similar to the following appears: CCX Link Test to 00:0d:88:c5:8a:d1. Link Test Packets Sent...................................... 20 Link Test Packets Received.................................. 10 Link Test Packets Lost (Total/AP to Client/Client to AP).... 10/5/5 Link Test Packets round trip time (min/max/average)......... 5ms/20ms/15ms RSSI at AP (min/max/average)................................ -60dBm/-50dBm/-55dBm RSSI at Client (min/max/average)............................ -50dBm/-40dBm/-45dBm SNR at AP (min/max/average)................................. 40dB/30dB/35dB SNR at Client (min/max/average)............................. 40dB/30dB/35dB Transmit Retries at AP (Total/Maximum)...................... 5/3 Transmit Retries at Client (Total/Maximum).................. 4/2 Transmit rate: 1M 2M 5.5M 6M 9M 11M 12M 18M 24M 36M 48M 54M 108M Packet Count: 0 0 0 0 0 0 0 0 0 2 0 18 0 Transmit rate: 1M 2M 5.5M 6M 9M 11M 12M 18M 24M 36M 48M 54M 108M Packet Count: 0 0 0 0 0 0 0 0 0 2 0 8 0 When CCX v4 or later releases is not enabled on either the controller or the client being tested, fewer details appear: Ping Link Test to 00:0d:88:c5:8a:d1. Link Test Packets Sent.......................... 20 Link Test Packets Received...................... 20 Local Signal Strength........................... -49dBm Local Signal to Noise Ratio..................... 39dB Displaying Link Latency Information: Example This example shows how to display general configuration details of the access point. These configuration details contain the link latency results that correspond to the access point that you specify in the command. Switch# show ap name AP01 config general Cisco AP Name Cisco AP Identifier Country Code Regulatory Domain Allowed by Country AP Country Code AP Regulatory Domain Switch Port Number MAC Address IP Address Configuration IP Address IP Netmask Gateway IP Address Fallback IP Address Being Used Domain Name Server CAPWAP Path MTU Telnet State : AP01 : 55 : US - United States : 802.11bg:-A 802.11a:-A : US - United States : Unconfigured : Te1/0/1 : 0000.2000.03f0 : Static IP assigned : 9.9.9.16 : 255.255.0.0 : 9.9.9.2 : 9.9.9.16 : Cisco : 0.0.0.0 : 1485 : Enabled Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 708 Lightweight Access Point Displaying TCP MSS Settings: Example SSH State Cisco AP Location Cisco AP Group Name Primary Cisco Controller Name Primary Cisco Controller IP Address Secondary Cisco Controller Name Secondary Cisco Controller IP Address Tertiary Cisco Controller Name Tertiary Cisco Controller IP Address Administrative State Operation State AP Mode AP Submode Remote AP Debug Logging Trap Severity Level Software Version Boot Version Stats Reporting Period LED State PoE Pre-Standard Switch PoE Power Injector MAC Address Power Type/Mode Number of Slots AP Model AP Image IOS Version Reset Button AP Serial Number AP Certificate Type Management Frame Protection Validation AP User Mode AP User Name AP 802.1X User Mode AP 802.1X User Name Cisco AP System Logging Host AP Up Time econd AP CAPWAP Up Time Join Date and Time Join Taken Time seconds Join Priority Ethernet Port Duplex Ethernet Port Speed AP Link Latency Current Delay Maximum Delay Minimum Delay Last Updated (based on AP up time) Rogue Detection AP TCP MSS Adjust AP TCP MSS Size : Disabled : default-location : default-group : CAPWAP Controller : 9.9.9.2 : : Not Configured : : Not Configured : Enabled : Registered : Local : Not Configured : Disabled : informational : 7.4.0.5 : 7.4.0.5 : 180 : Enabled : Disabled : Disabled : Power Injector/Normal Mode :2 : 3502E : C3500-K9W8-M : : : SIM1140K002 : Manufacture Installed : Disabled : Customized : Not Configured : Not Configured : Not Configured : 255.255.255.255 : 16 days 3 hours 14 minutes 1 s : 33 minutes 15 seconds : 01/02/2013 22:41:47 : 16 days 2 hours 40 minutes 45 :1 : Auto : Auto : Enabled :0 :0 :0 : 0 seconds : Disabled : Disabled : 536 Displaying TCP MSS Settings: Example This example shows how to display the current TCP MSS setting for all the access points that are associated with the switch: Switch# show ap tcp-adjust-mss AP Name TCP State MSS Size ------------------------------------------------------ AP01 Disabled 6146 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 709 Displaying TCP MSS Settings: Example AP02 AP03 AP04 AP05 Disabled Disabled Disabled Disabled 536 6146 6146 6146 Lightweight Access Point Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 710 4 5 C H A P T E R Configuring Power over Ethernet · Finding Feature Information, on page 711 · Information About Configuring Power over Ethernet, on page 711 · How to Configure Power over Ethernet, on page 711 · Configuration Examples for Configuring Power over Ethernet, on page 714 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring Power over Ethernet When an access point that has been converted to lightweight mode (such as an AP1262) access point is powered by a power injector that is connected to a Cisco pre-Intelligent Power Management (pre-IPM) switch, you must configure Power over Ethernet (PoE), which is also known as inline power. How to Configure Power over Ethernet Configuring Power over Ethernet (CLI) SUMMARY STEPS 1. ap name Cisco_AP power injector installed 2. ap name Cisco_AP power injector override 3. ap name Cisco_AP power injector switch-mac-address switch_mac_address 4. show ap name Cisco_AP config general Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 711 Configuring Power over Ethernet (GUI) Lightweight Access Point DETAILED STEPS Step 1 Command or Action ap name Cisco_AP power injector installed Example: Switch# ap name AP02 power injector installed Step 2 ap name Cisco_AP power injector override Example: Switch# ap name AP02 power injector override Step 3 ap name Cisco_AP power injector switch-mac-address switch_mac_address Example: Switch# ap name AP02 power injector switch-mac-address 10a.2d.5c.3d Step 4 show ap name Cisco_AP config general Example: Switch# show ap name AP02 config general Purpose Enables the PoE power injector state. The access point remembers that a power injector is connected to this particular switch port. If you relocate the access point, you must reenter this command after the presence of a new power injector is verified. Note Enter this command if your network contains any older Cisco 6-W switches that could be accidentally overloaded if connected directly to a 12-W access point. Make sure that the Cisco Discovery Protocol (CDP) is enabled before entering this command. Otherwise, this command will fail. Removes the safety checks and allows the access point to be connected to any switch port. You can use this command if your network does not contain any older Cisco 6-W switches that could be overloaded if connected directly to a 12-W access point. The access point assumes that a power injector is always connected. If you relocate the access point, it continues to assume that a power injector is present. Sets the MAC address of the switch port that has a power injector. Note Enter this command if you know the MAC address of the connected switch port and do not want to automatically detect it using the installed option. Displays common information that includes the PoE settings for a specific access point. Note The Power Type/Mode text box shows "degraded mode" if the access point is not operating at full power. Configuring Power over Ethernet (GUI) Step 1 Step 2 Step 3 Choose Configuration > Wireless > Access Points > All APs. The All APs page appears with a list of access points that are associated with the switch. Click the name of the access point. The AP > Edit page appears. Click the Advanced tab. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 712 Lightweight Access Point Configuring Power over Ethernet (GUI) Step 4 Step 5 Step 6 Step 7 Step 8 In the Power Over Ethernet Settings area, select the Pre-Standard 802.3af Switches check box. Select this check box if the access point is being powered by a high-power 802.3af Cisco switch. This switch provides more than the traditional 6 Watts of power but does not support the intelligent power management (IPM) feature. Note Unselect the Pre-standard 802.3af Switches check box if power is being provided by a power injector. This is the default value. Select the Power Injector State check box. Select this check box if the attached switch does not support IPM and a power injector is being used. If the attached switch supports IPM, you do not need to select this check box. The Power Injector Selection drop-down list is displayed that contains parameters that enable you to protect your switch port from an accidental overload if the power injector is inadvertently bypassed. From the Power Injector Selection drop-down list, choose an option to specify the desired level of protection. You can choose any one of the following three options: · Installed--Examines and remembers the MAC address of the currently connected switch port and assumes that a power injector is connected. Choose this option if your network contains older Cisco 6-Watt switches and you want to avoid possible overloads by forcing a double-check of any relocated access points. If you want to configure the switch MAC address, enter the MAC address in the Injector Switch MAC Address text box. If you want the access point to find the switch MAC address, leave the Injector Switch MAC Address text box blank. Note Each time that an access point is relocated, the MAC address of the new switch port fails to match the remembered MAC address, and the access point remains in low-power mode. You must then physically verify the existence of a power injector and reselect this option to cause the new MAC address to be remembered. · Override--Allows the access point to operate in high-power mode without first verifying a matching MAC address. You can use this option if your network does not contain any older Cisco 6-W switches that could be overloaded if connected directly to a 12-W access point. The advantage of this option is that if you relocate the access point, it continues to operate in high-power mode without any further configuration. The disadvantage of this option is that if the access point is connected directly to a 6-W switch, an overload occurs. Click Apply. Click Save Configuration. What to do next Manually reset the access point in order for the change to take effect. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 713 Configuration Examples for Configuring Power over Ethernet Lightweight Access Point Configuration Examples for Configuring Power over Ethernet Displaying Power over Ethernet Information: Example This example shows how to display common information that includes the PoE settings for a specific access point: Switch# show ap name AP01 config general Cisco AP Identifier............... 1 Cisco AP Name..................... AP1 ... PoE Pre-Standard Switch........... Enabled PoE Power Injector MAC Addr....... Disabled Power Type/Mode................... PoE/Low Power (degraded mode) ... Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 714 PART VIII Mobility · Information About Mobility, on page 717 · Mobility Network Elements, on page 723 · Mobility Control Protocols, on page 727 · Configuring Mobility, on page 735 4 6 C H A P T E R Information About Mobility · Overview, on page 717 · Wired and Wireless Mobility, on page 718 · Features of Mobility, on page 718 · Sticky Anchoring for Low Latency Roaming, on page 719 · Bridge Domain ID and L2/L3 Roaming, on page 720 · Link Down Behavior, on page 720 · Platform Specific Scale Requirement for the Mobility Controller, on page 720 Overview The switch delivers more services at access layer other than merely providing increased speeds and feeds. Wireless services is now integrated with the switch, which ensures that the access layer switch terminates the wireless users data plane, thereby delivering on the promise of Cisco's unified architecture. Unification implies that mobility services are provided to both wireless and wired stations. The switch provides seamless roaming, which requires transparency of the network configuration and deployment options to the client. From the end user's perspective, any mobility event must not change its IP address, its default router or DHCP server. This means that as stations roam, they must be able to · Send an ARP to their default router, or · Transmit a DHCP request to the server that had previously assigned their address. From the infrastructure's perspective, as mobility events occur, the station's traffic must follow its current point of attachment, which can either be a mobility agent (MA) or mobility controller (MC). This must be true regardless of whether the station has moved to a network that is configured for a different subnet. The period from which the station is not receiving traffic following its mobility event must be as short as possible, even below 40 ms whenever possible, which includes any authentication procedures that are required. From the infrastructure's perspective, the mobility management solution must have four main components, and all of these functions must be performed within the constraints of roaming: · Initial Association--This function is used to identify the user's new point of attachment in the network. · Context Transfer--This function is used to transfer state information associated with the station. This ensures that the station's static and real-time policies, including security and application ACLs, and services, remain the same across handoffs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 717 Wired and Wireless Mobility Mobility · Handoff--This function is used to signal that the station's point of attachment has changed, and control of the station should be relinquished by the previous access switch. · Data Plane--This function is typically tied to the handoff process, and ensures that the station's traffic continues to be delivered and received from the station without any noticeable performance degradation. Wired and Wireless Mobility One of the key features of the Converged access solution (applicable to both the Cisco Catalyst 3850 Switch and Cisco WLC 5700 Series Controller) is its ability to provide a device with an IP address and maintain its session persistence, across mobility events from ethernet connections to wireless and vice-versa. This feature allows users to remain on an ethernet network when possible, and make use of the freedom of mobility associated with wireless when necessary. This feature leverages support from both the client and the infrastructure and uses the two factor authentication-device and user. The device authentication credentials is cached in the mobility controller (MC). When a device transitions across link layers, the device credentials is validated, and if a match is found, the MC ensures that the same IP address is assigned to the new interface. Features of Mobility · Mobility Controller (MC)--The controller provides mobility management services for inter-peer group roaming events. The MC provides a central point of contact for management and policy based control protocols, such as RADIUS. This eliminates the need for the infrastructure servers to maintain a user's location as it transitions throughout the network. The MC sends the configuration to all the mobility agents under its sub-domain of their mobility configuration, peer group membership and list of members. A sub-domain is synonymous to the MC that forms it. Each sub-domain consists of an MC and zero or more access switches that have AP's associated to them. · Mobility Agents (MA)-- A mobility agent is either an access switch that has a wireless module running on it or an MC with an internal MA running on it. A mobility agent is the wireless component that maintains client mobility state machine for a mobile client that is connected via an AP to the device that the MA is running on. · Mobility Sub Domain-- It is an autonomous portion of the mobility domain network. A mobility sub-domain comprises of a single mobility controller and its associated mobility agents (MAs). Note Even when more than one mobility controller is present, only one MC can be active at any given time. A mobility sub-domain is the set of devices managed by the active mobility controller. A mobility sub-domain comprises of a set of mobility agents and associated access points. · Mobility Group-- A collection of mobility controllers (MCs) across which fast roaming is supported. The concept of mobility group is the same as a collection of buildings in a campus across which frequent roaming is expected. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 718 Mobility Sticky Anchoring for Low Latency Roaming · Mobility Domain-- A collection of mobility sub-domains across which mobility is supported. The term mobility domain may be the same as a campus network. · Mobility Oracle (MO)--The mobility oracle acts as the point of contact for mobility events that occur across mobility sub-domains. It also maintains a local database of each station in the entire mobility domain, their home and current sub-domain. A mobility domain includes one or more mobility oracle, though only one would be active at any given time. · Mobility Tunnel Endpoint (MTE)-- The mobility tunnel endpoint (MTE) provides data plane services for mobile devices through the use of tunneling. This minimizes the impact of roaming events on the network by keeping the user's point of presence on the network a constant. · Point of Attachment-- A station's point of attachment is where its data path is initially processed upon entry in the network. This could either be the access switch that is currently providing it service, or the wireless LAN controller. · Point of Presence-- A station's point of presence is the place in the network where the station is being advertised. For instance, if an access switch is advertising reachability to the station via a routing protocol, the interface on which the route is being advertised is considered the station's point of presence. · Switch Peer Group (SPG)-- A peer group is a statically created list of neighboring access switches between which fast mobility services is provided. A peer group limits the scope of interactions between switches during handoffs to only those that are geographically proximate. · Station--A user's device that connects to and requests service from the network. The device may have a wired, wireless or both interfaces. · Switch in the same SPG--A peer switch that is part of the peer group of the local switch. · Switch outside the SPG--A peer access switch that is not part of the local switch's peer group. · Foreign Mobility Controller-- The mobility controller providing mobility management service for the station in a foreign mobility sub-domain. The foreign mobility controller acts as a liaison between access switches in the foreign sub-domain and the mobility controller in the home domain. · Foreign Mobility Sub-Domain-- The mobility sub-domain, controlled by a mobility controller, supporting a station which is anchored in another mobility sub-domain · Foreign Switch-- The access switch in the foreign mobility sub-domain currently providing service to the station. · Anchor Mobility Controller-- The mobility controller providing a single point of control and mobility management service for stations in their home mobility sub-domain. · Anchor Mobility Sub-Domain-- The mobility sub-domain, controlled by a mobility controller, for a station where its IP address was assigned. · Anchor Switch-- The switch in the home mobility sub-domain that last provided service to a station. Sticky Anchoring for Low Latency Roaming Sticky Anchoring ensures low roaming latency from the client's point of presence is maintained at the switch where the client initially joins the network. It is expensive to apply client policies at a switch for a roaming client. There can be considerable delay as it involves contacting the AAA server for downloadable ACLs which is not acceptable for restoring time sensitive client traffic. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 719 Bridge Domain ID and L2/L3 Roaming Mobility To manage this delay, when the client roams between APs connected to different switches , irrespective of whether it is an intra sub-domain roam or inter sub-domain roam, the client traffic is always tunneled to the switch where the client first associates. The client is anchored at its first point of attachment for its lifetime in the network. This behavior is enabled by default. You can also disable this behavior to allow the client anchoring only for inter-subnet roams. This configuration is per WLAN config and is available under the WLAN config mode. The customer can configure different SSIDs for time sensitive and non time sensitive applications. Bridge Domain ID and L2/L3 Roaming Bridge domain ID provides the mobility nodes with information to decide on specific roam type, either as L2 or L3 roam. It also allows the network administrators to reuse the VLAN IDs across network distribution. When the VLAN IDs do not have the associated subnet configurations, they may require additional parameter to use in conjunction with VLAN ID. The network administrator ensures that the given VLAN under the same bridge domain ID are associated with the unique subnet. The mobility nodes will first check for the bridge domain ID for the given node and the VLAN ID associated with the client to identify the roam type. The bridge domain ID and the VLAN ID must be same to treat a roam as L2 roam. The bridge domain ID is configured for each SPG when creating a SPG and later on the MC. The bridge domain ID could be same for more than one SPG and all the MAs under the SPG will share the same bridge domain ID. This information is pushed to the MAs as part of the configuration download when MA comes up initially. If the bridge domain ID is modified when the system is up, it will be pushed to all the MAs in the modified SPG and will take immediate effect for the future roams. Note The MC can also have a bridge domain ID for it self, as the MC can also be part of a SPG. Link Down Behavior This section provides information about data synchronization between MA-MC and MC-MO when MC or MO faces downtime in absence of redundancy manager. When Keepalive is configured between MA-MC or MC-MO the clients database is synchronized between the MO and the MCs and the MC and its MAs respectively. Platform Specific Scale Requirement for the Mobility Controller The Mobility Controller (MC) role is supported on a number of different platforms like, the Cisco WLC 5700 Series, CUWN and Catalyst 3850 Switches. The scale requirements on these three platforms are summarized in the table below: Scalability Max number of MC in Mobility Domain Catalyst 3850 as MC 8 Catalyst 3650 as MC 8 Cisco WLC 5700 as MC CUWN 5508 WiSM2 as as MC MC 72 72 72 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 720 Mobility Platform Specific Scale Requirement for the Mobility Controller Scalability Max number of MC in Mobility Group Max number of MAs in Sub-domain (per MC) Max number of SPGs in Sub-domain (per MC) Max number of MAs in a SPG Catalyst 3850 as MC 8 Catalyst 3650 as MC 8 Cisco WLC 5700 as MC 24 CUWN 5508 WiSM2 as as MC MC 24 24 16 16 350 350 350 8 8 24 24 24 16 16 64 64 64 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 721 Platform Specific Scale Requirement for the Mobility Controller Mobility Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 722 4 7 C H A P T E R Mobility Network Elements · Mobility Agent, on page 723 · Mobility Controller, on page 724 · Mobility Oracle, on page 725 · Guest Controller, on page 725 Mobility Agent A Mobility Controller resides on the switch. It is both, control path and data path entity and is responsible for: · Handling the mobility events on the switch · Configuring the datapath elements on the switch for mobility, and · Communicating with the mobility controller As MA, the switch performs the datapath functions by terminating the CAPWAP tunnels that encapsulate 802.11 traffic sourced by wireless stations. This allows the switch to apply features to wired and wireless traffic in a uniform fashion. As far as switch is concerned, 802.11 is just another access medium. The MA performs the following functions: · Support the mobility protocol The MA is responsible for responding in a timely manner, ensuring the switch is capable of achieving its roaming budget. · Point of presence If the wireless subnets are not available at the MC, the MA assumes the point of presence if the wireless client VLAN is not available at the new point of attachment and tunnel the client traffic accordingly. · ARP Server When the network is configured in a layer 2 mode, the MA is responsible for advertising reachability for the stations connected to it. If tunneling is employed, the ARP request is transmitted on behalf of the station through the tunnel, which the point of presence (anchor switch) would bridge onto its uplink interface. · Proxy IGMP The MA on the switch is responsible for subscribing to multicast groups on behalf of a station after a roaming event has occurred. This information is passed as part of the context to the new switch. This ensures the multicast flows follow the user as it roams. · Routing When the switch is connected to a layer 3 access network, the MA is responsible for injecting routes for the stations that are associated with it for which tunneling is not provided. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 723 Mobility Controller Mobility · 802.1X Authenticator The authenticator function is included in the MA, and handles both wired and wireless stations. · Secure PMK Sharing When a station successfully authenticates to the network, the MA forwards the PMK to the MC. The MC is responsible for flooding the PMK to all the MAs under its sub-domain and to the peer MCs in the mobility group. The MA also performs the following datapath functions: · Mobility tunnel If tunneling is used, the MA encapsulates and decapsulates packets from the mobility tunnel to the MC, and to other MA in the peer group, if the access switches are serving as points of presence. The MA supports the tunneling of client data traffic between the point of attachment and the point of attachment. The packet format used for other switches is CAPWAP with an 802.3 payload. The MA also supports reassembly and fragmentation for mobility tunnels. · Encryption The mobility control traffic between the mobility nodes is DTLS encrypted. The MA also encrypts the CAPWAP control and data (optional) at the point of attachment. · CAPWAP The switch supports the CAPWAP control and data planes. The switch forwarding logic is responsible for terminating the CAPWAP tunnels with 802.11 as well as 802.3 payloads. Since support for large frames (greater than 1500bytes) is not universally available, the switch supports CAPWAP fragmentation and reassembly. Mobility Controller The main function of mobility controller is to coordinate the client roaming beyond a switch peer group. The other features of the mobility controller are: · Station Database--The Mobility Controller maintains a database of all the clients that are connected within the local mobility sub-domain. · Mobility Protocol--The MC supports the mobility protocol which ensures the target roaming point responds in a timely manner and achieves the 150ms roaming budget · Interface to Mobility Oracle--The Mobility Controller acts as a gateway between the switch and the Mobility Oracle. When the Mobility Controller does not find a match in its local database, it suggests a match for a wireless client entry (in its database) and forwards the request to the Mobility Oracle, which manages the Mobility Domain. Note Mobility Oracle function can be enabled on an MC only if it is supported by the platform. · ARP Server--When tunneling is employed for a station, its point of presence on the network is the Mobility Tunnel Endpoint (MTE). The Mobility Controller responds to any ARP requests received for the stations it is responsible for. · Routing--When the Mobility Controller is connected to a layer three network, the Mobility Controller is responsible for injecting routes for the stations it supports into the network. · Configures MTE--The Mobility Controller is the control point for the switch for all mobility management related requests. When a change in a station's point of attachment occurs, the Mobility Controller is responsible for configuring the forwarding policy on the MTE. · NTP Server--The Mobility Controller acts as an NTP server to the switch and supports all the nodes to have their clocks synchronized with it. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 724 Mobility Mobility Oracle Mobility Oracle The Mobility Oracle coordinates the client roams beyond the subdomain on a need basis and consists of the following features: · Station Database--The Mobility Oracle maintains a database of all stations that are serviced within the mobility domain. This database is populated during the Mobility Oracle's interactions with all the Mobility Controllers, in all of the mobility sub-domains it supports. · Interface to Mobility Controller--When the Mobility Oracle receives a request from a Mobility Controller, it performs a station lookup, and forwards, whenever needed, the request to the proper Mobility Controller. · NTP Server--The Mobility Oracle acts as an NTP server to the Mobility Controllers and synchronizes all the switch clocks within the mobility domain. Guest Controller The guest access feature provides guest access to wireless clients. The guest tunnels use the same format as the mobility tunnels. Using the guest access feature, there is no need to configure guest VLANs on the access switch. Traffic from the wired and wireless clients terminates on Guest Controller. Since the guest VLAN is not present on the access switch, the traffic is tunneled to the MTE over the existing mobility tunnel, and then via a guest tunnel to the Guest Controller. The advantage of this approach is that all guest traffic passes through the MTE before it is tunneled to the Guest Controller. The Guest Controller only needs to support tunnels between itself and all the MTEs. The disadvantage is that the traffic from the guest client is tunneled twice - once to the MTE and then again to the Guest Controller. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 725 Guest Controller Mobility Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 726 4 8 C H A P T E R Mobility Control Protocols · About Mobility Control Protocols, on page 727 · Initial Association and Roaming, on page 727 · Initial Association, on page 728 · Intra Switch Handoff, on page 729 · Intra Switch Peer Group Handoff, on page 729 · Inter Switch Peer Group Handoff, on page 730 · Inter Sub Domain Handoff, on page 731 · Inter Mobility Group Handoff, on page 733 About Mobility Control Protocols The mobility control protocol is used regardless of whether tunneled or routed. The mobility control protocol is used for mobility events between the MO, MC and MA. The mobility architecture uses both, · Distributed approach, using the direct communication with the switches in their respective SPG, as well as · Centralized approach, using the MC and MO. The goal is to reduce the overhead on the centralized MC, while limiting the interactions between switches to help scale the overall system. Initial Association and Roaming The following scenarios are applicable to the mobility management protocol: · Initial Association · Intra Switch Roam · Intra Switch Peer Group Roam · Inter Switch Peer Group Roam · Inter Sub-Domain Roam · Inter Group Roam Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 727 Initial Association Mobility Initial Association The illustration below explains the initial association process followed by theswitch: Figure 47: Initial Association 1. When a station initially associates with a mobility agent, the MA performs a lookup to determine whether keying information for key caching is locally available in the MA. If no keying information is available, which is the case when the station first appears in the network, the switch prompts the device to authenticate itself to generate the Pairwise Master Key (PMK). The PMK is generated on the client and the RADIUS server side, and the RADIUS sever forwards the PMK to the authenticator, the MA. 2. The MA sends the PMK to the MC. 3. After receiving the PMK from the MA, the MC transmits the PMK to all the MAs in its sub-domain, and to all the other MCs in its mobility group. 4. The mobility group is a single key domain. This ensures that 802.11r compliant stations recognize the key domain, and attempts to utilize the fast transition procedures defined in 802.11r. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 728 Mobility Intra Switch Handoff Note The 802.11r protocol defines a key domain, which is a collection of access points that share keying information. 5. (Refer to step 2B in the illustration). Since the station is new to the mobility sub-domain, as indicated by the fact that the PMK is not in the MA local key cache, the MA transmits a mobile announce message to the MC. 6. The MC checks if the client exists in its database. As the client cannot be found, the MC in turn forwards it to the MO, if available. 7. (Refer to step 5 in the illustration). As the station is new to the network, the MO returns a negative response (NACK), which is forwarded by the MC to the switch. If the Mobility Oracle is not available then the MC is responsible for not responding to the Mobile Announce. 8. The MA on the switch informs the MC about the station's new point of attachment via the Handoff Complete message. 9. The MA then informs the other MAs in its switch peer group (SPG) about the station's new point of attachment via the Handoff Notification message. It is necessary to transmit this notification to the MAs in its SPG to allow local handoff without interacting with the MC. The Handoff Notification message sent to MAs in SPG need not carry all the information in Handoff Complete message sent to the MC. 10. (Refer to step 7B in the illustration). The MC updates its database and forwards the Handoff Complete message to the Mobility Oracle. This ensures that the Mobility Oracle's database is updated to record the station's current home mobility sub-domain. To eliminate race conditions that could occur with devices moving quickly across switch, regardless of whether they are within a mobility sub-domain or not, the messages between MA and MC/MO are time synchronized. This would allow the MC and MO to properly process requests, if they are received out of order. The Handoff Notification sent to MAs in the SPG are not acknowledged. Intra Switch Handoff Mobility events within an MA are completely transparent to the SPG and the MC. When a station moves across APs on the same MA and attempts to perform a fast handoff, the PMK is present on the MA. The MA will complete the fast handoff without invoking any additional signal. Intra Switch Peer Group Handoff The switch peer group (SPG) is a group of MAs between which users may roam, and expect fast roaming services. Allowing the MA to handoff directly within a SPG reduces the overhead on the MC as it requires fewer messages to be exchanged. After the initial association is complete the station moves to another MA belonging to its SPG. In an intra switch peer group roam, the initial association, the stations PMK was forwarded to all MAs in the mobility sub-domain. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 729 Inter Switch Peer Group Handoff Figure 48: Intra Switch Peer Group Handoff Mobility The following process explains the intra switch peer group handoff: 1. In the initial association example, the Handoff Notification message is sent to all MAs in its SPG to know the station's current point of attachment. 2. The new MA sends a unicast Mobile Announce message to the previous MA to which the client is associated. 3. After the handoff completion, the new MA transmits a Handoff Complete message to the MC. 4. The new switch sends a Handoff Notification to all MA in its own SPG to inform them about the clients new point of presence. Inter Switch Peer Group Handoff The Intra SPG roams do not cover all possible scenarios and there can be cases where it is possible for mobility events to occur between two MAs that are not in the same SPG. When a MA does not have any information about a station's current point of attachment, because of the Handoff Notification message getting lost in the network, or because of the the station roaming to an MA that is not in the new SPG, the MA consults the MC. The MC provides information about the clients point of presence within the mobility sub-domain. This eliminates the need to consult all other MCs within the mobility sub-domain. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 730 Mobility Figure 49: Inter Switch Peer Group Handoff Inter Sub Domain Handoff The image above illustrates an example of a mobility event that occurs across MAs that are not in the same SPG, but within the same mobility sub-domain. Note The MA color matches the circle representing its SPG. 1. The new MA will have the PMK for the station, which was forwarded to each MA in the mobility sub-domain upon client initial authentication. 2. Since the MA had not been previously notified of the station's presence on a neighboring MA inside a different SPG transmits the mobile announce to the sub-domain's MC. 3. (Refer to step 2 in the illustration) On receiving the mobile announce message, the MC performs a lookup in its database, and forwards the request to the MA that was previously providing service to the station. This information is known to the MC through a previously received Handoff Complete message sent in a reliable fashion from the old MA. 4. (Refer to step 3 in the illustration) The old MA, shown in green above, transmits a Handoff message directly to the new MA. 5. The old MA needs to notify other MAs within its SPG of the fact that the station has left the group using a Station Left message. This ensures that if the station were to come back to one of the MA , they would be aware of the fact that the station is no longer being serviced by the old MA. 6. Once the handoff is complete, the new MA transmits the Handoff Complete message in a reliable fashion to the MC. 7. The new MA then transmits the Handoff Notification to the other MAs within its SPG. Inter Sub Domain Handoff A sub-domain is an ensemble formed by a mobility controller and the mobility agents it directly manages. An inter sub-domain mobility event implies communication between two mobility controllers. These 2 mobility controllers can be configured with the same mobility group value and recognize each other. They will appear in each other's mobility list, or they can be configured with different mobility group values, and still recognize each other. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 731 Inter Sub Domain Handoff Mobility When the roaming event occurs across sub-domains between MCs in the same mobility group, the 802.11r key domain advertised by the new APs are the same. Additionally, the client PMK is also transmitted to all MCs upon the client's initial authentication. The new MC does not need to force the client to reauthenticate, and the new MC also knows which previous MC was managing the wireless client mobility. Figure 50: Inter Sub Domain Handoff The following steps are involved in the inter sub domain handoff, when mobility controllers belong to the same mobility group: 1. When a clients PMK was sent by the initial MA to all the MCs in the mobility group, the new MA already had already received the client PMK from its MC, and re-authentication is not required. 2. The new MA was not notified previously of the station's presence on a neighboring MA inside a different SPG it transmits the mobile announce to the sub-domain's MC. 3. On receiving the mobile announce message, the MC forwards the mobile announce to the MO, which performs a lookup in its database, and forwards the request to the MC that was previously providing service to the station. 4. The previous MC, in turn, forwards the request to the MA that was previously providing service to the station. 5. The old MA, shown in yellow color above, transmits a Handoff message directly to the new MA. 6. The old MA must notify the other MAs within its SPG of the fact that the station has left the SPG using a Station Left message. This ensures that if the station comes back to one of the MA , the MA is aware of the fact that the station is no longer serviced by the old MA. 7. Once the handoff is complete, the new MA transmits the Handoff Complete message in a reliable fashion to the new Mobility Controller. 8. The new MA then transmits the Handoff Notification to all other MAs. 9. The new MC then transmits the Handoff Complete to the old MC. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 732 Mobility Inter Mobility Group Handoff Inter Mobility Group Handoff A mobility group is formed by MCs sharing the same mobility group name, and knowing each other. Since the roaming event occurs across mobility groups, the 802.11r key domain advertised by the new APs differ. This forces the client to re-authenticate. They are propagated only within a mobility group, and roaming across mobility groups requires the stations to re-authenticate when they cross mobility group boundaries. When the authentication is complete, the PMK that is generated is pushed to the MAs and MCs within the same mobility group. The stations cache the PMK from the previous sub-domain because each PMK is associated to a given sub-domain (802.11y key domain). This ensures that you do not have to re-authenticate when the PMK roams back to the previous sub-domain within the pmk cache timeout interval. The remaining procedure follows the inter-sub-domain handoff steps, except that these steps relate to inter mobility group roaming. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 733 Inter Mobility Group Handoff Mobility Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 734 4 9 C H A P T E R Configuring Mobility · Configuring Mobility Controller, on page 735 · Configuring Mobility Agent, on page 743 Configuring Mobility Controller Configuring Converged Access Controllers Creating Peer Groups, Peer Group Member, and Bridge Domain ID (CLI) Before you begin · On the mobility agent, you can only configure the IP address of the mobility controller. · On the mobility controller, you can define the peer group and the IP address of each peer group member. SUMMARY STEPS 1. wireless mobility controller 2. wireless mobility controller peer-group SPG1 3. wireless mobility controller peer-group SPG1 member ip member-ip-addr public-ip public-ip-addr 4. wireless mobility controller peer-group SPG1 member ip member-ip-addr public-ip public-ip-addr 5. wireless mobility controller peer-group SPG2 6. wireless mobility controller peer-group SPG2 member ip member-ip-addr public-ip public-ip-addr 7. wireless mobility controller peer-group SPG1 bridge-domain-id id DETAILED STEPS Step 1 Command or Action wireless mobility controller Example: Switch(config)# wireless mobility controller Purpose Enables the mobility controller functionality on the device. This command is applicable only to the switch. The controller is by default a mobility controller. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 735 Creating Peer Groups, Peer Group Member, and Bridge Domain ID (CLI) Mobility Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action wireless mobility controller peer-group SPG1 Example: Switch(config)# wireless mobility controller peer-group SPG1 Purpose Creates a peer group named SPG1. wireless mobility controller peer-group SPG1 member ip member-ip-addr public-ip public-ip-addr Example: Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.2 public-ip 10.10.20.2 Adds a mobility agent to the peer group. Note The 10.10.20.2 is the mobility agent's direct IP address. When NAT is used, use the optional public IP address to enter the mobility agent's NATed address. When NAT is not used, the public IP address is not used and the device displays the mobility agent's direct IP address. wireless mobility controller peer-group SPG1 member Adds another member to the peer group SPG1. ip member-ip-addr public-ip public-ip-addr Example: Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.6 public-ip 10.10.20.6 wireless mobility controller peer-group SPG2 Example: Switch(config)# wireless mobility controller peer-group SPG2 Creates another peer group SPG2. wireless mobility controller peer-group SPG2 member Adds a member to peer group SPG2. ip member-ip-addr public-ip public-ip-addr Example: Switch(config)# wireless mobility controller peer-group SPG2 member ip 10.10.10.20 public-ip 10.10.10.20 wireless mobility controller peer-group SPG1 bridge-domain-id id Example: Switch(config)# wireless mobility controller peer-group SPG1 bridge-domain-id 54 (Optional) Adds a bridge domain to SPG1 used for defining the subnet-VLAN mapping with other SPGs. Example This example shows how to create peer group and add members to it: Switch(config)# wireless mobility controller Switch(config)# wireless mobility controller peer-group SPG1 Switch(config)# wireless mobility controller peer-group SPG1 Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.2 public-ip Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 736 Mobility Creating Peer Groups, Peer Group Member, and Bridge Domain ID (GUI) 10.10.20.2 Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.6 public-ip 10.10.20.6 Switch(config)# wireless mobility controller peer-group SPG2 Switch(config)# wireless mobility controller peer-group SPG2 member ip 10.10.10.20 public-ip 10.10.10.20 Switch(config)# wireless mobility controller peer-group SPG1 bridge-domain-id 54 Creating Peer Groups, Peer Group Member, and Bridge Domain ID (GUI) Before you begin · Ensure that the device is in mobility controller state. · On the mobility agent, you can only configure the IP address of the mobility controller. · On the mobility controller, you can define the peer group and the IP address of each peer group member. Step 1 Step 2 Step 3 Step 4 Step 5 Choose Controller > Mobility Management > Switch Peer Group. The Mobility Switch Peer Groups page is displayed. Click New. Enter the following details: a) Switch Peer Group Name b) Bridge Domain ID c) Multicast IP Address Click Apply. Click Save Configuration. Configuring Local Mobility Group (CLI) Configuration for wireless mobility groups and mobility group members where the mobility group is a group of MCs. Before you begin MCs can belong only to one mobility group, and can know MCs in several mobility groups. SUMMARY STEPS 1. wireless mobility group name group-name 2. wireless mobility group member ip member-ip-addr public-ip public-ip-addr 3. wireless mobility group keepalive interval time-in-seconds 4. wireless mobility group keepalive count count Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 737 Configuring Local Mobility Group (GUI) Mobility DETAILED STEPS Step 1 Command or Action wireless mobility group name group-name Example: Switch(config)# wireless mobility group name Mygroup Purpose Creates a mobility group named Mygroup. Step 2 wireless mobility group member ip member-ip-addr Adds a mobility controller to the Mygroup mobility group. public-ip public-ip-addr Note When NAT is used, use the optional public IP Example: address to enter the NATed IP address of the Switch(config)# wireless mobility group member ip mobility controller. 10.10.34.10 public-ip 10.10.34.28 Step 3 wireless mobility group keepalive interval time-in-seconds Configures the interval between two keepalives sent to a Example: mobility member. Switch(config)# wireless mobility group keepalive interval 5 Step 4 wireless mobility group keepalive count count Example: Configures the keep alive retries before a member status is termed DOWN. Switch(config)# wireless mobility group keepalive count 3 Example Switch(config)# wireless mobility group name Mygroup Switch(config)# wireless mobility group member ip 10.10.34.10 public-ip 10.10.34.28 Switch(config)# wireless mobility group keepalive interval 5 Switch(config)# wireless mobility group keepalive count 3 Configuring Local Mobility Group (GUI) Before you begin Mobility controllers can belong to only one mobility group and can know mobility controllers in several mobility groups. Step 1 Step 2 Choose Controller > Mobility Management > Mobility Global Config. The Mobility Controller Configuration page is displayed. Enter the following details: a) Mobility Group Name b) Mobility Keepalive Interval c) Mobility Keepalive Count Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 738 Mobility Adding a Peer Mobility Group (CLI) Step 3 Step 4 d) Multicast IP Address if you want to enable multicast mode to send mobile announce messages to the mobility members. Note If you do not enable multicast IP address, the device uses unicast mode to send mobile announce messages. Click Apply. Click Save Configuration. Adding a Peer Mobility Group (CLI) Before you begin MCs belong to only one group, and can know MCs in several groups. SUMMARY STEPS 1. wireless mobility group member ip member-ip-addr public-ip public-ip-addr group group-name DETAILED STEPS Step 1 Command or Action Purpose wireless mobility group member ip member-ip-addr public-ip public-ip-addr group group-name Adds the member as a peer MC in a different group than the Mygroup. Example: Switch(config)# wireless mobility group member ip 10.10.10.24 public-ip 10.10.10.25 group Group2 Adding a Peer Mobility Group (GUI) Before you begin Mobility controllers belong to only one group, and can know several mobility groups. Step 1 Step 2 Step 3 Step 4 Step 5 Choose Controller > Mobility Management > Mobility Peer. The Mobility Peer page is displayed. Click New. Enter the following details: a) Mobility Member IP b) Mobility Member Public IP c) Mobility Member Group Name d) Multicast IP Address Click Apply. Click Save Configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 739 Configuring Optional Parameters for Roaming Behavior Mobility Configuring Optional Parameters for Roaming Behavior Use this configuration to disable the sticky anchor. This command can also be used, if required, between all MA's and MC's where roaming is expected for the target SSID. SUMMARY STEPS 1. wlan open21 2. no mobility anchor sticky DETAILED STEPS Step 1 Command or Action wlan open21 Example: Purpose Configures a WLAN. Step 2 Switch(config)# wlan open20 no mobility anchor sticky Example: Disables the default sticky mobility anchor. Switch(config-wlan)# no mobility anchor sticky Example Switch(config)# wlan open20 Switch(config-wlan)# no mobility anchor sticky Pointing the Mobility Controller to a Mobility Oracle (CLI) Before you begin You can configure a mobility oracle on a known mobility controller. SUMMARY STEPS 1. wireless mobility group member ip member-ip-addr group group-name 2. wireless mobility oracle ip oracle-ip-addr DETAILED STEPS Step 1 Command or Action Purpose wireless mobility group member ip member-ip-addr group group-name Creates and adds a MC to a mobility group. Example: Switch(config)# wireless mobility group member ip 10.10.10.10 group Group3 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 740 Mobility Pointing the Mobility Controller to a Mobility Oracle (GUI) Step 2 Command or Action wireless mobility oracle ip oracle-ip-addr Example: Switch(config)# wireless mobility oracle ip 10.10.10.10 Purpose Configures the mobility controller as mobility oracle. Example Switch(config)# wireless mobility group member ip 10.10.10.10 group Group3 Switch(config)# wireless mobility oracle ip 10.10.10.10 Pointing the Mobility Controller to a Mobility Oracle (GUI) Before you begin You can configure a mobility oracle on a known mobility controller. Step 1 Step 2 Step 3 Step 4 Choose Controller > Mobility Management > Mobility Global Config. The Mobility Controller Configuration page is displayed. Enter the Mobility Oracle IP Address. Note To make the mobility controller itself a mobility oracle, select the Mobility Oracle Enabled check box. Click Apply. Click Save Configuration. Configuring Guest Controller A guest controller is used when the client traffic is tunneled to a guest anchor controller in the demilitarized zone (DMZ). The guest client goes through a web authentication process. The web authentication process is optional, and the guest is allowed to pass traffic without authentication too. Enable the WLAN on the mobility agent on which the guest client connects with the mobility anchor address of the guest controller. On the guest controller WLAN, which can be Cisco 5500 Series WLC, Cisco WiSM2, or Cisco 5700 Series WLC, configure the IP address of the mobility anchor as its own IP address. This allows the traffic to be tunneled to the guest controller from the mobility agent. SUMMARY STEPS 1. wlan wlan-id 2. mobility anchor guest-anchor-ip-addr 3. client vlan vlan-name 4. security open Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 741 Configuring Guest Anchor Mobility DETAILED STEPS Step 1 Command or Action wlan wlan-id Example: Switch(config)# wlan Mywlan1 Purpose Creates a WLAN for the client. Step 2 mobility anchor guest-anchor-ip-addr Example: Switch(config-wlan)# mobility anchor 10.10.10.2 Enables the guest anchors (GA) IP address on the MA. Note To enable guest anchor on the mobility controller, you need not enter the IP address. Enter the mobility anchor command in the WLAN configuration mode to enable GA on the mobility controller. Step 3 client vlan vlan-name Example: Switch(config-wlan)# client vlan gc_ga_vlan1 Assigns a VLAN to the client's WLAN. Step 4 security open Example: Switch(config-wlan)# security open Assigns a security type to the WLAN. Example Switch(config)# wlan Mywlan1 Switch(config-wlan)# mobility anchor 10.10.10.2 Switch(config-wlan)# client vlan gc_ga_vlan1 Switch(config-wlan)# security open Configuring Guest Anchor SUMMARY STEPS 1. wlan Mywlan1 2. mobility anchor <guest-anchors-own-ip-address> 3. client vlan<vlan-name> 4. security open DETAILED STEPS Step 1 Command or Action wlan Mywlan1 Example: Switch(config)# wlan Mywlan1 Purpose Creates a wlan for the client. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 742 Mobility Configuring Mobility Agent Step 2 Step 3 Step 4 Command or Action Purpose mobility anchor <guest-anchors-own-ip-address> Enables the guest anchors IP address on the guest anchor (GA). The GA assigns its own address on itself. Example: Switch(config-wlan)# mobility anchor 10.10.10.2 client vlan<vlan-name> Example: Switch(config-wlan)# client vlan gc_ga_vlan1 Assigns a vlan to the clients wlan. security open Example: Switch(config-wlan)# security open Assigns a security type to the wlan. Example Switch(config)# wlan Mywlan1 Switch(config-wlan)# mobility anchor 10.10.10.2 Switch(config-wlan)# client vlan gc_ga_vlan1 Switch(config-wlan)# security open Configuring Mobility Agent Configuring Mobility Agent by Pointing to Mobility Controller (CLI) Before you begin · By default, the switches are configured as mobility agents. · Your network must have at least one mobility controller and the network connectivity with the mobility controller must be operational. · You cannot configure mobility from the mobility agent. On the mobility agent, you can configure only the IP address of the mobility controller to download the SPG configuration. · On the mobility agent, you can either configure the mobility controller address to point to an external mobility agent, or enable the mobility controller function. SUMMARY STEPS 1. configure terminal 2. wireless management interface vlan 21 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 743 Configuring Mobility Agent by Pointing to Mobility Controller (GUI) Mobility DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 wireless management interface vlan 21 Enables the wireless functionality on the device and Example: activates the mobility agent function. This ensures the APs have a place to terminate the CAPWAP tunnel. Switch (config)# wireless management interface vlan 21 Example This example shows how to add a mobility agent into the mobility group by pointing it to a mobility controller: Switch(config)# wireless management interface vlan 21 Configuring Mobility Agent by Pointing to Mobility Controller (GUI) Before you begin · By default, the switches are configured as mobility agents. · Your network must have at least one mobility controller and the network connectivity with the mobility controller must be operational. · You cannot configure mobility from the mobility agent. On the mobility agent, you can configure only the IP address of the mobility controller to download the SPG configuration. · On the mobility agent, you can either configure the mobility controller address to point to an external mobility agent, or enable the mobility controller function. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Controller > Mobility Management > Mobility Global Config The Mobility Controller Configuration page is displayed. From the Mobility Role drop-down list, choose Mobility Agent. In the Mobility Controller IP Address, enter the IP address of the mobility controller. Click Apply. Click Save Configuration. Reboot the device. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 744 Mobility Configuring the Mobility Controller for the Mobility Agent (CLI) Configuring the Mobility Controller for the Mobility Agent (CLI) SUMMARY STEPS 1. wireless mobility controller 2. wireless mobility controller ip ip-addr DETAILED STEPS Step 1 Command or Action wireless mobility controller Example: Switch (config)# wireless mobility controller Mobility role changed to Mobility Controller. Please save config and reboot the whole stack. Purpose Enables the mobility function on the switch. Note After you enter this command, save the configuration and reboot the switch for the mobility controller function to take effect. Step 2 wireless mobility controller ip ip-addr Example: Switch (config)# wireless mobility controller ip 10.10.21.3 Specifies the mobility controller to which the mobility agent relates. Note If a mobility agent is configured and the mobility controller exists on a different device, configure the SPG on the mobility controller to ensure the mobility agent functions properly. What to do next After you add a mobility controller role to the mobility agent, you can configure optional parameters on the mobility agent. Adding a Mobility Controller Role to the Mobility Agent SUMMARY STEPS 1. wireless mobility controller ip 10.10.21.3 DETAILED STEPS Step 1 Command or Action wireless mobility controller ip 10.10.21.3 Example: Switch(config)# wireless mobility controller ip 10.10.21.3 Purpose Converts the mobility agent to a mobility controller. Example This example shows how to add the mobility controller role to a mobility agent: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 745 Configuring Optional Parameters on a Mobility Agent (CLI) Mobility Switch(config)# wireless mobility controller ip 10.10.21.3 Mobility role changed to Mobility Controller. Please save config and reboot the whole stack. Configuring Optional Parameters on a Mobility Agent (CLI) This section shows how to configure load-balancing on a switch. · By default, the load-balancing is enabled and it cannot be disabled. · The switch supports a maximum of 2000 clients and the default threshold value is fifty percent of client max load. · When the switch reaches its threshold, it redistributes the new clients load to other mobility agents in the same SPG, if their client load is lower. SUMMARY STEPS 1. wireless mobility load-balance threshold threshold-value DETAILED STEPS Step 1 Command or Action Purpose wireless mobility load-balance threshold threshold-value Configures the threshold that triggers load-balancing. Example: Switch(config)# wireless mobility load-balance threshold 150 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 746 I X P A R T Network Management · Configuring Cisco IOS Configuration Engine, on page 749 · Configuring the Cisco Discovery Protocol, on page 769 · Configuring Simple Network Management Protocol, on page 779 · Configuring Service Level Agreements, on page 803 · Configuring SPAN and RSPAN, on page 823 · Configuring Wireshark, on page 861 5 0 C H A P T E R Configuring Cisco IOS Configuration Engine · Finding Feature Information, on page 749 · Prerequisites for Configuring the Configuration Engine, on page 749 · Restrictions for Configuring the Configuration Engine, on page 750 · Information About Configuring the Configuration Engine, on page 750 · How to Configure the Configuration Engine, on page 756 · Monitoring CNS Configurations, on page 766 · Additional References, on page 767 · Feature History and Information for the Configuration Engine, on page 767 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring the Configuration Engine · Obtain the name of the configuration engine instance to which you are connecting. · Because the CNS uses both the event bus and the configuration server to provide configurations to devices, you must define both ConfigID and Device ID for each configured switch. · All switches configured with the cns config partial global configuration command must access the event bus. The DeviceID, as originated on the switch, must match the DeviceID of the corresponding switch definition in the Cisco Configuration Engine. You must know the hostname of the event bus to which you are connecting. Related Topics Cisco Networking Services IDs and Device Hostnames, on page 752 DeviceID, on page 752 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 749 Restrictions for Configuring the Configuration Engine Network Management Restrictions for Configuring the Configuration Engine · Within the scope of a single instance of the configuration server, no two configured switches can share the same value for ConfigID. · Within the scope of a single instance of the event bus, no two configured switches can share the same value for DeviceID. Related Topics Cisco Networking Services IDs and Device Hostnames, on page 752 Information About Configuring the Configuration Engine Cisco Configuration Engine Software The Cisco Configuration Engine is network management utility software that acts as a configuration service for automating the deployment and management of network devices and services. Each Cisco Configuration Engine manages a group of Cisco devices (switches and routers) and the services that they deliver, storing their configurations and delivering them as needed. The Cisco Configuration Engine automates initial configurations and configuration updates by generating device-specific configuration changes, sending them to the device, executing the configuration change, and logging the results. The Cisco Configuration Engine supports standalone and server modes and has these Cisco Networking Services (CNS) components: · Configuration service: · Web server · File manager · Namespace mapping server · Event service (event gateway) · Data service directory (data models and schema) In standalone mode, the Cisco Configuration Engine supports an embedded directory service. In this mode, no external directory or other data store is required. In server mode, the Cisco Configuration Engine supports the use of a user-defined external directory. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 750 Network Management Figure 51: Cisco Configuration Engine Architectural Overview Configuration Service Configuration Service The Configuration Service is the core component of the Cisco Configuration Engine. It consists of a Configuration Server that works with Cisco IOS CNS agents on the switch. The Configuration Service delivers device and service configurations to the switch for initial configuration and mass reconfiguration by logical groups. Switches receive their initial configuration from the Configuration Service when they start up on the network for the first time. The Configuration Service uses the CNS Event Service to send and receive configuration change events and to send success and failure notifications. The Configuration Server is a web server that uses configuration templates and the device-specific configuration information stored in the embedded (standalone mode) or remote (server mode) directory. Configuration templates are text files containing static configuration information in the form of CLI commands. In the templates, variables are specified by using Lightweight Directory Access Protocol (LDAP) URLs that reference the device-specific configuration information stored in a directory. The Cisco IOS agent can perform a syntax check on received configuration files and publish events to show the success or failure of the syntax check. The configuration agent can either apply configurations immediately or delay the application until receipt of a synchronization event from the configuration server. Event Service The Cisco Configuration Engine uses the Event Service for receipt and generation of configuration events. The Event Service consists of an event agent and an event gateway. The event agent is on the switch and facilitates the communication between the switch and the event gateway on the Cisco Configuration Engine. The Event Service is a highly capable publish-and-subscribe communication method. The Event Service uses subject-based addressing to send messages to their destinations. Subject-based addressing conventions define a simple, uniform namespace for messages and their destinations. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 751 NameSpace Mapper Network Management Related Topics Enabling the CNS Event Agent, on page 756 NameSpace Mapper The Cisco Configuration Engine includes the NameSpace Mapper (NSM) that provides a lookup service for managing logical groups of devices based on application, device or group ID, and event. Cisco IOS devices recognize only event subject-names that match those configured in Cisco IOS software; for example, cisco.cns.config.load. You can use the namespace mapping service to designate events by using any desired naming convention. When you have populated your data store with your subject names, NSM changes your event subject-name strings to those known by Cisco IOS. For a subscriber, when given a unique device ID and event, the namespace mapping service returns a set of events to which to subscribe. Similarly, for a publisher, when given a unique group ID, device ID, and event, the mapping service returns a set of events on which to publish. Cisco Networking Services IDs and Device Hostnames The Cisco Configuration Engine assumes that a unique identifier is associated with each configured switch. This unique identifier can take on multiple synonyms, where each synonym is unique within a particular namespace. The event service uses namespace content for subject-based addressing of messages. The Cisco Configuration Engine intersects two namespaces, one for the event bus and the other for the configuration server. Within the scope of the configuration server namespace, the term ConfigID is the unique identifier for a device. Within the scope of the event bus namespace, the term DeviceID is the CNS unique identifier for a device. Related Topics Prerequisites for Configuring the Configuration Engine, on page 749 Restrictions for Configuring the Configuration Engine, on page 750 ConfigID Each configured switch has a unique ConfigID, which serves as the key into the Cisco Configuration Engine directory for the corresponding set of switch CLI attributes. The ConfigID defined on the switch must match the ConfigID for the corresponding switch definition on the Cisco Configuration Engine. The ConfigID is fixed at startup time and cannot be changed until the device restarts, even if the switch hostname is reconfigured. DeviceID Each configured switch participating on the event bus has a unique DeviceID, which is analogous to the switch source address so that the switch can be targeted as a specific destination on the bus. The origin of the DeviceID is defined by the Cisco IOS hostname of the switch. However, the DeviceID variable and its usage reside within the event gateway adjacent to the switch. The logical Cisco IOS termination point on the event bus is embedded in the event gateway, which in turn functions as a proxy on behalf of the switch. The event gateway represents the switch and its corresponding DeviceID to the event bus. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 752 Network Management Hostname and DeviceID The switch declares its hostname to the event gateway immediately after the successful connection to the event gateway. The event gateway couples the DeviceID value to the Cisco IOS hostname each time this connection is established. The event gateway retains this DeviceID value for the duration of its connection to the switch. Related Topics Prerequisites for Configuring the Configuration Engine, on page 749 Hostname and DeviceID The DeviceID is fixed at the time of the connection to the event gateway and does not change even when the switch hostname is reconfigured. When changing the switch hostname on the switch, the only way to refresh the DeviceID is to break the connection between the switch and the event gateway. For instructions on refreshing DeviceIDs, see "Related Topics." When the connection is reestablished, the switch sends its modified hostname to the event gateway. The event gateway redefines the DeviceID to the new value. Caution When using the Cisco Configuration Engine user interface, you must first set the DeviceID field to the hostname value that the switch acquires after, not before, and you must reinitialize the configuration for your Cisco IOS CNS agent. Otherwise, subsequent partial configuration command operations may malfunction. Related Topics Refreshing DeviceIDs, on page 763 Hostname, DeviceID, and ConfigID In standalone mode, when a hostname value is set for a switch, the configuration server uses the hostname as the DeviceID when an event is sent on hostname. If the hostname has not been set, the event is sent on the cn=<value> of the device. In server mode, the hostname is not used. In this mode, the unique DeviceID attribute is always used for sending an event on the bus. If this attribute is not set, you cannot update the switch. These and other associated attributes (tag value pairs) are set when you run Setup on the Cisco Configuration Engine. Cisco IOS CNS Agents The CNS event agent feature allows the switch to publish and subscribe to events on the event bus and works with the Cisco IOS CNS agent. These agents, embedded in the switch Cisco IOS software, allow the switch to be connected and automatically configured. Initial Configuration When the switch first comes up, it attempts to get an IP address by broadcasting a Dynamic Host Configuration Protocol (DHCP) request on the network. Assuming there is no DHCP server on the subnet, the distribution switch acts as a DHCP relay agent and forwards the request to the DHCP server. Upon receiving the request, the DHCP server assigns an IP address to the new switch and includes the Trivial File Transfer Protocol (TFTP) server Internet Protocol (IP) address, the path to the bootstrap configuration file, and the default Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 753 Incremental (Partial) Configuration Network Management gateway IP address in a unicast reply to the DHCP relay agent. The DHCP relay agent forwards the reply to the switch. The switch automatically configures the assigned IP address on interface VLAN 1 (the default) and downloads the bootstrap configuration file from the TFTP server. Upon successful download of the bootstrap configuration file, the switch loads the file in its running configuration. The Cisco IOS CNS agents initiate communication with the Configuration Engine by using the appropriate ConfigID and EventID. The Configuration Engine maps the Config ID to a template and downloads the full configuration file to the switch. The following figure shows a sample network configuration for retrieving the initial bootstrap configuration file by using DHCP-based autoconfiguration. Figure 52: Initial Configuration Related Topics Automated CNS Configuration, on page 755 Incremental (Partial) Configuration After the network is running, new services can be added by using the Cisco IOS CNS agent. Incremental (partial) configurations can be sent to the switch. The actual configuration can be sent as an event payload by way of the event gateway (push operation) or as a signal event that triggers the switch to initiate a pull operation. The switch can check the syntax of the configuration before applying it. If the syntax is correct, the switch applies the incremental configuration and publishes an event that signals success to the configuration server. If the switch does not apply the incremental configuration, it publishes an event showing an error status. When the switch has applied the incremental configuration, it can write it to nonvolatile random-access memory (NVRAM) or wait until signaled to do so. Synchronized Configuration When the switch receives a configuration, it can defer application of the configuration upon receipt of a write-signal event. The write-signal event tells the switch not to save the updated configuration into its NVRAM. The switch uses the updated configuration as its running configuration. This ensures that the switch configuration is synchronized with other network activities before saving the configuration in NVRAM for use at the next reboot. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 754 Network Management Automated CNS Configuration Automated CNS Configuration To enable automated CNS configuration of the switch, you must first complete the prerequisites listed in this topic. When you complete them, power on the switch. At the setup prompt, do nothing; the switch begins the initial configuration. When the full configuration file is loaded on your switch, you do not need to do anything else. For more information on what happens during initial configuration, see "Related Topics." Table 65: Prerequisites for Enabling Automatic Configuration Device Access switch Distribution switch Required Configuration Factory default (no configuration file) · IP helper address · Enable DHCP relay agent2 · IP routing (if used as default gateway) DHCP server · IP address assignment · TFTP server IP address · Path to bootstrap configuration file on the TFTP server · Default gateway IP address TFTP server · A bootstrap configuration file that includes the CNS configuration commands that enable the switch to communicate with the Configuration Engine · The switch configured to use either the switch MAC address or the serial number (instead of the default hostname) to generate the ConfigID and EventID · The CNS event agent configured to push the configuration file to the switch CNS Configuration Engine One or more templates for each type of device, with the ConfigID of the device mapped to the template. 2 A DHCP Relay is needed only when the DHCP Server is on a different subnet from the client. Related Topics Initial Configuration, on page 753 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 755 How to Configure the Configuration Engine Network Management How to Configure the Configuration Engine Enabling the CNS Event Agent Note You must enable the CNS event agent on the switch before you enable the CNS configuration agent. Beginning in privileged EXEC mode, follow these steps to enable the CNS event agent on the switch. SUMMARY STEPS 1. configure terminal 2. cns event {hostname | ip-address} [port-number] [ [keepalive seconds retry-count] [failover-time seconds ] [reconnect-time time] | backup] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 cns event {hostname | ip-address} [port-number] [ Enables the event agent, and enters the gateway parameters. [keepalive seconds retry-count] [failover-time seconds ] [reconnect-time time] | backup] · For {hostname | ip-address}, enter either the hostname or the IP address of the event gateway. Example: · (Optional) For port number, enter the port number for Switch(config)# cns event 10.180.1.27 keepalive the event gateway. The default port number is 11011. 120 10 · (Optional) For keepalive seconds, enter how often the switch sends keepalive messages. For retry-count, enter the number of unanswered keepalive messages that the switch sends before the connection is terminated. The default for each is 0. · (Optional) For failover-time seconds, enter how long the switch waits for the primary gateway route after the route to the backup gateway is established. · (Optional) For reconnect-time time, enter the maximum time interval that the switch waits before trying to reconnect to the event gateway. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 756 Network Management Enabling the Cisco IOS CNS Agent Command or Action Step 3 end Example: Switch(config)# end Purpose · (Optional) Enter backup to show that this is the backup gateway. (If omitted, this is the primary gateway.) Note Though visible in the command-line help string, the encrypt and the clock-timeout time keywords are not supported. Returns to privileged EXEC mode. Example This example shows how to enable the CNS event agent, set the IP address gateway to 10.180.1.27, set 120 seconds as the keepalive interval, and set 10 as the retry count. Switch(config)# cns event 10.180.1.27 keepalive 120 10 What to do next To verify information about the event agent, use the show cns event connections command in privileged EXEC mode. To disable the CNS event agent, use the no cns event { ip-address | hostname } global configuration command. Related Topics Event Service, on page 751 Enabling the Cisco IOS CNS Agent Beginning in privileged EXEC mode, follow these steps to enable the Cisco IOS CNS agent on the switch. Before you begin You must enable the CNS event agent on the switch before you enable this agent. SUMMARY STEPS 1. configure terminal 2. cns config initial {hostname | ip-address} [port-number] 3. cns config partial {hostname | ip-address} [port-number] 4. end 5. Start the Cisco IOS CNS agent on the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 757 Enabling an Initial Configuration for Cisco IOS CNS Agent Network Management DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 Step 4 cns config initial {hostname | ip-address} [port-number] Enables the Cisco IOS CNS agent, and enters the Example: configuration server parameters. · For {hostname | ip-address}, enter either the hostname Switch(config)# cns config initial 10.180.1.27 10 or the IP address of the configuration server. · (Optional) For port number, enter the port number for the configuration server. This command enables the Cisco IOS CNS agent and initiates an initial configuration on the switch. cns config partial {hostname | ip-address} [port-number] Enables the Cisco IOS CNS agent, and enters the Example: configuration server parameters. · For {hostname | ip-address}, enter either the hostname Switch(config)# cns config partial 10.180.1.27 10 or the IP address of the configuration server. · (Optional) For port number, enter the port number for the configuration server. end Example: Enables the Cisco IOS CNS agent and initiates a partial configuration on the switch. Returns to privileged EXEC mode. Switch(config)# end Step 5 Start the Cisco IOS CNS agent on the switch. What to do next You can now use the Cisco Configuration Engine to remotely send incremental configurations to the switch. Related Topics Refreshing DeviceIDs, on page 763 Enabling an Initial Configuration for Cisco IOS CNS Agent Beginning in privileged EXEC mode, follow these steps to enable the CNS configuration agent and initiate an initial configuration on the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 758 Network Management Enabling an Initial Configuration for Cisco IOS CNS Agent SUMMARY STEPS 1. configure terminal 2. cns template connect name 3. cli config-text 4. Repeat Steps 2 to 3 to configure another CNS connect template. 5. exit 6. cns connect name [retries number] [retry-interval seconds] [sleep seconds] [timeout seconds] 7. discover {controller controller-type | dlci [subinterface subinterface-number] | interface [interface-type] | line line-type} 8. template name [... name] 9. Repeat Steps 7 to 8 to specify more interface parameters and CNS connect templates in the CNS connect profile. 10. exit 11. hostname name 12. ip route network-number 13. cns id interface num {dns-reverse | ipaddress | mac-address} [event] [image] 14. cns id {hardware-serial | hostname | string string | udi} [event] [image] 15. cns config initial {hostname | ip-address} [port-number] [event] [no-persist] [page page] [source ip-address] [syntax-check] 16. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 cns template connect name Example: Enters CNS template connect configuration mode, and specifies the name of the CNS connect template. Switch(config)# cns template connect template-dhcp Step 3 Step 4 Step 5 cli config-text Example: Enters a command line for the CNS connect template. Repeat this step for each command line in the template. Switch(config-tmpl-conn)# cli ip address dhcp Repeat Steps 2 to 3 to configure another CNS connect template. exit Example: Returns to global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 759 Enabling an Initial Configuration for Cisco IOS CNS Agent Network Management Step 6 Step 7 Step 8 Step 9 Command or Action Switch(config)# exit cns connect name [retries number] [retry-interval seconds] [sleep seconds] [timeout seconds] Example: Switch(config)# cns connect dhcp Purpose Enters CNS connect configuration mode, specifies the name of the CNS connect profile, and defines the profile parameters. The switch uses the CNS connect profile to connect to the Configuration Engine. · Enter the name of the CNS connect profile. · (Optional) For retries number, enter the number of connection retries. The range is 1 to 30. The default is 3. · (Optional) For retry-interval seconds, enter the interval between successive connection attempts to the Configuration Engine. The range is 1 to 40 seconds. The default is 10 seconds. · (Optional) For sleep seconds, enter the amount of time before which the first connection attempt occurs. The range is 0 to 250 seconds. The default is 0. · (Optional) For timeout seconds, enter the amount of time after which the connection attempts end. The range is 10 to 2000 seconds. The default is 120. discover {controller controller-type | dlci [subinterface Specifies the interface parameters in the CNS connect subinterface-number] | interface [interface-type] | line profile. line-type} · For controller controller-type, enter the controller Example: type. Switch(config-cns-conn)# discover interface gigabitethernet · For dlci, enter the active data-link connection identifiers (DLCIs). (Optional) For subinterface subinterface-number, specify the point-to-point subinterface number that is used to search for active DLCIs. · For interface [interface-type], enter the type of interface. · For line line-type, enter the line type. template name [... name] Example: Specifies the list of CNS connect templates in the CNS connect profile to be applied to the switch configuration. You can specify more than one template. Switch(config-cns-conn)# template template-dhcp Repeat Steps 7 to 8 to specify more interface parameters and CNS connect templates in the CNS connect profile. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 760 Network Management Enabling an Initial Configuration for Cisco IOS CNS Agent Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action exit Example: Switch(config-cns-conn)# exit hostname name Example: Switch(config)# hostname device1 ip route network-number Example: Purpose Returns to global configuration mode. Enters the hostname for the switch. (Optional) Establishes a static route to the Configuration Engine whose IP address is network-number. RemoteSwitch(config)# ip route 172.28.129.22 255.255.255.255 11.11.11.1 cns id interface num {dns-reverse | ipaddress | mac-address} [event] [image] Example: (Optional) Sets the unique EventID or ConfigID used by the Configuration Engine. If you enter this command, do not enter the cns id {hardware-serial | hostname | string string | udi} [event] [image] command. RemoteSwitch(config)# cns id GigabitEthernet1/0/1 ipaddress · For interface num, enter the type of interface. For example, ethernet, group-async, loopback, or virtual-template. This setting specifies from which interface the IP or MAC address should be retrieved to define the unique ID. · For {dns-reverse | ipaddress | mac-address}, enter dns-reverse to retrieve the hostname and assign it as the unique ID, enter ipaddress to use the IP address, or enter mac-address to use the MAC address as the unique ID. · (Optional) Enter event to set the ID to be the event-id value used to identify the switch. · (Optional) Enter image to set the ID to be the image-id value used to identify the switch. Note If both the event and image keywords are omitted, the image-id value is used to identify the switch. cns id {hardware-serial | hostname | string string | udi} (Optional) Sets the unique EventID or ConfigID used by [event] [image] the Configuration Engine. If you enter this command, do Example: not enter the cns id interface num {dns-reverse | ipaddress | mac-address} [event] [image] command. RemoteSwitch(config)# cns id hostname · For { hardware-serial | hostname | string string | udi }, enter hardware-serial to set the switch serial number as the unique ID, enter hostname (the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 761 Enabling an Initial Configuration for Cisco IOS CNS Agent Network Management Step 15 Step 16 Command or Action Purpose default) to select the switch hostname as the unique ID, enter an arbitrary text string for string string as the unique ID, or enter udi to set the unique device identifier (UDI) as the unique ID. cns config initial {hostname | ip-address} [port-number] Enables the Cisco IOS agent, and initiates an initial [event] [no-persist] [page page] [source ip-address] configuration. [syntax-check] · For {hostname | ip-address}, enter the hostname or Example: the IP address of the configuration server. RemoteSwitch(config)# cns config initial 10.1.1.1 no-persist · (Optional) For port-number, enter the port number of the configuration server. The default port number is 80. · (Optional) Enable event for configuration success, failure, or warning messages when the configuration is finished. · (Optional) Enable no-persist to suppress the automatic writing to NVRAM of the configuration pulled as a result of entering the cns config initial global configuration command. If the no-persist keyword is not entered, using the cns config initial command causes the resultant configuration to be automatically written to NVRAM. · (Optional) For page page, enter the web page of the initial configuration. The default is /Config/config/asp. · (Optional) Enter source ip-address to use for source IP address. · (Optional) Enable syntax-check to check the syntax when this parameter is entered. Note Though visible in the command-line help string, the encrypt, status url, and inventory keywords are not supported. end Example: Returns to privileged EXEC mode. RemoteSwitch(config)# end Example This example shows how to configure an initial configuration on a remote switch when the switch configuration is unknown (the CNS Zero Touch feature). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 762 Network Management Refreshing DeviceIDs Switch(config)# cns template connect template-dhcp Switch(config-tmpl-conn)# cli ip address dhcp Switch(config-tmpl-conn)# exit Switch(config)# cns template connect ip-route Switch(config-tmpl-conn)# cli ip route 0.0.0.0 0.0.0.0 ${next-hop} Switch(config-tmpl-conn)# exit Switch(config)# cns connect dhcp Switch(config-cns-conn)# discover interface gigabitethernet Switch(config-cns-conn)# template template-dhcp Switch(config-cns-conn)# template ip-route Switch(config-cns-conn)# exit Switch(config)# hostname RemoteSwitch RemoteSwitch(config)# cns config initial 10.1.1.1 no-persist This example shows how to configure an initial configuration on a remote switch when the switch IP address is known. The Configuration Engine IP address is 172.28.129.22. Switch(config)# cns template connect template-dhcp Switch(config-tmpl-conn)# cli ip address dhcp Switch(config-tmpl-conn)# exit Switch(config)# cns template connect ip-route Switch(config-tmpl-conn)# cli ip route 0.0.0.0 0.0.0.0 ${next-hop} Switch(config-tmpl-conn)# exit Switch(config)# cns connect dhcp Switch(config-cns-conn)# discover interface gigabitethernet Switch(config-cns-conn)# template template-dhcp Switch(config-cns-conn)# template ip-route Switch(config-cns-conn)# exit Switch(config)# hostname RemoteSwitch RemoteSwitch(config)# ip route 172.28.129.22 255.255.255.255 11.11.11.1 RemoteSwitch(config)# cns id ethernet 0 ipaddress RemoteSwitch(config)# cns config initial 172.28.129.22 no-persist What to do next To verify information about the configuration agent, use the show cns config connections command in privileged EXEC mode. To disable the CNS Cisco IOS agent, use the no cns config initial { ip-address | hostname } global configuration command. Refreshing DeviceIDs Beginning in privileged EXEC mode, follow these steps to refresh a DeviceID when changing the hostname on the switch. SUMMARY STEPS 1. show cns config connections 2. Make sure that the CNS event agent is properly connected to the event gateway. 3. show cns event connections 4. Record from the output of Step 3 the information for the currently connected connection listed below. You will be using the IP address and port number in subsequent steps of these instructions. 5. configure terminal 6. no cns event ip-address port-number Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 763 Refreshing DeviceIDs Network Management 7. cns event ip-address port-number 8. end 9. Make sure that you have reestablished the connection between the switch and the event connection by examining the output from show cns event connections. DETAILED STEPS Step 1 Command or Action show cns config connections Example: Purpose Displays whether the CNS event agent is connecting to the gateway, connected, or active, and the gateway used by the event agent, its IP address and port number. Switch# show cns config connections Step 2 Make sure that the CNS event agent is properly connected Examine the output of show cns config connections for to the event gateway. the following: · Connection is active. · Connection is using the currently configured switch hostname. The DeviceID will be refreshed to correspond to the new hostname configuration using these instructions. Step 3 show cns event connections Example: Displays the event connection information for your switch. Step 4 Step 5 Switch# show cns event connections Record from the output of Step 3 the information for the currently connected connection listed below. You will be using the IP address and port number in subsequent steps of these instructions. configure terminal Enters global configuration mode. Example: Step 6 Step 7 Switch# configure terminal no cns event ip-address port-number Example: Switch(config)# no cns event 172.28.129.22 2012 Specifies the IP address and port number that you recorded in Step 4 in this command. This command breaks the connection between the switch and the event gateway. It is necessary to first break, then reestablish, this connection to refresh the DeviceID. cns event ip-address port-number Example: Switch(config)# cns event 172.28.129.22 2012 Specifies the IP address and port number that you recorded in Step 4 in this command. This command reestablishes the connection between the switch and the event gateway. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 764 Network Management Enabling a Partial Configuration for Cisco IOS CNS Agent Step 8 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Step 9 Make sure that you have reestablished the connection between the switch and the event connection by examining the output from show cns event connections. Related Topics Enabling the Cisco IOS CNS Agent, on page 757 Hostname and DeviceID, on page 753 Enabling a Partial Configuration for Cisco IOS CNS Agent Beginning in privileged EXEC mode, follow these steps to enable the Cisco IOS CNS agent and to initiate a partial configuration on the switch. SUMMARY STEPS 1. configure terminal 2. cns config partial {ip-address | hostname} [port-number] [source ip-address] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 cns config partial {ip-address | hostname} [port-number] Enables the configuration agent, and initiates a partial [source ip-address] configuration. Example: Switch(config)# cns config partial 172.28.129.22 2013 · For {ip-address | hostname}, enter the IP address or the hostname of the configuration server. · (Optional) For port-number, enter the port number of the configuration server. The default port number is 80. · (Optional) Enter source ip-address to use for the source IP address. Note Though visible in the command-line help string, the encrypt keyword is not supported. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 765 Monitoring CNS Configurations Network Management Step 3 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. What to do next To verify information about the configuration agent, use either the show cns config stats or the show cns config outstanding command in privileged EXEC mode. To disable the Cisco IOS agent, use the no cns config partial { ip-address | hostname } global configuration command. To cancel a partial configuration, use the cns config cancel global configuration command. Monitoring CNS Configurations Table 66: CNS show Commands Command show cns config connections Purpose Displays the status of the CNS Cisco IOS CNS agent connections. Switch# show cns config connections show cns config outstanding Displays information about incremental (partial) CNS configurations that have started but are not yet completed. Switch# show cns config outstanding show cns config stats Displays statistics about the Cisco IOS CNS agent. Switch# show cns config stats show cns event connections Displays the status of the CNS event agent connections. Switch# show cns event connections show cns event gateway Displays the event gateway information for your switch. Switch# show cns event gateway show cns event stats Displays statistics about the CNS event agent. Switch# show cns event stats show cns event subject Switch# show cns event subject Displays a list of event agent subjects that are subscribed to by applications. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 766 Network Management Additional References Additional References Related Documents Related Topic Document Title Configuration Engine Setup Cisco Configuration Engine Installation and Setup Guide, 1.5 for Linux http://www.cisco.com/en/US/docs/net_mgmt/configuration_engine/1.5/installation_linux Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for the Configuration Engine Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 767 Feature History and Information for the Configuration Engine Network Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 768 5 1 C H A P T E R Configuring the Cisco Discovery Protocol · Finding Feature Information, on page 769 · Information About CDP, on page 769 · How to Configure CDP, on page 770 · Monitoring and Maintaining CDP, on page 776 · Additional References, on page 777 · Feature History and Information for Cisco Discovery Protocol, on page 777 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About CDP CDP Overview CDP is a device discovery protocol that runs over Layer 2 (the data-link layer) on all Cisco-manufactured devices (routers, bridges, access servers, controllers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols. This feature enables applications to send SNMP queries to neighboring devices. CDP runs on all media that support Subnetwork Access Protocol (SNAP). Because CDP runs over the data-link layer only, two systems that support different network-layer protocols can learn about each other. Each CDP-configured device sends periodic messages to a multicast address, advertising at least one address at which it can receive SNMP messages. The advertisements also contain time-to-live, or holdtime information, which is the length of time a receiving device holds CDP information before discarding it. Each device also listens to the messages sent by other devices to learn about neighboring devices. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 769 CDP and Stacks Network Management On the switch, CDP enables Network Assistant to display a graphical view of the network. The switch uses CDP to find cluster candidates and maintain information about cluster members and other devices up to three cluster-enabled devices away from the command switch by default. CDP and Stacks A switch stack appears as a single switch in the network. Therefore, CDP discovers the switch stack, not the individual stack members. The switch stack sends CDP messages to neighboring network devices when there are changes to the switch stack membership, such as stack members being added or removed. Default CDP Configuration This table shows the default CDP configuration. Feature CDP global state CDP interface state CDP timer (packet update frequency) CDP holdtime (before discarding) CDP Version-2 advertisements Default Setting Enabled Enabled 60 seconds 180 seconds Enabled How to Configure CDP Configuring CDP Characteristics You can configure these CDP characteristics: · Frequency of CDP updates · Amount of time to hold the information before discarding it · Whether or not to send Version-2 advertisements Note Steps 2 through 4 are all optional and can be performed in any order. Beginning in privileged EXEC mode, follow these steps to configure these characteristics. SUMMARY STEPS 1. configure terminal 2. cdp timer seconds 3. cdp holdtime seconds 4. cdp advertise-v2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 770 Network Management Configuring CDP Characteristics 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 Step 3 Step 4 Step 5 cdp timer seconds Example: Switch(config)# cdp timer 20 cdp holdtime seconds Example: Switch(config)# cdp holdtime 60 cdp advertise-v2 Example: Switch(config)# cdp advertise-v2 end Example: Switch(config)# end Purpose Enters the global configuration mode. (Optional) Sets the transmission frequency of CDP updates in seconds. The range is 5 to 254; the default is 60 seconds. (Optional) Specifies the amount of time a receiving device should hold the information sent by your device before discarding it. The range is 10 to 255 seconds; the default is 180 seconds. (Optional) Configures CDP to send Version-2 advertisements. This is the default state. Returns to privileged EXEC mode. Example The following example shows how to configure CDP characteristics: Switch# configure terminal Switch(config)# cdp timer 50 Switch(config)# cdp holdtime 120 Switch(config)# cdp advertise-v2 Switch(config)# end What to do next Use the no form of the CDP commands to return to the default settings. Related Topics Monitoring and Maintaining CDP, on page 776 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 771 Disabling CDP Network Management Disabling CDP CDP is enabled by default. Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling CDP can interrupt cluster discovery and device connectivity. Beginning in privileged EXEC mode, follow these steps to disable the CDP device discovery capability. SUMMARY STEPS 1. configure terminal 2. no cdp run 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 no cdp run Example: Switch(config)# no cdp run end Example: Switch(config)# end Disables CDP. Returns to privileged EXEC mode. What to do next You must reenable CDP to use it. Related Topics Enabling CDP, on page 772 Enabling CDP CDP is enabled by default. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 772 Network Management Enabling CDP Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling CDP can interrupt cluster discovery and device connectivity. Beginning in privileged EXEC mode, follow these steps to enable CDP when it has been disabled. Before you begin CDP must be disabled, or it cannot be enabled. SUMMARY STEPS 1. configure terminal 2. cdp run 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 cdp run Example: Switch(config)# cdp run end Example: Switch(config)# end Enables CDP if it has been disabled. Returns to privileged EXEC mode. Example The following example shows how to enable CDP if it has been disabled: Switch# configure terminal Switch(config)# cdp run Switch(config)# end What to do next Use the show run all command to show that CDP has been enabled. If you enter only show run, the enabling of CDP may not be displayed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 773 Disabling CDP on an Interface Network Management Related Topics Disabling CDP, on page 772 Disabling CDP on an Interface CDP is enabled by default on all supported interfaces to send and to receive CDP information. Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling CDP can interrupt cluster discovery and device connectivity. Beginning in privileged EXEC mode, follow these steps to disable CDP on a port. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. no cdp enable 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 interface interface-id Example: Switch(config)# interface gigabitethernet1/0/1 no cdp enable Example: Switch(config-if)# no cdp enable end Example: Switch(config-if)# end Specifies the interface on which you are disabling CDP, and enters interface configuration mode. Disables CDP on the interface specified in Step 2. Returns to privileged EXEC mode. Related Topics Enabling CDP on an Interface, on page 775 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 774 Network Management Enabling CDP on an Interface Enabling CDP on an Interface CDP is enabled by default on all supported interfaces to send and to receive CDP information. Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling CDP can interrupt cluster discovery and device connectivity. Beginning in privileged EXEC mode, follow these steps to enable CDP on a port on which it has been disabled. Before you begin CDP must be disabled on the port that you are trying to CDP enable on, or it cannot be enabled. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. cdp enable 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 interface interface-id Example: Switch(config)# interface gigabitethernet1/0/1 cdp enable Example: Switch(config-if)# cdp enable end Example: Switch(config-if)# end Specifies the interface on which you are enabling CDP, and enters interface configuration mode. Enables CDP on a disabled interface. Returns to privileged EXEC mode. Example The following example shows how to enable CDP on a disabled port: Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 775 Monitoring and Maintaining CDP Network Management Switch(config-if)# cdp enable Switch(config-if)# end Related Topics Disabling CDP on an Interface, on page 774 Monitoring and Maintaining CDP Table 67: Commands for Displaying CDP Information Command clear cdp counters Description Resets the traffic counters to zero. clear cdp table Deletes the CDP table of information about neighbors. show cdp Displays global information, such as frequency of transmissions and the holdtime for packets being sent. show cdp entry entry-name [version] [protocol] Displays information about a specific neighbor. You can enter an asterisk (*) to display all CDP neighbors, or you can enter the name of the neighbor about which you want information. You can also limit the display to information about the protocols enabled on the specified neighbor or information about the version of software running on the device. show cdp interface [interface-id] Displays information about interfaces where CDP is enabled. You can limit the display to the interface about which you want information. show cdp neighbors [interface-id] [detail] Displays information about neighbors, including device type, interface type and number, holdtime settings, capabilities, platform, and port ID. You can limit the display to neighbors of a specific interface or expand the display to provide more detailed information. show cdp traffic Displays CDP counters, including the number of packets sent and received and checksum errors. Related Topics Configuring CDP Characteristics, on page 770 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 776 Network Management Additional References Additional References Related Documents Related Topic Document Title System Management Commands Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3850 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Cisco Discovery Protocol Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 777 Feature History and Information for Cisco Discovery Protocol Network Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 778 5 2 C H A P T E R Configuring Simple Network Management Protocol · Finding Feature Information, on page 779 · Prerequisites for SNMP, on page 779 · Restrictions for SNMP, on page 781 · Information About SNMP, on page 781 · How to Configure SNMP, on page 786 · Monitoring SNMP Status, on page 800 · SNMP Examples, on page 800 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for SNMP Supported SNMP Versions This software release supports the following SNMP versions: · SNMPv1--The Simple Network Management Protocol, a Full Internet Standard, defined in RFC 1157. · SNMPv2C replaces the Party-based Administrative and Security Framework of SNMPv2Classic with the community-string-based Administrative Framework of SNMPv2C while retaining the bulk retrieval and improved error handling of SNMPv2Classic. It has these features: · SNMPv2--Version 2 of the Simple Network Management Protocol, a Draft Internet Standard, defined in RFCs 1902 through 1907. · SNMPv2C--The community-string-based Administrative Framework for SNMPv2, an Experimental Internet Protocol defined in RFC 1901. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 779 Prerequisites for SNMP Network Management · SNMPv3--Version 3 of the SNMP is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by authenticating and encrypting packets over the network and includes these security features: · Message integrity--Ensures that a packet was not tampered with in transit. · Authentication--Determines that the message is from a valid source. · Encryption--Mixes the contents of a package to prevent it from being read by an unauthorized source. Note To select encryption, enter the priv keyword. Both SNMPv1 and SNMPv2C use a community-based form of security. The community of managers able to access the agent's MIB is defined by an IP address access control list and password. SNMPv2C includes a bulk retrieval function and more detailed error message reporting to management stations. The bulk retrieval function retrieves tables and large quantities of information, minimizing the number of round-trips required. The SNMPv2C improved error-handling includes expanded error codes that distinguish different kinds of error conditions; these conditions are reported through a single error code in SNMPv1. Error return codes in SNMPv2C report the error type. SNMPv3 provides for both security models and security levels. A security model is an authentication strategy set up for a user and the group within which the user resides. A security level is the permitted level of security within a security model. A combination of the security level and the security model determine which security method is used when handling an SNMP packet. Available security models are SNMPv1, SNMPv2C, and SNMPv3. The following table identifies characteristics and compares different combinations of security models and levels: Table 68: SNMP Security Models and Levels Model SNMPv1 SNMPv2C SNMPv3 SNMPv3 Level noAuthNoPriv Authentication Encryption Community string No noAuthNoPriv Community string No noAuthNoPriv Username No authNoPriv Message Digest 5 No (MD5) or Secure Hash Algorithm (SHA) Result Uses a community string match for authentication. Uses a community string match for authentication. Uses a username match for authentication. Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 780 Network Management Restrictions for SNMP Model SNMPv3 Level authPriv Authentication MD5 or SHA Encryption Result Data Encryption Provides Standard (DES) or authentication based Advanced on the HMAC-MD5 Encryption Standard or HMAC-SHA (AES) algorithms. Allows specifying the User-based Security Model (USM) with these encryption algorithms: · DES 56-bit encryption in addition to authentication based on the CBC-DES (DES-56) standard. · 3DES 168-bit encryption · AES 128-bit, 192-bit, or 256-bit encryption You must configure the SNMP agent to use the SNMP version supported by the management station. Because an agent can communicate with multiple managers, you can configure the software to support communications using SNMPv1, SNMPv2C, or SNMPv3. Restrictions for SNMP Version Restrictions · SNMPv1 does not support informs. Information About SNMP SNMP Overview SNMP is an application-layer protocol that provides a message format for communication between managers and agents. The SNMP system consists of an SNMP manager, an SNMP agent, and a management information base (MIB). The SNMP manager can be part of a network management system (NMS) such as Cisco Prime Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 781 SNMP Manager Functions Network Management Infrastructure. The agent and MIB reside on the switch. To configure SNMP on the switch, you define the relationship between the manager and the agent. The SNMP agent contains MIB variables whose values the SNMP manager can request or change. A manager can get a value from an agent or store a value into the agent. The agent gathers data from the MIB, the repository for information about device parameters and network data. The agent can also respond to a manager's requests to get or set data. An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP connection, loss of connection to a neighbor, or other significant events. The active switch handles the SNMP requests and traps for the whole switch stack. The active switch transparently manages any requests or traps that are related to all stack members. When a new active switch is elected, the new active switch continues to handle SNMP requests and traps as configured on the previous active switch, assuming that IP connectivity to the SNMP management stations is still in place after the new active switch has taken control. SNMP Manager Functions The SNMP manager uses information in the MIB to perform the operations described in the following table: Table 69: SNMP Operations Operation Description get-request Retrieves a value from a specific variable. get-next-request Retrieves a value from a variable within a table.3 get-bulk-request4 Retrieves large blocks of data, such as multiple rows in a table, that would otherwise require the transmission of many small blocks of data. get-response Replies to a get-request, get-next-request, and set-request sent by an NMS. set-request Stores a value in a specific variable. trap An unsolicited message sent by an SNMP agent to an SNMP manager when some event has occurred. 3 With this operation, an SNMP manager does not need to know the exact variable name. A sequential search is performed to find the needed variable from within a table. 4 The get-bulk command only works with SNMPv2 or later. SNMP Agent Functions The SNMP agent responds to SNMP manager requests as follows: · Get a MIB variable--The SNMP agent begins this function in response to a request from the NMS. The agent retrieves the value of the requested MIB variable and responds to the NMS with that value. · Set a MIB variable--The SNMP agent begins this function in response to a message from the NMS. The SNMP agent changes the value of the MIB variable to the value requested by the NMS. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 782 Network Management SNMP Community Strings The SNMP agent also sends unsolicited trap messages to notify an NMS that a significant event has occurred on the agent. Examples of trap conditions include, but are not limited to, when a port or module goes up or down, when spanning-tree topology changes occur, and when authentication failures occur. SNMP Community Strings SNMP community strings authenticate access to MIB objects and function as embedded passwords. In order for the NMS to access the switch, the community string definitions on the NMS must match at least one of the three community string definitions on the switch. A community string can have one of the following attributes: · Read-only (RO)--Gives all objects in the MIB except the community strings read access to authorized management stations, but does not allow write access. · Read-write (RW)--Gives all objects in the MIB read and write access to authorized management stations, but does not allow access to the community strings. · When a cluster is created, the command switch manages the exchange of messages among member switches and the SNMP application. The Network Assistant software appends the member switch number (@esN, where N is the switch number) to the first configured RW and RO community strings on the command switch and propagates them to the member switches. SNMP MIB Variables Access An example of an NMS is the Cisco Prime Infrastructure network management software. Cisco Prime Infrastructure 2.0 software uses the switch MIB variables to set device variables and to poll devices on the network for specific information. The results of a poll can be displayed as a graph and analyzed to troubleshoot internetworking problems, increase network performance, verify the configuration of devices, monitor traffic loads, and more. As shown in the figure, the SNMP agent gathers data from the MIB. The agent can send traps, or notification of certain events, to the SNMP manager, which receives and processes the traps. Traps alert the SNMP manager to a condition on the network such as improper user authentication, restarts, link status (up or down), MAC address tracking, and so forth. The SNMP agent also responds to MIB-related queries sent by the SNMP manager in get-request, get-next-request, and set-request format. Figure 53: SNMP Network SNMP Notifications SNMP allows the switch to send notifications to SNMP managers when particular events occur. SNMP notifications can be sent as traps or inform requests. In command syntax, unless there is an option in the command to select either traps or informs, the keyword traps refers to either traps or informs, or both. Use the snmp-server host command to specify whether to send SNMP notifications as traps or informs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 783 SNMP ifIndex MIB Object Values Network Management Note SNMPv1 does not support informs. Traps are unreliable because the receiver does not send an acknowledgment when it receives a trap, and the sender cannot determine if the trap was received. When an SNMP manager receives an inform request, it acknowledges the message with an SNMP response protocol data unit (PDU). If the sender does not receive a response, the inform request can be sent again. Because they can be resent, informs are more likely than traps to reach their intended destination. The characteristics that make informs more reliable than traps also consume more resources in the switch and in the network. Unlike a trap, which is discarded as soon as it is sent, an inform request is held in memory until a response is received or the request times out. Traps are sent only once, but an inform might be resent or retried several times. The retries increase traffic and contribute to a higher overhead on the network. Therefore, traps and informs require a trade-off between reliability and resources. If it is important that the SNMP manager receive every notification, use inform requests. If traffic on the network or memory in the switch is a concern and notification is not required, use traps. SNMP ifIndex MIB Object Values In an NMS, the IF-MIB generates and assigns an interface index (ifIndex) object value that is a unique number greater than zero to identify a physical or a logical interface. When the switch reboots or the switch software is upgraded, the switch uses this same value for the interface. For example, if the switch assigns a port 2 an ifIndex value of 10003, this value is the same after the switch reboots. The switch uses one of the values in the following table to assign an ifIndex value to an interface: Table 70: ifIndex Values Interface Type SVI5 EtherChannel Loopback Tunnel Physical (such as Gigabit Ethernet or SFP6-module interfaces) Null 5 SVI = switch virtual interface 6 SFP = small form-factor pluggable ifIndex Range 14999 50005012 50135077 50785142 1000014500 14501 Default SNMP Configuration Feature SNMP agent SNMP trap receiver SNMP traps Default Setting Disabled7. None configured. None enabled except the trap for TCP connections (tty). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 784 Network Management SNMP Configuration Guidelines Feature Default Setting SNMP version If no version keyword is present, the default is Version 1. SNMPv3 authentication If no keyword is entered, the default is the noauth (noAuthNoPriv) security level. SNMP notification type If no type is specified, all notifications are sent. 7 This is the default when the switch starts and the startup configuration does not have any snmp-server global configuration commands. SNMP Configuration Guidelines If the switch starts and the switch startup configuration has at least one snmp-server global configuration command, the SNMP agent is enabled. An SNMP group is a table that maps SNMP users to SNMP views. An SNMP user is a member of an SNMP group. An SNMP host is the recipient of an SNMP trap operation. An SNMP engine ID is a name for the local or remote SNMP engine. When configuring SNMP, follow these guidelines: · When configuring an SNMP group, do not specify a notify view. The snmp-server host global configuration command auto-generates a notify view for the user and then adds it to the group associated with that user. Modifying the group's notify view affects all users associated with that group. · To configure a remote user, specify the IP address or port number for the remote SNMP agent of the device where the user resides. · Before you configure remote users for a particular agent, configure the SNMP engine ID, using the snmp-server engineID global configuration command with the remote option. The remote agent's SNMP engine ID and user password are used to compute the authentication and privacy digests. If you do not configure the remote engine ID first, the configuration command fails. · When configuring SNMP informs, you need to configure the SNMP engine ID for the remote agent in the SNMP database before you can send proxy requests or informs to it. · If a local user is not associated with a remote host, the switch does not send informs for the auth (authNoPriv) and the priv (authPriv) authentication levels. · Changing the value of the SNMP engine ID has significant results. A user's password (entered on the command line) is converted to an MD5 or SHA security digest based on the password and the local engine ID. The command-line password is then destroyed, as required by RFC 2274. Because of this deletion, if the value of the engine ID changes, the security digests of SNMPv3 users become invalid, and you need to reconfigure SNMP users by using the snmp-server user username global configuration command. Similar restrictions require the reconfiguration of community strings when the engine ID changes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 785 How to Configure SNMP Network Management How to Configure SNMP Disabling the SNMP Agent The no snmp-server global configuration command disables all running versions (Version 1, Version 2C, and Version 3) of the SNMP agent on the device. You reenable all versions of the SNMP agent by the first snmp-server global configuration command that you enter. There is no Cisco IOS command specifically designated for enabling SNMP. Beginning in privileged EXEC mode, follow these steps to disable the SNMP agent. Before you begin The SNMP Agent must be enabled before it can be disabled. The SNMP agent is enabled by the first snmp-server global configuration command entered on the device. SUMMARY STEPS 1. configure terminal 2. no snmp-server 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 no snmp-server Example: Switch(config)# no snmp-server end Example: Switch(config)# end Disables the SNMP agent operation. Returns to privileged EXEC mode. Configuring Community Strings You use the SNMP community string to define the relationship between the SNMP manager and the agent. The community string acts like a password to permit access to the agent on the switch. Optionally, you can specify one or more of these characteristics associated with the string: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 786 Network Management Configuring Community Strings · An access list of IP addresses of the SNMP managers that are permitted to use the community string to gain access to the agent · A MIB view, which defines the subset of all MIB objects accessible to the given community · Read and write or read-only permission for the MIB objects accessible to the community Beginning in privileged EXEC mode, follow these steps to configure a community string on the switch. SUMMARY STEPS 1. configure terminal 2. snmp-server community string [view view-name] [ro | rw] [access-list-number] 3. access-list access-list-number {deny | permit} source [source-wildcard] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 snmp-server community string [view view-name] [ro Configures the community string. | rw] [access-list-number] Note The @ symbol is used for delimiting the context Example: information. Avoid using the @ symbol as part of the SNMP community string when Switch(config)# snmp-server community comaccess ro configuring this command. 4 · For string, specify a string that acts like a password and permits access to the SNMP protocol. You can configure one or more community strings of any length. · (Optional) For view-name, specify the view record accessible to the community. · (Optional) Specify either read-only (ro) if you want authorized management stations to retrieve MIB objects, or specify read-write (rw) if you want authorized management stations to retrieve and modify MIB objects. By default, the community string permits read-only access to all objects. · (Optional) For access-list-number, enter an IP standard access list numbered from 1 to 99 and 1300 to 1999. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 787 Configuring Community Strings Network Management Step 3 Step 4 Command or Action access-list access-list-number {deny | permit} source [source-wildcard] Example: Switch(config)# access-list 4 deny any Purpose (Optional) If you specified an IP standard access list number in Step 2, then create the list, repeating the command as many times as necessary. · For access-list-number, enter the access list number specified in Step 2. · The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. · For source, enter the IP address of the SNMP managers that are permitted to use the community string to gain access to the agent. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. end Example: Recall that the access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode. Switch(config)# end This example shows how to assign the comaccess string to SNMP, to allow read-only access, and to specify that IP access list 4 can use the community string to gain access to the switch SNMP agent: Switch(config)# snmp-server community comaccess ro 4 What to do next To disable access for an SNMP community, set the community string for that community to the null string (do not enter a value for the community string). To remove a specific community string, use the no snmp-server community string global configuration command. You can specify an identification name (engine ID) for the local or remote SNMP server engine on the switch. You can configure an SNMP server group that maps SNMP users to SNMP views, and you can add new users to the SNMP group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 788 Network Management Configuring SNMP Groups and Users Configuring SNMP Groups and Users You can specify an identification name (engine ID) for the local or remote SNMP server engine on the switch. You can configure an SNMP server group that maps SNMP users to SNMP views, and you can add new users to the SNMP group. Beginning in privileged EXEC mode, follow these steps to configure SNMP groups and users on the switch. SUMMARY STEPS 1. configure terminal 2. snmp-server engineID {local engineid-string | remote ip-address [udp-port port-number] engineid-string} 3. snmp-server group group-name {v1 | v2c | v3 {auth | noauth | priv}} [read readview] [write writeview] [notify notifyview] [access access-list] 4. snmp-server user username group-name {remote host [ udp-port port]} {v1 [access access-list] | v2c [access access-list] | v3 [encrypted] [access access-list] [auth {md5 | sha} auth-password] } [priv {des | 3des | aes {128 | 192 | 256}} priv-password] 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 snmp-server engineID {local engineid-string | remote Configures a name for either the local or remote copy of ip-address [udp-port port-number] engineid-string} SNMP. Example: Switch(config)# snmp-server engineID local 1234 · The engineid-string is a 24-character ID string with the name of the copy of SNMP. You need not specify the entire 24-character engine ID if it has trailing zeros. Specify only the portion of the engine ID up to the point where only zeros remain in the value. The Step Example configures an engine ID of 123400000000000000000000. · If you select remote, specify the ip-address of the device that contains the remote copy of SNMP and the optional User Datagram Protocol (UDP) port on the remote device. The default is 162. snmp-server group group-name {v1 | v2c | v3 {auth | Configures a new SNMP group on the remote device. noauth | priv}} [read readview] [write writeview] [notify notifyview] [access access-list] For group-name, specify the name of the group. Example: Specify one of the following security models: · v1 is the least secure of the possible security models. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 789 Configuring SNMP Groups and Users Network Management Step 4 Command or Action Purpose Switch(config)# snmp-server group public v2c access lmnop · v2c is the second least secure model. It allows transmission of informs and integers twice the normal width. · v3, the most secure, requires you to select one of the following authentication levels: auth--Enables the Message Digest 5 (MD5) and the Secure Hash Algorithm (SHA) packet authentication. noauth--Enables the noAuthNoPriv security level. This is the default if no keyword is specified. priv--Enables Data Encryption Standard (DES) packet encryption (also called privacy). (Optional) Enter read readview with a string (not to exceed 64 characters) that is the name of the view in which you can only view the contents of the agent. (Optional) Enter write writeview with a string (not to exceed 64 characters) that is the name of the view in which you enter data and configure the contents of the agent. (Optional) Enter notify notifyview with a string (not to exceed 64 characters) that is the name of the view in which you specify a notify, inform, or trap. (Optional) Enter access access-list with a string (not to exceed 64 characters) that is the name of the access list. snmp-server user username group-name {remote host [ Adds a new user for an SNMP group. udp-port port]} {v1 [access access-list] | v2c [access The username is the name of the user on the host that access-list] | v3 [encrypted] [access access-list] [auth connects to the agent. {md5 | sha} auth-password] } [priv {des | 3des | aes {128 | 192 | 256}} priv-password] The group-name is the name of the group to which the user Example: is associated. Enter remote to specify a remote SNMP entity to which Switch(config)# snmp-server user Pat public v2c the user belongs and the hostname or IP address of that entity with the optional UDP port number. The default is 162. Enter the SNMP version number (v1, v2c, or v3). If you enter v3, you have these additional options: · encrypted specifies that the password appears in encrypted format. This keyword is available only when the v3 keyword is specified. · auth is an authentication level setting session that can be either the HMAC-MD5-96 (md5) or the HMAC-SHA-96 (sha) authentication level and requires a password string auth-password (not to exceed 64 characters). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 790 Network Management Configuring SNMP Notifications Command or Action Step 5 end Example: Switch(config)# end Purpose If you enter v3 you can also configure a private (priv) encryption algorithm and password string priv-password using the following keywords (not to exceed 64 characters): · priv specifies the User-based Security Model (USM). · des specifies the use of the 56-bit DES algorithm. · 3des specifies the use of the 168-bit DES algorithm. · aes specifies the use of the DES algorithm. You must select either 128-bit, 192-bit, or 256-bit encryption. (Optional) Enter access access-list with a string (not to exceed 64 characters) that is the name of the access list. Returns to privileged EXEC mode. Configuring SNMP Notifications A trap manager is a management station that receives and processes traps. Traps are system alerts that the switch generates when certain events occur. By default, no trap manager is defined, and no traps are sent. Switches running this Cisco IOS release can have an unlimited number of trap managers. Note Many commands use the word traps in the command syntax. Unless there is an option in the command to select either traps or informs, the keyword traps refers to traps, informs, or both. Use the snmp-server host global configuration command to specify whether to send SNMP notifications as traps or informs. You can use the snmp-server host global configuration command for a specific host to receive the notification types listed in the following table. You can enable any or all of these traps and configure a trap manager to receive them. Table 71: Device Notification Types Notification Type Keyword bridge cluster config copy-config cpu threshold entity Description Generates STP bridge MIB traps. Generates a trap when the cluster configuration changes. Generates a trap for SNMP configuration changes. Generates a trap for SNMP copy configuration changes. Allow CPU-related traps. Generates a trap for SNMP entity changes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 791 Configuring SNMP Notifications Network Management Notification Type Keyword envmon flash fru-ctrl hsrp ipmulticast mac-notification ospf pim port-security snmp storm-control stpx syslog tty vlan-membership vlancreate vlandelete Description Generates environmental monitor traps. You can enable any or all of these environmental traps: fan, shutdown, status, supply, temperature. Generates SNMP FLASH notifications. In a switch stack, you can optionally enable notification for flash insertion or removal, which would cause a trap to be issued whenever a switch in the stack is removed or inserted (physical removal, power cycle, or reload). Generates entity field-replaceable unit (FRU) control traps. In the switch stack, this trap refers to the insertion or removal of a switch in the stack. Generates a trap for Hot Standby Router Protocol (HSRP) changes. Generates a trap for IP multicast routing changes. Generates a trap for MAC address notifications. Generates a trap for Open Shortest Path First (OSPF) changes. You can enable any or all of these traps: Cisco specific, errors, link-state advertisement, rate limit, retransmit, and state changes. Generates a trap for Protocol-Independent Multicast (PIM) changes. You can enable any or all of these traps: invalid PIM messages, neighbor changes, and rendezvous point (RP)-mapping changes. Generates SNMP port security traps. You can also set a maximum trap rate per second. The range is from 0 to 1000; the default is 0, which means that there is no rate limit. Note When you configure a trap by using the notification type port-security, configure the port security trap first, and then configure the port security trap rate: 1. snmp-server enable traps port-security 2. snmp-server enable traps port-security trap-rate rate Generates a trap for SNMP-type notifications for authentication, cold start, warm start, link up or link down. Generates a trap for SNMP storm-control. You can also set a maximum trap rate per minute. The range is from 0 to 1000; the default is 0 (no limit is imposed; a trap is sent at every occurrence). Generates SNMP STP Extended MIB traps. Generates SNMP syslog traps. Generates a trap for TCP connections. This trap is enabled by default. Generates a trap for SNMP VLAN membership changes. Generates SNMP VLAN created traps. Generates SNMP VLAN deleted traps. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 792 Network Management Configuring SNMP Notifications Notification Type Keyword vtp Description Generates a trap for VLAN Trunking Protocol (VTP) changes. Beginning in privileged EXEC mode, follow these steps to configure the switch to send traps or informs to a host. SUMMARY STEPS 1. configure terminal 2. snmp-server engineID remote ip-address engineid-string 3. snmp-server user username group-name {remote host [ udp-port port]} {v1 [access access-list] | v2c [access access-list] | v3 [encrypted] [access access-list] [auth {md5 | sha} auth-password] } 4. snmp-server group group-name {v1 | v2c | v3 {auth | noauth | priv}} [read readview] [write writeview] [notify notifyview] [access access-list] 5. snmp-server host host-addr [informs | traps] [version {1 | 2c | 3 {auth | noauth | priv}}] community-string [notification-type] 6. snmp-server enable traps notification-types 7. snmp-server trap-source interface-id 8. snmp-server queue-length length 9. snmp-server trap-timeout seconds 10. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 snmp-server engineID remote ip-address engineid-string Specifies the engine ID for the remote host. Example: Switch(config)# snmp-server engineID remote 192.180.1.27 00000063000100a1c0b4011b snmp-server user username group-name {remote host Configures an SNMP user to be associated with the remote [ udp-port port]} {v1 [access access-list] | v2c host created in Step 2. [access access-list] | v3 [encrypted] [access Note You cannot configure a remote user for an access-list] [auth {md5 | sha} auth-password] } address without first configuring the engine ID Example: for the remote host. Otherwise, you receive an Switch(config)# snmp-server user Pat public v2c error message, and the command is not executed. snmp-server group group-name {v1 | v2c | v3 {auth Configures an SNMP group. | noauth | priv}} [read readview] [write writeview] [notify notifyview] [access access-list] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 793 Configuring SNMP Notifications Network Management Step 5 Step 6 Step 7 Command or Action Example: Switch(config)# snmp-server group public v2c access lmnop Purpose snmp-server host host-addr [informs | traps] [version Specifies the recipient of an SNMP trap operation. {1 | 2c | 3 {auth | noauth | priv}}] community-string For host-addr, specify the name or Internet address of the [notification-type] host (the targeted recipient). Example: (Optional) Specify traps (the default) to send SNMP traps Switch(config)# snmp-server host 203.0.113.1 comaccess snmp to the host. Specify informs to send SNMP informs to the host. (Optional) Specify the SNMP version (1, 2c, or 3). SNMPv1 does not support informs. (Optional) For Version 3, select authentication level auth, noauth, or priv. For community-string, when version 1 or version 2c is specified, enter the password-like community string sent with the notification operation. When version 3 is specified, enter the SNMPv3 username. The @ symbol is used for delimiting the context information. Avoid using the @ symbol as part of the SNMP community string when configuring this command. (Optional) For notification-type, use the keywords listed in the table above. If no type is specified, all notifications are sent. snmp-server enable traps notification-types Example: Switch(config)# snmp-server enable traps snmp Enables the switch to send traps or informs and specifies the type of notifications to be sent. For a list of notification types, see the table above, or enter snmp-server enable traps ? To enable multiple types of traps, you must enter a separate snmp-server enable traps command for each trap type. Note When you configure a trap by using the notification type port-security, configure the port security trap first, and then configure the port security trap rate: a. snmp-server enable traps port-security b. snmp-server enable traps port-security trap-rate rate snmp-server trap-source interface-id Example: Switch(config)# snmp-server trap-source GigabitEthernet1/0/1 (Optional) Specifies the source interface, which provides the IP address for the trap message. This command also sets the source IP address for informs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 794 Network Management Setting the Agent Contact and Location Information Step 8 Step 9 Step 10 Command or Action snmp-server queue-length length Example: Switch(config)# snmp-server queue-length 20 snmp-server trap-timeout seconds Example: Switch(config)# snmp-server trap-timeout 60 end Example: Switch(config)# end Purpose (Optional) Establishes the message queue length for each trap host. The range is 1 to 1000; the default is 10. (Optional) Defines how often to resend trap messages. The range is 1 to 1000; the default is 30 seconds. Returns to privileged EXEC mode. What to do next The snmp-server host command specifies which hosts receive the notifications. The snmp-server enable trap command globally enables the method for the specified notification (for traps and informs). To enable a host to receive an inform, you must configure an snmp-server host informs command for the host and globally enable informs by using the snmp-server enable traps command. To remove the specified host from receiving traps, use the no snmp-server host host global configuration command. The no snmp-server host command with no keywords disables traps, but not informs, to the host. To disable informs, use the no snmp-server host informs global configuration command. To disable a specific trap type, use the no snmp-server enable traps notification-types global configuration command. Setting the Agent Contact and Location Information Beginning in privileged EXEC mode, follow these steps to set the system contact and location of the SNMP agent so that these descriptions can be accessed through the configuration file. SUMMARY STEPS 1. configure terminal 2. snmp-server contact text 3. snmp-server location text 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 795 Limiting TFTP Servers Used Through SNMP Network Management Step 2 Step 3 Step 4 Command or Action Purpose snmp-server contact text Sets the system contact string. Example: Switch(config)# snmp-server contact Dial System Operator at beeper 21555 snmp-server location text Example: Switch(config)# snmp-server location Building 3/Room 222 Sets the system location string. end Example: Returns to privileged EXEC mode. Switch(config)# end Limiting TFTP Servers Used Through SNMP Beginning in privileged EXEC mode, follow these steps to limit the TFTP servers used for saving and loading configuration files through SNMP to the servers specified in an access list. SUMMARY STEPS 1. configure terminal 2. snmp-server tftp-server-list access-list-number 3. access-list access-list-number {deny | permit} source [source-wildcard] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 snmp-server tftp-server-list access-list-number Example: Switch(config)# snmp-server tftp-server-list 44 Limits the TFTP servers used for configuration file copies through SNMP to the servers in the access list. For access-list-number, enter an IP standard access list numbered from 1 to 99 and 1300 to 1999. access-list access-list-number {deny | permit} source [source-wildcard] Example: Switch(config)# access-list 44 permit 10.1.1.2 Creates a standard access list, repeating the command as many times as necessary. For access-list-number, enter the access list number specified in Step 2. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 796 Network Management Configuring Trap Flags for SNMP Command or Action Step 4 end Example: Switch(config)# end Purpose The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. For source, enter the IP address of the TFTP servers that can access the switch. (Optional) For source-wildcard, enter the wildcard bits, in dotted decimal notation, to be applied to the source. Place ones in the bit positions that you want to ignore. The access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode. Configuring Trap Flags for SNMP SUMMARY STEPS 1. configure terminal 2. trapflags ap { interfaceup | register} 3. trapflags client {dot11 | excluded} 4. trapflags dot11-security {ids-sig-attack | wep-decrypt-error} 5. trapflags mesh 6. trapflags rogueap 7. trapflags rrm-params {channels | tx-power} 8. trapflags rrm-profile {coverage | interference | load | noise} 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 trapflags ap { interfaceup | register} Example: Switch(config)# trapflags ap interfaceup Enables sending AP-related traps. Use the no form of the command to disable the trap flags. · interfaceup Enables trap when a Cisco AP interface (A or B) comes up. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 797 Configuring Trap Flags for SNMP Network Management Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose · register Enables trap when a Cisco AP registers with a Cisco switch. trapflags client {dot11 | excluded} Example: Switch(config)# trapflags client excluded Enables sending client-related dot11 traps. Use the no form of the command to disable the trap flags. · dot11 Enables Dot11 traps for clients. · excluded Enables excluded traps for clients. trapflags dot11-security {ids-sig-attack | wep-decrypt-error} Example: Switch(config)# trapflags dot11-security wep-decrypt-error trapflags mesh Example: Enables sending 802.11 security-related traps. Use the no form of the command to disable the trap flags. · ids-sig-attack Enables IDS signature attack traps. · wep-decrypt-error Enables traps for WEP decrypt error for clients. Enables trap for the mesh. Use the no form of the command to disable the trap flags. Switch(config)# trapflags mesh trapflags rogueap Example: Enables trap for rogue AP detection. Use the no form of the command to disable the trap flags. Switch(config)# trapflags rogueap trapflags rrm-params {channels | tx-power} Example: Switch(config)# trapflags rrm-params tx-power Enables sending RRM-parameter update-related traps. Use the no form of the command to disable the trap flags. · channels Enables trap when RF Manager automatically changes a channel number for the Cisco AP interface. · tx-power Enables the trap when RF Manager automatically changes Tx-Power level for the Cisco AP interface. trapflags rrm-profile {coverage | interference | load | Enables sending RRM-profile-related traps. Use the no noise} form of the command to disable the trap flags. Example: Switch(config)# trapflags rrm-profile interference · coverage Enables the trap when the coverage profile maintained by RF Manager fails. · interference Enables the trap when the interference profile maintained by RF Manager fails. · load Enables trap when the load profile maintained by RF Manager fails. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 798 Network Management Enabling SNMP Wireless Trap Notification Command or Action Step 9 end Example: Switch(config)# end Purpose · noise Enables trap when the noise profile maintained by RF Manager fails. Returns to privileged EXEC mode. Enabling SNMP Wireless Trap Notification SUMMARY STEPS 1. configure terminal 2. snmp-server enable traps wireless [AP | RRM | bsn80211SecurityTrap | bsnAPParamUpdate | bsnAPProfile | bsnAccessPoint | bsnMobileStation | bsnRogue | client | mfp | rogue] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 snmp-server enable traps wireless [AP | RRM | Enables SNMP wireless trap notification. bsn80211SecurityTrap | bsnAPParamUpdate | bsnAPProfile | bsnAccessPoint | bsnMobileStation · AP Enables access point traps. | bsnRogue | client | mfp | rogue] · RRM Enables RRM traps. Example: Switch(config)# snmp-server enable traps wireless AP · bsn80211SecurityTrap Enables the security-related trap. · bsnAPParamUpdate Enables the trap for AP parameters that get updated. · bsnAPProfile Enables BSN AP profile traps. · bsnAccessPoint Enables BSN access point traps. · bsnMobileStation Controls wireless client traps. · bsnRogue Enables BSN rogue-related traps. · client Enables client traps. · mfp Enables MFP traps. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 799 Monitoring SNMP Status Network Management Command or Action Step 3 end Example: Switch(config)# end Purpose · rogue Enables rogue-related traps. Returns to privileged EXEC mode. Monitoring SNMP Status To display SNMP input and output statistics, including the number of illegal community string entries, errors, and requested variables, use the show snmp privileged EXEC command. You also can use the other privileged EXEC commands listed in the table to display SNMP information. Table 72: Commands for Displaying SNMP Information Command show snmp show snmp engineID show snmp group show snmp pending show snmp sessions show snmp user Purpose Displays SNMP statistics. Displays information on the local SNMP engine and all remote engines that have been configured on the device. Displays information on each SNMP group on the network. Displays information on pending SNMP requests. Displays information on the current SNMP sessions. Displays information on each SNMP user name in the SNMP users table. Note You must use this command to display SNMPv3 configuration information for auth | noauth | priv mode. This information is not displayed in the show running-config output. SNMP Examples This example shows how to enable all versions of SNMP. The configuration permits any SNMP manager to access all objects with read-only permissions using the community string public. This configuration does not cause the switch to send any traps. Switch(config)# snmp-server community public Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 800 Network Management SNMP Examples This example shows how to permit any SNMP manager to access all objects with read-only permission using the community string public. The switch also sends VTP traps to the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2C. The community string public is sent with the traps. Switch(config)# snmp-server community public Switch(config)# snmp-server enable traps vtp Switch(config)# snmp-server host 192.180.1.27 version 2c public Switch(config)# snmp-server host 192.180.1.111 version 1 public Switch(config)# snmp-server host 192.180.1.33 public This example shows how to allow read-only access for all objects to members of access list 4 that use the comaccess community string. No other SNMP managers have access to any objects. SNMP Authentication Failure traps are sent by SNMPv2C to the host cisco.com using the community string public. Switch(config)# snmp-server community comaccess ro 4 Switch(config)# snmp-server enable traps snmp authentication Switch(config)# snmp-server host cisco.com version 2c public This example shows how to send Entity MIB traps to the host cisco.com. The community string is restricted. The first line enables the switch to send Entity MIB traps in addition to any traps previously enabled. The second line specifies the destination of these traps and overwrites any previous snmp-server host commands for the host cisco.com. Switch(config)# snmp-server enable traps entity Switch(config)# snmp-server host cisco.com restricted entity This example shows how to enable the switch to send all traps to the host myhost.cisco.com using the community string public: Switch(config)# snmp-server enable traps Switch(config)# snmp-server host myhost.cisco.com public This example shows how to associate a user with a remote host and to send auth (authNoPriv) authentication-level informs when the user enters global configuration mode: Switch(config)# snmp-server engineID remote 192.180.1.27 00000063000100a1c0b4011b Switch(config)# snmp-server group authgroup v3 auth Switch(config)# snmp-server user authuser authgroup remote 192.180.1.27 v3 auth md5 mypassword Switch(config)# snmp-server user authuser authgroup v3 auth md5 mypassword Switch(config)# snmp-server host 192.180.1.27 informs version 3 auth authuser config Switch(config)# snmp-server enable traps Switch(config)# snmp-server inform retries 0 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 801 SNMP Examples Network Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 802 5 3 C H A P T E R Configuring Service Level Agreements · Finding Feature Information, on page 803 · Restrictions on SLAs, on page 803 · Information About SLAs, on page 804 · Configuration Guidelines, on page 808 · How to Configure IP SLAs Operations, on page 809 · Monitoring IP SLA Operations, on page 820 · Monitoring IP SLA Operation Examples, on page 821 · Feature History and Information for Service Level Agreements, on page 822 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions on SLAs This section lists the restrictions on SLAs. The following are restrictions on IP SLAs network performance measurement: · The switch does not support VoIP service levels using the gatekeeper registration delay operations measurements. · Only a Cisco IOS device can be a source for a destination IP SLAs responder. · You cannot configure the IP SLAs responder on non-Cisco devices and Cisco IOS IP SLAs can send operational packets only to services native to those devices. Related Topics Implementing IP SLA Network Performance Measurement, on page 810 Network Performance Measurement with Cisco IOS IP SLAs, on page 805 IP SLA Responder and IP SLA Control Protocol, on page 805 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 803 Information About SLAs Network Management Information About SLAs Cisco IOS IP Service Level Agreements (SLAs) Cisco IOS IP SLAs send data across the network to measure performance between multiple network locations or across multiple network paths. They simulate network data and IP services and collect network performance information in real time. Cisco IOS IP SLAs generate and analyze traffic either between Cisco IOS devices or from a Cisco IOS device to a remote IP device such as a network application server. Measurements provided by the various Cisco IOS IP SLA operations can be used for troubleshooting, for problem analysis, and for designing network topologies. Depending on the specific Cisco IOS IP SLA operations, various network performance statistics are monitored within the Cisco device and stored in both command-line interface (CLI) and Simple Network Management Protocol (SNMP) MIBs. IP SLA packets have configurable IP and application layer options such as source and destination IP address, User Datagram Protocol (UDP)/TCP port numbers, a type of service (ToS) byte (including Differentiated Services Code Point [DSCP] and IP Prefix bits), Virtual Private Network (VPN) routing/forwarding instance (VRF), and URL web address. Because Cisco IP SLAs are Layer 2 transport independent, you can configure end-to-end operations over disparate networks to best reflect the metrics that an end user is likely to experience. IP SLAs collect a unique subset of the following performance metrics: · Delay (both round-trip and one-way) · Jitter (directional) · Packet loss (directional) · Packet sequencing (packet ordering) · Path (per hop) · Connectivity (directional) · Server or website download time Because Cisco IOS IP SLAs is SNMP-accessible, it can also be used by performance-monitoring applications like Cisco Prime Internetwork Performance Monitor (IPM) and other third-party Cisco partner performance management products. Using IP SLAs can provide the following benefits: · Service-level agreement monitoring, measurement, and verification. · Network performance monitoring · Measurement of jitter, latency, or packet loss in the network. · Continuous, reliable, and predictable measurements. · IP service network health assessment to verify that the existing QoS is sufficient for new IP services. · Edge-to-edge network availability monitoring for proactive verification and connectivity testing of network resources (for example, shows the network availability of an NFS server used to store business critical data from a remote site). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 804 Network Management Network Performance Measurement with Cisco IOS IP SLAs · Network operation troubleshooting by providing consistent, reliable measurement that immediately identifies problems and saves troubleshooting time. · Multiprotocol Label Switching (MPLS) performance monitoring and network verification (if the switch supports MPLS). Network Performance Measurement with Cisco IOS IP SLAs You can use IP SLAs to monitor the performance between any area in the network--core, distribution, and edge--without deploying a physical probe. It uses generated traffic to measure network performance between two networking devices. Figure 54: Cisco IOS IP SLAs Operation The following figure shows how IP SLAs begin when the source device sends a generated packet to the destination device. After the destination device receives the packet, depending on the type of IP SLAs operation, it responds with time-stamp information for the source to make the calculation on performance metrics. An IP SLAs operation performs a network measurement from the source device to a destination in the network using a specific protocol such as UDP. Related Topics Implementing IP SLA Network Performance Measurement, on page 810 Restrictions on SLAs, on page 803 IP SLA Responder and IP SLA Control Protocol The IP SLA responder is a component embedded in the destination Cisco device that allows the system to anticipate and respond to IP SLA request packets. The responder provides accurate measurements without the need for dedicated probes. The responder uses the Cisco IOS IP SLA Control Protocol to provide a mechanism through which it can be notified on which port it should listen and respond. Note The IP SLA responder can be a Cisco IOS Layer 2, responder-configurable switch. The responder does not need to support full IP SLA functionality. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 805 Response Time Computation for IP SLAs Network Management The following figure shows where the Cisco IOS IP SLA responder fits in the IP network. The responder listens on a specific port for control protocol messages sent by an IP SLA operation. Upon receipt of the control message, it enables the specified UDP or TCP port for the specified duration. During this time, the responder accepts the requests and responds to them. It disables the port after it responds to the IP SLA packet, or when the specified time expires. MD5 authentication for control messages is available for added security. You do not need to enable the responder on the destination device for all IP SLA operations. For example, a responder is not required for services that are already provided by the destination router (such as Telnet or HTTP). Related Topics Restrictions on SLAs, on page 803 Response Time Computation for IP SLAs Switches, controllers, and routers can take tens of milliseconds to process incoming packets due to other high priority processes. This delay affects the response times because the test-packet reply might be in a queue while waiting to be processed. In this situation, the response times would not accurately represent true network delays. IP SLAs minimize these processing delays on the source device as well as on the target device (if the responder is being used) to determine true round-trip times. IP SLA test packets use time stamping to minimize the processing delays. When the IP SLA responder is enabled, it allows the target device to take time stamps when the packet arrives on the interface at interrupt level and again just as it is leaving, eliminating the processing time. This time stamping is made with a granularity of sub-milliseconds (ms). Figure 55: Cisco IOS IP SLA Responder Time Stamping The following figure demonstrates how the responder works. Four time stamps are taken to make the calculation for round-trip time. At the target router, with the responder functionality enabled, time stamp 2 (TS2) is subtracted from time stamp 3 (TS3) to produce the time spent processing the test packet as represented by delta. This delta value is then subtracted from the overall round-trip time. Notice that the same principle is applied by IP SLAs on the source router where the incoming time stamp 4 (TS4) is also taken at the interrupt leveltoallowforgreateraccuracy. An additional benefit of the two time stamps at the target device is the ability to track one-way delay, jitter, and directional packet loss. Because much network behavior is asynchronous, it is critical to have these statistics. However, to capture one-way delay measurements, you must configure both the source router and target router with Network Time Protocol (NTP) so that the source and target are synchronized to the same clock source. One-way jitter measurements do not require clock synchronization. IP SLAs Operation Scheduling When you configure an IP SLAs operation, you must schedule the operation to begin capturing statistics and collecting error information. You can schedule an operation to start immediately or to start at a certain month, day, and hour. You can use the pending option to set the operation to start at a later time. The pending option is an internal state of the operation that is visible through SNMP. The pending state is also used when an Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 806 Network Management IP SLA Operation Threshold Monitoring operation is a reaction (threshold) operation waiting to be triggered. You can schedule a single IP SLAs operation or a group of operations at one time. You can schedule several IP SLAs operations by using a single command through the Cisco IOS CLI or the CISCO RTTMON-MIB. Scheduling the operations to run at evenly distributed times allows you to control the amount of IP SLAs monitoring traffic. This distribution of IP SLA operations helps minimize the CPU utilization and thus improves network scalability. For more details about the IP SLA multi-operations scheduling functionality, see the "IP SLAs--Multiple Operation Scheduling" chapter of the Cisco IOS IP SLAs Configuration Guide. IP SLA Operation Threshold Monitoring To support successful service level agreement monitoring, you must have mechanisms that notify you immediately of any possible violation. IP SLAs can send SNMP traps that are triggered by events such as the following: · Connection loss · Timeout · Round-trip time threshold · Average jitter threshold · One-way packet loss · One-way jitter · One-way mean opinion score (MOS) · One-way latency An IP SLA threshold violation can also trigger another IP SLA operation for further analysis. For example, the frequency could be increased or an Internet Control Message Protocol (ICMP) path echo or ICMP path jitter operation could be initiated for troubleshooting. ICMP Echo The ICMP echo operation measures the end-to-end response time between a Cisco device and any other device that uses IP. The response time is computed by measuring the time it takes to send an ICMP echo request message to a destination and receive an ICMP echo reply. Many customers use IP SLA ICMP-based operations, in-house ping testing, or ping-based dedicated probes to measure this response time. The IP SLA ICMP echo operation conforms to the same specifications as ICMP ping testing, and both methods result in the same response times. Related Topics Analyzing IP Service Levels by Using the ICMP Echo Operation, on page 817 UDP Jitter Jitter is a simple term that describes interpacket delay variance. When multiple packets are sent consecutively at an interval of 10 ms from source to destination, the destination should receive them 10 ms apart (if the network is behaving correctly). However, if there are delays in the network (such as queuing, arriving through alternate routes, and so on), the time interval between packet arrivals might be more or less than 10 ms. A Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 807 Configuration Guidelines Network Management positive jitter value indicates that the packets arrived more than 10 ms apart. A negative jitter value indicates that the packets arrived less than 10 ms apart. If the packets arrive 12 ms apart, the positive jitter is 2 ms; if the packets arrive 8 ms apart, the negative jitter is 2 ms. For delay-sensitive networks, positive jitter values are undesirable, and a jitter value of 0 is ideal. In addition to monitoring jitter, the IP SLA UDP jitter operation can be used as a multipurpose data gathering operation. The packets generated by IP SLAs carry sequence information and time stamps from the source and operational target that include packet sending and receiving data. Based on this data, UDP jitter operations measure the following: · Per-direction jitter (source to destination and destination to source) · Per-direction packet-loss · Per-direction delay (one-way delay) · Round-trip delay (average round-trip time) Because the paths for the sending and receiving of data can be different (asymmetric), you can use the per-direction data to more readily identify where congestion or other problems are occurring in the network. The UDP jitter operation generates synthetic (simulated) UDP traffic and sends a number of UDP packets, each of a specified size, sent a specified number of milliseconds apart, from a source router to a target router, at a given frequency. By default, ten packet-frames, each with a payload size of 10 bytes are generated every 10 ms, and the operation is repeated every 60 seconds. You can configure each of these parameters to best simulate the IP service you want to provide. To provide accurate one-way delay (latency) measurements, time synchronization (as provided by NTP) is required between the source and the target device. Time synchronization is not required for the one-way jitter and packet loss measurements. If the time is not synchronized between the source and target devices, one-way jitter and packet loss data is returned, but values of 0 are returned for the one-way delay measurements provided by the UDP jitter operation. Related Topics Analyzing IP Service Levels by Using the UDP Jitter Operation, on page 814 Configuration Guidelines For information on the IP SLA commands, see the Cisco IOS IP SLAs Command Reference, Release 12.4T command reference. For detailed descriptions and configuration procedures, see the Cisco IOS IP SLAs Configuration Guide, Release 12.4TL. Not all of the IP SLA commands or operations described in the referenced guide are supported on the switch. The switch supports IP service level analysis by using UDP jitter, UDP echo, HTTP, TCP connect, ICMP echo, ICMP path echo, ICMP path jitter, FTP, DNS, and DHCP, as well as multiple operation scheduling and proactive threshold monitoring. It does not support VoIP service levels using the gatekeeper registration delay operations measurements. Before configuring any IP SLAs application, you can use the show ip sla application privileged EXEC command to verify that the operation type is supported on your software image. This is an example of the output from the command: Switch# show ip sla application Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 808 Network Management How to Configure IP SLAs Operations IP Service Level Agreements Version: Round Trip Time MIB 2.2.0, Infrastructure Engine-III Supported Operation Types: icmpEcho, path-echo, path-jitter, udpEcho, tcpConnect, http dns, udpJitter, dhcp, ftp, udpApp, wspApp Supported Features: IPSLAs Event Publisher IP SLAs low memory water mark: 33299323 Estimated system max number of entries: 24389 Estimated number of configurable operations: 24389 Number of Entries configured : 0 Number of active Entries :0 Number of pending Entries :0 Number of inactive Entries : 0 Time of last change in whole IP SLAs: *13:04:37.668 UTC Wed Dec 19 2012 How to Configure IP SLAs Operations This section does not include configuration information for all available operations as the configuration information details are included in the Cisco IOS IP SLAs Configuration Guide. It does include several operations as examples, including configuring the responder, configuring a UDP jitter operation, which requires a responder, and configuring an ICMP echo operation, which does not require a responder. For details about configuring other operations, see the Cisco IOS IP SLAs Configuration Guide. Configuring the IP SLA Responder The IP SLA responder is available only on Cisco IOS software-based devices, including some Layer 2 switches that do not support full IP SLA functionality. Beginning in privileged EXEC mode, follow these steps to configure the IP SLA responder on the target device (the operational target): SUMMARY STEPS 1. configure terminal 2. ip sla responder {tcp-connect | udp-echo} ipaddress ip-address port port-number 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 809 Implementing IP SLA Network Performance Measurement Network Management Step 2 Command or Action Purpose ip sla responder {tcp-connect | udp-echo} ipaddress Configures the switch as an IP SLA responder. ip-address port port-number The keywords have these meanings: Example: · tcp-connect--Enables the responder for TCP connect Switch(config)# ip sla responder udp-echo operations. 172.29.139.134 5000 · udp-echo--Enables the responder for User Datagram Protocol (UDP) echo or jitter operations. · ipaddress ip-address--Enter the destination IP address. · port port-number--Enter the destination port number. Note The IP address and port number must match those configured on the source device for the IP SLA operation. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. UDP Jitter Example This example shows how to configure the device as a responder for the UDP jitter IP SLA operation in the next procedure: Switch(config)# ip sla responder udp-echo 172.29.139.134 5000 Implementing IP SLA Network Performance Measurement Beginning in privileged EXEC mode, follow these steps to implement IP SLA network performance measurement on your switch: Before you begin Use the show ip sla application privileged EXEC command to verify that the desired operation type is supported on your software image. SUMMARY STEPS 1. configure terminal 2. ip sla operation-number Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 810 Network Management Implementing IP SLA Network Performance Measurement 3. udp-jitter {destination-ip-address | destination-hostname} destination-port [source-ip {ip-address | hostname}] [source-port port-number] [control {enable | disable}] [num-packets number-of-packets] [interval interpacket-interval] 4. frequency seconds 5. threshold milliseconds 6. exit 7. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring] 8. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip sla operation-number Example: Switch(config)# ip sla 10 Creates an IP SLA operation, and enters IP SLA configuration mode. Step 3 udp-jitter {destination-ip-address | destination-hostname} Configures the IP SLA operation as the operation type of destination-port [source-ip {ip-address | hostname}] your choice (a UDP jitter operation is used in the example), [source-port port-number] [control {enable | disable}] and enters its configuration mode (UDP jitter configuration [num-packets number-of-packets] [interval mode is used in the example). interpacket-interval] · destination-ip-address | Example: destination-hostname--Specifies the destination IP address or hostname. Switch(config-ip-sla)# udp-jitter 172.29.139.134 5000 · destination-port--Specifies the destination port number in the range from 1 to 65535. · (Optional) source-ip {ip-address | hostname}--Specifies the source IP address or hostname. When a source IP address or hostname is not specified, IP SLA chooses the IP address nearest to the destination · (Optional) source-port port-number--Specifies the source port number in the range from 1 to 65535. When a port number is not specified, IP SLA chooses an available port. · (Optional) control--Enables or disables sending of IP SLA control messages to the IP SLA responder. By default, IP SLA control messages are sent to the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 811 Implementing IP SLA Network Performance Measurement Network Management Command or Action Step 4 frequency seconds Example: Switch(config-ip-sla-jitter)# frequency 45 Purpose destination device to establish a connection with the IP SLA responder · (Optional) num-packets number-of-packets--Enters the number of packets to be generated. The range is 1 to 6000; the default is 10. · (Optional) interval inter-packet-interval--Enters the interval between sending packets in milliseconds. The range is 1 to 6000; the default value is 20 ms. (Optional) Configures options for the SLA operation. This example sets the rate at which a specified IP SLA operation repeats. The range is from 1 to 604800 seconds; the default is 60 seconds. Step 5 threshold milliseconds Example: Switch(config-ip-sla-jitter)# threshold 200 (Optional) Configures threshold conditions. This example sets the threshold of the specified IP SLA operation to 200. The range is from 0 to 60000 milliseconds. Step 6 exit Example: Switch(config-ip-sla-jitter)# exit Exits the SLA operation configuration mode (UDP jitter configuration mode in this example), and returns to global configuration mode. Step 7 ip sla schedule operation-number [life {forever | seconds}] Configures the scheduling parameters for an individual IP [start-time {hh:mm [:ss] [month day | day month] | pending SLA operation. | now | after hh:mm:ss] [ageout seconds] [recurring] · operation-number--Enter the RTR entry number. Example: · (Optional) life--Sets the operation to run indefinitely Switch(config)# ip sla schedule 10 start-time now life forever (forever) or for a specific number of seconds. The range is from 0 to 2147483647. The default is 3600 seconds (1 hour). · (Optional) start-time--Enters the time for the operation to begin collecting information: To start at a specific time, enter the hour, minute, second (in 24-hour notation), and day of the month. If no month is entered, the default is the current month. Enter pending to select no information collection until a start time is selected. Enter now to start the operation immediately. Enter after hh:mm:ss to show that the operation should start after the entered time has elapsed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 812 Network Management Implementing IP SLA Network Performance Measurement Command or Action Step 8 end Example: Switch(config)# end Purpose · (Optional) ageout seconds--Enter the number of seconds to keep the operation in memory when it is not actively collecting information. The range is 0 to 2073600 seconds, the default is 0 seconds (never ages out). · (Optional) recurring--Set the operation to automatically run every day. Returns to privileged EXEC mode. UDP Jitter Configuration This example shows how to configure a UDP jitter IP SLA operation: Switch(config)# ip sla 10 Switch(config-ip-sla)# udp-jitter 172.29.139.134 5000 Switch(config-ip-sla-jitter)# frequency 30 Switch(config-ip-sla-jitter)# exit Switch(config)# ip sla schedule 5 start-time now life forever Switch(config)# end Switch# show ip sla configuration 10 IP SLAs, Infrastructure Engine-II. Entry number: 10 Owner: Tag: Type of operation to perform: udp-jitter Target address/Source address: 1.1.1.1/0.0.0.0 Target port/Source port: 2/0 Request size (ARR data portion): 32 Operation timeout (milliseconds): 5000 Packet Interval (milliseconds)/Number of packets: 20/10 Type Of Service parameters: 0x0 Verify data: No Vrf Name: Control Packets: enabled Schedule: Operation frequency (seconds): 30 Next Scheduled Start Time: Pending trigger Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): 3600 Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): notInService Threshold (milliseconds): 5000 Distribution Statistics: Number of statistic hours kept: 2 Number of statistic distribution buckets kept: 1 Statistic distribution interval (milliseconds): 20 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 813 Analyzing IP Service Levels by Using the UDP Jitter Operation Network Management Enhanced History: Related Topics Network Performance Measurement with Cisco IOS IP SLAs, on page 805 Restrictions on SLAs, on page 803 Analyzing IP Service Levels by Using the UDP Jitter Operation Beginning in privileged EXEC mode, follow these steps to configure a UDP jitter operation on the source device: Before you begin You must enable the IP SLA responder on the target device (the operational target) to configure a UDP jitter operation on the source device. SUMMARY STEPS 1. configure terminal 2. ip sla operation-number 3. udp-jitter {destination-ip-address | destination-hostname} destination-port [source-ip {ip-address | hostname}] [source-port port-number] [control {enable | disable}] [num-packets number-of-packets] [interval interpacket-interval] 4. frequency seconds 5. exit 6. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring] 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip sla operation-number Example: Switch(config)# ip sla 10 Creates an IP SLA operation, and enters IP SLA configuration mode. Step 3 udp-jitter {destination-ip-address | destination-hostname} Configures the IP SLA operation as a UDP jitter operation, destination-port [source-ip {ip-address | hostname}] and enters UDP jitter configuration mode. [source-port port-number] [control {enable | disable}] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 814 Network Management Analyzing IP Service Levels by Using the UDP Jitter Operation Step 4 Command or Action Purpose [num-packets number-of-packets] [interval interpacket-interval] Example: Switch(config-ip-sla)# udp-jitter 172.29.139.134 5000 · destination-ip-address | destination-hostname--Specifies the destination IP address or hostname. · destination-port--Specifies the destination port number in the range from 1 to 65535. · (Optional) source-ip {ip-address | hostname}--Specifies the source IP address or hostname. When a source IP address or hostname is not specified, IP SLA chooses the IP address nearest to the destination. · (Optional) source-port port-number--Specifies the source port number in the range from 1 to 65535. When a port number is not specified, IP SLA chooses an available port. · (Optional) control--Enables or disables sending of IP SLA control messages to the IP SLA responder. By default, IP SLA control messages are sent to the destination device to establish a connection with the IP SLA responder. · (Optional) num-packets number-of-packets--Enters the number of packets to be generated. The range is 1 to 6000; the default is 10. · (Optional) interval inter-packet-interval--Enters the interval between sending packets in milliseconds. The range is 1 to 6000; the default value is 20 ms. frequency seconds Example: Switch(config-ip-sla-jitter)# frequency 45 (Optional) Sets the rate at which a specified IP SLA operation repeats. The range is from 1 to 604800 seconds; the default is 60 seconds. Step 5 exit Example: Switch(config-ip-sla-jitter)# exit Exits UDP jitter configuration mode, and returns to global configuration mode. Step 6 ip sla schedule operation-number [life {forever | seconds}] Configures the scheduling parameters for an individual IP [start-time {hh:mm [:ss] [month day | day month] | pending SLA operation. | now | after hh:mm:ss] [ageout seconds] [recurring] · operation-number--Enter the RTR entry number. Example: · (Optional) life--Sets the operation to run indefinitely Switch(config)# ip sla schedule 10 start-time now (forever) or for a specific number of seconds. The Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 815 Analyzing IP Service Levels by Using the UDP Jitter Operation Network Management Command or Action life forever Step 7 end Example: Switch(config)# end Purpose range is from 0 to 2147483647. The default is 3600 seconds (1 hour). · (Optional) start-time--Enters the time for the operation to begin collecting information: To start at a specific time, enter the hour, minute, second (in 24-hour notation), and day of the month. If no month is entered, the default is the current month. Enter pending to select no information collection until a start time is selected. Enter now to start the operation immediately. Enter after hh:mm:ss to show that the operation should start after the entered time has elapsed. · (Optional) ageout seconds--Enter the number of seconds to keep the operation in memory when it is not actively collecting information. The range is 0 to 2073600 seconds, the default is 0 seconds (never ages out). · (Optional) recurring--Set the operation to automatically run every day. Returns to privileged EXEC mode. Configuring a UDP Jitter IP SLA Operation This example shows how to configure a UDP jitter IP SLA operation: Switch(config)# ip sla 10 Switch(config-ip-sla)# udp-jitter 172.29.139.134 5000 Switch(config-ip-sla-jitter)# frequency 30 Switch(config-ip-sla-jitter)# exit Switch(config)# ip sla schedule 5 start-time now life forever Switch(config)# end Switch# show ip sla configuration 10 IP SLAs, Infrastructure Engine-II. Entry number: 10 Owner: Tag: Type of operation to perform: udp-jitter Target address/Source address: 1.1.1.1/0.0.0.0 Target port/Source port: 2/0 Request size (ARR data portion): 32 Operation timeout (milliseconds): 5000 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 816 Network Management Analyzing IP Service Levels by Using the ICMP Echo Operation Packet Interval (milliseconds)/Number of packets: 20/10 Type Of Service parameters: 0x0 Verify data: No Vrf Name: Control Packets: enabled Schedule: Operation frequency (seconds): 30 Next Scheduled Start Time: Pending trigger Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): 3600 Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): notInService Threshold (milliseconds): 5000 Distribution Statistics: Number of statistic hours kept: 2 Number of statistic distribution buckets kept: 1 Statistic distribution interval (milliseconds): 20 Enhanced History: Related Topics UDP Jitter, on page 807 Analyzing IP Service Levels by Using the ICMP Echo Operation Beginning in privileged EXEC mode, follow these steps to configure an ICMP echo operation on the source device: Before you begin This operation does not require the IP SLA responder to be enabled. SUMMARY STEPS 1. configure terminal 2. ip sla operation-number 3. icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-address | hostname} | source-interface interface-id] 4. frequency seconds 5. exit 6. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring] 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 817 Analyzing IP Service Levels by Using the ICMP Echo Operation Network Management Command or Action Switch# configure terminal Purpose Step 2 ip sla operation-number Example: Switch(config)# ip sla 10 Creates an IP SLA operation and enters IP SLA configuration mode. Step 3 Step 4 icmp-echo {destination-ip-address | destination-hostname} Configures the IP SLA operation as an ICMP Echo [source-ip {ip-address | hostname} | source-interface operation and enters ICMP echo configuration mode. interface-id] Example: · destination-ip-address | destination-hostname--Specifies the destination IP address or hostname. Switch(config-ip-sla)# icmp-echo 172.29.139.134 · (Optional) source-ip {ip-address | hostname}--Specifies the source IP address or hostname. When a source IP address or hostname is not specified, IP SLA chooses the IP address nearest to the destination. · (Optional) source-interface interface-id--Specifies the source interface for the operation. frequency seconds Example: Switch(config-ip-sla-echo)# frequency 30 (Optional) Sets the rate at which a specified IP SLA operation repeats. The range is from 1 to 604800 seconds; the default is 60 seconds. Step 5 exit Example: Switch(config-ip-sla-echo)# exit Exits UDP echo configuration mode, and returns to global configuration mode. Step 6 ip sla schedule operation-number [life {forever | seconds}] Configures the scheduling parameters for an individual IP [start-time {hh:mm [:ss] [month day | day month] | pending SLA operation. | now | after hh:mm:ss] [ageout seconds] [recurring] · operation-number--Enter the RTR entry number. Example: · (Optional) life--Sets the operation to run indefinitely Switch(config)# ip sla schedule 5 start-time now life forever (forever) or for a specific number of seconds. The range is from 0 to 2147483647. The default is 3600 seconds (1 hour) · (Optional) start-time--Enter the time for the operation to begin collecting information: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 818 Network Management Analyzing IP Service Levels by Using the ICMP Echo Operation Command or Action Step 7 end Example: Switch(config)# end Purpose To start at a specific time, enter the hour, minute, second (in 24-hour notation), and day of the month. If no month is entered, the default is the current month. Enter pending to select no information collection until a start time is selected. Enter now to start the operation immediately. Enter after hh:mm:ss to indicate that the operation should start after the entered time has elapsed. · (Optional) ageout seconds--Enter the number of seconds to keep the operation in memory when it is not actively collecting information. The range is 0 to 2073600 seconds; the default is 0 seconds (never ages out). · (Optional) recurring--Sets the operation to automatically run every day. Returns to privileged EXEC mode. Configuring an ICMP Echo IP SLA Operation This example shows how to configure an ICMP echo IP SLA operation: Switch(config)# ip sla 12 Switch(config-ip-sla)# icmp-echo 172.29.139.134 Switch(config-ip-sla-echo)# frequency 30 Switch(config-ip-sla-echo)# exit Switch(config)# ip sla schedule 5 start-time now life forever Switch(config)# end Switch# show ip sla configuration 22 IP SLAs, Infrastructure Engine-II. Entry number: 12 Owner: Tag: Type of operation to perform: echo Target address: 2.2.2.2 Source address: 0.0.0.0 Request size (ARR data portion): 28 Operation timeout (milliseconds): 5000 Type Of Service parameters: 0x0 Verify data: No Vrf Name: Schedule: Operation frequency (seconds): 60 Next Scheduled Start Time: Pending trigger Group Scheduled : FALSE Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 819 Monitoring IP SLA Operations Network Management Randomly Scheduled : FALSE Life (seconds): 3600 Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): notInService Threshold (milliseconds): 5000 Distribution Statistics: Number of statistic hours kept: 2 Number of statistic distribution buckets kept: 1 Statistic distribution interval (milliseconds): 20 History Statistics: Number of history Lives kept: 0 Number of history Buckets kept: 15 History Filter Type: None Enhanced History: Related Topics IP SLA Operation Threshold Monitoring, on page 807 Monitoring IP SLA Operations The following table describes the commands used to display IP SLA operation configurations and results: Table 73: Monitoring IP SLA Operations show ip sla application Displays global information about Cisco IOS IP SLAs. show ip sla authentication Displays IP SLA authentication information. show ip sla configuration [entry-number] Displays configuration values including all defaults for all IP SLA operations or a specific operation. show ip sla enhanced-history {collection-statistics Displays enhanced history statistics for collected | distribution statistics} [entry-number] history buckets or distribution statistics for all IP SLA operations or a specific operation. show ip sla ethernet-monitor configuration [entry-number] Displays IP SLA automatic Ethernet configuration. show ip sla group schedule [schedule-entry-number] Displays IP SLA group scheduling configuration and details. show ip sla history [entry-number | full | tabular] Displays history collected for all IP SLA operations. show ip sla mpls-lsp-monitor {collection-statistics Displays MPLS label switched path (LSP) Health | configuration | ldp operational-state | scan-queue Monitor operations. | summary [entry-number] | neighbors} show ip sla reaction-configuration [entry-number] Displays the configured proactive threshold monitoring settings for all IP SLA operations or a specific operation. show ip sla reaction-trigger [entry-number] Displays the reaction trigger information for all IP SLA operations or a specific operation. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 820 Network Management Monitoring IP SLA Operation Examples show ip sla responder Displays information about the IP SLA responder. show ip sla statistics [entry-number | aggregated | Displays current or aggregated operational status and details] statistics. Monitoring IP SLA Operation Examples The following example shows all IP SLAs by application: Switch# show ip sla application IP Service Level Agreements Version: Round Trip Time MIB 2.2.0, Infrastructure Engine-III Supported Operation Types: icmpEcho, path-echo, path-jitter, udpEcho, tcpConnect, http dns, udpJitter, dhcp, ftp, udpApp, wspApp Supported Features: IPSLAs Event Publisher IP SLAs low memory water mark: 33299323 Estimated system max number of entries: 24389 Estimated number of configurable operations: 24389 Number of Entries configured : 0 Number of active Entries :0 Number of pending Entries :0 Number of inactive Entries : 0 Time of last change in whole IP SLAs: *13:04:37.668 UTC Wed Dec 19 2012 The following example shows all IP SLA distribution statistics: Switch# show ip sla enhanced-history distribution-statistics Point by point Enhanced History Entry = Entry Number Int = Aggregation Interval BucI = Bucket Index StartT = Aggregation Start Time Pth = Path index Hop = Hop in path index Comps = Operations completed OvrTh = Operations completed over thresholds SumCmp = Sum of RTT (milliseconds) SumCmp2L = Sum of RTT squared low 32 bits (milliseconds) SumCmp2H = Sum of RTT squared high 32 bits (milliseconds) TMax = RTT maximum (milliseconds) TMin = RTT minimum (milliseconds) Entry Int BucI StartT Max TMin Pth Hop Comps OvrTh SumCmp SumCmp2L SumCmp2H T Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 821 Feature History and Information for Service Level Agreements Network Management Feature History and Information for Service Level Agreements Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 822 5 4 C H A P T E R Configuring SPAN and RSPAN · Finding Feature Information, on page 823 · Prerequisites for SPAN and RSPAN, on page 823 · Restrictions for SPAN and RSPAN, on page 824 · Information About SPAN and RSPAN, on page 825 · How to Configure SPAN and RSPAN, on page 837 · Monitoring SPAN and RSPAN Operations, on page 855 · SPAN and RSPAN Configuration Examples, on page 855 · Additional References, on page 858 · Feature History and Information for SPAN and RSPAN, on page 859 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for SPAN and RSPAN SPAN · You can limit SPAN traffic to specific VLANs by using the filter vlan keyword. If a trunk port is being monitored, only traffic on the VLANs specified with this keyword is monitored. By default, all VLANs are monitored on a trunk port. RSPAN · We recommend that you configure an RSPAN VLAN before you configure an RSPAN source or a destination session. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 823 Restrictions for SPAN and RSPAN Network Management Restrictions for SPAN and RSPAN SPAN The restrictions for SPAN are as follows: · On each switch, you can configure 66 sessions. A maximum of 7 source sessions can be configured and the remaining sessions can be configured as RSPAN destinations sessions. A source session is either a local SPAN session or an RSPAN source session. · For SPAN sources, you can monitor traffic for a single port or VLAN or a series or range of ports or VLANs for each session. You cannot mix source ports and source VLANs within a single SPAN session. · The destination port cannot be a source port; a source port cannot be a destination port. · You cannot have two SPAN sessions using the same destination port. · When you configure a switch port as a SPAN destination port, it is no longer a normal switch port; only monitored traffic passes through the SPAN destination port. · Entering SPAN configuration commands does not remove previously configured SPAN parameters. You must enter the no monitor session {session_number | all | local | remote} global configuration command to delete configured SPAN parameters. · For local SPAN, outgoing packets through the SPAN destination port carry the original encapsulation headers--untagged, ISL, or IEEE 802.1Q--if the encapsulation replicate keywords are specified. If the keywords are not specified, the packets are sent in native form. · You can configure a disabled port to be a source or destination port, but the SPAN function does not start until the destination port and at least one source port or source VLAN are enabled. · You cannot mix source VLANs and filter VLANs within a single SPAN session. Traffic monitoring in a SPAN session has the following restrictions: · Sources can be ports or VLANs, but you cannot mix source ports and source VLANs in the same session. · Wireshark does not capture egress packets when egress span is active. · You can run both a local SPAN and an RSPAN source session in the same switch or switch stack. The switch or switch stack supports a total of 66 source and RSPAN destination sessions. · You can configure two separate SPAN or RSPAN source sessions with separate or overlapping sets of SPAN source ports and VLANs. Both switched and routed ports can be configured as SPAN sources and destinations. · You can have multiple destination ports in a SPAN session, but no more than 64 destination ports per switch stack. · SPAN sessions do not interfere with the normal operation of the switch. However, an oversubscribed SPAN destination, for example, a 10-Mb/s port monitoring a 100-Mb/s port, can result in dropped or lost packets. · When SPAN or RSPAN is enabled, each packet being monitored is sent twice, once as normal traffic and once as a monitored packet. Monitoring a large number of ports or VLANs could potentially generate large amounts of network traffic. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 824 Network Management Information About SPAN and RSPAN · You can configure SPAN sessions on disabled ports; however, a SPAN session does not become active unless you enable the destination port and at least one source port or VLAN for that session. · The switch does not support a combination of local SPAN and RSPAN in a single session. · An RSPAN source session cannot have a local destination port. · An RSPAN destination session cannot have a local source port. · An RSPAN destination session and an RSPAN source session that are using the same RSPAN VLAN cannot run on the same switch or switch stack. RSPAN The restrictions for RSPAN are as follows: · RSPAN does not support BPDU packet monitoring or other Layer 2 switch protocols. · The RSPAN VLAN is configured only on trunk ports and not on access ports. To avoid unwanted traffic in RSPAN VLANs, make sure that the VLAN remote-span feature is supported in all the participating switches. · RSPAN VLANs are included as sources for port-based RSPAN sessions when source trunk ports have active RSPAN VLANs. RSPAN VLANs can also be sources in SPAN sessions. However, since the switch does not monitor spanned traffic, it does not support egress spanning of packets on any RSPAN VLAN identified as the destination of an RSPAN source session on the switch. · If you enable VTP and VTP pruning, RSPAN traffic is pruned in the trunks to prevent the unwanted flooding of RSPAN traffic across the network for VLAN IDs that are lower than 1005. · To use RSPAN, the switch must be running the LAN Base image. Information About SPAN and RSPAN SPAN and RSPAN You can analyze network traffic passing through ports or VLANs by using SPAN or RSPAN to send a copy of the traffic to another port on the switch or on another switch that has been connected to a network analyzer or other monitoring or security device. SPAN copies (or mirrors) traffic received or sent (or both) on source ports or source VLANs to a destination port for analysis. SPAN does not affect the switching of network traffic on the source ports or VLANs. You must dedicate the destination port for SPAN use. Except for traffic that is required for the SPAN or RSPAN session, destination ports do not receive or forward traffic. Only traffic that enters or leaves source ports or traffic that enters or leaves source VLANs can be monitored by using SPAN; traffic routed to a source VLAN cannot be monitored. For example, if incoming traffic is being monitored, traffic that gets routed from another VLAN to the source VLAN cannot be monitored; however, traffic that is received on the source VLAN and routed to another VLAN can be monitored. You can use the SPAN or RSPAN destination port to inject traffic from a network security device. For example, if you connect a Cisco Intrusion Detection System (IDS) sensor appliance to a destination port, the IDS device can send TCP reset packets to close down the TCP session of a suspected attacker. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 825 Local SPAN Network Management Local SPAN Local SPAN supports a SPAN session entirely within one switch; all source ports or source VLANs and destination ports are in the same switch or switch stack. Local SPAN copies traffic from one or more source ports in any VLAN or from one or more VLANs to a destination port for analysis. Figure 56: Example of Local SPAN Configuration on a Single Device All traffic on port 5 (the source port) is mirrored to port 10 (the destination port). A network analyzer on port 10 receives all network traffic from port 5 without being physically attached to port 5. Figure 57: Example of Local SPAN Configuration on a Device Stack This is an example of a local SPAN in a switch stack, where the source and destination ports reside on different stack members. Related Topics Creating a Local SPAN Session, on page 837 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 826 Network Management Remote SPAN Creating a Local SPAN Session and Configuring Incoming Traffic, on page 839 Example: Configuring Local SPAN, on page 855 Remote SPAN RSPAN supports source ports, source VLANs, and destination ports on different switches (or different switch stacks), enabling remote monitoring of multiple switches across your network. Figure 58: Example of RSPAN Configuration The figure below shows source ports on Switch A and Switch B. The traffic for each RSPAN session is carried over a user-specified RSPAN VLAN that is dedicated for that RSPAN session in all participating switches. The RSPAN traffic from the source ports or VLANs is copied into the RSPAN VLAN and forwarded over trunk ports carrying the RSPAN VLAN to a destination session monitoring the RSPAN VLAN. Each RSPAN source switch must have either ports or VLANs as RSPAN sources. The destination is always a physical port, as shown on Switch C in the figure. Related Topics Creating an RSPAN Source Session, on page 844 Creating an RSPAN Destination Session, on page 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 848 Examples: Creating an RSPAN VLAN, on page 857 SPAN and RSPAN Concepts and Terminology · SPAN Sessions Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 827 SPAN Sessions Network Management SPAN Sessions · Monitored Traffic · Source Ports · Source VLANs · VLAN Filtering · Destination Port · RSPAN VLAN SPAN sessions (local or remote) allow you to monitor traffic on one or more ports, or one or more VLANs, and send the monitored traffic to one or more destination ports. A local SPAN session is an association of a destination port with source ports or source VLANs, all on a single network device. Local SPAN does not have separate source and destination sessions. Local SPAN sessions gather a set of ingress and egress packets specified by the user and form them into a stream of SPAN data, which is directed to the destination port. RSPAN consists of at least one RSPAN source session, an RSPAN VLAN, and at least one RSPAN destination session. You separately configure RSPAN source sessions and RSPAN destination sessions on different network devices. To configure an RSPAN source session on a device, you associate a set of source ports or source VLANs with an RSPAN VLAN. The output of this session is the stream of SPAN packets that are sent to the RSPAN VLAN. To configure an RSPAN destination session on another device, you associate the destination port with the RSPAN VLAN. The destination session collects all RSPAN VLAN traffic and sends it out the RSPAN destination port. An RSPAN source session is very similar to a local SPAN session, except for where the packet stream is directed. In an RSPAN source session, SPAN packets are relabeled with the RSPAN VLAN ID and directed over normal trunk ports to the destination switch. An RSPAN destination session takes all packets received on the RSPAN VLAN, strips off the VLAN tagging, and presents them on the destination port. The session presents a copy of all RSPAN VLAN packets (except Layer 2 control packets) to the user for analysis. A single RSPAN session with multiple source and destination ports can be in the same session but more than one source session with the source being the same remote vlan is not allowed. Traffic monitoring in a SPAN session has these restrictions: · Sources can be ports or VLANs, but you cannot mix source ports and source VLANs in the same session. · The switch supports up to two local SPAN or RSPAN source sessions. · You can run both a local SPAN and an RSPAN source session in the same switch or switch stack. The switch or switch stack supports a total of 64 source and RSPAN destination sessions. · You can configure two separate SPAN or RSPAN source sessions with separate or overlapping sets of SPAN source ports and VLANs. Both switched and routed ports can be configured as SPAN sources and destinations. · You can have multiple destination ports in a SPAN session, but no more than 64 destination ports per switch stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 828 Network Management Monitored Traffic · SPAN sessions do not interfere with the normal operation of the switch. However, an oversubscribed SPAN destination, for example, a 10-Mb/s port monitoring a 100-Mb/s port, can result in dropped or lost packets. · When SPAN or RSPAN is enabled, each packet being monitored is sent twice, once as normal traffic and once as a monitored packet. Therefore monitoring a large number of ports or VLANs could potentially generate large amounts of network traffic. · You can configure SPAN sessions on disabled ports; however, a SPAN session does not become active unless you enable the destination port and at least one source port or VLAN for that session. · The switch does not support a combination of local SPAN and RSPAN in a single session. · An RSPAN source session cannot have a local destination port. · An RSPAN destination session cannot have a local source port. · An RSPAN destination session and an RSPAN source session that are using the same RSPAN VLAN cannot run on the same switch or switch stack. Monitored Traffic Related Topics Creating a Local SPAN Session, on page 837 Creating a Local SPAN Session and Configuring Incoming Traffic, on page 839 Example: Configuring Local SPAN, on page 855 SPAN sessions can monitor these traffic types: · Receive (Rx) SPAN--Receive (or ingress) SPAN monitors as much as possible all of the packets received by the source interface or VLAN before any modification or processing is performed by the switch. A copy of each packet received by the source is sent to the destination port for that SPAN session. Packets that are modified because of routing or Quality of Service (QoS)--for example, modified Differentiated Services Code Point (DSCP)--are copied before modification. Features that can cause a packet to be dropped during receive processing have no effect on ingress SPAN; the destination port receives a copy of the packet even if the actual incoming packet is dropped. These features include IP standard and extended input Access Control Lists (ACLs), ingress QoS policing, VLAN ACLs, and egress QoS policing. · Transmit (Tx) SPAN--Transmit (or egress) SPAN monitors as much as possible all of the packets sent by the source interface after all modification and processing is performed by the switch. A copy of each packet sent by the source is sent to the destination port for that SPAN session. The copy is provided after the packet is modified. Packets that are modified because of routing (for example, with modified time-to-live (TTL), MAC address, or QoS values) are duplicated (with the modifications) at the destination port. Features that can cause a packet to be dropped during transmit processing also affect the duplicated copy for SPAN. These features include IP standard and extended output ACLs and egress QoS policing. · Both--In a SPAN session, you can also monitor a port or VLAN for both received and sent packets. This is the default. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 829 Source Ports Network Management Source Ports The default configuration for local SPAN session ports is to send all packets untagged. However, when you enter the encapsulation replicate keywords while configuring a destination port, these changes occur: · Packets are sent on the destination port with the same encapsulation (untagged or IEEE 802.1Q) that they had on the source port. · Packets of all types, including BPDU and Layer 2 protocol packets, are monitored. Therefore, a local SPAN session with encapsulation replicate enabled can have a mixture of untagged and IEEE 802.1Q tagged packets appear on the destination port. Switch congestion can cause packets to be dropped at ingress source ports, egress source ports, or SPAN destination ports. In general, these characteristics are independent of one another. For example: · A packet might be forwarded normally but dropped from monitoring due to an oversubscribed SPAN destination port. · An ingress packet might be dropped from normal forwarding, but still appear on the SPAN destination port. · An egress packet dropped because of switch congestion is also dropped from egress SPAN. In some SPAN configurations, multiple copies of the same source packet are sent to the SPAN destination port. For example, a bidirectional (both Rx and Tx) SPAN session is configured for the Rx monitor on port A and Tx monitor on port B. If a packet enters the switch through port A and is switched to port B, both incoming and outgoing packets are sent to the destination port. Both packets are the same unless a Layer 3 rewrite occurs, in which case the packets are different because of the packet modification. A source port (also called a monitored port) is a switched or routed port that you monitor for network traffic analysis. In a local SPAN session or RSPAN source session, you can monitor source ports or VLANs for traffic in one or both directions. The switch supports any number of source ports (up to the maximum number of available ports on the switch) and any number of source VLANs (up to the maximum number of VLANs supported). However, the switch supports a maximum of (local or RSPAN) with source ports or VLANs. You cannot mix ports and VLANs in a single session. A source port has these characteristics: · It can be monitored in multiple SPAN sessions. · Each source port can be configured with a direction (ingress, egress, or both) to monitor. · It can be any port type (for example, EtherChannel, Gigabit Ethernet, and so forth). · For EtherChannel sources, you can monitor traffic for the entire EtherChannel or individually on a physical port as it participates in the port channel. · It can be an access port, trunk port, routed port, or voice VLAN port. · It cannot be a destination port. · Source ports can be in the same or different VLANs. · You can monitor multiple source ports in a single session. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 830 Network Management Source VLANs Source VLANs VLAN Filtering Destination Port VLAN-based SPAN (VSPAN) is the monitoring of the network traffic in one or more VLANs. The SPAN or RSPAN source interface in VSPAN is a VLAN ID, and traffic is monitored on all the ports for that VLAN. VSPAN has these characteristics: · All active ports in the source VLAN are included as source ports and can be monitored in either or both directions. · On a given port, only traffic on the monitored VLAN is sent to the destination port. · If a destination port belongs to a source VLAN, it is excluded from the source list and is not monitored. · If ports are added to or removed from the source VLANs, the traffic on the source VLAN received by those ports is added to or removed from the sources being monitored. · You cannot use filter VLANs in the same session with VLAN sources. · You can monitor only Ethernet VLANs. When you monitor a trunk port as a source port, by default, all VLANs active on the trunk are monitored. You can limit SPAN traffic monitoring on trunk source ports to specific VLANs by using VLAN filtering. · VLAN filtering applies only to trunk ports or to voice VLAN ports. · VLAN filtering applies only to port-based sessions and is not allowed in sessions with VLAN sources. · When a VLAN filter list is specified, only those VLANs in the list are monitored on trunk ports or on voice VLAN access ports. · SPAN traffic coming from other port types is not affected by VLAN filtering; that is, all VLANs are allowed on other ports. · VLAN filtering affects only traffic forwarded to the destination SPAN port and does not affect the switching of normal traffic. Each local SPAN session or RSPAN destination session must have a destination port (also called a monitoring port) that receives a copy of traffic from the source ports or VLANs and sends the SPAN packets to the user, usually a network analyzer. A destination port has these characteristics: · For a local SPAN session, the destination port must reside on the same switch or switch stack as the source port. For an RSPAN session, it is located on the switch containing the RSPAN destination session. There is no destination port on a switch or switch stack running only an RSPAN source session. · When a port is configured as a SPAN destination port, the configuration overwrites the original port configuration. When the SPAN destination configuration is removed, the port reverts to its previous configuration. If a configuration change is made to the port while it is acting as a SPAN destination port, the change does not take effect until the SPAN destination configuration had been removed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 831 RSPAN VLAN Network Management RSPAN VLAN Note When QoS is configured on the SPAN destination port, QoS takes effect immediately. · If the port was in an EtherChannel group, it is removed from the group while it is a destination port. If it was a routed port, it is no longer a routed port. · It can be any Ethernet physical port. · It cannot be a secure port. · It cannot be a source port. · It can be an EtherChannel group (ON mode only). · It cannot be a VLAN. · It can participate in only one SPAN session at a time (a destination port in one SPAN session cannot be a destination port for a second SPAN session). · When it is active, incoming traffic is disabled. The port does not transmit any traffic except that required for the SPAN session. Incoming traffic is never learned or forwarded on a destination port. · If ingress traffic forwarding is enabled for a network security device, the destination port forwards traffic at Layer 2. · It does not participate in any of the Layer 2 protocols (STP, VTP, CDP, DTP, PagP). · A destination port that belongs to a source VLAN of any SPAN session is excluded from the source list and is not monitored. · The maximum number of destination ports in a switch or switch stack is 64. Local SPAN and RSPAN destination ports function differently with VLAN tagging and encapsulation: · For local SPAN, if the encapsulation replicate keywords are specified for the destination port, these packets appear with the original encapsulation (untagged, ISL, or IEEE 802.1Q). If these keywords are not specified, packets appear in the untagged format. Therefore, the output of a local SPAN session with encapsulation replicate enabled can contain a mixture of untagged, ISL, or IEEE 802.1Q-tagged packets. · For RSPAN, the original VLAN ID is lost because it is overwritten by the RSPAN VLAN identification. Therefore, all packets appear on the destination port as untagged. The RSPAN VLAN carries SPAN traffic between RSPAN source and destination sessions. RSPAN VLAN has these special characteristics: · All traffic in the RSPAN VLAN is always flooded. · No MAC address learning occurs on the RSPAN VLAN. · RSPAN VLAN traffic only flows on trunk ports. · RSPAN VLANs must be configured in VLAN configuration mode by using the remote-span VLAN configuration mode command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 832 Network Management SPAN and RSPAN Interaction with Other Features · STP can run on RSPAN VLAN trunks but not on SPAN destination ports. · An RSPAN VLAN cannot be a private-VLAN primary or secondary VLAN. For VLANs 1 to 1005 that are visible to VLAN Trunking Protocol (VTP), the VLAN ID and its associated RSPAN characteristic are propagated by VTP. If you assign an RSPAN VLAN ID in the extended VLAN range (1006 to 4094), you must manually configure all intermediate switches. It is normal to have multiple RSPAN VLANs in a network at the same time with each RSPAN VLAN defining a network-wide RSPAN session. That is, multiple RSPAN source sessions anywhere in the network can contribute packets to the RSPAN session. It is also possible to have multiple RSPAN destination sessions throughout the network, monitoring the same RSPAN VLAN and presenting traffic to the user. The RSPAN VLAN ID separates the sessions. Related Topics Creating an RSPAN Source Session, on page 844 Creating an RSPAN Destination Session, on page 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 848 Examples: Creating an RSPAN VLAN, on page 857 SPAN and RSPAN Interaction with Other Features SPAN interacts with these features: · Routing--SPAN does not monitor routed traffic. VSPAN only monitors traffic that enters or exits the switch, not traffic that is routed between VLANs. For example, if a VLAN is being Rx-monitored and the switch routes traffic from another VLAN to the monitored VLAN, that traffic is not monitored and not received on the SPAN destination port. · STP--A destination port does not participate in STP while its SPAN or RSPAN session is active. The destination port can participate in STP after the SPAN or RSPAN session is disabled. On a source port, SPAN does not affect the STP status. STP can be active on trunk ports carrying an RSPAN VLAN. · CDP--A SPAN destination port does not participate in CDP while the SPAN session is active. After the SPAN session is disabled, the port again participates in CDP. Due to limitation in the ASIC, CDP packets are not dropped in RSPAN configured VLAN. · VTP--You can use VTP to prune an RSPAN VLAN between switches. · VLAN and trunking--You can modify VLAN membership or trunk settings for source or destination ports at any time. However, changes in VLAN membership or trunk settings for a destination port do not take effect until you remove the SPAN destination configuration. Changes in VLAN membership or trunk settings for a source port immediately take effect, and the respective SPAN sessions automatically adjust accordingly. · EtherChannel--You can configure an EtherChannel group as a source port or a SPAN destination port. When a group is configured as a SPAN source, the entire group is monitored. If a physical port is added to a monitored EtherChannel group, the new port is added to the SPAN source port list. If a port is removed from a monitored EtherChannel group, it is automatically removed from the source port list. A physical port that belongs to an EtherChannel group can be configured as a SPAN source port and still be a part of the EtherChannel. In this case, data from the physical port is monitored as it participates in the EtherChannel. However, if a physical port that belongs to an EtherChannel group is configured as a Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 833 SPAN and RSPAN and Device Stacks Network Management SPAN destination, it is removed from the group. After the port is removed from the SPAN session, it rejoins the EtherChannel group. Ports removed from an EtherChannel group remain members of the group, but they are in the inactive or suspended state. If a physical port that belongs to an EtherChannel group is a destination port and the EtherChannel group is a source, the port is removed from the EtherChannel group and from the list of monitored ports. · Multicast traffic can be monitored. For egress and ingress port monitoring, only a single unedited packet is sent to the SPAN destination port. It does not reflect the number of times the multicast packet is sent. · A private-VLAN port cannot be a SPAN destination port. · A secure port cannot be a SPAN destination port. For SPAN sessions, do not enable port security on ports with monitored egress when ingress forwarding is enabled on the destination port. For RSPAN source sessions, do not enable port security on any ports with monitored egress. · An IEEE 802.1x port can be a SPAN source port. You can enable IEEE 802.1x on a port that is a SPAN destination port; however, IEEE 802.1x is disabled until the port is removed as a SPAN destination. For SPAN sessions, do not enable IEEE 802.1x on ports with monitored egress when ingress forwarding is enabled on the destination port. For RSPAN source sessions, do not enable IEEE 802.1x on any ports that are egress monitored. SPAN and RSPAN and Device Stacks Because the stack of switches represents one logical switch, local SPAN source ports and destination ports can be in different switches in the stack. Therefore, the addition or deletion of switches in the stack can affect a local SPAN session, as well as an RSPAN source or destination session. An active session can become inactive when a switch is removed from the stack or an inactive session can become active when a switch is added to the stack. Flow-Based SPAN You can control the type of network traffic to be monitored in SPAN or RSPAN sessions by using flow-based SPAN (FSPAN) or flow-based RSPAN (FRSPAN), which apply access control lists (ACLs) to the monitored traffic on the source ports. The FSPAN ACLs can be configured to filter IPv4, IPv6, and non-IP monitored traffic. You apply an ACL to a SPAN session through the interface. It is applied to all the traffic that is monitored on all interfaces in the SPAN session.The packets that are permitted by this ACL are copied to the SPAN destination port. No other packets are copied to the SPAN destination port. The original traffic continues to be forwarded, and any port, VLAN, and router ACLs attached are applied. The FSPAN ACL does not have any effect on the forwarding decisions. Similarly, the port, VLAN, and router ACLs do not have any effect on the traffic monitoring. If a security input ACL denies a packet and it is not forwarded, the packet is still copied to the SPAN destination ports if the FSPAN ACL permits it. But if the security output ACL denies a packet and it is not sent, it is not copied to the SPAN destination ports. However, if the security output ACL permits the packet to go out, it is only copied to the SPAN destination ports if the FSPAN ACL permits it. This is also true for an RSPAN session. You can attach three types of FSPAN ACLs to the SPAN session: · IPv4 FSPAN ACL-- Filters only IPv4 packets. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 834 Network Management Default SPAN and RSPAN Configuration · IPv6 FSPAN ACL-- Filters only IPv6 packets. · MAC FSPAN ACL-- Filters only non-IP packets. If a VLAN-based FSPAN session configured on a stack cannot fit in the hardware memory on one or more switches, it is treated as unloaded on those switches, and traffic meant for the FSPAN ACL and sourcing on that switch is not copied to the SPAN destination ports. The FSPAN ACL continues to be correctly applied, and traffic is copied to the SPAN destination ports on the switches where the FSPAN ACL fits in the hardware memory. When an empty FSPAN ACL is attached, some hardware functions copy all traffic to the SPAN destination ports for that ACL. If sufficient hardware resources are not available, even an empty FSPAN ACL can be unloaded. IPv4 and MAC FSPAN ACLs are supported on all feature sets. IPv6 FSPAN ACLs are supported only in the advanced IP Services feature set. Related Topics Configuring an FSPAN Session, on page 850 Configuring an FRSPAN Session, on page 853 Default SPAN and RSPAN Configuration Table 74: Default SPAN and RSPAN Configuration Feature SPAN state (SPAN and RSPAN) Source port traffic to monitor Encapsulation type (destination port) Ingress forwarding (destination port) VLAN filtering RSPAN VLANs Default Setting Disabled. Both received and sent traffic (both). Native form (untagged packets). Disabled. On a trunk interface used as a source port, all VLANs are monitored. None configured. Configuration Guidelines SPAN Configuration Guidelines · To remove a source or destination port or VLAN from the SPAN session, use the no monitor session session_number source {interface interface-id | vlan vlan-id} global configuration command or the no monitor session session_number destination interface interface-id global configuration command. For destination interfaces, the encapsulation options are ignored with the no form of the command. · To monitor all VLANs on the trunk port, use the no monitor session session_number filter global configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 835 RSPAN Configuration Guidelines Network Management Related Topics Creating a Local SPAN Session, on page 837 Creating a Local SPAN Session and Configuring Incoming Traffic, on page 839 Example: Configuring Local SPAN, on page 855 RSPAN Configuration Guidelines · All the SPAN configuration guidelines apply to RSPAN. · As RSPAN VLANs have special properties, you should reserve a few VLANs across your network for use as RSPAN VLANs; do not assign access ports to these VLANs. · You can apply an output ACL to RSPAN traffic to selectively filter or monitor specific packets. Specify these ACLs on the RSPAN VLAN in the RSPAN source switches. · For RSPAN configuration, you can distribute the source ports and the destination ports across multiple switches in your network. · Access ports (including voice VLAN ports) on the RSPAN VLAN are put in the inactive state. · You can configure any VLAN as an RSPAN VLAN as long as these conditions are met: · The same RSPAN VLAN is used for an RSPAN session in all the switches. · All participating switches support RSPAN. Related Topics Creating an RSPAN Source Session, on page 844 Creating an RSPAN Destination Session, on page 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 848 Examples: Creating an RSPAN VLAN, on page 857 FSPAN and FRSPAN Configuration Guidelines · When at least one FSPAN ACL is attached, FSPAN is enabled. · When you attach at least one FSPAN ACL that is not empty to a SPAN session, and you have not attached one or more of the other FSPAN ACLs (for instance, you have attached an IPv4 ACL that is not empty, and have not attached IPv6 and MAC ACLs), FSPAN blocks the traffic that would have been filtered by the unattached ACLs. Therefore, this traffic is not monitored. Related Topics Configuring an FSPAN Session, on page 850 Configuring an FRSPAN Session, on page 853 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 836 Network Management How to Configure SPAN and RSPAN How to Configure SPAN and RSPAN Creating a Local SPAN Session Beginning in privileged EXEC mode, follow these steps to create a SPAN session and specify the source (monitored) ports or VLANs and the destination (monitoring) ports. SUMMARY STEPS 1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]} 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session all · all--Removes all SPAN sessions. · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] Example: Specifies the SPAN session and the source port (monitored port). · For session_number, the range is 1 to 66. Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 · For interface-id, specifies the source port to monitor. Valid interfaces include physical interfaces and port-channel logical interfaces (port-channel port-channel-number). Valid port-channel numbers are 1 to 48. · For vlan-id, specify the source VLAN to monitor. The range is 1 to 4094 (excluding the RSPAN VLAN). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 837 Creating a Local SPAN Session Network Management Command or Action Purpose Note A single session can include multiple sources (ports or VLANs) defined in a series of commands, but you cannot combine source ports and source VLANs in one session. · (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen. · (Optional) both | rx | tx--Specifies the direction of traffic to monitor. If you do not specify a traffic direction, the source interface sends both sent and received traffic. · both--Monitors both received and sent traffic. · rx--Monitors received traffic. · tx--Monitors sent traffic. Note You can use the monitor session session_number source command multiple times to configure multiple source ports. Step 4 monitor session session_number destination {interface Specifies the SPAN session and the destination port interface-id [, | -] [encapsulation replicate]} (monitoring port). Example: Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2 encapsulation replicate Note For local SPAN, you must use the same session number for the source and destination interfaces. · For session_number, specify the session number entered in step 3. · For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN. · (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen. (Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged). Note You can use monitor session session_number destination command multiple times to configure multiple destination ports. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 838 Network Management Creating a Local SPAN Session and Configuring Incoming Traffic Step 5 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Related Topics Local SPAN, on page 826 SPAN Sessions, on page 828 SPAN Configuration Guidelines, on page 835 Creating a Local SPAN Session and Configuring Incoming Traffic Beginning in privileged EXEC mode, follow these steps to create a SPAN session, to specify the source ports or VLANs and the destination ports, and to enable incoming traffic on the destination port for a network security device (such as a Cisco IDS Sensor Appliance). SUMMARY STEPS 1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate] [ingress {dot1q vlan vlan-id | isl | untagged vlan vlan-id | vlan vlan-id}]} 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session all · all--Removes all SPAN sessions. · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 839 Creating a Local SPAN Session and Configuring Incoming Traffic Network Management Step 3 Step 4 Command or Action monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] Example: Purpose Specifies the SPAN session and the source port (monitored port). Switch(config)# monitor session 2 source gigabitethernet1/0/1 rx monitor session session_number destination {interface Specifies the SPAN session, the destination port, the packet interface-id [, | -] [encapsulation replicate] [ingress {dot1q encapsulation, and the ingress VLAN and encapsulation. vlan vlan-id | isl | untagged vlan vlan-id | vlan vlan-id}]} · For session_number, specify the session number Example: entered in Step 3. Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation replicate ingress dot1q vlan 6 · For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN. · (Optional) [, | -]--Specifies a series or range of interfaces. Enter a space before and after the comma or hyphen. · (Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged). · ingress enables forwarding of incoming traffic on the destination port and to specify the encapsulation type: · dot1q vlan vlan-id--Accepts incoming packets with IEEE 802.1Q encapsulation with the specified VLAN as the default VLAN. · isl--Forwards ingress packets with ISL encapsulation. · untagged vlan vlan-id or vlan vlan-id--Accepts incoming packets with untagged encapsulation type with the specified VLAN as the default VLAN. · dot1q vlan vlan-id--Accepts incoming packets with IEEE 802.1Q encapsulation with the specified VLAN as the default VLAN. · isl--Forwards ingress packets with ISL encapsulation. · untagged vlan vlan-id or vlan vlan-id--Accepts incoming packets with untagged encapsulation type with the specified VLAN as the default VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 840 Network Management Specifying VLANs to Filter Step 5 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Related Topics Local SPAN, on page 826 SPAN Sessions, on page 828 SPAN Configuration Guidelines, on page 835 Example: Configuring Local SPAN, on page 855 Specifying VLANs to Filter Beginning in privileged EXEC mode, follow these steps to limit SPAN source traffic to specific VLANs. SUMMARY STEPS 1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source interface interface-id 4. monitor session session_number filter vlan vlan-id [, | -] 5. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]} 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session all · all--Removes all SPAN sessions. · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. monitor session session_number source interface interface-id Example: Specifies the characteristics of the source port (monitored port) and SPAN session. · For session_number, the range is 1 to 66. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 841 Configuring a VLAN as an RSPAN VLAN Network Management Step 4 Step 5 Step 6 Command or Action Purpose Switch(config)# monitor session 2 source interface gigabitethernet1/0/2 rx · For interface-id, specify the source port to monitor. The interface specified must already be configured as a trunk port. monitor session session_number filter vlan vlan-id [, | -] Limits the SPAN source traffic to specific VLANs. Example: Switch(config)# monitor session 2 filter vlan 1 5,9 · For session_number, enter the session number specified in Step 3. · For vlan-id, the range is 1 to 4094. · (Optional) Use a comma (,) to specify a series of VLANs, or use a hyphen (-) to specify a range of VLANs. Enter a space before and after the comma; enter a space before and after the hyphen. monitor session session_number destination {interface Specifies the SPAN session and the destination port interface-id [, | -] [encapsulation replicate]} (monitoring port). Example: Switch(config)# monitor session 2 destination interface gigabitethernet1/0/1 · For session_number, specify the session number entered in Step 3. · For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN. · (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen. · (Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged). end Example: Returns to privileged EXEC mode. Switch(config)# end Configuring a VLAN as an RSPAN VLAN Beginning in privileged EXEC mode, follow these steps to create a new VLAN, then configure it to be the RSPAN VLAN for the RSPAN session. SUMMARY STEPS 1. configure terminal 2. vlan vlan-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 842 Network Management Configuring a VLAN as an RSPAN VLAN 3. remote-span 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 vlan vlan-id Example: Switch(config)# vlan 100 Step 3 Step 4 remote-span Example: Switch(config-vlan)# remote-span end Example: Switch(config-vlan)# end Purpose Enters the global configuration mode. Enters a VLAN ID to create a VLAN, or enters the VLAN ID of an existing VLAN, and enters VLAN configuration mode. The range is 2 to 1001 and 1006 to 4094. The RSPAN VLAN cannot be VLAN 1 (the default VLAN) or VLAN IDs 1002 through 1005 (reserved for Token Ring and FDDI VLANs). Configures the VLAN as an RSPAN VLAN. Returns to privileged EXEC mode. What to do next You must create the RSPAN VLAN in all switches that will participate in RSPAN. If the RSPAN VLAN-ID is in the normal range (lower than 1005) and VTP is enabled in the network, you can create the RSPAN VLAN in one switch, and VTP propagates it to the other switches in the VTP domain. For extended-range VLANs (greater than 1005), you must configure RSPAN VLAN on both source and destination switches and any intermediate switches. Use VTP pruning to get an efficient flow of RSPAN traffic, or manually delete the RSPAN VLAN from all trunks that do not need to carry the RSPAN traffic. To remove the remote SPAN characteristic from a VLAN and convert it back to a normal VLAN, use the no remote-span VLAN configuration command. To remove a source port or VLAN from the SPAN session, use the no monitor session session_number source {interface interface-id | vlan vlan-id} global configuration command. To remove the RSPAN VLAN from the session, use the no monitor session session_number destination remote vlan vlan-id. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 843 Creating an RSPAN Source Session Network Management Creating an RSPAN Source Session Beginning in privileged EXEC mode, follow these steps to create and start an RSPAN source session and to specify the monitored source and the destination RSPAN VLAN. SUMMARY STEPS 1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination remote vlan vlan-id 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session 1 · all--Removes all SPAN sessions. · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] Example: Specifies the RSPAN session and the source port (monitored port). · For session_number, the range is 1 to 66. Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 tx · Enter a source port or source VLAN for the RSPAN session: · For interface-id, specifies the source port to monitor. Valid interfaces include physical interfaces and port-channel logical interfaces (port-channel port-channel-number). Valid port-channel numbers are 1 to 48. · For vlan-id, specifies the source VLAN to monitor. The range is 1 to 4094 (excluding the RSPAN VLAN). A single session can include multiple sources (ports or VLANs), defined in a series of commands, but you cannot combine source ports and source VLANs in one session. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 844 Network Management Specifying VLANs to Filter Command or Action Purpose · (Optional) [, | -]--Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen. · (Optional) both | rx | tx--Specifies the direction of traffic to monitor. If you do not specify a traffic direction, the source interface sends both sent and received traffic. · both--Monitors both received and sent traffic. · rx--Monitors received traffic. · tx--Monitors sent traffic. Step 4 Step 5 monitor session session_number destination remote vlan Specifies the RSPAN session, the destination RSPAN vlan-id VLAN, and the destination-port group. Example: Switch(config)# monitor session 1 destination remote vlan 100 · For session_number, enter the number defined in Step 3. · For vlan-id, specify the source RSPAN VLAN to monitor. end Example: Switch(config)# end Returns to privileged EXEC mode. Related Topics Remote SPAN, on page 827 RSPAN VLAN, on page 832 RSPAN Configuration Guidelines, on page 836 Specifying VLANs to Filter Beginning in privileged EXEC mode, follow these steps to configure the RSPAN source session to limit RSPAN source traffic to specific VLANs. SUMMARY STEPS 1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source interface interface-id 4. monitor session session_number filter vlan vlan-id [, | -] 5. monitor session session_number destination remote vlan vlan-id 6. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 845 Specifying VLANs to Filter Network Management DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 Step 4 Step 5 Step 6 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session 2 · all--Removes all SPAN sessions. · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. monitor session session_number source interface interface-id Example: Specifies the characteristics of the source port (monitored port) and SPAN session. · For session_number, the range is 1 to 66. Switch(config)# monitor session 2 source interface gigabitethernet1/0/2 rx · For interface-id, specify the source port to monitor. The interface specified must already be configured as a trunk port. monitor session session_number filter vlan vlan-id [, | -] Limits the SPAN source traffic to specific VLANs. Example: Switch(config)# monitor session 2 filter vlan 1 5,9 · For session_number, enter the session number specified in step 3. · For vlan-id, the range is 1 to 4094. · (Optional) , | - Use a comma (,) to specify a series of VLANs or use a hyphen (-) to specify a range of VLANs. Enter a space before and after the comma; enter a space before and after the hyphen. monitor session session_number destination remote vlan Specifies the RSPAN session and the destination remote vlan-id VLAN (RSPAN VLAN). Example: Switch(config)# monitor session 2 destination remote vlan 902 · For session_number, enter the session number specified in Step 3. · For vlan-id, specify the RSPAN VLAN to carry the monitored traffic to the destination port. end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 846 Network Management Creating an RSPAN Destination Session Creating an RSPAN Destination Session You configure an RSPAN destination session on a different switch or switch stack; that is, not the switch or switch stack on which the source session was configured. Beginning in privileged EXEC mode, follow these steps to define the RSPAN VLAN on that switch, to create an RSPAN destination session, and to specify the source RSPAN VLAN and the destination port. SUMMARY STEPS 1. configure terminal 2. vlan vlan-id 3. remote-span 4. exit 5. no monitor session {session_number | all | local | remote} 6. monitor session session_number source remote vlan vlan-id 7. monitor session session_number destination interface interface-id 8. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 Step 5 vlan vlan-id Example: Switch(config)# vlan 901 remote-span Example: Specifies the VLAN ID of the RSPAN VLAN created from the source switch, and enters VLAN configuration mode. If both switches are participating in VTP and the RSPAN VLAN ID is from 2 to 1005, Steps 2 through 4 are not required because the RSPAN VLAN ID is propagated through the VTP network. Identifies the VLAN as the RSPAN VLAN. Switch(config-vlan)# remote-span exit Example: Returns to global configuration mode. Switch(config-vlan)# exit no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session 1 · all--Removes all SPAN sessions. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic Network Management Step 6 Step 7 Step 8 Command or Action Purpose · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. monitor session session_number source remote vlan vlan-id Example: Specifies the RSPAN session and the source RSPAN VLAN. · For session_number, the range is 1 to 66. Switch(config)# monitor session 1 source remote vlan 901 · For vlan-id, specify the source RSPAN VLAN to monitor. monitor session session_number destination interface interface-id Example: Switch(config)# monitor session 1 destination interface gigabitethernet2/0/1 Specifies the RSPAN session and the destination interface. · For session_number, enter the number defined in Step 6. In an RSPAN destination session, you must use the same session number for the source RSPAN VLAN and the destination port. · For interface-id, specify the destination interface. The destination interface must be a physical interface. · Though visible in the command-line help string, encapsulation replicate is not supported for RSPAN. The original VLAN ID is overwritten by the RSPAN VLAN ID, and all packets appear on the destination port as untagged. end Example: Returns to privileged EXEC mode. Switch(config)# end Related Topics Remote SPAN, on page 827 RSPAN VLAN, on page 832 RSPAN Configuration Guidelines, on page 836 Creating an RSPAN Destination Session and Configuring Incoming Traffic Beginning in privileged EXEC mode, follow these steps to create an RSPAN destination session, to specify the source RSPAN VLAN and the destination port, and to enable incoming traffic on the destination port for a network security device (such as a Cisco IDS Sensor Appliance). SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 848 Network Management Creating an RSPAN Destination Session and Configuring Incoming Traffic 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source remote vlan vlan-id 4. monitor session session_number destination {interface interface-id [, | -] [ingress {dot1q vlan vlan-id | isl | untagged vlan vlan-id | vlan vlan-id}]} 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session 2 · all--Removes all SPAN sessions. · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. monitor session session_number source remote vlan vlan-id Example: Specifies the RSPAN session and the source RSPAN VLAN. · For session_number, the range is 1 to 66. Switch(config)# monitor session 2 source remote vlan 901 · For vlan-id, specify the source RSPAN VLAN to monitor. monitor session session_number destination {interface interface-id [, | -] [ingress {dot1q vlan vlan-id | isl | untagged vlan vlan-id | vlan vlan-id}]} Example: Specifies the SPAN session, the destination port, the packet encapsulation, and the incoming VLAN and encapsulation. · For session_number, enter the number defined in Step 4. Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 ingress vlan 6 In an RSPAN destination session, you must use the same session number for the source RSPAN VLAN and the destination port. · For interface-id, specify the destination interface. The destination interface must be a physical interface. · Though visible in the command-line help string, encapsulation replicate is not supported for RSPAN. The original VLAN ID is overwritten by the RSPAN VLAN ID, and all packets appear on the destination port as untagged. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 849 Configuring an FSPAN Session Network Management Command or Action Step 5 end Example: Switch(config)# end Purpose · (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen. · Enter ingress with additional keywords to enable forwarding of incoming traffic on the destination port and to specify the encapsulation type: · dot1q vlan vlan-id--Forwards incoming packets with IEEE 802.1Q encapsulation with the specified VLAN as the default VLAN. · isl--Forwards ingress packets with ISL encapsulation. · untagged vlan vlan-id or vlan vlan-id--Forwards incoming packets with untagged encapsulation type with the specified VLAN as the default VLAN. Returns to privileged EXEC mode. Related Topics Remote SPAN, on page 827 RSPAN VLAN, on page 832 RSPAN Configuration Guidelines, on page 836 Examples: Creating an RSPAN VLAN, on page 857 Configuring an FSPAN Session Beginning in privileged EXEC mode, follow these steps to create a SPAN session, specify the source (monitored) ports or VLANs and the destination (monitoring) ports, and configure FSPAN for the session. SUMMARY STEPS 1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]} 5. monitor session session_number filter {ip | ipv6 | mac} access-group {access-list-number | name} 6. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 850 Network Management Configuring an FSPAN Session DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session 2 · all--Removes all SPAN sessions. · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. Step 3 monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] Example: Specifies the SPAN session and the source port (monitored port). · For session_number, the range is 1 to 66. Switch(config)# monitor session 2 source interface gigabitethernet1/0/1 · For interface-id, specifies the source port to monitor. Valid interfaces include physical interfaces and port-channel logical interfaces (port-channel port-channel-number). Valid port-channel numbers are 1 to 48. · For vlan-id, specify the source VLAN to monitor. The range is 1 to 4094 (excluding the RSPAN VLAN). Note A single session can include multiple sources (ports or VLANs) defined in a series of commands, but you cannot combine source ports and source VLANs in one session. · (Optional) [, | -]--Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen. · (Optional) [both | rx | tx]--Specifies the direction of traffic to monitor. If you do not specify a traffic direction, the SPAN monitors both sent and received traffic. · both--Monitors both sent and received traffic. This is the default. · rx--Monitors received traffic. · tx--Monitors sent traffic. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 851 Configuring an FSPAN Session Network Management Command or Action Purpose Note You can use the monitor session session_number source command multiple times to configure multiple source ports. Step 4 monitor session session_number destination {interface Specifies the SPAN session and the destination port interface-id [, | -] [encapsulation replicate]} (monitoring port). Example: Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation replicate · For session_number, specify the session number entered in Step 3. · For destination, specify the following parameters: · For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN. · (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen. · (Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged). Step 5 Step 6 Note For local SPAN, you must use the same session number for the source and destination interfaces. You can use monitor session session_number destination command multiple times to configure multiple destination ports. monitor session session_number filter {ip | ipv6 | mac} Specifies the SPAN session, the types of packets to filter, access-group {access-list-number | name} and the ACLs to use in an FSPAN session. Example: Switch(config)# monitor session 2 filter ipv6 access-group 4 · For session_number, specify the session number entered in Step 3. · For access-list-number, specify the ACL number that you want to use to filter traffic. · For name, specify the ACL name that you want to use to filter traffic. end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 852 Network Management Configuring an FRSPAN Session Related Topics Flow-Based SPAN, on page 834 FSPAN and FRSPAN Configuration Guidelines, on page 836 Configuring an FRSPAN Session Beginning in privileged EXEC mode, follow these steps to start an RSPAN source session, specify the monitored source and the destination RSPAN VLAN, and configure FRSPAN for the session. SUMMARY STEPS 1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination remote vlan vlan-id 5. vlan vlan-id 6. remote-span 7. exit 8. monitor session session_number filter {ip | ipv6 | mac} access-group {access-list-number | name} 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session. Example: · For session_number, the range is 1 to 66. Switch(config)# no monitor session 2 · all--Removes all SPAN sessions. · local--Removes all local sessions. · remote--Removes all remote SPAN sessions. Step 3 monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] Example: Specifies the SPAN session and the source port (monitored port). · For session_number, the range is 1 to 66. Switch(config)# monitor session 2 source interface gigabitethernet1/0/1 · For interface-id, specifies the source port to monitor. Valid interfaces include physical interfaces and port-channel logical interfaces (port-channel port-channel-number). Valid port-channel numbers are 1 to 48. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 853 Configuring an FRSPAN Session Network Management Command or Action Purpose · For vlan-id, specify the source VLAN to monitor. The range is 1 to 4094 (excluding the RSPAN VLAN). Note A single session can include multiple sources (ports or VLANs) defined in a series of commands, but you cannot combine source ports and source VLANs in one session. · (Optional) [, | -]--Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen. · (Optional) [both | rx | tx]--Specifies the direction of traffic to monitor. If you do not specify a traffic direction, the SPAN monitors both sent and received traffic. · both--Monitors both sent and received traffic. This is the default. · rx--Monitors received traffic. · tx--Monitors sent traffic. Note You can use the monitor session session_number source command multiple times to configure multiple source ports. Step 4 Step 5 Step 6 Step 7 monitor session session_number destination remote vlan Specifies the RSPAN session and the destination RSPAN vlan-id VLAN. Example: Switch(config)# monitor session 2 destination remote vlan 5 · For session_number, enter the number defined in Step 3. · For vlan-id, specify the destination RSPAN VLAN to monitor. vlan vlan-id Example: Switch(config)# vlan 10 remote-span Example: Switch(config-vlan)# remote-span exit Example: Enters the VLAN configuration mode. For vlan-id, specify the source RSPAN VLAN to monitor. Specifies that the VLAN you specified in Step 5 is part of the RSPAN VLAN. Returns to global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 854 Network Management Monitoring SPAN and RSPAN Operations Step 8 Step 9 Command or Action Purpose Switch(config-vlan)# exit monitor session session_number filter {ip | ipv6 | mac} Specifies the RSPAN session, the types of packets to filter, access-group {access-list-number | name} and the ACLs to use in an FRSPAN session. Example: Switch(config)# monitor session 2 filter ip access-group 7 · For session_number, specify the session number entered in Step 3. · For access-list-number, specify the ACL number that you want to use to filter traffic. · For name, specify the ACL name that you want to use to filter traffic. end Example: Switch(config)# end Returns to privileged EXEC mode. Related Topics Flow-Based SPAN, on page 834 FSPAN and FRSPAN Configuration Guidelines, on page 836 Monitoring SPAN and RSPAN Operations The following table describes the command used to display SPAN and RSPAN operations configuration and results to monitor operations: Table 75: Monitoring SPAN and RSPAN Operations Command show monitor Purpose Displays the current SPAN, RSPAN, FSPAN, or FRSPAN configuration. SPAN and RSPAN Configuration Examples Example: Configuring Local SPAN This example shows how to set up SPAN session 1 for monitoring source port traffic to a destination port. First, any existing SPAN configuration for session 1 is deleted, and then bidirectional traffic is mirrored from source Gigabit Ethernet port 1 to destination Gigabit Ethernet port 2, retaining the encapsulation method. Switch(config)# no monitor session 1 Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 855 Example: Configuring Local SPAN Network Management Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2 encapsulation replicate Switch(config)# end This example shows how to remove port 1 as a SPAN source for SPAN session 1: Switch(config)# no monitor session 1 source interface gigabitethernet1/0/1 Switch(config)# end This example shows how to disable received traffic monitoring on port 1, which was configured for bidirectional monitoring: Switch(config)# no monitor session 1 source interface gigabitethernet1/0/1 rx The monitoring of traffic received on port 1 is disabled, but traffic sent from this port continues to be monitored. This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session 2 to monitor received traffic on all ports belonging to VLANs 1 through 3, and send it to destination Gigabit Ethernet port 2. The configuration is then modified to also monitor all traffic on all ports belonging to VLAN 10. Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source vlan 1 - 3 rx Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 Switch(config)# monitor session 2 source vlan 10 Switch(config)# end This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session 2 to monitor received traffic on Gigabit Ethernet source port 1, and send it to destination Gigabit Ethernet port 2 with the same egress encapsulation type as the source port, and to enable ingress forwarding with IEEE 802.1Q encapsulation and VLAN 6 as the default ingress VLAN: Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source gigabitethernet1/0/1 rx Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation replicate ingress dot1q vlan 6 Switch(config)# end This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session 2 to monitor traffic received on Gigabit Ethernet trunk port 2, and send traffic for only VLANs 1 through 5 and VLAN 9 to destination Gigabit Ethernet port 1: Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source interface gigabitethernet1/0/2 rx Switch(config)# monitor session 2 filter vlan 1 - 5 , 9 Switch(config)# monitor session 2 destination interface gigabitethernet1/0/1 Switch(config)# end Related Topics Creating a Local SPAN Session and Configuring Incoming Traffic, on page 839 Local SPAN, on page 826 SPAN Sessions, on page 828 SPAN Configuration Guidelines, on page 835 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 856 Network Management Examples: Creating an RSPAN VLAN Examples: Creating an RSPAN VLAN This example shows how to create the RSPAN VLAN 901: Switch(config)# vlan 901 Switch(config-vlan)# remote span Switch(config-vlan)# end This example shows how to remove any existing RSPAN configuration for session 1, configure RSPAN session 1 to monitor multiple source interfaces, and configure the destination as RSPAN VLAN 901: Switch(config)# no monitor session 1 Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 tx Switch(config)# monitor session 1 source interface gigabitethernet1/0/2 rx Switch(config)# monitor session 1 source interface port-channel 2 Switch(config)# monitor session 1 destination remote vlan 901 Switch(config)# end This example shows how to remove any existing configuration on RSPAN session 2, configure RSPAN session 2 to monitor traffic received on trunk port 2, and send traffic for only VLANs 1 through 5 and 9 to destination RSPAN VLAN 902: Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source interface gigabitethernet1/0/2 rx Switch(config)# monitor session 2 filter vlan 1 - 5 , 9 Switch(config)# monitor session 2 destination remote vlan 902 Switch(config)# end This example shows how to configure VLAN 901 as the source remote VLAN and port 1 as the destination interface: Switch(config)# monitor session 1 source remote vlan 901 Switch(config)# monitor session 1 destination interface gigabitethernet2/0/1 Switch(config)# end This example shows how to configure VLAN 901 as the source remote VLAN in RSPAN session 2, to configure Gigabit Ethernet source port 2 as the destination interface, and to enable forwarding of incoming traffic on the interface with VLAN 6 as the default receiving VLAN: Switch(config)# monitor session 2 source remote vlan 901 Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 ingress vlan 6 Switch(config)# end Related Topics Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 848 Remote SPAN, on page 827 RSPAN VLAN, on page 832 RSPAN Configuration Guidelines, on page 836 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 857 Additional References Network Management Additional References Related Documents Related Topic Document Title Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title MIBs MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 858 Network Management Feature History and Information for SPAN and RSPAN Feature History and Information for SPAN and RSPAN Release Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE Modification Switch Port Analyzer (SPAN): Allows monitoring of switch traffic on a port or VLAN using a sniffer/analyzer or RMON probe. This feature was introduced. Flow-based Switch Port Analyzer (SPAN): Provides a method to capture only required data between end hosts by using specified filters. The filters are defined in terms of access lists that limit IPv4, IPv6 or IPv4 + IPv6, or non-IP traffic (MAC) between specified source and destination addresses. This feature was introduced. SPAN destination port support on EtherChannels: Provides the ability to configure a SPAN destination port on an EtherChannel. This feature was introduced. Switch Port Analyzer (SPAN) distributed egress SPAN: Provides distributed egress SPAN functionality onto line cards in conjunction with ingress SPAN already been distributed to line cards. By distributing egress SPAN functionalities onto line cards, the performance of the system is improved. This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 859 Feature History and Information for SPAN and RSPAN Network Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 860 5 5 C H A P T E R Configuring Wireshark · Finding Feature Information, on page 861 · Prerequisites for Wireshark, on page 861 · Restrictions for Wireshark, on page 861 · Information About Wireshark, on page 863 · How to Configure Wireshark, on page 872 · Monitoring Wireshark, on page 882 · Configuration Examples for Wireshark, on page 882 · Additional References, on page 897 · Feature History and Information for WireShark, on page 898 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Wireshark · Wireshark is supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, Catalyst 3850, Catalyst 3650, Wireless LAN Controller 5700 Series, Catalyst 4500X-16, and Catalyst 4500X-32. Restrictions for Wireshark · Starting in Cisco IOS Release XE 3.3.0(SE), global packet capture on Wireshark is not supported. · Capture filters are not supported. · The CLI for configuring Wireshark requires that the feature be executed only from EXEC mode. Actions that usually occur in configuration submode (such as defining capture points), are handled at the EXEC Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 861 Restrictions for Wireshark Network Management mode instead. All key commands are not NVGEN'd and are not synchronized to the standby supervisor in NSF and SSO scenarios. · Packets captured in the output direction of an interface might not reflect the changes made by switch rewrite (includes TTL, VLAN tag, CoS, checksum, MAC addresses, DSCP, precedent, UP, etc.). · Limiting circular file storage by file size is not supported. Wireless Packet Capture · The only form of wireless capture is a CAPWAP tunnel capture. · When capturing CAPWAP tunnels, no other interface types can be used as attachment points on the same capture point. · Capturing multiple CAPWAP tunnels is supported. · Core filters are not applied and should be omitted when capturing a CAPWAP tunnel. · To capture a CAPWAP data tunnel, each CAPWAP tunnel is mapped to a physical port and an appropriate ACL will be applied to filter the traffic. · To capture a CAPWAP non-data tunnel, the switch is set to capture traffic on all ports and apply an appropriate ACL to filter the traffic. Configuration Limitations · Multiple capture points can be defined, but only one can be active at a time. You need to stop one before you can start the other. · Neither VRFs, management ports, nor private VLANs can be used as attachment points. · Only one ACL of each type (IPv4, IPv6, MAC) is allowed in a Wireshark class map. There can be a maximum of three ACLs in a class map: one for IPv4, one for IPv6, and the other for MAC. · Wireshark cannot capture packets on a destination SPAN port. · Wireshark will stop capturing when one of the attachment points (interfaces) attached to a capture point stops working. For example, if the device that is associated with an attachment point is unplugged from the switch. To resume capturing, the capture must be restarted manually. · CPU-injected packets are considered control plane packets. Therefore, these types of packets will not be captured on an interface egress capture. · MAC ACL is only used for non-IP packets such as ARP. It will not be supported on a Layer 3 port or SVI. · IPv6-based ACLs are not supported in VACL. · Layer 2 and Layer 3 EtherChannels are not supported. · ACL logging and Wireshark are incompatible. Once Wireshark is activated, it takes priority. All traffic, including that being captured by ACL logging on any ports, will be redirected to Wireshark. We recommended that you deactivate ACL logging before starting Wireshark. Otherwise, Wireshark traffic will be contaminated by ACL logging traffic. · Wireshark does not capture packets dropped by floodblock. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 862 Network Management Information About Wireshark · If you capture both PACL and RACL on the same port, only one copy is sent to the CPU. If you capture a DTLS-encrypted CAPWAP interface, two copies are sent to Wireshark, one encrypted and the other decrypted. The same behavior will occur if we capture a Layer 2 interface carrying DTLS-encrypted CAPWAP traffic. The core filter is based on the outer CAPWAP header. Information About Wireshark Wireshark Overview Wireshark is a packet analyzer program, formerly known as Ethereal, that supports multiple protocols and presents information in a text-based user interface. The ability to capture and analyze traffic provides data on network activity. Prior to Cisco IOS Release XE 3.3.0(SE), only two features addressed this need: SPAN and debug platform packet. Both have limitations. SPAN is ideal for capturing packets, but can only deliver them by forwarding them to some specified local or remote destination; it provides no local display or analysis support. The debug platform packet command is specific to the Catalyst 4500 series and only works on packets that come from the software process-forwarding path. Also, the debug platform packet command has limited local display capabilities and no analysis support. So the need exists for a traffic capture and analysis mechanism that is applicable to both hardware and software forwarded traffic and that provides strong packet capture, display, and analysis support, preferably using a well known interface. Wireshark dumps packets to a file using a well known format called .pcap, and is applied or enabled on individual interfaces. You specify an interface in EXEC mode along with the filter and other parameters. The Wireshark application is applied only when you enter a start command, and is removed only when Wireshark stops capturing packets either automatically or manually. Capture Points A capture point is the central policy definition of the Wireshark feature. The capture point describes all of the characteristics associated with a given instance of Wireshark: which packets to capture, where to capture them from, what to do with the captured packets, and when to stop. Capture points can be modified after creation, and do not become active until explicitly activated with a start command. This process is termed activating the capture point or starting the capture point. Capture points are identified by name and can also be manually or automatically deactivated or stopped. Multiple capture points can be defined, but only one can be active at a time. You need to stop one before you can start the other. Attachment Points An attachment point is a point in the logical packet process path associated with a capture point. An attachment point is an attribute of the capture point. Packets that impact an attachment point are tested against capture point filters; packets that match are copied and sent to the associated Wireshark instance of the capture point. A specific capture point can be associated with multiple attachment points, with limits on mixing attachment points of different types. Some restrictions apply when you specify attachment points of different types. Attachment points are directional (input or output or both) with the exception of the Layer 2 VLAN attachment point, which is always bidirectional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 863 Filters Network Management Filters Filters are attributes of a capture point that identify and limit the subset of traffic traveling through the attachment point of a capture point, which is copied and passed to Wireshark. To be displayed by Wireshark, a packet must pass through an attachment point, as well as all of the filters associated with the capture point. A capture point has the following types of filters: · Core system filter--The core system filter is applied by hardware, and its match criteria is limited by hardware. This filter determines whether hardware-forwarded traffic is copied to software for Wireshark purposes. · Display filter--The display filter is applied by Wireshark. Packets that fail the display filter are not displayed. Core System Filter You can specify core system filter match criteria by using the class map or ACL, or explicitly by using the CLI. Note When specifying CAPWAP as an attachment point, the core system filter is not used. In some installations, you need to obtain authorization to modify the switch configuration, which can lead to extended delays if the approval process is lengthy. This can limit the ability of network administrators to monitor and analyze traffic. To address this situation, Wireshark supports explicit specification of core system filter match criteria from the EXEC mode CLI. The disadvantage is that the match criteria that you can specify is a limited subset of what class map supports, such as MAC, IP source and destination addresses, ether-type, IP protocol, and TCP/UDP source and destination ports. If you prefer to use configuration mode, you can define ACLs or have class maps refer capture points to them. Explicit and ACL-based match criteria are used internally to construct class maps and policy maps. Note The ACL and class map configuration are part of the system and not aspects of the Wireshark feature. Display Filter With the display filter, you can direct Wireshark to further narrow the set of packets to display when decoding and displaying from a .pcap file. Related Topics Additional References, on page 897 Actions Wireshark can be invoked on live traffic or on a previously existing .pcap file. When invoked on live traffic, it can perform four types of actions on packets that pass its display filters: · Captures to buffer in memory to decode and analyze and store · Stores to a .pcap file · Decodes and displays Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 864 Network Management Storage of Captured Packets to Buffer in Memory · Stores and displays When invoked on a .pcap file only, only the decode and display action is applicable. Storage of Captured Packets to Buffer in Memory Packets can be stored in the capture buffer in memory for subsequent decode, analysis, or storage to a .pcap file. The capture buffer can be in linear or circular mode. In linear mode, new packets are discarded when the buffer is full. In circular mode, if the buffer is full, the oldest packets are discarded to accommodate the new packets. Although the buffer can also be cleared when needed, this mode is mainly used for debugging network traffic. Note If you have more than one capture that is storing packets in a buffer, clear the buffer before starting a new capture to avoid memory loss. Storage of Captured Packets to a .pcap File Note When WireShark is used on switches in a stack, packet captures can be stored only on flash or USB flash devices connected to the active switch. For example, if flash1 is connected to the active switch, and flash2 is connected to the secondary switch, only flash1 can be used to store packet captures. Attempts to store packet captures on devices other than flash or USB flash devices connected to the active switch will probably result in errors. Wireshark can store captured packets to a .pcap file. The capture file can be located on the following storage devices: · Switch on-board flash storage (flash:) · USB drive (usbflash0:) Note Attempts to store packet captures on unsupported devices or devices not connected to the active switch will probably result in errors. When configuring a Wireshark capture point, you can associate a filename. When the capture point is activated, Wireshark creates a file with the specified name and writes packets to it. If the file already exists when the file is associated or the capture point is activated, Wireshark queries you as to whether the file can be overwritten. Only one capture point may be associated with a given filename. If the destination of the Wireshark writing process is full, Wireshark fails with partial data in the file. You must ensure that there is sufficient space in the file system before you start the capture session. With Cisco IOS Release IOS XE 3.3.0(SE), the file system full status is not detected for some storage devices. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 865 Packet Decoding and Display Network Management You can reduce the required storage space by retaining only a segment, instead of the entire packet. Typically, you do not require details beyond the first 64 or 128 bytes. The default behavior is to store the entire packet. To avoid possible packet drops when processing and writing to the file system, Wireshark can optionally use a memory buffer to temporarily hold packets as they arrive. Memory buffer size can be specified when the capture point is associated with a .pcap file. Packet Decoding and Display Wireshark can decode and display packets to the console. This functionality is possible for capture points applied to live traffic and for capture points applied to a previously existing .pcap file. Note Decoding and displaying packets may be CPU intensive. Wireshark can decode and display packet details for a wide variety of packet formats. The details are displayed by entering the monitor capture name start command with one of the following keyword options, which place you into a display and decode mode: · brief--Displays one line per packet (the default). · detailed--Decodes and displays all the fields of all the packets whose protocols are supported. Detailed modes require more CPU than the other two modes. · (hexadecimal) dump--Displays one line per packet as a hexadecimal dump of the packet data and the printable characters of each packet. When you enter the capture command with the decode and display option, the Wireshark output is returned to Cisco IOS and displayed on the console unchanged. Live Traffic Display Wireshark receives copies of packets from the core system. Wireshark applies its display filters to discard uninteresting packets, and then decodes and displays the remaining packets. .pcap File Display Wireshark can decode and display packets from a previously stored .pcap file and direct the display filter to selectively displayed packets. Packet Storage and Display Functionally, this mode is a combination of the previous two modes. Wireshark stores packets in the specified .pcap file and decodes and displays them to the console. Only the core filters are applicable here. Wireshark Capture Point Activation and Deactivation After a Wireshark capture point has been defined with its attachment points, filters, actions, and other options, it must be activated. Until the capture point is activated, it does not actually capture packets. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 866 Network Management Wireshark Features Before a capture point is activated, some functional checks are performed. A capture point cannot be activated if it has neither a core system filter nor attachment points defined. Attempting to activate a capture point that does not meet these requirements generates an error.* Note *When performing a wireless capture with a CAPWAP tunneling interface, the core system filter is not required and cannot be used. The display filters are specified as needed. After Wireshark capture points are activated, they can be deactivated in multiple ways. A capture point that is storing only packets to a .pcap file can be halted manually or configured with time or packet limits, after which the capture point halts automatically. When a Wireshark capture point is activated, a fixed rate policer is applied automatically in the hardware so that the CPU is not flooded with Wireshark-directed packets. The disadvantage of the rate policer is that you cannot capture contiguous packets beyond the established rate even if more resources are available. Wireshark Features This section describes how Wireshark features function in the switch environment: · If port security and Wireshark are applied on an ingress capture, a packet that is dropped by port security will still be captured by Wireshark. If port security is applied on an ingress capture, and Wireshark is applied on an egress capture, a packet that is dropped by port security will not be captured by Wireshark. · Packets dropped by Dynamic ARP Inspection (DAI) are not captured by Wireshark. · If a port that is in STP blocked state is used as an attachment point and the core filter is matched, Wireshark will capture the packets that come into the port, even though the packets will be dropped by the switch. · Classification-based security features--Packets that are dropped by input classification-based security features (such as ACLs and IPSG) are not caught by Wireshark capture points that are connected to attachment points at the same layer. In contrast, packets that are dropped by output classification-based security features are caught by Wireshark capture points that are connected to attachment points at the same layer. The logical model is that the Wireshark attachment point occurs after the security feature lookup on the input side, and symmetrically before the security feature lookup on the output side. On ingress, a packet goes through a Layer 2 port, a VLAN, and a Layer 3 port/SVI. On egress, the packet goes through a Layer 3 port/SVI, a VLAN, and a Layer 2 port. If the attachment point is before the point where the packet is dropped, Wireshark will capture the packet. Otherwise, Wireshark will not capture the packet. For example, Wireshark capture policies connected to Layer 2 attachment points in the input direction capture packets dropped by Layer 3 classification-based security features. Symmetrically, Wireshark capture policies attached to Layer 3 attachment points in the output direction capture packets dropped by Layer 2 classification-based security features. · Routed ports and switch virtual interfaces (SVIs)--Wireshark cannot capture the output of an SVI because the packets that go out of an SVI's output are generated by CPU. To capture these packets, include the control plane as an attachment point. · VLANs--When a VLAN is used as a Wireshark attachment point, packets are captured in the input direction only. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 867 Wireshark Features Network Management · Redirection features--In the input direction, features traffic redirected by Layer 3 (such as PBR and WCCP) are logically later than Layer 3 Wireshark attachment points. Wireshark captures these packets even though they might later be redirected out another Layer 3 interface. Symmetrically, output features redirected by Layer 3 (such as egress WCCP) are logically prior to Layer 3 Wireshark attachment points, and Wireshark will not capture them. · SPAN--Wireshark and SPAN sources are compatible. You can configure an interface as a SPAN source and as a Wireshark attachment point simultaneously. Configuring a SPAN destination port as a Wireshark attachment point is not supported. · You can capture packets from a maximum of 1000 VLANs at a time, if no ACLs are applied. If ACLs are applied, the hardware will have less space for Wireshark to use. As a result, the maximum number of VLANs than can be used for packet capture at a time will be lower. Using more than 1000 VLANs tunnels at a time or extensive ACLs might have unpredictable results. For example, mobility may go down. Note Capturing an excessive number of attachment points at the same time is strongly discouraged because it may cause excessive CPU utilization and unpredictable hardware behavior. Wireless Packet Capture in Wireshark · Wireless traffic is encapsulated inside CAPWAP packets. However, capturing only a particular wireless client's traffic inside a CAPWAP tunnel is not supported when using the CAPWAP tunnel as an attachment point. To capture only a particular wireless client's traffic, use the client VLAN as an attachment point and formulate the core filter accordingly. · Limited decoding of inner wireless traffic is supported. Decoding of inner wireless packets inside encrypted CAPWAP tunnels is not supported. · No other interface type can be used with the CAPWAP tunneling interface on the same capture point. A CAPWAP tunneling interface and a Level 2 port cannot be attachment points on the same capture point. · You cannot specify a core filter when capturing packets for Wireshark via the CAPWAP tunnel. However, you can use the Wireshark display filters for filtering wireless client traffic against a specific wireless client. · You can capture packets from a maximum of 135 CAPWAP tunnels at a time if no ACLs are applied. If ACLs are applied, the hardware memory will have less space for Wireshark to use. As a result, the maximum number of CAPWAP tunnels than can be used for packet capture at a time will be lower. Using more than 135 CAPWAP tunnels at a time or unsing extensive ACLs might have unpredictable results. For example, mobility may go down. Note Capturing an excessive number of attachment points at the same time is strongly discouraged because it may cause excessive CPU utilization and unpredictable hardware behavior. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 868 Network Management Guidelines for Wireshark Guidelines for Wireshark · During Wireshark packet capture, hardware forwarding happens concurrently. · Before starting a Wireshark capture process, ensure that CPU usage is moderate and that sufficient memory (at least 200 MB) is available. · If you plan to store packets to a storage file, ensure that sufficient space is available before beginning a Wireshark capture process. · The CPU usage during Wireshark capture depends on how many packets match the specified conditions and on the intended actions for the matched packets (store, decode and display, or both). · Where possible, keep the capture to the minimum (limit by packets, duration) to avoid high CPU usage and other undesirable conditions. · Because packet forwarding typically occurs in hardware, packets are not copied to the CPU for software processing. For Wireshark packet capture, packets are copied and delivered to the CPU, which causes an increase in CPU usage. To avoid high CPU usage, do the following: · Attach only relevant ports. · Use a class map, and secondarily, an access list to express match conditions. If neither is viable, use an explicit, in-line filter. · Adhere closely to the filter rules. Restrict the traffic type (such as, IPv4 only) with a restrictive, rather than relaxed ACL, which elicits unwanted traffic. · Always limit packet capture to either a shorter duration or a smaller packet number. The parameters of the capture command enable you to specify the following: · Capture duration · Number of packets captured · File size · Packet segment size · Run a capture session without limits if you know that very little traffic matches the core filter. · You might experience high CPU (or memory) usage if: · You leave a capture session enabled and unattended for a long period of time, resulting in unanticipated bursts of traffic. · You launch a capture session with ring files or capture buffer and leave it unattended for a long time, resulting in performance or system health issues. · During a capture session, watch for high CPU usage and memory consumption due to Wireshark that may impact switch performance or health. If these situations arise, stop the Wireshark session immediately. · Avoid decoding and displaying packets from a .pcap file for a large file. Instead, transfer the .pcap file to a PC and run Wireshark on the PC. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 869 Guidelines for Wireshark Network Management · You can define up to eight Wireshark instances. An active show command that decodes and displays packets from a .pcap file or capture buffer counts as one instance. However, only one of the instances can be active. · Whenever an ACL that is associated with a running capture is modified, you must restart the capture for the ACL modifications to take effect. If you do not restart the capture, it will continue to use the original ACL as if it had not been modified. · To avoid packet loss, consider the following: · Use store-only (when you do not specify the display option) while capturing live packets rather than decode and display, which is an CPU-intensive operation (especially in detailed mode). · If you have more than one capture that is storing packets in a buffer, clear the buffer before starting a new capture to avoid memory loss. · If you use the default buffer size and see that you are losing packets, you can increase the buffer size to avoid losing packets. · Writing to flash disk is a CPU-intensive operation, so if the capture rate is insufficient, you may want to use a buffer capture. · The Wireshark capture session operates normally in streaming mode where packets are both captured and processed. However, when you specify a buffer size of at least 32 MB, the session automatically turns on lock-step mode in which a Wireshark capture session is split into two phases: capture and process. In the capture phase, the packets are stored in the temporary buffer. The duration parameter in lock-step mode serves as capture duration rather than session duration. When the buffer is full or the capture duration or packet limit has been attained, a session transitions to the process phase, wherein it stops accepting packets and starts processing packets in the buffer. You can also stop the capture manually. You will see a message in the output when the capture stops. With this second approach (lock-step mode), a higher capture throughput can be achieved. Note If you are capturing packets to a buffer, there is no file storage defined. Hence, you must export your capture from the buffer to a static storage file. Use the monitor capture capture-name export file-location : file-name command. · The streaming capture mode supports approximately 1000 pps; lock-step mode supports approximately 2 Mbps (measured with 256-byte packets). When the matching traffic rate exceeds this number, you may experience packet loss. · If you want to decode and display live packets in the console window, ensure that the Wireshark session is bounded by a short capture duration. Note Warning: A Wireshark session with either a longer duration limit or no capture duration (using a terminal with no auto-more support using the term len 0 command) may make the console or terminal unusable. · When using Wireshark to capture live traffic that leads to high CPU, usage, consider applying a QoS policy temporarily to limit the actual traffic until the capture process concludes. · All Wireshark-related commands are in EXEC mode; no configuration commands exist for Wireshark. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 870 Network Management Default Wireshark Configuration If you need to use access list or class-map in the Wireshark CLI, you must define an access list and class map with configuration commands. · No specific order applies when defining a capture point; you can define capture point parameters in any order, provided that CLI allows this. The Wireshark CLI allows as many parameters as possible on a single line. This limits the number of commands required to define a capture point. · All parameters except attachment points take a single value. Generally, you can replace the value with a new one by reentering the command. After user confirmation, the system accepts the new value and overrides the older one. A no form of the command is unnecessary to provide a new value, but it is necessary to remove a parameter. · Wireshark allows you to specify one or more attachment points. To add more than one attachment point, reenter the command with the new attachment point. To remove an attachment point, use the no form of the command. You can specify an interface range as an attachment point. For example, enter monitor capture mycap interface GigabitEthernet1/0/1 in where interface GigabitEthernet1/0/1 is an attachment point. If you also need to attach interface GigabitEthernet1/0/2, specify it in another line as follows: monitor capture mycap interface GigabitEthernet1/0/2 in · You can modify any of the parameters of a capture point while a session is active, but you must restart the session for the modifications to take effect. · The action you want to perform determines which parameters are mandatory. The Wireshark CLI allows you to specify or modify any parameter prior to entering the start command. When you enter the start command, Wireshark will start only after determining that all mandatory parameters have been provided. · If the capture file already exists, it provides a warning and receives confirmation before proceeding. This prevents you from mistakenly overwriting a file. · The core filter can be an explicit filter, access list, or class map. Specifying a newer filter of these types replaces the existing one. Note A core filter is required except when using a CAPWAP tunnel interface as a capture point attachment point. · You can terminate a Wireshark session with an explicit stop command or by entering q in automore mode. The session could terminate itself automatically when a stop condition such as duration or packet capture limit is met. Default Wireshark Configuration The table below shows the default Wireshark configuration. Feature Duration Packets Packet-length Default Setting No limit No limit No limit (full packet) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 871 How to Configure Wireshark Network Management Feature File size Ring file storage Buffer storage mode Default Setting No limit No Linear How to Configure Wireshark To configure Wireshark, perform these basic steps. 1. Define a capture point. 2. (Optional) Add or modify the capture point's parameters. 3. Activate or deactivate a capture point. 4. Delete the capture point when you are no longer using it. Related Topics Defining a Capture Point, on page 872 Adding or Modifying Capture Point Parameters, on page 876 Deleting Capture Point Parameters, on page 878 Deleting a Capture Point, on page 879 Activating and Deactivating a Capture Point, on page 880 Clearing the Capture Point Buffer, on page 881 Defining a Capture Point The example in this procedure defines a very simple capture point. If you choose, you can define a capture point and all of its parameters with one instance of the monitor capture command. Note You must define an attachment point, direction of capture, and core filter to have a functional capture point. An exception to needing to define a core filter is when you are defining a wireless capture point using a CAPWAP tunneling interface. In this case, you do not define your core filter. It cannot be used. In privileged EXEC mode, follow these steps to define a capture point. SUMMARY STEPS 1. show capwap summary 2. monitor capture {capture-name}{interface interface-type interface-id | control-plane}{in | out | both} 3. monitor capture {capture-name}[match {any | ipv4 any any | ipv6} any any}] 4. show monitor capture {capture-name}[ parameter] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 872 Network Management Defining a Capture Point DETAILED STEPS Step 1 Command or Action show capwap summary Example: Switch# show capwap summary Purpose Displays the CAPWAP tunnels available as attachment points for a wireless capture. Note Use this command only if you are using a CAPWAP tunnel as an attachment point to perform a wireless capture. See the CAPWAP example in the examples section. Step 2 monitor capture {capture-name}{interface Defines the capture point, specifies the attachment point interface-type interface-id | control-plane}{in | out with which the capture point is associated, and specifies the | both} direction of the capture. Example: The keywords have these meanings: Switch# monitor capture mycap interface GigabitEthernet1/0/1 in · capture-name--Specifies the name of the capture point to be defined (mycap is used in the example). · (Optional) interface interface-type interface-id--Specifies the attachment point with which the capture point is associated (GigabitEthernet1/0/1 is used in the example). Note Optionally, you can define multiple attachment points and all of the parameters for this capture point with this one command instance. These parameters are discussed in the instructions for modifying capture point parameters. Range support is also available both for adding and removing attachment points. Use one of the following for interface-type: · GigabitEthernet--Specifies the attachment point as GigabitEthernet. · vlan--Specifies the attachment point as a VLAN. Note Only ingress capture (in) is allowed when using this interface as an attachment point. · capwap--Specifies the attachment point as a CAPWAP tunnel. Note When using this interface as an attachment point, a core filter cannot be used. · (Optional) control-plane--Specifies the control plane as an attachment point. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 873 Defining a Capture Point Network Management Step 3 Step 4 Command or Action Purpose · in | out | both--Specifies the direction of capture. monitor capture {capture-name}[match {any | ipv4 Defines the core system filter. any any | ipv6} any any}] Note When using the CAPWAP tunneling interface Example: as an attachment point, do not perform this step Switch# monitor capture mycap interface because a core filter cannot be used. GigabitEthernet1/0/1 in match any The keywords have these meanings: · capture-name--Specifies the name of the capture point to be defined (mycap is used in the example). · match--Specifies a filter. The first filter defined is the core filter. Note A capture point cannot be activated if it has neither a core system filter nor attachment points defined. Attempting to activate a capture point that does not meet these requirements generates an error. · ipv4--Specifies an IP version 4 filter. · ipv6--Specifies an IP version 6 filter. show monitor capture {capture-name}[ parameter] Displays the capture point parameters that you defined in Example: Step 1 and confirms that you defined a capture point. Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in monitor capture mycap match any Example To define a capture point with a CAPWAP attachment point: Switch# show capwap summary CAPWAP Tunnels General Statistics: Number of Capwap Data Tunnels =1 Number of Capwap Mobility Tunnels = 0 Number of Capwap Multicast Tunnels = 0 Name APName Type PhyPortIf Mode McastIf ------ -------------------------------- ---- --------- --------- ------- Ca0 AP442b.03a9.6715 data Gi3/0/6 unicast - Name SrcIP SrcPort DestIP DstPort DtlsEn MTU Xact ------ --------------- ------- --------------- ------- ------ ----- ---- Ca0 10.10.14.32 5247 10.10.14.2 38514 No 1449 0 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 874 Network Management Defining a Capture Point Switch# monitor capture mycap interface capwap 0 both Switch# monitor capture mycap file location flash:mycap.pcap Switch# monitor capture mycap file buffer-size 1 Switch# monitor capture mycap start *Aug 20 11:02:21.983: %BUFCAP-6-ENABLE: Capture Point mycap enabled.on Switch# show monitor capture mycap parameter monitor capture mycap interface capwap 0 in monitor capture mycap interface capwap 0 out monitor capture mycap file location flash:mycap.pcap buffer-size 1 Switch# Switch# show monitor capture mycap Status Information for Capture mycap Target Type: Interface: CAPWAP, Ingress: 0 Egress: 0 Status : Active Filter Details: Capture all packets Buffer Details: Buffer Type: LINEAR (default) File Details: Associated file name: flash:mycap.pcap Size of buffer(in MB): 1 Limit Details: Number of Packets to capture: 0 (no limit) Packet Capture duration: 0 (no limit) Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling) Switch# Switch# show monitor capture file flash:mycap.pcap 1 0.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 2 0.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 3 2.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 4 2.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 5 3.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 6 4.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 7 4.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 8 5.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 9 5.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 10 6.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 11 8.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 12 9.225986 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 13 9.225986 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 14 9.225986 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 15 9.231998 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 16 9.231998 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 875 Adding or Modifying Capture Point Parameters Network Management 17 9.231998 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 18 9.236987 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 19 10.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 20 10.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 21 12.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 22 12.239993 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 23 12.244997 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 24 12.244997 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 25 12.250994 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 26 12.256990 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 27 12.262987 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 28 12.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 29 12.802012 10.10.14.3 -> 10.10.14.255 NBNS Name query NB WPAD.<00> 30 13.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ What to do next You can add additional attachment points, modify the parameters of your capture point, then activate it, or if you want to use your capture point just as it is, you can now activate it. Note You cannot change a capture point's parameters using the methods presented in this topic. Related Topics How to Configure Wireshark, on page 872 Adding or Modifying Capture Point Parameters, on page 876 Deleting Capture Point Parameters, on page 878 Deleting a Capture Point, on page 879 Activating and Deactivating a Capture Point, on page 880 Adding or Modifying Capture Point Parameters Although listed in sequence, the steps to specify values for the parameters can be executed in any order. You can also specify them in one, two, or several lines. Except for attachment points, which can be multiple, you can replace any value with a more recent value by redefining the same option. In privileged EXEC mode, follow these steps to modify a capture point's parameters. Before you begin A capture point must be defined before you can use these instructions. SUMMARY STEPS 1. monitor capture {capture-name} match {any | mac mac-match-string | ipv4 {any | host | protocol}{any | host} | ipv6 {any | host | protocol}{any | host}} 2. monitor capture {capture-name} limit {[duration seconds][packet-length size][packets num]} Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 876 Network Management Adding or Modifying Capture Point Parameters 3. monitor capture {capture-name} file {location filename} 4. monitor capture {capture-name} file {buffer-size size} 5. show monitor capture {capture-name}[ parameter] DETAILED STEPS Step 1 Command or Action Purpose monitor capture {capture-name} match {any | mac Defines the core system filter (ipv4 any any), defined either mac-match-string | ipv4 {any | host | explicitly, through ACL or through a class map. protocol}{any | host} | ipv6 {any | host | Note If you are defining a wireless capture point using protocol}{any | host}} a CAPWAP tunneling interface, this command Example: will have no effect, so it should not be used. Switch# monitor capture mycap match ipv4 any any Step 2 monitor capture {capture-name} limit {[duration seconds][packet-length size][packets num]} Example: Switch# monitor capture mycap limit duration 60 packet-len 400 Specifies the session limit in seconds (60), packets captured, or the packet segment length to be retained by Wireshark (400). Step 3 monitor capture {capture-name} file {location filename} Example: Switch# monitor capture mycap file location flash:mycap.pcap Specifies the file association, if the capture point intends to capture packets rather than only display them. Step 4 monitor capture {capture-name} file {buffer-size Specifies the size of the memory buffer used by Wireshark size} to handle traffic bursts. Example: Switch# monitor capture mycap file buffer-size 100 Step 5 show monitor capture {capture-name}[ parameter] Displays the capture point parameters that you defined Example: previously. Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in monitor capture mycap match ipv4 any any monitor capture mycap limit duration 60 packet-len 400 monitor capture point mycap file location bootdisk:mycap.pcap monitor capture mycap file buffer-size 100 Examples Modifying Parameters Associating or Disassociating a Capture File Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 877 Deleting Capture Point Parameters Network Management Switch# monitor capture point mycap file location flash:mycap.pcap Switch# no monitor capture mycap file Specifying a Memory Buffer Size for Packet Burst Handling Switch# monitor capture mycap buffer size 100 Defining an Explicit Core System Filter to Match Both IPv4 and IPv6 Switch# monitor capture mycap match any What to do next if your capture point contains all of the parameters you want, activate it. Related Topics How to Configure Wireshark, on page 872 Defining a Capture Point, on page 872 Deleting Capture Point Parameters, on page 878 Deleting a Capture Point, on page 879 Deleting Capture Point Parameters Although listed in sequence, the steps to delete parameters can be executed in any order. You can also delete them in one, two, or several lines. Except for attachment points, which can be multiple, you can delete any parameter. In privileged EXEC mode, follow these steps to delete a capture point's parameters. Before you begin A capture point parameter must be defined before you can use these instructions to delete it. SUMMARY STEPS 1. no monitor capture {capture-name} match 2. no monitor capture {capture-name} limit [duration][packet-length][packets] 3. no monitor capture {capture-name} file [location] [buffer-size] 4. show monitor capture {capture-name}[ parameter] DETAILED STEPS Step 1 Command or Action no monitor capture {capture-name} match Example: Switch# no monitor capture mycap match Step 2 no monitor capture {capture-name} limit [duration][packet-length][packets] Example: Purpose Deletes all filters defined on capture point (mycap). Deletes the session time limit and the packet segment length to be retained by Wireshark. It leaves other specified limits in place. Deletes all limits on Wireshark. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 878 Network Management Deleting a Capture Point Step 3 Step 4 Command or Action Switch# no monitor capture mycap limit duration packet-len Switch# no monitor capture mycap limit Purpose no monitor capture {capture-name} file [location] [buffer-size] Example: Switch# no monitor capture mycap file Switch# no monitor capture mycap file location Deletes the file association. The capture point will no longer capture packets. It will only display them. Deletes the file location association. The file location will no longer be associated with the capture point. However, other defined fille association will be unaffected by this action. show monitor capture {capture-name}[ parameter] Example: Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in Displays the capture point parameters that remain defined after your parameter deletion operations. This command can be run at any point in the procedure to see what parameters are associated with a capture point. What to do next If your capture point contains all of the parameters you want, activate it. Related Topics How to Configure Wireshark, on page 872 Defining a Capture Point, on page 872 Adding or Modifying Capture Point Parameters, on page 876 Deleting a Capture Point In privileged EXEC mode, follow these steps to delete a capture point. Before you begin A capture point must be defined before you can use these instructions to delete it. SUMMARY STEPS 1. no monitor capture {capture-name} 2. show monitor capture {capture-name}[ parameter] DETAILED STEPS Step 1 Command or Action no monitor capture {capture-name} Example: Switch# no monitor capture mycap Purpose Deletes the specified capture point (mycap). Step 2 show monitor capture {capture-name}[ parameter] Displays a message indicating that the specified capture Example: point does not exist because it has been deleted. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 879 Activating and Deactivating a Capture Point Network Management Command or Action Switch# show monitor capture mycap parameter Capture mycap does not exist Purpose What to do next You can define a new capture point with the same name as the one you deleted. These instructions are usually performed when one wants to start over with defining a capture point. Related Topics How to Configure Wireshark, on page 872 Defining a Capture Point, on page 872 Adding or Modifying Capture Point Parameters, on page 876 Activating and Deactivating a Capture Point In privileged EXEC mode, follow these steps to activate or deactivate a capture point. Before you begin A capture point cannot be activated unless an attachment point and a core system filter have been defined and the associated filename (if any) does not already exist. A capture point with no associated filename can only be activated to display. If no capture or display filters are specified, all of the packets captured by the core system filter are displayed. The default display mode is brief. Note When using a CAPWAP tunneling interface as an attachment point, core filters are not used, so there is no requirement to define them in this case. SUMMARY STEPS 1. monitor capture {capture-name} start[display [display-filter filter-string]][brief | detailed | dump] 2. monitor capture {capture-name} stop DETAILED STEPS Step 1 Command or Action monitor capture {capture-name} start[display [display-filter filter-string]][brief | detailed | dump] Example: Switch# monitor capture mycap start display display-filter "stp" Step 2 monitor capture {capture-name} stop Example: Purpose Activates a capture point and filters the display, so only packets containing "stp" are displayed. Deactivates a capture point. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 880 Network Management Clearing the Capture Point Buffer Command or Action Switch# monitor capture name stop Purpose Related Topics How to Configure Wireshark, on page 872 Defining a Capture Point, on page 872 Clearing the Capture Point Buffer In privileged EXEC mode, follow these steps to clear the buffer contents or save them to an external file for storage. Note If you have more than one capture that is storing packets in a buffer, clear the buffer before starting a new capture to avoid memory loss. SUMMARY STEPS 1. monitor capture {capture-name} [clear | export filename] DETAILED STEPS Step 1 Command or Action monitor capture {capture-name} [clear | export filename] Example: Switch# monitor capture mycap clear Purpose Clears capture buffer contents or stores the packets to a file. Examples: Capture Point Buffer Handling Exporting Capture to a File Switch# monitor capture mycap export flash:mycap.pcap Storage configured as File for this capture Clearing Capture Point Buffer Switch# monitor capture mycap clear Capture configured with file options Related Topics How to Configure Wireshark, on page 872 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 881 Monitoring Wireshark Network Management Monitoring Wireshark The commands in this table are used to monitor Wireshark. Command show monitor capture [capture-name ] Purpose Displays the capture point state so that you can see what capture points are defined, what their attributes are, and whether they are active. When capture point name is specified, it displays specific capture point's details. show monitor capture [capture-name parameter] Displays the capture point parameters. show capwap summary Displays all the CAPWAP tunnels on the switch. Use this command to determine which CAPWAP tunnels are available to use for a wireless capture. Configuration Examples for Wireshark Example: Displaying a Brief Output from a .pcap File You can display the output from a .pcap file by entering: Switch# show monitor capture file flash:mycap.pcap 1 0.000000 10.1.1.140 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 2 1.000000 10.1.1.141 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 3 2.000000 10.1.1.142 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 4 3.000000 10.1.1.143 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 5 4.000000 10.1.1.144 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 6 5.000000 10.1.1.145 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 7 6.000000 10.1.1.146 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 8 7.000000 10.1.1.147 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 9 8.000000 10.1.1.148 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 10 9.000000 10.1.1.149 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 11 10.000000 10.1.1.150 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 12 11.000000 10.1.1.151 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 13 12.000000 10.1.1.152 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 882 Network Management Example: Displaying a Brief Output from a .pcap File 14 13.000000 10.1.1.153 -> 20.1.1.2 15 14.000000 10.1.1.154 -> 20.1.1.2 16 15.000000 10.1.1.155 -> 20.1.1.2 17 16.000000 10.1.1.156 -> 20.1.1.2 18 17.000000 10.1.1.157 -> 20.1.1.2 19 18.000000 10.1.1.158 -> 20.1.1.2 20 19.000000 10.1.1.159 -> 20.1.1.2 21 20.000000 10.1.1.160 -> 20.1.1.2 22 21.000000 10.1.1.161 -> 20.1.1.2 23 22.000000 10.1.1.162 -> 20.1.1.2 24 23.000000 10.1.1.163 -> 20.1.1.2 25 24.000000 10.1.1.164 -> 20.1.1.2 26 25.000000 10.1.1.165 -> 20.1.1.2 27 26.000000 10.1.1.166 -> 20.1.1.2 28 27.000000 10.1.1.167 -> 20.1.1.2 29 28.000000 10.1.1.168 -> 20.1.1.2 30 29.000000 10.1.1.169 -> 20.1.1.2 31 30.000000 10.1.1.170 -> 20.1.1.2 32 31.000000 10.1.1.171 -> 20.1.1.2 33 32.000000 10.1.1.172 -> 20.1.1.2 34 33.000000 10.1.1.173 -> 20.1.1.2 35 34.000000 10.1.1.174 -> 20.1.1.2 36 35.000000 10.1.1.175 -> 20.1.1.2 37 36.000000 10.1.1.176 -> 20.1.1.2 38 37.000000 10.1.1.177 -> 20.1.1.2 39 38.000000 10.1.1.178 -> 20.1.1.2 40 39.000000 10.1.1.179 -> 20.1.1.2 41 40.000000 10.1.1.180 -> 20.1.1.2 42 41.000000 10.1.1.181 -> 20.1.1.2 43 42.000000 10.1.1.182 -> 20.1.1.2 44 43.000000 10.1.1.183 -> 20.1.1.2 45 44.000000 10.1.1.184 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 883 Example: Displaying Detailed Output from a .pcap File Network Management 46 45.000000 10.1.1.185 -> 20.1.1.2 47 46.000000 10.1.1.186 -> 20.1.1.2 48 47.000000 10.1.1.187 -> 20.1.1.2 49 48.000000 10.1.1.188 -> 20.1.1.2 50 49.000000 10.1.1.189 -> 20.1.1.2 51 50.000000 10.1.1.190 -> 20.1.1.2 52 51.000000 10.1.1.191 -> 20.1.1.2 53 52.000000 10.1.1.192 -> 20.1.1.2 54 53.000000 10.1.1.193 -> 20.1.1.2 55 54.000000 10.1.1.194 -> 20.1.1.2 56 55.000000 10.1.1.195 -> 20.1.1.2 57 56.000000 10.1.1.196 -> 20.1.1.2 58 57.000000 10.1.1.197 -> 20.1.1.2 59 58.000000 10.1.1.198 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 Example: Displaying Detailed Output from a .pcap File You can display the detailed .pcap file output by entering: Switch# show monitor capture file flash:mycap.pcap detailed Frame 1: 256 bytes on wire (2048 bits), 256 bytes captured (2048 bits) Arrival Time: Mar 21, 2012 14:35:09.111993000 PDT Epoch Time: 1332365709.111993000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 0.000000000 seconds] Frame Number: 1 Frame Length: 256 bytes (2048 bits) Capture Length: 256 bytes (2048 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ip:udp:data] Ethernet II, Src: 00:00:00:00:03:01 (00:00:00:00:03:01), Dst: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) Destination: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) Address: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) Source: 00:00:00:00:03:01 (00:00:00:00:03:01) Address: 00:00:00:00:03:01 (00:00:00:00:03:01) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) Type: IP (0x0800) Frame check sequence: 0x03b07f42 [incorrect, should be 0x08fcee78] Internet Protocol, Src: 10.1.1.140 (10.1.1.140), Dst: 20.1.1.2 (20.1.1.2) Version: 4 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 884 Network Management Example: Displaying Detailed Output from a .pcap File Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 238 Identification: 0x0000 (0) Flags: 0x00 0... .... = Reserved bit: Not set .0.. .... = Don't fragment: Not set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: UDP (17) Header checksum: 0x5970 [correct] [Good: True] [Bad: False] Source: 10.1.1.140 (10.1.1.140) Destination: 20.1.1.2 (20.1.1.2) User Datagram Protocol, Src Port: 20001 (20001), Dst Port: 20002 (20002) Source port: 20001 (20001) Destination port: 20002 (20002) Length: 218 Checksum: 0x6e2b [validation disabled] [Good Checksum: False] [Bad Checksum: False] Data (210 bytes) 0000 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 0010 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 0020 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f !"#$%&'()*+,-./ 0030 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 0123456789:;<=>? 0040 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f @ABCDEFGHIJKLMNO 0050 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f PQRSTUVWXYZ[\]^_ 0060 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f `abcdefghijklmno 0070 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f pqrstuvwxyz{|}~. 0080 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f ................ 0090 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f ................ 00a0 a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 00b0 b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 00c0 c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 00d0 d0 d1 .. Data: 000102030405060708090a0b0c0d0e0f1011121314151617... [Length: 210] Frame 2: 256 bytes on wire (2048 bits), 256 bytes captured (2048 bits) Arrival Time: Mar 21, 2012 14:35:10.111993000 PDT Example: Displaying a Hexadecimal Dump Output from a .pcap File You can display the hexadecimal dump output by entering: Switch# show monitor capture file bootflash:mycap.pcap dump 1 0.000000 10.1.1.140 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 0000 0010 0020 0030 0040 0050 0060 0070 0080 0090 00a0 00b0 54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 00 ee 00 00 00 00 40 11 59 70 0a 01 01 8c 14 01 01 02 4e 21 4e 22 00 da 6e 2b 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 Tu.:.?........E. ......@.Yp...... ..N!N"..n+...... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 885 Example: Displaying Detailed Output from a .pcap File Network Management 00c0 00d0 00e0 00f0 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 03 b0 7f 42 ................ ................ ................ ...............B 2 1.000000 10.1.1.141 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 0000 0010 0020 0030 0040 0050 0060 0070 0080 0090 00a0 00b0 00c0 00d0 00e0 00f0 54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 00 ee 00 00 00 00 40 11 59 6f 0a 01 01 8d 14 01 01 02 4e 21 4e 22 00 da 6e 2a 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 95 2c c3 3f Tu.:.?........E. ......@.Yo...... ..N!N"..n*...... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ ................ ................ ................ .............,.? 3 2.000000 10.1.1.142 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 0000 0010 0020 0030 0040 0050 0060 0070 0080 0090 00a0 00b0 00c0 00d0 00e0 00f0 54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 00 ee 00 00 00 00 40 11 59 6e 0a 01 01 8e 14 01 01 02 4e 21 4e 22 00 da 6e 29 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 6c f8 dc 14 Tu.:.?........E. ......@.Yn...... ..N!N"..n)...... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ ................ ................ ................ ............l... 4 3.000000 10.1.1.143 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 0000 54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 Tu.:.?........E. 0010 00 ee 00 00 00 00 40 11 59 6d 0a 01 01 8f 14 01 ......@.Ym...... 0020 01 02 4e 21 4e 22 00 da 6e 28 00 01 02 03 04 05 ..N!N"..n(...... 0030 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 ................ 0040 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 .......... !"#$% 0050 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 &'()*+,-./012345 Example: Displaying Packets from a .pcap File with a Display Filter You can display the .pcap file packets output by entering: Switch# show monitor capture file bootflash:mycap.pcap display-filter "ip.src == 10.1.1.140" dump 1 0.000000 10.1.1.140 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 0000 0010 0020 0030 0040 0050 0060 54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 00 ee 00 00 00 00 40 11 59 70 0a 01 01 8c 14 01 01 02 4e 21 4e 22 00 da 6e 2b 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 Tu.:.?........E. ......@.Yp...... ..N!N"..n+...... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 886 Network Management Example: Simple Capture and Display 0070 0080 0090 00a0 00b0 00c0 00d0 00e0 00f0 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 03 b0 7f 42 FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ ................ ................ ................ ...............B Example: Simple Capture and Display This example shows how to monitor traffic in the Layer 3 interface Gigabit Ethernet 1/0/1: Step 1: Define a capture point to match on the relevant traffic by entering: Switch# monitor capture mycap interface GigabitEthernet1/0/1 in Switch# monitor capture mycap match ipv4 any any Switch# monitor capture mycap limit duration 60 packets 100 Switch# monitor capture mycap buffer size 100 To avoid high CPU utilization, a low packet count and duration as limits has been set. Step 2: Confirm that the capture point has been correctly defined by entering: Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in monitor capture mycap match ipv4 any any monitor capture mycap buffer size 100 monitor capture mycap limit packets 100 duration 60 Switch# show monitor capture mycap Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: in Status : Inactive Filter Details: IPv4 Source IP: any Destination IP: any Protocol: any Buffer Details: Buffer Type: LINEAR (default) Buffer Size (in MB): 100 File Details: File not associated Limit Details: Number of Packets to capture: 100 Packet Capture duration: 60 Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling) Step 3: Start the capture process and display the results. Switch# monitor capture mycap start display 0.000000 10.1.1.30 -> 20.1.1.2 UDP Source port: 20001 1.000000 10.1.1.31 -> 20.1.1.2 UDP Source port: 20001 2.000000 10.1.1.32 -> 20.1.1.2 UDP Source port: 20001 3.000000 10.1.1.33 -> 20.1.1.2 UDP Source port: 20001 4.000000 10.1.1.34 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 887 Example: Simple Capture and Store Network Management 5.000000 6.000000 7.000000 8.000000 9.000000 10.1.1.35 -> 20.1.1.2 10.1.1.36 -> 20.1.1.2 10.1.1.37 -> 20.1.1.2 10.1.1.38 -> 20.1.1.2 10.1.1.39 -> 20.1.1.2 Step 4: Delete the capture point by entering: UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Switch# no monitor capture mycap Example: Simple Capture and Store This example shows how to capture packets to a filter: Step 1: Define a capture point to match on the relevant traffic and associate it to a file by entering: Switch# monitor capture mycap interface GigabitEthernet1/0/1 in Switch# monitor capture mycap match ipv4 any any Switch# monitor capture mycap limit duration 60 packets 100 Switch# monitor capture mycap file location flash:mycap.pcap Step 2: Confirm that the capture point has been correctly defined by entering: Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in monitor capture mycap match ipv4 any any monitor capture mycap file location flash:mycap.pcap monitor capture mycap limit packets 100 duration 60 Switch# show monitor capture mycap Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: in Status : Inactive Filter Details: IPv4 Source IP: any Destination IP: any Protocol: any Buffer Details: Buffer Type: LINEAR (default) File Details: Associated file name: flash:mycap.pcap Limit Details: Number of Packets to capture: 100 Packet Capture duration: 60 Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling) Step 3: Launch packet capture by entering: Switch# monitor capture mycap start Step 4: After sufficient time has passed, stop the capture by entering: Switch# monitor capture mycap stop Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 888 Network Management Example: Using Buffer Capture Note Alternatively, you could allow the capture operation stop automatically after the time has elapsed or the packet count has been met. The mycap.pcap file now contains the captured packets. Step 5: Display the packets by entering: Switch# show monitor capture file flash:mycap.pcap 0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000 10.1.1.30 -> 20.1.1.2 10.1.1.31 -> 20.1.1.2 10.1.1.32 -> 20.1.1.2 10.1.1.33 -> 20.1.1.2 10.1.1.34 -> 20.1.1.2 10.1.1.35 -> 20.1.1.2 10.1.1.36 -> 20.1.1.2 10.1.1.37 -> 20.1.1.2 10.1.1.38 -> 20.1.1.2 10.1.1.39 -> 20.1.1.2 Step 6: Delete the capture point by entering: UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Switch# no monitor capture mycap Example: Using Buffer Capture This example shows how to use buffer capture: Step 1: Launch a capture session with the buffer capture option by entering: Switch# monitor capture mycap interface GigabitEthernet1/0/1 in Switch# monitor capture mycap match ipv4 any any Switch# monitor capture mycap buffer circular size 1 Switch# monitor capture mycap start Step 2: Determine whether the capture is active by entering: Switch# show monitor capture mycap Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: in Status : Active Filter Details: IPv4 Source IP: any Destination IP: any Protocol: any Buffer Details: Buffer Type: CIRCULAR Buffer Size (in MB): 1 File Details: File not associated Limit Details: Number of Packets to capture: 0 (no limit) Packet Capture duration: 0 (no limit) Packet Size to capture: 0 (no limit) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 889 Example: Using Buffer Capture Network Management Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling) Step 3: Display the packets in the buffer by entering: Switch# show monitor capture mycap buffer brief 0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000 10.000000 11.000000 12.000000 13.000000 14.000000 15.000000 16.000000 17.000000 18.000000 19.000000 20.000000 21.000000 10.1.1.215 -> 20.1.1.2 10.1.1.216 -> 20.1.1.2 10.1.1.217 -> 20.1.1.2 10.1.1.218 -> 20.1.1.2 10.1.1.219 -> 20.1.1.2 10.1.1.220 -> 20.1.1.2 10.1.1.221 -> 20.1.1.2 10.1.1.222 -> 20.1.1.2 10.1.1.223 -> 20.1.1.2 10.1.1.224 -> 20.1.1.2 10.1.1.225 -> 20.1.1.2 10.1.1.226 -> 20.1.1.2 10.1.1.227 -> 20.1.1.2 10.1.1.228 -> 20.1.1.2 10.1.1.229 -> 20.1.1.2 10.1.1.230 -> 20.1.1.2 10.1.1.231 -> 20.1.1.2 10.1.1.232 -> 20.1.1.2 10.1.1.233 -> 20.1.1.2 10.1.1.234 -> 20.1.1.2 10.1.1.235 -> 20.1.1.2 10.1.1.236 -> 20.1.1.2 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Notice that the packets have been buffered. Step 4: Display the packets in other display modes. Switch# show monitor capture mycap buffer detailed Frame 1: 256 bytes on wire (2048 bits), 256 bytes captured (2048 bits) Arrival Time: Apr 15, 2012 15:50:02.398966000 PDT Epoch Time: 1334530202.398966000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 0.000000000 seconds] Frame Number: 1 Frame Length: 256 bytes (2048 bits) Capture Length: 256 bytes (2048 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ip:udp:data] Ethernet II, Src: 00:00:00:00:03:01 (00:00:00:00:03:01), Dst: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) Destination: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) Address: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) Source: 00:00:00:00:03:01 (00:00:00:00:03:01) Address: 00:00:00:00:03:01 (00:00:00:00:03:01) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) ... Switch# show monitor capture mycap buffer dump 0.000000 10.1.1.215 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 0000 54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 Tu.:.?........E. 0010 00 ee 00 00 00 00 40 11 59 25 0a 01 01 d7 14 01 ......@.Y%...... Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 890 Network Management Example: Using Buffer Capture 0020 0030 0040 0050 0060 0070 0080 0090 00a0 00b0 00c0 00d0 00e0 00f0 01 02 4e 21 4e 22 00 da 6d e0 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 03 3e d0 33 Step 5a: Clear the buffer by entering: Switch# monitor capture mycap clear ..N!N"..m....... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ ................ ................ ................ .............>.3 Step 5b: Wait for 10 seconds. Step 5c: Stop the traffic by entering: Switch# monitor capture mycap stop Step 6: Confirm that the same set of packets are displayed after this time gap by entering: Switch# show monitor capture mycap buffer brief 0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000 10.1.1.2 -> 20.1.1.2 10.1.1.3 -> 20.1.1.2 10.1.1.4 -> 20.1.1.2 10.1.1.5 -> 20.1.1.2 10.1.1.6 -> 20.1.1.2 10.1.1.7 -> 20.1.1.2 10.1.1.8 -> 20.1.1.2 10.1.1.9 -> 20.1.1.2 10.1.1.10 -> 20.1.1.2 10.1.1.11 -> 20.1.1.2 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Step 7: Wait for 10 seconds, then confirm that the same set of packets are displayed after this time gap by entering: Switch# show monitor capture mycap buffer brief 0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000 10.1.1.2 -> 20.1.1.2 10.1.1.3 -> 20.1.1.2 10.1.1.4 -> 20.1.1.2 10.1.1.5 -> 20.1.1.2 10.1.1.6 -> 20.1.1.2 10.1.1.7 -> 20.1.1.2 10.1.1.8 -> 20.1.1.2 10.1.1.9 -> 20.1.1.2 10.1.1.10 -> 20.1.1.2 10.1.1.11 -> 20.1.1.2 Step 8: Repeat Step 7. Step 9: Clear the buffer by entering: Switch# monitor capture mycap clear UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Step 10: Confirm that the buffer is now empty by entering: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 891 Example: Using Buffer Capture Network Management Switch# show monitor capture mycap buffer brief Step 11: Wait about 10 seconds, then display the buffer contents by entering: Switch# show monitor capture mycap buffer brief Step 12: Restart the traffic, wait for 10 seconds, then display the buffer contents by entering: Switch# monitor capture mycap start wait for 10 seconds... Switch# show monitor capture mycap buffer brief 0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000 10.1.1.2 -> 20.1.1.2 10.1.1.3 -> 20.1.1.2 10.1.1.4 -> 20.1.1.2 10.1.1.5 -> 20.1.1.2 10.1.1.6 -> 20.1.1.2 10.1.1.7 -> 20.1.1.2 10.1.1.8 -> 20.1.1.2 10.1.1.9 -> 20.1.1.2 10.1.1.10 -> 20.1.1.2 10.1.1.11 -> 20.1.1.2 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Step 13: Store the buffer contents to the mycap1.pcap file in the internal flash: storage device by entering: Switch# monitor capture mycap export flash:mycap1.pcap Exported Successfully Step 14: Check that the file has been created and that it contains the packets by entering: Switch# dir flash:mycap1.pcap Directory of flash:/mycap1.pcap 14758 -rw- 20152 Apr 15 2012 16:00:28 -07:00 mycap1.pcap 831541248 bytes total (831340544 bytes free) Switch# show monitor capture file flash:mycap1.pcap brief 1 0.000000 10.1.1.2 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 2 1.000000 10.1.1.3 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 3 2.000000 10.1.1.4 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 4 3.000000 10.1.1.5 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 5 4.000000 10.1.1.6 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 6 5.000000 10.1.1.7 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 7 6.000000 10.1.1.8 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 8 7.000000 10.1.1.9 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 9 8.000000 10.1.1.10 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 10 9.000000 10.1.1.11 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 11 10.000000 10.1.1.12 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 12 11.000000 10.1.1.13 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 13 12.000000 10.1.1.14 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 892 Network Management Example: Capture Sessions 14 13.000000 10.1.1.15 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 15 14.000000 10.1.1.16 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 16 15.000000 10.1.1.17 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 Step 15: Stop the packet capture and display the buffer contents by entering: Switch# monitor capture mycap stop Switch# show monitor capture mycap buffer brief 0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000 10.000000 11.000000 10.1.1.2 -> 20.1.1.2 10.1.1.3 -> 20.1.1.2 10.1.1.4 -> 20.1.1.2 10.1.1.5 -> 20.1.1.2 10.1.1.6 -> 20.1.1.2 10.1.1.7 -> 20.1.1.2 10.1.1.8 -> 20.1.1.2 10.1.1.9 -> 20.1.1.2 10.1.1.10 -> 20.1.1.2 10.1.1.11 -> 20.1.1.2 10.1.1.12 -> 20.1.1.2 10.1.1.13 -> 20.1.1.2 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Step 16: Clear the buffer and then try to display packets from the buffer by entering: Switch# monitor capture mycap clear Switch# show monitor capture mycap buffer brief Step 17: Delete the capture point by entering: Switch# no monitor capture mycap Example: Capture Sessions Switch# monitor capture mycap start display display-filter "stp" 0.000000 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 2.000992 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 2.981996 20:37:06:cf:08:b6 -> 20:37:06:cf:08:b6 LOOP Reply 4.000992 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 6.000000 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 7.998001 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 9.998001 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 Capture test is not active Failed to Initiate Wireshark Switch# show monitor capture mycap parameter monitor capture mycap control-plane both monitor capture mycap match any monitor capture mycap file location flash:mycap1.1 buffer-size 90 monitor capture mycap limit duration 10 Switch# monitor capture mycap start display display-filter "udp.port == 20002" A file by the same capture file name already exists, overwrite?[confirm] [ENTER] after a minute or so... Capture mycap is not active Failed to Initiate Wireshark Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 893 Example: Capture and Store in Lock-step Mode Network Management *Oct 13 15:00:44.649: %BUFCAP-6-ENABLE: Capture Point mycap enabled. *Oct 13 15:00:46.657: %BUFCAP-6-DISABLE_ASYNC: Capture Point mycap disabled. Rea son : Wireshark Session Ended Switch# monitor capture mycap start display display-filter "udp.port == 20002" dump A file by the same capture file name already exists, overwrite?[confirm] after a minute or so... Capture mycap is not active Failed to Initiate Wireshark *Oct 13 15:00:44.649: %BUFCAP-6-ENABLE: Capture Point mycap enabled. *Oct 13 15:00:46.657: %BUFCAP-6-DISABLE_ASYNC: Capture Point mycap disabled. Rea son : Wireshark Session Ended Switch# no monitor capture mycap file Switch# monitor capture mycap start display display-filter "udp.port == 20002" dump Please associate capture file/buffer Unable to activate Capture. Switch# monitor capture mycap start display display-filter "udp.port == 20002" Please associate capture file/buffer Unable to activate Capture. Switch# monitor capture mycap start display detailed Please associate capture file/buffer Unable to activate Capture. Example: Capture and Store in Lock-step Mode This example captures live traffic and stores the packets in lock-step mode. Note The capture rate might be slow for the first 15 seconds. If possible and necessary, start the traffic 15 seconds after the capture session starts. Step 1: Define a capture point to match on the relevant traffic and associate it to a file by entering: Switch# monitor capture mycap interface GigabitEthernet1/0/1 in Switch# monitor capture mycap match ipv4 any any Switch# monitor capture mycap limit duration 60 packets 100 Switch# monitor capture mycap file location flash:mycap.pcap buffer-size 64 Step 2: Confirm that the capture point has been correctly defined by entering: Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in monitor capture mycap file location flash:mycap.pcap buffer-size 64 monitor capture mycap limit packets 100 duration 60 Switch# show monitor capture mycap Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: in Status : Inactive Filter Details: Filter not attached Buffer Details: Buffer Type: LINEAR (default) File Details: Associated file name: flash:mycap.pcap Size of buffer(in MB): 64 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 894 Network Management Example: Simple Capture and Store of Packets in Egress Direction Limit Details: Number of Packets to capture: 100 Packet Capture duration: 60 Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling) Step 3: Launch packet capture by entering: Switch# monitor capture mycap start A file by the same capture file name already exists, overwrite?[confirm] Turning on lock-step mode Switch# *Oct 14 09:35:32.661: %BUFCAP-6-ENABLE: Capture Point mycap enabled. Step 4: Display the packets by entering: Switch# show monitor capture file flash:mycap.pcap 0.000000 10.1.1.30 -> 20.1.1.2 UDP Source port: 20001 1.000000 10.1.1.31 -> 20.1.1.2 UDP Source port: 20001 2.000000 10.1.1.32 -> 20.1.1.2 UDP Source port: 20001 3.000000 10.1.1.33 -> 20.1.1.2 UDP Source port: 20001 4.000000 10.1.1.34 -> 20.1.1.2 UDP Source port: 20001 5.000000 10.1.1.35 -> 20.1.1.2 UDP Source port: 20001 6.000000 10.1.1.36 -> 20.1.1.2 UDP Source port: 20001 7.000000 10.1.1.37 -> 20.1.1.2 UDP Source port: 20001 8.000000 10.1.1.38 -> 20.1.1.2 UDP Source port: 20001 9.000000 10.1.1.39 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Step 5: Delete the capture point by entering: Switch# no monitor capture mycap Example: Simple Capture and Store of Packets in Egress Direction This example shows how to capture packets to a filter: Step 1: Define a capture point to match on the relevant traffic and associate it to a file by entering: Switch# monitor capture mycap interface Gigabit 1/0/1 out match ipv4 any any Switch# monitor capture mycap limit duration 60 packets 100 Switch# monitor capture mycap file location flash:mycap.pcap buffer-size 90 Step 2: Confirm that the capture point has been correctly defined by entering: Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 out monitor capture mycap match ipv4 any any monitor capture mycap file location flash:mycap.pcap buffer-size 90 monitor capture mycap limit packets 100 duration 60 Switch# show monitor capture mycap Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: out Status : Inactive Filter Details: IPv4 Source IP: any Destination IP: any Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 895 Example: Simple Capture and Store of Packets in Egress Direction Network Management Protocol: any Buffer Details: Buffer Type: LINEAR (default) File Details: Associated file name: flash:mycap.pcap Size of buffer(in MB): 90 Limit Details: Number of Packets to capture: 100 Packet Capture duration: 60 Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling) Step 3: Launch packet capture by entering: Switch# monitor capture mycap start A file by the same capture file name already exists, overwrite?[confirm] Turning on lock-step mode Switch# *Oct 14 09:35:32.661: %BUFCAP-6-ENABLE: Capture Point mycap enabled. Note Allow the capture operation stop automatically after the time has elapsed or the packet count has been met. When you see the following message in the output, will know that the capture operation has stopped: *Oct 14 09:36:34.632: %BUFCAP-6-DISABLE_ASYNC: Capture Point mycap disabled. Rea son : Wireshark Session Ended The mycap.pcap file now contains the captured packets. Step 4: Display the packets by entering: Switch# show monitor capture file flash:mycap.pcap 0.000000 10.1.1.30 -> 20.1.1.2 UDP Source port: 20001 1.000000 10.1.1.31 -> 20.1.1.2 UDP Source port: 20001 2.000000 10.1.1.32 -> 20.1.1.2 UDP Source port: 20001 3.000000 10.1.1.33 -> 20.1.1.2 UDP Source port: 20001 4.000000 10.1.1.34 -> 20.1.1.2 UDP Source port: 20001 5.000000 10.1.1.35 -> 20.1.1.2 UDP Source port: 20001 6.000000 10.1.1.36 -> 20.1.1.2 UDP Source port: 20001 7.000000 10.1.1.37 -> 20.1.1.2 UDP Source port: 20001 8.000000 10.1.1.38 -> 20.1.1.2 UDP Source port: 20001 9.000000 10.1.1.39 -> 20.1.1.2 UDP Source port: 20001 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Step 5: Delete the capture point by entering: Switch# no monitor capture mycap Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 896 Network Management Additional References Additional References Related Documents Related Topic Document Title General Packet Filtering For general packet filtering, refer to: Display Filter Reference Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Related Topics Filters, on page 864 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 897 Feature History and Information for WireShark Network Management Feature History and Information for WireShark Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 898 X P A R T QoS · Configuring QoS, on page 901 · Configuring Auto-QoS, on page 1013 5 6 C H A P T E R Configuring QoS · Finding Feature Information, on page 901 · Prerequisites for QoS, on page 901 · QoS Components, on page 902 · QoS Terminology, on page 902 · Information About QoS, on page 903 · Restrictions for QoS on Wired Targets, on page 936 · Restrictions for QoS on Wireless Targets, on page 939 · How to Configure QoS, on page 942 · Monitoring QoS, on page 994 · Configuration Examples for QoS, on page 996 · Where to Go Next, on page 1010 · Additional References for QoS, on page 1010 · Feature History and Information for QoS, on page 1011 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for QoS Before configuring standard QoS, you must have a thorough understanding of these items: · Standard QoS concepts. · Wireless concepts and network topologies. · Classic Cisco IOS QoS. · Modular QoS CLI (MQC). · Understanding of QoS implementation. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 901 QoS QoS Components · The types of applications used and the traffic patterns on your network. · Traffic characteristics and needs of your network. For example, is the traffic on your network bursty? Do you need to reserve bandwidth for voice and video streams? · Bandwidth requirements and speed of the network. · Location of congestion points in the network. Related Topics Restrictions for QoS on Wired Targets, on page 936 Restrictions for QoS on Wireless Targets, on page 939 QoS Components QoS consists of the following key components: · Classification-- Classification is the process of distinguishing one type of traffic from another based upon ACLs, Differentiated Services Code Point (DSCP), Class of Service (CoS), and other factors. · Marking and mutation-- Marking is used on traffic to convey specific information to a downstream device in the network, or to carry information from one interface in a switch to another. When traffic is marked, QoS operations on that traffic can be applied. This can be accomplished directly using the set command or through a table map, which takes input values and translates them directly to values on output. · Shaping and policing-- Shaping is the process of imposing a maximum rate of traffic, while regulating the traffic rate in such a way that downstream devices are not subjected to congestion. Shaping in the most common form is used to limit the traffic sent from a physical or logical interface. Policing is used to impose a maximum rate on a traffic class. If the rate is exceeded, then a specific action is taken as soon as the event occurs. · Queuing -- Queueing is used to prevent traffic congestion. Traffic is sent to specific queues for servicing and scheduling based upon bandwidth allocation. Traffic is then scheduled or sent out through the port. · Bandwidth--Bandwidth allocation determines the available capacity for traffic that is subject to QoS policies. · Trust-- Trust enables traffic to pass through the switch, and the DSCP, precedence, or CoS values coming in from the end points are retained in the absence of any explicit policy configuration. QoS Terminology The following terms are used interchangeably in this QoS configuration guide: · Upstream (direction towards the switch) is the same as ingress. · Downstream (direction from the switch) is the same as egress. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 902 QoS Information About QoS Note Upstream is wireless to wired. Downstream is wired to wireless. Wireless to wireless has no specific term. Information About QoS QoS Overview By configuring the quality of service (QoS), you can provide preferential treatment to specific types of traffic at the expense of other traffic types. Without QoS, the switch offers best-effort service to each packet, regardless of the packet contents or size. The switch sends the packets without any assurance of reliability, delay bounds, or throughput. The following are specific features provided by QoS: · Low latency · Bandwidth guarantee · Buffering capabilities and dropping disciplines · Traffic policing · Enables the changing of the attribute of the frame or packet header · Relative services Related Topics Restrictions for QoS on Wired Targets, on page 936 Restrictions for QoS on Wireless Targets, on page 939 Modular QoS Command-Line Interface With the switch, QoS features are enabled through the Modular QoS command-line interface (MQC). The MQC is a command-line interface (CLI) structure that allows you to create traffic policies and attach these policies to interfaces. A traffic policy contains a traffic class and one or more QoS features. A traffic class is used to classify traffic, while the QoS features in the traffic policy determine how to treat the classified traffic. One of the main goals of MQC is to provide a platform-independent interface for configuring QoS across Cisco platforms. Wireless QoS Overview Wireless QoS can be configured on the following wireless targets: · Wireless ports, including all physical ports to which an access point can be associated. · Radio · SSID (applicable on a per-radio, per-AP, and per-SSID) · Client Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 903 QoS QoS and IPv6 for Wireless The following table displays how policies are supported for the wireless targets. Table 76: Wireless Targets Policies Support Wireless Target Wireless port Radio SSID Client Policies on Wireless Targets Supported Yes Yes Yes Yes Policies Supported Policies Supported Downstream Direction Upstream Direction Yes - user configurable No Yes - but not configurable No by user Yes - user configurable Yes - user configurable Yes - user configurable Yes - user configurable Note Additional polices that are user configured include multi-destination policers and VLANs. Wireless QoS supports the following additional features: · Queuing support · Policing of wireless traffic · Shaping of wireless traffic · Rate limiting in both downstream and upstream direction · Approximate Fair Drop (AFD) · Mobility support for QoS · Compatibility with precious metal QoS policies available on Cisco Unified Wireless Controllers. QoS and IPv6 for Wireless From this release onwards, the switch supports QoS for both IPv4 and IPv6 traffic, and client policies can now have IPv4 and IPv6 filters. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 904 QoS Wired and Wireless Access Supported Features Wired and Wireless Access Supported Features The following table describes the supported features for both wired and wireless access. Table 77: Supported QoS Features for Wired and Wireless Access Feature Targets Wired · Gigabit Ethernet · 10 Gigabit Ethernet · VLAN Wireless · Wireless port (CAPWAP tunnel) · SSID · Client · Radio · CAPWAP multicast tunnel Configuration Sequence QoS policy installed using the service-policy command. · When an access point joins the switch, the switch installs a policy on the port. The port policy has a child policy called port_child_policy. · A policy is installed on the radio which has a shaper configured to the radio rate. The default radio policy (which cannot be modified) is attached to the radio. · The default client policies take effect when a WMM client associates, and if admission control is enabled on the radio. · User can modify the port_child_policy to add more classes. · User can attach a user-defined policy at the SSID level. · User can attach a user-defined policy at the client level. Number of queues Up to 8 queues supported on a Only four queues supported. permitted at port level port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 905 QoS Supported QoS Features on Wireless Targets Feature Classification mechanism Wired · DSCP · IP precedence · CoS · QoS-group · ACL membership including: · IPv4 ACLs · IPv6 ACLS · MAC ACLs Wireless · Port level · Ingress: QoS policies not supported on ingress in wireless ports. · Egress: Only DSCP based classification. · SSID level · Ingress: DSCP, UP · Egress: DSCP,COS, QoS group · Client level · Ingress: ACL, DSCP, UP · Egress: ACL, DSCP, and COS Related Topics Port Policy Format, on page 907 Supported QoS Features on Wireless Targets This table describes the various features available on wireless targets. Table 78: QoS Features Available on Wireless Targets Target Features Port · Port shaper · Priority queuing · Multicast policing Traffic Direction Where Policies Are Applicable Non-Real Downstream Time (NRT), Real Time (RT) Comments Radio · Shaping SSID · Shaping · Police · Table map · BRR Non-Real Time Downstream Non-Real Time, Real Time Upstream and downstream Radio policies are not user configurable. Queuing actions such as shaping and BRR are allowed only in the downstream direction. Client · Set · Police Non-Real Time, Real time Upstream and downstream Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 906 QoS Port Policies Port Policies Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Port Policies, on page 907 Port Policy Format, on page 907 Radio Policies, on page 909 Applying an SSID or Client Policy on a WLAN (CLI), on page 959 Configuring SSID Policies (GUI), on page 958 SSID Policies, on page 909 Configuring Client Policies (CLI) Configuring Client Policies (GUI), on page 949 Client Policies, on page 910 The switch supports port-based policies. The port policies includes port shaper and a child policy (port_child_policy). Note Port child policies only apply to wireless ports and not to wired ports on the switch. A wireless port is defined as a port to which APs join. A default port child policy is applied on the switch to the wireless ports at start up.The port shaper rate is limited to 1G Port shaper specifies the traffic policy applicable between the device and the AP. This is the sum of the radio rates supported on the access point. The child policy determines the mapping between packets and queues defined by the port-child policy. The child policy can be configured to include voice, video, class-default, and non-client-nrt classes where voice and video are based on DSCP value (which is the outer CAPWAP header DSCP value). The definition of class-default is known to the system as any value other than voice and video DSCP. The DSCP value is assigned when the packet reaches the port. Before the packet arrives at the port, the SSID policies are applied on the packet. Port child policy also includes multicast percentage for a given port traffic. By default, the port child policy allocates up to 10 percent of the available rate. Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Restrictions for QoS on Wireless Targets, on page 939 Supported QoS Features on Wireless Targets, on page 906 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000 Port Policy Format This section describes the behavior of the port policies on a switch. The ports on the switch do not distinguish between wired or wireless physical ports. Depending on the kind of device associated to the switch, the policies are applied. For example, when an access point is connected to a switch port, the switch detects it as a wireless device and applies the default hierarchical policy which is in the format of a parent-child policy. This policy is an hierarchical policy. The parent policy cannot be modified but the child policy (port-child policy) can be modified to suit the QoS configuration. The switch is pre configured with a default class map and a policy map. Default class map: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 907 QoS Port Policy Format Class Map match-any non-client-nrt-class Match non-client-nrt The above port policy processes all network traffic to the Q3 queue. You can view the class map by executing the show class-map command. Default policy map: Policy Map port_child_policy Class non-client-nrt-class bandwidth remaining ratio 10 Note The class map and policy map listed are system-defined policies and cannot be changed. The following is the system-defined policy map available on the ports on which wireless devices are associated. The format consists of a parent policy and a service child policy (port_child_policy). To customize the policies to suite your network needs, you must configure the port child policy. Policy-map policy_map_name Class class-default Shape average average_rate Service-policy port_child_policy Note The parent policy is system generated and cannot be changed. You must configure the port_child_policy policy to suit the QoS requirements on your network. Depending on the type of traffic in your network, you can configure the port child policy. For example, in a typical wireless network deployment, you can assign specific priorities to voice and video traffic. Here is an example: Policy-map port_child_policy Class voice-policy-name (match dscp ef) Priority level 1 Police (multicast-policer-name-voice) Multicast Policer Class video-policy-name (match dscp af41) Priority level 2 Police (multicast-policer-name-video) Multicast Policer Class non-client-nrt-class traffic(match non-client-nrt) Bandwidth remaining ratio (brr-value-nrt-q2) Class class-default (NRT Data) Bandwidth remaining ratio (brr-value-q3) In the above port child policy: · voice-policy-name-- Refers to the name of the class that specifies rules for the traffic for voice packets. Here the DSCP value is mapped to a value of 46 (represented by the keyword ef). The voice traffic is assigned the highest priority of 1. · video-policy-name-- Refers to the name of the class that specifies rules for the traffic for video packets. The DSCP value is mapped to a value of 34 (represented by the keyword af41). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 908 QoS Radio Policies · multicast-policer-name-voice-- If you need to configure multicast voice traffic, you can configure policing for the voice class map. · multicast-policer-name-video-- If you need to configure multicast video traffic, you can configure policing for the video class map. In the above sample configuration, all voice and video traffic is directed to the Q0 and Q1 queues, respectively. These queues maintain a strict priority. The packets in Q0 and Q1 are processed in that order. The bandwidth remaining ratios brr-value-nrt-q2 and brr-value-q3 are directed to the Q2 and Q3 respectively specified by the class maps and class-default and non-client-nrt. The processing of packets on Q2 and Q3 are based on a weighted round-robin approach. For example, if the brr-value-nrtq2 has a value of 90 and brr-value-nrtq3 is 10, the packets in queue 2 and queue 3 are processed in the ratio of 9:1. Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Restrictions for QoS on Wireless Targets, on page 939 Supported QoS Features on Wireless Targets, on page 906 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000 Wired and Wireless Access Supported Features, on page 905 Policy Maps, on page 919 Radio Policies The radio policies are system defined and are not user configurable. Radio wireless targets are only applicable in the downstream direction. Radio policies are applicable on a per-radio, per-access point basis. The rate limit on the radios is the practical limit of the AP radio rate. This value is equivalent to the sum of the radios supported by the access point. The following radios are supported: · 802.11 a/n · 802.11 b/n · 802.11 a/c Related Topics Restrictions for QoS on Wireless Targets, on page 939 Supported QoS Features on Wireless Targets, on page 906 SSID Policies You can create QoS policies on SSID BSSID (Basic Service Set Identification) in both the upstream and downstream directions. By default, there is no SSID policy. You can configure an SSID policy based on the SSID name. The policy is applicable on a per BSSID. The types of policies you can create on SSID include marking by using table maps (table-maps), shape rate, and RT1 (Real Time 1) and RT2 (Real Time 2) policiers. If traffic is upstream, you usually configure a marking policy on the SSID. If traffic is downstream, you can configure marking and queuing. There should be a one-to-one mapping between the policies configured on a port and an SSID. For example, if you configure class voice and class video on the port, you can have a similar policy on the SSID. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 909 QoS Client Policies SSID priorities can be specified by configuring bandwidth remaining ratio. Queuing SSID policies are applied in the downstream direction. Related Topics Applying an SSID or Client Policy on a WLAN (CLI), on page 959 Configuring SSID Policies (GUI), on page 958 Applying a QoS Policy on a WLAN (GUI), on page 993 Supported QoS Features on Wireless Targets, on page 906 Examples: SSID Policy Examples: Configuring Downstream SSID Policy, on page 1001 Client Policies Client policies are applicable in the upstream and downstream direction. The wireless control module of the switch applies the default client policies when admission control is enabled for WMM clients. When admission control is disabled, there is no default client policy. You can configure policing and marking policies on clients. Note A client policy can have both IPv4 and IPv6 filters. You can configure client policies in the following ways: · Using AAA--You can use a combination of AAA and TCLAS, and AAA and SIP snooping when configuring with AAA. · Using the Cisco IOS MQC CLI--You can use a combination of CLI and TCLAS and CLI and SIP snooping. · Using the default configuration Note When applying client policies on a WLAN, you must disable the WLAN before modifying the client policy. SSID policies can be modified even if the WLAN is enabled. Note If you configured AAA by configuring the unified wireless controller procedure, and using the MQC QoS commands, the policy configuration performed through the MQC QoS commands takes precedence. For client policies, the following filters are supported: · ACL · DSCP · COS · WLAN UP Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 910 QoS Hierarchical QoS Related Topics Configuring Client Policies (CLI) Configuring Client Policies (GUI), on page 949 Applying a QoS Policy on a WLAN (GUI), on page 993 Supported QoS Features on Wireless Targets, on page 906 Examples: Client Policies, on page 1002 Hierarchical QoS The switch supports hierarchical QoS (HQoS). HQoS allows you to perform: · Hierarchical classification-- Traffic classification is based upon other classes. · Hierarchical policing--The process of having the policing configuration at multiple levels in a hierarchical policy. · Hierarchical shaping--Shaping can also be configured at multiple levels in the hierarchy. Note Hierarchical shaping is only supported for the port shaper, where for the parent you only have a configuration for the class default, and the only action for the class default is shaping. Related Topics Examples: Hierarchical Classification, on page 998 Examples: Hierarchical Policy Configuration, on page 998 Hierarchical Wireless QoS The switch supports hierarchical QoS for wireless targets. Hierarchical QoS policies are applicable on port, radio, SSID, and client. QoS policies configured on the device (including marking, shaping, policing) can be applied across the targets. If the network contains non-realtime traffic, the non-realtime traffic is subject to approximate fair drop. Hierarchy refers to the process of application of the various QoS policies on the packets arriving to the device. Figure 59: Hierarchical QoS This figure shows the various targets available on a wireless network, as well as a hierarchal wireless configuration. Wireless QoS is applied per-radio constraint, per-WLAN, and per-client constraint. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 911 QoS Wireless Packet Format Wireless Packet Format Figure 60: Wireless Packet Path in the Egress Direction during First Pass This figure displays the wireless packet flow and encapsulation used in hierarchical wireless QoS. The incoming packet enters the switch. The switch encapsulates this incoming packet and adds the 802.11e and CAPWAP headers. Hierarchical AFD Approximate Fair Dropping (AFD) is a feature provided by the QoS infrastructure in Cisco IOS. For wireless targets, AFD can be configured on SSID (via shaping) and clients (via policing). AFD shaping rate is only applicable for downstream direction. Unicast real-time traffic is not subjected to AFD drops. QoS Implementation Typically, networks operate on a best-effort delivery basis, which means that all traffic has equal priority and an equal chance of being delivered in a timely manner. When congestion occurs, all traffic has an equal chance of being dropped. When you configure the QoS feature, you can select specific network traffic, prioritize it according to its relative importance, and use congestion-management and congestion-avoidance techniques to provide Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 912 QoS Layer 2 Frame Prioritization Bits preferential treatment. Implementing QoS in your network makes network performance more predictable and bandwidth utilization more effective. The QoS implementation is based on the Differentiated Services (Diff-Serv) architecture, a standard from the Internet Engineering Task Force (IETF). This architecture specifies that each packet is classified upon entry into the network. The classification is carried in the IP packet header, using 6 bits from the deprecated IP type of service (ToS) field to carry the classification (class) information. Classification can also be carried in the Layer 2 frame. Figure 61: QoS Classification Layers in Frames and Packets The special bits in the Layer 2 frame or a Layer 3 packet are shown in the following figure: Related Topics Restrictions for QoS on Wired Targets, on page 936 Restrictions for QoS on Wireless Targets, on page 939 Layer 2 Frame Prioritization Bits Layer 2 Inter-Switch Link (ISL) frame headers have a 1-byte User field that carries an IEEE 802.1p class of service (CoS) value in the three least-significant bits. On ports configured as Layer 2 ISL trunks, all traffic is in ISL frames. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 913 QoS Layer 3 Packet Prioritization Bits Layer 2 802.1Q frame headers have a 2-byte Tag Control Information field that carries the CoS value in the three most-significant bits, which are called the User Priority bits. On ports configured as Layer 2 802.1Q trunks, all traffic is in 802.1Q frames except for traffic in the native VLAN. Other frame types cannot carry Layer 2 CoS values. Layer 2 CoS values range from 0 for low priority to 7 for high priority. Layer 3 Packet Prioritization Bits Layer 3 IP packets can carry either an IP precedence value or a Differentiated Services Code Point (DSCP) value. QoS supports the use of either value because DSCP values are backward-compatible with IP precedence values. IP precedence values range from 0 to 7. DSCP values range from 0 to 63. End-to-End QoS Solution Using Classification All switches and routers that access the Internet rely on the class information to provide the same forwarding treatment to packets with the same class information and different treatment to packets with different class information. The class information in the packet can be assigned by end hosts or by switches or routers along the way, based on a configured policy, detailed examination of the packet, or both. Detailed examination of the packet is expected to occur closer to the edge of the network, so that the core switches and routers are not overloaded with this task. Switches and routers along the path can use the class information to limit the amount of resources allocated per traffic class. The behavior of an individual device when handling traffic in the Diff-Serv architecture is called per-hop behavior. If all devices along a path provide a consistent per-hop behavior, you can construct an end-to-end QoS solution. Implementing QoS in your network can be a simple task or complex task and depends on the QoS features offered by your internetworking devices, the traffic types and patterns in your network, and the granularity of control that you need over incoming and outgoing traffic. Packet Classification Packet classification is the process of identifying a packet as belonging to one of several classes in a defined policy, based on certain criteria. The Modular QoS CLI (MQC) is a policy-class based language. The policy class language is used to define the following: · Class-map template with one or several match criteria · Policy-map template with one or several classes associated to the policy map The policy map template is then associated to one or several interfaces on the switch. Packet classification is the process of identifying a packet as belonging to one of the classes defined in the policy map. The process of classification will exit when the packet being processed matches a specific filter in a class. This is referred to as first-match exit. If a packet matches multiple classes in a policy, irrespective of the order of classes in the policy map, it would still exit the classification process after matching the first class. If a packet does not match any of the classes in the policy, it would be classified into the default class in the policy. Every policy map has a default class, which is a system-defined class to match packets that do not match any of the user-defined classes. Packet classification can be categorized into the following types: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 914 QoS Classification Based on Information That is Propagated with the Packet · Classification based on information that is propagated with the packet · Classification based on information that is switch specific · Hierarchical classification Classification Based on Information That is Propagated with the Packet Classification that is based on information that is part of the packet and propagated either end-to-end or between hops, typically includes the following: · Classification based on Layer 3 or 4 headers · Classification based on Layer 2 information Classification Based on Layer 3 or Layer 4 Header This is the most common deployment scenario. Numerous fields in the Layer 3 and Layer 4 headers can be used for packet classification. At the most granular level, this classification methodology can be used to match an entire flow. For this deployment type, an access control list (ACLs) can be used. ACLs can also be used to match based on various subsets of the flow (for example, source IP address only, or destination IP address only, or a combination of both). Classification can also be done based on the precedence or DSCP values in the IP header. The IP precedence field is used to indicate the relative priority with which a particular packet needs to be handled. It is made up of three bits in the IP header's type of service (ToS) byte. The following table shows the different IP precedence bit values and their names. Note IP precedence is not supported for wireless QoS. Table 79: IP Precedence Values and Names IP Precedence Value 0 1 2 3 4 5 6 7 IP Precedence Bits 000 001 010 011 100 101 110 111 IP Precedence Names Routine Priority Immediate Flash Flash Override Critical Internetwork control Network control Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 915 QoS Classification Based on Layer 2 Header Note All routing control traffic in the network uses IP precedence value 6 by default. IP precedence value 7 also is reserved for network control traffic. Therefore, the use of IP precedence values 6 and 7 is not recommended for user traffic. The DSCP field is made up of 6 bits in the IP header and is being standardized by the Internet Engineering Task Force (IETF) Differentiated Services Working Group. The original ToS byte contained the DSCP bits has been renamed the DSCP byte. The DSCP field is part of the IP header, similar to IP precedence. The DSCP field is a super set of the IP precedence field. Therefore, the DSCP field is used and is set in ways similar to what was described with respect to IP precedence. Note The DSCP field definition is backward-compatible with the IP precedence values. Classification Based on Layer 2 Header A variety of methods can be used to perform classification based on the Layer 2 header information. The most common methods include the following: · MAC address-based classification (only for access groups)--Classification is based upon the source MAC address (for policies in the input direction) and destination MAC address (for policies in the output direction). · Class-of-Service--Classification is based on the 3 bits in the Layer 2 header based on the IEEE 802.1p standard. This usually maps to the ToS byte in the IP header. · VLAN ID--Classification is based on the VLAN ID of the packet. Note Some of these fields in the Layer 2 header can also be set using a policy. Classification Based on Information that is Device Specific (QoS Groups) The switch also provides classification mechanisms that are available where classification is not based on information in the packet header or payload. At times you might be required to aggregate traffic coming from multiple input interfaces into a specific class in the output interface. For example, multiple customer edge routers might be going into the same access switch on different interfaces. The service provider might want to police all the aggregate voice traffic going into the core to a specific rate. However, the voice traffic coming in from the different customers could have a different ToS settings. QoS group-based classification is a feature that is useful in these scenarios. Policies configured on the input interfaces set the QoS group to a specific value, which can then be used to classify packets in the policy enabled on output interface. The QoS group is a field in the packet data structure internal to the switch. It is important to note that a QoS group is an internal label to the switch and is not part of the packet header. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 916 QoS Hierarchical Classification Hierarchical Classification The switch permits you to perform a classification based on other classes. Typically, this action may be required when there is a need to combine the classification mechanisms (that is, filters) from two or more classes into a single class map. QoS Wired Model To implement QoS, the switch must perform the following tasks: · Traffic classification--Distinguishes packets or flows from one another. · Traffic marking and policing--Assigns a label to indicate the given quality of service as the packets move through the switch, and then make the packets comply with the configured resource usage limits. · Queuing and scheduling--Provides different treatment in all situations where resource contention exists. · Shaping--Ensures that traffic sent from the switch meets a specific traffic profile. Ingress Port Activity The following activities occur at the ingress port of the switch: · Classification--Classifying a distinct path for a packet by associating it with a QoS label. For example, the switch maps the CoS or DSCP in the packet to a QoS label to distinguish one type of traffic from another. The QoS label that is generated identifies all future QoS actions to be performed on this packet. · Policing--Policing determines whether a packet is in or out of profile by comparing the rate of the incoming traffic to the configured policer. The policer limits the bandwidth consumed by a flow of traffic. The result is passed to the marker. · Marking--Marking evaluates the policer and configuration information for the action to be taken when a packet is out of profile and determines what to do with the packet (pass through a packet without modification, mark down the QoS label in the packet, or drop the packet). Note Applying polices on the wireless ingress port is not supported on the switch. Egress Port Activity The following activities occur at the egress port of the switch: · Policing--Policing determines whether a packet is in or out of profile by comparing the rate of the incoming traffic to the configured policer. The policer limits the bandwidth consumed by a flow of traffic. The result is passed to the marker. · Marking--Marking evaluates the policer and configuration information for the action to be taken when a packet is out of profile and determines what to do with the packet (pass through a packet without modification, mark down the QoS label in the packet, or drop the packet). · Queueing--Queueing evaluates the QoS packet label and the corresponding DSCP or CoS value before selecting which of the egress queues to use. Because congestion can occur when multiple ingress ports simultaneously send data to an egress port, Weighted Tail Drop (WTD) differentiates traffic classes and Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 917 QoS Classification subjects the packets to different thresholds based on the QoS label. If the threshold is exceeded, the packet is dropped. Classification Classification is the process of distinguishing one kind of traffic from another by examining the fields in the packet. Classification is enabled only if QoS is enabled on the switch. By default, QoS is enabled on the switch. During classification, the switch performs a lookup and assigns a QoS label to the packet. The QoS label identifies all QoS actions to be performed on the packet and from which queue the packet is sent. Access Control Lists You can use IP standard, IP extended, or Layer 2 MAC ACLs to define a group of packets with the same characteristics (class). You can also classify IP traffic based on IPv6 ACLs. In the QoS context, the permit and deny actions in the access control entries (ACEs) have different meanings from security ACLs: · If a match with a permit action is encountered (first-match principle), the specified QoS-related action is taken. · If a match with a deny action is encountered, the ACL being processed is skipped, and the next ACL is processed. · If no match with a permit action is encountered and all the ACEs have been examined, no QoS processing occurs on the packet, and the switch offers best-effort service to the packet. · If multiple ACLs are configured on a port, the lookup stops after the packet matches the first ACL with a permit action, and QoS processing begins. Class Maps Note When creating an access list, note that by default the end of the access list contains an implicit deny statement for everything if it did not find a match before reaching the end. After a traffic class has been defined with the ACL, you can attach a policy to it. A policy might contain multiple classes with actions specified for each one of them. A policy might include commands to classify the class as a particular aggregate (for example, assign a DSCP) or rate-limit the class. This policy is then attached to a particular port on which it becomes effective. You implement IP ACLs to classify IP traffic by using the access-list global configuration command; you implement Layer 2 MAC ACLs to classify non-IP traffic by using the mac access-list extended global configuration command. A class map is a mechanism that you use to name a specific traffic flow (or class) and isolate it from all other traffic. The class map defines the criteria used to match against a specific traffic flow to further classify it. The criteria can include matching the access group defined by the ACL or matching a specific list of DSCP or IP precedence values. If you have more than one type of traffic that you want to classify, you can create Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 918 QoS Policy Maps another class map and use a different name. After a packet is matched against the class-map criteria, you further classify it through the use of a policy map. You create a class map by using the class-map global configuration command or the class policy-map configuration command. You should use the class-map command when the map is shared among many ports. When you enter the class-map command, the switch enters the class-map configuration mode. In this mode, you define the match criterion for the traffic by using the match class-map configuration command. You can create a default class by using the class class-default policy-map configuration command. The default class is system-defined and cannot be configured. Unclassified traffic (traffic that does not meet the match criteria specified in the traffic classes) is treated as default traffic. Related Topics Creating a Traffic Class (CLI), on page 942 Examples: Classification by Access Control Lists, on page 996 Policy Maps A policy map specifies which traffic class to act on. Actions can include the following: · Setting a specific DSCP or IP precedence value in the traffic class · Setting a CoS value in the traffic class · Setting a QoS group · Setting a wireless LAN (WLAN) value in the traffic class · Specifying the traffic bandwidth limitations and the action to take when the traffic is out of profile Before a policy map can be effective, you must attach it to a port. You create and name a policy map using the policy-map global configuration command. When you enter this command, the switch enters the policy-map configuration mode. In this mode, you specify the actions to take on a specific traffic class by using the class or set policy-map configuration and policy-map class configuration commands. The policy map can also be configured using the police and bandwidth policy-map class configuration commands, which define the policer, the bandwidth limitations of the traffic, and the action to take if the limits are exceeded. In addition, the policy-map can further be configured using the priority policy-map class configuration command, to schedule priority for the class or the queueing policy-map class configuration commands, queue-buffers and queue-limit. To enable the policy map, you attach it to a port by using the service-policy interface configuration command. Related Topics Creating a Traffic Policy (CLI), on page 944 Port Policy Format, on page 907 Policy Map on Physical Port You can configure a nonhierarchical policy map on a physical port that specifies which traffic class to act on. Actions can include setting a specific DSCP or IP precedence value in the traffic class, specifying the traffic bandwidth limitations for each matched traffic class (policer), and taking action when the traffic is out of profile (marking). A policy map also has these characteristics: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 919 QoS Policy Map on VLANs · A policy map can contain multiple class statements, each with different match criteria and policers. · A policy map can contain a predefined default traffic class explicitly placed at the end of the map. When you configure a default traffic class by using the class class-default policy-map configuration command, unclassified traffic (traffic that does not meet the match criteria specified in the traffic classes) is treated as the default traffic class (class-default). · A separate policy-map class can exist for each type of traffic received through a port. Related Topics Attaching a Traffic Policy to an Interface (CLI), on page 956 Policy Map on VLANs The switch supports a VLAN QoS feature that allows the user to perform QoS treatment at the VLAN level (classification and QoS actions) using the incoming frame's VLAN information. In VLAN-based QoS, a service policy is applied to an SVI interface. All physical interfaces belonging to a VLAN policy map then need to be programmed to refer to the VLAN-based policy maps instead of the port-based policy map. Although the policy map is applied to the VLAN SVI, any policing (rate-limiting) action can only be performed on a per-port basis. You cannot configure the policer to take account of the sum of traffic from a number of physical ports. Each port needs to have a separate policer governing the traffic coming into that port. Related Topics Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI), on page 964 Examples: Policer VLAN Configuration, on page 1006 Wireless QoS Rate Limiting QoS per Client Rate Limit--Wireless QoS policies can be configured to rate-limit client traffic using policiers. Ths includes both real-time and non real time traffic. The non real-time traffic is policed using AFD policiers. These policiers can only be one rate two color. Note For client policy, the voice and video rate limits are applied at the same time. QoS Downstream Rate Limit--Wireless Downstream rate limiting is done using policing at the SSID level. AFD cannot drop real-time traffic, it can only be policed in the traffic queues. Real-time policing and AFD shaping is performed at the SSID level. The radio has a default shaping policy. This shaping limit is the physical limit of the radio itself. You can check the policy maps on the radio by using the show policy-map interface wireless radio command. Wireless QoS Multicast You can configure multicast policing rate at the port level. Related Topics Configuring QoS Policies for Multicast Traffic (CLI), on page 992 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 920 QoS Policing Policing After a packet is classified and has a DSCP-based, CoS-based, or QoS-group label assigned to it, the policing and marking process can begin. Policing involves creating a policer that specifies the bandwidth limits for the traffic. Packets that exceed the limits are out of profile or nonconforming. Each policer decides on a packet-by-packet basis whether the packet is in or out of profile and specifies the actions on the packet. These actions, carried out by the marker, include passing through the packet without modification, dropping the packet, or modifying (marking down) the assigned DSCP or CoS value of the packet and allowing the packet to pass through. To avoid out-of-order packets, both conform and nonconforming traffic typically exit the same queue. Note All traffic, regardless of whether it is bridged or routed, is subjected to a policer, if one is configured. As a result, bridged packets might be dropped or might have their DSCP or CoS fields modified when they are policed and marked. You can only configure policing on a physical port. After you configure the policy map and policing actions, attach the policy to an ingress port or SVI by using the service-policy interface configuration command. Related Topics Configuring Police (CLI), on page 979 Examples: Policing Action Configuration, on page 1006 Token-Bucket Algorithm Policing uses a token-bucket algorithm. As each frame is received by the switch, a token is added to the bucket. The bucket has a hole in it and leaks at a rate that you specify as the average traffic rate in bits per second. Each time a token is added to the bucket, the switch verifies that there is enough room in the bucket. If there is not enough room, the packet is marked as nonconforming, and the specified policer action is taken (dropped or marked down). How quickly the bucket fills is a function of the bucket depth (burst-byte), the rate at which the tokens are removed (rate-bps), and the duration of the burst above the average rate. The size of the bucket imposes an upper limit on the burst length and limits the number of frames that can be transmitted back-to-back. If the burst is short, the bucket does not overflow, and no action is taken against the traffic flow. However, if a burst is long and at a higher rate, the bucket overflows, and the policing actions are taken against the frames in that burst. You configure the bucket depth (the maximum burst that is tolerated before the bucket overflows) by using the burst-byte option of the police policy-map class configuration command. You configure how fast (the average rate) that the tokens are removed from the bucket by using the rate option of the police policy-map class configuration command. Related Topics Configuring Police (CLI), on page 979 Examples: Policing Action Configuration, on page 1006 Examples: Policing Units, on page 1007 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 921 QoS Marking Marking Marking is used to convey specific information to a downstream device in the network, or to carry information from one interface in a switch to another. Marking can be used to set certain field/bits in the packet headers, or marking can also be used to set certain fields in the packet structure that is internal to the switch. Additionally, the marking feature can be used to define mapping between fields. The following marking methods are available for QoS: · Packet header · Device (switch) specific information · Table maps Packet Header Marking Marking on fields in the packet header can be classified into two general categories: · IPv4/v6 header bit marking · Layer 2 header bit marking The marking feature at the IP level is used to set the precedence or the DSCP in the IP header to a specific value to get a specific per-hop behavior at the downstream device (switch or router), or it can also be used to aggregate traffic from different input interfaces into a single class in the output interface. The functionality is currently supported on both the IPv4 and IPv6 headers. Marking in the Layer 2 headers is typically used to influence dropping behavior in the downstream devices (switch or router). It works in tandem with the match on the Layer 2 headers. The bits in the Layer 2 header that can be set using a policy map are class of service. Switch Specific Information Marking This form of marking includes marking of fields in the packet data structure that are not part of the packets header, so that the marking can be used later in the data path. This is not propagated between the switches. Marking of QoS-group falls into this category. This form of marking is only supported in policies that are enabled on the input interfaces. The corresponding matching mechanism can be enabled on the output interfaces on the same switch and an appropriate QoS action can be applied. Table Map Marking Table map marking enables the mapping and conversion from one field to another using a conversion table. This conversion table is called a table map. Depending upon the table map attached to an interface, CoS, DSCP, and UP values (UP specific to wireless packets) of the packet are rewritten. The switch allows configuring both ingress table map policies and egress table map policies. Note The switch stack supports a total of 14 table maps. Only one table map is supported per wired port, per direction. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 922 QoS Table Map Marking As an example, a table map can be used to map the Layer 2 CoS setting to a precedence value in Layer 3. This feature enables combining multiple set commands into a single table, which indicates the method to perform the mapping. This table can be referenced in multiple policies, or multiple times in the same policy. The following table shows the currently supported forms of mapping: Table 80: Packet-Marking Types Used for Establishing a To-From Relationship The To Packet-Marking Type Precedence Precedence DSCP DSCP CoS CoS QoS Group QoS Group The From Packet-Marking Type CoS QoS Group CoS QoS Group Precedence DSCP Precedence DSCP A table map-based policy supports the following capabilities: · Mutation--You can have a table map that maps from one DSCP value set to another DSCP value set, and this can be attached to an egress port. · Rewrite--Packets coming in are rewritten depending upon the configured table map. · Mapping--Table map based policies can be used instead of set policies. The following steps are required for table map marking: 1. Define the table map--Use the table-map global configuration command to map the values. The table does not know of the policies or classes within which it will be used. The default command in the table map is used to indicate the value to be copied into the to field when there is no matching from field. 2. Define the policy map--You must define the policy map where the table map will be used. 3. Associate the policy to an interface. Note A table map policy on an input port changes the trust setting of that port to the from type of qos-marking. Related Topics Configuring Table Maps (CLI), on page 967 Examples: Table Map Marking Configuration, on page 1008 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 923 QoS Traffic Conditioning Traffic Conditioning To support QoS in a network, traffic entering the service provider network needs to be policed on the network boundary routers to ensure that the traffic rate stays within the service limit. Even if a few routers at the network boundary start sending more traffic than what the network core is provisioned to handle, the increased traffic load leads to network congestion. The degraded performance in the network makes it difficult to deliver QoS for all the network traffic. Traffic policing functions (using the police feature) and shaping functions (using the traffic shaping feature) manage the traffic rate, but differ in how they treat traffic when tokens are exhausted. The concept of tokens comes from the token bucket scheme, a traffic metering function. Note When running QoS tests on network traffic, you may see different results for the shaper and policing data. Network traffic data from shaping provides more accurate results. This table compares the policing and shaping functions. Table 81: Comparison Between Policing and Shaping Functions Policing Function Shaping Function Sends conforming traffic up to the line rate and allows Smooths traffic and sends it out at a constant rate. bursts. When tokens are exhausted, action is taken immediately. When tokens are exhausted, it buffers packets and sends them out later, when tokens are available. A class with shaping has a queue associated with it which will be used to buffer the packets. Policing has multiple units of configuration in bits Shaping has only one unit of configuration - in bits per second, packets per second and cells per second. per second. Policing has multiple possible actions associated with Shaping does not have the provision to mark packets an event, marking and dropping being example of that do not meet the profile. such actions. Works for both input and output traffic. Implemented for output traffic only. Transmission Control Protocol (TCP) detects the line TCP can detect that it has a lower speed line and adapt at line speed but adapts to the configured rate when its retransmission timer accordingly. This results in a packet drop occurs by lowering its window size. less scope of retransmissions and is TCP-friendly. Policing The QoS policing feature is used to impose a maximum rate on a traffic class. The QoS policing feature can also be used with the priority feature to restrict priority traffic. If the rate is exceeded, then a specific action is taken as soon as the event occurs. The rate (committed information rate [CIR] and peak information rate [PIR] ) and the burst parameters (conformed burst size [ Bc ] and extended burst size [Be] ) are all configured in bytes per second. The following policing forms or policers are supported for QoS: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 924 QoS Single-Rate Two-Color Policing · Single-rate two-color policing · Dual-rate three-color policing Note Single-rate three-color policing is not supported. Single-Rate Two-Color Policing Single-rate two-color policer is the mode in which you configure only a CIR and a Bc. The Bc is an optional parameter, and if it is not specified it is computed by default. In this mode, when an incoming packet has enough tokens available, the packet is considered to be conforming. If at the time of packet arrival, enough tokens are not available within the bounds of Bc, the packet is considered to have exceeded the configured rate. Note For information about the token-bucket algorithm, see Token-Bucket Algorithm, on page 921. Related Topics Configuring Police (CLI), on page 979 Examples: Single-Rate Two-Color Policing Configuration, on page 1007 Dual-Rate Three-Color Policing With the dual rate policer, the switch supports only color-blind mode. In this mode, you configure a committed information rate (CIR) and a peak information rate (PIR). As the name suggests, there are two token buckets in this case, one for the peak rate, and one for the conformed rate. Note For information about the token-bucket algorithm, see Token-Bucket Algorithm, on page 921. In the color-blind mode, the incoming packet is first checked against the peak rate bucket. If there are not enough tokens available, the packet is said to violate the rate. If there are enough tokens available, then the tokens in the conformed rate buckets are checked to determine if there are enough tokens available. The tokens in the peak rate bucket are decremented by the size of the packet. If it does not have enough tokens available, the packet is said to have exceeded the configured rate. If there are enough tokens available, then the packet is said to conform, and the tokens in both the buckets are decremented by the size of the packet. The rate at which tokens are replenished depends on the packet arrival. Assume that a packet comes in at time T1 and the next one comes in at time T2. The time interval between T1 and T2 determines the number of tokens that need to be added to the token bucket. This is calculated as: Time interval between packets (T2-T1) * CIR)/8 bytes Related Topics Configuring Police (CLI), on page 979 Examples: Dual-Rate Three-Color Policing Configuration, on page 1008 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 925 QoS Shaping Shaping Shaping is the process of imposing a maximum rate of traffic, while regulating the traffic rate in such a way that the downstream switches and routers are not subjected to congestion. Shaping in the most common form is used to limit the traffic sent from a physical or logical interface. Shaping has a buffer associated with it that ensures that packets which do not have enough tokens are buffered as opposed to being immediately dropped. The number of buffers available to the subset of traffic being shaped is limited and is computed based on a variety of factors. The number of buffers available can also be tuned using specific QoS commands. Packets are buffered as buffers are available, beyond which they are dropped. Class-Based Traffic Shaping The switch uses class-based traffic shaping. This shaping feature is enabled on a class in a policy that is associated to an interface. A class that has shaping configured is allocated a number of buffers to hold the packets that do not have tokens. The buffered packets are sent out from the class using FIFO. In the most common form of usage, class-based shaping is used to impose a maximum rate for an physical interface or logical interface as a whole. The following shaping forms are supported in a class: · Average rate shaping · Hierarchical shaping Shaping is implemented using a token bucket. The values of CIR, Bc and Be determine the rate at which the packets are sent out and the rate at which the tokens are replenished. Note For information about the token-bucket algorithm, see Token-Bucket Algorithm, on page 921. Average Rate Shaping You use the shape average policy-map class command to configure average rate shaping. This command configures a maximum bandwidth for a particular class. The queue bandwidth is restricted to this value even though the port has more bandwidth available. The switch supports configuring shape average by either a percentage or by a target bit rate value. Related Topics Configuring Shaping (CLI), on page 989 Examples: Average Rate Shaping Configuration, on page 1004 Hierarchical Shaping Shaping can also be configured at multiple levels in a hierarchy. This is accomplished by creating a parent policy with shaping configured, and then attaching child policies with additional shaping configurations to the parent policy. There are two supported types of hierarchical shaping: · Port shaper · User-configured shaping Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 926 QoS Queueing and Scheduling The port shaper uses the class default and the only action permitted in the parent is shaping. The queueing action is in the child with the port shaper. With the user configured shaping, you cannot have queueing action in the child. Related Topics Configuring Shaping (CLI), on page 989 Queueing and Scheduling The switch uses both queueing and scheduling to help prevent traffic congestion. The switch supports the following queueing and scheduling features: · Bandwidth · Weighted Tail Drop · Priority queues · Queue buffers Bandwidth The switch supports the following bandwidth configurations: · Bandwidth percent · Bandwidth remaining ratio Related Topics Configuring Bandwidth (CLI), on page 977 Bandwidth Percent You can use the bandwidth percent policy-map class command to allocate a minimum bandwidth to a particular class. The total sum cannot exceed 100 percent and in case the total sum is less than 100 percent, then the rest of the bandwidth is divided equally among all bandwidth queues. Note A queue can oversubscribe bandwidth in case the other queues do not utilize the entire port bandwidth. You cannot mix bandwidth types on a policy map. For example, you cannot configure bandwidth in a single policy map using both a bandwidth percent and in kilobits per second. Bandwidth Remaining Ratio You use the bandwidth remaining ratio policy-map class command to create a ratio for sharing unused bandwidth in specified queues. Any unused bandwidth will be used by these specific queues in the ratio that is specified by the configuration. Use this command when the priority command is also used for certain queues in the policy. When you assign ratios, the queues will be assigned certain weights which are inline with these ratios. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 927 QoS Weighted Tail Drop You can specify ratios using a range from 0 to 100. For example, you can configure a bandwidth remaining ration of 2 on one class, and another queue with a bandwidth remaining ratio of 4 on another class. The bandwidth remaining ratio of 4 will be scheduled twice as often as the bandwidth remaining ratio of 2. The total bandwidth ratio allocation for the policy can exceed 100. For example, you can configure a queue with a bandwidth remaining ratio of 50, and another queue with a bandwidth remaining ratio of 100. Weighted Tail Drop The switch egress queues use an enhanced version of the tail-drop congestion-avoidance mechanism called weighted tail drop (WTD). WTD is implemented on queues to manage the queue lengths and to provide drop precedences for different traffic classifications. As a frame is enqueued to a particular queue, WTD uses the frame's assigned QoS label to subject it to different thresholds. If the threshold is exceeded for that QoS label (the space available in the destination queue is less than the size of the frame), the switch drops the frame. Each queue has three configurable threshold values. The QoS label determines which of the three threshold values is subjected to the frame. Figure 62: WTD and Queue Operation The following figure shows an example of WTD operating on a queue whose size is 1000 frames. Three drop percentages are configured: 40 percent (400 frames), 60 percent (600 frames), and 100 percent (1000 frames). These percentages indicate that up to 400 frames can be queued at the 40-percent threshold, up to 600 frames at the 60-percent threshold, and up to 1000 frames at the 100-percent threshold. In the example, CoS value 6 has a greater importance than the other CoS values, and is assigned to the 100-percent drop threshold (queue-full state). CoS values 4 is assigned to the 60-percent threshold, and CoS values 3 is assigned to the 40-percent threshold. All of these threshold values are assigned using the queue-limit cos command. Assuming the queue is already filled with 600 frames, and a new frame arrives. It contains CoS value 4 and is subjected to the 60-percent threshold. If this frame is added to the queue, the threshold will be exceeded, so the switch drops it. Related Topics Configuring Queue Limits (CLI), on page 987 Examples: Queue-limit Configuration, on page 1004 Weighted Tail Drop Default Values The following are the Weighted Tail Drop (WTD) default values and the rules for configuring WTD threshold values. · If you configure less than three queue-limit percentages for WTD, then WTD default values are assigned to these thresholds. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 928 QoS Priority Queues The following are the WTD threshold default values: Table 82: WTD Threshold Default Values Threshold 0 1 2 Default Value Percentage 80 90 400 · If 3 different WTD thresholds are configured, then the queues are programmed as configured. · If 2 WTD thresholds are configured, then the maximum value percentage will be 400. · If a WTD single threshold is configured as x, then the maximum value percentage will be 400. · If the value of x is less than 90, then threshold1=90 and threshold 0= x. · If the value of x equals 90, then threshold1=90, threshold 0=80. · If the value x is greater than 90, then threshold1=x, threshold 0=80. Priority Queues Each port supports eight egress queues, of which two can be given a priority. You use the priority level policy class-map command to configure the priority for two classes. One of the classes has to be configured with a priority queue level 1, and the other class has to be configured with a priority queue level 2. Packets on these two queues are subjected to less latency with respect to other queues. Related Topics Configuring Priority (CLI), on page 982 Queue Buffer Each 1-gigabit port on the switch is allocated 168 buffers for a wireless port and 300 buffers for a wired port. Each 10-gigabit port is allocated 1800 buffers. At boot time, when there is no policy map enabled on the wired port, there are two queues created by default. Wired ports can have a maximum of 8 queues configured using MQC-based policies. The following table shows which packets go into which one of the queues: Table 83: DSCP, Precedence, and CoS - Queue Threshold Mapping Table DSCP, Precedence or CoS Queue Control Packets 0 Rest of Packets 1 Threshold 2 2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 929 QoS Queue Buffer Allocation Note You can guarantee the availability of buffers, set drop thresholds, and configure the maximum memory allocation for a queue. You use the queue-buffers policy-map class command to configure the queue buffers. You use the queue-limit policy-map class command to configure the maximum thresholds. There are two types of buffer allocations: hard buffers, which are explicitly reserved for the queue, and soft buffers, which are available for other ports when unused by a given port. For the wireless port default, Queue 0 will be given 40 percent of the buffers that are available for the interface as hard buffers, that is 67 buffers are allocated for Queue 0 in the context of 1-gigabit ports. The soft maximum for this queue is set to 268 (calculated as 67 * 400/100) for 1-gigabit ports, where 400 is the default maximum threshold that is configured for any queue. For the wired port default, Queue 0 will be given 40 percent of the buffers that are available for the interface as hard buffers, that is 120 buffers are allocated for Queue 0 in the context of 1-gigabit ports, and 720 buffers in the context of 10-gigabit ports. The soft maximum for this queue is set to 480 (calculated as 120 * 400/100) for 1-gigabit ports and 2880 for 10-gigabit ports, where 400 is the default maximum threshold that is configured for any queue. Queue 1 does not have any hard buffers allocated. The default soft buffer limit is set to 400 (which is the maximum threshold). The threshold would determine the maximum number of soft buffers that can be borrowed from the common pool. Queue Buffer Allocation The buffer allocation to any queue can be tuned using the queue-buffers ratio policy-map class configuration command. Related Topics Configuring Queue Buffers (CLI), on page 984 Examples: Queue Buffers Configuration, on page 1005 Dynamic Threshold and Scaling Traditionally, reserved buffers are statically allocated for each queue. No matter whether the queue is active or not, its buffers are held up by the queue. In addition, as the number of queues increases, the portion of the reserved buffers allocated for each queue can become smaller and smaller. Eventually, a situation may occur where there are not enough reserved buffers to support a jumbo frame for all queues. The switch supports Dynamic Thresholding and Scaling (DTS), which is a feature that provides a fair and efficient allocation of buffer resources. When congestion occurs, this DTS mechanism provides an elastic buffer allocation for the incoming data based on the occupancy of the global/port resources. Conceptually, DTS scales down the queue buffer allocation gradually as the resources are used up to leave room for other queues, and vice versa. This flexible method allows the buffers to be more efficiently and fairly utilized. As mentioned in the previous sections, there are two limits configured on a queue--a hard limit and a soft limit. Hard limits are not part of DTS. These buffers are available only for that queue. The sum of the hard limits should be less than the globally set up hard maximum limit. The global hard limit configured for egress queuing is currently set to 5705. In the default scenario when there are no MQC policies configured, the 24 1-gigabit ports would take up 24 * 67 = 1608, and the 4 10-gigabit ports would take up 4 * 720 = 2880, for a total of 4488 buffers, allowing room for more hard buffers to be allocated based upon the configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 930 QoS Queuing in Wireless Soft limit buffers participate in the DTS process. Additionally, some of the soft buffer allocations can exceed the global soft limit allocation. The global soft limit allocation for egress queuing is currently set to 7607. The sum of the hard and soft limits add up to 13312, which in turn translates to 3.4 MB. Because the sum of the soft buffer allocations can exceed the global limit, it allows a specific queue to use a large number of buffers when the system is lightly loaded. The DTS process dynamically adjusts the per-queue allocation as the system becomes more heavily loaded. Queuing in Wireless Queuing in the wireless component is performed based on the port policy and is applicable only in the downstream direction. The wireless module supports the following four queues: · Voice--This is a strict priority queue. Represented by Q0, this queue processes control traffic and multicast or unicast voice traffic. All control traffic (such as CAPWAP packets) is processed through the voice queue. The QoS module uses a different threshold within the voice queue to process control and voice packets to ensure that control packets get higher priority over other non-control packets. · Video--This is a strict priority queue. Represented by Q1, this queue processes multicast or unicast video traffic. · Data NRT--Represented by Q2, this queue processes all non-real-time unicast traffic. · Multicast NRT--Represented by Q3, this queue processes Multicast NRT traffic. Any traffic that does not match the traffic in Q0, Q1, or Q2 is processed through Q3. Note By default, the queues Q0 and Q1 are not enabled. Note A weighted round-robin policy is applied for traffic in the queues Q2 and Q3. For upstream direction only one queue is available. Port and radio policies are applicable only in the downstream direction. Note The wired ports support eight queues. Trust Behavior Trust Behavior for Wired and Wireless Ports For wired or wireless ports that are connected to the switch (end points such as IP phones, laptops, cameras, telepresence units, or other devices), their DSCP, precedence, or CoS values coming in from these end points are trusted by the switch and therefore are retained in the absence of any explicit policy configuration. This trust behavior is applicable to both upstream and downstream QoS. The packets are enqueued to the appropriate queue per the default initial configuration. No priority queuing at the switch is done by default. This is true for unicast and multicast packets. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 931 QoS Port Security on a Trusted Boundary for Cisco IP Phones In scenarios where the incoming packet type differs from the outgoing packet type, the trust behavior and the queuing behavior are explained in the following table. Note that the default trust mode for a port is DSCP based. The trust mode `falls back' to CoS if the incoming packet is a pure Layer 2 packet. You can also change the trust setting from DSCP to CoS. This setting change is accomplished by using an MQC policy that has a class default with a 'set cos cos table default default-cos' action, where default-cos is the name of the table map created (which only performs a default copy). Table 84: Trust and Queueing Behavior Incoming Packet Layer 3 Layer 2 Tagged Layer 3 Outgoing Packet Layer 3 Layer 2 Tagged Tagged Trust Behavior Queuing Behavior Preserve DSCP/Precedence Based on DSCP Not applicable Based on CoS Preserve DSCP and CoS Based on DSCP (trust DSCP takes precedence) Preserve DSCP, CoS is set to Based on DSCP 0 The Cisco IOS XE 3.2 Release supported different trust defaults for wired and wireless ports. The trust default for wired ports was the same as for this software release. For wireless ports, the default system behavior was non-trust, which meant that when the switch came up, all markings for the wireless ports were defaulted to zero and no traffic received priority treatment. For compatibility with an existing wired switch, all traffic went to the best-effort queue by default. The access point performed priority queuing by default. In the downstream direction, the access point maintained voice, video, best-effort, and background queues for queuing. The access selected the queuing strategy based on the 11e tag information. By default, the access point treated all wireless packets as best effort. The default trust behavior in the case of wireless ports could be changed by using the qos wireless default untrust command. Note If you upgrade from Cisco IOS XE 3.2 SE Release to a later release, the default behavior of the wireless traffic is still untrusted. In this situation, you can use the no qos wireless-default untrust command to enable trust behavior for wireless traffic. However, if you install Cisco IOS XE 3.3 SE or a later release on the switch, the default QoS behavior for wireless traffic is trust. Starting with Cisco IOS XE 3.3 SE Release and later, the packet markings are preserved in both egress and ingress directions for new installations (not upgrades) for wireless traffic. Related Topics Configuring Trust Behavior for Wireless Traffic (CLI), on page 970 Example: Table Map Configuration to Retain CoS Markings, on page 1009 Port Security on a Trusted Boundary for Cisco IP Phones In a typical network, you connect a Cisco IP Phone to a switch port and cascade devices that generate data packets from the back of the telephone. The Cisco IP Phone guarantees the voice quality through a shared data link by marking the CoS level of the voice packets as high priority (CoS = 5) and by marking the data packets as low priority (CoS = 0). Traffic sent from the telephone to the switch is typically marked with a tag Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 932 QoS Wireless QoS Mobility that uses the 802.1Q header. The header contains the VLAN information and the class of service (CoS) 3-bit field, which is the priority of the packet. For most Cisco IP Phone configurations, the traffic sent from the telephone to the switch should be trusted to ensure that voice traffic is properly prioritized over other types of traffic in the network. By using the trust device interface configuration command, you configure the switch port to which the telephone is connected to trust the traffic received on that port. Note The trust device device_type command available in interface configuration mode is a stand-alone command on the switch. When using this command in an AutoQoS configuration, if the connected peer device is not a corresponding device (defined as a device matching your trust policy), both CoS and DSCP values are set to "0" and any input policy will not take effect. If the connected peer device is a corresponding device, input policy will take effect. With the trusted setting, you also can use the trusted boundary feature to prevent misuse of a high-priority queue if a user bypasses the telephone and connects the PC directly to the switch. Without trusted boundary, the CoS labels generated by the PC are trusted by the switch (because of the trusted CoS setting). By contrast, trusted boundary uses CDP to detect the presence of a Cisco IP Phone (such as the Cisco IP Phone 7910, 7935, 7940, and 7960) on a switch port. If the telephone is not detected, the trusted boundary feature disables the trusted setting on the switch port and prevents misuse of a high-priority queue. Note that the trusted boundary feature is not effective if the PC and Cisco IP Phone are connected to a hub that is connected to the switch. Wireless QoS Mobility Wireless QoS mobility enables you to configure QoS policies so that the network provides the same service anywhere in the network. A wireless client can roam from one location to another and as a result the client can get associated to different access points associated with a different switch. Wireless client roaming can be classified into two types: · Intra-switch roaming · Inter-switch roaming Note The client policies must be available on all of the switches in the mobility group. The same SSID and port policy must be applied to all switches in the mobility group so that the clients get consistent treatment. Inter-Switch Roaming When a client roams from one location to another, the client can get associated to access points either associated to the same switch (anchor switch) or a different switch (foreign switch). Inter-switch roaming refers to the scenario where the client gets associated to an access point that is not associated to the same device before the client roamed. The host device is now foreign to the device to which the client was initially anchored. In the case of inter-switch roaming, the client QoS policy is always executed on the foreign controller. When a client roams from anchor switch to foreign switch, the QoS policy is uninstalled on the anchor switch and installed on the foreign switch. In the mobility handoff message, the anchor device passes the name of the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 933 QoS Intra-Switch Roaming policy to the foreign switch. The foreign switch should have a policy with the same name configured for the QoS policy to be applied correctly. In the case of inter-switch roaming, all of the QoS policies are moved from the anchor device to the foreign device. While the QoS policies are in transition from the anchor device to the foreign device, the traffic on the foreign device is provided the default treatment. This is comparable to a new policy installation on the client target. Note If the foreign device is not configured with the user-defined physical port policy, the default port policy is applicable to all traffic is routed through the NRT queue, except the control traffic which goes through RT1 queue. The network administrator must configure the same physical port policy on both the anchor and foreign devices symmetrically. Intra-Switch Roaming With intra-switch roaming, the client gets associated to an access point that is associated to the same switch before the client roamed, but this association to the device occurs through a different access point. Note QoS policies remain intact in the case of intra-switch roaming. Precious Metal Policies for Wireless QoS Wireless QoS is backward compatible with the precious metal policies offered by the unified wireless controller platforms. The precious metal policies are system-defined policies that are available on the controller. The following policies are available: · Platinum--Used for VoIP clients. · Gold--Used for video clients. · Silver-- Used for traffic that can be considered best-effort. · Bronze--Used for NRT traffic. These policies (also known as profiles) can be applied to a WLAN based on the traffic. We recommend the configuration using the Cisco IOS MQC configuration. The policies are available in the system based on the precious metal policy required. Based on the policies applied, the 802.1p, 802.11e (WMM), and DSCP fields in the packets are affected. These values are preconfigured and installed when the switch is booted. Note Unlike the precious metal policies that were applicable in the Cisco Unified Wireless controllers, the attributes rt-average-rate, nrt-average-rate, and peak rates are not applicable for the precious metal policies configured on this switch platform. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 934 QoS Standard QoS Default Settings Related Topics Configuring Precious Metal Policies (CLI), on page 991 Standard QoS Default Settings Default Wired QoS Configuration There are two queues configured by default on each wired interface on the switch. All control traffic traverses and is processed through queue 0. All other traffic traverses and is processed through queue 1. DSCP Maps Default CoS-to-DSCP Map You use the CoS-to-DSCP map to map CoS values in incoming packets to a DSCP value that QoS uses internally to represent the priority of the traffic. The following table shows the default CoS-to-DSCP map. If these values are not appropriate for your network, you need to modify them. Table 85: Default CoS-to-DSCP Map CoS Value 0 1 2 3 4 5 6 7 DSCP Value 0 8 16 24 32 40 48 56 Default IP-Precedence-to-DSCP Map You use the IP-precedence-to-DSCP map to map IP precedence values in incoming packets to a DSCP value that QoS uses internally to represent the priority of the traffic. The following table shows the default IP-precedence-to-DSCP map. If these values are not appropriate for your network, you need to modify them. Table 86: Default IP-Precedence-to-DSCP Map IP Precedence Value 0 1 2 3 DSCP Value 0 8 16 24 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 935 QoS Default DSCP-to-CoS Map IP Precedence Value 4 5 6 7 DSCP Value 32 40 48 56 Default DSCP-to-CoS Map You use the DSCP-to-CoS map to generate a CoS value, which is used to select one of the four egress queues. The following table shows the default DSCP-to-CoS map. If these values are not appropriate for your network, you need to modify them. Table 87: Default DSCP-to-CoS Map DSCP Value 07 815 1623 2431 3239 4047 4855 5663 CoS Value 0 1 2 3 4 5 6 7 Default Wireless QoS Configuration The ports on the switch do not distinguish between wired or wireless physical ports. Depending on the kind of device associated to the switch, the policies are applied. For example, when an access point is connected to a switch port, the switch detects it as a wireless device and applies the default hierarchical policy which is in the format of a parent-child policy. This policy is an hierarchical policy. The parent policy cannot be modified but the child policy (port-child policy) can be modified to suite the QoS configuration. The switch is preconfigured with a default class map and a policy map. Restrictions for QoS on Wired Targets A target is an entity where a policy is applied. You can apply a policy to either a wired or wireless target. A wired target can be either a port or VLAN. A wireless target can be either a port, radio, SSID, or client. Only port, SSID, and client policies are user configurable. Radio polices are not user configurable. Wireless QoS policies for port, radio, SSID, and client are applied in the downstream direction, and for upstream only SSID Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 936 QoS Restrictions for QoS on Wired Targets and client targets are supported. Downstream indicates that traffic is flowing from the switch to the wireless client. Upstream indicates that traffic is flowing from wireless client to the switch. The following are restrictions for applying QoS features on the switch for the wired target: · A maximum of 8 queuing classes are supported on the switch port for the wired target. · A maximum of 63 policers are supported per policy on the wired port for the wired target. · No more than two levels are supported in a QoS hierarchy. · In a hierarchical policy, overlapping actions between parent and child are not allowed, except when a policy has the port shaper in the parent and queueing features in the child policy. · A QoS policy cannot be attached to any EtherChannel interface. · Policing in both the parent and child is not supported in a QoS hierarchy. · Marking in both the parent and child is not supported in a QoS hierarchy. · A mixture of queue limit and queue buffer in the same policy is not supported. Note The queue-limit percent is not supported on the switch because the queue-buffer command handles this functionality. Queue limit is only supported with the DSCP and CoS extensions. · With shaping, there is an IPG overhead of 20Bytes for every packet that is accounted internally in the hardware. Shaping accuracy will be effected by this, specially for packets of small size. · The classification sequence for all wired queuing-based policies should be the same across all wired upstream ports (10-Gigabit Ethernet), and the same for all downstream wired ports (1-Gigabit Ethernet). · Empty classes are not supported. · Class-maps with empty actions are not supported. If there are two policies with the same order of class-maps and if there are class-maps with no action in one of the policies, there may be traffic drops. As a workaround, allocate minimal bandwidth for all the classes in PRIORITY_QUEUE. · A maximum of 256 classes are supported per policy on the wired port for the wired target. · The actions under a policer within a policy map have the following restrictions: · The conform action must be transmit. · The exceed/violate action for markdown type can only be cos2cos, prec2prec, dscp2dscp. · The markdown types must be the same within a policy. · A port-level input marking policy takes precedence over an SVI policy; however, if no port policy is configured, the SVI policy takes precedence. For a port policy to take precedence, define a port-level policy; so that the SVI policy is overwritten. · Classification counters have the following specific restrictions: · Classification counters count packets instead of bytes. · Filter-based classification counters are not supported Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 937 QoS Restrictions for QoS on Wired Targets · Only QoS configurations with marking or policing trigger the classification counter. · The classification counter is not port based. This means that the classification counter aggregates all packets belonging to the same class of the same policy which attach to different interfaces. · As long as there is policing or marking action in the policy, the class-default will have classification counters. · When there are multiple match statements in a class, then the classification counter only shows the traffic counter for one of the match statements. · Table maps have the following specific restrictions: · Only one table map for policing exceeding the markdown and one table map for policing violating the markdown per direction per target is supported. · Table maps must be configured under the class-default; table maps are unsupported for a user-defined class. · Hierarchical policies are required for the following: · Port-shapers · Aggregate policers · PV policy · Parent shaping and child marking/policing · For ports with wired targets, these are the only supported hierarchical policies: · Police chaining in the same policy is unsupported, except for wireless client. · Hierarchical queueing is unsupported in the same policy (port shaper is the exception). · In a parent class, all filters must have the same type. The child filter type must match the parent filter type with the following exceptions: · If the parent class is configured to match IP, then the child class can be configured to match the ACL. · If the parent class is configured to match CoS, then the child class can be configured to match the ACL. · The trust device device_type command available in interface configuration mode is a stand-alone command on the switch. When using this command in an AutoQoS configuration, if the connected peer device is not a corresponding device (defined as a device matching your trust policy), both CoS and DSCP values are set to "0" and any input policy will not take effect. If the connected peer device is a corresponding device, input policy will take effect. The following are restrictions for applying QoS features on the VLAN to the wired target: · For a flat or nonhierarchical policy, only marking or a table map is supported. The following are restrictions and considerations for applying QoS features on EtherChannel and channel member interfaces: · QoS is not supported on an EtherChannel interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 938 QoS Restrictions for QoS on Wireless Targets · QoS is supported on EtherChannel member interfaces in both ingress and egression directions. All EtherChannel members must have the same QoS policy applied. If the QoS policy is not the same, each individual policy on the different link acts independently. · On attaching a service policy to channel members, the following warning message appears to remind the user to make sure the same policy is attached to all ports in the EtherChannel: ' Warning: add service policy will cause inconsistency with port xxx in ether channel xxx. '. · Auto QoS is not supported on EtherChannel members. Note On attaching a service policy to an EtherChannel, the following message appears on the console: ' Warning: add service policy will cause inconsistency with port xxx in ether channel xxx. '. This warning message should be expected. This warning message is a reminder to attach the same policy to other ports in the same EtherChannel. The same message will be seen during boot up. This message does not mean there is a discrepancy between the EtherChannel member ports. Related Topics Restrictions for QoS on Wireless Targets, on page 939 Prerequisites for QoS, on page 901 QoS Overview, on page 903 QoS Implementation, on page 912 Restrictions for QoS on Wireless Targets General Restrictions A target is an entity where a policy is applied. You can apply a policy to either a wired or wireless target. A wired target can be either a port or VLAN. A wireless target can be either a port, radio, SSID, or client. Only port, SSID, and client policies are user configurable. Radio polices are not user configurable. Wireless QoS policies for port, radio, SSID, and client are applied in the downstream direction, and for upstream only SSID and client targets are supported. Downstream indicates that traffic is flowing from the switch to the wireless client. Upstream indicates that traffic is flowing from wireless client to the switch. · Only port, SSID, and client (using AAA and Cisco IOS command-line interface) policies are user-configurable. Radio policies are set by the wireless control module and are not user-configurable. · Port and radio policies are applicable only in the downstream direction. · SSID and client support non-queuing policies in the upstream direction. SSID and client targets can be configured with marking and policing policies. · One policy per target per direction is supported. Wireless QoS Restrictions on Ports The following are restrictions for applying QoS features on a wireless port target: · All wireless ports have similar parent policy with one class-default and one action shape under class-default. Shape rates are dependent on the 802.11a/b/g/ac bands. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 939 QoS Restrictions for QoS on Wireless Targets · You can create a maximum of four classes in a child policy by modifying the port_chlid_policy. · If there are four classes in the port_child_policy at the port level, one must be a non-client-nrt class and one must be class-default. · No two classes can have the same priority level. Only priority level 1 (for voice traffic and control traffic) and 2 (for video) are supported. · Priority is not supported in the multicast NRT class (non-client-nrt class) and class-default. · If four classes are configured, two of them have to be priority classes. If only three classes are configured, at least one of them should be a priority class. If three classes are configured and there is no non-client-nrt class, both priority levels must be present. · Only match DSCP is supported. · The port policy applied by the wireless control module cannot be removed using the CLI. · Both priority rate and police CIR (using MQC) in the same class is unsupported. · Queue limit (which is used to configure Weighted Tail Drop) is unsupported. Wireless QoS Restrictions on SSID The following are restrictions for applying QoS features on SSID: · One table map is supported at the ingress policy. · Table maps are supported for the parent class-default only. Up to two table maps are supported in the egress direction and three table-maps can be configured when a QoS group is involved. Note Table-maps are not supported at the client targets. · If a wireless port has a default policy with only two queues (one for multicast-NRT, one for class-default), the policy at SSID level cannot have voice and video class in the egress direction. · Policing without priority is not supported in the egress direction. · Priority configuration at the SSID level is used only to configure the RT1 and RT2 policers (AFD for policer). Priority configuration does not include the shape rate. Therefore, priority is restricted for SSID policies without police. · The mapping in the DSCP2DSCP and COS2COS table should be based on the classification function for the voice and video classes in the port level policy. · No action is allowed under the class-default of a child policy. · For a flat policy (non hierarchical), in the ingress direction, the policy configuration must be a set (table map) or policing or both. Wireless QoS Restrictions on Clients The following are restrictions for applying QoS policies on client targets: · Queuing is not supported. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 940 QoS Restrictions for QoS on Wireless Targets · Attaching, removing, or modifying client policies on a WLAN in the enabled state is not supported. You must shut down the WLAN to apply, remove, or modify a policy. · Table-map configuration is not supported for client targets. · Policing and set configured together in class-default is blocked in both the upstream and downstream direction: policy-map foo class class-default police X set dscp Y · Child policy is not supported under class-default if the parent policy contains other user-defined class maps in it. · Hierarchical client polies are only supported in the egress direction. · For flat egress client policy, policing in class-default and marking action in other classes are not supported. · Restrictions for ACLs: · All the filters in classes in a policy map for client policy must have the same attributes. Filters matching on protocol-specific attributes such as IPv4 or IPv6 addresses are considered as different attribute sets. · For filters matching on ACLs, all ACEs (Access Control Entry) in the access list should have the same type and number of attributes. For example, the following is an invalid access list as they match on different attributes: policy map foo class acl-101 (match on 3 tuple) police X class acl-102 (match on 5 tuple) police Y · For filters matching on marking attributes, all filters in the policy-map must match on the same marking attribute. For example, If filter matches on DSCP, then all filters in the policy must match on DSCP. · ACL matching on port ranges and subnet are only supported in ingress direction. · If an ingress SSID policy is configured along with an ingress client policy matching ACLs with port ranges, the SSID policy takes precedence over the client policy. As a result, the client policy will not take effect. Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Port Policies, on page 907 Port Policy Format, on page 907 Radio Policies, on page 909 Restrictions for QoS on Wired Targets, on page 936 Prerequisites for QoS, on page 901 QoS Overview, on page 903 QoS Implementation, on page 912 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 941 QoS How to Configure QoS How to Configure QoS Configuring Class, Policy, and Table Maps Creating a Traffic Class (CLI) To create a traffic class containing match criteria, use the class-map command to specify the traffic class name, and then use the following match commands in class-map configuration mode, as needed. Before you begin All match commands specified in this configuration task are considered optional, but you must configure at least one match criterion for a class. SUMMARY STEPS 1. configure terminal 2. class-map {class-map name | match-any} 3. match access-group {index number | name} 4. match class-map class-map name 5. match cos cos value 6. match dscp dscp value 7. match ip {dscp dscp value | precedence precedence value } 8. match non-client-nrt 9. match qos-group qos group value 10. match vlan vlan value 11. match wlan user-priority wlan value 12. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 class-map {class-map name | match-any} Example: Switch(config)# class-map test_1000 Switch(config-cmap)# Enters class map configuration mode. · Creates a class map to be used for matching packets to the class whose name you specify. · If you specify match-any, one of the match criteria must be met for traffic entering the traffic class to be classified as part of the traffic class. This is the default. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 942 QoS Creating a Traffic Class (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action match access-group {index number | name} Example: Switch(config-cmap)# match access-group 100 Switch(config-cmap)# Purpose The following parameters are available for this command: · access-group · class-map · cos · dscp · ip · non-client-nrt · precedence · qos-group · vlan · wlan user priority (Optional) For this example, enter the access-group ID: · Access list index (value from 1 to 2799) · Named access list match class-map class-map name Example: (Optional) Matches to another class-map name. Switch(config-cmap)# match class-map test_2000 Switch(config-cmap)# match cos cos value Example: Switch(config-cmap)# match cos 2 3 4 5 Switch(config-cmap)# (Optional) Matches IEEE 802.1Q or ISL class of service (user) priority values. · Enters up to 4 CoS values separated by spaces (0 to 7). match dscp dscp value Example: Switch(config-cmap)# match dscp af11 af12 Switch(config-cmap)# (Optional) Matches the DSCP values in IPv4 and IPv6 packets. match ip {dscp dscp value | precedence precedence value } Example: Switch(config-cmap)# match ip dscp af11 af12 (Optional) Matches IP values including the following: · dscp--Matches IP DSCP (DiffServ codepoints). · precedence--Matches IP precedence (0 to 7). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 943 QoS Creating a Traffic Policy (CLI) Step 8 Step 9 Step 10 Step 11 Command or Action Switch(config-cmap)# Purpose match non-client-nrt Example: Switch(config-cmap)# match non-client-nrt Switch(config-cmap)# (Optional) Matches non-client NRT (Non-Real-Time). Note This match is applicable only for policies on a wireless port. It carries all the multi-destination and AP (non-client) bound traffic. match qos-group qos group value Example: Switch(config-cmap)# match qos-group 10 Switch(config-cmap)# (Optional) Matches QoS group value (from 0 to 31). match vlan vlan value Example: Switch(config-cmap)# match vlan 210 Switch(config-cmap)# (Optional) Matches a VLAN ID (from 1 to 4095). match wlan user-priority wlan value Example: (Optional) Matches 802.11e specific values. Enter the user priority 802.11e user priority (0 to 7). Switch(config-cmap)# match wlan user priority 7 Switch(config-cmap)# Step 12 end Example: Switch(config-cmap)# end Saves the configuration changes. What to do next Configure the policy map. Related Topics Class Maps, on page 918 Examples: Classification by Access Control Lists, on page 996 Creating a Traffic Policy (CLI) To create a traffic policy, use the policy-map global configuration command to specify the traffic policy name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 944 QoS Creating a Traffic Policy (CLI) The traffic class is associated with the traffic policy when the class command is used. The class command must be entered after you enter the policy map configuration mode. After entering the class command, the switch is automatically in policy map class configuration mode, which is where the QoS policies for the traffic policy are defined. The following policy map class-actions are supported: · admit--Admits the request for Call Admission Control (CAC). · bandwidth--Bandwidth configuration options. · exit--Exits from the QoS class action configuration mode. · no--Negates or sets default values for the command. · police--Policer configuration options. · priority--Strict scheduling priority configuration options for this class. · queue-buffers--Queue buffer configuration options. · queue-limit--Queue maximum threshold for Weighted Tail Drop (WTD) configuration options. · service-policy--Configures the QoS service policy. · set--Sets QoS values using the following options: · CoS values · DSCP values · Precedence values · QoS group values · WLAN values · shape--Traffic-shaping configuration options. Before you begin You should have first created a class map. SUMMARY STEPS 1. configure terminal 2. policy-map policy-map name 3. class {class-name | class-default} 4. admit 5. bandwidth {kb/s kb/s value | percent percentage | remaining {percent | ratio}} 6. exit 7. no 8. police {target_bit_rate | cir | rate} 9. priority {kb/s | level level value | percent percentage value} 10. queue-buffers ratio ratio limit 11. queue-limit {packets | cos | dscp | percent} Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 945 QoS Creating a Traffic Policy (CLI) 12. service-policy policy-map name 13. set {cos | dscp | ip | precedence | qos-group | wlan} 14. shape average {target _bit_rate | percent} 15. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 policy-map policy-map name Example: Switch(config)# policy-map test_2000 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Step 3 class {class-name | class-default} Example: Switch(config-pmap)# class test_1000 Switch(config-pmap-c)# Specifies the name of the class whose policy you want to create or change. You can also create a system default class for unclassified packets. Step 4 Step 5 Step 6 admit Example: Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-c)# (Optional) Admits the request for Call Admission Control (CAC). For a more detailed example of this command and its usage, see Configuring Call Admission Control (CLI), on page 970. Note This command only configures CAC for wireless QoS. bandwidth {kb/s kb/s value | percent percentage | remaining {percent | ratio}} Example: Switch(config-pmap-c)# bandwidth 50 Switch(config-pmap-c)# (Optional) Sets the bandwidth using one of the following: · kb/s--Kilobits per second, enter a value between 20000 and 10000000 for Kb/s. · percent--Enter the percentage of the total bandwidth to be used for this policy map. · remaining--Enter the percentage ratio of the remaining bandwidth. exit Example: For a more detailed example of this command and its usage, see Configuring Bandwidth (CLI), on page 977. (Optional) Exits from QoS class action configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 946 QoS Creating a Traffic Policy (CLI) Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Switch(config-pmap-c)# exit Switch(config-pmap-c)# Purpose no Example: Switch(config-pmap-c)# no Switch(config-pmap-c)# (Optional) Negates the command. police {target_bit_rate | cir | rate} Example: Switch(config-pmap-c)# police 100000 Switch(config-pmap-c)# (Optional) Configures the policer: · target_bit_rate--Enter the bit rate per second, enter a value between 8000 and 10000000000. · cir--Committed Information Rate · rate--Specify police rate, PCR for hierarchical policies or SCR for single-level ATM 4.0 policer policies. For a more detailed example of this command and its usage, see Configuring Police (CLI), on page 979. priority {kb/s | level level value | percent percentage (Optional) Sets the strict scheduling priority for this class. value} Command options include: Example: Switch(config-pmap-c)# priority percent 50 Switch(config-pmap-c)# · kb/s--Kilobits per second, enter a value between 1 and 2000000. · level--Establishes a multi-level priority queue. Enter a value (1 or 2). · percent--Enter a percent of the total bandwidth for this priority. queue-buffers ratio ratio limit Example: Switch(config-pmap-c)# queue-buffers ratio 10 Switch(config-pmap-c)# For a more detailed example of this command and its usage, see Configuring Priority (CLI), on page 982. (Optional) Configures the queue buffer for the class. Enter the queue buffers ratio limit (0 to 100). For a more detailed example of this command and its usage, see Configuring Queue Buffers (CLI), on page 984. queue-limit {packets | cos | dscp | percent} (Optional) Specifies the queue maximum threshold for the Example: tail drop: · packets--Packets by default, enter a value between Switch(config-pmap-c)# queue-limit cos 7 percent 1 to 2000000. 50 · cos--Enter the parameters for each COS value. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 947 QoS Creating a Traffic Policy (CLI) Step 12 Step 13 Step 14 Step 15 Command or Action Switch(config-pmap-c)# service-policy policy-map name Example: Purpose · dscp--Enter the parameters for each DSCP value. · percent--Enter the percentage for the threshold. For a more detailed example of this command and its usage, see Configuring Queue Limits (CLI), on page 987. (Optional) Configures the QoS service policy. Switch(config-pmap-c)# service-policy test_2000 Switch(config-pmap-c)# set {cos | dscp | ip | precedence | qos-group | wlan} Example: Switch(config-pmap-c)# set cos 7 Switch(config-pmap-c)# (Optional) Sets the QoS values. Possible QoS configuration values include: · cos--Sets the IEEE 802.1Q/ISL class of service/user priority. · dscp--Sets DSCP in IP(v4) and IPv6 packets. · ip--Sets IP specific values. · precedence--Sets precedence in IP(v4) and IPv6 packet. · qos-group--Sets the QoS Group. · wlan--Sets the WLAN user-priority. shape average {target _bit_rate | percent} Example: Switch(config-pmap-c) #shape average percent 50 Switch(config-pmap-c) # (Optional) Sets the traffic shaping. Command parameters include: · target_bit_rate--Target bit rate. · percent--Percentage of interface bandwidth for Committed Information Rate. end Example: For a more detailed example of this command and its usage, see Configuring Shaping (CLI), on page 989. Saves the configuration changes. Switch(config-pmap-c) #end Switch(config-pmap-c) # What to do next Configure the interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 948 QoS Configuring Client Policies (GUI) Related Topics Policy Maps, on page 919 Configuring Client Policies (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Wireless. Expand the QoS node by clicking on the left pane and choose QOS-Policy. The QOS-Policy page is displayed. Click Add New to create a new QoS Policy. The Create QoS Policy page is displayed. Select Client from the Policy Type drop-down menu. Select the direction into which the policy needs to be applied from the Policy Direction drop-down menu. The available options are: · Ingress · Egress Specify a policy name in the Policy Name text box. Provide a description to the policy in the Description text box. (Optional) Configure the default voice or video configuration parameters by checking the Enable Voice or Enable Video checkbox. The following options are available: · Trust--Specify the classification type behavior on this policy. The options available are: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · User Priority--This option is available when the Policy Direction is ingress. Enter the 802.11e user priority. The range is from 0 to 7. · COS--This option is available when the Policy Direction is egress. Matches IEEE 802.1Q class of service. The range is from 0 to 7. · Mark--Specify the marking label for each packet. The following options are available: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · CoS--Matches IEEE 802.1Q class of service. The range is from 0 to 7. · User Priority--Enter the 802.11e user priority. The range is from 0 to 7. · Police(kbps)--Specify the policing rate in kbps. Note The marking and policing options are optional. Specify the Class-default parameters. The following options are available: · Mark--Specify the marking label for each packet. The following options are available: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 949 QoS Configuring Class-Based Packet Marking (CLI) Step 10 Step 11 · CoS--Matches IEEE 802.1Q class of service. The range is from 0 to 7. · User Priority--Enter the 802.11e user priority. The range is from 0 to 7. · Police (kbps)--This option is available when the Policy Direction is egress. This option Specify the policing rate in kbps. (Optional) To configure user defined classes, check the User Defined Classes checkbox. The following options are available: · Trust--Specify the classification type behavior on this policy. · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · User Priority--This option is available when the Policy Direction is ingress. Enter the 802.11e user priority. The range is from 0 to 7. · COS--This option is available when the Policy Direction is egress. Matches IEEE 802.1Q class of service. The range is from 0 to 7. · Mark--Specify the marking label for each packet. The following options are available: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · CoS--Matches IEEE 802.1Q class of service. The range is from 0 to 7. · User Priority--Enter the 802.11e user priority. The range is from 0 to 7. · Police (kbps)--This option is available when the Policy Direction is egress. This option Specify the policing rate in kbps. Click Add to add the policy. Related Topics Client Policies, on page 910 Supported QoS Features on Wireless Targets, on page 906 Examples: Client Policies, on page 1002 Configuring Class-Based Packet Marking (CLI) This procedure explains how to configure the following class-based packet marking features on your switch: · CoS value · DSCP value · IP value · Precedence value · QoS group value · WLAN value Before you begin You should have created a class map and a policy map before beginning this procedure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 950 QoS Configuring Class-Based Packet Marking (CLI) SUMMARY STEPS 1. configure terminal 2. policy-map policy name 3. class class name 4. set cos {cos value | cos table table-map name | dscp table table-map name | precedence table table-map name | qos-group table table-map name | wlan user-priority table table-map name} 5. set dscp {dscp value | default | dscp table table-map name | ef | precedence table table-map name | qos-group table table-map name | wlan user-priority table table-map name} 6. set ip {dscp | precedence} 7. set precedence {precedence value | cos table table-map name | dscp table table-map name | precedence table table-map name | qos-group table table-map name} 8. set qos-group {qos-group value | dscp table table-map name | precedence table table-map name} 9. set wlan user-priority {wlan user-priority value | cos table table-map name | dscp table table-map name | qos-group table table-map name | wlan table table-map name} 10. end 11. show policy-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 policy-map policy name Example: Switch(config)# policy-map policy1 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Step 3 class class name Example: Switch(config-pmap)# class class1 Switch(config-pmap-c)# Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · admit--Admits the request for Call Admission Control (CAC). · bandwidth--Bandwidth configuration options. · exit--Exits from the QoS class action configuration mode. · no--Negates or sets default values for the command. · police--Policer configuration options. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 951 QoS Configuring Class-Based Packet Marking (CLI) Step 4 Step 5 Command or Action Purpose · priority--Strict scheduling priority configuration options for this class. · queue-buffers--Queue buffer configuration options. · queue-limit--Queue maximum threshold for Weighted Tail Drop (WTD) configuration options. · service-policy--Configures the QoS service policy. · set--Sets QoS values using the following options: · CoS values · DSCP values · Precedence values · QoS group values · WLAN values · shape--Traffic-shaping configuration options. Note This procedure describes the available configurations using set command options. The other command options (admit, bandwidth, etc.) are described in other sections of this guide. Although this task lists all of the possible set commands, only one set command is supported per class. set cos {cos value | cos table table-map name | dscp table (Optional) Sets the specific IEEE 802.1Q Layer 2 CoS table-map name | precedence table table-map name | value of an outgoing packet. Values are from 0 to7. qos-group table table-map name | wlan user-priority table table-map name} You can also set the following values using the set cos command: Example: · cos table--Sets the CoS value based on a table map. Switch(config-pmap)# set cos 5 Switch(config-pmap)# · dscp table--Sets the code point value based on a table map. · precedence table--Sets the code point value based on a table map. · qos-group table--Sets the CoS value from QoS group based on a table map. · wlan user-priority table--Sets the CoS value from the WLAN user priority based on a table map. set dscp {dscp value | default | dscp table table-map name (Optional) Sets the DSCP value. | ef | precedence table table-map name | qos-group table Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 952 QoS Configuring Class-Based Packet Marking (CLI) Step 6 Command or Action table-map name | wlan user-priority table table-map name} Example: Switch(config-pmap)# set dscp af11 Switch(config-pmap)# Purpose In addition to setting specific DSCP values, you can also set the following using the set dscp command: · default--Matches packets with default DSCP value (000000). · dscp table--Sets the packet DSCP value from DSCP based on a table map. · ef--Matches packets with EF DSCP value (101110). · precedence table--Sets the packet DSCP value from precedence based on a table map. · qos-group table--Sets the packet DSCP value from a QoS group based upon a table map. · wlan user-priority table--Sets the packet DSCP value based upon a WLAN user-priority based upon a table map. set ip {dscp | precedence} Example: Switch(config-pmap)# set ip dscp c3 Switch(config-pmap)# (Optional) Sets IP specific values. These values are either IP DSCP or IP precedence values. You can set the following values using the set ip dscp command: · dscp value--Sets a specific DSCP value. · default--Matches packets with default DSCP value (000000). · dscp table--Sets the packet DSCP value from DSCP based on a table map. · ef--Matches packets with EF DSCP value (101110). · precedence table--Sets the packet DSCP value from precedence based on a table map. · qos-group table--Sets the packet DSCP value from a QoS group based upon a table map. · wlan user-priority table--Sets the packet DSCP value based upon a WLAN user-priority based upon a table map. You can set the following values using the set ip precedence command: · precedence value--Sets the precedence value (from 0 to 7) . · cos table--Sets the packet precedence value from Layer 2 CoS based on a table map. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 953 QoS Configuring Class-Based Packet Marking (CLI) Step 7 Step 8 Step 9 Command or Action Purpose · dscp table--Sets the packet precedence from DSCP value based on a table map. · precedence table--Sets the precedence value from precedence based on a table map · qos-group table--Sets the precedence value from a QoS group based upon a table map. set precedence {precedence value | cos table table-map name | dscp table table-map name | precedence table table-map name | qos-group table table-map name} Example: (Optional) Sets precedence values in IPv4 and IPv6 packets. You can set the following values using the set precedence command: Switch(config-pmap)# set precedence 5 Switch(config-pmap)# · precedence value--Sets the precedence value (from 0 to 7) . · cos table--Sets the packet precedence value from Layer 2 CoS on a table map. · dscp table--Sets the packet precedence from DSCP value on a table map. · precedence table--Sets the precedence value from precedence based on a table map. · qos-group table--Sets the precedence value from a QoS group based upon a table map. set qos-group {qos-group value | dscp table table-map (Optional) Sets QoS group values. You can set the name | precedence table table-map name} following values using this command: Example: · qos-group value--A number from 1 to 31. Switch(config-pmap)# set qos-group 10 Switch(config-pmap)# · dscp table--Sets the code point value from DSCP based on a table map. · precedence table--Sets the code point value from precedence based on a table map. set wlan user-priority {wlan user-priority value | cos (Optional) Sets the WLAN user priority value. You can table table-map name | dscp table table-map name | set the following values using this command: qos-group table table-map name | wlan table table-map name} · wlan user-priority value--A value between 0 to 7. Example: · cos table--Sets the WLAN user priority value from CoS based on a table map. Switch(config-pmap)# set wlan user-priority 1 Switch(config-pmap)# · dscp table--Sets the WLAN user priority value from DSCP based on a table map. · qos-group table--Sets the WLAN user priority value from QoS group based on a table map. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 954 QoS Configuring Class Maps for Voice and Video (CLI) Command or Action Step 10 Step 11 end Example: Switch(config-pmap)# end Switch# show policy-map Example: Switch# show policy-map Purpose · wlan table--Sets the WLAN user priority value from the WLAN user priority based on a table map. Saves configuration changes. (Optional) Displays policy configuration information for all classes configured for all service policies. What to do next Attach the traffic policy to an interface using the service-policy command. Configuring Class Maps for Voice and Video (CLI) To configure class maps for voice and video traffic, follow these steps: SUMMARY STEPS 1. configure terminal 2. class-map class-map-name 3. match dscp dscp-value-for-voice 4. end 5. configure terminal 6. class-map class-map-name 7. match dscp dscp-value-for-video 8. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 class-map class-map-name Example: Switch(config)# class-map voice Purpose Enters global configuration mode. Creates a class map. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 955 QoS Attaching a Traffic Policy to an Interface (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action match dscp dscp-value-for-voice Example: Switch(config-cmap)# match dscp 46 end Example: Switch(config)# end configure terminal Example: Switch# configure terminal class-map class-map-name Example: Switch(config)# class-map video match dscp dscp-value-for-video Example: Switch(config-cmap)# match dscp 34 end Example: Switch(config)# end Purpose Matches the DSCP value in the IPv4 and IPv6 packets. Set this value to 46. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enters global configuration mode. Configures a class map. Matches the DSCP value in the IPv4 and IPv6 packets. Set this value to 34. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Attaching a Traffic Policy to an Interface (CLI) After the traffic class and traffic policy are created, you must use the service-policy interface configuration command to attach a traffic policy to an interface, and to specify the direction in which the policy should be applied (either on packets coming into the interface or packets leaving the interface). Before you begin A traffic class and traffic policy must be created before attaching a traffic policy to an interface. SUMMARY STEPS 1. configure terminal 2. interface type 3. service-policy {input policy-map | output policy-map } 4. end 5. show policy map Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 956 QoS Attaching a Traffic Policy to an Interface (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 interface type Example: Switch(config)# interface GigabitEthernet1/0/1 Switch(config-if)# Enters interface configuration mode and configures an interface. Command parameters for the interface configuration include: · Auto Template-- Auto-template interface · Capwap--CAPWAP tunnel interface · GigabitEthernet--Gigabit Ethernet IEEE 802 · GroupVI--Group virtual interface · Internal Interface-- Internal interface · Loopback--Loopback interface · Null--Null interface · Port-channel--Ethernet Channel of interface · TenGigabitEthernet--10-Gigabit Ethernet · Tunnel--Tunnel interface · Vlan--Catalyst VLANs · Range--Interface range service-policy {input policy-map | output policy-map } Example: Switch(config-if)# service-policy output policy_map_01 Switch(config-if)# Attaches a policy map to an input or output interface. This policy map is then used as the service policy for that interface. In this example, the traffic policy evaluates all traffic leaving that interface. Step 4 end Example: Switch(config-if)# end Switch# Saves configuration changes. Step 5 show policy map Example: (Optional) Displays statistics for the policy on the specified interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 957 QoS Configuring SSID Policies (GUI) Command or Action Switch# show policy map Purpose What to do next Proceed to attach any other traffic policy to an interface, and to specify the direction in which the policy should be applied. Related Topics Policy Map on Physical Port, on page 919 Configuring SSID Policies (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless. Expand the QoS node by clicking on the left pane and choose QOS-Policy. The Create QoS Policy page is displayed. Click Add New to create a new QoS Policy. The QoS Policy page is displayed. Select SSID from the Policy Type drop-down menu. Select the direction into which the policy needs to be applied from the Policy Direction drop-down list. The available options are: · Ingress · Egress Note Voice and video configurations are available only in the egress direction. Note When creating an egress SSID policy for voice and video classes, if the port_child_policy is already configured with voice and video classes having priority level, the existing port_child_policy is used. If a port_child_policy does not exist with voice and video classes, the switch will create voice and video classes with priority levels 1 and 2 under port_child_policy for voice and video traffic. Specify a policy name in the Policy Name text box. Provide a description to the policy in the Description text box. Select the trust parameter from the Trust drop-down list. The following options are available: · DSCP-- Assigns a label to indicate the given quality of service as DSCP. · COS--Matches IEEE 802.1Q class of service. This option is not available when the Policy Direction is engres. · User Priority--Enter the 802.11e user priority. This option is not available when the Policy Direction is engres. · None--This option is available when the Policy Direction is egress. This option is available only for egress policies. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 958 QoS Applying an SSID or Client Policy on a WLAN (CLI) Step 9 If you chose Egress policy above, the following options are available: · Bandwidth--Specifies the bandwidth rate. The following options are available: · Rate--Specifies the bandwidth in kbps. Enter a value in kbps in the Value field. · Remaining Ratio--Specifies the bandwidth in BRR (bandwidth remaining ratio). Enter the percentage in the Percent field. Note If you choose the Rate option for the Bandwidth parameter, this value must be greater than the sum of the policing values for voice and video traffic. . · Enable Voice--Click on the Enable Voice checkbox to enable voice traffic on this policy. Specify the following properties: · Priority--Sets the priority for this policy for strict scheduling. The priority level is set to 1. · Police (kbps)--Specifies the police rate in Kilobits per second. · CAC--Enables or disables CAC. If CAC is enabled, you must specify the following options: · User priorityThis option is available when the Policy Direction is ingress. Enter the 802.11e user priority. The range is from 0 to 7. By default, a value of 6 is assigned. · Rate(kbps) Note The CAC rate must be less than the police rate. Step 10 · Enable Video--Check the Enable Video checkbox to enable video traffic on this policy. Specify the following properties: · Priority--Sets the priority for this policy for strict scheduling. · Police (kbps)--Specifies the police rate in kilobits per second. Click Apply. Related Topics SSID Policies, on page 909 Supported QoS Features on Wireless Targets, on page 906 Examples: SSID Policy Examples: Configuring Downstream SSID Policy, on page 1001 Applying an SSID or Client Policy on a WLAN (CLI) Before you begin You must have a service-policy map configured before applying it on an SSID. SUMMARY STEPS 1. configure terminal 2. wlan profile-name 3. service-policy [ input | output ] policy-name 4. service-policy client [ input | output ] policy-name Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 959 QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI) 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan profile-name Example: Switch# wlan test4 Step 3 service-policy [ input | output ] policy-name Example: Switch(config-wlan)# service-policy input policy-map-ssid Purpose Enters global configuration mode. Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Applies the policy. The following options are available: · input-- Assigns the policy map to WLAN ingress traffic. · output-- Assigns the policy map to WLAN egress traffic. Step 4 service-policy client [ input | output ] policy-name Applies the policy. The following options are available: Example: Switch(config-wlan)# service-policy client input policy-map-client · input-- Assigns the client policy for ingress direction on the WLAN. · output-- Assigns the client policy for egress direction on the WLAN. Step 5 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics SSID Policies, on page 909 Supported QoS Features on Wireless Targets, on page 906 Examples: SSID Policy Examples: Configuring Downstream SSID Policy, on page 1001 Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI) You can configure a nonhierarchical policy map on a physical port that specifies which traffic class to act on. Actions supported are remarking and policing. Before you begin You should have already decided upon the classification, policing, and marking of your network traffic by policy maps prior to beginning this procedure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 960 QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI) SUMMARY STEPS 1. configure terminal 2. class-map {class-map name | match-any } 3. match access-group { access list index | access list name } 4. policy-map policy-map-name 5. class {class-map-name | class-default} 6. set {cos | dscp | ip | precedence | qos-group | wlan user-priority} 7. police {target_bit_rate | cir | rate } 8. exit 9. exit 10. interface interface-id 11. service-policy input policy-map-name 12. end 13. show policy-map [policy-map-name [class class-map-name]] 14. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 class-map {class-map name | match-any } Example: Switch(config)# class-map ipclass1 Switch(config-cmap)# exit Switch(config)# Enters class map configuration mode. · Creates a class map to be used for matching packets to the class whose name you specify. · If you specify match-any, one of the match criteria must be met for traffic entering the traffic class to be classified as part of the traffic class. This is the default. match access-group { access list index | access list name Specifies the classification criteria to match to the class } map. You can match on the following criteria: Example: · access-group--Matches to access group. Switch(config-cmap)# match access-group 1000 Switch(config-cmap)# exit Switch(config)# · class-map--Matches to another class map. · cos--Matches to a CoS value. · dscp--Matches to a DSCP value. · ip--Matches to a specific IP value. · non-client-nrt--Matches non-client NRT. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 961 QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI) Step 4 Step 5 Step 6 Step 7 Command or Action policy-map policy-map-name Example: Switch(config)# policy-map flowit Switch(config-pmap)# Purpose · precedence--Matches precedence in IPv4 and IPv6 packets. · qos-group--Matches to a QoS group. · vlan--Matches to a VLAN. · wlan--Matches to a wireless LAN. Creates a policy map by entering the policy map name, and enters policy-map configuration mode. By default, no policy maps are defined. class {class-map-name | class-default} Example: Switch(config-pmap)# class ipclass1 Switch(config-pmap-c)# Defines a traffic classification, and enter policy-map class configuration mode. By default, no policy map class-maps are defined. If a traffic class has already been defined by using the class-map global configuration command, specify its name for class-map-name in this command. A class-default traffic class is predefined and can be added to any policy. It is always placed at the end of a policy map. With an implied match any included in the class-default class, all packets that have not already matched the other traffic classes will match class-default. set {cos | dscp | ip | precedence | qos-group | wlan (Optional) Sets the QoS values. Possible QoS configuration user-priority} values include: Example: Switch(config-pmap-c)# set dscp 45 Switch(config-pmap-c)# · cos--Sets the IEEE 802.1Q/ISL class of service/user priority. · dscp--Sets DSCP in IP(v4) and IPv6 packets. · ip--Sets IP specific values. · precedence--Sets precedence in IP(v4) and IPv6 packet. · qos-group--Sets QoS group. · wlan user-priority--Sets WLAN user priority. police {target_bit_rate | cir | rate } Example: In this example, the set dscp command classifies the IP traffic by setting a new DSCP value in the packet. (Optional) Configures the policer: · target_bit_rate--Specifies the bit rate per second, enter a value between 8000 and 10000000000. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 962 QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI) Command or Action Switch(config-pmap-c)# police 100000 conform-action transmit exceed-action drop Switch(config-pmap-c)# Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 exit Example: Switch(config-pmap-c)# exit exit Example: Switch(config-pmap)# exit interface interface-id Example: Switch(config)# interface gigabitethernet 2/0/1 service-policy input policy-map-name Example: Switch(config-if)# service-policy input flowit end Example: Switch(config-if)# end show policy-map [policy-map-name [class class-map-name]] Example: Switch# show policy-map Purpose · cir--Committed Information Rate. · rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies. In this example, the police command adds a policer to the class where any traffic beyond the 100000 set target bit rate is dropped. Returns to policy map configuration mode. Returns to global configuration mode. Specifies the port to attach to the policy map, and enters interface configuration mode. Valid interfaces include physical ports. Specifies the policy-map name, and applies it to an ingress port. Only one policy map per ingress port is supported. Returns to privileged EXEC mode. (Optional) Verifies your entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 963 QoS Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI) Step 14 Command or Action copy running-config startup-config Example: Switch# copy-running-config startup-config Purpose (Optional) Saves your entries in the configuration file. What to do next If applicable to your QoS configuration, configure classification, policing, and marking of traffic on SVIs by using policy maps. Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI) Before you begin You should have already decided upon the classification, policing, and marking of your network traffic by using policy maps prior to beginning this procedure. SUMMARY STEPS 1. configure terminal 2. class-map {class-map name | match-any } 3. match vlan vlan number 4. policy-map policy-map-name 5. description description 6. class {class-map-name | class-default} 7. set {cos | dscp | ip | precedence | qos-group | wlan user-priority} 8. police {target_bit_rate | cir | rate} 9. exit 10. exit 11. interface interface-id 12. service-policy input policy-map-name 13. end 14. show policy-map [policy-map-name [class class-map-name]] 15. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 964 QoS Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI) Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action class-map {class-map name | match-any } Example: Switch(config)# class-map class_vlan100 match vlan vlan number Example: Switch(config-cmap)# match vlan 100 Switch(config-cmap)# exit Switch(config)# Purpose Enters class map configuration mode. · Creates a class map to be used for matching packets to the class whose name you specify. · If you specify match-any, one of the match criteria must be met for traffic entering the traffic class to be classified as part of the traffic class. This is the default. Specifies the VLAN to match to the class map. policy-map policy-map-name Example: Switch(config)# policy-map policy_vlan100 Switch(config-pmap)# Creates a policy map by entering the policy map name, and enters policy-map configuration mode. By default, no policy maps are defined. description description Example: Switch(config-pmap)# description vlan 100 (Optional) Enters a description of the policy map. class {class-map-name | class-default} Example: Switch(config-pmap)# class class_vlan100 Switch(config-pmap-c)# Defines a traffic classification, and enters the policy-map class configuration mode. By default, no policy map class-maps are defined. If a traffic class has already been defined by using the class-map global configuration command, specify its name for class-map-name in this command. A class-default traffic class is predefined and can be added to any policy. It is always placed at the end of a policy map. With an implied match any included in the class-default class, all packets that have not already matched the other traffic classes will match class-default. set {cos | dscp | ip | precedence | qos-group | wlan (Optional) Sets the QoS values. Possible QoS configuration user-priority} values include: Example: Switch(config-pmap-c)# set dscp af23 · cos--Sets the IEEE 802.1Q/ISL class of service/user priority. · dscp--Sets DSCP in IP(v4) and IPv6 packets. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 965 QoS Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI) Command or Action Switch(config-pmap-c)# Step 8 police {target_bit_rate | cir | rate} Example: Switch(config-pmap-c)# police 200000 conform-action transmit exceed-action drop Switch(config-pmap-c)# Step 9 Step 10 Step 11 Step 12 exit Example: Switch(config-pmap-c)# exit exit Example: Switch(config-pmap)# exit interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/3 service-policy input policy-map-name Example: Switch(config-if)# service-policy input policy_vlan100 Purpose · ip--Sets IP specific values. · precedence--Sets precedence in IP(v4) and IPv6 packet. · qos-group--Sets QoS group. · wlan user-priority--Sets WLAN user-priority. In this example, the set dscp command classifies the IP traffic by matching the packets with a DSCP value of AF23 (010010). (Optional) Configures the policer: · target_bit_rate--Specifies the bit rate per second. Enter a value between 8000 and 10000000000. · cir--Committed Information Rate. · rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies. In this example, the police command adds a policer to the class where any traffic beyond the 200000 set target bit rate is dropped. Returns to policy map configuration mode. Returns to global configuration mode. Specifies the port to attach to the policy map, and enters interface configuration mode. Valid interfaces include physical ports. Specifies the policy-map name, and applies it to an ingress port. Only one policy map per ingress port is supported. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 966 QoS Configuring Table Maps (CLI) Step 13 Step 14 Step 15 Command or Action end Example: Switch(config-if)# end show policy-map [policy-map-name [class class-map-name]] Example: Switch# show policy-map copy running-config startup-config Example: Switch# copy-running-config startup-config Purpose Returns to privileged EXEC mode. (Optional) Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics Policy Map on VLANs, on page 920 Examples: Policer VLAN Configuration, on page 1006 Configuring Table Maps (CLI) Table maps are a form of marking, and also enable the mapping and conversion of one field to another using a table. For example, a table map can be used to map and convert a Layer 2 CoS setting to a precedence value in Layer 3. Note A table map can be referenced in multiple policies or multiple times in the same policy. SUMMARY STEPS 1. configure terminal 2. table-map name {default {default value | copy | ignore} | exit | map {from from value to to value } | no} 3. map from value to value 4. exit 5. exit 6. show table-map 7. configure terminal 8. policy-map 9. class class-default 10. set cos dscp table table map name Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 967 QoS Configuring Table Maps (CLI) 11. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 table-map name {default {default value | copy | ignore} Creates a table map and enters the table map configuration | exit | map {from from value to to value } | no} mode. In table map configuration mode, you can perform Example: the following tasks: · default--Configures the table map default value, or Switch(config)# table-map table01 sets the default behavior for a value not found in the Switch(config-tablemap)# table map to copy or ignore. · exit--Exits from the table map configuration mode. · map--Maps a from to a to value in the table map. · no--Negates or sets the default values of the command. map from value to value Example: Switch(config-tablemap)# map from 0 to 2 Switch(config-tablemap)# map from 1 to 4 Switch(config-tablemap)# map from 24 to 3 Switch(config-tablemap)# map from 40 to 6 Switch(config-tablemap)# default 0 Switch(config-tablemap)# In this step, packets with DSCP values 0 are marked to the CoS value 2, DSCP value 1 to the CoS value 4, DSCP value 24 to the CoS value 3, DSCP value 40 to the CoS value 6 and all others to the CoS value 0. Note The mapping from CoS values to DSCP values in this example is configured by using the set policy map class configuration command as described in a later step in this procedure. Step 4 exit Example: Switch(config-tablemap)# exit Switch(config)# Returns to global configuration mode. Step 5 exit Example: Switch(config) exit Switch# Returns to privileged EXEC mode. Step 6 show table-map Example: Displays the table map configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 968 QoS Configuring Table Maps (CLI) Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Switch# show table-map Table Map table01 from 0 to 2 from 1 to 4 from 24 to 3 from 40 to 6 default 0 Purpose configure terminal Example: Switch# configure terminal Switch(config)# Enters global configuration mode. policy-map Example: Switch(config)# policy-map table-policy Switch(config-pmap)# Configures the policy map for the table map. class class-default Example: Switch(config-pmap)# class class-default Switch(config-pmap-c)# Matches the class to the system default. set cos dscp table table map name Example: If this policy is applied on input port, that port will have trust DSCP enabled on that port and marking will take place depending upon the specified table map. Switch(config-pmap-c)# set cos dscp table table01 Switch(config-pmap-c)# end Example: Switch(config-pmap-c)# end Switch# Returns to privileged EXEC mode. What to do next Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. Related Topics Table Map Marking, on page 922 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 969 QoS Configuring Trust Examples: Table Map Marking Configuration, on page 1008 Configuring Trust Configuring Trust Behavior for Wireless Traffic (CLI) The Cisco IOS XE 3.2 Release supported different trust defaults for wired and wireless ports. The trust default for wired ports was the same as for this software release. For wireless ports, the default system behavior was non-trust, which meant that when the switch came up, all markings for the wireless ports were defaulted to zero and no traffic received priority treatment. For compatibility with an existing wired switch, all traffic went to the best-effort queue by default. The access point performed priority queuing by default. In the downstream direction, the access point maintained voice, video, best-effort, and background queues for queuing. The access selected the queuing strategy based on the 11e tag information. By default, the access point treated all wireless packets as best effort. SUMMARY STEPS 1. configure terminal 2. qos wireless-default-untrust 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 qos wireless-default-untrust Example: Switch (config)# qos wireless-default-untrust Step 3 end Example: Switch(config)# end Purpose Enters global configuration mode. Configures the behavior of the switch to untrust wireless traffic. To configure the switch to trust wireless traffic by default, use the no form of the command. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Trust Behavior for Wired and Wireless Ports, on page 931 Configuring QoS Features and Functionality Configuring Call Admission Control (CLI) This task explains how to configure class-based, unconditional packet marking features on your switch for Call Admission Control (CAC). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 970 QoS Configuring Call Admission Control (CLI) SUMMARY STEPS 1. configure terminal 2. class-map class name 3. match dscp dscp value 4. exit 5. class-map class name 6. match dscp dscp value 7. exit 8. table-map name 9. default copy 10. exit 11. table-map name 12. default copy 13. exit 14. policy-map policy name 15. class class-map-name 16. priority level level_value 17. police [target_bit_rate | cir | rate ] 18. admit cac wmm-tspec 19. rate value 20. wlan-up value 21. exit 22. exit 23. class class name 24. priority level level_value 25. police [target_bit_rate | cir | rate ] 26. admit cac wmm-tspec 27. rate value 28. wlan-up value 29. exit 30. exit 31. policy-map policy name 32. class class-map-name 33. set dscp dscp table table_map_name 34. set wlan user-priority dscp table table_map_name 35. shape average {target bit rate | percent percentage} 36. queue-buffers {ratio ratio value} 37. service-policy policy_map_name 38. end 39. show policy-map Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 971 QoS Configuring Call Admission Control (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 class-map class name Example: Switch(config)# class-map voice Switch(config-cmap)# Step 3 Step 4 Step 5 match dscp dscp value Example: Switch(config-cmap)# match dscp 46 exit Example: Switch(config-cmap)# exit Switch(config)# class-map class name Example: Switch(config)# class-map video Switch(config-cmap)# Step 6 Step 7 match dscp dscp value Example: Switch(config-cmap)# match dscp 34 exit Example: Switch(config-cmap)# exit Purpose Enters the global configuration mode. Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. (Optional) Matches the DSCP values in IPv4 and IPv6 packets. Returns to global configuration mode. Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. (Optional) Matches the DSCP values in IPv4 and IPv6 packets. Returns to global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 972 QoS Configuring Call Admission Control (CLI) Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Switch(config)# table-map name Example: Switch(config)# table-map dscp2dscp Switch(config-tablemap)# default copy Example: Switch(config-tablemap)# default copy exit Example: Switch(config-tablemap)# exit Switch(config)# table-map name Example: Switch(config)# table-map dscp2up Switch(config-tablemap)# default copy Example: Switch(config-tablemap)# default copy exit Example: Switch(config-tablemap)# exit Switch(config)# policy-map policy name Example: Switch(config)# policy-map ssid_child_cac Switch(config-pmap)# Purpose Creates a table map and enters the table map configuration mode. Sets the default behavior for value not found in the table map to copy. Note This is the default option. You can also do a mapping of values for DSCP to DSCP. Returns to global configuration mode. Creates a new table map and enters the table map configuration mode. Sets the default behavior for value not found in the table map to copy. Note This is the default option. You can also do a mapping of values for DSCP to UP. Returns to global configuration mode. Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 973 QoS Configuring Call Admission Control (CLI) Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Command or Action class class-map-name Example: Switch(config-pmap)# class voice Purpose Defines an interface-level traffic classification, and enters policy-map configuration mode. priority level level_value Example: Switch(config-pmap-c)# priority level 1 police [target_bit_rate | cir | rate ] Example: Switch(config-pmap-c)# police cir 10m admit cac wmm-tspec Example: Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-cac-wmm)# The priority command assigns a strict scheduling priority for the class. Note Priority level 1 is more important than priority level 2. Priority level 1 reserves bandwidth that is processed first for QoS, so its latency is very low. Both priority level 1 and 2 reserve bandwidth. (Optional) Configures the policer: · target_bit_rate--Specifies the bit rate per second. Enter a value between 8000 and 10000000000. · cir--Committed Information Rate. · rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies. Configures call admission control for the policy map. Note This command only configures CAC for wireless QoS. rate value Example: Switch(config-pmap-admit-cac-wmm)# rate 5000 Configures the target bit rate (Kilo Bits per second). Enter a value from 8 to 10000000. wlan-up value Example: Configures the WLAN UP value. Enter a value from 0 to 7. Switch(config-pmap-admit-cac-wmm)# wlan-up 6 7 exit Example: Switch(config-pmap-admit-cac-wmm)# exit Returns to policy map class configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 974 QoS Configuring Call Admission Control (CLI) Step 22 Step 23 Step 24 Step 25 Step 26 Step 27 Command or Action Switch(config-pmap-c)# Purpose exit Example: Switch(config-pmap-c)# exit Switch(config-pmap)# Returns to policy map configuration mode. class class name Example: Switch(config-pmap)# class video Switch(config-pmap-c)# priority level level_value Example: Switch(config-pmap-c)# priority level 2 police [target_bit_rate | cir | rate ] Example: Switch(config-pmap-c)# police cir 20m admit cac wmm-tspec Example: Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-admit-cac-wmm)# Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. The priority command assigns a strict scheduling priority for the class. Note Priority level 1 is more important than priority level 2. Priority level 1 reserves bandwidth that is processed first for QoS, so its latency is very low. Both priority level 1 and 2 reserve bandwidth. (Optional) Configures the policer: · target_bit_rate--Specifies the bit rate per second. Enter a value between 8000 and 10000000000. · cir--Committed Information Rate. · rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies. Configures call admission control for the policy map. Note This command only configures CAC for wireless QoS. rate value Example: Switch(config-pmap-admit-cac-wmm)# rate 5000 Configures the target bit rate (Kilo Bits per second). Enter a value from 8 to 10000000. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 975 QoS Configuring Call Admission Control (CLI) Step 28 Step 29 Step 30 Step 31 Step 32 Step 33 Step 34 Step 35 Command or Action wlan-up value Example: Purpose Configures the WLAN UP value. Enter a value from 0 to 7. Switch(config-pmap-admit-cac-wmm)# wlan-up 4 5 exit Example: Switch(config-pmap-cac-wmm)# exit Switch(config-pmap)# Returns to policy map configuration mode. exit Example: Switch(config-pmap)# exit Switch(config)# Returns to global configuration mode. policy-map policy name Example: Switch(config)# policy-map ssid_cac Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. class class-map-name Example: Switch(config-pmap)# class default Defines an interface-level traffic classification, and enters policy-map configuration mode. In this example, the class map is set to default. set dscp dscp table table_map_name Example: Switch(config-pmap-c)# set dscp dscp table dscp2dscp (Optional) Sets the QoS values. In this example, the set dscp dscp table command creates a table map and sets its values. set wlan user-priority dscp table table_map_name Example: (Optional) Sets the QoS values. In this example, the set wlan user-priority dscp table command sets the WLAN user priority. Switch(config-pmap-c)# set wlan user-priority dscp table dscp2up shape average {target bit rate | percent percentage} Example: Configures the average shape rate. You can configure the average shape rate by target bit rates (bits per second) or Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 976 QoS Configuring Bandwidth (CLI) Step 36 Step 37 Step 38 Step 39 Command or Action Switch(config-pmap-c)# shape average 100000000 Purpose by percentage of interface bandwidth for the Committed Information Rate (CIR). queue-buffers {ratio ratio value} Example: Switch(config-pmap-c)# queue-buffers ratio 0 Configures the relative buffer size for the queue. Note The sum of all configured buffers in a policy must be less than or equal to 100 percent. Unallocated buffers are evenly distributed to all the remaining queues. Ensure sufficient buffers are allocated to all queues including the priority queues. Note Protocol Data Units (PDUs) for network control protocols such as spanning-tree and LACP utilize the priority queue or queue 0 (when a priority queue is not configured). Ensure sufficient buffers are allocated to these queues for the protocols to function. service-policy policy_map_name Example: Specifies the policy map for the service policy. Switch(config-pmap-c)# service-policy ssid_child_cac end Example: Switch(config-pmap)# end Switch# Saves configuration changes. show policy-map Example: Switch# show policy-map (Optional) Displays policy configuration information for all classes configured for all service policies. What to do next Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. For additional information about CAC, refer to the System Management Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches). Configuring Bandwidth (CLI) This procedure explains how to configure bandwidth on your switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 977 QoS Configuring Bandwidth (CLI) Before you begin You should have created a class map for bandwidth before beginning this procedure. SUMMARY STEPS 1. configure terminal 2. policy-map policy name 3. class class name 4. bandwidth {Kb/s | percent percentage | remaining { ratio ratio }} 5. end 6. show policy-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 policy-map policy name Example: Switch(config)# policy-map policy_bandwidth01 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Step 3 Step 4 class class name Example: Switch(config-pmap)# class class_bandwidth01 Switch(config-pmap-c)# Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. bandwidth {Kb/s | percent percentage | remaining { ratio Configures the bandwidth for the policy map. The ratio }} parameters include: Example: Switch(config-pmap-c)# bandwidth 200000 Switch(config-pmap-c)# · Kb/s--Configures a specific value in kilobits per second (from 20000 to 10000000). · percent---Allocates minimum bandwidth to a particular class based on a percentage. The queue can oversubscribe bandwidth in case other queues do not utilize the entire port bandwidth. The total sum cannot exceed 100 percent, and in case it is less than 100 percent, the rest of the bandwidth is equally divided along all bandwidth queues. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 978 QoS Configuring Police (CLI) Command or Action Step 5 end Example: Switch(config-pmap-c)# end Switch# Step 6 show policy-map Example: Switch# show policy-map Purpose · remaining-- Allocates minimum bandwidth to a particular class. The queue can oversubscribe bandwidth in case other queues do not utilize entire port bandwidth. The total sum cannot exceed 100 percent. It is preferred to use this command when the priority command is used for certain queues in the policy. You can also assign ratios rather than percentages to each queue; the queues will be assigned certain weights which are inline with these ratios. Ratios can range from 0 to 100. Total bandwidth ratio allocation for the policy in this case can exceed 100. Note You cannot mix bandwidth types on a policy map. For example, you cannot configure bandwidth in a single policy map using both a bandwidth percent and in kilobits per second. Saves configuration changes. (Optional) Displays policy configuration information for all classes configured for all service policies. What to do next Configure any additional policy maps for QoS for your network. After creating the policy maps, attach the traffic policy or polices to an interface using the service-policy command. Related Topics Bandwidth, on page 927 Configuring Police (CLI) This procedure explains how to configure policing on your switch. Before you begin You should have created a class map for policing before beginning this procedure. SUMMARY STEPS 1. configure terminal 2. policy-map policy name Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 979 QoS Configuring Police (CLI) 3. class class name 4. police {target_bit_rate [burst bytes | bc | conform-action | pir ] | cir {target_bit_rate | percent percentage} | rate {target_bit_rate | percent percentage} conform-action transmit exceed-action {drop [violate action] | set-cos-transmit | set-dscp-transmit | set-prec-transmit | transmit [violate action] }} 5. end 6. show policy-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 policy-map policy name Example: Switch(config)# policy-map policy_police01 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Step 3 Step 4 class class name Example: Switch(config-pmap)# class class_police01 Switch(config-pmap-c)# Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. police {target_bit_rate [burst bytes | bc | conform-action The following police subcommand options are available: | pir ] | cir {target_bit_rate | percent percentage} | rate {target_bit_rate | percent percentage} conform-action transmit exceed-action {drop [violate action] | · target_bit_rate--Bits per second (from 8000 to 10000000000). set-cos-transmit | set-dscp-transmit | set-prec-transmit · burst bytes--Enter a value from 1000 to | transmit [violate action] }} 512000000. Example: · bc--Conform burst. Switch(config-pmap-c)# police 8000 conform-action transmit exceed-action drop Switch(config-pmap-c)# · conform-action--Action taken when rate is less than conform burst. · pir--Peak Information Rate. · cir--Committed Information Rate. · target_bit_rate--Target bit rate (8000 to10000000000). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 980 QoS Configuring Police (CLI) Command or Action Step 5 end Example: Switch(config-pmap-c)# end Switch# Step 6 show policy-map Example: Switch# show policy-map Purpose · percent--Percentage of interface bandwidth for CIR. · rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies. · target_bit_rate--Target Bit Rate (8000 to 10000000000). · percent--Percentage of interface bandwidth for rate. The following police conform-action transmit exceed-action subcommand options are available: · drop--Drops the packet. · set-cos-transmit--Sets the CoS value and sends it. · set-dscp-transmit--Sets the DSCP value and sends it. · set-prec-transmit--Rewrites the packet precedence and sends it. · transmit--Transmits the packet. Note Policer-based markdown actions are only supported using table maps. Only one markdown table map is allowed for each marking field in the switch. Saves configuration changes. (Optional) Displays policy configuration information for all classes configured for all service policies. What to do next Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 981 QoS Configuring Priority (CLI) Related Topics Single-Rate Two-Color Policing, on page 925 Examples: Single-Rate Two-Color Policing Configuration, on page 1007 Dual-Rate Three-Color Policing, on page 925 Examples: Dual-Rate Three-Color Policing Configuration, on page 1008 Policing, on page 921 Token-Bucket Algorithm, on page 921 Examples: Policing Action Configuration, on page 1006 Examples: Policing Units, on page 1007 Configuring Priority (CLI) This procedure explains how to configure priority on your switch. The switch supports giving priority to specified queues. There are two priority levels available (1 and 2). Note Queues supporting voice and video should be assigned a priority level of 1. Before you begin You should have created a class map for priority before beginning this procedure. SUMMARY STEPS 1. configure terminal 2. policy-map policy name 3. class class name 4. priority [Kb/s [burst_in_bytes] | level level_value [Kb/s [burst_in_bytes] | percent percentage [burst_in_bytes] ] | percent percentage [burst_in_bytes] ] 5. end 6. show policy-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 policy-map policy name Example: Switch(config)# policy-map policy_priority01 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 982 QoS Configuring Priority (CLI) Step 3 Step 4 Command or Action class class name Example: Switch(config-pmap)# class class_priority01 Switch(config-pmap-c)# Purpose Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. priority [Kb/s [burst_in_bytes] | level level_value [Kb/s (Optional) The priority command assigns a strict scheduling [burst_in_bytes] | percent percentage [burst_in_bytes] ] | priority for the class. percent percentage [burst_in_bytes] ] The command options include: Example: · Kb/s--Specifies the kilobits per second (from 1 to Switch(config-pmap-c)# priority level 1 2000000). Switch(config-pmap-c)# · burst_in_bytes--Specifies the burst in bytes (from 32 to 2000000). · level level_value--Specifies the multilevel (1-2) priority queue. · Kb/s--Specifies the kilobits per second (from 1 to 2000000). · burst_in_bytes--Specifies the burst in bytes (from 32 to 2000000). · percent--Percentage of the total bandwidth. · burst_in_bytes--Specifies the burst in bytes (from 32 to 2000000). · percent--Percentage of the total bandwidth. · burst_in_bytes--Specifies the burst in bytes (32 to 2000000). Step 5 end Example: Switch(config-pmap-c)# end Switch# Note Priority level 1 is more important than priority level 2. Priority level 1 reserves bandwidth that is processed first for QoS, so its latency is very low. Both priority level 1 and 2 reserve bandwidth. Saves configuration changes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 983 QoS Configuring Queues and Shaping Step 6 Command or Action show policy-map Example: Switch# show policy-map Purpose (Optional) Displays policy configuration information for all classes configured for all service policies. What to do next Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. Related Topics Priority Queues, on page 929 Configuring Queues and Shaping Configuring Egress Queue Characteristics Depending on the complexity of your network and your QoS solution, you may need to perform all of the procedures in this section. You need to make decisions about these characteristics: · Which packets are mapped by DSCP, CoS, or QoS group value to each queue and threshold ID? · What drop percentage thresholds apply to the queues, and how much reserved and maximum memory is needed for the traffic type? · How much of the fixed buffer space is allocated to the queues? · Does the bandwidth of the port need to be rate limited? · How often should the egress queues be serviced and which technique (shaped, shared, or both) should be used? Note You can only configure the egress queues on the switch. Configuring Queue Buffers (CLI) The switch allows you to allocate buffers to queues. If there is no allocation made to buffers, then they are divided equally for all queues. You can use the queue-buffer ratio to divide it in a particular ratio. Since by default DTS (Dynamic Threshold and Scaling) is active on all queues, these are soft buffers. Note The queue-buffer ratio is supported on both wired and wireless ports, but the queue-buffer ratio cannot be configured with a queue-limit. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 984 QoS Configuring Queue Buffers (CLI) Before you begin The following are prerequisites for this procedure: · You should have created a class map for the queue buffer before beginning this procedure. · You must have configured either bandwidth, shape, or priority on the policy map prior to configuring the queue buffers. SUMMARY STEPS 1. configure terminal 2. policy-map policy name 3. class class name 4. bandwidth {Kb/s | percent percentage | remaining { ratio ratio value }} 5. queue-buffers {ratio ratio value} 6. end 7. show policy-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 policy-map policy name Example: Switch(config)# policy-map policy_queuebuffer01 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Step 3 Step 4 class class name Example: Switch(config-pmap)# class class_queuebuffer01 Switch(config-pmap-c)# Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. bandwidth {Kb/s | percent percentage | remaining { ratio Configures the bandwidth for the policy map. The command ratio value }} parameters include: Example: Switch(config-pmap-c)# bandwidth percent 80 · Kb/s--Use this command to configure a specific value. The range is 20000 to 10000000. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 985 QoS Configuring Queue Buffers (CLI) Step 5 Step 6 Command or Action Switch(config-pmap-c)# queue-buffers {ratio ratio value} Example: Switch(config-pmap-c)# queue-buffers ratio 10 Switch(config-pmap-c)# end Example: Switch(config-pmap-c)# end Switch# Purpose · percent--Allocates a minimum bandwidth to a particular class using a percentage. The queue can oversubscribe bandwidth in case other queues do not utilize the entire port bandwidth. The total sum cannot exceed 100 percent, and in case it is less than 100 percent, the rest of the bandwidth is equally divided along all bandwidth queues. · remaining--Allocates a minimum bandwidth to a particular class. The queue can oversubscribe bandwidth in case other queues do not utilize entire port bandwidth. The total sum cannot exceed 100 percent. It is preferred to use this command when the priority command is used for certain queues in the policy. You can also assign ratios rather than a percentage to each queue; the queues will be assigned certain weights that are inline with these ratios. Ratios can range from 0 to 100. Total bandwidth ratio allocation for the policy in this case can exceed 100. Note You cannot mix bandwidth types on a policy map. Configures the relative buffer size for the queue. Note The sum of all configured buffers in a policy must be less than or equal to 100 percent. Unallocated buffers are are evenly distributed to all the remaining queues. Ensure sufficient buffers are allocated to all queues including the priority queues. Note Protocol Data Units(PDUs) for network control protocols such as spanning-tree and LACP utilize the priority queue or queue 0 (when a priority queue is not configured). Ensure sufficient buffers are allocated to these queues for the protocols to function. Saves configuration changes. Step 7 show policy-map Example: Switch# show policy-map (Optional) Displays policy configuration information for all classes configured for all service policies. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 986 QoS Configuring Queue Limits (CLI) What to do next Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. Related Topics Queue Buffer Allocation, on page 930 Examples: Queue Buffers Configuration, on page 1005 Configuring Queue Limits (CLI) You use queue limits to configure Weighted Tail Drop (WTD). WTD ensures the configuration of more than one threshold per queue. Each class of service is dropped at a different threshold value to provide for QoS differentiation. With the switch, each queue has 3 explicit programmable threshold classes--0, 1, 2. Therefore, the enqueue/drop decision of each packet per queue is determined by the packet's threshold class assignment, which is determined by the DSCP, CoS, or QoS group field of the frame header. WTD also uses a soft limit, and therefore you are allowed to configure the queue limit to up to 400 percent (maximum four times the reserved buffer from common pool). This soft limit prevents overrunning the common pool without impacting other features. Note You can only configure queue limits on the switch egress queues on wired ports. Before you begin The following are prerequisites for this procedure: · You should have created a class map for the queue limits before beginning this procedure. · You must have configured either bandwidth, shape, or priority on the policy map prior to configuring the queue limits. SUMMARY STEPS 1. configure terminal 2. policy-map policy name 3. class class name 4. bandwidth {Kb/s | percent percentage | remaining { ratio ratio value }} 5. queue-limit {packets packets | cos {cos value { maximum threshold value | percent percentage } | values {cos value | percent percentage } } | dscp {dscp value {maximum threshold value | percent percentage} | match packet {maximum threshold value | percent percentage} | default {maximum threshold value | percent percentage} | ef {maximum threshold value | percent percentage} | dscp values dscp value} | percent percentage }} 6. end 7. show policy-map Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 987 QoS Configuring Queue Limits (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 policy-map policy name Example: Switch(config)# policy-map policy_queuelimit01 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Step 3 Step 4 class class name Example: Switch(config-pmap)# class class_queuelimit01 Switch(config-pmap-c)# Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. bandwidth {Kb/s | percent percentage | remaining { ratio Configures the bandwidth for the policy map. The ratio value }} parameters include: Example: Switch(config-pmap-c)# bandwidth 500000 Switch(config-pmap-c)# · Kb/s--Use this command to configure a specific value. The range is 20000 to 10000000. · percent--Allocates a minimum bandwidth to a particular class. The queue can oversubscribe bandwidth in case other queues do not utilize the entire port bandwidth. The total sum cannot exceed 100 percent, and in case it is less than 100 percent, the rest of the bandwidth is equally divided along all bandwidth queues. · remaining--Allocates a minimum bandwidth to a particular class. The queue can oversubscribe bandwidth in case other queues do not utilize entire port bandwidth. The total sum cannot exceed 100 percent. It is preferred to use this command when the priority command is used for certain queues in the policy. You can also assign ratios rather than a percentage to each queue; the queues will be assigned certain weights that are inline with these ratios. Ratios can range from 0 to 100. Total bandwidth ratio allocation for the policy in this case can exceed 100. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 988 QoS Configuring Shaping (CLI) Step 5 Command or Action Purpose Note You cannot mix bandwidth types on a policy map. queue-limit {packets packets | cos {cos value { maximum Sets the queue limit threshold percentage values. threshold value | percent percentage } | values {cos value | percent percentage } } | dscp {dscp value {maximum threshold value | percent percentage} | match packet {maximum threshold value | percent percentage} | default {maximum threshold value | percent percentage} | ef {maximum threshold value | percent percentage} | dscp values dscp value} | percent percentage }} With every queue, there are three thresholds (0,1,2), and there are default values for each of these thresholds. Use this command to change the default or any other queue limit threshold setting. For example, if DSCP 3, 4, and 5 packets are being sent into a specific queue in a configuration, then you can use this command to set the threshold percentages for these three DSCP values. For additional information Example: about queue limit threshold values, see Weighted Tail Drop, on page 928. Switch(config-pmap-c)# queue-limit dscp 3 percent Note 20 Switch(config-pmap-c)# queue-limit dscp 4 percent 30 Switch(config-pmap-c)# queue-limit dscp 5 percent 40 The switch does not support absolute queue-limit percentages. The switch only supports DSCP or CoS queue-limit percentages. Step 6 end Example: Switch(config-pmap-c)# end Switch# Saves configuration changes. Step 7 show policy-map Example: Switch# show policy-map (Optional) Displays policy configuration information for all classes configured for all service policies. What to do next Proceed to configure any additional policy maps for QoS for your network. After creating your policy maps, proceed to attach the traffic policy or polices to an interface using the service-policy command. Related Topics Weighted Tail Drop, on page 928 Examples: Queue-limit Configuration, on page 1004 Configuring Shaping (CLI) You use the shape command to configure shaping (maximum bandwidth) for a particular class. The queue's bandwidth is restricted to this value even though the port has additional bandwidth left. You can configure shaping as an average percent, as well as a shape average value in bits per second. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 989 QoS Configuring Shaping (CLI) Before you begin You should have created a class map for shaping before beginning this procedure. SUMMARY STEPS 1. configure terminal 2. policy-map policy name 3. class class name 4. shape average {target bit rate | percent percentage} 5. end 6. show policy-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 policy-map policy name Example: Switch(config)# policy-map policy_shaping01 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. Step 3 Step 4 class class name Example: Switch(config-pmap)# class class_shaping01 Switch(config-pmap-c)# Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following: · word--Class map name. · class-default--System default class matching any otherwise unclassified packets. shape average {target bit rate | percent percentage} Example: Switch(config-pmap-c)# shape average percent 50 Switch(config-pmap-c)# Configures the average shape rate. You can configure the average shape rate by target bit rates (bits per second) or by percentage of interface bandwidth for the Committed Information Rate (CIR). Step 5 end Example: Switch(config-pmap-c)# end Saves configuration changes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 990 QoS Configuring Precious Metal Policies (CLI) Command or Action Switch# Step 6 show policy-map Example: Switch# show policy-map Purpose (Optional) Displays policy configuration information for all classes configured for all service policies. What to do next Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. Related Topics Average Rate Shaping, on page 926 Examples: Average Rate Shaping Configuration, on page 1004 Hierarchical Shaping, on page 926 Configuring Precious Metal Policies (CLI) You can configure precious metal QoS policies on a per-WLAN basis. SUMMARY STEPS 1. configure terminal 2. wlan wlan-name 3. service-policy output policy-name 4. end 5. show wlan {wlan-id | wlan-name} DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 wlan wlan-name Example: Switchwlan test4 Enters the WLAN configuration submode. Step 3 service-policy output policy-name Configures the WLAN with the QoS policy. To configure Example: the WLAN with precious metal policies, you must enter one of the following keywords: platinum, gold, silver, or bronze. The upstream policy is specified with the keyword Switch(config-wlan)# service-policy output platinum platinum-up as shown in the example. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 991 QoS Configuring QoS Policies for Multicast Traffic (CLI) Step 4 Step 5 Command or Action Example: Switch(config-wlan)# service-policy input platinum-up end Example: Switch(config)# end show wlan {wlan-id | wlan-name} Example: Switch# show wlan name qos-wlan Purpose Note Upstream policies differ from downstream policies. The upstream policies have a suffix of -up. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode. Verifies the configured QoS policy on the WLAN. Switch# show wlan name qos-wlan ... ... ... QoS Service Policy - Input Policy Name : platinum-up Policy State : Validated QoS Service Policy - Output Policy Name : platinum Policy State : Validated ... ... Related Topics Precious Metal Policies for Wireless QoS, on page 934 Configuring QoS Policies for Multicast Traffic (CLI) Before you begin The following are the prerequisites for configuring a QoS policy for multicast traffic: · You must have a multicast service policy configured. · You must enable multicast-multicast mode before applying the policy. SUMMARY STEPS 1. configure terminal 2. ap capwap multicast service-policy output service-policy-name 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 992 QoS Applying a QoS Policy on a WLAN (GUI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap capwap multicast service-policy output service-policy-name Applies the configured multicast policy. Example: Switch(config)#ap capwap multicast service-policy output service-policy-mcast Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Wireless QoS Multicast, on page 920 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000 Applying a QoS Policy on a WLAN (GUI) Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless. Expand the WLAN node by clicking on the left pane and choose WLANs. The WLANs page is displayed. Select the WLAN for which you want to configure the QoS policies by clicking on the WLAN Profile. Click the QoS tab to configure the QoS policies on the WLAN. The following options are available: Parameter QoS SSID Policy Downstream QoS Policy Description QoS downstream policy configuration. The Existing Policy column displays the current applied policy. To change the existing policy, select the policy from the drop-down list in the Assign Policy column. Upstream QoS Policy QoS upstream policy configuration. The Existing Policy column displays the current applied policy. To change the existing policy, select the policy from the drop-down list in the Assign Policy column. QoS Client Policy Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 993 QoS Monitoring QoS Parameter Downstream QoS Policy Description QoS downstream policy configuration. The Existing Policy column displays the current applied policy. To change the existing policy, select the policy from the drop-down list in the Assign Policy column. Upstream QoS Policy QoS upstream policy configuration. The Existing Policy column displays the current applied policy. To change the existing policy, select the policy from the drop-down list in the Assign Policy column. WMM WMM Policy WMM Policy. Values are the following: · Disabled--Disables this WMM policy. · Allowed--Allows the clients to communicate with the WLAN. · Required--Ensures that it is mandatory for the clients to have WMM features enabled on them to communicate with the WLAN. Step 5 Click Apply. Related Topics Port Policies, on page 907 Port Policy Format, on page 907 Restrictions for QoS on Wireless Targets, on page 939 Supported QoS Features on Wireless Targets, on page 906 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000 SSID Policies, on page 909 Examples: SSID Policy Examples: Configuring Downstream SSID Policy, on page 1001 Client Policies, on page 910 Examples: Client Policies, on page 1002 Monitoring QoS The following commands can be used to monitor QoS on the switch. Note Classification counters and statistics are not supported for any wireless targets. Table 88: Monitoring QoS Command show class-map [class_map_name] Description Displays a list of all class maps configured. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 994 QoS Monitoring QoS Command show policy-map [policy_map_name] Description Displays a list of all policy maps configured. Command parameters include: · policy map name · interface · session show policy-map interface { Auto-template | Capwap | Shows the runtime representation GigabitEthernet | GroupVI | InternalInterface | Loopback | Null | and statistics of all the policies Port-channel | TenGigabitEthernet | Tunnel | Vlan | Brief | class | configured on the switch. Command input | output | wireless } parameters include: · Auto-template--Auto-Template interface · Capwap--CAPWAP tunnel interface · GigabitEthernet--Gigabit Ethernet IEEE.802.3z · GroupVI--Group virtual interface · InternalInterface--Internal interface · Loopback--Loopback interface · Null--Null interface · Port-channel--Ethernet channel of interfaces · TenGigabitEthernet--10-Gigabit Ethernet · Tunnel--Tunnel interface · Vlan--Catalyst VLANs · Brief--Brief description of policy maps · Class--Show statistics for individual class · Input--Input policy · Output--Output policy · Wireless--wireless Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 995 QoS Configuration Examples for QoS Command show policy-map interface wireless ap [access point] show policy-map interface wireless ssid [ssid] show policy-map interface wireless client [client] show policy-map session [ input | output | uid UUID ] Description Shows the runtime representation and statistics for all the wireless APs on the switch. Shows the runtime representation and statistics for all the SSID targets on the switch. Shows the runtime representation and statistics for all the client targets on the switch. Shows the session QoS policy. Command parameters include: · input--Input policy · output--Output policy · uid--Policy based on SSS unique identification. show table-map Displays all the table maps and their configurations. show policy-map interface wireless ssid name ssid-name radio type Displays SSID policy configuration {24ghz | 5ghz} ap name ap-name on an access point. Configuration Examples for QoS Examples: Classification by Access Control Lists This example shows how to classify packets for QoS by using access control lists (ACLs): Switch# configure terminal Switch(config)# access-list 101 permit ip host 12.4.1.1 host 15.2.1.1 Switch(config)# class-map acl-101 Switch(config-cmap)# description match on access-list 101 Switch(config-cmap)# match access-group 101 Switch(config-cmap)# After creating a class map by using an ACL, you then create a policy map for the class, and apply the policy map to an interface for QoS. Related Topics Creating a Traffic Class (CLI), on page 942 Class Maps, on page 918 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 996 QoS Examples: Class of Service Layer 2 Classification Examples: Class of Service Layer 2 Classification This example shows how to classify packets for QoS using a class of service Layer 2 classification: Switch# configure terminal Switch(config)# class-map cos Switch(config-cmap)# match cos ? <0-7> Enter up to 4 class-of-service values separated by white-spaces Switch(config-cmap)# match cos 3 4 5 Switch(config-cmap)# After creating a class map by using a CoS Layer 2 classification, you then create a policy map for the class, and apply the policy map to an interface for QoS. Examples: Class of Service DSCP Classification This example shows how to classify packets for QoS using a class of service DSCP classification: Switch# configure terminal Switch(config)# class-map dscp Switch(config-cmap)# match dscp af21 af22 af23 Switch(config-cmap)# After creating a class map by using a DSCP classification, you then create a policy map for the class, and apply the policy map to an interface for QoS. Examples: VLAN ID Layer 2 Classification This example shows how to classify for QoS using a VLAN ID Layer 2 classification: Switch# configure terminal Switch(config)# class-map vlan-120 Switch(config-cmap)# match vlan ? <1-4095> VLAN id Switch(config-cmap)# match vlan 120 Switch(config-cmap)# After creating a class map by using a VLAN Layer 2 classification, you then create a policy map for the class, and apply the policy map to an interface for QoS. Examples: Classification by DSCP or Precedence Values This example shows how to classify packets by using DSCP or precedence values: Switch# configure terminal Switch(config)# class-map prec2 Switch(config-cmap)# description matching precedence 2 packets Switch(config-cmap)# match ip precedence 2 Switch(config-cmap)# exit Switch(config)# class-map ef Switch(config-cmap)# description EF traffic Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 997 QoS Examples: Hierarchical Classification Switch(config-cmap)# match ip dscp ef Switch(config-cmap)# After creating a class map by using a DSCP or precedence values, you then create a policy map for the class, and apply the policy map to an interface for QoS. Examples: Hierarchical Classification The following is an example of a hierarchical classification, where a class named parent is created, which matches another class named child. The class named child matches based on the IP precedence being set to 2. Switch# configure terminal Switch(config)# class-map child Switch(config-cmap)# match ip precedence 2 Switch(config-cmap)# exit Switch(config)# class-map parent Switch(config-cmap)# match class child Switch(config-cmap)# After creating the parent class map, you then create a policy map for the class, and apply the policy map to an interface for QoS. Related Topics Hierarchical QoS, on page 911 Examples: Hierarchical Policy Configuration The following is an example of a configuration using hierarchical polices: Switch# configure terminal Switch(config)# class-map c1 Switch(config-cmap)# match dscp 30 Switch(config-cmap)# exit Switch(config)# class-map c2 Switch(config-cmap)# match precedence 4 Switch(config-cmap)# exit Switch(config)# class-map c3 Switch(config-cmap)# exit Switch(config)# policy-map child Switch(config-pmap)# class c1 Switch(config-pmap-c)# priority level 1 Switch(config-pmap-c)# police rate percent 20 conform-action transmit exceed action drop Switch(config-pmap-c-police)# exit Switch(config-pmap-c)# exit Switch(config-pmap)# class c2 Switch(config-pmap-c)# bandwidth 20000 Switch(config-pmap-c)# exit Switch(config-pmap)# class class-default Switch(config-pmap-c)# bandwidth 20000 Switch(config-pmap-c)# exit Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 998 QoS Examples: Classification for Voice and Video Switch(config-pmap)# exit Switch(config)# policy-map parent Switch(config-pmap)# class class-default Switch(config-pmap-c)# shape average 1000000 Switch(config-pmap-c)# service-policy child Switch(config-pmap-c)# end Related Topics Hierarchical QoS, on page 911 Examples: Classification for Voice and Video This example describes how to classify packet streams for voice and video using switch specific information. In this example, voice and video are coming in from end-point A into GigabitEthernet1/0/1 on the switch and have precedence values of 5 and 6, respectively. Additionally, voice and video are also coming from end-point B into GigabitEthernet1/0/2 on the switch with DSCP values of EF and AF11, respectively. Assume that all the packets from the both the interfaces are sent on the uplink interface, and there is a requirement to police voice to 100 Mbps and video to 150 Mbps. To classify per the above requirements, a class to match voice packets coming in on GigabitEthernet1/0/1 is created, named voice-interface-1, which matches precedence 5. Similarly another class for voice is created, named voice-interface-2, which will match voice packets in GigabitEthernet1/0/2. These classes are associated to two separate policies named input-interface-1, which is attached to GigabitEthernet1/0/1, and input-interface-2, which is attached to GigabitEthernet1/0/2. The action for this class is to mark the qos-group to 10. To match packets with QoS-group 10 on the output interface, a class named voice is created which matches on QoS-group 10. This is then associated to another policy named output-interface, which is associated to the uplink interface. Video is handled in the same way, but matches on QoS-group 20. The following example shows how classify using the above switch specific information: Switch(config)# Switch(config)# class-map voice-interface-1 Switch(config-cmap)# match ip precedence 5 Switch(config-cmap)# exit Switch(config)# class-map video-interface-1 Switch(config-cmap)# match ip precedence 6 Switch(config-cmap)# exit Switch(config)# class-map voice-interface-2 Switch(config-cmap)# match ip dscp ef Switch(config-cmap)# exit Switch(config)# class-map video-interface-2 Switch(config-cmap)# match ip dscp af11 Switch(config-cmap)# exit Switch(config)# policy-map input-interface-1 Switch(config-pmap)# class voice-interface-1 Switch(config-pmap-c)# set qos-group 10 Switch(config-pmap-c)# exit Switch(config-pmap)# class video-interface-1 Switch(config-pmap-c)# set qos-group 20 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 999 QoS Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic Switch(config-pmap-c)# policy-map input-interface-2 Switch(config-pmap)# class voice-interface-2 Switch(config-pmap-c)# set qos-group 10 Switch(config-pmap-c)# class video-interface-2 Switch(config-pmap-c)# set qos-group 20 Switch(config-pmap-c)# exit Switch(config-pmap)# exit Switch(config)# class-map voice Switch(config-cmap)# match qos-group 10 Switch(config-cmap)# exit Switch(config)# class-map video Switch(config-cmap)# match qos-group 20 Switch(config)# policy-map output-interface Switch(config-pmap)# class voice Switch(config-pmap-c)# police 256000 conform-action transmit exceed-action drop Switch(config-pmap-c-police)# exit Switch(config-pmap-c)# exit Switch(config-pmap)# class video Switch(config-pmap-c)# police 1024000 conform-action transmit exceed-action drop Switch(config-pmap-c-police)# exit Switch(config-pmap-c)# exit Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic The following example provides a template for creating a port child policy for managing quality of service for voice and video traffic. Policy-map port_child_policy Class voice (match dscp ef) Priority level 1 Police Multicast Policer Class video (match dscp af41) Priority level 2 Police Multicast Policer Class mcast-data (match non-client-nrt) Bandwidth remaining ratio <> Class class-default (NRT Data) Bandwidth remaining ratio <> Note Multicast Policer in the example above is not a keyword. It refers to the policing policy configured. Two class maps with name voice and video are configured with DSCP assignments of 46 and 34. The voice traffic is assigned the priority of 1 and the video traffic is assigned the priority level 2 and is processed using Q0 and Q1. If your network receives multicast voice and video traffic, you can configure multicast policers. The non-client NRT data and NRT data are processed using the Q2 and Q3 queues. Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Port Policies, on page 907 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1000 QoS Examples: Configuring Downstream SSID Policy Port Policy Format, on page 907 Configuring QoS Policies for Multicast Traffic (CLI), on page 992 Wireless QoS Multicast, on page 920 Examples: Configuring Downstream SSID Policy To configure a downstream BSSID policy, you must first configure a port child policy with priority level queuing. Configuring a User-Defined Port Child Policy The following is an example of configuring a user-defined port child policy: policy-map port_child_policy class voice priority level 1 20000 class video priority level 2 10000 class non-client-nrt-class bandwidth remaining ratio 10 class class-default bandwidth remaining ratio 15 Configuring Downstream BSSID Policy The following configuration example displays how to configure a downstream BSSID policy: policy-map bssid-policer queue-buffer ratio 0 class class-default shape average 30000000 set dscp dscp table dscp2dscp set wlan user-priority dscp table dscp2up service-policy ssid_child_qos The SSID child QoS policy may be defined as below: Policy Map ssid-child_qos Class voice priority level 1 police cir 5m admit cac wmm-tspec UP 6,7 / tells WCM allow `voice' TSPEC\SIP snoop for this ssid rate 4000 / must be police rate value is in kbps) Class video priority level 2 police cir 60000 Related Topics Applying an SSID or Client Policy on a WLAN (CLI), on page 959 Configuring SSID Policies (GUI), on page 958 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1001 QoS Examples: Client Policies Applying a QoS Policy on a WLAN (GUI), on page 993 SSID Policies, on page 909 Examples: Client Policies The following example shows a default client policy in the downstream direction. Any incoming traffic contains the user-priority as 0: Note The default client policy is enabled only on WMM clients that are ACM-enabled. Policy-map client-def-down class class-default set wlan user-priority 0 The following example shows the default client policy in the upstream direction. Any traffic that is sent to the wired network from wireless network will result in the DSCP value being set to 0. Note The default client policy is enabled only on WMM clients that are ACM-enabled. Policy-map client-def-up class class-default set dscp 0 The following examples shows client policies that are generated automatically and applied to the WMM client when the client authenticates to a profile in AAA with a QoS-level attribute configured. Policy Map platinum-WMM Class voice-plat set wlan user-priority 6 Class video-plat set wlan user-priority 4 Class class-default set wlan user-priority 0 Policy Map gold-WMM Class voice-gold set wlan user-priority 4 Class video-gold set wlan user-priority 4 Class class-default set wlan user-priority 0 The following is an example of non-WMM client precious metal policies: Policy Map platinum set wlan user-priority 6 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1002 QoS Examples: Client Policies Any traffic matching class voice1 the user priority is set to a pre-defined value. The class can be set to assign a DSCP or ACL. Policy Map client1-down Class voice1 //match dscp, cos set wlan user-priority <> Class voice2 //match acl set wlan user-priority <> Class voice3 set wlan user-priority <> Class class-default set wlan user-priority 0 The following is an example of a client policy based on AAA and TCLAS: Policy Map client2-down[ AAA+ TCLAS pol example] Class voice\\match dscp police <> set <> Class class-default set <> Class voice1|| voice2 [match acls] police <> class voice1 set <> class voice2 set <> The following is an example of a client policy for voice and video for traffic in the downstream direction: Policy Map client3-down class voice \\match dscp, cos police X class video police Y class class-default police Z The following is an example of a client policy for voice and video for traffic in the upstream direction using policing: Policy Map client1-up class voice \\match dscp, up, cos police X class video police Y class class-default police Z The following is an example of a client policy for voice and video based on DSCP: Policy Map client2-up class voice \\match dscp, up, cos set dscp <> class video set dscp <> class class-default set dscp <> Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1003 QoS Examples: Average Rate Shaping Configuration Related Topics Configuring Client Policies (CLI) Configuring Client Policies (GUI), on page 949 Applying a QoS Policy on a WLAN (GUI), on page 993 Client Policies, on page 910 Examples: Average Rate Shaping Configuration The following example shows how to configure average rate shaping: Switch# configure terminal Switch(config)# class-map prec1 Switch(config-cmap)# description matching precedence 1 packets Switch(config-cmap)# match ip precedence 1 Switch(config-cmap)# end Switch# configure terminal Switch(config)# class-map prec2 Switch(config-cmap)# description matching precedence 2 packets Switch(config-cmap)# match ip precedence 2 Switch(config-cmap)# exit Switch(config)# policy-map shaper Switch(config-pmap)# class prec1 Switch(config-pmap-c)# shape average 512000 Switch(config-pmap-c)# exit Switch(config-pmap)# policy-map shaper Switch(config-pmap)# class prec2 Switch(config-pmap-c)# shape average 512000 Switch(config-pmap-c)# exit Switch(config-pmap)# class class-default Switch(config-pmap-c)# shape average 1024000 After configuring the class maps, policy map, and shape averages for your configuration, proceed to then apply the policy map to the interface for QoS. Related Topics Configuring Shaping (CLI), on page 989 Average Rate Shaping, on page 926 Examples: Queue-limit Configuration The following example shows how to configure a queue-limit policy based upon DSCP values and percentages: Switch# configure terminal Switch#(config)# policy-map port-queue Switch#(config-pmap)# class dscp-1-2-3 Switch#(config-pmap-c)# bandwidth percent 20 Switch#(config-pmap-c)# queue-limit dscp 1 percent 80 Switch#(config-pmap-c)# queue-limit dscp 2 percent 90 Switch#(config-pmap-c)# queue-limit dscp 3 percent 100 Switch#(config-pmap-c)# exit Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1004 QoS Examples: Queue Buffers Configuration Switch#(config-pmap)# class dscp-4-5-6 Switch#(config-pmap-c)# bandwidth percent 20 Switch#(config-pmap-c)# queue-limit dscp 4 percent 20 Switch#(config-pmap-c)# queue-limit dscp 5 percent 30 Switch#(config-pmap-c)# queue-limit dscp 6 percent 20 Switch#(config-pmap-c)# exit Switch#(config-pmap)# class dscp-7-8-9 Switch#(config-pmap-c)# bandwidth percent 20 Switch#(config-pmap-c)# queue-limit dscp 7 percent 20 Switch#(config-pmap-c)# queue-limit dscp 8 percent 30 Switch#(config-pmap-c)# queue-limit dscp 9 percent 20 Switch#(config-pmap-c)# exit Switch#(config-pmap)# class dscp-10-11-12 Switch#(config-pmap-c)# bandwidth percent 20 Switch#(config-pmap-c)# queue-limit dscp 10 percent 20 Switch#(config-pmap-c)# queue-limit dscp 11 percent 30 Switch#(config-pmap-c)# queue-limit dscp 12 percent 20 Switch#(config-pmap-c)# exit Switch#(config-pmap)# class dscp-13-14-15 Switch#(config-pmap-c)# bandwidth percent 10 Switch#(config-pmap-c)# queue-limit dscp 13 percent 20 Switch#(config-pmap-c)# queue-limit dscp 14 percent 30 Switch#(config-pmap-c)# queue-limit dscp 15 percent 20 Switch#(config-pmap-c)# end Switch# After finishing with the above policy map queue-limit configuration, you can then proceed to apply the policy map to an interface for QoS. Related Topics Configuring Queue Limits (CLI), on page 987 Weighted Tail Drop, on page 928 Examples: Queue Buffers Configuration The following example shows how configure a queue buffer policy and then apply it to an interface for QoS: Switch# configure terminal Switch(config)# policy-map policy1001 Switch(config-pmap)# class class1001 Switch(config-pmap-c)# bandwidth remaining ratio 10 Switch(config-pmap-c)# queue-buffer ratio ? <0-100> Queue-buffers ratio limit Switch(config-pmap-c)# queue-buffer ratio 20 Switch(config-pmap-c)# end Switch# configure terminal Switch(config)# interface gigabitEthernet2/0/3 Switch(config-if)# service-policy output policy1001 Switch(config-if)# end Related Topics Configuring Queue Buffers (CLI), on page 984 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1005 QoS Examples: Policing Action Configuration Queue Buffer Allocation, on page 930 Examples: Policing Action Configuration The following example displays the various policing actions that can be associated to the policer. These actions are accomplished using the conforming, exceeding, or violating packet configurations. You have the flexibility to drop, mark and transmit, or transmit packets that have exceeded or violated a traffic profile. For example, a common deployment scenario is one where the enterprise customer polices traffic exiting the network towards the service provider and marks the conforming, exceeding and violating packets with different DSCP values. The service provider could then choose to drop the packets marked with the exceeded and violated DSCP values under cases of congestion, but may choose to transmit them when bandwidth is available. Note The Layer 2 fields can be marked to include the CoS fields, and the Layer 3 fields can be marked to include the precedence and the DSCP fields. One useful feature is the ability to associate multiple actions with an event. For example, you could set the precedence bit and the CoS for all conforming packets. A submode for an action configuration could then be provided by the policing feature. This is an example of a policing action configuration: Switch# configure terminal Switch(config)# policy-map police Switch(config-pmap)# class class-default Switch(config-pmap-c)# police cir 1000000 pir 2000000 Switch(config-pmap-c-police)# conform-action transmit Switch(config-pmap-c-police)# exceed-action set-dscp-transmit dscp table exceed-markdown-table Switch(config-pmap-c-police)# violate-action set-dscp-transmit dscp table violate-markdown-table Switch(config-pmap-c-police)# end In this example, the exceed-markdown-table and violate-mark-down-table are table maps. Note Policer-based markdown actions are only supported using table maps. Only one markdown table map is allowed for each marking field in the switch. Related Topics Configuring Police (CLI), on page 979 Policing, on page 921 Token-Bucket Algorithm, on page 921 Examples: Policer VLAN Configuration The following example displays a VLAN policer configuration. At the end of this configuration, the VLAN policy map is applied to an interface for QoS. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1006 QoS Examples: Policing Units Switch(config)# class-map vlan100 Switch(config-cmap)# match vlan 100 Switch(config-cmap)# exit Switch(config)# policy-map vlan100 Switch(config-pmap)# policy-map class vlan100 Switch(config-pmap-c)# police 100000 bc conform-action transmit exceed-action drop Switch(config-pmap-c-police)# end Switch# configure terminal Switch(config)# interface gigabitEthernet1/0/5 Switch(config-if)# service-policy input vlan100 Related Topics Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI), on page 964 Policy Map on VLANs, on page 920 Examples: Policing Units The following examples display the various units of policing that are supported for QoS. The policing unit is the basis on which the token bucket works . The following units of policing are supported: · CIR and PIR are specified in bits per second. The burst parameters are specified in bytes. This is the default mode; it is the unit that is assumed when no units are specified. The CIR and PIR can also be configured in percent, in which case the burst parameters have to be configured in milliseconds. · CIR and PIR are specified in packets per second. In this case, the burst parameters are configured in packets as well. The following is an example of a policer configuration in bits per second: Switch(config)# policy-map bps-policer Switch(config-pmap)# class class-default Switch(config-pmap-c) # police rate 256000 bps burst 1000 bytes conform-action transmit exceed-action drop The following is an example of a policer configuration in packets per second. In this configuration, a dual-rate three-color policer is configured where the units of measurement is packet. The burst and peak burst are all specified in packets. Switch(config)# policy-map pps-policer Switch(config-pmap)# class class-default Switch(config-pmap-c)# police rate 5000 pps burst 100 packets peak-rate 10000 pps peak-burst 200 packets conform-action transmit exceed-action drop violate-action drop Related Topics Configuring Police (CLI), on page 979 Token-Bucket Algorithm, on page 921 Examples: Single-Rate Two-Color Policing Configuration The following example shows how to configure a single-rate two-color policer: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1007 QoS Examples: Dual-Rate Three-Color Policing Configuration Switch(config)# class-map match-any prec1 Switch(config-cmap)# match ip precedence 1 Switch(config-cmap)# exit Switch(config)# policy-map policer Switch(config-pmap)# class prec1 Switch(config-pmap-c)# police cir 256000 conform-action transmit exceed-action drop Switch(config-pmap-c-police)# exit Switch(config-pmap-c)# Related Topics Configuring Police (CLI), on page 979 Single-Rate Two-Color Policing, on page 925 Examples: Dual-Rate Three-Color Policing Configuration The following example shows how to configure a dual-rate three-color policer: Switch# configure terminal Switch(config)# policy-Map dual-rate-3color-policer Switch(config-pmap)# class class-default Switch(config-pmap-c)# police cir 64000 bc 2000 pir 128000 be 2000 Switch(config-pmap-c-police)# conform-action transmit Switch(config-pmap-c-police)# exceed-action set-dscp-transmit dscp table exceed-markdown-table Switch(config-pmap-c-police)# violate-action set-dscp-transmit dscp table violate-markdown-table Switch(config-pmap-c-police)# exit Switch(config-pmap-c)# In this example, the exceed-markdown-table and violate-mark-down-table are table maps. Note Policer based markdown actions are only supported using table maps. Only one markdown table map is allowed for each marking field in the switch. Related Topics Configuring Police (CLI), on page 979 Dual-Rate Three-Color Policing, on page 925 Examples: Table Map Marking Configuration The following steps and examples show how to use table map marking for your QoS configuration: 1. Define the table map. Define the table-map using the table-map command and indicate the mapping of the values. This table does not know of the policies or classes within which it will be used. The default command in the table map indicates the value to be copied into the `to' field when there is no matching `from' field. In the example, a table map named table-map1 is created. The mapping defined is to convert the value from 0 to 1 and from 2 to 3, while setting the default value to 4. Switch(config)# table-map table-map1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1008 QoS Example: Table Map Configuration to Retain CoS Markings Switch(config-tablemap)# map from 0 to 1 Switch(config-tablemap)# map from 2 to 3 Switch(config-tablemap)# default 4 Switch(config-tablemap)# exit 2. Define the policy map where the table map will be used. In the example, the incoming CoS is mapped to the DSCP based on the mapping specified in the table table-map1. For this example, if the incoming packet has a DSCP of 0, the CoS in the packet is set 1. If no table map name is specified the command assumes a default behavior where the value is copied as is from the `from' field (DSCP in this case) to the `to' field (CoS in this case). Note however, that while the CoS is a 3-bit field, the DSCP is a 6-bit field, which implies that the CoS is copied to the first three bits in the DSCP. Switch(config)# policy map policy1 Switch(config-pmap)# class class-default Switch(config-pmap-c)# set cos dscp table table-map1 Switch(config-pmap-c)# exit 3. Associate the policy to an interface. Switch(config)# interface GigabitEthernet1/0/1 Switch(config-if)# service-policy output policy1 Switch(config-if)# exit Related Topics Configuring Table Maps (CLI), on page 967 Table Map Marking, on page 922 Example: Table Map Configuration to Retain CoS Markings The following example shows how to use table maps to retain CoS markings on an interface for your QoS configuration. The cos-trust-policy policy (configured in the example) is enabled in the ingress direction to retain the CoS marking coming into the interface. If the policy is not enabled, only the DSCP is trusted by default. If a pure Layer 2 packet arrives at the interface, then the CoS value will be rewritten to 0 when there is no such policy in the ingress port for CoS. Switch# configure terminal Switch(config)# table-map cos2cos Switch(config-tablemap)# default copy Switch(config-tablemap)# exit Switch(config)# policy map cos-trust-policy Switch(config-pmap)# class class-default Switch(config-pmap-c)# set cos cos table cos2cos Switch(config-pmap-c)# exit Switch(config)# interface GigabitEthernet1/0/2 Switch(config-if)# service-policy input cos-trust-policy Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1009 QoS Where to Go Next Switch(config-if)# exit Related Topics Trust Behavior for Wired and Wireless Ports, on page 931 Where to Go Next Review the auto-QoS documentation to see if you can use these automated capabilities for your QoS configuration. Additional References for QoS Related Documents Related Topic Document Title For complete syntax and usage information QoS Command Reference (Catalyst 3650 Switches) for the commands used in this chapter. Cisco IOS Quality of Service Solutions Command Reference Call Admission Control (CAC) System Management Configuration Guide (Catalyst 3650 Switches) System Management Command Reference (Catalyst 3650 Switches) Multicast Shaping and Policing Rate Precious Metal Policies IP Multicast Routing Configuration Guide (Catalyst 3650 Switches) Cisco Wireless LAN Controller Configuration Guide. Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title -- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1010 QoS Feature History and Information for QoS MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for QoS Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1011 QoS Feature History and Information for QoS Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1012 5 7 C H A P T E R Configuring Auto-QoS · Finding Feature Information, on page 1013 · Prerequisites for Auto-QoS, on page 1013 · Restrictions for Auto-QoS, on page 1013 · Information About Configuring Auto-QoS, on page 1014 · How to Configure Auto-QoS, on page 1016 · Monitoring Auto-QoS, on page 1020 · Troubleshooting Auto-QoS, on page 1021 · Configuration Examples for Auto-QoS, on page 1021 · Where to Go Next for Auto-QoS, on page 1050 · Additional References for Auto-QoS, on page 1050 · Feature History and Information for Auto-QoS, on page 1051 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Auto-QoS The prerequisites for auto-QoS are the same as the prerequisites for standard QoS. Restrictions for Auto-QoS The following are restrictions for auto-QoS: · Auto-qos is not supported on SVI interfaces. · The trust device device_type command available in interface configuration mode is a stand-alone command on the switch. When using this command, if the connected peer device is not a corresponding Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1013 QoS Information About Configuring Auto-QoS device (defined as a device matching your trust policy), both CoS and DSCP values are set to "0" and any input policy will not take effect. If the connected peer device is a corresponding device, input policy will take effect. · You must exercise caution when copying a pre-3.2.2 software version to this switch. If you do copy a pre-3.2.2 software version to this switch, then you must follow the auto-QoS upgrade procedure described later in this chapter. · Do not configure the auto qos voip cisco-phone option for IP phones that support video. This option causes DSCP markings of video packets to get overwritten, because these packets do not have Expedited Forwarding priority, which results in these packets getting classified in the class-default class. · Auto-QoS does not generate configuration when it is pushed from the startup-configuration using the auto qos voip cisco-phone command to the running-configuration. This is expected behavior and this is to prevent overwriting of user-created customized QoS policies by the default configuration, if any, every time the command auto qos voip cisco-phone is pushed from the startup-config. You can use any of the following workarounds for this limitation: · Configure the auto qos voip cisco-phone command manually on the switch interfaces. · For new switches, if you push auto-QoS commands through startup-config, the command should include each of the following as part of the standard template 1. Interface-level: · trust device cisco-phone · auto qos voip cisco-phone · service-policy input AutoQos-4.0-CiscoPhone-Input-Policy · service-policy output AutoQos-4.0-Output-Policy 2. Global-level: · Class-map · Policy-map · ACL(ACE) · If the auto qos voip cisco-phone command is already configured on an interface but policies are not being generated, disable the command from all the interfaces and reconfigure the command on each interface manually. Related Topics Upgrading Auto-QoS (CLI), on page 1018 Information About Configuring Auto-QoS Auto-QoS Overview You can use the auto-QoS feature to simplify the deployment of QoS features. Auto-QoS determines the network design and enables QoS configurations so that the switch can prioritize different traffic flows. The switch employs the MQC model. This means that instead of using certain global configurations, auto-QoS applied to any interface on a switch configures several global class maps and policy maps. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1014 QoS Auto-QoS Global Configuration Templates Auto-QoS matches traffic and assigns each matched packet to qos-groups. This allows the output policy map to put specific qos-groups into specific queues, including into the priority queue. QoS is needed in both directions, both on inbound and outbound. When inbound, the switch port needs to trust the DSCP in the packet (done by default). When outbound, the switch port needs to give voice packets "front of line" priority. If voice is delayed too long by waiting behind other packets in the outbound queue, the end host drops the packet because it arrives outside of the receive window for that packet. Auto-QoS Global Configuration Templates In general, an auto-QoS command generates a series of class maps that either match on ACLs or on DSCP and/or CoS values to differentiate traffic into application classes. An input policy is also generated, which matches the generated classes and in some cases, polices the classes to a set bandwidth. Eight egress-queue class maps are generated. The actual egress output policy assigns a queue to each one of these eight egress-queue class maps. The auto-QoS commands only generate templates as needed. For example, the first time any new auto-QoS command is used, global configurations that define the eight queue egress service-policy are generated. From this point on, auto-QoS commands applied to other interfaces do not generate templates for egress queuing because all auto-QoS commands rely on the same eight queue models, which have already been generated from the first time a new auto-QoS command was used. Auto-QoS Policy and Class Maps After entering the appropriate auto-QoS command, the following actions occur: · Specific class maps are created. · Specific policy maps (input and output) are created. · Policy maps are attached to the specified interface. · Trust level for the interface is configured. Related Topics Configuring Auto-QoS (CLI), on page 1016 Effects of Auto-QoS on Running Configuration When auto-QoS is enabled, the auto qos interface configuration commands and the generated global configuration are added to the running configuration. The switch applies the auto-QoS-generated commands as if the commands were entered from the CLI. An existing user configuration can cause the application of the generated commands to fail or to be overridden by the generated commands. These actions may occur without warning. If all the generated commands are successfully applied, any user-entered configuration that was not overridden remains in the running configuration. Any user-entered configuration that was overridden can be retrieved by reloading the switch without saving the current configuration to memory. If the generated commands are not applied, the previous running configuration is restored. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1015 QoS How to Configure Auto-QoS How to Configure Auto-QoS Configuring Auto-QoS (CLI) For optimum QoS performance, configure auto-QoS on all the devices in your network. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. Depending on your auto-QoS configuration, use one of the following commands: · auto qos voip {cisco-phone | cisco-softphone | trust} · auto qos video {cts | ip-camera | media-player} · auto qos classify [police] · auto qos trust {cos | dscp} 4. end 5. show auto qos interface interface-id DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Switch(config)# interface gigabitethernet 3/0/1 Specifies the port that is connected to a VoIP port, video device, or the uplink port that is connected to another trusted switch or router in the network interior, and enters the interface configuration mode. Step 3 Depending on your auto-QoS configuration, use one of the The following commands enable auto-QoS for VoIP: following commands: · auto qos voip cisco-phone--If the port is connected · auto qos voip {cisco-phone | cisco-softphone | trust} to a Cisco IP Phone, the QoS labels of incoming packets are only trusted (conditional trust through CDP) when the telephone is detected. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1016 QoS Configuring Auto-QoS (CLI) Command or Action · auto qos video {cts | ip-camera | media-player} · auto qos classify [police] · auto qos trust {cos | dscp} Example: Switch(config-if)# auto qos trust dscp Purpose Note Do not configure the auto qos voip cisco-phone option for IP phones that support video. This option causes DSCP markings of video packets to get overwritten, because these packets do not have Expedited Forwarding priority, which results in these packets getting classified in the class-default class. · auto qos voip cisco-softphone--The port is connected to device running the Cisco SoftPhone feature. This command generates a QoS configuration for interfaces connected to PCs running the Cisco IP SoftPhone application and mark, as well as police traffic coming from such interfaces. Ports configured with this command are considered untrusted. · auto qos voip trust--The uplink port is connected to a trusted switch or router, and the VoIP traffic classification in the ingress packet is trusted. The following commands enable auto-QoS for the specified video device (system, camera, or media player): · auto qos video cts--A port connected to a Cisco Telepresence system. QoS labels of incoming packets are only trusted (conditional trust through CDP) when a Cisco TelePresence is detected. · auto qos video ip-camera--A port connected to a Cisco video surveillance camera. QoS labels of incoming packets are only trusted (conditional trust through CDP) when a Cisco camera is detected. · auto qos video media-player--A port connected to a CDP-capable Cisco digital media player. QoS labels of incoming packets are only trusted (conditional trust through CDP) when a digital media player is detected. The following command enables auto-QoS for classification: · auto qos classify police-- This command generates a QoS configuration for untrusted interfaces. The configuration places a service-policy on the interface to classify traffic coming from untrusted desktops/devices and mark them accordingly. The service-policies generated do police. The following commands enable auto-QoS for trusted interfaces: · auto qos trust cos--Class of service. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1017 QoS Upgrading Auto-QoS (CLI) Command or Action Step 4 end Example: Switch(config-if)# end Step 5 show auto qos interface interface-id Example: Switch# show auto qos interface gigabitethernet 3/0/1 Purpose · auto qos trust dscp--Differentiated Services Code Point. Returns to privileged EXEC mode. (Optional) Displays the auto-QoS command on the interface on which auto-QoS was enabled. Use the show running-config command to display the auto-QoS configuration and user modifications. Related Topics Auto-QoS Policy and Class Maps, on page 1015 Upgrading Auto-QoS (CLI) This procedure should only be followed after copying a pre-3.2.2 software version to this switch. If you do copy a pre-3.2.2 software version to this switch, then you must follow this auto-QoS upgrade procedure. Before you begin Prior to upgrading, you need to remove all auto-QoS configurations currently on the switch. This sample procedure describes that process. After following this sample procedure, you must then reboot the switch with the new or upgraded software image and reconfigure auto-QoS. SUMMARY STEPS 1. show auto qos 2. no auto qos 3. show running-config | i autoQos 4. no policy-map policy-map_name 5. show running-config | i AutoQoS 6. show auto qos 7. write memory DETAILED STEPS Step 1 show auto qos Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1018 QoS Upgrading Auto-QoS (CLI) Step 2 Step 3 Step 4 Step 5 Switch# show auto qos GigabitEthernet2/0/3 auto qos voip cisco-phone GigabitEthernet2/0/27 auto qos voip cisco-softphone In privileged EXEC mode, record all current auto QoS configurations by entering this command. no auto qos Example: Switch(config-if)#no auto qos In interface configuration mode, run the appropriate no auto qos command on each interface that has an auto QoS configuration. show running-config | i autoQos Example: Switch# show running-config | i autoQos Return to privileged EXEC mode, and record any remaining auto QoS maps class maps, policy maps, access lists, table maps, or other configurations by entering this command. no policy-map policy-map_name Example: Switch)config# no policy-map pmap_101 Switch)config# no class-map cmap_101 Switch)config# no ip access-list extended AutoQos-101 Switch)config# no table-map 101 Switch)config# no table-map policed-dscp In global configuration mode, remove the QoS class maps, policy maps, table maps, and any other auto QoS configurations by entering these commands: · no policy-map policy-map-name · no class-map class-map-name · no ip access-list extended Auto-QoS-x · no table-map table-map-name · no table-map policed-dscp show running-config | i AutoQoS Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1019 QoS Monitoring Auto-QoS Step 6 Step 7 Switch# show running-config | i AutoQos Return to privileged EXEC mode, run this command again to ensure that no auto-QoS configuration or remaining parts of the auto-QoS configuration exists show auto qos Example: Switch# show auto qos Run this command to ensure that no auto-QoS configuration or remaining parts of the configuration exists. write memory Example: Switch# write memory Write the changes to the auto QoS configuration to NV memory by entering the write memory command. What to do next Reboot the switch with the new or upgraded software image. After rebooting with the new or upgraded software image, re-configure auto-QoS for the appropriate switch interfaces as determined by running the show auto qos command described in step 1. Note There is only one table-map for exceed and another table-map for violate markdown per switch or stack. If the switch already has a table-map under the exceed action, then the auto-qos policy cannot be applied. Related Topics Restrictions for Auto-QoS, on page 1013 Monitoring Auto-QoS Table 89: Commands for Monitoring Auto-QoS Command show auto qos [interface [interface-id]] Description Displays the initial auto-QoS configuration. You can compare the show auto qos and the show running-config command output to identify the user-defined QoS settings. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1020 QoS Troubleshooting Auto-QoS Command show running-config Description Displays information about the QoS configuration that might be affected by auto-QoS. You can compare the show auto qos and the show running-config command output to identify the user-defined QoS settings. Troubleshooting Auto-QoS To troubleshoot auto-QoS, use the debug auto qos privileged EXEC command. For more information, see the debug auto qos command in the command reference for this release. To disable auto-QoS on a port, use the no form of the auto qos command interface configuration command, such as no auto qos voip. Only the auto-QoS-generated interface configuration commands for this port are removed. If this is the last port on which auto-QoS is enabled and you enter the no auto qos voip command, auto-QoS is considered disabled even though the auto-QoS-generated global configuration commands remain (to avoid disrupting traffic on other ports affected by the global configuration). Configuration Examples for Auto-QoS Example: auto qos trust cos The following is an example of the auto qos trust cos command and the applied policies and class maps. The following policy maps are created and applied when running this command: · AutoQos-4.0-Trust-Cos-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface gigabitEthernet1/0/17 Switch(config-if)# auto qos trust cos Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1021 QoS Example: auto qos trust cos Switch(config-if)# end Switch# show policy-map interface GigabitEthernet1/0/17 GigabitEthernet1/0/7 Service-policy input: AutoQos-4.0-Trust-Cos-Input-Policy Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set cos cos table AutoQos-4.0-Trust-Cos-Table Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1022 QoS Example: auto qos trust cos 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1023 QoS Example: auto qos trust dscp Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 Example: auto qos trust dscp The following is an example of the auto qos trust dscp command and the applied policies and class maps. The following policy maps are created and applied when running this command: · AutoQos-4.0-Trust-Dscp-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface GigabitEthernet1/0/18 Switch(config-if)# auto qos trust dscp Switch(config-if)# end Switch#show policy-map interface GigabitEthernet1/0/18 GigabitEthernet1/0/18 Service-policy input: AutoQos-4.0-Trust-Dscp-Input-Policy Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp dscp table AutoQos-4.0-Trust-Dscp-Table Service-policy output: AutoQos-4.0-Output-Policy Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1024 QoS Example: auto qos trust dscp queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1025 QoS Example: auto qos video cts (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 Example: auto qos video cts The following is an example of the auto qos video cts command and the applied policies and class maps. The following policy maps are created and applied when running this command: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1026 QoS Example: auto qos video cts · AutoQos-4.0-Trust-Cos-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface gigabitEthernet1/0/12 Switch(config-if)# auto qos video cts Switch(config-if)# end Switch# show policy-map interface gigabitEthernet1/0/12 GigabitEthernet1/0/12 Service-policy input: AutoQos-4.0-Trust-Cos-Input-Policy Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set cos cos table AutoQos-4.0-Trust-Cos-Table Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1027 QoS Example: auto qos video cts Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1028 QoS Example: auto qos video ip-camera Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 Example: auto qos video ip-camera The following is an example of the auto qos video ip-camera command and the applied policies and class maps. The following policy maps are created and applied when running this command: · AutoQos-4.0-Trust-Dscp-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1029 QoS Example: auto qos video ip-camera · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface GigabitEthernet1/0/9 Switch(config-if)# auto qos video ip-camera Switch(config-if)# end Switch# show policy-map interface GigabitEthernet1/0/9 GigabitEthernet1/0/9 Service-policy input: AutoQos-4.0-Trust-Dscp-Input-Policy Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp dscp table AutoQos-4.0-Trust-Dscp-Table Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1030 QoS Example: auto qos video ip-camera queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1031 QoS Example: auto qos video media-player 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 Example: auto qos video media-player The following is an example of the auto qos video media-player command and the applied policies and class maps. The following policy maps are created and applied when running this command: · AutoQos-4.0-Trust-Dscp-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface GigabitEthernet1/0/25 Switch(config-if)# auto qos video media-player Switch(config-if)# end Switch# show policy-map interface GigabitEthernet1/0/25 GigabitEthernet1/0/25 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1032 QoS Example: auto qos video media-player Service-policy input: AutoQos-4.0-Trust-Dscp-Input-Policy Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp dscp table AutoQos-4.0-Trust-Dscp-Table Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1033 QoS Example: auto qos video media-player queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1034 QoS Example: auto qos voip trust (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 Example: auto qos voip trust The following is an example of the auto qos voip trust command and the applied policies and class maps. The following policy maps are created and applied when running this command: · AutoQos-4.0-Trust-Cos-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface gigabitEthernet1/0/31 Switch(config-if)# auto qos voip trust Switch(config-if)# end Switch# show policy-map interface GigabitEthernet1/0/31 GigabitEthernet1/0/31 Service-policy input: AutoQos-4.0-Trust-Cos-Input-Policy Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set cos cos table AutoQos-4.0-Trust-Cos-Table Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1035 QoS Example: auto qos voip trust 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1036 QoS Example: auto qos voip cisco-phone 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 Example: auto qos voip cisco-phone The following is an example of the auto qos voip cisco-phone command and the applied policies and class maps. The following policy maps are created and applied when running this command: · AutoQos-4.0-CiscoPhone-Input-Policy · AutoQos-4.0-Output-Policy Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1037 QoS Example: auto qos voip cisco-phone The following class maps are created and applied when running this command: · AutoQos-4.0-Voip-Data-CiscoPhone-Class (match-any) · AutoQos-4.0-Voip-Signal-CiscoPhone-Class (match-any) · AutoQos-4.0-Default-Class (match-any) · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface gigabitEthernet1/0/5 Switch(config-if)# auto qos voip cisco-phone Switch(config-if)# end Switch# show policy-map interface gigabitEthernet1/0/5 GigabitEthernet1/0/5 Service-policy input: AutoQos-4.0-CiscoPhone-Input-Policy Class-map: AutoQos-4.0-Voip-Data-CiscoPhone-Class (match-any) 0 packets Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp ef police: cir 128000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Voip-Signal-CiscoPhone-Class (match-any) 0 packets Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs3 police: cir 32000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1038 QoS Example: auto qos voip cisco-phone conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Default-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Default 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp default Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1039 QoS Example: auto qos voip cisco-phone 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1040 QoS Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 Example: auto qos voip cisco-softphone Example: auto qos voip cisco-softphone The following is an example of the auto qos voip cisco-softphone command and the applied policies and class maps. The following policy maps are created and applied when running this command: · AutoQos-4.0-CiscoSoftPhone-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · AutoQos-4.0-Voip-Data-Class (match-any) · AutoQos-4.0-Voip-Signal-Class (match-any) · AutoQos-4.0-Multimedia-Conf-Class (match-any) · AutoQos-4.0-Bulk-Data-Class (match-any) · AutoQos-4.0-Transaction-Class (match-any) · AutoQos-4.0-Scavanger-Class (match-any) · AutoQos-4.0-Signaling-Class (match-any) · AutoQos-4.0-Default-Class (match-any) · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface gigabitEthernet1/0/21 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1041 QoS Example: auto qos voip cisco-softphone Switch(config-if)# auto qos voip cisco-softphone Switch(config-if)# end Switch# show policy-map interface gigabitEthernet1/0/21 GigabitEthernet1/0/21 Service-policy input: AutoQos-4.0-CiscoSoftPhone-Input-Policy Class-map: AutoQos-4.0-Voip-Data-Class (match-any) 0 packets Match: dscp ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp ef police: cir 128000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Voip-Signal-Class (match-any) 0 packets Match: dscp cs3 (24) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs3 police: cir 32000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Multimedia-Conf-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-MultiEnhanced-Conf 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af41 police: cir 5000000 bps, bc 156250 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Bulk-Data-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Bulk-Data 0 packets, 0 bytes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1042 QoS Example: auto qos voip cisco-softphone 5 minute rate 0 bps QoS Set dscp af11 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Transaction-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Transactional-Data 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af21 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Scavanger-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Scavanger 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs1 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Signaling-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Signaling 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs3 police: cir 32000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Default-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Default 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp default police: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1043 QoS Example: auto qos voip cisco-softphone cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1044 QoS Example: auto qos voip cisco-softphone (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1045 QoS auto qos classify police Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 auto qos classify police The following is an example of the auto qos classify police command and the applied policies and class maps. The following policy maps are created and applied when running this command: · AutoQos-4.0-Classify-Police-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · AutoQos-4.0-Multimedia-Conf-Class (match-any) · AutoQos-4.0-Bulk-Data-Class (match-any) · AutoQos-4.0-Transaction-Class (match-any) · AutoQos-4.0-Scavanger-Class (match-any) · AutoQos-4.0-Signaling-Class (match-any) · AutoQos-4.0-Default-Class (match-any) · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) Switch(config)# interface gigabitEthernet1/0/6 Switch(config-if)# auto qos classify police Switch(config-if)# end Switch# show policy-map interface gigabitEthernet1/0/6 GigabitEthernet1/0/6 Service-policy input: AutoQos-4.0-Classify-Police-Input-Policy Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1046 QoS auto qos classify police Class-map: AutoQos-4.0-Multimedia-Conf-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-MultiEnhanced-Conf 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af41 police: cir 5000000 bps, bc 156250 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Bulk-Data-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Bulk-Data 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af11 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Transaction-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Transactional-Data 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af21 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Scavanger-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Scavanger 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs1 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Signaling-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Signaling 0 packets, 0 bytes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1047 QoS auto qos classify police 5 minute rate 0 bps QoS Set dscp cs3 police: cir 32000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps Class-map: AutoQos-4.0-Default-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Default 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp default police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000, Priority Level: 1 Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1048 QoS auto qos classify police queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100 (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 1% Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1049 QoS Where to Go Next for Auto-QoS queue-buffers ratio 10 Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25 Where to Go Next for Auto-QoS Review the QoS documentation if you require any specific QoS changes to your auto-QoS configuration. Additional References for Auto-QoS Related Documents Related Topic Document Title For complete syntax and usage information for the commands used in this chapter. QoS Command Reference (Catalyst 3650 Switches) Cisco IOS Quality of Service Solutions Command Reference Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1050 QoS Feature History and Information for Auto-QoS Standards and RFCs Standard/RFC Title -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Auto-QoS Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1051 QoS Feature History and Information for Auto-QoS Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1052 X I P A R T Radio Resource Management · Configuring Radio Resource Management, on page 1055 5 8 C H A P T E R Configuring Radio Resource Management · Finding Feature Information, on page 1055 · Prerequisites for Configuring Radio Resource Management, on page 1055 · Restrictions for Radio Resource Management, on page 1056 · Information About Radio Resource Management, on page 1056 · How to Configure RRM, on page 1063 · Monitoring RRM Parameters and RF Group Status, on page 1082 · Examples: RF Group Configuration, on page 1084 · Information About ED-RRM, on page 1084 · Additional References for Radio Resource Management, on page 1086 · Feature History and Information For Performing Radio Resource Management Configuration, on page 1087 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring Radio Resource Management The switch should be configured as a mobility controller and not a mobility anchor to configure Radio Resource Management. It may require dynamic channel assignment functionality for the home APs to be supported. The new mobility architecture that involves mobility controller and mobility agent must be configured on the switch or controllers for RRM to work. Note Refer Mobility Configuration Guide for configuring mobility controller and mobility agent. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1055 Restrictions for Radio Resource Management Radio Resource Management Restrictions for Radio Resource Management If an AP tries to join the RF-group that already holds the maximum number of APs it can support, the device rejects the application and throws an error. Information About Radio Resource Management The Radio Resource Management (RRM) software embedded in the switch acts as a built-in RF engineer to consistently provide real-time RF management of your wireless network. RRM enables switches to continually monitor their associated lightweight access points for the following information: · Traffic load--The total bandwidth used for transmitting and receiving traffic. It enables wireless LAN managers to track and plan network growth ahead of client demand. · Interference--The amount of traffic coming from other 802.11 sources. · Noise--The amount of non-802.11 traffic that is interfering with the currently assigned channel. · Coverage--The Received Signal Strength (RSSI) and signal-to-noise ratio (SNR) for all connected clients. · Other --The number of nearby access points. RRM performs these functions: · Radio resource monitoring · Transmit power control · Dynamic channel assignment · Coverage hole detection and correction · RF grouping Radio Resource Monitoring RRM automatically detects and configures new switches and lightweight access points as they are added to the network. It then automatically adjusts associated and nearby lightweight access points to optimize coverage and capacity. Lightweight access points can scan all valid channels for the country of operation as well as for channels available in other locations. The access points in local mode go "off-channel" for a period not greater than 60 ms to monitor these channels for noise and interference. Packets collected during this time are analyzed to detect rogue access points, rogue clients, ad-hoc clients, and interfering access points. Note In the presence of voice traffic or other critical traffic (in the last 100 ms), the access points can defer off-channel measurements. It also defers based on WLAN scan defer priority configurations. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1056 Radio Resource Management Information About RF Groups Each access point spends only 0.2 percent of its time off-channel. This activity is distributed across all access points so that adjacent access points are not scanning at the same time, which could adversely affect wireless LAN performance. RRM supports new mobility architecture for RF grouping that involves Mobility Controller (MC) and Mobility Agent (MA). · Mobility Controller (MC)--The Cisco WLC 5700 Series Controllers, Cisco Catalyst 3850 Switch, or Cisco Unified Wireless Networking Solution controller can act as MC. The MC has MC functionality and MA functionality that is running internally into it. · Mobility Agent (MA)--The Mobility Agent is the component that maintains client mobility state machine for a mobile client. Information About RF Groups An RF group is a logical collection of Cisco WLCs that coordinate to perform RRM in a globally optimized manner to perform network calculations on a per-radio basis. An RF group exists for each 802.11 network type. Clustering Cisco WLCs into a single RF group enable the RRM algorithms to scale beyond the capabilities of a single Cisco WLC. RF group is created based on following parameters: · User-configured RF network name. · Neighbor discovery performed at the radio level. · Country list configured on MC. RF grouping runs between MCs. Lightweight access points periodically send out neighbor messages over the air. Access points using the the same RF group name validate messages from each other. When access points on different Cisco WLCs hear validated neighbor messages at a signal strength of 80 dBm or stronger, the Cisco WLCs dynamically form an RF neighborhood in auto mode. In static mode, the leader is manually selected and the members are added to the RF Group. To know more about RF Group modes, RF Group Leader. Note RF groups and mobility groups are similar in that they both define clusters of Cisco WLCs, but they are different in terms of their use. An RF group facilitates scalable, system-wide dynamic RF management while a mobility group facilitates scalable, system-wide mobility and Cisco WLC redundancy. RF Group Leader Starting in the 7.0.116.0 release, the RF Group Leader can be configured in two ways as follows: · Auto Mode--In this mode, the members of an RF group elect an RF group leader to maintain a "master" power and channel scheme for the group. The RF grouping algorithm dynamically chooses the RF group leader and ensures that an RF group leader is always present. Group leader assignments can and do change (for instance, if the current RF group leader becomes inoperable or if RF group members experience major changes). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1057 RF Group Leader Radio Resource Management · Static Mode--In this mode, the user selects a Cisco WLC as an RF group leader manually. In this mode, the leader and the members are manually configured and are therefore fixed. If the members are unable to join the RF group, the reason is indicated. The leader tries to establish a connection with a member every 1 minute if the member has not joined in the previous attempt. The RF group leader analyzes real-time radio data collected by the system, calculates the power and channel assignments, and sends them to each of the Cisco WLCs in the RF group. The RRM algorithms ensure system-wide stability and restrain channel and power scheme changes to the appropriate local RF neighborhoods. In Cisco WLC software releases prior to 6.0, the dynamic channel assignment (DCA) search algorithm attempts to find a good channel plan for the radios associated to Cisco WLCs in the RF group, but it does not adopt a new channel plan unless it is considerably better than the current plan. The channel metric of the worst radio in both plans determines which plan is adopted. Using the worst-performing radio as the single criterion for adopting a new channel plan can result in pinning or cascading problems. Pinning occurs when the algorithm could find a better channel plan for some of the radios in an RF group but is prevented from pursuing such a channel plan change because the worst radio in the network does not have any better channel options. The worst radio in the RF group could potentially prevent other radios in the group from seeking better channel plans. The larger the network, the more likely pinning becomes. Cascading occurs when one radio's channel change results in successive channel changes to optimize the remaining radios in the RF neighborhood. Optimizing these radios could lead to their neighbors and their neighbors' neighbors having a suboptimal channel plan and triggering their channel optimization. This effect could propagate across multiple floors or even multiple buildings, if all the access point radios belong to the same RF group. This change results in considerable client confusion and network instability. The main cause of both pinning and cascading is the way in which the search for a new channel plan is performed and that any potential channel plan changes are controlled by the RF circumstances of a single radio. In Cisco WLC software release 6.0, the DCA algorithm has been redesigned to prevent both pinning and cascading. The following changes have been implemented: · Multiple local searches--The DCA search algorithm performs multiple local searches initiated by different radios within the same DCA run rather than performing a single global search driven by a single radio. This change addresses both pinning and cascading while maintaining the desired flexibility and adaptability of DCA and without jeopardizing stability. · Multiple channel plan change initiators (CPCIs)--Previously, the single worst radio was the sole initiator of a channel plan change. Now each radio within the RF group is evaluated and prioritized as a potential initiator. Intelligent randomization of the resulting list ensures that every radio is eventually evaluated, which eliminates the potential for pinning. · Limiting the propagation of channel plan changes (Localization)--For each CPCI radio, the DCA algorithm performs a local search for a better channel plan, but only the CPCI radio itself and its one-hop neighboring access points are actually allowed to change their current transmit channels. The impact of an access point triggering a channel plan change is felt only to within two RF hops from that access point, and the actual channel plan changes are confined to within a one-hop RF neighborhood. Because this limitation applies across all CPCI radios, cascading cannot occur. · Non-RSSI-based cumulative cost metric--A cumulative cost metric measures how well an entire region, neighborhood, or network performs with respect to a given channel plan. The individual cost metrics of all access points in that area are considered in order to provide an overall understanding of the channel plan's quality. These metrics ensure that the improvement or deterioration of each single radio is factored into any channel plan change. The objective is to prevent channel plan changes in which a single radio improves but at the expense of multiple other radios experiencing a considerable performance decline. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1058 Radio Resource Management RF Group Name The RRM algorithms run at a specified updated interval, which is 600 seconds by default. Between update intervals, the RF group leader sends keepalive messages to each of the RF group members and collects real-time RF data. Note Several monitoring intervals are also available. See the Configuring RRM section for details. RF Group Name A Cisco WLC is configured with an RF group name, which is sent to all access points joined to the Cisco WLC and used by the access points as the shared secret for generating the hashed MIC in the neighbor messages. To create an RF group, you configure all of the Cisco WLCs to be included in the group with the same RF group name. If there is any possibility that an access point joined to a Cisco WLC may hear RF transmissions from an access point on a different Cisco WLC, you should configure the Cisco WLCs with the same RF group name. If RF transmissions between access points can be heard, then system-wide RRM is recommended to avoid 802.11 interference and contention as much as possible. Mobility Controller An MC can either be a group leader or a group member. One of the MCs can act as a RF group leader based on RF grouping and RF group election with other MCs. The order of priority to elect the RF leader is based on the maximum number of APs the controller or switch can support. The highest priority being 1 and the least being 5. 1. WiSM 2 Controllers 2. Cisco WLC 5700 Series Controllers 3. WiSM 1 Controllers 4. Catalyst 3850 Series Switches 5. Catalyst 3650 Series Switches When one of the MCs becomes the RRM group leader, the remaining MCs become RRM group members. RRM group members send their RF information to the Group Leader. The group leader determines a channel and Tx power plan for the network and passes the information back to the RF group members. The MCs push the power plan to MA for the radios that belong to MA. These channel and power plans are ultimately pushed down to individual radios. Note MC has MA functionality within it. Mobility Agent The MA communicates with the MC. The MC includes MAC or IP address of the switch/controller while communicating with the MA. The MA provides the following information when polled by the MC: · Interference or noise data. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1059 Information About Rogue Access Point Detection in RF Groups Radio Resource Management · Neighbor data. · Radio capabilities (supported channels, power levels). · Radio configuration (power, channel, channel width). · Radar data. The MC exchanges the following information with the switch/controller (MA). The message includes: · Configurations (channel/power/channel width) for individual radios. · Polling requests for current configurations and RF measurements for individual radios · Group Leader Update In turn, the MA communicates the following messages with the MC: · RF measurements from radios (e.g. load, noise and neighbor information) · RF capabilities and configurations of individual radios The MA sets channel, power, and channel width on the radios when directed by the MC. The DFS, coverage hole detection/mitigation, static channel/power configurations are performed by the MA. Information About Rogue Access Point Detection in RF Groups After you have created an RF group of Cisco WLCs, you need to configure the access points connected to the Cisco WLCs to detect rogue access points. The access points will then select the beacon/probe-response frames in neighboring access point messages to see if they contain an authentication information element (IE) that matches that of the RF group. If the select is successful, the frames are authenticated. Otherwise, the authorized access point reports the neighboring access point as a rogue, records its BSSID in a rogue table, and sends the table to the Cisco WLC. Transmit Power Control The switch dynamically controls access point transmit power based on real-time wireless LAN conditions. The Transmit Power Control (TPC) algorithm both increases and decreases an access point's power in response to changes in the RF environment. In most instances, TPC seeks to lower an access point's power to reduce interference, but in the case of a sudden change in the RF coverage--for example, if an access point fails or becomes disabled--TPC can also increase power on surrounding access points. This feature is different from coverage hole detection, which is primarily concerned with clients. TPC provides enough RF power to achieve desired coverage levels while avoiding channel interference between access points. Overriding the TPC Algorithm with Minimum and Maximum Transmit Power Settings The TPC algorithm balances RF power in many diverse RF environments. However, it is possible that automatic power control will not be able to resolve some scenarios in which an adequate RF design was not possible to implement due to architectural restrictions or site restrictions--for example, when all access points must be mounted in a central hallway, placing the access points close together, but requiring coverage out to the edge of the building. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1060 Radio Resource Management Dynamic Channel Assignment In these scenarios, you can configure maximum and minimum transmit power limits to override TPC recommendations. The maximum and minimum TPC power settings apply to all access points through RF profiles in a RF network. To set the Maximum Power Level Assignment and Minimum Power Level Assignment, enter the maximum and minimum transmit power used by RRM in the text boxes in the Tx Power Control page. The range for these parameters is -10 to 30 dBm. The minimum value cannot be greater than the maximum value; the maximum value cannot be less than the minimum value. If you configure a maximum transmit power, RRM does not allow any access point attached to the switch to exceed this transmit power level (whether the power is set by RRM TPC or by coverage hole detection). For example, if you configure a maximum transmit power of 11 dBm, then no access point would transmit above 11 dBm, unless the access point is configured manually. Dynamic Channel Assignment Two adjacent access points on the same channel can cause either signal contention or signal collision. In a collision, data is not received by the access point. This functionality can become a problem, for example, when someone reading e-mail in a café affects the performance of the access point in a neighboring business. Even though these are completely separate networks, someone sending traffic to the café on channel 1 can disrupt communication in an enterprise using the same channel. Switches can dynamically allocate access point channel assignments to avoid conflict and to increase capacity and performance. Channels are "reused" to avoid wasting scarce RF resources. In other words, channel 1 is allocated to a different access point far from the café, which is more effective than not using channel 1 altogether. The switch's Dynamic Channel Assignment (DCA) capabilities are also useful in minimizing adjacent channel interference between access points. For example, two overlapping channels in the 802.11b/g band, such as 1 and 2, cannot both simultaneously use 11/54 Mbps. By effectively reassigning channels, the switch keeps adjacent channels separated. Note We recommend that you use only non-overlapping channels (1, 6, 11, and so on). The switch examines a variety of real-time RF characteristics to efficiently handle channel assignments as follows: · Access point received energy--The received signal strength measured between each access point and its nearby neighboring access points. Channels are optimized for the highest network capacity. · Noise--Noise can limit signal quality at the client and access point. An increase in noise reduces the effective cell size and degrades user experience. By optimizing channels to avoid noise sources, the switch can optimize coverage while maintaining system capacity. If a channel is unusable due to excessive noise, that channel can be avoided. · 802.11 Interference--Interference is any 802.11 traffic that is not part of your wireless LAN, including rogue access points and neighboring wireless networks. Lightweight access points constantly scan all channels looking for sources of interference. If the amount of 802.11 interference exceeds a predefined configurable threshold (the default is 10 percent), the access point sends an alert to the switch. Using the RRM algorithms, the switch may then dynamically rearrange channel assignments to increase system performance in the presence of the interference. Such an adjustment could result in adjacent lightweight access points being on the same channel, but this setup is preferable to having the access points remain on a channel that is unusable due to an interfering foreign access point. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1061 Coverage Hole Detection and Correction Radio Resource Management In addition, if other wireless networks are present, the switch shifts the usage of channels to complement the other networks. For example, if one network is on channel 6, an adjacent wireless LAN is assigned to channel 1 or 11. This arrangement increases the capacity of the network by limiting the sharing of frequencies. If a channel has virtually no capacity remaining, the switch may choose to avoid this channel. In very dense deployments in which all nonoverlapping channels are occupied, the switch does its best, but you must consider RF density when setting expectations. · Load and utilization--When utilization monitoring is enabled, capacity calculations can consider that some access points are deployed in ways that carry more traffic than other access points (for example, a lobby versus an engineering area). The switch can then assign channels to improve the access point with the worst performance reported. The load is taken into account when changing the channel structure to minimize the impact on clients currently in the wireless LAN. This metric keeps track of every access point's transmitted and received packet counts to determine how busy the access points are. New clients avoid an overloaded access point and associate to a new access point. This parameter is disabled by default. The switch combines this RF characteristic information with RRM algorithms to make system-wide decisions. Conflicting demands are resolved using soft-decision metrics that guarantee the best choice for minimizing network interference. The end result is optimal channel configuration in a three-dimensional space, where access points on the floor above and below play a major factor in an overall wireless LAN configuration. Note Radios using 40-MHz channels in the 2.4-GHz band or or 80MHz channels are not supported by DCA. The RRM startup mode is invoked in the following conditions: · In a single-switch environment, the RRM startup mode is invoked after the switch is rebooted. · In a multiple-switch environment, the RRM startup mode is invoked after an RF Group leader is elected. You can trigger RRM startup mode from CLI. RRM startup mode runs for 100 minutes (10 iterations at 10-minute intervals). The duration of the RRM startup mode is independent of the DCA interval, sensitivity, and network size. The startup mode consists of 10 DCA runs with high sensitivity (making channel changes easy and sensitive to the environment) to converge to a steady state channel plan. After the startup mode is finished, DCA continues to run at the specified interval and sensitivity. Coverage Hole Detection and Correction The RRM coverage hole detection algorithm can detect areas of radio coverage in a wireless LAN that are below the level needed for robust radio performance. This feature can alert you to the need for an additional (or relocated) lightweight access point. If clients on a lightweight access point are detected at threshold levels (RSSI, failed client count, percentage of failed packets, and number of failed packets) lower than those specified in the RRM configuration, the access point sends a "coverage hole" alert to the switch. The alert indicates the existence of an area where clients are continually experiencing poor signal coverage, without having a viable access point to which to roam. The switch discriminates between coverage holes that can and cannot be corrected. For coverage holes that can be corrected, the switch mitigates the coverage hole by increasing the transmit power level for that specific access point. The switch does not mitigate coverage holes caused by clients that are unable to increase Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1062 Radio Resource Management How to Configure RRM their transmit power or are statically set to a power level because increasing their downstream transmit power might increase interference in the network. How to Configure RRM Configuring Advanced RRM CCX Parameters (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm ccx location-measurement interval 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz rrm ccx location-measurement Configures the interval for 802.11 CCX client location interval measurements. The range is from 10 to 32400 seconds. Example: Step 3 Switch(config)# ap dot11 24ghz rrm ccx location-measurement 15 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Neighbor Discovery Type (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm ndp-type {protected | transparent} 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1063 Configuring RRM Profile Thresholds, Monitoring Channels, and Monitoring Intervals (GUI) Radio Resource Management DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 24ghz | 5ghz rrm ndp-type {protected | transparent} Example: Step 3 Switch(config)#ap dot11 24ghz rrm ndp-type protected Switch(config)#ap dot11 24ghz rrm ndp-type transparent end Example: Switch(config)# end Purpose Enters global configuration mode. Configures the neighbor discovery type. By default, the mode is set to "transparent". · protected--Sets the neighbor discover type to protected. Packets are encrypted. · transparent--Sets the neighbor discover type to transparent. Packets are sent as is. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring RRM Profile Thresholds, Monitoring Channels, and Monitoring Intervals (GUI) Step 1 Step 2 Step 3 Choose Configuration > Wireless > 802.11a/n/ac > RRM > General or Configuration > Wireless > 802.11b/g/n > RRM > General to open RRM General page. Configure profile thresholds used for alarming as follows: Note The profile thresholds have no bearing on the functionality of the RRM algorithms. Switches send an SNMP trap (or an alert) to the Cisco Prime Infrastructure or another trap receiver when individual APs values set for these threshold parameters are exceeded. a) In the Interference text box, enter the percentage of interference (802.11 traffic from sources outside of your wireless network) on a single access point. The valid range is 0 to 100%, and the default value is 10%. b) In the Clients text box, enter the number of clients on a single access point. The valid range is 1 to 75, and the default value is 12. c) In the Noise text box, enter the level of noise (non-802.11 traffic) on a single access point. The valid range is 127 to 0 dBm, and the default value is 70 dBm. d) In the Utilization text box, enter the percentage of RF bandwidth being used by a single access point. The valid range is 0 to 100%, and the default value is 80%. e) In the Throughput text box, enter the level of Throughput being used by a single access point. The valid range is 1000 to 10000000, and the default value is 1000000. From the Channel List drop-down list, choose one of the following options to specify the set of channels that the access point uses for RRM scanning: · All Channels--RRM channel scanning occurs on all channels supported by the selected radio, which includes channels not allowed in the country of operation. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1064 Radio Resource Management Configuring RF Groups Step 4 · Country Channels--RRM channel scanning occurs only on the data channels in the country of operation. This is the default value. · DCA Channels--RRM channel scanning occurs only on the channel set used by the DCA algorithm, which by default includes all of the non-overlapping channels allowed in the country of operation. However, you can specify the channel set to be used by DCA if desired. To do so, follow instructions in the Dynamic Channel Assignment. Configure monitor intervals as follows: a. In the Channel Scan Interval text box, enter (in seconds) the sum of the time between scans for each channel within a radio band. The entire scanning process takes 50 ms per channel, per radio and runs at the interval configured here. The time spent listening on each channel is determined by the non-configurable 50-ms scan time and the number of channels to be scanned. For example, in the U.S. all 11 802.11b/g channels are scanned for 50 ms each within the default 180-second interval. So every 16 seconds, 50 ms is spent listening on each scanned channel (180/11 = ~16 seconds). The Channel Scan Interval parameter determines the interval at which the scanning occurs. The valid range is 60 to 3600 seconds, and the default value for 802.11a/n/ac and 802.11b/g/n radios is 180 seconds. b. In the Neighbor Packet Frequency text box, enter (in seconds) how frequently neighbor packets (messages) are sent, which eventually builds the neighbor list. The valid range is 60 to 3600 seconds, and the default value is 60 seconds. Note If the access point radio does not receive a neighbor packet from an existing neighbor within 60 minutes, the Cisco WLC deletes that neighbor from the neighbor list. Step 5 Step 6 Click Apply. Click Save Configuration. Note Click Set to Factory Default if you want to return all of the Cisco WLC's RRM parameters to their factory-default values. Configuring RF Groups This section describes how to configure RF groups through either the GUI or the CLI. Note The RF group name is generally set at deployment time through the Startup Wizard. However, you can change it as necessary. Note When the multiple-country feature is being used, all Cisco WLCs intended to join the same RF group must be configured with the same set of countries, configured in the same order. Note You can also configure RF groups using the Cisco Prime Infrastructure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1065 Configuring the RF Group Mode (GUI) Radio Resource Management Configuring the RF Group Mode (GUI) Step 1 Step 2 Choose Configuration > Wireless > 802.11a/n/ac > RRM > RF Grouping or or Configuration > Wireless > 802.11b/g/n > RRM > RF Grouping to open the RF Grouping page. From the Group Mode drop-down list, choose the mode that you want to configure for this Cisco WLC. You can configure RF grouping in the following modes: · auto--Sets the RF group selection to automatic update mode. Note A configured static leader cannot become a member of another RF group until its mode is set to "auto". · leader--Sets the RF group selection to static mode, and sets this Cisco WLC as the group leader. · off--Sets the RF group selection off. Every Cisco WLC optimizes its own access point parameters. Note A Cisco WLC with a lower priority cannot assume the role of a group leader if a Cisco WLC with a higher priority is available. Here, priority is related to the processing power of the Cisco WLC. Note We recommend that Cisco WLCs participate in automatic RF grouping. You can override RRM settings without disabling automatic RF group participation. Step 3 Step 4 Click Apply to save the configuration and click Restart to restart the RRM RF Grouping algorithm. If you configured RF Grouping mode for this Cisco WLC as a static leader, you can add group members from the Group Members section as follows: a. In the switch Name text box, enter the Cisco WLC that you want to add as a member to this group. b. In the IP Address text box, enter the IP address of the Cisco WLC. c. Click Add to add the member to this group. Note If the member has not joined the static leader, the reason of the failure is shown in parentheses. Step 5 Step 6 Click Apply. Click Save Configuration. Configuring RF Group Selection Mode (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm group-mode{auto | leader | off} 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1066 Radio Resource Management Configuring an RF Group Name (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz rrm group-mode{auto | leader | Configures RF group selection mode for 802.11 bands. off} · auto--Sets the 802.11 RF group selection to automatic Example: update mode. · leader--Sets the 802.11 RF group selection to leader Switch(config)#ap dot11 24ghz rrm group-mode leader mode. · off--Disables the 802.11 RF group selection. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring an RF Group Name (CLI) SUMMARY STEPS 1. configure terminal 2. wireless rf-network name 3. end 4. show network profile profile_number DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wireless rf-network name Example: Switch (config)# wireless rf-network test1 Step 3 Step 4 end Example: Switch(config)# end show network profile profile_number Purpose Enters global configuration mode. Creates an RF group. The group name should be ASCII String up to 19 characters and is case sensitive. Note Repeat this procedure for each controller that you want to include in the RF group. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Displays the RF group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1067 Configuring an RF Group Name (GUI) Radio Resource Management Command or Action Purpose Note You can view the network profile number from 1 to 4294967295. Configuring an RF Group Name (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Controller > General to open the General page. Enter a name for the RF group in the RF Group Name text box. The name can contain up to 19 ASCII characters and is case sensitive. Click Apply to commit your changes. Click Save Configuration to save your changes. Repeat this procedure for each controller that you want to include in the RF group. Configuring Members in a 802.11 Static RF Group (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm group-member group_name ip_addr 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz rrm group-member group_name Configures members in a 802.11 static RF group. The group ip_addr mode should be set as leader for the group member to be Example: active. Step 3 Switch(config)#ap dot11 24ghz rrm group-member Grpmem01 10.1.1.1 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1068 Radio Resource Management Configuring Transmit Power Control Configuring Transmit Power Control Configuring the Tx-Power Control Threshold (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm tpc-threshold threshold_value 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz rrm tpc-threshold threshold_value Configures the Tx-power control threshold used by RRM Example: for auto power assignment. The range is from 80 to 50. Step 3 Switch(config)#ap dot11 24ghz rrm tpc-threshold -60 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the Tx-Power Level (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm txpower{trans_power_level | auto | max | min | once} 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz rrm txpower{trans_power_level | Configures the 802.11 tx-power level auto | max | min | once} Example: · trans_power_level--Sets the transmit power level. · auto--Enables auto-RF. · max--Configures the maximum auto-RF tx-power. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1069 Configuring Transmit Power Control (GUI) Radio Resource Management Step 3 Command or Action Switch(config)#ap dot11 24ghz rrm txpower auto end Example: Switch(config)# end Purpose · min--Configures the minimum auto-RF tx-power. · once--Enables one-time auto-RF. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Transmit Power Control (GUI) Step 1 Step 2 Step 3 Choose Configuration > Wireless > 802.11a/n/ac > RRM > TPC or Configuration > Wireless > 802.11b/g/n > RRM > TPC to open RRM Tx Power Control (TPC) page. Choose the Transmit Power Control. Coverage Optimal Mode (TPCv1)-- Offers strong signal coverage and stability. In this mode, power can be kept low to gain extra capacity and reduce interference. Choose one of the following options from the Power Level Assignment Method list to specify the Cisco WLC's dynamic power assignment mode: · Automatic--Causes the Cisco WLC to periodically evaluate and, if necessary, update the transmit power for all joined access points. This is the default value. · On Demand--Causes the Cisco WLC to periodically evaluate the transmit power for all joined access points. However, the Cisco WLC updates the power, if necessary, only when you click Apply after choosing On Demand. Note The Cisco WLC does not evaluate and update the transmit power immediately when you click Apply after choosing On Demand. It waits for the next 600-second interval. This value is not configurable. · Fixed--Prevents the Cisco WLC from evaluating and, if necessary, updating the transmit power for joined access points. The power level is set to the fixed value chosen from the drop-down list. The corresponding option for Fixed when you try to configure from CLI is once. Note The transmit power level is assigned an integer value instead of a value in mW or dBm. The integer corresponds to a power level that varies depending on the regulatory domain, channel, and antennas in which the access points are deployed. Note For optimal performance, we recommend that you use the Automatic setting. Step 4 Step 5 Enter the maximum and minimum power level assignment values in the Maximum Power Level Assignment and Minimum Power Level Assignment text boxes. The range for the Maximum Power Level Assignment is 10 to 30 dBm. The range for the Minimum Power Level Assignment is 10 to 30 dBm. In the Power Threshold text box, enter the cutoff signal level used by RRM when determining whether to reduce an access point's power. The default value for this parameter is 70 dBm for TPCv1, but can be changed when access points are transmitting at higher (or lower) than desired power levels. The range for this parameter is 80 to 50 dBm. Increasing this value (between 65 and 50 dBm) causes the access points to operate at a higher transmit power. Decreasing the value has the opposite effect. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1070 Radio Resource Management Configuring 802.11 RRM Parameters Step 6 Step 7 In applications with a dense population of access points, it may be useful to decrease the threshold to 80 or 75 dBm to reduce the number of BSSIDs (access points) and beacons seen by the wireless clients. Some wireless clients might have difficulty processing a large number of BSSIDs or a high beacon rate and might exhibit problematic behavior with the default threshold. This page also shows the following nonconfigurable transmit power level parameter settings: · Power Neighbor Count--The minimum number of neighbors an access point must have for the transmit power control algorithm to run. · Power Assignment Leader--The MAC address of the RF group leader, which is responsible for power level assignment. · Last Power Level Assignment--The last time RRM evaluated the current transmit power level assignments. Click Apply. Click Save Configuration. Configuring 802.11 RRM Parameters Configuring Advanced 802.11 Channel Assignment Parameters (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event sensitivity {high | low | medium} 3. ap dot11 {24ghz | 5ghz} rrm channel dca {channel number | anchor-time | global {auto | once} | interval | min-metric | sensitivity {high | low | medium}} 4. ap dot11 5ghz rrm channel dca chan-width {20 | 40 | 80} 5. ap dot11 {24ghz | 5ghz} rrm channel device 6. ap dot11 {24ghz | 5ghz} rrm channel foreign 7. ap dot11 {24ghz | 5ghz} rrm channel load 8. ap dot11 {24ghz | 5ghz} rrm channel noise 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 {24ghz | 5ghz} rrm channel cleanair-event sensitivity {high | low | medium} Example: Purpose Enters global configuration mode. Configures CleanAir event-driven RRM parameters. · HighSpecifies the most sensitivity to non-Wi-Fi interference as indicated by the air quality (AQ) value. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1071 Configuring Advanced 802.11 Channel Assignment Parameters (CLI) Radio Resource Management Step 3 Command or Action Switch(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high Purpose · LowSpecifies the least sensitivity to non-Wi-Fi interference as indicated by the AQ value. · MediumSpecifies medium sensitivity to non-Wi-Fi interference as indicated by the AQ value. ap dot11 {24ghz | 5ghz} rrm channel dca {channel number | anchor-time | global {auto | once} | interval | min-metric | sensitivity {high | low | medium}} Example: Configures Dynamic Channel Assignment (DCA) algorithm parameters for the 802.11 band. · <1-14>Enter a channel number to be added to the DCA list. Switch(config)#ap dot11 24ghz rrm channel dca interval 2 · anchor-timeConfigures the anchor time for the DCA. The range is between 0 and 23 hours. · globalConfigures the DCA mode for all 802.11 Cisco APs. · autoEnables auto-RF. · onceEnables auto-RF only once. · intervalConfigures the DCA interval value. The values are 1, 2, 3, 4, 6, 8, 12 and 24 hours and the default value 0 denotes 10 minutes. · min-metricConfigures the DCA minimum RSSI energy metric. The range is between -100 and -60. · sensitivityConfigures the DCA sensitivity level to changes in the environment. · highSpecifies the most sensitivity. · lowSpecifies the least sensitivity. · mediumSpecifies medium sensitivity. Step 4 Step 5 Step 6 ap dot11 5ghz rrm channel dca chan-width {20 | 40 | 80} Configures the DCA channel width for all 802.11 radios in the 5-GHz band. Sets the channel width to 20 MHz, 40 MHz, or 80 MHz, ; 20 MHz is the default value. ap dot11 {24ghz | 5ghz} rrm channel device Example: Configures the persistent non-Wi-Fi device avoidance in the 802.11 channel assignment. Switch(config)#ap dot11 24ghz rrm channel device ap dot11 {24ghz | 5ghz} rrm channel foreign Example: Configures the foreign AP 802.11 interference avoidance in the channel assignment. Switch(config)#ap dot11 24ghz rrm channel foreign Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1072 Radio Resource Management Configuring Dynamic Channel Assignment (GUI) Step 7 Step 8 Step 9 Command or Action ap dot11 {24ghz | 5ghz} rrm channel load Example: Purpose Configures the Cisco AP 802.11 load avoidance in the channel assignment. Switch(config)#ap dot11 24ghz rrm channel load ap dot11 {24ghz | 5ghz} rrm channel noise Example: Configures the 802.11 noise avoidance in the channel assignment. Switch(config)#ap dot11 24ghz rrm channel noise end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Dynamic Channel Assignment (GUI) You can specify the channels that the Dynamic Channel Assignment (DCA) algorithm considers when selecting the channels to be used for RRM scanning by using the Cisco WLC GUI. Note This functionality is helpful when you know that the clients do not support certain channels because they are legacy devices or they have certain regulatory restrictions. Step 1 Step 2 Step 3 Disable the 802.11a/n/ac or 802.11b/g/n network as follows: a) Choose Configuration > Wireless > 802.11a/n/ac > Network or Configuration > Wireless > 802.11b/g/n > Network to open the Global Parameters page. b) Unselect the 802.11a/n/ac (or 802.11b/g/n) Network Status check box. c) Click Apply. Choose Configuration > Wireless > 802.11a/n/ac > RRM > DCA or Configuration > Wireless > 802.11b/g/n > RRM > DCA to open the Dynamic Channel Assignment (DCA) page. Choose one of the following options from the Channel Assignment Method drop-down list to specify the Cisco WLC's DCA mode: · Automatic--Causes the Cisco WLC to periodically evaluate and, if necessary, update the channel assignment for all joined access points. This is the default value. · Freeze--Causes the Cisco WLC to evaluate and update the channel assignment for all joined access points, if necessary, only when you click Apply after selecting the Freeze option. Note The Cisco WLC does not evaluate and update the channel assignment immediately when you click Apply after selecting the Freeze option. It waits for the next interval to elapse. · OFF--Turns off DCA and sets all access point radios to the first channel of the band. If you choose this option, you must manually assign channels on all radios. Note For optimal performance, we recommend that you use the Automatic setting. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1073 Configuring Dynamic Channel Assignment (GUI) Radio Resource Management Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 From the Interval drop-down list, choose one of the following options to specify how often the DCA algorithm is allowed to run: 10 minutes, 1 hour, 2 hours, 3 hours, 4 hours, 6 hours, 8 hours, 12 hours, or 24 hours. The default value is 10 minutes. From the AnchorTime drop-down list, choose a number to specify the time of day when the DCA algorithm is to start. The options are numbers between 0 and 23 (inclusive) representing the hour of the day from 12:00 a.m. to 11:00 p.m. From the DCA Channel Sensitivity drop-down list, choose one of the following options to specify how sensitive the DCA algorithm is to environmental changes such as signal, load, noise, and interference when determining whether to change channels: · Low--The DCA algorithm is not particularly sensitive to environmental changes. · Medium--The DCA algorithm is moderately sensitive to environmental changes. · High--The DCA algorithm is highly sensitive to environmental changes. The default value is Medium. The DCA sensitivity thresholds vary by radio band, as noted in the following table: Table 90: DCA Sensitivity Thresholds Option High Medium Low 2.4-GHz DCA Sensitivity Threshold 5 dB 10 dB 20 dB 5-GHz DCA Sensitivity Threshold 5 dB 15 dB 20 dB This page also shows the following nonconfigurable channel parameter settings: · Channel Assignment Leader--The MAC address of the RF group leader, which is responsible for channel assignment. In the DCA Channel List area, the DCA Channels text box shows the channels that are currently selected. To choose a channel, select its check box in the Select column. To exclude a channel, unselect its check box. The ranges are as follows: · 802.11a--36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 132, 136, 140, 149, 153, 157, 161, 165 (depending on countries). · 802.11b/g--1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14 (depending on countries). The defaults are as follows: · 802.11a--36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 132, 136, 140, 149, 153, 157, 161 · 802.11b/g--1, 6, 11 Click Apply. Reenable the 802.11 networks as follows: a. Choose Configuration > Wireless > 802.11a/n/ac > Network or Configuration > Wireless > 802.11b/g/n > Network to open the Global Parameters page. b. Select the 802.11a/n/ac (or 802.11b/g/n) Network Status check box. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1074 Radio Resource Management Configuring 802.11 Coverage Hole Detection (CLI) Step 11 c. Click Apply. Click Save Configuration. Configuring 802.11 Coverage Hole Detection (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm coverage data{fail-percentage | packet-count | rssi-threshold} 3. ap dot11 24ghz | 5ghz rrm coverage exception global exception level 4. ap dot11 24ghz | 5ghz rrm coverage level global cli_min exception level 5. ap dot11 24ghz | 5ghz rrm coverage voice{fail-percentage | packet-count | rssi-threshold} 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz rrm coverage data{fail-percentage Configures the 802.11 coverage hole detection for data | packet-count | rssi-threshold} packets. Example: Switch(config)#ap dot11 24ghz rrm coverage data fail-percentage 60 · fail-percentage--Configures the 802.11 coverage failure-rate threshold for uplink data packets as a percentage that ranges from 1 to 100%. · packet-count--Configures the 802.11 coverage minimum failure count threshold for uplink data packets that ranges from 1 to 255. · rssi-threshold--Configures the 802.11 minimum receive coverage level for data packets that range from 90 to 60 dBm. Step 3 Step 4 ap dot11 24ghz | 5ghz rrm coverage exception global exception level Example: Configures the 802.11 Cisco AP coverage exception level as a percentage that ranges from 0 to 100%. Switch(config)#ap dot11 24ghz rrm coverage exception global 50 ap dot11 24ghz | 5ghz rrm coverage level global cli_min Configures the 802.11 Cisco AP client minimum exception exception level level that ranges from 1 to 75 clients. Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1075 Configuring Coverage Hole Detection (GUI) Radio Resource Management Step 5 Step 6 Command or Action Purpose Switch(config)#ap dot11 24ghz rrm coverage level global 10 ap dot11 24ghz | 5ghz rrm coverage Configures the 802.11 coverage hole detection for voice voice{fail-percentage | packet-count | rssi-threshold} packets. Example: Switch(config)#ap dot11 24ghz rrm coverage voice packet-count 10 · fail-percentage--Configures the 802.11 coverage failure-rate threshold for uplink voice packets as a percentage that ranges from 1 to 100%. · packet-count--Configures the 802.11 coverage minimum failure count threshold for uplink voice packets that ranges from 1 to 255. · rssi-threshold--Configures the 802.11 minimum receive coverage level for voice packets that range from 90 to 60 dBm. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Coverage Hole Detection (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Disable the 802.11 network as follows: a) Choose Configuration > Wireless > 802.11a/n/ac or Configuration > Wireless > 802.11b/g/n to open the 802.11a/n/ac (or 802.11b/g/n) Global Parameters page. b) Unselect the 802.11a/n/ac (or 802.11b/g/n) Network Status check box. c) Click Apply. Choose Configuration > Wireless > 802.11a/n/ac > RRM > Coverage Thresholds or Configuration > Wireless > 802.11b/g/n > RRM > Coverage Thresholds to open coverage page. Select the Enable Coverage Hole Detection check box to enable coverage hole detection, or unselect it to disable this feature. If you enable coverage hole detection, the Cisco WLC automatically determines, based on data received from the access points, if any access points have clients that are potentially located in areas with poor coverage. The default value is selected. In the Data RSSI text box, enter the minimum Receive Signal Strength Indication (RSSI) value for data packets received by the access point. The value that you enter is used to identify coverage holes (or areas of poor coverage) within your network. If the access point receives a packet in the data queue with an RSSI value below the value that you enter here, a potential coverage hole has been detected. The valid range is 90 to 60 dBm, and the default value is 80 dBm. The access point takes data RSSI measurements every 5 seconds and reports them to the Cisco WLC in 90-second intervals. In the Voice RSSI text box, enter the minimum Receive Signal Strength Indication (RSSI) value for voice packets received by the access point. The value that you enter is used to identify coverage holes within your network. If the access point receives a packet in the voice queue with an RSSI value below the value that you enter here, a potential coverage hole has been detected. The valid range is 90 to 60 dBm, and the default value is 80 dBm. The access point takes voice RSSI measurements every 5 seconds and reports them to the Cisco WLC in 90-second intervals. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1076 Radio Resource Management Configuring 802.11 Event Logging (CLI) Step 6 Step 7 Step 8 Step 9 Step 10 In the Min Failed Client Count per AP text box, enter the minimum number of clients on an access point with an RSSI value at or below the data or voice RSSI threshold. The valid range is 1 to 75, and the default value is 3. In the Coverage Exception Level per AP text box, enter the percentage of clients on an access point that are experiencing a low signal level but cannot roam to another access point. The valid range is 0 to 100%, and the default value is 25%. Note If both the number and percentage of failed packets exceed the values configured for Failed Packet Count and Failed Packet Percentage (configurable through the Cisco WLC CLI) for a 5-second period, the client is considered to be in a pre-alarm condition. The Cisco WLC uses this information to distinguish between real and false coverage holes. False positives are generally due to the poor roaming logic implemented on most clients. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the Min Failed Client Count per AP and Coverage Exception Level per AP text boxes over two 90-second periods (a total of 180 seconds). The Cisco WLC determines if the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point. Click Apply. Reenable the 802.11 network as follows: a) Choose Configuration > Wireless > 802.11a/n/ac > Network or Configuration > Wireless > 802.11b/g/n > Network to open the 802.11a (or 802.11b/g) Global Parameters page. b) Select the 802.11a/n/ac (or 802.11b/g/n) Network Status check box. c) Click Apply. Click Save Configuration. Configuring 802.11 Event Logging (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm logging{channel | coverage | foreign | load | noise | performance | txpower} 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz rrm logging{channel | coverage | Configures event-logging for various parameters. foreign | load | noise | performance | txpower} · channel--Configures the 802.11 channel change Example: logging mode. Switch(config)#ap dot11 24ghz rrm logging channel Switch(config)#ap dot11 24ghz rrm logging coverage Switch(config)#ap dot11 24ghz rrm logging foreign · coverage--Configures the 802.11 coverage profile logging mode. · foreign--Configures the 802.11 foreign interference profile logging mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1077 Configuring 802.11 Statistics Monitoring (CLI) Radio Resource Management Step 3 Command or Action Switch(config)#ap dot11 24ghz rrm logging load Purpose · load--Configures the 802.11 load profile logging mode. Switch(config)#ap dot11 24ghz rrm logging noise Switch(config)#ap dot11 24ghz rrm logging performance Switch(config)#ap dot11 24ghz rrm logging txpower · noise--Configures the 802.11 noise profile logging mode. · performance--Configures the 802.11 performance profile logging mode. · txpower--Configures the 802.11 transmit power change logging mode. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring 802.11 Statistics Monitoring (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm monitor channel-list{all | country | dca} 3. ap dot11 24ghz | 5ghz rrm monitor coverage interval 4. ap dot11 24ghz | 5ghz rrm monitor load interval 5. ap dot11 24ghz | 5ghz rrm monitor noise interval 6. ap dot11 24ghz | 5ghz rrm monitor signal interval 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 24ghz | 5ghz rrm monitor channel-list{all | country | dca} Example: Switch(config)#ap dot11 24ghz rrm monitor channel-list all Purpose Enters global configuration mode. Sets the 802.11 monitoring channel-list for parameters such as noise/interference/rogue. · all-- Monitors all channels. · country-- Monitor channels used in configured country code. · dca-- Monitor channels used by dynamic channel assignment. Step 3 ap dot11 24ghz | 5ghz rrm monitor coverage interval Example: Configures the 802.11 coverage measurement interval in seconds that ranges from 60 to 3600. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1078 Radio Resource Management Configuring the 802.11 Performance Profile (CLI) Step 4 Command or Action Purpose Switch(config)#ap dot11 24ghz rrm monitor coverage 600 ap dot11 24ghz | 5ghz rrm monitor load interval Example: Configures the 802.11 load measurement interval in seconds that ranges from 60 to 3600. Switch(config)#ap dot11 24ghz rrm monitor load 180 Step 5 Step 6 Step 7 ap dot11 24ghz | 5ghz rrm monitor noise interval Example: Configures the 802.11 noise measurement interval (channel scan interval) in seconds that ranges from 60 to 3600. Switch(config)#ap dot11 24ghz rrm monitor noise 360 ap dot11 24ghz | 5ghz rrm monitor signal interval Example: Configures the 802.11 signal measurement interval (neighbor packet frequency) in seconds that ranges from 60 to 3600. Switch(config)#ap dot11 24ghz rrm monitor signal 480 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the 802.11 Performance Profile (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz rrm profile clients cli_threshold_value 3. ap dot11 24ghz | 5ghz rrm profile foreign int_threshold_value 4. ap dot11 24ghz | 5ghz rrm profile noise for_noise_threshold_value 5. ap dot11 24ghz | 5ghz rrm profile throughput throughput_threshold_value 6. ap dot11 24ghz | 5ghz rrm profile utilization rf_util_threshold_value 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1079 Configuring Rogue Access Point Detection in RF Groups Radio Resource Management Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action ap dot11 24ghz | 5ghz rrm profile clients cli_threshold_value Example: Purpose Sets the threshold value for 802.11 Cisco AP clients that range between 1 and 75 clients. Switch(config)#ap dot11 24ghz rrm profile clients 20 ap dot11 24ghz | 5ghz rrm profile foreign int_threshold_value Example: Sets the threshold value for 802.11 foreign interference that ranges between 0 and 100%. Switch(config)#ap dot11 24ghz rrm profile foreign 50 ap dot11 24ghz | 5ghz rrm profile noise for_noise_threshold_value Example: Sets the threshold value for 802.11 foreign noise ranges between 127 and 0 dBm. Switch(config)#ap dot11 24ghz rrm profile noise -65 ap dot11 24ghz | 5ghz rrm profile throughput throughput_threshold_value Example: Sets the threshold value for 802.11 Cisco AP throughput that ranges between 1000 and 10000000 bytes per second. Switch(config)#ap dot11 24ghz rrm profile throughput 10000 ap dot11 24ghz | 5ghz rrm profile utilization rf_util_threshold_value Example: Sets the threshold value for 802.11 RF utilization that ranges between 0 to 100%. Switch(config)#ap dot11 24ghz rrm profile utilization 75 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Rogue Access Point Detection in RF Groups Configuring Rogue Access Point Detection in RF Groups (CLI) Before you begin Ensure that each Cisco WLC in the RF group has been configured with the same RF group name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1080 Radio Resource Management Configuring Rogue Access Point Detection in RF Groups (CLI) Note The name is used to verify the authentication IE in all beacon frames. If the Cisco WLCs have different names, false alarms will occur. SUMMARY STEPS 1. ap name Cisco_AP mode {local | monitor} 2. end 3. configure terminal 4. wireless wps ap-authentication 5. wireless wps ap-authentication threshold value DETAILED STEPS Step 1 Command or Action ap name Cisco_AP mode {local | monitor} Example: Switch# ap name ap1 mode local Purpose Configures a particular access point for local (normal) mode or monitor (listen-only) mode. Perform this step for every access point connected to the Cisco WLC. Step 2 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Step 3 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 4 wireless wps ap-authentication Enables rogue access point detection. Example: Switch (config)# wireless wps ap-authentication Step 5 wireless wps ap-authentication threshold value Example: Switch (config)# wireless wps ap-authentication threshold 50 Specifies when a rogue access point alarm is generated. An alarm occurs when the threshold value (which specifies the number of access point frames with an invalid authentication IE) is met or exceeded within the detection period. The valid threshold range is from 1 to 255, and the default threshold value is 1. To avoid false alarms, you may want to set the threshold to a higher value. Note Enable rogue access point detection and threshold value on every Cisco WLC in the RF group. Note If rogue access point detection is not enabled on every Cisco WLC in the RF group, the access points on the Cisco WLCs with this feature disabled are reported as rogues. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1081 Enabling Rogue Access Point Detection in RF Groups (GUI) Radio Resource Management Enabling Rogue Access Point Detection in RF Groups (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Make sure that each Cisco WLC in the RF group has been configured with the same RF group name. Note The name is used to verify the authentication IE in all beacon frames. If the Cisco WLCs have different names, false alarms will occur. Choose Configuration > Wireless > Access Points > All APs to open the All APs page. Click the name of an access point to open the All APs > Edit page. Choose either local or monitor from the AP Mode drop-down list and click Apply to commit your changes. Click Save Configuration to save your changes. Repeat Step 2 through Step 5 for every access point connected to the Cisco WLC. Choose Configuration > Security > Wireless Protection Policies > AP Authentication/MFP to open the AP Authentication Policy page. The name of the RF group to which this Cisco WLC belongs appears at the top of the page. Choose AP Authentication from the Protection Type drop-down list to enable rogue access point detection. Enter a number in the Alarm Trigger Threshold edit box to specify when a rogue access point alarm is generated. An alarm occurs when the threshold value (which specifies the number of access point frames with an invalid authentication IE) is met or exceeded within the detection period. Note The valid threshold range is from1 to 255, and the default threshold value is 1. To avoid false alarms, you may want to set the threshold to a higher value. Click Apply to commit your changes. Click Save Configuration to save your changes. Repeat this procedure on every Cisco WLC in the RF group. Note If rogue access point detection is not enabled on every Cisco WLC in the RF group, the access points on the Cisco WLCs with this feature disabled are reported as rogues. Monitoring RRM Parameters and RF Group Status Monitoring RRM Parameters Table 91: Commands for monitoring Radio Resource Management Commands show ap dot11 24ghz ccx Description Displays the 802.11b CCX information for all Cisco APs. show ap dot11 24ghz channel Displays the configuration and statistics of the 802.11b channel assignment. show ap dot11 24ghz coverage Displays the configuration and statistics of the 802.11b coverage. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1082 Radio Resource Management Monitoring RF Group Status (CLI) Commands show ap dot11 24ghz group Description Displays the configuration and statistics of the 802.11b grouping. show ap dot11 24ghz l2roam Displays 802.11b l2roam information. show ap dot11 24ghz logging Displays the configuration and statistics of the 802.11b event logging. show ap dot11 24ghz monitor Displays the configuration and statistics of the 802.11b monitoring. show ap dot11 24ghz profile Displays 802.11b profiling information for all Cisco APs. show ap dot11 24ghz receiver Displays the configuration and statistics of the 802.11b receiver. show ap dot11 24ghz summary Displays the configuration and statistics of the 802.11b Cisco APs. show ap dot11 24ghz txpower Displays the configuration and statistics of the 802.11b transmit power control. show ap dot11 5ghz ccx Displays 802.11a CCX information for all Cisco APs. show ap dot11 5ghz channel Displays the configuration and statistics of the 802.11a channel assignment. show ap dot11 5ghz coverage Displays the configuration and statistics of the 802.11a coverage. show ap dot11 5ghz group Displays the configuration and statistics of the 802.11a grouping. show ap dot11 5ghz l2roam Displays 802.11a l2roam information. show ap dot11 5ghz logging Displays the configuration and statistics of the 802.11a event logging. show ap dot11 5ghz monitor Displays the configuration and statistics of the 802.11a monitoring. show ap dot11 5ghz profile Displays 802.11a profiling information for all Cisco APs. show ap dot11 5ghz receiver Displays the configuration and statistics of the 802.11a receiver. show ap dot11 5ghz summary Displays the configuration and statistics of the 802.11a Cisco APs. show ap dot11 5ghz txpower Displays the configuration and statistics of the 802.11a transmit power control. Monitoring RF Group Status (CLI) This section describes the new commands for RF group status. The following commands can be used to monitor RF group status on the switch. Table 92: Monitoring Aggressive Load Balancing Command Command Purpose show ap dot11 5ghz group Displays the Cisco WLC name which is the RF group leader for the 802.11a RF network. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1083 Monitoring RF Group Status (GUI) Radio Resource Management show ap dot11 24ghz group Displays the Cisco WLC name which is the RF group leader for the 802.11b/g RF network. Monitoring RF Group Status (GUI) Step 1 Step 2 Choose Configuration > Wireless > 802.11a/n > or 802.11b/g/n > RRM > RF Grouping to open the RF Grouping Algorithm page. This page shows the details of the RF group, displaying the configurable parameter Group mode, the Group role of this Cisco WLC, the Group Update Interval and the Cisco WLC name and IP address of the Group Leader to this Cisco WLC. Note RF grouping mode can be set using the Group Mode drop-down list. Tip Once a Cisco WLC has joined as a static member and you want to change the grouping mode, we recommend that you remove the member from the configured static-leader and also make sure that a member Cisco WLC has not been configured to be a member on multiple static leaders. This is to avoid repeated join attempts from one or more RF static leaders. (Optional) Repeat this procedure for the network type that you did not select (802.11a/n or 802.11b/g/n). Examples: RF Group Configuration This example shows how to configure RF group name: Switch# configure terminal Switch(config)# wireless rf-network test1 Switch(config)# ap dot11 24ghz shutdown Switch(config)# end Switch # show network profile 5 This example shows how to configure rogue access point detection in RF groups: Switch# ap name ap1 mode local Switch# end Switch# configure terminal Switch(config)# wireless wps ap-authentication Switch(config)# wireless wps ap-authentication threshold 50 Switch(config)# end Information About ED-RRM Spontaneous interference is interference that appears suddenly on a network, perhaps jamming a channel or a range of channels completely. The Cisco CleanAir spectrum event-driven RRM feature allows you to set a threshold for air quality (AQ) that, if exceeded, triggers an immediate channel change for the affected access point. Most RF management systems can avoid interference, but this information takes time to propagate Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1084 Radio Resource Management Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI) through the system. Cisco CleanAir relies on AQ measurements to continuously evaluate the spectrum and can trigger a move within 30 seconds. For example, if an access point detects interference from a video camera, it can recover by changing channels within 30 seconds of the camera becoming active. Cisco CleanAir also identifies and locates the source of interference so that more permanent mitigation of the device can be performed at a later time. Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI) Step 1 Step 2 Step 3 Trigger spectrum event-driven radio resource management (RRM) to run when a Cisco CleanAir-enabled access point detects a significant level of interference by entering these commands: ap dot11 {24ghz | 5ghz} rrm channel cleanair-event --Configures CleanAir driven RRM parameters for the 802.11 Cisco lightweight access points. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event sensitivity {low | medium | high | custom}--Configures CleanAir driven RRM sensitivity for the 802.11 Cisco lightweight access points. Default selection is Medium. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event rogue-contribution--Enables rogue contribution. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event rogue-contributionduty-cycle thresholdvalue--Configures threshold value for rogue contribution. The valid range is from 1 to 99, with 80 as the default. Save your changes by entering this command: write memory See the CleanAir configuration for the 802.11a/n/ac or 802.11b/g/n network by entering this command: show ap dot11 {24ghz | 5ghz} cleanair config Information similar to the following appears: AdditionalClean Air Settings: CleanAir Event-driven RRM State.............. : Enabled CleanAir Driven RRM Sensitivity.............. : LOW CleanAir Event-driven RRM Rogue Option....... : Enabled CleanAir Event-driven RRM Rogue Duty Cycle... : 80 CleanAir Persistent Devices state............ : Disabled CleanAir Persistent Device Propagation....... : Disabled Configuring ED-RRM (GUI) Step 1 Step 2 Step 3 Choose Configure > Radio Configurations > 2.4 GHZ or 5 GHZ > RRM > DCA to open the ED-RRM page. Note Before enabling ED-RRM, you have to disable Network Status from Configure > Radio Configurations > 2.4 GHZ or 5 GHZ > Network > General page, and then re-enable the network after configuring ED-RRM. In the Event Driven RRM section, select the EDRRM check box to reveal ED-RRM parameters . From the Sensitivity Threshold drop-down, select the value. Options are: Low, Medium, or High. Default selection is Medium. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1085 Additional References for Radio Resource Management Radio Resource Management Step 4 Step 5 Step 6 Step 7 Select the Rogue Contribution check box to reveal Rogue Duty-Cycle parameters . Enter the Rogue Duty Cycle value in the text box. The valid range is from 1 to 99, with 80 as the default. Click Apply. Click Save Configuration. Additional References for Radio Resource Management Related Documents Related Topic Document Title RRM commands and their details RRM Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1086 Radio Resource Management Feature History and Information For Performing Radio Resource Management Configuration Feature History and Information For Performing Radio Resource Management Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1087 Feature History and Information For Performing Radio Resource Management Configuration Radio Resource Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1088 X I I PA R T Routing · Configuring MSDP, on page 1091 · Configuring IP Unicast Routing, on page 1111 5 9 C H A P T E R Configuring MSDP · Finding Feature Information, on page 1091 · Information About Configuring MSDP, on page 1091 · How to Configure MSDP, on page 1093 · Monitoring and Maintaining MSDP, on page 1108 · Configuration Examples for Configuring MSDP, on page 1109 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring MSDP This section describes how to configure the Multicast Source Discovery Protocol (MSDP on the switch. The MSDP connects multiple Protocol-Independent Multicast sparse-mode (PIM-SM) domains. MSDP is not fully supported in this software release because of a lack of support for Multicast Border Gateway Protocol (MBGP), which works closely with MSDP. However, it is possible to create default peers that MSDP can operate with if MBGP is not running. To use this feature, the active switch must be running the IP services feature set. Understanding MSDP MSDP allows multicast sources for a group to be known to all rendezvous points (RPs) in different domains. Each PIM-SM domain uses its own RPs and does not depend on RPs in other domains. An RP runs MSDP over the Transmission Control Protocol (TCP) to discover multicast sources in other domains. An RP in a PIM-SM domain has an MSDP peering relationship with MSDP-enabled devices in another domain. The peering relationship occurs over a TCP connection, primarily exchanging a list of sources sending to multicast groups. The TCP connections between RPs are achieved by the underlying routing system. The receiving RP uses the source lists to establish a source path. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1091 MSDP Operation Routing The purpose of this topology is to have domains discover multicast sources in other domains. If the multicast sources are of interest to a domain that has receivers, multicast data is delivered over the normal, source-tree building mechanism in PIM-SM. MSDP is also used to announce sources sending to a group. These announcements must originate at the domain's RP. MSDP depends heavily on the Border Gateway Protocol (BGP) or MBGP for interdomain operation. We recommend that you run MSDP in RPs in your domain that are RPs for sources sending to global groups to be announced to the Internet. MSDP Operation When a source sends its first multicast packet, the first-hop router (designated router or RP) directly connected to the source sends a PIM register message to the RP. The RP uses the register message to register the active source and to forward the multicast packet down the shared tree in the local domain. With MSDP configured, the RP also forwards a source-active (SA) message to all MSDP peers. The SA message identifies the source, the group the source is sending to, and the address of the RP or the originator ID (the IP address of the interface used as the RP address), if configured. Each MSDP peer receives and forwards the SA message away from the originating RP to achieve peer reverse-path flooding (RPF). The MSDP device examines the BGP or MBGP routing table to discover which peer is the next hop toward the originating RP of the SA message. Such a peer is called an RPF peer (reverse-path forwarding peer). The MSDP device forwards the message to all MSDP peers other than the RPF peer. For information on how to configure an MSDP peer when BGP and MBGP are not supported, see the Configuring a Default MSDP Peer, on page 1093. If the MSDP peer receives the same SA message from a non-RPF peer toward the originating RP, it drops the message. Otherwise, it forwards the message to all its MSDP peers. The RP for a domain receives the SA message from an MSDP peer. If the RP has any join requests for the group the SA message describes and if the (*,G) entry exists with a nonempty outgoing interface list, the domain is interested in the group, and the RP triggers an (S,G) join toward the source. After the (S,G) join reaches the source's DR, a branch of the source tree has been built from the source to the RP in the remote domain. Multicast traffic can now flow from the source across the source tree to the RP and then down the shared tree in the remote domain to the receiver. MSDP Benefits MSDP has these benefits: · It breaks up the shared multicast distribution tree. You can make the shared tree local to your domain. Your local members join the local tree, and join messages for the shared tree never need to leave your domain. · PIM sparse-mode domains can rely only on their own RPs, decreasing reliance on RPs in another domain. This increases security because you can prevent your sources from being known outside your domain. · Domains with only receivers can receive data without globally advertising group membership. · Global source multicast routing table state is not required, saving memory. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1092 Routing How to Configure MSDP How to Configure MSDP Default MSDP Configuration MSDP is not enabled, and no default MSDP peer exists. Configuring a Default MSDP Peer In this software release, because BGP and MBGP are not supported, you cannot configure an MSDP peer on the local switch by using the ip msdp peer global configuration command. Instead, you define a default MSDP peer (by using the ip msdp default-peer global configuration command) from which to accept all SA messages for the switch. The default MSDP peer must be a previously configured MSDP peer. Configure a default MSDP peer when the switch is not BGP- or MBGP-peering with an MSDP peer. If a single MSDP peer is configured, the switch always accepts all SA messages from that peer. This figure shows a network in which default MSDP peers might be used. A customer who owns Switch B is connected to the Internet through two Internet service providers (ISPs), one owning Router A and the other owning Router C. They are not running BGP or MBGP between them. To learn about sources in the ISP's domain or in other domains, Switch B at the customer site identifies Router A as its default MSDP peer. Switch B advertises SA messages to both Router A and Router C but accepts SA messages only from Router A or only from Router C. If Router A is first in the configuration file, it is used if it is running. If Router A is not running, only then does Switch B accept SA messages from Router C. This is the default behavior without a prefix list. If you specify a prefix list, the peer is a default peer only for the prefixes in the list. You can have multiple active default peers when you have a prefix list associated with each. When you do not have any prefix lists, you can configure multiple default peers, but only the first one is the active default peer as long as the router has connectivity to this peer and the peer is alive. If the first configured peer fails or the connectivity to this peer fails, the second configured peer becomes the active default, and so on. The ISP probably uses a prefix list to define which prefixes it accepts from the customer's router. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Router# configure terminal Step 2 ip msdp default-peer ip-address | name [prefix-list list] Example: Router(config)# ip msdp default-peer 10.1.1.1 prefix-list site-a Defines a default peer from which to accept all MSDP SA messages. · For ip-address | name, enter the IP address or Domain Name System (DNS) server name of the MSDP default peer. · (Optional) For prefix-list list, enter the list name that specifies the peer to be the default peer only for the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1093 Configuring a Default MSDP Peer Routing Step 3 Step 4 Command or Action Purpose listed prefixes. You can have multiple active default peers when you have a prefix list associated with each. When you enter multiple ip msdp default-peer commands with the prefix-list keyword, you use all the default peers at the same time for different RP prefixes. This syntax is typically used in a service provider cloud that connects stub site clouds. When you enter multiple ip msdp default-peer commands without the prefix-list keyword, a single active peer accepts all SA messages. If that peer fails, the next configured default peer accepts all SA messages. This syntax is typically used at a stub site. ip prefix-list name [description string] | seq number {permit | deny} network length (Optional) Creates a prefix list using the name specified in Step 2. Example: Router(config)# prefix-list site-a seq 3 permit 12 network length 128 · (Optional) For description string, enter a description of up to 80 characters to describe this prefix list. · For seq number, enter the sequence number of the entry. The range is 1 to 4294967294. · The deny keyword denies access to matching conditions. · The permit keyword permits access to matching conditions. · For network length, specify the network number and length (in bits) of the network mask that is permitted or denied. ip msdp description {peer-name | peer-address} text Example: Router(config)# ip msdp description peer-name site-b (Optional) Configures a description for the specified peer to make it easier to identify in a configuration or in show command output. By default, no description is associated with an MSDP peer. Step 5 end Example: Router(config)# end Returns to privileged EXEC mode. Step 6 show running-config Example: Router# show running-config Verifies your entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1094 Routing Caching Source-Active State Step 7 Command or Action copy running-config startup-config Example: Router# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Caching Source-Active State By default, the switch does not cache source/group pairs from received SA messages. When the switch forwards the MSDP SA information, it does not store it in memory. Therefore, if a member joins a group soon after a SA message is received by the local RP, that member needs to wait until the next SA message to hear about the source. This delay is known as join latency. If you want to sacrifice some memory in exchange for reducing the latency of the source information, you can configure the switch to cache SA messages. Beginning in privileged EXEC mode, follow these steps to enable the caching of source/group pairs. This procedure is optional. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 ip msdp cache-sa-state [list access-list-number] Example: Switch(config)# ip msdp cache-sa-state 100 Enables the caching of source/group pairs (create an SA state). Those pairs that pass the access list are cached. For list access-list-number, the range is 100 to 199. Note An alternative to this command is the ip msdp sa-reques global configuration command, which causes the switch to send an SA request message to the MSDP peer when a new member for a group becomes active. access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard Example: Switch(config)# access-list 100 permit ip 171.69.0.0 0.0.255.255 224.2.0.0 0.0.255.255 Creates an IP extended access list, repeating the command as many times as necessary. · For access-list-number, the range is 100 to 199. Enter the same number created in Step 2. · The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. · For protocol, enter ip as the protocol name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1095 Controlling Source Information that Your Switch Originates Routing Command or Action Step 4 end Example: Switch(config)# end Step 5 show running-config Example: Switch# show running-config Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose · For source, enter the number of the network or host from which the packet is being sent. · For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. · For destination, enter the number of the network or host to which the packet is being sent. · For destination-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the destination. Place ones in the bit positions that you want to ignore. Recall that the access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Controlling Source Information that Your Switch Originates You can control the multicast source information that originates with your switch: · Sources you advertise (based on your sources) · Receivers of source information (based on knowing the requestor) For more information, see the Redistributing Sources, on page 1096 and the Filtering Source-Active Request Messages, on page 1098. Redistributing Sources SA messages originate on RPs to which sources have registered. By default, any source that registers with an RP is advertised. The A flag is set in the RP when a source is registered, which means the source is advertised in an SA unless it is filtered. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1096 Routing Redistributing Sources Step 1 This task is optional. Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 ip msdp redistribute [list access-list-name] [asn aspath-access-list-number] [route-map map] Example: Switch(config)# ip msdp redistribute list 21 Configures which (S,G) entries from the multicast routing table are advertised in SA messages. By default, only sources within the local domain are advertised. · (Optional) list access-list-name-- Enters the name or number of an IP standard or extended access list. The range is 1 to 99 for standard access lists and 100 to 199 for extended lists. The access list controls which local sources are advertised and to which groups they send. · (Optional) asn aspath-access-list-number--Enters the IP standard or extended access list number in the range 1 to 199. This access list number must also be configured in the ip as-path access-list command. · (Optional) route-map map--Enters the IP standard or extended access list number in the range 1 to 199. This access list number must also be configured in the ip as-path access-list command. The switch advertises (S,G) pairs according to the access list or autonomous system path access list. Use one of the following: · access-listaccess-list-number {deny | permit} source [source-wildcard] · access-listaccess-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard Creates an IP standard access list, repeating the command as many times as necessary. or Creates an IP extended access list, repeating the command as many times as necessary. · access-list-number--Enters the same number created in Step 2. The range is 1 to 99 for standard access lists and 100 to 199 for extended lists. Example: Switch(config)# access list 21 permit 194.1.22.0 · deny--Denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. or · protocol--Enters ip as the protocol name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1097 Filtering Source-Active Request Messages Routing Step 4 Command or Action Purpose Switch(config)# access list 21 permit ip 194.1.22.0 · source--Enters the number of the network or host 1.1.1.1 194.3.44.0 1.1.1.1 from which the packet is being sent. · source-wildcard--Enters the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. · destination--Enters the number of the network or host to which the packet is being sent. · destination-wildcard--Enters the wildcard bits in dotted decimal notation to be applied to the destination. Place ones in the bit positions that you want to ignore. end Example: Recall that the access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode. Switch(config)# end Step 5 show running-config Example: Switch# show running-config Verifies your entries. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Filtering Source-Active Request Messages By default, only switches that are caching SA information can respond to SA requests. By default, such a switch honors all SA request messages from its MSDP peers and supplies the IP addresses of the active sources. However, you can configure the switch to ignore all SA requests from an MSDP peer. You can also honor only those SA request messages from a peer for groups described by a standard access list. If the groups in the access list pass, SA request messages are accepted. All other such messages from the peer for other groups are ignored. This task is optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1098 Routing Filtering Source-Active Request Messages Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 Use one of the following: · ip msdp filter-sa-request {ip-addressname} · ip msdp filter-sa-request {ip-addressname} list access-list-number Example: Switch(config)# ip msdp filter sa-request 171.69.2.2 Filters all SA request messages from the specified MSDP peer. or Filters SA request messages from the specified MSDP peer for groups that pass the standard access list. The access list describes a multicast group address. The range for the access-list-number is 1 to 99. Step 3 Step 4 access-list access-list-number {deny | permit} source [source-wildcard] Creates an IP standard access list, repeating the command as many times as necessary. Example: · For access-list-number, the range is 1 to 99. Switch(config)# access-list 1 permit 192.4.22.0 0.0.0.255 · The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. · For source, enter the number of the network or host from which the packet is being sent. · (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. end Example: Recall that the access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode. Switch(config)# end Step 5 show running-config Example: Switch# show running-config Verifies your entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1099 Controlling Source Information that Your Switch Forwards Routing Step 6 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Controlling Source Information that Your Switch Forwards By default, the switch forwards all SA messages it receives to all its MSDP peers. However, you can prevent outgoing messages from being forwarded to a peer by using a filter or by setting a time-to-live (TTL) value. Using a Filter By creating a filter, you can perform one of these actions: · Filter all source/group pairs · Specify an IP extended access list to pass only certain source/group pairs · Filter based on match criteria in a route map This task is optional. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Use one of the following: · ip msdp sa-filter out {ip-address name} · ip msdp sa-filter out {ip-address name} list access-list-number · ip msdp sa-filter out {ip-address name} route-map map-tag Example: Switch(config)# ip msdp sa-filter out switch.cisco.com · Filters all SA messages to the specified MSDP peer. · Passes only those SA messages that pass the IP extended access list to the specified peer. The range for the extended access-list-number is 100 to 199. If both the list and the route-map keywords are used, all conditions must be true to pass any (S,G) pair in outgoing SA messages. · Passes only those SA messages that meet the match criteria in the route map map-tag to the specified MSDP peer. If all match criteria are true, a permit from the route map passes routes through the filter. A deny filters routes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1100 Routing Using a Filter Command or Action or Switch(config)# ip msdp sa-filter out list 100 Purpose or Switch(config)# ip msdp sa-filter out switch.cisco.com route-map 22 Step 3 Step 4 access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard Example: Switch(config)# access list 100 permit ip 194.1.22.0 1.1.1.1 194.3.44.0 1.1.1.1 (Optional) Creates an IP extended access list, repeating the command as many times as necessary. · For access-list-number, enter the number specified in Step 2. · The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. · For protocol, enter ip as the protocol name. · For source, enter the number of the network or host from which the packet is being sent. · For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. · For destination, enter the number of the network or host to which the packet is being sent. · For destination-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the destination. Place ones in the bit positions that you want to ignore. end Example: Recall that the access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode. Switch(config)# end Step 5 show running-config Example: Switch# show running-config Verifies your entries. Step 6 copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1101 Using TTL to Limit the Multicast Data Sent in SA Messages Routing Command or Action Switch# copy running-config startup-config Purpose Using TTL to Limit the Multicast Data Sent in SA Messages You can use a TTL value to control what data is encapsulated in the first SA message for every source. Only multicast packets with an IP-header TTL greater than or equal to the ttl argument are sent to the specified MSDP peer. For example, you can limit internal traffic to a TTL of 8. If you want other groups to go to external locations, you must send those packets with a TTL greater than 8. This task is optional. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip msdp ttl-threshold {ip-address | name} ttl Example: Switch(config)# ip msdp ttl-threshold switch.cisco.com 0 Limits which multicast data is encapsulated in the first SA message to the specified MSDP peer. · For ip-address | name, enter the IP address or name of the MSDP peer to which the TTL limitation applies. · For ttl, enter the TTL value. The default is 0, which means all multicast data packets are forwarded to the peer until the TTL is exhausted. The range is 0 to 255. Step 3 end Example: Returns to privileged EXEC mode. Switch(config)# end Step 4 show running-config Example: Switch# show running-config Verifies your entries. Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1102 Routing Controlling Source Information that Your Switch Receives Controlling Source Information that Your Switch Receives By default, the switch receives all SA messages that its MSDP RPF peers send to it. However, you can control the source information that you receive from MSDP peers by filtering incoming SA messages. In other words, you can configure the switch to not accept them. You can perform one of these actions: · Filter all incoming SA messages from an MSDP peer · Specify an IP extended access list to pass certain source/group pairs · Filter based on match criteria in a route map This task is optional. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal Use one of the following: · ip msdp sa-filter in {ip-address name} · ip msdp sa-filter in {ip-address name} list access-list-number · ip msdp sa-filter in {ip-address name} route-map map-tag Example: Switch(config)# ip msdp sa-filter in switch.cisco.com · Filters all SA messages to the specified MSDP peer. · Passes only those SA messages from the specified peer that pass the IP extended access list. The range for the extended access-list-number is 100 to 199. If both the list and the route-map keywords are used, all conditions must be true to pass any (S,G) pair in outgoing SA messages. · Passes only those SA messages from the specified MSDP peer that meet the match criteria in the route map map-tag. If all match criteria are true, a permit from the route map passes routes through the filter. A deny filters routes. or Switch(config)# ip msdp sa-filter in list 100 or Switch(config)# ip msdp sa-filter in switch.cisco.com route-map 22 Step 3 access-list access-list-number {deny | permit} protocol (Optional) Creates an IP extended access list, repeating the source source-wildcard destination destination-wildcard command as many times as necessary. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1103 Configuring an MSDP Mesh Group Routing Command or Action Example: Switch(config)# access list 100 permit ip 194.1.22.0 1.1.1.1 194.3.44.0 1.1.1.1 Step 4 end Example: Switch(config)# end Step 5 show running-config Example: Switch# show running-config Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose · access-list-number, enter the number specified in Step 2. · The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. · For protocol, enter ip as the protocol name. · For source, enter the number of the network or host from which the packet is being sent. · For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. · For destination, enter the number of the network or host to which the packet is being sent. · For destination-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the destination. Place ones in the bit positions that you want to ignore. Recall that the access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Configuring an MSDP Mesh Group An MSDP mesh group is a group of MSDP speakers that have fully meshed MSDP connectivity among one another. Any SA messages received from a peer in a mesh group are not forwarded to other peers in the same mesh group. Thus, you reduce SA message flooding and simplify peer-RPF flooding. Use the ip msdp mesh-group global configuration command when there are multiple RPs within a domain. It is especially Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1104 Routing Shutting Down an MSDP Peer Step 1 used to send SA messages across a domain. You can configure multiple mesh groups (with different names) in a single switch. This task is optional. Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 ip msdp mesh-group name {ip-address | name} Example: Switch(config)# ip msdp mesh-group 2 switch.cisco.com Step 3 end Example: Switch(config)# end Configures an MSDP mesh group, and specifies the MSDP peer belonging to that mesh group. By default, the MSDP peers do not belong to a mesh group. · For name, enter the name of the mesh group. · For ip-address | name, enter the IP address or name of the MSDP peer to be a member of the mesh group. Repeat this procedure on each MSDP peer in the group. Returns to privileged EXEC mode. Step 4 show running-config Example: Switch# show running-config Verifies your entries. Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Shutting Down an MSDP Peer If you want to configure many MSDP commands for the same peer and you do not want the peer to become active, you can shut down the peer, configure it, and later bring it up. When a peer is shut down, the TCP connection is terminated and is not restarted. You can also shut down an MSDP session without losing configuration information for the peer. This task is optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1105 Including a Bordering PIM Dense-Mode Region in MSDP Routing Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ip msdp shutdown {peer-name | peer address} Shuts down the specified MSDP peer without losing Example: configuration information. For peer-name | peer address, enter the IP address or name Switch(config)# ip msdp shutdown switch.cisco.com of the MSDP peer to shut down. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 show running-config Example: Switch# show running-config Verifies your entries. Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Including a Bordering PIM Dense-Mode Region in MSDP You can configure MSDP on a switch that borders a PIM sparse-mode region with a dense-mode region. By default, active sources in the dense-mode region do not participate in MSDP. Note We do not recommend using the ip msdp border sa-address global configuration command. It is better to configure the border router in the sparse-mode domain to proxy-register sources in the dense-mode domain to the RP of the sparse-mode domain and have the sparse-mode domain use standard MSDP procedures to advertise these sources. The ip msdp originator-id global configuration command also identifies an interface to be used as the RP address. If both the ip msdp border sa-address and the ip msdp originator-id global configuration commands are configured, the address derived from the ip msdp originator-id command specifies the RP address. This task is optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1106 Routing Configuring an Originating Address other than the RP Address Step 1 Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 ip msdp border sa-address interface-id Example: Switch(config)# ip msdp border sa-address 0/1 ip msdp redistribute [list access-list-name] [asn aspath-access-list-number] [route-map map] Example: Switch(config)# ip msdp redistribute list 100 Configures the switch on the border between a dense-mode and sparse-mode region to send SA messages about active sources in the dense-mode region. For interface-id, specifies the interface from which the IP address is derived and used as the RP address in SA messages. The IP address of the interface is used as the Originator-ID, which is the RP field in the SA message. Configures which (S,G) entries from the multicast routing table are advertised in SA messages. For more information, see the Redistributing Sources, on page 1096. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 5 show running-config Example: Switch# show running-config Verifies your entries. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring an Originating Address other than the RP Address You can allow an MSDP speaker that originates an SA message to use the IP address of the interface as the RP address in the SA message by changing the Originator ID. You might change the Originator ID in one of these cases: · If you configure a logical RP on multiple switches in an MSDP mesh group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1107 Monitoring and Maintaining MSDP Routing Step 1 · If you have a switch that borders a PIM sparse-mode domain and a dense-mode domain. If a switch borders a dense-mode domain for a site, and sparse-mode is being used externally, you might want dense-mode sources to be known to the outside world. Because this switch is not an RP, it would not have an RP address to use in an SA message. Therefore, this command provides the RP address by specifying the address of the interface. If both the ip msdp border sa-address and the ip msdp originator-id global configuration commands are configured, the address derived from the ip msdp originator-id command specifies the address of the RP. This task is optional. Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 ip msdp originator-id interface-id Example: Switch(config)# ip msdp originator-id 0/1 Configures the RP address in SA messages to be the address of the originating device interface. For interface-id, specify the interface on the local switch. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 show running-config Example: Switch# show running-config Verifies your entries. Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Monitoring and Maintaining MSDP Commands that monitor MSDP SA messages, peers, state, and peer status: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1108 Routing Configuration Examples for Configuring MSDP Table 93: Commands for Monitoring and Maintaining MSDP Command debug ip msdp [peer-address | name] [detail] [routes] debug ip msdp resets show ip msdp count [autonomous-system-number] show ip msdp peer [peer-address | name] show ip msdp sa-cache [group-address | source-address | group-name | source-name] [autonomous-system-number] show ip msdp summary Purpose Debugs an MSDP activity. Debugs MSDP peer reset reasons. Displays the number of sources and groups originated in SA messages from each autonomous system. The ip msdp cache-sa-state command must be configured for this command to produce any output. Displays detailed information about an MSDP peer. Displays (S,G) state learned from MSDP peers. Displays MSDP peer status and SA message counts. Commands that clear MSDP connections, statistics, and SA cache entries: Table 94: Commands for Clearing MSDP Connections, Statistics, or SA Cache Entries Command Purpose clear ip msdp peer peer-address | name Clears the TCP connection to the specified MSDP peer, resetting all MSDP message counters. clear ip msdp statistics [peer-address | Clears statistics counters for one or all the MSDP peers without name] resetting the sessions. clear ip msdp sa-cache [group-address | Clears the SA cache entries for all entries, all sources for a name] specific group, or all entries for a specific source/group pair. Configuration Examples for Configuring MSDP Configuring a Default MSDP Peer: Example This example shows a partial configuration of Router A and Router C in . Each of these ISPs have more than one customer (like the customer in ) who use default peering (no BGP or MBGP). In that case, they might have similar configurations. That is, they accept SAs only from a default peer if the SA is permitted by the corresponding prefix list. Router A Router(config)# ip msdp default-peer 10.1.1.1 Router(config)# ip msdp default-peer 10.1.1.1 prefix-list site-a Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1109 Caching Source-Active State: Example Routing Router(config)# ip prefix-list site-b permit 10.0.0.0/1 Router C Router(config)# ip msdp default-peer 10.1.1.1 prefix-list site-a Router(config)# ip prefix-list site-b permit 10.0.0.0/1 Caching Source-Active State: Example This example shows how to enable the cache state for all sources in 171.69.0.0/16 sending to groups 224.2.0.0/16: Switch(config)# ip msdp cache-sa-state 100 Switch(config)# access-list 100 permit ip 171.69.0.0 0.0.255.255 224.2.0.0 0.0.255.255 Controlling Source Information that Your Switch Originates: Example This example shows how to configure the switch to filter SA request messages from the MSDP peer at 171.69.2.2. SA request messages from sources on network 192.4.22.0 pass access list 1 and are accepted; all others are ignored. Switch(config)# ip msdp filter sa-request 171.69.2.2 list 1 Switch(config)# access-list 1 permit 192.4.22.0 0.0.0.255 Controlling Source Information that Your Switch Forwards: Example This example shows how to allow only (S,G) pairs that pass access list 100 to be forwarded in an SA message to the peer named switch.cisco.com: Switch(config)# ip msdp peer switch.cisco.com connect-source gigabitethernet1/0/1 Switch(config)# ip msdp sa-filter out switch.cisco.com list 100 Switch(config)# access-list 100 permit ip 171.69.0.0 0.0.255.255 224.20 0 0.0.255.255 Controlling Source Information that Your Switch Receives: Example This example shows how to filter all SA messages from the peer named switch.cisco.com: Switch(config)# ip msdp peer switch.cisco.com connect-source gigabitethernet1/0/1 Switch(config)# ip msdp sa-filter in switch.cisco.com Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1110 6 0 C H A P T E R Configuring IP Unicast Routing · Finding Feature Information, on page 1112 · Information About Configuring IP Unicast Routing, on page 1112 · Information About IP Routing, on page 1112 · How to Configure IP Routing, on page 1119 · How to Configure IP Addressing, on page 1120 · Monitoring and Maintaining IP Addressing, on page 1135 · How to Configure IP Unicast Routing, on page 1136 · Information About RIP, on page 1137 · How to Configure RIP, on page 1138 · Configuration Example for Summary Addresses and Split Horizon, on page 1144 · Information About OSPF, on page 1145 · How to Configure OSPF, on page 1148 · Monitoring OSPF, on page 1158 · Configuration Examples for OSPF, on page 1159 · Information About EIGRP, on page 1160 · How to Configure EIGRP, on page 1163 · Monitoring and Maintaining EIGRP, on page 1169 · Information About BGP, on page 1170 · How to Configure BGP, on page 1177 · Monitoring and Maintaining BGP, on page 1198 · Configuration Examples for BGP, on page 1199 · Information About ISO CLNS Routing, on page 1200 · How to Configure ISO CLNS Routing, on page 1203 · Monitoring and Maintaining ISO IGRP and IS-IS, on page 1212 · Configuration Examples for ISO CLNS Routing, on page 1213 · Information About Multi-VRF CE, on page 1214 · How to Configure Multi-VRF CE, on page 1217 · Configuration Examples for Multi-VRF CE, on page 1230 · Configuring Unicast Reverse Path Forwarding, on page 1234 · Protocol-Independent Features, on page 1234 · Monitoring and Maintaining the IP Network, on page 1256 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1111 Finding Feature Information Routing Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring IP Unicast Routing This module describes how to configure IP Version 4 (IPv4) unicast routing on the switch. Note On switches running the LAN base feature, static routing on VLANs is supported only with this release. A switch stack operates and appears as a single router to the rest of the routers in the network. Basic routing functions, including static routing and the Routing Information Protocol (RIP), are available with both the IP base feature set and the IP services feature set. To use advanced routing features and other routing protocols, you must have the IP services feature set enabled on the standalone switch or on the active switch. Note In addition to IPv4 traffic, you can also enable IP Version 6 (IPv6) unicast routing and configure interfaces to forward IPv6 traffic if the switch or switch stack is running the IP base or IP services feature set. Information About IP Routing In some network environments, VLANs are associated with individual networks or subnetworks. In an IP network, each subnetwork is mapped to an individual VLAN. Configuring VLANs helps control the size of the broadcast domain and keeps local traffic local. However, network devices in different VLANs cannot communicate with one another without a Layer 3 device (router) to route traffic between the VLAN, referred to as inter-VLAN routing. You configure one or more routers to route traffic to the appropriate destination VLAN. Figure 63: Routing Topology Example This figure shows a basic routing topology. Switch A is in VLAN 10, and Switch B is in VLAN 20. The router has an interface in each VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1112 Routing Types of Routing When Host A in VLAN 10 needs to communicate with Host B in VLAN 10, it sends a packet addressed to that host. Switch A forwards the packet directly to Host B, without sending it to the router. When Host A sends a packet to Host C in VLAN 20, Switch A forwards the packet to the router, which receives the traffic on the VLAN 10 interface. The router checks the routing table, finds the correct outgoing interface, and forwards the packet on the VLAN 20 interface to Switch B. Switch B receives the packet and forwards it to Host C. Types of Routing Routers and Layer 3 switches can route packets in these ways: · By using default routing · By using preprogrammed static routes for the traffic · By dynamically calculating routes by using a routing protocol Default routing refers to sending traffic with a destination unknown to the router to a default outlet or destination. Static unicast routing forwards packets from predetermined ports through a single path into and out of a network. Static routing is secure and uses little bandwidth, but does not automatically respond to changes in the network, such as link failures, and therefore, might result in unreachable destinations. As networks grow, static routing becomes a labor-intensive liability. Switches running the LAN base feature set support 16 user-configured static routes, in addition to any default routes used for the management interface. The LAN base image supports static routing only on SVIs. Dynamic routing protocols are used by routers to dynamically calculate the best route for forwarding traffic. There are two types of dynamic routing protocols: · Routers using distance-vector protocols maintain routing tables with distance values of networked resources, and periodically pass these tables to their neighbors. Distance-vector protocols use one or a series of metrics for calculating the best routes. These protocols are easy to configure and use. · Routers using link-state protocols maintain a complex database of network topology, based on the exchange of link-state advertisements (LSAs) between routers. LSAs are triggered by an event in the network, which speeds up the convergence time or time required to respond to these changes. Link-state protocols respond quickly to topology changes, but require greater bandwidth and more resources than distance-vector protocols. Distance-vector protocols supported by the switch are Routing Information Protocol (RIP), which uses a single distance metric (cost) to determine the best path and Border Gateway Protocol (BGP), which adds a path vector mechanism. The switch also supports the Open Shortest Path First (OSPF) link-state protocol and Enhanced IGRP (EIGRP), which adds some link-state routing features to traditional Interior Gateway Routing Protocol (IGRP) to improve efficiency. Note On a switch or switch stack, the supported protocols are determined by the software running on the active switch. If the active switch is running the IP base feature set, only default routing, static routing and RIP are supported. If the active switch is running the IP base feature set, only default routing, static routing and RIP are supported. If the switch is running the LAN base feature set, you can configure 16 static routes on SVIs. All other routing protocols require the IP services feature set. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1113 IP Routing and Switch Stacks Routing IP Routing and Switch Stacks A switch stack appears to the network as a single switch, regardless of which switch in the stack is connected to a routing peer. The active switch performs these functions: · It initializes and configures the routing protocols. · It sends routing protocol messages and updates to other routers. · It processes routing protocol messages and updates received from peer routers. · It generates, maintains, and distributes the distributed Cisco Express Forwarding (dCEF) database to all stack members. The routes are programmed on all switches in the stack bases on this database. · The MAC address of the active switch is used as the router MAC address for the whole stack, and all outside devices use this address to send IP packets to the stack. · All IP packets that require software forwarding or processing go through the CPU of the active switch. Stack members perform these functions: · They act as routing standby switches, ready to take over in case they are elected as the new active switch if the active switch fails. · They program the routes into hardware. If a active switch fails, the stack detects that the active switch is down and elects one of the stack members to be the new active switch. During this period, except for a momentary interruption, the hardware continues to forward packets with no active protocols. However, even though the switch stack maintains the hardware identification after a failure, the routing protocols on the router neighbors might flap during the brief interruption before the active switch restarts. Routing protocols such as OSPF and EIGRP need to recognize neighbor transitions. The router uses two levels of nonstop forwarding (NSF) to detect a switchover, to continue forwarding network traffic, and to recover route information from peer devices: · NSF-aware routers tolerate neighboring router failures. After the neighbor router restarts, an NSF-aware router supplies information about its state and route adjacencies on request. · NSF-capable routers support NSF. When they detect a active switch change, they rebuild routing information from NSF-aware or NSF-capable neighbors and do not wait for a restart. The switch stack supports NSF-capable routing for OSPF and EIGRP. Upon election, the new active switch performs these functions: · It starts generating, receiving, and processing routing updates. · It builds routing tables, generates the CEF database, and distributes it to stack members. · It uses its MAC address as the router MAC address. To notify its network peers of the new MAC address, it periodically (every few seconds for 5 minutes) sends a gratuitous ARP reply with the new router MAC address. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1114 Routing Classless Routing Note If you configure the persistent MAC address feature on the stack and the active switch changes, the stack MAC address does not change for the configured time period. If the previous active switch rejoins the stack as a member switch during that time period, the stack MAC address remains the MAC address of the previous active switch. · It attempts to determine the reachability of every proxy ARP entry by sending an ARP request to the proxy ARP IP address and receiving an ARP reply. For each reachable proxy ARP IP address, it generates a gratuitous ARP reply with the new router MAC address. This process is repeated for 5 minutes after a new active switch election. Note When a active switch is running the IP services feature set, the stack can run all supported protocols, including Open Shortest Path First (OSPF), Enhanced IGRP (EIGRP), and Border Gateway Protocol (BGP). If the active switch fails and the new elected active switch is running the IP base or LAN base feature set, these protocols will no longer run in the stack. Caution Partitioning of the switch stack into two or more stacks might lead to undesirable behavior in the network. If the switch is reloaded, then all the ports on that switch go down and there is a loss of traffic for the interfaces involved in routing, despite NSF/SSO capability Classless Routing By default, classless routing behavior is enabled on the switch when it is configured to route. With classless routing, if a router receives packets for a subnet of a network with no default route, the router forwards the packet to the best supernet route. A supernet consists of contiguous blocks of Class C address spaces used to simulate a single, larger address space and is designed to relieve the pressure on the rapidly depleting Class B address space. In Figure 41-2, classless routing is enabled. When the host sends a packet to 120.20.4.1, instead of discarding the packet, the router forwards it to the best supernet route. If you disable classless routing and a router receives packets destined for a subnet of a network with no network default route, the router discards the packet. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1115 Address Resolution Figure 64: IP Classless Routing Routing In Figure 41-3, the router in network 128.20.0.0 is connected to subnets 128.20.1.0, 128.20.2.0, and 128.20.3.0. If the host sends a packet to 120.20.4.1, because there is no network default route, the router discards the packet. Figure 65: No IP Classless Routing Address Resolution You can control interface-specific handling of IP by using address resolution. A device using IP can have both a local address or MAC address, which uniquely defines the device on its local segment or LAN, and a network address, which identifies the network to which the device belongs. Note In a switch stack, network communication uses a single MAC address and the IP address of the stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1116 Routing Proxy ARP The local address or MAC address is known as a data link address because it is contained in the data link layer (Layer 2) section of the packet header and is read by data link (Layer 2) devices. To communicate with a device on Ethernet, the software must learn the MAC address of the device. The process of learning the MAC address from an IP address is called address resolution. The process of learning the IP address from the MAC address is called reverse address resolution. The switch can use these forms of address resolution: · Address Resolution Protocol (ARP) is used to associate IP address with MAC addresses. Taking an IP address as input, ARP learns the associated MAC address and then stores the IP address/MAC address association in an ARP cache for rapid retrieval. Then the IP datagram is encapsulated in a link-layer frame and sent over the network. Encapsulation of IP datagrams and ARP requests or replies on IEEE 802 networks other than Ethernet is specified by the Subnetwork Access Protocol (SNAP). · Proxy ARP helps hosts with no routing tables learn the MAC addresses of hosts on other networks or subnets. If the switch (router) receives an ARP request for a host that is not on the same interface as the ARP request sender, and if the router has all of its routes to the host through other interfaces, it generates a proxy ARP packet giving its own local data link address. The host that sent the ARP request then sends its packets to the router, which forwards them to the intended host. The switch also uses the Reverse Address Resolution Protocol (RARP), which functions the same as ARP does, except that the RARP packets request an IP address instead of a local MAC address. Using RARP requires a RARP server on the same network segment as the router interface. Use the ip rarp-server address interface configuration command to identify the server. For more information on RARP, see the Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.4. Proxy ARP Proxy ARP, the most common method for learning about other routes, enables an Ethernet host with no routing information to communicate with hosts on other networks or subnets. The host assumes that all hosts are on the same local Ethernet and that they can use ARP to learn their MAC addresses. If a switch receives an ARP request for a host that is not on the same network as the sender, the switch evaluates whether it has the best route to that host. If it does, it sends an ARP reply packet with its own Ethernet MAC address, and the host that sent the request sends the packet to the switch, which forwards it to the intended host. Proxy ARP treats all networks as if they are local and performs ARP requests for every IP address. ICMP Router Discovery Protocol Router discovery allows the switch to dynamically learn about routes to other networks using ICMP router discovery protocol (IRDP). IRDP allows hosts to locate routers. When operating as a client, the switch generates router discovery packets. When operating as a host, the switch receives router discovery packets. The switch can also listen to Routing Information Protocol (RIP) routing updates and use this information to infer locations of routers. The switch does not actually store the routing tables sent by routing devices; it merely keeps track of which systems are sending the data. The advantage of using IRDP is that it allows each router to specify both a priority and the time after which a device is assumed to be down if no further packets are received. Each device discovered becomes a candidate for the default router, and a new highest-priority router is selected when a higher priority router is discovered, when the current default router is declared down, or when a TCP connection is about to time out because of excessive retransmissions. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1117 UDP Broadcast Packets and Protocols Routing UDP Broadcast Packets and Protocols User Datagram Protocol (UDP) is an IP host-to-host layer protocol, as is TCP. UDP provides a low-overhead, connectionless session between two end systems and does not provide for acknowledgment of received datagrams. Network hosts occasionally use UDP broadcasts to find address, configuration, and name information. If such a host is on a network segment that does not include a server, UDP broadcasts are normally not forwarded. You can remedy this situation by configuring an interface on a router to forward certain classes of broadcasts to a helper address. You can use more than one helper address per interface. You can specify a UDP destination port to control which UDP services are forwarded. You can specify multiple UDP protocols. You can also specify the Network Disk (ND) protocol, which is used by older diskless Sun workstations and the network security protocol SDNS. By default, both UDP and ND forwarding are enabled if a helper address has been defined for an interface. The description for the ip forward-protocol interface configuration command in the Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services, Release 12.4 lists the ports that are forwarded by default if you do not specify any UDP ports. Broadcast Packet Handling After configuring an IP interface address, you can enable routing and configure one or more routing protocols, or you can configure the way the switch responds to network broadcasts. A broadcast is a data packet destined for all hosts on a physical network. The switch supports two kinds of broadcasting: · A directed broadcast packet is sent to a specific network or series of networks. A directed broadcast address includes the network or subnet fields. · A flooded broadcast packet is sent to every network. Note You can also limit broadcast, unicast, and multicast traffic on Layer 2 interfaces by using the storm-control interface configuration command to set traffic suppression levels. Routers provide some protection from broadcast storms by limiting their extent to the local cable. Bridges (including intelligent bridges), because they are Layer 2 devices, forward broadcasts to all network segments, thus propagating broadcast storms. The best solution to the broadcast storm problem is to use a single broadcast address scheme on a network. In most modern IP implementations, you can set the address to be used as the broadcast address. Many implementations, including the one in the switch, support several addressing schemes for forwarding broadcast messages. IP Broadcast Flooding You can allow IP broadcasts to be flooded throughout your internetwork in a controlled fashion by using the database created by the bridging STP. Using this feature also prevents loops. To support this capability, bridging must be configured on each interface that is to participate in the flooding. If bridging is not configured on an interface, it still can receive broadcasts. However, the interface never forwards broadcasts it receives, and the router never uses that interface to send broadcasts received on a different interface. Packets that are forwarded to a single network address using the IP helper-address mechanism can be flooded. Only one copy of the packet is sent on each network segment. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1118 Routing How to Configure IP Routing To be considered for flooding, packets must meet these criteria. (Note that these are the same conditions used to consider packet forwarding using IP helper addresses.) · The packet must be a MAC-level broadcast. · The packet must be an IP-level broadcast. · The packet must be a TFTP, DNS, Time, NetBIOS, ND, or BOOTP packet, or a UDP specified by the ip forward-protocol udp global configuration command. · The time-to-live (TTL) value of the packet must be at least two. A flooded UDP datagram is given the destination address specified with the ip broadcast-address interface configuration command on the output interface. The destination address can be set to any address. Thus, the destination address might change as the datagram propagates through the network. The source address is never changed. The TTL value is decremented. When a flooded UDP datagram is sent out an interface (and the destination address possibly changed), the datagram is handed to the normal IP output routines and is, therefore, subject to access lists, if they are present on the output interface. In the switch, the majority of packets are forwarded in hardware; most packets do not go through the switch CPU. For those packets that do go to the CPU, you can speed up spanning tree-based UDP flooding by a factor of about four to five times by using turbo-flooding. This feature is supported over Ethernet interfaces configured for ARP encapsulation. How to Configure IP Routing By default, IP routing is disabled on the switch, and you must enable it before routing can take place. For detailed IP routing configuration information, see the Cisco IOS IP Configuration Guide, Release 12.4 In the following procedures, the specified interface must be one of these Layer 3 interfaces: · A routed port: a physical port configured as a Layer 3 port by using the no switchport interface configuration command. · A switch virtual interface (SVI): a VLAN interface created by using the interface vlan vlan_id global configuration command and by default a Layer 3 interface. · An EtherChannel port channel in Layer 3 mode: a port-channel logical interface created by using the interface port-channel port-channel-number global configuration command and binding the Ethernet interface into the channel group. For more information, see the "Configuring Layer 3 EtherChannels" section on page 39-15. Note The switch does not support tunnel interfaces for unicast routed traffic. All Layer 3 interfaces on which routing will occur must have IP addresses assigned to them. See the "Assigning IP Addresses to Network Interfaces" section on page 41-7. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1119 How to Configure IP Addressing Routing Note A Layer 3 switch can have an IP address assigned to each routed port and SVI. The number of routed ports and SVIs that you can configure is limited to 128, exceeding the recommended number and volume of features being implemented might impact CPU utilization because of hardware limitations. Configuring routing consists of several main procedures: · To support VLAN interfaces, create and configure VLANs on the switch or switch stack, and assign VLAN membership to Layer 2 interfaces. For more information, see Chapter 14, "Configuring VLANs." · Configure Layer 3 interfaces. · Enable IP routing on the switch. · Assign IP addresses to the Layer 3 interfaces. · Enable selected routing protocols on the switch. · Configure routing protocol parameters (optional). How to Configure IP Addressing A required task for configuring IP routing is to assign IP addresses to Layer 3 network interfaces to enable the interfaces and allow communication with the hosts on those interfaces that use IP. The following sections describe how to configure various IP addressing features. Assigning IP addresses to the interface is required; the other procedures are optional. Default IP Addressing Configuration Table 95: Default Addressing Configuration Feature IP address ARP IP broadcast address IP classless routing IP default gateway IP directed broadcast Default Setting None defined. No permanent entries in the Address Resolution Protocol (ARP) cache. Encapsulation: Standard Ethernet-style ARP. Timeout: 14400 seconds (4 hours). 255.255.255.255 (all ones). Enabled. Disabled. Disabled (all IP directed broadcasts are dropped). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1120 Routing Assigning IP Addresses to Network Interfaces Feature IP domain IP forward-protocol IP helper address IP host IRDP IP proxy ARP IP routing IP subnet-zero Default Setting Domain list: No domain names defined. Domain lookup: Enabled. Domain name: Enabled. If a helper address is defined or User Datagram Protocol (UDP) flooding is configured, UDP forwarding is enabled on default ports. Any-local-broadcast: Disabled. Spanning Tree Protocol (STP): Disabled. Turbo-flood: Disabled. Disabled. Disabled. Disabled. Defaults when enabled: · Broadcast IRDP advertisements. · Maximum interval between advertisements: 600 seconds. · Minimum interval between advertisements: 0.75 times max interval · Preference: 0. Enabled. Disabled. Disabled. Assigning IP Addresses to Network Interfaces An IP address identifies a location to which IP packets can be sent. Some IP addresses are reserved for special uses and cannot be used for host, subnet, or network addresses. RFC 1166, "Internet Numbers," contains the official description of IP addresses. An interface can have one primary IP address. A mask identifies the bits that denote the network number in an IP address. When you use the mask to subnet a network, the mask is referred to as a subnet mask. To receive an assigned network number, contact your Internet service provider. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1121 Assigning IP Addresses to Network Interfaces Routing Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Switch(config)# interface gigabitethernet 1/0/1 no switchport Example: Removes the interface from Layer 2 configuration mode (if it is a physical interface). Switch(config-if)# no switchport ip address ip-address subnet-mask Example: Configures the IP address and IP subnet mask. Switch(config-if)# ip address 10.1.5.1 255.255.255.0 no shutdown Example: Enables the physical interface. Switch(config-if)# no shutdown end Example: Returns to privileged EXEC mode. Switch(config-if)# end show ip route Example: Verifies your entries. Switch# show ip route show ip interface [interface-id] Example: Verifies your entries. Switch# show ip interface gigabitethernet 1/0/1 show running-config interface [interface-id] Example: Verifies your entries. Switch# show running-config interface gigabitethernet 1/0/1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1122 Routing Using Subnet Zero Step 10 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Using Subnet Zero Subnetting with a subnet address of zero is strongly discouraged because of the problems that can arise if a network and a subnet have the same addresses. For example, if network 131.108.0.0 is subnetted as 255.255.255.0, subnet zero would be written as 131.108.0.0, which is the same as the network address. You can use the all ones subnet (131.108.255.0) and even though it is discouraged, you can enable the use of subnet zero if you need the entire subnet space for your IP address. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip subnet-zero Example: Enables the use of subnet zero for interface addresses and routing updates. Step 3 Switch(config)# ip subnet-zero end Example: Returns to privileged EXEC mode. Step 4 Switch(config)# end show running-config Example: Verifies your entry. Step 5 Switch# show running-config copy running-config startup-config Example: (Optional) Saves your entry in the configuration file. Switch# copy running-config startup-config Enabling Classless Routing To prevent the switch from forwarding packets destined for unrecognized subnets to the best supernet route possible, you can disable classless routing behavior. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1123 Configuring Address Resolution Methods Routing Step 1 Step 2 Step 3 Step 4 Step 5 Procedure Command or Action configure terminal Example: Switch# configure terminal no ip classless Example: Switch(config)#no ip classless end Example: Switch(config)# end show running-config Example: Switch# show running-config copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enters global configuration mode. Disables classless routing behavior. Returns to privileged EXEC mode. Verifies your entry. (Optional) Saves your entry in the configuration file. Configuring Address Resolution Methods You can perform the following tasks to configure address resolution. Defining a Static ARP Cache ARP and other address resolution protocols provide dynamic mapping between IP addresses and MAC addresses. Because most hosts support dynamic address resolution, you usually do not need to specify static ARP cache entries. If you must define a static ARP cache entry, you can do so globally, which installs a permanent entry in the ARP cache that the switch uses to translate IP addresses into MAC addresses. Optionally, you can also specify that the switch respond to ARP requests as if it were the owner of the specified IP address. If you do not want the ARP entry to be permanent, you can specify a timeout period for the ARP entry. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1124 Routing Defining a Static ARP Cache Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose arp ip-address hardware-address type Example: Associates an IP address with a MAC (hardware) address in the ARP cache, and specifies encapsulation type as one of these: Switch(config)# ip 10.1.5.1 c2f3.220a.12f4 arpa · arpa--ARP encapsulation for Ethernet interfaces · snap--Subnetwork Address Protocol encapsulation for Token Ring and FDDI interfaces · sap--HP's ARP type arp ip-address hardware-address type [alias] Example: (Optional) Specifies that the switch respond to ARP requests as if it were the owner of the specified IP address. Switch(config)# ip 10.1.5.3 d7f3.220d.12f5 arpa alias interface interface-id Example: Enters interface configuration mode, and specifies the interface to configure. Switch(config)# interface gigabitethernet 1/0/1 arp timeout seconds Example: (Optional) Sets the length of time an ARP cache entry will stay in the cache. The default is 14400 seconds (4 hours). The range is 0 to 2147483 seconds. Switch(config-if)# arp 20000 end Example: Returns to privileged EXEC mode. Switch(config-if)# end show interfaces [interface-id] Example: Verifies the type of ARP and the timeout value used on all interfaces or a specific interface. Switch# show interfaces gigabitethernet 1/0/1 show arp Example: Views the contents of the ARP cache. Switch# show arp show ip arp Example: Views the contents of the ARP cache. Switch# show ip arp Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1125 Setting ARP Encapsulation Routing Step 10 Command or Action copy running-config startup-config Example: Switch# copy running-config start-config Purpose (Optional) Saves your entries in the configuration file. Setting ARP Encapsulation By default, Ethernet ARP encapsulation (represented by the arpa keyword) is enabled on an IP interface. You can change the encapsulation methods to SNAP if required by your network. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Step 3 Step 4 Switch(config)# interface gigabitethernet 1/0/2 arp {arpa | snap} Example: Specifies the ARP encapsulation method: · arpa--Address Resolution Protocol Switch(config-if)# arp arpa · snap--Subnetwork Address Protocol end Example: Returns to privileged EXEC mode. Step 5 Switch(config-if)# end show interfaces [interface-id] Example: Verifies ARP encapsulation configuration on all interfaces or the specified interface. Step 6 Switch# show interfaces copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1126 Routing Enabling Proxy ARP Enabling Proxy ARP By default, the switch uses proxy ARP to help hosts learn MAC addresses of hosts on other networks or subnets. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Step 3 Switch(config)# interface gigabitethernet 1/0/2 ip proxy-arp Example: Enables proxy ARP on the interface. Step 4 Switch(config-if)# ip proxy-arp end Example: Returns to privileged EXEC mode. Step 5 Switch(config-if)# end show ip interface [interface-id] Example: Verifies the configuration on the interface or all interfaces. Step 6 Switch# show ip interface gigabitethernet 1/0/2 copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Routing Assistance When IP Routing is Disabled These mechanisms allow the switch to learn about routes to other networks when it does not have IP routing enabled: · Proxy ARP · Default Gateway · ICMP Router Discovery Protocol (IRDP) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1127 Proxy ARP Routing Proxy ARP Proxy ARP is enabled by default. To enable it after it has been disabled, see the "Enabling Proxy ARP" section. Proxy ARP works as long as other routers support it. Default Gateway Another method for locating routes is to define a default router or default gateway. All non-local packets are sent to this router, which either routes them appropriately or sends an IP Control Message Protocol (ICMP) redirect message back, defining which local router the host should use. The switch caches the redirect messages and forwards each packet as efficiently as possible. A limitation of this method is that there is no means of detecting when the default router has gone down or is unavailable. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip default-gateway ip-address Example: Sets up a default gateway (router). Step 3 Switch(config)# ip default gateway 10.1.5.1 end Example: Returns to privileged EXEC mode. Step 4 Switch(config)# end show ip redirects Example: Displays the address of the default gateway router to verify the setting. Step 5 Switch# show ip redirects copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config ICMP Router Discovery Protocol (IRDP) The only required task for IRDP routing on an interface is to enable IRDP processing on that interface. When enabled, the default parameters apply. You can optionally change any of these parameters. If you change the maxadvertinterval value, the holdtime and minadvertinterval values also change, so it is important to first change the maxadvertinterval value, before manually changing either the holdtime or minadvertinterval values. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1128 Routing ICMP Router Discovery Protocol (IRDP) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Switch(config)# interface gigabitethernet 1/0/1 ip irdp Example: Enables IRDP processing on the interface. Switch(config-if)# ip irdp ip irdp multicast Example: Switch(config-if)# ip irdp multicast (Optional) Sends IRDP advertisements to the multicast address (224.0.0.1) instead of IP broadcasts. Note This command allows for compatibility with Sun Microsystems Solaris, which requires IRDP packets to be sent out as multicasts. Many implementations cannot receive these multicasts; ensure end-host ability before using this command. ip irdp holdtime seconds Example: Switch(config-if)# ip irdp holdtime 1000 ip irdp maxadvertinterval seconds Example: (Optional) Sets the IRDP period for which advertisements are valid. The default is three times the maxadvertinterval value. It must be greater than maxadvertinterval and cannot be greater than 9000 seconds. If you change the maxadvertinterval value, this value also changes. (Optional) Sets the IRDP maximum interval between advertisements. The default is 600 seconds. Switch(config-if)# ip irdp maxadvertinterval 650 ip irdp minadvertinterval seconds (Optional) Sets the IRDP minimum interval between Example: advertisements. The default is 0.75 times the maxadvertinterval. If you change the maxadvertinterval, this value changes to the new default (0.75 of Switch(config-if)# ip irdp minadvertinterval 500 maxadvertinterval). ip irdp preference number Example: Switch(config-if)# ip irdp preference 2 (Optional) Sets a device IRDP preference level. The allowed range is 231 to 231. The default is 0. A higher value increases the router preference level. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1129 Configuring Broadcast Packet Handling Routing Step 9 Step 10 Step 11 Step 12 Command or Action ip irdp address address [number] Example: Purpose (Optional) Specifies an IRDP address and preference to proxy-advertise. Switch(config-if)# ip irdp address 10.1.10.10 end Example: Returns to privileged EXEC mode. Switch(config-if)# end show ip irdp Example: Verifies settings by displaying IRDP values. Switch# show ip irdp copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Configuring Broadcast Packet Handling Perform the tasks in these sections to enable these schemes: · Enabling Directed Broadcast-to-Physical Broadcast Translation, page 41-19 · Forwarding UDP Broadcast Packets and Protocols, page 41-20 · Establishing an IP Broadcast Address, page 41-22 · Flooding IP Broadcasts, page 41-23 Enabling Directed Broadcast-to-Physical Broadcast Translation By default, IP directed broadcasts are dropped; they are not forwarded. Dropping IP-directed broadcasts makes routers less susceptible to denial-of-service attacks. You can enable forwarding of IP-directed broadcasts on an interface where the broadcast becomes a physical (MAC-layer) broadcast. Only those protocols configured by using the ip forward-protocol global configuration command are forwarded. You can specify an access list to control which broadcasts are forwarded. When an access list is specified, only those IP packets permitted by the access list are eligible to be translated from directed broadcasts to physical broadcasts. For more information on access lists, see Chapter 36, "Configuring Network Security with ACLs." Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1130 Routing Enabling Directed Broadcast-to-Physical Broadcast Translation Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the interface to configure. Switch(config)# interface gigabitethernet 1/0/2 ip directed-broadcast [access-list-number] Example: Switch(config-if)# ip directed-broadcast 103 Enables directed broadcast-to-physical broadcast translation on the interface. You can include an access list to control which broadcasts are forwarded. When an access list, only IP packets permitted by the access list can be translated. Note The ip directed-broadcast interface configuration command can be configured on a VPN routing/forwarding(VRF) interface and is VRF aware. Directed broadcast traffic is routed only within the VRF. exit Example: Returns to global configuration mode. Switch(config-if)# exit ip forward-protocol {udp [port] | nd | sdns} Example: Switch(config)# ip forward-protocol nd Specifies which protocols and ports the router forwards when forwarding broadcast packets. · udp--Forward UPD datagrams. port: (Optional) Destination port that controls which UDP services are forwarded. · nd--Forward ND datagrams. · sdns--Forward SDNS datagrams end Example: Returns to privileged EXEC mode. Switch(config)# end show ip interface [interface-id] Example: Verifies the configuration on the interface or all interfaces Switch# show ip interface Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1131 Forwarding UDP Broadcast Packets and Protocols Routing Step 8 Step 9 Command or Action show running-config Example: Switch# show running-config copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies the configuration on the interface or all interfaces (Optional) Saves your entries in the configuration file. Forwarding UDP Broadcast Packets and Protocols If you do not specify any UDP ports when you configure the forwarding of UDP broadcasts, you are configuring the router to act as a BOOTP forwarding agent. BOOTP packets carry DHCP information. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Step 3 Switch(config)# interface gigabitethernet 1/0/1 ip helper-address address Example: Enables forwarding and specifies the destination address for forwarding UDP broadcast packets, including BOOTP. Step 4 Switch(config-if)# ip helper address 10.1.10.1 exit Example: Returns to global configuration mode. Step 5 Switch(config-if)# exit ip forward-protocol {udp [port] | nd | sdns} Example: Specifies which protocols the router forwards when forwarding broadcast packets. Step 6 Switch(config)# ip forward-protocol sdns end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1132 Routing Establishing an IP Broadcast Address Step 7 Step 8 Step 9 Command or Action Purpose Switch(config)# end show ip interface [interface-id] Example: Verifies the configuration on the interface or all interfaces. Switch# show ip interface gigabitethernet 1/0/1 show running-config Example: Verifies the configuration on the interface or all interfaces. Switch# show running-config copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Establishing an IP Broadcast Address The most popular IP broadcast address (and the default) is an address consisting of all ones (255.255.255.255). However, the switch can be configured to generate any form of IP broadcast address. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the interface to configure. Step 3 Switch(config)# interface gigabitethernet 1/0/1 ip broadcast-address ip-address Example: Enters a broadcast address different from the default, for example 128.1.255.255. Step 4 Switch(config-if)# ip broadcast-address 128.1.255.255 end Example: Returns to privileged EXEC mode. Switch(config-if)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1133 Flooding IP Broadcasts Routing Step 5 Step 6 Command or Action show ip interface [interface-id] Example: Switch# show ip interface copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies the broadcast address on the interface or all interfaces. (Optional) Saves your entries in the configuration file. Flooding IP Broadcasts Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal ip forward-protocol spanning-tree Example: Uses the bridging spanning-tree database to flood UDP datagrams. Switch(config)# ip forward-protocol spanning-tree end Example: Returns to privileged EXEC mode. Switch(config)# end show running-config Example: Verifies your entry. Switch# show running-config copy running-config startup-config Example: (Optional) Saves your entry in the configuration file. Switch# copy running-config startup-config configure terminal Example: Enters global configuration mode Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1134 Routing Monitoring and Maintaining IP Addressing Step 7 Step 8 Step 9 Step 10 Command or Action ip forward-protocol turbo-flood Example: Purpose Uses the spanning-tree database to speed up flooding of UDP datagrams. Switch(config)# ip forward-protocol turbo-flood end Example: Returns to privileged EXEC mode. Switch(config)# end show running-config Example: Verifies your entry. Switch# show running-config copy running-config startup-config Example: (Optional) Saves your entry in the configuration file. Switch# copy running-config startup-config Monitoring and Maintaining IP Addressing When the contents of a particular cache, table, or database have become or are suspected to be invalid, you can remove all its contents by using the clear privileged EXEC commands. Table 41-2 lists the commands for clearing contents. Table 96: Commands to Clear Caches, Tables, and Databases clear arp-cache clear host {name | *} clear ip route {network [mask] | *} Clears the IP ARP cache and the fast-switching cache. Removes one or all entries from the hostname and the address cache. Removes one or more routes from the IP routing table. You can display specific statistics, such as the contents of IP routing tables, caches, and databases; the reachability of nodes; and the routing path that packets are taking through the network. Table 41-3 lists the privileged EXEC commands for displaying IP statistics. Table 97: Commands to Display Caches, Tables, and Databases show arp show hosts Displays the entries in the ARP table. Displays the default domain name, style of lookup service, name server hosts, and the cached list of hostnames and addresses. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1135 How to Configure IP Unicast Routing Routing show ip aliases show ip arp show ip interface [interface-id] show ip irdp show ip masks address show ip redirects show ip route [address [mask]] | [protocol] show ip route summary Displays IP addresses mapped to TCP ports (aliases). Displays the IP ARP cache. Displays the IP status of interfaces. Displays IRDP values. Displays the masks used for network addresses and the number of subnets using each mask. Displays the address of a default gateway. Displays the current state of the routing table. Displays the current state of the routing table in summary form. How to Configure IP Unicast Routing Enabling IP Unicast Routing By default, the switch is in Layer 2 switching mode and IP routing is disabled. To use the Layer 3 capabilities of the switch, you must enable IP routing. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip routing Example: Enables IP routing. Step 3 Switch(config)# ip routing router ip_routing_protocol Example: Switch(config)# router rip Specifies an IP routing protocol. This step might include other commands, such as specifying the networks to route with the network (RIP) router configuration command. For information on specific protocols, see sections later in this chapter and to the Cisco IOS IP Configuration Guide, Release 12.4. Note The IP base feature set supports only RIP as a routing protocol. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1136 Routing Example of Enabling IP Routing Step 4 Step 5 Step 6 Command or Action end Example: Switch(config)# end show running-config Example: Switch# show running-config copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Example of Enabling IP Routing This example shows how to enable IP routingusing RIP as the routing protocol : Switch# configure terminal Enter configuration commands, one per line. Switch(config)# ip routing Switch(config)# router rip Switch(config-router)# network 10.0.0.0 Switch(config-router)# end End with CNTL/Z. What to Do Next You can now set up parameters for the selected routing protocols as described in these sections: · RIP · OSPF, · EIGRP · BGP · Unicast Reverse Path Forwarding · Protocol-Independent Features (optional) Information About RIP The Routing Information Protocol (RIP) is an interior gateway protocol (IGP) created for use in small, homogeneous networks. It is a distance-vector routing protocol that uses broadcast User Datagram Protocol (UDP) data packets to exchange routing information. The protocol is documented in RFC 1058. You can find detailed information about RIP in IP Routing Fundamentals, published by Cisco Press. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1137 Summary Addresses and Split Horizon Routing Note RIP is supported in the IP Base. Using RIP, the switch sends routing information updates (advertisements) every 30 seconds. If a router does not receive an update from another router for 180 seconds or more, it marks the routes served by that router as unusable. If there is still no update after 240 seconds, the router removes all routing table entries for the non-updating router. RIP uses hop counts to rate the value of different routes. The hop count is the number of routers that can be traversed in a route. A directly connected network has a hop count of zero; a network with a hop count of 16 is unreachable. This small range (0 to 15) makes RIP unsuitable for large networks. If the router has a default network path, RIP advertises a route that links the router to the pseudonetwork 0.0.0.0. The 0.0.0.0 network does not exist; it is treated by RIP as a network to implement the default routing feature. The switch advertises the default network if a default was learned by RIP or if the router has a gateway of last resort and RIP is configured with a default metric. RIP sends updates to the interfaces in specified networks. If an interface's network is not specified, it is not advertised in any RIP update. Summary Addresses and Split Horizon Routers connected to broadcast-type IP networks and using distance-vector routing protocols normally use the split-horizon mechanism to reduce the possibility of routing loops. Split horizon blocks information about routes from being advertised by a router on any interface from which that information originated. This feature usually optimizes communication among multiple routers, especially when links are broken. How to Configure RIP Default RIP Configuration Table 98: Default RIP Configuration Feature Auto summary Default-information originate Default metric IP RIP authentication key-chain IP RIP triggered IP split horizon Neighbor Network Default Setting Enabled. Disabled. Built-in; automatic metric translations. No authentication. Authentication mode: clear text. Disabled Varies with media. None defined. None specified. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1138 Routing Configuring Basic RIP Parameters Feature Offset list Output delay Timers basic Validate-update-source Version Default Setting Disabled. 0 milliseconds. · Update: 30 seconds. · Invalid: 180 seconds. · Hold-down: 180 seconds. · Flush: 240 seconds. Enabled. Receives RIP Version 1 and 2 packets; sends Version 1 packets. Configuring Basic RIP Parameters To configure RIP, you enable RIP routing for a network and optionally configure other parameters. On the switches, RIP configuration commands are ignored until you configure the network number. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip routing Example: Enables IP routing. (Required only if IP routing is disabled.) Step 3 Switch(config)# ip routing router rip Example: Enables a RIP routing process, and enter router configuration mode. Step 4 Switch(config)# router rip network network number Example: Switch(config)# network 12 Associates a network with a RIP routing process. You can specify multiple network commands. RIP routing updates are sent and received through interfaces only on these networks. Note You must configure a network number for the RIP commands to take effect. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1139 Configuring Basic RIP Parameters Routing Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action neighbor ip-address Example: Switch(config)# neighbor 10.2.5.1 offset-list [access-list number | name] {in | out} offset [type number] Example: Switch(config)# offset-list 103 in 10 timers basic update invalid holddown flush Example: Switch(config)# timers basic 45 360 400 300 Purpose (Optional) Defines a neighboring router with which to exchange routing information. This step allows routing updates from RIP (normally a broadcast protocol) to reach nonbroadcast networks. (Optional) Applies an offset list to routing metrics to increase incoming and outgoing metrics to routes learned through RIP. You can limit the offset list with an access list or an interface. (Optional) Adjusts routing protocol timers. Valid ranges for all timers are 0 to 4294967295 seconds. · update--The time between sending routing updates. The default is 30 seconds. · invalid--The timer after which a route is declared invalid. The default is 180 seconds. · holddown--The time before a route is removed from the routing table. The default is 180 seconds. · flush--The amount of time for which routing updates are postponed. The default is 240 seconds. version {1 | 2} Example: Switch(config)# version 2 no auto summary Example: Switch(config)# no auto summary no validate-update-source Example: Switch(config)# no validdate-update-source output-delay delay Example: (Optional) Configures the switch to receive and send only RIP Version 1 or RIP Version 2 packets. By default, the switch receives Version 1 and 2 but sends only Version 1. You can also use the interface commands ip rip {send | receive} version 1 | 2 | 1 2} to control what versions are used for sending and receiving on interfaces. (Optional) Disables automatic summarization. By default, the switch summarizes subprefixes when crossing classful network boundaries. Disable summarization (RIP Version 2 only) to advertise subnet and host routing information to classful network boundaries. (Optional) Disables validation of the source IP address of incoming RIP routing updates. By default, the switch validates the source IP address of incoming RIP routing updates and discards the update if the source address is not valid. Under normal circumstances, disabling this feature is not recommended. However, if you have a router that is off-network and you want to receive its updates, you can use this command. (Optional) Adds interpacket delay for RIP updates sent. By default, packets in a multiple-packet RIP update have no delay added between packets. If you are sending packets Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1140 Routing Configuring RIP Authentication Step 12 Step 13 Step 14 Command or Action Switch(config)# output-delay 8 end Example: Switch(config)# end show ip protocols Example: Switch# show ip protocols copy running-config startup-config Example: Switch# copy running-config startup-config Purpose to a lower-speed device, you can add an interpacket delay in the range of 8 to 50 milliseconds. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Configuring RIP Authentication RIP Version 1 does not support authentication. If you are sending and receiving RIP Version 2 packets, you can enable RIP authentication on an interface. The key chain specifies the set of keys that can be used on the interface. If a key chain is not configured, no authentication is performed. The switch supports two modes of authentication on interfaces for which RIP authentication is enabled: plain text and MD5. The default is plain text. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the interface to configure. Step 3 Switch(config)# interface gigabitethernet 1/0/1 ip rip authentication key-chain name-of-chain Example: Enables RIP authentication. Switch(config-if)# ip rip authentication key-chain trees Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1141 Configuring Summary Addresses and Split Horizon Routing Step 4 Step 5 Step 6 Step 7 Command or Action ip rip authentication mode {text | md5} Example: Purpose Configures the interface to use plain text authentication (the default) or MD5 digest authentication. Switch(config-if)# ip rip authentication mode md5 end Example: Returns to privileged EXEC mode. Switch(config-if)# end show running-config interface [interface-id] Example: Verifies your entries. Switch# show running-config copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Configuring Summary Addresses and Split Horizon Note In general, disabling split horizon is not recommended unless you are certain that your application requires it to properly advertise routes. If you want to configure an interface running RIP to advertise a summarized local IP address pool on a network access server for dial-up clients, use the ip summary-address rip interface configuration command. Note If split horizon is enabled, neither autosummary nor interface IP summary addresses are advertised. Step 1 Step 2 Procedure Command or Action configure terminal Example: Switch# configure terminal interface interface-id Example: Purpose Enters global configuration mode. Enters interface configuration mode, and specifies the Layer 3 interface to configure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1142 Routing Configuring Split Horizon Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Switch(config)# interface gigabitethernet 1/0/1 ip address ip-address subnet-mask Example: Configures the IP address and IP subnet. Switch(config-if)# ip address 10.1.1.10 255.255.255.0 ip summary-address rip ip address ip-network mask Example: Configures the IP address to be summarized and the IP network mask. Switch(config-if)# ip summary-address rip ip address 10.1.1.30 255.255.255.0 no ip split horizon Example: Disables split horizon on the interface. Switch(config-if)# no ip split horizon end Example: Returns to privileged EXEC mode. Switch(config-if)# end show ip interface interface-id Example: Verifies your entries. Switch# show ip interface gigabitethernet 1/0/1 copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Configuring Split Horizon Routers connected to broadcast-type IP networks and using distance-vector routing protocols normally use the split-horizon mechanism to reduce the possibility of routing loops. Split horizon blocks information about routes from being advertised by a router on any interface from which that information originated. This feature can optimize communication among multiple routers, especially when links are broken. Note In general, we do not recommend disabling split horizon unless you are certain that your application requires it to properly advertise routes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1143 Configuration Example for Summary Addresses and Split Horizon Routing Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the interface to configure. Switch(config)# interface gigabitethernet 1/0/1 ip address ip-address subnet-mask Example: Configures the IP address and IP subnet. Switch(config-if)# ip address 10.1.1.10 255.255.255.0 no ip split-horizon Example: Disables split horizon on the interface. Switch(config-if)# no ip split-horizon end Example: Returns to privileged EXEC mode. Switch(config-if)# end show ip interface interface-id Example: Verifies your entries. Switch# show ip interface gigabitethernet 1/0/1 copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config ConfigurationExampleforSummaryAddressesandSplitHorizon In this example, the major net is 10.0.0.0. The summary address 10.2.0.0 overrides the autosummary address of 10.0.0.0 so that 10.2.0.0 is advertised out interface Gigabit Ethernet port 2, and 10.0.0.0 is not advertised. In the example, if the interface is still in Layer 2 mode (the default), you must enter a no switchport interface configuration command before entering the ip address interface configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1144 Routing Information About OSPF Note If split horizon is enabled, neither autosummary nor interface summary addresses (those configured with the ip summary-address rip router configuration command) are advertised. Switch(config)# router rip Switch(config-router)# interface gigabitethernet1/0/2 Switch(config-if)# ip address 10.1.5.1 255.255.255.0 Switch(config-if)# ip summary-address rip 10.2.0.0 255.255.0.0 Switch(config-if)# no ip split-horizon Switch(config-if)# exit Switch(config)# router rip Switch(config-router)# network 10.0.0.0 Switch(config-router)# neighbor 2.2.2.2 peer-group mygroup Switch(config-router)# end Information About OSPF OSPF is an Interior Gateway Protocol (IGP) designed expressly for IP networks, supporting IP subnetting and tagging of externally derived routing information. OSPF also allows packet authentication and uses IP multicast when sending and receiving packets. The Cisco implementation supports RFC 1253, OSPF management information base (MIB). Note OSPF is supported in IP Base. The Cisco implementation conforms to the OSPF Version 2 specifications with these key features: · Definition of stub areas is supported. · Routes learned through any IP routing protocol can be redistributed into another IP routing protocol. At the intradomain level, this means that OSPF can import routes learned through EIGRP and RIP. OSPF routes can also be exported into RIP. · Plain text and MD5 authentication among neighboring routers within an area is supported. · Configurable routing interface parameters include interface output cost, retransmission interval, interface transmit delay, router priority, router dead and hello intervals, and authentication key. · Virtual links are supported. · Not-so-stubby-areas (NSSAs) per RFC 1587are supported. OSPF typically requires coordination among many internal routers, area border routers (ABRs) connected to multiple areas, and autonomous system boundary routers (ASBRs). The minimum configuration would use all default parameter values, no authentication, and interfaces assigned to areas. If you customize your environment, you must ensure coordinated configuration of all routers. OSPF Nonstop Forwarding The switch or switch stack supports two levels of nonstop forwarding (NSF): Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1145 OSPF NSF Awareness Routing · OSPF NSF Awareness, on page 1146 · OSPF NSF Capability, on page 1146 OSPF NSF Awareness The IP-services feature set supports OSPF NSF Awareness supported for IPv4. When the neighboring router is NSF-capable, the Layer 3 switch continues to forward packets from the neighboring router during the interval between the primary Route Processor (RP) in a router crashing and the backup RP taking over, or while the primary RP is manually reloaded for a non-disruptive software upgrade. This feature cannot be disabled. OSPF NSF Capability The IP services feature set supports the OSPFv2 NSF IETF format in addition to the OSPFv2 NSF Cisco format that is supported in earlier releases. For information about this feature, see NSF--OSPF (RFC 3623 OSPF Graceful Restart): http://www.cisco.com/en/US/docs/ios/ha/configuration/guide/ha-ospf_grrs.html#wp1055692. The IP-services feature set also supports OSPF NSF-capable routing for IPv4 for better convergence and lower traffic loss following a stack master change. When a stack master change occurs in an OSPF NSF-capable stack, the new stack master must do two things to resynchronize its link-state database with its OSFP neighbors: · Release the available OSPF neighbors on the network without resetting the neighbor relationship. · Reacquire the contents of the link-state database for the network. After a stack master change, the new master sends an OSPF NSF signal to neighboring NSF-aware devices. A device recognizes this signal to mean that it should not reset the neighbor relationship with the stack. As the NSF-capable stack master receives signals from other routes on the network, it begins to rebuild its neighbor list. When the neighbor relationships are reestablished, the NSF-capable stack master resynchronizes its database with its NSF-aware neighbors, and routing information is exchanged between the OSPF neighbors. The new stack master uses this routing information to remove stale routes, to update the routing information database (RIB), and to update the forwarding information base (FIB) with the new information. The OSPF protocols then fully converge. Note OSPF NSF requires that all neighbor networking devices be NSF-aware. If an NSF-capable router discovers non-NSF aware neighbors on a network segment, it disables NSF capabilities for that segment. Other network segments where all devices are NSF-aware or NSF-capable continue to provide NSF capabilities. Use the nsf OSPF routing configuration command to enable OSPF NSF routing. Use the show ip ospf privileged EXEC command to verify that it is enabled. For more information, see Cisco Nonstop Forwarding: http://www.cisco.com/en/US/docs/ios/ha/configuration/guide/ha-nonstp_fwdg.html Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1146 Routing OSPF Area Parameters OSPF Area Parameters You can optionally configure several OSPF area parameters. These parameters include authentication for password-based protection against unauthorized access to an area, stub areas, and not-so-stubby-areas (NSSAs). Stub areas are areas into which information on external routes is not sent. Instead, the area border router (ABR) generates a default external route into the stub area for destinations outside the autonomous system (AS). An NSSA does not flood all LSAs from the core into the area, but can import AS external routes within the area by redistribution. Route summarization is the consolidation of advertised addresses into a single summary route to be advertised by other areas. If network numbers are contiguous, you can use the area range router configuration command to configure the ABR to advertise a summary route that covers all networks in the range. Other OSPF Parameters You can optionally configure other OSPF parameters in router configuration mode. · Route summarization: When redistributing routes from other protocols as described in the "Using Route Maps to Redistribute Routing Information" section on page 41-124, each route is advertised individually in an external LSA. To help decrease the size of the OSPF link state database, you can use the summary-address router configuration command to advertise a single router for all the redistributed routes included in a specified network address and mask. · Virtual links: In OSPF, all areas must be connected to a backbone area. You can establish a virtual link in case of a backbone-continuity break by configuring two Area Border Routers as endpoints of a virtual link. Configuration information includes the identity of the other virtual endpoint (the other ABR) and the nonbackbone link that the two routers have in common (the transit area). Virtual links cannot be configured through a stub area. · Default route: When you specifically configure redistribution of routes into an OSPF routing domain, the route automatically becomes an autonomous system boundary router (ASBR). You can force the ASBR to generate a default route into the OSPF routing domain. · Domain Name Server (DNS) names for use in all OSPF show privileged EXEC command displays makes it easier to identify a router than displaying it by router ID or neighbor ID. · Default Metrics: OSPF calculates the OSPF metric for an interface according to the bandwidth of the interface. The metric is calculated as ref-bw divided by bandwidth, where ref is 10 by default, and bandwidth (bw) is specified by the bandwidth interface configuration command. For multiple links with high bandwidth, you can specify a larger number to differentiate the cost on those links. · Administrative distance is a rating of the trustworthiness of a routing information source, an integer between 0 and 255, with a higher value meaning a lower trust rating. An administrative distance of 255 means the routing information source cannot be trusted at all and should be ignored. OSPF uses three different administrative distances: routes within an area (interarea), routes to another area (interarea), and routes from another routing domain learned through redistribution (external). You can change any of the distance values. · Passive interfaces: Because interfaces between two devices on an Ethernet represent only one network segment, to prevent OSPF from sending hello packets for the sending interface, you must configure the sending device to be a passive interface. Both devices can identify each other through the hello packet for the receiving interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1147 LSA Group Pacing Routing · Route calculation timers: You can configure the delay time between when OSPF receives a topology change and when it starts the shortest path first (SPF) calculation and the hold time between two SPF calculations. · Log neighbor changes: You can configure the router to send a syslog message when an OSPF neighbor state changes, providing a high-level view of changes in the router. LSA Group Pacing The OSPF LSA group pacing feature allows the router to group OSPF LSAs and pace the refreshing, check-summing, and aging functions for more efficient router use. This feature is enabled by default with a 4-minute default pacing interval, and you will not usually need to modify this parameter. The optimum group pacing interval is inversely proportional to the number of LSAs the router is refreshing, check-summing, and aging. For example, if you have approximately 10,000 LSAs in the database, decreasing the pacing interval would benefit you. If you have a very small database (40 to 100 LSAs), increasing the pacing interval to 10 to 20 minutes might benefit you slightly. Loopback Interfaces OSPF uses the highest IP address configured on the interfaces as its router ID. If this interface is down or removed, the OSPF process must recalculate a new router ID and resend all its routing information out its interfaces. If a loopback interface is configured with an IP address, OSPF uses this IP address as its router ID, even if other interfaces have higher IP addresses. Because loopback interfaces never fail, this provides greater stability. OSPF automatically prefers a loopback interface over other interfaces, and it chooses the highest IP address among all loopback interfaces. How to Configure OSPF Default OSPF Configuration Table 99: Default OSPF Configuration Feature Interface parameters Default Setting Cost: 1. Retransmit interval: 5 seconds. Transmit delay: 1 second. Priority: 1. Hello interval: 10 seconds. Dead interval: 4 times the hello interval. No authentication. No password specified. MD5 authentication disabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1148 Routing Feature Area Auto cost Default-information originate Default metric Distance OSPF OSPF database filter IP OSPF name lookup Log adjacency changes Neighbor Neighbor database filter Network area Nonstop Forwarding (NSF) awareness NSF capability Router ID Summary address Timers LSA group pacing Timers shortest path first (spf) Default OSPF Configuration Default Setting Authentication type: 0 (no authentication). Default cost: 1. Range: Disabled. Stub: No stub area defined. NSSA: No NSSA area defined. 100 Mb/s. Disabled. When enabled, the default metric setting is 10, and the external route type default is Type 2. Built-in, automatic metric translation, as appropriate for each routing protocol. dist1 (all routes within an area): 110. dist2 (all routes from one area to another): 110. and dist3 (routes from other routing domains): 110. Disabled. All outgoing link-state advertisements (LSAs) are flooded to the interface. Disabled. Enabled. None specified. Disabled. All outgoing LSAs are flooded to the neighbor. Disabled. Enabled. Allows Layer 3 switches to continue forwarding packets from a neighboring NSF-capable router during hardware or software changes. Disabled. Note The switch stack supports OSPF NSF-capable routing for IPv4. No OSPF routing process defined. Disabled. 240 seconds. spf delay: 5 seconds.; spf-holdtime: 10 seconds. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1149 Configuring Basic OSPF Parameters Routing Feature Virtual link Default Setting No area ID or router ID defined. Hello interval: 10 seconds. Retransmit interval: 5 seconds. Transmit delay: 1 second. Dead interval: 40 seconds. Authentication key: no key predefined. Message-digest key (MD5): no key predefined. Configuring Basic OSPF Parameters To enable OSPF, create an OSPF routing process, specify the range of IP addresses to associate with the routing process, and assign area IDs to be associated with that range. For switches running the IP services image, you can configure either the Cisco OSPFv2 NSF format or the IETF OSPFv2 NSF format. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal router ospf process-id Example: Switch(config)# router ospf 15 Enables OSPF routing, and enter router configuration mode. The process ID is an internally used identification parameter that is locally assigned and can be any positive integer. Each OSPF routing process has a unique value. Note OSPF for Routed Access supports only one OSPFv2 and one OSPFv3 instance with a maximum number of 200 dynamically learned routes. Step 3 nsf cisco [enforce global] Example: Switch(config)# nsf cisco enforce global (Optional) Enables Cisco NSF operations for OSPF. The enforce global keyword cancels NSF restart when non-NSF-aware neighboring networking devices are detected. Note Enter the command in Step 3 or Step 4, and go to Step 5. Step 4 nsf ietf [restart-interval seconds] Example: Switch(config)# nsf ietf restart-interval 60 (Optional) Enables IETF NSF operations for OSPF. The restart-interval keyword specifies the length of the graceful restart interval, in seconds. The range is from 1 to 1800. The default is 120. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1150 Routing Configuring OSPF Interfaces Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Note Enter the command in Step 3 or Step 4, and go to Step 5. network address wildcard-mask area area-id Define an interface on which OSPF runs and the area ID Example: for that interface. You can use the wildcard-mask to use a single command to define one or more multiple interfaces to be associated with a specific OSPF area. The area ID can Switch(config)# 20 network 10.1.1.1 255.240.0.0 area be a decimal value or an IP address. end Example: Returns to privileged EXEC mode. Switch(config)# end show ip protocols Example: Verifies your entries. Switch# show ip protocols copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring OSPF Interfaces You can use the ip ospf interface configuration commands to modify interface-specific OSPF parameters. You are not required to modify any of these parameters, but some interface parameters (hello interval, dead interval, and authentication key) must be consistent across all routers in an attached network. If you modify these parameters, be sure all routers in the network have compatible values. Step 1 Step 2 Note The ip ospf interface configuration commands are all optional. Procedure Command or Action configure terminal Example: Switch# configure terminal interface interface-id Example: Purpose Enters global configuration mode. Enters interface configuration mode, and specifies the Layer 3 interface to configure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1151 Configuring OSPF Interfaces Routing Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose Switch(config)# interface gigabitethernet 1/0/1 ip ospf cost Example: (Optional) Explicitly specifies the cost of sending a packet on the interface. Switch(config-if)# ip ospf 8 ip ospf retransmit-interval seconds Example: (Optional) Specifies the number of seconds between link state advertisement transmissions. The range is 1 to 65535 seconds. The default is 5 seconds. Switch(config-if)# ip ospf transmit-interval 10 ip ospf transmit-delay seconds Example: (Optional) Sets the estimated number of seconds to wait before sending a link state update packet. The range is 1 to 65535 seconds. The default is 1 second. Switch(config-if)# ip ospf transmit-delay 2 ip ospf priority number Example: (Optional) Sets priority to help find the OSPF designated router for a network. The range is from 0 to 255. The default is 1. Switch(config-if)# ip ospf priority 5 ip ospf hello-interval seconds Example: Switch(config-if)# ip ospf hello-interval 12 (Optional) Sets the number of seconds between hello packets sent on an OSPF interface. The value must be the same for all nodes on a network. The range is 1 to 65535 seconds. The default is 10 seconds. ip ospf dead-interval seconds Example: Switch(config-if)# ip ospf dead-interval 8 (Optional) Sets the number of seconds after the last device hello packet was seen before its neighbors declare the OSPF router to be down. The value must be the same for all nodes on a network. The range is 1 to 65535 seconds. The default is 4 times the hello interval. ip ospf authentication-key key Example: Switch(config-if)# ip ospf authentication-key password (Optional) Assign a password to be used by neighboring OSPF routers. The password can be any string of keyboard-entered characters up to 8 bytes in length. All neighboring routers on the same network must have the same password to exchange OSPF information. ip ospf message digest-key keyid md5 key (Optional) Enables MDS authentication. Example: · keyid--An identifier from 1 to 255. Switch(config-if)# ip ospf message digest-key 16 md5 your1pass · key--An alphanumeric password of up to 16 bytes. ip ospf database-filter all out Example: (Optional) Block flooding of OSPF LSA packets to the interface. By default, OSPF floods new LSAs over all Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1152 Routing Configuring OSPF Area Parameters Step 12 Step 13 Step 14 Step 15 Command or Action Switch(config-if)# ip ospf database-filter all out Purpose interfaces in the same area, except the interface on which the LSA arrives. end Example: Returns to privileged EXEC mode. Switch(config-if)# end show ip ospf interface [interface-name] Example: Displays OSPF-related interface information. Switch# show ip ospf interface show ip ospf neighbor detail Example: Switch# show ip ospf neighbor detail Displays NSF awareness status of neighbor switch. The output matches one of these examples: · Options is 0x52 LLS Options is 0x1 (LR) When both of these lines appear, the neighbor switch is NSF aware. · Options is 0x42--This means the neighbor switch is not NSF aware. copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Configuring OSPF Area Parameters Before you begin Step 1 Note The OSPF area router configuration commands are all optional. Procedure Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1153 Configuring OSPF Area Parameters Routing Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action router ospf process-id Example: Purpose Enables OSPF routing, and enter router configuration mode. Switch(config)# router ospf 109 area area-id authentication Example: Switch(config-router)# area 1 authentication area area-id authentication message-digest Example: (Optional) Allow password-based protection against unauthorized access to the identified area. The identifier can be either a decimal value or an IP address. (Optional) Enables MD5 authentication on the area. Switch(config-router)# area 1 authentication message-digest area area-id stub [no-summary] Example: Switch(config-router)# area 1 stub area area-id nssa [no-redistribution] [default-information-originate] [no-summary] Example: Switch(config-router)# area 1 nssa default-information-originate (Optional) Define an area as a stub area. The no-summary keyword prevents an ABR from sending summary link advertisements into the stub area. (Optional) Defines an area as a not-so-stubby-area. Every router within the same area must agree that the area is NSSA. Select one of these keywords: · no-redistribution--Select when the router is an NSSA ABR and you want the redistribute command to import routes into normal areas, but not into the NSSA. · default-information-originate--Select on an ABR to allow importing type 7 LSAs into the NSSA. · no-redistribution--Select to not send summary LSAs into the NSSA. area area-id range address mask Example: (Optional) Specifies an address range for which a single route is advertised. Use this command only with area border routers. Switch(config-router)# area 1 range 255.240.0.0 end Example: Returns to privileged EXEC mode. Switch(config-router)# end show ip ospf [process-id] Example: Displays information about the OSPF routing process in general or for a specific process ID to verify configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1154 Routing Configuring Other OSPF Parameters Step 10 Step 11 Command or Action Switch# show ip ospf show ip ospf [process-id [area-id]] database Example: Switch# show ip osfp database copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Displays lists of information related to the OSPF database for a specific router. (Optional) Saves your entries in the configuration file. Configuring Other OSPF Parameters Step 1 Step 2 Step 3 Step 4 Step 5 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router ospf process-id Example: Enables OSPF routing, and enter router configuration mode. Switch(config)# router ospf 10 summary-address address mask Example: Switch(config)# summary-address 10.1.1.1 255.255.255.0 area area-id virtual-link router-id [hello-interval seconds] [retransmit-interval seconds] [trans] [[authentication-key key] | message-digest-key keyid md5 key]] Example: (Optional) Specifies an address and IP subnet mask for redistributed routes so that only one summary route is advertised. (Optional) Establishes a virtual link and set its parameters. See the "Configuring OSPF Interfaces" section on page 41-39 for parameter definitions and Table 41-5 on page 41-35 for virtual link defaults. Switch(config)# area 2 virtual-link 192.168.255.1 hello-interval 5 default-information originate [always] [metric metric-value] [metric-type type-value] [route-map map-name] (Optional) Forces the ASBR to generate a default route into the OSPF routing domain. Parameters are all optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1155 Configuring Other OSPF Parameters Routing Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action Example: Purpose Switch(config)# default-information originate metric 100 metric-type 1 ip ospf name-lookup Example: (Optional) Configures DNS name lookup. The default is disabled. Switch(config)# ip ospf name-lookup ip auto-cost reference-bandwidth ref-bw Example: (Optional) Specifies an address range for which a single route will be advertised. Use this command only with area border routers. Switch(config)# ip auto-cost reference-bandwidth 5 distance ospf {[inter-area dist1] [inter-area dist2] [external dist3]} Example: (Optional) Changes the OSPF distance values. The default distance for each type of route is 110. The range is 1 to 255. Switch(config)# distance ospf inter-area 150 passive-interface type number Example: (Optional) Suppresses the sending of hello packets through the specified interface. Switch(config)# passive-interface gigabitethernet 1/0/6 timers throttle spf spf-delay spf-holdtime spf-wait (Optional) Configures route calculation timers. Example: Switch(config)# timers throttle spf 200 100 100 · spf-delay--Delay between receiving a change to SPF calculation. The range is from 1 to 600000 miliseconds. · spf-holdtime--Delay between first and second SPF calculation. The range is form 1 to 600000 in milliseconds. · spf-wait--Maximum wait time in milliseconds for SPF calculations. The range is from 1 to 600000 in milliseconds. ospf log-adj-changes Example: (Optional) Sends syslog message when a neighbor state changes. Switch(config)# ospf log-adj-changes end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1156 Routing Changing LSA Group Pacing Step 13 Step 14 Command or Action Switch(config)# end show ip ospf [process-id [area-id]] database Example: Switch# show ip ospf database copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Displays lists of information related to the OSPF database for a specific router. For some of the keyword options, see the "Monitoring OSPF" section on page 41-47. (Optional) Saves your entries in the configuration file. Changing LSA Group Pacing Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router ospf process-id Example: Enables OSPF routing, and enter router configuration mode. Switch(config)# router ospf 25 timers lsa-group-pacing seconds Example: Changes the group pacing of LSAs. Switch(config-router)# timers lsa-group-pacing 15 end Example: Returns to privileged EXEC mode. Switch(config)# end show running-config Example: Verifies your entries. Switch# show running-config copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1157 Configuring a Loopback Interface Routing Command or Action Switch# copy running-config startup-config Configuring a Loopback Interface Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Procedure Command or Action configure terminal Example: Switch# configure terminal interface loopback 0 Example: Switch(config)# interface loopback 0 ip address address mask Example: Switch(config-if)# ip address 10.1.1.5 255.255.240.0 end Example: Switch(config-if)# end show ip interface Example: Switch# show ip interface copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Purpose Enters global configuration mode. Creates a loopback interface, and enter interface configuration mode. Assign an IP address to this interface. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Monitoring OSPF You can display specific statistics such as the contents of IP routing tables, caches, and databases. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1158 Routing Configuration Examples for OSPF Table 100: Show IP OSPF Statistics Commands show ip ospf [process-id] Displays general information about OSPF routing processes. show ip ospf [process-id] database [router] [link-state-id] Displays lists of information related to the OSPF database. show ip ospf [process-id] database [router] [self-originate] show ip ospf [process-id] database [router] [adv-router [ip-address]] show ip ospf [process-id] database [network] [link-state-id] show ip ospf [process-id] database [summary] [link-state-id] show ip ospf [process-id] database [asbr-summary] [link-state-id] show ip ospf [process-id] database [external] [link-state-id] show ip ospf [process-id area-id] database [database-summary] show ip ospf border-routes Displays the internal OSPF routing ABR and ASBR table entries. show ip ospf interface [interface-name] Displays OSPF-related interface information. show ip ospf neighbor [interface-name] [neighbor-id] Displays OSPF interface neighbor information. detail show ip ospf virtual-links Displays OSPF-related virtual links information. Configuration Examples for OSPF Example: Configuring Basic OSPF Parameters This example shows how to configure an OSPF routing process and assign it a process number of 109: Switch(config)# router ospf 109 Switch(config-router)# network 131.108.0.0 255.255.255.0 area 24 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1159 Information About EIGRP Routing Information About EIGRP Enhanced IGRP (EIGRP) is a Cisco proprietary enhanced version of the IGRP. EIGRP uses the same distance vector algorithm and distance information as IGRP; however, the convergence properties and the operating efficiency of EIGRP are significantly improved. The convergence technology employs an algorithm referred to as the Diffusing Update Algorithm (DUAL), which guarantees loop-free operation at every instant throughout a route computation and allows all devices involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in recomputations. IP EIGRP provides increased network width. With RIP, the largest possible width of your network is 15 hops. Because the EIGRP metric is large enough to support thousands of hops, the only barrier to expanding the network is the transport-layer hop counter. EIGRP increments the transport control field only when an IP packet has traversed 15 routers and the next hop to the destination was learned through EIGRP. When a RIP route is used as the next hop to the destination, the transport control field is incremented as usual. EIGRP Features EIGRP offers these features: · Fast convergence. · Incremental updates when the state of a destination changes, instead of sending the entire contents of the routing table, minimizing the bandwidth required for EIGRP packets. · Less CPU usage because full update packets need not be processed each time they are received. · Protocol-independent neighbor discovery mechanism to learn about neighboring routers. · Variable-length subnet masks (VLSMs). · Arbitrary route summarization. · EIGRP scales to large networks. EIGRP Components EIGRP has these four basic components: · Neighbor discovery and recovery is the process that routers use to dynamically learn of other routers on their directly attached networks. Routers must also discover when their neighbors become unreachable or inoperative. Neighbor discovery and recovery is achieved with low overhead by periodically sending small hello packets. As long as hello packets are received, the Cisco IOS software can learn that a neighbor is alive and functioning. When this status is determined, the neighboring routers can exchange routing information. · The reliable transport protocol is responsible for guaranteed, ordered delivery of EIGRP packets to all neighbors. It supports intermixed transmission of multicast and unicast packets. Some EIGRP packets must be sent reliably, and others need not be. For efficiency, reliability is provided only when necessary. For example, on a multiaccess network that has multicast capabilities (such as Ethernet), it is not necessary to send hellos reliably to all neighbors individually. Therefore, EIGRP sends a single multicast hello with an indication in the packet informing the receivers that the packet need not be acknowledged. Other Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1160 Routing EIGRP Nonstop Forwarding types of packets (such as updates) require acknowledgment, which is shown in the packet. The reliable transport has a provision to send multicast packets quickly when there are unacknowledged packets pending. Doing so helps ensure that convergence time remains low in the presence of varying speed links. · The DUAL finite state machine embodies the decision process for all route computations. It tracks all routes advertised by all neighbors. DUAL uses the distance information (known as a metric) to select efficient, loop-free paths. DUAL selects routes to be inserted into a routing table based on feasible successors. A successor is a neighboring router used for packet forwarding that has a least-cost path to a destination that is guaranteed not to be part of a routing loop. When there are no feasible successors, but there are neighbors advertising the destination, a recomputation must occur. This is the process whereby a new successor is determined. The amount of time it takes to recompute the route affects the convergence time. Recomputation is processor-intensive; it is advantageous to avoid recomputation if it is not necessary. When a topology change occurs, DUAL tests for feasible successors. If there are feasible successors, it uses any it finds to avoid unnecessary recomputation. · The protocol-dependent modules are responsible for network layer protocol-specific tasks. An example is the IP EIGRP module, which is responsible for sending and receiving EIGRP packets that are encapsulated in IP. It is also responsible for parsing EIGRP packets and informing DUAL of the new information received. EIGRP asks DUAL to make routing decisions, but the results are stored in the IP routing table. EIGRP is also responsible for redistributing routes learned by other IP routing protocols. Note To enable EIGRP, the switch or stack master must be running the IP services feature set. EIGRP Nonstop Forwarding The switch stack supports two levels of EIGRP nonstop forwarding: · EIGRP NSF Awareness · EIGRP NSF Capability EIGRP NSF Awareness The IP-services feature set supports EIGRP NSF Awareness for IPv4. When the neighboring router is NSF-capable, the Layer 3 switch continues to forward packets from the neighboring router during the interval between the primary Route Processor (RP) in a router failing and the backup RP taking over, or while the primary RP is manually reloaded for a nondisruptive software upgrade. This feature cannot be disabled. For more information on this feature, see the "EIGRP Nonstop Forwarding (NSF) Awareness" section of the Cisco IOS IP Routing Protocols Configuration Guide, Release 12.4. EIGRP NSF Capability The IP services feature set supports EIGRP Cisco NSF routing to speed up convergence and to eliminate traffic loss after a stack master change. For details about this NSF capability, see the "Configuring Nonstop Forwarding" chapter in the High Availability Configuration Guide, Cisco IOS XE Release 3S: http://www.cisco.com/en/US/docs/ios/ios_xe/ha/configuration/guide/ha-nonstp_fwdg_xe.html. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1161 EIGRP Stub Routing Routing The IP-services feature set also supports EIGRP NSF-capable routing for IPv4 for better convergence and lower traffic loss following a stack master change. When an EIGRP NSF-capable stack master restarts or a new stack master starts up and NSF restarts, the switch has no neighbors, and the topology table is empty. The switch must bring up the interfaces, reacquire neighbors, and rebuild the topology and routing tables without interrupting the traffic directed toward the switch stack. EIGRP peer routers maintain the routes learned from the new stack master and continue forwarding traffic through the NSF restart process. To prevent an adjacency reset by the neighbors, the new stack master uses a new Restart (RS) bit in the EIGRP packet header to show the restart. When the neighbor receives this, it synchronizes the stack in its peer list and maintains the adjacency with the stack. The neighbor then sends its topology table to the stack master with the RS bit set to show that it is NSF-aware and is aiding the new stack master. If at least one of the stack peer neighbors is NSF-aware, the stack master receives updates and rebuilds its database. Each NSF-aware neighbor sends an end of table (EOT) marker in the last update packet to mark the end of the table content. The stack master recognizes the convergence when it receives the EOT marker, and it then begins sending updates. When the stack master has received all EOT markers from its neighbors or when the NSF converge timer expires, EIGRP notifies the routing information database (RIB) of convergence and floods its topology table to all NSF-aware peers. EIGRP Stub Routing The EIGRP stub routing feature, available in all feature sets, reduces resource utilization by moving routed traffic closer to the end user. Note The IP base feature set contains EIGRP stub routing capability, which only advertises connected or summary routes from the routing tables to other switches in the network. The switch uses EIGRP stub routing at the access layer to eliminate the need for other types of routing advertisements. For enhanced capability and complete EIGRP routing, the switch must be running the IP services feature set. On a switch running the IP base feature set, if you try to configure multi-VRF-CE and EIGRP stub routing at the same time, the configuration is not allowed. IPv6 EIGRP stub routing is not supported with the IP base feature set. In a network using EIGRP stub routing, the only allowable route for IP traffic to the user is through a switch that is configured with EIGRP stub routing. The switch sends the routed traffic to interfaces that are configured as user interfaces or are connected to other devices. When using EIGRP stub routing, you need to configure the distribution and remote routers to use EIGRP and to configure only the switch as a stub. Only specified routes are propagated from the switch. The switch responds to all queries for summaries, connected routes, and routing updates. Any neighbor that receives a packet informing it of the stub status does not query the stub router for any routes, and a router that has a stub peer does not query that peer. The stub router depends on the distribution router to send the proper updates to all peers. In Figure 41-4, switch B is configured as an EIGRP stub router. Switches A and C are connected to the rest of the WAN. Switch B advertises connected, static, redistribution, and summary routes to switch A and C. Switch B does not advertise any routes learned from switch A (and the reverse). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1162 Routing Figure 66: EIGRP Stub Router Configuration How to Configure EIGRP For more information about EIGRP stub routing, see "Configuring EIGRP Stub Routing" section of the Cisco IOS IP Configuration Guide, Volume 2 of 3: Routing Protocols, Release 12.4. How to Configure EIGRP To create an EIGRP routing process, you must enable EIGRP and associate networks. EIGRP sends updates to the interfaces in the specified networks. If you do not specify an interface network, it is not advertised in any EIGRP update. Note If you have routers on your network that are configured for IGRP, and you want to change to EIGRP, you must designate transition routers that have both IGRP and EIGRP configured. In these cases, perform Steps 1 through 3 in the next section and also see the "Configuring Split Horizon" section. You must use the same AS number for routes to be automatically redistributed. Default EIGRP Configuration Table 101: Default EIGRP Configuration Feature Auto summary Default-information Default Setting Disabled. Exterior routes are accepted and default information is passed between EIGRP processes when doing redistribution. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1163 Default EIGRP Configuration Feature Default metric Distance EIGRP log-neighbor changes IP authentication key-chain IP authentication mode IP bandwidth-percent IP hello interval IP hold-time IP split-horizon IP summary address Metric weights Network Nonstop Forwarding (NSF) Awareness NSF capability Routing Default Setting Only connected routes and interface static routes can be redistributed without a default metric. The metric includes: · Bandwidth: 0 or greater kb/s. · Delay (tens of microseconds): 0 or any positive number that is a multiple of 39.1 nanoseconds. · Reliability: any number between 0 and 255 (255 means 100 percent reliability). · Loading: effective bandwidth as a number between 0 and 255 (255 is 100 percent loading). · MTU: maximum transmission unit size of the route in bytes. 0 or any positive integer. Internal distance: 90. External distance: 170. Disabled. No adjacency changes logged. No authentication provided. No authentication provided. 50 percent. For low-speed nonbroadcast multiaccess (NBMA) networks: 60 seconds; all other networks: 5 seconds. For low-speed NBMA networks: 180 seconds; all other networks: 15 seconds. Enabled. No summary aggregate addresses are predefined. tos: 0; k1 and k3: 1; k2, k4, and k5: 0 None specified. Enabled for IPv4 on switches running the IP services feature set. Allows Layer 3 switches to continue forwarding packets from a neighboring NSF-capable router during hardware or software changes. Disabled. Note The switch supports EIGRP NSF-capable routing for IPv4. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1164 Routing Configuring Basic EIGRP Parameters Feature Offset-list Router EIGRP Set metric Traffic-share Variance Configuring Basic EIGRP Parameters Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Procedure Command or Action configure terminal Example: Switch# configure terminal router eigrp autonomous-system Example: Switch(config)# router eigrp 10 nsf Example: Switch(config)# nsf network network-number Example: Switch(config)# network 192.168.0.0 eigrp log-neighbor-changes Example: Switch(config)# eigrp log-neighbor-changes metric weights tos k1 k2 k3 k4 k5 Example: Switch(config)# metric weights 0 2 0 2 0 0 Default Setting Disabled. Disabled. No metric set in the route map. Distributed proportionately to the ratios of the metrics. 1 (equal-cost load-balancing). Purpose Enters global configuration mode. Enables an EIGRP routing process, and enter router configuration mode. The AS number identifies the routes to other EIGRP routers and is used to tag routing information. (Optional) Enables EIGRP NSF. Enter this command on the stack master and on all of its peers. Associate networks with an EIGRP routing process. EIGRP sends updates to the interfaces in the specified networks. (Optional) Enables logging of EIGRP neighbor changes to monitor routing system stability. (Optional) Adjust the EIGRP metric. Although the defaults have been carefully set to provide excellent operation in most networks, you can adjust them. Setting metrics is complex and is not recommended without guidance from an experienced network designer. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1165 Configuring EIGRP Interfaces Routing Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action offset-list [access-list number | name] {in | out} offset [type number] Example: Switch(config)# offset-list 21 out 10 auto-summary Example: Purpose (Optional) Applies an offset list to routing metrics to increase incoming and outgoing metrics to routes learned through EIGRP. You can limit the offset list with an access list or an interface. (Optional) Enables automatic summarization of subnet routes into network-level routes. Switch(config)# auto-summary ip summary-address eigrp autonomous-system-number (Optional) Configures a summary aggregate. address mask Example: Switch(config)# ip summary-address eigrp 1 192.168.0.0 255.255.0.0 end Example: Returns to privileged EXEC mode. Switch(config)# end show ip protocols Example: Switch# show ip protocols copy running-config startup-config Example: Verifies your entries. For NSF awareness, the output shows: *** IP Routing is NSF aware *** EIGRP NSF enabled (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Configuring EIGRP Interfaces Other optional EIGRP parameters can be configured on an interface basis. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1166 Routing Configuring EIGRP Interfaces Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action interface interface-id Example: Purpose Enters interface configuration mode, and specifies the Layer 3 interface to configure. Switch(config)# interface gigabitethernet 1/0/1 ip bandwidth-percent eigrp percent Example: (Optional) Configures the percentage of bandwidth that can be used by EIGRP on an interface. The default is 50 percent. Switch(config-if)# ip bandwidth-percent eigrp 60 ip summary-address eigrp autonomous-system-number (Optional) Configures a summary aggregate address for a address mask specified interface (not usually necessary if auto-summary Example: is enabled). Switch(config-if)# ip summary-address eigrp 109 192.161.0.0 255.255.0.0 ip hello-interval eigrp autonomous-system-number seconds Example: (Optional) Change the hello time interval for an EIGRP routing process. The range is 1 to 65535 seconds. The default is 60 seconds for low-speed NBMA networks and 5 seconds for all other networks. Switch(config-if)# ip hello-interval eigrp 109 10 ip hold-time eigrp autonomous-system-number seconds Example: Switch(config-if)# ip hold-time eigrp 109 40 (Optional) Change the hold time interval for an EIGRP routing process. The range is 1 to 65535 seconds. The default is 180 seconds for low-speed NBMA networks and 15 seconds for all other networks. Do not adjust the hold time without consulting Cisco technical support. no ip split-horizon eigrp autonomous-system-number Example: (Optional) Disables split horizon to allow route information to be advertised by a router out any interface from which that information originated. Switch(config-if)# no ip split-horizon eigrp 109 end Example: Returns to privileged EXEC mode. Switch(config-if)# end show ip eigrp interface Example: Displays which interfaces EIGRP is active on and information about EIGRP relating to those interfaces. Switch# show ip eigrp interface Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1167 Configuring EIGRP Route Authentication Routing Step 10 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Configuring EIGRP Route Authentication EIGRP route authentication provides MD5 authentication of routing updates from the EIGRP routing protocol to prevent the introduction of unauthorized or false routing messages from unapproved sources. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Step 3 Switch(config)# interface gigabitethernet 1/0/1 ip authentication mode eigrp autonomous-system md5 Enables MD5 authentication in IP EIGRP packets. Example: Step 4 Switch(config-if)# ip authentication mode eigrp 104 md5 ip authentication key-chain eigrp autonomous-system key-chain Example: Enables authentication of IP EIGRP packets. Step 5 Switch(config-if)# ip authentication key-chain eigrp 105 chain1 exit Example: Returns to global configuration mode. Step 6 Switch(config-if)# exit key chain name-of-chain Example: Identify a key chain and enter key-chain configuration mode. Match the name configured in Step 4. Switch(config)# key chain chain1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1168 Routing Monitoring and Maintaining EIGRP Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action key number Example: Purpose In key-chain configuration mode, identify the key number. Switch(config-keychain)# key 1 key-string text Example: In key-chain key configuration mode, identify the key string. Switch(config-keychain-key)# key-string key1 accept-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key seconds} can be received. Example: Switch(config-keychain-key)# accept-lifetime 13:30:00 Jan 25 2011 duration 7200 The start-time and end-time syntax can be either hh:mm:ss Month date year or hh:mm:ss date Month year. The default is forever with the default start-time and the earliest acceptable date as January 1, 1993. The default end-time and duration is infinite. send-lifetime start-time {infinite | end-time | duration seconds} Example: Switch(config-keychain-key)# send-lifetime 14:00:00 Jan 25 2011 duration 3600 (Optional) Specifies the time period during which the key can be sent. The start-time and end-time syntax can be either hh:mm:ss Month date year or hh:mm:ss date Month year. The default is forever with the default start-time and the earliest acceptable date as January 1, 1993. The default end-time and duration is infinite. end Example: Returns to privileged EXEC mode. Switch(config-keychain-key)# exit show key chain Example: Displays authentication key information. Switch# show key chain copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Monitoring and Maintaining EIGRP You can delete neighbors from the neighbor table. You can also display various EIGRP routing statistics. Table 41-8 lists the privileged EXEC commands for deleting neighbors and displaying statistics. For Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1169 Information About BGP Routing explanations of fields in the resulting display, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4. Table 102: IP EIGRP Clear and Show Commands clear ip eigrp neighbors [if-address | interface] Deletes neighbors from the neighbor table. show ip eigrp interface [interface] [as number] Displays information about interfaces configured for EIGRP. show ip eigrp neighbors [type-number] Displays EIGRP discovered neighbors. show ip eigrp topology Displays the EIGRP topology table for a given [autonomous-system-number] | [[ip-address] mask]] process. show ip eigrp traffic [autonomous-system-number] Displays the number of packets sent and received for all or a specified EIGRP process. Information About BGP The Border Gateway Protocol (BGP) is an exterior gateway protocol used to set up an interdomain routing system that guarantees the loop-free exchange of routing information between autonomous systems. Autonomous systems are made up of routers that operate under the same administration and that run Interior Gateway Protocols (IGPs), such as RIP or OSPF, within their boundaries and that interconnect by using an Exterior Gateway Protocol (EGP). BGP Version 4 is the standard EGP for interdomain routing in the Internet. The protocol is defined in RFCs 1163, 1267, and 1771. You can find detailed information about BGP in Internet Routing Architectures, published by Cisco Press, and in the "Configuring BGP" chapter in the Cisco IP and IP Routing Configuration Guide. For details about BGP commands and keywords, see the "IP Routing Protocols" part of the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols . BGP Network Topology Routers that belong to the same autonomous system (AS) and that exchange BGP updates run internal BGP (IBGP), and routers that belong to different autonomous systems and that exchange BGP updates run external BGP (EBGP). Most configuration commands are the same for configuring EBGP and IBGP. The difference is that the routing updates are exchanged either between autonomous systems (EBGP) or within an AS (IBGP). Figure 41-5 shows a network that is running both EBGP and IBGP. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1170 Routing Figure 67: EBGP, IBGP, and Multiple Autonomous Systems BGP Network Topology Before exchanging information with an external AS, BGP ensures that networks within the AS can be reached by defining internal BGP peering among routers within the AS and by redistributing BGP routing information to IGPs that run within the AS, such as IGRP and OSPF. Routers that run a BGP routing process are often referred to as BGP speakers. BGP uses the Transmission Control Protocol (TCP) as its transport protocol (specifically port 179). Two BGP speakers that have a TCP connection to each other for exchanging routing information are known as peers or neighbors. In Figure 41-5, Routers A and B are BGP peers, as are Routers B and C and Routers C and D. The routing information is a series of AS numbers that describe the full path to the destination network. BGP uses this information to construct a loop-free map of autonomous systems. The network has these characteristics: · Routers A and B are running EBGP, and Routers B and C are running IBGP. Note that the EBGP peers are directly connected and that the IBGP peers are not. As long as there is an IGP running that allows the two neighbors to reach one another, IBGP peers do not have to be directly connected. · All BGP speakers within an AS must establish a peer relationship with each other. That is, the BGP speakers within an AS must be fully meshed logically. BGP4 provides two techniques that reduce the requirement for a logical full mesh: confederations and route reflectors. · AS 200 is a transit AS for AS 100 and AS 300--that is, AS 200 is used to transfer packets between AS 100 and AS 300. BGP peers initially exchange their full BGP routing tables and then send only incremental updates. BGP peers also exchange keepalive messages (to ensure that the connection is up) and notification messages (in response to errors or special conditions). In BGP, each route consists of a network number, a list of autonomous systems that information has passed through (the autonomous system path), and a list of other path attributes. The primary function of a BGP system is to exchange network reachability information, including information about the list of AS paths, with other BGP systems. This information can be used to determine AS connectivity, to prune routing loops, and to enforce AS-level policy decisions. A router or switch running Cisco IOS does not select or use an IBGP route unless it has a route available to the next-hop router and it has received synchronization from an IGP (unless IGP synchronization is disabled). When multiple routes are available, BGP bases its path selection on attribute values. See the "Configuring BGP Decision Attributes" section for information about BGP attributes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1171 Nonstop Forwarding Awareness Routing BGP Version 4 supports classless interdomain routing (CIDR) so you can reduce the size of your routing tables by creating aggregate routes, resulting in supernets. CIDR eliminates the concept of network classes within BGP and supports the advertising of IP prefixes. Nonstop Forwarding Awareness The BGP NSF Awareness feature is supported for IPv4 in the IP services feature set. To enable this feature with BGP routing, you need to enable Graceful Restart. When the neighboring router is NSF-capable, and this feature is enabled, the Layer 3 switch continues to forward packets from the neighboring router during the interval between the primary Route Processor (RP) in a router failing and the backup RP taking over, or while the primary RP is manually reloaded for a nondisruptive software upgrade. For more information, see the "BGP Nonstop Forwarding (NSF) Awareness" section of the Cisco IOS IP Routing Protocols Configuration Guide, Release 12.4. Information About BGP Routing To enable BGP routing, you establish a BGP routing process and define the local network. Because BGP must completely recognize the relationships with its neighbors, you must also specify a BGP neighbor. BGP supports two kinds of neighbors: internal and external. Internal neighbors are in the same AS; external neighbors are in different autonomous systems. External neighbors are usually adjacent to each other and share a subnet, but internal neighbors can be anywhere in the same AS. The switch supports the use of private AS numbers, usually assigned by service providers and given to systems whose routes are not advertised to external neighbors. The private AS numbers are from 64512 to 65535. You can configure external neighbors to remove private AS numbers from the AS path by using the neighbor remove-private-as router configuration command. Then when an update is passed to an external neighbor, if the AS path includes private AS numbers, these numbers are dropped. If your AS will be passing traffic through it from another AS to a third AS, it is important to be consistent about the routes it advertises. If BGP advertised a route before all routers in the network had learned about the route through the IGP, the AS might receive traffic that some routers could not yet route. To prevent this from happening, BGP must wait until the IGP has propagated information across the AS so that BGP is synchronized with the IGP. Synchronization is enabled by default. If your AS does not pass traffic from one AS to another AS, or if all routers in your autonomous systems are running BGP, you can disable synchronization, which allows your network to carry fewer routes in the IGP and allows BGP to converge more quickly. Routing Policy Changes Routing policies for a peer include all the configurations that might affect inbound or outbound routing table updates. When you have defined two routers as BGP neighbors, they form a BGP connection and exchange routing information. If you later change a BGP filter, weight, distance, version, or timer, or make a similar configuration change, you must reset the BGP sessions so that the configuration changes take effect. There are two types of reset, hard reset and soft reset. Cisco IOS Releases 12.1 and later support a soft reset without any prior configuration. To use a soft reset without preconfiguration, both BGP peers must support the soft route refresh capability, which is advertised in the OPEN message sent when the peers establish a TCP session. A soft reset allows the dynamic exchange of route refresh requests and routing information between BGP routers and the subsequent re-advertisement of the respective outbound routing table. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1172 Routing BGP Decision Attributes · When soft reset generates inbound updates from a neighbor, it is called dynamic inbound soft reset. · When soft reset sends a set of updates to a neighbor, it is called outbound soft reset. A soft inbound reset causes the new inbound policy to take effect. A soft outbound reset causes the new local outbound policy to take effect without resetting the BGP session. As a new set of updates is sent during outbound policy reset, a new inbound policy can also take effect. Table 41-10 lists the advantages and disadvantages hard reset and soft reset. Table 103: Advantages and Disadvantages of Hard and Soft Resets Type of Reset Hard reset Outbound soft reset Dynamic inbound soft reset Advantages Disadvantages No memory overhead The prefixes in the BGP, IP, and FIB tables provided by the neighbor are lost. Not recommended. No configuration, no storing of Does not reset inbound routing routing table updates table updates. Does not clear the BGP session and Both BGP routers must support the cache route refresh capability (in Cisco Does not require storing of routing IOS Release 12.1 and later). table updates and has no memory overhead BGP Decision Attributes When a BGP speaker receives updates from multiple autonomous systems that describe different paths to the same destination, it must choose the single best path for reaching that destination. When chosen, the selected path is entered into the BGP routing table and propagated to its neighbors. The decision is based on the value of attributes that the update contains and other BGP-configurable factors. When a BGP peer learns two EBGP paths for a prefix from a neighboring AS, it chooses the best path and inserts that path in the IP routing table. If BGP multipath support is enabled and the EBGP paths are learned from the same neighboring autonomous systems, instead of a single best path, multiple paths are installed in the IP routing table. Then, during packet switching, per-packet or per-destination load-balancing is performed among the multiple paths. The maximum-paths router configuration command controls the number of paths allowed. These factors summarize the order in which BGP evaluates the attributes for choosing the best path: If the path specifies a next hop that is inaccessible, drop the update. The BGP next-hop attribute, automatically determined by the software, is the IP address of the next hop that is going to be used to reach a destination. For EBGP, this is usually the IP address of the neighbor specified by the neighbor remote-as router configuration command. You can disable next-hop processing by using route maps or the neighbor next-hop-self router configuration command. 1. Prefer the path with the largest weight (a Cisco proprietary parameter). The weight attribute is local to the router and not propagated in routing updates. By default, the weight attribute is 32768 for paths that the router originates and zero for other paths. Routes with the largest weight are preferred. You can use access lists, route maps, or the neighbor weight router configuration command to set weights. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1173 Route Maps Routing 2. Prefer the route with the highest local preference. Local preference is part of the routing update and exchanged among routers in the same AS. The default value of the local preference attribute is 100. You can set local preference by using the bgp default local-preference router configuration command or by using a route map. 3. Prefer the route that was originated by BGP running on the local router. 4. Prefer the route with the shortest AS path. 5. Prefer the route with the lowest origin type. An interior route or IGP is lower than a route learned by EGP, and an EGP-learned route is lower than one of unknown origin or learned in another way. 6. Prefer the route with the lowest multi -exit discriminator (MED) metric attribute if the neighboring AS is the same for all routes considered. You can configure the MED by using route maps or by using the default-metric router configuration command. When an update is sent to an IBGP peer, the MED is included. 7. Prefer the external (EBGP) path over the internal (IBGP) path. 8. Prefer the route that can be reached through the closest IGP neighbor (the lowest IGP metric). This means that the router will prefer the shortest internal path within the AS to reach the destination (the shortest path to the BGP next-hop). 9. If the following conditions are all true, insert the route for this path into the IP routing table: Both the best route and this route are external. Both the best route and this route are from the same neighboring autonomous system. maximum-paths is enabled. 10. If multipath is not enabled, prefer the route with the lowest IP address value for the BGP router ID. The router ID is usually the highest IP address on the router or the loopback (virtual) address, but might be implementation-specific. Route Maps Within BGP, route maps can be used to control and to modify routing information and to define the conditions by which routes are redistributed between routing domains. See the "Using Route Maps to Redistribute Routing Information" section on page 41-124 for more information about route maps. Each route map has a name that identifies the route map (map tag) and an optional sequence number. BGP Filtering You can filter BGP advertisements by using AS-path filters, such as the as-path access-list global configuration command and the neighbor filter-list router configuration command. You can also use access lists with the neighbor distribute-list router configuration command. Distribute-list filters are applied to network numbers. See the "Controlling Advertising and Processing in Routing Updates" section on page 41-135 for information about the distribute-list command. You can use route maps on a per-neighbor basis to filter updates and to modify various attributes. A route map can be applied to either inbound or outbound updates. Only the routes that pass the route map are sent or accepted in updates. On both inbound and outbound updates, matching is supported based on AS path, community, and network numbers. Autonomous system path matching requires the match as-path access-list Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1174 Routing Prefix List for BGP Filtering route-map command, community based matching requires the match community-list route-map command, and network-based matching requires the ip access-list global configuration command. Prefix List for BGP Filtering You can use prefix lists as an alternative to access lists in many BGP route filtering commands, including the neighbor distribute-list router configuration command. The advantages of using prefix lists include performance improvements in loading and lookup of large lists, incremental update support, easier CLI configuration, and greater flexibility. Filtering by a prefix list involves matching the prefixes of routes with those listed in the prefix list, as when matching access lists. When there is a match, the route is used. Whether a prefix is permitted or denied is based upon these rules: · An empty prefix list permits all prefixes. · An implicit deny is assumed if a given prefix does not match any entries in a prefix list. · When multiple entries of a prefix list match a given prefix, the sequence number of a prefix list entry identifies the entry with the lowest sequence number. By default, sequence numbers are generated automatically and incremented in units of five. If you disable the automatic generation of sequence numbers, you must specify the sequence number for each entry. You can specify sequence values in any increment. If you specify increments of one, you cannot insert additional entries into the list; if you choose very large increments, you might run out of values. BGP Community Filtering One way that BGP controls the distribution of routing information based on the value of the COMMUNITIES attribute. The attribute is a way to groups destinations into communities and to apply routing decisions based on the communities. This method simplifies configuration of a BGP speaker to control distribution of routing information. A community is a group of destinations that share some common attribute. Each destination can belong to multiple communities. AS administrators can define to which communities a destination belongs. By default, all destinations belong to the general Internet community. The community is identified by the COMMUNITIES attribute, an optional, transitive, global attribute in the numerical range from 1 to 4294967200. These are some predefined, well-known communities: · internet--Advertise this route to the Internet community. All routers belong to it. · no-export--Do not advertise this route to EBGP peers. · no-advertise--Do not advertise this route to any peer (internal or external). · local-as--Do not advertise this route to peers outside the local autonomous system. Based on the community, you can control which routing information to accept, prefer, or distribute to other neighbors. A BGP speaker can set, append, or modify the community of a route when learning, advertising, or redistributing routes. When routes are aggregated, the resulting aggregate has a COMMUNITIES attribute that contains all communities from all the initial routes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1175 BGP Neighbors and Peer Groups Routing You can use community lists to create groups of communities to use in a match clause of a route map. As with an access list, a series of community lists can be created. Statements are checked until a match is found. As soon as one statement is satisfied, the test is concluded. To set the COMMUNITIES attribute and match clauses based on communities, see the match community-list and set community route-map configuration commands in the "Using Route Maps to Redistribute Routing Information" section. BGP Neighbors and Peer Groups Often many BGP neighbors are configured with the same update policies (that is, the same outbound route maps, distribute lists, filter lists, update source, and so on). Neighbors with the same update policies can be grouped into peer groups to simplify configuration and to make updating more efficient. When you have configured many peers, we recommend this approach. To configure a BGP peer group, you create the peer group, assign options to the peer group, and add neighbors as peer group members. You configure the peer group by using the neighbor router configuration commands. By default, peer group members inherit all the configuration options of the peer group, including the remote-as (if configured), version, update-source, out-route-map, out-filter-list, out-dist-list, minimum-advertisement-interval, and next-hop-self. All peer group members also inherit changes made to the peer group. Members can also be configured to override the options that do not affect outbound updates. Aggregate Routes Classless interdomain routing (CIDR) enables you to create aggregate routes (or supernets) to minimize the size of routing tables. You can configure aggregate routes in BGP either by redistributing an aggregate route into BGP or by creating an aggregate entry in the BGP routing table. An aggregate address is added to the BGP table when there is at least one more specific entry in the BGP table. Routing Domain Confederations One way to reduce the IBGP mesh is to divide an autonomous system into multiple subautonomous systems and to group them into a single confederation that appears as a single autonomous system. Each autonomous system is fully meshed within itself and has a few connections to other autonomous systems in the same confederation. Even though the peers in different autonomous systems have EBGP sessions, they exchange routing information as if they were IBGP peers. Specifically, the next hop, MED, and local preference information is preserved. You can then use a single IGP for all of the autonomous systems. BGP Route Reflectors BGP requires that all of the IBGP speakers be fully meshed. When a router receives a route from an external neighbor, it must advertise it to all internal neighbors. To prevent a routing information loop, all IBPG speakers must be connected. The internal neighbors do not send routes learned from internal neighbors to other internal neighbors. With route reflectors, all IBGP speakers need not be fully meshed because another method is used to pass learned routes to neighbors. When you configure an internal BGP peer to be a route reflector, it is responsible for passing IBGP learned routes to a set of IBGP neighbors. The internal peers of the route reflector are divided into two groups: client peers and nonclient peers (all the other routers in the autonomous system). A route reflector reflects routes between these two groups. The route reflector and its client peers form a cluster. The Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1176 Routing Route Dampening nonclient peers must be fully meshed with each other, but the client peers need not be fully meshed. The clients in the cluster do not communicate with IBGP speakers outside their cluster. When the route reflector receives an advertised route, it takes one of these actions, depending on the neighbor: · A route from an external BGP speaker is advertised to all clients and nonclient peers. · A route from a nonclient peer is advertised to all clients. · A route from a client is advertised to all clients and nonclient peers. Hence, the clients need not be fully meshed. Usually a cluster of clients have a single route reflector, and the cluster is identified by the route reflector router ID. To increase redundancy and to avoid a single point of failure, a cluster might have more than one route reflector. In this case, all route reflectors in the cluster must be configured with the same 4-byte cluster ID so that a route reflector can recognize updates from route reflectors in the same cluster. All the route reflectors serving a cluster should be fully meshed and should have identical sets of client and nonclient peers. Route Dampening Route flap dampening is a BGP feature designed to minimize the propagation of flapping routes across an internetwork. A route is considered to be flapping when it is repeatedly available, then unavailable, then available, then unavailable, and so on. When route dampening is enabled, a numeric penalty value is assigned to a route when it flaps. When a route's accumulated penalties reach a configurable limit, BGP suppresses advertisements of the route, even if the route is running. The reuse limit is a configurable value that is compared with the penalty. If the penalty is less than the reuse limit, a suppressed route that is up is advertised again. Dampening is not applied to routes that are learned by IBGP. This policy prevents the IBGP peers from having a higher penalty for routes external to the AS. More BGP Information For detailed descriptions of BGP configuration, see the "Configuring BGP" chapter in the "IP Routing Protocols" part of the Cisco IOS IP Configuration Guide, Release 12.4. For details about specific commands, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4. How to Configure BGP Default BGP Configuration Table 41-9 shows the basic default BGP configuration. For the defaults for all characteristics, see the specific commands in the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4. Table 104: Default BGP Configuration Feature Aggregate address AS path access list Default Setting Disabled: None defined. None defined. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1177 Default BGP Configuration Routing Feature Auto summary Best path Default Setting Disabled. · The router considers as-path in choosing a route and does not compare similar routes from external BGP peers. · Compare router ID: Disabled. BGP community list · Number: None defined. When you permit a value for the community number, the list defaults to an implicit deny for everything else that has not been permitted. · Format: Cisco default format (32-bit number). BGP confederation identifier/peers · Identifier: None configured. · Peers: None identified. BGP Fast external fallover BGP local preference BGP network BGP route dampening Enabled. 100. The range is 0 to 4294967295 with the higher value preferred. None specified; no backdoor route advertised. Disabled by default. When enabled: · Half-life is 15 minutes. · Re-use is 750 (10-second increments). · Suppress is 2000 (10-second increments). · Max-suppress-time is 4 times half-life; 60 minutes. BGP router ID The IP address of a loopback interface if one is configured or the highest IP address configured for a physical interface on the router. Default information originate (protocol or network Disabled. redistribution) Default metric Built-in, automatic metric translations. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1178 Routing Feature Distance Distribute list Internal route redistribution IP prefix list Multi exit discriminator (MED) Default BGP Configuration Default Setting · External route administrative distance: 20 (acceptable values are from 1 to 255). · Internal route administrative distance: 200 (acceptable values are from 1 to 255). · Local route administrative distance: 200 (acceptable values are from 1 to 255). · In (filter networks received in updates): Disabled. · Out (suppress networks from being advertised in updates): Disabled. Disabled. None defined. · Always compare: Disabled. Does not compare MEDs for paths from neighbors in different autonomous systems. · Best path compare: Disabled. · MED missing as worst path: Disabled. · Deterministic MED comparison is disabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1179 Default BGP Configuration Feature Neighbor NSF8 Awareness Routing Default Setting · Advertisement interval: 30 seconds for external peers; 5 seconds for internal peers. · Change logging: Enabled. · Conditional advertisement: Disabled. · Default originate: No default route is sent to the neighbor. · Description: None. · Distribute list: None defined. · External BGP multihop: Only directly connected neighbors are allowed. · Filter list: None used. · Maximum number of prefixes received: No limit. · Next hop (router as next hop for BGP neighbor): Disabled. · Password: Disabled. · Peer group: None defined; no members assigned. · Prefix list: None specified. · Remote AS (add entry to neighbor BGP table): No peers defined. · Private AS number removal: Disabled. · Route maps: None applied to a peer. · Send community attributes: None sent to neighbors. · Shutdown or soft reconfiguration: Not enabled. · Timers: keepalive: 60 seconds; holdtime: 180 seconds. · Update source: Best local address. · Version: BGP Version 4. · Weight: Routes learned through BGP peer: 0; routes sourced by the local router: 32768. Disabled9. If enabled, allows Layer 3 switches to continue forwarding packets from a neighboring NSF-capable router during hardware or software changes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1180 Routing Enabling BGP Routing Feature Default Setting Route reflector None configured. Synchronization (BGP and IGP) Disabled. Table map update Disabled. Timers Keepalive: 60 seconds; holdtime: 180 seconds. 8 Nonstop Forwarding 9 NSF Awareness can be enabled for IPv4 on switches with the IP services feature set by enabling Graceful Restart. Enabling BGP Routing Before you begin Step 1 Step 2 Step 3 Step 4 Note To enable BGP, the switch or stack master must be running the IP services feature set. Procedure Command or Action configure terminal Example: Switch# configure terminal ip routing Example: Switch(config)# ip routing router bgp autonomous-system Example: Switch(config)# router bgp 45000 network network-number [mask network-mask] [route-map route-map-name] Example: Switch(config)# network 10.108.0.0 Purpose Enters global configuration mode. Enables IP routing. Enables a BGP routing process, assign it an AS number, and enter router configuration mode. The AS number can be from 1 to 65535, with 64512 to 65535 designated as private autonomous numbers. Configures a network as local to this AS, and enter it in the BGP table. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1181 Enabling BGP Routing Routing Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action neighbor {ip-address | peer-group-name} remote-as number Example: Switch(config)# neighbor 10.108.1.2 remote-as 65200 neighbor {ip-address | peer-group-name} remove-private-as Example: Purpose Adds an entry to the BGP neighbor table specifying that the neighbor identified by the IP address belongs to the specified AS. For EBGP, neighbors are usually directly connected, and the IP address is the address of the interface at the other end of the connection. For IBGP, the IP address can be the address of any of the router interfaces. (Optional) Removes private AS numbers from the AS-path in outbound routing updates. Switch(config)# neighbor 172.16.2.33 remove-private-as synchronization Example: (Optional) Enables synchronization between BGP and an IGP. Switch(config)# synchronization auto-summary Example: Switch(config)# auto-summary bgp graceful-restart Example: (Optional) Enables automatic network summarization. When a subnet is redistributed from an IGP into BGP, only the network route is inserted into the BGP table. (Optional) Enables NSF awareness on switch. By default, NSF awareness is disabled. Switch(config)# bgp graceful-start end Example: Returns to privileged EXEC mode. Switch(config)# end show ip bgp network network-number Example: Verifies the configuration. Switch# show ip bgp network 10.108.0.0 show ip bgp neighbor Example: Switch# show ip bgp neighbor Verifies that NSF awareness (Graceful Restart) is enabled on the neighbor. If NSF awareness is enabled on the switch and the neighbor, this message appears: Graceful Restart Capability: advertised and received Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1182 Routing Managing Routing Policy Changes Command or Action Step 13 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose If NSF awareness is enabled on the switch, but not on the neighbor, this message appears: Graceful Restart Capability: advertised (Optional) Saves your entries in the configuration file. Managing Routing Policy Changes To learn if a BGP peer supports the route refresh capability and to reset the BGP session: Step 1 Step 2 Procedure Command or Action show ip bgp neighbors Example: Switch# show ip bgp neighbors clear ip bgp {* | address | peer-group-name} Example: Switch# clear ip bgp * Purpose Displays whether a neighbor supports the route refresh capability. When supported, this message appears for the router: Received route refresh capability from peer. Resets the routing table on the specified connection. · Enter an asterisk (*) to specify that all connections be reset. · Enter an IP address to specify the connection to be reset. · Enter a peer group name to reset the peer group. Step 3 clear ip bgp {* | address | peer-group-name} soft out Example: Switch# clear ip bgp * soft out (Optional) Performs an outbound soft reset to reset the inbound routing table on the specified connection. Use this command if route refresh is supported. · Enter an asterisk (*) to specify that all connections be reset. · Enter an IP address to specify the connection to be reset. · Enter a peer group name to reset the peer group. Step 4 show ip bgp Example: Verifies the reset by checking information about the routing table and about BGP neighbors. Switch# show ip bgp Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1183 Configuring BGP Decision Attributes Routing Step 5 Command or Action show ip bgp neighbors Example: Switch# show ip bgp neighbors Purpose Verifies the reset by checking information about the routing table and about BGP neighbors. Configuring BGP Decision Attributes Step 1 Step 2 Step 3 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router bgp autonomous-system Example: Enables a BGP routing process, assign it an AS number, and enter router configuration mode. Switch(config)# router bgp 4500 bgp best-path as-path ignore Example: (Optional) Configures the router to ignore AS path length in selecting a route. Switch(config-router)# bgp bestpath as-path ignore Step 4 Step 5 Step 6 neighbor {ip-address | peer-group-name} next-hop-self (Optional) Disables next-hop processing on BGP updates Example: to a neighbor by entering a specific IP address to be used instead of the next-hop address. Switch(config-router)# neighbor 10.108.1.1 next-hop-self neighbor {ip-address | peer-group-name} weight weight (Optional) Assign a weight to a neighbor connection. Example: Acceptable values are from 0 to 65535; the largest weight is the preferred route. Routes learned through another BGP peer have a default weight of 0; routes sourced by the local Switch(config-router)# 50 neighbor 172.16.12.1 weight router have a default weight of 32768. default-metric number Example: Switch(config-router)# default-metric 300 (Optional) Sets a MED metric to set preferred paths to external neighbors. All routes without a MED will also be set to this value. The range is 1 to 4294967295. The lowest value is the most desirable. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1184 Routing Configuring BGP Decision Attributes Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Command or Action bgp bestpath med missing-as-worst Example: Purpose (Optional) Configures the switch to consider a missing MED as having a value of infinity, making the path without a MED value the least desirable path. Switch(config-router)# bgp bestpath med missing-as-worst bgp always-compare med Example: Switch(config-router)# bgp always-compare-med (Optional) Configures the switch to compare MEDs for paths from neighbors in different autonomous systems. By default, MED comparison is only done among paths in the same AS. bgp bestpath med confed Example: (Optional) Configures the switch to consider the MED in choosing a path from among those advertised by different subautonomous systems within a confederation. Switch(config-router)# bgp bestpath med confed bgp deterministic med Example: (Optional) Configures the switch to consider the MED variable when choosing among routes advertised by different peers in the same AS. Switch(config-router)# bgp deterministic med bgp default local-preference value Example: (Optional) Change the default local preference value. The range is 0 to 4294967295; the default value is 100. The highest local preference value is preferred. Switch(config-router)# bgp default local-preference 200 maximum-paths number Example: Switch(config-router)# maximum-paths 8 (Optional) Configures the number of paths to be added to the IP routing table. The default is to only enter the best path in the routing table. The range is from 1 to 16. Having multiple paths allows load-balancing among the paths. (Although the switch software allows a maximum of 32 equal-cost routes, the switch hardware will never use more than 16 paths per route.) end Example: Returns to privileged EXEC mode. Switch(config-router)# end show ip bgp Example: Verifies the reset by checking information about the routing table and about BGP neighbors. Switch# show ip bgp show ip bgp neighbors Example: Verifies the reset by checking information about the routing table and about BGP neighbors. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1185 Configuring BGP Filtering with Route Maps Routing Step 16 Command or Action Switch# show ip bgp neighbors copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Configuring BGP Filtering with Route Maps Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal route-map map-tag [permit | deny] [sequence-number] Creates a route map, and enter route-map configuration Example: mode. Switch(config)# route-map set-peer-address permit 10 set ip next-hop ip-address [...ip-address] [peer-address] (Optional) Sets a route map to disable next-hop processing Example: Switch(config)# set ip next-hop 10.1.1.3 · In an inbound route map, set the next hop of matching routes to be the neighbor peering address, overriding third-party next hops. · In an outbound route map of a BGP peer, set the next hop to the peering address of the local router, disabling the next-hop calculation. end Example: Switch(config)# end show route-map [map-name] Example: Switch# show route-map copy running-config startup-config Example: Returns to privileged EXEC mode. Displays all route maps configured or only the one specified to verify configuration. (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1186 Routing Configuring BGP Filtering by Neighbor Command or Action Switch# copy running-config startup-config Purpose Configuring BGP Filtering by Neighbor Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router bgp autonomous-system Example: Enables a BGP routing process, assign it an AS number, and enter router configuration mode. Switch(config)# router bgp 109 neighbor {ip-address | peer-group name} distribute-list (Optional) Filters BGP routing updates to or from neighbors {access-list-number | name} {in | out} as specified in an access list. Example: Switch(config-router)# neighbor 172.16.4.1 distribute-list 39 in Note You can also use the neighbor prefix-list router configuration command to filter updates, but you cannot use both commands to configure the same BGP peer. neighbor {ip-address | peer-group name} route-map map-tag {in | out} Example: (Optional) Applies a route map to filter an incoming or outgoing route. Switch(config-router)# neighbor 172.16.70.24 route-map internal-map in end Example: Returns to privileged EXEC mode. Switch(config-router)# end show ip bgp neighbors Example: Verifies the configuration. Switch# show ip bgp neighbors copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1187 Configuring BGP Filtering by Access Lists and Neighbors Routing Configuring BGP Filtering by Access Lists and Neighbors Another method of filtering is to specify an access list filter on both incoming and outbound updates, based on the BGP autonomous system paths. Each filter is an access list based on regular expressions. (See the "Regular Expressions" appendix in the Cisco IOS Dial Technologies Command Reference, Release 12.4 for more information on forming regular expressions.) To use this method, define an autonomous system path access list, and apply it to updates to and from particular neighbors. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip as-path access-list access-list-number {permit | deny} Defines a BGP-related access list. as-regular-expressions Example: Step 3 Switch(config)# ip as-path access-list 1 deny _65535_ router bgp autonomous-system Example: Enters BGP router configuration mode. Step 4 Switch(config)# router bgp 110 neighbor {ip-address | peer-group name} filter-list {access-list-number | name} {in | out | weight weight} Example: Establishes a BGP filter based on an access list. Step 5 Switch(config-router)# neighbor 172.16.1.1 filter-list 1 out end Example: Returns to privileged EXEC mode. Step 6 Switch(config-router)# end show ip bgp neighbors [paths regular-expression] Example: Verifies the configuration. Step 7 Switch# show ip bgp neighbors copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1188 Routing Configuring Prefix Lists for BGP Filtering Configuring Prefix Lists for BGP Filtering You do not need to specify a sequence number when removing a configuration entry. Show commands include the sequence numbers in their output. Before using a prefix list in a command, you must set up the prefix list. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip prefix-list list-name [seq seq-value] deny | permit network/len [ge ge-value] [le le-value] Example: Switch(config)# ip prefix-list BLUE permit 172.16.1.0/24 Creates a prefix list with an optional sequence number to deny or permit access for matching conditions. You must enter at least one permit or deny clause. · network/len is the network number and length (in bits) of the network mask. · (Optional) ge and le values specify the range of the prefix length to be matched.The specified ge-value and le-value must satisfy this condition: len < ge-value < le-value < 32 Step 3 ip prefix-list list-name seq seq-value deny | permit network/len [ge ge-value] [le le-value] Example: (Optional) Adds an entry to a prefix list, and assign a sequence number to the entry. Step 4 Switch(config)# ip prefix-list BLUE seq 10 permit 172.24.1.0/24 end Example: Returns to privileged EXEC mode. Step 5 Switch(config)# end show ip prefix list [detail | summary] name [network/len] Verifies the configuration by displaying information about [seq seq-num] [longer] [first-match] a prefix list or prefix list entries. Example: Step 6 Switch# show ip prefix list summary test copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1189 Configuring BGP Community Filtering Routing Configuring BGP Community Filtering By default, no COMMUNITIES attribute is sent to a neighbor. You can specify that the COMMUNITIES attribute be sent to the neighbor at an IP address by using the neighbor send-community router configuration command. SUMMARY STEPS 1. configure terminal 2. ip community-list community-list-number {permit | deny} community-number 3. router bgp autonomous-system 4. neighbor {ip-address | peer-group name} send-community 5. set comm-list list-num delete 6. exit 7. ip bgp-community new-format 8. end 9. show ip bgp community 10. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip community-list community-list-number {permit | deny} Creates a community list, and assign it a number. community-number Example: · The community-list-number is an integer from 1 to 99 that identifies one or more permit or deny groups of communities. Switch(config)# ip community-list 1 permit 50000:10 · The community-number is the number configured by a set community route-map configuration command. Step 3 router bgp autonomous-system Example: Enters BGP router configuration mode. Step 4 Switch(config)# router bgp 108 neighbor {ip-address | peer-group name} send-community Example: Specifies that the COMMUNITIES attribute be sent to the neighbor at this IP address. Switch(config-router)# neighbor 172.16.70.23 send-community Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1190 Routing Configuring BGP Neighbors and Peer Groups Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose set comm-list list-num delete Example: Switch(config-router)# set comm-list 500 delete (Optional) Removes communities from the community attribute of an inbound or outbound update that match a standard or extended community list specified by a route map. exit Example: Returns to global configuration mode. Switch(config-router)# end ip bgp-community new-format Example: Switch(config)# ip bgp-community new format end Example: (Optional) Displays and parses BGP communities in the format AA:NN. A BGP community is displayed in a two-part format 2 bytes long. The Cisco default community format is in the format NNAA. In the most recent RFC for BGP, a community takes the form AA:NN, where the first part is the AS number and the second part is a 2-byte number. Returns to privileged EXEC mode. Switch(config)# end show ip bgp community Example: Verifies the configuration. Switch# show ip bgp community copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Configuring BGP Neighbors and Peer Groups To assign configuration options to an individual neighbor, specify any of these router configuration commands by using the neighbor IP address. To assign the options to a peer group, specify any of the commands by using the peer group name. You can disable a BGP peer or peer group without removing all the configuration information by using the neighbor shutdown router configuration command. Step 1 Step 2 Procedure Command or Action configure terminal router bgp autonomous-system Purpose Enters global configuration mode. Enters BGP router configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1191 Configuring BGP Neighbors and Peer Groups Routing Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Command or Action neighbor peer-group-name peer-group Purpose Creates a BGP peer group. neighbor ip-address peer-group peer-group-name Makes a BGP neighbor a member of the peer group. neighbor {ip-address | peer-group-name} remote-as number Specifies a BGP neighbor. If a peer group is not configured with a remote-as number, use this command to create peer groups containing EBGP neighbors. The range is 1 to 65535. neighbor {ip-address | peer-group-name} description text neighbor {ip-address | peer-group-name} default-originate [route-map map-name] (Optional) Associates a description with a neighbor. (Optional) Allows a BGP speaker (the local router) to send the default route 0.0.0.0 to a neighbor for use as a default route. neighbor {ip-address | peer-group-name} send-community (Optional) Specifies that the COMMUNITIES attribute be sent to the neighbor at this IP address. neighbor {ip-address | peer-group-name} update-source (Optional) Allows internal BGP sessions to use any interface operational interface for TCP connections. neighbor {ip-address | peer-group-name} ebgp-multihop (Optional) Allows BGP sessions, even when the neighbor is not on a directly connected segment. The multihop session is not established if the only route to the multihop peer's address is the default route (0.0.0.0). neighbor {ip-address | peer-group-name} local-as number (Optional) Specifies an AS number to use as the local AS. The range is 1 to 65535. neighbor {ip-address | peer-group-name} advertisement-interval seconds (Optional) Sets the minimum interval between sending BGP routing updates. neighbor {ip-address | peer-group-name} maximum-prefix maximum [threshold] (Optional) Controls how many prefixes can be received from a neighbor. The range is 1 to 4294967295. The threshold (optional) is the percentage of maximum at which a warning message is generated. The default is 75 percent. neighbor {ip-address | peer-group-name} next-hop-self (Optional) Disables next-hop processing on the BGP updates to a neighbor. neighbor {ip-address | peer-group-name} password string (Optional) Sets MD5 authentication on a TCP connection to a BGP peer. The same password must be configured on both BGP peers, or the connection between them is not made. neighbor {ip-address | peer-group-name} route-map (Optional) Applies a route map to incoming or outgoing map-name {in | out} routes. neighbor {ip-address | peer-group-name} send-community (Optional) Specifies that the COMMUNITIES attribute be sent to the neighbor at this IP address. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1192 Routing Configuring Aggregate Addresses in a Routing Table Step 18 Step 19 Step 20 Step 21 Step 22 Step 23 Step 24 Step 25 Step 26 Command or Action Purpose neighbor {ip-address | peer-group-name} timers keepalive (Optional) Sets timers for the neighbor or peer group. holdtime · The keepalive interval is the time within which keepalive messages are sent to peers. The range is 1 to 4294967295 seconds; the default is 60. · The holdtime is the interval after which a peer is declared inactive after not receiving a keepalive message from it. The range is 1 to 4294967295 seconds; the default is 180. neighbor {ip-address | peer-group-name} weight weight (Optional) Specifies a weight for all routes from a neighbor. neighbor {ip-address | peer-group-name} distribute-list (Optional) Filter BGP routing updates to or from neighbors, {access-list-number | name} {in | out} as specified in an access list. neighbor {ip-address | peer-group-name} filter-list access-list-number {in | out | weight weight} (Optional) Establish a BGP filter. neighbor {ip-address | peer-group-name} version value (Optional) Specifies the BGP version to use when communicating with a neighbor. neighbor {ip-address | peer-group-name} soft-reconfiguration inbound (Optional) Configures the software to start storing received updates. end Returns to privileged EXEC mode. show ip bgp neighbors Verifies the configuration. copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring Aggregate Addresses in a Routing Table Step 1 Step 2 Step 3 Procedure Command or Action configure terminal Example: Switch# configure terminal router bgp autonomous-system Example: Switch(config)# router bgp 106 aggregate-address address mask Example: Purpose Enters global configuration mode. Enters BGP router configuration mode. Creates an aggregate entry in the BGP routing table. The aggregate route is advertised as coming from the AS, and Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1193 Configuring Aggregate Addresses in a Routing Table Routing Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose the atomic aggregate attribute is set to indicate that Switch(config-router)# aggregate-address 10.0.0.0 information might be missing. 255.0.0.0 aggregate-address address mask as-set (Optional) Generates AS set path information. This Example: command creates an aggregate entry following the same rules as the previous command, but the advertised path will be an AS_SET consisting of all elements contained Switch(config-router)# 255.0.0.0 as-set aggregate-address 10.0.0.0 in all paths. Do not use this keyword when aggregating many paths because this route must be continually withdrawn and updated. aggregate-address address-mask summary-only Example: (Optional) Advertises summary addresses only. Switch(config-router)# aggregate-address 10.0.0.0 255.0.0.0 summary-only aggregate-address address mask suppress-map map-name Example: (Optional) Suppresses selected, more specific routes. Switch(config-router)# aggregate-address 10.0.0.0 255.0.0.0 suppress-map map1 aggregate-address address mask advertise-map map-name Example: (Optional) Generates an aggregate based on conditions specified by the route map. Switch(config-router)# aggregate-address 10.0.0.0 255.0.0.0 advertise-map map2 aggregate-address address mask attribute-map map-name Example: (Optional) Generates an aggregate with attributes specified in the route map. Switch(config-router)# aggregate-address 10.0.0.0 255.0.0.0 attribute-map map3 end Example: Returns to privileged EXEC mode. Switch(config-router)# end show ip bgp neighbors [advertised-routes] Example: Verifies the configuration. Switch# show ip bgp neighbors Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1194 Routing Configuring Routing Domain Confederations Step 11 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Configuring Routing Domain Confederations You must specify a confederation identifier that acts as the autonomous system number for the group of autonomous systems. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal router bgp autonomous-system Example: Enters BGP router configuration mode. Step 3 Switch(config)# router bgp 100 bgp confederation identifier autonomous-system Example: Configures a BGP confederation identifier. Switch(config)# bgp confederation identifier 50007 Step 4 Step 5 Step 6 bgp confederation peers autonomous-system [autonomous-system ...] Example: Specifies the autonomous systems that belong to the confederation and that will be treated as special EBGP peers. Switch(config)# bgp confederation peers 51000 51001 51002 end Example: Returns to privileged EXEC mode. Switch(config)# end show ip bgp neighbor Example: Verifies the configuration. Switch# show ip bgp neighbor Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1195 Configuring BGP Route Reflectors Routing Step 7 Step 8 Command or Action show ip bgp network Example: Switch# show ip bgp network copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies the configuration. (Optional) Saves your entries in the configuration file. Configuring BGP Route Reflectors Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router bgp autonomous-system Example: Enters BGP router configuration mode. Switch(config)# router bgp 101 neighbor {ip-address | peer-group-name} route-reflector-client Example: Configures the local router as a BGP route reflector and the specified neighbor as a client. Switch(config-router)# neighbor 172.16.70.24 route-reflector-client bgp cluster-id cluster-id Example: (Optional) Configures the cluster ID if the cluster has more than one route reflector. Switch(config-router)# bgp cluster-id 10.0.1.2 no bgp client-to-client reflection Example: Switch(config-router)# no bgp client-to-client reflection end Example: (Optional) Disables client-to-client route reflection. By default, the routes from a route reflector client are reflected to other clients. However, if the clients are fully meshed, the route reflector does not need to reflect routes to clients. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1196 Routing Configuring Route Dampening Step 7 Step 8 Command or Action Switch(config-router)# end show ip bgp Example: Switch# show ip bgp copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies the configuration. Displays the originator ID and the cluster-list attributes. (Optional) Saves your entries in the configuration file. Configuring Route Dampening Step 1 Step 2 Step 3 Step 4 Step 5 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router bgp autonomous-system Example: Enters BGP router configuration mode. Switch(config)# router bgp 100 bgp dampening Example: Enables BGP route dampening. Switch(config-router)# bgp dampening bgp dampening half-life reuse suppress max-suppress [route-map map] Example: (Optional) Changes the default values of route dampening factors. Switch(config-router)# bgp dampening 30 1500 10000 120 end Example: Returns to privileged EXEC mode. Switch(config-router)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1197 Monitoring and Maintaining BGP Routing Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose show ip bgp flap-statistics [{regexp regexp} | {filter-list (Optional) Monitors the flaps of all paths that are flapping. list} | {address mask [longer-prefix]}] The statistics are deleted when the route is not suppressed Example: and is stable. Switch# show ip bgp flap-statistics show ip bgp dampened-paths Example: (Optional) Displays the dampened routes, including the time remaining before they are suppressed. Switch# show pi bgp dampened-paths clear ip bgp flap-statistics [{regexp regexp} | {filter-list (Optional) Clears BGP flap statistics to make it less likely list} | {address mask [longer-prefix]} that a route will be dampened. Example: Switch# clear ip bgp flap-statistics clear ip bgp dampening Example: (Optional) Clears route dampening information, and unsuppress the suppressed routes. Switch# clear ip bgp dampening copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Monitoring and Maintaining BGP You can remove all contents of a particular cache, table, or database. This might be necessary when the contents of the particular structure have become or are suspected to be invalid. You can display specific statistics, such as the contents of BGP routing tables, caches, and databases. You can use the information to get resource utilization and solve network problems. You can also display information about node reachability and discover the routing path your device's packets are taking through the network. Table 41-8 lists the privileged EXEC commands for clearing and displaying BGP. For explanations of the display fields, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4. Table 105: IP BGP Clear and Show Commands clear ip bgp address clear ip bgp * clear ip bgp peer-group tag Resets a particular BGP connection. Resets all BGP connections. Removes all members of a BGP peer group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1198 Routing Configuration Examples for BGP show ip bgp prefix Displays peer groups and peers not in peer groups to which the prefix has been advertised. Also display prefix attributes such as the next hop and the local prefix. show ip bgp cidr-only Displays all BGP routes that contain subnet and supernet network masks. show ip bgp community [community-number] [exact] Displays routes that belong to the specified communities. show ip bgp community-list community-list-number Displays routes that are permitted by the community [exact-match] list. show ip bgp filter-list access-list-number Displays routes that are matched by the specified AS path access list. show ip bgp inconsistent-as Displays the routes with inconsistent originating autonomous systems. show ip bgp regexp regular-expression Displays the routes that have an AS path that matches the specified regular expression entered on the command line. show ip bgp Displays the contents of the BGP routing table. show ip bgp neighbors [address] Displays detailed information on the BGP and TCP connections to individual neighbors. show ip bgp neighbors [address] [advertised-routes Displays routes learned from a particular BGP | dampened-routes | flap-statistics | paths neighbor. regular-expression | received-routes | routes] show ip bgp paths Displays all BGP paths in the database. show ip bgp peer-group [tag] [summary] Displays information about BGP peer groups. show ip bgp summary Displays the status of all BGP connections. The bgp log-neighbor changes command is enabled by default. It allows to log messages that are generated when a BGP neighbor resets, comes up, or goes down. Configuration Examples for BGP Example: Configuring BGP on Routers In Figure 41-5 Router A: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1199 Information About ISO CLNS Routing Routing Switch(config)# router bgp 100 Switch(config-router)# neighbor 129.213.1.1 remote-as 200 Router B: Switch(config)# router bgp 200 Switch(config-router)# neighbor 129.213.1.2 remote-as 100 Switch(config-router)# neighbor 175.220.1.2 remote-as 200 Router C: Switch(config)# router bgp 200 Switch(config-router)# neighbor 175.220.212.1 remote-as 200 Switch(config-router)# neighbor 192.208.10.1 remote-as 300 Router D: Switch(config)# router bgp 300 Switch(config-router)# neighbor 192.208.10.2 remote-as 200 To verify that BGP peers are running, use the show ip bgp neighbors privileged EXEC command. This is the output of this command on Router A: Switch# show ip bgp neighbors BGP neighbor is 129.213.1.1, remote AS 200, external link BGP version 4, remote router ID 175.220.212.1 BGP state = established, table version = 3, up for 0:10:59 Last read 0:00:29, hold time is 180, keepalive interval is 60 seconds Minimum time between advertisement runs is 30 seconds Received 2828 messages, 0 notifications, 0 in queue Sent 2826 messages, 0 notifications, 0 in queue Connections established 11; dropped 10 Anything other than state = established means that the peers are not running. The remote router ID is the highest IP address on that router (or the highest loopback interface). Each time the table is updated with new information, the table version number increments. A table version number that continually increments means that a route is flapping, causing continual routing updates. For exterior protocols, a reference to an IP network from the network router configuration command controls only which networks are advertised. This is in contrast to Interior Gateway Protocols (IGPs), such as EIGRP, which also use the network command to specify where to send updates. For detailed descriptions of BGP configuration, see the "IP Routing Protocols" part of the Cisco IOS IP Configuration Guide, Release 12.4. For details about specific commands, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4. Information About ISO CLNS Routing Connectionless Routing The International Organization for Standardization (ISO) Connectionless Network Service (CLNS) protocol is a standard for the network layer of the Open System Interconnection (OSI) model. Addresses in the ISO network architecture are referred to as network service access point (NSAP) addresses and network entity Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1200 Routing IS-IS Dynamic Routing titles (NETs). Each node in an OSI network has one or more NETs. In addition, each node has many NSAP addresses. When you enable connectionless routing on the switch by using the clns routing global configuration command, the switch makes only forwarding decisions, with no routing-related functionality. For dynamic routing, you must also enable a routing protocol. The switch supports the Intermediate System-to-Intermediate System (IS-IS) dynamic routing protocol that is based on the OSI routing protocol for ISO CLNS networks. When dynamically routing, you use IS-IS. This routing protocol supports the concept of areas. Within an area, all routers know how to reach all the system IDs. Between areas, routers know how to reach the proper area. IS-IS supports two levels of routing: station routing (within an area) and area routing (between areas). The key difference between the ISO IGRP and IS-IS NSAP addressing schemes is in the definition of area addresses. Both use the system ID for Level 1 routing (routing within an area). However, they differ in the way addresses are specified for area routing. An ISO IGRP NSAP address includes three separate fields for routing: the domain, area, and system ID. An IS-IS address includes two fields: a single continuous area field (comprising the domain and area fields) and the system ID. Note For more detailed information about ISO CLNS, see the Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS and XNS Configuration Guide, Release 12.4. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS and XNS Command Reference, Release 12.4, use the IOS command reference master index, or search online. IS-IS Dynamic Routing IS-IS is an ISO dynamic routing protocol (described in ISO 105890). Unlike other routing protocols, enabling IS-IS requires that you create an IS-IS routing process and assign it to a specific interface, rather than to a network. You can specify more than one IS-IS routing process per Layer 3 switch or router by using the multiarea IS-IS configuration syntax. You then configure the parameters for each instance of the IS-IS routing process. Small IS-IS networks are built as a single area that includes all the routers in the network. As the network grows larger, it is usually reorganized into a backbone area made up of the connected set of all Level 2 routers from all areas, which is in turn connected to local areas. Within a local area, routers know how to reach all system IDs. Between areas, routers know how to reach the backbone, and the backbone routers know how to reach other areas. Routers establish Level 1 adjacencies to perform routing within a local area (station routing). Routers establish Level 2 adjacencies to perform routing between Level 1 areas (area routing). A single Cisco router can participate in routing in up to 29 areas and can perform Level 2 routing in the backbone. In general, each routing process corresponds to an area. By default, the first instance of the routing process configured performs both Level 1and Level 2 routing. You can configure additional router instances, which are automatically treated as Level 1 areas. You must configure the parameters for each instance of the IS-IS routing process individually. For IS-IS multiarea routing, you can configure only one process to perform Level 2 routing, although you can define up to 29 Level 1 areas for each Cisco unit. If Level 2 routing is configured on any process, all additional processes are automatically configured as Level 1. You can configure this process to perform Level 1 routing at the same time. If Level 2 routing is not desired for a router instance, remove the Level 2 capability using the is-type global configuration command. Use the is-type command also to configure a different router instance as a Level 2 router. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1201 Nonstop Forwarding Awareness Routing Note For more detailed information about IS-IS, see the "IP Routing Protocols" chapter of the Cisco IOS IP Configuration Guide, Release 12.4. For complete syntax and usage information for the commands used in this section, see the Cisco IOS IP Command Reference, Release 12.4. Nonstop Forwarding Awareness The integrated IS-IS NSF Awareness feature is supported for IPv4G. The feature allows customer premises equipment (CPE) routers that are NSF-aware to help NSF-capable routers perform nonstop forwarding of packets. The local router is not necessarily performing NSF, but its awareness of NSF allows the integrity and accuracy of the routing database and link-state database on the neighboring NSF-capable router to be maintained during the switchover process. This feature is automatically enabled and requires no configuration. For more information on this feature, see the Integrated IS-IS Nonstop Forwarding (NSF) Awareness Feature Guide. IS-IS Global Parameters These are some optional IS-IS global parameters that you can configure: · You can force a default route into an IS-IS routing domain by configuring a default route controlled by a route map. You can also specify other filtering options configurable under a route map. · You can configure the router to ignore IS-IS LSPs that are received with internal checksum errors or to purge corrupted LSPs, which causes the initiator of the LSP to regenerate it. · You can assign passwords to areas and domains. · You can create aggregate addresses that are represented in the routing table by a summary address (route-summarization). Routes learned from other routing protocols can also be summarized. The metric used to advertise the summary is the smallest metric of all the specific routes. · You can set an overload bit. · You can configure the LSP refresh interval and the maximum time that an LSP can remain in the router database without a refresh · You can set the throttling timers for LSP generation, shortest path first computation, and partial route computation. · You can configure the switch to generate a log message when an IS-IS adjacency changes state (up or down). · If a link in the network has a maximum transmission unit (MTU) size of less than 1500 bytes, you can lower the LSP MTU so that routing will still occur. · The partition avoidance router configuration command prevents an area from becoming partitioned when full connectivity is lost among a Level1-2 border router, adjacent Level 1 routers, and end hosts. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1202 Routing IS-IS Interface Parameters IS-IS Interface Parameters You can optionally configure certain interface-specific IS-IS parameters, independently from other attached routers. However, if you change some values from the defaults, such as multipliers and time intervals, it makes sense to also change them on multiple routers and interfaces. Most of the interface parameters can be configured for level 1, level 2, or both. These are some interface level parameters you can configure: · The default metric on the interface, which is used as a value for the IS-IS metric and assigned when there is no quality of service (QoS) routing performed. · The hello interval (length of time between hello packets sent on the interface) or the default hello packet multiplier used on the interface to determine the hold time sent in IS-IS hello packets. The hold time determines how long a neighbor waits for another hello packet before declaring the neighbor down. This determines how quickly a failed link or neighbor is detected so that routes can be recalculated. Change the hello-multiplier in circumstances where hello packets are lost frequently and IS-IS adjacencies are failing unnecessarily. You can raise the hello multiplier and lower the hello interval correspondingly to make the hello protocol more reliable without increasing the time required to detect a link failure. · Other time intervals: · Complete sequence number PDU (CSNP) interval. CSNPs are sent by the designated router to maintain database synchronization · Retransmission interval. This is the time between retransmission of IS-IS LSPs for point-to-point links. · IS-IS LSP retransmission throttle interval. This is the maximum rate (number of milliseconds between packets) at which IS-IS LSPs are re-sent on point-to-point links This interval is different from the retransmission interval, which is the time between successive retransmissions of the same LSP · Designated router election priority, which allows you to reduce the number of adjacencies required on a multiaccess network, which in turn reduces the amount of routing protocol traffic and the size of the topology database. · The interface circuit type, which is the type of adjacency desired for neighbors on the specified interface · Password authentication for the interface How to Configure ISO CLNS Routing Default IS-IS Configuration Table 106: Default IS-IS Configuration Feature Ignore link-state PDU (LSP) errors Default Setting Enabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1203 Default IS-IS Configuration Routing Feature IS-IS type Default-information originate Log IS-IS adjacency state changes. LSP generation throttling timers LSP maximum lifetime (without a refresh) LSP refresh interval Maximum LSP packet size NSF Awareness Partial route computation (PRC) throttling timers Partition avoidance Password Set-overload-bit Shortest path first (SPF) throttling timers Default Setting Conventional IS-IS: the router acts as both a Level 1 (station) and a Level 2 (area) router. Multiarea IS-IS: the first instance of the IS-IS routing process is a Level 1-2 router. Remaining instances are Level 1 routers. Disabled. Disabled. Maximum interval between two consecutive occurrences: 5 seconds. Initial LSP generation delay: 50 ms. Hold time between the first and second LSP generation: 5000 ms. 1200 seconds (20 minutes) before t.he LSP packet is deleted. Send LSP refreshes every 900 seconds (15 minutes). 1497 bytes. Enabled. Allows Layer 3 switches to continue forwarding packets from a neighboring NSF-capable router during hardware or software changes. Maximum PRC wait interval: 5 seconds. Initial PRC calculation delay after a topology change: 2000 ms. Hold time between the first and second PRC calculation: 5000 ms. Disabled. No area or domain password is defined, and authentication is disabled. Disabled. When enabled, if no arguments are entered, the overload bit is set immediately and remains set until you enter the no set-overload-bit command. Maximum interval between consecutive SFPs: 10 seconds. Initial SFP calculation after a topology change: 5500 ms. Holdtime between the first and second SFP calculation: 5500 ms. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1204 Routing Enabling IS-IS Routing Feature Summary-address Default Setting Disabled. Enabling IS-IS Routing To enable IS-IS, you specify a name and NET for each routing process. You then enable IS-IS routing on the interface and specify the area for each instance of the routing process. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal clns routing Example: Enables ISO connectionless routing on the switch. Step 3 Step 4 Step 5 Switch(config)# clns routing router isis [area tag] Example: Switch(config)# router isis tag1 net network-entity-title Example: Switch(config-router)# net 47.0004.004d.0001.0001.0c11.1111.00 is-type {level-1 | level-1-2 | level-2-only} Example: Switch(config-router)# is-type level-2-only Enables the IS-IS routing for the specified routing process and enter IS-IS routing configuration mode. (Optional) Use the area tag argument to identify the area to which the IS-IS router is assigned. You must enter a value if you are configuring multiple IS-IS areas. The first IS-IS instance configured is Level 1-2 by default. Later instances are automatically Level 1. You can change the level of routing by using the is-type global configuration command. Configures the NETs for the routing process. If you are configuring multiarea IS-IS, specify a NET for each routing process. You can specify a name for a NET and for an address. (Optional) Configures the router to act as a Level 1 (station) router, a Level 2 (area) router for multi-area routing, or both (the default): · level-1--act as a station router only · level-1-2--act as both a station router and an area router · level 2--act as an area router only Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1205 Enabling IS-IS Routing Routing Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action exit Example: Purpose Returns to global configuration mode. Switch(config-router)# end interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Specifies an interface to route IS-IS, and enter interface configuration mode. If the interface is not already configured as a Layer 3 interface, enter the no switchport command to put it into Layer 3 mode. ip router isis [area tag] Example: Configures an IS-IS routing process for ISO CLNS on the interface and attach an area designator to the routing process. Switch(config-if)# ip router isis tag1 clns router isis [area tag] Example: Enables ISO CLNS on the interface. Switch(config-if)# clns router isis tag1 ip address ip-address-mask Example: Switch(config-if)# ip address 10.0.0.5 255.255.255.0 end Example: Define the IP address for the interface. An IP address is required on all interfaces in an area enabled for IS-IS if any one interface is configured for IS-IS routing. Returns to privileged EXEC mode. Switch(config-if)# end show isis [area tag] database detail Example: Verifies your entries. Switch# show isis database detail copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1206 Routing Configuring IS-IS Global Parameters Configuring IS-IS Global Parameters Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal clns routing Example: Enables ISO connectionless routing on the switch. Switch(config)# clns routing router isis Example: Specifies the IS-IS routing protocol and enter router configuration mode. Switch(config)# router isis default-information originate [route-map map-name] Example: Switch(config-router)# default-information originate route-map map1 (Optional) Forces a default route into the IS-IS routing domain.If you enter route-map map-name, the routing process generates the default route if the route map is satisfied. ignore-lsp-errors Example: Switch(config-router)# ignore-lsp-errors (Optional) Configures the router to ignore LSPs with internal checksum errors, instead of purging the LSPs. This command is enabled by default (corrupted LSPs are dropped). To purge the corrupted LSPs, enter the no ignore-lsp-errors router configuration command. area-password password Example: (Optional Configures the area authentication password, which is inserted in Level 1 (station router level) LSPs. Switch(config-router)# area-password 1password domain-password password Example: (Optional) Configures the routing domain authentication password, which is inserted in Level 2 (area router level) LSPs. Switch(config-router)# domain-password 2password summary-address address mask [level-1 | level-1-2 | level-2] Example: (Optional) Creates a summary of addresses for a given level. Switch(config-router)# summary-address 10.1.0.0 255.255.0.0 level-2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1207 Configuring IS-IS Global Parameters Routing Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action Purpose set-overload-bit [on-startup {seconds | wait-for-bgp}] (Optional) Sets an overload bit (a hippity bit) to allow other Example: routers to ignore the router in their shortest path first (SPF) calculations if the router is having problems. Switch(config-router)# set-overload-bit on-startup wait-for-bgp · (Optional) on-startup--sets the overload bit only on startup. If on-startup is not specified, the overload bit is set immediately and remains set until you enter the no set-overload-bit command. If on-startup is specified, you must enter a number of seconds or wait-for-bgp. · seconds--When the on-startup keyword is configured, causes the overload bit to be set upon system startup and remain set for this number of seconds. The range is from 5 to 86400 seconds. · wait-for-bgp--When the on-startup keyword is configured, causes the overload bit to be set upon system startup and remain set until BGP has converged. If BGP does not signal IS-IS that it is converged, IS-IS will turn off the overload bit after 10 minutes. lsp-refresh-interval seconds Example: (Optional) Sets an LSP refresh interval in seconds. The range is from 1 to 65535 seconds. The default is to send LSP refreshes every 900 seconds (15 minutes). Switch(config-router)# lsp-refresh-interval 1080 max-lsp-lifetime seconds Example: Switch(config-router)# max-lsp-lifetime 1000 (Optional) Sets the maximum time that LSP packets remain in the router database without being refreshed. The range is from 1 to 65535 seconds. The default is 1200 seconds (20 minutes). After the specified time interval, the LSP packet is deleted. lsp-gen-interval [level-1 | level-2] lsp-max-wait [lsp-initial-wait lsp-second-wait] Example: Switch(config-router)# lsp-gen-interval level-2 2 50 100 (Optional) Sets the IS-IS LSP generation throttling timers: · lsp-max-wait--the maximum interval (in seconds) between two consecutive occurrences of an LSP being generated. The range is 1 to 120, the default is 5. · lsp-initial-wait--the initial LSP generation delay (in milliseconds). The range is 1 to 10000; the default is 50. · lsp-second-wait--the hold time between the first and second LSP generation (in milliseconds). The range is 1 to 10000; the default is 5000. spf-interval [level-1 | level-2] spf-max-wait [spf-initial-wait spf-second-wait] Example: (Optional) Sets IS-IS shortest path first (SPF) throttling timers. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1208 Routing Configuring IS-IS Global Parameters Step 14 Step 15 Step 16 Step 17 Step 18 Command or Action Purpose Switch(config-router)# spf-interval level-2 5 10 20 · spf-max-wait--the maximum interval between consecutive SFPs (in seconds). The range is 1 to 120, the default is 10. · spf-initial-wait--the initial SFP calculation after a topology change (in milliseconds). The range is 1 to 10000; the default is 5500. · spf-second-wait--the holdtime between the first and second SFP calculation (in milliseconds). The range is 1 to 10000; the default is 5500. prc-interval prc-max-wait [prc-initial-wait prc-second-wait] Example: Switch(config-router)# prc-interval 5 10 20 (Optional) Sets IS-IS partial route computation (PRC) throttling timers. · prc-max-wait--the maximum interval (in seconds) between two consecutive PRC calculations. The range is 1 to 120; the default is 5. · prc-initial-wait--the initial PRC calculation delay (in milliseconds) after a topology change. The range is 1 to 10,000; the default is 2000. · prc-second-wait--the hold time between the first and second PRC calculation (in milliseconds). The range is 1 to 10,000; the default is 5000. log-adjacency-changes [all] (Optional) Sets the router to log IS-IS adjacency state Example: changes. Enter all to include all changes generated by events that are not related to the Intermediate System-to-Intermediate System Hellos, including End Switch(config-router)# log-adjacency-changes all System-to-Intermediate System PDUs and link state packets (LSPs). lsp-mtu size Example: Switch(config-router)# lsp mtu 1560 (Optional) Specifies the maximum LSP packet size in bytes. The range is 128 to 4352; the default is 1497 bytes. Note If any link in the network has a reduced MTU size, you must change the LSP MTU size on all routers in the network. partition avoidance Example: Switch(config-router)# partition avoidance end Example: Switch(config-router)# end (Optional) Causes an IS-IS Level 1-2 border router to stop advertising the Level 1 area prefix into the Level 2 backbone when full connectivity is lost among the border router, all adjacent level 1 routers, and end hosts. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1209 Configuring IS-IS Interface Parameters Routing Step 19 Step 20 Command or Action show clns Example: Switch# show clns copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies your entries. (Optional) Saves your entries in the configuration file. Configuring IS-IS Interface Parameters Step 1 Step 2 Step 3 Step 4 Step 5 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal interface interface-id Example: Switch(config)# interface gigabitethernet 1/0/1 Specifies the interface to be configured and enter interface configuration mode. If the interface is not already configured as a Layer 3 interface, enter the no switchport command to put it into Layer 3 mode. isis metric default-metric [level-1 | level-2] Example: Switch(config-if)# isis metric 15 (Optional) Configures the metric (or cost) for the specified interface. The range is from 0 to 63. The default is 10. If no level is entered, the default is to apply to both Level 1 and Level 2 routers. isis hello-interval {seconds | minimal} [level-1 | level-2] (Optional) Specifies the length of time between hello Example: packets sent by the switch. By default, a value three times the hello interval seconds is advertised as the holdtime in the hello packets sent. With smaller hello intervals, Switch(config-if)# isis hello-interval minimal topological changes are detected faster, but there is more routing traffic. · minimal--causes the system to compute the hello interval based on the hello multiplier so that the resulting hold time is 1 second. · seconds--the range is from 1 to 65535. The default is 10 seconds. isis hello-multiplier multiplier [level-1 | level-2] Example: (Optional) Specifies the number of IS-IS hello packets a neighbor must miss before the router should declare the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1210 Routing Configuring IS-IS Interface Parameters Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Switch(config-if)# isis hello-multiplier 5 Purpose adjacency as down. The range is from 3 to 1000. The default is 3. Using a smaller hello-multiplier causes fast convergence, but can result in more routing instability. isis csnp-interval seconds [level-1 | level-2] Example: Switch(config-if)# isis csnp-interval 15 (Optional) Configures the IS-IS complete sequence number PDU (CSNP) interval for the interface. The range is from 0 to 65535. The default is 10 seconds. isis retransmit-interval seconds Example: Switch(config-if)# isis retransmit-interval 7 (Optional) Configures the number of seconds between retransmission of IS-IS LSPs for point-to-point links. The value you specify should be an integer greater than the expected round-trip delay between any two routers on the network. The range is from 0 to 65535. The default is 5 seconds. isis retransmit-throttle-interval milliseconds Example: Switch(config-if)# isis retransmit-throttle-interval 4000 (Optional) Configures the IS-IS LSP retransmission throttle interval, which is the maximum rate (number of milliseconds between packets) at which IS-IS LSPs will be re-sent on point-to-point links. The range is from 0 to 65535. The default is determined by the isis lsp-interval command. isis priority value [level-1 | level-2] Example: Switch(config-if)# isis priority 50 (Optional) Configures the priority to use for designated router election. The range is from 0 to 127. The default is 64. isis circuit-type {level-1 | level-1-2 | level-2-only} Example: Switch(config-if)# isis circuit-type level-1-2 (Optional) Configures the type of adjacency desired for neighbors on the specified interface (specify the interface circuit type). · level-1--a Level 1 adjacency is established if there is at least one area address common to both this node and its neighbors. · level-1-2--a Level 1 and 2 adjacency is established if the neighbor is also configured as both Level 1 and Level 2 and there is at least one area in common. If there is no area in common, a Level 2 adjacency is established. This is the default. · level 2--a Level 2 adjacency is established. If the neighbor router is a Level 1 router, no adjacency is established. isis password password [level-1 | level-2] Example: Switch(config-if)# isis password secret (Optional) Configures the authentication password for an interface. By default, authentication is disabled. Specifying Level 1 or Level 2 enables the password only for Level 1 or Level 2 routing, respectively. If you do not specify a level, the default is Level 1 and Level 2. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1211 Monitoring and Maintaining ISO IGRP and IS-IS Routing Step 12 Step 13 Step 14 Command or Action end Example: Purpose Returns to privileged EXEC mode. Switch(config-if)# end show clns interface interface-id Example: Verifies your entries. Switch# show clns interface gigabitethernet 1/0/1 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Monitoring and Maintaining ISO IGRP and IS-IS You can remove all contents of a CLNS cache or remove information for a particular neighbor or route. You can display specific CLNS or IS-IS statistics, such as the contents of routing tables, caches, and databases. You can also display information about specific interfaces, filters, or neighbors. Table 41-13 lists the privileged EXEC commands for clearing and displaying ISO CLNS and IS-IS routing. For explanations of the display fields, see the Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS and XNS Command Reference, Release 12.4, use the Cisco IOS command reference master index, or search online. Table 107: ISO CLNS and IS-IS Clear and Show Commands clear clns cache clear clns es-neighbors clear clns is-neighbors clear clns neighbors clear clns route show clns show clns cache show clns es-neighbors Clears and reinitializes the CLNS routing cache. Removes end system (ES) neighbor information from the adjacency database. Removes intermediate system (IS) neighbor information from the adjacency database. Removes CLNS neighbor information from the adjacency database. Removes dynamically derived CLNS routing information. Displays information about the CLNS network. Displays the entries in the CLNS routing cache. Displays ES neighbor entries, including the associated areas. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1212 Routing Configuration Examples for ISO CLNS Routing show clns filter-expr show clns filter-set show clns interface [interface-id] show clns neighbor show clns protocol show clns route show clns traffic show ip route isis show isis database show isis routes show isis spf-log show isis topology show route-map trace clns destination which-route {nsap-address | clns-name} Displays filter expressions. Displays filter sets. Displays the CLNS-specific or ES-IS information about each interface. Displays information about IS-IS neighbors. List the protocol-specific information for each IS-IS or ISO IGRP routing process in this router. Displays all the destinations to which this router knows how to route CLNS packets. Displays information about the CLNS packets this router has seen. Displays the current state of the ISIS IP routing table. Displays the IS-IS link-state database. Displays the IS-IS Level 1 routing table. Displays a history of the shortest path first (SPF) calculations for IS-IS. Displays a list of all connected routers in all areas. Displays all route maps configured or only the one specified. Discover the paths taken to a specified destination by packets in the network. Displays the routing table in which the specified CLNS destination is found. Configuration Examples for ISO CLNS Routing Example: Configuring IS-IS Routing This example shows how to configure three routers to run conventional IS-IS as an IP routing protocol. In conventional IS-IS, all routers act as Level 1 and Level 2 routers (by default). Router A: Switch(config)# clns routing Switch(config)# router isis Switch(config-router)# net 49.0001.0000.0000.000a.00 Switch(config-router)# exit Switch(config)# interface gigabitethernet1/0/1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1213 Information About Multi-VRF CE Routing Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config-router)# exit Router B: Switch(config)# clns routing Switch(config)# router isis Switch(config-router)# net 49.0001.0000.0000.000b.00 Switch(config-router)# exit Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config-router)# exit Router C: Switch(config)# clns routing Switch(config)# router isis Switch(config-router)# net 49.0001.0000.0000.000c.00 Switch(config-router)# exit Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config-router)# exit Information About Multi-VRF CE Virtual Private Networks (VPNs) provide a secure way for customers to share bandwidth over an ISP backbone network. A VPN is a collection of sites sharing a common routing table. A customer site is connected to the service-provider network by one or more interfaces, and the service provider associates each interface with a VPN routing table, called a VPN routing/forwarding (VRF) table. The switch supports multiple VPN routing/forwarding (multi-VRF) instances in customer edge (CE) devices (multi-VRF CE) when the it is running the IP services or advanced IP services feature set. Multi-VRF CE allows a service provider to support two or more VPNs with overlapping IP addresses. Note The switch does not use Multiprotocol Label Switching (MPLS) to support VPNs. For information about MPLS VRF, see the Cisco IOS Switching Services Configuration Guide, Release 12.4. Understanding Multi-VRF CE Multi-VRF CE is a feature that allows a service provider to support two or more VPNs, where IP addresses can be overlapped among the VPNs. Multi-VRF CE uses input interfaces to distinguish routes for different Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1214 Routing Network Topology VPNs and forms virtual packet-forwarding tables by associating one or more Layer 3 interfaces with each VRF. Interfaces in a VRF can be either physical, such as Ethernet ports, or logical, such as VLAN SVIs, but an interface cannot belong to more than one VRF at any time. Note Multi-VRF CE interfaces must be Layer 3 interfaces. Multi-VRF CE includes these devices: · Customer edge (CE) devices provide customers access to the service-provider network over a data link to one or more provider edge routers. The CE device advertises the site's local routes to the router and learns the remote VPN routes from it. A switch can be a CE. · Provider edge (PE) routers exchange routing information with CE devices by using static routing or a routing protocol such as BGP, RIPv2, OSPF, or EIGRP. The PE is only required to maintain VPN routes for those VPNs to which it is directly attached, eliminating the need for the PE to maintain all of the service-provider VPN routes. Each PE router maintains a VRF for each of its directly connected sites. Multiple interfaces on a PE router can be associated with a single VRF if all of these sites participate in the same VPN. Each VPN is mapped to a specified VRF. After learning local VPN routes from CEs, a PE router exchanges VPN routing information with other PE routers by using internal BGP (IBPG). · Provider routers or core routers are any routers in the service provider network that do not attach to CE devices. With multi-VRF CE, multiple customers can share one CE, and only one physical link is used between the CE and the PE. The shared CE maintains separate VRF tables for each customer and switches or routes packets for each customer based on its own routing table. Multi-VRF CE extends limited PE functionality to a CE device, giving it the ability to maintain separate VRF tables to extend the privacy and security of a VPN to the branch office. Network Topology Figure 41-6 shows a configuration using switches as multiple virtual CEs. This scenario is suited for customers who have low bandwidth requirements for their VPN service, for example, small companies. In this case, multi-VRF CE support is required in the switches. Because multi-VRF CE is a Layer 3 feature, each interface in a VRF must be a Layer 3 interface. Figure 68: Switches Acting as Multiple Virtual CEs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1215 Packet-Forwarding Process Routing When the CE switch receives a command to add a Layer 3 interface to a VRF, it sets up the appropriate mapping between the VLAN ID and the policy label (PL) in multi-VRF-CE-related data structures and adds the VLAN ID and PL to the VLAN database. When multi-VRF CE is configured, the Layer 3 forwarding table is conceptually partitioned into two sections: · The multi-VRF CE routing section contains the routes from different VPNs. · The global routing section contains routes to non-VPN networks, such as the Internet. VLAN IDs from different VRFs are mapped into different policy labels, which are used to distinguish the VRFs during processing. For each new VPN route learned, the Layer 3 setup function retrieves the policy label by using the VLAN ID of the ingress port and inserts the policy label and new route to the multi-VRF CE routing section. If the packet is received from a routed port, the port internal VLAN ID number is used; if the packet is received from an SVI, the VLAN number is used. Packet-Forwarding Process This is the packet-forwarding process in a multi-VRF-CE-enabled network: · When the switch receives a packet from a VPN, the switch looks up the routing table based on the input policy label number. When a route is found, the switch forwards the packet to the PE. · When the ingress PE receives a packet from the CE, it performs a VRF lookup. When a route is found, the router adds a corresponding MPLS label to the packet and sends it to the MPLS network. · When an egress PE receives a packet from the network, it strips the label and uses the label to identify the correct VPN routing table. Then it performs the normal route lookup. When a route is found, it forwards the packet to the correct adjacency. · When a CE receives a packet from an egress PE, it uses the input policy label to look up the correct VPN routing table. If a route is found, it forwards the packet within the VPN. Network Components To configure VRF, you create a VRF table and specify the Layer 3 interface associated with the VRF. Then configure the routing protocols in the VPN and between the CE and the PE. BGP is the preferred routing protocol used to distribute VPN routing information across the provider's backbone. The multi-VRF CE network has three major components: · VPN route target communities--lists of all other members of a VPN community. You need to configure VPN route targets for each VPN community member. · Multiprotocol BGP peering of VPN community PE routers--propagates VRF reachability information to all members of a VPN community. You need to configure BGP peering in all PE routers within a VPN community. · VPN forwarding--transports all traffic between all VPN community members across a VPN service-provider network. VRF-Aware Services IP services can be configured on global interfaces, and these services run within the global routing instance. IP services are enhanced to run on multiple routing instances; they are VRF-aware. Any configured VRF in the system can be specified for a VRF-aware service. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1216 Routing How to Configure Multi-VRF CE VRF-Aware services are implemented in platform-independent modules. VRF means multiple routing instances in Cisco IOS. Each platform has its own limit on the number of VRFs it supports. VRF-aware services have the following characteristics: · The user can ping a host in a user-specified VRF. · ARP entries are learned in separate VRFs. The user can display Address Resolution Protocol (ARP) entries for specific VRFs. How to Configure Multi-VRF CE Default Multi-VRF CE Configuration Table 108: Default VRF Configuration Feature VRF Maps VRF maximum routes Forwarding table Default Setting Disabled. No VRFs are defined. No import maps, export maps, or route maps are defined. Fast Ethernet switches: 8000 Gigabit Ethernet switches: 12000. The default for an interface is the global routing table. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1217 Multi-VRF CE Configuration Guidelines Routing Multi-VRF CE Configuration Guidelines Note To use multi-VRF CE, you must have the IP services or advanced IP services feature set enabled on your switch. · A switch with multi-VRF CE is shared by multiple customers, and each customer has its own routing table. · Because customers use different VRF tables, the same IP addresses can be reused. Overlapped IP addresses are allowed in different VPNs. · Multi-VRF CE lets multiple customers share the same physical link between the PE and the CE. Trunk ports with multiple VLANs separate packets among customers. Each customer has its own VLAN. · Multi-VRF CE does not support all MPLS-VRF functionality. It does not support label exchange, LDP adjacency, or labeled packets. · For the PE router, there is no difference between using multi-VRF CE or using multiple CEs. In Figure 41-6, multiple virtual Layer 3 interfaces are connected to the multi-VRF CE device. · The switch supports configuring VRF by using physical ports, VLAN SVIs, or a combination of both. The SVIs can be connected through an access port or a trunk port. · A customer can use multiple VLANs as long as they do not overlap with those of other customers. A customer's VLANs are mapped to a specific routing table ID that is used to identify the appropriate routing tables stored on the switch. · The switch supports one global network and up to 26 VRFs. · Most routing protocols (BGP, OSPF, RIP, and static routing) can be used between the CE and the PE. However, we recommend using external BGP (EBGP) for these reasons: · BGP does not require multiple algorithms to communicate with multiple CEs. · BGP is designed for passing routing information between systems run by different administrations. · BGP makes it easy to pass attributes of the routes to the CE. · Multi-VRF CE does not affect the packet switching rate. · VPN multicast is not supported. · You can enable VRF on a private VLAN, and the reverse. · You cannot enable VRF when policy-based routing (PBR) is enabled on an interface, and the reverse. · You cannot enable VRF when Web Cache Communication Protocol (WCCP) is enabled on an interface, and the reverse. Configuring VRFs For complete syntax and usage information for the commands, see the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1218 Routing Configuring VRFs Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal ip routing Example: Enables IP routing. Switch(config)# ip routing ip vrf vrf-name Example: Names the VRF, and enter VRF configuration mode. Switch(config)# ip vrf vpn1 rd route-distinguisher Example: Switch(config-vrf)# rd 100:2 route-target {export | import | both} route-target-ext-community Example: Switch(config-vrf)# route-target both 100:2 import map route-map Example: Creates a VRF table by specifying a route distinguisher. Enter either an AS number and an arbitrary number (xxx:y) or an IP address and arbitrary number (A.B.C.D:y) Creates a list of import, export, or import and export route target communities for the specified VRF. Enter either an AS system number and an arbitrary number (xxx:y) or an IP address and an arbitrary number (A.B.C.D:y). The route-target-ext-community should be the same as the route-distinguisher entered in Step 4. (Optional) Associates a route map with the VRF. Switch(config-vrf)# import map importmap1 interface interface-id Example: Switch(config-vrf)# interface gigabitethernet 1/0/1 ip vrf forwarding vrf-name Example: Specifies the Layer 3 interface to be associated with the VRF, and enter interface configuration mode. The interface can be a routed port or SVI. Associates the VRF with the Layer 3 interface. Switch(config-if)# ip vrf forwarding vpn1 end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1219 Configuring VRF-Aware Services Routing Step 10 Step 11 Command or Action Switch(config-if)# end show ip vrf [brief | detail | interfaces] [vrf-name] Example: Switch# show ip vrf interfaces vpn1 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies the configuration. Displays information about the configured VRFs. (Optional) Saves your entries in the configuration file. Configuring VRF-Aware Services These services are VRF-Aware: · ARP · Ping · Simple Network Management Protocol (SNMP) · Unicast Reverse Path Forwarding (uRPF) · Syslog · Traceroute · FTP and TFTP Note The switch does not support VRF-aware services for Unicast Reverse Path Forwar......ding (uRPF) or Network Time Protocol (NTP). Configuring VRF-Aware Services for ARP For complete syntax and usage information for the commands, see the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4. show ip arp vrf vrf-name Step 1 Procedure Command or Action Example: Purpose Switch# show ip arp vrf vpn1 Displays the ARP table in the specified VRF. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1220 Routing Configuring VRF-Aware Services for Ping Configuring VRF-Aware Services for Ping For complete syntax and usage information for the commands, see the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4. Step 1 Procedure Command or Action ping vrf vrf-name ip-host Example: Purpose Displays the ARP table in the specified VRF. Switch# ping vrf vpn1 ip-host Configuring VRF-Aware Services for SNMP For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal snmp-server trap authentication vrf Example: Enables SNMP traps for packets on a VRF. Step 3 Switch(config)# snmp-server trap authentication vrf snmp-server engineID remote host vrf vpn-instance engine-id string Example: Configures a name for the remote SNMP engine on a switch. Step 4 Switch(config)# snmp-server engineID remote 172.16.20.3 vrf vpn1 80000009030000B064EFE100 snmp-server host host vrf vpn-instance traps community Specifies the recipient of an SNMP trap operation and Example: specifies the VRF table to be used for sending SNMP traps. Switch(config)# snmp-server host 172.16.20.3 vrf vpn1 traps comaccess Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1221 Configuring VRF-Aware Servcies for uRPF Routing Step 5 Step 6 Step 7 Command or Action Purpose snmp-server host host vrf vpn-instance informs community Specifies the recipient of an SNMP inform operation and Example: specifies the VRF table to be used for sending SNMP informs. Switch(config)# snmp-server host 172.16.20.3 vrf vpn1 informs comaccess snmp-server user user group remote host vrf vpn-instance Adds a user to an SNMP group for a remote host on a VRF security model for SNMP access. Example: Switch(config)# snmp-server user abcd remote 172.16.20.3 vrf vpn1 priv v2c 3des secure3des end Example: Returns to privileged EXEC mode. Switch(config)# end Configuring VRF-Aware Servcies for uRPF uRPF can be configured on an interface assigned to a VRF, and source lookup is done in the VRF table. For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Step 3 Switch# configure terminal interface interface-id Switch(config)# interface gigabitethernet 1/0/1 no switchport Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Removes the interface from Layer 2 configuration mode if it is a physical interface. Step 4 Switch(config-if)# no switchport ip vrf forwarding vrf-name Example: Configures VRF on the interface. Switch(config-if)# ip vrf forwarding vpn2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1222 Routing Configuring VRF-Aware RADIUS Step 5 Step 6 Step 7 Command or Action ip address ip-address Example: Purpose Enters the IP address for the interface. Switch(config-if)# ip address 10.1.5.1 ip verify unicast reverse-path Example: Enables uRPF on the interface. Switch(config-if)# ip verify unicast reverse-path end Example: Returns to privileged EXEC mode. Switch(config-if)# end Configuring VRF-Aware RADIUS To configure VRF-Aware RADIUS, you must first enable AAA on a RADIUS server. The switch supports the ip vrf forwarding vrf-name server-group configuration and the ip radius source-interface global configuration commands, as described in the Per VRF AAA Feature Guide. Configuring VRF-Aware Services for Syslog For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal logging on Example: Enables or temporarily disables logging of storage router event message. Step 3 Switch(config)# logging on logging host ip-address vrf vrf-name Example: Specifies the host address of the syslog server where logging messages are to be sent. Step 4 Switch(config)# logging host 10.10.1.0 vrf vpn1 logging buffered logging buffered size debugging Example: Logs messages to an internal buffer. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1223 Configuring VRF-Aware Services for Traceroute Routing Step 5 Step 6 Step 7 Command or Action Purpose Switch(config)# logging buffered critical 6000 debugging logging trap debugging Example: Limits the logging messages sent to the syslog server. Switch(config)# logging trap debugging logging facility facility Example: Sends system logging messages to a logging facility. Switch(config)# logging facility user end Example: Returns to privileged EXEC mode. Switch(config)# end Configuring VRF-Aware Services for Traceroute For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4. Step 1 Procedure Command or Action traceroute vrf vrf-name ipaddress Example: Purpose Specifies the name of a VPN VRF in which to find the destination address. Switch(config)# traceroute vrf vpn2 10.10.1.1 Configuring VRF-Aware Services for FTP and TFTP So that FTP and TFTP are VRF-aware, you must configure some FTP/TFTP CLIs. For example, if you want to use a VRF table that is attached to an interface, say E1/0, you need to configure the ip tftp source-interface E1/0 or the ip ftp source-interface E1/0 command to inform TFTP or FTP server to use a specific routing table. In this example, the VRF table is used to look up the destination IP address. These changes are backward-compatible and do not affect existing behavior. That is, you can use the source-interface CLI to send packets out a particular interface even if no VRF is configured on that interface. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1224 Routing Configuring Multicast VRFs Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Purpose Switch# configure terminal ip ftp source-interface interface-type interface-number Specifies the source IP address for FTP connections. Example: Switch(config)# ip ftp source-interface gigabitethernet 1/0/2 end Example: Returns to privileged EXEC mode. Switch(config)#end configure terminal Example: Enters global configuration mode. Switch# configure terminal ip tftp source-interface interface-type interface-number Specifies the source IP address for TFTP connections. Example: Switch(config)# ip tftp source-interface gigabitethernet 1/0/2 end Example: Returns to privileged EXEC mode. Switch(config)#end Configuring Multicast VRFs For complete syntax and usage information for the commands, see the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4. For more information about configuring a multicast within a Multi-VRF CE, see the Cisco IOS IP Multicast Configuration Guide, Release 12.4. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1225 Configuring Multicast VRFs Routing Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action ip routing Example: Purpose Enables IP routing mode. Switch(config)# ip routing ip vrf vrf-name Example: Names the VRF, and enter VRF configuration mode. Switch(config)# ip vrf vpn1 rd route-distinguisher Example: Switch(config-vrf)# rd 100:2 route-target {export | import | both} route-target-ext-community Example: Switch(config-vrf)# route-target import 100:2 import map route-map Example: Creates a VRF table by specifying a route distinguisher. Enter either an AS number and an arbitrary number (xxx:y) or an IP address and an arbitrary number (A.B.C.D:y) Creates a list of import, export, or import and export route target communities for the specified VRF. Enter either an AS system number and an arbitrary number (xxx:y) or an IP address and an arbitrary number (A.B.C.D:y). The route-target-ext-community should be the same as the route-distinguisher entered in Step 4. (Optional) Associates a route map with the VRF. Switch(config-vrf)# import map importmap1 ip multicast-routing vrf vrf-name distributed Example: (Optional) Enables global multicast routing for VRF table. Switch(config-vrf)# ip multicast-routing vrf vpn1 distributed interface interface-id Example: Specifies the Layer 3 interface to be associated with the VRF, and enter interface configuration mode. The interface can be a routed port or an SVI. Switch(config-vrf)# interface gigabitethernet 1/0/2 ip vrf forwarding vrf-name Example: Associates the VRF with the Layer 3 interface. Switch(config-if)# ip vrf forwarding vpn1 ip address ip-address mask Example: Configures IP address for the Layer 3 interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1226 Routing Configuring a VPN Routing Session Step 11 Step 12 Step 13 Step 14 Command or Action Switch(config-if)# ip address 10.1.5.1 255.255.255.0 ip pim sparse-dense mode Example: Switch(config-if)# ip pim sparse-dense mode end Example: Switch(config-if)# end show ip vrf [brief | detail | interfaces] [vrf-name] Example: Switch# show ip vrf detail vpn1 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enables PIM on the VRF-associated Layer 3 interface. Returns to privileged EXEC mode. Verifies the configuration. Displays information about the configured VRFs. (Optional) Saves your entries in the configuration file. Configuring a VPN Routing Session Routing within the VPN can be configured with any supported routing protocol (RIP, OSPF, EIGRP, or BGP) or with static routing. The configuration shown here is for OSPF, but the process is the same for other protocols. Note To configure an EIGRP routing process to run within a VRF instance, you must configure an autonomous-system number by entering the autonomous-system autonomous-system-number address-family configuration mode command. Step 1 Step 2 Procedure Command or Action configure terminal Example: Switch# configure terminal router ospf process-id vrf vrf-name Example: Switch(config)# router ospf 1 vrf vpn1 Purpose Enters global configuration mode. Enables OSPF routing, specifies a VPN forwarding table, and enter router configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1227 Configuring BGP PE to CE Routing Sessions Routing Step 3 Step 4 Command or Action log-adjacency-changes Example: Purpose (Optional) Logs changes in the adjacency state. This is the default state. Switch(config-router)# log-adjacency-changes redistribute bgp autonomous-system-number subnets Example: Sets the switch to redistribute information from the BGP network to the OSPF network. Switch(config-router)# redistribute bgp 10 subnets Step 5 Step 6 Step 7 Step 8 network network-number area area-id Example: Switch(config-router)# network 1 area 2 end Example: Switch(config-router)# end show ip ospf process-id Example: Switch# show ip ospf 1 copy running-config startup-config Example: Switch# copy running-config startup-config Defines a network address and mask on which OSPF runs and the area ID for that network address. Returns to privileged EXEC mode. Verifies the configuration of the OSPF network. (Optional) Saves your entries in the configuration file. Configuring BGP PE to CE Routing Sessions Step 1 Step 2 Procedure Command or Action configure terminal Example: Switch# configure terminal router bgp autonomous-system-number Example: Switch(config)# router bgp 2 Purpose Enters global configuration mode. Configures the BGP routing process with the AS number passed to other BGP routers, and enter router configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1228 Routing Configuring BGP PE to CE Routing Sessions Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action network network-number mask network-mask Example: Purpose Specifies a network and mask to announce using BGP. Switch(config-router)# network 5 mask 255.255.255.0 redistribute ospf process-id match internal Example: Sets the switch to redistribute OSPF internal routes. Switch(config-router)# redistribute ospf 1 match internal network network-number area area-id Example: Defines a network address and mask on which OSPF runs and the area ID for that network address. Switch(config-router)# network 5 area 2 address-family ipv4 vrf vrf-name Example: Defines BGP parameters for PE to CE routing sessions, and enter VRF address-family mode. Switch(config-router)# address-family ipv4 vrf vpn1 neighbor address remote-as as-number Example: Defines a BGP session between PE and CE routers. Switch(config-router)# neighbor 10.1.1.2 remote-as 2 neighbor address activate Example: Activates the advertisement of the IPv4 address family. Switch(config-router)# neighbor 10.2.1.1 activate end Example: Switch(config-router)# end show ip bgp [ipv4] [neighbors] Example: Switch# show ip bgp ipv4 neighbors copy running-config startup-config Example: Returns to privileged EXEC mode. Verifies BGP configuration. (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1229 Monitoring Multi-VRF CE Routing Command or Action Switch# copy running-config startup-config Purpose Monitoring Multi-VRF CE Table 109: Commands for Displaying Multi-VRF CE Information show ip protocols vrf vrf-name Displays routing protocol information associated with a VRF. show ip route vrf vrf-name [connected] [protocol Displays IP routing table information associated with [as-number]] [list] [mobile] [odr] [profile] [static] a VRF. [summary] [supernets-only] show ip vrf [brief | detail | interfaces] [vrf-name] Displays information about the defined VRF instances. For more information about the information in the displays, see the Cisco IOS Switching Services Command Reference, Release 12.4. Configuration Examples for Multi-VRF CE Multi-VRF CE Configuration Example Figure 41-7 is a simplified example of the physical connections in a network similar to that in Figure 41-6. OSPF is the protocol used in VPN1, VPN2, and the global network. BGP is used in the CE to PE connections. The examples following the illustration show how to configure a switch as CE Switch A, and the VRF configuration for customer switches D and F. Commands for configuring CE Switch C and the other customer switches are not included but would be similar. The example also includes commands for configuring traffic to Switch A for a Catalyst 6000 or Catalyst 6500 switch acting as a PE router. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1230 Routing Figure 69: Multi-VRF CE Configuration Example Multi-VRF CE Configuration Example On Switch A, enable routing and configure VRF. Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip routing Switch(config)# ip vrf v11 Switch(config-vrf)# rd 800:1 Switch(config-vrf)# route-target export 800:1 Switch(config-vrf)# route-target import 800:1 Switch(config-vrf)# exit Switch(config)# ip vrf v12 Switch(config-vrf)# rd 800:2 Switch(config-vrf)# route-target export 800:2 Switch(config-vrf)# route-target import 800:2 Switch(config-vrf)# exit Configure the loopback and physical interfaces on Switch A. Gigabit Ethernet port 1 is a trunk connection to the PE. Gigabit Ethernet ports 8 and 11 connect to VPNs: Switch(config)# interface loopback1 Switch(config-if)# ip vrf forwarding v11 Switch(config-if)# ip address 8.8.1.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface loopback2 Switch(config-if)# ip vrf forwarding v12 Switch(config-if)# ip address 8.8.2.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface gigabitethernet1/0/5 Switch(config-if)# switchport trunk encapsulation dot1q Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1231 Multi-VRF CE Configuration Example Routing Switch(config-if)# switchport mode trunk Switch(config-if)# no ip address Switch(config-if)# exit Switch(config)# interface gigabitethernet1/0/8 Switch(config-if)# switchport access vlan 208 Switch(config-if)# no ip address Switch(config-if)# exit Switch(config)# interface gigabitethernet1/0/11 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport mode trunk Switch(config-if)# no ip address Switch(config-if)# exit Configure the VLANs used on Switch A. VLAN 10 is used by VRF 11 between the CE and the PE. VLAN 20 is used by VRF 12 between the CE and the PE. VLANs 118 and 208 are used for the VPNs that include Switch F and Switch D, respectively: Switch(config)# interface vlan10 Switch(config-if)# ip vrf forwarding v11 Switch(config-if)# ip address 38.0.0.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface vlan20 Switch(config-if)# ip vrf forwarding v12 Switch(config-if)# ip address 83.0.0.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface vlan118 Switch(config-if)# ip vrf forwarding v12 Switch(config-if)# ip address 118.0.0.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface vlan208 Switch(config-if)# ip vrf forwarding v11 Switch(config-if)# ip address 208.0.0.8 255.255.255.0 Switch(config-if)# exit Configure OSPF routing in VPN1 and VPN2. Switch(config)# router ospf 1 vrf vl1 Switch(config-router)# redistribute bgp 800 subnets Switch(config-router)# network 208.0.0.0 0.0.0.255 area 0 Switch(config-router)# exit Switch(config)# router ospf 2 vrf vl2 Switch(config-router)# redistribute bgp 800 subnets Switch(config-router)# network 118.0.0.0 0.0.0.255 area 0 Switch(config-router)# exit Configure BGP for CE to PE routing. Switch(config)# router bgp 800 Switch(config-router)# address-family ipv4 vrf vl2 Switch(config-router-af)# redistribute ospf 2 match internal Switch(config-router-af)# neighbor 83.0.0.3 remote-as 100 Switch(config-router-af)# neighbor 83.0.0.3 activate Switch(config-router-af)# network 8.8.2.0 mask 255.255.255.0 Switch(config-router-af)# exit Switch(config-router)# address-family ipv4 vrf vl1 Switch(config-router-af)# redistribute ospf 1 match internal Switch(config-router-af)# neighbor 38.0.0.3 remote-as 100 Switch(config-router-af)# neighbor 38.0.0.3 activate Switch(config-router-af)# network 8.8.1.0 mask 255.255.255.0 Switch(config-router-af)# end Switch D belongs to VPN 1. Configure the connection to Switch A by using these commands. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1232 Routing Multi-VRF CE Configuration Example Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip routing Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# no switchport Switch(config-if)# ip address 208.0.0.20 255.255.255.0 Switch(config-if)# exit Switch(config)# router ospf 101 Switch(config-router)# network 208.0.0.0 0.0.0.255 area 0 Switch(config-router)# end Switch F belongs to VPN 2. Configure the connection to Switch A by using these commands. Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip routing Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport mode trunk Switch(config-if)# no ip address Switch(config-if)# exit Switch(config)# interface vlan118 Switch(config-if)# ip address 118.0.0.11 255.255.255.0 Switch(config-if)# exit Switch(config)# router ospf 101 Switch(config-router)# network 118.0.0.0 0.0.0.255 area 0 Switch(config-router)# end When used on switch B (the PE router), these commands configure only the connections to the CE device, Switch A. Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# ip vrf v1 Router(config-vrf)# rd 100:1 Router(config-vrf)# route-target export 100:1 Router(config-vrf)# route-target import 100:1 Router(config-vrf)# exit Router(config)# ip vrf v2 Router(config-vrf)# rd 100:2 Router(config-vrf)# route-target export 100:2 Router(config-vrf)# route-target import 100:2 Router(config-vrf)# exit Router(config)# ip cef Router(config)# interface Loopback1 Router(config-if)# ip vrf forwarding v1 Router(config-if)# ip address 3.3.1.3 255.255.255.0 Router(config-if)# exit Router(config)# interface Loopback2 Router(config-if)# ip vrf forwarding v2 Router(config-if)# ip address 3.3.2.3 255.255.255.0 Router(config-if)# exit Router(config)# interface gigabitethernet1/1/0.10 Router(config-if)# encapsulation dot1q 10 Router(config-if)# ip vrf forwarding v1 Router(config-if)# ip address 38.0.0.3 255.255.255.0 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1233 Configuring Unicast Reverse Path Forwarding Routing Router(config-if)# exit Router(config)# interface gigabitethernet1/1/0.20 Router(config-if)# encapsulation dot1q 20 Router(config-if)# ip vrf forwarding v2 Router(config-if)# ip address 83.0.0.3 255.255.255.0 Router(config-if)# exit Router(config)# router bgp 100 Router(config-router)# address-family ipv4 vrf v2 Router(config-router-af)# neighbor 83.0.0.8 remote-as 800 Router(config-router-af)# neighbor 83.0.0.8 activate Router(config-router-af)# network 3.3.2.0 mask 255.255.255.0 Router(config-router-af)# exit Router(config-router)# address-family ipv4 vrf vl Router(config-router-af)# neighbor 38.0.0.8 remote-as 800 Router(config-router-af)# neighbor 38.0.0.8 activate Router(config-router-af)# network 3.3.1.0 mask 255.255.255.0 Router(config-router-af)# end Configuring Unicast Reverse Path Forwarding The unicast reverse path forwarding (unicast RPF) feature helps to mitigate problems that are caused by the introduction of malformed or forged (spoofed) IP source addresses into a network by discarding IP packets that lack a verifiable IP source address. For example, a number of common types of denial-of-service (DoS) attacks, including Smurf and Tribal Flood Network (TFN), can take advantage of forged or rapidly changing source IP addresses to allow attackers to thwart efforts to locate or filter the attacks. For Internet service providers (ISPs) that provide public access, Unicast RPF deflects such attacks by forwarding only packets that have source addresses that are valid and consistent with the IP routing table. This action protects the network of the ISP, its customer, and the rest of the Internet. Note · Unicast RPF is supported only in IP services. · Do not configure unicast RPF if the switch is in a mixed hardware stack combining more than one switch type: Catalyst 3750-X, Catalyst 3750-E, and Catalyst 3750 switches. For detailed IP unicast RPF configuration information, see the Other Security Features chapter in the Cisco IOS Security Configuration Guide, Release 12.4. Protocol-Independent Features This section describes IP routing protocol-independent features that are available on switches running the IP base or the IP services feature set; except that with the IP base feature set, protocol-related features are available only for RIP. For a complete description of the IP routing protocol-independent commands in this chapter, see the "IP Routing Protocol-Independent Commands" chapter of the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4. · Configuring Distributed Cisco Express Forwarding, page 41-118 · Configuring the Number of Equal-Cost Routing Paths, page 41-120 · Configuring Static Unicast Routes, page 41-121 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1234 Routing Distributed Cisco Express Forwarding · Specifying Default Routes and Networks, page 41-123 · Using Route Maps to Redistribute Routing Information, page 41-124 · Configuring Policy-Based Routing, page 41-130 · Filtering Routing Information, page 41-134 · Managing Authentication Keys, page 41-137 Distributed Cisco Express Forwarding Information About Cisco Express Forwarding Cisco Express Forwarding (CEF) is a Layer 3 IP switching technology used to optimize network performance. CEF implements an advanced IP look-up and forwarding algorithm to deliver maximum Layer 3 switching performance. CEF is less CPU-intensive than fast switching route caching, allowing more CPU processing power to be dedicated to packet forwarding. In a switch stack, the hardware uses distributed CEF (dCEF) in the stack. In dynamic networks, fast switching cache entries are frequently invalidated because of routing changes, which can cause traffic to be process switched using the routing table, instead of fast switched using the route cache. CEF and dCEF use the Forwarding Information Base (FIB) lookup table to perform destination-based switching of IP packets. The two main components in CEF and dCEF are the distributed FIB and the distributed adjacency tables. · The FIB is similar to a routing table or information base and maintains a mirror image of the forwarding information in the IP routing table. When routing or topology changes occur in the network, the IP routing table is updated, and those changes are reflected in the FIB. The FIB maintains next-hop address information based on the information in the IP routing table. Because the FIB contains all known routes that exist in the routing table, CEF eliminates route cache maintenance, is more efficient for switching traffic, and is not affected by traffic patterns. · Nodes in the network are said to be adjacent if they can reach each other with a single hop across a link layer. CEF uses adjacency tables to prepend Layer 2 addressing information. The adjacency table maintains Layer 2 next-hop addresses for all FIB entries. Because the switch or switch stack uses Application Specific Integrated Circuits (ASICs) to achieve Gigabit-speed line rate IP traffic, CEF or dCEF forwarding applies only to the software-forwarding path, that is, traffic that is forwarded by the CPU. How to Configure Cisco Express Forwarding CEF or distributed CEF is enabled globally by default. If for some reason it is disabled, you can re-enable it by using the ip cef or ip cef distributed global configuration command. The default configuration is CEF or dCEF enabled on all Layer 3 interfaces. Entering the no ip route-cache cef interface configuration command disables CEF for traffic that is being forwarded by software. This command does not affect the hardware forwarding path. Disabling CEF and using the debug ip packet detail privileged EXEC command can be useful to debug software-forwarded traffic. To enable CEF on an interface for the software-forwarding path, use the ip route-cache cef interface configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1235 How to Configure Cisco Express Forwarding Routing Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Caution Although the no ip route-cache cef interface configuration command to disable CEF on an interface is visible in the CLI, we strongly recommend that you do not disable CEF or dCEF on interfaces except for debugging purposes. To enable CEF or dCEF globally and on an interface for software-forwarded traffic if it has been disabled: Procedure Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal ip cef Example: Enables CEF operation on a non-stacking switch. Go to Step 4. Switch(config)# ip cef ip cef distributed Example: Enables CEF operation on a active switch. Switch(config)# ip cef distributed interface interface-id Example: Enters interface configuration mode, and specifies the Layer 3 interface to configure. Switch(config)# interface gigabitethernet 1/0/1 ip route-cache cef Example: Enables CEF on the interface for software-forwarded traffic. Switch(config-if)# ip route-cache cef end Example: Returns to privileged EXEC mode. Switch(config-if)# end show ip cef Example: Displays the CEF status on all interfaces. Switch# show ip cef show cef linecard [detail] Example: (Optional) Displays CEF-related interface information on a non-stacking switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1236 Routing Number of Equal-Cost Routing Paths Step 9 Step 10 Step 11 Step 12 Command or Action Purpose Switch# show cef linecard detail show cef linecard [slot-number] [detail] Example: Switch# show cef linecard 5 detail show cef interface [interface-id] Example: (Optional) Displays CEF-related interface information on a switch by stack member for all switches in the stack or for the specified switch. (Optional) For slot-number, enter the stack member switch number. Displays detailed CEF information for all interfaces or the specified interface. Switch# show cef interface gigabitethernet 1/0/1 show adjacency Example: Displays CEF adjacency table information. Switch# show adjacency copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Number of Equal-Cost Routing Paths Information About Equal-Cost Routing Paths When a router has two or more routes to the same network with the same metrics, these routes can be thought of as having an equal cost. The term parallel path is another way to see occurrences of equal-cost routes in a routing table. If a router has two or more equal-cost paths to a network, it can use them concurrently. Parallel paths provide redundancy in case of a circuit failure and also enable a router to load balance packets over the available paths for more efficient use of available bandwidth. Equal-cost routes are supported across switches in a stack. Even though the router automatically learns about and configures equal-cost routes, you can control the maximum number of parallel paths supported by an IP routing protocol in its routing table. Although the switch software allows a maximum of 32 equal-cost routes, the switch hardware will never use more than 16 paths per route. How to Configure Equal-Cost Routing Paths Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1237 Static Unicast Routes Routing Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Switch# configure terminal router {bgp | rip | ospf | eigrp} Example: Switch(config)# router eigrp maximum-paths maximum Example: Switch(config-router)# maximum-paths 2 end Example: Switch(config-router)# end show ip protocols Example: Switch# show ip protocols copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enters router configuration mode. Sets the maximum number of parallel paths for the protocol routing table. The range is from 1 to 16; the default is 4 for most IP routing protocols, but only 1 for BGP. Returns to privileged EXEC mode. Verifies the setting in the Maximum path field. (Optional) Saves your entries in the configuration file. Static Unicast Routes Information About Static Unicast Routes Static unicast routes are user-defined routes that cause packets moving between a source and a destination to take a specified path. Static routes can be important if the router cannot build a route to a particular destination and are useful for specifying a gateway of last resort to which all unroutable packets are sent. The switch retains static routes until you remove them. However, you can override static routes with dynamic routing information by assigning administrative distance values. Each dynamic routing protocol has a default administrative distance, as listed in Table 41-16. If you want a static route to be overridden by information from a dynamic routing protocol, set the administrative distance of the static route higher than that of the dynamic protocol. Table 110: Dynamic Routing Protocol Default Administrative Distances Route Source Connected interface Static route Default Distance 0 1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1238 Routing Configuring Static Unicast Routes Route Source Enhanced IRGP summary route External BGP Internal Enhanced IGRP IGRP OSPF Internal BGP Unknown Default Distance 5 20 90 100 110 200 225 Static routes that point to an interface are advertised through RIP, IGRP, and other dynamic routing protocols, whether or not static redistribute router configuration commands were specified for those routing protocols. These static routes are advertised because static routes that point to an interface are considered in the routing table to be connected and hence lose their static nature. However, if you define a static route to an interface that is not one of the networks defined in a network command, no dynamic routing protocols advertise the route unless a redistribute static command is specified for these protocols. When an interface goes down, all static routes through that interface are removed from the IP routing table. When the software can no longer find a valid next hop for the address specified as the forwarding router's address in a static route, the static route is also removed from the IP routing table. Configuring Static Unicast Routes Static unicast routes are user-defined routes that cause packets moving between a source and a destination to take a specified path. Static routes can be important if the router cannot build a route to a particular destination and are useful for specifying a gateway of last resort to which all unroutable packets are sent. Beginning in privileged EXEC mode, follow these steps to configure a static route: Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal ip route prefix mask {address | interface} [distance] Example: Establish a static route. Step 3 Switch(config)# ip route prefix mask gigabitethernet 1/0/4 end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1239 Default Routes and Networks Routing Step 4 Step 5 Command or Action Switch(config)# end show ip route Example: Switch# show ip route copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Displays the current state of the routing table to verify the configuration. (Optional) Saves your entries in the configuration file. Default Routes and Networks Information About Default Routes and Networks A router might not be able to learn the routes to all other networks. To provide complete routing capability, you can use some routers as smart routers and give the remaining routers default routes to the smart router. (Smart routers have routing table information for the entire internetwork.) These default routes can be dynamically learned or can be configured in the individual routers. Most dynamic interior routing protocols include a mechanism for causing a smart router to generate dynamic default information that is then forwarded to other routers. If a router has a directly connected interface to the specified default network, the dynamic routing protocols running on that device generate a default route. In RIP, it advertises the pseudonetwork 0.0.0.0. A router that is generating the default for a network also might need a default of its own. One way a router can generate its own default is to specify a static route to the network 0.0.0.0 through the appropriate device. When default information is passed through a dynamic routing protocol, no further configuration is required. The system periodically scans its routing table to choose the optimal default network as its default route. In IGRP networks, there might be several candidate networks for the system default. Cisco routers use administrative distance and metric information to set the default route or the gateway of last resort. If dynamic default information is not being passed to the system, candidates for the default route are specified with the ip default-network global configuration command. If this network appears in the routing table from any source, it is flagged as a possible choice for the default route. If the router has no interface on the default network, but does have a path to it, the network is considered as a possible candidate, and the gateway to the best default path becomes the gateway of last resort. How to Configure Default Routes and Networks Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1240 Routing Route Maps to Redistribute Routing Information Step 2 Step 3 Step 4 Step 5 Command or Action Switch# configure terminal ip default-network network number Example: Switch(config)# ip default-network 1 end Example: Switch(config)# end show ip route Example: Switch# show ip route copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Specifies a default network. Returns to privileged EXEC mode. Displays the selected default route in the gateway of last resort display. (Optional) Saves your entries in the configuration file. Route Maps to Redistribute Routing Information Information About Route Maps The switch can run multiple routing protocols simultaneously, and it can redistribute information from one routing protocol to another. Redistributing information from one routing protocol to another applies to all supported IP-based routing protocols. You can also conditionally control the redistribution of routes between routing domains by defining enhanced packet filters or route maps between the two domains. The match and set route-map configuration commands define the condition portion of a route map. The match command specifies that a criterion must be matched. The set command specifies an action to be taken if the routing update meets the conditions defined by the match command. Although redistribution is a protocol-independent feature, some of the match and set route-map configuration commands are specific to a particular protocol. One or more match commands and one or more set commands follow a route-map command. If there are no match commands, everything matches. If there are no set commands, nothing is done, other than the match. Therefore, you need at least one match or set command. Note A route map with no set route-map configuration commands is sent to the CPU, which causes high CPU utilization. You can also identify route-map statements as permit or deny. If the statement is marked as a deny, the packets meeting the match criteria are sent back through the normal forwarding channels (destination-based Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1241 How to Configure a Route Map Routing routing). If the statement is marked as permit, set clauses are applied to packets meeting the match criteria. Packets that do not meet the match criteria are forwarded through the normal routing channel. You can use the BGP route map continue clause to execute additional entries in a route map after an entry is executed with successful match and set clauses. You can use the continue clause to configure and organize more modular policy definitions so that specific policy configurations need not be repeated within the same route map. The switch supports the continue clause for outbound policies. For more information about using the route map continue clause, see the BGP Route-Map Continue Support for an Outbound Policy feature guide for Cisco IOS Release 12.4(4)T. How to Configure a Route Map Although each of Steps 3 through 14 in the following section is optional, you must enter at least one match route-map configuration command and one set route-map configuration command. Step 1 Step 2 Step 3 Step 4 Note The keywords are the same as defined in the procedure to control the route distribution. Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal route-map map-tag [permit | deny] [sequence number] Example: Switch(config)# route-map rip-to-ospf permit 4 Defines any route maps used to control redistribution and enter route-map configuration mode. map-tag--A meaningful name for the route map. The redistribute router configuration command uses this name to reference this route map. Multiple route maps might share the same map tag name. (Optional) If permit is specified and the match criteria are met for this route map, the route is redistributed as controlled by the set actions. If deny is specified, the route is not redistributed. sequence number (Optional)-- Number that indicates the position a new route map is to have in the list of route maps already configured with the same name. match as-path path-list-number Example: Matches a BGP AS path access list. Switch(config-route-map)#match as-path 10 match community-list community-list-number [exact] Matches a BGP community list. Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1242 Routing How to Configure a Route Map Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose Switch(config-route-map)# match community-list 150 match ip address {access-list-number | access-list-name} Matches a standard access list by specifying the name or [...access-list-number | ...access-list-name] number. It can be an integer from 1 to 199. Example: Switch(config-route-map)# match ip address 5 80 match metric metric-value Example: Matches the specified route metric. The metric-value can be an EIGRP metric with a specified value from 0 to 4294967295. Switch(config-route-map)# match metric 2000 match ip next-hop {access-list-number | access-list-name} Matches a next-hop router address passed by one of the [...access-list-number | ...access-list-name] access lists specified (numbered from 1 to 199). Example: Switch(config-route-map)# match ip next-hop 8 45 match tag tag value [...tag-value] Example: Matches the specified tag value in a list of one or more route tag values. Each can be an integer from 0 to 4294967295. Switch(config-route-map)# match tag 3500 match interface type number [...type number] Example: Matches the specified next hop route out one of the specified interfaces. Switch(config-route-map)# match interface gigabitethernet 1/0/1 match ip route-source {access-list-number | access-list-name} [...access-list-number | ...access-list-name] Example: Matches the address specified by the specified advertised access lists. Switch(config-route-map)# match ip route-source 10 30 match route-type {local | internal | external [type-1 | Matches the specified route-type: type-2]} · local--Locally generated BGP routes. Example: · internal--OSPF intra-area and interarea routes or Switch(config-route-map)# match route-type local EIGRP internal routes. · external--OSPF external routes (Type 1 or Type 2) or EIGRP external routes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1243 How to Configure a Route Map Routing Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Command or Action Purpose set dampening halflife reuse suppress max-suppress-time Sets BGP route dampening factors. Example: Switch(config-route-map)# set dampening 30 1500 10000 120 set local-preference value Example: Assigns a value to a local BGP path. Switch(config-route-map)# set local-preference 100 set origin {igp | egp as | incomplete} Example: Sets the BGP origin code. Switch(config-route-map)#set origin igp set as-path {tag | prepend as-path-string} Example: Modifies the BGP autonomous system path. Switch(config-route-map)# set as-path tag set level {level-1 | level-2 | level-1-2 | stub-area | backbone} Example: Sets the level for routes that are advertised into the specified area of the routing domain. The stub-area and backbone are OSPF NSSA and backbone areas. Switch(config-route-map)# set level level-1-2 set metric metric value Example: Sets the metric value to give the redistributed routes (for EIGRP only). The metric value is an integer from -294967295 to 294967295. Switch(config-route-map)# set metric 100 set metric bandwidth delay reliability loading mtu Sets the metric value to give the redistributed routes (for Example: EIGRP only): · bandwidth--Metric value or IGRP bandwidth of the Switch(config-route-map)# set metric 10000 10 255 route in kilobits per second in the range 0 to 1 1500 4294967295 · delay--Route delay in tens of microseconds in the range 0 to 4294967295. · reliability--Likelihood of successful packet transmission expressed as a number between 0 and 255, where 255 means 100 percent reliability and 0 means no reliability. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1244 Routing How to Control Route Distribution Step 19 Step 20 Command or Action Purpose · loading--Effective bandwidth of the route expressed as a number from 0 to 255 (255 is 100 percent loading). · mtu--Minimum maximum transmission unit (MTU) size of the route in bytes in the range 0 to 4294967295. set metric-type {type-1 | type-2} Example: Sets the OSPF external metric type for redistributed routes. Switch(config-route-map)# set metric-type type-2 set metric-type internal Example: Sets the multi-exit discriminator (MED) value on prefixes advertised to external BGP neighbor to match the IGP metric of the next hop. Switch(config-route-map)# set metric-type internal Step 21 Step 22 Step 23 Step 24 set weight number Example: Switch(config-route-map)# set weight 100 end Example: Switch(config-route-map)# end show route-map Example: Switch# show route-map copy running-config startup-config Example: Switch# copy running-config startup-config Sets the BGP weight for the routing table. The value can be from 1 to 65535. Returns to privileged EXEC mode. Displays all route maps configured or only the one specified to verify configuration. (Optional) Saves your entries in the configuration file. How to Control Route Distribution Although each of Steps 3 through 14 in the following section is optional, you must enter at least one match route-map configuration command and one set route-map configuration command. Note The keywords are the same as defined in the procedure to configure the route map for redistritbution. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1245 How to Control Route Distribution Routing The metrics of one routing protocol do not necessarily translate into the metrics of another. For example, the RIP metric is a hop count, and the IGRP metric is a combination of five qualities. In these situations, an artificial metric is assigned to the redistributed route. Uncontrolled exchanging of routing information between different routing protocols can create routing loops and seriously degrade network operation. If you have not defined a default redistribution metric that replaces metric conversion, some automatic metric translations occur between routing protocols: · RIP can automatically redistribute static routes. It assigns static routes a metric of 1 (directly connected). · Any protocol can redistribute other routing protocols if a default mode is in effect. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router {bgp | rip | ospf | eigrp} Example: Enters router configuration mode. Switch(config)# router bgp redistribute protocol [process-id] {level-1 | level-1-2 | level-2} [metric metric-value] [metric-type type-value] [match internal | external type-value] [tag tag-value] [route-map map-tag] [weight weight] [subnets] Example: Redistributes routes from one routing protocol to another routing protocol. If no route-maps are specified, all routes are redistributed. If the keyword route-map is specified with no map-tag, no routes are distributed. Switch(config-router)# redistribute bgp 300 level-1-2 route-map bgp-to-ospf default-metric number Example: Cause the current routing protocol to use the same metric value for all redistributed routes (BGP, RIP and OSPF). Switch(config-router)# default-metric 1024 default-metric bandwidth delay reliability loading mtu Example: Cause the EIGRP routing protocol to use the same metric value for all non-EIGRP redistributed routes. Switch(config-router)# default-metric 1000 100 250 100 1500 end Example: Returns to privileged EXEC mode. Switch(config-router)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1246 Routing Policy-Based Routing Step 7 Step 8 Command or Action show route-map Example: Switch# show route-map copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Displays all route maps configured or only the one specified to verify configuration. (Optional) Saves your entries in the configuration file. Policy-Based Routing Information About Policy-Based Routing You can use policy-based routing (PBR) to configure a defined policy for traffic flows. By using PBR, you can have more control over routing by reducing the reliance on routes derived from routing protocols. PBR can specify and implement routing policies that allow or deny paths based on: · Identity of a particular end system · Application · Protocol You can use PBR to provide equal-access and source-sensitive routing, routing based on interactive versus batch traffic, or routing based on dedicated links. For example, you could transfer stock records to a corporate office on a high-bandwidth, high-cost link for a short time while transmitting routine application data such as e-mail over a low-bandwidth, low-cost link. With PBR, you classify traffic using access control lists (ACLs) and then make traffic go through a different path. PBR is applied to incoming packets. All packets received on an interface with PBR enabled are passed through route maps. Based on the criteria defined in the route maps, packets are forwarded (routed) to the appropriate next hop. · Route map statement marked as permit is processed as follows: · A match command can match on length or multiple ACLs. A route map statement can contain multiple match commands. Logical or algorithm function is performed across all the match commands to reach a permit or deny decision. For example: match length A B match ip address acl1 acl2 match ip address acl3 A packet is permitted if it is permitted by match length A B or acl1 or acl2 or acl3 · If the decision reached is permit, then the action specified by the set command is applied on the packet . Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1247 How to Configure PBR Routing · If the decision reached is deny, then the PBR action (specified in the set command) is not applied. Instead the processing logic moves forward to look at the next route-map statement in the sequence (the statement with the next higher sequence number). If no next statement exists, PBR processing terminates, and the packet is routed using the default IP routing table. · For PBR, route-map statements marked as deny are not supported. For more information about configuring route maps, see the "Using Route Maps to Redistribute Routing Information" section. You can use standard IP ACLs to specify match criteria for a source address or extended IP ACLs to specify match criteria based on an application, a protocol type, or an end station. The process proceeds through the route map until a match is found. If no match is found, normal destination-based routing occurs. There is an implicit deny at the end of the list of match statements. If match clauses are satisfied, you can use a set clause to specify the IP addresses identifying the next hop router in the path. For details about PBR commands and keywords, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols . How to Configure PBR · To use PBR, you must have the IP Base feature set enabled on the switch or stack master. · Multicast traffice is not policy-routed. PBR applies only to unicast traffic. · You can enable PBR on a routed port or an SVI. · The switch supports PBR based on match length. · You can apply a policy route map to an EtherChannel port channel in Layer 3 mode, but you cannot apply a policy route map to a physical interface that is a member of the EtherChannel. If you try to do so, the command is rejected. When a policy route map is applied to a physical interface, that interface cannot become a member of an EtherChannel. · You can define a mazimum of 128 IP policy route maps on the switch or switch stack. · You can define a maximum of 512 access control entries(ACEs) for PBR on the switch or switch stack. · When configuring match criteria in a route map, follow these guidelines: · Do not match ACLs that permit packets destined for a local address. · VRF and PBR are mutually exclusive on a switch interface. You cannot enable VRF when PBR is enabled on an interface. The reverse is also true, you cannot enable PBR when VRF is enabled on an interface. · Web Cache Communication Protocol (WCCP) and PBR are mutually exclusive on a switch interface. You cannot enable WCCP when PBR is enabled on an interface. The reverse is also true, you cannot enable PBR when WCCP is enabled on an interface. · The number of hardware entries used by PBR depends on the route map itself, the ACLs used, and the order of the ACLs and route-map entries. · PBR based on TOS, DSCP and IP Precedence are not supported. · Set interface, set default next-hop and set default interface are not supported. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1248 Routing How to Configure PBR · ip next-hop recursive and ip next-hop verify availability features are not available and the next-hop should be directly connected. · Policy-maps with no set actions are supported. Matching packets are routed normally. · Policy-maps with no match clauses are supported. Set actions are applied to all packets. By default, PBR is disabled on the switch. To enable PBR, you must create a route map that specifies the match criteria and the resulting action. Then, you must enable PBR for that route map on an interface. All packets arriving on the specified interface matching the match clauses are subject to PBR. Packets that are generated by the switch, or local packets, are not normally policy-routed. When you globally enable local PBR on the switch, all packets that originate on the switch are subject to local PBR. Local PBR is disabled by default. SUMMARY STEPS 1. configure terminal 2. route-map map-tag [permit] [sequence number] 3. match ip address {access-list-number | access-list-name} [access-list-number |...access-list-name] 4. match length min max 5. set ip next-hop ip-address [...ip-address] 6. exit 7. interface interface-id 8. ip policy route-map map-tag 9. ip route-cache policy 10. exit 11. ip local policy route-map map-tag 12. end 13. show route-map [map-name] 14. show ip policy 15. show ip local policy DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 route-map map-tag [permit] [sequence number] Example: Switch(config)# route-map pbr-map permit Purpose Enters global configuration mode. Defines route maps that are used to control where packets are output, and enters route-map configuration mode. · map-tag -- A meaningful name for the route map. The ip policy route-map interface configuration command uses this name to reference the route map. Multiple route-map statements with the same map tag define a single route map. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1249 How to Configure PBR Routing Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose · (Optional) permit -- If permit is specified and the match criteria are met for this route map, the route is policy routed as defined by the set actions. · (Optional) sequence number -- The sequence number shows the position of the route-map statement in the given route map. match ip address {access-list-number | access-list-name} Matches the source and destination IP addresses that are [access-list-number |...access-list-name] permitted by one or more standard or extended access lists. Example: ACLs can match on more than one source and destination IP address. Switch(config-route-map)# match ip address 110 140 If you do not specify a match command, the route map is applicable to all packets. match length min max Example: Switch(config-route-map)# match length 64 1500 Matches the length of the packet. set ip next-hop ip-address [...ip-address] Specifies the action to be taken on the packets that match Example: the criteria. Sets next hop to which to route the packet (the next hop must be adjacent). Switch(config-route-map)# set ip next-hop 10.1.6.2 exit Example: Switch(config-route-map)# exit Returns to global configuration mode. interface interface-id Example: Enters interface configuration mode, and specifies the interface to be configured. Switch(config)# interface gigabitethernet 1/0/1 ip policy route-map map-tag Example: Switch(config-if)# ip policy route-map pbr-map Enables PBR on a Layer 3 interface, and identify the route map to use. You can configure only one route map on an interface. However, you can have multiple route map entries with different sequence numbers. These entries are evaluated in the order of sequence number until the first match. If there is no match, packets are routed as usual. ip route-cache policy Example: Switch(config-if)# ip route-cache policy (Optional) Enables fast-switching PBR. You must enable PBR before enabling fast-switching PBR. exit Example: Switch(config-if)# exit Returns to global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1250 Routing Filtering Routing Information Step 11 Step 12 Step 13 Step 14 Step 15 Command or Action ip local policy route-map map-tag Example: Switch(config)# ip local policy route-map local-pbr end Example: Switch(config)# end show route-map [map-name] Example: Switch# show route-map show ip policy Example: Switch# show ip policy show ip local policy Example: Switch# show ip local policy Purpose (Optional) Enables local PBR to perform policy-based routing on packets originating at the switch. This applies to packets generated by the switch, and not to incoming packets. Returns to privileged EXEC mode. (Optional) Displays all the route maps configured or only the one specified to verify configuration. (Optional) Displays policy route maps attached to the interface. (Optional) Displays whether or not local policy routing is enabled and, if so, the route map being used. Filtering Routing Information You can filter routing protocol information by performing the tasks described in this section. Note When routes are redistributed between OSPF processes, no OSPF metrics are preserved. Setting Passive Interfaces To prevent other routers on a local network from dynamically learning about routes, you can use the passive-interface router configuration command to keep routing update messages from being sent through a router interface. When you use this command in the OSPF protocol, the interface address you specify as passive appears as a stub network in the OSPF domain. OSPF routing information is neither sent nor received through the specified router interface. In networks with many interfaces, to avoid having to manually set them as passive, you can set all interfaces to be passive by default by using the passive-interface default router configuration command and manually setting interfaces where adjacencies are desired. Use a network monitoring privileged EXEC command such as show ip ospf interface to verify the interfaces that you enabled as passive, or use the show ip interface privileged EXEC command to verify the interfaces that you enabled as active. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1251 Setting Passive Interfaces Routing Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router {bgp | rip | ospf | eigrp} Example: Enters router configuration mode. Switch(config)# router ospf passive-interface interface-id Example: Suppresses sending routing updates through the specified Layer 3 interface. Switch(config-router)# passive-interface gigabitethernet 1/0/1 passive-interface default Example: (Optional) Sets all interfaces as passive by default. Switch(config-router)# passive-interface default no passive-interface interface type Example: (Optional) Activates only those interfaces that need to have adjacencies sent. Switch(config-router)# no passive-interface gigabitethernet1/0/3 gigabitethernet 1/0/5 network network-address Example: (Optional) Specifies the list of networks for the routing process. The network-address is an IP address. Switch(config-router)# network 10.1.1.1 end Example: Returns to privileged EXEC mode. Switch(config-router)# end copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1252 Routing Controlling Advertising and Processing in Routing Updates Controlling Advertising and Processing in Routing Updates You can use the distribute-list router configuration command with access control lists to suppress routes from being advertised in routing updates and to prevent other routers from learning one or more routes. When used in OSPF, this feature applies to only external routes, and you cannot specify an interface name. You can also use a distribute-list router configuration command to avoid processing certain routes listed in incoming updates. (This feature does not apply to OSPF.) Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal router {bgp | rip | eigrp} Example: Enters router configuration mode. Step 3 Switch(config)# router eigrp distribute-list {access-list-number | access-list-name} out Permits or denies routes from being advertised in routing [interface-name | routing process | updates, depending upon the action listed in the access list. autonomous-system-number] Example: Step 4 Switch(config-router)# distribute 120 out gigabitethernet 1/0/7 distribute-list {access-list-number | access-list-name} in Suppresses processing in routes listed in updates. [type-number] Example: Step 5 Switch(config-router)# distribute-list 125 in end Example: Returns to privileged EXEC mode. Step 6 Switch(config-router)# end copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Filtering Sources of Routing Information Because some routing information might be more accurate than others, you can use filtering to prioritize information coming from different sources. An administrative distance is a rating of the trustworthiness of a Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1253 Filtering Sources of Routing Information Routing Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 routing information source, such as a router or group of routers. In a large network, some routing protocols can be more reliable than others. By specifying administrative distance values, you enable the router to intelligently discriminate between sources of routing information. The router always picks the route whose routing protocol has the lowest administrative distance. Table 41-16 on page 41-122 shows the default administrative distances for various routing information sources. Because each network has its own requirements, there are no general guidelines for assigning administrative distances. Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal router {bgp | rip | ospf | eigrp} Example: Enters router configuration mode. Switch(config)# router bgp distance weight {ip-address {ip-address mask}} [ip access Defines an administrative distance. list] weight--The administrative distance as an integer from 10 Example: to 255. Used alone, weight specifies a default administrative distance that is used when no other specification exists for Switch(config-router)# distance 50 10.1.5.1 a routing information source. Routes with a distance of 255 are not installed in the routing table. (Optional) ip access list--An IP standard or extended access list to be applied to incoming routing updates. end Example: Returns to privileged EXEC mode. Switch(config-router)# end show ip protocols Example: Displays the default administrative distance for a specified routing process. Switch# show ip protocols copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1254 Routing Managing Authentication Keys Managing Authentication Keys Key management is a method of controlling authentication keys used by routing protocols. Not all protocols can use key management. Authentication keys are available for EIGRP and RIP Version 2. Prerequisites Before you manage authentication keys, you must enable authentication. See the appropriate protocol section to see how to enable authentication for that protocol. To manage authentication keys, define a key chain, identify the keys that belong to the key chain, and specify how long each key is valid. Each key has its own key identifier (specified with the key number key chain configuration command), which is stored locally. The combination of the key identifier and the interface associated with the message uniquely identifies the authentication algorithm and Message Digest 5 (MD5) authentication key in use. How to Configure Authentication Keys You can configure multiple keys with life times. Only one authentication packet is sent, regardless of how many valid keys exist. The software examines the key numbers in order from lowest to highest, and uses the first valid key it encounters. The lifetimes allow for overlap during key changes. Note that the router must know these lifetimes. Step 1 Procedure Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal key chain name-of-chain Example: Identifies a key chain, and enter key chain configuration mode. Step 3 Switch(config)# key chain key10 key number Example: Identifies the key number. The range is 0 to 2147483647. Step 4 Step 5 Switch(config-keychain)# key 2000 key-string text Example: Identifies the key string. The string can contain from 1 to 80 uppercase and lowercase alphanumeric characters, but the first character cannot be a number. Switch(config-keychain)# Room 20, 10th floor accept-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key seconds} can be received. Example: The start-time and end-time syntax can be either hh:mm:ss Month date year or hh:mm:ss date Month year. The default Switch(config-keychain)# accept-lifetime 12:30:00 is forever with the default start-time and the earliest Jan 25 1009 infinite Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1255 Monitoring and Maintaining the IP Network Routing Step 6 Step 7 Step 8 Step 9 Command or Action Purpose acceptable date as January 1, 1993. The default end-time and duration is infinite. send-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key seconds} can be sent. Example: The start-time and end-time syntax can be either hh:mm:ss Month date year or hh:mm:ss date Month year. The default Switch(config-keychain)# accept-lifetime 23:30:00 is forever with the default start-time and the earliest Jan 25 1019 infinite acceptable date as January 1, 1993. The default end-time and duration is infinite. end Example: Returns to privileged EXEC mode. Switch(config-keychain)# end show key chain Example: Displays authentication key information. Switch# show key chain copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Monitoring and Maintaining the IP Network You can remove all contents of a particular cache, table, or database. You can also display specific statistics. Table 111: Commands to Clear IP Routes or Display Route Status clear ip route {network [mask | *]} show ip protocols Clears one or more routes from the IP routing table. Displays the parameters and state of the active routing protocol process. show ip route [address [mask] [longer-prefixes]] | Displays the current state of the routing table. [protocol [process-id]] show ip route summary Displays the current state of the routing table in summary form. show ip route supernets-onl Displays supernets. show ip cache Displays the routing table used to switch IP traffic. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1256 Routing show route-map [map-name] Monitoring and Maintaining the IP Network Displays all route maps configured or only the one specified. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1257 Monitoring and Maintaining the IP Network Routing Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1258 PART XIII Security · Preventing Unauthorized Access , on page 1261 · Controlling Switch Access with Passwords and Privilege Levels , on page 1263 · Configuring TACACS+ , on page 1279 · Configuring RADIUS , on page 1295 · Configuring Kerberos , on page 1327 · Configuring Local Authentication and Authorization , on page 1335 · Configuring Secure Shell (SSH) , on page 1339 · Configuring Secure Socket Layer HTTP , on page 1349 · Configuring IPv4 ACLs , on page 1361 · Configuring IPv6 ACLs, on page 1413 · Configuring DHCP , on page 1423 · Configuring IP Source Guard , on page 1445 · Configuring Dynamic ARP Inspection, on page 1455 · Configuring IEEE 802.1x Port-Based Authentication, on page 1471 · Configuring Web-Based Authentication , on page 1559 · Configuring Port-Based Traffic Control, on page 1583 · Configuring IPv6 First Hop Security, on page 1613 · Configuring Cisco TrustSec, on page 1639 · Configuring Wireless Guest Access , on page 1645 · Managing Rogue Devices, on page 1671 · Classifying Rogue Access Points, on page 1679 · Configuring wIPS, on page 1693 · Configuring Intrusion Detection System, on page 1703 6 1 C H A P T E R Preventing Unauthorized Access · Finding Feature Information, on page 1261 · Preventing Unauthorized Access, on page 1261 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Preventing Unauthorized Access You can prevent unauthorized users from reconfiguring your switch and viewing configuration information. Typically, you want network administrators to have access to your switch while you restrict access to users who dial from outside the network through an asynchronous port, connect from outside the network through a serial port, or connect through a terminal or workstation from within the local network. To prevent unauthorized access into your switch, you should configure one or more of these security features: · At a minimum, you should configure passwords and privileges at each switch port. These passwords are locally stored on the switch. When users attempt to access the switch through a port or line, they must enter the password specified for the port or line before they can access the switch. · For an additional layer of security, you can also configure username and password pairs, which are locally stored on the switch. These pairs are assigned to lines or ports and authenticate each user before that user can access the switch. If you have defined privilege levels, you can also assign a specific privilege level (with associated rights and privileges) to each username and password pair. · If you want to use username and password pairs, but you want to store them centrally on a server instead of locally, you can store them in a database on a security server. Multiple networking devices can then use the same database to obtain user authentication (and, if necessary, authorization) information. · You can also enable the login enhancements feature, which logs both failed and unsuccessful login attempts. Login enhancements can also be configured to block future login attempts after a set number Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1261 Preventing Unauthorized Access Security of unsuccessful attempts are made. For more information, see the Cisco IOS Login Enhancements documentation. Related Topics Configuring Username and Password Pairs, on page 1271 TACACS+ and Switch Access, on page 1281 Setting a Telnet Password for a Terminal Line, on page 1270 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1262 6 2 C H A P T E R Controlling Switch Access with Passwords and Privilege Levels · Finding Feature Information, on page 1263 · Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1263 · Information About Passwords and Privilege Levels, on page 1264 · How to Control Switch Access with Passwords and Privilege Levels, on page 1266 · Monitoring Switch Access, on page 1275 · Configuration Examples for Setting Passwords and Privilege Levels, on page 1275 · Additional References, on page 1276 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Controlling Switch Access with Passwords and Privileges The following are the restrictions for controlling switch access with passwords and privileges: · Disabling password recovery will not work if you have set the switch to boot up manually by using the boot manual global configuration command. This command produces the boot loader prompt (switch:) after the switch is power cycled. Related Topics Disabling Password Recovery, on page 1269 Password Recovery, on page 1264 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1263 Information About Passwords and Privilege Levels Security Information About Passwords and Privilege Levels Default Password and Privilege Level Configuration A simple way of providing terminal access control in your network is to use passwords and assign privilege levels. Password protection restricts access to a network or network device. Privilege levels define what commands users can enter after they have logged into a network device. This table shows the default password and privilege level configuration. Table 112: Default Password and Privilege Levels Feature Default Setting Enable password and privilege level No password is defined. The default is level 15 (privileged EXEC level). The password is not encrypted in the configuration file. Enable secret password and privilege No password is defined. The default is level 15 (privileged EXEC level level). The password is encrypted before it is written to the configuration file. Line password No password is defined. Additional Password Security To provide an additional layer of security, particularly for passwords that cross the network or that are stored on a Trivial File Transfer Protocol (TFTP) server, you can use either the enable password or enable secret global configuration commands. Both commands accomplish the same thing; that is, you can establish an encrypted password that users must enter to access privileged EXEC mode (the default) or any privilege level you specify. We recommend that you use the enable secret command because it uses an improved encryption algorithm. If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously. If you enable password encryption, it applies to all passwords including username passwords, authentication key passwords, the privileged command password, and console and virtual terminal line passwords. Related Topics Protecting Enable and Enable Secret Passwords with Encryption, on page 1267 Example: Protecting Enable and Enable Secret Passwords with Encryption, on page 1276 Password Recovery By default, any end user with physical access to the switch can recover from a lost password by interrupting the boot process while the switch is powering on and then by entering a new password. The password-recovery disable feature protects access to the switch password by disabling part of this functionality. When this feature is enabled, the end user can interrupt the boot process only by agreeing to set Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1264 Security Terminal Line Telnet Configuration the system back to the default configuration. With password recovery disabled, you can still interrupt the boot process and change the password, but the configuration file (config.text) and the VLAN database file (vlan.dat) are deleted. If you disable password recovery, we recommend that you keep a backup copy of the configuration file on a secure server in case the end user interrupts the boot process and sets the system back to default values. Do not keep a backup copy of the configuration file on the switch. If the switch is operating in VTP transparent mode, we recommend that you also keep a backup copy of the VLAN database file on a secure server. When the switch is returned to the default system configuration, you can download the saved files to the switch by using the Xmodem protocol. To re-enable password recovery, use the service password-recovery global configuration command. Related Topics Disabling Password Recovery, on page 1269 Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1263 Terminal Line Telnet Configuration When you power-up your switch for the first time, an automatic setup program runs to assign IP information and to create a default configuration for continued use. The setup program also prompts you to configure your switch for Telnet access through a password. If you did not configure this password during the setup program, you can configure it when you set a Telnet password for a terminal line. For more information on doing this, see Related Topics. Related Topics Setting a Telnet Password for a Terminal Line, on page 1270 Example: Setting a Telnet Password for a Terminal Line, on page 1276 Username and Password Pairs You can configure username and password pairs, which are locally stored on the switch. These pairs are assigned to lines or ports and authenticate each user before that user can access the switch. If you have defined privilege levels, you can also assign a specific privilege level (with associated rights and privileges) to each username and password pair. Related Topics Configuring Username and Password Pairs, on page 1271 Privilege Levels Cisco switches (and other devices) use privilege levels to provide password security for different levels of switch operation. By default, the Cisco IOS software operates in two modes (privilege levels) of password security: user EXEC (Level 1) and privileged EXEC (Level 15). You can configure up to 16 hierarchical levels of commands for each mode. By configuring multiple passwords, you can allow different sets of users to have access to specified commands. Privilege Levels on Lines Users can override the privilege level you set using the privilege level line configuration command by logging in to the line and enabling a different privilege level. They can lower the privilege level by using the disable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1265 How to Control Switch Access with Passwords and Privilege Levels Security command. If users know the password to a higher privilege level, they can use that password to enable the higher privilege level. You might specify a high level or privilege level for your console line to restrict line usage. For example, if you want many users to have access to the clear line command, you can assign it level 2 security and distribute the level 2 password fairly widely. But if you want more restricted access to the configure command, you can assign it level 3 security and distribute that password to a more restricted group of users. Command Privilege Levels When you set a command to a privilege level, all commands whose syntax is a subset of that command are also set to that level. For example, if you set the show ip traffic command to level 15, the show commands and show ip commands are automatically set to privilege level 15 unless you set them individually to different levels. Related Topics Setting the Privilege Level for a Command, on page 1272 Example: Setting the Privilege Level for a Command, on page 1276 Changing the Default Privilege Level for Lines, on page 1273 Logging into and Exiting a Privilege Level, on page 1274 How to Control Switch Access with Passwords and Privilege Levels Setting or Changing a Static Enable Password The enable password controls access to the privileged EXEC mode. Beginning in privileged EXEC mode, follow these steps to set or change a static enable password: SUMMARY STEPS 1. configure terminal 2. enable password password 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 enable password password Example: Defines a new password or changes an existing password for access to privileged EXEC mode. By default, no password is defined. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1266 Security Protecting Enable and Enable Secret Passwords with Encryption Command or Action Switch(config)# enable password secret321 Step 3 end Example: Switch(config)# end Purpose For password, specify a string from 1 to 25 alphanumeric characters. The string cannot start with a number, is case sensitive, and allows spaces but ignores leading spaces. It can contain the question mark (?) character if you precede the question mark with the key combination Crtl-v when you create the password; for example, to create the password abc?123, do this: Enter abc. Enter Crtl-v. Enter ?123. When the system prompts you to enter the enable password, you need not precede the question mark with the Ctrl-v; you can simply enter abc?123 at the password prompt. Returns to privileged EXEC mode. Related Topics Example: Setting or Changing a Static Enable Password, on page 1275 Protecting Enable and Enable Secret Passwords with Encryption Beginning in privileged EXEC mode, follow these steps to establish an encrypted password that users must enter to access privileged EXEC mode (the default) or any privilege level you specify: SUMMARY STEPS 1. configure terminal 2. Use one of the following: · enable password [level level] {password encryption-type encrypted-password} · enable secret [level level] {password encryption-type encrypted-password} 3. service password-encryption 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1267 Protecting Enable and Enable Secret Passwords with Encryption Security Command or Action Switch# configure terminal Purpose Step 2 Use one of the following: · enable password [level level] {password encryption-type encrypted-password} · enable secret [level level] {password encryption-type encrypted-password} Example: Switch(config)# enable password example102 or Switch(config)# enable secret level 1 password secret123sample · Defines a new password or changes an existing password for access to privileged EXEC mode. · Defines a secret password, which is saved using a nonreversible encryption method. · (Optional) For level, the range is from 0 to 15. Level 1 is normal user EXEC mode privileges. The default level is 15 (privileged EXEC mode privileges). · For password, specify a string from 1 to 25 alphanumeric characters. The string cannot start with a number, is case sensitive, and allows spaces but ignores leading spaces. By default, no password is defined. · (Optional) For encryption-type, only type 5, a Cisco proprietary encryption algorithm, is available. If you specify an encryption type, you must provide an encrypted password--an encrypted password that you copy from another switch configuration. Note If you specify an encryption type and then enter a clear text password, you can not re-enter privileged EXEC mode. You cannot recover a lost encrypted password by any method. Step 3 service password-encryption Example: Switch(config)# service password-encryption (Optional) Encrypts the password when the password is defined or when the configuration is written. Encryption prevents the password from being readable in the configuration file. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Related Topics Additional Password Security, on page 1264 Example: Protecting Enable and Enable Secret Passwords with Encryption, on page 1276 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1268 Security Disabling Password Recovery Disabling Password Recovery Beginning in privileged EXEC mode, follow these steps to disable password recovery to protect the security of your switch: Before you begin If you disable password recovery, we recommend that you keep a backup copy of the configuration file on a secure server in case the end user interrupts the boot process and sets the system back to default values. Do not keep a backup copy of the configuration file on the switch. If the switch is operating in VTP transparent mode, we recommend that you also keep a backup copy of the VLAN database file on a secure server. When the switch is returned to the default system configuration, you can download the saved files to the switch by using the Xmodem protocol. SUMMARY STEPS 1. configure terminal 2. no service password-recovery 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 no service password-recovery Example: Switch(config)# no service password-recovery Step 3 end Example: Switch(config)# end Disables password recovery. This setting is saved in an area of the flash memory that is accessible by the boot loader and the Cisco IOS image, but it is not part of the file system and is not accessible by any user. Returns to privileged EXEC mode. What to do next To re-enable password recovery, use the service password-recovery global configuration command. Related Topics Password Recovery, on page 1264 Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1263 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1269 Setting a Telnet Password for a Terminal Line Security Setting a Telnet Password for a Terminal Line Beginning in user EXEC mode, follow these steps to set a Telnet password for the connected terminal line: Before you begin Attach a PC or workstation with emulation software to the switch console port, or attach a PC to the Ethernet management port. The default data characteristics of the console port are 9600, 8, 1, no parity. You might need to press the Return key several times to see the command-line prompt. SUMMARY STEPS 1. enable 2. configure terminal 3. line vty 0 15 4. password password 5. end DETAILED STEPS Step 1 Command or Action enable Example: Switch> enable Purpose Note If a password is required for access to privileged EXEC mode, you will be prompted for it. Enters privileged EXEC mode. Step 2 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 3 line vty 0 15 Example: Switch(config)# line vty 0 15 Step 4 password password Example: Switch(config-line)# password abcxyz543 Step 5 end Example: Configures the number of Telnet sessions (lines), and enters line configuration mode. There are 16 possible sessions on a command-capable switch. The 0 and 15 mean that you are configuring all 16 possible Telnet sessions. Sets a Telnet password for the line or lines. For password, specify a string from 1 to 25 alphanumeric characters. The string cannot start with a number, is case sensitive, and allows spaces but ignores leading spaces. By default, no password is defined. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1270 Security Configuring Username and Password Pairs Command or Action Switch(config-line)# end Purpose Related Topics Preventing Unauthorized Access, on page 1261 Terminal Line Telnet Configuration, on page 1265 Example: Setting a Telnet Password for a Terminal Line, on page 1276 Configuring Username and Password Pairs Beginning in privileged EXEC mode, follow these steps to configure username and password pairs: SUMMARY STEPS 1. configure terminal 2. username name [privilege level] {password encryption-type password} 3. Use one of the following: · line console 0 · line vty 0 15 4. login local 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 username name [privilege level] {password encryption-type password} Sets the username, privilege level, and password for each user. Example: Switch(config)# username adamsample privilege 1 password secret456 Switch(config)# username 111111111111 mac attribute · For name, specify the user ID as one word or the MAC address. Spaces and quotation marks are not allowed. · You can configure a maximum of 12000 clients each, for both username and MAC filter. · (Optional) For level, specify the privilege level the user has after gaining access. The range is 0 to 15. Level 15 gives privileged EXEC mode access. Level 1 gives user EXEC mode access. · For encryption-type, enter 0 to specify that an unencrypted password will follow. Enter 7 to specify that a hidden password will follow. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1271 Setting the Privilege Level for a Command Security Command or Action Step 3 Step 4 Use one of the following: · line console 0 · line vty 0 15 Example: Switch(config)# line console 0 or Switch(config)# line vty 15 login local Example: Switch(config-line)# login local Step 5 end Example: Switch(config)# end Purpose · For password, specify the password the user must enter to gain access to the switch. The password must be from 1 to 25 characters, can contain embedded spaces, and must be the last option specified in the username command. Enters line configuration mode, and configures the console port (line 0) or the VTY lines (line 0 to 15). Enables local password checking at login time. Authentication is based on the username specified in Step 2. Returns to privileged EXEC mode. Related Topics Preventing Unauthorized Access, on page 1261 Username and Password Pairs, on page 1265 Setting the Privilege Level for a Command Beginning in privileged EXEC mode, follow these steps to set the privilege level for a command: SUMMARY STEPS 1. configure terminal 2. privilege mode level level command 3. enable password level level password 4. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1272 Security Changing the Default Privilege Level for Lines DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 Step 4 privilege mode level level command Sets the privilege level for a command. Example: Switch(config)# privilege exec level 14 configure · For mode, enter configure for global configuration mode, exec for EXEC mode, interface for interface configuration mode, or line for line configuration mode. · For level, the range is from 0 to 15. Level 1 is for normal user EXEC mode privileges. Level 15 is the level of access permitted by the enable password. · For command, specify the command to which you want to restrict access. enable password level level password Example: Switch(config)# enable password level 14 SecretPswd14 Specifies the password to enable the privilege level. · For level, the range is from 0 to 15. Level 1 is for normal user EXEC mode privileges. · For password, specify a string from 1 to 25 alphanumeric characters. The string cannot start with a number, is case sensitive, and allows spaces but ignores leading spaces. By default, no password is defined. end Example: Returns to privileged EXEC mode. Switch(config)# end Related Topics Privilege Levels, on page 1265 Example: Setting the Privilege Level for a Command, on page 1276 Changing the Default Privilege Level for Lines Beginning in privileged EXEC mode, follow these steps to change the default privilege level for the specified line: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1273 Logging into and Exiting a Privilege Level Security SUMMARY STEPS 1. configure terminal 2. line vty line 3. privilege level level 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 line vty line Example: Switch(config)# line vty 10 Step 3 privilege level level Example: Switch(config)# privilege level 15 Step 4 end Example: Switch(config)# end Purpose Enters the global configuration mode. Selects the virtual terminal line on which to restrict access. Changes the default privilege level for the line. For level, the range is from 0 to 15. Level 1 is for normal user EXEC mode privileges. Level 15 is the level of access permitted by the enable password. Returns to privileged EXEC mode. What to do next Users can override the privilege level you set using the privilege level line configuration command by logging in to the line and enabling a different privilege level. They can lower the privilege level by using the disable command. If users know the password to a higher privilege level, they can use that password to enable the higher privilege level. You might specify a high level or privilege level for your console line to restrict line usage. Related Topics Privilege Levels, on page 1265 Logging into and Exiting a Privilege Level Beginning in user EXEC mode, follow these steps to log into a specified privilege level and exit a specified privilege level. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1274 Security Monitoring Switch Access SUMMARY STEPS 1. enable level 2. disable level DETAILED STEPS Step 1 Command or Action enable level Example: Switch> enable 15 Step 2 disable level Example: Switch# disable 1 Purpose Logs in to a specified privilege level. Following the example, Level 15 is privileged EXEC mode. For level, the range is 0 to 15. Exits to a specified privilege level. Following the example, Level 1 is user EXEC mode. For level, the range is 0 to 15. Related Topics Privilege Levels, on page 1265 Monitoring Switch Access Table 113: Commands for Displaying DHCP Information show privilege Displays the privilege level configuration. Configuration Examples for Setting Passwords and Privilege Levels Example: Setting or Changing a Static Enable Password This example shows how to change the enable password to l1u2c3k4y5. The password is not encrypted and provides access to level 15 (traditional privileged EXEC mode access): Switch(config)# enable password l1u2c3k4y5 Related Topics Setting or Changing a Static Enable Password, on page 1266 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1275 Example: Protecting Enable and Enable Secret Passwords with Encryption Security Example: Protecting Enable and Enable Secret Passwords with Encryption This example shows how to configure the encrypted password $1$FaD0$Xyti5Rkls3LoyxzS8 for privilege level 2: Switch(config)# enable secret level 2 5 $1$FaD0$Xyti5Rkls3LoyxzS8 Related Topics Protecting Enable and Enable Secret Passwords with Encryption, on page 1267 Additional Password Security, on page 1264 Example: Setting a Telnet Password for a Terminal Line This example shows how to set the Telnet password to let45me67in89: Switch(config)# line vty 10 Switch(config-line)# password let45me67in89 Related Topics Setting a Telnet Password for a Terminal Line, on page 1270 Terminal Line Telnet Configuration, on page 1265 Example: Setting the Privilege Level for a Command This example shows how to set the configure command to privilege level 14 and define SecretPswd14 as the password users must enter to use level 14 commands: Switch(config)# privilege exec level 14 configure Switch(config)# enable password level 14 SecretPswd14 Related Topics Setting the Privilege Level for a Command, on page 1272 Privilege Levels, on page 1265 Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1276 Security Additional References MIBs MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1277 Additional References Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1278 6 3 C H A P T E R Configuring TACACS+ · Finding Feature Information, on page 1279 · Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 · Information About TACACS+, on page 1281 · How to Configure TACACS+, on page 1285 · Monitoring TACACS+, on page 1291 · Additional References, on page 1292 · Feature Information for TACACS+, on page 1293 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) The following are the prerequisites for set up and configuration of switch access with Terminal Access Controller Access Control System Plus (TACACS+) (must be performed in the order presented): 1. Configure the switches with the TACACS+ server addresses. 2. Set an authentication key. 3. Configure the key from Step 2 on the TACACS+ servers. 4. Enable AAA. 5. Create a login authentication method list. 6. Apply the list to the terminal lines. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1279 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) Security 7. Create an authorization and accounting method list. The following are the prerequisites for controlling switch access with TACACS+: · You must have access to a configured TACACS+ server to configure TACACS+ features on your switch. Also, you must have access to TACACS+ services maintained in a database on a TACACS+ daemon typically running on a LINUX or Windows workstation. · We recommend a redundant connection between a switch stack and the TACACS+ server. This is to help ensure that the TACACS+ server remains accessible in case one of the connected stack members is removed from the switch stack. · You need a system running the TACACS+ daemon software to use TACACS+ on your switch. · To use TACACS+, it must be enabled. · Authorization must be enabled on the switch to be used. · Users must first successfully complete TACACS+ authentication before proceeding to TACACS+ authorization. · To use any of the AAA commands listed in this section or elsewhere, you must first enable AAA with the aaa new-model command. · At a minimum, you must identify the host or hosts maintaining the TACACS+ daemon and define the method lists for TACACS+ authentication. You can optionally define method lists for TACACS+ authorization and accounting. · The method list defines the types of authentication to be performed and the sequence in which they are performed; it must be applied to a specific port before any of the defined authentication methods are performed. The only exception is the default method list (which, by coincidence, is named default). The default method list is automatically applied to all ports except those that have a named method list explicitly defined. A defined method list overrides the default method list. · Use TACACS+ for privileged EXEC access authorization if authentication was performed by using TACACS+. · Use the local database if authentication was not performed by using TACACS+. Related Topics TACACS+ Overview, on page 1281 TACACS+ Operation, on page 1283 How to Configure TACACS+, on page 1285 Method List Description, on page 1283 Configuring TACACS+ Login Authentication, on page 1286 TACACS+ Login Authentication, on page 1284 Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1289 TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1284 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1280 Security Information About TACACS+ Information About TACACS+ TACACS+ and Switch Access This section describes TACACS+. TACACS+ provides detailed accounting information and flexible administrative control over the authentication and authorization processes. It is facilitated through authentication, authorization, accounting (AAA) and can be enabled only through AAA commands. The switch supports TACACS+ for IPv6. Information is in the "TACACS+ Over an IPv6 Transport" section of the "Implementing ADSL for IPv6" chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2. For information about configuring this feature, see the "Configuring TACACS+ over IPv6" section of the "Implementing ADSL for IPv6" chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2. Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Security Command Reference, Release 12.4 and the Cisco IOS IPv6 Command Reference. Related Topics Preventing Unauthorized Access, on page 1261 Configuring the Switch for Local Authentication and Authorization, on page 1335 SSH Servers, Integrated Clients, and Supported Versions, on page 1341 TACACS+ Overview TACACS+ is a security application that provides centralized validation of users attempting to gain access to your switch. TACACS+ provides for separate and modular authentication, authorization, and accounting facilities. TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each service--authentication, authorization, and accounting--independently. Each service can be tied into its own database to take advantage of other services available on that server or on the network, depending on the capabilities of the daemon. The goal of TACACS+ is to provide a method for managing multiple network access points from a single management service. Your switch can be a network access server along with other Cisco routers and access servers. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1281 TACACS+ Overview Figure 70: Typical TACACS+ Network Configuration Security TACACS+, administered through the AAA security services, can provide these services: · Authentication--Provides complete control of authentication through login and password dialog, challenge and response, and messaging support. The authentication facility can conduct a dialog with the user (for example, after a username and password are provided, to challenge a user with several questions, such as home address, mother's maiden name, service type, and social security number). The TACACS+ authentication service can also send messages to user screens. For example, a message could notify users that their passwords must be changed because of the company's password aging policy. · Authorization--Provides fine-grained control over user capabilities for the duration of the user's session, including but not limited to setting autocommands, access control, session duration, or protocol support. You can also enforce restrictions on what commands a user can execute with the TACACS+ authorization feature. · Accounting--Collects and sends information used for billing, auditing, and reporting to the TACACS+ daemon. Network managers can use the accounting facility to track user activity for a security audit or to provide information for user billing. Accounting records include user identities, start and stop times, executed commands (such as PPP), number of packets, and number of bytes. The TACACS+ protocol provides authentication between the switch and the TACACS+ daemon, and it ensures confidentiality because all protocol exchanges between the switch and the TACACS+ daemon are encrypted. Related Topics Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1282 Security TACACS+ Operation TACACS+ Operation When a user attempts a simple ASCII login by authenticating to a switch using TACACS+, this process occurs: 1. When the connection is established, the switch contacts the TACACS+ daemon to obtain a username prompt to show to the user. The user enters a username, and the switch then contacts the TACACS+ daemon to obtain a password prompt. The switch displays the password prompt to the user, the user enters a password, and the password is then sent to the TACACS+ daemon. TACACS+ allows a dialog between the daemon and the user until the daemon receives enough information to authenticate the user. The daemon prompts for a username and password combination, but can include other items, such as the user's mother's maiden name. 2. The switch eventually receives one of these responses from the TACACS+ daemon: · ACCEPT--The user is authenticated and service can begin. If the switch is configured to require authorization, authorization begins at this time. · REJECT--The user is not authenticated. The user can be denied access or is prompted to retry the login sequence, depending on the TACACS+ daemon. · ERROR--An error occurred at some time during authentication with the daemon or in the network connection between the daemon and the switch. If an ERROR response is received, the switch typically tries to use an alternative method for authenticating the user. · CONTINUE--The user is prompted for additional authentication information. After authentication, the user undergoes an additional authorization phase if authorization has been enabled on the switch. Users must first successfully complete TACACS+ authentication before proceeding to TACACS+ authorization. 3. If TACACS+ authorization is required, the TACACS+ daemon is again contacted, and it returns an ACCEPT or REJECT authorization response. If an ACCEPT response is returned, the response contains data in the form of attributes that direct the EXEC or NETWORK session for that user and the services that the user can access: · Telnet, Secure Shell (SSH), rlogin, or privileged EXEC services · Connection parameters, including the host or client IP address, access list, and user timeouts Related Topics Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 Method List Description A method list defines the sequence and methods to be used to authenticate, to authorize, or to keep accounts on a user. You can use method lists to designate one or more security protocols to be used, thus ensuring a backup system if the initial method fails. The software uses the first method listed to authenticate, to authorize, or to keep accounts on users; if that method does not respond, the software selects the next method in the list. This process continues until there is successful communication with a listed method or the method list is exhausted. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1283 TACACS+ Configuration Options Security Related Topics How to Configure TACACS+, on page 1285 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 TACACS+ Configuration Options You can configure the switch to use a single server or AAA server groups to group existing server hosts for authentication. You can group servers to select a subset of the configured server hosts and use them for a particular service. The server group is used with a global server-host list and contains the list of IP addresses of the selected server hosts. Related Topics Identifying the TACACS+ Server Host and Setting the Authentication Key, on page 1285 TACACS+ Login Authentication A method list describes the sequence and authentication methods to be queried to authenticate a user. You can designate one or more security protocols to be used for authentication, thus ensuring a backup system for authentication in case the initial method fails. The software uses the first method listed to authenticate users; if that method fails to respond, the software selects the next authentication method in the method list. This process continues until there is successful communication with a listed authentication method or until all defined methods are exhausted. If authentication fails at any point in this cycle--meaning that the security server or local username database responds by denying the user access--the authentication process stops, and no other authentication methods are attempted. Related Topics Configuring TACACS+ Login Authentication, on page 1286 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 TACACS+ Authorization for Privileged EXEC Access and Network Services AAA authorization limits the services available to a user. When AAA authorization is enabled, the switch uses information retrieved from the user's profile, which is located either in the local user database or on the security server, to configure the user's session. The user is granted access to a requested service only if the information in the user profile allows it. Related Topics Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1289 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 TACACS+ Accounting The AAA accounting feature tracks the services that users are accessing and the amount of network resources that they are consuming. When AAA accounting is enabled, the switch reports user activity to the TACACS+ security server in the form of accounting records. Each accounting record contains accounting attribute-value Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1284 Security Default TACACS+ Configuration (AV) pairs and is stored on the security server. This data can then be analyzed for network management, client billing, or auditing. Related Topics Starting TACACS+ Accounting, on page 1290 Default TACACS+ Configuration TACACS+ and AAA are disabled by default. To prevent a lapse in security, you cannot configure TACACS+ through a network management application. When enabled, TACACS+ can authenticate users accessing the switch through the CLI. Note Although TACACS+ configuration is performed through the CLI, the TACACS+ server authenticates HTTP connections that have been configured with a privilege level of 15. How to Configure TACACS+ This section describes how to configure your switch to support TACACS+. Related Topics Method List Description, on page 1283 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 Identifying the TACACS+ Server Host and Setting the Authentication Key Beginning in privileged EXEC mode, follow these steps to identify the TACACS+ server host and set the authentication key: SUMMARY STEPS 1. configure terminal 2. tacacs-server host hostname 3. aaa new-model 4. aaa group server tacacs+ group-name 5. server ip-address 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1285 Configuring TACACS+ Login Authentication Security Command or Action Switch# configure terminal Purpose Step 2 Step 3 tacacs-server host hostname Example: Switch(config)# tacacs-server host yourserver aaa new-model Example: Switch(config)# aaa new-model Identifies the IP host or hosts maintaining a TACACS+ server. Enter this command multiple times to create a list of preferred hosts. The software searches for hosts in the order in which you specify them. For hostname, specify the name or IP address of the host. Enables AAA. Step 4 aaa group server tacacs+ group-name Example: Switch(config)# aaa group server tacacs+ your_server_group (Optional) Defines the AAA server-group with a group name. This command puts the switch in a server group subconfiguration mode. Step 5 server ip-address Example: Switch(config)# server 10.1.2.3 Step 6 end Example: Switch(config)# end (Optional) Associates a particular TACACS+ server with the defined server group. Repeat this step for each TACACS+ server in the AAA server group. Each server in the group must be previously defined in Step 2. Returns to privileged EXEC mode. Related Topics TACACS+ Configuration Options, on page 1284 Configuring TACACS+ Login Authentication Beginning in privileged EXEC mode, follow these steps to configure TACACS+ login authentication: Before you begin To configure AAA authentication, you define a named list of authentication methods and then apply that list to various ports. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1286 Security Configuring TACACS+ Login Authentication Note To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip http authentication aaa global configuration command. Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods. For more information about the ip http authentication command, see the Cisco IOS Security Command Reference, Release 12.4. SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. aaa authentication login {default | list-name} method1 [method2...] 4. line [console | tty | vty] line-number [ending-line-number] 5. login authentication {default | list-name} 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 aaa new-model Example: Switch(config)# aaa new-model Enables AAA. Step 3 aaa authentication login {default | list-name} method1 [method2...] Example: Switch(config)# aaa authentication login default tacacs+ local Creates a login authentication method list. · To create a default list that is used when a named list is not specified in the login authentication command, use the default keyword followed by the methods that are to be used in default situations. The default method list is automatically applied to all ports. · For list-name, specify a character string to name the list you are creating. · For method1..., specify the actual method the authentication algorithm tries. The additional methods of authentication are used only if the previous method returns an error, not if it fails. Select one of these methods: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1287 Configuring TACACS+ Login Authentication Security Step 4 Command or Action Purpose · enable--Use the enable password for authentication. Before you can use this authentication method, you must define an enable password by using the enable password global configuration command. · group tacacs+--Uses TACACS+ authentication. Before you can use this authentication method, you must configure the TACACS+ server. For more information, see the Identifying the TACACS+ Server Host and Setting the Authentication Key, on page 1285. · line --Use the line password for authentication. Before you can use this authentication method, you must define a line password. Use the password password line configuration command. · local--Use the local username database for authentication. You must enter username information in the database. Use the username password global configuration command. · local-case--Use a case-sensitive local username database for authentication. You must enter username information in the database by using the username name password global configuration command. · none--Do not use any authentication for login. line [console | tty | vty] line-number [ending-line-number] Enters line configuration mode, and configures the lines to Example: which you want to apply the authentication list. Switch(config)# line 2 4 Step 5 Step 6 login authentication {default | list-name} Applies the authentication list to a line or set of lines. Example: Switch(config-line)# login authentication default · If you specify default, use the default list created with the aaa authentication login command. · For list-name, specify the list created with the aaa authentication login command. end Example: Switch(config-line)# end Returns to privileged EXEC mode. Related Topics TACACS+ Login Authentication, on page 1284 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1288 Security Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services You can use the aaa authorization global configuration command with the tacacs+ keyword to set parameters that restrict a user's network access to privileged EXEC mode. The aaa authorization exec tacacs+ local command sets these authorization parameters: · Use TACACS+ for privileged EXEC access authorization if authentication was performed by using TACACS+. · Use the local database if authentication was not performed by using TACACS+. Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been configured. SUMMARY STEPS 1. configure terminal 2. aaa authorization network tacacs+ 3. aaa authorization exec tacacs+ 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 aaa authorization network tacacs+ Example: Configures the switch for user TACACS+ authorization for all network-related service requests. Switch(config)# aaa authorization network tacacs+ Step 3 aaa authorization exec tacacs+ Example: Switch(config)# aaa authorization exec tacacs+ Configures the switch for user TACACS+ authorization if the user has privileged EXEC access. The exec keyword might return user profile information (such as autocommand information). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1289 Starting TACACS+ Accounting Security Step 4 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Related Topics TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1284 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279 Starting TACACS+ Accounting Beginning in privileged EXEC mode, follow these steps to start TACACS+ Accounting: SUMMARY STEPS 1. configure terminal 2. aaa accounting network start-stop tacacs+ 3. aaa accounting exec start-stop tacacs+ 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 aaa accounting network start-stop tacacs+ Example: Enables TACACS+ accounting for all network-related service requests. Switch(config)# aaa accounting network start-stop tacacs+ Step 3 aaa accounting exec start-stop tacacs+ Example: Switch(config)# aaa accounting exec start-stop tacacs+ Enables TACACS+ accounting to send a start-record accounting notice at the beginning of a privileged EXEC process and a stop-record at the end. Step 4 end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1290 Security Establishing a Session with a Router if the AAA Server is Unreachable Command or Action Switch(config)# end Purpose What to do next To establish a session with a router if the AAA server is unreachable, use the aaa accounting system guarantee-first command. It guarantees system accounting as the first record, which is the default condition. In some situations, users might be prevented from starting a session on the console or terminal connection until after the system reloads, which can take more than 3 minutes. To establish a console or Telnet session with the router if the AAA server is unreachable when the router reloads, use the no aaa accounting system guarantee-first command. Related Topics TACACS+ Accounting, on page 1284 Establishing a Session with a Router if the AAA Server is Unreachable To establishing a session with a router if the AAA server is unreachable, use the aaa accounting system guarantee-first command. It guarantees system accounting as the first record, which is the default condition. In some situations, users might be prevented from starting a session on the console or terminal connection until after the system reloads, which can take more than 3 minutes. To establish a console or Telnet session with the router if the AAA server is unreachable when the router reloads, use the no aaa accounting system guarantee-first command. Monitoring TACACS+ Table 114: Commands for Displaying TACACS+ Information Command show tacacs Purpose Displays TACACS+ server statistics. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1291 Additional References Security Additional References Related Documents Related Document Title Topic Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity Control http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html policies and Identity Service templates for Session Aware networking. Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) RADIUS, TACACS+, http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra Secure Shell, 802.1X and AAA. Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1292 Security Feature Information for TACACS+ Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for TACACS+ Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1293 Feature Information for TACACS+ Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1294 6 4 C H A P T E R Configuring RADIUS · Finding Feature Information, on page 1295 · Prerequisites for Controlling Switch Access with RADIUS, on page 1295 · Restrictions for Controlling Switch Access with RADIUS, on page 1296 · Information about RADIUS, on page 1296 · How to Configure RADIUS, on page 1308 · Monitoring CoA Functionality, on page 1322 · Configuration Examples for Controlling Switch Access with RADIUS, on page 1323 · Additional References, on page 1324 · Feature Information for RADIUS, on page 1325 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Controlling Switch Access with RADIUS This section lists the prerequisites for controlling Catalyst switch access with RADIUS. General: · RADIUS and AAA must be enabled to use any of the configuration commands in this chapter. · RADIUS is facilitated through AAA and can be enabled only through AAA commands. · At a minimum, you must identify the host or hosts that run the RADIUS server software and define the method lists for RADIUS authentication. You can optionally define method lists for RADIUS authorization and accounting. · You should have access to and should configure a RADIUS server before configuring RADIUS features on your switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1295 Restrictions for Controlling Switch Access with RADIUS Security · The RADIUS host is normally a multiuser system running RADIUS server software from Cisco (Cisco Secure Access Control Server Version 3.0), Livingston, Merit, Microsoft, or another software provider. For more information, see the RADIUS server documentation. · To use the Change-of-Authorization (CoA) interface, a session must already exist on the switch. CoA can be used to identify a session and enforce a disconnect request. The update affects only the specified session. · A redundant connection between a switch stack and the RADIUS server is recommended. This is to help ensure that the RADIUS server remains accessible in case one of the connected stack members is removed from the switch stack. For RADIUS operation: · Users must first successfully complete RADIUS authentication before proceeding to RADIUS authorization, if it is enabled. Related Topics RADIUS and Switch Access, on page 1296 RADIUS Operation, on page 1298 Restrictions for Controlling Switch Access with RADIUS This topic covers restrictions for controlling switch access with RADIUS. General: · To prevent a lapse in security, you cannot configure RADIUS through a network management application. RADIUS is not suitable in the following network security situations: · Multiprotocol access environments. RADIUS does not support AppleTalk Remote Access (ARA), NetBIOS Frame Control Protocol (NBFCP), NetWare Asynchronous Services Interface (NASI), or X.25 PAD connections. · Switch-to-switch or router-to-router situations. RADIUS does not provide two-way authentication. RADIUS can be used to authenticate from one device to a non-Cisco device if the non-Cisco device requires authentication. · Networks using a variety of services. RADIUS generally binds a user to one service model. Related Topics RADIUS Overview, on page 1297 Information about RADIUS RADIUS and Switch Access This section describes how to enable and configure RADIUS. RADIUS provides detailed accounting information and flexible administrative control over the authentication and authorization processes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1296 Security RADIUS Overview The switch supports RADIUS for IPv6. Information is in the "RADIUS Over IPv6" section of the "Implementing ADSL for IPv6" chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2. For information about configuring this feature, see the "Configuring the NAS" section in the "Implementing ADSL for IPv6" chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2. Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Security Command Reference, Release 12.4 and the Cisco IOS IPv6 Command Reference. Related Topics Prerequisites for Controlling Switch Access with RADIUS, on page 1295 Configuring the Switch for Local Authentication and Authorization, on page 1335 SSH Servers, Integrated Clients, and Supported Versions, on page 1341 RADIUS Overview RADIUS is a distributed client/server system that secures networks against unauthorized access. RADIUS clients run on supported Cisco routers and switches. Clients send authentication requests to a central RADIUS server, which contains all user authentication and network service access information. Use RADIUS in these network environments that require access security: · Networks with multiple-vendor access servers, each supporting RADIUS. For example, access servers from several vendors use a single RADIUS server-based security database. In an IP-based network with multiple vendors' access servers, dial-in users are authenticated through a RADIUS server that has been customized to work with the Kerberos security system. · Turnkey network security environments in which applications support the RADIUS protocol, such as in an access environment that uses a smart card access control system. In one case, RADIUS has been used with Enigma's security cards to validates users and to grant access to network resources. · Networks already using RADIUS. You can add a Cisco switch containing a RADIUS client to the network. This might be the first step when you make a transition to a TACACS+ server. See Figure 2: Transitioning from RADIUS to TACACS+ Services below. · Network in which the user must only access a single service. Using RADIUS, you can control user access to a single host, to a single utility such as Telnet, or to the network through a protocol such as IEEE 802.1x. For more information about this protocol, see Chapter 11, "Configuring IEEE 802.1x Port-Based Authentication." · Networks that require resource accounting. You can use RADIUS accounting independently of RADIUS authentication or authorization. The RADIUS accounting functions allow data to be sent at the start and end of services, showing the amount of resources (such as time, packets, bytes, and so forth) used during the session. An Internet service provider might use a freeware-based version of RADIUS access control and accounting software to meet special security and billing needs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1297 RADIUS Operation Figure 71: Transitioning from RADIUS to TACACS+ Services Security Related Topics Restrictions for Controlling Switch Access with RADIUS, on page 1296 RADIUS Operation When a user attempts to log in and authenticate to a switch that is access controlled by a RADIUS server, these events occur: 1. The user is prompted to enter a username and password. 2. The username and encrypted password are sent over the network to the RADIUS server. 3. The user receives one of the following responses from the RADIUS server: · ACCEPT--The user is authenticated. · REJECT--The user is either not authenticated and is prompted to re-enter the username and password, or access is denied. · CHALLENGE--A challenge requires additional data from the user. · CHALLENGE PASSWORD--A response requests the user to select a new password. The ACCEPT or REJECT response is bundled with additional data that is used for privileged EXEC or network authorization. The additional data included with the ACCEPT or REJECT packets includes these items: · Telnet, SSH, rlogin, or privileged EXEC services · Connection parameters, including the host or client IP address, access list, and user timeouts Related Topics Prerequisites for Controlling Switch Access with RADIUS, on page 1295 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1298 Security RADIUS Change of Authorization RADIUS Change of Authorization This section provides an overview of the RADIUS interface including available primitives and how they are used during a Change of Authorization (CoA). · Change-of-Authorization Requests · CoA Request Response Code · CoA Request Commands · Session Reauthentication · Stacking Guidelines for Session Termination A standard RADIUS interface is typically used in a pulled model where the request originates from a network attached device and the response come from the queried servers. Catalyst switches support the RADIUS Change of Authorization (CoA) extensions defined in RFC 5176 that are typically used in a pushed model and allow for the dynamic reconfiguring of sessions from external authentication, authorization, and accounting (AAA) or policy servers. The switch supports these per-session CoA requests: · Session reauthentication · Session termination · Session termination with port shutdown · Session termination with port bounce This feature is integrated with the Cisco Identity Services Engine, and the Cisco Secure Access Control Server (ACS) 5.1. The RADIUS interface is enabled by default on Catalyst switches. However, some basic configuration is required for the following attributes: · Security and Password--refer to the "Preventing Unauthorized Access to Your Switch" section in this guide. · Accounting--refer to the "Starting RADIUS Accounting" section in the Configuring Switch-Based Authentication chapter in this guide. Change-of-Authorization Requests Change of Authorization (CoA) requests, as described in RFC 5176, are used in a push model to allow for session identification, host reauthentication, and session termination. The model is comprised of one request (CoA-Request) and two possible response codes: · CoA acknowledgment (ACK) [CoA-ACK] · CoA non-acknowledgment (NAK) [CoA-NAK] The request is initiated from a CoA client (typically a RADIUS or policy server) and directed to the switch that acts as a listener. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1299 RFC 5176 Compliance Security RFC 5176 Compliance The Disconnect Request message, which is also referred to as Packet of Disconnect (POD), is supported by the switch for session termination. This table shows the IETF attributes are supported for this feature. Table 115: Supported IETF Attributes Attribute Number 24 31 44 80 101 Attribute Name State Calling-Station-ID Acct-Session-ID Message-Authenticator Error-Cause This table shows the possible values for the Error-Cause attribute. Table 116: Error-Cause Values Value Explanation 201 Residual Session Context Removed 202 Invalid EAP Packet (Ignored) 401 Unsupported Attribute 402 Missing Attribute 403 NAS Identification Mismatch 404 Invalid Request 405 Unsupported Service 406 Unsupported Extension 407 Invalid Attribute Value 501 Administratively Prohibited 502 Request Not Routable (Proxy) 503 Session Context Not Found 504 Session Context Not Removable 505 Other Proxy Processing Error 506 Resources Unavailable Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1300 Security Preconditions Value Explanation 507 Request Initiated 508 Multiple Session Selection Unsupported Preconditions To use the CoA interface, a session must already exist on the switch. CoA can be used to identify a session and enforce a disconnect request. The update affects only the specified session. CoA Request Response Code The CoA Request response code can be used to convey a command to the switch. Related Topics CoA Request Commands, on page 1302 Session Identification For disconnect and CoA requests targeted at a particular session, the switch locates the session based on one or more of the following attributes: · Calling-Station-Id (IETF attribute #31 which contains the host MAC address) · Audit-Session-Id (Cisco VSA) · Acct-Session-Id (IETF attribute #44) Unless all session identification attributes included in the CoA message match the session, the switch returns a Disconnect-NAK or CoA-NAK with the "Invalid Attribute Value" error-code attribute. If more than one session identification attribute is included in the message, all the attributes must match the session or the switch returns a Disconnect- negative acknowledgment (NAK) or CoA-NAK with the error code "Invalid Attribute Value." The packet format for a CoA Request code as defined in RFC 5176 consists of the fields: Code, Identifier, Length, Authenticator, and Attributes in Type:Length:Value (TLV) format. 0 1 2 3 01234567890123456789012345678901 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Code | Identifier | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Authenticator | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Attributes ... +-+-+-+-+-+-+-+-+-+-+-+-+- The attributes field is used to carry Cisco vendor-specific attributes (VSAs). Related Topics CoA Disconnect-Request, on page 1303 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1301 CoA ACK Response Code Security CoA Request: Disable Host Port, on page 1303 CoA Request: Bounce-Port, on page 1304 CoA ACK Response Code If the authorization state is changed successfully, a positive acknowledgment (ACK) is sent. The attributes returned within CoA ACK will vary based on the CoA Request and are discussed in individual CoA Commands. CoA NAK Response Code A negative acknowledgment (NAK) indicates a failure to change the authorization state and can include attributes that indicate the reason for the failure. Use show commands to verify a successful CoA. CoA Request Commands Table 117: CoA Commands Supported on the Switch Command 10 Cisco VSA Reauthenticate Cisco:Avpair="subscriber:command=reauthenticate" host Terminate session This is a standard disconnect request that does not require a VSA. Bounce host port Cisco:Avpair="subscriber:command=bounce-host-port" Disable host port Cisco:Avpair="subscriber:command=disable-host-port" 10 All CoA commands must include the session identifier between the switch and the CoA client. Related Topics CoA Request Response Code, on page 1301 Session Reauthentication The AAA server typically generates a session reauthentication request when a host with an unknown identity or posture joins the network and is associated with a restricted access authorization profile (such as a guest VLAN). A reauthentication request allows the host to be placed in the appropriate authorization group when its credentials are known. To initiate session authentication, the AAA server sends a standard CoA-Request message which contains a Cisco VSA in this form: Cisco:Avpair="subscriber:command=reauthenticate" and one or more session identification attributes. The current session state determines the switch response to the message. If the session is currently authenticated by IEEE 802.1x, the switch responds by sending an EAPoL (Extensible Authentication Protocol over Lan) -RequestId message to the server. If the session is currently authenticated by MAC authentication bypass (MAB), the switch sends an access-request to the server, passing the same identity attributes used for the initial successful authentication. If session authentication is in progress when the switch receives the command, the switch terminates the process, and restarts the authentication sequence, starting with the method configured to be attempted first. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1302 Security Session Reauthentication in a Switch Stack If the session is not yet authorized, or is authorized via guest VLAN, or critical VLAN, or similar policies, the reauthentication message restarts the access control methods, beginning with the method configured to be attempted first. The current authorization of the session is maintained until the reauthentication leads to a different authorization result. Session Reauthentication in a Switch Stack When a switch stack receives a session reauthentication message: · It checkpoints the need for a re-authentication before returning an acknowledgment (ACK). · It initiates reauthentication for the appropriate session. · If authentication completes with either success or failure, the signal that triggered the reauthentication is removed from the stack member. · If the stack master fails before authentication completes, reauthentication is initiated after stack master switch-over based on the original command (which is subsequently removed). · If the stack master fails before sending an ACK, the new stack master treats the re-transmitted command as a new command. Session Termination There are three types of CoA requests that can trigger session termination. A CoA Disconnect-Request terminates the session, without disabling the host port. This command causes re-initialization of the authenticator state machine for the specified host, but does not restrict that host's access to the network. To restrict a host's access to the network, use a CoA Request with the Cisco:Avpair="subscriber:command=disable-host-port" VSA. This command is useful when a host is known to be causing problems on the network, and you need to immediately block network access for the host. When you want to restore network access on the port, re-enable it using a non-RADIUS mechanism. When a device with no supplicant, such as a printer, needs to acquire a new IP address (for example, after a VLAN change), terminate the session on the host port with port-bounce (temporarily disable and then re-enable the port). CoA Disconnect-Request This command is a standard Disconnect-Request. Because this command is session-oriented, it must be accompanied by one or more of the session identification attributes. If the session cannot be located, the switch returns a Disconnect-NAK message with the "Session Context Not Found" error-code attribute. If the session is located, the switch terminates the session. After the session has been completely removed, the switch returns a Disconnect-ACK. If the switch fails-over to a standby switch before returning a Disconnect-ACK to the client, the process is repeated on the new active switch when the request is re-sent from the client. If the session is not found following re-sending, a Disconnect-ACK is sent with the "Session Context Not Found" error-code attribute. Related Topics Session Identification, on page 1301 CoA Request: Disable Host Port This command is carried in a standard CoA-Request message that has this new VSA: Cisco:Avpair="subscriber:command=disable-host-port" Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1303 CoA Request: Bounce-Port Security Because this command is session-oriented, it must be accompanied by one or more of the session identification attributes. If the session cannot be located, the switch returns a CoA-NAK message with the "Session Context Not Found" error-code attribute. If the session is located, the switch disables the hosting port and returns a CoA-ACK message. If the switch fails before returning a CoA-ACK to the client, the process is repeated on the new active switch when the request is re-sent from the client. If the switch fails after returning a CoA-ACK message to the client but before the operation has completed, the operation is restarted on the new active switch. Note A Disconnect-Request failure following command re-sending could be the result of either a successful session termination before change-over (if the Disconnect-ACK was not sent) or a session termination by other means (for example, a link failure) that occurred after the original command was issued and before the standby switch became active. Related Topics Session Identification, on page 1301 CoA Request: Bounce-Port This command is carried in a standard CoA-Request message that contains the following VSA: Cisco:Avpair="subscriber:command=bounce-host-port" Because this command is session-oriented, it must be accompanied by one or more of the session identification attributes. If the session cannot be located, the switch returns a CoA-NAK message with the "Session Context Not Found" error-code attribute. If the session is located, the switch disables the hosting port for a period of 10 seconds, re-enables it (port-bounce), and returns a CoA-ACK. If the switch fails before returning a CoA-ACK to the client, the process is repeated on the new active switch when the request is re-sent from the client. If the switch fails after returning a CoA-ACK message to the client but before the operation has completed, the operation is re-started on the new active switch. Related Topics Session Identification, on page 1301 Stacking Guidelines for Session Termination No special handling is required for CoA Disconnect-Request messages in a switch stack. Stacking Guidelines for CoA-Request Bounce-Port Because the bounce-port command is targeted at a session, not a port, if the session is not found, the command cannot be executed. When the Auth Manager command handler on the stack master receives a valid bounce-port command, it checkpoints the following information before returning a CoA-ACK message: · the need for a port-bounce · the port-id (found in the local session context) The switch initiates a port-bounce (disables the port for 10 seconds, then re-enables it). If the port-bounce is successful, the signal that triggered the port-bounce is removed from the standby stack master. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1304 Security Stacking Guidelines for CoA-Request Disable-Port If the stack master fails before the port-bounce completes, a port-bounce is initiated after stack master change-over based on the original command (which is subsequently removed). If the stack master fails before sending a CoA-ACK message, the new stack master treats the re-sent command as a new command. Stacking Guidelines for CoA-Request Disable-Port Because the disable-port command is targeted at a session, not a port, if the session is not found, the command cannot be executed. When the Auth Manager command handler on the stack master receives a valid disable-port command, it verifies this information before returning a CoA-ACK message: · the need for a port-disable · the port-id (found in the local session context) The switch attempts to disable the port. If the port-disable operation is successful, the signal that triggered the port-disable is removed from the standby stack master. If the stack master fails before the port-disable operation completes, the port is disabled after stack master change-over based on the original command (which is subsequently removed). If the stack master fails before sending a CoA-ACK message, the new stack master treats the re-sent command as a new command. Default RADIUS Configuration RADIUS and AAA are disabled by default. To prevent a lapse in security, you cannot configure RADIUS through a network management application. When enabled, RADIUS can authenticate users accessing the switch through the CLI. RADIUS Server Host Switch-to-RADIUS-server communication involves several components: · Hostname or IP address · Authentication destination port · Accounting destination port · Key string · Timeout period · Retransmission value You identify RADIUS security servers by their hostname or IP address, hostname and specific UDP port numbers, or their IP address and specific UDP port numbers. The combination of the IP address and the UDP port number creates a unique identifier, allowing different ports to be individually defined as RADIUS hosts providing a specific AAA service. This unique identifier enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1305 RADIUS Login Authentication Security If two different host entries on the same RADIUS server are configured for the same service--for example, accounting--the second host entry configured acts as a fail-over backup to the first one. Using this example, if the first host entry fails to provide accounting services, the %RADIUS-4-RADIUS_DEAD message appears, and then the switch tries the second host entry configured on the same device for accounting services. (The RADIUS host entries are tried in the order that they are configured.) A RADIUS server and the switch use a shared secret text string to encrypt passwords and exchange responses. To configure RADIUS to use the AAA security commands, you must specify the host running the RADIUS server daemon and a secret text (key) string that it shares with the switch. The timeout, retransmission, and encryption key values can be configured globally for all RADIUS servers, on a per-server basis, or in some combination of global and per-server settings. Related Topics Identifying the RADIUS Server Host, on page 1308 Defining AAA Server Groups, on page 1312 Configuring Settings for All RADIUS Servers, on page 1317 Configuring RADIUS Login Authentication, on page 1310 RADIUS Login Authentication To configure AAA authentication, you define a named list of authentication methods and then apply that list to various ports. The method list defines the types of authentication to be performed and the sequence in which they are performed; it must be applied to a specific port before any of the defined authentication methods are performed. The only exception is the default method list. The default method list is automatically applied to all ports except those that have a named method list explicitly defined. A method list describes the sequence and authentication methods to be queried to authenticate a user. You can designate one or more security protocols to be used for authentication, thus ensuring a backup system for authentication in case the initial method fails. The software uses the first method listed to authenticate users; if that method fails to respond, the software selects the next authentication method in the method list. This process continues until there is successful communication with a listed authentication method or until all defined methods are exhausted. If authentication fails at any point in this cycle--meaning that the security server or local username database responds by denying the user access--the authentication process stops, and no other authentication methods are attempted. Related Topics Configuring RADIUS Login Authentication, on page 1310 AAA Server Groups You can configure the switch to use AAA server groups to group existing server hosts for authentication. You select a subset of the configured server hosts and use them for a particular service. The server group is used with a global server-host list, which lists the IP addresses of the selected server hosts. Server groups also can include multiple host entries for the same server if each entry has a unique identifier (the combination of the IP address and UDP port number), allowing different ports to be individually defined as RADIUS hosts providing a specific AAA service. If you configure two different host entries on the same RADIUS server for the same service, (for example, accounting), the second configured host entry acts as a fail-over backup to the first one. Related Topics Defining AAA Server Groups, on page 1312 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1306 Security AAA Authorization AAA Authorization AAA authorization limits the services available to a user. When AAA authorization is enabled, the switch uses information retrieved from the user's profile, which is in the local user database or on the security server, to configure the user's session. The user is granted access to a requested service only if the information in the user profile allows it. Related Topics Configuring RADIUS Authorization for User Privileged Access and Network Services, on page 1314 RADIUS Accounting The AAA accounting feature tracks the services that users are using and the amount of network resources that they are consuming. When you enable AAA accounting, the switch reports user activity to the RADIUS security server in the form of accounting records. Each accounting record contains accounting attribute-value (AV) pairs and is stored on the security server. You can then analyze the data for network management, client billing, or auditing. Related Topics Starting RADIUS Accounting, on page 1315 Vendor-Specific RADIUS Attributes The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the switch and the RADIUS server by using the vendor-specific attribute (attribute 26). Vendor-specific attributes (VSAs) allow vendors to support their own extended attributes not suitable for general use. The Cisco RADIUS implementation supports one vendor-specific option by using the format recommended in the specification. Cisco's vendor-ID is 9, and the supported option has vendor-type 1, which is named cisco-avpair. The value is a string with this format: protocol : attribute sep value * Protocol is a value of the Cisco protocol attribute for a particular type of authorization. Attribute and value are an appropriate attributevalue (AV) pair defined in the Cisco TACACS+ specification, and sep is = for mandatory attributes and is * for optional attributes. The full set of features available for TACACS+ authorization can then be used for RADIUS. Other vendors have their own unique vendor-IDs, options, and associated VSAs. For more information about vendor-IDs and VSAs, see RFC 2138, "Remote Authentication Dial-In User Service (RADIUS)." For a complete list of RADIUS attributes or more information about vendor-specific attribute 26, see the "RADIUS Attributes" appendix in the Cisco IOS Security Configuration Guide. Related Topics Configuring the Switch to Use Vendor-Specific RADIUS Attributes, on page 1318 Vendor-Proprietary RADIUS Server Communication Although an IETF draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the switch and the RADIUS server, some vendors have extended the RADIUS attribute set in a unique way. Cisco IOS software supports a subset of vendor-proprietary RADIUS attributes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1307 How to Configure RADIUS Security As mentioned earlier, to configure RADIUS (whether vendor-proprietary or IETF draft-compliant), you must specify the host running the RADIUS server daemon and the secret text string it shares with the switch. You specify the RADIUS host and secret text string by using the radius-server global configuration commands. Related Topics Configuring the Switch for Vendor-Proprietary RADIUS Server Communication, on page 1319 How to Configure RADIUS Identifying the RADIUS Server Host To apply these settings globally to all RADIUS servers communicating with the switch, use the three unique global configuration commands: radius-server timeout, radius-server retransmit, and radius-server key. To apply these values on a specific RADIUS server, use the radius-server host global configuration command. You can configure the switch to use AAA server groups to group existing server hosts for authentication. For more information, see Related Topics below. You also need to configure some settings on the RADIUS server. These settings include the IP address of the switch and the key string to be shared by both the server and the switch. For more information, see the RADIUS server documentation. Before you begin If you configure both global and per-server functions (timeout, retransmission, and key commands) on the switch, the per-server timer, retransmission, and key value commands override global timer, retransmission, and key value commands. For information on configuring these settings on all RADIUS servers, see Related Topics below. SUMMARY STEPS 1. configure terminal 2. radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number] [timeout seconds] [retransmit retries] [key string] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 radius-server host {hostname | ip-address} [auth-port Specifies the IP address or hostname of the remote RADIUS port-number] [acct-port port-number] [timeout seconds] server host. [retransmit retries] [key string] · (Optional) For auth-port port-number, specify the Example: UDP destination port for authentication requests. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1308 Security Identifying the RADIUS Server Host Step 3 Command or Action Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1 Purpose · (Optional) For acct-port port-number, specify the UDP destination port for accounting requests. · (Optional) For timeout seconds, specify the time interval that the switch waits for the RADIUS server to reply before resending. The range is 1 to 1000. This setting overrides the radius-server timeout global configuration command setting. If no timeout is set with the radius-server host command, the setting of the radius-server timeout command is used. · (Optional) For retransmit retries, specify the number of times a RADIUS request is resent to a server if that server is not responding or responding slowly. The range is 1 to 1000. If no retransmit value is set with the radius-server host command, the setting of the radius-server retransmit global configuration command is used. · (Optional) For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. Note The key is a text string that must match the encryption key used on the RADIUS server. Always configure the key as the last item in the radius-server host command. Leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks are part of the key. end Example: To configure the switch to recognize more than one host entry associated with a single IP address, enter this command as many times as necessary, making sure that each UDP port number is different. The switch software searches for hosts in the order in which you specify them. Set the timeout, retransmit, and encryption key values to use with the specific RADIUS host. Returns to privileged EXEC mode. Switch(config)# end Related Topics RADIUS Server Host, on page 1305 Defining AAA Server Groups, on page 1312 Configuring Settings for All RADIUS Servers, on page 1317 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1309 Configuring RADIUS Login Authentication Security Configuring RADIUS Login Authentication Beginning in privileged EXEC mode, follow these steps to configure RADIUS login authentication: Before you begin To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip http authentication aaa global configuration command. Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods. For more information about the ip http authentication command, see the Cisco IOS Security Command Reference, Release 12.4. SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. aaa authentication login {default | list-name} method1 [method2...] 4. line [console | tty | vty] line-number [ending-line-number] 5. login authentication {default | list-name} 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 aaa new-model Example: Switch(config)# aaa new-model Enables AAA. Step 3 aaa authentication login {default | list-name} method1 [method2...] Example: Switch(config)# aaa authentication login default local Creates a login authentication method list. · To create a default list that is used when a named list is not specified in the login authentication command, use the default keyword followed by the methods that are to be used in default situations. The default method list is automatically applied to all ports. · For list-name, specify a character string to name the list you are creating. · For method1..., specify the actual method the authentication algorithm tries. The additional methods of authentication are used only if the previous method returns an error, not if it fails. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1310 Security Configuring RADIUS Login Authentication Command or Action Purpose Select one of these methods: · enable--Use the enable password for authentication. Before you can use this authentication method, you must define an enable password by using the enable password global configuration command. · group radius--Use RADIUS authentication. Before you can use this authentication method, you must configure the RADIUS server. · line--Use the line password for authentication. Before you can use this authentication method, you must define a line password. Use the password password line configuration command. · local--Use the local username database for authentication. You must enter username information in the database. Use the username name password global configuration command. · local-case--Use a case-sensitive local username database for authentication. You must enter username information in the database by using the username password global configuration command. · none--Do not use any authentication for login. Step 4 line [console | tty | vty] line-number [ending-line-number] Enters line configuration mode, and configure the lines to Example: which you want to apply the authentication list. Switch(config)# line 1 4 Step 5 login authentication {default | list-name} Example: Switch(config)# login authentication default Step 6 end Example: Switch(config)# end Applies the authentication list to a line or set of lines. · If you specify default, use the default list created with the aaa authentication login command. · For list-name, specify the list created with the aaa authentication login command. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1311 Defining AAA Server Groups Security Related Topics RADIUS Login Authentication, on page 1306 RADIUS Server Host, on page 1305 Defining AAA Server Groups You use the server group server configuration command to associate a particular server with a defined group server. You can either identify the server by its IP address or identify multiple host instances or entries by using the optional auth-port and acct-port keywords. Beginning in privileged EXEC mode, follow these steps to define AAA server groups: SUMMARY STEPS 1. configure terminal 2. radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number] [timeout seconds] [retransmit retries] [key string] 3. aaa new-model 4. aaa group server radius group-name 5. server ip-address 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 radius-server host {hostname | ip-address} [auth-port Specifies the IP address or hostname of the remote RADIUS port-number] [acct-port port-number] [timeout seconds] server host. [retransmit retries] [key string] · (Optional) For auth-port port-number, specify the Example: UDP destination port for authentication requests. Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1 · (Optional) For acct-port port-number, specify the UDP destination port for accounting requests. · (Optional) For timeout seconds, specify the time interval that the switch waits for the RADIUS server to reply before resending. The range is 1 to 1000. This setting overrides the radius-server timeout global configuration command setting. If no timeout is set with the radius-server host command, the setting of the radius-server timeout command is used. · (Optional) For retransmit retries, specify the number of times a RADIUS request is resent to a server if that server is not responding or responding slowly. The Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1312 Security Defining AAA Server Groups Command or Action Step 3 aaa new-model Example: Switch(config)# aaa new-model Purpose range is 1 to 1000. If no retransmit value is set with the radius-server host command, the setting of the radius-server retransmit global configuration command is used. · (Optional) For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. Note The key is a text string that must match the encryption key used on the RADIUS server. Always configure the key as the last item in the radius-server host command. Leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks are part of the key. To configure the switch to recognize more than one host entry associated with a single IP address, enter this command as many times as necessary, making sure that each UDP port number is different. The switch software searches for hosts in the order in which you specify them. Set the timeout, retransmit, and encryption key values to use with the specific RADIUS host. Enables AAA. Step 4 aaa group server radius group-name Example: Switch(config)# aaa group server radius group1 Defines the AAA server-group with a group name. This command puts the switch in a server group configuration mode. Step 5 server ip-address Example: Switch(config-sg-radius)# server 172.20.0.1 auth-port 1000 acct-port 1001 Step 6 end Example: Switch(config)# end Associates a particular RADIUS server with the defined server group. Repeat this step for each RADIUS server in the AAA server group. Each server in the group must be previously defined in Step 2. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1313 Configuring RADIUS Authorization for User Privileged Access and Network Services Security Using Two Different RADIUS Group Servers In this example, the switch is configured to recognize two different RADIUS group servers (group1 and group2). Group1 has two different host entries on the same RADIUS server configured for the same services. The second host entry acts as a fail-over backup to the first entry. Switch(config)# radius-server host 172.20.0.1 auth-port 1000 acct-port 1001 Switch(config)# radius-server host 172.10.0.1 auth-port 1645 acct-port 1646 Switch(config)# aaa new-model Switch(config)# aaa group server radius group1 Switch(config-sg-radius)# server 172.20.0.1 auth-port 1000 acct-port 1001 Switch(config-sg-radius)# exit Switch(config)# aaa group server radius group2 Switch(config-sg-radius)# server 172.20.0.1 auth-port 2000 acct-port 2001 Switch(config-sg-radius)# exit Related Topics Identifying the RADIUS Server Host, on page 1308 RADIUS Server Host, on page 1305 AAA Server Groups, on page 1306 Configuring RADIUS Authorization for User Privileged Access and Network Services Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been configured. Beginning in privileged EXEC mode, follow these steps to configure RADIUS authorization for user priviledged access and network services: SUMMARY STEPS 1. configure terminal 2. aaa authorization network radius 3. aaa authorization exec radius 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1314 Security Starting RADIUS Accounting Step 2 Command or Action aaa authorization network radius Example: Purpose Configures the switch for user RADIUS authorization for all network-related service requests. Switch(config)# aaa authorization network radius Step 3 aaa authorization exec radius Example: Switch(config)# aaa authorization exec radius Configures the switch for user RADIUS authorization if the user has privileged EXEC access. The exec keyword might return user profile information (such as autocommand information). Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. What to do next You can use the aaa authorization global configuration command with the radius keyword to set parameters that restrict a user's network access to privileged EXEC mode. The aaa authorization exec radius local command sets these authorization parameters: · Use RADIUS for privileged EXEC access authorization if authentication was performed by using RADIUS. · Use the local database if authentication was not performed by using RADIUS. Related Topics AAA Authorization, on page 1307 Starting RADIUS Accounting Beginning in privileged EXEC mode, follow these steps to start RADIUS accounting: SUMMARY STEPS 1. configure terminal 2. aaa accounting network start-stop radius 3. aaa accounting exec start-stop radius 4. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1315 Establishing a Session with a Router if the AAA Server is Unreachable Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 aaa accounting network start-stop radius Example: Enables RADIUS accounting for all network-related service requests. Switch(config)# aaa accounting network start-stop radius Step 3 aaa accounting exec start-stop radius Example: Switch(config)# aaa accounting exec start-stop radius Enables RADIUS accounting to send a start-record accounting notice at the beginning of a privileged EXEC process and a stop-record at the end. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. What to do next To establishing a session with a router if the AAA server is unreachable, use the aaa accounting system guarantee-first command. This command guarantees system accounting as the first record, which is the default condition. In some situations, users might be prevented from starting a session on the console or terminal connection until after the system reloads, which can take more than 3 minutes. To establish a console or Telnet session with the router if the AAA server is unreachable when the router reloads, use the no aaa accounting system guarantee-first command. Related Topics RADIUS Accounting, on page 1307 Establishing a Session with a Router if the AAA Server is Unreachable The aaa accounting system guarantee-first command guarantees system accounting as the first record, which is the default condition. In some situations, users might be prevented from starting a session on the console or terminal connection until after the system reloads, which can take more than 3 minutes. To establish a console or Telnet session with the router if the AAA server is unreachable when the router reloads, use the no aaa accounting system guarantee-first command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1316 Security Configuring Settings for All RADIUS Servers Configuring Settings for All RADIUS Servers Beginning in privileged EXEC mode, follow these steps to configure settings for all RADIUS servers: SUMMARY STEPS 1. configure terminal 2. radius-server key string 3. radius-server retransmit retries 4. radius-server timeout seconds 5. radius-server deadtime minutes 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 radius-server key string Specifies the shared secret text string used between the Example: switch and all RADIUS servers. Note The key is a text string that must match the Switch(config)# radius-server key your_server_key encryption key used on the RADIUS server. Leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks are part of the key. radius-server retransmit retries Example: Switch(config)# radius-server retransmit 5 Specifies the number of times the switch sends each RADIUS request to the server before giving up. The default is 3; the range 1 to 1000. Step 4 radius-server timeout seconds Example: Switch(config)# radius-server timeout 3 Specifies the number of seconds a switch waits for a reply to a RADIUS request before resending the request. The default is 5 seconds; the range is 1 to 1000. Step 5 radius-server deadtime minutes Example: Switch(config)# radius-server deadtime 0 When a RADIUS server is not responding to authentication requests, this command specifies a time to stop the request on that server. This avoids the wait for the request to timeout before trying the next configured server. The default is 0; the range is 1 to 1440 minutes. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1317 Configuring the Switch to Use Vendor-Specific RADIUS Attributes Security Step 6 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Related Topics Identifying the RADIUS Server Host, on page 1308 RADIUS Server Host, on page 1305 Configuring the Switch to Use Vendor-Specific RADIUS Attributes Beginning in privileged EXEC mode, follow these steps to configure the switch to use vendor-specific RADIUS attributes: SUMMARY STEPS 1. configure terminal 2. radius-server vsa send [accounting | authentication] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 radius-server vsa send [accounting | authentication] Example: Switch(config)# radius-server vsa send end Example: Enables the switch to recognize and use VSAs as defined by RADIUS IETF attribute 26. · (Optional) Use the accounting keyword to limit the set of recognized vendor-specific attributes to only accounting attributes. · (Optional) Use the authentication keyword to limit the set of recognized vendor-specific attributes to only authentication attributes. If you enter this command without keywords, both accounting and authentication vendor-specific attributes are used. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1318 Security Configuring the Switch for Vendor-Proprietary RADIUS Server Communication Command or Action Switch(config)# end Purpose Related Topics Vendor-Specific RADIUS Attributes, on page 1307 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication Beginning in privileged EXEC mode, follow these steps to configure the switch to use vendor-proprietary RADIUS server communication: SUMMARY STEPS 1. configure terminal 2. radius-server host {hostname | ip-address} non-standard 3. radius-server key string 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 radius-server host {hostname | ip-address} non-standard Specifies the IP address or hostname of the remote RADIUS Example: server host and identifies that it is using a vendor-proprietary implementation of RADIUS. Switch(config)# radius-server host 172.20.30.15 nonstandard Step 3 radius-server key string Example: Switch(config)# radius-server key rad124 Specifies the shared secret text string used between the switch and the vendor-proprietary RADIUS server. The switch and the RADIUS server use this text string to encrypt passwords and exchange responses. Note The key is a text string that must match the encryption key used on the RADIUS server. Leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks are part of the key. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1319 Configuring CoA on the Switch Security Step 4 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. What to do next This feature allows access and authentication requests to be evenly across all RADIUS servers in a server group. For more information, see the "RADIUS Server Load Balancing" chapter of the Cisco IOS Security Configuration Guide, Release 12.4. Related Topics Vendor-Proprietary RADIUS Server Communication, on page 1307 Configuring CoA on the Switch Beginning in privileged EXEC mode, follow these steps to configure CoA on a switch. This procedure is required. SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. aaa server radius dynamic-author 4. client {ip-address | name} [vrf vrfname] [server-key string] 5. server-key [0 | 7] string 6. port port-number 7. auth-type {any | all | session-key} 8. ignore session-key 9. ignore server-key 10. authentication command bounce-port ignore 11. authentication command disable-port ignore 12. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 aaa new-model Example: Enables AAA. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1320 Security Configuring CoA on the Switch Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Switch(config)# aaa new-model Purpose aaa server radius dynamic-author Example: Configures the switch as an authentication, authorization, and accounting (AAA) server to facilitate interaction with an external policy server. Switch(config)# aaa server radius dynamic-author client {ip-address | name} [vrf vrfname] [server-key string] server-key [0 | 7] string Example: Switch(config-sg-radius)# server-key your_server_key Enters dynamic authorization local server configuration mode and specifies a RADIUS client from which a device will accept CoA and disconnect requests. Configures the RADIUS key to be shared between a device and RADIUS clients. port port-number Example: Switch(config-sg-radius)# port 25 Specifies the port on which a device listens for RADIUS requests from configured RADIUS clients. auth-type {any | all | session-key} Example: Switch(config-sg-radius)# auth-type any Specifies the type of authorization the switch uses for RADIUS clients. The client must match all the configured attributes for authorization. ignore session-key ignore server-key Example: Switch(config-sg-radius)# ignore server-key (Optional) Configures the switch to ignore the session-key. For more information about the ignore command, see the Cisco IOS Intelligent Services Gateway Command Reference on Cisco.com. (Optional) Configures the switch to ignore the server-key. For more information about the ignore command, see the Cisco IOS Intelligent Services Gateway Command Reference on Cisco.com. authentication command bounce-port ignore (Optional) Configures the switch to ignore a CoA request Example: to temporarily disable the port hosting a session. The purpose of temporarily disabling the port is to trigger a DHCP renegotiation from the host when a VLAN change Switch(config-sg-radius)# bounce-port ignore authentication command occurs and there is no supplicant on the endpoint to detect the change. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1321 Configuring RADIUS Server Load Balancing Security Step 11 Step 12 Command or Action Purpose authentication command disable-port ignore (Optional) Configures the switch to ignore a nonstandard Example: command requesting that the port hosting a session be administratively shut down. Shutting down the port results in termination of the session. Switch(config-sg-radius)# authentication command disable-port ignore Use standard CLI or SNMP commands to re-enable the port. end Example: Returns to privileged EXEC mode. Switch(config-sg-radius)# end Configuring RADIUS Server Load Balancing This feature allows access and authentication requests to be evenly across all RADIUS servers in a server group. For more information, see the "RADIUS Server Load Balancing" chapter of the Cisco IOS Security Configuration Guide, Release 12.4. Monitoring CoA Functionality Table 118: Privileged EXEC show Commands Command Purpose show aaa attributes protocol radius Displays AAA attributes of RADIUS commands. Table 119: Global Troubleshooting Commands Command Purpose debug radius Displays information for troubleshooting RADIUS. debug aaa coa Displays information for troubleshooting CoA processing. debug aaa pod Displays information for troubleshooting POD packets. debug aaa subsys Displays information for troubleshooting POD packets. debug cmdhd [detail | error | events] Displays information for troubleshooting command headers. For detailed information about the fields in these displays, see the command reference for this release. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1322 Security Configuration Examples for Controlling Switch Access with RADIUS Configuration Examples for Controlling Switch Access with RADIUS Examples: Identifying the RADIUS Server Host This example shows how to configure one RADIUS server to be used for authentication and another to be used for accounting: Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1 Switch(config)# radius-server host 172.20.36.50 acct-port 1618 key rad2 This example shows how to configure host1 as the RADIUS server and to use the default ports for both authentication and accounting: Switch(config)# radius-server host host1 Examples: Configuring the Switch to Use Vendor-Specific RADIUS Attributes For example, this AV pair activates Cisco's multiple named ip address pools feature during IP authorization (during PPP IPCP address assignment): cisco-avpair= "ip:addr-pool=first" This example shows how to provide a user logging in from a switch with immediate access to privileged EXEC commands: cisco-avpair= "shell:priv-lvl=15" This example shows how to specify an authorized VLAN in the RADIUS server database: cisco-avpair= "tunnel-type(#64)=VLAN(13)" cisco-avpair= "tunnel-medium-type(#65)=802 media(6)" cisco-avpair= "tunnel-private-group-id(#81)=vlanid" This example shows how to apply an input ACL in ASCII format to an interface for the duration of this connection: cisco-avpair= "ip:inacl#1=deny ip 10.10.10.10 0.0.255.255 20.20.20.20 255.255.0.0" cisco-avpair= "ip:inacl#2=deny ip 10.10.10.10 0.0.255.255 any" cisco-avpair= "mac:inacl#3=deny any any decnet-iv" This example shows how to apply an output ACL in ASCII format to an interface for the duration of this connection: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1323 Example: Configuring the Switch for Vendor-Proprietary RADIUS Server Communication Security cisco-avpair= "ip:outacl#2=deny ip 10.10.10.10 0.0.255.255 any" Example: Configuring the Switch for Vendor-Proprietary RADIUS Server Communication This example shows how to specify a vendor-proprietary RADIUS host and to use a secret key of rad124 between the switch and the server: Switch(config)# radius-server host 172.20.30.15 nonstandard Switch(config)# radius-server key rad124 Additional References Related Documents Related Document Title Topic Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity Control http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html policies and Identity Service templates for Session Aware networking. Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) RADIUS, TACACS+, http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra Secure Shell, 802.1X and AAA. Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1324 Security Feature Information for RADIUS Standards and RFCs Standard/RFC Title MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for RADIUS Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1325 Feature Information for RADIUS Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1326 6 5 C H A P T E R Configuring Kerberos · Finding Feature Information, on page 1327 · Prerequisites for Controlling Switch Access with Kerberos, on page 1327 · Restrictions for Controlling Switch Access with Kerberos, on page 1328 · Information about Kerberos, on page 1328 · How to Configure Kerberos, on page 1331 · Monitoring the Kerberos Configuration, on page 1331 · Additional References, on page 1332 · Feature Information for Kerberos, on page 1333 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Controlling Switch Access with Kerberos The following are the prerequisites for controlling switch access with Kerberos. · So that remote users can authenticate to network services, you must configure the hosts and the KDC in the Kerberos realm to communicate and mutually authenticate users and network services. To do this, you must identify them to each other. You add entries for the hosts to the Kerberos database on the KDC and add KEYTAB files generated by the KDC to all hosts in the Kerberos realm. You also create entries for the users in the KDC database. · A Kerberos server can be a switch that is configured as a network security server and that can authenticate users by using the Kerberos protocol. When you add or create entries for the hosts and users, follow these guidelines: · The Kerberos principal name must be in all lowercase characters. · The Kerberos instance name must be in all lowercase characters. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1327 Restrictions for Controlling Switch Access with Kerberos Security · The Kerberos realm name must be in all uppercase characters. Restrictions for Controlling Switch Access with Kerberos The following lists any restrictions for controlling switch access with Kerberos. Information about Kerberos This section provides Kerberos information. Kerberos and Switch Access This section describes how to enable and configure the Kerberos security system, which authenticates requests for network resources by using a trusted third party. For Kerberos configuration examples, see the "Kerberos Configuration Examples" section in the "Security Server Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.4.. For complete syntax and usage information for the commands used in this section, see the "Kerberos Commands" section in the "Security Server Protocols" chapter of the Cisco IOS Security Command Reference, Release 12.4. Note In the Kerberos configuration examples and in the Cisco IOS Security Command Reference, Release 12.4, the trusted third party can be a switch that supports Kerberos, that is configured as a network security server, and that can authenticate users by using the Kerberos protocol. Kerberos Overview Kerberos is a secret-key network authentication protocol, which was developed at the Massachusetts Institute of Technology (MIT). It uses the Data Encryption Standard (DES) cryptographic algorithm for encryption and authentication and authenticates requests for network resources. Kerberos uses the concept of a trusted third party to perform secure verification of users and services. This trusted third party is called the key distribution center (KDC). Kerberos verifies that users are who they claim to be and the network services that they use are what the services claim to be. To do this, a KDC or trusted Kerberos server issues tickets to users. These tickets, which have a limited life span, are stored in user credential caches. The Kerberos server uses the tickets instead of user names and passwords to authenticate users and network services. Note A Kerberos server can be a switch that is configured as a network security server and that can authenticate users by using the Kerberos protocol. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1328 Security Kerberos Overview The Kerberos credential scheme uses a process called single logon. This process authenticates a user once and then allows secure authentication (without encrypting another password) wherever that user credential is accepted. This software release supports Kerberos 5, which allows organizations that are already using Kerberos 5 to use the same Kerberos authentication database on the KDC that they are already using on their other network hosts (such as UNIX servers and PCs). In this software release, Kerberos supports these network services: · Telnet · rlogin · rsh This table lists the common Kerberos-related terms and definitions. Table 120: Kerberos Terms Term Definition Authentication A process by which a user or service identifies itself to another service. For example, a client can authenticate to a switch or a switch can authenticate to another switch. Authorization Credential A means by which the switch identifies what privileges the user has in a network or on the switch and what actions the user can perform. A general term that refers to authentication tickets, such as TGTs11 and service credentials. Kerberos credentials verify the identity of a user or service. If a network service decides to trust the Kerberos server that issued a ticket, it can be used in place of re-entering a username and password. Credentials have a default life span of eight hours. Instance An authorization level label for Kerberos principals. Most Kerberos principals are of the form user@REALM (for example, smith@EXAMPLE.COM). A Kerberos principal with a Kerberos instance has the form user/instance@REALM (for example, smith/admin@EXAMPLE.COM). The Kerberos instance can be used to specify the authorization level for the user if authentication is successful. The server of each network service might implement and enforce the authorization mappings of Kerberos instances but is not required to do so. Note The Kerberos principal and instance names must be in all lowercase characters. Note The Kerberos realm name must be in all uppercase characters. KDC12 Key distribution center that consists of a Kerberos server and database program that is running on a network host. Kerberized A term that describes applications and services that have been modified to support the Kerberos credential infrastructure. Kerberos realm A domain consisting of users, hosts, and network services that are registered to a Kerberos server. The Kerberos server is trusted to verify the identity of a user or network service to another user or network service. Note The Kerberos realm name must be in all uppercase characters. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1329 Kerberos Operation Security Term Definition Kerberos server A daemon that is running on a network host. Users and network services register their identity with the Kerberos server. Network services query the Kerberos server to authenticate to other network services. KEYTAB13 A password that a network service shares with the KDC. In Kerberos 5 and later Kerberos versions, the network service authenticates an encrypted service credential by using the KEYTAB to decrypt it. In Kerberos versions earlier than Kerberos 5, KEYTAB is referred to as SRVTAB14. Principal Also known as a Kerberos identity, this is who you are or what a service is according to the Kerberos server. Note The Kerberos principal name must be in all lowercase characters. Service credential A credential for a network service. When issued from the KDC, this credential is encrypted with the password shared by the network service and the KDC. The password is also shared with the user TGT. SRVTAB A password that a network service shares with the KDC. In Kerberos 5 or later Kerberos versions, SRVTAB is referred to as KEYTAB. TGT Ticket granting ticket that is a credential that the KDC issues to authenticated users. When users receive a TGT, they can authenticate to network services within the Kerberos realm represented by the KDC. 11 ticket granting ticket 12 key distribution center 13 key table 14 server table Kerberos Operation A Kerberos server can be a switch that is configured as a network security server and that can authenticate remote users by using the Kerberos protocol. Although you can customize Kerberos in a number of ways, remote users attempting to access network services must pass through three layers of security before they can access network services. To authenticate to network services by using a switch as a Kerberos server, remote users must follow these steps: 1. Authenticating to a Boundary Switch, on page 1330 2. Obtaining a TGT from a KDC, on page 1331 3. Authenticating to Network Services, on page 1331 Authenticating to a Boundary Switch This section describes the first layer of security through which a remote user must pass. The user must first authenticate to the boundary switch. This process then occurs: 1. The user opens an un-Kerberized Telnet connection to the boundary switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1330 Security Obtaining a TGT from a KDC 2. The switch prompts the user for a username and password. 3. The switch requests a TGT from the KDC for this user. 4. The KDC sends an encrypted TGT that includes the user identity to the switch. 5. The switch attempts to decrypt the TGT by using the password that the user entered. · If the decryption is successful, the user is authenticated to the switch. · If the decryption is not successful, the user repeats Step 2 either by re-entering the username and password (noting if Caps Lock or Num Lock is on or off) or by entering a different username and password. A remote user who initiates a un-Kerberized Telnet session and authenticates to a boundary switch is inside the firewall, but the user must still authenticate directly to the KDC before getting access to the network services. The user must authenticate to the KDC because the TGT that the KDC issues is stored on the switch and cannot be used for additional authentication until the user logs on to the switch. Obtaining a TGT from a KDC This section describes the second layer of security through which a remote user must pass. The user must now authenticate to a KDC and obtain a TGT from the KDC to access network services. For instructions about how to authenticate to a KDC, see the "Obtaining a TGT from a KDC" section in the "Security Server Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.4. Authenticating to Network Services This section describes the third layer of security through which a remote user must pass. The user with a TGT must now authenticate to the network services in a Kerberos realm. For instructions about how to authenticate to a network service, see the "Authenticating to Network Services" section in the "Security Server Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.4. How to Configure Kerberos To set up a Kerberos-authenticated server-client system, follow these steps: · Configure the KDC by using Kerberos commands. · Configure the switch to use the Kerberos protocol. For instructions, see the "Kerberos Configuration Task List" section in the "Security Server Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.4. Monitoring the Kerberos Configuration To display the Kerberos configuration, use the show running-config privileged EXEC command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1331 Additional References Security Additional References Related Documents Related Document Title Topic Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity Control http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html policies and Identity Service templates for Session Aware networking. Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) RADIUS, TACACS+, http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra Secure Shell, 802.1X and AAA. Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1332 Security Feature Information for Kerberos Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for Kerberos Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1333 Feature Information for Kerberos Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1334 6 6 C H A P T E R Configuring Local Authentication and Authorization · Finding Feature Information, on page 1335 · How to Configure Local Authentication and Authorization, on page 1335 · Monitoring Local Authentication and Authorization, on page 1337 · Additional References, on page 1337 · Feature Information for Local Authentication and Authorization, on page 1338 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. How to Configure Local Authentication and Authorization Configuring the Switch for Local Authentication and Authorization You can configure AAA to operate without a server by setting the switch to implement AAA in local mode. The switch then handles authentication and authorization. No accounting is available in this configuration. Note To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip http authentication aaa global configuration command. Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods. Beginning in privileged EXEC mode, follow these steps to configure AAA to operate without a server by setting the switch to implement AAA in local mode: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1335 Configuring the Switch for Local Authentication and Authorization Security SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. aaa authentication login default local 4. aaa authorization exec local 5. aaa authorization network local 6. username name [privilege level] {password encryption-type password} 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 aaa new-model Example: Switch(config)# aaa new-model Enables AAA. Step 3 aaa authentication login default local Example: Sets the login authentication to use the local username database. The default keyword applies the local user database authentication to all ports. Switch(config)# aaa authentication login default local Step 4 aaa authorization exec local Example: Switch(config)# aaa authorization exec local Configures user AAA authorization, check the local database, and allow the user to run an EXEC shell. Step 5 aaa authorization network local Example: Configures user AAA authorization for all network-related service requests. Switch(config)# aaa authorization network local Step 6 username name [privilege level] {password encryption-type password} Enters the local database, and establishes a username-based authentication system. Example: Repeat this command for each user. · For name, specify the user ID as one word. Spaces and Switch(config)# username your_user_name privilege quotation marks are not allowed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1336 Security Monitoring Local Authentication and Authorization Command or Action 1 password 7 secret567 Step 7 end Example: Switch(config)# end Purpose · (Optional) For level, specify the privilege level the user has after gaining access. The range is 0 to 15. Level 15 gives privileged EXEC mode access. Level 0 gives user EXEC mode access. · For encryption-type, enter 0 to specify that an unencrypted password follows. Enter 7 to specify that a hidden password follows. · For password, specify the password the user must enter to gain access to the switch. The password must be from 1 to 25 characters, can contain embedded spaces, and must be the last option specified in the username command. Returns to privileged EXEC mode. Related Topics Setting Up the Switch to Run SSH, on page 1343 SSH Configuration Guidelines, on page 1341 Monitoring Local Authentication and Authorization To display Local Authentication and Authorization configuration, use the show running-config privileged EXEC command. Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1337 Feature Information for Local Authentication and Authorization Security MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for Local Authentication and Authorization Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1338 6 7 C H A P T E R Configuring Secure Shell (SSH) · Finding Feature Information, on page 1339 · Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP), on page 1339 · Restrictions for Configuring the Switch for SSH, on page 1340 · Information about SSH, on page 1340 · How to Configure SSH, on page 1343 · Monitoring the SSH Configuration and Status, on page 1346 · Additional References, on page 1346 · Feature Information for SSH, on page 1347 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP) The following are the prerequisites for configuring the switch for secure shell (SSH): · For SSH to work, the switch needs an RSA public/private key pair. This is the same with Secure Copy Protocol (SCP), which relies on SSH for its secure transport. · Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch. · Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman (RSA) key pair. · SCP relies on SSH for security. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1339 Restrictions for Configuring the Switch for SSH Security · SCP requires that authentication, authorization, and accounting (AAA) authorization be configured so the router can determine whether the user has the correct privilege level. · A user must have appropriate authorization to use SCP. · A user who has appropriate authorization can use SCP to copy any file in the Cisco IOS File System (IFS) to and from a switch by using the copy command. An authorized administrator can also do this from a workstation. Related Topics Secure Copy Protocol Concepts, on page 1342 Restrictions for Configuring the Switch for SSH The following are restrictions for configuring the switch for secure shell. · The switch supports Rivest, Shamir, and Adelman (RSA) authentication. · SSH supports only the execution-shell application. · The SSH server and the SSH client are supported only on DES (56-bit) and 3DES (168-bit) data encryption software. · The switch supports the Advanced Encryption Standard (AES) encryption algorithm with a 128-bit key, 192-bit key, or 256-bit key. However, symmetric cipher AES to encrypt the keys is not supported. · This software release does not support IP Security (IPSec). · When using SCP, you cannot enter the password into the copy command. You must enter the password when prompted. Related Topics Secure Copy Protocol Concepts, on page 1342 Information about SSH Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. SSH provides more security for remote connections than Telnet does by providing strong encryption when a device is authenticated. This software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2). SSH and Switch Access For SSH configuration examples, see the "SSH Configuration Examples" section in the "Configuring Secure Shell" section in the "Other Security Features" chapter of the Cisco IOS Security Configuration Guide, Cisco IOS Release 12.4. SSH functions the same in IPv6 as in IPv4. For IPv6, SSH supports IPv6 addresses and enables secure, encrypted connections with remote IPv6 nodes over an IPv6 transport. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1340 Security SSH Servers, Integrated Clients, and Supported Versions Note For complete syntax and usage information for the commands used in this section, see the command reference for this release and the "Secure Shell Commands" section of the "Other Security Features" chapter of the Cisco IOS Security Command Reference, Release 12.4 and the Cisco IOS IPv6 Command Reference. SSH Servers, Integrated Clients, and Supported Versions The SSH feature has an SSH server and an SSH integrated client, which are applications that run on the switch. You can use an SSH client to connect to a switch running the SSH server. The SSH server works with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works with the SSH server supported in this release and with non-Cisco SSH servers. The switch supports an SSHv1 or an SSHv2 server. The switch supports an SSHv1 client. SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES) encryption algorithm, and password-based user authentication. SSH also supports these user authentication methods: · TACACS+ · RADIUS · Local authentication and authorization Related Topics Configuring the Switch for Local Authentication and Authorization, on page 1335 TACACS+ and Switch Access, on page 1281 RADIUS and Switch Access, on page 1296 SSH Configuration Guidelines Follow these guidelines when configuring the switch as an SSH server or SSH client: · An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server, and the reverse. · If the SSH server is running on a stack master and the stack master fails, the new stack master uses the RSA key pair generated by the previous stack master. · If you get CLI error messages after entering the crypto key generate rsa global configuration command, an RSA key pair has not been generated. Reconfigure the hostname and domain, and then enter the crypto key generate rsa command. For more information, see Related Topics below. · When generating the RSA key pair, the message No host name specified might appear. If it does, you must configure a hostname by using the hostname global configuration command. · When generating the RSA key pair, the message No domain specified might appear. If it does, you must configure an IP domain name by using the ip domain-name global configuration command. · When configuring the local authentication and authorization authentication method, make sure that AAA is disabled on the console. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1341 Secure Copy Protocol Overview Security Related Topics Setting Up the Switch to Run SSH, on page 1343 Configuring the Switch for Local Authentication and Authorization, on page 1335 Secure Copy Protocol Overview The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch configurations or switch image files. SCP relies on Secure Shell (SSH), an application and a protocol that provides a secure replacement for the Berkeley r-tools. For SSH to work, the switch needs an RSA public/private key pair. This is the same with SCP, which relies on SSH for its secure transport. Because SSH also relies on AAA authentication, and SCP relies further on AAA authorization, correct configuration is necessary. · Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch. · Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman (RSA) key pair. Note When using SCP, you cannot enter the password into the copy command. You must enter the password when prompted. Secure Copy Protocol Concepts The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch configurations or switch image files. SCP relies on Secure Shell (SSH), an application and a protocol that provides a secure replacement for the Berkeley r-tools. To configure the Secure Copy feature, you should understand the SCP concepts. The behavior of SCP is similar to that of remote copy (rcp), which comes from the Berkeley r-tools suite, except that SCP relies on SSH for security. SCP also requires that authentication, authorization, and accounting (AAA) authorization be configured so the router can determine whether the user has the correct privilege level. For information about how to configure and verify SCP, see the "Secure Copy Protocol" section in the Cisco IOS Security Configuration Guide: Securing User Services, Release 12.4. Related Topics Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP), on page 1339 Restrictions for Configuring the Switch for SSH, on page 1340 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1342 Security How to Configure SSH How to Configure SSH Setting Up the Switch to Run SSH Beginning in privileged EXEC mode, follow these steps to set up your switch to run SSH: Before you begin Configure user authentication for local or remote access. This step is required. For more information, see Related Topics below. SUMMARY STEPS 1. configure terminal 2. hostname hostname 3. ip domain-name domain_name 4. crypto key generate rsa 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 hostname hostname Example: Switch(config)# hostname your_hostname Configures a hostname and IP domain name for your switch. Note Follow this procedure only if you are configuring the switch as an SSH server. Step 3 ip domain-name domain_name Example: Switch(config)# ip domain-name your_domain Configures a host domain for your switch. Step 4 crypto key generate rsa Example: Switch(config)# crypto key generate rsa Enables the SSH server for local and remote authentication on the switch and generates an RSA key pair. Generating an RSA key pair for the switch automatically enables SSH. We recommend that a minimum modulus size of 1024 bits. When you generate RSA keys, you are prompted to enter a modulus length. A longer modulus length might be more secure, but it takes longer to generate and to use. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1343 Configuring the SSH Server Security Command or Action Step 5 end Example: Switch(config)# end Purpose Note Follow this procedure only if you are configuring the switch as an SSH server. Returns to privileged EXEC mode. Related Topics SSH Configuration Guidelines, on page 1341 Configuring the Switch for Local Authentication and Authorization, on page 1335 Configuring the SSH Server Beginning in privileged EXEC mode, follow these steps to configure the SSH server: Note This procedure is only required if you are configuring the switch as an SSH server. SUMMARY STEPS 1. configure terminal 2. ip ssh version [1 | 2] 3. ip ssh {timeout seconds | authentication-retries number} 4. Use one or both of the following: · line vtyline_number[ending_line_number] · transport input ssh 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip ssh version [1 | 2] Example: Switch(config)# ip ssh version 1 (Optional) Configures the switch to run SSH Version 1 or SSH Version 2. · 1--Configure the switch to run SSH Version 1. · 2--Configure the switch to run SSH Version 2. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1344 Security Configuring the SSH Server Step 3 Step 4 Command or Action Purpose If you do not enter this command or do not specify a keyword, the SSH server selects the latest SSH version supported by the SSH client. For example, if the SSH client supports SSHv1 and SSHv2, the SSH server selects SSHv2. ip ssh {timeout seconds | authentication-retries number} Configures the SSH control parameters: Example: Switch(config)# ip ssh timeout 90 authentication-retries 2 · Specify the time-out value in seconds; the default is 120 seconds. The range is 0 to 120 seconds. This parameter applies to the SSH negotiation phase. After the connection is established, the switch uses the default time-out values of the CLI-based sessions. By default, up to five simultaneous, encrypted SSH connections for multiple CLI-based sessions over the network are available (session 0 to session 4). After the execution shell starts, the CLI-based session time-out value returns to the default of 10 minutes. · Specify the number of times that a client can re-authenticate to the server. The default is 3; the range is 0 to 5. Use one or both of the following: · line vtyline_number[ending_line_number] · transport input ssh Example: Switch(config)# line vty 1 10 or Switch(config-line)# transport input ssh Repeat this step when configuring both parameters. (Optional) Configures the virtual terminal line settings. · Enters line configuration mode to configure the virtual terminal line settings. For line_number and ending_line_number, specify a pair of lines. The range is 0 to 15. · Specifies that the switch prevent non-SSH Telnet connections. This limits the router to only SSH connections. Step 5 end Example: Switch(config-line)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1345 Monitoring the SSH Configuration and Status Security Monitoring the SSH Configuration and Status This table displays the SSH server configuration and status. Table 121: Commands for Displaying the SSH Server Configuration and Status Command Purpose show ip Shows the version and configuration information for the SSH server. ssh show ssh Shows the status of the SSH server. For more information about these commands, see the "Secure Shell Commands" section in the "Other Security Features" chapter of the Cisco IOS Security Command Reference . Additional References Related Documents Related Document Title Topic Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity Control http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html policies and Identity Service templates for Session Aware networking. Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) RADIUS, TACACS+, http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra Secure Shell, 802.1X and AAA. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1346 Security Feature Information for SSH Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for SSH Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1347 Feature Information for SSH Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1348 6 8 C H A P T E R Configuring Secure Socket Layer HTTP · Finding Feature Information, on page 1349 · Information about Secure Sockets Layer (SSL) HTTP, on page 1349 · Secure HTTP Servers and Clients Overview, on page 1352 · How to Configure Secure HTTP Servers and Clients, on page 1352 · How to Configure Secure HTTP Servers and Clients, on page 1359 · Monitoring Secure HTTP Server and Client Status, on page 1359 · Additional References, on page 1359 · Feature Information for SSL HTTP, on page 1360 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information about Secure Sockets Layer (SSL) HTTP This section describes how to configure Secure Sockets Layer (SSL) Version 3.0 support for the HTTP 1.1 server and client. SSL provides server authentication, encryption, and message integrity, as well as HTTP client authentication, to allow secure HTTP communications. Note SSL evolved into Transport Layer Security (TLS) in 1999, but is still used in this particular context. On a secure HTTP connection, data to and from an HTTP server is encrypted before being sent over the Internet. HTTP with SSL encryption provides a secure connection to allow such functions as configuring a switch from a Web browser. Cisco's implementation of the secure HTTP server and secure HTTP client uses an implementation of SSL Version 3.0 with application-layer encryption. HTTP over SSL is abbreviated as HTTPS; the URL of a secure connection begins with https:// instead of http://. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1349 Certificate Authority Trustpoints Security The primary role of the HTTP secure server (the switch) is to listen for HTTPS requests on a designated port (the default HTTPS port is 443) and pass the request to the HTTP 1.1 Web server. The HTTP 1.1 server processes requests and passes responses (pages) back to the HTTP secure server, which, in turn, responds to the original request. The primary role of the HTTP secure client (the web browser) is to respond to Cisco IOS application requests for HTTPS User Agent services, perform HTTPS User Agent services for the application, and pass the response back to the application. For configuration examples and complete syntax and usage information for the commands used in this section, see the "HTTPS - HTTP Server and Client with SSL 3.0" feature description for Cisco IOS Release 12.2(15)T. Certificate Authority Trustpoints Certificate authorities (CAs) manage certificate requests and issue certificates to participating network devices. These services provide centralized security key and certificate management for the participating devices. Specific CA servers are referred to as trustpoints. When a connection attempt is made, the HTTPS server provides a secure connection by issuing a certified X.509v3 certificate, obtained from a specified CA trustpoint, to the client. The client (usually a Web browser), in turn, has a public key that allows it to authenticate the certificate. For secure HTTP connections, we highly recommend that you configure a CA trustpoint. If a CA trustpoint is not configured for the device running the HTTPS server, the server certifies itself and generates the needed RSA key pair. Because a self-certified (self-signed) certificate does not provide adequate security, the connecting client generates a notification that the certificate is self-certified, and the user has the opportunity to accept or reject the connection. This option is useful for internal network topologies (such as testing). If you do not configure a CA trustpoint, when you enable a secure HTTP connection, either a temporary or a persistent self-signed certificate for the secure HTTP server (or client) is automatically generated. · If the switch is not configured with a hostname and a domain name, a temporary self-signed certificate is generated. If the switch reboots, any temporary self-signed certificate is lost, and a new temporary new self-signed certificate is assigned. · If the switch has been configured with a host and domain name, a persistent self-signed certificate is generated. This certificate remains active if you reboot the switch or if you disable the secure HTTP server so that it will be there the next time you re-enable a secure HTTP connection. Note The certificate authorities and trustpoints must be configured on each device individually. Copying them from other devices makes them invalid on the switch. If a self-signed certificate has been generated, this information is included in the output of the show running-config privileged EXEC command. This is a partial sample output from that command displaying a self-signed certificate. Switch# show running-config Building configuration... <output truncated> crypto pki trustpoint TP-self-signed-3080755072 enrollment selfsigned Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1350 Security CipherSuites subject-name cn=IOS-Self-Signed-Certificate-3080755072 revocation-check none rsakeypair TP-self-signed-3080755072 ! ! crypto ca certificate chain TP-self-signed-3080755072 certificate self-signed 01 3082029F 30820208 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 59312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 33303830 37353530 37323126 30240609 2A864886 F70D0109 02161743 45322D33 3535302D 31332E73 756D6D30 342D3335 3530301E 170D3933 30333031 30303030 35395A17 0D323030 31303130 30303030 305A3059 312F302D <output truncated> You can remove this self-signed certificate by disabling the secure HTTP server and entering the no crypto pki trustpoint TP-self-signed-30890755072 global configuration command. If you later re-enable a secure HTTP server, a new self-signed certificate is generated. Note The values that follow TP self-signed depend on the serial number of the device. You can use an optional command (ip http secure-client-auth) to allow the HTTPS server to request an X.509v3 certificate from the client. Authenticating the client provides more security than server authentication by itself. For additional information on Certificate Authorities, see the "Configuring Certification Authority Interoperability" chapter in the Cisco IOS Security Configuration Guide, Release 12.4. CipherSuites A CipherSuite specifies the encryption algorithm and the digest algorithm to use on a SSL connection. When connecting to the HTTPS server, the client Web browser offers a list of supported CipherSuites, and the client and server negotiate the best encryption algorithm to use from those on the list that are supported by both. For example, Netscape Communicator 4.76 supports U.S. security with RSA Public Key Cryptography, MD2, MD5, RC2-CBC, RC4, DES-CBC, and DES-EDE3-CBC. For the best possible encryption, you should use a client browser that supports 128-bit encryption, such as Microsoft Internet Explorer Version 5.5 (or later) or Netscape Communicator Version 4.76 (or later). The SSL_RSA_WITH_DES_CBC_SHA CipherSuite provides less security than the other CipherSuites, as it does not offer 128-bit encryption. The more secure and more complex CipherSuites require slightly more processing time. This list defines the CipherSuites supported by the switch and ranks them from fastest to slowest in terms of router processing load (speed): 1. SSL_RSA_WITH_DES_CBC_SHA--RSA key exchange (RSA Public Key Cryptography) with DES-CBC for message encryption and SHA for message digest 2. SSL_RSA_WITH_RC4_128_MD5--RSA key exchange with RC4 128-bit encryption and MD5 for message digest 3. SSL_RSA_WITH_RC4_128_SHA--RSA key exchange with RC4 128-bit encryption and SHA for message digest Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1351 Default SSL Configuration Security 4. SSL_RSA_WITH_3DES_EDE_CBC_SHA--RSA key exchange with 3DES and DES-EDE3-CBC for message encryption and SHA for message digest RSA (in conjunction with the specified encryption and digest algorithm combinations) is used for both key generation and authentication on SSL connections. This usage is independent of whether or not a CA trustpoint is configured. Default SSL Configuration The standard HTTP server is enabled. SSL is enabled. No CA trustpoints are configured. No self-signed certificates are generated. SSL Configuration Guidelines When SSL is used in a switch cluster, the SSL session terminates at the cluster commander. Cluster member switches must run standard HTTP. Before you configure a CA trustpoint, you should ensure that the system clock is set. If the clock is not set, the certificate is rejected due to an incorrect date. In a switch stack, the SSL session terminates at the stack master. Secure HTTP Servers and Clients Overview On a secure HTTP connection, data to and from an HTTP server is encrypted before being sent over the Internet. HTTP with SSL encryption provides a secure connection to allow such functions as configuring a switch from a Web browser. Cisco's implementation of the secure HTTP server and secure HTTP client uses an implementation of SSL Version 3.0 with application-layer encryption. HTTP over SSL is abbreviated as HTTPS; the URL of a secure connection begins with https:// instead of http://. The primary role of the HTTP secure server (the switch) is to listen for HTTPS requests on a designated port (the default HTTPS port is 443) and pass the request to the HTTP 1.1 Web server. The HTTP 1.1 server processes requests and passes responses (pages) back to the HTTP secure server, which, in turn, responds to the original request. The primary role of the HTTP secure client (the web browser) is to respond to Cisco IOS application requests for HTTPS User Agent services, perform HTTPS User Agent services for the application, and pass the response back to the application. How to Configure Secure HTTP Servers and Clients Configuring a CA Trustpoint For secure HTTP connections, we recommend that you configure an official CA trustpoint. A CA trustpoint is more secure than a self-signed certificate. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1352 Security Configuring a CA Trustpoint Beginning in privileged EXEC mode, follow these steps to configure a CA Trustpoint: SUMMARY STEPS 1. configure terminal 2. hostname hostname 3. ip domain-name domain-name 4. crypto key generate rsa 5. crypto ca trustpoint name 6. enrollment url url 7. enrollment http-proxy host-name port-number 8. crl query url 9. primary name 10. exit 11. crypto ca authentication name 12. crypto ca enroll name 13. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 hostname hostname Example: Switch(config)# hostname your_hostname Specifies the hostname of the switch (required only if you have not previously configured a hostname). The hostname is required for security keys and certificates. Step 3 ip domain-name domain-name Example: Switch(config)# ip domain-name your_domain Specifies the IP domain name of the switch (required only if you have not previously configured an IP domain name). The domain name is required for security keys and certificates. Step 4 crypto key generate rsa Example: Switch(config)# crypto key generate rsa (Optional) Generates an RSA key pair. RSA key pairs are required before you can obtain a certificate for the switch. RSA key pairs are generated automatically. You can use this command to regenerate the keys, if needed. Step 5 crypto ca trustpoint name Example: Specifies a local configuration name for the CA trustpoint and enter CA trustpoint configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1353 Configuring a CA Trustpoint Security Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action Switch(config)# crypto ca trustpoint your_trustpoint Purpose enrollment url url Example: Switch(ca-trustpoint)# enrollment url http://your_server:80 Specifies the URL to which the switch should send certificate requests. enrollment http-proxy host-name port-number Example: Switch(ca-trustpoint)# enrollment http-proxy your_host 49 (Optional) Configures the switch to obtain certificates from the CA through an HTTP proxy server. · For host-name , specify the proxy server used to get the CA. · For port-number, specify the port number used to access the CA. crl query url Example: Switch(ca-trustpoint)# crl query ldap://your_host:49 Configures the switch to request a certificate revocation list (CRL) to ensure that the certificate of the peer has not been revoked. primary name Example: Switch(ca-trustpoint)# primary your_trustpoint (Optional) Specifies that the trustpoint should be used as the primary (default) trustpoint for CA requests. · For name, specify the trustpoint that you just configured. exit Example: Switch(ca-trustpoint)# exit Exits CA trustpoint configuration mode and return to global configuration mode. crypto ca authentication name Example: Switch(config)# crypto ca authentication your_trustpoint Authenticates the CA by getting the public key of the CA. Use the same name used in Step 5. crypto ca enroll name Example: Obtains the certificate from the specified CA trustpoint. This command requests a signed certificate for each RSA key pair. Switch(config)# crypto ca enroll your_trustpoint Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1354 Security Configuring the Secure HTTP Server Step 13 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Configuring the Secure HTTP Server Beginning in privileged EXEC mode, follow these steps to configure a secure HTTP server: Before you begin If you are using a certificate authority for certification, you should use the previous procedure to configure the CA trustpoint on the switch before enabling the HTTP server. If you have not configured a CA trustpoint, a self-signed certificate is generated the first time that you enable the secure HTTP server. After you have configured the server, you can configure options (path, access list to apply, maximum number of connections, or timeout policy) that apply to both standard and secure HTTP servers. To verify the secure HTTP connection by using a Web browser, enter https://URL, where the URL is the IP address or hostname of the server switch. If you configure a port other than the default port, you must also specify the port number after the URL. For example: https://209.165.129:1026 or https://host.domain.com:1026 SUMMARY STEPS 1. show ip http server status 2. configure terminal 3. ip http secure-server 4. ip http secure-port port-number 5. ip http secure-ciphersuite {[3des-ede-cbc-sha] [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]} 6. ip http secure-client-auth 7. ip http secure-trustpoint name 8. ip http path path-name 9. ip http access-class access-list-number 10. ip http max-connections value 11. ip http timeout-policy idle seconds life seconds requests value 12. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1355 Configuring the Secure HTTP Server Security DETAILED STEPS Step 1 Command or Action show ip http server status Example: Switch# show ip http server status Step 2 Step 3 Step 4 Step 5 Step 6 configure terminal Example: Switch# configure terminal ip http secure-server Example: Switch(config)# ip http secure-server ip http secure-port port-number Example: Switch(config)# ip http secure-port 443 ip http secure-ciphersuite {[3des-ede-cbc-sha] [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]} Example: Switch(config)# ip http secure-ciphersuite rc4-128-md5 ip http secure-client-auth Example: Switch(config)# ip http secure-client-auth Purpose (Optional) Displays the status of the HTTP server to determine if the secure HTTP server feature is supported in the software. You should see one of these lines in the output: HTTP secure server capability: Present or HTTP secure server capability: Not present Enters global configuration mode. Enables the HTTPS server if it has been disabled. The HTTPS server is enabled by default. (Optional) Specifies the port number to be used for the HTTPS server. The default port number is 443. Valid options are 443 or any number in the range 1025 to 65535. (Optional) Specifies the CipherSuites (encryption algorithms) to be used for encryption over the HTTPS connection. If you do not have a reason to specify a particularly CipherSuite, you should allow the server and client to negotiate a CipherSuite that they both support. This is the default. (Optional) Configures the HTTP server to request an X.509v3 certificate from the client for authentication during the connection process. The default is for the client to request a certificate from the server, but the server does not attempt to authenticate the client. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1356 Security Configuring the Secure HTTP Server Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action ip http secure-trustpoint name Example: Switch(config)# ip http secure-trustpoint your_trustpoint ip http path path-name Example: Switch(config)# ip http path /your_server:80 Purpose Specifies the CA trustpoint to use to get an X.509v3 security certificate and to authenticate the client certificate connection. Note Use of this command assumes you have already configured a CA trustpoint according to the previous procedure. (Optional) Sets a base HTTP path for HTML files. The path specifies the location of the HTTP server files on the local system (usually located in system flash memory). ip http access-class access-list-number Example: Switch(config)# ip http access-class 2 (Optional) Specifies an access list to use to allow access to the HTTP server. ip http max-connections value Example: Switch(config)# ip http max-connections 4 (Optional) Sets the maximum number of concurrent connections that are allowed to the HTTP server. The range is 1 to 16; the default value is 5. ip http timeout-policy idle seconds life seconds requests (Optional) Specifies how long a connection to the HTTP value server can remain open under the defined circumstances: Example: Switch(config)# ip http timeout-policy idle 120 life 240 requests 1 · idle--the maximum time period when no data is received or response data cannot be sent. The range is 1 to 600 seconds. The default is 180 seconds (3 minutes). · life--the maximum time period from the time that the connection is established. The range is 1 to 86400 seconds (24 hours). The default is 180 seconds. · requests--the maximum number of requests processed on a persistent connection. The maximum value is 86400. The default is 1. end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1357 Configuring the Secure HTTP Client Security Configuring the Secure HTTP Client Beginning in privileged EXEC mode, follow these steps to configure a secure HTTP client: Before you begin The standard HTTP client and secure HTTP client are always enabled. A certificate authority is required for secure HTTP client certification. This procedure assumes that you have previously configured a CA trustpoint on the switch. If a CA trustpoint is not configured and the remote HTTPS server requires client authentication, connections to the secure HTTP client fail. SUMMARY STEPS 1. configure terminal 2. ip http client secure-trustpoint name 3. ip http client secure-ciphersuite {[3des-ede-cbc-sha] [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]} 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 ip http client secure-trustpoint name Example: Switch(config)# ip http client secure-trustpoint your_trustpoint (Optional) Specifies the CA trustpoint to be used if the remote HTTP server requests client authentication. Using this command assumes that you have already configured a CA trustpoint by using the previous procedure. The command is optional if client authentication is not needed or if a primary trustpoint has been configured. ip http client secure-ciphersuite {[3des-ede-cbc-sha] (Optional) Specifies the CipherSuites (encryption [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]} algorithms) to be used for encryption over the HTTPS Example: connection. If you do not have a reason to specify a particular CipherSuite, you should allow the server and client to negotiate a CipherSuite that they both support. This Switch(config)# rc4-128-md5 ip http client secure-ciphersuite is the default. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1358 Security How to Configure Secure HTTP Servers and Clients How to Configure Secure HTTP Servers and Clients These sections contain this configuration information: Monitoring Secure HTTP Server and Client Status To monitor the SSL secure server and client status, use the privileged EXEC commands in the following table. Table 122: Commands for Displaying the SSL Secure Server and Client Status Command Purpose show ip http client secure status Shows the HTTP secure client configuration. show ip http server secure status Shows the HTTP secure server configuration. show running-config Shows the generated self-signed certificate for secure HTTP connections. Additional References Related Documents Related Document Title Topic Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity Control http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.htm policies and Identity Service templates for Session Aware networking. Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switch RADIUS, TACACS+, http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-l Secure Shell, 802.1X and AAA. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1359 Feature Information for SSL HTTP Security Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for SSL HTTP Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1360 6 9 C H A P T E R Configuring IPv4 ACLs · Finding Feature Information, on page 1361 · Prerequisites for Configuring Network Security with ACLs, on page 1361 · Restrictions for Configuring Network Security with ACLs, on page 1361 · Information about Network Security with ACLs, on page 1363 · How to Configure ACLs, on page 1376 · Monitoring IPv4 ACLs, on page 1396 · Configuration Examples for ACLs, on page 1397 · Additional References, on page 1412 · Feature Information for ACLs, on page 1412 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring Network Security with ACLs This section lists the prerequisites for configuring network security with Access Control Lists (ACLs). · On switches running the LAN base feature set, VLAN maps are not supported. Restrictions for Configuring Network Security with ACLs General Network Security The following are restrictions for configuring network security with ACLs: · You cannot apply named MAC extended ACLs to Layer 3 interfaces. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1361 Restrictions for Configuring Network Security with ACLs Security · Though visible in the command-line help strings, appletalk is not supported as a matching condition for the deny and permit MAC access-list configuration mode commands. ACL Filtering The following are restrictions on ACL filtering: · If IEEE 802.1Q tunneling is configured on an interface, any IEEE 802.1Q encapsulated IP packets received on the tunnel port can be filtered by MAC ACLs, but not by IP ACLs. This is because the switch does not recognize the protocol inside the IEEE 802.1Q header. This restriction applies to router ACLs, port ACLs, and VLAN maps. IPv4 ACL Network Interfaces The following restrictions apply to IPv4 ACLs to network interfaces: · When controlling access to an interface, you can use a named or numbered ACL. · If you apply an ACL to a Layer 2 interface that is a member of a VLAN, the Layer 2 (port) ACL takes precedence over an input Layer 3 ACL applied to the VLAN interface or a VLAN map applied to the VLAN. · If you apply an ACL to a Layer 3 interface and routing is not enabled on the switch, the ACL only filters packets that are intended for the CPU, such as SNMP, Telnet, or web traffic. · You do not have to enable routing to apply ACLs to Layer 2 interfaces. · When private VLANs are configured, you can apply router ACLs only on the primary-VLAN SVIs. The ACL is applied to both primary and secondary VLAN Layer 3 traffic. Note By default, the router sends Internet Control Message Protocol (ICMP) unreachable messages when a packet is denied by an access group on a Layer 3 interface. These access-group denied packets are not dropped in hardware but are bridged to the switch CPU so that it can generate the ICMP-unreachable message. They do not generate ICMP unreachable messages. ICMP unreachable messages can be disabled on router ACLs with the no ip unreachables interface command. MAC ACLs on a Layer 2 Interface After you create a MAC ACL, you can apply it to a Layer 2 interface to filter non-IP traffic coming in that interface. When you apply the MAC ACL, consider these guidelines: · If you apply an ACL to a Layer 2 interface that is a member of a VLAN, the Layer 2 (port) ACL takes precedence over an input Layer 3 ACL applied to the VLAN interface or a VLAN map applied to the VLAN. Incoming packets received on the Layer 2 port are always filtered by the port ACL. · You can apply no more than one IP access list and one MAC access list to the same Layer 2 interface. The IP access list filters only IP packets, and the MAC access list filters non-IP packets. · A Layer 2 interface can have only one MAC access list. If you apply a MAC access list to a Layer 2 interface that has a MAC ACL configured, the new ACL replaces the previously configured one. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1362 Security Information about Network Security with ACLs Note The mac access-group interface configuration command is only valid when applied to a physical Layer 2 interface. You cannot use the command on EtherChannel port channels. Related Topics Applying an IPv4 ACL to an Interface, on page 1386 IPv4 ACL Interface Considerations, on page 1375 Creating Named MAC Extended ACLs, on page 1388 Applying a MAC ACL to a Layer 2 Interface, on page 1389 Information about Network Security with ACLs This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists. Cisco TrustSec and ACLs Catalyst 3850 switches running the IP base or IP services feature set also support Cisco TrustSec Security Group Tag (SCT) Exchange Protocol (SXP). This feature supports security group access control lists (SGACLs), which define ACL policies for a group of devices instead of an IP address. The SXP control protocol allows tagging packets with SCTs without a hardware upgrade, and runs between access layer devices at the Cisco TrustSec domain edge and distribution layer devices within the Cisco TrustSec domain. Catalyst 3850 switches operate as access layer switches in the Cisco TrustSec network. The sections on SXP define the capabilities supported on the Catalyst 3850 switches. ACL Overview Packet filtering can help limit network traffic and restrict network use by certain users or devices. ACLs filter traffic as it passes through a router or switch and permit or deny packets crossing specified interfaces or VLANs. An ACL is a sequential collection of permit and deny conditions that apply to packets. When a packet is received on an interface, the switch compares the fields in the packet against any applied ACLs to verify that the packet has the required permissions to be forwarded, based on the criteria specified in the access lists. One by one, it tests packets against the conditions in an access list. The first match decides whether the switch accepts or rejects the packets. Because the switch stops testing after the first match, the order of conditions in the list is critical. If no conditions match, the switch rejects the packet. If there are no restrictions, the switch forwards the packet; otherwise, the switch drops the packet. The switch can use ACLs on all packets it forwards, including packets bridged within a VLAN. You configure access lists on a router or Layer 3 switch to provide basic security for your network. If you do not configure ACLs, all packets passing through the switch could be allowed onto all parts of the network. You can use ACLs to control which hosts can access different parts of a network or to decide which types of traffic are forwarded or blocked at router interfaces. For example, you can allow e-mail traffic to be forwarded but not Telnet traffic. ACLs can be configured to block inbound traffic, outbound traffic, or both. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1363 Access Control Entries Security Access Control Entries An ACL contains an ordered list of access control entries (ACEs). Each ACE specifies permit or deny and a set of conditions the packet must satisfy in order to match the ACE. The meaning of permit or deny depends on the context in which the ACL is used. ACL Supported Types The switch supports IP ACLs and Ethernet (MAC) ACLs: · IP ACLs filter IPv4 traffic, including TCP, User Datagram Protocol (UDP), Internet Group Management Protocol (IGMP), and Internet Control Message Protocol (ICMP). · Ethernet ACLs filter non-IP traffic. This switch also supports quality of service (QoS) classification ACLs. Supported ACLs The switch supports three types of ACLs to filter traffic: · Port ACLs access-control traffic entering a Layer 2 interface. You can apply only one IP access list and one MAC access list to a Layer 2 interface. · Router ACLs access-control routed traffic between VLANs and are applied to Layer 3 interfaces in a specific direction (inbound or outbound). · VLAN ACLs or VLAN maps access-control all packets (bridged and routed). You can use VLAN maps to filter traffic between devices in the same VLAN. VLAN maps are configured to provide access control based on Layer 3 addresses for IPv4. Unsupported protocols are access-controlled through MAC addresses using Ethernet ACEs. After a VLAN map is applied to a VLAN, all packets (routed or bridged) entering the VLAN are checked against the VLAN map. Packets can either enter the VLAN through a switch port or through a routed port after being routed. ACL Precedence When Port ACLs, router ACLs, and VLAN maps are configured on the same switch, the filtering precedence, from greatest to least, is port ACL, router ACL, then VLAN map. The following examples describe simple use cases: · When both an input port ACL and a VLAN map are applied, incoming packets received on ports with a port ACL applied are filtered by the port ACL. Other packets are filtered by the VLAN map · When an input router ACL and input port ACL exist in a switch virtual interface (SVI), incoming packets received on ports to which a port ACL is applied are filtered by the port ACL. Incoming routed IP packets received on other ports are filtered by the router ACL. Other packets are not filtered. · When an output router ACL and input port ACL exist in an SVI, incoming packets received on the ports to which a port ACL is applied are filtered by the port ACL. Outgoing routed IP packets are filtered by the router ACL. Other packets are not filtered. · When a VLAN map, input router ACL, and input port ACL exist in an SVI, incoming packets received on the ports to which a port ACL is applied are only filtered by the port ACL. Incoming routed IP packets Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1364 Security Port ACLs Port ACLs received on other ports are filtered by both the VLAN map and the router ACL. Other packets are filtered only by the VLAN map. · When a VLAN map, output router ACL, and input port ACL exist in an SVI, incoming packets received on the ports to which a port ACL is applied are only filtered by the port ACL. Outgoing routed IP packets are filtered by both the VLAN map and the router ACL. Other packets are filtered only by the VLAN map. Related Topics Restrictions for Configuring Network Security with ACLs, on page 1361 Port ACLs are ACLs that are applied to Layer 2 interfaces on a switch. Port ACLs are supported only on physical interfaces and not on EtherChannel interfaces. Port ACLs can be applied on outbound and inbound interfaces. The following access lists are supported: · Standard IP access lists using source addresses · Extended IP access lists using source and destination addresses and optional protocol type information · MAC extended access lists using source and destination MAC addresses and optional protocol type information The switch examines ACLs on an interface and permits or denies packet forwarding based on how the packet matches the entries in the ACL. In this way, ACLs control access to a network or to part of a network. Figure 72: Using ACLs to Control Traffic in a Network This is an example of using port ACLs to control access to a network when all workstations are in the same VLAN. ACLs applied at the Layer 2 input would allow Host A to access the Human Resources network, but prevent Host B from accessing the same network. Port ACLs can only be applied to Layer 2 interfaces in the inbound direction. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1365 Router ACLs Security When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port. When you apply a port ACL to a port with voice VLAN, the ACL filters traffic on both data and voice VLANs. With port ACLs, you can filter IP traffic by using IP access lists and non-IP traffic by using MAC addresses. You can filter both IP and non-IP traffic on the same Layer 2 interface by applying both an IP access list and a MAC access list to the interface. Note You cannot apply more than one IP access list and one MAC access list to a Layer 2 interface. If an IP access list or MAC access list is already configured on a Layer 2 interface and you apply a new IP access list or MAC access list to the interface, the new ACL replaces the previously configured one. Router ACLs VLAN Maps You can apply router ACLs on switch virtual interfaces (SVIs), which are Layer 3 interfaces to VLANs; on physical Layer 3 interfaces; and on Layer 3 EtherChannel interfaces. You apply router ACLs on interfaces for specific directions (inbound or outbound). You can apply one router ACL in each direction on an interface. The switch supports these access lists for IPv4 traffic: · Standard IP access lists use source addresses for matching operations. · Extended IP access lists use source and destination addresses and optional protocol type information for matching operations. As with port ACLs, the switch examines ACLs associated with features configured on a given interface. As packets enter the switch on an interface, ACLs associated with all inbound features configured on that interface are examined. After packets are routed and before they are forwarded to the next hop, all ACLs associated with outbound features configured on the egress interface are examined. ACLs permit or deny packet forwarding based on how the packet matches the entries in the ACL, and can be used to control access to a network or to part of a network. Use VLAN ACLs or VLAN maps to access-control all traffic. You can apply VLAN maps to all packets that are routed into or out of a VLAN or are bridged within a VLAN in the switch or switch stack. Use VLAN maps for security packet filtering. VLAN maps are not defined by direction (input or output). You can configure VLAN maps to match Layer 3 addresses for IPv4 traffic. All non-IP protocols are access-controlled through MAC addresses and Ethertype using MAC VLAN maps. (IP traffic is not access controlled by MAC VLAN maps.) You can enforce VLAN maps only on packets going through the switch; you cannot enforce VLAN maps on traffic between hosts on a hub or on another switch connected to this switch. With VLAN maps, forwarding of packets is permitted or denied, based on the action specified in the map. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1366 Security ACEs and Fragmented and Unfragmented Traffic Figure 73: Using VLAN Maps to Control Traffic This shows how a VLAN map is applied to prevent a specific type of traffic from Host A in VLAN 10 from being forwarded. You can apply only one VLAN map to a VLAN. ACEs and Fragmented and Unfragmented Traffic IP packets can be fragmented as they cross the network. When this happens, only the fragment containing the beginning of the packet contains the Layer 4 information, such as TCP or UDP port numbers, ICMP type and code, and so on. All other fragments are missing this information. Some access control entries (ACEs) do not check Layer 4 information and therefore can be applied to all packet fragments. ACEs that do test Layer 4 information cannot be applied in the standard manner to most of the fragments in a fragmented IP packet. When the fragment contains no Layer 4 information and the ACE tests some Layer 4 information, the matching rules are modified: · Permit ACEs that check the Layer 3 information in the fragment (including protocol type, such as TCP, UDP, and so on) are considered to match the fragment regardless of what the missing Layer 4 information might have been. · Deny ACEs that check Layer 4 information never match a fragment unless the fragment contains Layer 4 information. Example: ACEs and Fragmented and Unfragmented Traffic Consider access list 102, configured with these commands, applied to three fragmented packets: Switch(config)# access-list 102 permit tcp any host 10.1.1.1 eq smtp Switch(config)# access-list 102 deny tcp any host 10.1.1.2 eq telnet Switch(config)# access-list 102 permit tcp any host 10.1.1.2 Switch(config)# access-list 102 deny tcp any any Note In the first and second ACEs in the examples, the eq keyword after the destination address means to test for the TCP-destination-port well-known numbers equaling Simple Mail Transfer Protocol (SMTP) and Telnet, respectively. · Packet A is a TCP packet from host 10.2.2.2., port 65000, going to host 10.1.1.1 on the SMTP port. If this packet is fragmented, the first fragment matches the first ACE (a permit) as if it were a complete packet because all Layer 4 information is present. The remaining fragments also match the first ACE, even though they do not contain the SMTP port information, because the first ACE only checks Layer Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1367 ACLs and Switch Stacks Security 3 information when applied to fragments. The information in this example is that the packet is TCP and that the destination is 10.1.1.1. · Packet B is from host 10.2.2.2, port 65001, going to host 10.1.1.2 on the Telnet port. If this packet is fragmented, the first fragment matches the second ACE (a deny) because all Layer 3 and Layer 4 information is present. The remaining fragments in the packet do not match the second ACE because they are missing Layer 4 information. Instead, they match the third ACE (a permit). Because the first fragment was denied, host 10.1.1.2 cannot reassemble a complete packet, so packet B is effectively denied. However, the later fragments that are permitted will consume bandwidth on the network and resources of host 10.1.1.2 as it tries to reassemble the packet. · Fragmented packet C is from host 10.2.2.2, port 65001, going to host 10.1.1.3, port ftp. If this packet is fragmented, the first fragment matches the fourth ACE (a deny). All other fragments also match the fourth ACE because that ACE does not check any Layer 4 information and because Layer 3 information in all fragments shows that they are being sent to host 10.1.1.3, and the earlier permit ACEs were checking different hosts. ACLs and Switch Stacks ACL support is the same for a switch stack as for a standalone switch. ACL configuration information is propagated to all switches in the stack. All switches in the stack, including the active switch, process the information and program their hardware. Active Switch and ACL Functions The active switch performs these ACL functions: · It processes the ACL configuration and propagates the information to all stack members. · It distributes the ACL information to any switch that joins the stack. · If packets must be forwarded by software for any reason (for example, not enough hardware resources), the active switch forwards the packets only after applying ACLs on the packets. · It programs its hardware with the ACL information it processes. Stack Member and ACL Functions Stack members perform these ACL functions: · They receive the ACL information from the active switch and program their hardware. · A stack member configured as a standby switch, performs the functions of the active switch in the event the active switch fails. Active Switch Failure and ACLs Both the active and standby switches have the ACL information. When the active switch fails, the standby takes over. The new active switch distributes the ACL information to all stack members. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1368 Security Standard and Extended IPv4 ACLs Standard and Extended IPv4 ACLs This section describes IP ACLs. An ACL is a sequential collection of permit and deny conditions. One by one, the switch tests packets against the conditions in an access list. The first match determines whether the switch accepts or rejects the packet. Because the switch stops testing after the first match, the order of the conditions is critical. If no conditions match, the switch denies the packet. The software supports these types of ACLs or access lists for IPv4: · Standard IP access lists use source addresses for matching operations. · Extended IP access lists use source and destination addresses for matching operations and optional protocol-type information for finer granularity of control. IPv4 ACL Switch Unsupported Features Configuring IPv4 ACLs on the switch is the same as configuring IPv4 ACLs on other Cisco switches and routers. The switch does not support these Cisco IOS router ACL-related features: · Non-IP protocol ACLs · IP accounting · Reflexive ACLs and dynamic ACLs are not supported. · ACL logging for port ACLs and VLAN maps Access List Numbers The number you use to denote your ACL shows the type of access list that you are creating. This lists the access-list number and corresponding access list type and shows whether or not they are supported in the switch. The switch supports IPv4 standard and extended access lists, numbers 1 to 199 and 1300 to 2699. Table 123: Access List Numbers Access List Number 199 100199 200299 300399 400499 500599 600699 Type IP standard access list IP extended access list Protocol type-code access list DECnet access list XNS standard access list XNS extended access list AppleTalk access list Supported Yes Yes No No No No No Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1369 Numbered Standard IPv4 ACLs Security Access List Number 700799 800899 900999 10001099 11001199 12001299 13001999 20002699 Type Supported 48-bit MAC address access list No IPX standard access list No IPX extended access list No IPX SAP access list No Extended 48-bit MAC address No access list IPX summary address access list No IP standard access list (expanded Yes range) IP extended access list (expanded Yes range) In addition to numbered standard and extended ACLs, you can also create standard and extended named IP ACLs by using the supported numbers. That is, the name of a standard IP ACL can be 1 to 99; the name of an extended IP ACL can be 100 to 199. The advantage of using named ACLs instead of numbered lists is that you can delete individual entries from a named list. Numbered Standard IPv4 ACLs When creating an ACL, remember that, by default, the end of the ACL contains an implicit deny statement for all packets that it did not find a match for before reaching the end. With standard access lists, if you omit the mask from an associated IP host address ACL specification, 0.0.0.0 is assumed to be the mask. The switch always rewrites the order of standard access lists so that entries with host matches and entries with matches having a don't care mask of 0.0.0.0 are moved to the top of the list, above any entries with non-zero don't care masks. Therefore, in show command output and in the configuration file, the ACEs do not necessarily appear in the order in which they were entered. After creating a numbered standard IPv4 ACL, you can apply it to terminal lines, to interfaces, or to VLANs. Numbered Extended IPv4 ACLs Although standard ACLs use only source addresses for matching, you can use extended ACL source and destination addresses for matching operations and optional protocol type information for finer granularity of control. When you are creating ACEs in numbered extended access lists, remember that after you create the ACL, any additions are placed at the end of the list. You cannot reorder the list or selectively add or remove ACEs from a numbered list. The switch does not support dynamic or reflexive access lists. It also does not support filtering based on the type of service (ToS) minimize-monetary-cost bit. Some protocols also have specific parameters and keywords that apply to that protocol. You can define an extended TCP, UDP, ICMP, IGMP, or other IP ACL. The switch also supports these IP protocols: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1370 Security Named IPv4 ACLs Note ICMP echo-reply cannot be filtered. All other ICMP codes or types can be filtered. These IP protocols are supported: · Authentication Header Protocol (ahp) · Encapsulation Security Payload (esp) · Enhanced Interior Gateway Routing Protocol (eigrp) · generic routing encapsulation (gre) · Internet Control Message Protocol (icmp) · Internet Group Management Protocol (igmp) · any Interior Protocol (ip) · IP in IP tunneling (ipinip) · KA9Q NOS-compatible IP over IP tunneling (nos) · Open Shortest Path First routing (ospf) · Payload Compression Protocol (pcp) · Protocol-Independent Multicast (pim) · Transmission Control Protocol (tcp) · User Datagram Protocol (udp) Named IPv4 ACLs You can identify IPv4 ACLs with an alphanumeric string (a name) rather than a number. You can use named ACLs to configure more IPv4 access lists in a router than if you were to use numbered access lists. If you identify your access list with a name rather than a number, the mode and command syntax are slightly different. However, not all commands that use IP access lists accept a named access list. Note The name you give to a standard or extended ACL can also be a number in the supported range of access list numbers. That is, the name of a standard IP ACL can be 1 to 99. The advantage of using named ACLs instead of numbered lists is that you can delete individual entries from a named list. Consider these guidelines and limitations before configuring named ACLs: · Not all commands that accept a numbered ACL accept a named ACL. ACLs for packet filters and route filters on interfaces can use a name. VLAN maps also accept a name. · A standard ACL and an extended ACL cannot have the same name. · Numbered ACLs are also available. · You can use standard or extended ACLs (named or numbered) in VLAN maps. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1371 ACL Logging Security · With IPv4 QoS ACLs, if you enter the class-map {match-all | match-any} class-map-name global configuration command, you can enter these match commands: · match access-group acl-name Note The ACL must be an extended named ACL. · match input-interface interface-id-list · match ip dscp dscp-list · match ip precedence ip-precedence-list You cannot enter the match access-group acl-index command. ACL Logging The switch software can provide logging messages about packets permitted or denied by a standard IP access list. That is, any packet that matches the ACL causes an informational logging message about the packet to be sent to the console. The level of messages logged to the console is controlled by the logging console commands controlling the syslog messages. Note Because routing is done in hardware and logging is done in software, if a large number of packets match a permit or deny ACE containing a log keyword, the software might not be able to match the hardware processing rate, and not all packets will be logged. The first packet that triggers the ACL causes a logging message right away, and subsequent packets are collected over 5-minute intervals before they appear or logged. The logging message includes the access list number, whether the packet was permitted or denied, the source IP address of the packet, and the number of packets from that source permitted or denied in the prior 5-minute interval. Smart Logging When smart logging is enabled on the switch and an ACL configured with smart logging is attached to a Layer 2 interface (port ACL), the contents of packets denied or permitted because of the ACL are also sent to a specified NetFlow collector. Hardware and Software Treatment of IP ACLs ACL processing is performed in hardware. If the hardware reaches its capacity to store ACL configurations, all packets on that interface are dropped. Note If an ACL configuration cannot be implemented in hardware due to an out-of-resource condition on a switch or stack member, then only the traffic in that VLAN arriving on that switch is affected. For router ACLs, other factors can cause packets to be sent to the CPU: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1372 Security VLAN Map Configuration Guidelines · Using the log keyword · Generating ICMP unreachable messages When traffic flows are both logged and forwarded, forwarding is done by hardware, but logging must be done by software. Because of the difference in packet handling capacity between hardware and software, if the sum of all flows being logged (both permitted flows and denied flows) is of great enough bandwidth, not all of the packets that are forwarded can be logged. When you enter the show ip access-lists privileged EXEC command, the match count displayed does not account for packets that are access controlled in hardware. Use the show platform acl counters hardware privileged EXEC command to obtain some basic hardware ACL statistics for switched and routed packets. Router ACLs function as follows: · The hardware controls permit and deny actions of standard and extended ACLs (input and output) for security access control. · If log has not been specified, the flows that match a deny statement in a security ACL are dropped by the hardware if ip unreachables is disabled. The flows matching a permit statement are switched in hardware. · Adding the log keyword to an ACE in a router ACL causes a copy of the packet to be sent to the CPU for logging only. If the ACE is a permit statement, the packet is still switched and routed in hardware. VLAN Map Configuration Guidelines VLAN maps are the only way to control filtering within a VLAN. VLAN maps have no direction. To filter traffic in a specific direction by using a VLAN map, you need to include an ACL with specific source or destination addresses. If there is a match clause for that type of packet (IP or MAC) in the VLAN map, the default action is to drop the packet if the packet does not match any of the entries within the map. If there is no match clause for that type of packet, the default is to forward the packet. The following are the VLAN map configuration guidelines: · If there is no ACL configured to deny traffic on an interface and no VLAN map is configured, all traffic is permitted. · Each VLAN map consists of a series of entries. The order of entries in an VLAN map is important. A packet that comes into the switch is tested against the first entry in the VLAN map. If it matches, the action specified for that part of the VLAN map is taken. If there is no match, the packet is tested against the next entry in the map. · If the VLAN map has at least one match clause for the type of packet (IP or MAC) and the packet does not match any of these match clauses, the default is to drop the packet. If there is no match clause for that type of packet in the VLAN map, the default is to forward the packet. · Logging is not supported for VLAN maps. · When a switch has an IP access list or MAC access list applied to a Layer 2 interface, and you apply a VLAN map to a VLAN that the port belongs to, the port ACL takes precedence over the VLAN map. · If a VLAN map configuration cannot be applied in hardware, all packets in that VLAN are dropped. · You can configure VLAN maps on primary and secondary VLANs. However, we recommend that you configure the same VLAN maps on private-VLAN primary and secondary VLANs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1373 VLAN Maps with Router ACLs Security · When a frame is Layer-2 forwarded within a private VLAN, the same VLAN map is applied at the ingress side and at the egress side. When a frame is routed from inside a private VLAN to an external port, the private-VLAN map is applied at the ingress side. · For frames going upstream from a host port to a promiscuous port, the VLAN map configured on the secondary VLAN is applied. · For frames going downstream from a promiscuous port to a host port, the VLAN map configured on the primary VLAN is applied. To filter out specific IP traffic for a private VLAN, you should apply the VLAN map to both the primary and secondary VLANs. VLAN Maps with Router ACLs To access control both bridged and routed traffic, you can use VLAN maps only or a combination of router ACLs and VLAN maps. You can define router ACLs on both input and output routed VLAN interfaces, and you can define a VLAN map to access control the bridged traffic. If a packet flow matches a VLAN-map deny clause in the ACL, regardless of the router ACL configuration, the packet flow is denied. Note When you use router ACLs with VLAN maps, packets that require logging on the router ACLs are not logged if they are denied by a VLAN map. If the VLAN map has a match clause for the type of packet (IP or MAC) and the packet does not match the type, the default is to drop the packet. If there is no match clause in the VLAN map, and no action specified, the packet is forwarded if it does not match any VLAN map entry. VLAN Maps and Router ACL Configuration Guidelines These guidelines are for configurations where you need to have an router ACL and a VLAN map on the same VLAN. These guidelines do not apply to configurations where you are mapping router ACLs and VLAN maps on different VLANs. If you must configure a router ACL and a VLAN map on the same VLAN, use these guidelines for both router ACL and VLAN map configuration: · You can configure only one VLAN map and one router ACL in each direction (input/output) on a VLAN interface. · Whenever possible, try to write the ACL with all entries having a single action except for the final, default action of the other type. That is, write the ACL using one of these two forms: permit... permit... permit... deny ip any any or deny... deny... deny... permit ip any any · To define multiple actions in an ACL (permit, deny), group each action type together to reduce the number of entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1374 Security Time Ranges for ACLs · Avoid including Layer 4 information in an ACL; adding this information complicates the merging process. The best merge results are obtained if the ACLs are filtered based on IP addresses (source and destination) and not on the full flow (source IP address, destination IP address, protocol, and protocol ports). It is also helpful to use don't care bits in the IP address, whenever possible. If you need to specify the full-flow mode and the ACL contains both IP ACEs and TCP/UDP/ICMP ACEs with Layer 4 information, put the Layer 4 ACEs at the end of the list. This gives priority to the filtering of traffic based on IP addresses. Time Ranges for ACLs You can selectively apply extended ACLs based on the time of day and the week by using the time-range global configuration command. First, define a time-range name and set the times and the dates or the days of the week in the time range. Then enter the time-range name when applying an ACL to set restrictions to the access list. You can use the time range to define when the permit or deny statements in the ACL are in effect, for example, during a specified time period or on specified days of the week. The time-range keyword and argument are referenced in the named and numbered extended ACL task tables. These are some benefits of using time ranges: · You have more control over permitting or denying a user access to resources, such as an application (identified by an IP address/mask pair and a port number). · You can control logging messages. ACL entries can be set to log traffic only at certain times of the day. Therefore, you can simply deny access without needing to analyze many logs generated during peak hours. Time-based access lists trigger CPU activity because the new configuration of the access list must be merged with other features and the combined configuration loaded into the hardware memory. For this reason, you should be careful not to have several access lists configured to take affect in close succession (within a small number of minutes of each other.) Note The time range relies on the switch system clock; therefore, you need a reliable clock source. We recommend that you use Network Time Protocol (NTP) to synchronize the switch clock. Related Topics Configuring Time Ranges for ACLs, on page 1384 IPv4 ACL Interface Considerations When you apply the ip access-group interface configuration command to a Layer 3 interface (an SVI, a Layer 3 EtherChannel, or a routed port), the interface must have been configured with an IP address. Layer 3 access groups filter packets that are routed or are received by Layer 3 processes on the CPU. They do not affect packets bridged within a VLAN. For inbound ACLs, after receiving a packet, the switch checks the packet against the ACL. If the ACL permits the packet, the switch continues to process the packet. If the ACL rejects the packet, the switch discards the packet. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1375 How to Configure ACLs Security For outbound ACLs, after receiving and routing a packet to a controlled interface, the switch checks the packet against the ACL. If the ACL permits the packet, the switch sends the packet. If the ACL rejects the packet, the switch discards the packet. By default, the input interface sends ICMP Unreachable messages whenever a packet is discarded, regardless of whether the packet was discarded because of an ACL on the input interface or because of an ACL on the output interface. ICMP Unreachables are normally limited to no more than one every one-half second per input interface, but this can be changed by using the ip icmp rate-limit unreachable global configuration command. When you apply an undefined ACL to an interface, the switch acts as if the ACL has not been applied to the interface and permits all packets. Remember this behavior if you use undefined ACLs for network security. Related Topics Applying an IPv4 ACL to an Interface, on page 1386 Restrictions for Configuring Network Security with ACLs, on page 1361 How to Configure ACLs Configuring IPv4 ACLs These are the steps to use IP ACLs on the switch: SUMMARY STEPS 1. Create an ACL by specifying an access list number or name and the access conditions. 2. Apply the ACL to interfaces or terminal lines. You can also apply standard and extended IP ACLs to VLAN maps. DETAILED STEPS Step 1 Step 2 Command or Action Purpose Create an ACL by specifying an access list number or name and the access conditions. Apply the ACL to interfaces or terminal lines. You can also apply standard and extended IP ACLs to VLAN maps. Creating a Numbered Standard ACL Beginning in privileged EXEC mode, follow these steps to create a numbered standard ACL: SUMMARY STEPS 1. configure terminal 2. access-list access-list-number {deny | permit} source source-wildcard [log] 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1376 Security Creating a Numbered Standard ACL DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 access-list access-list-number {deny | permit} source source-wildcard [log] Example: Switch(config)# access-list 2 deny your_host end Example: Switch(config)# end Defines a standard IPv4 access list by using a source address and wildcard. The access-list-number is a decimal number from 1 to 99 or 1300 to 1999. Enter deny or permit to specify whether to deny or permit access if conditions are matched. The source is the source address of the network or host from which the packet is being sent specified as: · The 32-bit quantity in dotted-decimal format. · The keyword any as an abbreviation for source and source-wildcard of 0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard. · The keyword host as an abbreviation for source and source-wildcard of source 0.0.0.0. (Optional) The source-wildcard applies wildcard bits to the source. (Optional) Enter log to cause an informational logging message about the packet that matches the entry to be sent to the console. (Optional) Enter smartlog to send copies of denied or permitted packets to a NetFlow collector. Note Logging is supported only on ACLs attached to Layer 3 interfaces. Returns to privileged EXEC mode. Related Topics Configuring VLAN Maps, on page 1390 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1377 Creating a Numbered Extended ACL Security Creating a Numbered Extended ACL Beginning in privileged EXEC mode, follow these steps to create a numbered extended ACL: SUMMARY STEPS 1. configure terminal 2. access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [fragments] [log [log-input] [time-range time-range-name] [dscp dscp] 3. access-list access-list-number {deny | permit} tcp source source-wildcard [operator port] destination destination-wildcard [operator port] [established] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] [flag] 4. access-list access-list-number {deny | permit} udp source source-wildcard [operator port] destination destination-wildcard [operator port] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] 5. access-list access-list-number {deny | permit} icmp source source-wildcard destination destination-wildcard [icmp-type | [[icmp-type icmp-code] | [icmp-message]] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] 6. access-list access-list-number {deny | permit} igmp source source-wildcard destination destination-wildcard [igmp-type] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [fragments] [log [log-input] [time-range time-range-name] [dscp dscp] Example: Switch(config)# access-list 101 permit ip host 10.1.1.2 any precedence 0 tos 0 log Defines an extended IPv4 access list and the access conditions. The access-list-number is a decimal number from 100 to 199 or 2000 to 2699. Enter deny or permit to specify whether to deny or permit the packet if conditions are matched. For protocol, enter the name or number of an P protocol: ahp, eigrp, esp, gre, icmp, igmp, igrp, ip, ipinip, nos, ospf, pcp, pim, tcp, or udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including ICMP, TCP, and UDP), use the keyword ip. The source is the number of the network or host from which the packet is sent. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1378 Security Creating a Numbered Extended ACL Step 3 Command or Action Purpose The source-wildcard applies wildcard bits to the source. The destination is the network or host number to which the packet is sent. The destination-wildcard applies wildcard bits to the destination. Source, source-wildcard, destination, and destination-wildcard can be specified as: · The 32-bit quantity in dotted-decimal format. · The keyword any for 0.0.0.0 255.255.255.255 (any host). · The keyword host for a single host 0.0.0.0. The other keywords are optional and have these meanings: · precedence--Enter to match packets with a precedence level specified as a number from 0 to 7 or by name: routine (0), priority (1), immediate (2), flash (3), flash-override (4), critical (5), internet (6), network (7). · fragments--Enter to check non-initial fragments. · tos--Enter to match by type of service level, specified by a number from 0 to 15 or a name: normal (0), max-reliability (2), max-throughput (4), min-delay (8). · log--Enter to create an informational logging message to be sent to the console about the packet that matches the entry or log-input to include the input interface in the log entry. · smartlog--Enter when smart logging is globally enabled to have a copy of the denied or permitted packet sent to a NetFlow collector. · time-range--Specify the time-range name. · dscp--Enter to match packets with the DSCP value specified by a number from 0 to 63, or use the question mark (?) to see a list of available values. Note If you enter a dscp value, you cannot enter tos or precedence. You can enter both a tos and a precedence value with no dscp. access-list access-list-number {deny | permit} tcp source Defines an extended TCP access list and the access source-wildcard [operator port] destination conditions. destination-wildcard [operator port] [established] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1379 Creating a Numbered Extended ACL Security Step 4 Command or Action Purpose [precedence precedence] [tos tos] [fragments] [log The parameters are the same as those described for an [log-input] ] [time-range time-range-name] [dscp dscp] extended IPv4 ACL, with these exceptions: [flag] (Optional) Enter an operator and port to compare source Example: (if positioned after source source-wildcard) or destination (if positioned after destination destination-wildcard) port. Switch(config)# access-list 101 permit tcp any any Possible operators include eq (equal), gt (greater than), lt eq 500 (less than), neq (not equal), and range (inclusive range). Operators require a port number (range requires two port numbers separated by a space). Enter the port number as a decimal number (from 0 to 65535) or the name of a TCP port. The other optional keywords have these meanings: · established--Enter to match an established connection. This has the same function as matching on the ack or rst flag. · flag--Enter one of these flags to match by the specified TCP header bits: ack (acknowledge), fin (finish), psh (push), rst (reset), syn (synchronize), or urg (urgent). access-list access-list-number {deny | permit} udp source (Optional) Defines an extended UDP access list and the source-wildcard [operator port] destination access conditions. destination-wildcard [operator port] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] The UDP parameters are the same as those described for TCP except that the [operator [port]] port number or name must be a UDP port number or name, and the flag and Example: established keywords are not valid for UDP. Switch(config)# access-list 101 permit udp any any eq 100 Step 5 access-list access-list-number {deny | permit} icmp source Defines an extended ICMP access list and the access source-wildcard destination destination-wildcard [icmp-type conditions. | [[icmp-type icmp-code] | [icmp-message]] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] The ICMP parameters are the same as those described for most IP protocols in an extended IPv4 ACL, with the addition of the ICMP message type and code parameters. Example: These optional keywords have these meanings: Switch(config)# access-list 101 permit icmp any any 200 · icmp-type--Enter to filter by ICMP message type, a number from 0 to 255. · icmp-code--Enter to filter ICMP packets that are filtered by the ICMP message code type, a number from 0 to 255. · icmp-message--Enter to filter ICMP packets by the ICMP message type name or the ICMP message type and code name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1380 Security Creating Named Standard ACLs Step 6 Command or Action Purpose access-list access-list-number {deny | permit} igmp source (Optional) Defines an extended IGMP access list and the source-wildcard destination destination-wildcard access conditions. [igmp-type] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] The IGMP parameters are the same as those described for most IP protocols in an extended IPv4 ACL, with this optional parameter. Example: igmp-type--To match IGMP message type, enter a number from 0 to 15, or enter the message name: dvmrp, Switch(config)# access-list 101 permit igmp any any 14 host-query, host-report, pim, or trace. Step 7 end Example: Switch(config)# end Returns to privileged EXEC mode. Extended IP ACL with the any Keyword Extended IP ACL with the host Keyword To use an abbreviation for a source and source wildcard of 0.0.0.0 255.255.255.255 and an abbreviation for a destination and destination wildcard of 0.0.0.0 255.255.255.255 when defining an extended IP ACL, use the any keyword in place of source and destination address and wildcard: Switch# configure terminal Switch(config)# access-list 101 permit ip any any precedence 0 tos 0 fragments log time-range workhours dscp 10 Switch(config)# end To use an abbreviation for a source and a source wildcard of source 0.0.0.0 and an abbreviation for a destination and destination wildcard of destination 0.0.0.0 when defining an extended IP ACL, use the host keyword in place of the source and destination wildcard or mask. Switch# configure terminal Switch(config)# access-list 101 permit ip host 10.1.1.2 any Switch(config)# end Related Topics Configuring VLAN Maps, on page 1390 Creating Named Standard ACLs Beginning in privileged EXEC mode, follow these steps to create a standard ACL using names: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1381 Creating Named Standard ACLs Security SUMMARY STEPS 1. configure terminal 2. ip access-list standard name 3. Use one of the following: · deny {source [source-wildcard] | host source | any} [log] · permit {source [source-wildcard] | host source | any} [log]] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip access-list standard name Example: Switch(config)# ip access-list standard 20 Defines a standard IPv4 access list using a name, and enter access-list configuration mode. The name can be a number from 1 to 99. Step 3 Use one of the following: In access-list configuration mode, specify one or more · deny {source [source-wildcard] | host source | any} [log] conditions denied or permitted to decide if the packet is forwarded or dropped. · permit {source [source-wildcard] | host source | any} [log]] · host source--A source and source wildcard of source 0.0.0.0. Example: Switch(config-std-nacl)# deny 192.168.0.0 0.0.255.255 255.255.0.0 0.0.255.255 · any--A source and source wildcard of 0.0.0.0 255.255.255.255. or Switch(config-std-nacl)# permit 10.108.0.0 0.0.0.0 255.255.255.0 0.0.0.0 Step 4 end Example: Switch(config-std-nacl)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1382 Security Creating Extended Named ACLs Creating Extended Named ACLs Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names: SUMMARY STEPS 1. configure terminal 2. ip access-list extended name 3. {deny | permit} protocol {source [source-wildcard] | host source | any} {destination [destination-wildcard] | host destination | any} [precedence precedence] [tos tos] [established] [log] [time-range time-range-name] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip access-list extended name Example: Switch(config)# ip access-list extended 150 Defines an extended IPv4 access list using a name, and enter access-list configuration mode. The name can be a number from 100 to 199. Step 3 Step 4 {deny | permit} protocol {source [source-wildcard] | host In access-list configuration mode, specify the conditions source | any} {destination [destination-wildcard] | host allowed or denied. Use the log keyword to get access list destination | any} [precedence precedence] [tos tos] logging messages, including violations. [established] [log] [time-range time-range-name] · host source--A source and source wildcard of source Example: 0.0.0.0. Switch(config-ext-nacl)# permit 0 any any · host destintation--A destination and destination wildcard of destination 0.0.0.0. · any--A source and source wildcard or destination and destination wildcard of 0.0.0.0 255.255.255.255. end Example: Returns to privileged EXEC mode. Switch(config-ext-nacl)# end When you are creating extended ACLs, remember that, by default, the end of the ACL contains an implicit deny statement for everything if it did not find a match before reaching the end. For standard ACLs, if you omit the mask from an associated IP host address access list specification, 0.0.0.0 is assumed to be the mask. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1383 Configuring Time Ranges for ACLs Security After you create an ACL, any additions are placed at the end of the list. You cannot selectively add ACL entries to a specific ACL. However, you can use no permit and no deny access-list configuration mode commands to remove entries from a named ACL. This example shows how you can delete individual ACEs from the named access list border-list: Switch(config)# ip access-list extended border-list Switch(config-ext-nacl)# no permit ip host 10.1.1.3 any Being able to selectively remove lines from a named ACL is one reason you might use named ACLs instead of numbered ACLs. What to do next After creating a named ACL, you can apply it to interfaces or to VLANs . Configuring Time Ranges for ACLs Beginning in privileged EXEC mode, follow these steps to configure a time-range parameter for an ACL: SUMMARY STEPS 1. configure terminal 2. time-range time-range-name 3. Use one of the following: · absolute [start time date] [end time date] · periodic day-of-the-week hh:mm to [day-of-the-week] hh:mm · periodic {weekdays | weekend | daily} hh:mm to hh:mm 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 time-range time-range-name Example: Switch(config)# time-range workhours Assigns a meaningful name (for example, workhours) to the time range to be created, and enter time-range configuration mode. The name cannot contain a space or quotation mark and must begin with a letter. Step 3 Use one of the following: · absolute [start time date] [end time date] Specifies when the function it will be applied to is operational. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1384 Security Applying an IPv4 ACL to a Terminal Line Command or Action Purpose · periodic day-of-the-week hh:mm to [day-of-the-week] hh:mm · periodic {weekdays | weekend | daily} hh:mm to hh:mm Example: · You can use only one absolute statement in the time range. If you configure more than one absolute statement, only the one configured last is executed. · You can enter multiple periodic statements. For example, you could configure different hours for weekdays and weekends. Switch(config-time-range)# absolute start 00:00 1 Jan 2006 end 23:59 1 Jan 2006 See the example configurations. or Switch(config-time-range)# periodic weekdays 8:00 to 12:00 Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. What to do next Repeat the steps if you have multiple items that you want in effect at different times. Related Topics Time Ranges for ACLs, on page 1375 Applying an IPv4 ACL to a Terminal Line You can use numbered ACLs to control access to one or more terminal lines. You cannot apply named ACLs to lines. You must set identical restrictions on all the virtual terminal lines because a user can attempt to connect to any of them. Beginning in privileged EXEC mode, follow these steps to restrict incoming and outgoing connections between a virtual terminal line and the addresses in an ACL: SUMMARY STEPS 1. configure terminal 2. line [console | vty] line-number 3. access-class access-list-number {in | out} 4. end 5. show running-config 6. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1385 Applying an IPv4 ACL to an Interface Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 line [console | vty] line-number Example: Switch(config)# line console 0 Step 3 access-class access-list-number {in | out} Example: Switch(config-line)# access-class 10 in Step 4 end Example: Switch(config-line)# end Step 5 show running-config Example: Switch# show running-config Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enters the global configuration mode. Identifies a specific line to configure, and enter in-line configuration mode. · console--Specifies the console terminal line. The console port is DCE. · vty--Specifies a virtual terminal for remote console access. The line-number is the first line number in a contiguous group that you want to configure when the line type is specified. The range is from 0 to 16. Restricts incoming and outgoing connections between a particular virtual terminal line (into a device) and the addresses in an access list. Returns to privileged EXEC mode. Displays the access list configuration. (Optional) Saves your entries in the configuration file. Applying an IPv4 ACL to an Interface This section describes how to apply IPv4 ACLs to network interfaces. Beginning in privileged EXEC mode, follow these steps to control access to an interface: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1386 Security Applying an IPv4 ACL to an Interface SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. ip access-group {access-list-number | name} {in | out} 4. end 5. show running-config 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Switch(config)# interface gigabitethernet1/0/1 Identifies a specific interface for configuration, and enter interface configuration mode. The interface can be a Layer 2 interface (port ACL), or a Layer 3 interface (router ACL). Step 3 ip access-group {access-list-number | name} {in | out} Controls access to the specified interface. Example: Switch(config-if)# ip access-group 2 in Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 5 show running-config Example: Switch# show running-config Displays the access list configuration. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1387 Creating Named MAC Extended ACLs Security Related Topics IPv4 ACL Interface Considerations, on page 1375 Restrictions for Configuring Network Security with ACLs, on page 1361 Creating Named MAC Extended ACLs You can filter non-IPv4 traffic on a VLAN or on a Layer 2 interface by using MAC addresses and named MAC extended ACLs. The procedure is similar to that of configuring other extended named ACLs. Beginning in privileged EXEC mode, follow these steps to create a named MAC extended ACL: SUMMARY STEPS 1. configure terminal 2. mac access-list extended name 3. {deny | permit} {any | host source MAC address | source MAC address mask} {any | host destination MAC address | destination MAC address mask} [type mask | lsap lsap mask | aarp | amber | dec-spanning | decnet-iv | diagnostic | dsm | etype-6000 | etype-8042 | lat | lavc-sca | mop-console | mop-dump | msdos | mumps | netbios | vines-echo | vines-ip | xns-idp | 0-65535] [cos cos] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 mac access-list extended name Example: Switch(config)# mac access-list extended mac1 Defines an extended MAC access list using a name. Step 3 {deny | permit} {any | host source MAC address | source In extended MAC access-list configuration mode, specifies MAC address mask} {any | host destination MAC address to permit or deny any source MAC address, a source MAC | destination MAC address mask} [type mask | lsap lsap address with a mask, or a specific host source MAC address mask | aarp | amber | dec-spanning | decnet-iv | diagnostic and any destination MAC address, destination MAC address | dsm | etype-6000 | etype-8042 | lat | lavc-sca | with a mask, or a specific destination MAC address. mop-console | mop-dump | msdos | mumps | netbios | vines-echo | vines-ip | xns-idp | 0-65535] [cos cos] (Optional) You can also enter these options: Example: · type mask--An arbitrary EtherType number of a packet with Ethernet II or SNAP encapsulation in decimal, Switch(config-ext-macl)# deny any any decnet-iv hexadecimal, or octal with optional mask of don't care bits applied to the EtherType before testing for a match. or Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1388 Security Applying a MAC ACL to a Layer 2 Interface Command or Action Switch(config-ext-macl)# permit any any Step 4 end Example: Switch(config-ext-macl)# end Purpose · lsap lsap mask--An LSAP number of a packet with IEEE 802.2 encapsulation in decimal, hexadecimal, or octal with optional mask of don't care bits. · aarp | amber | dec-spanning | decnet-iv | diagnostic | dsm | etype-6000 | etype-8042 | lat | lavc-sca | mop-console | mop-dump | msdos | mumps | netbios | vines-echo | vines-ip | xns-idp--A non-IP protocol. · cos cos--An IEEE 802.1Q cost of service number from 0 to 7 used to set priority. Returns to privileged EXEC mode. Related Topics Restrictions for Configuring Network Security with ACLs, on page 1361 Configuring VLAN Maps, on page 1390 Applying a MAC ACL to a Layer 2 Interface Beginning in privileged EXEC mode, follow these steps to apply a MAC access list to control access to a Layer 2 interface: SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. mac access-group {name} {in | out } 4. end 5. show mac access-group [interface interface-id] 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1389 Configuring VLAN Maps Security Step 2 Command or Action interface interface-id Example: Switch(config)# interface gigabitethernet1/0/2 Purpose Identifies a specific interface, and enter interface configuration mode. The interface must be a physical Layer 2 interface (port ACL). Step 3 mac access-group {name} {in | out } Example: Switch(config-if)# mac access-group mac1 in Controls access to the specified interface by using the MAC access list. Port ACLs are supported in the outbound and inbound directions. Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 5 show mac access-group [interface interface-id] Example: Switch# show mac access-group interface gigabitethernet1/0/2 Displays the MAC access list applied to the interface or all Layer 2 interfaces. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. After receiving a packet, the switch checks it against the inbound ACL. If the ACL permits it, the switch continues to process the packet. If the ACL rejects the packet, the switch discards it. When you apply an undefined ACL to an interface, the switch acts as if the ACL has not been applied and permits all packets. Remember this behavior if you use undefined ACLs for network security. Related Topics Restrictions for Configuring Network Security with ACLs, on page 1361 Configuring VLAN Maps To create a VLAN map and apply it to one or more VLANs, perform these steps: Before you begin Create the standard or extended IPv4 ACLs or named MAC extended ACLs that you want to apply to the VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1390 Security Configuring VLAN Maps SUMMARY STEPS 1. vlan access-map name [number] 2. match {ip | mac} address {name | number} [name | number] 3. Enter one of the following commands to specify an IP packet or a non-IP packet (with only a known MAC address) and to match the packet against one or more ACLs (standard or extended): · action { forward} Switch(config-access-map)# action forward · action { drop} Switch(config-access-map)# action drop 4. vlan filter mapname vlan-list list DETAILED STEPS Step 1 Command or Action vlan access-map name [number] Example: Switch(config)# vlan access-map map_1 20 Purpose Creates a VLAN map, and give it a name and (optionally) a number. The number is the sequence number of the entry within the map. When you create VLAN maps with the same name, numbers are assigned sequentially in increments of 10. When modifying or deleting maps, you can enter the number of the map entry that you want to modify or delete. VLAN maps do not use the specific permit or deny keywords. To deny a packet by using VLAN maps, create an ACL that would match the packet, and set the action to drop. A permit in the ACL counts as a match. A deny in the ACL means no match. Entering this command changes to access-map configuration mode. Step 2 match {ip | mac} address {name | number} [name | number] Example: Switch(config-access-map)# match ip address ip2 Match the packet (using either the IP or MAC address) against one or more standard or extended access lists. Note that packets are only matched against access lists of the correct protocol type. IP packets are matched against standard or extended IP access lists. Non-IP packets are only matched against named MAC extended access lists. Note If the VLAN map is configured with a match clause for a type of packet (IP or MAC) and the map action is drop, all packets that match the type are dropped. If the VLAN map has no match clause, and the configured action is drop, all IP and Layer 2 packets are dropped. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1391 Creating a VLAN Map Security Step 3 Command or Action Purpose Enter one of the following commands to specify an IP Sets the action for the map entry. packet or a non-IP packet (with only a known MAC address) and to match the packet against one or more ACLs (standard or extended): · action { forward} Switch(config-access-map)# action forward · action { drop} Switch(config-access-map)# action drop Step 4 vlan filter mapname vlan-list list Applies the VLAN map to one or more VLAN IDs. Example: The list can be a single VLAN ID (22), a consecutive list (10-22), or a string of VLAN IDs (12, 22, 30). Spaces Switch(config)# vlan filter map 1 vlan-list 20-22 around the comma and hyphen are optional. Related Topics Creating a Numbered Standard ACL, on page 1376 Creating a Numbered Extended ACL, on page 1378 Creating Named MAC Extended ACLs, on page 1388 Creating a VLAN Map, on page 1392 Applying a VLAN Map to a VLAN, on page 1394 Creating a VLAN Map Each VLAN map consists of an ordered series of entries. Beginning in privileged EXEC mode, follow these steps to create, add to, or delete a VLAN map entry: SUMMARY STEPS 1. configure terminal 2. vlan access-map name [number] 3. match {ip | mac} address {name | number} [name | number] 4. action {drop | forward} 5. end 6. show running-config 7. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1392 Security Creating a VLAN Map DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 vlan access-map name [number] Example: Switch(config)# vlan access-map map_1 20 Creates a VLAN map, and give it a name and (optionally) a number. The number is the sequence number of the entry within the map. When you create VLAN maps with the same name, numbers are assigned sequentially in increments of 10. When modifying or deleting maps, you can enter the number of the map entry that you want to modify or delete. VLAN maps do not use the specific permit or deny keywords. To deny a packet by using VLAN maps, create an ACL that would match the packet, and set the action to drop. A permit in the ACL counts as a match. A deny in the ACL means no match. Entering this command changes to access-map configuration mode. match {ip | mac} address {name | number} [name | number] Example: Switch(config-access-map)# match ip address ip2 Match the packet (using either the IP or MAC address) against one or more standard or extended access lists. Note that packets are only matched against access lists of the correct protocol type. IP packets are matched against standard or extended IP access lists. Non-IP packets are only matched against named MAC extended access lists. action {drop | forward} Example: (Optional) Sets the action for the map entry. The default is to forward. Switch(config-access-map)# action forward Step 5 end Example: Switch(config-access-map)# end Returns to global configuration mode. Step 6 show running-config Example: Switch# show running-config Displays the access list configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1393 Applying a VLAN Map to a VLAN Security Step 7 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Related Topics Configuring VLAN Maps, on page 1390 Applying a VLAN Map to a VLAN Beginning in privileged EXEC mode, follow these steps to apply a VLAN map to one or more VLANs: SUMMARY STEPS 1. configure terminal 2. vlan filter mapname vlan-list list 3. end 4. show running-config 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 vlan filter mapname vlan-list list Applies the VLAN map to one or more VLAN IDs. Example: The list can be a single VLAN ID (22), a consecutive list (10-22), or a string of VLAN IDs (12, 22, 30). Spaces Switch(config)# vlan filter map 1 vlan-list 20-22 around the comma and hyphen are optional. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 show running-config Example: Switch# show running-config Displays the access list configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1394 Security Configuring VACL Logging Step 5 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Related Topics Configuring VLAN Maps, on page 1390 Configuring VACL Logging Beginning in privileged EXEC mode: SUMMARY STEPS 1. configure terminal 2. vlan access-map name [number] 3. action drop log 4. exit 5. vlan access-log {maxflow max_number | threshold pkt_count} 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 vlan access-map name [number] Example: Switch(config)# vlan access-map gandymede 10 Step 3 action drop log Example: Creates a VLAN map. Give it a name and optionally a number. The number is the sequence number of the entry within the map. The sequence number range is from 0 to 65535. When you create VLAN maps with the same name, numbers are assigned sequentially in increments of 10. When modifying or deleting maps, you can enter the number of the map entry that you want to modify or delete. Specifying the map name and optionally a number enters the access-map configuration mode. Sets the VLAN access map to drop and log IP packets. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1395 Monitoring IPv4 ACLs Security Command or Action Switch(config-access-map)# action drop log Purpose Step 4 exit Example: Switch(config-access-map)# exit Exits the VLAN access map configuration mode and return to the global configuration mode. Step 5 Step 6 vlan access-log {maxflow max_number | threshold pkt_count} Example: Switch(config)# vlan access-log threshold 4000 Configures the VACL logging parameters. · maxflow max_number--Sets the log table size. The content of the log table can be deleted by setting the maxflow to 0. When the log table is full, the software drops logged packets from new flows. The range is from 0 to 2048. The default is 500. · threshold pkt_count--Sets the logging threshold. A logging message is generated if the threshold for a flow is reached before the 5-minute interval. The threshold range is from 0 to 2147483647. The default threshold is 0, which means that a syslog message is generated every 5 minutes. end Example: Switch(config)# end Returns to privileged EXEC mode. Monitoring IPv4 ACLs You can monitor IPv4 ACLs by displaying the ACLs that are configured on the switch, and displaying the ACLs that have been applied to interfaces and VLANs. When you use the ip access-group interface configuration command to apply ACLs to a Layer 2 or 3 interface, you can display the access groups on the interface. You can also display the MAC ACLs applied to a Layer 2 interface. You can use the privileged EXEC commands as described in this table to display this information. Table 124: Commands for Displaying Access Lists and Access Groups Command show access-lists [number | name] Purpose Displays the contents of one or all current IP and MAC address access lists or a specific access list (numbered or named). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1396 Security Configuration Examples for ACLs Command show ip access-lists [number | name] show ip interface interface-id show running-config [interface interface-id] show mac access-group [interface interface-id] Purpose Displays the contents of all current IP access lists or a specific IP access list (numbered or named). Displays detailed configuration and status of an interface. If IP is enabled on the interface and ACLs have been applied by using the ip access-group interface configuration command, the access groups are included in the display. Displays the contents of the configuration file for the switch or the specified interface, including all configured MAC and IP access lists and which access groups are applied to an interface. Displays MAC access lists applied to all Layer 2 interfaces or the specified Layer 2 interface. You can also monitor VLAN maps by displaying information about VLAN access maps or VLAN filters. Use the privileged EXEC commands in this table to display VLAN map information. Table 125: Commands for Displaying VLAN Map Information Command show vlan access-map [mapname] Purpose Displays information about all VLAN access maps or the specified access map. show vlan filter [access-map name | vlan vlan-id] Displays information about all VLAN filters or about a specified VLAN or VLAN access map. Configuration Examples for ACLs Examples: Using Time Ranges with ACLs This example shows how to verify after you configure time ranges for workhours and to configure January 1, 2006, as a company holiday. Switch# show time-range time-range entry: new_year_day_2003 (inactive) absolute start 00:00 01 January 2006 end 23:59 01 January 2006 time-range entry: workhours (inactive) periodic weekdays 8:00 to 12:00 periodic weekdays 13:00 to 17:00 To apply a time range, enter the time-range name in an extended ACL that can implement time ranges. This example shows how to create and verify extended access list 188 that denies TCP traffic from any source to any destination during the defined holiday times and permits all TCP traffic during work hours. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1397 Examples: Including Comments in ACLs Security Switch(config)# access-list 188 deny tcp any any time-range new_year_day_2006 Switch(config)# access-list 188 permit tcp any any time-range workhours Switch(config)# end Switch# show access-lists Extended IP access list 188 10 deny tcp any any time-range new_year_day_2006 (inactive) 20 permit tcp any any time-range workhours (inactive) This example uses named ACLs to permit and deny the same traffic. Switch(config)# ip access-list extended deny_access Switch(config-ext-nacl)# deny tcp any any time-range new_year_day_2006 Switch(config-ext-nacl)# exit Switch(config)# ip access-list extended may_access Switch(config-ext-nacl)# permit tcp any any time-range workhours Switch(config-ext-nacl)# end Switch# show ip access-lists Extended IP access list lpip_default 10 permit ip any any Extended IP access list deny_access 10 deny tcp any any time-range new_year_day_2006 (inactive) Extended IP access list may_access 10 permit tcp any any time-range workhours (inactive) Examples: Including Comments in ACLs You can use the remark keyword to include comments (remarks) about entries in any IP standard or extended ACL. The remarks make the ACL easier for you to understand and scan. Each remark line is limited to 100 characters. The remark can go before or after a permit or deny statement. You should be consistent about where you put the remark so that it is clear which remark describes which permit or deny statement. For example, it would be confusing to have some remarks before the associated permit or deny statements and some remarks after the associated statements. To include a comment for IP numbered standard or extended ACLs, use the access-list access-list number remark remark global configuration command. To remove the remark, use the no form of this command. In this example, the workstation that belongs to Jones is allowed access, and the workstation that belongs to Smith is not allowed access: Switch(config)# access-list 1 remark Permit only Jones workstation through Switch(config)# access-list 1 permit 171.69.2.88 Switch(config)# access-list 1 remark Do not allow Smith through Switch(config)# access-list 1 deny 171.69.3.13 For an entry in a named IP ACL, use the remark access-list configuration command. To remove the remark, use the no form of this command. In this example, the Jones subnet is not allowed to use outbound Telnet: Switch(config)# ip access-list extended telnetting Switch(config-ext-nacl)# remark Do not allow Jones subnet to telnet out Switch(config-ext-nacl)# deny tcp host 171.69.2.88 any eq telnet Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1398 Security Examples: Troubleshooting ACLs Examples: Troubleshooting ACLs If this ACL manager message appears and [chars] is the access-list name, ACLMGR-2-NOVMR: Cannot generate hardware representation of access list [chars] The switch has insufficient resources to create a hardware representation of the ACL. The resources include hardware memory and label space but not CPU memory. A lack of available logical operation units or specialized hardware resources causes this problem. Logical operation units are needed for a TCP flag match or a test other than eq (ne, gt, lt, or range) on TCP, UDP, or SCTP port numbers. Use one of these workarounds: · Modify the ACL configuration to use fewer resources. · Rename the ACL with a name or number that alphanumerically precedes the ACL names or numbers. To determine the specialized hardware resources, enter the show platform layer4 acl map privileged EXEC command. If the switch does not have available resources, the output shows that index 0 to index 15 are not available. For more information about configuring ACLs with insufficient resources, see CSCsq63926 in the Bug Toolkit. For example, if you apply this ACL to an interface: permit tcp source source-wildcard destination destination-wildcard range 5 60 permit tcp source source-wildcard destination destination-wildcard range 15 160 permit tcp source source-wildcard destination destination-wildcard range 115 1660 permit tcp source source-wildcard destination destination-wildcard And if this message appears: ACLMGR-2-NOVMR: Cannot generate hardware representation of access list [chars] The flag-related operators are not available. To avoid this issue, · Move the fourth ACE before the first ACE by using ip access-list resequence global configuration command: permit tcp source source-wildcard destination destination-wildcard permit tcp source source-wildcard destination destination-wildcard range 5 60 permit tcp source source-wildcard destination destination-wildcard range 15 160 permit tcp source source-wildcard destination destination-wildcard range 115 1660 or · Rename the ACL with a name or number that alphanumerically precedes the other ACLs (for example, rename ACL 79 to ACL 1). You can now apply the first ACE in the ACL to the interface. The switch allocates the ACE to available mapping bits in the Opselect index and then allocates flag-related operators to use the same bits in the hardware memory. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1399 IPv4 ACL Configuration Examples Security IPv4 ACL Configuration Examples This section provides examples of configuring and applying IPv4 ACLs. For detailed information about compiling ACLs, see the Cisco IOS Security Configuration Guide, Release 12.4 and to the Configuring IP Services" section in the "IP Addressing and Services" chapter of the Cisco IOS IP Configuration Guide, Release 12.4. ACLs in a Small Networked Office Figure 74: Using Router ACLs to Control Traffic This shows a small networked office environment with routed Port 2 connected to Server A, containing benefits and other information that all employees can access, and routed Port 1 connected to Server B, containing confidential payroll data. All users can access Server A, but Server B has restricted access. Use router ACLs to do this in one of two ways: · Create a standard ACL, and filter traffic coming to the server from Port 1. · Create an extended ACL, and filter traffic coming from the server into Port 1. Examples: ACLs in a Small Networked Office This example uses a standard ACL to filter traffic coming into Server B from a port, permitting traffic only from Accounting's source addresses 172.20.128.64 to 172.20.128.95. The ACL is applied to traffic coming out of routed Port 1 from the specified source address. Switch(config)# access-list 6 permit 172.20.128.64 0.0.0.31 Switch(config)# end Switch# how access-lists Standard IP access list 6 10 permit 172.20.128.64, wildcard bits 0.0.0.31 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1400 Security Example: Numbered ACLs Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group 6 out This example uses an extended ACL to filter traffic coming from Server B into a port, permitting traffic from any source address (in this case Server B) to only the Accounting destination addresses 172.20.128.64 to 172.20.128.95. The ACL is applied to traffic going into routed Port 1, permitting it to go only to the specified destination addresses. Note that with extended ACLs, you must enter the protocol (IP) before the source and destination information. Switch(config)# access-list 106 permit ip any 172.20.128.64 0.0.0.31 Switch(config)# end Switch# show access-lists Extended IP access list 106 10 permit ip any 172.20.128.64 0.0.0.31 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group 106 in Example: Numbered ACLs In this example, network 36.0.0.0 is a Class A network whose second octet specifies a subnet; that is, its subnet mask is 255.255.0.0. The third and fourth octets of a network 36.0.0.0 address specify a particular host. Using access list 2, the switch accepts one address on subnet 48 and reject all others on that subnet. The last line of the list shows that the switch accepts addresses on all other network 36.0.0.0 subnets. The ACL is applied to packets entering a port. Switch(config)# access-list 2 permit 36.48.0.3 Switch(config)# access-list 2 deny 36.48.0.0 0.0.255.255 Switch(config)# access-list 2 permit 36.0.0.0 0.255.255.255 Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ip access-group 2 in Examples: Extended ACLs In this example, the first line permits any incoming TCP connections with destination ports greater than 1023. The second line permits incoming TCP connections to the Simple Mail Transfer Protocol (SMTP) port of host 128.88.1.2. The third line permits incoming ICMP messages for error feedback. Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 gt 1023 Switch(config)# access-list 102 permit tcp any host 128.88.1.2 eq 25 Switch(config)# access-list 102 permit icmp any any Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ip access-group 102 in In this example, suppose that you have a network connected to the Internet, and you want any host on the network to be able to form TCP connections to any host on the Internet. However, you do not want IP hosts to be able to form TCP connections to hosts on your network, except to the mail (SMTP) port of a dedicated mail host. SMTP uses TCP port 25 on one end of the connection and a random port number on the other end. The same port numbers are used throughout the life of the connection. Mail packets coming in from the Internet have a destination port of 25. Outbound packets have the port numbers reversed. Because the secure system of the network always accepts mail connections on port 25, the incoming and outgoing services are separately Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1401 Examples: Named ACLs Security controlled. The ACL must be configured as an input ACL on the outbound interface and an output ACL on the inbound interface. Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 eq 23 Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 eq 25 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group 102 in In this example, the network is a Class B network with the address 128.88.0.0, and the mail host address is 128.88.1.2. The established keyword is used only for the TCP to show an established connection. A match occurs if the TCP datagram has the ACK or RST bits set, which show that the packet belongs to an existing connection. Gigabit Ethernet interface 1 on stack member 1 is the interface that connects the router to the Internet. Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 established Switch(config)# access-list 102 permit tcp any host 128.88.1.2 eq 25 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group 102 in Examples: Named ACLs This example creates a standard ACL named internet_filter and an extended ACL named marketing_group. The internet_filter ACL allows all traffic from the source address 1.2.3.4. Switch(config)# ip access-list standard Internet_filter Switch(config-ext-nacl)# permit 1.2.3.4 Switch(config-ext-nacl)# exit The marketing_group ACL allows any TCP Telnet traffic to the destination address and wildcard 171.69.0.0 0.0.255.255 and denies any other TCP traffic. It permits ICMP traffic, denies UDP traffic from any source to the destination address range 171.69.0.0 through 179.69.255.255 with a destination port less than 1024, denies any other IP traffic, and provides a log of the result. Switch(config)# ip access-list extended marketing_group Switch(config-ext-nacl)# permit tcp any 171.69.0.0 0.0.255.255 eq telnet Switch(config-ext-nacl)# deny tcp any any Switch(config-ext-nacl)# permit icmp any any Switch(config-ext-nacl)# deny udp any 171.69.0.0 0.0.255.255 lt 1024 Switch(config-ext-nacl)# deny ip any any log Switch(config-ext-nacl)# exit The Internet_filter ACL is applied to outgoing traffic and the marketing_group ACL is applied to incoming traffic on a Layer 3 port. Switch(config)# interface gigabitethernet3/0/2 Switch(config-if)# no switchport Switch(config-if)# ip address 2.0.5.1 255.255.255.0 Switch(config-if)# ip access-group Internet_filter out Switch(config-if)# ip access-group marketing_group in Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1402 Security Examples: Time Range Applied to an IP ACL Examples: Time Range Applied to an IP ACL This example denies HTTP traffic on IP on Monday through Friday between the hours of 8:00 a.m. and 6:00 p.m (18:00). The example allows UDP traffic only on Saturday and Sunday from noon to 8:00 p.m. (20:00). Switch(config)# time-range no-http Switch(config)# periodic weekdays 8:00 to 18:00 ! Switch(config)# time-range udp-yes Switch(config)# periodic weekend 12:00 to 20:00 ! Switch(config)# ip access-list extended strict Switch(config-ext-nacl)# deny tcp any any eq www time-range no-http Switch(config-ext-nacl)# permit udp any any time-range udp-yes ! Switch(config-ext-nacl)# exit Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ip access-group strict in Examples: Commented IP ACL Entries In this example of a numbered ACL, the workstation that belongs to Jones is allowed access, and the workstation that belongs to Smith is not allowed access: Switch(config)# access-list 1 remark Permit only Jones workstation through Switch(config)# access-list 1 permit 171.69.2.88 Switch(config)# access-list 1 remark Do not allow Smith workstation through Switch(config)# access-list 1 deny 171.69.3.13 In this example of a numbered ACL, the Winter and Smith workstations are not allowed to browse the web: Switch(config)# access-list 100 remark Do not allow Winter to browse the web Switch(config)# access-list 100 deny host 171.69.3.85 any eq www Switch(config)# access-list 100 remark Do not allow Smith to browse the web Switch(config)# access-list 100 deny host 171.69.3.13 any eq www In this example of a named ACL, the Jones subnet is not allowed access: Switch(config)# ip access-list standard prevention Switch(config-std-nacl)# remark Do not allow Jones subnet through Switch(config-std-nacl)# deny 171.69.0.0 0.0.255.255 In this example of a named ACL, the Jones subnet is not allowed to use outbound Telnet: Switch(config)# ip access-list extended telnetting Switch(config-ext-nacl)# remark Do not allow Jones subnet to telnet out Switch(config-ext-nacl)# deny tcp 171.69.0.0 0.0.255.255 any eq telnet Examples: ACL Logging Two variations of logging are supported on router ACLs. The log keyword sends an informational logging message to the console about the packet that matches the entry; the log-input keyword includes the input interface in the log entry. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1403 Examples: ACL Logging Security In this example, standard named access list stan1 denies traffic from 10.1.1.0 0.0.0.255, allows traffic from all other sources, and includes the log keyword. Switch(config)# ip access-list standard stan1 Switch(config-std-nacl)# deny 10.1.1.0 0.0.0.255 log Switch(config-std-nacl)# permit any log Switch(config-std-nacl)# exit Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group stan1 in Switch(config-if)# end Switch# show logging Syslog logging: enabled (0 messages dropped, 0 flushes, 0 overruns) Console logging: level debugging, 37 messages logged Monitor logging: level debugging, 0 messages logged Buffer logging: level debugging, 37 messages logged File logging: disabled Trap logging: level debugging, 39 message lines logged Log Buffer (4096 bytes): 00:00:48: NTP: authentication delay calculation problems <output truncated> 00:09:34:%SEC-6-IPACCESSLOGS:list stan1 permitted 0.0.0.0 1 packet 00:09:59:%SEC-6-IPACCESSLOGS:list stan1 denied 10.1.1.15 1 packet 00:10:11:%SEC-6-IPACCESSLOGS:list stan1 permitted 0.0.0.0 1 packet This example is a named extended access list ext1 that permits ICMP packets from any source to 10.1.1.0 0.0.0.255 and denies all UDP packets. Switch(config)# ip access-list extended ext1 Switch(config-ext-nacl)# permit icmp any 10.1.1.0 0.0.0.255 log Switch(config-ext-nacl)# deny udp any any log Switch(config-std-nacl)# exit Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip access-group ext1 in This is a an example of a log for an extended ACL: 01:24:23:%SEC-6-IPACCESSLOGDP:list ext1 permitted icmp 10.1.1.15 -> 10.1.1.61 (0/0), 1 packet 01:25:14:%SEC-6-IPACCESSLOGDP:list ext1 permitted icmp 10.1.1.15 -> 10.1.1.61 (0/0), 7 packets 01:26:12:%SEC-6-IPACCESSLOGP:list ext1 denied udp 0.0.0.0(0) -> 255.255.255.255(0), 1 packet 01:31:33:%SEC-6-IPACCESSLOGP:list ext1 denied udp 0.0.0.0(0) -> 255.255.255.255(0), 8 packets Note that all logging entries for IP ACLs start with %SEC-6-IPACCESSLOG with minor variations in format depending on the kind of ACL and the access entry that has been matched. This is an example of an output message when the log-input keyword is entered: 00:04:21:%SEC-6-IPACCESSLOGDP:list inputlog permitted icmp 10.1.1.10 (Vlan1 0001.42ef.a400) -> 10.1.1.61 (0/0), 1 packet Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1404 Security Configuration Examples for ACLs and VLAN Maps A log message for the same sort of packet using the log keyword does not include the input interface information: 00:05:47:%SEC-6-IPACCESSLOGDP:list inputlog permitted icmp 10.1.1.10 -> 10.1.1.61 (0/0), 1 packet Configuration Examples for ACLs and VLAN Maps Example: Creating an ACL and a VLAN Map to Deny a Packet This example shows how to create an ACL and a VLAN map to deny a packet. In the first map, any packets that match the ip1 ACL (TCP packets) would be dropped. You first create the ip1 ACL to permit any TCP packet and no other packets. Because there is a match clause for IP packets in the VLAN map, the default action is to drop any IP packet that does not match any of the match clauses. Switch(config)# ip access-list extended ip1 Switch(config-ext-nacl)# permit tcp any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map map_1 10 Switch(config-access-map)# match ip address ip1 Switch(config-access-map)# action drop Example: Creating an ACL and a VLAN Map to Permit a Packet This example shows how to create a VLAN map to permit a packet. ACL ip2 permits UDP packets and any packets that match the ip2 ACL are forwarded. In this map, any IP packets that did not match any of the previous ACLs (that is, packets that are not TCP packets or UDP packets) would get dropped. Switch(config)# ip access-list extended ip2 Switch(config-ext-nacl)# permit udp any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map map_1 20 Switch(config-access-map)# match ip address ip2 Switch(config-access-map)# action forward Example: Default Action of Dropping IP Packets and Forwarding MAC Packets In this example, the VLAN map has a default action of drop for IP packets and a default action of forward for MAC packets. Used with standard ACL 101 and extended named access lists igmp-match and tcp-match, the map will have the following results: · Forward all UDP packets · Drop all IGMP packets · Forward all TCP packets · Drop all other IP packets · Forward all non-IP packets Switch(config)# access-list 101 permit udp any any Switch(config)# ip access-list extended igmp-match Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1405 Example: Default Action of Dropping MAC Packets and Forwarding IP Packets Security Switch(config-ext-nacl)# permit igmp any any Switch(config)# action forward Switch(config-ext-nacl)# permit tcp any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map drop-ip-default 10 Switch(config-access-map)# match ip address 101 Switch(config-access-map)# action forward Switch(config-access-map)# exit Switch(config)# vlan access-map drop-ip-default 20 Switch(config-access-map)# match ip address igmp-match Switch(config-access-map)# action drop Switch(config-access-map)# exit Switch(config)# vlan access-map drop-ip-default 30 Switch(config-access-map)# match ip address tcp-match Switch(config-access-map)# action forward Example: Default Action of Dropping MAC Packets and Forwarding IP Packets In this example, the VLAN map has a default action of drop for MAC packets and a default action of forward for IP packets. Used with MAC extended access lists good-hosts and good-protocols, the map will have the following results: · Forward MAC packets from hosts 0000.0c00.0111 and 0000.0c00.0211 · Forward MAC packets with decnet-iv or vines-ip protocols · Drop all other non-IP packets · Forward all IP packets Switch(config)# mac access-list extended good-hosts Switch(config-ext-macl)# permit host 000.0c00.0111 any Switch(config-ext-macl)# permit host 000.0c00.0211 any Switch(config-ext-nacl)# exit Switch(config)# action forward Switch(config-ext-macl)# mac access-list extended good-protocols Switch(config-ext-macl)# permit any any vines-ip Switch(config-ext-nacl)# exit Switch(config)# vlan access-map drop-mac-default 10 Switch(config-access-map)# match mac address good-hosts Switch(config-access-map)# action forward Switch(config-access-map)# exit Switch(config)# vlan access-map drop-mac-default 20 Switch(config-access-map)# match mac address good-protocols Switch(config-access-map)# action forward Example: Default Action of Dropping All Packets In this example, the VLAN map has a default action of drop for all packets (IP and non-IP). Used with access lists tcp-match and good-hosts from Examples 2 and 3, the map will have the following results: · Forward all TCP packets · Forward MAC packets from hosts 0000.0c00.0111 and 0000.0c00.0211 · Drop all other IP packets · Drop all other MAC packets Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1406 Security Configuration Examples for Using VLAN Maps in Your Network Switch(config)# vlan access-map drop-all-default 10 Switch(config-access-map)# match ip address tcp-match Switch(config-access-map)# action forward Switch(config-access-map)# exit Switch(config)# vlan access-map drop-all-default 20 Switch(config-access-map)# match mac address good-hosts Switch(config-access-map)# action forward Configuration Examples for Using VLAN Maps in Your Network Example: Wiring Closet Configuration Figure 75: Wiring Closet Configuration In a wiring closet configuration, routing might not be enabled on the switch. In this configuration, the switch can still support a VLAN map and a QoS classification ACL. Assume that Host X and Host Y are in different VLANs and are connected to wiring closet switches A and C. Traffic from Host X to Host Y is eventually being routed by Switch B, a Layer 3 switch with routing enabled. Traffic from Host X to Host Y can be access-controlled at the traffic entry point, Switch A. If you do not want HTTP traffic switched from Host X to Host Y, you can configure a VLAN map on Switch A to drop all HTTP traffic from Host X (IP address 10.1.1.32) to Host Y (IP address 10.1.1.34) at Switch A and not bridge it to Switch B. First, define the IP access list http that permits (matches) any TCP traffic on the HTTP port. Switch(config)# ip access-list extended http Switch(config-ext-nacl)# permit tcp host 10.1.1.32 host 10.1.1.34 eq www Switch(config-ext-nacl)# exit Next, create VLAN access map map2 so that traffic that matches the http access list is dropped and all other IP traffic is forwarded. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1407 Example: Restricting Access to a Server on Another VLAN Security Switch(config)# vlan access-map map2 10 Switch(config-access-map)# match ip address http Switch(config-access-map)# action drop Switch(config-access-map)# exit Switch(config)# ip access-list extended match_all Switch(config-ext-nacl)# permit ip any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map map2 20 Switch(config-access-map)# match ip address match_all Switch(config-access-map)# action forward Then, apply VLAN access map map2 to VLAN 1. Switch(config)# vlan filter map2 vlan 1 Example: Restricting Access to a Server on Another VLAN Figure 76: Restricting Access to a Server on Another VLAN You can restrict access to a server on another VLAN. For example, server 10.1.1.100 in VLAN 10 needs to have access denied to these hosts: · Hosts in subnet 10.1.2.0/8 in VLAN 20 should not have access. · Hosts 10.1.1.4 and 10.1.1.8 in VLAN 10 should not have access. Example: Denying Access to a Server on Another VLAN This example shows how to deny access to a server on another VLAN by creating the VLAN map SERVER 1 that denies access to hosts in subnet 10.1.2.0.8, host 10.1.1.4, and host 10.1.1.8 and permits other IP traffic. The final step is to apply the map SERVER1 to VLAN 10. Define the IP ACL that will match the correct packets. Switch(config)# ip access-list extended SERVER1_ACL Switch(config-ext-nacl))# permit ip 10.1.2.0 0.0.0.255 host 10.1.1.100 Switch(config-ext-nacl))# permit ip host 10.1.1.4 host 10.1.1.100 Switch(config-ext-nacl))# permit ip host 10.1.1.8 host 10.1.1.100 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1408 Security Configuration Examples of Router ACLs and VLAN Maps Applied to VLANs Switch(config-ext-nacl))# exit Define a VLAN map using this ACL that will drop IP packets that match SERVER1_ACL and forward IP packets that do not match the ACL. Switch(config)# vlan access-map SERVER1_MAP Switch(config-access-map)# match ip address SERVER1_ACL Switch(config-access-map)# action drop Switch(config)# vlan access-map SERVER1_MAP 20 Switch(config-access-map)# action forward Switch(config-access-map)# exit Apply the VLAN map to VLAN 10. Switch(config)# vlan filter SERVER1_MAP vlan-list 10 Configuration Examples of Router ACLs and VLAN Maps Applied to VLANs This section gives examples of applying router ACLs and VLAN maps to a VLAN for switched, bridged, routed, and multicast packets. Although the following illustrations show packets being forwarded to their destination, each time the packet's path crosses a line indicating a VLAN map or an ACL, it is also possible that the packet might be dropped, rather than forwarded. Example: ACLs and Switched Packets Figure 77: Applying ACLs on Switched Packets This example shows how an ACL is applied on packets that are switched within a VLAN. Packets switched within the VLAN without being routed or forwarded by fallback bridging are only subject to the VLAN map of the input VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1409 Example: ACLs and Bridged Packets Security Example: ACLs and Bridged Packets Figure 78: Applying ACLs on Bridged Packets This example shows how an ACL is applied on fallback-bridged packets. For bridged packets, only Layer 2 ACLs are applied to the input VLAN. Only non-IP, non-ARP packets can be fallback-bridged. Example: ACLs and Routed Packets Figure 79: Applying ACLs on Routed Packets This example shows how ACLs are applied on routed packets. The ACLs are applied in this order: 1. VLAN map for input VLAN 2. Input router ACL 3. Output router ACL 4. VLAN map for output VLAN Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1410 Security Example: ACLs and Multicast Packets Example: ACLs and Multicast Packets Figure 80: Applying ACLs on Multicast Packets This example shows how ACLs are applied on packets that are replicated for IP multicasting. A multicast packet being routed has two different kinds of filters applied: one for destinations that are other ports in the input VLAN and another for each of the destinations that are in other VLANs to which the packet has been routed. The packet might be routed to more than one output VLAN, in which case a different router output ACL and VLAN map would apply for each destination VLAN. The final result is that the packet might be permitted in some of the output VLANs and not in others. A copy of the packet is forwarded to those destinations where it is permitted. However, if the input VLAN map drops the packet, no destination receives a copy of the packet. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1411 Additional References Security Additional References Related Documents Related Topic Document Title IPv4 Access Control List topics Securing the Data Plane Configuration Guide Library, Cisco IOS XE Release 3SE (Cata http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secda Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for ACLs Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1412 7 0 C H A P T E R Configuring IPv6 ACLs · Finding Feature Information, on page 1413 · Information about IPv6 ACLs, on page 1413 · Restrictions for IPv6 ACLs, on page 1414 · Default Configuration for IPv6 ACLs , on page 1415 · How to Configure IPv6 ACLs, on page 1415 · How to Attach an IPv6 ACL to an Interface, on page 1419 · Monitoring IPv6 ACLs, on page 1420 · Additional References, on page 1421 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information about IPv6 ACLs You can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them to interfaces similarly to the way that you create and apply IP Version 4 (IPv4) named ACLs. You can also create and apply input router ACLs to filter Layer 3 management traffic when the switch is running the IP base and LAN base feature sets. A switch supports two types of IPv6 ACLs: · IPv6 router ACLs are supported on outbound or inbound traffic on Layer 3 interfaces, which can be routed ports, switch virtual interfaces (SVIs), or Layer 3 EtherChannels. IPv6 router ACLs apply only to IPv6 packets that are routed. · IPv6 port ACLs are supported on inbound and outbound Layer 2 interfaces. IPv6 port ACLs are applied to all IPv6 packets entering the interface. The switch does not support VLAN ACLs (VLAN maps) for IPv6 traffic. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1413 Switch Stacks and IPv6 ACLs Security You can apply both IPv4 and IPv6 ACLs to an interface. As with IPv4 ACLs, IPv6 port ACLs take precedence over router ACLs. Switch Stacks and IPv6 ACLs The active switch supports IPv6 ACLs in hardware and distributes the IPv6 ACLs to the stack members. If a standby switch takes over as the active switch, it distributes the ACL configuration to all stack members. The member switches sync up the configuration distributed by the new active switch and flush out entries that are not required. When an ACL is modified, attached to, or detached from an interface, the active switch distributes the change to all stack members. Interactions with Other Features and Switches · If an IPv6 router ACL is configured to deny a packet, the packet is not routed. A copy of the packet is sent to the Internet Control Message Protocol (ICMP) queue to generate an ICMP unreachable message for the frame. · If a bridged frame is to be dropped due to a port ACL, the frame is not bridged. · You can create both IPv4 and IPv6 ACLs on a switch or switch stack, and you can apply both IPv4 and IPv6 ACLs to the same interface. Each ACL must have a unique name; an error message appears if you try to use a name that is already configured. You use different commands to create IPv4 and IPv6 ACLs and to attach IPv4 or IPv6 ACLs to the same Layer 2 or Layer 3 interface. If you use the wrong command to attach an ACL (for example, an IPv4 command to attach an IPv6 ACL), you receive an error message. · You cannot use MAC ACLs to filter IPv6 frames. MAC ACLs can only filter non-IP frames. · If the hardware memory is full, packets are dropped on the interface and an unload error message is logged. Restrictions for IPv6 ACLs With IPv4, you can configure standard and extended numbered IP ACLs, named IP ACLs, and MAC ACLs. IPv6 supports only named ACLs. The switch supports most Cisco IOS-supported IPv6 ACLs with some exceptions: · The switch does not support matching on these keywords: flowlabel, routing header, and undetermined-transport. · The switch does not support reflexive ACLs (the reflect keyword). · This release supports only port ACLs and router ACLs for IPv6; it does not support VLAN ACLs (VLAN maps). · The switch does not apply MAC-based ACLs on IPv6 frames. · You cannot apply IPv6 port ACLs to Layer 2 EtherChannels. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1414 Security Default Configuration for IPv6 ACLs · When configuring an ACL, there is no restriction on keywords entered in the ACL, regardless of whether or not they are supported on the platform. When you apply the ACL to an interface that requires hardware forwarding (physical ports or SVIs), the switch checks to determine whether or not the ACL can be supported on the interface. If not, attaching the ACL is rejected. · If an ACL is applied to an interface and you attempt to add an access control entry (ACE) with an unsupported keyword, the switch does not allow the ACE to be added to the ACL that is currently attached to the interface. IPv6 ACLs on the switch have these characteristics: · Fragmented frames (the fragments keyword as in IPv4) are supported · The same statistics supported in IPv4 are supported for IPv6 ACLs. · If the switch runs out of hardware space, the packets associated with the ACL are dropped on the interface. · Logging is supported for router ACLs, but not for port ACLs. · The switch supports IPv6 address-matching for a full range of prefix-lengths. Default Configuration for IPv6 ACLs The default IPv6 ACL configuration is as follows: Switch# show access-lists preauth_ipv6_acl IPv6 access list preauth_ipv6_acl (per-user) permit udp any any eq domain sequence 10 permit tcp any any eq domain sequence 20 permit icmp any any nd-ns sequence 30 permit icmp any any nd-na sequence 40 permit icmp any any router-solicitation sequence 50 permit icmp any any router-advertisement sequence 60 permit icmp any any redirect sequence 70 permit udp any eq 547 any eq 546 sequence 80 permit udp any eq 546 any eq 547 sequence 90 deny ipv6 any any sequence 100 How to Configure IPv6 ACLs To filter IPv6 traffic, you perform these steps: 1. Create an IPv6 ACL, and enter IPv6 access list configuration mode. 2. Configure the IPv6 ACL to block (deny) or pass (permit) traffic. 3. Apply the IPv6 ACL to an interface. For router ACLs, you must also configure an IPv6 address on the Layer 3 interface to which the ACL is applied. SUMMARY STEPS 1. configure terminal 2. [no]{ipv6 access-list list-name| client permit-control-packets| log-update threshold| role-based list-name} Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1415 How to Configure IPv6 ACLs Security 3. [no]{deny | permit} protocol {source-ipv6-prefix/|prefix-length|any threshold| host source-ipv6-address} [ operator [ port-number ]] { destination-ipv6-prefix/ prefix-length | any | host destination-ipv6-address} [operator [port-number]][dscp value] [fragments] [log] [log-input] [routing] [sequence value] [time-range name] 4. {deny | permit} tcp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator [port-number]] {destination-ipv6- prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [ack] [dscp value] [established] [fin] [log] [log-input] [neq {port | protocol}] [psh] [range {port | protocol}] [rst] [routing] [sequence value] [syn] [time-range name] [urg] 5. {deny | permit} udp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator [port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [dscp value] [log] [log-input] [neq {port | protocol}] [range {port | protocol}] [routing] [sequence value] [time-range name]] 6. {deny | permit} icmp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator [port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [icmp-type [icmp-code] | icmp-message] [dscp value] [log] [log-input] [routing] [sequence value] [time-range name] 7. end 8. show ipv6 access-list 9. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 [no]{ipv6 access-list list-name| client Defines an IPv6 ACL name, and enters IPv6 access list permit-control-packets| log-update threshold| role-based configuration mode. list-name} Example: Switch(config)# ipv6 access-list example_acl_list Step 3 [no]{deny | permit} protocol Enter deny or permit to specify whether to deny or permit {source-ipv6-prefix/|prefix-length|any threshold| host the packet if conditions are matched. These are the source-ipv6-address} [ operator [ port-number ]] { conditions: destination-ipv6-prefix/ prefix-length | any | host destination-ipv6-address} [operator [port-number]][dscp value] [fragments] [log] [log-input] [routing] [sequence value] [time-range name] · For protocol, enter the name or number of an Internet protocol: ahp, esp, icmp, ipv6, pcp, stcp, tcp, or udp, or an integer in the range 0 to 255 representing an IPv6 protocol number. · The source-ipv6-prefix/prefix-length or destination-ipv6-prefix/ prefix-length is the source or destination IPv6 network or class of networks for which to set deny or permit conditions, specified in hexadecimal and using 16-bit values between colons (see RFC 2373). · Enter any as an abbreviation for the IPv6 prefix ::/0. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1416 Security How to Configure IPv6 ACLs Step 4 Command or Action Purpose · For host source-ipv6-address or destination-ipv6-address, enter the source or destination IPv6 host address for which to set deny or permit conditions, specified in hexadecimal using 16-bit values between colons. · (Optional) For operator, specify an operand that compares the source or destination ports of the specified protocol. Operands are lt (less than), gt (greater than), eq (equal), neq (not equal), and range. If the operator follows the source-ipv6-prefix/prefix-length argument, it must match the source port. If the operator follows the destination-ipv6- prefix/prefix-length argument, it must match the destination port. · (Optional) The port-number is a decimal number from 0 to 65535 or the name of a TCP or UDP port. You can use TCP port names only when filtering TCP. You can use UDP port names only when filtering UDP. · (Optional) Enter dscp value to match a differentiated services code point value against the traffic class value in the Traffic Class field of each IPv6 packet header. The acceptable range is from 0 to 63. · (Optional) Enter fragments to check noninitial fragments. This keyword is visible only if the protocol is ipv6. · (Optional) Enter log to cause an logging message to be sent to the console about the packet that matches the entry. Enter log-input to include the input interface in the log entry. Logging is supported only for router ACLs. · (Optional) Enter routing to specify that IPv6 packets be routed. · (Optional) Enter sequence value to specify the sequence number for the access list statement. The acceptable range is from 1 to 4,294,967,295. · (Optional) Enter time-range name to specify the time range that applies to the deny or permit statement. {deny | permit} tcp {source-ipv6-prefix/prefix-length | any (Optional) Define a TCP access list and the access | host source-ipv6-address} [operator [port-number]] conditions. {destination-ipv6- prefix/prefix-length | any | host Enter tcp for Transmission Control Protocol. The destination-ipv6-address} [operator [port-number]] [ack] [dscp value] [established] [fin] [log] [log-input] [neq parameters are the same as those described in Step 3a, with these additional optional parameters: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1417 How to Configure IPv6 ACLs Security Step 5 Step 6 Step 7 Command or Action Purpose {port | protocol}] [psh] [range {port | protocol}] [rst] [routing] [sequence value] [syn] [time-range name] [urg] · ack--Acknowledgment bit set. · established--An established connection. A match occurs if the TCP datagram has the ACK or RST bits set. · fin--Finished bit set; no more data from sender. · neq {port | protocol}--Matches only packets that are not on a given port number. · psh--Push function bit set. · range {port | protocol}--Matches only packets in the port number range. · rst--Reset bit set. · syn--Synchronize bit set. · urg--Urgent pointer bit set. {deny | permit} udp {source-ipv6-prefix/prefix-length | (Optional) Define a UDP access list and the access any | host source-ipv6-address} [operator [port-number]] conditions. {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [dscp value] [log] [log-input] [neq {port | protocol}] [range Enter udp for the User Datagram Protocol. The UDP parameters are the same as those described for TCP, except that the [operator [port]] port number or name must be a {port | protocol}] [routing] [sequence value] [time-range UDP port number or name, and the established parameter name]] is not valid for UDP. {deny | permit} icmp {source-ipv6-prefix/prefix-length | (Optional) Define an ICMP access list and the access any | host source-ipv6-address} [operator [port-number]] conditions. {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [icmp-type [icmp-code] | icmp-message] [dscp value] [log] Enter icmp for Internet Control Message Protocol. The ICMP parameters are the same as those described for most IP protocols in Step 1, with the addition of the ICMP [log-input] [routing] [sequence value] [time-range name] message type and code parameters. These optional keywords have these meanings: · icmp-type--Enter to filter by ICMP message type, a number from 0 to 255. · icmp-code--Enter to filter ICMP packets that are filtered by the ICMP message code type, a number from 0 to 255. · icmp-message--Enter to filter ICMP packets by the ICMP message type name or the ICMP message type and code name. To see a list of ICMP message type names and code names, use the ? key or see command reference for this release. end Return to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1418 Security How to Attach an IPv6 ACL to an Interface Step 8 Step 9 Command or Action show ipv6 access-list copy running-config startup-config Purpose Verify the access list configuration. (Optional) Save your entries in the configuration file. Example Use the no {deny | permit} IPv6 access-list configuration commands with keywords to remove the deny or permit conditions from the specified access list. This example configures the IPv6 access list named CISCO. The first deny entry in the list denies all packets that have a destination TCP port number greater than 5000. The second deny entry denies packets that have a source UDP port number less than 5000. The second deny also logs all matches to the console. The first permit entry in the list permits all ICMP packets. The second permit entry in the list permits all other traffic. The second permit entry is necessary because an implicit deny -all condition is at the end of each IPv6 access list. Switch(config)# ipv6 access-list CISCO Switch(config-ipv6-acl)# deny tcp any any gt 5000 Switch config-ipv6-acl)# deny ::/0 lt 5000 ::/0 log Switch(config-ipv6-acl)# permit icmp any any Switch(config-ipv6-acl)# permit any any What to do next Attach the IPv6 ACL to an Interface How to Attach an IPv6 ACL to an Interface You can apply an ACL to outbound or inbound traffic on Layer 3 interfaces, or to inbound traffic on Layer 2 interfaces. You can also apply ACLs only to inbound management traffic on Layer 3 interfaces. Beginning in privileged EXEC mode, follow these steps to control access to an interface: SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. no switchport 4. ipv6 address pv6-address 5. ipv6 traffic-filter access-list-name {in | out} 6. end 7. show running-config 8. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1419 Monitoring IPv6 ACLs Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 interface interface-id Step 3 no switchport Step 4 ipv6 address pv6-address Step 5 ipv6 traffic-filter access-list-name {in | out} Step 6 Step 7 Step 8 end show running-config copy running-config startup-config Purpose Enters the global configuration mode. Identify a Layer 2 interface (for port ACLs) or Layer 3 interface (for router ACLs) on which to apply an access list, and enter interface configuration mode. If applying a router ACL, this changes the interface from Layer 2 mode (the default) to Layer 3 mode. Configure an IPv6 address on a Layer 3 interface (for router ACLs). Apply the access list to incoming or outgoing traffic on the interface. Return to privileged EXEC mode. Verify the access list configuration. (Optional) Save your entries in the configuration file. Example Use the no ipv6 traffic-filter access-list-name interface configuration command to remove an access list from an interface. This example shows how to apply the access list Cisco to outbound traffic on a Layer 3 interface: Switch(config)# interface gigabitethernet 1/0/3 Switch(config-if)# no switchport Switch(config-if)# ipv6 address 2001::/64 eui-64 Switch(config-if)# ipv6 traffic-filter CISCO out Monitoring IPv6 ACLs You can display information about all configured access lists, all IPv6 access lists, or a specific access list by using one or more of the privileged EXEC commands shown in the table below: Command show access-lists show ipv6 access-list [access-list-name] Purpose Displays all access lists configured on the switch. Displays all configured IPv6 access lists or the access list specified by name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1420 Security Additional References This is an example of the output from the show access-lists privileged EXEC command. The output shows all access lists that are configured on the switch or switch stack. Switch # show access-lists Extended IP access list hello 10 permit ip any any IPv6 access list ipv6 permit ipv6 any any sequence 10 This is an example of the output from the show ipv6 access-list privileged EXEC command. The output shows only IPv6 access lists configured on the switch or switch stack Switch# show ipv6 access-list IPv6 access list inbound permit tcp any any eq bgp (8 matches) sequence 10 permit tcp any any eq telnet (15 matches) sequence 20 permit udp any any sequence 30 IPv6 access list outbound deny udp any any sequence 10 deny tcp any any eq telnet sequence 20 Additional References Related Documents Related Topic Document Title IPv6 IPv6 Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) security configuration http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/config_library/xe-3se/3850/ipv6-xe-3se-3850-library topics IPv6 command reference IPv6 Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/command/ipv6-xe-3se-3850-cr-book.html Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1421 Additional References Security MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1422 7 1 C H A P T E R Configuring DHCP · Finding Feature Information, on page 1423 · Information About DHCP, on page 1423 · How to Configure DHCP Features, on page 1430 · Configuring DHCP Server Port-Based Address Allocation, on page 1439 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About DHCP DHCP Server The DHCP server assigns IP addresses from specified address pools on a switch or router to DHCP clients and manages them. If the DHCP server cannot give the DHCP client the requested configuration parameters from its database, it forwards the request to one or more secondary DHCP servers defined by the network administrator. The switch can act as a DHCP server. DHCP Relay Agent A DHCP relay agent is a Layer 3 device that forwards DHCP packets between clients and servers. Relay agents forward requests and replies between clients and servers when they are not on the same physical subnet. Relay agent forwarding is different from the normal Layer 2 forwarding, in which IP datagrams are switched transparently between networks. Relay agents receive DHCP messages and generate new DHCP messages to send on output interfaces. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1423 DHCP Snooping Security DHCP Snooping DHCP snooping is a DHCP security feature that provides network security by filtering untrusted DHCP messages and by building and maintaining a DHCP snooping binding database, also referred to as a DHCP snooping binding table. DHCP snooping acts like a firewall between untrusted hosts and DHCP servers. You use DHCP snooping to differentiate between untrusted interfaces connected to the end user and trusted interfaces connected to the DHCP server or another switch. Note For DHCP snooping to function properly, all DHCP servers must be connected to the switch through trusted interfaces. An untrusted DHCP message is a message that is received through an untrusted interface. By default, the switch considers all interfaces untrusted. So, the switch must be configured to trust some interfaces to use DHCP Snooping. When you use DHCP snooping in a service-provider environment, an untrusted message is sent from a device that is not in the service-provider network, such as a customer's switch. Messages from unknown devices are untrusted because they can be sources of traffic attacks. The DHCP snooping binding database has the MAC address, the IP address, the lease time, the binding type, the VLAN number, and the interface information that corresponds to the local untrusted interfaces of a switch. It does not have information regarding hosts interconnected with a trusted interface. In a service-provider network, an example of an interface you might configure as trusted is one connected to a port on a device in the same network. An example of an untrusted interface is one that is connected to an untrusted interface in the network or to an interface on a device that is not in the network. When a switch receives a packet on an untrusted interface and the interface belongs to a VLAN in which DHCP snooping is enabled, the switch compares the source MAC address and the DHCP client hardware address. If the addresses match (the default), the switch forwards the packet. If the addresses do not match, the switch drops the packet. The switch drops a DHCP packet when one of these situations occurs: · A packet from a DHCP server, such as a DHCPOFFER, DHCPACK, DHCPNAK, or DHCPLEASEQUERY packet, is received from outside the network or firewall. · A packet is received on an untrusted interface, and the source MAC address and the DHCP client hardware address do not match. · The switch receives a DHCPRELEASE or DHCPDECLINE broadcast message that has a MAC address in the DHCP snooping binding database, but the interface information in the binding database does not match the interface on which the message was received. · A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is not 0.0.0.0, or the relay agent forwards a packet that includes option-82 information to an untrusted port. If the switch is an aggregation switch supporting DHCP snooping and is connected to an edge switch that is inserting DHCP option-82 information, the switch drops packets with option-82 information when packets are received on an untrusted interface. If DHCP snooping is enabled and packets are received on a trusted port, the aggregation switch does not learn the DHCP snooping bindings for connected devices and cannot build a complete DHCP snooping binding database. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1424 Security Option-82 Data Insertion When an aggregation switch can be connected to an edge switch through an untrusted interface and you enter the ip dhcp snooping information option allow-untrusted global configuration command, the aggregation switch accepts packets with option-82 information from the edge switch. The aggregation switch learns the bindings for hosts connected through an untrusted switch interface. The DHCP security features, such as dynamic ARP inspection or IP source guard, can still be enabled on the aggregation switch while the switch receives packets with option-82 information on untrusted input interfaces to which hosts are connected. The port on the edge switch that connects to the aggregation switch must be configured as a trusted interface. Related Topics Prerequisites for Configuring DHCP Snooping and Option 82, on page 1434 Option-82 Data Insertion In residential, metropolitan Ethernet-access environments, DHCP can centrally manage the IP address assignments for a large number of subscribers. When the DHCP option-82 feature is enabled on the switch, a subscriber device is identified by the switch port through which it connects to the network (in addition to its MAC address). Multiple hosts on the subscriber LAN can be connected to the same port on the access switch and are uniquely identified. Note The DHCP option-82 feature is supported only when DHCP snooping is globally enabled on the VLANs to which subscriber devices using option-82 are assigned. The following illustration shows a metropolitan Ethernet network in which a centralized DHCP server assigns IP addresses to subscribers connected to the switch at the access layer. Because the DHCP clients and their associated DHCP server do not reside on the same IP network or subnet, a DHCP relay agent (the Catalyst switch) is configured with a helper address to enable broadcast forwarding and to transfer DHCP messages between the clients and the server. Figure 81: DHCP Relay Agent in a Metropolitan Ethernet Network When you enable the DHCP snooping information option 82 on the switch, the following sequence of events occurs: · The host (DHCP client) generates a DHCP request and broadcasts it on the network. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1425 Option-82 Data Insertion Security · When the switch receives the DHCP request, it adds the option-82 information in the packet. By default, the remote-ID suboption is the switch MAC address, and the circuit-ID suboption is the port identifier, vlan-mod-port, from which the packet is received.You can configure the remote ID and circuit ID. · If the IP address of the relay agent is configured, the switch adds this IP address in the DHCP packet. · The switch forwards the DHCP request that includes the option-82 field to the DHCP server. · The DHCP server receives the packet. If the server is option-82-capable, it can use the remote ID, the circuit ID, or both to assign IP addresses and implement policies, such as restricting the number of IP addresses that can be assigned to a single remote ID or circuit ID. Then the DHCP server echoes the option-82 field in the DHCP reply. · The DHCP server unicasts the reply to the switch if the request was relayed to the server by the switch. The switch verifies that it originally inserted the option-82 data by inspecting the remote ID and possibly the circuit ID fields. The switch removes the option-82 field and forwards the packet to the switch port that connects to the DHCP client that sent the DHCP request. · In the default suboption configuration, when the described sequence of events occurs, the values in these fields do not change (see the illustration,Suboption Packet Formats): · Circuit-ID suboption fields · Suboption type · Length of the suboption type · Circuit-ID type · Length of the circuit-ID type · Remote-ID suboption fields · Suboption type · Length of the suboption type · Remote-ID type · Length of the remote-ID type In the port field of the circuit ID suboption, the port numbers start at 3. For example, on a switch with 24 10/100/1000 ports and four small form-factor pluggable (SFP) module slots, port 3 is the Gigabit Ethernet 1/0/1 port, port 4 is the Gigabit Ethernet 1/0/2 port, and so forth. Port 27 is the SFP module slot Gigabit Ethernet1/0/25, and so forth. The illustration, Suboption Packet Formats. shows the packet formats for the remote-ID suboption and the circuit-ID suboption when the default suboption configuration is used. For the circuit-ID suboption, the module number corresponds to the switch number in the stack. The switch uses the packet formats when you globally enable DHCP snooping and enter the ip dhcp snooping information option global configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1426 Security Figure 82: Suboption Packet Formats Option-82 Data Insertion The illustration, User-Configured Suboption Packet Formats, shows the packet formats for user-configured remote-ID and circuit-ID suboptions The switch uses these packet formats when DHCP snooping is globally enabled and when the ip dhcp snooping information option format remote-id global configuration command and theip dhcp snooping vlan information option format-type circuit-id string interface configuration command are entered. The values for these fields in the packets change from the default values when you configure the remote-ID and circuit-ID suboptions: · Circuit-ID suboption fields · The circuit-ID type is 1. · The length values are variable, depending on the length of the string that you configure. · Remote-ID suboption fields · The remote-ID type is 1. · The length values are variable, depending on the length of the string that you configure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1427 Cisco IOS DHCP Server Database Figure 83: User-Configured Suboption Packet Formats Security Cisco IOS DHCP Server Database During the DHCP-based autoconfiguration process, the designated DHCP server uses the Cisco IOS DHCP server database. It has IP addresses, address bindings, and configuration parameters, such as the boot file. An address binding is a mapping between an IP address and a MAC address of a host in the Cisco IOS DHCP server database. You can manually assign the client IP address, or the DHCP server can allocate an IP address from a DHCP address pool. For more information about manual and automatic address bindings, see the "Configuring DHCP" chapter of the Cisco IOS IP Configuration Guide, Release 12.4. For procedures to enable and configure the Cisco IOS DHCP server database, see the "DHCP Configuration Task List" section in the "Configuring DHCP" chapter of the Cisco IOS IP Configuration Guide, Release 12.4. DHCP Snooping Binding Database When DHCP snooping is enabled, the switch uses the DHCP snooping binding database to store information about untrusted interfaces. The database can have up to 64,000 bindings. Each database entry (binding) has an IP address, an associated MAC address, the lease time (in hexadecimal format), the interface to which the binding applies, and the VLAN to which the interface belongs. The database agent stores the bindings in a file at a configured location. At the end of each entry is a checksum that accounts for all the bytes from the start of the file through all the bytes associated with the entry. Each entry is 72 bytes, followed by a space and then the checksum value. To keep the bindings when the switch reloads, you must use the DHCP snooping database agent. If the agent is disabled, dynamic ARP inspection or IP source guard is enabled, and the DHCP snooping binding database has dynamic bindings, the switch loses its connectivity. If the agent is disabled and only DHCP snooping is enabled, the switch does not lose its connectivity, but DHCP snooping might not prevent DHCP spoofing attacks. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1428 Security DHCP Snooping and Switch Stacks When reloading, the switch reads the binding file to build the DHCP snooping binding database. The switch updates the file when the database changes. When a switch learns of new bindings or when it loses bindings, the switch immediately updates the entries in the database. The switch also updates the entries in the binding file. The frequency at which the file is updated is based on a configurable delay, and the updates are batched. If the file is not updated in a specified time (set by the write-delay and abort-timeout values), the update stops. This is the format of the file with bindings: <initial-checksum> TYPE DHCP-SNOOPING VERSION 1 BEGIN <entry-1> <checksum-1> <entry-2> <checksum-1-2> ... ... <entry-n> <checksum-1-2-..-n> END Each entry in the file is tagged with a checksum value that the switch uses to verify the entries when it reads the file. The initial-checksum entry on the first line distinguishes entries associated with the latest file update from entries associated with a previous file update. This is an example of a binding file: 2bb4c2a1 TYPE DHCP-SNOOPING VERSION 1 BEGIN 192.1.168.1 3 0003.47d8.c91f 2BB6488E Gi1/0/4 21ae5fbb 192.1.168.3 3 0003.44d6.c52f 2BB648EB Gi1/0/4 1bdb223f 192.1.168.2 3 0003.47d9.c8f1 2BB648AB Gi1/0/4 584a38f0 END When the switch starts and the calculated checksum value equals the stored checksum value, the switch reads entries from the binding file and adds the bindings to its DHCP snooping binding database. The switch ignores an entry when one of these situations occurs: · The switch reads the entry and the calculated checksum value does not equal the stored checksum value. The entry and the ones following it are ignored. · An entry has an expired lease time (the switch might not remove a binding entry when the lease time expires). · The interface in the entry no longer exists on the system. · The interface is a routed interface or a DHCP snooping-trusted interface. DHCP Snooping and Switch Stacks DHCP snooping is managed on the stack master. When a new switch joins the stack, the switch receives the DHCP snooping configuration from the stack master. When a member leaves the stack, all DHCP snooping address bindings associated with the switch age out. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1429 How to Configure DHCP Features Security All snooping statistics are generated on the stack master. If a new stack master is elected, the statistics counters reset. When a stack merge occurs, all DHCP snooping bindings in the stack master are lost if it is no longer the stack master. With a stack partition, the existing stack master is unchanged, and the bindings belonging to the partitioned switches age out. The new master of the partitioned stack begins processing the new incoming DHCP packets. How to Configure DHCP Features Default DHCP Snooping Configuration Table 126: Default DHCP Configuration Feature Default Setting DHCP server DHCP relay agent Enabled in Cisco IOS software, requires configuration15 Enabled16 DHCP packet forwarding address None configured Checking the relay agent information Enabled (invalid messages are dropped) DHCP relay agent forwarding policy Replace the existing relay agent information DHCP snooping enabled globally Disabled DHCP snooping information option Enabled DHCP snooping option to accept packets on untrusted Disabled input interfaces17 DHCP snooping limit rate None configured DHCP snooping trust Untrusted DHCP snooping VLAN Disabled DHCP snooping MAC address verification Enabled Cisco IOS DHCP server binding database Enabled in Cisco IOS software, requires configuration. Note The switch gets network addresses and configuration parameters only from a device configured as a DHCP server. DHCP snooping binding database agent Enabled in Cisco IOS software, requires configuration. This feature is operational only when a destination is configured. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1430 Security DHCP Snooping Configuration Guidelines 15 The switch responds to DHCP requests only if it is configured as a DHCP server. 16 The switch relays DHCP packets only if the IP address of the DHCP server is configured on the SVI of the DHCP client. 17 Use this feature when the switch is an aggregation switch that receives packets with option-82 information from an edge switch. DHCP Snooping Configuration Guidelines · If a switch port is connected to a DHCP server, configure a port as trusted by entering the ip dhcp snooping trust interface configuration command. · If a switch port is connected to a DHCP client, configure a port as untrusted by entering the no ip dhcp snooping trust interface configuration command. · You can display DHCP snooping statistics by entering the show ip dhcp snooping statistics user EXEC command, and you can clear the snooping statistics counters by entering the clear ip dhcp snooping statistics privileged EXEC command. Configuring the DHCP Server The switch can act as a DHCP server. For procedures to configure the switch as a DHCP server, see the "Configuring DHCP" section of the "IP addressing and Services" section of the Cisco IOS IP Configuration Guide, Release 12.4. DHCP Server and Switch Stacks The DHCP binding database is managed on the stack master. When a new stack master is assigned, the new master downloads the saved binding database from the TFTP server. If the stack master fails, all unsaved bindings are lost. The IP addresses associated with the lost bindings are released. You should configure an automatic backup by using the ip dhcp database url [timeout seconds | write-delay seconds] global configuration command. When a stack merge occurs, the stack master that becomes a stack member loses all of the DHCP lease bindings. With a stack partition, the new master in the partition acts as a new DHCP server without any of the existing DHCP lease bindings. Configuring the DHCP Relay Agent Beginning in privileged EXEC mode, follow these steps to enable the DHCP relay agent on the switch: SUMMARY STEPS 1. configure terminal 2. service dhcp 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1431 Specifying the Packet Forwarding Address Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 Step 3 service dhcp Example: Switch(config)# service dhcp end Example: Switch(config)# end Purpose Enters the global configuration mode. Enables the DHCP server and relay agent on your switch. By default, this feature is enabled. Returns to privileged EXEC mode. What to do next See the "Configuring DHCP" section of the "IP Addressing and Services" section of the Cisco IOS IP Configuration Guide, Release 12.4 for these procedures: · Checking (validating) the relay agent information · Configuring the relay agent forwarding policy Specifying the Packet Forwarding Address If the DHCP server and the DHCP clients are on different networks or subnets, you must configure the switch with the ip helper-address address interface configuration command. The general rule is to configure the command on the Layer 3 interface closest to the client. The address used in the ip helper-address command can be a specific DHCP server IP address, or it can be the network address if other DHCP servers are on the destination network segment. Using the network address enables any DHCP server to respond to requests. Beginning in privileged EXEC mode, follow these steps to specify the packet forwarding address: SUMMARY STEPS 1. configure terminal 2. interface vlan vlan-id 3. ip address ip-address subnet-mask 4. ip helper-address address 5. end 6. interface range port-range or interface interface-id 7. switchport mode access 8. switchport access vlan vlan-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1432 Security Specifying the Packet Forwarding Address 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 interface vlan vlan-id Example: Creates a switch virtual interface by entering a VLAN ID, and enter interface configuration mode. Switch(config)# interface vlan 1 ip address ip-address subnet-mask Example: Configures the interface with an IP address and an IP subnet. Switch(config-if)# ip address 192.108.1.27 255.255.255.0 ip helper-address address Example: Switch(config-if)# ip helper-address 172.16.1.2 Specifies the DHCP packet forwarding address. The helper address can be a specific DHCP server address, or it can be the network address if other DHCP servers are on the destination network segment. Using the network address enables other servers to respond to DHCP requests. If you have multiple servers, you can configure one helper address for each server. end Example: Returns to global configuration mode. Switch(config-if)# end interface range port-range or interface interface-id Example: Switch(config)# interface gigabitethernet1/0/2 switchport mode access Example: Configures multiple physical ports that are connected to the DHCP clients, and enter interface range configuration mode. or Configures a single physical port that is connected to the DHCP client, and enter interface configuration mode. Defines the VLAN membership mode for the port. Switch(config-if)# switchport mode access switchport access vlan vlan-id Example: Assigns the ports to the same VLAN as configured in Step 2. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1433 Prerequisites for Configuring DHCP Snooping and Option 82 Security Step 9 Command or Action Switch(config-if)# switchport access vlan 1 end Example: Switch(config-if)# end Purpose Returns to privileged EXEC mode. Prerequisites for Configuring DHCP Snooping and Option 82 The prerequisites for DHCP Snooping and Option 82 are as follows: · Before configuring the DHCP snooping information option on your switch, be sure to configure the device that is acting as the DHCP server. You must specify the IP addresses that the DHCP server can assign or exclude, or you must configure DHCP options for these devices. · For DHCP snooping to function properly, all DHCP servers must be connected to the switch through trusted interfaces. · Before configuring the DHCP relay agent on your switch, make sure to configure the device that is acting as the DHCP server. You must specify the IP addresses that the DHCP server can assign or exclude, configure DHCP options for devices, or set up the DHCP database agent. · The following prerequisites apply to DHCP snooping binding database configuration: · Because both NVRAM and the flash memory have limited storage capacity, we recommend that you store the binding file on a TFTP server. · For network-based URLs (such as TFTP and FTP), you must create an empty file at the configured URL before the switch can write bindings to the binding file at that URL. See the documentation for your TFTP server to determine whether you must first create an empty file on the server; some TFTP servers cannot be configured this way. · To ensure that the lease time in the database is accurate, we recommend that you enable and configure Network Time Protocol (NTP). · If NTP is configured, the switch writes binding changes to the binding file only when the switch system clock is synchronized with NTP. · If you want the switch to respond to DHCP requests, it must be configured as a DHCP server. · If you want the switch to relay DHCP packets, the IP address of the DHCP server must be configured on the switch virtual interface (SVI) of the DHCP client. · To use the DHCP snooping option of accepting packets on untrusted inputs, the switch must be an aggregation switch that receives packets with option-82 information from an edge switch. · ***************** · The following two list items should be checked for technical accuracy by a subject matter expert: · You must configure the switch to use the Cisco IOS DHCP server binding database to use it for DHCP snooping. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1434 Security Enabling DHCP Snooping and Option 82 · You must configure a destination on the DHCP snooping binding database to use the switch for DHCP snooping. · For DHCP snooping to function properly, all DHCP servers must be connected to the switch through trusted interfaces. In a service-provider network, a trusted interface is connected to a port on a device in the same network. · You must globally enable DHCP snooping on the switch. · Before globally enabling DHCP snooping on the switch, make sure that the devices acting as the DHCP server and the DHCP relay agent are configured and enabled. · When you configure DHCP snooping smart logging, the contents of packets dropped by DHCP are sent to a NetFlow collector. If you configure this feature, make sure that smart logging is globally enabled. Note Do not enable Dynamic Host Configuration Protocol (DHCP) snooping on RSPAN VLANs. If DHCP snooping is enabled on RSPAN VLANs, DHCP packets might not reach the RSPAN destination port. Related Topics DHCP Snooping, on page 1424 Enabling DHCP Snooping and Option 82 Beginning in privileged EXEC mode, follow these steps to enable DHCP snooping on the switch: SUMMARY STEPS 1. configure terminal 2. ip dhcp snooping 3. ip dhcp snooping vlan vlan-range [smartlog] 4. ip dhcp snooping information option 5. ip dhcp snooping information option format remote-id [string ASCII-string | hostname] 6. ip dhcp snooping information option allow-untrusted 7. interface interface-id 8. ip dhcp snooping vlan vlan information option format-type circuit-id [override] string ASCII-string 9. ip dhcp snooping trust 10. ip dhcp snooping limit rate rate 11. exit 12. ip dhcp snooping verify mac-address 13. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1435 Enabling DHCP Snooping and Option 82 Security Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Switch# configure terminal Purpose ip dhcp snooping Example: Enables DHCP snooping globally. Switch(config)# ip dhcp snooping ip dhcp snooping vlan vlan-range [smartlog] Example: Switch(config)# ip dhcp snooping vlan 10 Enables DHCP snooping on a VLAN or range of VLANs. The range is 1 to 4094. · You can enter a single VLAN ID identified by VLAN ID number, a series of VLAN IDs separated by commas, a range of VLAN IDs separated by hyphens, or a range of VLAN IDs separated by entering the starting and ending VLAN IDs separated by a space. · (Optional) Enter smartlog to configure the switch to send the contents of dropped packets to a NetFlow collector. ip dhcp snooping information option Example: Enables the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages to the DHCP server. This is the default setting. Switch(config)# ip dhcp snooping information option ip dhcp snooping information option format remote-id (Optional) Configures the remote-ID suboption. [string ASCII-string | hostname] You can configure the remote ID as: Example: · String of up to 63 ASCII characters (no spaces) Switch(config)# ip dhcp snooping information option format remote-id string acsiistring2 · Configured hostname for the switch Note If the hostname is longer than 63 characters, it is truncated to 63 characters in the remote-ID configuration. The default remote ID is the switch MAC address. ip dhcp snooping information option allow-untrusted Example: Switch(config)# ip dhcp snooping information option allow-untrusted (Optional) If the switch is an aggregation switch connected to an edge switch, this command enables the switch to accept incoming DHCP snooping packets with option-82 information from the edge switch. The default setting is disabled. Note Enter this command only on aggregation switches that are connected to trusted devices. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1436 Security Enabling DHCP Snooping and Option 82 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action interface interface-id Example: Purpose Specifies the interface to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 ip dhcp snooping vlan vlan information option (Optional) Configures the circuit-ID suboption for the format-type circuit-id [override] string ASCII-string specified interface. Example: Specify the VLAN and port identifier, using a VLAN ID in the range of 1 to 4094. The default circuit ID is the port Switch(config-if)# ip dhcp snooping vlan 1 identifier, in the format vlan-mod-port. information option format-type curcuit-id override string ovrride2 You can configure the circuit ID to be a string of 3 to 63 ASCII characters (no spaces). (Optional) Use the override keyword when you do not want the circuit-ID suboption inserted in TLV format to define subscriber information. ip dhcp snooping trust Example: Switch(config-if)# ip dhcp snooping trust (Optional) Configures the interface as trusted or untrusted. Use the no keyword to configure an interface to receive messages from an untrusted client. The default setting is untrusted. ip dhcp snooping limit rate rate Example: Switch(config-if)# ip dhcp snooping limit rate 100 (Optional) Configures the number of DHCP packets per second that an interface can receive. The range is 1 to 2048. By default, no rate limit is configured. Note We recommend an untrusted rate limit of not more than 100 packets per second. If you configure rate limiting for trusted interfaces, you might need to increase the rate limit if the port is a trunk port assigned to more than one VLAN with DHCP snooping. exit Example: Returns to global configuration mode. Switch(config-if)# exit ip dhcp snooping verify mac-address Example: Switch(config)# ip dhcp snooping verify mac-address end Example: (Optional) Configures the switch to verify that the source MAC address in a DHCP packet received on untrusted ports matches the client hardware address in the packet. The default is to verify that the source MAC address matches the client hardware address in the packet. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1437 Enabling the Cisco IOS DHCP Server Database Security Command or Action Switch(config)# end Purpose Enabling DHCP Snooping on Private VLANs You can enable DHCP snooping on private VLANs. If DHCP snooping is enabled, the configuration is propagated to both a primary VLAN and its associated secondary VLANs. If DHCP snooping is enabled on the primary VLAN, it is also configured on the secondary VLANs. If DHCP snooping is already configured on the primary VLAN and you configure DHCP snooping with different settings on a secondary VLAN, the configuration for the secondary VLAN does not take effect. You must configure DHCP snooping on the primary VLAN. If DHCP snooping is not configured on the primary VLAN, this message appears when you are configuring DHCP snooping on the secondary VLAN, such as VLAN 200: 2w5d:%DHCP_SNOOPING-4-DHCP_SNOOPING_PVLAN_WARNING:DHCP Snooping configuration may not take effect on secondary vlan 200. DHCP Snooping configuration on secondary vlan is derived from its primary vlan. The show ip dhcp snooping privileged EXEC command output shows all VLANs, including primary and secondary private VLANs, on which DHCP snooping is enabled. Enabling the Cisco IOS DHCP Server Database For procedures to enable and configure the Cisco IOS DHCP server database, see the "DHCP Configuration Task List" section in the "Configuring DHCP" chapter of the Cisco IOS IP Configuration Guide, Release 12.4 Monitoring DHCP Snooping Information Table 127: Commands for Displaying DHCP Information show ip dhcp snooping show ip dhcp snooping binding show ip dhcp snooping database show ip dhcp snooping statistics show ip source binding Displays the DHCP snooping configuration for a switch Displays only the dynamically configured bindings in the DHCP snooping binding database, also referred to as a binding table. Displays the DHCP snooping binding database status and statistics. Displays the DHCP snooping statistics in summary or detail form. Display the dynamically and statically configured bindings. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1438 Security Configuring DHCP Server Port-Based Address Allocation Note If DHCP snooping is enabled and an interface changes to the down state, the switch does not delete the statically configured bindings. Configuring DHCP Server Port-Based Address Allocation Information About Configuring DHCP Server Port-Based Address Allocation DHCP server port-based address allocation is a feature that enables DHCP to maintain the same IP address on an Ethernet switch port regardless of the attached device client identifier or client hardware address. When Ethernet switches are deployed in the network, they offer connectivity to the directly connected devices. In some environments, such as on a factory floor, if a device fails, the replacement device must be working immediately in the existing network. With the current DHCP implementation, there is no guarantee that DHCP would offer the same IP address to the replacement device. Control, monitoring, and other software expect a stable IP address associated with each device. If a device is replaced, the address assignment should remain stable even though the DHCP client has changed. When configured, the DHCP server port-based address allocation feature ensures that the same IP address is always offered to the same connected port even as the client identifier or client hardware address changes in the DHCP messages received on that port. The DHCP protocol recognizes DHCP clients by the client identifier option in the DHCP packet. Clients that do not include the client identifier option are identified by the client hardware address. When you configure this feature, the port name of the interface overrides the client identifier or hardware address and the actual point of connection, the switch port, becomes the client identifier. In all cases, by connecting the Ethernet cable to the same port, the same IP address is allocated through DHCP to the attached device. The DHCP server port-based address allocation feature is only supported on a Cisco IOS DHCP server and not a third-party server. Default Port-Based Address Allocation Configuration By default, DHCP server port-based address allocation is disabled. Port-Based Address Allocation Configuration Guidelines · By default, DHCP server port-based address allocation is disabled. · To restrict assignments from the DHCP pool to preconfigured reservations (unreserved addresses are not offered to the client and other clients are not served by the pool), you can enter the reserved-only DHCP pool configuration command. Enabling the DHCP Snooping Binding Database Agent Beginning in privileged EXEC mode, follow these steps to enable and configure the DHCP snooping binding database agent on the switch: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1439 Enabling the DHCP Snooping Binding Database Agent Security SUMMARY STEPS 1. configure terminal 2. ip dhcp snooping database {flash[number]:/filename | ftp://user:password@host/filename | http://[[username:password]@]{hostname | host-ip}[/directory] /image-name.tar | rcp://user@host/filename}| tftp://host/filename 3. ip dhcp snooping database timeout seconds 4. ip dhcp snooping database write-delay seconds 5. end 6. ip dhcp snooping binding mac-address vlan vlan-id ip-address interface interface-id expiry seconds DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 Step 4 Step 5 ip dhcp snooping database {flash[number]:/filename | ftp://user:password@host/filename | http://[[username:password]@]{hostname | host-ip}[/directory] /image-name.tar | rcp://user@host/filename}| tftp://host/filename Example: Switch(config)# ip dhcp snooping database tftp://10.90.90.90/snooping-rp2 Specifies the URL for the database agent or the binding file by using one of these forms: · flash[number]:/filename (Optional) Use the number parameter to specify the stack member number of the stack master. The range for number is 1 to 9. · ftp://user:password@host/filename · http://[[username:password]@]{hostname | host-ip}[/directory] /image-name.tar · rcp://user@host/filename · tftp://host/filename ip dhcp snooping database timeout seconds Specifies (in seconds) how long to wait for the database Example: transfer process to finish before stopping the process. The default is 300 seconds. The range is 0 to 86400. Use 0 Switch(config)# ip dhcp snooping database timeout to define an infinite duration, which means to continue 300 trying the transfer indefinitely. ip dhcp snooping database write-delay seconds Example: Switch(config)# ip dhcp snooping database write-delay 15 Specifies the duration for which the transfer should be delayed after the binding database changes. The range is from 15 to 86400 seconds. The default is 300 seconds (5 minutes). end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1440 Security Enabling DHCP Server Port-Based Address Allocation Command or Action Switch(config)# end Purpose Step 6 ip dhcp snooping binding mac-address vlan vlan-id ip-address interface interface-id expiry seconds Example: Switch# ip dhcp snooping binding 0001.1234.1234 vlan 1 172.20.50.5 interface gi1/1 expiry 1000 (Optional) Adds binding entries to the DHCP snooping binding database. The vlan-id range is from 1 to 4904. The seconds range is from 1 to 4294967295. Enter this command for each entry that you add. Use this command when you are testing or debugging the switch. Enabling DHCP Server Port-Based Address Allocation Beginning in privileged EXEC mode, follow these steps to globally enable port-based address allocation and to automatically generate a subscriber identifier on an interface. SUMMARY STEPS 1. configure terminal 2. ip dhcp use subscriber-id client-id 3. ip dhcp subscriber-id interface-name 4. interface interface-id 5. ip dhcp server use subscriber-id client-id 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 ip dhcp use subscriber-id client-id Example: Configures the DHCP server to globally use the subscriber identifier as the client identifier on all incoming DHCP messages. Switch(config)# ip dhcp use subscriber-id client-id ip dhcp subscriber-id interface-name Example: Switch(config)# ip dhcp subscriber-id interface-name Automatically generates a subscriber identifier based on the short name of the interface. A subscriber identifier configured on a specific interface takes precedence over this command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1441 Monitoring DHCP Server Port-Based Address Allocation Security Step 4 Step 5 Step 6 Command or Action interface interface-id Example: Purpose Specifies the interface to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 ip dhcp server use subscriber-id client-id Example: Configures the DHCP server to use the subscriber identifier as the client identifier on all incoming DHCP messages on the interface. Switch(config-if)# ip dhcp server use subscriber-id client-id end Example: Returns to privileged EXEC mode. Switch(config)# end Monitoring DHCP Server Port-Based Address Allocation Table 128: Commands for Displaying DHCP Port-Based Address Allocation Information Command show interface interface id show ip dhcp pool show ip dhcp binding Purpose Displays the status and configuration of a specific interface. Displays the DHCP address pools. Displays address bindings on the Cisco IOS DHCP server. Additional References Related Documents Related Topic Document Title DHCP IP Addressing: DHCP Configuration Guide, Cisco IOS XE Release 3S Configuration Information http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_dhcp/configuration/xe-3s/dhcp-xe-3s-book.html and Procedures Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1442 Security Feature Information for DHCP Snooping and Option 82 Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for DHCP Snooping and Option 82 Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1443 Feature Information for DHCP Snooping and Option 82 Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1444 7 2 C H A P T E R Configuring IP Source Guard IP Source Guard (IPSG) is a security feature that restricts IP traffic on nonrouted, Layer 2 interfaces by filtering traffic based on the DHCP snooping binding database and on manually configured IP source bindings. This chapter contains the following topics: · Finding Feature Information, on page 1445 · Information About IP Source Guard, on page 1445 · How to Configure IP Source Guard, on page 1447 · Monitoring IP Source Guard, on page 1453 · Additional References, on page 1454 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About IP Source Guard IP Source Guard You can use IP source guard to prevent traffic attacks if a host tries to use the IP address of its neighbor and you can enable IP source guard when DHCP snooping is enabled on an untrusted interface. After IPSG is enabled on an interface, the switch blocks all IP traffic received on the interface except for DHCP packets allowed by DHCP snooping. The switch uses a source IP lookup table in hardware to bind IP addresses to ports. For IP and MAC filtering, a combination of source IP and source MAC lookups are used. IP traffic with a source IP address is the binding table is allowed, all other traffic is denied. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1445 IP Source Guard for Static Hosts Security The IP source binding table has bindings that are learned by DHCP snooping or are manually configured (static IP source bindings). An entry in this table has an IP address, its associated MAC address, and its associated VLAN number. The switch uses the IP source binding table only when IP source guard is enabled. IPSG is supported only on Layer 2 ports, including access and trunk ports. You can configure IPSG with source IP address filtering or with source IP and MAC address filtering. IP Source Guard for Static Hosts Note Do not use IPSG (IP source guard) for static hosts on uplink ports or trunk ports. IPSG for static hosts extends the IPSG capability to non-DHCP and static environments. The previous IPSG used the entries created by DHCP snooping to validate the hosts connected to a switch. Any traffic received from a host without a valid DHCP binding entry is dropped. This security feature restricts IP traffic on nonrouted Layer 2 interfaces. It filters traffic based on the DHCP snooping binding database and on manually configured IP source bindings. The previous version of IPSG required a DHCP environment for IPSG to work. IPSG for static hosts allows IPSG to work without DHCP. IPSG for static hosts relies on IP device tracking-table entries to install port ACLs. The switch creates static entries based on ARP requests or other IP packets to maintain the list of valid hosts for a given port. You can also specify the number of hosts allowed to send traffic to a given port. This is equivalent to port security at Layer 3. IPSG for static hosts also supports dynamic hosts. If a dynamic host receives a DHCP-assigned IP address that is available in the IP DHCP snooping table, the same entry is learned by the IP device tracking table. In a stacked environment, when the master failover occurs, the IP source guard entries for static hosts attached to member ports are retained. When you enter the show ip device tracking all EXEC command, the IP device tracking table displays the entries as ACTIVE. Note Some IP hosts with multiple network interfaces can inject some invalid packets into a network interface. The invalid packets contain the IP or MAC address for another network interface of the host as the source address. The invalid packets can cause IPSG for static hosts to connect to the host, to learn the invalid IP or MAC address bindings, and to reject the valid bindings. Consult the vender of the corresponding operating system and the network interface to prevent the host from injecting invalid packets. IPSG for static hosts initially learns IP or MAC bindings dynamically through an ACL-based snooping mechanism. IP or MAC bindings are learned from static hosts by ARP and IP packets. They are stored in the device tracking database. When the number of IP addresses that have been dynamically learned or statically configured on a given port reaches a maximum, the hardware drops any packet with a new IP address. To resolve hosts that have moved or gone away for any reason, IPSG for static hosts leverages IP device tracking to age out dynamically learned IP address bindings. This feature can be used with DHCP snooping. Multiple bindings are established on a port that is connected to both DHCP and static hosts. For example, bindings are stored in both the device tracking database as well as in the DHCP snooping binding database. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1446 Security IP Source Guard Configuration Guidelines IP Source Guard Configuration Guidelines · You can configure static IP bindings only on nonrouted ports. If you enter the ip source binding mac-address vlan vlan-id ip-address interface interface-id global configuration command on a routed interface, this error message appears: Static IP source binding can only be configured on switch port. · When IP source guard with source IP filtering is enabled on an interface, DHCP snooping must be enabled on the access VLAN for that interface. · If you are enabling IP source guard on a trunk interface with multiple VLANs and DHCP snooping is enabled on all the VLANs, the source IP address filter is applied on all the VLANs. Note If IP source guard is enabled and you enable or disable DHCP snooping on a VLAN on the trunk interface, the switch might not properly filter traffic. · You can enable this feature when 802.1x port-based authentication is enabled. · When you configure IP source guard smart logging, packets with a source address other than the specified address or an address learned by DHCP are denied, and the packet contents are sent to a NetFlow collector. If you configure this feature, make sure that smart logging is globally enabled. · In a switch stack, if IP source guard is configured on a stack member interface and you remove the the configuration of that switch by entering the no switch stack-member-number provision global configuration command, the interface static bindings are removed from the binding table, but they are not removed from the running configuration. If you again provision the switch by entering the switch stack-member-number provision command, the binding is restored. To remove the binding from the running configuration, you must disable IP source guard before entering the no switch provision command. The configuration is also removed if the switch reloads while the interface is removed from the binding table. How to Configure IP Source Guard Enabling IP Source Guard SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. ip verify source [mac-check ] 4. Use one of the following: · ip verify source[smartlog] · ip verify source port-security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1447 Enabling IP Source Guard Security 5. exit 6. ip source binding mac-address vlan vlan-id ip-address interface interface-id 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the interface to be configured, and enters interface configuration mode. Switch(config)# interface gigabitethernet 1/0/1 Step 3 ip verify source [mac-check ] Example: Switch(config-if)# ip verify source Enables IP source guard with source IP address filtering. (Optional) mac-check--Enables IP Source Guard with source IP address and MAC address filtering. Step 4 Step 5 Use one of the following: Enables IP source guard with source IP address filtering. · ip verify source[smartlog] · ip verify source port-security Example: · (Optional) Enter smartlog to configure the switch to send the contents of dropped packets to a NetFlow collector. Switch(config-if)# ip verify source Enables IP source guard with source IP and MAC address filtering. or When you enable both IP source guard and port security Switch(config-if)# ip verify source port-security by using the ip verify source port-security interface configuration command, there are two caveats: · The DHCP server must support option 82, or the client is not assigned an IP address. · The MAC address in the DHCP packet is not learned as a secure address. The MAC address of the DHCP client is learned as a secure address only when the switch receives non-DHCP data traffic. exit Example: Returns to global configuration mode. Switch(config-if)# exit Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1448 Security Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port Step 6 Command or Action ip source binding mac-address vlan vlan-id ip-address interface interface-id Example: Purpose Adds a static IP source binding. Enter this command for each static binding. Switch(config)# ip source binding 0100.0230.0002 vlan 11 10.0.0.4 interface gigabitethernet1/0/1 Step 7 end Example: Switch(config)# end Returns to privileged EXEC mode. Enabling IP source guard with source IP and MAC filtering on VLANs 10 and 11 Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface gigabitethernet 1/0/1 Switch(config-if)# ip verify source Switch(config-if)# exit Switch(config)# ip source binding 0100.0022.0010 vlan 10 10.0.0.2 interface gigabitethernet 1/0/1 Switch(config)# ip source binding 0100.0230.0002 vlan 11 10.0.0.4 interface gigabitethernet 1/0/1 Switch(config)# end Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port You must configure the ip device tracking maximum limit-number interface configuration command globally for IPSG for static hosts to work. If you only configure this command on a port without enabling IP device tracking globally or by setting an IP device tracking maximum on that interface, IPSG with static hosts rejects all the IP traffic from that interface. This requirement also applies to IPSG with static hosts on a private VLAN host port. SUMMARY STEPS 1. configure terminal 2. ip device tracking 3. interface interface-id 4. switchport mode access 5. switchport access vlan vlan-id 6. ip verify source[tracking] [mac-check ] 7. ip device tracking maximum number 8. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1449 Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 ip device tracking Example: Switch(config)# ip device tracking Turns on the IP host table, and globally enables IP device tracking. Step 3 interface interface-id Example: Enters interface configuration mode. Switch(config)# interface gigabitethernet 1/0/1 Step 4 switchport mode access Example: Switch(config-if)# switchport mode access Configures a port as access. Step 5 switchport access vlan vlan-id Example: Switch(config-if)# switchport access vlan 10 Configures the VLAN for this port. Step 6 Step 7 ip verify source[tracking] [mac-check ] Example: Switch(config-if)# ip verify source tracking mac-check ip device tracking maximum number Example: Switch(config-if)# ip device tracking maximum 8 Enables IP source guard with source IP address filtering. (Optional) tracking--Enables IP source guard for static hosts. (Optional) mac-check--Enables MAC address filtering. The command ip verify source tracking mac-checkenables IP source guard for static hosts with MAC address filtering. Establishes a maximum limit for the number of static IPs that the IP device tracking table allows on the port. The range is 1to 10. The maximum number is 10. Note You must configure the ip device tracking maximum limit-number interface configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1450 Security Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port Step 8 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Eight Examples This example shows how to stop IPSG with static hosts on an interface. Switch(config-if)# no ip verify source Switch(config-if)# no ip device tracking max This example shows how to enable IPSG with static hosts on a port. Switch(config)# ip device tracking Switch(config-if)# ip device tracking maximum 10 Switch(config-if)# ip verify source tracking This example shows how to enable IPSG for static hosts with IP filters on a Layer 2 access port and to verify the valid IP bindings on the interface Gi1/0/3: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip device tracking Switch(config)# interface gigabitethernet1/0/3 Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan 10 Switch(config-if)# ip device tracking maximum 5 Switch(config-if)# ip verify source tracking Switch(config-if)# end Switch# show ip verify source Interface Filter-type Filter-mode --------- ----------- ----------- Gi1/0/3 ip trk active Gi1/0/3 ip trk active Gi1/0/3 ip trk active IP-address --------------- 40.1.1.24 40.1.1.20 40.1.1.21 Mac-address ----------------- Vlan ---- 10 10 10 This example shows how to enable IPSG for static hosts with IP-MAC filters on a Layer 2 access port, to verify the valid IP-MAC bindings on the interface Gi1/0/3, and to verify that the number of bindings on this interface has reached the maximum: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip device tracking Switch(config)# interface gigabitethernet1/0/3 Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan 1 Switch(config-if)# ip device tracking maximum 5 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1451 Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port Security Switch(config-if)# ip verify source tracking Switch(config-if)# end Switch# show ip verify source Interface Filter-type Filter-mode --------- ----------- ----------- Gi1/0/3 ip trk active IP-address --------------- deny-all Mac-address ----------------- Vlan ---- 1 This example displays all IP or MAC binding entries for all interfaces. The CLI displays all active as well as inactive entries. When a host is learned on a interface, the new entry is marked as active. When the same host is disconnected from that interface and connected to a different interface, a new IP or MAC binding entry displays as active as soon as the host is detected. The old entry for this host on the previous interface is marked as INACTIVE. Switch# show ip device tracking all IP Device Tracking for wireless clients = Enabled Global IP Device Tracking for wired clients = Enabled Global IP Device Tracking Probe Count = 3 Global IP Device Tracking Probe Interval = 30 ----------------------------------------------------------------------------------------------- IP Address MAC Address Vlan Interface Probe-Timeout STATE ----------------------------------------------------------------------------------------------- 200.1.1.8 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.9 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.10 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.1 0001.0600.0000 9 GigabitEthernet1/0/2 ACTIVE 200.1.1.1 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.2 0001.0600.0000 9 GigabitEthernet1/0/2 ACTIVE 200.1.1.2 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.3 0001.0600.0000 9 GigabitEthernet1/0/2 ACTIVE 200.1.1.3 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.4 0001.0600.0000 9 GigabitEthernet1/0/2 ACTIVE 200.1.1.4 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.5 0001.0600.0000 9 GigabitEthernet1/0/2 ACTIVE 200.1.1.5 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.6 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.7 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE This example displays all active IP or MAC binding entries for all interfaces: Switch# show ip device tracking all active IP Device Tracking for wireless clients = Enabled Global IP Device Tracking for wired clients = Enabled Global IP Device Tracking Probe Count = 3 Global IP Device Tracking Probe Interval = 30 ----------------------------------------------------------------------------------------------- IP Address MAC Address Vlan Interface Probe-Timeout STATE ----------------------------------------------------------------------------------------------- 200.1.1.1 0001.0600.0000 9 GigabitEthernet1/0/1 ACTIVE 200.1.1.2 0001.0600.0000 9 GigabitEthernet1/0/1 ACTIVE 200.1.1.3 0001.0600.0000 9 GigabitEthernet1/0/1 ACTIVE 200.1.1.4 0001.0600.0000 9 GigabitEthernet1/0/1 ACTIVE 200.1.1.5 0001.0600.0000 9 GigabitEthernet1/0/1 ACTIVE This example displays all inactive IP or MAC binding entries for all interfaces. The host was first learned on GigabitEthernet 1/0/1 and then moved to GigabitEthernet 0/2. the IP or MAC binding entries learned on GigabitEthernet1/ 0/1 are marked as inactive. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1452 Security Monitoring IP Source Guard Switch# show ip device tracking all inactive IP Device Tracking for wireless clients = Enabled Global IP Device Tracking for wired clients= Enabled Global IP Device Tracking Probe Count = 3 Global IP Device Tracking Probe Interval = 30 ----------------------------------------------------------------------------------------------- IP Address MAC Address Vlan Interface Probe-Timeout STATE ----------------------------------------------------------------------------------------------- 200.1.1.8 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.9 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.10 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.1 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.2 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.3 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.4 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.5 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.6 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE 200.1.1.7 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE This example displays the count of all IP device tracking host entries for all interfaces: Switch# show ip device tracking all count Total IP Device Tracking Host entries: 5 --------------------------------------------------------------------- Interface Maximum Limit Number of Entries --------------------------------------------------------------------- Gi1/0/3 5 Monitoring IP Source Guard Table 129: Privileged EXEC show Commands Command Purpose show ip verify source [ interface interface-id ] Displays the IP source guard configuration on the switch or on a specific interface. show ip device tracking { all | interface interface-id Displays information about the entries in the IP device | ip ip-address | mac imac-address} tracking table. Table 130: Interface Configuration Commands Command Purpose ip verify source tracking Verifies the data source. For detailed information about the fields in these displays, see the command reference for this release. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1453 Additional References Security Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1454 7 3 C H A P T E R Configuring Dynamic ARP Inspection · Finding Feature Information, on page 1455 · Restrictions for Dynamic ARP Inspection, on page 1455 · Understanding Dynamic ARP Inspection, on page 1457 · Default Dynamic ARP Inspection Configuration, on page 1460 · Relative Priority of ARP ACLs and DHCP Snooping Entries, on page 1461 · Configuring ARP ACLs for Non-DHCP Environments , on page 1461 · Configuring Dynamic ARP Inspection in DHCP Environments, on page 1463 · How to Limit the Rate of Incoming ARP Packets, on page 1466 · How to Perform Validation Checks, on page 1467 · Monitoring DAI, on page 1469 · Verifying the DAI Configuration, on page 1469 · Additional References, on page 1470 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Dynamic ARP Inspection This section lists the restrictions and guidelines for configuring Dynamic ARP Inspection on the switch. · Dynamic ARP inspection is an ingress security feature; it does not perform any egress checking. · Dynamic ARP inspection is not effective for hosts connected to switches that do not support dynamic ARP inspection or that do not have this feature enabled. Because man-in-the-middle attacks are limited to a single Layer 2 broadcast domain, separate the domain with dynamic ARP inspection checks from the one with no checking. This action secures the ARP caches of hosts in the domain enabled for dynamic ARP inspection. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1455 Restrictions for Dynamic ARP Inspection Security · Dynamic ARP inspection depends on the entries in the DHCP snooping binding database to verify IP-to-MAC address bindings in incoming ARP requests and ARP responses. Make sure to enable DHCP snooping to permit ARP packets that have dynamically assigned IP addresses. When DHCP snooping is disabled or in non-DHCP environments, use ARP ACLs to permit or to deny packets. · Dynamic ARP inspection is supported on access ports, trunk ports, and EtherChannel ports. Note Do not enable Dynamic ARP inspection on RSPAN VLANs. If Dynamic ARP inspection is enabled on RSPAN VLANs, Dynamic ARP inspection packets might not reach the RSPAN destination port. · A physical port can join an EtherChannel port channel only when the trust state of the physical port and the channel port match. Otherwise, the physical port remains suspended in the port channel. A port channel inherits its trust state from the first physical port that joins the channel. Consequently, the trust state of the first physical port need not match the trust state of the channel. Conversely, when you change the trust state on the port channel, the switch configures a new trust state on all the physical ports that comprise the channel. · The rate limit is calculated separately on each switch in a switch stack. For a cross-stack EtherChannel, this means that the actual rate limit might be higher than the configured value. For example, if you set the rate limit to 30 pps on an EtherChannel that has one port on switch 1 and one port on switch 2, each port can receive packets at 29 pps without causing the EtherChannel to become error-disabled. · The operating rate for the port channel is cumulative across all the physical ports within the channel. For example, if you configure the port channel with an ARP rate-limit of 400 pps, all the interfaces combined on the channel receive an aggregate 400 pps. The rate of incoming ARP packets on EtherChannel ports is equal to the sum of the incoming rate of packets from all the channel members. Configure the rate limit for EtherChannel ports only after examining the rate of incoming ARP packets on the channel-port members. The rate of incoming packets on a physical port is checked against the port-channel configuration rather than the physical-ports configuration. The rate-limit configuration on a port channel is independent of the configuration on its physical ports. If the EtherChannel receives more ARP packets than the configured rate, the channel (including all physical ports) is placed in the error-disabled state. · Make sure to limit the rate of ARP packets on incoming trunk ports. Configure trunk ports with higher rates to reflect their aggregation and to handle packets across multiple dynamic ARP inspection-enabled VLANs. You also can use the ip arp inspection limit none interface configuration command to make the rate unlimited. A high rate-limit on one VLAN can cause a denial-of-service attack to other VLANs when the software places the port in the error-disabled state. · When you enable dynamic ARP inspection on the switch, policers that were configured to police ARP traffic are no longer effective. The result is that all ARP traffic is sent to the CPU. · When you configure dynamic ARP inspection smart logging, the contents of all packets in the log buffer (by default, all dropped packets) are sent to a NetFlow collector. If you configure this feature, make sure that smart logging is globally enabled. For more information about smart logging, see the "Configuring Smart Logging" section on page xxx. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1456 Security Understanding Dynamic ARP Inspection Understanding Dynamic ARP Inspection ARP provides IP communication within a Layer 2 broadcast domain by mapping an IP address to a MAC address. For example, Host B wants to send information to Host A but does not have the MAC address of Host A in its ARP cache. Host B generates a broadcast message for all hosts within the broadcast domain to obtain the MAC address associated with the IP address of Host A. All hosts within the broadcast domain receive the ARP request, and Host A responds with its MAC address. However,because ARP allows a gratuitous reply from a host even if an ARP request was not received, an ARP spoofing attack and the poisoning of ARP caches can occur. After the attack, all traffic from the device under attack flows through the attacker's computer and then to the router, switch, or host. A malicious user can attack hosts, switches, and routers connected to your Layer 2 network by poisoning the ARP caches of systems connected to the subnet and by intercepting traffic intended for other hosts on the subnet. Figure 26-1 shows an example of ARP cache poisoning. Figure 84: ARP Cache Poisoning Hosts A, B, and C are connected to the switch on interfaces A, B and C, all of which are on the same subnet. Their IP and MAC addresses are shown in parentheses; for example, Host A uses IP address IA and MAC address MA. When Host A needs to communicate to Host B at the IP layer, it broadcasts an ARP request for the MAC address associated with IP address IB. When the switch and Host B receive the ARP request, they populate their ARP caches with an ARP binding for a host with the IP address IA and a MAC address MA; for example, IP address IA is bound to MAC address MA. When Host B responds, the switch and Host A populate their ARP caches with a binding for a host with the IP address IB and the MAC address MB. Host C can poison the ARP caches of the switch, Host A, and Host B by broadcasting forged ARP responses with bindings for a host with an IP address of IA (or IB) and a MAC address of MC. Hosts with poisoned ARP caches use the MAC address MC as the destination MAC address for traffic intended for IA or IB. This means that Host C intercepts that traffic. Because Host C knows the true MAC addresses associated with IA and IB, it can forward the intercepted traffic to those hosts by using the correct MAC address as the destination. Host C has inserted itself into the traffic stream from Host A to Host B, the classic man-in-the middleattack. Dynamic ARP inspection is a security feature that validates ARP packets in a network. It intercepts, logs,and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from certain man-in-the-middle attacks. Dynamic ARP inspection ensures that only valid ARP requests and responses are relayed. The switch performs these activities: · Intercepts all ARP requests and responses on untrusted ports · Verifies that each of these intercepted packets has a valid IP-to-MAC address binding before updating the local ARP cache or before forwarding the packet to the appropriate destination · Drops invalid ARP packets Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1457 Interface Trust States and Network Security Security Dynamic ARP inspection determines the validity of an ARP packet based on valid IP-to-MAC address bindings stored in a trusted database, the DHCP snooping binding database. This database is built by DHCP snooping if DHCP snooping is enabled on the VLANs and on the switch. If the ARP packet is received on a trusted interface, the switch forwards the packet without any checks. On untrusted interfaces, the switch forwards the packet only if it is valid. You enable dynamic ARP inspection on a per-VLAN basis by using the ip arp inspection vlan vlan-range global configuration command. In non-DHCP environments, dynamic ARP inspection can validate ARP packets against user-configured ARP access control lists (ACLs) for hosts with statically configured IP addresses. You define an ARP ACL by using the arp access-list acl-name global configuration command. You can configure dynamic ARP inspection to drop ARP packets when the IP addresses in the packets are invalid or when the MAC addresses in the body of the ARP packets do not match the addresses specified in the Ethernet header. Use the ip arp inspection validate {[src-mac] [dst-mac] [ip]} global configuration command. Interface Trust States and Network Security Dynamic ARP inspection associates a trust state with each interface on the switch. Packets arriving on trusted interfaces bypass all dynamic ARP inspection validation checks, and those arriving on untrusted interfaces undergo the dynamic ARP inspection validation process. In a typical network configuration, you configure all switch ports connected to host ports as untrusted and configure all switch ports connected to switches as trusted. With this configuration, all ARP packets entering the network from a given switch bypass the security check. No other validation is needed at any other place in the VLAN or in the network. You configure the trust setting by using theip arp inspection trust interface configuration command. Caution Use the trust state configuration carefully. Configuring interfaces as untrusted when they should betrusted can result in a loss of connectivity. In the following figure, assume that both Switch A and Switch B are running dynamic ARP inspection on the VLAN that includes Host 1 and Host 2. If Host 1 and Host 2 acquire their IP addresses from the DHCP server connected to Switch A, only Switch A binds the IP-to-MAC address of Host 1. Therefore, if the interface between Switch A and Switch B is untrusted, the ARP packets from Host 1 are dropped by Switch B. Connectivity between Host 1 and Host 2 is lost. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1458 Security Figure 85: ARP Packet Validation on a VLAN Enabled for Dynamic ARP Inspection Rate Limiting of ARP Packets Configuring interfaces to be trusted when they are actually untrusted leaves a security hole in the network. If Switch A is not running dynamic ARP inspection, Host 1 can easily poison the ARP cache of Switch B (and Host 2, if the link between the switches is configured as trusted). This condition can occur even though Switch B is running dynamic ARP inspection. Dynamic ARP inspection ensures that hosts (on untrusted interfaces) connected to a switch running dynamic ARP inspection do not poison the ARP caches of other hosts in the network. However, dynamic ARP inspection does not prevent hosts in other portions of the network from poisoning the caches of the hosts that are connected to a switch running dynamic ARP inspection. In cases in which some switches in a VLAN run dynamic ARP inspection and other switches do not, configure the interfaces connecting such switches as untrusted. However, to validate the bindings of packets from nondynamic ARP inspection switches, configure the switch running dynamic ARP inspection with ARP ACLs. When you cannot determine such bindings, at Layer 3, isolate switches running dynamic ARP inspection from switches not running dynamic ARP inspection switches. Note Depending on the setup of the DHCP server and the network, it might not be possible to validate a given ARP packet on all switches in the VLAN. Rate Limiting of ARP Packets The switch CPU performs dynamic ARP inspection validation checks; therefore, the number of incoming ARP packets is rate-limited to prevent a denial-of-service attack. By default, the rate for untrusted interfaces is 15 packets per second (pps). Trusted interfaces are not rate-limited. You can change this setting by using theip arp inspection limitinterface configuration command. When the rate of incoming ARP packets exceeds the configured limit, the switch places the port in the error-disabled state. The port remains in that state until you intervene. You can use the errdisable recovery global configuration command to enable error disable recovery so that ports automatically emerge from this state after a specified timeout period. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1459 Relative Priority of ARP ACLs and DHCP Snooping Entries Security Note The rate limit for an EtherChannel is applied separately to each switch in a stack. For example, if a limit of 20 pps is configured on the EtherChannel, each switch with ports in the EtherChannel can carry up to 20 pps. If any switch exceeds the limit, the entire EtherChannel is placed into the error-disabled state. Relative Priority of ARP ACLs and DHCP Snooping Entries Dynamic ARP inspection uses the DHCP snooping binding database for the list of valid IP-to-MAC address bindings. ARP ACLs take precedence over entries in the DHCP snooping binding database. The switch uses ACLs only if you configure them by using the ip arp inspection filter vlan global configuration command. The switch first compares ARP packets to user-configured ARP ACLs. If the ARP ACL denies the ARP packet, the switch also denies the packet even if a valid binding exists in the database populated by DHCP snooping. Logging of Dropped Packets When the switch drops a packet, it places an entry in the log buffer and then generates system messages on a rate-controlled basis. After the message is generated, the switch clears the entry from the log buffer. Each log entry contains flow information, such as the receiving VLAN, the port number, the source and destination IP addresses, and the source and destination MAC addresses. You use the ip arp inspection log-buffer global configuration command to configure the number of entries in the buffer and the number of entries needed in the specified interval to generate system messages. You specify the type of packets that are logged by using the ip arp inspection vlan logging global configuration command. Default Dynamic ARP Inspection Configuration Feature Dynamic ARP inspection Interface trust state Feature Dynamic ARP inspection Interface trust state Default Settings Disabled on all VLANs. All interfaces are untrusted. The rate is 15 pps on untrusted interfaces, assuming that the network is a switched network with a host connecting to as many as 15 new hosts per second. The rate is unlimited on all trusted interfaces. The burst interval is 1 second. No ARP ACLs are defined. No checks are performed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1460 Security Relative Priority of ARP ACLs and DHCP Snooping Entries Feature Rate limit of incoming ARP packets ARP ACLs for non-DHCP environments Default Settings When dynamic ARP inspection is enabled, all denied or dropped ARP packets are logged. The number of entries in the log is 32. The number of system messages is limited to 5 per second. The logging-rate interval is 1 second. All denied or dropped ARP packets are logged. Relative Priority of ARP ACLs and DHCP Snooping Entries Dynamic ARP inspection uses the DHCP snooping binding database for the list of valid IP-to-MAC address bindings. ARP ACLs take precedence over entries in the DHCP snooping binding database. The switch uses ACLs only if you configure them by using the ip arp inspection filter vlan global configuration command. The switch first compares ARP packets to user-configured ARP ACLs. If the ARP ACL denies the ARP packet, the switch also denies the packet even if a valid binding exists in the database populated by DHCP snooping. Configuring ARP ACLs for Non-DHCP Environments This procedure shows how to configure dynamic ARP inspection when Switch B shown in Figure 2 does not support dynamic ARP inspection or DHCP snooping. If you configure port 1 on Switch A as trusted, a security hole is created because both Switch A and Host 1 could be attacked by either Switch B or Host 2. To prevent this possibility, you must configure port 1 on Switch A as untrusted. To permit ARP packets from Host 2, you must set up an ARP ACL and apply it to VLAN 1. If the IP address of Host 2 is not static (it is impossible to apply the ACL configuration on Switch A) you must separate Switch A from Switch B at Layer 3 and use a router to route packets between them. Beginning in privileged EXEC mode, follow these steps to configure an ARP ACL on Switch A. This procedure is required in non-DHCP environments. SUMMARY STEPS 1. Configureterminal 2. arp access-list acl-name 3. permit ip host sender-ip mac host sender-mac 4. exit 5. ip arp inspection filter arp-acl-name vlan vlan-range [static] 6. ip arp inspection smartlog 7. interface interface-id 8. no ip arp inspection trust 9. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1461 Configuring ARP ACLs for Non-DHCP Environments Security 10. show arp access-list acl-name show ip arp inspection vlan vlan-range show ip arp inspection interfaces 11. copy running-config startup-config DETAILED STEPS Step 1 Command or Action Configureterminal Step 2 arp access-list acl-name Purpose Enter global configuration mode. Define an ARP ACL, and enter ARP access-list configuration mode. By default, no ARP access lists are defined. Note At the end of the ARP access list, there is an implicitdeny ip any mac any command. Step 3 permit ip host sender-ip mac host sender-mac Permit ARP packets from the specified host (Host 2). · Forsender-ip, enter the IP address of Host 2. · For sender-mac, enter the MAC address of Host 2. Step 4 Step 5 Step 6 exit Return to global configuration mode. ip arp inspection filter arp-acl-name vlan vlan-range Apply the ARP ACL to the VLAN. By default, no defined [static] ARP ACLs are applied to any VLAN. · For arp-acl-name, specify the name of the ACL created in Step 2. · For vlan-range, specify the VLAN that the switches and hosts are in. You can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. · (Optional) Specify static to treat implicit denies in the ARP ACL as explicit denies and to drop packets that do not match any previous clauses in the ACL. DHCP bindings are not used. If you do not specify this keyword, it means that there is no explicit deny in the ACL that denies the packet, and DHCP bindings determine whether a packet is permitted or denied if the packet does not match any clauses in the ACL. ip arp inspection smartlog ARP packets containing only IP-to-MAC address bindings are compared against the ACL. Packets are permitted only if the access list permits them. Specify that whatever packets are currently being logged are also smart-logged. By default, all dropped packets are logged. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1462 Security Configuring Dynamic ARP Inspection in DHCP Environments Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action interface interface-id Purpose Specify the Switch A interface that is connected to Switch B, and enter interface configuration mode. no ip arp inspection trust Configure the Switch A interface that is connected to Switch B as untrusted. By default, all interfaces are untrusted. For untrusted interfaces, the switch intercepts all ARP requests and responses. It verifies that the intercepted packets have valid IP-to-MAC address bindings before updating the local cache and before forwarding the packet to the appropriate destination. The switch drops invalid packets and logs them in the log buffer according to the logging configuration specified with the ip arp inspection vlan logging global configuration command. end Return to privileged EXEC mode. show arp access-list acl-name show ip arp inspection vlan vlan-range show ip arp inspection interfaces copy running-config startup-config Verify your entries. (Optional) Save your entries in the configuration file. Example To remove the ARP ACL, use the no arp access-list global configuration command. To remove the ARP ACL attached to a VLAN, use the no ip arp inspection filter arp-acl-name vlan vlan-range global configuration command. This example shows how to configure an ARP ACL called host2 on Switch A, to permit ARP packets from Host 2 (IP address 1.1.1.1 and MAC address 0001.0001.0001), to apply the ACL to VLAN 1, and to configure port 1 on Switch A as untrusted: Switch(config)#arp access-list host2 Switch(config-arp-acl)#permit ip host 1.1.1.1 mac host 1.1.1 Switch(config-arp-acl)# exit Switch(config)# ip arp inspection filter host2 vlan 1 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# no ip arp inspection trust Configuring Dynamic ARP Inspection in DHCP Environments Before you begin This procedure shows how to configure dynamic ARP inspection when two switches support this feature. Host 1 is connected to Switch A, and Host 2 is connected to Switch B. Both switches are running dynamic ARP inspection on VLAN 1 where the hosts are located. A DHCP server is connected to Switch A. Both hosts Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1463 Configuring Dynamic ARP Inspection in DHCP Environments Security acquire their IP addresses from the same DHCP server. Therefore, Switch A has the bindings for Host 1 and Host 2, and Switch B has the binding for Host 2. Note Dynamic ARP inspection depends on the entries in the DHCP snooping binding database to verify IP-to-MAC address bindings in incoming ARP requests and ARP responses. Make sure to enable DHCP snooping to permit ARP packets that have dynamically assigned IP addresses. Beginning in privileged EXEC mode, follow these steps to configure dynamic ARP inspection. You must perform this procedure on both switches. This procedure is required. SUMMARY STEPS 1. show cdp neighbors 2. configure terminal 3. ip arp inspection vlan vlan-range 4. ip arp inspection smartlog 5. Interfaceinterface-id 6. ip arp inspection trust 7. end 8. show ip arp inspection interfaces 9. show ip arp inspection vlan vlan-range 10. show ip dhcp snooping binding 11. show ip arp inspection statistics vlan vlan-range 12. copy running-config startup-config DETAILED STEPS Step 1 Command or Action show cdp neighbors Step 2 configure terminal Example: Purpose Verify the connection between the switches. Enters the global configuration mode. Switch# configure terminal Step 3 ip arp inspection vlan vlan-range Example: Step 4 ip arp inspection smartlog Example: Enable dynamic ARP inspection on a per-VLAN basis. By default, dynamic ARP inspection is disabled on all VLANs. For vlan-range, specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. Specify the same VLAN ID for both switches. (Optional). Specify that whatever packets are currently being logged are also smart-logged. By default, all dropped packets are logged. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1464 Security Configuring Dynamic ARP Inspection in DHCP Environments Step 5 Step 6 Command or Action Interfaceinterface-id Example: ip arp inspection trust Example: Step 7 Step 8 Step 9 end Example: show ip arp inspection interfaces Example: show ip arp inspection vlan vlan-range Step 10 Step 11 Step 12 show ip dhcp snooping binding Example: show ip arp inspection statistics vlan vlan-range Example: copy running-config startup-config Example: Purpose Specify the interface connected to the other switch, and enter interface configuration mode. Configure the connection between the switches as trusted. By default, all interfaces are untrusted. The switch does not check ARP packets that it receives from the other switch on the trusted interface. It simply forwards the packets. For untrusted interfaces, the switch intercepts all ARP requests and responses. It verifies that the intercepted packets have valid IP-to-MAC address bindings before updating the local cache and before forwarding the packet to the appropriate destination. The switch drops invalid packets and logs them in the log buffer according to the logging configuration specified with the ip arp inspection vlan logging global configuration command. Return to privileged EXEC mode. Verify the dynamic ARP inspection configuration on interfaces. Verify the dynamic ARP inspection configuration on VLAN. Verify the DHCP bindings. Check the dynamic ARP inspection statistics on VLAN. (Optional) Save your entries in the configuration file. Example To disable dynamic ARP inspection, use the no ip arp inspection vlan vlan-range global configuration command. To return the interfaces to an untrusted state, use the no ip arp inspection trust interface configuration command. This example shows how to configure dynamic ARP inspection on Switch A in VLAN 1. You would perform a similar procedure on Switch B: Switch(config)# ip arp inspection vlan 1 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)#ip arp inspection trust Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1465 How to Limit the Rate of Incoming ARP Packets Security How to Limit the Rate of Incoming ARP Packets The switch CPU performs dynamic ARP inspection validation checks; therefore, the number of incoming ARP packets is rate-limited to prevent a denial- of-service attack. When the rate of incoming ARP packets exceeds the configured limit, the switch places the port in the error-disabled state. The port remains in that state until you enable error-disabled recovery so that ports automatically emerge from this state after a specified timeout period. Note Unless you configure a rate limit on an interface, changing the trust state of the interface also changes its rate limit to the default value for that trust state. After you configure the rate limit, the interface retains the rate limit even when its trust state is changed. If you enter the no ip arp inspection limit interface configuration command, the interface reverts to its default rate limit. For configuration guidelines for rate limiting trunk ports and EtherChannel ports, see the section, "Dynamic ARP Inspection Configuration Guidelines." To return to the default rate-limit configuration, use the no ip arp inspection limit interface configuration command. To disable error recovery for dynamic ARP inspection, use the no errdisable recovery cause arp-inspection global configuration command. Beginning in privileged EXEC mode, follow these steps to limit the rate of incoming ARP packets. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. ip arp inspection limit {rate pps [burst interval seconds] | none} 4. exit 5. errdisable detect cause arp-inspection and errdisable recovery causearp-inspection errdisable recovery interval interval 6. exit 7. show ip arp inspection interfaces show errdisable recovery 8. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Purpose Enter global configuration mode. Step 2 interface interface-id Specify the interface to be rate-limited, and enter interface configuration mode. Step 3 ip arp inspection limit {rate pps [burst interval seconds] Limit the rate of incoming ARP requests and responses on | none} the interface. Limit the rate of incoming ARP requests and responses on the interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1466 Security How to Perform Validation Checks Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose The default rate is 15 pps on untrusted interfaces and unlimited on trusted interfaces. The burst interval is 1 second. The keywords have these meanings: · For rate pps, specify an upper limit for the number of incoming packets processed per second. The range is 0 to 2048 pps. · (Optional) For burst interval seconds, specify the consecutive interval in seconds, over which the interface is monitored for a high rate of ARP packets. The range is 1 to 15. · For rate none, specify no upper limit for the rate of incoming ARP packets that can be processed. exit Return to global configuration mode. errdisable detect cause arp-inspection and errdisable recovery causearp-inspection errdisable recovery interval interval (Optional) Enable error recovery from the dynamic ARP inspection error-disabled state, and configure the dynamic ARP inspection recover mechanism variables. By default, recovery is disabled, and the recovery interval is 300 seconds. For interval interval, specify the time in seconds to recover from the error-disabled state. The range is 30 to 86400. exit Return to privileged EXEC mode. show ip arp inspection interfaces show errdisable recovery copy running-config startup-config Verify your settings. (Optional) Save your entries in the configuration file. How to Perform Validation Checks Dynamic ARP inspection intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. You can configure the switch to perform additional checks on the destination MAC address, the sender and target IP addresses, and the source MAC address. Beginning in privileged EXEC mode, follow these steps to perform specific checks on incoming ARP packets. This procedure is optional. To disable checking, use theno ip arp inspection validate [src-mac] [dst-mac] [ip] global configuration command. To display statistics for forwarded, dropped, and MAC and IP validation failure packets, use the show ip arp inspection statistics privileged EXEC command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1467 How to Perform Validation Checks Security SUMMARY STEPS 1. configure terminal 2. ip arp inspection validate {[src-mac] [dst-mac] [ip]} 3. exit 4. show ip arp inspection vlan vlan-range 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Step 2 ip arp inspection validate {[src-mac] [dst-mac] [ip]} Step 3 Step 4 Step 5 exit show ip arp inspection vlan vlan-range copy running-config startup-config Purpose Enter global configuration mode. Perform a specific check on incoming ARP packets. By default, no checks are performed. The keywords have these meanings: · For src-mac, check the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. When enabled, packets with different MAC addresses are classified as invalid and are dropped. · For dst-mac, check the destination MAC address in the Ethernet header against the target MAC address in ARP body. This check is performed for ARP responses. When enabled, packets with different MAC addresses are classified as invalid and are dropped. · For ip, check the ARP body for invalid and unexpected IP addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP multicast addresses. Sender IP addresses are checked in all ARP requests and responses, and target IP addresses are checked only in ARP responses. You must specify at least one of the keywords. Each command overrides the configuration of the previous command; that is, if a command enables src and dst mac validations, and a second command enables IP validation only, the src and dst mac validations are disabled as a result of the second command. Return to privileged EXEC mode. Verify your settings. (Optional) Save your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1468 Security Monitoring DAI Monitoring DAI To monitor DAI, use the following commands: Command Description clear ip arp inspection statistics Clears dynamic ARP inspection statistics. show ip arp inspection statistics [vlan vlan-range] Displays statistics for forwarded, dropped, MAC validation failure, IP validation failure, ACL permitted and denied, and DHCP permitted and denied packets for the specified VLAN. If no VLANs are specified or if a range is specified, displays information only for VLANs with dynamic ARP inspection enabled (active). clear ip arp inspection log show ip arp inspection log Clears the dynamic ARP inspection log buffer. Displays the configuration and contents of the dynamic ARP inspection log buffer. For the show ip arp inspection statistics command, the switch increments the number of forwarded packets for each ARP request and response packet on a trusted dynamic ARP inspection port. The switch increments the number of ACL or DHCP permitted packets for each packet that is denied by source MAC, destination MAC, or IP validation checks, and the switch increments the appropriate. Verifying the DAI Configuration To display and verify the DAI configuration, use the following commands: Command show arp access-list [acl-name] Description Displays detailed information about ARP ACLs. show ip arp inspection interfaces [interface-id] Displays the trust state and the rate limit of ARP packets for the specified interface or all interfaces. show ip arp inspection vlan vlan-range Displays the configuration and the operating state of dynamic ARP inspection for the specified VLAN. If no VLANs are specified or if a range is specified, displays information only for VLANs with dynamic ARP inspection enabled (active). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1469 Additional References Security Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1470 7 4 C H A P T E R Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication. IEEE 802.1x authentication prevents unauthorized devices (clients) from gaining access to the network. Unless otherwise noted, the term switch refers to a standalone switch or a switch stack. · Finding Feature Information, on page 1471 · Information About 802.1x Port-Based Authentication, on page 1471 · How to Configure 802.1x Port-Based Authentication, on page 1502 · Monitoring 802.1x Statistics and Status, on page 1555 · Additional References, on page 1556 · Feature Information for 802.1x Port-Based Authentication, on page 1557 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About 802.1x Port-Based Authentication The 802.1x standard defines a client-server-based access control and authentication protocol that prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they are properly authenticated. The authentication server authenticates each client connected to a switch port before making available any services offered by the switch or the LAN. Until the client is authenticated, 802.1x access control allows only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1471 Port-Based Authentication Process Security Note For complete syntax and usage information for the commands used in this chapter, see the "RADIUS Commands" section in the Cisco IOS Security Command Reference, Release 12.4 and the command reference for this release. Port-Based Authentication Process When 802.1x port-based authentication is enabled and the client supports 802.1x-compliant client software, these events occur: · If the client identity is valid and the 802.1x authentication succeeds, the switch grants the client access to the network. · If 802.1x authentication times out while waiting for an EAPOL message exchange and MAC authentication bypass is enabled, the switch can use the client MAC address for authorization. If the client MAC address is valid and the authorization succeeds, the switch grants the client access to the network. If the client MAC address is invalid and the authorization fails, the switch assigns the client to a guest VLAN that provides limited services if a guest VLAN is configured. · If the switch gets an invalid identity from an 802.1x-capable client and a restricted VLAN is specified, the switch can assign the client to a restricted VLAN that provides limited services. · If the RADIUS authentication server is unavailable (down) and inaccessible authentication bypass is enabled, the switch grants the client access to the network by putting the port in the critical-authentication state in the RADIUS-configured or the user-specified access VLAN. Note Inaccessible authentication bypass is also referred to as critical authentication or the AAA fail policy. If Multi Domain Authentication (MDA) is enabled on a port, this flow can be used with some exceptions that are applicable to voice authorization. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1472 Security Figure 86: Authentication Flowchart This figure shows the authentication Port-Based Authentication Process process. The switch re-authenticates a client when one of these situations occurs: · Periodic re-authentication is enabled, and the re-authentication timer expires. You can configure the re-authentication timer to use a switch-specific value or to be based on values from the RADIUS server. After 802.1x authentication using a RADIUS server is configured, the switch uses timers based on the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS attribute (Attribute [29]). The Session-Timeout RADIUS attribute (Attribute[27]) specifies the time after which re-authentication occurs. The Termination-Action RADIUS attribute (Attribute [29]) specifies the action to take during re-authentication. The actions are Initialize and ReAuthenticate. When the Initialize action is set (the attribute value is DEFAULT), the 802.1x session ends, and connectivity is lost during re-authentication. When the ReAuthenticate action is set (the attribute value is RADIUS-Request), the session is not affected during re-authentication. · You manually re-authenticate the client by entering the dot1x re-authenticate interface interface-id privileged EXEC command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1473 Port-Based Authentication Initiation and Message Exchange Security Port-Based Authentication Initiation and Message Exchange During 802.1x authentication, the switch or the client can initiate authentication. If you enable authentication on a port by using the authentication port-control auto interface configuration command, the switch initiates authentication when the link state changes from down to up or periodically as long as the port remains up and unauthenticated. The switch sends an EAP-request/identity frame to the client to request its identity. Upon receipt of the frame, the client responds with an EAP-response/identity frame. However, if during bootup, the client does not receive an EAP-request/identity frame from the switch, the client can initiate authentication by sending an EAPOL-start frame, which prompts the switch to request the client's identity. Note If 802.1x authentication is not enabled or supported on the network access device, any EAPOL frames from the client are dropped. If the client does not receive an EAP-request/identity frame after three attempts to start authentication, the client sends frames as if the port is in the authorized state. A port in the authorized state effectively means that the client has been successfully authenticated. When the client supplies its identity, the switch begins its role as the intermediary, passing EAP frames between the client and the authentication server until authentication succeeds or fails. If the authentication succeeds, the switch port becomes authorized. If the authentication fails, authentication can be retried, the port might be assigned to a VLAN that provides limited services, or network access is not granted. The specific exchange of EAP frames depends on the authentication method being used. Figure 87: Message Exchange This figure shows a message exchange initiated by the client when the client uses the One-Time-Password (OTP) authentication method with a RADIUS server. If 802.1x authentication times out while waiting for an EAPOL message exchange and MAC authentication bypass is enabled, the switch can authorize the client when the switch detects an Ethernet packet from the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1474 Security Authentication Manager for Port-Based Authentication client. The switch uses the MAC address of the client as its identity and includes this information in the RADIUS-access/request frame that is sent to the RADIUS server. After the server sends the switch the RADIUS-access/accept frame (authorization is successful), the port becomes authorized. If authorization fails and a guest VLAN is specified, the switch assigns the port to the guest VLAN. If the switch detects an EAPOL packet while waiting for an Ethernet packet, the switch stops the MAC authentication bypass process and starts 802.1x authentication. Figure 88: Message Exchange During MAC Authentication Bypass This figure shows the message exchange during MAC authentication bypass. Authentication Manager for Port-Based Authentication In Cisco IOS Release 12.2(46)SE and earlier, you could not use the same authorization methods, including CLI commands and messages, on this switch and also on other network devices, such as a Catalyst 6000. You had to use separate authentication configurations. Cisco IOS Release 12.2(50)SE and later supports the same authorization methods on all Catalyst switches in a network. Cisco IOS Release 12.2(55)SE supports filtering verbose system messages from the authentication manager. Port-Based Authentication Methods Table 131: 802.1x Features Authentication method 802.1x Mode Single host Multiple host MDA Multiple Authentication VLAN assignment VLAN assignment VLAN assignment VLAN assignment Per-user ACL Per-user ACL Per-user ACL Filter-ID attribute Filter-Id attribute Filter-Id attribute Downloadable ACL Downloadable ACL Downloadable ACL Redirect URL Redirect URL Redirect URL Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1475 Per-User ACLs and Filter-Ids Security Authentication method Mode Single host Multiple host MDA Multiple Authentication MAC authentication VLAN assignment VLAN assignment VLAN assignment VLAN assignment bypass Per-user ACL Per-user ACL Per-user ACL Filter-ID attribute Filter-Id attribute Filter-Id attribute Downloadable ACL Downloadable ACL Downloadable ACL Redirect URL Redirect URL Redirect URL Standalone web authentication Proxy ACL, Filter-Id attribute, downloadable ACL NAC Layer 2 IP validation Filter-Id attribute Filter-Id attribute Filter-Id attribute Filter-Id attribute Downloadable ACL Downloadable ACL Downloadable ACL Downloadable ACL Redirect URL Redirect URL Redirect URL Redirect URL Web authentication Proxy ACL as fallback method Filter-Id attribute Proxy ACL Filter-Id attribute Proxy ACL Filter-Id attribute Proxy ACL Filter-Id attribute Downloadable ACL Downloadable ACL Downloadable ACL Downloadable ACL 18 Supported in Cisco IOS Release 12.2(50)SE and later. 19 For clients that do not support 802.1x authentication. Per-User ACLs and Filter-Ids ACLs configured on the switch are compatible with other devices running Cisco IOS releases. You can only set any as the source in the ACL. Note For any ACL configured for multiple-host mode, the source portion of statement must be any. (For example, permit icmp any host 10.10.1.1.) Port-Based Authentication Manager CLI Commands The authentication-manager interface-configuration commands control all the authentication methods, such as 802.1x, MAC authentication bypass, and web authentication. The authentication manager commands determine the priority and order of authentication methods applied to a connected host. The authentication manager commands control generic authentication features, such as host-mode, violation mode, and the authentication timer. Generic authentication commands include the authentication host-mode, authentication violation, and authentication timer interface configuration commands. 802.1x-specific commands begin with the dot1x keyword. For example, the authentication port-control auto interface configuration command enables authentication on an interface. However, the dot1x Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1476 Security Port-Based Authentication Manager CLI Commands system-authentication control global configuration command only globally enables or disables 802.1x authentication. Note If 802.1x authentication is globally disabled, other authentication methods are still enabled on that port, such as web authentication. The authentication manager commands provide the same functionality as earlier 802.1x commands. Beginning with Cisco IOS Release 12.2(55)SE, you can filter out verbose system messages generated by the authentication manager. The filtered content typically relates to authentication success. You can also filter verbose messages for 802.1x authentication and MAB authentication. There is a separate command for each authentication method: · The no authentication logging verbose global configuration command filters verbose messages from the authentication manager. · The no dot1x logging verbose global configuration command filters 802.1x authentication verbose messages. · The no mab logging verbose global configuration command filters MAC authentication bypass (MAB) verbose messages Table 132: Authentication Manager Commands and Earlier 802.1x Commands The authentication manager commands in Cisco IOS Release 12.2(50)SE or later The equivalent 802.1x commands Description in Cisco IOS Release 12.2(46)SE and earlier authentication control-direction dot1x control-direction {both | {both | in} in} Enable 802.1x authentication with the wake-on-LAN (WoL) feature, and configure the port control as unidirectional or bidirectional. authentication event dot1x auth-fail vlan dot1x critical (interface configuration) dot1x guest-vlan6 Enable the restricted VLAN on a port. Enable the inaccessible-authentication-bypass feature. Specify an active VLAN as an 802.1x guest VLAN. authentication fallback fallback-profile dot1x fallback fallback-profile Configure a port to use web authentication as a fallback method for clients that do not support 802.1x authentication. authentication host-mode [multi-auth | multi-domain | multi-host | single-host] dot1x host-mode {single-host | multi-host | multi-domain} Allow a single host (client) or multiple hosts on an 802.1x-authorized port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1477 Ports in Authorized and Unauthorized States Security The authentication manager commands in Cisco IOS Release 12.2(50)SE or later The equivalent 802.1x commands Description in Cisco IOS Release 12.2(46)SE and earlier authentication order mab Provides the flexibility to define the order of authentication methods to be used. authentication periodic dot1x reauthentication Enable periodic re-authentication of the client. authentication port-control {auto dot1x port-control {auto | | force-authorized | force-un force-authorized | authorized} force-unauthorized} Enable manual control of the authorization state of the port. authentication timer dot1x timeout Set the 802.1x timers. authentication violation {protect dot1x violation-mode {shutdown Configure the violation modes that | restrict | shutdown} | restrict | protect} occur when a new device connects to a port or when a new device connects to a port after the maximum number of devices are connected to that port. show authentication show dot1x Display 802.1x statistics, administrative status, and operational status for the switch or for the specified port. authentication manager: compatibility with earlier 802.1x CLI commands Ports in Authorized and Unauthorized States During 802.1x authentication, depending on the switch port state, the switch can grant a client access to the network. The port starts in the unauthorized state. While in this state, the port that is not configured as a voice VLAN port disallows all ingress and egress traffic except for 802.1x authentication, CDP, and STP packets. When a client is successfully authenticated, the port changes to the authorized state, allowing all traffic for the client to flow normally. If the port is configured as a voice VLAN port, the port allows VoIP traffic and 802.1x protocol packets before the client is successfully authenticated. If a client that does not support 802.1x authentication connects to an unauthorized 802.1x port, the switch requests the client's identity. In this situation, the client does not respond to the request, the port remains in the unauthorized state, and the client is not granted access to the network. In contrast, when an 802.1x-enabled client connects to a port that is not running the 802.1x standard, the client initiates the authentication process by sending the EAPOL-start frame. When no response is received, the client sends the request for a fixed number of times. Because no response is received, the client begins sending frames as if the port is in the authorized state. You control the port authorization state by using the authentication port-control interface configuration command and these keywords: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1478 Security Port-Based Authentication and Switch Stacks · force-authorized--disables 802.1x authentication and causes the port to change to the authorized state without any authentication exchange required. The port sends and receives normal traffic without 802.1x-based authentication of the client. This is the default setting. · force-unauthorized--causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the port. · auto--enables 802.1x authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port changes from down to up or when an EAPOL-start frame is received. The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server. Each client attempting to access the network is uniquely identified by the switch by using the client MAC address. Note In Session Aware Networking mode, the authentication port-control command is access-session port-control. If the client is successfully authenticated (receives an Accept frame from the authentication server), the port state changes to authorized, and all frames from the authenticated client are allowed through the port. If the authentication fails, the port remains in the unauthorized state, but authentication can be retried. If the authentication server cannot be reached, the switch can resend the request. If no response is received from the server after the specified number of attempts, authentication fails, and network access is not granted. When a client logs off, it sends an EAPOL-logoff message, causing the switch port to change to the unauthorized state. If the link state of a port changes from up to down, or if an EAPOL-logoff frame is received, the port returns to the unauthorized state. Port-Based Authentication and Switch Stacks If a switch is added to or removed from a switch stack, 802.1x authentication is not affected as long as the IP connectivity between the RADIUS server and the stack remains intact. This statement also applies if the stack master is removed from the switch stack. Note that if the stack master fails, a stack member becomes the new stack master by using the election process, and the 802.1x authentication process continues as usual. If IP connectivity to the RADIUS server is interrupted because the switch that was connected to the server is removed or fails, these events occur: · Ports that are already authenticated and that do not have periodic re-authentication enabled remain in the authenticated state. Communication with the RADIUS server is not required. · Ports that are already authenticated and that have periodic re-authentication enabled (with the authentication periodic global configuration command) fail the authentication process when the re-authentication occurs. Ports return to the unauthenticated state during the re-authentication process. Communication with the RADIUS server is required. For an ongoing authentication, the authentication fails immediately because there is no server connectivity. If the switch that failed comes up and rejoins the switch stack, the authentications might or might not fail depending on the boot-up time and whether the connectivity to the RADIUS server is re-established by the time the authentication is attempted. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1479 802.1x Host Mode Security To avoid loss of connectivity to the RADIUS server, you should ensure that there is a redundant connection to it. For example, you can have a redundant connection to the stack master and another to a stack member, and if the stack master fails, the switch stack still has connectivity to the RADIUS server. 802.1x Host Mode You can configure an 802.1x port for single-host or for multiple-hosts mode. In single-host mode, only one client can be connected to the 802.1x-enabled switch port. The switch detects the client by sending an EAPOL frame when the port link state changes to the up state. If a client leaves or is replaced with another client, the switch changes the port link state to down, and the port returns to the unauthorized state. In multiple-hosts mode, you can attach multiple hosts to a single 802.1x-enabled port. In this mode, only one of the attached clients must be authorized for all clients to be granted network access. If the port becomes unauthorized (re-authentication fails or an EAPOL-logoff message is received), the switch denies network access to all of the attached clients. In this topology, the wireless access point is responsible for authenticating the clients attached to it, and it also acts as a client to the switch. Figure 89: Multiple Host Mode Example This figure shows 802.1x port-based authentication in a wireless LAN. 802.1x Multiple Authentication Mode Multiple-authentication (multiauth) mode allows multiple authenticated clients on the data VLAN and voice VLAN. Each host is individually authenticated. There is no limit to the number of data or voice device that can be authenticated on a multiauthport. If a hub or access point is connected to an 802.1x-enabled port, each connected client must be authenticated. For non-802.1x devices, you can use MAC authentication bypass or web authentication as the per-host authentication fallback method to authenticate different hosts with different methods on a single port. Note When a port is in multiple-authentication mode, the authentication-failed VLAN features do not activate. You can assign a RADIUS-server-supplied VLAN in multi-auth mode, under the following conditions: · The host is the first host authorized on the port, and the RADIUS server supplies VLAN information · Subsequent hosts are authorized with a VLAN that matches the operational VLAN. · A host is authorized on the port with no VLAN assignment, and subsequent hosts either have no VLAN assignment, or their VLAN information matches the operational VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1480 Security Multi-auth Per User VLAN assignment · The first host authorized on the port has a group VLAN assignment, and subsequent hosts either have no VLAN assignment, or their group VLAN matches the group VLAN on the port. Subsequent hosts must use the same VLAN from the VLAN group as the first host. If a VLAN list is used, all hosts are subject to the conditions specified in the VLAN list. · After a VLAN is assigned to a host on the port, subsequent hosts must have matching VLAN information or be denied access to the port. · You cannot configure a guest VLAN or an auth-fail VLAN in multi-auth mode. · The behavior of the critical-auth VLAN is not changed for multi-auth mode. When a host tries to authenticate and the server is not reachable, all authorized hosts are reinitialized in the configured VLAN. Multi-auth Per User VLAN assignment The Multi-auth Per User VLAN assignment feature allows you to create multiple operational access VLANs based on VLANs assigned to the clients on the port that has a single configured access VLAN. The port configured as an access port where the traffic for all the VLANs associated with data domain is not dot1q tagged, and these VLANs are treated as native VLANs. The number of hosts per multi-auth port is 8, however there can be more hosts. Note The Multi-auth Per User VLAN assignment feature is not supported for Voice domain. All clients in Voice domain on a port must use the same VLAN. The following scenarios are associated with the multi-auth Per User VLAN assignments: Scenario one When a hub is connected to an access port, and the port is configured with an access VLAN (V0). The host (H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to V1. This behaviour is similar on a single-host or multi-domain-auth port. When a second host (H2) is connected and gets assigned to VLAN ( V2), the port will have two operational VLANs (V1 and V2). If H1 and H2 sends untagged ingress traffic, H1 traffic is mapped to VLAN (V1) and H2 traffic to VLAN (V2), all egress traffic going out of the port on VLAN (V1) and VLAN (V2) are untagged. If both the hosts, H1 and H2 are logged out or the sessions are removed due to some reason then VLAN (V1) and VLAN (V2) are removed from the port, and the configured VLAN (V0) is restored on the port. Scenario two When a hub is connected to an access port, and the port is configured with an access VLAN (V0). The host (H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to V1. When a second host (H2) is connected and gets authorized without explicit vlan policy, H2 is expected to use the configured VLAN (V0) that is restored on the port. A ll egress traffic going out of two operational VLANs, VLAN (V0) and VLAN (V1) are untagged. If host (H2 ) is logged out or the session is removed due to some reason then the configured VLAN (V0) is removed from the port, and VLAN (V1) becomes the only operational VLAN on the port. Scenario three Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1481 Limitation in Multi-auth Per User VLAN assignment Security When a hub is connected to an access port in open mode, and the port is configured with an access VLAN (V0) . The host (H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to V1. When a second host (H2) is connected and remains unauthorized, it still has access to operational VLAN (V1) due to open mode. If host H1 is logged out or the session is removed due to some reason, VLAN (V1) is removed from the port and host (H2) gets assigned to VLAN (V0). Note The combination of Open mode and VLAN assignment has an adverse affect on host (H2) because it has an IP address in the subnet that corresponds to VLAN (V1). Limitation in Multi-auth Per User VLAN assignment In the Multi-auth Per User VLAN assignment feature, egress traffic from multiple vlans are untagged on a port where the hosts receive traffic that is not meant for them. This can be a problem with broadcast and multicast traffic. · IPv4 ARPs: Hosts receive ARP packets from other subnets. This is a problem if two subnets in different Virtual Routing and Forwarding (VRF) tables with overlapping IP address range are active on the port. The host ARP cache may get invalid entries. · IPv6 control packets: In IPv6 deployments, Router Advertisements (RA) are processed by hosts that are not supposed to receive them. When a host from one VLAN receives RA from a different VLAN, the host assign incorrect IPv6 address to itself. Such a host is unable to get access to the network. The workaround is to enable the IPv6 first hop security so that the broadcast ICMPv6 packets are converted to unicast and sent out from multi-auth enabled ports.. The packet is replicated for each client in multi-auth port belonging to the VLAN and the destination MAC is set to an individual client. Ports having one VLAN, ICMPv6 packets broadcast normally. · IP multicast: Multicast traffic destined to a multicast group gets replicated for different VLANs if the hosts on those VLANs join the multicast group. When two hosts in different VLANs join a multicast group (on the same mutli-auth port), two copies of each multicast packet are sent out from that port. MAC Move When a MAC address is authenticated on one switch port, that address is not allowed on another authentication manager-enabled port of the switch. If the switch detects that same MAC address on another authentication manager-enabled port, the address is not allowed. There are situations where a MAC address might need to move from one port to another on the same switch. For example, when there is another device (for example a hub or an IP phone) between an authenticated host and a switch port, you might want to disconnect the host from the device and connect it directly to another port on the same switch. You can globally enable MAC move so the device is reauthenticated on the new port. When a host moves to a second port, the session on the first port is deleted, and the host is reauthenticated on the new port. MAC move is supported on all host modes. (The authenticated host can move to any port on the switch, no matter which host mode is enabled on the that port.) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1482 Security MAC Replace When a MAC address moves from one port to another, the switch terminates the authenticated session on the original port and initiates a new authentication sequence on the new port. The MAC move feature applies to both voice and data hosts. Note In open authentication mode, a MAC address is immediately moved from the original port to the new port, with no requirement for authorization on the new port. MAC Replace Beginning with Cisco IOS Release 12.2(55)SE, the MAC replace feature can be configured to address the violation that occurs when a host attempts to connect to a port where another host was previously authenticated. Note This feature does not apply to ports in multi-auth mode, because violations are not triggered in that mode. It does not apply to ports in multiple host mode, because in that mode, only the first host requires authentication. If you configure the authentication violation interface configuration command with the replace keyword, the authentication process on a port in multi-domain mode is: · A new MAC address is received on a port with an existing authenticated MAC address. · The authentication manager replaces the MAC address of the current data host on the port with the new MAC address. · The authentication manager initiates the authentication process for the new MAC address. · If the authentication manager determines that the new host is a voice host, the original voice host is removed. If a port is in open authentication mode, any new MAC address is immediately added to the MAC address table. 802.1x Accounting The 802.1x standard defines how users are authorized and authenticated for network access but does not keep track of network usage. 802.1x accounting is disabled by default. You can enable 802.1x accounting to monitor this activity on 802.1x-enabled ports: · User successfully authenticates. · User logs off. · Link-down occurs. · Re-authentication successfully occurs. · Re-authentication fails. The switch does not log 802.1x accounting information. Instead, it sends this information to the RADIUS server, which must be configured to log accounting messages. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1483 802.1x Accounting Attribute-Value Pairs Security 802.1x Accounting Attribute-Value Pairs The information sent to the RADIUS server is represented in the form of Attribute-Value (AV) pairs. These AV pairs provide data for different applications. (For example, a billing application might require information that is in the Acct-Input-Octets or the Acct-Output-Octets attributes of a RADIUS packet.) AV pairs are automatically sent by a switch that is configured for 802.1x accounting. Three types of RADIUS accounting packets are sent by a switch: · STARTsent when a new user session starts · INTERIMsent during an existing session for updates · STOPsent when a session terminates You can view the AV pairs that are being sent by the switch by entering the debug radius accounting privileged EXEC command. For more information about this command, see the Cisco IOS Debug Command Reference, Release 12.4. This table lists the AV pairs and when they are sent are sent by the switch. Table 133: Accounting AV Pairs Attribute Number Attribute[1] Attribute[4] Attribute[5] Attribute[8] Attribute[25] Attribute[30] Attribute[31] Attribute[40] Attribute[41] Attribute[42] Attribute[43] Attribute[44] Attribute[45] Attribute[46] Attribute[49] Attribute[61] AV Pair Name START User-Name Always NAS-IP-Address Always NAS-Port Always Framed-IP-Address Never Class Always Called-Station-ID Always Calling-Station-ID Always Acct-Status-Type Always Acct-Delay-Time Always Acct-Input-Octets Never Acct-Output-Octets Never Acct-Session-ID Always Acct-Authentic Always Acct-Session-Time Never Acct-Terminate-Cause Never NAS-Port-Type Always INTERIM Always Always Always Sometimes20 Always Always Always Always Always Always Always Always Always Always Never Always STOP Always Always Always Sometimes Always Always Always Always Always Always Always Always Always Always Always Always Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1484 Security 802.1x Readiness Check 20 The Framed-IP-Address AV pair is sent only if a valid Dynamic Host Control Protocol (DHCP) binding exists for the host in the DHCP snooping bindings table. 802.1x Readiness Check The 802.1x readiness check monitors 802.1x activity on all the switch ports and displays information about the devices connected to the ports that support 802.1x. You can use this feature to determine if the devices connected to the switch ports are 802.1x-capable. You use an alternate authentication such as MAC authentication bypass or web authentication for the devices that do not support 802.1x functionality. This feature only works if the supplicant on the client supports a query with the NOTIFY EAP notification packet. The client must respond within the 802.1x timeout value. The 802.1x readiness check is allowed on all ports that can be configured for 802.1x. The readiness check is not available on a port that is configured as dot1x force-unauthorized. Follow these guidelines to enable the readiness check on the switch: · The readiness check is typically used before 802.1x is enabled on the switch. · If you use the dot1x test eapol-capable privileged EXEC command without specifying an interface, all the ports on the switch stack are tested. · When you configure the dot1x test eapol-capable command on an 802.1x-enabled port, and the link comes up, the port queries the connected client about its 802.1x capability. When the client responds with a notification packet, it is 802.1x-capable. A syslog message is generated if the client responds within the timeout period. If the client does not respond to the query, the client is not 802.1x-capable. No syslog message is generated. · The readiness check can be sent on a port that handles multiple hosts (for example, a PC that is connected to an IP phone). A syslog message is generated for each of the clients that respond to the readiness check within the timer period. Related Topics Configuring 802.1x Readiness Check, on page 1506 Switch-to-RADIUS-Server Communication RADIUS security servers are identified by their hostname or IP address, hostname and specific UDP port numbers, or IP address and specific UDP port numbers. The combination of the IP address and UDP port number creates a unique identifier, which enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address. If two different host entries on the same RADIUS server are configured for the same service--for example, authentication--the second host entry configured acts as the fail-over backup to the first one. The RADIUS host entries are tried in the order that they were configured. Related Topics Configuring the Switch-to-RADIUS-Server Communication, on page 1513 802.1x Authentication with VLAN Assignment The switch supports 802.1x authentication with VLAN assignment. After successful 802.1x authentication of a port, the RADIUS server sends the VLAN assignment to configure the switch port. The RADIUS server Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1485 802.1x Authentication with VLAN Assignment Security database maintains the username-to-VLAN mappings, assigning the VLAN based on the username of the client connected to the switch port. You can use this feature to limit network access for certain users. Voice device authentication is supported with multidomain host mode. When a voice device is authorized and the RADIUS server returned an authorized VLAN, the voice VLAN on the port is configured to send and receive packets on the assigned voice VLAN. Voice VLAN assignment behaves the same as data VLAN assignment on multidomain authentication (MDA)-enabled ports. When configured on the switch and the RADIUS server, 802.1x authentication with VLAN assignment has these characteristics: · If no VLAN is supplied by the RADIUS server or if 802.1x authentication is disabled, the port is configured in its access VLAN after successful authentication. Recall that an access VLAN is a VLAN assigned to an access port. All packets sent from or received on this port belong to this VLAN. · If 802.1x authentication is enabled but the VLAN information from the RADIUS server is not valid, authorization fails and configured VLAN remains in use. This prevents ports from appearing unexpectedly in an inappropriate VLAN because of a configuration error. Configuration errors could include specifying a VLAN for a routed port, a malformed VLAN ID, a nonexistent or internal (routed port) VLAN ID, an RSPAN VLAN, a shut down or suspended VLAN. In the case of a multidomain host port, configuration errors can also be due to an attempted assignment of a data VLAN that matches the configured or assigned voice VLAN ID (or the reverse). · If 802.1x authentication is enabled and all information from the RADIUS server is valid, the authorized device is placed in the specified VLAN after authentication. · If the multiple-hosts mode is enabled on an 802.1x port, all hosts are placed in the same VLAN (specified by the RADIUS server) as the first authenticated host. · Enabling port security does not impact the RADIUS server-assigned VLAN behavior. · If 802.1x authentication is disabled on the port, it is returned to the configured access VLAN and configured voice VLAN. When the port is in the force authorized, force unauthorized, unauthorized, or shutdown state, it is put into the configured access VLAN. If an 802.1x port is authenticated and put in the RADIUS server-assigned VLAN, any change to the port access VLAN configuration does not take effect. In the case of a multidomain host, the same applies to voice devices when the port is fully authorized with these exceptions: · If the VLAN configuration change of one device results in matching the other device configured or assigned VLAN, authorization of all devices on the port is terminated and multidomain host mode is disabled until a valid configuration is restored where data and voice device configured VLANs no longer match. · If a voice device is authorized and is using a downloaded voice VLAN, the removal of the voice VLAN configuration, or modifying the configuration value to dot1p or untagged results in voice device un-authorization and the disablement of multi-domain host mode. The 802.1x authentication with VLAN assignment feature is not supported on trunk ports, dynamic ports, or with dynamic-access port assignment through a VLAN Membership Policy Server (VMPS). To configure VLAN assignment you need to perform these tasks: · Enable AAA authorization by using the network keyword to allow interface configuration from the RADIUS server. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1486 Security 802.1x Authentication with Per-User ACLs · Enable 802.1x authentication. (The VLAN assignment feature is automatically enabled when you configure 802.1x authentication on an access port). · Assign vendor-specific tunnel attributes in the RADIUS server. The RADIUS server must return these attributes to the switch: · [64] Tunnel-Type = VLAN · [65] Tunnel-Medium-Type = 802 · [81] Tunnel-Private-Group-ID = VLAN name or VLAN ID Attribute [64] must contain the value VLAN (type 13). Attribute [65] must contain the value 802 (type 6). Attribute [81] specifies the VLAN name or VLAN ID assigned to the IEEE 802.1x-authenticated user. 802.1x Authentication with Per-User ACLs You can enable per-user access control lists (ACLs) to provide different levels of network access and service to an 802.1x-authenticated user. When the RADIUS server authenticates a user connected to an 802.1x port, it retrieves the ACL attributes based on the user identity and sends them to the switch. The switch applies the attributes to the 802.1x port for the duration of the user session. The switch removes the per-user ACL configuration when the session is over, if authentication fails, or if a link-down condition occurs. The switch does not save RADIUS-specified ACLs in the running configuration. When the port is unauthorized, the switch removes the ACL from the port. You can configure router ACLs and input port ACLs on the same switch. However, a port ACL takes precedence over a router ACL. If you apply input port ACL to an interface that belongs to a VLAN, the port ACL takes precedence over an input router ACL applied to the VLAN interface. Incoming packets received on the port to which a port ACL is applied are filtered by the port ACL. Incoming routed packets received on other ports are filtered by the router ACL. Outgoing routed packets are filtered by the router ACL. To avoid configuration conflicts, you should carefully plan the user profiles stored on the RADIUS server. RADIUS supports per-user attributes, including vendor-specific attributes. These vendor-specific attributes (VSAs) are in octet-string format and are passed to the switch during the authentication process. The VSAs used for per-user ACLs are inacl#<n> for the ingress direction and outacl#<n> for the egress direction. MAC ACLs are supported only in the ingress direction. The switch supports VSAs only in the ingress direction. It does not support port ACLs in the egress direction on Layer 2 ports. Use only the extended ACL syntax style to define the per-user configuration stored on the RADIUS server. When the definitions are passed from the RADIUS server, they are created by using the extended naming convention. However, if you use the Filter-Id attribute, it can point to a standard ACL. You can use the Filter-Id attribute to specify an inbound or outbound ACL that is already configured on the switch. The attribute contains the ACL number followed by .in for ingress filtering or .out for egress filtering. If the RADIUS server does not allow the .in or .out syntax, the access list is applied to the outbound ACL by default. Because of limited support of Cisco IOS access lists on the switch, the Filter-Id attribute is supported only for IP ACLs numbered 1 to 199 and 1300 to 2699 (IP standard and IP extended ACLs). Only one 802.1x-authenticated user is supported on a port. If the multiple-hosts mode is enabled on the port, the per-user ACL attribute is disabled for the associated port. The maximum size of the per-user ACL is 4000 ASCII characters but is limited by the maximum size of RADIUS-server per-user ACLs. To configure per-user ACLs: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1487 802.1x Authentication with Downloadable ACLs and Redirect URLs Security · Enable AAA authentication. · Enable AAA authorization by using the network keyword to allow interface configuration from the RADIUS server. · Enable 802.1x authentication. · Configure the user profile and VSAs on the RADIUS server. · Configure the 802.1x port for single-host mode. Note Per-user ACLs are supported only in single-host mode. 802.1x Authentication with Downloadable ACLs and Redirect URLs You can download ACLs and redirect URLs from a RADIUS server to the switch during 802.1x authentication or MAC authentication bypass of the host. You can also download ACLs during web authentication. Note A downloadable ACL is also referred to as a dACL. If more than one host is authenticated and the host is in single-host, MDA, or multiple-authentication mode, the switch changes the source address of the ACL to the host IP address. You can apply the ACLs and redirect URLs to all the devices connected to the 802.1x-enabled port. If no ACLs are downloaded during 802.1x authentication, the switch applies the static default ACL on the port to the host. On a voice VLAN port configured in multi-auth or MDA mode, the switch applies the ACL only to the phone as part of the authorization policies. Beginning with Cisco IOS Release 12.2(55)SE, if there is no static ACL on a port, a dynamic auth-default ACL is created, and policies are enforced before dACLs are downloaded and applied. Note The auth-default-ACL does not appear in the running configuration. The auth-default ACL is created when at least one host with an authorization policy is detected on the port. The auth-default ACL is removed from the port when the last authenticated session ends. You can configure the auth-default ACL by using the ip access-list extended auth-default-acl global configuration command. Note The auth-default-ACL does not support Cisco Discovery Protocol (CDP) bypass in the single host mode. You must configure a static ACL on the interface to support CDP bypass. The 802.1x and MAB authentication methods support two authentication modes, open and closed. If there is no static ACL on a port in closed authentication mode: · An auth-default-ACL is created. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1488 Security Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL · The auth-default-ACL allows only DHCP traffic until policies are enforced. · When the first host authenticates, the authorization policy is applied without IP address insertion. · When a second host is detected, the policies for the first host are refreshed, and policies for the first and subsequent sessions are enforced with IP address insertion. If there is no static ACL on a port in open authentication mode: · An auth-default-ACL-OPEN is created and allows all traffic. · Policies are enforced with IP address insertion to prevent security breaches. · Web authentication is subject to the auth-default-ACL-OPEN. To control access for hosts with no authorization policy, you can configure a directive. The supported values for the directive are open and default. When you configure the open directive, all traffic is allowed. The default directive subjects traffic to the access provided by the port. You can configure the directive either in the user profile on the AAA server or on the switch. To configure the directive on the AAA server, use the authz-directive =<open/default> global command. To configure the directive on the switch, use the epm access-control open global configuration command. Note The default value of the directive is default. If a host falls back to web authentication on a port without a configured ACL: · If the port is in open authentication mode, the auth-default-ACL-OPEN is created. · If the port is in closed authentication mode, the auth-default-ACL is created. The access control entries (ACEs) in the fallback ACL are converted to per-user entries. If the configured fallback profile does not include a fallback ACL, the host is subject to the auth-default-ACL associated with the port. Note If you use a custom logo with web authentication and it is stored on an external server, the port ACL must allow access to the external server before authentication. You must either configure a static port ACL or change the auth-default-ACL to provide appropriate access to the external server. Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL The switch uses these cisco-av-pair VSAs: · url-redirect is the HTTP or HTTPS URL. · url-redirect-acl is the switch ACL name or number. The switch uses the CiscoSecure-defined-ACL attribute value pair to intercept an HTTP or HTTPS request from the end point. The switch then forwards the client web browser to the specified redirect address. The url-redirect AV pair on the Cisco Secure ACS contains the URL to which the web browser is redirected. The url-redirect-acl attribute value pair contains the name or number of an ACL that specifies the HTTP or HTTPS traffic to redirect. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1489 Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs Security Note · Traffic that matches a permit ACE in the ACL is redirected. · Define the URL redirect ACL and the default port ACL on the switch. If a redirect URL is configured for a client on the authentication server, a default port ACL on the connected client switch port must also be configured Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs You can set the CiscoSecure-Defined-ACL Attribute-Value (AV) pair on the Cisco Secure ACS with the RADIUS cisco-av-pair vendor-specific attributes (VSAs). This pair specifies the names of the downloadable ACLs on the Cisco Secure ACS with the #ACL#-IP-name-number attribute. · The name is the ACL name. · The number is the version number (for example, 3f783768). If a downloadable ACL is configured for a client on the authentication server, a default port ACL on the connected client switch port must also be configured. If the default ACL is configured on the switch and the Cisco Secure ACS sends a host-access-policy to the switch, it applies the policy to traffic from the host connected to a switch port. If the policy does not apply, the switch applies the default ACL. If the Cisco Secure ACS sends the switch a downloadable ACL, this ACL takes precedence over the default ACL that is configured on the switch port. However, if the switch receives an host access policy from the Cisco Secure ACS but the default ACL is not configured, the authorization failure is declared. VLAN ID-based MAC Authentication You can use VLAN ID-based MAC authentication if you wish to authenticate hosts based on a static VLAN ID instead of a downloadable VLAN. When you have a static VLAN policy configured on your switch, VLAN information is sent to an IAS (Microsoft) RADIUS server along with the MAC address of each host for authentication. The VLAN ID configured on the connected port is used for MAC authentication. By using VLAN ID-based MAC authentication with an IAS server, you can have a fixed number of VLANs in the network. The feature also limits the number of VLANs monitored and handled by STP. The network can be managed as a fixed VLAN. Note This feature is not supported on Cisco ACS Server. (The ACS server ignores the sent VLAN-IDs for new hosts and only authenticates based on the MAC address.) 802.1x Authentication with Guest VLAN You can configure a guest VLAN for each 802.1x port on the switch to provide limited services to clients, such as downloading the 802.1x client. These clients might be upgrading their system for 802.1x authentication, and some hosts, such as Windows 98 systems, might not be IEEE 802.1x-capable. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1490 Security 802.1x Authentication with Restricted VLAN When you enable a guest VLAN on an 802.1x port, the switch assigns clients to a guest VLAN when the switch does not receive a response to its EAP request/identity frame or when EAPOL packets are not sent by the client. The switch maintains the EAPOL packet history. If an EAPOL packet is detected on the interface during the lifetime of the link, the switch determines that the device connected to that interface is an IEEE 802.1x-capable supplicant, and the interface does not change to the guest VLAN state. EAPOL history is cleared if the interface link status goes down. If no EAPOL packet is detected on the interface, the interface changes to the guest VLAN state. If the switch is trying to authorize an 802.1x-capable voice device and the AAA server is unavailable, the authorization attempt fails, but the detection of the EAPOL packet is saved in the EAPOL history. When the AAA server becomes available, the switch authorizes the voice device. However, the switch no longer allows other devices access to the guest VLAN. To prevent this situation, use one of these command sequences: · Enter the authentication event no-response action authorize vlan vlan-id interface configuration command to allow access to the guest VLAN. · Enter the shutdown interface configuration command followed by the no shutdown interface configuration command to restart the port. Use a restricted VLAN to allow clients that failed authentication access to the network by entering the dot1x auth-fail vlan vlan-id interface configuration command. If devices send EAPOL packets to the switch during the lifetime of the link, the switch no longer allows clients that fail authentication access to the guest VLAN. Note If an EAPOL packet is detected after the interface has changed to the guest VLAN, the interface reverts to an unauthorized state, and 802.1x authentication restarts. When the switch port is moved to the guest VLAN, the number of allowed 802.1x-incapable hosts is determined by the configured host-mode. If an 802.1x-capable client joins the same port on which the guest VLAN is configured, the port is put into the unauthorized state in the user-configured access VLAN, and authentication is restarted. Guest VLANs are supported on 802.1x ports in single host, multiple host, multi-auth and multi-domain modes. You can configure any active VLAN except an RSPAN VLAN, a private VLAN, or a voice VLAN as an 802.1x guest VLAN. The guest VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported only on access ports. The switch supports MAC authentication bypass. When MAC authentication bypass is enabled on an 802.1x port, the switch can authorize clients based on the client MAC address when IEEE 802.1x authentication times out while waiting for an EAPOL message exchange. After detecting a client on an 802.1x port, the switch waits for an Ethernet packet from the client. The switch sends the authentication server a RADIUS-access/request frame with a username and password based on the MAC address. If authorization succeeds, the switch grants the client access to the network. If authorization fails, the switch assigns the port to the guest VLAN if one is specified. 802.1x Authentication with Restricted VLAN You can configure a restricted VLAN (also referred to as an authentication failed VLAN) for each IEEE 802.1x port on a switch stack or a switch to provide limited services to clients that cannot access the guest VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1491 802.1x Authentication with Inaccessible Authentication Bypass Security These clients are 802.1x-compliant and cannot access another VLAN because they fail the authentication process. A restricted VLAN allows users without valid credentials in an authentication server (typically, visitors to an enterprise) to access a limited set of services. The administrator can control the services available to the restricted VLAN. Note You can configure a VLAN to be both the guest VLAN and the restricted VLAN if you want to provide the same services to both types of users. Without this feature, the client attempts and fails authentication indefinitely, and the switch port remains in the spanning-tree blocking state. With this feature, you can configure the switch port to be in the restricted VLAN after a specified number of authentication attempts (the default value is 3 attempts). The authenticator counts the failed authentication attempts for the client. When this count exceeds the configured maximum number of authentication attempts, the port moves to the restricted VLAN. The failed attempt count increments when the RADIUS server replies with either an EAP failure or an empty response without an EAP packet. When the port moves into the restricted VLAN, the failed attempt counter resets. Users who fail authentication remain in the restricted VLAN until the next re-authentication attempt. A port in the restricted VLAN tries to re-authenticate at configured intervals (the default is 60 seconds). If re-authentication fails, the port remains in the restricted VLAN. If re-authentication is successful, the port moves either to the configured VLAN or to a VLAN sent by the RADIUS server. You can disable re-authentication. If you do this, the only way to restart the authentication process is for the port to receive a link down or EAP logoff event. We recommend that you keep re-authentication enabled if a client might connect through a hub. When a client disconnects from the hub, the port might not receive the link down or EAP logoff event. After a port moves to the restricted VLAN, a simulated EAP success message is sent to the client. This prevents clients from indefinitely attempting authentication. Some clients (for example, devices running Windows XP) cannot implement DHCP without EAP success. Restricted VLANs are supported on 802.1x ports in all host modes and on Layer 2 ports. You can configure any active VLAN except an RSPAN VLAN, a primary private VLAN, or a voice VLAN as an 802.1x restricted VLAN. The restricted VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported only on access ports. Other security port features such as dynamic ARP Inspection, DHCP snooping, and IP source guard can be configured independently on a restricted VLAN. 802.1x Authentication with Inaccessible Authentication Bypass Use the inaccessible authentication bypass feature, also referred to as critical authentication or the AAA fail policy, when the switch cannot reach the configured RADIUS servers and new hosts cannot be authenticated. You can configure the switch to connect those hosts to critical ports. When a new host tries to connect to the critical port, that host is moved to a user-specified access VLAN, the critical VLAN. The administrator gives limited authentication to the hosts. When the switch tries to authenticate a host connected to a critical port, the switch checks the status of the configured RADIUS server. If a server is available, the switch can authenticate the host. However, if all the RADIUS servers are unavailable, the switch grants network access to the host and puts the port in the critical-authentication state, which is a special case of the authentication state. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1492 Security Inaccessible Authentication Bypass Support on Multiple-Authentication Ports Inaccessible Authentication Bypass Support on Multiple-Authentication Ports When a port is configured on any host mode and the AAA server is unavailable, the port is then configured to multi-host mode and moved to the critical VLAN. To support this inaccessible bypass on multiple-authentication (multiauth) ports, use the authentication event server dead action reinitialize vlan vlan-id command. When a new host tries to connect to the critical port, that port is reinitialized and all the connected hosts are moved to the user-specified access VLAN. This command is supported on all host modes. Inaccessible Authentication Bypass Authentication Results The behavior of the inaccessible authentication bypass feature depends on the authorization state of the port: · If the port is unauthorized when a host connected to a critical port tries to authenticate and all servers are unavailable, the switch puts the port in the critical-authentication state in the RADIUS-configured or user-specified access VLAN. · If the port is already authorized and reauthentication occurs, the switch puts the critical port in the critical-authentication state in the current VLAN, which might be the one previously assigned by the RADIUS server. · If the RADIUS server becomes unavailable during an authentication exchange, the current exchange times out, and the switch puts the critical port in the critical-authentication state during the next authentication attempt. You can configure the critical port to reinitialize hosts and move them out of the critical VLAN when the RADIUS server is again available. When this is configured, all critical ports in the critical-authentication state are automatically re-authenticated. Inaccessible Authentication Bypass Feature Interactions Inaccessible authentication bypass interacts with these features: · Guest VLAN--Inaccessible authentication bypass is compatible with guest VLAN. When a guest VLAN is enabled on 8021.x port, the features interact as follows: · If at least one RADIUS server is available, the switch assigns a client to a guest VLAN when the switch does not receive a response to its EAP request/identity frame or when EAPOL packets are not sent by the client. · If all the RADIUS servers are not available and the client is connected to a critical port, the switch authenticates the client and puts the critical port in the critical-authentication state in the RADIUS-configured or user-specified access VLAN. · If all the RADIUS servers are not available and the client is not connected to a critical port, the switch might not assign clients to the guest VLAN if one is configured. · If all the RADIUS servers are not available and if a client is connected to a critical port and was previously assigned to a guest VLAN, the switch keeps the port in the guest VLAN. · Restricted VLAN--If the port is already authorized in a restricted VLAN and the RADIUS servers are unavailable, the switch puts the critical port in the critical-authentication state in the restricted VLAN. · 802.1x accounting--Accounting is not affected if the RADIUS servers are unavailable. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1493 802.1x Critical Voice VLAN Security · Private VLAN--You can configure inaccessible authentication bypass on a private VLAN host port. The access VLAN must be a secondary private VLAN. · Voice VLAN--Inaccessible authentication bypass is compatible with voice VLAN, but the RADIUS-configured or user-specified access VLAN and the voice VLAN must be different. · Remote Switched Port Analyzer (RSPAN)--Do not configure an RSPAN VLAN as the RADIUS-configured or user-specified access VLAN for inaccessible authentication bypass. In a switch stack, the stack master checks the status of the RADIUS servers by sending keepalive packets. When the status of a RADIUS server changes, the stack master sends the information to the stack members. The stack members can then check the status of RADIUS servers when re-authenticating critical ports. If the new stack master is elected, the link between the switch stack and RADIUS server might change, and the new stack immediately sends keepalive packets to update the status of the RADIUS servers. If the server status changes from dead to alive, the switch re-authenticates all switch ports in the critical-authentication state. When a member is added to the stack, the stack master sends the member the server status. 802.1x Critical Voice VLAN When an IP phone connected to a port is authenticated by the access control server (ACS), the phone is put into the voice domain. If the ACS is not reachable, the switch cannot determine if the device is a voice device. If the server is unavailable, the phone cannot access the voice network and therefore cannot operate. For data traffic, you can configure inaccessible authentication bypass, or critical authentication, to allow traffic to pass through on the native VLAN when the server is not available. If the RADIUS authentication server is unavailable (down) and inaccessible authentication bypass is enabled, the switch grants the client access to the network and puts the port in the critical-authentication state in the RADIUS-configured or the user-specified access VLAN. When the switch cannot reach the configured RADIUS servers and new hosts cannot be authenticated, the switch connects those hosts to critical ports. A new host trying to connect to the critical port is moved to a user-specified access VLAN, the critical VLAN, and granted limited authentication. You can enter the authentication event server dead action authorize voice interface configuration command to configure the critical voice VLAN feature. When the ACS does not respond, the port goes into critical authentication mode. When traffic coming from the host is tagged with the voice VLAN, the connected device (the phone) is put in the configured voice VLAN for the port. The IP phones learn the voice VLAN identification through CDP (Cisco devices) or through LLDP or DHCP. You can configure the voice VLAN for a port by entering the switchport voice vlan vlan-id interface configuration command. This feature is supported in multidomain and multi-auth host modes. Although you can enter the command when the switch in single-host or multi-host mode, the command has no effect unless the device changes to multidomain or multi-auth host mode. 802.1x User Distribution You can configure 802.1x user distribution to load-balance users with the same group name across multiple different VLANs. The VLANs are either supplied by the RADIUS server or configured through the switch CLI under a VLAN group name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1494 Security 802.1x User Distribution Configuration Guidelines · Configure the RADIUS server to send more than one VLAN name for a user. The multiple VLAN names can be sent as part of the response to the user. The 802.1x user distribution tracks all the users in a particular VLAN and achieves load balancing by moving the authorized user to the least populated VLAN. · Configure the RADIUS server to send a VLAN group name for a user. The VLAN group name can be sent as part of the response to the user. You can search for the selected VLAN group name among the VLAN group names that you configured by using the switch CLI. If the VLAN group name is found, the corresponding VLANs under this VLAN group name are searched to find the least populated VLAN. Load balancing is achieved by moving the corresponding authorized user to that VLAN. Note The RADIUS server can send the VLAN information in any combination of VLAN-IDs, VLAN names, or VLAN groups. 802.1x User Distribution Configuration Guidelines · Confirm that at least one VLAN is mapped to the VLAN group. · You can map more than one VLAN to a VLAN group. · You can modify the VLAN group by adding or deleting a VLAN. · When you clear an existing VLAN from the VLAN group name, none of the authenticated ports in the VLAN are cleared, but the mappings are removed from the existing VLAN group. · If you clear the last VLAN from the VLAN group name, the VLAN group is cleared. · You can clear a VLAN group even when the active VLANs are mapped to the group. When you clear a VLAN group, none of the ports or users that are in the authenticated state in any VLAN within the group are cleared, but the VLAN mappings to the VLAN group are cleared. IEEE 802.1x Authentication with Voice VLAN Ports A voice VLAN port is a special access port associated with two VLAN identifiers: · VVID to carry voice traffic to and from the IP phone. The VVID is used to configure the IP phone connected to the port. · PVID to carry the data traffic to and from the workstation connected to the switch through the IP phone. The PVID is the native VLAN of the port. The IP phone uses the VVID for its voice traffic, regardless of the authorization state of the port. This allows the phone to work independently of IEEE 802.1x authentication. In single-host mode, only the IP phone is allowed on the voice VLAN. In multiple-hosts mode, additional clients can send traffic on the voice VLAN after a supplicant is authenticated on the PVID. When multiple-hosts mode is enabled, the supplicant authentication affects both the PVID and the VVID. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1495 IEEE 802.1x Authentication with Port Security Security Note If an IP phone and PC are connected to a switchport, and the port is configured in single- or multi-host mode, we do not recommend configuring that port in standalone MAC authentication bypass mode. We recommend only using MAC authentication bypass as a fallback method to 802.1x authentication with the timeout period set to the default of five seconds. A voice VLAN port becomes active when there is a link, and the device MAC address appears after the first CDP message from the IP phone. Cisco IP phones do not relay CDP messages from other devices. As a result, if several IP phones are connected in series, the switch recognizes only the one directly connected to it. When IEEE 802.1x authentication is enabled on a voice VLAN port, the switch drops packets from unrecognized IP phones more than one hop away. When IEEE 802.1x authentication is enabled on a switch port, you can configure an access port VLAN that is also a voice VLAN. Note If you enable IEEE 802.1x authentication on an access port on which a voice VLAN is configured and to which a Cisco IP Phone is connected, the Cisco IP phone loses connectivity to the switch for up to 30 seconds. IEEE 802.1x Authentication with Port Security In general, Cisco does not recommend enabling port security when IEEE 802.1x is enabled. Since IEEE 802.1x enforces a single MAC address per port (or per VLAN when MDA is configured for IP telephony), port security is redundant and in some cases may interfere with expected IEEE 802.1x operations. IEEE 802.1x Authentication with Wake-on-LAN The IEEE 802.1x authentication with wake-on-LAN (WoL) feature allows dormant PCs to be powered when the switch receives a specific Ethernet frame, known as the magic packet. You can use this feature in environments where administrators need to connect to systems that have been powered down. When a host that uses WoL is attached through an IEEE 802.1x port and the host powers off, the IEEE 802.1x port becomes unauthorized. The port can only receive and send EAPOL packets, and WoL magic packets cannot reach the host. When the PC is powered off, it is not authorized, and the switch port is not opened. When the switch uses IEEE 802.1x authentication with WoL, the switch forwards traffic to unauthorized IEEE 802.1x ports, including magic packets. While the port is unauthorized, the switch continues to block ingress traffic other than EAPOL packets. The host can receive packets but cannot send packets to other devices in the network. Note If PortFast is not enabled on the port, the port is forced to the bidirectional state. When you configure a port as unidirectional by using the authentication control-direction in interface configuration command, the port changes to the spanning-tree forwarding state. The port can send packets to the host but cannot receive packets from the host. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1496 Security IEEE 802.1x Authentication with MAC Authentication Bypass When you configure a port as bidirectional by using the authentication control-direction both interface configuration command, the port is access-controlled in both directions. The port does not receive packets from or send packets to the host. IEEE 802.1x Authentication with MAC Authentication Bypass You can configure the switch to authorize clients based on the client MAC address by using the MAC authentication bypass feature. For example, you can enable this feature on IEEE 802.1x ports connected to devices such as printers. If IEEE 802.1x authentication times out while waiting for an EAPOL response from the client, the switch tries to authorize the client by using MAC authentication bypass. When the MAC authentication bypass feature is enabled on an IEEE 802.1x port, the switch uses the MAC address as the client identity. The authentication server has a database of client MAC addresses that are allowed network access. After detecting a client on an IEEE 802.1x port, the switch waits for an Ethernet packet from the client. The switch sends the authentication server a RADIUS-access/request frame with a username and password based on the MAC address. If authorization succeeds, the switch grants the client access to the network. If authorization fails, the switch assigns the port to the guest VLAN if one is configured. If the switch already authorized a port by using MAC authentication bypass and detects an IEEE 802.1x supplicant, the switch does not unauthorize the client connected to the port. When re-authentication occurs, the switch uses the authentication or re-authentication methods configured on the port, if the previous session ended because the Termination-Action RADIUS attribute value is DEFAULT. Clients that were authorized with MAC authentication bypass can be re-authenticated. The re-authentication process is the same as that for clients that were authenticated with IEEE 802.1x. During re-authentication, the port remains in the previously assigned VLAN. If re-authentication is successful, the switch keeps the port in the same VLAN. If re-authentication fails, the switch assigns the port to the guest VLAN, if one is configured. If re-authentication is based on the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS attribute (Attribute [29]) and if the Termination-Action RADIUS attribute (Attribute [29]) action is Initialize (the attribute value is DEFAULT), the MAC authentication bypass session ends, and connectivity is lost during re-authentication. If MAC authentication bypass is enabled and the IEEE 802.1x authentication times out, the switch uses the MAC authentication bypass feature to initiate re-authorization. For more information about these AV pairs, see RFC 3580, "IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines." MAC authentication bypass interacts with the features: · IEEE 802.1x authentication--MAC authentication bypass and IEEE 802.1x authentication are configured independently on the port. · Guest VLAN--If a client has an invalid MAC address identity, the switch assigns the client to a guest VLAN if one is configured. · Restricted VLAN--This feature is not supported when the client connected to an IEEE 802.lx port is authenticated with MAC authentication bypass. · Port security · Voice VLAN · VLAN Membership Policy Server (VMPS)--IEEE802.1x and VMPS are mutually exclusive. · Private VLAN--You can assign a client to a private VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1497 Network Admission Control Layer 2 IEEE 802.1x Validation Security · Network admission control (NAC) Layer 2 IP validation--This feature takes effect after an IEEE 802.1x port is authenticated with MAC authentication bypass, including hosts in the exception list. · Network Edge Access Topology (NEAT)--MAB and NEAT are mutually exclusive. You cannot enable MAB when NEAT is enabled on an interface, and you cannot enable NEAT when MAB is enabled on an interface. Network Admission Control Layer 2 IEEE 802.1x Validation The switch supports the Network Admission Control (NAC) Layer 2 IEEE 802.1x validation, which checks the antivirus condition or posture of endpoint systems or clients before granting the devices network access. With NAC Layer 2 IEEE 802.1x validation, you can do these tasks: · Download the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS attribute (Attribute[29]) from the authentication server. · Set the number of seconds between re-authentication attempts as the value of the Session-Timeout RADIUS attribute (Attribute[27]) and get an access policy against the client from the RADIUS server. · Set the action to be taken when the switch tries to re-authenticate the client by using the Termination-Action RADIUS attribute (Attribute[29]). If the value is the DEFAULT or is not set, the session ends. If the value is RADIUS-Request, the re-authentication process starts. · View the NAC posture token, which shows the posture of the client, by using the show authentication privileged EXEC command. · Configure secondary private VLANs as guest VLANs. Configuring NAC Layer 2 IEEE 802.1x validation is similar to configuring IEEE 802.1x port-based authentication except that you must configure a posture token on the RADIUS server. Flexible Authentication Ordering You can use flexible authentication ordering to configure the order of methods that a port uses to authenticate a new host. MAC authentication bypass and 802.1x can be the primary or secondary authentication methods, and web authentication can be the fallback method if either or both of those authentication attempts fail. Related Topics Configuring Flexible Authentication Ordering, on page 1550 Open1x Authentication Open1x authentication allows a device access to a port before that device is authenticated. When open authentication is configured, a new host can pass traffic according to the access control list (ACL) defined on the port. After the host is authenticated, the policies configured on the RADIUS server are applied to that host. You can configure open authentication with these scenarios: · Single-host mode with open authenticationOnly one user is allowed network access before and after authentication. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1498 Security Multidomain Authentication · MDA mode with open authenticationOnly one user in the voice domain and one user in the data domain are allowed. · Multiple-hosts mode with open authenticationAny host can access the network. · Multiple-authentication mode with open authenticationSimilar to MDA, except multiple hosts can be authenticated. Note If open authentication is configured, it takes precedence over other authentication controls. This means that if you use the authentication open interface configuration command, the port will grant access to the host irrespective of the authentication port-control interface configuration command. In Session Aware Networking mode, to enable open authentication, use no access-session closed. To disable open authentication, use access-session closed. Related Topics Configuring Open1x, on page 1551 Multidomain Authentication The switch supports multidomain authentication (MDA), which allows both a data device and voice device, such as an IP phone (Cisco or non-Cisco), to authenticate on the same switch port. The port is divided into a data domain and a voice domain. MDA does not enforce the order of device authentication. However, for best results, we recommend that a voice device is authenticated before a data device on an MDA-enabled port. Follow these guidelines for configuring MDA: · You must configure a switch port for MDA. · You must configure the voice VLAN for the IP phone when the host mode is set to multidomain. · Voice VLAN assignment on an MDA-enabled port is supported. Note You can assign a dynamic VLAN to a voice device on an MDA-enabled switch port, but the voice device fails authorization if a static voice VLAN configured on the switchport is the same as the dynamic VLAN assigned for the voice device in the RADIUS server. · To authorize a voice device, the AAA server must be configured to send a Cisco Attribute-Value (AV) pair attribute with a value of device-traffic-class=voice. Without this value, the switch treats the voice device as a data device. · The guest VLAN and restricted VLAN features only apply to the data devices on an MDA-enabled port. The switch treats a voice device that fails authorization as a data device. · If more than one device attempts authorization on either the voice or the data domain of a port, it is error disabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1499 802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) Security · Until a device is authorized, the port drops its traffic. Non-Cisco IP phones or voice devices are allowed into both the data and voice VLANs. The data VLAN allows the voice device to contact a DHCP server to obtain an IP address and acquire the voice VLAN information. After the voice device starts sending on the voice VLAN, its access to the data VLAN is blocked. · A voice device MAC address that is binding on the data VLAN is not counted towards the port security MAC address limit. · You can use dynamic VLAN assignment from a RADIUS server only for data devices. · MDA can use MAC authentication bypass as a fallback mechanism to allow the switch port to connect to devices that do not support IEEE 802.1x authentication. · When a data or a voice device is detected on a port, its MAC address is blocked until authorization succeeds. If the authorization fails, the MAC address remains blocked for 5 minutes. · If more than five devices are detected on the data VLAN or more than one voice device is detected on the voice VLAN while a port is unauthorized, the port is error disabled. · When a port host mode is changed from single- or multihost to multidomain mode, an authorized data device remains authorized on the port. However, a Cisco IP phone that has been allowed on the port voice VLAN is automatically removed and must be reauthenticated on that port. · Active fallback mechanisms such as guest VLAN and restricted VLAN remain configured after a port changes from single- or multihost mode to multidomain mode. · Switching a port host mode from multidomain to single- or multihost mode removes all authorized devices from the port. · If a data domain is authorized first and placed in the guest VLAN, non-IEEE 802.1x-capable voice devices need to tag their packets on the voice VLAN to trigger authentication. · We do not recommend per-user ACLs with an MDA-enabled port. An authorized device with a per-user ACL policy might impact traffic on both the voice and data VLANs of the port. If used, only one device on the port should enforce per-user ACLs. 802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) The Network Edge Access Topology (NEAT) feature extends identity to areas outside the wiring closet (such as conference rooms). This allows any type of device to authenticate on the port. · 802.1x switch supplicant: You can configure a switch to act as a supplicant to another switch by using the 802.1x supplicant feature. This configuration is helpful in a scenario, where, for example, a switch is outside a wiring closet and is connected to an upstream switch through a trunk port. A switch configured with the 802.1x switch supplicant feature authenticates with the upstream switch for secure connectivity. Once the supplicant switch authenticates successfully the port mode changes from access to trunk. · If the access VLAN is configured on the authenticator switch, it becomes the native VLAN for the trunk port after successful authentication. You can enable MDA or multiauth mode on the authenticator switch interface that connects to one more supplicant switches. Multihost mode is not supported on the authenticator switch interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1500 Security Voice Aware 802.1x Security Use the dot1x supplicant force-multicast global configuration command on the supplicant switch for Network Edge Access Topology (NEAT) to work in all host modes. · Host Authorization: Ensures that only traffic from authorized hosts (connecting to the switch with supplicant) is allowed on the network. The switches use Client Information Signalling Protocol (CISP) to send the MAC addresses connecting to the supplicant switch to the authenticator switch. · Auto enablement: Automatically enables trunk configuration on the authenticator switch, allowing user traffic from multiple VLANs coming from supplicant switches. Configure the cisco-av-pair as device-traffic-class=switch at the ACS. (You can configure this under the group or the user settings.) Figure 90: Authenticator and Supplicant Switch using CISP 1 Workstations (clients) 2 Supplicant switch (outside wiring closet) 3 Authenticator switch 4 Access control server (ACS) 5 Trunk port Voice Aware 802.1x Security You use the voice aware 802.1x security feature to configure the switch to disable only the VLAN on which a security violation occurs, whether it is a data or voice VLAN. In previous releases, when an attempt to authenticate the data client caused a security violation, the entire port shut down, resulting in a complete loss of connectivity. You can use this feature in IP phone deployments where a PC is connected to the IP phone. A security violation found on the data VLAN results in the shutdown of only the data VLAN. The traffic on the voice VLAN flows through the switch without interruption. Related Topics Configuring Voice Aware 802.1x Security, on page 1507 Common Session ID Authentication manager uses a single session ID (referred to as a common session ID) for a client no matter which authentication method is used. This ID is used for all reporting purposes, such as the show commands and MIBs. The session ID appears with all per-session syslog messages. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1501 How to Configure 802.1x Port-Based Authentication Security The session ID includes: · The IP address of the Network Access Device (NAD) · A monotonically increasing unique 32 bit integer · The session start time stamp (a 32 bit integer) This example shows how the session ID appears in the output of the show authentication command. The session ID in this example is 160000050000000B288508E5: Switch# show authentication sessions Interface MAC Address Method Domain Fa4/0/4 0000.0000.0203 mab DATA Status Session ID Authz Success 160000050000000B288508E5 This is an example of how the session ID appears in the syslog output. The session ID in this example is also160000050000000B288508E5: 1w0d: %AUTHMGR-5-START: Starting 'mab' for client (0000.0000.0203) on Interface Fa4/0/4 AuditSessionID 160000050000000B288508E5 1w0d: %MAB-5-SUCCESS: Authentication successful for client (0000.0000.0203) on Interface Fa4/0/4 AuditSessionID 160000050000000B288508E5 1w0d: %AUTHMGR-7-RESULT: Authentication result 'success' from 'mab' for client (0000.0000.0203) on Interface Fa4/0/4 AuditSessionID 160000050000000B288508E5 The session ID is used by the NAD, the AAA server, and other report-analyzing applications to identify the client. The ID appears automatically. No configuration is required. How to Configure 802.1x Port-Based Authentication Default 802.1x Authentication Configuration Table 134: Default 802.1x Authentication Configuration Feature Switch 802.1x enable state Per-port 802.1x enable state AAA RADIUS server · IP address · UDP authentication port · Key Default Setting Disabled. Disabled (force-authorized). The port sends and receives normal traffic without 802.1x-based authentication of the client. Disabled. · None specified. · 1812. · None specified. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1502 Security Default 802.1x Authentication Configuration Feature Default Setting Host mode Single-host mode. Control direction Bidirectional control. Periodic re-authentication Disabled. Number of seconds between re-authentication attempts 3600 seconds. Re-authentication number 2 times (number of times that the switch restarts the authentication process before the port changes to the unauthorized state). Quiet period 60 seconds (number of seconds that the switch remains in the quiet state following a failed authentication exchange with the client). Retransmission time 30 seconds (number of seconds that the switch should wait for a response to an EAP request/identity frame from the client before resending the request). Maximum retransmission number 2 times (number of times that the switch will send an EAP-request/identity frame before restarting the authentication process). Client timeout period 30 seconds (when relaying a request from the authentication server to the client, the amount of time the switch waits for a response before resending the request to the client.) Authentication server timeout period 30 seconds (when relaying a response from the client to the authentication server, the amount of time the switch waits for a reply before resending the response to the server.) You can change this timeout period by using the dot1x timeout server-timeout interface configuration command. Guest VLAN None specified. Inaccessible authentication bypass Disabled. Restricted VLAN None specified. Authenticator (switch) mode None specified. MAC authentication bypass Disabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1503 802.1x Authentication Configuration Guidelines Security 802.1x Authentication Configuration Guidelines 802.1x Authentication These are the 802.1x authentication configuration guidelines: · When 802.1x authentication is enabled, ports are authenticated before any other Layer 2 or Layer 3 features are enabled. · If the VLAN to which an 802.1x-enabled port is assigned changes, this change is transparent and does not affect the switch. For example, this change occurs if a port is assigned to a RADIUS server-assigned VLAN and is then assigned to a different VLAN after re-authentication. If the VLAN to which an 802.1x port is assigned to shut down, disabled, or removed, the port becomes unauthorized. For example, the port is unauthorized after the access VLAN to which a port is assigned shuts down or is removed. · The 802.1x protocol is supported on Layer 2 static-access ports, voice VLAN ports, and Layer 3 routed ports, but it is not supported on these port types: · Trunk port--If you try to enable 802.1x authentication on a trunk port, an error message appears, and 802.1x authentication is not enabled. If you try to change the mode of an 802.1x-enabled port to trunk, an error message appears, and the port mode is not changed. · Dynamic ports--A port in dynamic mode can negotiate with its neighbor to become a trunk port. If you try to enable 802.1x authentication on a dynamic port, an error message appears, and 802.1x authentication is not enabled. If you try to change the mode of an 802.1x-enabled port to dynamic, an error message appears, and the port mode is not changed. · Dynamic-access ports--If you try to enable 802.1x authentication on a dynamic-access (VLAN Query Protocol [VQP]) port, an error message appears, and 802.1x authentication is not enabled. If you try to change an 802.1x-enabled port to dynamic VLAN assignment, an error message appears, and the VLAN configuration is not changed. · EtherChannel port--Do not configure a port that is an active or a not-yet-active member of an EtherChannel as an 802.1x port. If you try to enable 802.1x authentication on an EtherChannel port, an error message appears, and 802.1x authentication is not enabled. · Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) destination ports--You can enable 802.1x authentication on a port that is a SPAN or RSPAN destination port. However, 802.1x authentication is disabled until the port is removed as a SPAN or RSPAN destination port. You can enable 802.1x authentication on a SPAN or RSPAN source port. · Before globally enabling 802.1x authentication on a switch by entering the dot1x system-auth-control global configuration command, remove the EtherChannel configuration from the interfaces on which 802.1x authentication and EtherChannel are configured. · If you are using a device running the Cisco Access Control Server (ACS) application for IEEE 802.1x authentication with EAP-Transparent LAN Services (TLS) and EAP-MD5, make sure that the device is running ACS Version 3.2.1 or later. · When IP phones are connected to an 802.1x-enabled switch port that is in single host mode, the switch grants the phones network access without authenticating them. We recommend that you use multidomain authentication (MDA) on the port to authenticate both a data device and a voice device, such as an IP phone. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1504 Security VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass Note Only Catalyst 3750, 3560, and 2960 switches support CDP bypass. The Catalyst 3750-X, 3560-X, 3750-E, and 3560-E switches do not support CDP bypass. · Cisco IOS Release 12.2(55)SE and later supports filtering of system messages related to 802.1x authentication. VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass These are the configuration guidelines for VLAN assignment, guest VLAN, restricted VLAN, and inaccessible authentication bypass: · When 802.1x authentication is enabled on a port, you cannot configure a port VLAN that is equal to a voice VLAN. · The 802.1x authentication with VLAN assignment feature is not supported on trunk ports, dynamic ports, or with dynamic-access port assignment through a VMPS. · You can configure 802.1x authentication on a private-VLAN port, but do not configure IEEE 802.1x authentication with port security, a voice VLAN, a guest VLAN, a restricted VLAN, or a per-user ACL on private-VLAN ports. · You can configure any VLAN except an RSPAN VLAN or a voice VLAN as an 802.1x guest VLAN. The guest VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported only on access ports. · After you configure a guest VLAN for an 802.1x port to which a DHCP client is connected, you might need to get a host IP address from a DHCP server. You can change the settings for restarting the 802.1x authentication process on the switch before the DHCP process on the client times out and tries to get a host IP address from the DHCP server. Decrease the settings for the 802.1x authentication process (authentication timer inactivity and authentication timer reauthentication interface configuration commands). The amount to decrease the settings depends on the connected 802.1x client type. · When configuring the inaccessible authentication bypass feature, follow these guidelines: · The feature is supported on 802.1x port in single-host mode and multihosts mode. · If the client is running Windows XP and the port to which the client is connected is in the critical-authentication state, Windows XP might report that the interface is not authenticated. · If the Windows XP client is configured for DHCP and has an IP address from the DHCP server, receiving an EAP-Success message on a critical port might not re-initiate the DHCP configuration process. · You can configure the inaccessible authentication bypass feature and the restricted VLAN on an 802.1x port. If the switch tries to re-authenticate a critical port in a restricted VLAN and all the RADIUS servers are unavailable, switch changes the port state to the critical authentication state and remains in the restricted VLAN. · You can configure any VLAN except an RSPAN VLAN or a voice VLAN as an 802.1x restricted VLAN. The restricted VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported only on access ports. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1505 MAC Authentication Bypass Security MAC Authentication Bypass These are the MAC authentication bypass configuration guidelines: · Unless otherwise stated, the MAC authentication bypass guidelines are the same as the 802.1x authentication guidelines. · If you disable MAC authentication bypass from a port after the port has been authorized with its MAC address, the port state is not affected. · If the port is in the unauthorized state and the client MAC address is not the authentication-server database, the port remains in the unauthorized state. However, if the client MAC address is added to the database, the switch can use MAC authentication bypass to re-authorize the port. · If the port is in the authorized state, the port remains in this state until re-authorization occurs. Maximum Number of Allowed Devices Per Port This is the maximum number of devices allowed on an 802.1x-enabled port: · In single-host mode, only one device is allowed on the access VLAN. If the port is also configured with a voice VLAN, an unlimited number of Cisco IP phones can send and receive traffic through the voice VLAN. · In multidomain authentication (MDA) mode, one device is allowed for the access VLAN, and one IP phone is allowed for the voice VLAN. · In multihost mode, only one 802.1x supplicant is allowed on the port, but an unlimited number of non-802.1x hosts are allowed on the access VLAN. An unlimited number of devices are allowed on the voice VLAN. Configuring 802.1x Readiness Check Beginning in privileged EXEC mode, follow these steps to enable the 802.1x readiness check on the switch: SUMMARY STEPS 1. dot1x test eapol-capable [interface interface-id] 2. configure terminal 3. dot1x test timeout timeout 4. end DETAILED STEPS Step 1 Command or Action dot1x test eapol-capable [interface interface-id] Example: Switch# dot1x test eapol-capable interface gigabitethernet1/0/13 Purpose Enables the 802.1x readiness check on the switch. (Optional) For interface-id specify the port on which to check for IEEE 802.1x readiness. Note If you omit the optional interface keyword, all interfaces on the switch are tested. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1506 Security Configuring Voice Aware 802.1x Security Step 2 Command or Action configure terminal Example: Switch# configure terminal Step 3 dot1x test timeout timeout Example: Switch(config)# dot1x test timeout 300 Step 4 end Example: Switch(config)# end Purpose (Optional) Enters global configuration mode. (Optional) Configures the timeout used to wait for EAPOL response. The range is from 1 to 65535 seconds. The default is 10 seconds. Returns to privileged EXEC mode. Related Topics 802.1x Readiness Check, on page 1485 Configuring Voice Aware 802.1x Security Follow these guidelines to configure voice aware 802.1x voice security on the switch: · You enable voice aware 802.1x security by entering the errdisable detect cause security-violation shutdown vlan global configuration command. You disable voice aware 802.1x security by entering the no version of this command. This command applies to all 802.1x-configured ports in the switch. Note If you do not include the shutdown vlan keywords, the entire port is shut down when it enters the error-disabled state. · If you use the errdisable recovery cause security-violation global configuration command to configure error-disabled recovery, the port is automatically re-enabled. If error-disabled recovery is not configured for the port, you re-enable it by using the shutdown and no shutdown interface configuration commands. · You can re-enable individual VLANs by using the clear errdisable interface interface-id vlan [vlan-list] privileged EXEC command. If you do not specify a range, all VLANs on the port are enabled. Beginning in privileged EXEC mode, follow these steps to enable voice aware 802.1x security: SUMMARY STEPS 1. configure terminal 2. errdisable detect cause security-violation shutdown vlan 3. errdisable recovery cause security-violation 4. clear errdisable interface interface-id vlan [vlan-list] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1507 Configuring Voice Aware 802.1x Security Security 5. Enter the following: · shutdown · no shutdown 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 Step 3 errdisable detect cause security-violation shutdown vlan Shuts down any VLAN on which a security violation error Example: occurs. Note If the shutdown vlan keywords are not included, Switch(config)# errdisable detect cause the entire port enters the error-disabled state and security-violation shutdown vlan shuts down. errdisable recovery cause security-violation Example: Switch(config)# errdisable recovery cause security-violation (Optional) Enables automatic per-VLAN error recovery. Step 4 Step 5 clear errdisable interface interface-id vlan [vlan-list] Example: Switch(config)# clear errdisable interface GigabitEthernet4/0/2 vlan (Optional) Reenables individual VLANs that have been error disabled. · For interface-id, specify the port on which to reenable individual VLANs. · (Optional) For vlan-list, specify a list of VLANs to be re-enabled. If vlan-list is not specified, all VLANs are re-enabled. Enter the following: · shutdown · no shutdown Example: Switch(config-if)# shutdown Switch(config-if)# no shutdown (Optional) Re-enables an error-disabled VLAN, and clear all error-disable indications. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1508 Security Configuring 802.1x Violation Modes Step 6 Command or Action end Example: Switch(config-if)# end Purpose Returns to privileged EXEC mode. Related Topics Voice Aware 802.1x Security, on page 1501 Configuring 802.1x Violation Modes You can configure an 802.1x port so that it shuts down, generates a syslog error, or discards packets from a new device when: · a device connects to an 802.1x-enabled port · the maximum number of allowed about devices have been authenticated on the port Beginning in privileged EXEC mode, follow these steps to configure the security violation actions on the switch: SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. aaa authentication dot1x {default} method1 4. interface interface-id 5. switchport mode access 6. authentication violation {shutdown | restrict | protect | replace} 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 aaa new-model Example: Switch(config)# aaa new-model Enables AAA. Step 3 aaa authentication dot1x {default} method1 Creates an 802.1x authentication method list. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1509 Configuring 802.1x Authentication Security Step 4 Command or Action Purpose Example: Switch(config)# aaa authentication dot1x default group radius To create a default list that is used when a named list is not specified in the authentication command, use the default keyword followed by the method that is to be used in default situations. The default method list is automatically applied to all ports. For method1, enter the group radius keywords to use the list of all RADIUS servers for authentication. Note Though other keywords are visible in the command-line help string, only the group radius keywords are supported. interface interface-id Example: Switch(config)# interface gigabitethernet1/0/4 Specifies the port connected to the client that is to be enabled for IEEE 802.1x authentication, and enter interface configuration mode. Step 5 switchport mode access Example: Switch(config-if)# switchport mode access Sets the port to access mode. Step 6 Step 7 authentication violation {shutdown | restrict | protect | Configures the violation mode. The keywords have these replace} meanings: Example: · shutdownError disable the port. Switch(config-if)# authentication violation restrict · restrictGenerate a syslog error. · protectDrop packets from any new device that sends traffic to the port. · replaceRemoves the current session and authenticates with the new host. end Example: Switch(config-if)# end Returns to privileged EXEC mode. Configuring 802.1x Authentication To allow per-user ACLs or VLAN assignment, you must enable AAA authorization to configure the switch for all network-related service requests. This is the 802.1x AAA process: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1510 Security Configuring 802.1x Port-Based Authentication Before you begin To configure 802.1x port-based authentication, you must enable authentication, authorization, and accounting (AAA) and specify the authentication method list. A method list describes the sequence and authentication method to be queried to authenticate a user. SUMMARY STEPS 1. A user connects to a port on the switch. 2. Authentication is performed. 3. VLAN assignment is enabled, as appropriate, based on the RADIUS server configuration. 4. The switch sends a start message to an accounting server. 5. Re-authentication is performed, as necessary. 6. The switch sends an interim accounting update to the accounting server that is based on the result of re-authentication. 7. The user disconnects from the port. 8. The switch sends a stop message to the accounting server. DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose A user connects to a port on the switch. Authentication is performed. VLAN assignment is enabled, as appropriate, based on the RADIUS server configuration. The switch sends a start message to an accounting server. Re-authentication is performed, as necessary. The switch sends an interim accounting update to the accounting server that is based on the result of re-authentication. The user disconnects from the port. The switch sends a stop message to the accounting server. Configuring 802.1x Port-Based Authentication Beginning in privileged EXEC mode, follow these steps to configure 802.1x port-based authentication: SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. aaa authentication dot1x {default} method1 4. dot1x system-auth-control 5. aaa authorization network {default} group radius 6. radius-server host ip-address Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1511 Configuring 802.1x Port-Based Authentication Security 7. radius-server key string 8. interface interface-id 9. switchport mode access 10. authentication port-control auto 11. dot1x pae authenticator 12. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 aaa new-model Example: Switch(config)# aaa new-model Enables AAA. Step 3 Step 4 aaa authentication dot1x {default} method1 Creates an 802.1x authentication method list. Example: To create a default list that is used when a named list is not specified in the authentication command, use the Switch(config)# aaa authentication dot1x default default keyword followed by the method that is to be used group radius in default situations. The default method list is automatically applied to all ports. For method1, enter the group radius keywords to use the list of all RADIUS servers for authentication. Note Though other keywords are visible in the command-line help string, only the group radius keywords are supported. dot1x system-auth-control Example: Enables 802.1x authentication globally on the switch. Switch(config)# dot1x system-auth-control Step 5 aaa authorization network {default} group radius Example: (Optional) Configures the switch to use user-RADIUS authorization for all network-related service requests, such as per-user ACLs or VLAN assignment. Switch(config)# aaa authorization network default Note group radius For per-user ACLs, single-host mode must be configured. This setting is the default. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1512 Security Configuring the Switch-to-RADIUS-Server Communication Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action radius-server host ip-address Example: Purpose (Optional) Specifies the IP address of the RADIUS server. Switch(config)# radius-server host 124.2.2.12 radius-server key string Example: Switch(config)# radius-server key abc1234 (Optional) Specifies the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. interface interface-id Example: Specifies the port connected to the client that is to be enabled for IEEE 802.1x authentication, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 switchport mode access Example: Switch(config-if)# switchport mode access (Optional) Sets the port to access mode only if you configured the RADIUS server in Step 6 and Step 7. authentication port-control auto Example: Enables 802.1x authentication on the port. Switch(config-if)# authentication port-control auto dot1x pae authenticator Example: Switch(config-if)# dot1x pae authenticator Sets the interface Port Access Entity to act only as an authenticator and ignore messages meant for a supplicant. end Example: Switch(config-if)# end Returns to privileged EXEC mode. Configuring the Switch-to-RADIUS-Server Communication You can globally configure the timeout, retransmission, and encryption key values for all RADIUS servers by using the radius-server host global configuration command. If you want to configure these options on a Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1513 Configuring the Switch-to-RADIUS-Server Communication Security per-server basis, use the radius-server timeout, the radius-server retransmit, and the radius-server key global configuration commands. You also need to configure some settings on the RADIUS server. These settings include the IP address of the switch and the key string to be shared by both the server and the switch. For more information, see the RADIUS server documentation. Beginning in privileged EXEC mode, follow these steps to configure the RADIUS server parameters on the switch. This procedure is required. Before you begin You must enable authentication, authorization, and accounting (AAA) and specify the authentication method list. A method list describes the sequence and authentication method to be queried to authenticate a user. SUMMARY STEPS 1. configure terminal 2. radius-server host {hostname | ip-address} auth-port port-number key string 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 radius-server host {hostname | ip-address} auth-port port-number key string Example: Switch(config)# radius-server host 125.5.5.43 auth-port 1812 key string Configures the RADIUS server parameters. For hostname | ip-address, specify the hostname or IP address of the remote RADIUS server. For auth-port port-number, specify the UDP destination port for authentication requests. The default is 1812. The range is 0 to 65536. For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server. Note Always configure the key as the last item in the radius-server host command syntax because leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks are part of the key. This key must match the encryption used on the RADIUS daemon. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1514 Security Configuring the Host Mode Command or Action Step 3 end Example: Switch(config)# end Purpose If you want to use multiple RADIUS servers, re-enter this command. Returns to privileged EXEC mode. Related Topics Switch-to-RADIUS-Server Communication, on page 1485 Configuring the Host Mode Beginning in privileged EXEC mode, follow these steps to allow multiple hosts (clients) on an IEEE 802.1x-authorized port that has the authentication port-control interface configuration command set to auto. Use the multi-domain keyword to configure and enable multidomain authentication (MDA), which allows both a host and a voice device, such as an IP phone (Cisco or non-Cisco), on the same switch port. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. authentication host-mode [multi-auth | multi-domain | multi-host | single-host] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to which multiple hosts are indirectly attached, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 Step 3 authentication host-mode [multi-auth | multi-domain | Allows multiple hosts (clients) on an 802.1x-authorized multi-host | single-host] port. Example: The keywords have these meanings: Switch(config-if)# authentication host-mode · multi-authAllow one client on the voice VLAN and multiple authenticated clients on the data VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1515 Configuring Periodic Re-Authentication Security Command or Action multi-host Step 4 end Example: Switch(config-if)# end Purpose Note The multi-auth keyword is only available with the authentication host-mode command. · multi-hostAllow multiple hosts on an 802.1x-authorized port after a single host has been authenticated. · multi-domainAllow both a host and a voice device, such as an IP phone (Cisco or non-Cisco), to be authenticated on an IEEE 802.1x-authorized port. Note You must configure the voice VLAN for the IP phone when the host mode is set to multi-domain. Make sure that the authentication port-control interface configuration command is set to auto for the specified interface. Returns to privileged EXEC mode. Configuring Periodic Re-Authentication You can enable periodic 802.1x client re-authentication and specify how often it occurs. If you do not specify a time period before enabling re-authentication, the number of seconds between attempts is 3600. Beginning in privileged EXEC mode, follow these steps to enable periodic re-authentication of the client and to configure the number of seconds between re-authentication attempts. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. authentication periodic 4. authentication timer {{[inactivity | reauthenticate | restart]} {value}} 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1516 Security Changing the Quiet Period Command or Action Switch# configure terminal Purpose Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 Step 3 Step 4 Step 5 authentication periodic Example: Switch(config-if)# authentication periodic authentication timer {{[inactivity | reauthenticate | restart]} {value}} Example: Switch(config-if)# authentication timer reauthenticate 180 end Example: Switch(config-if)# end Enables periodic re-authentication of the client, which is disabled by default. Note The default value is 3600 seconds. To change the value of the reauthentication timer or to have the switch use a RADIUS-provided session timeout, enter the authentication timer reauthenticate command. Sets the number of seconds between re-authentication attempts. The authentication timer keywords have these meanings: · inactivity--Interval in seconds after which if there is no activity from the client then it is unauthorized · reauthenticate--Time in seconds after which an automatic re-authentication attempt is initiated · restart value--Interval in seconds after which an attempt is made to authenticate an unauthorized port This command affects the behavior of the switch only if periodic re-authentication is enabled. Returns to privileged EXEC mode. Changing the Quiet Period When the switch cannot authenticate the client, the switch remains idle for a set period of time and then tries again. The authentication timer inactivity interface configuration command controls the idle period. A failed authentication of the client might occur because the client provided an invalid password. You can provide a faster response time to the user by entering a number smaller than the default. Beginning in privileged EXEC mode, follow these steps to change the quiet period. This procedure is optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1517 Changing the Quiet Period Security SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. authentication timer inactivity seconds 4. end 5. show authentication sessions interface interface-id 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 Step 3 authentication timer inactivity seconds Example: Sets the number of seconds that the switch remains in the quiet state following a failed authentication exchange with the client. Switch(config-if)# authentication timer inactivity The range is 1 to 65535 seconds; the default is 60. 30 Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 5 show authentication sessions interface interface-id Example: Verifies your entries. Switch# show authentication sessions interface gigabitethernet2/0/1 Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1518 Security Changing the Switch-to-Client Retransmission Time Changing the Switch-to-Client Retransmission Time The client responds to the EAP-request/identity frame from the switch with an EAP-response/identity frame. If the switch does not receive this response, it waits a set period of time (known as the retransmission time) and then resends the frame. Note You should change the default value of this command only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers. Beginning in privileged EXEC mode, follow these steps to change the amount of time that the switch waits for client notification. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. authentication timer reauthenticate seconds 4. end 5. show authentication sessions interface interface-id 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 Step 3 authentication timer reauthenticate seconds Example: Switch(config-if)# authentication timer reauthenticate 60 Sets the number of seconds that the switch waits for a response to an EAP-request/identity frame from the client before resending the request. The range is 1 to 65535 seconds; the default is 5. Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1519 Setting the Switch-to-Client Frame-Retransmission Number Security Step 5 Command or Action show authentication sessions interface interface-id Example: Purpose Verifies your entries. Switch# show authentication sessions interface gigabitethernet2/0/1 Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Setting the Switch-to-Client Frame-Retransmission Number In addition to changing the switch-to-client retransmission time, you can change the number of times that the switch sends an EAP-request/identity frame (assuming no response is received) to the client before restarting the authentication process. Note You should change the default value of this command only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers. Beginning in privileged EXEC mode, follow these steps to set the switch-to-client frame-retransmission number. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. dot1x max-reauth-req count 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1520 Security Setting the Re-Authentication Number Command or Action Purpose Switch(config)# interface gigabitethernet2/0/1 Step 3 dot1x max-reauth-req count Example: Switch(config-if)# dot1x max-reauth-req 5 Sets the number of times that the switch sends an EAP-request/identity frame to the client before restarting the authentication process. The range is 1 to 10; the default is 2. Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Setting the Re-Authentication Number You can also change the number of times that the switch restarts the authentication process before the port changes to the unauthorized state. Note You should change the default value of this command only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers. Beginning in privileged EXEC mode, follow these steps to set the re-authentication number. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode access 4. dot1x max-req count 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1521 Enabling MAC Move Security Command or Action Switch# interface gigabitethernet2/0/1 Step 3 switchport mode access Example: Switch(config-if)# switchport mode access Step 4 dot1x max-req count Example: Switch(config-if)# dot1x max-req 4 Step 5 end Example: Switch(config-if)# end Purpose Sets the port to access mode only if you previously configured the RADIUS server. Sets the number of times that the switch restarts the authentication process before the port changes to the unauthorized state. The range is 0 to 10; the default is 2. Returns to privileged EXEC mode. Enabling MAC Move MAC move allows an authenticated host to move from one port on the switch to another. Beginning in privileged EXEC mode, follow these steps to globally enable MAC move on the switch. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. authentication mac-move permit 3. end 4. show running-config 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 authentication mac-move permit Example: Enables MAC move on the switch. Default is deny. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1522 Security Enabling MAC Replace Step 3 Command or Action Switch(config)# authentication mac-move permit end Example: Purpose In Session Aware Networking mode, the default CLI is access-session mac-move deny. To enable Mac Move in Session Aware Networking, use the no access-session mac-move global configuration command. Returns to privileged EXEC mode. Switch(config)# end Step 4 show running-config Example: Switch# show running-config Verifies your entries. Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Enabling MAC Replace MAC replace allows a host to replace an authenticated host on a port. Beginning in privileged EXEC mode, follow these steps to enable MAC replace on an interface. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. authentication violation {protect | replace | restrict | shutdown} 4. end 5. show running-config 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1523 Configuring 802.1x Accounting Security Step 2 Command or Action interface interface-id Example: Purpose Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/2 Step 3 Step 4 authentication violation {protect | replace | restrict | Use the replace keyword to enable MAC replace on the shutdown} interface. The port removes the current session and initiates Example: authentication with the new host. The other keywords have these effects: Switch(config-if)# authentication violation replace · protect: the port drops packets with unexpected MAC addresses without generating a system message. · restrict: violating packets are dropped by the CPU and a system message is generated. · shutdown: the port is error disabled when it receives an unexpected MAC address. end Example: Returns to privileged EXEC mode. Switch(config-if)# end Step 5 show running-config Example: Switch# show running-config Verifies your entries. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring 802.1x Accounting Enabling AAA system accounting with 802.1x accounting allows system reload events to be sent to the accounting RADIUS server for logging. The server can then infer that all active 802.1x sessions are closed. Because RADIUS uses the unreliable UDP transport protocol, accounting messages might be lost due to poor network conditions. If the switch does not receive the accounting response message from the RADIUS server after a configurable number of retransmissions of an accounting request, this system message appears: Accounting message %s for session %s failed to receive Accounting Response. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1524 Security Configuring 802.1x Accounting When the stop message is not sent successfully, this message appears: 00:09:55: %RADIUS-4-RADIUS_DEAD: RADIUS server 172.20.246.201:1645,1646 is not responding. Note You must configure the RADIUS server to perform accounting tasks, such as logging start, stop, and interim-update messages and time stamps. To turn on these functions, enable logging of "Update/Watchdog packets from this AAA client" in your RADIUS server Network Configuration tab. Next, enable "CVS RADIUS Accounting" in your RADIUS server System Configuration tab. Beginning in privileged EXEC mode, follow these steps to configure 802.1x accounting after AAA is enabled on your switch. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. aaa accounting dot1x default start-stop group radius 4. aaa accounting system default start-stop group radius 5. end 6. show running-config 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/3 Step 3 aaa accounting dot1x default start-stop group radius Enables 802.1x accounting using the list of all RADIUS Example: servers. Switch(config-if)# aaa accounting dot1x default start-stop group radius Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1525 Configuring a Guest VLAN Security Step 4 Command or Action Purpose aaa accounting system default start-stop group radius (Optional) Enables system accounting (using the list of all Example: RADIUS servers) and generates system accounting reload event messages when the switch reloads. Switch(config-if)# aaa accounting system default start-stop group radius Step 5 end Example: Switch(config-if)# end Returns to privileged EXEc mode. Step 6 show running-config Example: Switch# show running-config Verifies your entries. Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring a Guest VLAN When you configure a guest VLAN, clients that are not 802.1x-capable are put into the guest VLAN when the server does not receive a response to its EAP request/identity frame. Clients that are 802.1x-capable but that fail authentication are not granted network access. The switch supports guest VLANs in single-host or multiple-hosts mode. Beginning in privileged EXEC mode, follow these steps to configure a guest VLAN. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. Use one of the following: · switchport mode access · switchport mode private-vlan host 4. authentication event no-response action authorize vlan vlan-id 5. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1526 Security Configuring a Restricted VLAN DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/2 Step 3 Use one of the following: · switchport mode access · switchport mode private-vlan host Example: Switch(config-if)# switchport mode private-vlan host · Sets the port to access mode. · Configures the Layer 2 port as a private-VLAN host port. Step 4 authentication event no-response action authorize vlan Specifies an active VLAN as an 802.1x guest VLAN. The vlan-id range is 1 to 4094. Example: You can configure any active VLAN except an internal VLAN (routed port), an RSPAN VLAN or a voice VLAN Switch(config-if)# authentication event no-response as an 802.1x guest VLAN. action authorize vlan 2 Step 5 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Configuring a Restricted VLAN When you configure a restricted VLAN on a switch stack or a switch, clients that are IEEE 802.1x-compliant are moved into the restricted VLAN when the authentication server does not receive a valid username and password. The switch supports restricted VLANs only in single-host mode. Beginning in privileged EXEC mode, follow these steps to configure a restricted VLAN. This procedure is optional. SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1527 Configuring a Restricted VLAN Security 2. interface interface-id 3. Use one of the following: · switchport mode access · switchport mode private-vlan host 4. authentication port-control auto 5. authentication event fail action authorize vlan vlan-id 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/2 Step 3 Use one of the following: · switchport mode access · switchport mode private-vlan host Example: Switch(config-if)# switchport mode access · Sets the port to access mode. · Configures the Layer 2 port as a private-VLAN host port. Step 4 authentication port-control auto Example: Enables 802.1x authentication on the port. Switch(config-if)# authentication port-control auto Step 5 Step 6 authentication event fail action authorize vlan vlan-id Specifies an active VLAN as an 802.1x restricted VLAN. Example: The range is 1 to 4094. You can configure any active VLAN except an internal Switch(config-if)# authentication event fail action VLAN (routed port), an RSPAN VLAN or a voice VLAN authorize vlan 2 as an 802.1x restricted VLAN. end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1528 Security Configuring Number of Authentication Attempts on a Restricted VLAN Command or Action Switch(config-if)# end Purpose Configuring Number of Authentication Attempts on a Restricted VLAN You can configure the maximum number of authentication attempts allowed before a user is assigned to the restricted VLAN by using the authentication event retry retry count interface configuration command. The range of allowable authentication attempts is 1 to 3. The default is 3 attempts. Beginning in privileged EXEC mode, follow these steps to configure the maximum number of allowed authentication attempts. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. Use one of the following: · switchport mode access · switchport mode private-vlan host 4. authentication port-control auto 5. authentication event fail action authorize vlan vlan-id 6. authentication event retry retry count 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/3 Step 3 Use one of the following: · switchport mode access · switchport mode private-vlan host Example: or · Sets the port to access mode. · Configures the Layer 2 port as a private-VLAN host port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1529 Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN Security Command or Action Switch(config-if)# switchport mode access Purpose Step 4 authentication port-control auto Example: Enables 802.1x authentication on the port. Switch(config-if)# authentication port-control auto Step 5 Step 6 authentication event fail action authorize vlan vlan-id Specifies an active VLAN as an 802.1x restricted VLAN. Example: The range is 1 to 4094. You can configure any active VLAN except an internal Switch(config-if)# authentication event fail action VLAN (routed port), an RSPAN VLAN or a voice VLAN authorize vlan 8 as an 802.1x restricted VLAN. authentication event retry retry count Example: Specifies a number of authentication attempts to allow before a port moves to the restricted VLAN. The range is 1 to 3, and the default is 3. Switch(config-if)# authentication event retry 2 Step 7 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN Beginning in privileged EXEC mode, follow these steps to configure critical voice VLAN on a port and enable the inaccessible authentication bypass feature. SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. radius-server dead-criteria{time seconds } [tries number] 4. radius-serverdeadtimeminutes 5. radius-server host ip-address address[acct-port udp-port][auth-port udp-port] [testusername name[idle-time time] [ignore-acct-port][ignore auth-port]] [key string] 6. dot1x critical {eapol | recovery delay milliseconds} 7. interface interface-id 8. authentication event server dead action {authorize | reinitialize} vlan vlan-id] 9. switchport voice vlan vlan-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1530 Security Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN 10. authentication event server dead action authorize voice 11. show authentication interface interface-id 12. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 aaa new-model Example: Switch(config)# aaa new-model Enables AAA. Step 3 Step 4 radius-server dead-criteria{time seconds } [tries number] Sets the conditions that determine when a RADIUS server is considered un-available or down (dead). Example: Switch(config)# radius-server dead-criteria time 20 tries 10 · time-- 1 to 120 seconds. The switch dynamically determines a default seconds value between 10 and 60. · number--1 to 100 tries. The switch dynamically determines a default triesnumber between 10 and 100. radius-serverdeadtimeminutes Example: Switch(config)# radius-server deadtime 60 (Optional) Sets the number of minutes during which a RADIUS server is not sent requests. The range is from 0 to 1440 minutes (24 hours). The default is 0 minutes. Step 5 radius-server host ip-address address[acct-port udp-port][auth-port udp-port] [testusername name[idle-time time] [ignore-acct-port][ignore auth-port]] [key string] Example: (Optional) Configure the RADIUS server parameters by using these keywords: · acct-portudp-port--Specify the UDP port for the RADIUS accounting server. The range for the UDP port number is from 0 to 65536. The default is 1646. Switch(config)# radius-server host 1.1.1.2 acct-port 1550 auth-port 1560 test username user1 idle-time 30 key abc1234 · auth-portudp-port--Specify the UDP port for the RADIUS authentication server. The range for the UDP port number is from 0 to 65536. The default is 1645. Note You should configure the UDP port for the RADIUS accounting server and the UDP port for the RADIUS authentication server to nondefault values. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1531 Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN Security Step 6 Command or Action Purpose · test usernamename--Enable automated testing of the RADIUS server status, and specify the username to be used. · idle-time time--Set the interval of time in minutes after which the switch sends test packets to the server. The range is from 1 to 35791 minutes. The default is 60 minutes (1 hour). · ignore-acct-port--Disable testing on the RADIUS-server accounting port. · ignore-auth-port--Disable testing on the RADIUS-server authentication port. · For keystring, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server. Note Always configure the key as the last item in the radius-server host command syntax because leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks are part of the key. This key must match the encryption used on the RADIUS daemon. dot1x critical {eapol | recovery delay milliseconds} Example: Switch(config)# dot1x critical eapol (config)# dot1x critical recovery delay 2000 You can also configure the authentication and encryption key by using theradius-server key {0string | 7string | string} global configuration command. (Optional) Configure the parameters for inaccessible authentication bypass: · eapol--Specify that the switch sends an EAPOL-Success message when the switch successfully authenticates the critical port. · recovery delaymilliseconds--Set the recovery delay period during which the switch waits to re-initialize a critical port when a RADIUS server that was unavailable becomes available. The range is from 1 to 10000 milliseconds. The default is 1000 milliseconds (a port can be re-initialized every second). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1532 Security Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action interface interface-id Example: Purpose Specify the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet 1/0/1 authentication event server dead action {authorize | reinitialize} vlan vlan-id] Example: Switch(config-if)# authentication event server dead action reinitialicze vlan 20 Use these keywords to move hosts on the port if the RADIUS server is unreachable: · authorize--Move any new hosts trying to authenticate to the user-specified critical VLAN. · reinitialize--Move all authorized hosts on the port to the user-specified critical VLAN. switchport voice vlan vlan-id Example: Switch(config-if)# switchport voice vlan Specifies the voice VLAN for the port. The voice VLAN cannot be the same as the critical data VLAN configured in Step 6. authentication event server dead action authorize voice Configures critical voice VLAN to move data traffic on Example: the port to the voice VLAN if the RADIUS server is unreachable. Switch(config-if)# authentication event server dead action authorize voice show authentication interface interface-id Example: Switch(config-if)# do show authentication interface gigabit 1/0/1 (Optional) Verify your entries. copy running-config startup-config Example: Switch(config-if)# do copy running-config startup-config (Optional) Verify your entries. Example To return to the RADIUS server default settings, use the no radius-server dead-criteria, the no radius-server deadtime, and the no radius-server host global configuration commands. To disable inaccessible authentication bypass, use the no authentication event server dead action interface configuration command. To disable critical voice VLAN, use the no authentication event server dead action authorize voice interface configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1533 Example of Configuring Inaccessible Authentication Bypass Security Example of Configuring Inaccessible Authentication Bypass This example shows how to configure the inaccessible authentication bypass feature: Switch(config)# radius-server dead-criteria time 30 tries 20 Switch(config)# radius-server deadtime 60 Switch(config)# radius-server host 1.1.1.2 acct-port 1550 auth-port 1560 test username user1 idle-time 30 key abc1234 Switch(config)# dot1x critical eapol Switch(config)# dot1x critical recovery delay 2000 Switch(config)# interface gigabitethernet 1/0/1 Switch(config-if)# dot1x critical Switch(config-if)# dot1x critical recovery action reinitialize Switch(config-if)# dot1x critical vlan 20 Switch(config-if)# end Configuring 802.1x Authentication with WoL Beginning in privileged EXEC mode, follow these steps to enable 802.1x authentication with WoL. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. authentication control-direction {both | in} 4. end 5. show authentication sessions interface interface-id 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/3 Step 3 authentication control-direction {both | in} Example: Enables 802.1x authentication with WoL on the port, and use these keywords to configure the port as bidirectional or unidirectional. Switch(config-if)# authentication control-direction Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1534 Security Configuring MAC Authentication Bypass Command or Action both Step 4 end Example: Switch(config-if)# end Purpose · both--Sets the port as bidirectional. The port cannot receive packets from or send packets to the host. By default, the port is bidirectional. · in--Sets the port as unidirectional. The port can send packets to the host but cannot receive packets from the host. Returns to privileged EXEC mode. Step 5 show authentication sessions interface interface-id Example: Verifies your entries. Switch# show authentication sessions interface gigabitethernet2/0/3 Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring MAC Authentication Bypass Beginning in privileged EXEC mode, follow these steps to enable MAC authentication bypass. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. authentication port-control auto 4. mab [eap] 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1535 Formatting a MAC Authentication Bypass Username and Password Security Command or Action Switch# configure terminal Purpose Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 Step 3 authentication port-control auto Example: Enables 802.1x authentication on the port. Switch(config-if)# authentication port-control auto Step 4 mab [eap] Example: Switch(config-if)# mab Enables MAC authentication bypass. (Optional) Use the eap keyword to configure the switch to use EAP for authorization. Step 5 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Formatting a MAC Authentication Bypass Username and Password Use the optional mab request format command to format the MAB username and password in a style accepted by the authentication server. The username and password are usually the MAC address of the client. Some authentication server configurations require the password to be different from the username. Beginning in privileged EXEC mode, follow these steps to format MAC authentication bypass username and passwords. SUMMARY STEPS 1. configure terminal 2. mab request format attribute 1 groupsize {1 | 2 | 4 |12} [separator {- | : | .} {lowercase | uppercase}] 3. mab request format attribute2 {0 | 7} text 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1536 Security Configuring 802.1x User Distribution Command or Action Switch# configure terminal Purpose Step 2 Step 3 Step 4 mab request format attribute 1 groupsize {1 | 2 | 4 |12} Specifies the format of the MAC address in the User-Name [separator {- | : | .} {lowercase | uppercase}] attribute of MAB-generated Access-Request packets. Example: Switch(config)# mab request format attribute 1 groupsize 12 1--Sets the username format of the 12 hex digits of the MAC address. group size--The number of hex nibbles to concatenate before insertion of a separator. A valid groupsize must be either 1, 2, 4, or 12. separator--The character that separates the hex nibbles according to group size. A valid separator must be either a hyphen, colon, or period. No separator is used for a group size of 12. {lowercase | uppercase}--Specifies if nonnumeric hex nibbles should be in lowercase or uppercase. mab request format attribute2 {0 | 7} text Example: 2--Specifies a custom (nondefault) value for the User-Password attribute in MAB-generated Access-Request packets. Switch(config)# mab request format attribute 2 7 0--Specifies a cleartext password to follow. A02f44E18B12 7--Specifies an encrypted password to follow. text--Specifies the password to be used in the User-Password attribute. Note When you send configuration information in e-mail, remove type 7 password information. The show tech-support command removes this information from its output by default. end Example: Returns to privileged EXEC mode. Switch(config)# end Configuring 802.1x User Distribution Beginning in privileged EXEC mode, follow these steps to configure a VLAN group and to map a VLAN to it: SUMMARY STEPS 1. configure terminal 2. vlan group vlan-group-name vlan-list vlan-list Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1537 Example of Configuring VLAN Groups Security 3. end 4. no vlan group vlan-group-name vlan-list vlan-list DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 vlan group vlan-group-name vlan-list vlan-list Example: Configures a VLAN group, and maps a single VLAN or a range of VLANs to it. Switch(config)# vlan group eng-dept vlan-list 10 Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 no vlan group vlan-group-name vlan-list vlan-list Example: Clears the VLAN group configuration or elements of the VLAN group configuration. Switch(config)# no vlan group eng-dept vlan-list 10 Example of Configuring VLAN Groups This example shows how to configure the VLAN groups, to map the VLANs to the groups, to and verify the VLAN group configurations and mapping to the specified VLANs: Switch(config)# vlan group eng-dept vlan-list 10 Switch(config)# show vlan group group-name eng-dept Group Name Vlans Mapped ------------- -------------- eng-dept 10 Switch(config)# show dot1x vlan-group all Group Name Vlans Mapped ------------- -------------- eng-dept 10 hr-dept 20 This example shows how to add a VLAN to an existing VLAN group and to verify that the VLAN was added: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1538 Security Configuring NAC Layer 2 802.1x Validation Switch(config)# vlan group eng-dept vlan-list 30 Switch(config)# show vlan group eng-dept Group Name Vlans Mapped ------------- -------------- eng-dept 10,30 This example shows how to remove a VLAN from a VLAN group: Switch# no vlan group eng-dept vlan-list 10 This example shows that when all the VLANs are cleared from a VLAN group, the VLAN group is cleared: Switch(config)# no vlan group eng-dept vlan-list 30 Vlan 30 is successfully cleared from vlan group eng-dept. Switch(config)# show vlan group group-name eng-dept This example shows how to clear all the VLAN groups: Switch(config)# no vlan group end-dept vlan-list all Switch(config)# show vlan-group all For more information about these commands, see the Cisco IOS Security Command Reference. Configuring NAC Layer 2 802.1x Validation You can configure NAC Layer 2 802.1x validation, which is also referred to as 802.1x authentication with a RADIUS server. Beginning in privileged EXEC mode, follow these steps to configure NAC Layer 2 802.1x validation. The procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode access 4. authentication event no-response action authorize vlan vlan-id 5. authentication periodic 6. authentication timer reauthenticate 7. end 8. show authentication sessions interface interface-id 9. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1539 Configuring NAC Layer 2 802.1x Validation Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/3 Step 3 switchport mode access Example: Switch(config-if)# switchport mode access Sets the port to access mode only if you configured the RADIUS server. Step 4 authentication event no-response action authorize vlan Specifies an active VLAN as an 802.1x guest VLAN. The vlan-id range is 1 to 4094. Example: You can configure any active VLAN except an internal VLAN (routed port), an RSPAN VLAN, or a voice VLAN Switch(config-if)# authentication event no-response as an 802.1x guest VLAN. action authorize vlan 8 Step 5 authentication periodic Example: Switch(config-if)# authentication periodic Enables periodic re-authentication of the client, which is disabled by default. Step 6 authentication timer reauthenticate Example: Switch(config-if)# authentication timer reauthenticate Sets re-authentication attempt for the client (set to one hour). This command affects the behavior of the switch only if periodic re-authentication is enabled. Step 7 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 8 show authentication sessions interface interface-id Example: Verifies your entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1540 Security Configuring an Authenticator Switch with NEAT Command or Action Purpose Switch# show authentication sessions interface gigabitethernet2/0/3 Step 9 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring an Authenticator Switch with NEAT Configuring this feature requires that one switch outside a wiring closet is configured as a supplicant and is connected to an authenticator switch. Note The cisco-av-pairs must be configured as device-traffic-class=switch on the ACS, which sets the interface as a trunk after the supplicant is successfully authenticated. Beginning in privileged EXEC mode, follow these steps to configure a switch as an authenticator: SUMMARY STEPS 1. configure terminal 2. cisp enable 3. interface interface-id 4. switchport mode access 5. authentication port-control auto 6. dot1x pae authenticator 7. spanning-tree portfast 8. end 9. show running-config interface interface-id 10. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 cisp enable Example: Enables CISP. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1541 Configuring an Authenticator Switch with NEAT Security Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Switch(config)# cisp enable Purpose interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 switchport mode access Example: Switch(config-if)# switchport mode access Sets the port mode to access. authentication port-control auto Example: Sets the port-authentication mode to auto. Switch(config-if)# authentication port-control auto dot1x pae authenticator Example: Switch(config-if)# dot1x pae authenticator Configures the interface as a port access entity (PAE) authenticator. spanning-tree portfast Example: Enables Port Fast on an access port connected to a single workstation or server.. Switch(config-if)# spanning-tree portfast trunk end Example: Switch(config-if)# end Returns to privileged EXEC mode. show running-config interface interface-id Example: Switch# show running-config interface gigabitethernet2/0/1 Verifies your configuration. copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1542 Security Configuring a Supplicant Switch with NEAT Command or Action Switch# copy running-config startup-config Purpose Configuring a Supplicant Switch with NEAT Beginning in privileged EXEC mode, follow these steps to configure a switch as a supplicant: SUMMARY STEPS 1. configure terminal 2. cisp enable 3. dot1x credentials profile 4. username suppswitch 5. password password 6. dot1x supplicant force-multicast 7. interface interface-id 8. switchport trunk encapsulation dot1q 9. switchport mode trunk 10. dot1x pae supplicant 11. dot1x credentials profile-name 12. end 13. show running-config interface interface-id 14. copy running-config startup-config 15. Configuring NEAT with Auto Smartports Macros DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 cisp enable Example: Switch(config)# cisp enable Enables CISP. Step 3 dot1x credentials profile Example: Switch(config)# dot1x credentials test Creates 802.1x credentials profile. This must be attached to the port that is configured as supplicant. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1543 Configuring a Supplicant Switch with NEAT Security Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action username suppswitch Example: Switch(config)# username suppswitch Purpose Creates a username. password password Example: Switch(config)# password myswitch Creates a password for the new username. dot1x supplicant force-multicast Forces the switch to send only multicast EAPOL packets Example: when it receives either unicast or multicast packets. This also allows NEAT to work on the supplicant switch Switch(config)# dot1x supplicant force-multicast in all host modes. interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 switchport trunk encapsulation dot1q Example: Sets the port to trunk mode. Switch(config-if)# switchport trunk encapsulation dot1q switchport mode trunk Example: Switch(config-if)# switchport mode trunk Configures the interface as a VLAN trunk port. dot1x pae supplicant Example: Switch(config-if)# dot1x pae supplicant Configures the interface as a port access entity (PAE) supplicant. dot1x credentials profile-name Example: Switch(config-if)# dot1x credentials test Attaches the 802.1x credentials profile to the interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1544 Security Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs Step 12 Step 13 Step 14 Step 15 Command or Action end Example: Switch(config-if)# end show running-config interface interface-id Example: Switch# show running-config interface gigabitethernet1/0/1 copy running-config startup-config Example: Switch# copy running-config startup-config Configuring NEAT with Auto Smartports Macros Purpose Returns to privileged EXEC mode. Verifies your configuration. (Optional) Saves your entries in the configuration file. You can also use an Auto Smartports user-defined macro instead of the switch VSA to configure the authenticator switch. For more information, see the Auto Smartports Configuration Guide for this release. Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs In addition to configuring 802.1x authentication on the switch, you need to configure the ACS. For more information, see the Configuration Guide for Cisco Secure ACS 4.2: http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/configuration/guide/acs_config.pdf Note You must configure a downloadable ACL on the ACS before downloading it to the switch. After authentication on the port, you can use the show ip access-list privileged EXEC command to display the downloaded ACLs on the port. Configuring Downloadable ACLs The policies take effect after client authentication and the client IP address addition to the IP device tracking table. The switch then applies the downloadable ACL to the port. Beginning in privileged EXEC mode: SUMMARY STEPS 1. configure terminal 2. ip device tracking 3. aaa new-model Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1545 Configuring Downloadable ACLs Security 4. aaa authorization network default local group radius 5. radius-server vsa send authentication 6. interface interface-id 7. ip access-group acl-id in 8. show running-config interface interface-id 9. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 ip device tracking Example: Switch(config)# ip device tracking Sets the ip device tracking table. Step 3 aaa new-model Example: Switch(config)# aaa new-model Enables AAA. Step 4 aaa authorization network default local group radius Sets the authorization method to local. To remove the Example: authorization method, use the no aaa authorization network default local group radius command. Switch(config)# aaa authorization network default local group radius Step 5 radius-server vsa send authentication Example: Switch(config)# radius-server vsa send authentication Configures the radius vsa send authentication. Step 6 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/4 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1546 Security Configuring a Downloadable Policy Step 7 Command or Action Purpose ip access-group acl-id in Configures the default ACL on the port in the input Example: direction. Note The acl-id is an access list name or number. Switch(config-if)# ip access-group default_acl in Step 8 show running-config interface interface-id Example: Verifies your configuration. Switch(config-if)# show running-config interface gigabitethernet2/0/4 Step 9 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring a Downloadable Policy Beginning in privileged EXEC mode: SUMMARY STEPS 1. configure terminal 2. access-list access-list-number { deny | permit } { hostname | any | host } log 3. interface interface-id 4. ip access-group acl-id in 5. exit 6. aaa new-model 7. aaa authorization network default group radius 8. ip device tracking 9. ip device tracking probe [count | interval | use-svi] 10. radius-server vsa send authentication 11. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1547 Configuring a Downloadable Policy Security Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action access-list access-list-number { deny | permit } { hostname | any | host } log Example: Switch(config)# access-list 1 deny any log Purpose Defines the default port ACL. The access-list-number is a decimal number from 1 to 99 or 1300 to 1999. Enter deny or permit to specify whether to deny or permit access if conditions are matched. The source is the source address of the network or host that sends a packet, such as this: · hostname: The 32-bit quantity in dotted-decimal format. · any: The keyword any as an abbreviation for source and source-wildcard value of 0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard value. · host: The keyword host as an abbreviation for source and source-wildcard of source 0.0.0.0. interface interface-id Example: (Optional) Applies the source-wildcard wildcard bits to the source. (Optional) Enters log to cause an informational logging message about the packet that matches the entry to be sent to the console. Enters interface configuration mode. Switch(config)# interface gigabitethernet2/0/2 ip access-group acl-id in Example: Configures the default ACL on the port in the input direction. Note The acl-id is an access list name or number. Switch(config-if)# ip access-group default_acl in exit Example: Switch(config-if)# exit Returns to global configuration mode. aaa new-model Example: Switch(config)# aaa new-model Enables AAA. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1548 Security Configuring VLAN ID-based MAC Authentication Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose aaa authorization network default group radius Example: Sets the authorization method to local. To remove the authorization method, use the no aaa authorization network default group radius command. Switch(config)# aaa authorization network default group radius ip device tracking Example: Switch(config)# ip device tracking Enables the IP device tracking table. To disable the IP device tracking table, use the no ip device tracking global configuration commands. ip device tracking probe [count | interval | use-svi] Example: Switch(config)# ip device tracking probe count (Optional) Configures the IP device tracking table: · count count--Sets the number of times that the switch sends the ARP probe. The range is from 1 to 5. The default is 3. · interval interval--Sets the number of seconds that the switch waits for a response before resending the ARP probe. The range is from 30 to 300 seconds. The default is 30 seconds. · use-svi--Uses the switch virtual interface (SVI) IP address as source of ARP probes. radius-server vsa send authentication Example: Switch(config)# radius-server vsa send authentication Configures the network access server to recognize and use vendor-specific attributes. Note The downloadable ACL must be operational. end Example: Switch(config)# end Returns to privileged EXEC mode. Configuring VLAN ID-based MAC Authentication Beginning in privileged EXEC mode, follow these steps: SUMMARY STEPS 1. configure terminal 2. mab request format attribute 32 vlan access-vlan 3. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1549 Configuring Flexible Authentication Ordering Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 mab request format attribute 32 vlan access-vlan Example: Enables VLAN ID-based MAC authentication. Switch(config)# mab request format attribute 32 vlan access-vlan Step 3 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Configuring Flexible Authentication Ordering The examples used in the instructions below changes the order of Flexible Authentication Ordering so that MAB is attempted before IEEE 802.1X authentication (dot1x). MAB is configured as the first authentication method, so MAB will have priority over all other authentication methods. Note Before changing the default order and priority of these authentication methods, however, you should understand the potential consequences of those changes. See http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/application_note_c27-573287_ps6638_Products_White_Paper.html for details. Beginning in privileged EXEC mode, follow these steps: SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode access 4. authentication order [ dot1x | mab ] | {webauth} 5. authentication priority [ dot1x | mab ] | {webauth} 6. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1550 Security Configuring Open1x DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet 1/0/1 Step 3 switchport mode access Example: Switch(config-if)# switchport mode access Sets the port to access mode only if you previously configured the RADIUS server. Step 4 authentication order [ dot1x | mab ] | {webauth} Example: (Optional) Sets the order of authentication methods used on a port. Switch(config-if)# authentication order mab dot1x Step 5 authentication priority [ dot1x | mab ] | {webauth} Example: (Optional) Adds an authentication method to the port-priority list. Switch(config-if)# authentication priority mab dot1x Step 6 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Related Topics Flexible Authentication Ordering, on page 1498 Configuring Open1x Beginning in privileged EXEC mode, follow these steps to enable manual control of the port authorization state: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1551 Configuring Open1x Security SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode access 4. authentication control-direction {both | in} 5. authentication fallback name 6. authentication host-mode [multi-auth | multi-domain | multi-host | single-host] 7. authentication open 8. authentication order [ dot1x | mab ] | {webauth} 9. authentication periodic 10. authentication port-control {auto | force-authorized | force-un authorized} 11. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet 1/0/1 Step 3 switchport mode access Example: Switch(config-if)# switchport mode access Sets the port to access mode only if you configured the RADIUS server. Step 4 authentication control-direction {both | in} Example: Switch(config-if)# authentication control-direction both (Optional) Configures the port control as unidirectional or bidirectional. Step 5 authentication fallback name Example: Switch(config-if)# authentication fallback profile1 (Optional) Configures a port to use web authentication as a fallback method for clients that do not support 802.1x authentication. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1552 Security Disabling 802.1x Authentication on the Port Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose authentication host-mode [multi-auth | multi-domain (Optional) Sets the authorization manager mode on a port. | multi-host | single-host] Example: Switch(config-if)# authentication host-mode multi-auth authentication open Example: Switch(config-if)# authentication open (Optional) Enables or disable open access on a port. authentication order [ dot1x | mab ] | {webauth} Example: (Optional) Sets the order of authentication methods used on a port. Switch(config-if)# authentication order dot1x webauth authentication periodic Example: Switch(config-if)# authentication periodic (Optional) Enables or disable reauthentication on a port. authentication port-control {auto | force-authorized | (Optional) Enables manual control of the port authorization force-un authorized} state. Example: Switch(config-if)# authentication port-control auto end Example: Switch(config-if)# end Returns to privileged EXEC mode. Related Topics Open1x Authentication, on page 1498 Disabling 802.1x Authentication on the Port You can disable 802.1x authentication on the port by using the no dot1x pae interface configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1553 Resetting the 802.1x Authentication Configuration to the Default Values Security Beginning in privileged EXEC mode, follow these steps to disable 802.1x authentication on the port. This procedure is optional. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode access 4. no dot1x pae authenticator 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the port to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 Step 3 switchport mode access Example: Switch(config-if)# switchport mode access (Optional) Sets the port to access mode only if you configured the RADIUS server. Step 4 no dot1x pae authenticator Example: Switch(config-if)# no dot1x pae authenticator Disables 802.1x authentication on the port. Step 5 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Resetting the 802.1x Authentication Configuration to the Default Values Beginning in privileged EXEC mode, follow these steps to reset the 802.1x authentication configuration to the default values. This procedure is optional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1554 Security Monitoring 802.1x Statistics and Status SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. dot1x default 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 interface interface-id Example: Enters interface configuration mode, and specify the port to be configured. Switch(config)# interface gigabitethernet1/0/2 Step 3 dot1x default Example: Switch(config-if)# dot1x default Resets the 802.1x parameters to the default values. Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Monitoring 802.1x Statistics and Status Table 135: Privileged EXEC show Commands Command show dot1x all statistics show dot1x interface interface-id statistics show dot1x all [count | details | statistics | summary] show dot1x interface interface-id Purpose Displays 802.1x statistics for all ports Displays 802.1x statistics for a specific port Displays the 802.1x administrative and operational status for a switch Displays the 802.1x administrative and operational status for a specific port Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1555 Additional References Security Table 136: Global Configuration Commands Command no dot1x logging verbose Purpose Filters verbose 802.1x authentication messages (beginning with Cisco IOS Release 12.2(55)SE) For detailed information about the fields in these displays, see the command reference for this release. Additional References Related Documents Related Document Title Topic Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity Control http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html policies and Identity Service templates for Session Aware networking. Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) RADIUS, TACACS+, http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra Secure Shell, 802.1X and AAA. Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1556 Security Feature Information for 802.1x Port-Based Authentication MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for 802.1x Port-Based Authentication Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1557 Feature Information for 802.1x Port-Based Authentication Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1558 7 5 C H A P T E R Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: · Finding Feature Information, on page 1559 · Information About Web-Based Authentication, on page 1559 · How to Configure Web-Based Authentication, on page 1567 · Monitoring Web-Based Authentication Status, on page 1581 · Feature Information for Web-Based Authentication, on page 1581 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Web-Based Authentication Use the web-based authentication feature, known as web authentication proxy, to authenticate end users on host systems that do not run the IEEE 802.1x supplicant. Note You can configure web-based authentication on Layer 2 and Layer 3 interfaces. When you initiate an HTTP session, web-based authentication intercepts ingress HTTP packets from the host and sends an HTML login page to the users. The users enter their credentials, which the web-based authentication feature sends to the authentication, authorization, and accounting (AAA) server for authentication. If authentication succeeds, web-based authentication sends a Login-Successful HTML page to the host and applies the access policies returned by the AAA server. If authentication fails, web-based authentication forwards a Login-Fail HTML page to the user, prompting the user to retry the login. If the user exceeds the maximum number of attempts, web-based authentication forwards a Login-Expired HTML page to the host, and the user is placed on a watch list for a waiting period. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1559 Device Roles Security These sections describe the role of web-based authentication as part of AAA: Device Roles With web-based authentication, the devices in the network have these specific roles: · Client--The device (workstation) that requests access to the LAN and the services and responds to requests from the switch. The workstation must be running an HTML browser with Java Script enabled. · Authentication server--Authenticates the client. The authentication server validates the identity of the client and notifies the switch that the client is authorized to access the LAN and the switch services or that the client is denied. · Switch--Controls the physical access to the network based on the authentication status of the client. The switch acts as an intermediary (proxy) between the client and the authentication server, requesting identity information from the client, verifying that information with the authentication server, and relaying a response to the client. Figure 91: Web-Based Authentication Device Roles This figure shows the roles of these devices in a network. Host Detection The switch maintains an IP device tracking table to store information about detected hosts. Note By default, the IP device tracking feature is disabled on a switch. You must enable the IP device tracking feature to use web-based authentication. For Layer 2 interfaces, web-based authentication detects IP hosts by using these mechanisms: · ARP based trigger--ARP redirect ACL allows web-based authentication to detect hosts with a static IP address or a dynamic IP address. · Dynamic ARP inspection · DHCP snooping--Web-based authentication is notified when the switch creates a DHCP-binding entry for the host. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1560 Security Session Creation Session Creation When web-based authentication detects a new host, it creates a session as follows: · Reviews the exception list. If the host IP is included in the exception list, the policy from the exception list entry is applied, and the session is established. · Reviews for authorization bypass If the host IP is not on the exception list, web-based authentication sends a nonresponsive-host (NRH) request to the server. If the server response is access accepted, authorization is bypassed for this host. The session is established. · Sets up the HTTP intercept ACL If the server response to the NRH request is access rejected, the HTTP intercept ACL is activated, and the session waits for HTTP traffic from the host. Authentication Process When you enable web-based authentication, these events occur: · The user initiates an HTTP session. · The HTTP traffic is intercepted, and authorization is initiated. The switch sends the login page to the user. The user enters a username and password, and the switch sends the entries to the authentication server. · If the authentication succeeds, the switch downloads and activates the user's access policy from the authentication server. The login success page is sent to the user. · If the authentication fails, the switch sends the login fail page. The user retries the login. If the maximum number of attempts fails, the switch sends the login expired page, and the host is placed in a watch list. After the watch list times out, the user can retry the authentication process. · If the authentication server does not respond to the switch, and if an AAA fail policy is configured, the switch applies the failure access policy to the host. The login success page is sent to the user. · The switch reauthenticates a client when the host does not respond to an ARP probe on a Layer 2 interface, or when the host does not send any traffic within the idle timeout on a Layer 3 interface. · The feature applies the downloaded timeout or the locally configured session timeout. · If the terminate action is RADIUS, the feature sends a nonresponsive host (NRH) request to the server. The terminate action is included in the response from the server. · If the terminate action is default, the session is dismantled, and the applied policy is removed. Local Web Authentication Banner With Web Authentication, you can create a default and customized web-browser banners that appears when you log in to a switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1561 Local Web Authentication Banner Security The banner appears on both the login page and the authentication-result pop-up pages. The default banner messages are as follows: · Authentication Successful · Authentication Failed · Authentication Expired The Local Web Authentication Banner can be configured in legacy and new-style (Session-aware) CLIs as follows: · Legacy mode--Use the ip admission auth-proxy-banner http global configuration command. · New-style mode--Use the parameter-map type webauth global bannerglobal configuration command. The default banner Cisco Systems and Switch host-name Authentication appear on the Login Page. Cisco Systems appears on the authentication result pop-up page. Figure 92: Authentication Successful Banner The banner can be customized as follows: · Add a message, such as switch, router, or company name to the banner: · Legacy mode--Use the ip admission auth-proxy-banner http banner-textglobal configuration command. · New-style mode--Use the parameter-map type webauth global bannerglobal configuration command · Add a logo or text file to the banner : · Legacy mode--Use the ip admission auth-proxy-banner http file-path global configuration command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1562 Security Local Web Authentication Banner · New-style mode--Use the parameter-map type webauth global banner global configuration command Figure 93: Customized Web Banner If you do not enable a banner, only the username and password dialog boxes appear in the web authentication login screen, and no banner appears when you log into the switch. Figure 94: Login Screen With No Banner Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1563 Web Authentication Customizable Web Pages Security For more information, see the Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) and the Web Authentication Enhancements - Customizing Authentication Proxy Web Pages. Web Authentication Customizable Web Pages During the web-based authentication process, the switch internal HTTP server hosts four HTML pages to deliver to an authenticating client. The server uses these pages to notify you of these four-authentication process states: · Login--Your credentials are requested. · Success--The login was successful. · Fail--The login failed. · Expire--The login session has expired because of excessive login failures. Guidelines · You can substitute your own HTML pages for the default internal HTML pages. · You can use a logo or specify text in the login, success, failure, and expire web pages. · On the banner page, you can specify text in the login page. · The pages are in HTML. · You must include an HTML redirect command in the success page to access a specific URL. · The URL string must be a valid URL (for example, http://www.cisco.com). An incomplete URL might cause page not found or similar errors on a web browser. · If you configure web pages for HTTP authentication, they must include the appropriate HTML commands (for example, to set the page time out, to set a hidden password, or to confirm that the same page is not submitted twice). · The CLI command to redirect users to a specific URL is not available when the configured login form is enabled. The administrator should ensure that the redirection is configured in the web page. · If the CLI command redirecting users to specific URL after authentication occurs is entered and then the command configuring web pages is entered, the CLI command redirecting users to a specific URL does not take effect. · Configured web pages can be copied to the switch boot flash or flash. · On stackable switches, configured pages can be accessed from the flash on the stack master or members. · The login page can be on one flash, and the success and failure pages can be another flash (for example, the flash on the stack master or a member). · You must configure all four pages. · The banner page has no effect if it is configured with the web page. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1564 Security Authentication Proxy Web Page Guidelines · All of the logo files (image, flash, audio, video, and so on) that are stored in the system directory (for example, flash, disk0, or disk) and that must be displayed on the login page must use web_auth_<filename> as the file name. · The configured authentication proxy feature supports both HTTP and SSL. You can substitute your HTML pages for the default internal HTML pages. You can also specify a URL to which users are redirected after authentication occurs, which replaces the internal Success page. Figure 95: Customizeable Authentication Page Authentication Proxy Web Page Guidelines When configuring customized authentication proxy web pages, follow these guidelines: · To enable the custom web pages feature, specify all four custom HTML files. If you specify fewer than four files, the internal default HTML pages are used. · The four custom HTML files must be present on the flash memory of the switch. The maximum size of each HTML file is 8 KB. · Any images on the custom pages must be on an accessible HTTP server. Configure an intercept ACL within the admission rule. · Any external link from a custom page requires configuration of an intercept ACL within the admission rule. · To access a valid DNS server, any name resolution required for external links or images requires configuration of an intercept ACL within the admission rule. · If the custom web pages feature is enabled, a configured auth-proxy-banner is not used. · If the custom web pages feature is enabled, the redirection URL for successful login feature is not available. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1565 Redirection URL for Successful Login Guidelines Security · To remove the specification of a custom file, use the no form of the command. Because the custom login page is a public web form, consider these guidelines for the page: · The login form must accept user entries for the username and password and must show them as uname and pwd. · The custom login page should follow best practices for a web form, such as page timeout, hidden password, and prevention of redundant submissions. Related Topics Customizing the Authentication Proxy Web Pages, on page 1576 Redirection URL for Successful Login Guidelines When configuring a redirection URL for successful login, consider these guidelines: · If the custom authentication proxy web pages feature is enabled, the redirection URL feature is disabled and is not available in the CLI. You can perform redirection in the custom-login success page. · If the redirection URL feature is enabled, a configured auth-proxy-banner is not used. · To remove the specification of a redirection URL, use the no form of the command. · If the redirection URL is required after the web-based authentication client is successfully authenticated, then the URL string must start with a valid URL (for example, http://) followed by the URL information. If only the URL is given without http://, then the redirection URL on successful authentication might cause page not found or similar errors on a web browser. Related Topics Specifying a Redirection URL for Successful Login, on page 1578 Web-based Authentication Interactions with Other Features Port Security LAN Port IP You can configure web-based authentication and port security on the same port. Web-based authentication authenticates the port, and port security manages network access for all MAC addresses, including that of the client. You can then limit the number or group of clients that can access the network through the port. For more information about enabling port security, see the . You can configure LAN port IP (LPIP) and Layer 2 web-based authentication on the same port. The host is authenticated by using web-based authentication first, followed by LPIP posture validation. The LPIP host policy overrides the web-based authentication host policy. If the web-based authentication idle timer expires, the NAC policy is removed. The host is authenticated, and posture is validated again. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1566 Security Gateway IP Gateway IP You cannot configure Gateway IP (GWIP) on a Layer 3 VLAN interface if web-based authentication is configured on any of the switch ports in the VLAN. You can configure web-based authentication on the same Layer 3 interface as Gateway IP. The host policies for both features are applied in software. The GWIP policy overrides the web-based authentication host policy. ACLs If you configure a VLAN ACL or a Cisco IOS ACL on an interface, the ACL is applied to the host traffic only after the web-based authentication host policy is applied. For Layer 2 web-based authentication, it is more secure, though not required, to configure a port ACL (PACL) as the default access policy for ingress traffic from hosts connected to the port. After authentication, the web-based authentication host policy overrides the PACL. The Policy ACL is applied to the session even if there is no ACL configured on the port. You cannot configure a MAC ACL and web-based authentication on the same interface. You cannot configure web-based authentication on a port whose access VLAN is configured for VACL capture. Context-Based Access Control Web-based authentication cannot be configured on a Layer 2 port if context-based access control (CBAC) is configured on the Layer 3 VLAN interface of the port VLAN. EtherChannel You can configure web-based authentication on a Layer 2 EtherChannel interface. The web-based authentication configuration applies to all member channels. How to Configure Web-Based Authentication Default Web-Based Authentication Configuration The following table shows the default web-based authentication configuration. Table 137: Default Web-based Authentication Configuration Feature AAA RADIUS server · IP address · UDP authentication port · Key Default Setting Disabled · None specified · 1645 · None specified Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1567 Web-Based Authentication Configuration Guidelines and Restrictions Security Feature Default value of inactivity timeout Inactivity timeout Default Setting 3600 seconds Enabled Web-Based Authentication Configuration Guidelines and Restrictions · Web-based authentication is an ingress-only feature. · You can configure web-based authentication only on access ports. Web-based authentication is not supported on trunk ports, EtherChannel member ports, or dynamic trunk ports. · You cannot authenticate hosts on Layer 2 interfaces with static ARP cache assignment. These hosts are not detected by the web-based authentication feature because they do not send ARP messages. · By default, the IP device tracking feature is disabled on a switch. You must enable the IP device tracking feature to use web-based authentication. · You must configure at least one IP address to run the switch HTTP server. You must also configure routes to reach each host IP address. The HTTP server sends the HTTP login page to the host. · Hosts that are more than one hop away might experience traffic disruption if an STP topology change results in the host traffic arriving on a different port. This occurs because the ARP and DHCP updates might not be sent after a Layer 2 (STP) topology change. · Web-based authentication does not support VLAN assignment as a downloadable-host policy. · Web-based authentication supports IPv6 in Session-aware policy mode. IPv6 Web-authentication requires at least one IPv6 address configured on the switch and IPv6 Snooping configured on the switchport. · Web-based authentication and Network Edge Access Topology (NEAT) are mutually exclusive. You cannot use web-based authentication when NEAT is enabled on an interface, and you cannot use NEAT when web-based authentication is running on an interface. · Web-based authentication NRH (Non-Responsive Host) is not supported for voice devices. · Only the Password Authentication Protocol (PAP) is supported for web-based RADIUS authentication on controllers. The Challenge Handshake Authentication Protocol (CHAP) is not supported for web-based RADIUS authentication on controllers. · Identify the following RADIUS security server settings that will be used while configuring switch-to-RADIUS-server communication: · Host name · Host IP address · Host name and specific UDP port numbers · IP address and specific UDP port numbers The combination of the IP address and UDP port number creates a unique identifier, that enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address. If two different host entries on the same RADIUS server are configured for the same service (for example, authentication) the second Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1568 Security Web-Based Authentication Configuration Task List host entry that is configured functions as the failover backup to the first one. The RADIUS host entries are chosen in the order that they were configured. · When you configure the RADIUS server parameters: · Specify the key string on a separate command line. · For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server. · When you specify the key string, use spaces within and at the end of the key. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks are part of the key. This key must match the encryption used on the RADIUS daemon. · You can globally configure the timeout, retransmission, and encryption key values for all RADIUS servers by using with the radius-server host global configuration command. If you want to configure these options on a per-server basis, use the radius-server timeout, radius-server transmit, and the radius-server key global configuration commands. For more information, see the Cisco IOS Security Configuration Guide, Release 12.4 and the Cisco IOS Security Command Reference, Release 12.4. Note You need to configure some settings on the RADIUS server, including: the switch IP address, the key string to be shared by both the server and the switch, and the downloadable ACL (DACL). For more information, see the RADIUS server documentation. Web-Based Authentication Configuration Task List Configuring the Authentication Rule and Interfaces Examples in this section are legacy-style configurations. For new-style configurations, see the Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) This example shows how to verify the configuration: Switch# show ip admission status IP admission status: Enabled interfaces 0 Total sessions 0 Init sessions 0 Max init sessions allowed 100 Limit reached 0 Hi watermark 0 TCP half-open connections 0 Hi watermark 0 TCP new connections 0 Hi watermark 0 TCP half-open + new 0 Hi watermark 0 HTTPD1 Contexts 0 Hi watermark 0 Parameter Map: Global Custom Pages Custom pages not configured Banner Banner not configured Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1569 Configuring the Authentication Rule and Interfaces Security Beginning in privileged EXEC mode, follow these steps to configure the authentication rule and interfaces: SUMMARY STEPS 1. configure terminal 2. ip admission name name proxy http 3. interface type slot/port 4. ip access-group name 5. ip admission name 6. exit 7. ip device tracking 8. end 9. show ip admission status 10. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 ip admission name name proxy http Example: Configures an authentication rule for web-based authorization. Switch(config)# ip admission name webauth1 proxy http Step 3 Step 4 interface type slot/port Example: Switch(config)# interface gigabitEthernet1/0/1 Enters interface configuration mode and specifies the ingress Layer 2 or Layer 3 interface to be enabled for web-based authentication. type can be fastethernet, gigabit ethernet, or tengigabitethernet. ip access-group name Example: Applies the default ACL. Switch(config-if)# ip access-group webauthag Step 5 ip admission name Example: Switch(config-if)# ip admission webauth1 Configures web-based authentication on the specified interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1570 Security Configuring AAA Authentication Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action exit Example: Switch(config-if)# exit ip device tracking Example: Switch(config)# ip device tracking end Example: Switch(config)# end show ip admission status Example: Switch# show ip admission status copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Returns to configuration mode. Enables the IP device tracking table. Returns to privileged EXEC mode. Displays the configuration. (Optional) Saves your entries in the configuration file. Configuring AAA Authentication Beginning in privileged EXEC mode, follow these steps to configure AAA authentication: SUMMARY STEPS 1. configure terminal 2. aaa new-model 3. aaa authentication login default group {tacacs+ | radius} 4. aaa authorization auth-proxy default group {tacacs+ | radius} 5. tacacs-server host {hostname | ip_address} 6. tacacs-server key {key-data} 7. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1571 Configuring AAA Authentication Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 aaa new-model Example: Switch(config)# aaa new-model Enables AAA functionality. Step 3 aaa authentication login default group {tacacs+ | radius} Defines the list of authentication methods at login. Example: Switch(config)# aaa authentication login default group tacacs+ Step 4 aaa authorization auth-proxy default group {tacacs+ | Creates an authorization method list for web-based radius} authorization. Example: Switch(config)# aaa authorization auth-proxy default group tacacs+ Step 5 tacacs-server host {hostname | ip_address} Example: Switch(config)# tacacs-server host 10.1.1.1 Specifies an AAA server. Step 6 tacacs-server key {key-data} Example: Switch(config)# tacacs-server key Configures the authorization and encryption key used between the switch and the TACACS server. Step 7 end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1572 Security Configuring Switch-to-RADIUS-Server Communication Configuring Switch-to-RADIUS-Server Communication Beginning in privileged EXEC mode, follow these steps to configure the RADIUS server parameters: Before you begin Identify the following RADIUS security server settings that will be used in theses instructions: · Host name · Host IP address · Host name and specific UDP port numbers · IP address and specific UDP port numbers The combination of the IP address and UDP port number creates a unique identifier, that enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address. If two different host entries on the same RADIUS server are configured for the same service (for example, authentication) the second host entry that is configured functions as the failover backup to the first one. The RADIUS host entries are chosen in the order that they were configured. SUMMARY STEPS 1. configure terminal 2. ip radius source-interface vlan vlan interface number 3. radius-server host {hostname | ip-address} test username username 4. radius-server key string 5. radius-server dead-criteria tries num-tries 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip radius source-interface vlan vlan interface number Example: Specifies that the RADIUS packets have the IP address of the indicated interface. Switch(config)# ip radius source-interface vlan 80 Step 3 radius-server host {hostname | ip-address} test username Specifies the host name or IP address of the remote username RADIUS server. Example: The test username username option enables automated testing of the RADIUS server connection. The specified Switch(config)# radius-server host 172.l20.39.46 username does not need to be a valid user name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1573 Configuring Switch-to-RADIUS-Server Communication Security Command or Action test username user1 Step 4 radius-server key string Example: Switch(config)# radius-server key rad123 Purpose The key option specifies an authentication and encryption key to use between the switch and the RADIUS server. To use multiple RADIUS servers, reenter this command for each server. Configures the authorization and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. Step 5 radius-server dead-criteria tries num-tries Example: Specifies the number of unanswered sent messages to a RADIUS server before considering the server to be inactive. The range of num-tries is 1 to 100. Switch(config)# radius-server dead-criteria tries When you configure the RADIUS server parameters: 30 · Specify the key string on a separate command line. · For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server. · When you specify the key string, use spaces within and at the end of the key. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks are part of the key. This key must match the encryption used on the RADIUS daemon. · You can globally configure the timeout, retransmission, and encryption key values for all RADIUS servers by using with the radius-server host global configuration command. If you want to configure these options on a per-server basis, use the radius-server timeout, radius-server transmit, and the radius-server key global configuration commands. For more information, see the Cisco IOS Security Configuration Guide, Release 12.4 and the Cisco IOS Security Command Reference, Release 12.4. Note You need to configure some settings on the RADIUS server, including: the switch IP address, the key string to be shared by both the server and the switch, and the downloadable ACL (DACL). For more information, see the RADIUS server documentation. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1574 Security Configuring the HTTP Server Step 6 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Configuring the HTTP Server To use web-based authentication, you must enable the HTTP server within the switch. You can enable the server for either HTTP or HTTPS. Beginning in privileged EXEC mode, follow these steps to enable the server for either HTTP or HTTPS: SUMMARY STEPS 1. configure terminal 2. ip http server 3. ip http secure-server 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip http server Example: Switch(config)# ip http server Enables the HTTP server. The web-based authentication feature uses the HTTP server to communicate with the hosts for user authentication. Step 3 ip http secure-server Example: Switch(config)# ip http secure-server Step 4 end Example: Enables HTTPS. You can configure custom authentication proxy web pages or specify a redirection URL for successful login. Note To ensure secure authentication when you enter the ip http secure-server command, the login page is always in HTTPS (secure HTTP) even if the user sends an HTTP request. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1575 Customizing the Authentication Proxy Web Pages Security Command or Action Switch(config)# end Purpose Customizing the Authentication Proxy Web Pages You can configure web authentication to display four substitute HTML pages to the user in place of the switch default HTML pages during web-based authentication. For the equivalent Session Aware Networking configuration example for this feature, see the section "Configuring a Parameter Map for Web-Based Authentication" in the chapter, "Configuring Identity Control Policies." of the book, "Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)." Beginning in privileged EXEC mode, follow these steps to specify the use of your custom authentication proxy web pages: Before you begin Store your custom HTML files on the switch flash memory. SUMMARY STEPS 1. configure terminal 2. ip admission proxy http login page file device:login-filename 3. ip admission proxy http success page file device:success-filename 4. ip admission proxy http failure page file device:fail-filename 5. ip admission proxy http login expired page file device:expired-filename 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip admission proxy http login page file device:login-filename Example: Specifies the location in the switch memory file system of the custom HTML file to use in place of the default login page. The device: is flash memory. Switch(config)# ip admission proxy http login page file disk1:login.htm Step 3 ip admission proxy http success page file device:success-filename Example: Specifies the location of the custom HTML file to use in place of the default login success page. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1576 Security Customizing the Authentication Proxy Web Pages Command or Action Purpose Switch(config)# ip admission proxy http success page file disk1:success.htm Step 4 ip admission proxy http failure page file device:fail-filename Example: Specifies the location of the custom HTML file to use in place of the default login failure page. Switch(config)# ip admission proxy http fail page file disk1:fail.htm Step 5 ip admission proxy http login expired page file device:expired-filename Example: Switch(config)# ip admission proxy http login expired page file disk1:expired.htm Specifies the location of the custom HTML file to use in place of the default login expired page. Step 6 end Example: Switch(config)# end Returns to privileged EXEC mode. Verifying Custom Authentication Proxy Web Pages This example shows how to verify the configuration of a custom authentication proxy web page: Switch# show ip admission status IP admission status: Enabled interfaces 0 Total sessions 0 Init sessions 0 Max init sessions allowed 100 Limit reached 0 Hi watermark 0 TCP half-open connections 0 Hi watermark 0 TCP new connections 0 Hi watermark 0 TCP half-open + new 0 Hi watermark 0 HTTPD1 Contexts 0 Hi watermark 0 Parameter Map: Global Custom Pages Custom pages not configured Banner Banner not configured Related Topics Authentication Proxy Web Page Guidelines, on page 1565 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1577 Specifying a Redirection URL for Successful Login Security Specifying a Redirection URL for Successful Login Beginning in privileged EXEC mode, follow these steps to specify a URL to which the user is redirected after authentication, effectively replacing the internal Success HTML page: SUMMARY STEPS 1. configure terminal 2. ip admission proxy http success redirect url-string 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip admission proxy http success redirect url-string Example: Specifies a URL for redirection of the user in place of the default login success page. Switch(config)# ip admission proxy http success redirect www.example.com Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Verifying Redirection URL for Successful Login Switch# show ip admission status Enabled interfaces 0 Total sessions 0 Init sessions 0 Max init sessions allowed 100 Limit reached 0 Hi watermark 0 TCP half-open connections 0 Hi watermark 0 TCP new connections 0 Hi watermark 0 TCP half-open + new 0 Hi watermark 0 HTTPD1 Contexts 0 Hi watermark 0 Parameter Map: Global Custom Pages Custom pages not configured Banner Banner not configured Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1578 Security Configuring the Web-Based Authentication Parameters Related Topics Redirection URL for Successful Login Guidelines, on page 1566 Configuring the Web-Based Authentication Parameters Beginning in privileged EXEC mode, follow these steps to configure the maximum number of failed login attempts before the client is placed in a watch list for a waiting period: SUMMARY STEPS 1. configure terminal 2. ip admission max-login-attempts number 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 ip admission max-login-attempts number Example: Set sthe maximum number of failed login attempts. The range is 1 to 2147483647 attempts. The default is 5. Switch(config)# ip admission max-login-attempts 10 Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Configuring a Web Authentication Local Banner Beginning in privileged EXEC mode, follow these steps to configure a local banner on a switch that has web authentication configured. SUMMARY STEPS 1. configure terminal 2. ip admission auth-proxy-banner http [banner-text | file-path] 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1579 Removing Web-Based Authentication Cache Entries Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 ip admission auth-proxy-banner http [banner-text | Enables the local banner. file-path] (Optional) Create a custom banner by entering C banner-text Example: C (where C is a delimiting character), or file-path that indicates a file (for example, a logo or text file) that appears Switch(config)# ip admission auth-proxy-banner http in the banner. C My Switch C Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Removing Web-Based Authentication Cache Entries Beginning in privileged EXEC mode, follow these steps to remove web-based authentication cache entries: SUMMARY STEPS 1. clear ip auth-proxy cache {* | host ip address} 2. clear ip admission cache {* | host ip address} DETAILED STEPS Step 1 Command or Action clear ip auth-proxy cache {* | host ip address} Example: Switch# clear ip auth-proxy cache 192.168.4.5 Purpose Delete authentication proxy entries. Use an asterisk to delete all cache entries. Enter a specific IP address to delete the entry for a single host. Step 2 clear ip admission cache {* | host ip address} Example: Switch# clear ip admission cache 192.168.4.5 Delete authentication proxy entries. Use an asterisk to delete all cache entries. Enter a specific IP address to delete the entry for a single host. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1580 Security Monitoring Web-Based Authentication Status Monitoring Web-Based Authentication Status Use the commands in this topic to display the web-based authentication settings for all interfaces or for specific ports. Table 138: Privileged EXEC show Commands Command Purpose show authentication sessions method Displays the web-based authentication settings for all interfaces for webauth fastethernet, gigabitethernet, or tengigabitethernet show authentication sessions interface Displays the web-based authentication settings for the specified type slot/port[details] interface for fastethernet, gigabitethernet, or tengigabitethernet. In Session Aware Networking mode, use the show access-session interface command. Feature Information for Web-Based Authentication Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1581 Feature Information for Web-Based Authentication Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1582 7 6 C H A P T E R Configuring Port-Based Traffic Control · Overview of Port-Based Traffic Control , on page 1584 · Finding Feature Information, on page 1584 · Information About Storm Control, on page 1584 · How to Configure Storm Control, on page 1586 · Finding Feature Information, on page 1588 · Information About Protected Ports, on page 1588 · How to Configure Protected Ports, on page 1589 · Monitoring Protected Ports, on page 1590 · Where to Go Next, on page 1590 · Additional References, on page 1591 · Feature Information, on page 1591 · Finding Feature Information, on page 1591 · Information About Port Blocking, on page 1592 · How to Configure Port Blocking, on page 1592 · Monitoring Port Blocking, on page 1594 · Where to Go Next, on page 1594 · Additional References, on page 1594 · Feature Information, on page 1595 · Prerequisites for Port Security, on page 1595 · Restrictions for Port Security, on page 1595 · Information About Port Security, on page 1595 · How to Configure Port Security, on page 1600 · Configuration Examples for Port Security, on page 1606 · Additional References, on page 1607 · Finding Feature Information, on page 1608 · Information About Protocol Storm Protection, on page 1608 · How to Configure Protocol Storm Protection, on page 1609 · Monitoring Protocol Storm Protection, on page 1610 · Additional References, on page 1610 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1583 Overview of Port-Based Traffic Control Security Overview of Port-Based Traffic Control Port-based traffic control is a set of Layer 2 features on the Cisco Catalyst switches used to filter or block packets at the port level in response to specific traffic conditions. The following port-based traffic control features are supported in the Cisco IOS Release for which this guide is written: · Storm Control · Protected Ports · Private Virtual Local Area Network (PVLAN) · Port Blocking · Port Security · Protocol Storm Protection Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Storm Control Storm Control Storm control prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast storm on one of the physical interfaces. A LAN storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance. Errors in the protocol-stack implementation, mistakes in network configurations, or users issuing a denial-of-service attack can cause a storm. Storm control (or traffic suppression) monitors packets passing from an interface to the switching bus and determines if the packet is unicast, multicast, or broadcast. The switch counts the number of packets of a specified type received within the 1-second time interval and compares the measurement with a predefined suppression-level threshold. How Traffic Activity is Measured Storm control uses one of these methods to measure traffic activity: · Bandwidth as a percentage of the total available bandwidth of the port that can be used by the broadcast, multicast, or unicast traffic · Traffic rate in packets per second at which broadcast, multicast, or unicast packets are received Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1584 Security Traffic Patterns · Traffic rate in bits per second at which broadcast, multicast, or unicast packets are received · Traffic rate in packets per second and for small frames. This feature is enabled globally. The threshold for small frames is configured for each interface. With each method, the port blocks traffic when the rising threshold is reached. The port remains blocked until the traffic rate drops below the falling threshold (if one is specified) and then resumes normal forwarding. If the falling suppression level is not specified, the switch blocks all traffic until the traffic rate drops below the rising suppression level. In general, the higher the level, the less effective the protection against broadcast storms. Note When the storm control threshold for multicast traffic is reached, all multicast traffic except control traffic, such as bridge protocol data unit (BDPU) and Cisco Discovery Protocol (CDP) frames, are blocked. However, the switch does not differentiate between routing updates, such as OSPF, and regular multicast data traffic, so both types of traffic are blocked. Traffic Patterns Figure 96: Broadcast Storm Control Example This example shows broadcast traffic patterns on an interface over a given period of time. Broadcast traffic being forwarded exceeded the configured threshold between time intervals T1 and T2 and between T4 and T5. When the amount of specified traffic exceeds the threshold, all traffic of that kind is dropped for the next time period. Therefore, broadcast traffic is blocked during the intervals following T2 and T5. At the next time interval (for example, T3), if broadcast traffic does not exceed the threshold, it is again forwarded. The combination of the storm-control suppression level and the 1-second time interval controls the way the storm control algorithm works. A higher threshold allows more packets to pass through. A threshold value of 100 percent means that no limit is placed on the traffic. A value of 0.0 means that all broadcast, multicast, or unicast traffic on that port is blocked. Note Because packets do not arrive at uniform intervals, the 1-second time interval during which traffic activity is measured can affect the behavior of storm control. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1585 How to Configure Storm Control Security You use the storm-control interface configuration commands to set the threshold value for each traffic type. How to Configure Storm Control Configuring Storm Control and Threshold Levels You configure storm control on a port and enter the threshold level that you want to be used for a particular type of traffic. However, because of hardware limitations and the way in which packets of different sizes are counted, threshold percentages are approximations. Depending on the sizes of the packets making up the incoming traffic, the actual enforced threshold might differ from the configured level by several percentage points. Before you begin Storm control is supported on physical interfaces. You can also configure storm control on an EtherChannel. When storm control is configured on an EtherChannel, the storm control settings propagate to the EtherChannel physical interfaces. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. storm-control {broadcast | multicast | unicast} level {level [level-low] | bps bps [bps-low] | pps pps [pps-low]} 4. storm-control action {shutdown | trap} 5. end 6. show storm-control [interface-id] [broadcast | multicast | unicast] 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal interface interface-id Example: Specifies the interface to be configured, and enter interface configuration mode. Step 3 Switch(config)# interface gigabitethernet1/0/1 storm-control {broadcast | multicast | unicast} level Configures broadcast, multicast, or unicast storm control. {level [level-low] | bps bps [bps-low] | pps pps [pps-low]} By default, storm control is disabled. Example: The keywords have these meanings: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1586 Security Configuring Storm Control and Threshold Levels Step 4 Command or Action Purpose Switch(config-if)# storm-control unicast level 87 65 · For level, specifies the rising threshold level for broadcast, multicast, or unicast traffic as a percentage (up to two decimal places) of the bandwidth. The port blocks traffic when the rising threshold is reached. The range is 0.00 to 100.00. · (Optional) For level-low, specifies the falling threshold level as a percentage (up to two decimal places) of the bandwidth. This value must be less than or equal to the rising suppression value. The port forwards traffic when traffic drops below this level. If you do not configure a falling suppression level, it is set to the rising suppression level. The range is 0.00 to 100.00. If you set the threshold to the maximum value (100 percent), no limit is placed on the traffic. If you set the threshold to 0.0, all broadcast, multicast, and unicast traffic on that port is blocked. · For bps bps, specifies the rising threshold level for broadcast, multicast, or unicast traffic in bits per second (up to one decimal place). The port blocks traffic when the rising threshold is reached. The range is 0.0 to 10000000000.0. · (Optional) For bps-low, specifies the falling threshold level in bits per second (up to one decimal place). It can be less than or equal to the rising threshold level. The port forwards traffic when traffic drops below this level. The range is 0.0 to 10000000000.0. · For pps pps, specifies the rising threshold level for broadcast, multicast, or unicast traffic in packets per second (up to one decimal place). The port blocks traffic when the rising threshold is reached. The range is 0.0 to 10000000000.0. · (Optional) For pps-low, specifies the falling threshold level in packets per second (up to one decimal place). It can be less than or equal to the rising threshold level. The port forwards traffic when traffic drops below this level. The range is 0.0 to 10000000000.0. storm-control action {shutdown | trap} Example: Switch(config-if)# storm-control action trap For BPS and PPS settings, you can use metric suffixes such as k, m, and g for large number thresholds. Specifies the action to be taken when a storm is detected. The default is to filter out the traffic and not to send traps. · Select the shutdown keyword to error-disable the port during a storm. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1587 Finding Feature Information Security Step 5 Step 6 Step 7 Command or Action Purpose · Select the trap keyword to generate an SNMP trap when a storm is detected. end Example: Returns to privileged EXEC mode. Switch(config-if)# end show storm-control [interface-id] [broadcast | multicast Verifies the storm control suppression levels set on the | unicast] interface for the specified traffic type. If you do not enter Example: a traffic type, broadcast storm control settings are displayed. Switch# show storm-control gigabitethernet1/0/1 unicast copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Protected Ports Protected Ports Some applications require that no traffic be forwarded at Layer 2 between ports on the same switch so that one neighbor does not see the traffic generated by another neighbor. In such an environment, the use of protected ports ensures that there is no exchange of unicast, broadcast, or multicast traffic between these ports on the switch. Protected ports have these features: · A protected port does not forward any traffic (unicast, multicast, or broadcast) to any other port that is also a protected port. Data traffic cannot be forwarded between protected ports at Layer 2; only control traffic, such as PIM packets, is forwarded because these packets are processed by the CPU and forwarded in software. All data traffic passing between protected ports must be forwarded through a Layer 3 device. · Forwarding behavior between a protected port and a nonprotected port proceeds as usual. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1588 Security Default Protected Port Configuration Because a switch stack represents a single logical switch, Layer 2 traffic is not forwarded between any protected ports in the switch stack, whether they are on the same or different switches in the stack. Default Protected Port Configuration The default is to have no protected ports defined. Protected Ports Guidelines You can configure protected ports on a physical interface (for example, Gigabit Ethernet port 1) or an EtherChannel group (for example, port-channel 5). When you enable protected ports for a port channel, it is enabled for all ports in the port-channel group. Do not configure a private-VLAN port as a protected port. Do not configure a protected port as a private-VLAN port. A private-VLAN isolated port does not forward traffic to other isolated ports or community ports. How to Configure Protected Ports Configuring a Protected Port Before you begin Protected ports are not pre-defined. This is the task to configure one. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport protected 4. end 5. show interfaces interface-id switchport 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the interface to be configured, and enter interface configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1589 Monitoring Protected Ports Security Command or Action Purpose Switch(config)# interface gigabitethernet1/0/1 Step 3 switchport protected Example: Switch(config-if)# switchport protected Configures the interface to be a protected port. Step 4 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 5 show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet1/0/1 switchport Verifies your entries. Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Monitoring Protected Ports Table 139: Commands for Displaying Protected Port Settings Command show interfaces [interface-id] switchport Purpose Displays the administrative and operational status of all switching (nonrouting) ports or the specified port, including port blocking and port protection settings. Where to Go Next · Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1590 Security Additional References Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1591 Information About Port Blocking Security Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Port Blocking Port Blocking By default, the switch floods packets with unknown destination MAC addresses out of all ports. If unknown unicast and multicast traffic is forwarded to a protected port, there could be security issues. To prevent unknown unicast or multicast traffic from being forwarded from one port to another, you can block a port (protected or nonprotected) from flooding unknown unicast or multicast packets to other ports. Note With multicast traffic, the port blocking feature blocks only pure Layer 2 packets. Multicast packets that contain IPv4 or IPv6 information in the header are not blocked. How to Configure Port Blocking Blocking Flooded Traffic on an Interface Before you begin The interface can be a physical interface or an EtherChannel group. When you block multicast or unicast traffic for a port channel, it is blocked on all ports in the port-channel group. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport block multicast 4. switchport block unicast 5. end 6. show interfaces interface-id switchport 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1592 Security Blocking Flooded Traffic on an Interface Command or Action Switch# configure terminal Purpose Step 2 interface interface-id Example: Specifies the interface to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 switchport block multicast Example: Switch(config-if)# switchport block multicast Blocks unknown multicast forwarding out of the port. Note Only pure Layer 2 multicast traffic is blocked. Multicast packets that contain IPv4 or IPv6 information in the header are not blocked. Step 4 switchport block unicast Example: Switch(config-if)# switchport block unicast Blocks unknown unicast forwarding out of the port. Step 5 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 6 show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet1/0/1 switchport Verifies your entries. Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1593 Monitoring Port Blocking Security Monitoring Port Blocking Table 140: Commands for Displaying Port Blocking Settings Command show interfaces [interface-id] switchport Purpose Displays the administrative and operational status of all switching (nonrouting) ports or the specified port, including port blocking and port protection settings. Where to Go Next · Additional References Related Documents Related Topic Document Title Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title MIBs MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1594 Security Feature Information Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information Release Cisco IOS XE 3.3SE Prerequisites for Port Security Feature Information This feature was introduced. Note If you try to set the maximum value to a number less than the number of secure addresses already configured on an interface, the command is rejected. Restrictions for Port Security The maximum number of secure MAC addresses that you can configure on a switch or switch stack is set by the maximum number of available MAC addresses allowed in the system. This number is determined by the active Switch Database Management (SDM) template. This number is the total of available MAC addresses, including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces. Information About Port Security Port Security You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1595 Types of Secure MAC Addresses Security of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged. Related Topics Enabling and Configuring Port Security, on page 1600 Configuration Examples for Port Security, on page 1606 Types of Secure MAC Addresses The switch supports these types of secure MAC addresses: · Static secure MAC addresses--These are manually configured by using the switchport port-security mac-address mac-address interface configuration command, stored in the address table, and added to the switch running configuration. · Dynamic secure MAC addresses--These are dynamically configured, stored only in the address table, and removed when the switch restarts. · Sticky secure MAC addresses--These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, when the switch restarts, the interface does not need to dynamically reconfigure them. Sticky Secure MAC Addresses You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. The interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. All sticky secure MAC addresses are added to the running configuration. The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the sticky secure addresses, they are lost. If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration. Security Violations It is a security violation when one of these situations occurs: · The maximum number of secure MAC addresses have been added to the address table, and a station whose MAC address is not in the address table attempts to access the interface. · An address learned or configured on one secure interface is seen on another secure interface in the same VLAN. · Running diagnostic tests with port security enabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1596 Security Security Violations You can configure the interface for one of three violation modes, based on the action to be taken if a violation occurs: · protect--when the number of secure MAC addresses reaches the maximum limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred. Note We do not recommend configuring the protect violation mode on a trunk port. The protect mode disables learning when any VLAN reaches its maximum limit, even if the port has not reached its maximum limit. · restrict--when the number of secure MAC addresses reaches the maximum limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the number of maximum allowable addresses. In this mode, you are notified that a security violation has occurred. An SNMP trap is sent, a syslog message is logged, and the violation counter increments. · shutdown--a port security violation causes the interface to become error-disabled and to shut down immediately, and the port LED turns off. When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command, or you can manually re-enable it by entering the shutdown and no shut down interface configuration commands. This is the default mode. · shutdown vlan--Use to set the security violation mode per-VLAN. In this mode, the VLAN is error disabled instead of the entire port when a violation occurs This table shows the violation mode and the actions taken when you configure an interface for port security. Table 141: Security Violation Mode Actions Violation Mode Traffic is forwarded 21 Sends SNMP Sends syslog Displays error Violation trap message message counter 22 increments Shuts down port protect No restrict No shutdown No shutdown No vlan No No No Yes Yes No No No No No Yes No No No Yes No Yes Yes Yes No 23 21 Packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses. 22 The switch returns an error message if you manually configure an address that would cause a security violation. 23 Shuts down only the VLAN on which the violation occurred. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1597 Port Security Aging Security Port Security Aging You can use port security aging to set the aging time for all secure addresses on a port. Two types of aging are supported per port: · Absolute--The secure addresses on the port are deleted after the specified aging time. · Inactivity--The secure addresses on the port are deleted only if the secure addresses are inactive for the specified aging time. Related Topics Enabling and Configuring Port Security Aging, on page 1605 Port Security and Switch Stacks When a switch joins a stack, the new switch will get the configured secure addresses. All dynamic secure addresses are downloaded by the new stack member from the other stack members. When a switch (either the active switch or a stack member) leaves the stack, the remaining stack members are notified, and the secure MAC addresses configured or learned by that switch are deleted from the secure MAC address table. Default Port Security Configuration Table 142: Default Port Security Configuration Feature Default Setting Port security Disabled on a port. Sticky address learning Disabled. Maximum number of secure MAC addresses per port 1. Violation mode Shutdown. The port shuts down when the maximum number of secure MAC addresses is exceeded. Port security aging Disabled. Aging time is 0. Static aging is disabled. Type is absolute. Port Security Configuration Guidelines · Port security can only be configured on static access ports or trunk ports. A secure port cannot be a dynamic access port. · A secure port cannot be a destination port for Switched Port Analyzer (SPAN). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1598 Security Port Security Configuration Guidelines · Note Voice VLAN is only supported on access ports and not on trunk ports, even though the configuration is allowed. · A secure port cannot be a private-VLAN port. · When you enable port security on an interface that is also configured with a voice VLAN, set the maximum allowed secure addresses on the port to two. When the port is connected to a Cisco IP phone, the IP phone requires one MAC address. The Cisco IP phone address is learned on the voice VLAN, but is not learned on the access VLAN. If you connect a single PC to the Cisco IP phone, no additional MAC addresses are required. If you connect more than one PC to the Cisco IP phone, you must configure enough secure addresses to allow one for each PC and one for the phone. · When a trunk port configured with port security and assigned to an access VLAN for data traffic and to a voice VLAN for voice traffic, entering the switchport voice and switchport priority extend interface configuration commands has no effect. When a connected device uses the same MAC address to request an IP address for the access VLAN and then an IP address for the voice VLAN, only the access VLAN is assigned an IP address. · When you enter a maximum secure address value for an interface, and the new value is greater than the previous value, the new value overwrites the previously configured value. If the new value is less than the previous value and the number of configured secure addresses on the interface exceeds the new value, the command is rejected. · The switch does not support port security aging of sticky secure MAC addresses. This table summarizes port security compatibility with other port-based features. Table 143: Port Security Compatibility with Other Switch Features Type of Port or Feature on Port DTP 24 port 25 Trunk port Dynamic-access port 26 Routed port SPAN source port SPAN destination port EtherChannel Tunneling port Protected port IEEE 802.1x port Voice VLAN port 27 Compatible with Port Security No Yes No No Yes No Yes Yes Yes Yes Yes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1599 Overview of Port-Based Traffic Control Security Type of Port or Feature on Port Compatible with Port Security IP source guard Yes Dynamic Address Resolution Protocol (ARP) Yes inspection Flex Links Yes 24 DTP=Dynamic Trunking Protocol 25 A port configured with the switchport mode dynamic interface configuration command. 26 A VLAN Query Protocol (VQP) port configured with the switchport access vlan dynamic interface configuration command. 27 You must set the maximum allowed secure addresses on the port to two plus the maximum number of secure addresses allowed on the access VLAN. Overview of Port-Based Traffic Control Port-based traffic control is a set of Layer 2 features on the Cisco Catalyst switches used to filter or block packets at the port level in response to specific traffic conditions. The following port-based traffic control features are supported in the Cisco IOS Release for which this guide is written: · Storm Control · Protected Ports · Private Virtual Local Area Network (PVLAN) · Port Blocking · Port Security · Protocol Storm Protection How to Configure Port Security Enabling and Configuring Port Security Before you begin This task restricts input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port: SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode {access | trunk} 4. switchport voice vlan vlan-id 5. switchport port-security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1600 Security Enabling and Configuring Port Security 6. switchport port-security [maximum value [vlan {vlan-list | {access | voice}}]] 7. switchport port-security violation {protect | restrict | shutdown | shutdown vlan} 8. switchport port-security [mac-address mac-address [vlan {vlan-id | {access | voice}}] 9. switchport port-security mac-address sticky 10. switchport port-security mac-address sticky [mac-address | vlan {vlan-id | {access | voice}}] 11. end 12. show port-security 13. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the interface to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 switchport mode {access | trunk} Example: Switch(config-if)# switchport mode access Sets the interface switchport mode as access or trunk; an interface in the default mode (dynamic auto) cannot be configured as a secure port. Step 4 switchport voice vlan vlan-id Example: Switch(config-if)# switchport voice vlan 22 Enables voice VLAN on a port. vlan-id--Specifies the VLAN to be used for voice traffic. Step 5 switchport port-security Example: Switch(config-if)# switchport port-security Enable port security on the interface. Step 6 switchport port-security [maximum value [vlan {vlan-list | {access | voice}}]] Example: Switch(config-if)# switchport port-security maximum 20 (Optional) Sets the maximum number of secure MAC addresses for the interface. The maximum number of secure MAC addresses that you can configure on a switch or switch stack is set by the maximum number of available MAC addresses allowed in the system. This number is set by the active Switch Database Management (SDM) template. This number is the total of available MAC Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1601 Enabling and Configuring Port Security Security Step 7 Command or Action Purpose addresses, including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces. (Optional) vlan--sets a per-VLAN maximum value Enter one of these options after you enter the vlan keyword: · vlan-list--On a trunk port, you can set a per-VLAN maximum value on a range of VLANs separated by a hyphen or a series of VLANs separated by commas. For nonspecified VLANs, the per-VLAN maximum value is used. · access--On an access port, specifies the VLAN as an access VLAN. · voice--On an access port, specifies the VLAN as a voice VLAN. Note The voice keyword is available only if a voice VLAN is configured on a port and if that port is not the access VLAN. If an interface is configured for voice VLAN, configure a maximum of two secure MAC addresses. switchport port-security violation {protect | restrict | (Optional) Sets the violation mode, the action to be taken shutdown | shutdown vlan} when a security violation is detected, as one of these: Example: Switch(config-if)# switchport port-security violation restrict · protect--When the number of port secure MAC addresses reaches the maximum limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred. Note We do not recommend configuring the protect mode on a trunk port. The protect mode disables learning when any VLAN reaches its maximum limit, even if the port has not reached its maximum limit. · restrict--When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. An SNMP trap is sent, a syslog message is logged, and the violation counter increments. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1602 Security Enabling and Configuring Port Security Step 8 Command or Action Purpose · shutdown--The interface is error-disabled when a violation occurs, and the port LED turns off. An SNMP trap is sent, a syslog message is logged, and the violation counter increments. · shutdown vlan--Use to set the security violation mode per VLAN. In this mode, the VLAN is error disabled instead of the entire port when a violation occurs. Note When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command. You can manually re-enable it by entering the shutdown and no shutdown interface configuration commands or by using the clear errdisable interface vlan privileged EXEC command. switchport port-security [mac-address mac-address [vlan {vlan-id | {access | voice}}] Example: Switch(config-if)# switchport port-security mac-address 00:A0:C7:12:C9:25 vlan 3 voice (Optional) Enters a secure MAC address for the interface. You can use this command to enter the maximum number of secure MAC addresses. If you configure fewer secure MAC addresses than the maximum, the remaining MAC addresses are dynamically learned. Note If you enable sticky learning after you enter this command, the secure addresses that were dynamically learned are converted to sticky secure MAC addresses and are added to the running configuration. (Optional) vlan--sets a per-VLAN maximum value. Enter one of these options after you enter the vlan keyword: · vlan-id--On a trunk port, you can specify the VLAN ID and the MAC address. If you do not specify a VLAN ID, the native VLAN is used. · access--On an access port, specifies the VLAN as an access VLAN. · voice--On an access port, specifies the VLAN as a voice VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1603 Enabling and Configuring Port Security Security Step 9 Step 10 Step 11 Step 12 Command or Action Purpose Note The voice keyword is available only if a voice VLAN is configured on a port and if that port is not the access VLAN. If an interface is configured for voice VLAN, configure a maximum of two secure MAC addresses. switchport port-security mac-address sticky Example: (Optional) Enables sticky learning on the interface. Switch(config-if)# switchport port-security mac-address sticky switchport port-security mac-address sticky [mac-address | vlan {vlan-id | {access | voice}}] Example: Switch(config-if)# switchport port-security mac-address sticky 00:A0:C7:12:C9:25 vlan voice (Optional) Enters a sticky secure MAC address, repeating the command as many times as necessary. If you configure fewer secure MAC addresses than the maximum, the remaining MAC addresses are dynamically learned, are converted to sticky secure MAC addresses, and are added to the running configuration. Note If you do not enable sticky learning before this command is entered, an error message appears, and you cannot enter a sticky secure MAC address. (Optional) vlan--sets a per-VLAN maximum value. Enter one of these options after you enter the vlan keyword: · vlan-id--On a trunk port, you can specify the VLAN ID and the MAC address. If you do not specify a VLAN ID, the native VLAN is used. · access--On an access port, specifies the VLAN as an access VLAN. · voice--On an access port, specifies the VLAN as a voice VLAN. Note The voice keyword is available only if a voice VLAN is configured on a port and if that port is not the access VLAN. end Example: Switch(config-if)# end Returns to privileged EXEC mode. show port-security Example: Verifies your entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1604 Security Enabling and Configuring Port Security Aging Step 13 Command or Action Switch# show port-security copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Related Topics Port Security, on page 1595 Configuration Examples for Port Security, on page 1606 Enabling and Configuring Port Security Aging Use this feature to remove and add devices on a secure port without manually deleting the existing secure MAC addresses and to still limit the number of secure addresses on a port. You can enable or disable the aging of secure addresses on a per-port basis. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport port-security aging {static | time time | type {absolute | inactivity}} 4. end 5. show port-security [interface interface-id] [address] 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the interface to be configured, and enter interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 switchport port-security aging {static | time time | type Enables or disable static aging for the secure port, or set the {absolute | inactivity}} aging time or type. Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1605 Configuration Examples for Port Security Security Step 4 Step 5 Step 6 Command or Action Purpose Note Switch(config-if)# switchport port-security aging time 120 The switch does not support port security aging of sticky secure addresses. Enter static to enable aging for statically configured secure addresses on this port. For time, specifies the aging time for this port. The valid range is from 0 to 1440 minutes. For type, select one of these keywords: · absolute--Sets the aging type as absolute aging. All the secure addresses on this port age out exactly after the time (minutes) specified lapses and are removed from the secure address list. · inactivity--Sets the aging type as inactivity aging. The secure addresses on this port age out only if there is no data traffic from the secure source addresses for the specified time period. end Example: Returns to privileged EXEC mode. Switch(config)# end show port-security [interface interface-id] [address] Example: Verifies your entries. Switch# show port-security interface gigabitethernet1/0/1 copy running-config startup-config Example: (Optional) Saves your entries in the configuration file. Switch# copy running-config startup-config Related Topics Port Security Aging, on page 1598 Configuration Examples for Port Security This example shows how to enable port security on a port and to set the maximum number of secure addresses to 50. The violation mode is the default, no static secure MAC addresses are configured, and sticky learning is enabled. Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1606 Security Additional References Switch(config-if)# switchport port-security maximum 50 Switch(config-if)# switchport port-security mac-address sticky This example shows how to configure a static secure MAC address on VLAN 3 on a port: Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# switchport mode trunk Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address 0000.0200.0004 vlan 3 This example shows how to enable sticky port security on a port, to manually configure MAC addresses for data VLAN and voice VLAN, and to set the total maximum number of secure addresses to 20 (10 for data VLAN and 10 for voice VLAN). Switch(config)# interface tengigabitethernet1/0/1 Switch(config-if)# switchport access vlan 21 Switch(config-if)# switchport mode access Switch(config-if)# switchport voice vlan 22 Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 20 Switch(config-if)# switchport port-security violation restrict Switch(config-if)# switchport port-security mac-address sticky Switch(config-if)# switchport port-security mac-address sticky 0000.0000.0002 Switch(config-if)# switchport port-security mac-address 0000.0000.0003 Switch(config-if)# switchport port-security mac-address sticky 0000.0000.0001 vlan voice Switch(config-if)# switchport port-security mac-address 0000.0000.0004 vlan voice Switch(config-if)# switchport port-security maximum 10 vlan access Switch(config-if)# switchport port-security maximum 10 vlan voice Related Topics Port Security, on page 1595 Enabling and Configuring Port Security, on page 1600 Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1607 Finding Feature Information Security Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Protocol Storm Protection Protocol Storm Protection When a switch is flooded with Address Resolution Protocol (ARP) or control packets, high CPU utilization can cause the CPU to overload. These issues can occur: · Routing protocol can flap because the protocol control packets are not received, and neighboring adjacencies are dropped. · Spanning Tree Protocol (STP) reconverges because the STP bridge protocol data unit (BPDU) cannot be sent or received. · CLI is slow or unresponsive. Using protocol storm protection, you can control the rate at which control packets are sent to the switch by specifying the upper threshold for the packet flow rate. The supported protocols are ARP, ARP snooping, Dynamic Host Configuration Protocol (DHCP) v4, DHCP snooping, Internet Group Management Protocol (IGMP), and IGMP snooping. When the packet rate exceeds the defined threshold, the switch drops all traffic arriving on the specified virtual port for 30 seconds. The packet rate is measured again, and protocol storm protection is again applied if necessary. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1608 Security Default Protocol Storm Protection Configuration For further protection, you can manually error disable the virtual port, blocking all incoming traffic on the virtual port. You can manually enable the virtual port or set a time interval for automatic re-enabling of the virtual port. Note Excess packets are dropped on no more than two virtual ports. Virtual port error disabling is not supported for EtherChannel and Flexlink interfaces Default Protocol Storm Protection Configuration Protocol storm protection is disabled by default. When it is enabled, auto-recovery of the virtual port is disabled by default. How to Configure Protocol Storm Protection Enabling Protocol Storm Protection SUMMARY STEPS 1. configure terminal 2. psp {arp | dhcp | igmp} pps value 3. errdisable detect cause psp 4. errdisable recovery interval time 5. end 6. show psp config {arp | dhcp | igmp} DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 psp {arp | dhcp | igmp} pps value Example: Switch(config)# psp dhcp pps 35 Step 3 errdisable detect cause psp Example: Purpose Enters global configuration mode. Configures protocol storm protection for ARP, IGMP, or DHCP. For value, specifies the threshold value for the number of packets per second. If the traffic exceeds this value, protocol storm protection is enforced. The range is from 5 to 50 packets per second. (Optional) Enables error-disable detection for protocol storm protection. If this feature is enabled, the virtual port is error Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1609 Monitoring Protocol Storm Protection Security Command or Action Switch(config)# errdisable detect cause psp Step 4 errdisable recovery interval time Example: Switch Step 5 end Example: Switch(config)# end Step 6 show psp config {arp | dhcp | igmp} Example: Switch# show psp config dhcp Purpose disabled. If this feature is disabled, the port drops excess packets without error disabling the port. (Optional) Configures an auto-recovery time (in seconds) for error-disabled virtual ports. When a virtual port is error-disabled, the switch auto-recovers after this time. The range is from 30 to 86400 seconds. Returns to privileged EXEC mode. Verifies your entries. Monitoring Protocol Storm Protection Command show psp config {arp | dhcp | igmp} Purpose Verify your entries. Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1610 Security Additional References Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1611 Additional References Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1612 7 7 C H A P T E R Configuring IPv6 First Hop Security · Finding Feature Information, on page 1613 · Prerequisites for First Hop Security in IPv6, on page 1613 · Restrictions for First Hop Security in IPv6, on page 1613 · Information about First Hop Security in IPv6, on page 1614 · How to Configure an IPv6 Snooping Policy, on page 1616 · How to Configure the IPv6 Binding Table Content , on page 1621 · How to Configure an IPv6 Neighbor Discovery Inspection Policy, on page 1622 · How to Configure an IPv6 Router Advertisement Guard Policy, on page 1627 · How to Configure an IPv6 DHCP Guard Policy , on page 1632 · Additional References, on page 1637 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for First Hop Security in IPv6 · You have configured the necessary IPv6 enabled SDM template. · You should be familiar with the IPv6 neighbor discovery feature. For information, see the "Implementing IPv6 Addressing and Basic Connectivity" chapter of the Cisco IOS IPv6 Configuration Library on Cisco.com. Restrictions for First Hop Security in IPv6 · The following restrictions apply when applying FHS policies to EtherChannel interfaces (Port Channels): · A physical port with an FHS policy attached cannot join an EtherChannel group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1613 Information about First Hop Security in IPv6 Security · An FHS policy cannot be attached to an physical port when it is a member of an EtherChannel group. · By default, a snooping policy has a security-level of guard. When such a snooping policy is configured on an access switch, external IPv6 Router Advertisement (RA) or Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server packets are blocked, even though the uplink port facing the router or DHCP server/relay is configured as a trusted port. To allow IPv6 RA or DHCPv6 server messages, do the following: · Apply an IPv6 RA-guard policy (for RA) or IPv6 DHCP-guard policy (for DHCP server messages ) on the uplink port. · Configure a snooping policy with a lower security-level, for example glean or inspect. However; configuring a lower security level is not recommended with such a snooping policy, because benefits of First Hop security features are not effective. Information about First Hop Security in IPv6 First Hop Security in IPv6 (FHS IPv6) is a set of IPv6 security features, the policies of which can be attached to a physical interface, or a VLAN. An IPv6 software policy database service stores and accesses these policies. When a policy is configured or modified, the attributes of the policy are stored or updated in the software policy database, then applied as was specified. The following IPv6 policies are currently supported: · IPv6 Snooping Policy--IPv6 Snooping Policy acts as a container policy that enables most of the features available with FHS in IPv6. · IPv6 FHS Binding Table Content--A database table of IPv6 neighbors connected to the switch is created from information sources such as Neighbor Discovery (ND) protocol snooping. This database, or binding, table is used by various IPv6 guard features (such as IPv6 ND Inspection) to validate the link-layer address (LLA), the IPv4 or IPv6 address, and prefix binding of the neighbors to prevent spoofing and redirect attacks. · IPv6 Neighbor Discovery Inspection--IPv6 ND inspection learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables. IPv6 ND inspection analyzes neighbor discovery messages in order to build a trusted binding table database and IPv6 neighbor discovery messages that do not conform are dropped. An ND message is considered trustworthy if its IPv6-to-Media Access Control (MAC) mapping is verifiable. This feature mitigates some of the inherent vulnerabilities of the ND mechanism, such as attacks on DAD, address resolution, router discovery, and the neighbor cache. · IPv6 Router Advertisement Guard--The IPv6 Router Advertisement (RA) guard feature enables the network administrator to block or reject unwanted or rogue RA guard messages that arrive at the network switch platform. RAs are used by routers to announce themselves on the link. The RA Guard feature analyzes the RAs and filters out bogus RAs sent by unauthorized routers. In host mode, all router advertisement and router redirect messages are disallowed on the port. The RA guard feature compares configuration information on the Layer 2 device with the information found in the received RA frame. Once the Layer 2 device has validated the content of the RA frame and router redirect frame against the configuration, it forwards the RA to its unicast or multicast destination. If the RA frame content is not validated, the RA is dropped. · IPv6 DHCP Guard--The IPv6 DHCP Guard feature blocks reply and advertisement messages that come from unauthorized DHCPv6 servers and relay agents. IPv6 DHCP guard can prevent forged messages Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1614 Security Information about First Hop Security in IPv6 from being entered in the binding table and block DHCPv6 server messages when they are received on ports that are not explicitly configured as facing a DHCPv6 server or DHCP relay. To use this feature, configure a policy and attach it to an interface or a VLAN. To debug DHCP guard packets, use the debug ipv6 snooping dhcp-guard privileged EXEC command. · IPv6 Source Guard--Like IPv4 Source Guard, IPv6 Source Guard validates the source address or prefix to prevent source address spoofing. A source guard programs the hardware to allow or deny traffic based on source or destination addresses. It deals exclusively with data packet traffic. The IPv6 source guard feature provides the ability to store entries in the hardware TCAM table to prevent a host from sending packets with an invalid IPv6 source address. To debug source-guard packets, use the debug ipv6 snooping source-guard privileged EXEC command. Note The IPv6 source guard and prefix guard features are supported only in the ingress direction; it is not supported in the egress direction. The following restrictions apply: · An FHS policy cannot be attached to an physical port when it is a member of an EtherChannel group. · When IPv6 source guard is enabled on a switch port, NDP or DHCP snooping must be enabled on the interface to which the switch port belongs. Otherwise, all data traffic from this port will be blocked. · An IPv6 source guard policy cannot be attached to a VLAN. It is supported only at the interface level. · When you configure IPv4 and IPv6 source guard together on an interface, it is recommended to use ip verify source mac-check instead of ip verify source . IPv4 connectivity on a given port might break due to two different filtering rules set -- one for IPv4 (IP-filter) and the other for IPv6 (IP-MAC filter). · You cannot use IPv6 Source Guard and Prefix Guard together. When you attach the policy to an interface, it should be "validate address" or "validate prefix" but not both. · PVLAN and Source/Prefix Guard cannot be applied together. · IPv6 Source Guard and Prefix Guard is supported on EtherChannels For more information on IPv6 Source Guard, see the IPv6 Source Guard chapter of the Cisco IOS IPv6 Configuration Guide Library on Cisco.com. · IPv6 Prefix Guard--The IPv6 prefix guard feature works within the IPv6 source guard feature, to enable the device to deny traffic originated from non-topologically correct addresses. IPv6 prefix guard is often used when IPv6 prefixes are delegated to devices (for example, home gateways) using DHCP prefix delegation. The feature discovers ranges of addresses assigned to the link and blocks any traffic sourced with an address outside this range. For more information on IPv6 Prefix Guard, see the IPv6 Prefix Guard chapter of the Cisco IOS IPv6 Configuration Guide Library on Cisco.com. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1615 How to Configure an IPv6 Snooping Policy Security · IPv6 Destination Guard--The IPv6 destination guard feature works with IPv6 neighbor discovery to ensure that the device performs address resolution only for those addresses that are known to be active on the link. It relies on the address glean functionality to populate all destinations active on the link into the binding table and then blocks resolutions before they happen when the destination is not found in the binding table. Note IPv6 Destination Guard is recommended to apply on Layer 2 VLAN with an SVI configured For more information about IPv6 Destination Guard, see the IPv6 Destination Guard chapter of the Cisco IOS IPv6 Configuration Guide Library on Cisco.com. How to Configure an IPv6 Snooping Policy Beginning in privileged EXEC mode, follow these steps to configure IPv6 Snooping Policy : SUMMARY STEPS 1. configure terminal 2. ipv6 snooping policypolicy-name 3. {[default ] | [device-role {node | switch}] | [limit address-count value] | [no] | [protocol {dhcp | ndp} ] | [security-level {glean | guard | inspect} ] | [tracking {disable [stale-lifetime [seconds | infinite] | enable [reachable-lifetime [seconds | infinite] } ] | [trusted-port ] } 4. end 5. show ipv6 snooping policy policy-name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 ipv6 snooping policypolicy-name Example: Creates a snooping policy and enters IPv6 Snooping Policy Configuration mode. Switch(config)# ipv6 snooping policy example_policy Step 3 {[default ] | [device-role {node | switch}] | [limit Enables data address gleaning, validates messages against address-count value] | [no] | [protocol {dhcp | ndp} ] | various criteria, specifies the security level for messages. [security-level {glean | guard | inspect} ] | [tracking {disable [stale-lifetime [seconds | infinite] | enable · (Optional) default--Sets all to default options. [reachable-lifetime [seconds | infinite] } ] | [trusted-port · (Optional) device-role{node] | switch}--Specifies ]} the role of the device attached to the port. Default is Example: node. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1616 Security How to Configure an IPv6 Snooping Policy Step 4 Step 5 Command or Action Switch(config-ipv6-snooping)# security-level inspect Purpose · (Optional) limit address-count value--Limits the number of addresses allowed per target. Example: Switch(config-ipv6-snooping)# trusted-port · (Optional) no--Negates a command or sets it to defaults. · (Optional) protocol{dhcp | ndp}--Specifies which protocol should be redirected to the snooping feature for analysis. The default, is dhcp and ndp. To change the default, use the no protocol command. · (Optional) security-level{glean|guard|inspect}--Specifies the level of security enforced by the feature. Default is guard. glean--Gleans addresses from messages and populates the binding table without any verification. guard--Gleans addresses and inspects messages. In addition, it rejects RA and DHCP server messages. This is the default option. inspect--Gleans addresses, validates messages for consistency and conformance, and enforces address ownership. · (Optional) tracking {disable | enable}--Overrides the default tracking behavior and specifies a tracking option. · (Optional) trusted-port--Sets up a trusted port. It disables the guard on applicable targets. Bindings learned through a trusted port have preference over bindings learned through any other port. A trusted port is given preference in case of a collision while making an entry in the table. end Example: Switch(config-ipv6-snooping)# exit Exits configuration modes to Privileged EXEC mode. show ipv6 snooping policy policy-name Example: Switch#show ipv6 snooping policy example_policy Displays the snooping policy configuration. What to do next Attach an IPv6 Snooping policy to interfaces or VLANs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1617 How to Attach an IPv6 Snooping Policy to an Interface Security How to Attach an IPv6 Snooping Policy to an Interface Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Snooping policy on an interface or VLAN: SUMMARY STEPS 1. configure terminal 2. interface Interface_type stack/module/port 3. switchport 4. ipv6 snooping [attach-policy policy_name [ vlan {vlan_id | add vlan_ids | exceptvlan_ids | none | remove vlan_ids}] | vlan {vlan_id | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 5. do show running-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 interface Interface_type stack/module/port Example: Specifies an interface type and identifier; enters the interface configuration mode. Switch(config)# interface gigabitethernet 1/1/4 Step 3 Step 4 switchport Example: Switch(config-if)# switchport Enters the Switchport mode. Note To configure Layer 2 parameters, if the interface is in Layer 3 mode, you must enter the switchport interface configuration command without any parameters to put the interface into Layer 2 mode. This shuts down the interface and then re-enables it, which might generate messages on the device to which the interface is connected. When you put an interface that is in Layer 3 mode into Layer 2 mode, the previous configuration information related to the affected interface might be lost, and the interface is returned to its default configuration. The command prompt displays as (config-if)# in Switchport configuration mode. ipv6 snooping [attach-policy policy_name [ vlan {vlan_id Attaches a custom ipv6 snooping policy to the interface or | add vlan_ids | exceptvlan_ids | none | remove vlan_ids}] the specified VLANs on the interface. To attach the default | vlan {vlan_id | add vlan_ids | exceptvlan_ids | none | policy to the interface, use the ipv6 snooping command remove vlan_ids | all} ] without the attach-policy keyword. To attach the default Example: policy to VLANs on the interface, use the ipv6 snooping vlan command. The default policy is, security-level guard, device-role node, protocol ndp and dhcp. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1618 Security How to Attach an IPv6 Snooping Policy to a Layer 2 EtherChannel Interface Command or Action Switch(config-if)# ipv6 snooping or Switch(config-if)# ipv6 snooping attach-policy example_policy or Switch(config-if)# ipv6 snooping vlan 111,112 or Switch(config-if)# ipv6 snooping attach-policy example_policy vlan 111,112 Purpose Step 5 do show running-config Example: Switch#(config-if)# do show running-config Verifies that the policy is attached to the specified interface without exiting the interface configuration mode. How to Attach an IPv6 Snooping Policy to a Layer 2 EtherChannel Interface Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Snooping policy on an EtherChannel interface or VLAN: Step 1 Step 2 Procedure Command or Action configure terminal Example: Switch# configure terminal interface range Interface_name Example: Switch(config)# interface range Po11 Purpose Enters the global configuration mode. Specify the port-channel interface name assigned when the EtherChannel was created. Enters the interface range configuration mode. Tip Enter the do show interfaces summary command for quick reference to interface names and types. Step 3 ipv6 snooping [attach-policy policy_name [ vlan {vlan_ids Attaches the IPv6 Snooping policy to the interface or the | add vlan_ids | except vlan_ids | none | remove vlan_ids specified VLANs on that interface. The default policy is | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | attached if the attach-policy option is not used. none | remove vlan_ids | all} ] Example: Switch(config-if-range)# ipv6 snooping attach-policy example_policy or Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1619 How to Attach an IPv6 Snooping Policy to VLANs Globally Security Command or Action Switch(config-if-range)# ipv6 snooping attach-policy example_policy vlan 222,223,224 Purpose or Switch(config-if-range)#ipv6 snooping vlan 222, 223,224 Step 4 do show running-config interfaceportchannel_interface_name Confirms that the policy is attached to the specified interface without exiting the configuration mode. Example: Switch#(config-if-range)# do show running-config int po11 How to Attach an IPv6 Snooping Policy to VLANs Globally Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Snooping Policy to VLANs across multiple interfaces: SUMMARY STEPS 1. configure terminal 2. vlan configuration vlan_list 3. ipv6 snooping [attach-policy policy_name] 4. do show running-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 vlan configuration vlan_list Example: Switch(config)# vlan configuration 333 Step 3 ipv6 snooping [attach-policy policy_name] Example: Switch(config-vlan-config)#ipv6 snooping attach-policy example_policy Purpose Enters the global configuration mode. Specifies the VLANs to which the IPv6 Snooping policy will be attached ; enters the VLAN interface configuration mode. Attaches the IPv6 Snooping policy to the specified VLANs across all switch and stack interfaces. The default policy is attached if the attach-policy option is not used. The default policy is, security-level guard, device-role node, protocol ndp and dhcp. Step 4 do show running-config Example: Verifies that the policy is attached to the specified VLANs without exiting the interface configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1620 Security How to Configure the IPv6 Binding Table Content Command or Action Switch#(config-if)# do show running-config Purpose How to Configure the IPv6 Binding Table Content Beginning in privileged EXEC mode, follow these steps to configure IPv6 Binding Table Content : SUMMARY STEPS 1. configure terminal 2. [no] ipv6 neighbor binding [vlan vlan-id {ipv6-address interface interface_type stack/module/port hw_address [reachable-lifetimevalue [seconds | default | infinite] | [tracking{ [default | disable] [ reachable-lifetimevalue [seconds | default | infinite] | [enable [reachable-lifetimevalue [seconds | default | infinite] | [retry-interval {seconds| default [reachable-lifetimevalue [seconds | default | infinite] } ] 3. [no] ipv6 neighbor binding max-entries number [mac-limit number | port-limit number [mac-limit number] | vlan-limit number [ [mac-limit number] | [port-limit number [mac-limitnumber] ] ] ] 4. ipv6 neighbor binding logging 5. exit 6. show ipv6 neighbor binding DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 [no] ipv6 neighbor binding [vlan vlan-id {ipv6-address interface interface_type stack/module/port hw_address [reachable-lifetimevalue [seconds | default | infinite] | [tracking{ [default | disable] [ reachable-lifetimevalue [seconds | default | infinite] | [enable [reachable-lifetimevalue [seconds | default | infinite] | [retry-interval {seconds| default [reachable-lifetimevalue [seconds | default | infinite] } ] Example: Switch(config)# ipv6 neighbor binding Step 3 [no] ipv6 neighbor binding max-entries number Specifies the maximum number of entries that are allowed [mac-limit number | port-limit number [mac-limit number] to be inserted in the binding table cache. | vlan-limit number [ [mac-limit number] | [port-limit number [mac-limitnumber] ] ] ] Example: Switch(config)# ipv6 neighbor binding max-entries 30000 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1621 How to Configure an IPv6 Neighbor Discovery Inspection Policy Security Step 4 Step 5 Step 6 Command or Action ipv6 neighbor binding logging Example: Switch(config)# ipv6 neighbor binding logging exit Example: Switch(config)# exit show ipv6 neighbor binding Example: Switch# show ipv6 neighbor binding Purpose Enables the logging of binding table main events. Exits global configuration mode, and places the router in privileged EXEC mode. Displays contents of a binding table. How to Configure an IPv6 Neighbor Discovery Inspection Policy Beginning in privileged EXEC mode, follow these steps to configure an IPv6 ND Inspection Policy: SUMMARY STEPS 1. configure terminal 2. [no]ipv6 nd inspection policy policy-name 3. device-role {host | monitor | router | switch} 4. drop-unsecure 5. limit address-count value 6. sec-level minimum value 7. tracking {enable [reachable-lifetime {value | infinite}] | disable [stale-lifetime {value | infinite}]} 8. trusted-port 9. validate source-mac 10. no {device-role | drop-unsecure | limit address-count | sec-level minimum | tracking | trusted-port | validate source-mac} 11. default {device-role | drop-unsecure | limit address-count | sec-level minimum | tracking | trusted-port | validate source-mac} 12. do show ipv6 nd inspection policy policy_name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 [no]ipv6 nd inspection policy policy-name Example: Purpose Enters the global configuration mode. Specifies the ND inspection policy name and enters ND Inspection Policy configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1622 Security How to Configure an IPv6 Neighbor Discovery Inspection Policy Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Switch(config)# ipv6 nd inspection policy example_policy Purpose device-role {host | monitor | router | switch} Example: Specifies the role of the device attached to the port. The default is host. Switch(config-nd-inspection)# device-role switch drop-unsecure Example: Switch(config-nd-inspection)# drop-unsecure Drops messages with no or invalid options or an invalid signature. limit address-count value Enter 110,000. Example: Switch(config-nd-inspection)# limit address-count 1000 sec-level minimum value Specifies the minimum security level parameter value Example: when Cryptographically Generated Address (CGA) options are used. Switch(config-nd-inspection)# limit address-count 1000 tracking {enable [reachable-lifetime {value | infinite}] Overrides the default tracking policy on a port. | disable [stale-lifetime {value | infinite}]} Example: Switch(config-nd-inspection)# tracking disable stale-lifetime infinite trusted-port Example: Switch(config-nd-inspection)# trusted-port Configures a port to become a trusted port. validate source-mac Example: Switch(config-nd-inspection)# validate source-mac no {device-role | drop-unsecure | limit address-count | Remove the current configuration of a parameter with the sec-level minimum | tracking | trusted-port | validate no form of the command. source-mac} Example: Switch(config-nd-inspection)# no validate source-mac default {device-role | drop-unsecure | limit address-count | sec-level minimum | tracking | trusted-port | validate source-mac} Example: Restores configuration to the default values. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1623 How to Attach an IPv6 Neighbor Discovery Inspection Policy to an Interface Security Step 12 Command or Action Switch(config-nd-inspection)# default limit address-count do show ipv6 nd inspection policy policy_name Example: Switch(config-nd-inspection)# do show ipv6 nd inspection policy example_policy Purpose Verifies the ND Inspection Configuration without exiting ND inspection configuration mode. How to Attach an IPv6 Neighbor Discovery Inspection Policy to an Interface Beginning in privileged EXEC mode, follow these steps to attach an IPv6 ND Inspection policy to an interface or VLANs on an interface : SUMMARY STEPS 1. configure terminal 2. interface Interface_type stack/module/port 3. ipv6 nd inspection [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none | remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 interface Interface_type stack/module/port Example: Specifies an interface type and identifier; enters the interface configuration mode. Switch(config)# interface gigabitethernet 1/1/4 Step 3 ipv6 nd inspection [attach-policy policy_name [ vlan Attaches the Neighbor Discovery Inspection policy to the {vlan_ids | add vlan_ids | except vlan_ids | none | remove interface or the specified VLANs on that interface. The vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | default policy is attached if the attach-policy option is not exceptvlan_ids | none | remove vlan_ids | all} ] used. Example: Switch(config-if)# ipv6 nd inspection attach-policy example_policy or Switch(config-if)# ipv6 nd inspection attach-policy example_policy vlan 222,223,224 or Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1624 Security How to Attach an IPv6 Neighbor Discovery Inspection Policy to a Layer 2 EtherChannel Interface Command or Action Purpose Switch(config-if)# ipv6 nd inspection vlan 222, 223,224 Step 4 do show running-config Example: Switch#(config-if)# do show running-config Verifies that the policy is attached to the specified interface without exiting the interface configuration mode. How to Attach an IPv6 Neighbor Discovery Inspection Policy to a Layer 2 EtherChannel Interface Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Neighbor Discovery Inspection policy on an EtherChannel interface or VLAN: SUMMARY STEPS 1. configure terminal 2. interface range Interface_name 3. ipv6 nd inspection [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none | remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config interfaceportchannel_interface_name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 interface range Interface_name Example: Switch(config)# interface range Po11 Purpose Enters the global configuration mode. Specify the port-channel interface name assigned when the EtherChannel was created. Enters the interface range configuration mode. Tip Enter the do show interfaces summary command for quick reference to interface names and types. Step 3 ipv6 nd inspection [attach-policy policy_name [ vlan Attaches the ND Inspection policy to the interface or the {vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | attached if the attach-policy option is not used. exceptvlan_ids | none | remove vlan_ids | all} ] Example: Switch(config-if-range)# ipv6 nd inspection attach-policy example_policy Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1625 How to Attach an IPv6 Neighbor Discovery Inspection Policy to VLANs Globally Security Command or Action Purpose or Switch(config-if-range)# ipv6 nd inspection attach-policy example_policy vlan 222,223,224 or Switch(config-if-range)#ipv6 nd inspection vlan 222, 223,224 Step 4 do show running-config interfaceportchannel_interface_name Confirms that the policy is attached to the specified interface without exiting the configuration mode. Example: Switch#(config-if-range)# do show running-config int po11 How to Attach an IPv6 Neighbor Discovery Inspection Policy to VLANs Globally Beginning in privileged EXEC mode, follow these steps to attach an IPv6 ND Inspection policy to VLANs across multiple interfaces: SUMMARY STEPS 1. configure terminal 2. vlan configuration vlan_list 3. ipv6 nd inspection [attach-policy policy_name] 4. do show running-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 vlan configuration vlan_list Example: Switch(config)# vlan configuration 334 Step 3 ipv6 nd inspection [attach-policy policy_name] Example: Switch(config-vlan-config)#ipv6 nd inspection attach-policy example_policy Purpose Enters the global configuration mode. Specifies the VLANs to which the IPv6 Snooping policy will be attached ; enters the VLAN interface configuration mode. Attaches the IPv6 Neighbor Discovery policy to the specified VLANs across all switch and stack interfaces. The default policy is attached if the attach-policy option is not used. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1626 Security How to Configure an IPv6 Router Advertisement Guard Policy Command or Action Step 4 do show running-config Example: Switch#(config-if)# do show running-config Purpose The default policy is, device-role host, no drop-unsecure, limit address-count disabled, sec-level minimum is disabled, tracking is disabled, no trusted-port, no validate source-mac. Confirms that the policy is attached to the specified VLANs without exiting the configuration mode. How to Configure an IPv6 Router Advertisement Guard Policy Beginning in privileged EXEC mode, follow these steps to configure an IPv6 Router Advertisement policy : SUMMARY STEPS 1. configure terminal 2. [no]ipv6 nd raguard policy policy-name 3. [no]device-role {host | monitor | router | switch} 4. [no]hop-limit {maximum | minimum} value 5. [no]managed-config-flag {off | on} 6. [no]match {ipv6 access-list list | ra prefix-list list} 7. [no]other-config-flag {on | off} 8. [no]router-preference maximum {high | medium | low} 9. [no]trusted-port 10. default {device-role | hop-limit {maximum | minimum} | managed-config-flag | match {ipv6 access-list | ra prefix-list } | other-config-flag | router-preference maximum| trusted-port} 11. do show ipv6 nd raguard policy policy_name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 [no]ipv6 nd raguard policy policy-name Example: Switch(config)# ipv6 nd raguard policy example_policy Step 3 [no]device-role {host | monitor | router | switch} Example: Switch(config-nd-raguard)# device-role switch Purpose Enters the global configuration mode. Specifies the RA Guard policy name and enters RA Guard Policy configuration mode. Specifies the role of the device attached to the port. The default is host. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1627 How to Configure an IPv6 Router Advertisement Guard Policy Security Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose [no]hop-limit {maximum | minimum} value Example: Switch(config-nd-raguard)# hop-limit maximum 33 (1255) Range for Maximum and Minimum Hop Limit values. Enables filtering of Router Advertisement messages by the Hop Limit value. A rogue RA message may have a low Hop Limit value (equivalent to the IPv4 Time to Live) that when accepted by the host, prevents the host from generating traffic to destinations beyond the rogue RA message generator. An RA message with an unspecified Hop Limit value is blocked. If not configured, this filter is disabled. Configure minimum to block RA messages with Hop Limit values lower than the value you specify. Configure maximumto block RA messages with Hop Limit values greater than the value you specify. [no]managed-config-flag {off | on} Enables filtering of Router Advertisement messages by Example: the Managed Address Configuration, or "M" flag field. A rouge RA message with an M field of 1 can cause a host Switch(config-nd-raguard)# managed-config-flag on to use a rogue DHCPv6 server. If not configured, this filter is disabled. On--Accepts and forwards RA messages with an M value of 1, blocks those with 0. Off--Accepts and forwards RA messages with an M value of 0, blocks those with 1. [no]match {ipv6 access-list list | ra prefix-list list} Matches a specified prefix list or access list. Example: Switch(config-nd-raguard)# match ipv6 access-list example_list [no]other-config-flag {on | off} Example: Switch(config-nd-raguard)# other-config-flag on Enables filtering of Router Advertisement messages by the Other Configuration, or "O" flag field. A rouge RA message with an O field of 1 can cause a host to use a rogue DHCPv6 server. If not configured, this filter is disabled. On--Accepts and forwards RA messages with an O value of 1, blocks those with 0. Off--Accepts and forwards RA messages with an O value of 0, blocks those with 1. [no]router-preference maximum {high | medium | low} Enables filtering of Router Advertisement messages by Example: Switch(config-nd-raguard)# router-preference maximum high the Router Preference flag. If not configured, this filter is disabled. · high--Accepts RA messages with the Router Preference set to high, medium, or low. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1628 Security How to Attach an IPv6 Router Advertisement Guard Policy to an Interface Step 9 Step 10 Step 11 Command or Action Purpose · medium--Blocks RA messages with the Router Preference set to high. · low--Blocks RA messages with the Router Preference set to medium and high. [no]trusted-port Example: Switch(config-nd-raguard)# trusted-port When configured as a trusted port, all attached devices are trusted, and no further message verification is performed. default {device-role | hop-limit {maximum | minimum} Restores a command to its default value. | managed-config-flag | match {ipv6 access-list | ra prefix-list } | other-config-flag | router-preference maximum| trusted-port} Example: Switch(config-nd-raguard)# default hop-limit do show ipv6 nd raguard policy policy_name Example: (Optional)--Displays the ND Guard Policy configuration without exiting the RA Guard policy configuration mode. Switch(config-nd-raguard)# do show ipv6 nd raguard policy example_policy How to Attach an IPv6 Router Advertisement Guard Policy to an Interface Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Router Advertisement policy to an interface or to VLANs on the interface : SUMMARY STEPS 1. configure terminal 2. interface Interface_type stack/module/port 3. ipv6 nd raguard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none | remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 interface Interface_type stack/module/port Example: Purpose Enters the global configuration mode. Specifies an interface type and identifier; enters the interface configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1629 How to Attach an IPv6 Router Advertisement Guard Policy to a Layer 2 EtherChannel Interface Security Command or Action Purpose Switch(config)# interface gigabitethernet 1/1/4 Step 3 ipv6 nd raguard [attach-policy policy_name [ vlan Attaches the Neighbor Discovery Inspection policy to the {vlan_ids | add vlan_ids | except vlan_ids | none | remove interface or the specified VLANs on that interface. The vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | default policy is attached if the attach-policy option is not exceptvlan_ids | none | remove vlan_ids | all} ] used. Example: Switch(config-if)# ipv6 nd raguard attach-policy example_policy or Switch(config-if)# ipv6 nd raguard attach-policy example_policy vlan 222,223,224 or Switch(config-if)# ipv6 nd raguard vlan 222, 223,224 Step 4 do show running-config Example: Switch#(config-if)# do show running-config Confirms that the policy is attached to the specified interface without exiting the configuration mode. How to Attach an IPv6 Router Advertisement Guard Policy to a Layer 2 EtherChannel Interface Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Router Advertisement Guard Policy on an EtherChannel interface or VLAN: SUMMARY STEPS 1. configure terminal 2. interface range Interface_name 3. ipv6 nd raguard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none | remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config interfaceportchannel_interface_name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1630 Security How to Attach an IPv6 Router Advertisement Guard Policy to VLANs Globally Step 2 Step 3 Command or Action interface range Interface_name Example: Switch(config)# interface range Po11 Purpose Specify the port-channel interface name assigned when the EtherChannel was created. Enters the interface range configuration mode. Tip Enter the do show interfaces summary command for quick reference to interface names and types. ipv6 nd raguard [attach-policy policy_name [ vlan Attaches the RA Guard policy to the interface or the {vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | attached if the attach-policy option is not used. exceptvlan_ids | none | remove vlan_ids | all} ] Example: Switch(config-if-range)# ipv6 nd raguard attach-policy example_policy or Switch(config-if-range)# ipv6 nd raguard attach-policy example_policy vlan 222,223,224 or Switch(config-if-range)#ipv6 nd raguard vlan 222, 223,224 Step 4 do show running-config interfaceportchannel_interface_name Confirms that the policy is attached to the specified interface without exiting the configuration mode. Example: Switch#(config-if-range)# do show running-config int po11 How to Attach an IPv6 Router Advertisement Guard Policy to VLANs Globally Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Router Advertisement policy to VLANs regardless of interface: SUMMARY STEPS 1. configure terminal 2. vlan configuration vlan_list 3. ipv6 dhcp guard [attach-policy policy_name] 4. do show running-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1631 How to Configure an IPv6 DHCP Guard Policy Security DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 vlan configuration vlan_list Example: Switch(config)# vlan configuration 335 Step 3 ipv6 dhcp guard [attach-policy policy_name] Example: Switch(config-vlan-config)#ipv6 nd raguard attach-policy example_policy Step 4 do show running-config Example: Switch#(config-if)# do show running-config Purpose Enters global configuration mode. Specifies the VLANs to which the IPv6 RA Guard policy will be attached ; enters the VLAN interface configuration mode. Attaches the IPv6 RA Guard policy to the specified VLANs across all switch and stack interfaces. The default policy is attached if the attach-policy option is not used. Confirms that the policy is attached to the specified VLANs without exiting the configuration mode. How to Configure an IPv6 DHCP Guard Policy Beginning in privileged EXEC mode, follow these steps to configure an IPv6 DHCP (DHCPv6) Guard policy: SUMMARY STEPS 1. configure terminal 2. [no]ipv6 dhcp guard policy policy-name 3. [no]device-role {client | server} 4. [no] match server access-list ipv6-access-list-name 5. [no] match reply prefix-list ipv6-prefix-list-name 6. [no]preference{ max limit | min limit } 7. [no] trusted-port 8. default {device-role | trusted-port} 9. do show ipv6 dhcp guard policy policy_name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1632 Security How to Configure an IPv6 DHCP Guard Policy Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action [no]ipv6 dhcp guard policy policy-name Example: Switch(config)# ipv6 dhcp guard policy example_policy [no]device-role {client | server} Example: Switch(config-dhcp-guard)# device-role server Purpose Specifies the DHCPv6 Guard policy name and enters DHCPv6 Guard Policy configuration mode. (Optional) Filters out DHCPv6 replies and DHCPv6 advertisements on the port that are not from a device of the specified role. Default is client. · client--Default value, specifies that the attached device is a client. Server messages are dropped on this port. · server--Specifies that the attached device is a DHCPv6 server. Server messages are allowed on this port. [no] match server access-list ipv6-access-list-name Example: ;;Assume a preconfigured IPv6 Access List as follows: Switch(config)# ipv6 access-list my_acls Switch(config-ipv6-acl)# permit host FE80::A8BB:CCFF:FE01:F700 any (Optional). Enables verification that the advertised DHCPv6 server or relay address is from an authorized server access list (The destination address in the access list is 'any'). If not configured, this check will be bypassed. An empty access list is treated as a permit all. ;;configure DCHPv6 Guard to match approved access list. Switch(config-dhcp-guard)# match server access-list my_acls [no] match reply prefix-list ipv6-prefix-list-name (Optional) Enables verification of the advertised prefixes Example: in DHCPv6 reply messages from the configured authorized prefix list. If not configured, this check will be bypassed. ;;Assume a preconfigured IPv6 prefix list as An empty prefix list is treated as a permit. follows: Switch(config)# ipv6 prefix-list my_prefix permit 2001:0DB8::/64 le 128 ;; Configure DCHPv6 Guard to match prefix Switch(config-dhcp-guard)# match reply prefix-list my_prefix [no]preference{ max limit | min limit } Example: Switch(config-dhcp-guard)# preference max 250 Switch(config-dhcp-guard)#preference min 150 Configure max and min when device-role is serverto filter DCHPv6 server advertisements by the server preference value. The defaults permit all advertisements. max limit--(0 to 255) (Optional) Enables verification that the advertised preference (in preference option) is less than the specified limit. Default is 255. If not specified, this check will be bypassed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1633 How to Attach an IPv6 DHCP Guard Policy to an Interface or a VLAN on an Interface Security Step 7 Step 8 Step 9 Command or Action [no] trusted-port Example: Switch(config-dhcp-guard)# trusted-port Purpose min limit--(0 to 255) (Optional) Enables verification that the advertised preference (in preference option) is greater than the specified limit. Default is 0. If not specified, this check will be bypassed. (Optional) trusted-port--Sets the port to a trusted mode. No further policing takes place on the port. Note If you configure a trusted port then the device-role option is not available. default {device-role | trusted-port} Example: Switch(config-dhcp-guard)# default device-role (Optional) default--Sets a command to its defaults. do show ipv6 dhcp guard policy policy_name (Optional) Displays the configuration of the IPv6 DHCP Example: guard policy without leaving the configuration submode. Omitting the policy_name variable displays all DHCPv6 Switch(config-dhcp-guard)# do show ipv6 dhcp guard policies. policy example_policy Example of DHCPv6 Guard Configuration enable configure terminal ipv6 access-list acl1 permit host FE80::A8BB:CCFF:FE01:F700 any ipv6 prefix-list abc permit 2001:0DB8::/64 le 128 ipv6 dhcp guard policy pol1 device-role server match server access-list acl1 match reply prefix-list abc preference min 0 preference max 255 trusted-port interface GigabitEthernet 0/2/0 switchport ipv6 dhcp guard attach-policy pol1 vlan add 1 vlan 1 ipv6 dhcp guard attach-policy pol1 show ipv6 dhcp guard policy pol1 How to Attach an IPv6 DHCP Guard Policy to an Interface or a VLAN on an Interface Beginning in privileged EXEC mode, follow these steps to configure IPv6 Binding Table Content : SUMMARY STEPS 1. configure terminal 2. interface Interface_type stack/module/port Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1634 Security How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface 3. ipv6 dhcp guard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none | remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config interface Interface_type stack/module/port DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 interface Interface_type stack/module/port Example: Specifies an interface type and identifier; enters the interface configuration mode. Switch(config)# interface gigabitethernet 1/1/4 Step 3 ipv6 dhcp guard [attach-policy policy_name [ vlan Attaches the DHCP Guard policy to the interface or the {vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | attached if the attach-policy option is not used. exceptvlan_ids | none | remove vlan_ids | all} ] Example: Switch(config-if)# ipv6 dhcp guard attach-policy example_policy or Switch(config-if)# ipv6 dhcp guard attach-policy example_policy vlan 222,223,224 or Switch(config-if)# ipv6 dhcp guard vlan 222, 223,224 Step 4 do show running-config interface Interface_type stack/module/port Example: Switch#(config-if)# do show running-config gig 1/1/4 Confirms that the policy is attached to the specified interface without exiting the configuration mode. How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface Beginning in privileged EXEC mode, follow these steps to attach an IPv6 DHCP Guard policy on an EtherChannel interface or VLAN: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1635 How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface Security SUMMARY STEPS 1. configure terminal 2. interface range Interface_name 3. ipv6 dhcp guard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none | remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config interfaceportchannel_interface_name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 interface range Interface_name Example: Switch(config)# interface range Po11 Purpose Enters the global configuration mode. Specify the port-channel interface name assigned when the EtherChannel was created. Enters the interface range configuration mode. Tip Enter the do show interfaces summary command for quick reference to interface names and types. Step 3 ipv6 dhcp guard [attach-policy policy_name [ vlan Attaches the DHCP Guard policy to the interface or the {vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | attached if the attach-policy option is not used. exceptvlan_ids | none | remove vlan_ids | all} ] Example: Switch(config-if-range)# ipv6 dhcp guard attach-policy example_policy or Switch(config-if-range)# ipv6 dhcp guard attach-policy example_policy vlan 222,223,224 or Switch(config-if-range)#ipv6 dhcp guard vlan 222, 223,224 Step 4 do show running-config interfaceportchannel_interface_name Confirms that the policy is attached to the specified interface without exiting the configuration mode. Example: Switch#(config-if-range)# do show running-config int po11 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1636 Security How to Attach an IPv6 DHCP Guard Policy to VLANs Globally How to Attach an IPv6 DHCP Guard Policy to VLANs Globally Beginning in privileged EXEC mode, follow these steps to attach an IPv6 DHCP Guard policy to VLANs across multiple interfaces: SUMMARY STEPS 1. configure terminal 2. vlan configuration vlan_list 3. ipv6 dhcp guard [attach-policy policy_name] 4. do show running-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 vlan configuration vlan_list Example: Switch(config)# vlan configuration 334 Step 3 ipv6 dhcp guard [attach-policy policy_name] Example: Switch(config-vlan-config)#ipv6 dhcp guard attach-policy example_policy Step 4 do show running-config Example: Switch#(config-if)# do show running-config Purpose Enters the global configuration mode. Specifies the VLANs to which the IPv6 Snooping policy will be attached ; enters the VLAN interface configuration mode. Attaches the IPv6 Neighbor Discovery policy to the specified VLANs across all switch and stack interfaces. The default policy is attached if the attach-policy option is not used. The default policy is, device-role client, no trusted-port. Confirms that the policy is attached to the specified VLANs without exiting the configuration mode. Additional References Related Documents Related Topic Document Title IPv6 IPv6 Configuration Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) network management http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/config_library/xe-3se/3850/ipv6-xe-3se-3850-library and security topics Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1637 Additional References Security Related Topic Document Title IPv6 IPv6 Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Command Reference http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/command/ipv6-xe-3se-3850-cr-book.html Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1638 7 8 C H A P T E R Configuring Cisco TrustSec · Configuring Cisco TrustSec, on page 1639 · Finding Feature Information, on page 1639 · Information About Cisco TrustSec, on page 1640 · Restrictions for Cisco TrustSec, on page 1641 · Feature Information for Cisco TrustSec, on page 1642 · Additional References, on page 1642 Configuring Cisco TrustSec Cisco TrustSec provides security improvements to Cisco network devices based on the capability to strongly identify users, hosts, and network devices within a network. TrustSec provides topology-independent and scalable access controls by uniquely classifying data traffic for a particular role. TrustSec ensures data confidentiality and integrity by establishing trust among authenticated peers and encrypting links with those peers. The key component of Cisco TrustSec is the Cisco Identity Services Engine (ISE). Cisco ISE can provision switches with TrustSec Identities and Security Group ACLs (SGACLs), though these may be configured manually on the switch. Finding Feature Information For switch configurations verified within the TrustSec solution, see the Cisco TrustSec How-to guides at the following URL: http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/landing_DesignZone_TrustSec.html For general TrustSec configuration summaries, specific platform considerations, and cts command reference information related to Cisco Catalyst switches, see the Cisco TrustSec Switch Configuration Guide at the following URL: http://www.cisco.com/en/US/docs/switches/lan/trustsec/configuration/guide/trustsec.html Release notes for Cisco TrustSec General Availability releases are at the following URL: http://www.cisco.com/en/US/docs/switches/lan/trustsec/release/notes/rn_cts_crossplat.html Additional information about the Cisco TrustSec solution, including overviews, datasheets, features by platform matrix, and case studies, is available at the following URL: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1639 Information About Cisco TrustSec Security http://www.cisco.com/en/US/netsol/ns1051/index.html Information About Cisco TrustSec The table below lists the TrustSec features to be eventually implemented on TrustSec-enabled Cisco switches. Successive general availability releases of TrustSec will expand the number of switches supported and the number of TrustSec features supported per switch. Cisco TrustSec Feature 802.1AE Tagging (MACsec) Description Protocol for IEEE 802.1AE-based wire-rate hop-to-hop Layer 2 encryption. Between MACsec-capable devices, packets are encrypted on egress from the transmitting device, decrypted on ingress to the receiving device, and in the clear within the devices. This feature is only available between TrustSec hardware-capable devices. Endpoint Admission Control (EAC) EAC is an authentication process for an endpoint user or a device connecting to the TrustSec domain. Usually EAC takes place at the access level switch. Successful authentication and authorization in the EAC process results in Security Group Tag assignment for the user or device. Currently EAC can be 802.1X, MAC Authentication Bypass (MAB), and Web Authentication Proxy (WebAuth). Network Device Admission Control (NDAC) NDAC is an authentication process where each network device in the TrustSec domain can verify the credentials and trustworthiness of its peer device. NDAC utilizes an authentication framework based on IEEE 802.1X port-based authentication and uses EAP-FAST as its EAP method. Successful authentication and authorization in NDAC process results in Security Association Protocol negotiation for IEEE 802.1AE encryption. Security Group Access Control List (SGACL) A Security Group Access Control List (SGACL) associates a Security Group Tag with a policy. The policy is enforced upon SGT-tagged traffic egressing the TrustSec domain. Security Association Protocol (SAP) After NDAC authentication, the Security Association Protocol (SAP) automatically negotiates keys and the cipher suite for subsequent MACSec link encryption between TrustSec peers. SAP is defined in IEEE 802.11i. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1640 Security Restrictions for Cisco TrustSec Cisco TrustSec Feature Security Group Tag (SGT) SGT Exchange Protocol (SXP) Description An SGT is a 16-bit single label indicating the security classification of a source in the TrustSec domain. It is appended to an Ethernet frame or an IP packet. Security Group Tag Exchange Protocol (SXP). With SXP, devices that are not TrustSec-hardware-capable can receive SGT attributes for authenticated users and devices from the Cisco Identity Services Engine (ISE) or the Cisco Secure Access Control System (ACS). The devices can then forward a sourceIP-to-SGT binding to a TrustSec-hardware-capable device will tag the source traffic for SGACL enforcement. Restrictions for Cisco TrustSec The following guidelines and limitations apply to configuring Cisco TrustSec SGT and SGACL: · You cannot statically map an IP-subnet to an SGT. You can only map IP addresses to an SGT. When you configure IP address-to-SGT mappings, the IP address prefix must be 32. · If a port is configured in Multi-Auth mode, all hosts connecting on that port must be assigned the same SGT. When a host tries to authenticate, its assigned SGT must be the same as the SGT assigned to a previously authenticated host. If a host tries to authenticate and its SGT is different from the SGT of a previously authenticated host, the VLAN port (VP) to which these hosts belong is error-disabled. · Cisco TrustSec enforcement is supported only on up to eight VLANs on a VLAN-trunk link. If there are more than eight VLANs configured on a VLAN-trunk link and Cisco TrustSec enforcement is enabled on those VLANs, the switch ports on those VLAN-trunk links will be error-disabled. · The switch can assign SGT and apply corresponding SGACL to end-hosts based on SXP listening only if the end-hosts are Layer2 adjacent to the switch. · Port-to-SGT mapping can be configured only on Cisco TrustSec links (that is, switch-to-switch links). Port-to-SGT mapping cannot be configured on host-to-switch links. · When port-to-SGT mapping is configured on a port, an SGT is assigned to all ingress traffic on that port. There is no SGACL enforcement for egress traffic on the port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1641 Feature Information for Cisco TrustSec Security Feature Information for Cisco TrustSec Table 144: Feature Information for Cisco TrustSec Feature Name Release · NDAC Cisco IOS XE 3.3SE · SXPv1, SXPv2 · SGT · SGACL Layer2 Enforcement · Interface to SGT and VLAN to SGT mapping. · Subnet to SGT mapping · Layer 3 Port Mapping (PM) · Layer 3 Identity Port Mapping (IPM) · Security Group Name Download · SXP Loop Detection · Policy-based CoA SXPv1 and SXPv2 Cisco IOS XE 15.0(2)EX SXPv1 and SXPv2 Cisco IOS XE 15.0(2)EX1 Additional References Related Documents Related Topic Various TrustSec Featurette configurations and examples Feature Information These features were introduced on the Catalyst 3850 and 3650 switches and the Cisco 5700 Series Wireless LAN Controllers. SXP is introduced on the Catalyst 2960-X switch. SXP is introduced on the Catalyst 2960-XR switch. Document Title Cisco TrustSec Configuration Guide, Cisco IOS Release 15SY hptw/: wwc.sicoc.ome/nU/ Sd/ocsoi/s-xmoi/lss/ec_usr_cstc/onfgiuraoitn1/5-sys/ec-cst-15-sy-bookh.mt l Cisco TrustSec Configuration Guide, Cisco IOS XE Release 3S hptw/: wwc.sicoc.ome/nU/ Sd/ocsoi/s-xmoi/ls/ec_usr_cstc/onfgiuraoitnx/e-3sc/st-sg-thandnilg-mi p-fwdh.mt l Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1642 Security Additional References Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB MIBs Link CISCO-TRUSTSEC-POLICY-MIB To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1643 Additional References Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1644 7 9 C H A P T E R Configuring Wireless Guest Access · Finding Feature Information, on page 1645 · Prerequisites for Guest Access, on page 1645 · Restrictions for Guess Access, on page 1646 · Information about Wireless Guest Access, on page 1646 · Fast Secure Roaming, on page 1646 · How to Configure Guest Access, on page 1647 · Configuration Examples for Guest Access, on page 1662 · Additional References for Guest Access, on page 1668 · Feature History and Information for Guest Access, on page 1669 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Guest Access · All mobility peers should be configured for hierarchical mobility architecture. · For Guest Controller Mobility Anchor configuration on WLAN is must on Mobility Agent and Guest Controller. · Guest Access can be a 3 box solution or 2 box solution. The mobility tunnel link status should be up between: · Mobility Agent, Mobility Controller and Guest Controller. or · Mobility Agent/Mobility Controller and Guest Controller Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1645 Restrictions for Guess Access Security Restrictions for Guess Access Guest Controller functionality is not supported on the Catalyst 3850 switch whereas Catalyst 3850 can act as mobility agent. Information about Wireless Guest Access Ideally, the implementation of a wireless guest network uses as much of an enterprise's existing wireless and wired infrastructure as possible to avoid the cost and complexity of building a physical overlay network. Assuming this is the case, the following additional elements and functions are needed: · A dedicated guest WLAN/SSID--Implemented throughout the campus wireless network wherever guest access is required. A guest WLAN is identified by a WLAN with mobility anchor (Guest Controller) configured. · Guest traffic segregation--Requires implementing Layer 2 or Layer 3 techniques across the campus network to restrict where guests are allowed to go. · Access control--Involves using imbedded access control functionality within the campus network or implementing an external platform to control guest access to the Internet from the enterprise network. · Guest user credential management--A process by which a sponsor or lobby administrator can create temporary credentials in behalf of a guest. This function might be resident within an access control platform or it might be a component of AAA or some other management system. Fast Secure Roaming Fast secure roaming can be achieved by caching the Pairwise Master Key (PMK) information for Cisco Centralized Key Management (CCKM), 802.11r and 802.11i clients. Cisco Centralized Key Management (CCKM) helps to improve roaming. Only the client can initiate the roaming process, which depends on factors such as: · Overlap between APs · Distance between APs · Channel, signal strength, and load on the AP · Data rates and output power Whenever a fast-roaming client 802.11i, [CCKM]) roams to a new device, after fast-roaming the clients go through mobility "handoff" procedure. And new AAA attributes learned through mobility "handoff" procedure get re-applied. Full L2 authentication must be avoided during roaming if the client uses the 802.11i WPA2, CCKM, 802.11r to achieve the full requirements of fast secure roaming. The PMK cache (802.11i, CCKM, and 802.11r) is used to authenticate and derive the keys for roaming clients to avoid full L2 authentication. This requires all Mobility Anchors (MA) and Mobility Controllers (MC) in the mobility group to have the same PMK cache values. The session timeout defines when a PMK cache will expire. A PMK cache can also be deleted when a client fails to re-authenticate or when it is manually deleted them from the CLI. The deletion on the original controller or switch shall be propagated to other controllers or switches in the same mobility group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1646 Security How to Configure Guest Access How to Configure Guest Access Creating a Lobby Administrator Account SUMMARY STEPS 1. configure terminal 2. user-name user-name 3. type lobby-admin 4. password 0 password 5. end 6. show running-config | section user-name (or) show running-config | section configured lobby admin username DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 user-name user-name Example: Switch (config)# user-name lobby Creates a user account. Step 3 type lobby-admin Example: Switch (config-user-name)# type lobby-admin Specifies the account type as lobby admin. Step 4 password 0 password Example: Switch(config-user-name)# password 0 lobby Creates a password for the lobby administrator account. Step 5 end Example: Switch (config-user-name)# end Returns to privileged EXEC mode. Step 6 show running-config | section user-name (or) show Displays the configuration details. running-config | section configured lobby admin username Example: Switch # show running-config | section lobby Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1647 Configuring Guest User Accounts Security Example Configuring Guest User Accounts SUMMARY STEPS 1. configure terminal 2. user-name user-name 3. password unencrypted/hidden-password password 4. type network-user description description guest-user lifetime year 0-1 month 0-11 day 0-30 hour 0-23 minute 0-59 second 0-59 5. end 6. show aaa local netuser all 7. show running-config | sectionuser-name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 user-name user-name Example: Switch (config)# user-name guest Creates a username for the lobby ambassador account. Step 3 password unencrypted/hidden-password password Example: Switch (config-user-name)# password 0 guest Specifies the password for the user. Step 4 type network-user description description guest-user Specifies the type of user. lifetime year 0-1 month 0-11 day 0-30 hour 0-23 minute 0-59 second 0-59 Example: Switch (config-user-name)# type network-user description guest guest-user lifetime year 1 month 10 day 3 hour 1 minute 5 second 30 Step 5 end Example: Switch (config-user-name)# end Returns to privileged EXEC mode. Step 6 show aaa local netuser all Example: Displays the configuration details. After the lifetime, the user-name with guest type will be deleted and the client Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1648 Security Configuring Mobility Agent (MA) Command or Action Switch # show aaa local netuser all Step 7 show running-config | sectionuser-name Example: Switch # show running-config | section guest Purpose associated with the guest user-name will be de-authenticated. Displays the configuration details. Example Configuring Mobility Agent (MA) SUMMARY STEPS 1. configure terminal 2. wireless mobility controller ipmc-ipaddress public-ip mc-publicipaddress 3. wlan wlan-name wlan-id ssid 4. client vlan idvlan-group name/vlan-id 5. no security wpa 6. mobility anchor ipaddress 7. aaa-override 8. no shutdown 9. end 10. show wireless mobility summary 11. show wlan name wlan-name/id DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 wireless mobility controller ipmc-ipaddress public-ip mc-publicipaddress Example: Switch (config) # wireless mobility controller ip27.0.0.1 public-ip 27.0.0.1 Configures the Mobility Controller to which the MA will be associated. Step 3 wlan wlan-name wlan-id ssid Example: Switch (config) # wlan mywlan 34 mywlan-ssid · For wlan-name enter, enter the profile name. The range is 1- 32 characters. · For wlan-id, enter the WLAN ID. The range is 1-512. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1649 Configuring Mobility Controller Security Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose · For ssid, enter the Service Set IDentifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID. client vlan idvlan-group name/vlan-id Example: Switch (config-wlan) # client vlan VLAN0136 Configures the VLAN id or group of the WLAN. no security wpa Example: Switch (config-wlan) # no security wpa The security configuration must be the same for the WLAN created on the GC. This example is for open authentication. For other security types such as open and webauth, appropriate command should be provided. mobility anchor ipaddress Configures the Guest Controller as mobility anchor. Example: Switch (config-wlan) # mobility anchor 9.3.32.2 aaa-override Example: Switch (config-wlan) # aaa-override (Optional) Enables AAA override. AAA override is required for non open authentication in case AAA attributes are to be prioritized. It is required only in case guest user need to be deauthenticated after lifetime or have to give aaa-override attribute to the user. no shutdown Example: Switch(config-wlan) # no shutdown Enables the WLAN. end Example: Switch (config) # end Returns to privileged EXEC mode. show wireless mobility summary Example: Switch # show wireless mobility summary Verifies the mobility controller IP address and mobility tunnel status. show wlan name wlan-name/id Example: Switch # show wlan name mywlan Displays the configuration of mobility anchor. Example Configuring Mobility Controller Mobility Controller mode should be enabled using the wireless mobility controller command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1650 Security Configuring Mobility Controller SUMMARY STEPS 1. configure terminal 2. wireless mobility group member ip ip-address public-ip ip-address group group-name 3. wireless mobility controller peer-group peer-group-name 4. wireless mobility controller peer-group peer-group-name member ip ipaddress public-ip ipaddress 5. end 6. show wireless mobility summary DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 wireless mobility group member ip ip-address public-ip Adds all peers within the MC group. The ip-address should ip-address group group-name be the guest controller's IP address. Example: Switch (config) # wireless mobility group member ip 27.0.0.1 public-ip 23.0.0.1 group test Step 3 wireless mobility controller peer-group peer-group-name Creates the switch peer group. Example: Switch (config) # wireless mobility controller peer-group pg Step 4 wireless mobility controller peer-group peer-group-name Adds the MA to the switch peer group. member ip ipaddress public-ip ipaddress Example: Switch (config) # wireless mobility controller peer-group pg member ip 9.7.136.10 public-ip 9.7.136.10 Step 5 end Example: Switch (config) # end Returns to privileged EXEC mode. Step 6 show wireless mobility summary Example: Switch # show wireless mobility summary Displays the configuration details. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1651 Obtaining a Web Authentication Certificate Security Example Obtaining a Web Authentication Certificate SUMMARY STEPS 1. configure terminal 2. crypto pki import trustpoint name pkcs12 tftp: passphrase 3. end 4. show crypto pki trustpoints cert DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 crypto pki import trustpoint name pkcs12 tftp: passphrase Imports certificate. Example: Switch (config)# crypto pki import cert pkcs12 tftp://9.1.0.100/ldapserver-cert.p12 cisco Step 3 end Example: Switch (config)# end Returns to privileged EXEC mode. Step 4 show crypto pki trustpoints cert Example: Switch # show crypto pki trustpoints cert Displays the configuration details. Example Displaying a Web Authentication Certificate SUMMARY STEPS 1. show crypto ca certificate verb Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1652 Security Choosing the Default Web Authentication Login Page DETAILED STEPS Step 1 Command or Action show crypto ca certificate verb Example: Switch # show crypto ca certificate verb Purpose Displays the current web authentication certificate details. Example Choosing the Default Web Authentication Login Page AAA override flag should be enabled on the WLAN for web authentication using local or remote AAA server. SUMMARY STEPS 1. configure terminal 2. parameter-map type webauth parameter-map name 3. wlan wlan-name 4. shutdown 5. security web-auth 6. security web-auth authentication-list authentication list name 7. security web-auth parameter-map parameter-map name 8. no shutdown 9. end 10. show running-config | section wlan-name 11. show running-config | section parameter-map type webauth parameter-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth parameter-map name Configures the web-auth parameter-map. Example: Switch (config) # parameter-map type webauth test Step 3 wlan wlan-name Example: Switch (config) # wlan wlan10 For the wlan-name, enter the profile name. The range is 1- 32 characters. Step 4 shutdown Example: Disables WLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1653 Choosing a Customized Web Authentication Login Page from an External Web Server Security Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Switch (config) # shutdown Purpose security web-auth Example: Controller (config-wlan) # security web-auth Enables web-auth on WLAN. security web-auth authentication-list authentication list Allows you to map the authentication list name with the name web-auth WLAN. Example: Controller (config-wlan) # security web-auth authentication-list test security web-auth parameter-map parameter-map name Allows you to map the parameter-map name with the Example: web-auth WLAN. Switch (config) # security web-auth parameter-map test no shutdown Example: Switch (config) # no shutdown Enables the WLAN. end Example: Switch (config) # end Returns to privileged EXEC mode. show running-config | section wlan-name Example: Switch# show running-config | section mywlan Displays the configuration details. show running-config | section parameter-map type webauth parameter-map Example: Switch# show running-config | section parameter-map type webauth test Displays the configuration details. Example Choosing a Customized Web Authentication Login Page from an External Web Server AAA override flag should be enabled on the WLAN for web authentication using local or remote AAA server. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1654 Security Choosing a Customized Web Authentication Login Page from an External Web Server SUMMARY STEPS 1. configure terminal 2. parameter-map type webauth global 3. virtual-ip {ipv4 | ipv6} ip-address 4. parameter-map type webauth parameter-map name 5. type {authbypass | consent | webauth | webconsent} 6. redirect [for-login|on-success|on-failure] URL 7. redirect portal {ipv4 | ipv6} ip-address 8. end 9. show running-config | section parameter-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth global Configures a global webauth type parameter. Example: Switch (config) # parameter-map type webauth global Step 3 virtual-ip {ipv4 | ipv6} ip-address Configures the virtual IP address. Example: Switch (config-params-parameter-map) # virtual-ip ipv4 1.1.1.1 Step 4 parameter-map type webauth parameter-map name Example: Switch (config-params-parameter-map) # parameter-map type webauth test Configures the webauth type parameter. Step 5 type {authbypass | consent | webauth | webconsent} Example: Configures webauth subtypes such as consent, passthru, webauth, or webconsent. Switch (config-params-parameter-map) # type webauth Step 6 redirect [for-login|on-success|on-failure] URL Example: Configures the redirect URL for the log in page, success page, and failure page. Switch (config-params-parameter-map) # redirect for-login http://9.1.0.100/login.html Step 7 redirect portal {ipv4 | ipv6} ip-address Example: Switch (config-params-parameter-map) # redirect portal ipv4 23.0.0.1 Configures the external portal IPv4 address. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1655 Assigning Login, Login Failure, and Logout Pages per WLAN Security Step 8 Step 9 Command or Action end Example: Switch (config-params-parameter-map) # end show running-config | section parameter-map Example: Switch # show running-config | section parameter-map Purpose Returns to privileged EXEC mode. Displays the configuration details. Example Assigning Login, Login Failure, and Logout Pages per WLAN SUMMARY STEPS 1. configure terminal 2. parameter-map type webauth parameter-map-name 3. custom-page login device html-filename 4. custom-page login expired html-filename 5. custom-page failure device html-filename 6. custom-page success device html-filename 7. end 8. show running-config | section parameter-map type webauth parameter-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth parameter-map-name Configures the webauth type parameter. Example: Switch (config) # parameter-map type webauth test Step 3 custom-page login device html-filename Example: Allows you to specify the filename for web authentication customized login page. Switch (config-params-parameter-map)# custom-page login device device flash:login.html Step 4 custom-page login expired html-filename Example: Allows you to specify the filename for web authentication customized login expiry page. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1656 Security Configuring AAA-Override Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Switch (config-params-parameter-map)# custom-page login expired device flash:loginexpired.html custom-page failure device html-filename Example: Allows you to specify the filename for web authentication customized login failure page. Switch (config-params-parameter-map)# custom-page failure device device flash:loginfail.html custom-page success device html-filename Example: Allows you to specify the filename for web authentication customized login success page. Switch (config-params-parameter-map)# custom-page success device device flash:loginsuccess.html end Example: Switch (config-params-parameter-map)# end Returns to privileged EXEC mode. show running-config | section parameter-map type webauth parameter-map Displays the configuration details. Example: Switch (config) # show running-config | section parameter-map type webauth test Example Configuring AAA-Override SUMMARY STEPS 1. configure terminal 2. wlan wlan-name 3. aaa-override 4. end 5. show running-config | section wlan-name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1657 Configuring Client Load Balancing Security Step 2 Step 3 Step 4 Step 5 Command or Action wlan wlan-name Example: Switch (config) # wlan ramban aaa-override Example: Switch (config-wlan) # aaa-override end Example: Switch (config-wlan) # end show running-config | section wlan-name Example: Switch # show running-config | section ramban Purpose For wlan-name, enter the profile name. The range is 1- 32 characters. Enables AAA override on the WLAN. Returns to privileged EXEC mode. Displays the configuration details. Example Configuring Client Load Balancing SUMMARY STEPS 1. configure terminal 2. wlan wlan-name 3. shutdown 4. mobility anchor ip-address1 5. mobility anchor ip-address2 6. no shutdown wlan 7. end 8. show running-config | section wlan-name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Step 2 wlan wlan-name Example: Switch (config)# wlan ramban Purpose Enters global configuration mode. For wlan-name, enter the profile name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1658 Security Configuring Preauthentication ACL Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action shutdown Example: Switch (config-wlan)# shutdown Purpose Disables WLAN. mobility anchor ip-address1 Configures a guest controller as mobility anchor. Example: Switch (config-wlan) # mobility anchor 9.7.136.15 mobility anchor ip-address2 Configures a guest controller as mobility anchor. Example: Switch (config-wlan) # mobility anchor 9.7.136.16 no shutdown wlan Example: Switch (config-wlan) # no shutdown wlan Enables the WLAN. end Example: Switch (config-wlan) # end Returns to privileged EXEC mode. show running-config | section wlan-name Example: Switch # show running-config | section ramban Displays the configuration details. Example Configuring Preauthentication ACL SUMMARY STEPS 1. configure terminal 2. wlan wlan-name 3. shutdown 4. ip access-group web preauthrule 5. no shutdown 6. end 7. show wlan name wlan-name DETAILED STEPS Step 1 Command or Action configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1659 Configuring IOS ACL Definition Security Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Example: Switch# configure terminal wlan wlan-name Example: Switch (config)# wlan ramban shutdown Example: Switch (config-wlan)# shutdown ip access-group web preauthrule Example: Switch (config-wlan)# ip access-group web preauthrule no shutdown Example: Switch (config)# no shutdown end Example: Switch (config-wlan)# end show wlan name wlan-name Example: Switch# show wlan name ramban Purpose For wlan-name, enter the profile name. Disables the WLAN. Configures ACL that has to be applied before authentication. Enables the WLAN. Returns to privileged EXEC mode. Displays the configuration details. Example Configuring IOS ACL Definition SUMMARY STEPS 1. configure terminal 2. ip access-list extended access-list number 3. permit udp any eq port number any 4. end 5. show access-lists ACL number Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1660 Security Configuring Webpassthrough DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Purpose Enters global configuration mode. Step 2 ip access-list extended access-list number Example: Switch (config) # ip access-list extended 102 Configures extended IP access-list. Step 3 permit udp any eq port number any Configures destination host. Example: Switch (config-ext-nacl) # permit udp any eq 8080 any Step 4 end Example: Switch (config-wlan) # end Returns to privileged EXEC mode. Step 5 show access-lists ACL number Example: Switch # show access-lists 102 Displays the configuration details. Example Configuring Webpassthrough SUMMARY STEPS 1. configure terminal 2. parameter-map type webauth parameter-map name 3. type consent 4. end 5. show running-config | section parameter-map type webauth parameter-map DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch # configure terminal Step 2 parameter-map type webauth parameter-map name Purpose Enters global configuration mode. Configures the webauth type parameter. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1661 Configuration Examples for Guest Access Security Step 3 Step 4 Step 5 Command or Action Example: Switch (config) # parameter-map type webauth webparalocal Purpose type consent Configures webauth type as consent. Example: Switch (config-params-parameter-map) # type consent end Example: Switch (config-params-parameter-map) # end Returns to privileged EXEC mode. show running-config | section parameter-map type webauth parameter-map Displays the configuration details. Example: Switch (config) # show running-config | section parameter-map type webauth test Example Configuration Examples for Guest Access Example: Creating a Lobby Ambassador Account This example shows how to configure a lobby ambassador account. Switch# configure terminal Switch(config)# user-name lobby Switch(config)# type lobby-admin Switch(config)# password 0 lobby Switch(config)# end Switch# show running-config | section lobby user-name lobby creation-time 1351118727 password 0 lobby type lobby-admin Example: Obtaining Web Authentication Certificate This example shows how to obtain web authentication certificate. Switch# configure terminal Switch(config)# crypto pki import cert pkcs12 tftp://9.1.0.100/ldapserver-cert.p12 cisco Switch(config)# end Switch# show crypto pki trustpoints cert Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1662 Security Example: Obtaining Web Authentication Certificate Trustpoint cert: Subject Name: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Serial Number (hex): 00 Certificate configured. Switch# show crypto pki certificates cert Certificate Status: Available Certificate Serial Number (hex): 04 Certificate Usage: General Purpose Issuer: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Subject: Name: ldapserver e=rkannajr@cisco.com cn=ldapserver ou=WNBU o=Cisco st=California c=US Validity Date: start date: 07:35:23 UTC Jan 31 2012 end date: 07:35:23 UTC Jan 28 2022 Associated Trustpoints: cert ldap12 Storage: nvram:rkannajrcisc#4.cer CA Certificate Status: Available Certificate Serial Number (hex): 00 Certificate Usage: General Purpose Issuer: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Subject: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Validity Date: start date: 07:27:56 UTC Jan 31 2012 end date: 07:27:56 UTC Jan 28 2022 Associated Trustpoints: cert ldap12 ldap Storage: nvram:rkannajrcisc#0CA.cer Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1663 Example: Displaying a Web Authentication Certificate Security Example: Displaying a Web Authentication Certificate This example shows how to display a web authentication certificate. Switch# show crypto ca certificate verb Certificate Status: Available Version: 3 Certificate Serial Number (hex): 2A9636AC00000000858B Certificate Usage: General Purpose Issuer: cn=Cisco Manufacturing CA o=Cisco Systems Subject: Name: WS-C3780-6DS-S-2037064C0E80 Serial Number: PID:WS-C3780-6DS-S SN:FOC1534X12Q cn=WS-C3780-6DS-S-2037064C0E80 serialNumber=PID:WS-C3780-6DS-S SN:FOC1534X12Q CRL Distribution Points: http://www.cisco.com/security/pki/crl/cmca.crl Validity Date: start date: 15:43:22 UTC Aug 21 2011 end date: 15:53:22 UTC Aug 21 2021 Subject Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Signature Algorithm: SHA1 with RSA Encryption Fingerprint MD5: A310B856 A41565F1 1D9410B5 7284CB21 Fingerprint SHA1: 04F180F6 CA1A67AF 9D7F561A 2BB397A1 0F5EB3C9 X509v3 extensions: X509v3 Key Usage: F0000000 Digital Signature Non Repudiation Key Encipherment Data Encipherment X509v3 Subject Key ID: B9EEB123 5A3764B4 5E9C54A7 46E6EECA 02D283F7 X509v3 Authority Key ID: D0C52226 AB4F4660 ECAE0591 C7DC5AD1 B047F76C Authority Info Access: Associated Trustpoints: CISCO_IDEVID_SUDI Key Label: CISCO_IDEVID_SUDI Example: Configuring Guest User Accounts This example shows how to configure a guest user account. Switch# configure terminal Switch(config)# user-name guest Switch(config-user-name)# password 0 guest Switch(config-user-name)# type network-user description guest guest-user lifetime year 1 month 10 day 3 hour 1 minute 5 second 30 Switch(config-user-name)# end Switch# show aaa local netuser all User-Name : guest Type : guest Password : guest Is_passwd_encrypted : No Descriptio : guest Attribute-List : Not-Configured First-Login-Time : Not-Logged-In Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1664 Security Example: Configuring Mobility Controller Num-Login Lifetime Start-Time :0 : 1 years 10 months 3 days 1 hours 5 mins 30 secs : 20:47:37 chennai Dec 21 2012 Example: Configuring Mobility Controller This example shows how to configure a mobility controller. Switch# configure terminal Switch(config)# wireless mobility group member ip 27.0.0.1 public-ip 23.0.0.1 group test Switch(config)# wireless mobility controller peer-group pg Switch(config)# wireless mobility controller peer-group pg member ip 9.7.136.10 public-ip 9.7.136.10 Switch(config)# end Switch# show wireless mobility summary Mobility Controller Summary: Mobility Role Mobility Protocol Port Mobility Group Name Mobility Oracle DTLS Mode Mobility Domain ID for 802.11r Mobility Keepalive Interval Mobility Keepalive Count Mobility Control Message DSCP Value Mobility Domain Member Count : Mobility Controller : 16666 : default : Enabled : Enabled : 0xac34 : 10 :3 :7 :3 Link Status is Control Link Status : Data Link Status Controllers configured in the Mobility Domain: IP Public IP Group Name Multicast IP Link Status ------------------------------------------------------------------------------- 9.9.9.2 - default 0.0.0.0 UP : UP 12.12.11.11 12.13.12.12 rasagna-grp DOWN : DOWN 27.0.0.1 23.0.0.1 test DOWN : DOWN Switch Peer Group Name Switch Peer Group Member Count Bridge Domain ID Multicast IP Address : spg1 :0 :0 : 0.0.0.0 Switch Peer Group Name Switch Peer Group Member Count Bridge Domain ID Multicast IP Address : pg :1 :0 : 0.0.0.0 IP Public IP Link Status -------------------------------------------------- 9.7.136.10 9.7.136.10 DOWN : DOWN Example: Choosing the Default Web Authentication Login Page This example shows how to choose a default web authentication login page. Switch# configure terminal Switch(config)# parameter-map type webauth test Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1665 Example: Choosing a Customized Web Authentication Login Page from an External Web Server Security This operation will permanently convert all relevant authentication commands to their CPL control-policy equivalents. As this conversion is irreversible and will disable the conversion CLI 'authentication display [legacy|new-style]', you are strongly advised to back up your current configuration before proceeding. Do you wish to continue? [yes]: yes Switch(config)# wlan wlan50 Switch(config-wlan)# shutdown Switch(config-wlan)# security web-auth authentication-list test Switch(config-wlan)# security web-auth parameter-map test Switch(config-wlan)# no shutdown Switch(config-wlan)# end Switch# show running-config | section wlan50 wlan wlan50 50 wlan50 security wpa akm cckm security wpa wpa1 security wpa wpa1 ciphers aes security wpa wpa1 ciphers tkip security web-auth authentication-list test security web-auth parameter-map test session-timeout 1800 no shutdown Switch# show running-config | section parameter-map type webauth test parameter-map type webauth test type webauth Example: Choosing a Customized Web Authentication Login Page from an External Web Server This example shows how to choose a customized web authentication login page from an external web server. Switch# configure terminal Switch(config)# parameter-map type webauth global Switch(config-params-parameter-map)# virtual-ip ipv4 1.1.1.1 Switch(config-params-parameter-map)# parameter-map type webauth test Switch(config-params-parameter-map)# type webauth Switch(config-params-parameter-map)# redirect for-login http://9.1.0.100/login.html Switch(config-params-parameter-map)# redirect portal ipv4 23.0.0.1 Switch(config-params-parameter-map)# end Switch# show running-config | section parameter-map parameter-map type webauth global virtual-ip ipv4 1.1.1.1 parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 23.0.0.1 security web-auth parameter-map rasagna-auth-map security web-auth parameter-map test Example: Assigning Login, Login Failure, and Logout Pages per WLAN This example shows how to assign login, login failure and logout pages per WLAN. Switch# configure terminal Switch(config)# parameter-map type webauth test Switch(config-params-parameter-map)# custom-page login device flash:loginsantosh.html Switch(config-params-parameter-map)# custom-page login expired device flash:loginexpire.html Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1666 Security Example: Configuring AAA-Override Switch(config-params-parameter-map)# custom-page failure device flash:loginfail.html Switch(config-params-parameter-map)# custom-page success device flash:loginsucess.html Switch(config-params-parameter-map)# end Switch# show running-config | section parameter-map type webauth test parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 23.0.0.1 custom-page login device flash:loginsantosh.html custom-page success device flash:loginsucess.html custom-page failure device flash:loginfail.html custom-page login expired device flash:loginexpire.html Example: Configuring AAA-Override This example shows how to configure aaa-override. Switch# configure terminal Switch(config)# wlan fff Switch(config-wlan)# aaa-override Switch(config-wlan)# end Switch# show running-config | section fff wlan fff 44 fff aaa-override shutdown Example: Configuring Client Load Balancing This example shows how to configure client load balancing. Switch# configure terminal Switch(config)# wlan fff Switch(config-wlan)# shutdown Switch(config-wlan)# mobility anchor 9.7.136.15 Switch(config-wlan)# mobility anchor 9.7.136.16 Switch(config-wlan)# no shutdown wlan Switch(config-wlan)# end Switch# show running-config | section fff wlan fff 44 fff aaa-override shutdown Example: Configuring Preauthentication ACL This example shows how to configure preauthentication ACL. Switch# configure terminal Switch(config)# wlan fff Switch(config-wlan)# shutdown Switch(config-wlan)# ip access-group web preauthrule Switch(config-wlan)# no shutdown Switch(config-wlan)# end Switch# show wlan name fff Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1667 Example: Configuring IOS ACL Definition Security Example: Configuring IOS ACL Definition This example shows how to configure IOS ACL definition. Switch# configure terminal Switch(config)# ip access-list extended 102 Switch(config-ext-nacl)# permit udp any eq 8080 any Switch(config-ext-nacl)# end Switch# show access-lists 102 Extended IP access list 102 10 permit udp any eq 8080 any Example: Configuring Webpassthrough This example shows how to configure webpassthrough. Switch# configure terminal Switch(config)# parameter-map type webauth webparalocal Switch(config-params-parameter-map)# type consent Switch(config-params-parameter-map)# end Switch# show running-config | section parameter-map type webauth test parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 23.0.0.1 Additional References for Guest Access Related Documents Related Topic Mobility CLI commands Document Title Mobility Command Reference, Cisco IOS XE 3SE (Cisco WLC 5700 Series) Mobility configuration Mobility Configuration Guide, Cisco IOS XE 3SE (Cisco WLC 5700 Series) Security CLI commands Security Command Reference, Cisco IOS Release 3SE (Cisco WLC 5700 Series) Configuring web-based authentication on the Security Configuration Guide, Cisco IOS Release 3SE (Cisco Catalyst 5700 Series Wireless Controller WLC 5700 Series) Wired guest access configuration and commands Identity Based Networking Services Standards and RFCs Standard/RFC Title None - Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1668 Security Feature History and Information for Guest Access MIBs MIB MIBs Link None To locate and download MIBs for selected platforms, Cisco software releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Guest Access Releases Cisco IOS XE Release 3.2SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1669 Feature History and Information for Guest Access Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1670 8 0 C H A P T E R Managing Rogue Devices · Finding Feature Information, on page 1671 · Information About Rogue Devices, on page 1671 · How to Configure Rogue Detection, on page 1674 · Monitoring Rogue Detection, on page 1676 · Examples: Rogue Detection Configuration, on page 1677 · Additional References for Rogue Detection, on page 1677 · Feature History and Information For Performing Rogue Detection Configuration, on page 1678 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Rogue Devices Rogue access points can disrupt wireless LAN operations by hijacking legitimate clients and using plain-text or other denial-of-service or man-in-the-middle attacks. That is, a hacker can use a rogue access point to capture sensitive information, such as usernames and passwords. The hacker can then transmit a series of Clear to Send (CTS) frames. This action mimics an access point, informing a particular client to transmit, and instructing all the other clients to wait, which results in legitimate clients being unable to access network resources. Wireless LAN service providers have a strong interest in banning rogue access points from the air space. Because rogue access points are inexpensive and readily available, employees sometimes plug unauthorized rogue access points into existing LANs and build ad hoc wireless networks without their IT department's knowledge or consent. These rogue access points can be a serious breach of network security because they can be plugged into a network port behind the corporate firewall. Because employees generally do not enable any security settings on the rogue access point, it is easy for unauthorized users to use the access point to intercept network traffic and hijack client sessions. Even more alarming, wireless users frequently publish unsecure access point locations, increasing the odds of having enterprise security breached. The following are some guidelines to manage rogue devices: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1671 Information About Rogue Devices Security · The containment frames are sent immediately after the authorization and associations are detected. The enhanced containment algorithm provides more effective containment of ad hoc clients. · · The are designed to serve associated clients. These access points spend relatively less time performing off-channel scanning: about 50 milliseconds on each channel. If you want to perform high rogue detection, a monitor mode access point must be used. Alternatively, you can reduce the scan intervals from 180 seconds to a lesser value, for example, 120 or 60 seconds, ensuring that the radio goes off-channel more frequently, which improves the chances of rogue detection. However, the access point will still spend about 50 milliseconds on each channel. · Rogue detection is disabled by default for OfficeExtend access points because these access points, which are deployed in a home environment, are likely to detect a large number of rogue devices. · Client card implementations might mitigate the effectiveness of ad hoc containment. · It is possible to classify and report rogue access points through the use of rogue states and user-defined classification rules that enable rogues to automatically move between states. · Each controller limits the number of rogue containments to three per radio (or six per radio for access points in the monitor mode). · Rogue Location Discovery Protocol (RLDP) detects rogue access points that are configured for open authentication. · RLDP detects rogue access points that use a broadcast Basic Service Set Identifier (BSSID), that is, the access point broadcasts its Service Set Identifier in beacons. · RLDP detects only those rogue access points that are on the same network. If an access list in the network prevents the sending of RLDP traffic from the rogue access point to the controller, RLDP does not work. · RLDP does not work on 5-GHz dynamic frequency selection (DFS) channels. However, RLDP works when the managed access point is in the monitor mode on a DFS channel. · If RLDP is enabled on mesh APs, and the APs perform RLDP tasks, the mesh APs are dissociated from the controller. The workaround is to disable RLDP on mesh APs. · If RLDP is enabled on nonmonitor APs, client connectivity outages occur when RLDP is in process. · If the rogue is manually contained, the rogue entry is retained even after the rogue expires. · If the rogue is contained by any other means, such as auto, rule, and AwIPS preventions, the rogue entry is deleted when it expires. · The controller will request to AAA server for rogue client validation only once. As a result, if rogue client validation fails on the first attempt then the rogue client will not be detected as a threat any more. To avoid this, add the valid client entries in the authentication server before enabling Validate Rogue Clients Against AAA. · In the 7.4 and earlier releases, if a rogue that was already classified by a rule was not reclassified. In the 7.5 release, this behavior is enhanced to allow reclassification of rogues based on the priority of the rogue rule. The priority is determined by using the rogue report that is received by the controller. · The rogue detector AP fails to co-relate and contain the wired rogue AP on a 5Mhz channel because the MAC address of the rogue AP for WLAN, LAN, 11a radio and 11bg radio are configured with a difference of +/-1 of the rogue BSSID. In the 8.0 release, this behavior is enhanced by increasing the range of MAC address, that the rogue detector AP co-relates the wired ARP MAC and rogue BSSID, by +/-3. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1672 Security Information About Rogue Devices Detecting Rogue Devices The controller continuously monitors all the nearby access points and automatically discovers and collects information on rogue access points and clients. When the controller discovers a rogue access point, it uses the Rogue Location Discovery Protocol (RLDP) and the rogue detector mode access point is connected to determine if the rogue is attached to your network. Controller initiates RLDP on rogue devices that have open authenticated and configured. If RLDP uses Flexconnect or local mode access points, then clients are disconnected for that moment. After the RLDP cycle, the clients are reconnected to the access points. As and when rogue access points are seen (auto-configuration), the RLDP process is initiated. You can configure the controller to use RLDP on all the access points or only on the access points configured for the monitor (listen-only) mode. The latter option facilitates automated rogue access point detection in a crowded radio frequency (RF) space, allowing monitoring without creating unnecessary interference and without affecting the regular data access point functionality. If you configure the controller to use RLDP on all the access points, the controller always chooses the monitor access point for RLDP operation if a monitor access point and a local (data) access point are both nearby. If RLDP determines that the rogue is on your network, you can choose to contain the detected rogue either manually or automatically. RLDP detects on wire presence of the rogue access points that are configured with open authentication only once, which is the default retry configuration. Retries can be configured using the config rogue ap rldp retries command. You can initiate or trigger RLDP from controller in three ways: 1. Enter the RLDP initiation command manually from the controller CLI. The equivalent GUI option for initiating RLDP is not supported. config rogue ap rldp initiate mac-address 2. Schedule RLDP from the controller CLI. The equivalent GUI option for scheduling RLDP is not supported. config rogue ap rldp schedule 3. Auto RLDP. You can configure auto RLDP on controller either from controller CLI or GUI but keep in mind the following guidelines: · The auto RLDP option can be configured only when the rogue detection security level is set to custom. · Either auto RLDP or schedule of RLDP can be enabled at a time. A rogue access point is moved to a contained state either automatically or manually. The controller selects the best available access point for containment and pushes the information to the access point. The access point stores the list of containments per radio. For auto containment, you can configure the controller to use only the monitor mode access point. The containment operation occurs in the following two ways: · The container access point goes through the list of containments periodically and sends unicast containment frames. For rogue access point containment, the frames are sent only if a rogue client is associated. · Whenever a contained rogue activity is detected, containment frames are transmitted. Individual rogue containment involves sending a sequence of unicast disassociation and deauthentication frames. Cisco Prime Infrastructure Interaction and Rogue Detection Cisco Prime Infrastructure supports rule-based classification and uses the classification rules configured on the controller. The controller sends traps to Cisco Prime Infrastructure after the following events: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1673 How to Configure Rogue Detection Security · If an unknown access point moves to the Friendly state for the first time, the controller sends a trap to Cisco Prime Infrastructure only if the rogue state is Alert. It does not send a trap if the rogue state is Internal or External. · If a rogue entry is removed after the timeout expires, the controller sends a trap to Cisco Prime Infrastructure for rogue access points categorized as Malicious (Alert, Threat) or Unclassified (Alert). The controller does not remove rogue entries with the following rogue states: Contained, Contained Pending, Internal, and External. How to Configure Rogue Detection Configuring Rogue Detection (CLI) SUMMARY STEPS 1. configure terminal 2. wireless wps rogue detection min-rssi rssi in dBm 3. wireless wps rogue detection min-transient-time time in seconds 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wireless wps rogue detection min-rssi rssi in dBm Example: Switch(config)# wireless wps rogue detection min-rssi 100 Purpose Enters global configuration mode. Specify the minimum RSSI value that rogues should have for APs to detect and for rogue entry to be created in the switch. Valid range for the rssi in dBm parameter is 128 dBm to -70 dBm, and the default value is -128 dBm. Note This feature is applicable to all the AP modes. There can be many rogues with very weak RSSI values that do not provide any valuable information in rogue analysis. Therefore, you can use this option to filter rogues by specifying the minimum RSSI value at which APs should detect rogues. Step 3 wireless wps rogue detection min-transient-time time in seconds Example: Switch(config)# wireless wps rogue detection min-transient-time Specify the time interval at which rogues have to be consistently scanned for by APs after the first time the rogues are scanned. Valid range for the time in sec parameter is 120 seconds to 1800 seconds, and the default value is 0. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1674 Security Configuring Rogue Detection (GUI) Command or Action Step 4 end Example: Switch(config)# end Configuring Rogue Detection (GUI) Purpose Note This feature is applicable to APs that are in monitor mode only. Using the transient interval values, you can control the time interval at which APs should scan for rogues. APs can also filter the rogues based on their transient interval values. This feature has the following advantages: · Rogue reports from APs to the controller are shorter · Transient rogue entries are avoided in the controller · Unnecessary memory allocation for transient rogues are avoided Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Step 1 Step 2 Step 3 Step 4 Step 5 Make sure that rogue detection is enabled on the corresponding access points. Rogue detection is enabled by default for all access points joined to the controller (except for OfficeExtend access points). However, you can enable or disable rogue detection for individual access point by choosing Configuration > Wireless > Access Policies > All APs to open Edit AP page, selecting or unselecting the Rogue Detector check box in the General area of the Edit AP page. Choose Configuration > Security > Wireless Protection Policies > Rogue Policies. The Rogue Policies page is displayed. Choose one of the following options from the Rogue Location Discovery Protocol drop-down list: · Disable--Disables RLDP on all the access points. This is the default value. · All APs--Enables RLDP on all the access points. · Monitor Mode APs--Enables RLDP only on the access points in the monitor mode. In the Expiration Timeout for Rogue AP and Rogue Client Entries text box, enter the number of seconds after which the rogue access point and client entries expire and are removed from the list. The valid range is 240 to 3600 seconds, and the default value is 1200 seconds. Note If a rogue access point or client entry times out, it is removed from the controller only if its rogue state is Alert or Threat for any classification type. To use the AAA server or local database to validate if rogue clients are valid clients, select the Validate Rogue Clients Against AAA check box. By default, the check box is unselected. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1675 Monitoring Rogue Detection Security Step 6 Step 7 Step 8 Step 9 Step 10 If necessary, select the Detect and Report Adhoc Networks check box to enable adhoc rogue detection and reporting. By default, the check box is selected. In the Rogue Detection Report Interval text box, enter the time interval, in seconds, at which APs should send the rogue detection report to the controller. The valid range is 10 seconds to 300 seconds, and the default value is 10 seconds. If you want the controller to automatically contain certain rogue devices, enable the following parameters. By default, these parameters are in disabled state. Caution When you select any of the Auto Contain parameters and click Apply, the following message is displayed: "Using this feature may have legal consequences. Do you want to continue?" The 2.4-GHz and 5-GHz frequencies in the Industrial, Scientific, and Medical (ISM) band are open to the public and can be used without a license. As such, containing devices on another party's network could have legal consequences. · Auto Containment Level--Set the auto containment level. By default, the auto containment level is set to 1. · Auto Containment only for Monitor mode APs--Configure the monitor mode access points for auto-containment. · Rogue on Wire--Configure the auto containment of rogues that are detected on the wired network. · Using Our SSID--Configure the auto containment of rogues that are advertising your network's SSID. If you leave this parameter unselected, the controller only generates an alarm when such a rogue is detected. · Valid Client on Rogue AP--Configure the auto containment of a rogue access point to which trusted clients are associated. If you leave this parameter unselected, the controller only generates an alarm when such a rogue is detected. · Adhoc Rogue AP--Configure the auto containment of adhoc networks detected by the controller. If you leave this parameter unselected, the controller only generates an alarm when such a network is detected. Click Apply. Click Save Configuration. Monitoring Rogue Detection This section describes the new command for rogue detection. The following command can be used to monitor rogue detection on the switch. Table 145: Monitoring Rogue Detection Command Command show wireless wps rogue ap summary show wireless wps rogue client detailed client-mac Purpose Displays a list of all rogue access points detected by the switch. Displays detailed information for a specific rogue client. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1676 Security Examples: Rogue Detection Configuration Examples: Rogue Detection Configuration This example shows how to configure the minimum RSSI that a detected rogue AP needs to be at, to have an entry created at the switch: Switch# configure terminal Switch(config)# wireless wps rogue detection min-rssi -100 Switch(config)# end Switch# show wireless wps rogue client detailed/show wireless wps rogue ap summary This example shows how to configure the classification interval: Switch# configure terminal Switch(config)# wireless wps rogue detection min-transient-time 500 Switch(config)# end Switch# show wireless wps rogue client detailed/show wireless wps rogue ap summary Additional References for Rogue Detection Related Documents Related Topic Security commands Document Title Security Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1677 Feature History and Information For Performing Rogue Detection Configuration Security Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For Performing Rogue Detection Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1678 8 1 C H A P T E R Classifying Rogue Access Points · Finding Feature Information, on page 1679 · Information About Classifying Rogue Access Points, on page 1679 · Restrictions for Classifying Rogue Access Points, on page 1682 · How to Classify Rogue Access Points, on page 1683 · Viewing and Classifying Rogue Devices (GUI) , on page 1688 · Examples: Classifying Rogue Access Points, on page 1690 · Additional References for Classifying Rogue Access Points, on page 1690 · Feature History and Information For Classifying Rogue Access Points, on page 1691 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Classifying Rogue Access Points The controller software enables you to create rules that can organize and display rogue access points as Friendly, Malicious, or Unclassified. By default, none of the classification rules are enabled. Therefore, all unknown access points are categorized as Unclassified. When you create a rule, configure conditions for it, and enable the rule, the unclassified access points are reclassified. Whenever you change a rule, it is applied to all access points (friendly, malicious, and unclassified) in the Alert state only. Note Rule-based rogue classification does not apply to ad hoc rogues and rogue clients. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1679 Information About Classifying Rogue Access Points Security Note You can configure up to 64 rogue classification rules per controller. When the controller receives a rogue report from one of its managed access points, it responds as follows: 1. The controller verifies that the unknown access point is in the friendly MAC address list. If it is, the controller classifies the access point as Friendly. 2. If the unknown access point is not in the friendly MAC address list, the controller starts applying rogue classification rules. 3. If the rogue is already classified as Malicious, Alert or Friendly, Internal or External, the controller does not reclassify it automatically. If the rogue is classified differently, the controller reclassifies it automatically only if the rogue is in the Alert state. 4. The controller applies the first rule based on priority. If the rogue access point matches the criteria specified by the rule, the controller classifies the rogue according to the classification type configured for the rule. 5. If the rogue access point does not match any of the configured rules, the controller classifies the rogue as Unclassified. 6. The controller repeats the previous steps for all rogue access points. 7. If RLDP determines that the rogue access point is on the network, the controller marks the rogue state as Threat and classifies it as Malicious automatically, even if no rules are configured. You can then manually contain the rogue (unless you have configured RLDP to automatically contain the rogue), which would change the rogue state to Contained. If the rogue access point is not on the network, the controller marks the rogue state as Alert, and you can manually contain the rogue. 8. If desired, you can manually move the access point to a different classification type and rogue state. Table 146: Classification Mapping Rule-Based Rogue States Classification Type Friendly · Internal--If the unknown access point is inside the network and poses no threat to WLAN security, you would manually configure it as Friendly, Internal. An example is the access points in your lab network. · External--If the unknown access point is outside the network and poses no threat to WLAN security, you would manually configure it as Friendly, External. An example is an access point that belongs to a neighboring coffee shop. · Alert--The unknown access point is moved to Alert if it is not in the neighbor list or in the user-configured friendly MAC list. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1680 Security Information About Classifying Rogue Access Points Rule-Based Rogue States Classification Type Malicious · Alert--The unknown access point is moved to Alert if it is not in the neighbor list or in the user-configured friendly MAC list. · Threat--The unknown access point is found to be on the network and poses a threat to WLAN security. · Contained--The unknown access point is contained. · Contained Pending--The unknown access point is marked Contained, but the action is delayed due to unavailable resources. Unclassified · Pending--On first detection, the unknown access point is put in the Pending state for 3 minutes. During this time, the managed access points determine if the unknown access point is a neighbor access point. · Alert--The unknown access point is moved to Alert if it is not in the neighbor list or in the user-configured friendly MAC list. · Contained--The unknown access point is contained. · Contained Pending--The unknown access point is marked Contained, but the action is delayed due to unavailable resources. The classification and state of the rogue access points are configured as follows: · From Known to Friendly, Internal · From Acknowledged to Friendly, External · From Contained to Malicious, Contained As mentioned previously, the controller can automatically change the classification type and rogue state of an unknown access point based on user-defined rules, or you can manually move the unknown access point to a different classification type and rogue state. Table 147: Allowable Classification Type and Rogue State Transitions From To Friendly (Internal, External, Alert) Malicious (Alert) Friendly (Internal, External, Alert) Unclassified (Alert) Friendly (Alert) Friendly (Internal, External) Malicious (Alert, Threat) Friendly (Internal, External) Malicious (Contained, Contained Pending) Malicious (Alert) Unclassified (Alert, Threat) Friendly (Internal, External) Unclassified (Contained, Contained Pending) Unclassified (Alert) Unclassified (Alert) Malicious (Alert) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1681 Restrictions for Classifying Rogue Access Points Security If the rogue state is Contained, you have to uncontain the rogue access point before you can change the classification type. If you want to move a rogue access point from Malicious to Unclassified, you must delete the access point and allow the controller to reclassify it. Restrictions for Classifying Rogue Access Points The following rules apply to this feature: · Classifying Custom type rogues is tied to rogue rules. Therefore, it is not possible to manually classify a rogue as Custom. Custom class change can occur only using rogue rules. · There are traps that are sent for containment by rule and for every 30 minutes for rogue classification change. For custom classification, the first trap does not contain the severity score because the trap has existed before the custom classification. The severity score is obtained from the subsequent trap that is generated after 30 minutes if the rogue is classified. · Rogue rules are applied on every incoming new rogue report in the controller in the order of their priority. · Once a rogue satisfies a higher priority rule and classified, it does not move down the priority list for the same report. · Previously classified rogue gets re-classified on every new rogue report with the following restrictions: · Rogues which are classified as friendly by rule and whose state is set to ALERT, go through re-classification on receiving the new rogue report. · If a rogue is classified as friendly by the administrator manually, then the state is INTERNAL and it does not get re-classified on successive rogue reports. · If rogue is classified as malicious, irrespective of the state it does not get re-classified on subsequent rogue reports. · Transition of the rogue's state from friendly to malicious is possible by multiple rogue rules if some attribute is missing in new rogue report. · Transition of the rogue's state from malicious to any other classification is not possible by any rogue rule. · When service set identifiers (SSIDs) are defined as part of a rogue rule, and details of the rogue rule are displayed using the show wireless wps rogue rule detailed command, the output differs in Cisco IOS XE Release 3.6E and prior releases and Cisco IOS XE Denali 16.1.1 and later releases. The following is sample output from the show wireless wps rogue rule detailed command in Cisco IOS XE Release 3.6E and prior releases: Switch# show wireless wps rogue rule detailed test Priority Rule Name State Type Match Operation Hit Count Total Conditions Condition : type SSID Count :1 : wpstest : Disabled : Pending : Any :0 :1 : Ssid : 2 ! SSID count differs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1682 Security How to Classify Rogue Access Points SSID 1 SSID 2 : ssid1 : ssid2 The following is sample output from the show wireless wps rogue rule detailed command in Cisco IOS XE Denali 16.1.1 and later releases: Switch# show wireless wps rogue rule detailed test Priority Rule Name State Type Match Operation Hit Count Total Conditions Condition : type SSID Count SSID SSID :1 : wpstest : Disabled : Pending : Any :0 :1 : Ssid : 2 ! SSID count differs. : ssid1 : ssid2 How to Classify Rogue Access Points Configuring Rogue Classification Rules (CLI) SUMMARY STEPS 1. configure terminal 2. wireless wps rogue rule rule-name priority priority 3. classify {friendly | malicious} 4. condition {client-count | duration | encryption | infrastructure | rssi | ssid} 5. match {all | any} 6. default 7. exit 8. shutdown 9. end 10. configure terminal 11. wireless wps rogue rule shutdown 12. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1683 Configuring Rogue Classification Rules (CLI) Security Step 2 Step 3 Step 4 Command or Action wireless wps rogue rule rule-name priority priority Example: Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)# Purpose Creates or enables a rule. While creating a rule, you must enter priority for the rule. Note After creating the rule, if you are editing the rule, you can change the priority only for the rogue rules that are disabled. You cannot change priority for the rogue rules that are enabled. While editing, changing the priority for a rogue rule is optional. classify {friendly | malicious} Example: Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)# classify friendly Classifies a rule. condition {client-count | duration | encryption | infrastructure | rssi | ssid} Example: Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)# condition client-count 5 Specifies to add the following conditions to a rule that the rogue access point must meet. · client-count--Requires that a minimum number of clients be associated to the rogue access point. For example, if the number of clients associated to the rogue access point is greater than or equal to the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum number of clients to be associated to the rogue access point for the condition_value parameter. The valid range is 1 to 10 (inclusive), and the default value is 0. · duration--Requires that the rogue access point be detected for a minimum period of time. If you choose this option, enter a value for the minimum detection period for the condition_value parameter. The valid range is 0 to 3600 seconds (inclusive), and the default value is 0 seconds. · encryption--Requires that the advertised WLAN does not have encryption enabled. · infrastructure--Requires the SSID to be known to the controller. · rssi--Requires that the rogue access point have a minimum RSSI value. For example, if the rogue access point has an RSSI that is greater than the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum RSSI value for the condition_value parameter. The valid range is 95 to 50 dBm (inclusive), and the default value is 0 dBm. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1684 Security Configuring Rogue Classification Rules (CLI) Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action Purpose · ssid--Requires that the rogue access point have a specific SSID. You should add SSIDs that are not managed by the controller. If you choose this option, enter the SSID for the condition_value parameter. The SSID is added to the user-configured SSID list. match {all | any} Example: Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)# match all Specifies whether a detected rogue access point must meet all or any of the conditions specified by the rule in order for the rule to be matched and the rogue access point to adopt the classification type of the rule. default Example: Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)# default Specifies to set a command to its default. exit Example: Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)# exit Switch(config)# Specifies to exit the sub-mode. shutdown Example: Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)# shutdown Specifies to disable a particular rogue rule. For example, the rule rule_3 is disabled. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. configure terminal Example: Switch# configure terminal Enters global configuration mode. wireless wps rogue rule shutdown Specifies to disable all the rogue rules. Example: Switch(config)# wireless wps rogue rule shutdown end Example: Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1685 Configuring Rogue Classification Rules (GUI) Security Command or Action Switch(config)# end Purpose Configuring Rogue Classification Rules (GUI) Step 1 Step 2 Step 3 Choose Security > Wireless Protection Policies > Rogue Policies > Rogue Rules to open the Rogue Rules page. Any rules that have already been created are listed in priority order. The name, type, and status of each rule is provided. Note If you ever want to delete a rule, hover your mouse cursor over the blue drop-down arrow for that rule and click Remove. Create a new rule as follows: a) Click Add Rule. An Add Rule section appears at the top of the page. b) In the Rule Name text box, enter a name for the new rule. Ensure that the name does not contain any spaces. c) From the Rule Type drop-down list, choose from the following options to classify rogue access points matching this rule as friendly or malicious: · Friendly · Malicious d) Click Add to add this rule to the list of existing rules, or click Cancel to discard this new rule. Edit a rule as follows: a) Click the name of the rule that you want to edit. The Rogue Rule > Edit page appears. b) From the Type drop-down list, choose from the following options to classify rogue access points matching this rule: · Friendly · Malicious c) From the Match Operation text box, choose one of the following: All--If this rule is enabled, a detected rogue access point must meet all of the conditions specified by the rule in order for the rule to be matched and the rogue to adopt the classification type of the rule. Any--If this rule is enabled, a detected rogue access point must meet any of the conditions specified by the rule in order for the rule to be matched and the rogue to adopt the classification type of the rule. This is the default value. d) To enable this rule, select the Enable Rule check box. The default value is unselected. e) To disable this particular rule, unselect the Enable Rule check box. Note You cannot disable all the rogue rule in one shot from GUI but you can disable all the rogue rules from CLI using the wireless wps rogue rule shutdown command. f) From the Add Condition drop-down list, choose one or more of the following conditions that the rogue access point must meet and click Add Condition. · SSID--Requires that the rogue access point have a specific user-configured SSID. If you choose this option, enter the SSID in the User Configured SSID text box, and click Add SSID. The user-configured SSIDs are added and listed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1686 Security Configuring Rogue Classification Rules (GUI) Step 4 Note To delete an SSID, highlight the SSID and click Remove. The SSID applied on a WLAN cannot be applied for the rogue rule. · RSSI--Requires that the rogue access point have a minimum Received Signal Strength Indication (RSSI) value. For example, if the rogue access point has an RSSI that is greater than the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum RSSI value in the Minimum RSSI text box. The valid range is 95 to 50 dBm (inclusive), and the default value is 0 dBm. · Duration--Requires that the rogue access point be detected for a minimum period of time. If you choose this option, enter a value for the minimum detection period in the Time Duration text box. The valid range is 0 to 3600 seconds (inclusive), and the default value is 0 seconds. · Client Count--Requires that a minimum number of clients be associated to the rogue access point. For example, if the number of clients associated to the rogue access point is greater than or equal to the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum number of clients to be associated to the rogue access point in the Minimum Number of Rogue Clients text box. The valid range is 1 to 10 (inclusive), and the default value is 0. · No Encryption--Requires that the rogue access point's advertised WLAN does not have encryption enabled. If a rogue access point has encryption disabled, it is likely that more clients will try to associate to it. No further configuration is required for this option. Note Cisco Prime Infrastructure refers to this option as "Open Authentication." · Managed SSID--Requires that the rogue access point's managed SSID (the SSID configured for the WLAN) be known to the controller. No further configuration is required for this option. Note The SSID and Managed SSID conditions cannot be used with the All operation because these two SSID lists are mutually exclusive. If you define a rule with Match All and have these two conditions configured, the rogue access points are never classified as friendly or malicious because one of the conditions can never be met. You can add up to six conditions per rule. When you add a condition, it appears under the Conditions section. Note If you ever want to delete a condition from this rule, click Remove near the condition. · User configured SSID--Requires that the rogue access point have a substring of the specific user-configured SSID. The controller searches the substring in the same occurrence pattern and returns a match if the substring is found in the whole string of an SSID. g) Click Apply. If you want to change the priority in which rogue classification rules are applied, follow these steps: a. Click Change Priority to access the Rogue Rules > Priority page. The rogue rules are listed in priority order in the Change Rules Priority text box. b. Click on a specific rule for which you want to change the priority, and click Up to raise its priority in the list or Down to lower its priority in the list. Note You can change priority only for the disabled rule. You cannot change priority only for the enabled rule. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1687 Viewing and Classifying Rogue Devices (GUI) c. Click Apply. Security Viewing and Classifying Rogue Devices (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Choose Monitor > Rogues. Choose the following options to view the different types of rogue access points detected by the controller: · Friendly APs · Malicious APs · Unclassified APs The respective rogue APs pages provide the following information: the MAC address of the rogue access point, the number of radios that detected the rogue access point, the number of clients connected to the rogue access point, the current status of the rogue access point, and last heard. Get more details about a rogue access point by clicking the MAC address of the access point. The Rogue AP Detail page appears. This page provides the following information: the MAC address of the rogue device, the type of rogue device (such as an access point), whether the rogue device is on the wired network, the dates and times when the rogue device was first and last reported, and the current status of the device. The Class Type text box shows the current classification for this rogue access point: · Friendly--An unknown access point that matches the user-defined friendly rules or an existing known and acknowledged rogue access point. Friendly access points cannot be contained. · Malicious--An unknown access point that matches the user-defined malicious rules or is moved manually by the user from the Friendly or Unclassified classification type. Note Once an access point is classified as Malicious, you cannot apply rules to it in the future, and it cannot be moved to another classification type. If you want to move a malicious access point to the Unclassified classification type, you must delete the access point and allow the controller to reclassify it. · Unclassified--An unknown access point that does not match the user-defined friendly or malicious rules. An unclassified access point can be contained. It can also be moved to the Friendly or Malicious classification type automatically in accordance with user-defined rules or manually by the user. If you want to change the classification of this device, choose a different classification from the Class Type drop-down list. Note A rogue access point cannot be moved to another class if its current state is Contain. From the Update Status drop-down list, choose one of the following options to specify how the controller should respond to this rogue access point: · Internal--The controller trusts this rogue access point. This option is available if the Class Type is set to Friendly. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1688 Security Viewing and Classifying Rogue Devices (GUI) Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 · External--The controller acknowledges the presence of this rogue access point. This option is available if the Class Type is set to Friendly. · Contain--The controller contains the offending device so that its signals no longer interfere with authorized clients. This option is available if the Class Type is set to Malicious or Unclassified. · Alert--The controller forwards an immediate alert to the system administrator for further action. This option is available if the Class Type is set to Malicious or Unclassified. The bottom of the page provides information on both the access points that detected this rogue access point and any clients that are associated to it. To see more details for any of the clients, click Edit to open the Rogue Client Detail page. Click Apply. Click Save Configuration. See any adhoc rogues detected by the controller by choosing Adhoc Rogues. The Adhoc Rogues page appears. This page shows the following information: the MAC address, BSSID, and SSID of the adhoc rogue, the number of radios that detected the adhoc rogue, and the current status of the adhoc rogue. Obtain more details about an adhoc rogue by clicking the MAC address of the rogue. The Adhoc Rogue Detail page appears. This page provides the following information: the MAC address and BSSID of the adhoc rogue, the dates and times when the rogue was first and last reported, and the current status of the rogue. From the Update Status drop-down list, choose one of the following options to specify how the controller should respond to this adhoc rogue: · Contain--The controller contains the offending device so that its signals no longer interfere with authorized clients. · Alert--The controller forwards an immediate alert to the system administrator for further action. · Internal--The controller trusts this rogue access point. · External--The controller acknowledges the presence of this rogue access point. From the Maximum Number of APs to Contain the Rogue drop-down list, choose one of the following options to specify the maximum number of access points used to contain this adhoc rogue: 1, 2, 3, or 4. The bottom of the page provides information on the access points that detected this adhoc rogue. Click Apply. Click Save Configuration. View any access points that have been configured to be ignored by choosing Rogue AP Ignore-List. The Rogue AP Ignore-List page appears. This page shows the MAC addresses of any access points that are configured to be ignored. The rogue-ignore list contains a list of any autonomous access points that have been manually added to Cisco Prime Infrastructure maps by the users. The controller regards these autonomous access points as rogues even though the Prime Infrastructure is managing them. The rogue-ignore list allows the controller to ignore these access points. The list is updated as follows: · When the controller receives a rogue report, it checks to see if the unknown access point is in the rogue-ignore access point list. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1689 Examples: Classifying Rogue Access Points Security · If the unknown access point is in the rogue-ignore list, the controller ignores this access point and continues to process other rogue access points. · If the unknown access point is not in the rogue-ignore list, the controller sends a trap to the Prime Infrastructure. If the Prime Infrastructure finds this access point in its autonomous access point list, the Prime Infrastructure sends a command to the controller to add this access point to the rogue-ignore list. This access point is then ignored in future rogue reports. · If a user removes an autonomous access point from the Prime Infrastructure, the Prime Infrastructure sends a command to the controller to remove this access point from the rogue-ignore list. Examples: Classifying Rogue Access Points This example shows how to create rule that can organize and display rogue access points as Friendly: Switch# configure terminal Switch(config)# wireless wps rogue rule ap1 priority 1 Switch(config-rule)# classify friendly Switch(config-rule)# end This example shows how to apply condition that the rogue access point must meet: Switch# configure terminal Switch(config)# wireless wps rogue rule ap1 priority 1 Switch(config-rule)# condition client-count 5 Switch(config-rule)# condition duration 1000 Switch(config-rule)# end Additional References for Classifying Rogue Access Points Related Documents Related Topic Document Title Security commands Security Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1690 Security Feature History and Information For Classifying Rogue Access Points MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For Classifying Rogue Access Points Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1691 Feature History and Information For Classifying Rogue Access Points Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1692 8 2 C H A P T E R Configuring wIPS · Finding Feature Information, on page 1693 · Information About wIPS, on page 1693 · How to Configure wIPS on an Access Point, on page 1700 · Monitoring wIPS Information, on page 1701 · Examples: wIPS Configuration, on page 1701 · Additional References for Configuring wIPS, on page 1702 · Feature History for Performing wIPS Configuration, on page 1702 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About wIPS The Cisco Adaptive wireless Intrusion Prevention System (wIPS) is an advanced approach to wireless threat detection and performance management. It combines network traffic analysis, network device and topology information, signature-based techniques, and anomaly detection to deliver highly accurate and complete wireless threat prevention. With a fully infrastructure-integrated solution, you can continually monitor wireless traffic on both the wired and wireless networks and use that network intelligence to analyze attacks from many sources to more accurately pinpoint and proactively prevent attacks rather than waiting until damage or exposure has occurred. The Cisco Adaptive wIPS is enabled by the Cisco 3300 Series Mobility Services Engine (MSE), which centralizes the processing of intelligence collected by the continuous monitoring of Cisco Aironet access points. With Cisco Adaptive wIPS functionalities and Cisco Prime Infrastructure integration into the MSE, the wIPS service can configure, monitor, and report wIPS policies and alarms. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1693 Information About wIPS Security Note If your wIPS deployment consists of a controller, access point, and MSE, you must set all the three entities to the UTC time zone. The Cisco Adaptive wIPS is not configured on the controller. Instead, the Prime Infrastructure forwards the profile configuration to the wIPS service, which forwards the profile to the controller. The profile is stored in flash memory on the controller and sent to access points when they join the controller. When an access point disassociates and joins another controller, it receives the wIPS profile from the new controller. Local mode access points with a subset of wIPS capabilities is referred to as Enhanced Local Mode access point or ELM AP. You can configure an access point to work in wIPS mode if the access point is in any of the following modes: · Monitor · Local The regular local mode access point is extended with a subset of Wireless Intrusion Prevention System (wIPS) capabilities. This feature enables you to deploy your access points to provide protection without needing a separate overlay network. wIPS ELM has limited capability of detecting off-channel alarms. The access point periodically goes off-channel, and monitors the non-serving channels for a short duration, and triggers alarms if any attack is detected on the channel. But the off-channel alarm detection is best effort and it takes longer time to detect attacks and trigger alarms, which might cause the ELM AP intermittently detect an alarm and clear it because it is not visible. Access points in any of the above modes can periodically send alarms based on the policy profile to the wIPS service through the controller. The wIPS service stores and processes the alarms and generates SNMP traps. The Prime Infrastructure configures its IP address as a trap destination to receive SNMP traps from the MSE. This table lists all the SNMP trap controls and their respective traps. When a trap control is enabled, all the traps of the trap control are also enabled. Note The controller uses only SNMPv2 for SNMP trap transmission. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1694 Security Information About wIPS Table 148: SNMP Trap Controls and their respective Traps Tab Name General Trap Control Link (Port) Up/Down Spanning Tree Config Save AP Client Traps AP Register Ap Interface Up/Down 802.11 Association 802.11 Disassociation 802.11 Deauthentication 802.11 Failed Authentication 802.11 Failed Association Exclusion NAC Alert Trap linkUp, linkDown newRoot, topologyChange, stpInstanceNewRootTrap, stpInstanceTopologyChangeTrap bsnDot11EssCreated, bsnDot11EssDeleted, bsnConfigSaved, ciscoLwappScheduledResetNotif, ciscoLwappClearResetNotif, ciscoLwappResetFailedNotif, ciscoLwappSysInvalidXmlConfig bsnAPDisassociated, bsnAPAssociated bsnAPIfUp, bsnAPIfDown bsnDot11StationAssociate bsnDot11StationDisassociate bsnDot11StationDeauthenticate bsnDot11StationAuthenticateFail bsnDot11StationAssociateFail bsnDot11StationBlacklisted cldcClientWlanProfileName, cldcClientIPAddress, cldcApMacAddress, cldcClientQuarantineVLAN, cldcClientAccessVLAN Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1695 Information About wIPS Tab Name Security Traps Auto RF Profile Traps Auto RF Update Traps Security Trap Control Trap User Authentication bsnTooManyUnsuccessLoginAttempts, cLWAGuestUserLoggedIn, cLWAGuestUserLoggedOut RADIUS Servers Not Responding bsnRADIUSServerNotResponding, ciscoLwappAAARadiusReqTimedOut WEP Decrypt Error bsnWepKeyDecryptError Rogue AP bsnAdhocRogueAutoContained, bsnRogueApAutoContained, bsnTrustedApHasInvalidEncryption, bsnMaxRogueCountExceeded, bsnMaxRogueCountClear, bsnApMaxRogueCountExceeded, bsnApMaxRogueCountClear, bsnTrustedApHasInvalidRadioPolicy, bsnTrustedApHasInvalidSsid, bsnTrustedApIsMissing SNMP Authentication agentSnmpAuthenticationTrapFlag Multiple Users multipleUsersTrap Load Profile bsnAPLoadProfileFailed Noise Profile bsnAPNoiseProfileFailed Interference Profile bsnAPInterferenceProfileFailed Coverage Profile bsnAPCoverageProfileFailed Channel Update bsnAPCurrentChannelChanged Tx Power Update bsnAPCurrentTxPowerChanged Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1696 Security Information About wIPS Tab Name Mesh Traps Trap Control Child Excluded Parent Parent Change Authfailure Mesh Child Moved Excessive Parent Change Excessive Children Poor SNR Console Login Excessive Association Default Bridge Group Name Trap ciscoLwappMeshChildExcludedParent ciscoLwappMeshParentChange ciscoLwappMeshAuthorizationFailure ciscoLwappMeshChildMoved ciscoLwappMeshExcessiveParentChange ciscoLwappMeshExcessiveChildren ciscoLwappMeshAbateSNR, ciscoLwappMeshOnsetSNR ciscoLwappMeshConsoleLogin ciscoLwappMeshExcessiveAssociation ciscoLwappMeshDefaultBridgeGroupName The following are the trap description for the traps mentioned in the SNMP Trap Controls and their respective Traps table: · General Traps · SNMP Authentication--The SNMPv2 entity has received a protocol message that is not properly authenticated. Note When a user who is configured in SNMP V3 mode tries to access the controller with an incorrect password, the authentication fails and a failure message is displayed. However, no trap logs are generated for the authentication failure. · Link (Port) Up/Down--Link changes status from up or down. · Link (Port) Up/Down--Link changes status from up or down. · Multiple Users--Two users log on with the same ID. · Rogue AP--Whenever a rogue access point is detected, this trap is sent with its MAC address; when a rogue access point that was detected earlier no longer exists, this trap is sent. · Config Save--Notification sent when the controller configuration is modified. · Cisco AP Traps · AP Register--Notification sent when an access point associates or disassociates with the controller. · AP Interface Up/Down--Notification sent when an access point interface (802.11X) status goes up or down. · Client Related Traps · 802.11 Association--Associate notification that is sent when the client sends an association frame. · 802.11 Disassociation--Disassociate notification that is sent when the client sends a disassociation frame. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1697 Information About wIPS Security · 802.11 Deauthentication--Deauthenticate notification that is sent when the client sends a deauthentication frame. · 802.11 Failed Authentication--Authenticate failure notification that is sent when the client sends an authentication frame with a status code other than successful. · 802.11 Failed Association--Associate failure notification that is sent when the client sends an association frame with a status code other than successful. · Exclusion--Associate failure notification that is sent when a client is Exclusion Listed (blacklisted). · Authentication--Authentication notification that is sent when a client is successfully authenticated. · Max Clients Limit Reached--Notification that is sent when the maximum number of clients, defined in the Threshold field, have associated with the controller. · NAC Alert--Alert that is sent when a client joins an SNMP NAC-enabled WLAN. This notification is generated when a client on NAC-enabled SSIDs complete Layer2 authentication to inform about the client's presence to the NAC appliance. cldcClientWlanProfileName represents the profile name of the WLAN that the 802.11 wireless client is connected to. cldcClientIPAddress represents the unique IP address of the client. cldcApMacAddress represents the MAC address of the AP to which the client is associated. cldcClientQuarantineVLAN represents the quarantine VLAN for the client. cldcClientAccessVLAN represents the access VLAN for the client. · Association with Stats--Associate notification that is sent with data statistics when a client associates with the controller or roams. The data statistics include transmitted and received bytes and packets. · Disassociation with Stats--Disassociate notification that is sent with data statistics when a client disassociates from the controller. The data statistics include transmitted and received bytes and packets, SSID, and session ID. Note When you downgrade to Release 7.4 from a higher release, if a trap that was not supported in Release 7.4 (for example, NAC Alert trap) is enabled before the downgrade, all traps are disabled. After the downgrade, you must enable all the traps that were enabled before the downgrade. We recommend that you disable the new traps before the downgrade so that all the other traps are not disabled. · Security Traps · User Auth Failure--This trap is to inform that a client RADIUS Authentication failure has occurred. · RADIUS Server No Response--This trap is to indicate that no RADIUS server(s) are responding to authentication requests sent by the RADIUS client. · WEP Decrypt Error--Notification sent when the controller detects a WEP decrypting error. · Rouge AP--Whenever a rogue access point is detected, this trap is sent with its MAC address; when a rogue access point that was detected earlier no longer exists, this trap is sent. · SNMP Authentication--The SNMPv2 entity has received a protocol message that is not properly authenticated. Note When a user who is configured in SNMP V3 mode tries to access the controller with an incorrect password, the authentication fails and a failure message is displayed. However, no trap logs are generated for the authentication failure. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1698 Security Information About wIPS · Multiple Users--Two users log on with the same ID. · SNMP Authentication · Load Profile--Notification sent when the Load Profile state changes between PASS and FAIL. · Noise Profile--Notification sent when the Noise Profile state changes between PASS and FAIL. · Interference Profile--Notification sent when the Interference Profile state changes between PASS and FAIL. · Coverage Profile--Notification sent when the Coverage Profile state changes between PASS and FAIL. · Auto RF Profile Traps · Load Profile--Notification sent when the Load Profile state changes between PASS and FAIL. · Noise Profile--Notification sent when the Noise Profile state changes between PASS and FAIL. · Interference Profile--Notification sent when the Interference Profile state changes between PASS and FAIL. · Coverage Profile--Notification sent when the Coverage Profile state changes between PASS and FAIL. · Auto RF Update Traps · Channel Update--Notification sent when the access point dynamic channel algorithm is updated. · Tx Power Update--Notification sent when the access point dynamic transmit power algorithm is updated. · Mesh Traps · Child Excluded Parent--Notification send when a defined number of failed association to the controller occurs through a parent mesh node. · Notification sent when a child mesh node exceeds the threshold limit of the number of discovery response timeouts. The child mesh node does not try to associate an excluded parent mesh node for the interval defined. The child mesh node remembers the excluded parent MAC address when it joins the network, it informs the controller. · Parent Change--Notification is sent by the agent when a child mesh node changes its parent. The child mesh node remembers its previous parent and it informs the controller about the change of its parent when it rejoins the network. · Child Moved--Notification sent when a parent mesh node loses connection with its child mesh node. · Excessive Parent Change--Notification sent when the child mesh node changes its parent frequently. Each mesh node keeps a count of the number of parent changes in a fixed time. If it exceeds the defined threshold then child mesh node informs the controller. · Excessive Children--Notification sent when the child count exceeds for a RAP and MAP. · Poor SNR--Notification sent when the child mesh node detects a lower SNR on a backhaul link. For the other trap, a notification is sent to clear a notification when the child mesh node detects an SNR on a backhaul link that is higher then the object defined by 'clMeshSNRThresholdAbate'. · Console Login--Notification is sent by the agent when login on MAP console is successful or failure after three attempts. · Default Bridge Group Name--Notification sent when MAP mesh node joins parent using 'default' bridge group name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1699 How to Configure wIPS on an Access Point Security Note The remaining traps do not have trap controls. These traps are not generated too frequently and do not require any trap control. Any other trap that is generated by the controller cannot be turned off. Note In all of the above cases, the controller functions solely as a forwarding device. Note To download the MIBs, click here. How to Configure wIPS on an Access Point Configuring wIPS on an Access Point (CLI) SUMMARY STEPS 1. ap name name mode submode wips 2. end 3. show wireless wps wips summary 4. show wireless wps wips statistics DETAILED STEPS Step 1 Command or Action ap name name mode submode wips Example: Switch# ap name ap1 mode local wips Step 2 end Example: Switch(config)# end Step 3 show wireless wps wips summary Example: Switch# show wireless wps wips summary Step 4 show wireless wps wips statistics Example: Switch# show wireless wps wips statistics Purpose Configure an access point for local or monitor mode and then set the submode to wIPS. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. View the wIPS configuration on the access point. View the current state of wIPS configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1700 Security Configuring wIPS on an Access Point (GUI) Configuring wIPS on an Access Point (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Access Points > All APs. The All APs page appears with a list of all access points that are associated with the switch. Click the name of the access point for which you want to configure wIPS. The AP > Edit page appears. In the General area, set the AP Mode parameter. To configure an access point for wIPS, you must choose one of the following modes from the AP Mode drop-down list: · Local · Monitor Set the AP Sub Mode to wIPS by choosing wIPS from the AP Sub Mode drop-down list. Click Apply. Click Save. Monitoring wIPS Information This section describes the new command for wIPS. The following command can be used to monitor wIPS configured on the access point. Table 149: Monitoring wIPS Command Command Purpose show wireless wps wips summary Displays the wIPS configuration on the access point. show wireless wps wips statistics Displays the current state of wIPS configuration. Examples: wIPS Configuration This example shows how to configure wIPS on AP1: Switch# ap name ap1 mode local submode wips Switch# end Switch# show wireless wps wips summary Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1701 Additional References for Configuring wIPS Security Additional References for Configuring wIPS Related Documents Related Topic Document Title System management commands Security Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History for Performing wIPS Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1702 8 3 C H A P T E R Configuring Intrusion Detection System · Finding Feature Information, on page 1703 · Information About Intrusion Detection System, on page 1703 · How to Configure Intrusion Detection System, on page 1704 · Monitoring Intrusion Detection System, on page 1705 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the <TBD> Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Intrusion Detection System The Cisco Intrusion Detection System/Intrusion Prevention System (CIDS/CIPS) instructs switches to block certain clients from accessing the wireless network when attacks involving these clients are detected at Layer 3 through Layer 7. This system offers significant network protection by helping to detect, classify, and stop threats including worms, spyware/adware, network viruses, and application abuse. Two methods are available to detect potential attacks: · IDS sensors · IDS signatures IDS sensors can be configured to detect various types of IP-level attacks in the network. When the sensors identify an attack, they can alert the switch to shun the offending client. When a new IDS sensor is added, the IDS sensor should be registered with the switch so that the switch can query the sensor to get the list of shunned clients. When an IDS sensor detects a suspicious client, it alerts the switch to shun this client. The shun entry is distributed to all switches within the same mobility group. If the client to be shunned is currently joined to a switch in this mobility group, the anchor switch adds this client to the dynamic exclusion list, and the foreign Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1703 How to Configure Intrusion Detection System Security switch removes the client. The next time that the client tries to connect to a switch, the anchor switch rejects the handoff and informs the foreign switch that the client is being excluded. How to Configure Intrusion Detection System Configuring IDS Sensors SUMMARY STEPS 1. configure terminal 2. wireless wps cids-sensor index [ip-address ip-addr username password_type password] 3. wireless wps cids-sensor index 4. [default exit fingerprint interval no port shutdown] 5. end username password DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wireless wps cids-sensor index [ip-address ip-addr username username password password_type password] Example: Switch(config)# wireless wps cids-sensor 2 231.1.1.1 admin pwd123 Purpose Enters global configuration mode. Configures the IDS sensors that holds and internal index number. The index parameter determines the sequence in which the controller consults the IDS sensors. The controller supports up to five IDS sensors. · ip-address [optional] Provide the IP address for the IDS. · username [optional] Configures the username for the IDS. · password [optional] Configures the password for the respective username. Step 3 wireless wps cids-sensor index Example: Enters the IDS configuration submode. Step 4 Switch(config)# wireless wps cids-sensor 1 [default exit fingerprint interval no port shutdown] Example: Switch(config-cids-index)# default Configures various IDS parameters. · default [optional] Sets a command to its default. · exit [optional] Exits the submode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1704 Security Monitoring Intrusion Detection System Command or Action Step 5 end Example: Switch(config)# end Purpose · fingerprint [optional] Configures the sensor's TLS fingerprint. · interval [optional] Configures the sensor's query interval. The range is between 10-3600 seconds. · no [optional] Negates a command or set its defaults. · port [optional] Configures the sensor's port number. · shutdown [optional] Shuts down the intrusion detection sensor. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Monitoring Intrusion Detection System Table 150: Commands for Monitoring Wireless Multicast Commands Description show wireless wps cids-sensor index Displays the IDS configuration of the IDS sensor with the mentioned index value. show wireless wps cids-sensor summary Displays the list of all the configured IDS with their respective values like index, ip-address, port number, interval value, status and last query. show wireless wps shun-list Displays the list of the IDS shun list. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1705 Monitoring Intrusion Detection System Security Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1706 X I V PA R T Stack Manager and High Availability · Managing Switch Stacks, on page 1709 · Configuring Cisco NSF with SSO , on page 1739 · Configuring Wireless High Availability, on page 1755 8 4 C H A P T E R Managing Switch Stacks · Finding Feature Information, on page 1709 · Prerequisites for Switch Stacks, on page 1709 · Restrictions for Switch Stacks, on page 1709 · Information About Switch Stacks, on page 1710 · How to Configure a Switch Stack, on page 1721 · Troubleshooting the Switch Stack, on page 1727 · Monitoring the Switch Stack, on page 1729 · Configuration Examples for Switch Stacks, on page 1730 · Additional References for Switch Stacks, on page 1737 · Feature History and Information for Switch Stacks, on page 1738 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Switch Stacks All the switches in the switch stack need to be running the same license level as the active switch. For information about license levels, see the System Management Configuration Guide (Catalyst 3650 Switches). All switches in the switch stack need to be running compatible software versions. A StackWise adapter must be installed in the stacking port to enable stacking. For switch stack hardware considerations, see the Catalyst 3650 Switch Hardware Installation Guide. Restrictions for Switch Stacks The following are restrictions for your switch stack configuration: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1709 Information About Switch Stacks Stack Manager and High Availability · Switch stacks running the LAN Base license level do not support Layer 3 features. · A switch stack can have up to nine stacking-capable switches connected through their StackWise-160 ports. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Related Topics Supported Features in a Switch Stack, on page 1710 Information About Switch Stacks Switch Stack Overview A switch stack can have up to nine stacking-capable switches connected through their StackWise-160 ports. The stack members work together as a unified system. Layer 2 and Layer 3 protocols present the entire switch stack as a single entity to the network. A switch stack always has one active switch and one standby switch. If the active switch becomes unavailable, the standby switch assumes the role of the active switch, and continues to the keep the stack operational. The active switch controls the operation of the switch stack, and is the single point of stack-wide management. From the active switch, you configure: · System-level (global) features that apply to all stack members · Interface-level features for each stack member The active switch contains the saved and running configuration files for the switch stack. The configuration files include the system-level settings for the switch stack and the interface-level settings for each stack member. Each stack member has a current copy of these files for back-up purposes. Supported Features in a Switch Stack The system-level features supported on the active switch are supported on the entire switch stack. Related Topics Restrictions for Switch Stacks, on page 1709 Encryption Features If the active switch is running the cryptographic universal software image (supports encryption), the encryption features are available on the switch stack. StackWise-160 The stack members use the StackWise-160 technology to work together as a unified system. Layer 2 and Layer 3 protocols support the entire switch stack as a single entity in the network. Note Switch stacks running the LAN Base image do not support Layer 3 features. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1710 Stack Manager and High Availability Switch Stack Membership StackWise-160 has a stack bandwidth of 160 Gbps, and uses stateful switchover (SSO) to provide resiliency within the stack. The stack behaves as a single switching unit that is managed by an active switch elected by the member switches. The active switch automatically elects a standby switch within the stack. The active switch creates and updates all the switching, routing and wireless information and constantly synchronizes that information with the standby switch. Access points continue to remain connected during an active-to-standby switchover unless the access point is directly connected to the active switch. In this case the access point will lose power and reboot. A working stack can accept new members or delete old ones without service interruption. Switch Stack Membership A standalone switch is a switch stack with one stack member that also operates as the active switch. You can connect one standalone switch to another to create a switch stack containing two stack members, with one of them as the active switch. You can connect standalone switches to an existing switch stack to increase the stack membership. Changes to Switch Stack Membership If you replace a stack member with an identical model, the new switch functions with exactly the same configuration as the replaced switch, assuming that the new switch (referred to as the provisioned switch) is using the same member number as the replaced switch. The operation of the switch stack continues uninterrupted during membership changes unless you remove the active switch or you add powered-on standalone switches or switch stacks. · Adding powered-on switches (merging) causes all switches to reload and elect a new active switch from among themselves. The newly elected active switch retains its role and configuration. All other switches retain their stack member numbers and use the stack configuration of the newly elected active switch. · Removing powered-on stack members causes the switch stack to divide (partition) into two or more switch stacks, each with the same configuration. This can cause: · An IP address conflict in your network. If you want the switch stacks to remain separate, change the IP address or addresses of the newly created switch stacks. · A MAC address conflict between two members in the stack. You can use the stack-mac update force command to resolve the conflict. If a newly created switch stack does not have an active switch or standby switch, the switch stack will reload and elect a new active switch. Note Make sure that you power off the switches that you add to or remove from the switch stack. After adding or removing stack members, make sure that the switch stack is operating at full bandwidth (160 Gbps). Press the Mode button on a stack member until the Stack mode LED is on. The last two right port LEDs on all switches in the stack should be green. Depending on the switch model, the last two right ports are 10-Gigabit Ethernet ports or small form-factor pluggable (SFP) module ports (10/100/1000 ports). If one or both of these LEDs are not green on any of the switches, the stack is not operating at full bandwidth. If you remove powered-on members but do not want to partition the stack: · Power off the switches in the newly created switch stacks. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1711 Stack Member Numbers Stack Manager and High Availability · Reconnect them to the original switch stack through their stack ports. · Power on the switches. For cabling and power considerations that affect switch stacks, see the Catalyst 3650 Switch Hardware Installation Guide . Related Topics Assigning a Stack Member Number, on page 1722 Switch Stack Configuration Scenarios, on page 1730 Stack Member Numbers The stack member number (1 to 9) identifies each member in the switch stack. The member number also determines the interface-level configuration that a stack member uses. You can display the stack member number by using the show switch EXEC command. A new, out-of-the-box switch (one that has not joined a switch stack or has not been manually assigned a stack member number) ships with a default stack member number of 1. When it joins a switch stack, its default stack member number changes to the lowest available member number in the stack. Stack members in the same switch stack cannot have the same stack member number. Every stack member, including a standalone switch, retains its member number until you manually change the number or unless the number is already being used by another member in the stack. · If you manually change the stack member number by using the switch current-stack-member-number renumber new-stack-member-number command, the new number goes into effect after that stack member resets (or after you use the reload slot stack-member-number privileged EXEC command) and only if that number is not already assigned to any other members in the stack. Another way to change the stack member number is by changing the SWITCH_NUMBER environment variable. If the number is being used by another member in the stack, the switch selects the lowest available number in the stack. If you manually change the number of a stack member and no interface-level configuration is associated with that new member number, that stack member resets to its default configuration. You cannot use the switch current-stack-member-number renumber new-stack-member-number command on a provisioned switch. If you do, the command is rejected. · If you move a stack member to a different switch stack, the stack member retains its number only if the number is not being used by another member in the stack. If it is being used, the switch selects the lowest available number in the stack. · If you merge switch stacks, the switches that join the switch stack of a new active switch select the lowest available numbers in the stack. As described in the hardware installation guide, you can use the switch port LEDs in Stack mode to visually determine the stack member number of each stack member. Related Topics Assigning a Stack Member Number, on page 1722 Switch Stack Configuration Scenarios, on page 1730 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1712 Stack Manager and High Availability Stack Member Priority Values Stack Member Priority Values A higher priority value for a stack member increases the probability of it being elected active switch and retaining its stack member number. The priority value can be 1 to 15. The default priority value is 1. You can display the stack member priority value by using the show switch EXEC command. Note We recommend assigning the highest priority value to the switch that you prefer to be the active switch. This ensures that the switch is reelected as the active switch if a reelection occurs. To change the priority value for a stack member, use the switch stack-member-number priority new priority-value command. The new priority value takes effect immediately but does not affect the current active switch. The new priority value helps determine which stack member is elected as the new active switch when the current active switch or the switch stack resets. Related Topics Setting the Stack Member Priority Value, on page 1723 Switch Stack Bridge ID and MAC Address A switch stack is identified in the network by its bridge ID and, if it is operating as a Layer 3 device, its router MAC address. The bridge ID and router MAC address are determined by the MAC address of the active switch. If the active switch changes, the MAC address of the new active switch determines the new bridge ID and router MAC address. If the entire switch stack reloads, the switch stack uses the MAC address of the active switch. Persistent MAC Address on the Switch Stack You can use the persistent MAC address feature to set a time delay before the stack MAC address changes. During this time period, if the previous active switch rejoins the stack, the stack continues to use its MAC address as the stack MAC address, even if the switch is now a stack member and not an active switch. If the previous active switch does not rejoin the stack during this period, the switch stack takes the MAC address of the new active switch as the stack MAC address. By default, the stack MAC address will be the MAC address of the first active switch, even if a new active switch takes over. You can also configure stack MAC persistency so that the stack MAC address never changes to the new active switch MAC address. Related Topics Enabling the Persistent MAC Address Feature, on page 1721 Enabling the Persistent MAC Address Feature: Example, on page 1731 Active and Standby Switch Election and Reelection All stack members are eligible to be the active switch or the standby switch. If the active switch becomes unavailable, the standby switch becomes the active switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1713 Switch Stack Configuration Files Stack Manager and High Availability An active switch retains its role unless one of these events occurs: · The switch stack is reset. · The active switch is removed from the switch stack. · The active switch is reset or powered off. · The active switch fails. · The switch stack membership is increased by adding powered-on standalone switches or switch stacks. The active switch is elected or reelected based on one of these factors and in the order listed: 1. The switch that is currently the active switch. 2. The switch with the highest stack member priority value. Note We recommend assigning the highest priority value to the switch that you prefer to be the active switch. This ensures that the switch is reelected as active switch if a reelection occurs. 3. The switch with the shortest start-up time. 4. The switch with the lowest MAC address. Note The factors for electing or reelecting a new standby switch are same as those for the active switch election or reelection, and are applied to all participating switches except the active switch. After election, the new active switch becomes available after a few seconds. In the meantime, the switch stack uses the forwarding tables in memory to minimize network disruption. The physical interfaces on the other available stack members are not affected during a new active switch election and reset. When the previous active switch becomes available, it does not resume its role as the active switch. If you power on or reset an entire switch stack, some stack members might not participate in the active switch election. Stack members that are powered on within the same 2-minute timeframe participate in the active switch election and have a chance to become the active switch. Stack members that are powered on after the 120-second timeframe do not participate in this initial election and become stack members. For powering considerations that affect active-switch elections, see the switch hardware installation guide. As described in the hardware installation guide, you can use the ACTV LED on the switch to see if the switch is the active switch. Switch Stack Configuration Files The active switch has the saved and running configuration file for the switch stack. The standby switch automatically receives the synchronized running configuration file. Stack members receive synchronized copies when the running configuration file is saved into the startup configuration file. If the active switch becomes unavailable, the standby switch takes over with the current running configuration. The configuration files record these settings: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1714 Stack Manager and High Availability Offline Configuration to Provision a Stack Member · System-level (global) configuration settings such as IP, STP, VLAN, and SNMP settings that apply to all stack members · Stack member interface-specific configuration settings that are specific for each stack member Note The interface-specific settings of the active switch are saved if the active switch is replaced without saving the running configuration to the startup configuration. A new, out-of-box switch joining a switch stack uses the system-level settings of that switch stack. If a switch is moved to a different switch stack before it is powered on, that switch loses its saved configuration file and uses the system-level configuration of the new switch stack. If the switch is powered on as a standalone switch before it joins the new switch stack, the stack will reload. When the stack reloads, the new switch may become the active switch, retain its configuration and overwrite the configuration files of the other stack members. The interface-specific configuration of each stack member is associated with the stack member number. Stack members retain their numbers unless they are manually changed or they are already used by another member in the same switch stack. If the stack member number changes, the new number goes into effect after that stack member resets. · If an interface-specific configuration does not exist for that member number, the stack member uses its default interface-specific configuration. · If an interface-specific configuration exists for that member number, the stack member uses the interface-specific configuration associated with that member number. If you replace a failed member with an identical model, the replacement member automatically uses the same interface-specific configuration as the failed switch. You do not need to reconfigure the interface settings. The replacement switch (referred to as the provisioned switch) must have the same stack member number as the failed switch. You back up and restore the stack configuration in the same way as you would for a standalone switch configuration. Related Topics Assigning a Stack Member Number, on page 1722 Switch Stack Configuration Scenarios, on page 1730 Offline Configuration to Provision a Stack Member You can use the offline configuration feature to provision (to supply a configuration to) a new switch before it joins the switch stack. You can configure the stack member number, the switch type, and the interfaces associated with a switch that is not currently part of the stack. The configuration that you create on the switch stack is called the provisioned configuration. The switch that is added to the switch stack and that receives this configuration is called the provisioned switch. You manually create the provisioned configuration through the switch stack-member-number provision type global configuration command. You must change the stack-member-number on the provisioned switch before you add it to the stack, and it must match the stack member number that you created for the new switch on the switch stack. The switch type in the provisioned configuration must match the switch type of the newly added switch. The provisioned configuration is automatically created when a switch is added to a switch stack and when no provisioned configuration exists. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1715 Effects of Adding a Provisioned Switch to a Switch Stack Stack Manager and High Availability When you configure the interfaces associated with a provisioned switch, the switch stack accepts the configuration, and the information appears in the running configuration. However, as the switch is not active, any configuration on the interface is not operational and the interface associated with the provisioned switch does not appear in the display of the specific feature. For example, VLAN configuration information associated with a provisioned switch does not appear in the show vlan user EXEC command output on the switch stack. The switch stack retains the provisioned configuration in the running configuration whether or not the provisioned switch is part of the stack. You can save the provisioned configuration to the startup configuration file by entering the copy running-config startup-config privileged EXEC command. The startup configuration file ensures that the switch stack can reload and can use the saved information whether or not the provisioned switch is part of the switch stack. Related Topics Removing Provisioned Switch Information, on page 1725 Provisioning a New Member for a Switch Stack: Example, on page 1732 Effects of Adding a Provisioned Switch to a Switch Stack When you add a provisioned switch to the switch stack, the stack applies either the provisioned configuration or the default configuration. This table lists the events that occur when the switch stack compares the provisioned configuration with the provisioned switch. Table 151: Results of Comparing the Provisioned Configuration with the Provisioned Switch Scenario Result The stack member numbers 1. If the stack member number of the The switch stack applies the and the switch types match. provisioned switch matches the provisioned configuration to the stack member number in the provisioned switch and adds it to the provisioned configuration on the stack. stack, and 2. If the switch type of the provisioned switch matches the switch type in the provisioned configuration on the stack. The stack member numbers 1. If the stack member number of the The switch stack applies the default match but the switch types provisioned switch matches the configuration to the provisioned switch do not match. stack member number in the and adds it to the stack. provisioned configuration on the stack, but The provisioned configuration is changed to reflect the new information. 2. The switch type of the provisioned switch does not match the switch type in the provisioned configuration on the stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1716 Stack Manager and High Availability Effects of Replacing a Provisioned Switch in a Switch Stack Scenario The stack member number is not found in the provisioned configuration. The stack member number of the provisioned switch is not found in the provisioned configuration. Result The switch stack applies the default configuration to the provisioned switch and adds it to the stack. The provisioned configuration is changed to reflect the new information. The switch stack applies the default configuration to the provisioned switch and adds it to the stack. If you add a provisioned switch that is a different type than specified in the provisioned configuration to a powered-down switch stack and then apply power, the switch stack rejects the (now incorrect) switch stack-member-number provision type global configuration command in the startup configuration file. However, during stack initialization, the nondefault interface configuration information in the startup configuration file for the provisioned interfaces (potentially of the wrong type) is executed. Depending on the differences between the actual switch type and the previously provisioned switch type, some commands are rejected, and some commands are accepted. Note If the switch stack does not contain a provisioned configuration for a new switch, the switch joins the stack with the default interface configuration. The switch stack then adds to its running configuration with a switch stack-member-number provision type global configuration command that matches the new switch. Effects of Replacing a Provisioned Switch in a Switch Stack When a provisioned switch in a switch stack fails, it is removed from the stack, and is replaced with another switch, the stack applies either the provisioned configuration or the default configuration to it. The events that occur when the switch stack compares the provisioned configuration with the provisioned switch are the same as those when you add a provisioned switch to a stack. Effects of Removing a Provisioned Switch from a Switch Stack If you remove a provisioned switch from the switch stack, the configuration associated with the removed stack member remains in the running configuration as provisioned information. To completely remove the configuration, use the no switch stack-member-number provision global configuration command. Upgrading a Switch Running Incompatible Software The auto-upgrade and auto-advise features enable a switch with software packages that are incompatible with the switch stack to be upgraded to a compatible software version so that it can join the switch stack. Auto-Upgrade The purpose of the auto-upgrade feature is to allow a switch to be upgraded to a compatible software image, so that the switch can join the switch stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1717 Auto-Advise Stack Manager and High Availability When a new switch attempts to join a switch stack, each stack member performs compatibility checks with itself and the new switch. Each stack member sends the results of the compatibility checks to the active switch, which uses the results to determine whether the switch can join the switch stack. If the software on the new switch is incompatible with the switch stack, the new switch enters version-mismatch (VM) mode. If the auto-upgrade feature is enabled on the existing switch stack, the active switch automatically upgrades the new switch with the same software image running on a compatible stack member. Auto-upgrade starts a few minutes after the mismatched software is detected before starting. Auto-upgrade is disabled by default. Auto-upgrade includes an auto-copy process and an auto-extract process. · Auto-copy automatically copies the software image running on any stack member to the new switch to automatically upgrade it. Auto-copy occurs if auto-upgrade is enabled, if there is enough flash memory in the new switch, and if the software image running on the switch stack is suitable for the new switch. Auto-Advise Note A switch in VM mode might not run all released software. For example, new switch hardware is not recognized in earlier versions of software. · Automatic extraction (auto-extract) occurs when the auto-upgrade process cannot find the appropriate software in the stack to copy to the new switch. In that case, the auto-extract process searches all switches in the stack for the bin file needed to upgrade the switch stack or the new switch. The bin file can be in any flash file system in the switch stack or in the new switch. If a bin file suitable for the new switch is found on a stack member, the process extracts the file and automatically upgrades the new switch. The auto-upgrade feature is not available in bundle mode. The switch stack must be running in installed mode. If the switch stack is in bundle mode, use the software expand privileged EXEC command to change to installed mode. You can enable auto-upgrade by using the software auto-upgrade enable global configuration command on the new switch. You can check the status of auto-upgrade by using the show running-config privileged EXEC command and by checking the Auto upgrade line in the display. You can configure auto-upgrade to upgrade the new switch with a specific software bundle by using the software auto-upgrade source url global configuration command. If the software bundle is invalid, the new switch is upgraded with the same software image running on a compatible stack member. When the auto-upgrade process is complete, the new switch reloads and joins the stack as a fully functioning member. If you have both stack cables connected during the reload, network downtime does not occur because the switch stack operates on two rings. For more information about upgrading a switch running incompatible software see the Cisco IOS File System, Configuration Files, and Bundle Files Appendix, Cisco IOS XE Release 3SE (Catalyst 3650 Switches). The auto-advise feature is triggered when: · The auto-upgrade feature is disabled. · The new switch is in bundle mode and the stack is in installed mode. Auto-advise displays syslog messages about using the software auto-upgrade privileged EXEC command to change the new switch to installed mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1718 Stack Manager and High Availability Examples of Auto-Advise Messages · The stack is in bundle mode. Auto-advise displays syslog messages about booting the new switch in bundle mode so that it can join the stack. · An auto-upgrade attempt fails because the new switch is running incompatible software. After the switch stack performs compatibility checks with the new switch, auto-advise displays syslog messages about whether the new switch can be auto-upgraded. Auto-advise cannot be disabled. It does not give suggestions when the switch stack software and the software of the switch in version-mismatch (VM) mode do not contain the same license level. Examples of Auto-Advise Messages Auto-Upgrade Is Disabled and Incompatible Switch Attempting to Join: Example This sample auto-advise output shows the system messages displayed when the auto-upgrade feature is disabled and an incompatible switch 1 tries to join the switch stack: *Oct 18 08:36:19.379: %INSTALLER-6-AUTO_ADVISE_SW_INITIATED: 2 installer: Auto advise initiated for switch 1 *Oct 18 08:36:19.380: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: Searching stack for software to upgrade switch 1 *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: Switch 1 with incompatible software has been *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: added to the stack. The software running on *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: all stack members was scanned and it has been *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: determined that the 'software auto-upgrade' *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: command can be used to install compatible *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: software on switch 1. Auto-Upgrade is Disabled and New Switch is in Bundle Mode: Example This sample auto-advise output shows the system messages displayed when auto-upgrade is disabled and a switch running in bundle mode tries to join the stack that is running in installed mode: *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW_INITIATED: 2 installer: Auto advise initiated for switch 1 *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: Switch 1 running bundled software has been added *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: to the stack that is running installed software. *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: The 'software auto-upgrade' command can be used to *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: convert switch 1 to the installed running mode by *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: installing its running software. SDM Template Mismatch in Switch Stacks All stack members use the Switch Database Management (SDM) template configured on the active switch. When a new switch is added to a stack, the SDM configuration that is stored on the active switch overrides the template configured on an individual switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1719 Switch Stack Management Connectivity Stack Manager and High Availability You can use the show switch privileged EXEC command to see if any stack members are in SDM-mismatch mode. Version-mismatch (VM) mode has priority over SDM-mismatch mode. If a VM-mode condition and an SDM-mismatch mode exist, the switch stack first attempts to resolve the VM-mode condition. Switch Stack Management Connectivity You manage the switch stack and the stack member interfaces through the active switch. You can use the CLI, SNMP, and supported network management applications such as CiscoWorks. You cannot manage stack members on an individual switch basis. Note Use SNMP to manage network features across the stack that are defined by supported MIBs. The switch does not support MIBs to manage stacking-specific features such as stack membership and election. Connectivity to Specific Stack Members If you want to configure a specific stack member port, you must include the stack member number in the CLI command interface notation. To debug the standby switch, you can access it from the active switch using the session standby ios privileged EXEC command. To debug a specific stack member, use the session switch stack-member-number privileged EXEC command from the active switch to access the diagnostic shell of the stack member. Only the show and debug commands are available in a CLI session to a specific stack member. Related Topics Accessing the Diagnostic Console of a Stack Member, on page 1727 Connectivity to the Switch Stack Through an IP Address The switch stack is managed through a single IP address. The IP address is a system-level setting and is not specific to the active switch or to any other stack member. You can still manage the stack through the same IP address even if you remove the active switch or any other stack member from the stack, provided there is IP connectivity. Note Stack members retain their IP addresses when you remove them from a switch stack. To avoid a conflict by having two devices with the same IP address in your network, change the IP addresses of any switches that you remove from the switch stack. Connectivity to the Switch Stack Through Console Ports or Ethernet Management Ports You can connect to the active switch by using one of these methods: · You can connect a terminal or a PC to the active switch through the console port of one or more stack members. · You can connect a PC to the active switch through the Ethernet management ports of one or more stack members. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1720 Stack Manager and High Availability How to Configure a Switch Stack Be careful when using multiple CLI sessions to the active switch. Commands that you enter in one session are not displayed in the other sessions. Therefore, it is possible that you might not be able to identify the session from which you entered a command. We recommend using only one CLI session when managing the switch stack. How to Configure a Switch Stack Default Switch Stack Configuration The following table shows the default switch stack configuration settings: Table 152: Default Switch Stack Configuration Feature Stack MAC address timer Stack member number Stack member priority value Offline configuration Persistent MAC address Default Setting Disabled. 1 1 The switch stack is not provisioned. Disabled. Enabling the Persistent MAC Address Feature This procedure is optional. Note When you enter the command to configure this feature, a warning message appears with the consequences of your configuration. You should use this feature cautiously. Using the old active switch MAC address elsewhere in the same domain could result in lost traffic. SUMMARY STEPS 1. configure terminal 2. stack-mac persistent timer [0 | time-value] 3. end 4. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1721 Assigning a Stack Member Number Stack Manager and High Availability Command or Action Switch# configure terminal Step 2 stack-mac persistent timer [0 | time-value] Example: Switch(config)# stack-mac persistent timer 7 Step 3 end Example: Switch(config)# end Step 4 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enables a time delay after an active-switch change before the stack MAC address changes to that of the new active switch. If the previous active switch rejoins the stack during this period, the stack uses that MAC address as the stack MAC address. · Enter the command with no value or with a value of 0 to continue using the MAC address of the current active switch indefinitely. · Enter a time-value from 1 to 60 minutes to configure the time period before the stack MAC address changes to the new active switch. The stack MAC address of the previous active switch is used until the configured time period expires. Returns to privileged EXEC mode. (Optional) Saves your entries in the configuration file. Related Topics Persistent MAC Address on the Switch Stack, on page 1713 Enabling the Persistent MAC Address Feature: Example, on page 1731 Assigning a Stack Member Number This optional task is available only from the active switch. SUMMARY STEPS 1. switch current-stack-member-number renumber new-stack-member-number 2. reload slot stack-member-number Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1722 Stack Manager and High Availability Setting the Stack Member Priority Value DETAILED STEPS Step 1 Command or Action switch current-stack-member-number renumber new-stack-member-number Example: Switch(config)# switch 3 renumber 4 Step 2 reload slot stack-member-number Example: Switch# reload slot 4 Purpose Specifies the current stack member number and the new stack member number for the stack member. The range is 1 to 9. You can display the current stack member number by using the show switch user EXEC command. Resets the stack member. Related Topics Changes to Switch Stack Membership, on page 1711 Stack Member Numbers, on page 1712 Switch Stack Configuration Files, on page 1714 Switch Stack Configuration Scenarios, on page 1730 Setting the Stack Member Priority Value This optional task is available only from the active switch. Follow these steps to assign a priority value to a stack member: SUMMARY STEPS 1. enable 2. switch stack-member-number priority new-priority-number 3. show switch stack-member-number 4. copy running-config startup-config DETAILED STEPS Step 1 Command or Action enable Example: Switch enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 switch stack-member-number priority new-priority-number Specifies the stack member number and the new priority Example: for the stack member. The stack member number range is 1 to 9. The priority value range is 1 to 15. Switch# switch 3 priority 2 You can display the current priority value by using the show switch user EXEC command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1723 Provisioning a New Member for a Switch Stack Stack Manager and High Availability Command or Action Step 3 show switch stack-member-number Example: Switch# show switch Step 4 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose The new priority value takes effect immediately but does not affect the current active switch. The new priority value helps determine which stack member is elected as the new active switch when the current active switch or switch stack resets. Verify the stack member priority value. (Optional) Saves your entries in the configuration file. Related Topics Stack Member Priority Values, on page 1713 Provisioning a New Member for a Switch Stack This optional task is available only from the active switch. SUMMARY STEPS 1. show switch 2. configure terminal 3. switch stack-member-number provision type 4. end 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action show switch Example: Switch# show switch Purpose Displays summary information about the switch stack. Step 2 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 3 switch stack-member-number provision type Example: Specifies the stack member number for the preconfigured switch. By default, no switches are provisioned. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1724 Stack Manager and High Availability Removing Provisioned Switch Information Command or Action Switch(config)# switch 3 provision WS-xxxx Step 4 end Example: Switch(config)# end Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose For stack-member-number, the range is 1 to 9. Specify a stack member number that is not already used in the switch stack. See Step 1. For type, enter the model number of a supported switch that is listed in the command-line help strings. Returns to privileged EXEC mode. (Optional) Saves your entries in the configuration file. Removing Provisioned Switch Information Before you begin, you must remove the provisioned switch from the stack. This optional task is available only from the active switch. SUMMARY STEPS 1. configure terminal 2. no switch stack-member-number provision 3. end 4. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 no switch stack-member-number provision Example: Switch(config)# no switch 3 provision Removes the provisioning information for the specified member. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1725 Displaying Incompatible Switches in the Switch Stack Stack Manager and High Availability Step 4 Command or Action copy running-config startup-config Example: Switch# copy running-config startup-config Purpose (Optional) Saves your entries in the configuration file. Example If you are removing a provisioned switch in a stack with this configuration: · The stack has four members · Stack member 1 is the active switch · Stack member 3 is a provisioned switch and want to remove the provisioned information and to avoid receiving an error message, you can remove power from stack member 3, disconnect the StackWise-160 cables between the stack member 3 and switches to which it is connected, reconnect the cables between the remaining stack members, and enter the no switch stack-member-number provision global configuration command. Related Topics Offline Configuration to Provision a Stack Member , on page 1715 Provisioning a New Member for a Switch Stack: Example, on page 1732 Displaying Incompatible Switches in the Switch Stack SUMMARY STEPS 1. show switch DETAILED STEPS Step 1 Command or Action show switch Example: Switch# show switch Purpose Displays any incompatible switches in the switch stack (indicated by a 'Current State' of 'V-Mismatch'). The V-Mismatch state identifies the switches with incompatible software. The output displays Lic-Mismatch for switches that are not running the same license level as the active switch. For information about managing license levels, see the System Management Configuration Guide (Catalyst 3650 Switches). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1726 Stack Manager and High Availability Upgrading an Incompatible Switch in the Switch Stack Upgrading an Incompatible Switch in the Switch Stack SUMMARY STEPS 1. software auto-upgrade 2. copy running-config startup-config DETAILED STEPS Step 1 Command or Action software auto-upgrade Example: Switch# software auto-upgrade Purpose Upgrades incompatible switches in the switch stack, or changes switches in bundle mode to installed mode. Step 2 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Troubleshooting the Switch Stack Accessing the Diagnostic Console of a Stack Member Before you begin This optional task is available only from the active switch. SUMMARY STEPS 1. session switch stack-member-number 2. exit DETAILED STEPS Step 1 Command or Action session switch stack-member-number Example: Switch# session switch 2 Purpose Accesses the diagnostic shell of the stack member from the active switch. Step 2 exit Example: Switch(diag)> exit Returns to the CLI session on the active switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1727 Temporarily Disabling a Stack Port Stack Manager and High Availability Related Topics Connectivity to Specific Stack Members, on page 1720 Temporarily Disabling a Stack Port If a stack port is flapping and causing instability in the stack ring, to disable the port, enter the switch stack-member-number stack port port-number disable privileged EXEC command. To reenable the port, enter the switch stack-member-number stack port port-number enable command. Note Be careful when using the switch stack-member-number stack port port-number disable command. When you disable the stack port, the stack operates at half bandwidth. A stack is in the full-ring state when all members are connected through the stack ports and are in the ready state. The stack is in the partial-ring state when the following occurs: · All members are connected through their stack ports but some are not in the ready state. · Some members are not connected through the stack ports. SUMMARY STEPS 1. switch stack-member-number stack port port-number disable 2. switch stack-member-number stack port port-number enable DETAILED STEPS Step 1 Command or Action switch stack-member-number stack port port-number disable Example: Switch# switch 2 stack port 1 disable Purpose Disables the specified stack port. Step 2 switch stack-member-number stack port port-number enable Example: Switch# switch 2 stack port 1 enable Reenables the stack port. When you disable a stack port and the stack is in the full-ring state, you can disable only one stack port. This message appears: Enabling/disabling a stack port may cause undesired stack changes. Continue?[confirm] When you disable a stack port and the stack is in the partial-ring state, you cannot disable the port. This message appears: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1728 Stack Manager and High Availability Reenabling a Stack Port While Another Member Starts Disabling stack port not allowed with current stack configuration. Reenabling a Stack Port While Another Member Starts Stack Port 1 on Switch 1 is connected to Port 2 on Switch 4. If Port 1 is flapping, you can disable Port 1 with the switch 1 stack port 1 disable privileged EXEC command. While Port 1 on Switch 1 is disabled and Switch 1 is still powered on, follow these steps to reenable a stack port: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Disconnect the stack cable between Port 1 on Switch 1 and Port 2 on Switch 4. Remove Switch 4 from the stack. Add a switch to replace Switch 4 and assign it switch-number 4. Reconnect the cable between Port 1 on Switch 1 and Port 2 on Switch 4 (the replacement switch). Reenable the link between the switches. Enter the switch 1 stack port 1 enable privileged EXEC command to enable Port 1 on Switch 1. Power on Switch 4. Caution Powering on Switch 4 before enabling the Port 1 on Switch 1 might cause one of the switches to reload. If Switch 4 is powered on first, you might need to enter the switch 1 stack port 1 enable and the switch 4 stack port 2 enable privileged EXEC commands to bring up the link. Monitoring the Switch Stack Table 153: Commands for Displaying Stack Information Command Description show switch Displays summary information about the stack, including the status of provisioned switches and switches in version-mismatch mode. show switch stack-member-number Displays information about a specific member. show switch detail Displays detailed information about the stack. show switch neighbors Displays the stack neighbors. show switch stack-ports [summary] Displays port information for the stack. show redundancy Displays the redundant system and the current processor information. The redundant system information includes the system uptime, standby failures, switchover reason, hardware, configured and operating redundancy mode. The current processor information displayed includes the active location, the software state, the uptime in the current state and so on. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1729 Configuration Examples for Switch Stacks Stack Manager and High Availability Command show redundancy state Description Displays all the redundancy states of the active and standby switches. Configuration Examples for Switch Stacks Switch Stack Configuration Scenarios Most of these switch stack configuration scenarios assume that at least two switches are connected through their StackWise-160 ports. Table 154: Configuration Scenarios Scenario Result Active switch election Connect two powered-on switch stacks specifically determined through the StackWise-160 ports. by existing active switches Only one of the two active switches becomes the new active switch. Active switch election 1. Connect two switches through their The stack member with the higher specifically determined StackWise-160 ports. priority value is elected active switch. by the stack member priority value 2. Use the switch stack-member-number priority new-priority-number global configuration command to set one stack member with a higher member priority value. 3. Restart both stack members at the same time. Active switch election Assuming that both stack members have the The stack member with the saved specifically determined same priority value: configuration file is elected active by the configuration file 1. Make sure that one stack member has a switch. default configuration and that the other stack member has a saved (nondefault) configuration file. 2. Restart both stack members at the same time. Active switch election Assuming that both stack members have the The stack member with the lower specifically determined same priority value, configuration file, and MAC address is elected active by the MAC address feature set, restart both stack members at the switch. same time. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1730 Stack Manager and High Availability Enabling the Persistent MAC Address Feature: Example Scenario Result Stack member number conflict Assuming that one stack member has a higher The stack member with the higher priority value than the other stack member: priority value retains its stack 1. Ensure that both stack members have the same stack member number. If necessary, use the switch member number. The other stack member has a new stack member number. current-stack-member-number renumber new-stack-member-number global configuration command. 2. Restart both stack members at the same time. Add a stack member 1. Power off the new switch. The active switch is retained. The new switch is added to the switch 2. Through their StackWise-160 ports, stack. connect the new switch to a powered-on switch stack. 3. Power on the new switch. Active switch failure Add more than nine stack members Remove (or power off) the active switch. 1. Through their StackWise-160 ports, connect ten switches. 2. Power on all switches. One of the remaining stack members becomes the new stack master. All other stack members in the stack remain as stack members and do not reboot. Two switches become active switches. One active switch has nine stack members. The other active switch remains as a standalone switch. Use the Mode button and port LEDs on the switches to identify which switches are active switches and which switches belong to each active switch. Related Topics Assigning a Stack Member Number, on page 1722 Changes to Switch Stack Membership, on page 1711 Stack Member Numbers, on page 1712 Switch Stack Configuration Files, on page 1714 Enabling the Persistent MAC Address Feature: Example This example shows how to configure the persistent MAC address feature for a 7-minute time delay and to verify the configuration: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1731 Provisioning a New Member for a Switch Stack: Example Stack Manager and High Availability Switch(config)# stack-mac persistent timer 7 WARNING: The stack continues to use the base MAC of the old Master WARNING: as the stack MAC after a master switchover until the MAC WARNING: persistency timer expires. During this time the Network WARNING: Administrators must make sure that the old stack-mac does WARNING: not appear elsewhere in this network domain. If it does, WARNING: user traffic may be blackholed. Switch(config)# end Switch# show switch Switch/Stack Mac Address : 0016.4727.a900 Mac persistency wait time: 7 mins H/W Current Switch# Role Mac Address Priority Version State ---------------------------------------------------------- *1 Active 0016.4727.a900 1 P2B Ready Related Topics Enabling the Persistent MAC Address Feature, on page 1721 Persistent MAC Address on the Switch Stack, on page 1713 Provisioning a New Member for a Switch Stack: Example This example shows how to provision a switch with a stack member number of 2 for the switch stack. The show running-config command output shows the interfaces associated with the provisioned switch: Switch(config)# switch 2 provision switch_PID Switch(config)# end Switch# show running-config | include switch 2 ! interface GigabitEthernet2/0/1 ! interface GigabitEthernet2/0/2 ! interface GigabitEthernet2/0/3 <output truncated> Related Topics Removing Provisioned Switch Information, on page 1725 Offline Configuration to Provision a Stack Member , on page 1715 show switch stack-ports summary Command Output: Example Only Port 1 on stack member 2 is disabled. Switch# show switch stack-ports summary Switch#/ Stack Neighbor Cable Link Port# Port Length OK Status -------- ------ -------- -------- ---- 1/1 OK 3 50 cm Yes 1/2 Down None 3 m Yes 2/1 Down None 3 m Yes 2/2 OK 3 50 cm Yes 3/1 OK 2 50 cm Yes 3/2 OK 1 50 cm Yes Link Active -----Yes No No Yes Yes Yes Sync OK ---Yes Yes Yes Yes Yes Yes # Changes To LinkOK --------- 1 1 1 1 1 1 In Loopback -------No No No No No No Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1732 Stack Manager and High Availability show switch stack-ports summary Command Output: Example Table 155: show switch stack-ports summary Command Output Field Switch#/Port# Stack Port Status Description Member number and its stack port number. Status of the stack port. · Absent--No cable is detected on the stack port. · Down--A cable is detected, but either no connected neighbor is up, or the stack port is disabled. · OK--A cable is detected, and the connected neighbor is up. Neighbor Cable Length Link OK Switch number of the active member at the other end of the stack cable. Valid lengths are 50 cm, 1 m, or 3 m. If the switch cannot detect the cable length, the value is no cable. The cable might not be connected, or the link might be unreliable. Whether the stack cable is connected and functional. There may or may not be a neighbor connected on the other end. The link partner is a stack port on a neighbor switch. · No--There is no stack cable connected to this port or the stack cable is not functional. · Yes--There is a functional stack cable connected to this port. Link Active Whether a neighbor is connected on the other end of the stack cable. · No--No neighbor is detected on the other end. The port cannot send traffic over this link. · Yes--A neighbor is detected on the other end. The port can send traffic over this link. Sync OK Whether the link partner sends valid protocol messages to the stack port. · No--The link partner does not send valid protocol messages to the stack port. · Yes--The link partner sends valid protocol messages to the port. # Changes to LinkOK The relative stability of the link. If a large number of changes occur in a short period of time, link flapping can occur. In Loopback Whether a stack cable is attached to a stack port on the member. · No--At least one stack port on the member has an attached stack cable. · Yes--None of the stack ports on the member has an attached stack cable. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1733 Software Loopback: Examples Stack Manager and High Availability Software Loopback: Examples In a stack with three members, stack cables connect all the members: Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Status Length OK -------- ------ -------- -------- ---- 1/1 OK 3 50 cm Yes 1/2 OK 2 3m Yes 2/1 OK 1 3m Yes 2/2 OK 3 50 cm Yes 3/1 OK 2 50 cm Yes 3/2 OK 1 50 cm Yes Link Active ------ Yes Yes Yes Yes Yes Yes Sync OK ---Yes Yes Yes Yes Yes Yes #Changes To LinkOK --------- 1 1 1 1 1 1 In Loopback -------- No No No No No No If you disconnect the stack cable from Port 1 on Switch 1, these messages appear: 01:09:55: %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 2 Switch 3 has changed to state DOWN 01:09:56: %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 1 Switch 1 has changed to state DOWN Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Status Length OK Link Active Sync OK #Changes To LinkOK In Loopback -------1/1 1/2 2/1 2/2 3/1 3/2 -----Absent OK OK OK OK Down -------None 2 1 3 2 None -------No cable 3m 3m 50 cm 50 cm 50 cm ---No Yes Yes Yes Yes No -----No Yes Yes Yes Yes No ---No Yes Yes Yes Yes No --------1 1 1 1 1 1 -------No No No No No No If you disconnect the stack cable from Port 2 on Switch 1, the stack splits. Switch 2 and Switch 3 are now in a two-member stack connected through stack cables: Switch# show sw stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Status Length -------- ------ -------- -------- 2/1 Down None 3 m 2/2 OK 3 50 cm 3/1 OK 2 50 cm 3/2 Down None 50 cm Link OK ---No Yes Yes No Link Active ------ No Yes Yes No Sync OK ---No Yes Yes No #Changes To LinkOK --------- 1 1 1 1 In Loopback -------- No No No No Switch 1 is a standalone switch: Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Status Length OK -------- ------ -------- -------- ---- 1/1 Absent None No cable No 1/2 Absent None No cable No Link Active ------ No No Sync OK ---No No #Changes To LinkOK --------- 1 1 In Loopback -------- Yes Yes Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1734 Stack Manager and High Availability Software Loopback with Connected Stack Cables: Examples Software Loopback with Connected Stack Cables: Examples · On Port 1 on Switch 1, the port status is Down, and a cable is connected. On Port 2 on Switch 1, the port status is Absent, and no cable is connected. Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Link Sync #Changes In Status Length OK Active OK To LinkOK Loopback -------- ------ -------- -------- ---- ------ ---- --------- -------- 1/1 Down None 50 Cm No No No 1 No 1/2 Absent None No cable No No No 1 No · In a physical loopback, a cable connects both stack ports on a switch. You can use this configuration to test · Cables on a switch that is running properly · Stack ports with a cable that works properly Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Status Length OK -------- ------ -------- -------- ---- 2/1 OK 2 50 cm Yes 2/2 OK 2 50 cm Yes Link Active ------ Yes Yes Sync OK ---Yes Yes #Changes To LinkOK --------- 1 1 In Loopback -------- No No The port status shows that · Switch 2 is a standalone switch. · The ports can send and receive traffic. Software Loopback with no Connected Stack Cable: Example Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Status Length OK -------- ------ -------- -------- ---- 1/1 Absent None No cable No 1/2 Absent None No cable No Link Active ------ No No Sync OK ---- No No #Changes To LinkOK --------- 1 1 In Loopback -------- Yes Yes Finding a Disconnected Stack Cable: Example Stack cables connect all stack members. Port 2 on Switch 1 connects to Port 1 on Switch 2. This is the port status for the members: Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Status Length OK Link Active Sync OK #Changes To LinkOK In Loopback Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1735 Fixing a Bad Connection Between Stack Ports: Example Stack Manager and High Availability -------1/1 1/2 2/1 2/2 -----OK OK OK OK -------2 2 1 1 -------50 cm 50 cm 50 cm 50 cm ---Yes Yes Yes Yes -----Yes Yes Yes Yes ---Yes Yes Yes Yes --------0 0 0 0 -------No No No No If you disconnect the cable from Port 2 on Switch 1, these messages appear: %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 1 Switch 2 has changed to state DOWN %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 2 Switch 1 has changed to state DOWN This is now the port status: Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Status Length OK -------- ------ -------- -------- ---- 1/1 OK 2 50 cm Yes 1/2 Absent None No cable No 2/1 Down None 50 cm No 2/2 OK 1 50 cm Yes Link Active ------ Yes No No Yes Sync OK ---Yes No No Yes #Changes To LinkOK --------- 1 2 2 1 In Loopback -------- No No No No Only one end of the cable connects to a stack port, Port 1 on Switch 2. · The Stack Port Status value for Port 2 on Switch 1 is Absent, and the value for Port 1 on Switch 2 is Down. · The Cable Length value is No cable. Diagnosing the problem: · Verify the cable connection for Port 2 on Switch 1. · Port 2 on Switch 1 has a port or cable problem if · The In Loopback value is Yes. or · The Link OK, Link Active, or Sync OK value is No. Fixing a Bad Connection Between Stack Ports: Example Stack cables connect all members. Port 2 on Switch 1 connects to Port 1 on Switch 2. This is the port status: Switch# show switch stack-ports summary Switch# Sw#/Port# Port Neighbor Cable Link Status Length OK -------- ------ -------- -------- ---- 1/1 OK 2 50 cm Yes Link Active ------ Yes Sync OK ---Yes #Changes To LinkOK --------- 1 In Loopback -------- No Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1736 Stack Manager and High Availability Additional References for Switch Stacks 1/2 Down None 50 cm No No No 2 No 2/1 Down None 50 cm No No No 2 No 2/2 OK 1 50 cm Yes Yes Yes 1 No Diagnosing the problem: · The Stack Port Status value is Down. · Link OK, Link Active, and Sync OK values are No. · The Cable Length value is 50 cm. The switch detects and correctly identifies the cable. The connection between Port 2 on Switch 1 and Port 1 on Switch 2 is unreliable on at least one of the connector pins. Additional References for Switch Stacks Related Documents Related Topic Document Title Cabling and powering on a switch stack. Catalyst 3650 Switch Hardware Installation Guide Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and , use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1737 Feature History and Information for Switch Stacks Stack Manager and High Availability Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Switch Stacks Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1738 8 5 C H A P T E R Configuring Cisco NSF with SSO · Finding Feature Information, on page 1739 · Prerequisites for NSF with SSO, on page 1739 · Restrictions for NSF with SSO, on page 1740 · Information About NSF with SSO, on page 1740 · How to Configure Cisco NSF with SSO , on page 1745 · Additional References for NSF with SSO, on page 1752 · Feature History and Information for NSF with SSO, on page 1753 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for NSF with SSO The following are prerequisites and considerations for configuring NSF with SSO. · Use of the routing protocols requires the IP Services license level. EIGRP-stub and OSPF for routed access are supported on IP Base license level. · BGP support in NSF requires that neighbor networking devices be NSF-aware; that is, the devices must have the graceful restart capability and advertise that capability in their OPEN message during session establishment. If an NSF-capable router discovers that a particular BGP neighbor does not have graceful restart capability, it does not establish an NSF-capable session with that neighbor. All other neighbors that have graceful restart capability continue to have NSF-capable sessions with this NSF-capable networking device. · OSPF support in NSF requires that all neighbor networking devices be NSF-aware. If an NSF-capable router discovers that it has non-NSF -aware neighbors on a particular network segment, it disables NSF capabilities for that segment. Other network segments composed entirely of NSF-capable or NSF-aware routers continue to provide NSF capabilities. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1739 Restrictions for NSF with SSO Stack Manager and High Availability Restrictions for NSF with SSO The following are restrictions for configuring NSF with SSO: · NSF capability is supported for IPv4 routing protocols only. NSF capability is not supported for IPv6 routing protocols. · NSF does not support IP Multicast Routing, as it is not SSO-aware. · NSF is not supported if the IOS-XE software is running in the LAN Base mode. · For NSF operation, you must have SSO configured on the device. · NSF with SSO supports IP Version 4 traffic and protocols only; NSF with SSO does not support IPv6 traffic. · All Layer 3 neighboring devices must be NSF Helper or NSF-capable to support graceful restart capability. · For IETF, all neighboring devices must be running an NSF-aware software image. Information About NSF with SSO Overview of NSF with SSO The switch supports fault resistance by allowing a standby switch to take over if the active switch becomes unavailable. Cisco nonstop forwarding (NSF) works with stateful switchover (SSO) to minimize the amount of time a network is unavailable. NSF provides these benefits: · Improved network availability--NSF continues forwarding network traffic and application state information so that user session information is maintained after a switchover. · Overall network stability--Network stability may be improved with the reduction in the number of route flaps, which were created when routers in the network failed and lost their routing tables. · Neighboring routers do not detect a link flap--Because the interfaces remain up during a switchover, neighboring routers do not detect a link flap (the link does not go down and come back up). · Prevents routing flaps--Because SSO continues forwarding network traffic during a switchover, routing flaps are avoided. · Maintains user sessions established prior to the switchover. SSO Operation When a standby switch runs in SSO mode, the standby switch starts up in a fully-initialized state and synchronizes with the persistent configuration and the running configuration of the active switch. It subsequently maintains the state on the protocols listed below, and all changes in hardware and software states for features that support stateful switchover are kept in synchronization. Consequently, it offers minimum interruption to Layer 2 sessions in a redundant active switch configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1740 Stack Manager and High Availability SSO Operation If the active switch fails, the standby switch becomes the active switch. This new active switch uses existing Layer 2 switching information to continue forwarding traffic. Layer 3 forwarding will be delayed until the routing tables have been repopulated in the newly active switch. Note SSO is not supported if the IOS-XE software is running the LAN Base license level. The state of these features is preserved between both the active and standby switches: · 802.3 · 802.3u · 802.3x (Flow Control) · 802.3ab (GE) · 802.3z (Gigabit Ethernet including CWDM) · 802.3ad (LACP) · 802.1p (Layer 2 QoS) · 802.1q · 802.1X (Authentication) · 802.1D (Spanning Tree Protocol) · 802.3af (Inline power) · PAgP · VTP · Dynamic ARP Inspection · DHCP snooping · IP source guard · IGMP snooping (versions 1 and 2) · DTP (802.1q and ISL) · MST · PVST+ · Rapid-PVST · PortFast/UplinkFast/BackboneFast · BPDU guard and filtering · Voice VLAN · Port security · Unicast MAC filtering · ACL (VACLS, PACLS, RACLS) · QOS (DBL) · Multicast storm control/broadcast storm control SSO is compatible with the following list of features. However, the protocol database for these features is not synchronized between the standby and active switches: · 802.1Q tunneling with Layer 2 Protocol Tunneling (L2PT) · Baby giants · Jumbo frame support · CDP · Flood blocking · UDLD Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1741 NSF Operation Stack Manager and High Availability · SPAN/RSPAN · NetFlow All Layer 3 protocols on a switch are learned on the standby switch if SSO is enabled. NSF Operation Cisco IOS Nonstop Forwarding (NSF) always runs with stateful switchover (SSO) and provides redundancy for Layer 3 traffic. NSF is supported by the BGP, OSPF, and EIGRP routing protocols and is supported by Cisco Express Forwarding (CEF) for forwarding. The routing protocols have been enhanced with NSF-capability and awareness, which means that routers running these protocols can detect a switchover and take the necessary actions to continue forwarding network traffic and to recover route information from the peer devices. Each protocol depends on CEF to continue forwarding packets during switchover while the routing protocols rebuild the Routing Information Base (RIB) tables. After the routing protocols have converged, CEF updates the FIB table and removes stale route entries. CEF then updates the hardware with the new FIB information. If the active switch is configured for BGP (with the graceful-restart command), OSPF, or EIGRP routing protocols, routing updates are automatically sent during the active switch election. The switch supports NSF-awareness and NSF-capability for the BGP, OSPF, and EIGRP protocols in IP Services license level and NSF-awareness for the EIGRP-stub in IP Base license level. NSF has two primary components: · NSF-awareness A networking device is NSF-aware if it is running NSF-compatible software. If neighboring router devices detect that an NSF router can still forward packets when an active switch election happens, this capability is referred to as NSF-awareness. Cisco IOS enhancements to the Layer 3 routing protocols (BGP, OSPF, and EIGRP) are designed to prevent route-flapping so that the CEF routing table does not time out or the NSF router does not drop routes. An NSF-aware router helps to send routing protocol information to the neighboring NSF router. NSF-awareness is enabled by default for EIGRP-stub, EIGRP, and OSPF protocols. NSF-awareness is disabled by default for BGP. · NSF-capability A device is NSF-capable if it has been configured to support NSF; it rebuilds routing information from NSF-aware or NSF-capable neighbors. NSF works with SSO to minimize the amount of time that a Layer 3 network is unavailable following an active switch election by continuing to forward IP packets. Reconvergence of Layer 3 routing protocols (BGP, OSPFv2, and EIGRP) is transparent to the user and happens automatically in the background. The routing protocols recover routing information from neighbor devices and rebuild the Cisco Express Forwarding (CEF) table. Note NSF does not support IPv6 and is IPv4 Unicast only. Cisco Express Forwarding A key element of Cisco IOS Nonstop Forwarding (NSF) is packet forwarding. In a Cisco networking device, packet forwarding is provided by Cisco Express Forwarding (CEF). CEF maintains the FIB and uses the FIB Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1742 Stack Manager and High Availability BGP Operation information that was current at the time of the switchover to continue forwarding packets during a switchover. This feature reduces traffic interruption during the switchover. During normal NSF operation, CEF on the active supervisor switch synchronizes its current FIB and adjacency databases with the FIB and adjacency databases on the standby switch. Upon switchover, the standby switch initially has FIB and adjacency databases that are mirror images of those that were current on the active switch. CEF keeps the forwarding engine on the standby switch current with changes that are sent to it by CEF on the active switch. The forwarding engine can continue forwarding after a switchover as soon as the interfaces and a data path are available. As the routing protocols start to repopulate the RIB on a prefix-by-prefix basis, the updates cause prefix-by-prefix updates to CEF, which it uses to update the FIB and adjacency databases. Existing and new entries receive the new version ("epoch") number, indicating that they have been refreshed. The forwarding information is updated on the forwarding engine during convergence. The switch signals when the RIB has converged. The software removes all FIB and adjacency entries that have an epoch older than the current switchover epoch. The FIB now represents the newest routing protocol forwarding information. BGP Operation When an NSF-capable router begins a BGP session with a BGP peer, it sends an OPEN message to the peer. Included in the message is a statement that the NSF-capable device has "graceful" restart capability. Graceful restart is the mechanism by which BGP routing peers avoid a routing flap following a switchover. If the BGP peer has received this capability, it is aware that the device sending the message is NSF-capable. Both the NSF-capable router and its BGP peers need to exchange the graceful restart capability in their OPEN messages at the time of session establishment. If both the peers do not exchange the graceful restart capability, the session will not be capable of a graceful restart. If the BGP session is lost during the active switch switchover, the NSF-aware BGP peer marks all the routes associated with the NSF-capable router as stale; however, it continues to use these routes to make forwarding decisions for a set period of time. This functionality prevents packets from being lost while the newly active switch is waiting for convergence of the routing information with the BGP peers. After an active switch switchover occurs, the NSF-capable router reestablishes the session with the BGP peer. In establishing the new session, it sends a new graceful restart message that identifies the NSF-capable router as having restarted. At this point, the routing information is exchanged between the two BGP peers. After this exchange is complete, the NSF-capable device uses the routing information to update the RIB and the FIB with the new forwarding information. The NSF-aware device uses the network information to remove stale routes from its BGP table; the BGP protocol then is fully converged. If a BGP peer does not support the graceful restart capability, it ignores the graceful restart capability in an OPEN message but establishes a BGP session with the NSF-capable device. This function allows interoperability with non-NSF-aware BGP peers (and without NSF functionality), but the BGP session with non-NSF-aware BGP peers is not capable of a graceful restart. Note BGP support in NSF requires that neighbor networking devices be NSF-aware; that is, the devices must have the graceful restart capability and advertise that capability in their OPEN message during session establishment. If an NSF-capable router discovers that a particular BGP neighbor does not have graceful restart capability, it does not establish an NSF-capable session with that neighbor. All other neighbors that have graceful restart capability continue to have NSF-capable sessions with this NSF-capable networking device. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1743 OSPF Operation Stack Manager and High Availability OSPF Operation When an OSPF NSF-capable router performs an active switch switchover, it must perform the following tasks in order to resynchronize its link state database with its OSPF neighbors: · Relearn the available OSPF neighbors on the network without causing a reset of the neighbor relationship · Reacquire the contents of the link state database for the network As quickly as possible after an active switch switchover, the NSF-capable router sends an OSPF NSF signal to neighboring NSF-aware devices. Neighbor networking devices recognize this signal as an indicator that the neighbor relationship with this router should not be reset. As the NSF-capable router receives signals from other routers on the network, it can begin to rebuild its neighbor list. After neighbor relationships are reestablished, the NSF-capable router begins to resynchronize its database with all of its NSF-aware neighbors. At this point, the routing information is exchanged between the OSPF neighbors. Once this exchange is complete, the NSF-capable device uses the routing information to remove stale routes, update the RIB, and update the FIB with the new forwarding information. The OSPF protocols are then fully converged. Note OSPF support in NSF requires that all neighbor networking devices be NSF-aware. If an NSF-capable router discovers that it has non-NSF -aware neighbors on a particular network segment, it disables NSF capabilities for that segment. Other network segments composed entirely of NSF-capable or NSF-aware routers continue to provide NSF capabilities. EIGRP Operation When an EIGRP NSF-capable router initially re-boots after an NSF restart, it has no neighbor and its topology table is empty. The router is notified by the standby (now active) switch when it needs to bring up the interfaces, reacquire neighbors, and rebuild the topology and routing tables. The restarting router and its peers must accomplish these tasks without interrupting the data traffic directed toward the restarting router. EIGRP peer routers maintain the routes learned from the restarting router and continue forwarding traffic through the NSF restart process. To prevent an adjacency reset by the neighbors, the restarting router uses a new Restart (RS) bit in the EIGRP packet header to indicate a restart. The RS bit is set in the hello packets and in the initial INIT update packets during the NSF restart period. The RS bit in the hello packets allows the neighbors to be quickly notified of the NSF restart. Without seeing the RS bit, the neighbor can only detect an adjacency reset by receiving an INIT update or by the expiration of the hello hold timer. Without the RS bit, a neighbor does not know if the adjacency reset should be handled using NSF or the normal startup method. When the neighbor receives the restart indication, either by receiving the hello packet or the INIT packet, it recognizes the restarting peer in its peer list and maintains the adjacency with the restarting router. The neighbor then sends it topology table to the restarting router with the RS bit set in the first update packet indicating that it is NSF-aware and is helping out the restarting router. The neighbor does not set the RS bit in their hello packets, unless it is also a NSF restarting neighbor. Note A router may be NSF-aware but may not be helping the NSF restarting neighbor because booting from a cold start. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1744 Stack Manager and High Availability How to Configure Cisco NSF with SSO If at least one of the peer routers is NSF-aware, the restarting router would then receive updates and rebuild its database. The restarting router must then find out if it had converged so that it can notify the routing information base (RIB). Each NSF-aware router is required to send an end of table (EOT) marker in the last update packet to indicate the end of the table content. The restarting router knows it has converged when it receives the EOT marker. The restarting router can then begin sending updates. An NSF-aware peer would know when the restarting router had converged when it receives an EOT indication from the restarting router. The peer then scans its topology table to search for the routes with the restarted neighbor as the source. The peer compares the route timestamp with the restart event timestamp to determine if the route is still available. The peer then goes active to find alternate paths for the routes that are no longer available through the restarted router. When the restarting router has received all EOT indications from its neighbors or when the NSF converge timer expires, EIGRP notifies the RIB of convergence. EIGRP waits for the RIB convergence signal and then floods its topology table to all awaiting NSF-aware peers. How to Configure Cisco NSF with SSO Configuring SSO You must configure SSO in order to use NSF with any supported protocol. SUMMARY STEPS 1. redundancy 2. mode sso 3. end 4. show running-config 5. show redundancy states DETAILED STEPS Step 1 Command or Action redundancy Example: Switch(config)# redundancy Step 2 mode sso Example: Switch(config-red)# mode sso Step 3 end Example: Switch(config-red)# end Step 4 show running-config Example: Purpose Enters redundancy configuration mode. Configures SSO. When this command is entered, the standby switch is reloaded and begins to work in SSO mode. Returns to EXEC mode. Verifies that SSO is enabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1745 Configuring SSO Example Stack Manager and High Availability Step 5 Command or Action Switch# show running-config show redundancy states Example: Switch# show redundancy states Purpose Displays the operating redundancy mode. Configuring SSO Example This example shows how to configure the system for SSO and display the redundancy state: Switch(config)# redundancy Switch(config)# mode sso Switch(config)# end Switch# show redundancy states my state = 13 -ACTIVE peer state = 8 -STANDBY HOT Mode = Duplex Unit = Primary Unit ID = 5 Redundancy Mode (Operational) = sso Redundancy Mode (Configured) = sso Split Mode = Disabled Manual Swact = Enabled Communications = Up client count = 29 client_notification_TMR = 30000 milliseconds keep_alive TMR = 9000 milliseconds keep_alive count = 1 keep_alive threshold = 18 RF debug mask = 0x0 Configuring CEF NSF The CEF NSF feature operates by default while the networking device is running in SSO mode. No configuration is necessary. Verifying CEF NSF To verify CEF NSF, use the show cef state privileged EXEX command. Switch# show cef state CEF Status: RP instance common CEF enabled IPv4 CEF Status: CEF enabled/running dCEF enabled/running CEF switching enabled/running universal per-destination load sharing algorithm, id DEA83012 IPv6 CEF Status: CEF disabled/not running dCEF disabled/not running universal per-destination load sharing algorithm, id DEA83012 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1746 Stack Manager and High Availability Configuring BGP for NSF RRP state: I am standby RRP: no RF Peer Presence: yes RF PeerComm reached: yes RF Progression blocked: never Redundancy mode: rpr(1) CEF NSF sync: disabled/not running CEF ISSU Status: FIBHWIDB broker No slots are ISSU capable. FIBIDB broker No slots are ISSU capable. FIBHWIDB Subblock broker No slots are ISSU capable. FIBIDB Subblock broker No slots are ISSU capable. Adjacency update No slots are ISSU capable. IPv4 table broker No slots are ISSU capable. CEF push No slots are ISSU capable. Configuring BGP for NSF You must configure BGP graceful restart on all peer devices participating in BGP NSF. SUMMARY STEPS 1. configure terminal 2. router bgp as-number 3. bgp graceful-restart DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch(config)# configure terminal Step 2 router bgp as-number Example: Switch(config)# router bgp 300 Step 3 bgp graceful-restart Example: Switch(config)# bgp graceful-restart Purpose Enters global configuration mode. Enables a BGP routing process, which places the switch in switch configuration mode. Enables the BGP graceful restart capability, starting BGP NSF. If you enter this command after the BGP session has been established, you must restart the session for the capability to be exchanged with the BGP neighbor. Use this command on the restarting switch and all of its peers. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1747 Verifying BGP NSF Stack Manager and High Availability Verifying BGP NSF To verify BGP NSF, you must check that BGP graceful restart is configured on the SSO-enabled networking device and on the neighbor devices. To verify, follow these steps: Step 1 Step 2 Step 3 Verify that "bgp graceful-restart" appears in the BGP configuration of the SSO-enabled switch by entering the show running-config command: Example: Switch# show running-config . . . router bgp 120 . . . bgp graceful-restart neighbor 192.0.2.0 remote-as 300 . . . Repeat Step 1 on each of the BGP neighbors. On the SSO device and the neighbor device, verify that the graceful restart function is shown as both advertised and received, and confirm the address families that have the graceful restart capability. If no address families are listed, BGP NSF does not occur either: Example: Switch# show ip bgp neighbors BGP neighbor is 192.0.2.3, remote AS 1, internal link BGP version 4, remote router ID 192.0.2.4 BGP state = Established, up for 00:02:38 Last read 00:00:38, last write 00:00:35, hold time is 180, keepalive interval is 60 seconds Neighbor capabilities: Route refresh: advertised and received(new) Address family IPv4 Unicast: advertised and received Message statistics: InQ depth is 0 OutQ depth is 0 Sent Rcvd Opens: 1 1 Notifications: 0 0 Updates: 0 0 Keepalives: 4 4 Route Refresh: 0 0 Total: 5 5 Default minimum time between advertisement runs is 0 seconds ............................................................ (Remaining output deleted) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1748 Stack Manager and High Availability Configuring OSPF NSF Configuring OSPF NSF All peer devices participating in OSPF NSF must be made OSPF NSF-aware, which happens automatically when you install an NSF software image on the device. SUMMARY STEPS 1. configure terminal 2. router ospf processID 3. nsf DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch(config)# configure terminal Step 2 router ospf processID Example: Switch(config)# router ospf processID Step 3 nsf Example: Switch(config)# nsf Purpose Enters global configuration mode. Enables an OSPF routing process, which places the switch in router configuration mode. Enables NSF operations for OSPF. Verifying OSPF NSF Step 1 Verify that `nsf' appears in the OSPF configuration of the SSO-enabled device by entering the show running-config command: Example: Switch(config)#show running-config route ospf 120 log-adjacency-changes nsf network 192.0.2.0 192.0.2.255 area 0 network 192.0.2.1 192.0.2.255 area 1 network 192.0.2.2 192.0.2.255 area 2 . . . Step 2 Enter the show ip ospf command to verify that NSF is enabled on the device: Example: Switch show ip ospf Routing Process "ospf 1" with ID 192.0.2.1 Start time: 00:02:07.532, Time elapsed: 00:39:05.052 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1749 Configuring EIGRP NSF Stack Manager and High Availability Supports only single TOS(TOS0) routes Supports opaque LSA Supports Link-local Signaling (LLS) transit capable is 0 External flood list length 0 IETF Non-Stop Forwarding enabled restart-interval limit: 120 sec IETF NSF helper support enabled Cisco NSF helper support enabled Reference bandwidth unit is 100 mbps Area BACKBONE(0) Number of interfaces in this area is 3 (1 loopback) Area has no authentication SPF algorithm last executed 00:08:53.760 ago SPF algorithm executed 2 times Area ranges are Number of LSA 3. Checksum Sum 0x025BE0 Number of opaque link LSA 0. Checksum Sum 0x000000 Number of DCbitless LSA 0 Number of indication LSA 0 Number of DoNotAge LSA 0 Flood list length 0 Configuring EIGRP NSF SUMMARY STEPS 1. configure terminal 2. router eigrp as-number 3. nsf DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch configure terminal Step 2 router eigrp as-number Example: Switch(config)# router eigrp as-number Step 3 nsf Example: Switch(config-router)# nsf Purpose Enters global configuration mode. Enables an EIGRP routing process, which places the switch in router configuration mode. Enables EIGRP NSF. Use this command on the "restarting" switch and all of its peers. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1750 Stack Manager and High Availability Verifying EIGRP NSF Verifying EIGRP NSF Step 1 Verify that "nsf" appears in the EIGRP configuration of the SSO-enabled device by entering the show running-config command: Example: Switch show running-config .. . router eigrp 100 auto-summary nsf .. . Step 2 Enter the show ip protocols command to verify that NSF is enabled on the device: Example: Switch show ip protocols *** IP Routing is NSF aware *** Routing Protocol is "ospf 1" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Router ID 192.0.2.3 Number of areas in this router is 1. 1 normal 0 stub 0 nssa Maximum path: 1 Routing for Networks: Routing on Interfaces Configured Explicitly (Area 0): Loopback0 GigabitEthernet5/3 TenGigabitEthernet3/1 Routing Information Sources: Gateway Distance Last Update 192.0.2.1 110 00:01:02 Distance: (default is 110) Routing Protocol is "bgp 601" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set IGP synchronization is disabled Automatic route summarization is disabled Neighbor(s): Address FiltIn FiltOut DistIn DistOut Weight RouteMap 192.0.2.0 Maximum path: 1 Routing Information Sources: Gateway Distance Last Update 192.0.2.0 20 00:01:03 Distance: external 20 internal 200 local 200 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1751 Additional References for NSF with SSO Stack Manager and High Availability Additional References for NSF with SSO Related Documents Related Topic Document Title IP Routing: BGP IP Routing: BGP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) IP Routing: EIGRP IP Routing: EIGRP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) IP Routing: OSPF IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and , use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1752 Stack Manager and High Availability Feature History and Information for NSF with SSO Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for NSF with SSO Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1753 Feature History and Information for NSF with SSO Stack Manager and High Availability Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1754 8 6 C H A P T E R Configuring Wireless High Availability · Finding Feature Information, on page 1755 · Information about High Availability, on page 1755 · Information about Access Point Stateful Switch Over , on page 1755 · Initiating Graceful Switchover, on page 1756 · Configuring EtherChannels, on page 1756 · Configuring LACP, on page 1756 · Troubleshooting High Availability, on page 1758 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information about High Availability The high availability feature is enabled by default when the switches are connected using the stack cable and the Cisco StackWise-160 technology is enabled. You cannot disable it; however, you can initiate a manual graceful-switchover using the command line interface to use the high availability feature enabled in the switch. Information about Access Point Stateful Switch Over An Access Point Stateful Switch Over (AP SSO) implies that all the access point sessions are switched over state-fully and the user session information is maintained during a switchover, and access points continue to operate in network with no loss of sessions, providing improved network availability. The active switch in the stack is equipped to perform all network functions, including IP functions and routing information exchange. The switch supports 1000 access points and 12000 clients. However, all the clients are de-authenticated and need to be re-associated with the new active switch except for the locally switched clients in FlexConnect mode when a switchover occurs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1755 Initiating Graceful Switchover Stack Manager and High Availability Once a redundancy pair is formed while in a stack, high availability is enabled, which includes that access points continue to remain connected during an active-to-standby switchover. Note You can not disable AP SSO while in a switch stack once the switches form a redundant pair. Initiating Graceful Switchover To perform a manual switchover and to use the high availability feature enabled in the switch, execute the redundancy force-switchover command. This command initiates a graceful switchover from the active to the standby switch. Switch# redundancy force-switchover System configuration has been modified. Save ? [yes/no] : yes Building configuration ... Preparing for switchover ... Compressed configuration from 14977 bytes to 6592 bytes[OK]This will reload the active unit and force switchover to standby[confirm] : y Configuring EtherChannels The LAG, or an EtherChannel, bundles all the existing ports in both the standby and active units into a single logical port to provide an aggregate bandwidth of 60 Gbps. The creation of an EtherChannel enables protection against failures. The EtherChannels or LAGs created are used for link redundancy to ensure high availability of access points. Step 1 Step 2 Step 3 Step 4 Step 5 Connect two switches that are in powered down state using the stack cable. Power up and perform a boot on both switches simultaneously or power and boot one switch. The switches boot up successfully, and form a high availability pair. Configure EtherChannel or LAG on the units. Use the show etherchannel summary command to view the status of the configured EtherChannel. On successful configuration, all the specified ports will be bundled in a single channel and listed in the command output of show etherchannel summary. Execute the show ap uptime command to verify the connected access points. Configuring LACP SUMMARY STEPS 1. configure terminal 2. interface port-channel number Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1756 Stack Manager and High Availability Configuring LACP 3. lacp max-bundle number 4. lacp port-priority number 5. switchport backup interface po2 6. end 7. show etherchannel summary 8. show interfaces switchport backup DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 interface port-channel number Example: Switch(config)# interface Port-channel Po2 Enters port-channel interface configuration mode. Step 3 lacp max-bundle number Example: Switch(config-if)# lacp max-bundle 6 Defines the maximum number of active bundled LACP ports allowed in a port channel. The value ranges from 1 to 8. Step 4 lacp port-priority number Example: Switch(config-if)# lacp port-priority 4 Specifies port priority to be configured on the port using LACP. The value ranges from 0 to 65535. Step 5 switchport backup interface po2 Specifies an interface as the backup interface. Example: Switch(config-if)# switchport backup interface Po2 Step 6 Step 7 end show etherchannel summary Example: Switch# show etherchannel summary Exits the interface and configuration mode. Displays a summary of EtherChannel properties. Step 8 show interfaces switchport backup Example: Switch# show interfaces switchport backup Displays summary of backup EtherChannel properties. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1757 Troubleshooting High Availability Stack Manager and High Availability Troubleshooting High Availability Access the Standby Console You can only access the console of the active switch in a stack. To access the standby switch, use the following commands. Before you begin Use this functionality only under supervision of Cisco Support. SUMMARY STEPS 1. configure terminal 2. service internal 3. redundancy 4. main-cpu 5. standby console enable 6. exit DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 service internal Example: Switch(config)# service internal Step 3 redundancy Example: Switch(config)# redundancy Step 4 main-cpu Example: Switch(config)# main-cpu Step 5 standby console enable Example: Switch(config)# standby console enable Step 6 exit Example: Purpose Enters global configuration mode. Enables Cisco IOS debug commands. Enters redundancy configuration mode. Enters the redundancy main configuration submode. Enables the standby console. Exits the configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1758 Stack Manager and High Availability Before a Switchover Command or Action Switch(config)# exit Purpose Before a Switchover A switchover happens when the active switch fails; however, while performing a manual switchover, you can execute these commands to initiate a successful switchover: SUMMARY STEPS 1. show redundancy states 2. show switch detail 3. show platform ses states 4. show ap summary 5. show capwap detail 6. show dtls database-brief 7. show power inline DETAILED STEPS Step 1 Command or Action show redundancy states Example: Switch# show redundancy states Step 2 show switch detail Example: Switch# show switch detail Step 3 show platform ses states Example: Switch# show platform ses states Step 4 show ap summary Example: Switch# show ap summary Step 5 show capwap detail Example: Switch# show capwap detail Step 6 show dtls database-brief Example: Switch# show dtls database-brief Step 7 show power inline Purpose Displays the high availability role of the active and standby switches. Display physical property of the stack. Verify if the physical states of the stacks are "Ready" or "Port". Displays the sequences of the stack manager. Displays all the access points in the active and standby switches. Displays the details of the CAPWAP tunnel in the active and standby switches. Displays DTLS details in the active and standby switches. Displays the power on Ethernet power state. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1759 After a Switchover Stack Manager and High Availability Command or Action Example: Switch# show power inline Purpose Note When a failover occurs, the standby controller must be in a standby-hot state and the redundant port in a terminal state in SSO for successful switchover to occur. After a Switchover This section defines the steps that you must perform to ensure that successful switchover from the active to standby switch is performed. On successful switchover of the standby switch as active, all access points connected to the active need to re-join the standby (then active) switch. SUMMARY STEPS 1. show ap uptime 2. show wireless summary 3. show wcdb database all 4. show power inline DETAILED STEPS Step 1 Command or Action show ap uptime Example: Switch# show ap uptime Step 2 show wireless summary Example: Switch# show wireless summary Step 3 show wcdb database all Example: Switch# show wcdb database all Step 4 show power inline Example: Switch# show power inline Purpose Verify if the uptime of the access point after the switchover is large enough. Display the clients connected in the active switch. Display if the client has reached the uptime. Display the power over Ethernet power state. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1760 Stack Manager and High Availability Monitoring the Switch Stack Monitoring the Switch Stack Table 156: Commands for Displaying Stack Information Command Description show switch Displays summary information about the stack, including the status of provisioned switches and switches in version-mismatch mode. show switch stack-member-number Displays information about a specific member. show switch detail Displays detailed information about the stack. show switch neighbors Displays the stack neighbors. show switch stack-ports [summary] Displays port information for the stack. show redundancy Displays the redundant system and the current processor information. The redundant system information includes the system uptime, standby failures, switchover reason, hardware, configured and operating redundancy mode. The current processor information displayed includes the active location, the software state, the uptime in the current state and so on. show redundancy state Displays all the redundancy states of the active and standby switches. LACP Configuration: Example This example shows how to configure LACP and to verify creation of the LACP bundle and the status: Switch(config)# ! interface TenGigabitEthernet1/0/1 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet1/0/2 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet1/0/3 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet1/0/4 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet1/0/5 switchport mode trunk Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1761 LACP Configuration: Example Stack Manager and High Availability channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet1/0/6 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet2/0/1 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet2/0/2 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet2/0/3 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet2/0/4 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet2/0/5 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet2/0/6 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface Vlan1 no ip address ip igmp version 1 shutdown ! Switch# show etherchannel summary Flags: D - down P - bundled in port-channel I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3 S - Layer2 U - in use f - failed to allocate aggregator M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port Number of channel-groups in use: 1 Number of aggregators: 1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1762 Stack Manager and High Availability Flex Link Configuration: Example Group Port-channel Protocol Ports ------+-------------+-----------+----------------------------------------------- 1 Po1(SU) LACP Te1/0/1(P) Te1/0/2(P) Te1/0/3(P) Te1/0/4(H) Te1/0/5(H) Te1/0/6(H) Te2/0/1(P) Te2/0/2(P) Te2/0/3(P) Te2/0/4(H) Te2/0/5(H) Te2/0/6(H) This example shows the switch backup interface pairs: Switch# show interfaces switchport backup Switch Backup Interface Pairs: Active Interface Backup Interface State ------------------------------------------------------------------------ Port-channel1 Port-channel2 Active Standby/Backup Up This example shows the summary of the EtherChannel configured in the switch: Switch# show ethernet summary Flags: D - down P - bundled in port-channel I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3 S - Layer2 U - in use f - failed to allocate aggregator M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port Number of channel-groups in use: 2 Number of aggregators: 2 Group Port-channel Protocol Ports ------+-------------+-----------+----------------------------------------------- 1 Po1(SU) LACP Te1/0/1(P) Te1/0/2(P) Te1/0/3(P) Te1/0/4(P) Te1/0/5(P) Te1/0/6(P) 2 Po2(SU) LACP Te2/0/1(P) Te2/0/2(P) Te2/0/3(P) Te2/0/4(P) Te2/0/5(P) Te2/0/6(P) Flex Link Configuration: Example This example shows how to configure flex link and to verify creation and the status of the created link: Switch(config)# ! interface Port-channel1 description Ports 1-6 connected to NW-55-SW switchport mode trunk switchport backup interface Po2 switchport backup interface Po2 preemption mode forced switchport backup interface Po2 preemption delay 1 ip dhcp snooping trust ! interface Port-channel2 description Ports 7-12connected to NW-55-SW switchport mode trunk ip dhcp snooping trust ! interface GigabitEthernet0/0 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1763 Flex Link Configuration: Example vrf forwarding Mgmt-vrf no ip address negotiation auto ! interface TenGigabitEthernet1/0/1 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/2 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/3 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/4 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/5 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/6 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/1 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/2 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/3 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/4 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/5 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/6 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! Stack Manager and High Availability Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1764 Stack Manager and High Availability Viewing Redundancy Switchover History (GUI) interface Vlan1 no ip address Switch# show etherchannel summary Flags: D - down P - bundled in port-channel I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3 S - Layer2 U - in use f - failed to allocate aggregator M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port Number of channel-groups in use: 2 Number of aggregators: 2 Group Port-channel Protocol Ports ------+-------------+-----------+----------------------------------------------- 1 Po1(SU) - Te1/0/1(P) Te1/0/2(P) Te1/0/3(P) Te1/0/4(P) Te1/0/5(P) Te1/0/6(P) 2 Po2(SU) - Te2/0/1(P) Te2/0/2(P) Te2/0/3(D) Te2/0/4(P) Te2/0/5(P) Te2/0/6(P) Viewing Redundancy Switchover History (GUI) Step 1 Step 2 Click Monitor > Controller > Redundancy > States. The Redundancy States page is displayed. The values for the following parameters are displayed in the page: Parameter Description Index Displays the index number of the of the redundant unit. Previous Active Displays the Switches that was active before. Current Active Displays the Switches that is currently active. Switch Over Time Displays the system time when the switchover occurs. Switch Over Reason Displays the cause of the switchover. Click Apply. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1765 Viewing Switchover States (GUI) Stack Manager and High Availability Viewing Switchover States (GUI) Step 1 Step 2 Click Monitor > Controller > Redundancy > States. The Redundancy States page is displayed. The values for the following parameters are displayed in the page: Parameter My State Description Shows the state of the active CPU Switch module. Values are as follows: · Active · Standby HOT · Disable Peer State Displays the state of the peer (or standby) CPU Switch module. Values are as follows: · Standby HOT · Disable Mode Displays the current state of the redundancy peer. Values are as follows: · Simplex-- Single CPU switch module · Duplex-- Two CPU switch modules Unit ID Redundancy Mode (Operational) Redundancy Mode (Configured) Redundancy State Displays the unit ID of the CPU switch module. Displays the current operational redundancy mode supported on the unit. Displays the current configured redundancy mode supported on the unit. Displays the current functioning redundancy state of the unit. Values are as follows: · SSP · Not Redundant Manual SWACT Displays whether manual switchovers have been enabled without the force option. Communications Displays whether communications are up or down between the two CPU Switch modules. Client Count Displays the number of redundancy subsystems that are registered as RF clients. Client Notification TMR Displays, in milliseconds, the time that an internal RF timer has for notifying RF client subsystems. Keep Alive TMR Displays, in milliseconds, the time interval the RF manager has for sending keep-alive messages to its peer on the standby CPU switch module. Keep Alive Count Displays the number of keep-alive messages sent without receiving a response from the standby CPU Switch module. Keep Alive Threshold Displays the threshold for declaring that interprocessor communications are down when keep-alive messages have been enabled (which is the default). RF Debug Mask Displays an internal mask used by the RF to keep track of which debug modes are on. Click Apply. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1766 Stack Manager and High Availability Viewing Switchover States (GUI) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1767 Viewing Switchover States (GUI) Stack Manager and High Availability Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1768 X V P A R T System Management · Administering the System, on page 1771 · Performing Switch Setup Configuration, on page 1795 · Configuring Right-To-Use Licenses, on page 1831 · Configuring Administrator Usernames and Passwords, on page 1847 · Configuring 802.11 parameters and Band Selection, on page 1853 · Configuring Aggressive Load Balancing, on page 1873 · Configuring Client Roaming, on page 1879 · Configuring Application Visibility and Control, on page 1893 · Configuring Voice and Video Parameters, on page 1923 · Configuring RFID Tag Tracking, on page 1945 · Configuring Location Settings, on page 1949 · Monitoring Flow Control, on page 1959 · Configuring SDM Templates, on page 1963 · Configuring System Message Logs, on page 1969 · Configuring Online Diagnostics, on page 1985 · Managing Configuration Files, on page 1995 · Configuration Replace and Configuration Rollback, on page 2033 · Working with the Flash File System, on page 2049 · Working with Cisco IOS XE Software Bundles, on page 2061 · Troubleshooting the Software Configuration, on page 2073 8 7 C H A P T E R Administering the System · Finding Feature Information, on page 1771 · Information About Administering the Switch, on page 1771 · How to Administer the Switch, on page 1777 · Monitoring and Maintaining Administration of the Switch, on page 1790 · Configuration Examples for Switch Administration, on page 1791 · Additional References for Switch Administration, on page 1793 · Feature History and Information for Switch Administration, on page 1794 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Administering the Switch System Time and Date Management You can manage the system time and date on your switch using automatic configuration methods (RTC and NTP), or manual configuration methods. System Clock The basis of the time service is the system clock. This clock runs from the moment the system starts up and keeps track of the date and time. The system clock can then be set from these sources: · NTP · Manual configuration Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1771 Network Time Protocol System Management The system clock can provide time to these services: · User show commands · Logging and debugging messages The system clock keeps track of time internally based on Coordinated Universal Time (UTC), also known as Greenwich Mean Time (GMT). You can configure information about the local time zone and summer time (daylight saving time) so that the time appears correctly for the local time zone. The system clock keeps track of whether the time is authoritative or not (that is, whether it has been set by a time source considered to be authoritative). If it is not authoritative, the time is available only for display purposes and is not redistributed. Network Time Protocol The NTP is designed to time-synchronize a network of devices. NTP runs over User Datagram Protocol (UDP), which runs over IP. NTP is documented in RFC 1305. An NTP network usually gets its time from an authoritative time source, such as a radio clock or an atomic clock attached to a time server. NTP then distributes this time across the network. NTP is extremely efficient; no more than one packet per minute is necessary to synchronize two devices to within a millisecond of one another. NTP Stratum NTP uses the concept of a stratum to describe how many NTP hops away a device is from an authoritative time source. A stratum 1 time server has a radio or atomic clock directly attached, a stratum 2 time server receives its time through NTP from a stratum 1 time server, and so on. A device running NTP automatically chooses as its time source the device with the lowest stratum number with which it communicates through NTP. This strategy effectively builds a self-organizing tree of NTP speakers. NTP avoids synchronizing to a device whose time might not be accurate by never synchronizing to a device that is not synchronized. NTP also compares the time reported by several devices and does not synchronize to a device whose time is significantly different than the others, even if its stratum is lower. NTP Associations The communications between devices running NTP (known as associations) are usually statically configured; each device is given the IP address of all devices with which it should form associations. Accurate timekeeping is possible by exchanging NTP messages between each pair of devices with an association. However, in a LAN environment, NTP can be configured to use IP broadcast messages instead. This alternative reduces configuration complexity because each device can simply be configured to send or receive broadcast messages. However, in that case, information flow is one-way only. NTP Security The time kept on a device is a critical resource; you should use the security features of NTP to avoid the accidental or malicious setting of an incorrect time. Two mechanisms are available: an access list-based restriction scheme and an encrypted authentication mechanism. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1772 System Management NTP Implementation NTP Implementation Implementation of NTP does not support stratum 1 service; it is not possible to connect to a radio or atomic clock. We recommend that the time service for your network be derived from the public NTP servers available on the IP Internet. Figure 97: Typical NTP Network Configuration The following figure shows a typical network example using NTP. Switch A is the NTP master, with the Switch B, C, and D configured in NTP server mode, in server association with Switch A. Switch E is configured as an NTP peer to the upstream and downstream switches, Switch B and Switch F, respectively. If the network is isolated from the Internet, NTP allows a device to act as if it is synchronized through NTP, when in fact it has learned the time by using other means. Other devices then synchronize to that device through NTP. When multiple sources of time are available, NTP is always considered to be more authoritative. NTP time overrides the time set by any other method. Several manufacturers include NTP software for their host systems, and a publicly available version for systems running UNIX and its various derivatives is also available. This software allows host systems to be time-synchronized as well. NTP Version 4 NTP version 4 is implemented on the switch. NTPv4 is an extension of NTP version 3. NTPv4 supports both IPv4 and IPv6 and is backward-compatible with NTPv3. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1773 System Name and Prompt System Management NTPv4 provides these capabilities: · Support for IPv6. · Improved security compared to NTPv3. The NTPv4 protocol provides a security framework based on public key cryptography and standard X509 certificates. · Automatic calculation of the time-distribution hierarchy for a network. Using specific multicast groups, NTPv4 automatically configures the hierarchy of the servers to achieve the best time accuracy for the lowest bandwidth cost. This feature leverages site-local IPv6 multicast addresses. System Name and Prompt You configure the system name on the switch to identify it. By default, the system name and prompt are Switch. If you have not configured a system prompt, the first 20 characters of the system name are used as the system prompt. A greater-than symbol [>] is appended. The prompt is updated whenever the system name changes. Stack System Name and Prompt If you are accessing a stack member through the active switch, you must use the session stack-member-number privileged EXEC command. The stack member number range is . When you use this command, the stack member number is appended to the system prompt. For example, Switch-2# is the prompt in privileged EXEC mode for stack member 2, and the system prompt for the switch stack is Switch. Default System Name and Prompt Configuration The default switch system name and prompt is Switch. DNS The DNS protocol controls the Domain Name System (DNS), a distributed database with which you can map hostnames to IP addresses. When you configure DNS on your switch, you can substitute the hostname for the IP address with all IP commands, such as ping, telnet, connect, and related Telnet support operations. IP defines a hierarchical naming scheme that allows a device to be identified by its location or domain. Domain names are pieced together with periods (.) as the delimiting characters. For example, Cisco Systems is a commercial organization that IP identifies by a com domain name, so its domain name is cisco.com. A specific device in this domain, for example, the File Transfer Protocol (FTP) system is identified as ftp.cisco.com. To keep track of domain names, IP has defined the concept of a domain name server, which holds a cache (or database) of names mapped to IP addresses. To map domain names to IP addresses, you must first identify the hostnames, specify the name server that is present on your network, and enable the DNS. Default DNS Settings Table 157: Default DNS Settings Feature DNS enable state Default Setting Enabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1774 System Management Login Banners Feature DNS default domain name DNS servers Default Setting None configured. No name server addresses are configured. Login Banners You can configure a message-of-the-day (MOTD) and a login banner. The MOTD banner is displayed on all connected terminals at login and is useful for sending messages that affect all network users (such as impending system shutdowns). The login banner is also displayed on all connected terminals. It appears after the MOTD banner and before the login prompts. The MOTD and login banners are not configured. Default Banner Configuration The MOTD and login banners are not configured. MAC Address Table The MAC address table contains address information that the switch uses to forward traffic between ports. All MAC addresses in the address table are associated with one or more ports. The address table includes these types of addresses: · Dynamic address--A source MAC address that the switch learns and then ages when it is not in use. · Static address--A manually entered unicast address that does not age and that is not lost when the switch resets. The address table lists the destination MAC address, the associated VLAN ID, and port number associated with the address and the type (static or dynamic). MAC Address Table Creation With multiple MAC addresses supported on all ports, you can connect any port on the switch to other network devices. The switch provides dynamic addressing by learning the source address of packets it receives on each port and adding the address and its associated port number to the address table. As devices are added or removed from the network, the switch updates the address table, adding new dynamic addresses and aging out those that are not in use. The aging interval is globally configured. However, the switch maintains an address table for each VLAN, and STP can accelerate the aging interval on a per-VLAN basis. The switch sends packets between any combination of ports, based on the destination address of the received packet. Using the MAC address table, the switch forwards the packet only to the port associated with the destination address. If the destination address is on the port that sent the packet, the packet is filtered and not forwarded. The switch always uses the store-and-forward method: complete packets are stored and checked for errors before transmission. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1775 MAC Addresses and VLANs System Management MAC Addresses and VLANs All addresses are associated with a VLAN. An address can exist in more than one VLAN and have different destinations in each. Unicast addresses, for example, could be forwarded to port 1 in VLAN 1 and ports 9, 10, and 1 in VLAN 5. Each VLAN maintains its own logical address table. A known address in one VLAN is unknown in another until it is learned or statically associated with a port in the other VLAN. MAC Addresses and Switch Stacks The MAC address tables on all stack members are synchronized. At any given time, each stack member has the same copy of the address tables for each VLAN. When an address ages out, the address is removed from the address tables on all stack members. When a switch joins a switch stack, that switch receives the addresses for each VLAN learned on the other stack members. When a stack member leaves the switch stack, the remaining stack members age out or remove all addresses learned by the former stack member. Default MAC Address Table Settings The following table shows the default settings for the MAC address table. Table 158: Default Settings for the MAC Address Feature Aging time Dynamic addresses Static addresses Default Setting 300 seconds Automatically learned None configured ARP Table Management To communicate with a device (over Ethernet, for example), the software first must learn the 48-bit MAC address or the local data link address of that device. The process of learning the local data link address from an IP address is called address resolution. The Address Resolution Protocol (ARP) associates a host IP address with the corresponding media or MAC addresses and the VLAN ID. Using an IP address, ARP finds the associated MAC address. When a MAC address is found, the IP-MAC address association is stored in an ARP cache for rapid retrieval. Then the IP datagram is encapsulated in a link-layer frame and sent over the network. Encapsulation of IP datagrams and ARP requests and replies on IEEE 802 networks other than Ethernet is specified by the Subnetwork Access Protocol (SNAP). By default, standard Ethernet-style ARP encapsulation (represented by the arpa keyword) is enabled on the IP interface. ARP entries added manually to the table do not age and must be manually removed. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1776 System Management How to Administer the Switch How to Administer the Switch Configuring the Time and Date Manually System time remains accurate through restarts and reboot, however, you can manually configure the time and date after the system is restarted. We recommend that you use manual configuration only when necessary. If you have an outside source to which the switch can synchronize, you do not need to manually set the system clock. Note You must reconfigure this setting if you have manually configured the system clock before the active switch fails and a different stack member assumes the role of active switch. Setting the System Clock If you have an outside source on the network that provides time services, such as an NTP server, you do not need to manually set the system clock. SUMMARY STEPS 1. Use one of the following: · clock set hh:mm:ss day month year · clock set hh:mm:ss month day year DETAILED STEPS Step 1 Command or Action Use one of the following: · clock set hh:mm:ss day month year · clock set hh:mm:ss month day year Example: Switch# clock set 13:32:00 23 March 2013 Purpose Sets the system clock using one of these formats: · hh:mm:ss--Specifies the time in hours (24-hour format), minutes, and seconds. The time specified is relative to the configured time zone. · day--Specifies the day by date in the month. · month--Specifies the month by name. · year--Specifies the year (no abbreviation). Configuring the Time Zone SUMMARY STEPS 1. configure terminal 2. clock timezone zone hours-offset [minutes-offset] 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1777 Configuring Summer Time (Daylight Saving Time) System Management DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 clock timezone zone hours-offset [minutes-offset] Example: Switch(config)# clock timezone AST -3 30 Step 3 end Example: Switch(config)# end Purpose Enters global configuration mode. Sets the time zone. Internal time is kept in Coordinated Universal Time (UTC), so this command is used only for display purposes and when the time is manually set. · zone--Enters the name of the time zone to be displayed when standard time is in effect. The default is UTC. · hours-offset--Enters the hours offset from UTC. · (Optional) minutes-offset--Enters the minutes offset from UTC. This available where the local time zone is a percentage of an hour different from UTC. Returns to privileged EXEC mode. Configuring Summer Time (Daylight Saving Time) To configure summer time (daylight saving time) in areas where it starts and ends on a particular day of the week each year, perform this task: SUMMARY STEPS 1. configure terminal 2. clock summer-time zone date date month year hh:mm date month year hh:mm [offset]] 3. clock summer-time zone recurring [week day month hh:mm week day month hh:mm [offset]] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1778 System Management Configuring a System Name Step 2 Command or Action clock summer-time zone date date month year hh:mm date month year hh:mm [offset]] Example: Purpose Configures summer time to start and end on specified days every year. Switch(config)# clock summer-time PDT date 10 March 2013 2:00 3 November 2013 2:00 Step 3 Step 4 clock summer-time zone recurring [week day month hh:mm week day month hh:mm [offset]] Example: Switch(config)# clock summer-time PDT recurring 10 March 2013 2:00 3 November 2013 2:00 Configures summer time to start and end on the specified days every year. All times are relative to the local time zone. The start time is relative to standard time. The end time is relative to summer time. Summer time is disabled by default. If you specify clock summer-time zone recurring without parameters, the summer time rules default to the United States rules. If the starting month is after the ending month, the system assumes that you are in the southern hemisphere. · zone--Specifies the name of the time zone (for example, PDT) to be displayed when summer time is in effect. · (Optional) week-- Specifies the week of the month (1 to 4, first, or last). · (Optional) day--Specifies the day of the week (Sunday, Monday...). · (Optional) month--Specifies the month (January, February...). · (Optional) hh:mm--Specifies the time (24-hour format) in hours and minutes. · (Optional) offset--Specifies the number of minutes to add during summer time. The default is 60. end Example: Returns to privileged EXEC mode. Switch(config)# end Configuring a System Name SUMMARY STEPS 1. configure terminal 2. hostname name Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1779 Setting Up DNS System Management 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 hostname name Example: Switch(config)# hostname remote-users Step 3 end Example: Switch(config)# end Purpose Enters global configuration mode. Configures a system name. When you set the system name, it is also used as the system prompt. The default setting is Switch. The name must follow the rules for ARPANET hostnames. They must start with a letter, end with a letter or digit, and have as interior characters only letters, digits, and hyphens. Names can be up to 63 characters. Returns to privileged EXEC mode. Setting Up DNS If you use the switch IP address as its hostname, the IP address is used and no DNS query occurs. If you configure a hostname that contains no periods (.), a period followed by the default domain name is appended to the hostname before the DNS query is made to map the name to an IP address. The default domain name is the value set by the ip domain-name global configuration command. If there is a period (.) in the hostname, the Cisco IOS software looks up the IP address without appending any default domain name to the hostname. SUMMARY STEPS 1. configure terminal 2. ip domain-name name 3. ip name-server server-address1 [server-address2 ... server-address6] 4. ip domain-lookup [nsap | source-interface interface] 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1780 System Management Configuring a Message-of-the-Day Login Banner Command or Action Switch# configure terminal Purpose Step 2 Step 3 Step 4 Step 5 ip domain-name name Example: Switch(config)# ip domain-name Cisco.com ip name-server server-address1 [server-address2 ... server-address6] Example: Switch(config)# ip name-server 192.168.1.100 192.168.1.200 192.168.1.300 Defines a default domain name that the software uses to complete unqualified hostnames (names without a dotted-decimal domain name). Do not include the initial period that separates an unqualified name from the domain name. At boot time, no domain name is configured; however, if the switch configuration comes from a BOOTP or Dynamic Host Configuration Protocol (DHCP) server, then the default domain name might be set by the BOOTP or DHCP server (if the servers were configured with this information). Specifies the address of one or more name servers to use for name and address resolution. You can specify up to six name servers. Separate each server address with a space. The first server specified is the primary server. The switch sends DNS queries to the primary server first. If that query fails, the backup servers are queried. ip domain-lookup [nsap | source-interface interface] Example: Switch(config)# ip domain-lookup end Example: (Optional) Enables DNS-based hostname-to-address translation on your switch. This feature is enabled by default. If your network devices require connectivity with devices in networks for which you do not control name assignment, you can dynamically assign device names that uniquely identify your devices by using the global Internet naming scheme (DNS). Returns to privileged EXEC mode. Switch(config)# end Configuring a Message-of-the-Day Login Banner You can create a single or multiline message banner that appears on the screen when someone logs in to the switch SUMMARY STEPS 1. configure terminal 2. banner motd c message c Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1781 Configuring a Login Banner System Management 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 banner motd c message c Example: Switch(config)# banner motd # This is a secure site. Only authorized users are allowed. For access, contact technical support. # Step 3 end Example: Switch(config)# end Purpose Enters global configuration mode. Specifies the message of the day. c--Enters the delimiting character of your choice, for example, a pound sign (#), and press the Return key. The delimiting character signifies the beginning and end of the banner text. Characters after the ending delimiter are discarded. message--Enters a banner message up to 255 characters. You cannot use the delimiting character in the message. Returns to privileged EXEC mode. Configuring a Login Banner You can configure a login banner to be displayed on all connected terminals. This banner appears after the MOTD banner and before the login prompt. SUMMARY STEPS 1. configure terminal 2. banner login c message c 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 banner login c message c Specifies the login message. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1782 System Management Managing the MAC Address Table Command or Action Example: Switch(config)# banner login $ Access for authorized users only. Please enter your username and password. $ Step 3 end Example: Switch(config)# end Purpose c-- Enters the delimiting character of your choice, for example, a pound sign (#), and press the Return key. The delimiting character signifies the beginning and end of the banner text. Characters after the ending delimiter are discarded. message--Enters a login message up to 255 characters. You cannot use the delimiting character in the message. Returns to privileged EXEC mode. Managing the MAC Address Table Changing the Address Aging Time SUMMARY STEPS 1. configure terminal 2. mac address-table aging-time [0 | 10-1000000] [routed-mac | vlan vlan-id] 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 mac address-table aging-time [0 | 10-1000000] [routed-mac | vlan vlan-id] Example: Switch(config)# mac address-table aging-time 500 vlan 2 Step 3 end Example: Switch(config)# end Sets the length of time that a dynamic entry remains in the MAC address table after the entry is used or updated. The range is 10 to 1000000 seconds. The default is 300. You can also enter 0, which disables aging. Static address entries are never aged or removed from the table. vlan-id--Valid IDs are 1 to 4094. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1783 Configuring MAC Address Change Notification Traps System Management Configuring MAC Address Change Notification Traps SUMMARY STEPS 1. configure terminal 2. snmp-server host host-addr community-string notification-type { informs | traps } {version {1 | 2c | 3}} {vrf vrf instance name} 3. snmp-server enable traps mac-notification change 4. mac address-table notification change 5. mac address-table notification change [interval value] [history-size value] 6. interface interface-id 7. snmp trap mac-notification change {added | removed} 8. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 snmp-server host host-addr community-string Specifies the recipient of the trap message. notification-type { informs | traps } {version {1 | 2c | 3}} {vrf vrf instance name} · host-addr--Specifies the name or address of the NMS. Example: · traps (the default)--Sends SNMP traps to the host. Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification · informs--Sends SNMP informs to the host. · version--Specifies the SNMP version to support. Version 1, the default, is not available with informs. · community-string--Specifies the string to send with the notification operation. Though you can set this string by using the snmp-server host command, we recommend that you define this string by using the snmp-server community command before using the snmp-server host command. · notification-type--Uses the mac-notification keyword. · vrf vrf instance name--Specifies the VPN routing/forwarding instance for this host. snmp-server enable traps mac-notification change Example: Enables the switch to send MAC address change notification traps to the NMS. Switch(config)# snmp-server enable traps mac-notification change Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1784 System Management Configuring MAC Address Move Notification Traps Step 4 Command or Action mac address-table notification change Example: Switch(config)# mac address-table notification change Purpose Enables the MAC address change notification feature. Step 5 Step 6 mac address-table notification change [interval value] [history-size value] Example: Switch(config)# mac address-table notification change interval 123 Switch(config)#mac address-table notification change history-size 100 Enters the trap interval time and the history table size. · (Optional) interval value--Specifies the notification trap interval in seconds between each set of traps that are generated to the NMS. The range is 0 to 2147483647 seconds; the default is 1 second. · (Optional) history-size value--Specifies the maximum number of entries in the MAC notification history table. The range is 0 to 500; the default is 1. interface interface-id Example: Switch(config)# interface gigabitethernet1/0/2 Enters interface configuration mode, and specifies the Layer 2 interface on which to enable the SNMP MAC address notification trap. Step 7 Step 8 snmp trap mac-notification change {added | removed} Enables the MAC address change notification trap on the Example: interface. · Enables the trap when a MAC address is added on Switch(config-if)# snmp trap this interface. mac-notification change added · Enables the trap when a MAC address is removed from this interface. end Example: Switch(config-if)# end Returns to privileged EXEC mode. Configuring MAC Address Move Notification Traps When you configure MAC-move notification, an SNMP notification is generated and sent to the network management system whenever a MAC address moves from one port to another within the same VLAN. Beginning in privileged EXEC mode, follow these steps to configure the switch to send MAC address-move notification traps to an NMS host: SUMMARY STEPS 1. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1785 Configuring MAC Address Move Notification Traps System Management 2. snmp-server host host-addr {traps | informs} {version {1 | 2c | 3}} community-string notification-type 3. snmp-server enable traps mac-notification move 4. mac address-table notification mac-move 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 snmp-server host host-addr {traps | informs} {version {1 | 2c | 3}} community-string notification-type Example: Specifies the recipient of the trap message. · host-addr--Specifies the name or address of the NMS. · traps (the default)--Sends SNMP traps to the host. Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification · informs--Sends SNMP informs to the host. · version--Specifies the SNMP version to support. Version 1, the default, is not available with informs. · community-string--Specifies the string to send with the notification operation. Though you can set this string by using the snmp-server host command, we recommend that you define this string by using the snmp-server community command before using the snmp-server host command. · notification-type--Uses the mac-notification keyword. snmp-server enable traps mac-notification move Example: Enables the switch to send MAC address move notification traps to the NMS. Switch(config)# snmp-server enable traps mac-notification move Step 4 mac address-table notification mac-move Example: Switch(config)# mac address-table notification mac-move Enables the MAC address move notification feature. Step 5 end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1786 System Management Configuring MAC Threshold Notification Traps Command or Action Switch(config)# end Purpose Configuring MAC Threshold Notification Traps When you configure MAC threshold notification, an SNMP notification is generated and sent to the network management system when a MAC address table threshold limit is reached or exceeded. SUMMARY STEPS 1. configure terminal 2. snmp-server host host-addr {traps | informs} {version {1 | 2c | 3}} community-string notification-type 3. snmp-server enable traps mac-notification threshold 4. mac address-table notification threshold 5. mac address-table notification threshold [limit percentage] | [interval time] 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 snmp-server host host-addr {traps | informs} {version {1 | 2c | 3}} community-string notification-type Example: Specifies the recipient of the trap message. · host-addr--Specifies the name or address of the NMS. · traps (the default)--Sends SNMP traps to the host. Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification · informs--Sends SNMP informs to the host. · version--Specifies the SNMP version to support. Version 1, the default, is not available with informs. · community-string--Specifies the string to send with the notification operation. You can set this string by using the snmp-server host command, but we recommend that you define this string by using the snmp-server community command before using the snmp-server host command. · notification-type--Uses the mac-notification keyword. snmp-server enable traps mac-notification threshold Enables MAC threshold notification traps to the NMS. Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1787 Adding and Removing Static Address Entries System Management Command or Action Switch(config)# snmp-server enable traps mac-notification threshold Step 4 mac address-table notification threshold Example: Switch(config)# mac address-table notification threshold Step 5 mac address-table notification threshold [limit percentage] | [interval time] Example: Switch(config)# mac address-table notification threshold interval 123 Switch(config)# mac address-table notification threshold limit 78 Step 6 end Example: Switch(config)# end Purpose Enables the MAC address threshold notification feature. Enters the threshold value for the MAC address threshold usage monitoring. · (Optional) limit percentage--Specifies the percentage of the MAC address table use; valid values are from 1 to 100 percent. The default is 50 percent. · (Optional) interval time--Specifies the time between notifications; valid values are greater than or equal to 120 seconds. The default is 120 seconds. Returns to privileged EXEC mode. Adding and Removing Static Address Entries SUMMARY STEPS 1. configure terminal 2. mac address-table static mac-addr vlan vlan-id interface interface-id 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 mac address-table static mac-addr vlan vlan-id interface Adds a static address to the MAC address table. interface-id · mac-addr--Specifies the destination MAC unicast Example: address to add to the address table. Packets with this destination address received in the specified VLAN Switch(config)# mac address-table are forwarded to the specified interface. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1788 System Management Configuring Unicast MAC Address Filtering Command or Action static c2f3.220a.12f4 vlan 4 interface gigabitethernet 1/0/1 Step 3 end Example: Switch(config)# end Purpose · vlan-id--Specifies the VLAN for which the packet with the specified MAC address is received. Valid VLAN IDs are 1 to 4094. · interface-id--Specifies the interface to which the received packet is forwarded. Valid interfaces include physical ports or port channels. For static multicast addresses, you can enter multiple interface IDs. For static unicast addresses, you can enter only one interface at a time, but you can enter the command multiple times with the same MAC address and VLAN ID. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Unicast MAC Address Filtering SUMMARY STEPS 1. configure terminal 2. mac address-table static mac-addr vlan vlan-id drop 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 mac address-table static mac-addr vlan vlan-id drop Example: Switch(config)# mac address-table static c2f3.220a.12f4 vlan 4 drop Enables unicast MAC address filtering and configure the switch to drop a packet with the specified source or destination unicast static address. · mac-addr--Specifies a source or destination unicast MAC address (48-bit). Packets with this MAC address are dropped. · vlan-id--Specifies the VLAN for which the packet with the specified MAC address is received. Valid VLAN IDs are 1 to 4094. end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1789 Monitoring and Maintaining Administration of the Switch System Management Command or Action Switch(config)# end Purpose Monitoring and Maintaining Administration of the Switch Command clear mac address-table dynamic Purpose Removes all dynamic entries. clear mac address-table dynamic address mac-address Removes a specific MAC address. clear mac address-table dynamic interface interface-id Removes all addresses on the specified physical port or port channel. clear mac address-table dynamic vlan vlan-id Removes all addresses on a specified VLAN. show clock [detail] Displays the time and date configuration. show ip igmp snooping groups Displays the Layer 2 multicast entries for all VLANs or the specified VLAN. show mac address-table address mac-address Displays MAC address table information for the specified MAC address. show mac address-table aging-time Displays the aging time in all VLANs or the specified VLAN. show mac address-table count Displays the number of addresses present in all VLANs or the specified VLAN. show mac address-table dynamic Displays only dynamic MAC address table entries. show mac address-table interface interface-name Displays the MAC address table information for the specified interface. show mac address-table move update Displays the MAC address table move update information. show mac address-table multicast Displays a list of multicast MAC addresses. show mac address-table notification {change | mac-move | threshold} Displays the MAC notification parameters and history table. show mac address-table secure Displays the secure MAC addresses. show mac address-table static Displays only static MAC address table entries. show mac address-table vlan vlan-id Displays the MAC address table information for the specified VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1790 System Management Configuration Examples for Switch Administration Configuration Examples for Switch Administration Example: Setting the System Clock This example shows how to manually set the system clock: Switch# clock set 13:32:00 23 July 2013 Examples: Configuring Summer Time This example (for daylight savings time) shows how to specify that summer time starts on March 10 at 02:00 and ends on November 3 at 02:00: Switch(config)# clock summer-time PDT recurring PST date 10 March 2013 2:00 3 November 2013 2:00 This example shows how to set summer time start and end dates: Switch(config)#clock summer-time PST date 20 March 2013 2:00 20 November 2013 2:00 Example: Configuring a MOTD Banner This example shows how to configure a MOTD banner by using the pound sign (#) symbol as the beginning and ending delimiter: Switch(config)# banner motd # This is a secure site. Only authorized users are allowed. For access, contact technical support. # Switch(config)# This example shows the banner that appears from the previous configuration: Unix> telnet 192.0.2.15 Trying 192.0.2.15... Connected to 192.0.2.15. Escape character is '^]'. This is a secure site. Only authorized users are allowed. For access, contact technical support. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1791 Example: Configuring a Login Banner System Management User Access Verification Password: Example: Configuring a Login Banner This example shows how to configure a login banner by using the dollar sign ($) symbol as the beginning and ending delimiter: Switch(config)# banner login $ Access for authorized users only. Please enter your username and password. $ Switch(config)# Example: Configuring MAC Address Change Notification Traps This example shows how to specify 172.20.10.10 as the NMS, enable MAC address notification traps to the NMS, enable the MAC address-change notification feature, set the interval time to 123 seconds, set the history-size to 100 entries, and enable traps whenever a MAC address is added on the specified port: Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification Switch(config)# snmp-server enable traps mac-notification change Switch(config)# mac address-table notification change Switch(config)# mac address-table notification change interval 123 Switch(config)# mac address-table notification change history-size 100 Switch(config)# interface gigabitethernet1/2/1 Switch(config-if)# snmp trap mac-notification change added Example: Configuring MAC Threshold Notification Traps This example shows how to specify 172.20.10.10 as the NMS, enable the MAC address threshold notification feature, set the interval time to 123 seconds, and set the limit to 78 per cent: Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification Switch(config)# snmp-server enable traps mac-notification threshold Switch(config)# mac address-table notification threshold Switch(config)# mac address-table notification threshold interval 123 Switch(config)# mac address-table notification threshold limit 78 Example: Adding the Static Address to the MAC Address Table This example shows how to add the static address c2f3.220a.12f4 to the MAC address table. When a packet is received in VLAN 4 with this MAC address as its destination address, the packet is forwarded to the specified port: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1792 System Management Example: Configuring Unicast MAC Address Filtering Switch(config)# mac address-table static c2f3.220a.12f4 vlan 4 interface gigabitethernet1/1/1 Example: Configuring Unicast MAC Address Filtering This example shows how to enable unicast MAC address filtering and how to configure drop packets that have a source or destination address of c2f3.220a.12f4. When a packet is received in VLAN 4 with this MAC address as its source or destination, the packet is dropped: Switch(config)# mac address-table static c2f3.220a.12f4 vlan 4 drop Additional References for Switch Administration Related Documents Related Topic System management commands Network management configuration Layer 2 configuration VLAN configuration Platform-independent command references Platform-independent configuration information Document Title System Management Command Reference (Catalyst 3650 Switches) Network Management Configuration Guide (Catalyst 3650 Switches) Layer 2/3 Configuration Guide (Catalyst 3650 Switches) VLAN Configuration Guide (Catalyst 3650 Switches) Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches) IP Addressing Configuration Guide Library, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Standards and RFCs Standard/RFC Title None -- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1793 Feature History and Information for Switch Administration System Management MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Switch Administration Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1794 8 8 C H A P T E R Performing Switch Setup Configuration · Finding Feature Information, on page 1795 · Information About Performing Switch Setup Configuration, on page 1795 · How to Perform Switch Setup Configuration, on page 1807 · Monitoring Switch Setup Configuration, on page 1823 · Configuration Examples for Performing Switch Setup, on page 1827 · Additional References For Performing Switch Setup, on page 1828 · Feature History and Information For Performing Switch Setup Configuration, on page 1829 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Performing Switch Setup Configuration Review the sections in this module before performing your initial switch configuration tasks that include IP address assignments and DHCP autoconfiguration. Switch Boot Process To start your switch, you need to follow the procedures in the hardware installation guide for installing and powering on the switch and setting up the initial switch configuration (IP address, subnet mask, default gateway, secret and Telnet passwords, and so forth). The normal boot process involves the operation of the boot loader software and includes these activities: · Locates the bootable (base) package in the bundle or installed package set. · Performs low-level CPU initialization. It initializes the CPU registers, which control where physical memory is mapped, its quantity, its speed, and so forth. · Performs power-on self-test (POST) for the CPU subsystem and tests the system DRAM. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1795 Software Installer Features System Management · Initializes the file systems on the system board. · Loads a default operating system software image into memory and boots up the switch. The boot loader provides access to the file systems before the operating system is loaded. Normally, the boot loader is used only to load, decompress, and start the operating system. After the boot loader gives the operating system control of the CPU, the boot loader is not active until the next system reset or power-on. The boot loader also provides trap-door access into the system if the operating system has problems serious enough that it cannot be used. The trap-door mechanism provides enough access to the system so that if it is necessary, you can reinstall the operating system software image by using the emergency-install command and restart the operating system. Before you can assign switch information, make sure you have connected a PC or terminal to the console port or a PC to the Ethernet management port, and make sure you have configured the PC or terminal-emulation software baud rate and character format to match these of the switch console port: · Baud rate default is 9600. · Data bits default is 8. Note If the data bits option is set to 8, set the parity option to none. · Stop bits default is 2 (minor). · Parity settings default is none. Software Installer Features The following software installer features are supported on your switch: · Software bundle installation on a standalone switch, a switch stack, or a subset of switches in a stack. The default is installation on all the switches if a switch stack is configured. · In a stack of switches, Cisco recommends all switches in install mode. · Software rollback to a previously installed package set. · Emergency installation in the event that no valid installed packages reside on the boot flash. · Auto-upgrade of a switch that joins the switch stack with incompatible software. · Installation using packages on one switch as the source for installing packages on another switch in the switch stack. Note Software installation and rollback must be performed while running only in installed mode. You can use the software expand EXEC command to convert bundle boot mode to install mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1796 System Management Software Boot Modes Software Boot Modes Your switch supports two modes to boot the software packages: · Installed mode · Bundle mode Related Topics Examples: Displaying Software Bootup in Install Mode, on page 1823 Example: Emergency Installation, on page 1825 Installed Boot Mode You can boot your switch in installed mode by booting the software package provisioning file that resides in flash: switch: boot flash:packages.conf The provisioning file contains a list of software packages to boot, mount, and run. The ISO file system in each installed package is mounted to the root file system directly from flash. Note The packages and provisioning file used to boot in installed mode must reside in flash. Booting in installed mode from usbflash0: or tftp: is not supported. Related Topics Examples: Displaying Software Bootup in Install Mode, on page 1823 Example: Emergency Installation, on page 1825 Bundle Boot Mode You can boot your switch in bundle boot mode by booting the bundle (.bin) file: switch: boot flash:cat3850-universalk9.SSA.03.08.83.EMD.150-8.83.EMD.bin The provisioning file contained in a bundle is used to decide which packages to boot, mount, and run. Packages are extracted from the bundle and copied to RAM. The ISO file system in each package is mounted to the root file system. Unlike install boot mode, additional memory that is equivalent to the size of the bundle is used when booting in bundle mode. Unlike install boot mode, bundle boot mode is available from several locations: · flash: · usbflash0: · tftp: Note Auto install and smart install functionality is not supported in bundle boot mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1797 Boot Mode for a Switch Stack System Management Note The AP image pre-download feature is not supported in bundle boot mode. For more information about the pre-download feature see the Cisco WLC 5700 Series Preloading an Image to Access Points chapter. Related Topics Examples: Displaying Software Bootup in Install Mode, on page 1823 Example: Emergency Installation, on page 1825 Boot Mode for a Switch Stack All the switches in a stack must be running in installed mode or bundle boot mode. A mixed mode stack is not supported. If a new switch tries to join the stack in a different boot mode then the active switch, the new switch is given a V-mismatch state. If a mixed mode switch stack is booted at the same time, then all the switches except for the active switch is given a V-mismatch state. If the boot mode does not support auto-upgrade, then the switch stack members must be re-booted in the same boot mode as the active switch. If the stack is running in installed mode, the auto-upgrade feature can be used to automatically upgrade the new switch that is attempting to join the switch stack. The auto-upgrade feature changes the boot mode of the new switch to installed mode. If the stack is running in bundle boot mode, the auto-upgrade feature is not available. You will be required to use the bundle mode to boot the new switch so that it can join the switch stack. This is an example of the state of a switch that attempts to join the switch stack when the boot mode is not compatible with the active switch: Switch# show switch Switch/Stack Mac Address : 6400.f125.1100 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State ------------------------------------------------------------ 1 Member 6400 f125.1a00 1 0 V-Mismatch *2 Active 6400.f125.1100 1 V01 Ready Switch Switches Information Assignment You can assign IP information through the switch setup program, through a DHCP server, or manually. Use the switch setup program if you want to be prompted for specific IP information. With this program, you can also configure a hostname and an enable secret password. It gives you the option of assigning a Telnet password (to provide security during remote management) and configuring your switch as a command or member switch of a cluster or as a standalone switch. The switch stack is managed through a single IP address. The IP address is a system-level setting and is not specific to the stack master or to any other stack member. You can still manage the stack through the same Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1798 System Management Default Switch Information IP address even if you remove the stack master or any other stack member from the stack, provided there is IP connectivity. Note Stack members retain their IP address when you remove them from a switch stack. To avoid a conflict by having two devices with the same IP address in your network, change the IP address of the switch that you removed from the switch stack. Use a DHCP server for centralized control and automatic assignment of IP information after the server is configured. Note If you are using DHCP, do not respond to any of the questions in the setup program until the switch receives the dynamically assigned IP address and reads the configuration file. If you are an experienced user familiar with the switch configuration steps, manually configure the switch. Otherwise, use the setup program described in the Boot Process section. Default Switch Information Table 159: Default Switch Information Feature Default Setting IP address and subnet mask No IP address or subnet mask are defined. Default gateway No default gateway is defined. Enable secret password No password is defined. Hostname The factory-assigned default hostname is Switch. Telnet password No password is defined. DHCP-Based Autoconfiguration Overview DHCP provides configuration information to Internet hosts and internetworking devices. This protocol consists of two components: one for delivering configuration parameters from a DHCP server to a device and an operation for allocating network addresses to devices. DHCP is built on a client-server model, in which designated DHCP servers allocate network addresses and deliver configuration parameters to dynamically configured devices. The switch can act as both a DHCP client and a DHCP server. During DHCP-based autoconfiguration, your switch (DHCP client) is automatically configured at startup with IP address information and a configuration file. With DHCP-based autoconfiguration, no DHCP client-side configuration is needed on your switch. However, you need to configure the DHCP server for various lease options associated with IP addresses. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1799 DHCP Client Request Process System Management If you want to use DHCP client autoconfiguration, you need to configure a Trivial File Transfer Protocol (TFTP) server to fetch the configuration file. The DHCP client then applies the new configuration file to its running configuration. Note If the new configuration is downloaded to a switch that already has a configuration, the downloaded configuration is appended to the configuration file stored on the switch. (Any existing configuration is not overwritten by the downloaded one.) Note We recommend a redundant connection between a switch stack and the DHCP, DNS, and TFTP servers. This is to help ensure that these servers remain accessible in case one of the connected stack members is removed from the switch stack. The DHCP server for your switch can be on the same LAN or on a different LAN than the switch. If the DHCP server is running on a different LAN, you should configure a DHCP relay device between your switch and the DHCP server. A relay device forwards broadcast traffic between two directly connected LANs. A router does not forward broadcast packets, but it forwards packets based on the destination IP address in the received packet. DHCP-based autoconfiguration replaces the BOOTP client functionality on your switch. DHCP Client Request Process When you boot up your switch, the DHCP client is invoked and requests configuration information from a DHCP server when the configuration file is not present on the switch. If the configuration file is present and the configuration includes the ip address dhcp interface configuration command on specific routed interfaces, the DHCP client is invoked and requests the IP address information for those interfaces. This is the sequence of messages that are exchanged between the DHCP client and the DHCP server. Figure 98: DHCP Client and Server Message Exchange The client, Switch A, broadcasts a DHCPDISCOVER message to locate a DHCP server. The DHCP server offers configuration parameters (such as an IP address, subnet mask, gateway IP address, DNS IP address, a lease for the IP address, and so forth) to the client in a DHCPOFFER unicast message. In a DHCPREQUEST broadcast message, the client returns a formal request for the offered configuration information to the DHCP server. The formal request is broadcast so that all other DHCP servers that received the DHCPDISCOVER broadcast message from the client can reclaim the IP addresses that they offered to the client. The DHCP server confirms that the IP address has been allocated to the client by returning a DHCPACK unicast message to the client. With this message, the client and server are bound, and the client uses configuration information received from the server. The amount of information the switch receives depends on how you configure the DHCP server. If the configuration parameters sent to the client in the DHCPOFFER unicast message are invalid (a configuration error exists), the client returns a DHCPDECLINE broadcast message to the DHCP server. The DHCP server sends the client a DHCPNAK denial broadcast message, which means that the offered configuration parameters have not been assigned, that an error has occurred during the negotiation of the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1800 System Management DHCP-based Autoconfiguration and Image Update parameters, or that the client has been slow in responding to the DHCPOFFER message (the DHCP server assigned the parameters to another client). A DHCP client might receive offers from multiple DHCP or BOOTP servers and can accept any of the offers; however, the client usually accepts the first offer it receives. The offer from the DHCP server is not a guarantee that the IP address is allocated to the client; however, the server usually reserves the address until the client has had a chance to formally request the address. If the switch accepts replies from a BOOTP server and configures itself, the switch broadcasts, instead of unicasts, TFTP requests to obtain the switch configuration file. The DHCP hostname option allows a group of switches to obtain hostnames and a standard configuration from the central management DHCP server. A client (switch) includes in its DCHPDISCOVER message an option 12 field used to request a hostname and other configuration parameters from the DHCP server. The configuration files on all clients are identical except for their DHCP-obtained hostnames. If a client has a default hostname (the hostname name global configuration command is not configured or the no hostname global configuration command is entered to remove the hostname), the DHCP hostname option is not included in the packet when you enter the ip address dhcp interface configuration command. In this case, if the client receives the DCHP hostname option from the DHCP interaction while acquiring an IP address for an interface, the client accepts the DHCP hostname option and sets the flag to show that the system now has a hostname configured. DHCP-based Autoconfiguration and Image Update You can use the DHCP image upgrade features to configure a DHCP server to download both a new image and a new configuration file to one or more switches in a network. Simultaneous image and configuration upgrade for all switches in the network helps ensure that each new switch added to a network are synchronous with the network. There are two types of DHCP image upgrades: DHCP autoconfiguration and DHCP auto-image update. Restrictions for DHCP-based Autoconfiguration · The DHCP-based autoconfiguration with a saved configuration process stops if there is not at least one Layer 3 interface in an up state without an assigned IP address in the network. · Unless you configure a timeout, the DHCP-based autoconfiguration with a saved configuration feature tries indefinitely to download an IP address. · The auto-install process stops if a configuration file cannot be downloaded or if the configuration file is corrupted. · The configuration file that is downloaded from TFTP is merged with the existing configuration in the running configuration but is not saved in the NVRAM unless you enter the write memory or copy running-configuration startup-configuration privileged EXEC command. If the downloaded configuration is saved to the startup configuration, the feature is not triggered during subsequent system restarts. DHCP Autoconfiguration DHCP autoconfiguration downloads a configuration file to one or more switches in your network from a DHCP server. The downloaded configuration file becomes the running configuration of the switch. It does not over write the bootup configuration saved in the flash, until you reload the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1801 DHCP Auto-Image Update System Management DHCP Auto-Image Update You can use DHCP auto-image upgrade with DHCP autoconfiguration to download both a configuration and a new image to one or more switches in your network. The switch (or switches) downloading the new configuration and the new image can be blank (or only have a default factory configuration loaded). To enable a DHCP auto-image update on the switch, the TFTP server where the image and configuration files are located must be configured with the correct option 67 (the configuration filename), option 66 (the DHCP server hostname) option 150 (the TFTP server address), and option 125 (description of the Cisco IOS image file) settings. After you install the switch in your network, the auto-image update feature starts. The downloaded configuration file is saved in the running configuration of the switch, and the new image is downloaded and installed on the switch. When you reboot the switch, the configuration is stored in the saved configuration on the switch. DHCP Server Configuration Guidelines Follow these guidelines if you are configuring a device as a DHCP server: · You should configure the DHCP server with reserved leases that are bound to each switch by the switch hardware address. · If you want the switch to receive IP address information, you must configure the DHCP server with these lease options: · IP address of the client (required) · Subnet mask of the client (required) · DNS server IP address (optional) · Router IP address (default gateway address to be used by the switch) (required) · If you want the switch to receive the configuration file from a TFTP server, you must configure the DHCP server with these lease options: · TFTP server name (required) · Boot filename (the name of the configuration file that the client needs) (recommended) · Hostname (optional) · Depending on the settings of the DHCP server, the switch can receive IP address information, the configuration file, or both. · If you do not configure the DHCP server with the lease options described previously, it replies to client requests with only those parameters that are configured. If the IP address and the subnet mask are not in the reply, the switch is not configured. If the router IP address or the TFTP server name are not found, the switch might send broadcast, instead of unicast, TFTP requests. Unavailability of other lease options does not affect autoconfiguration. · The switch can act as a DHCP server. By default, the Cisco IOS DHCP server and relay agent features are enabled on your switch but are not configured. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1802 System Management Purpose of the TFTP Server Purpose of the TFTP Server Based on the DHCP server configuration, the switch attempts to download one or more configuration files from the TFTP server. If you configured the DHCP server to respond to the switch with all the options required for IP connectivity to the TFTP server, and if you configured the DHCP server with a TFTP server name, address, and configuration filename, the switch attempts to download the specified configuration file from the specified TFTP server. If you did not specify the configuration filename, the TFTP server, or if the configuration file could not be downloaded, the switch attempts to download a configuration file by using various combinations of filenames and TFTP server addresses. The files include the specified configuration filename (if any) and these files: network-config, cisconet.cfg, hostname.config, or hostname.cfg, where hostname is the switch's current hostname. The TFTP server addresses used include the specified TFTP server address (if any) and the broadcast address (255.255.255.255). For the switch to successfully download a configuration file, the TFTP server must contain one or more configuration files in its base directory. The files can include these files: · The configuration file named in the DHCP reply (the actual switch configuration file). · The network-confg or the cisconet.cfg file (known as the default configuration files). · The router-confg or the ciscortr.cfg file (These files contain commands common to all switches. Normally, if the DHCP and TFTP servers are properly configured, these files are not accessed.) If you specify the TFTP server name in the DHCP server-lease database, you must also configure the TFTP server name-to-IP-address mapping in the DNS-server database. If the TFTP server to be used is on a different LAN from the switch, or if it is to be accessed by the switch through the broadcast address (which occurs if the DHCP server response does not contain all the required information described previously), a relay must be configured to forward the TFTP packets to the TFTP server. The preferred solution is to configure the DHCP server with all the required information. Purpose of the DNS Server The DHCP server uses the DNS server to resolve the TFTP server name to an IP address. You must configure the TFTP server name-to-IP address map on the DNS server. The TFTP server contains the configuration files for the switch. You can configure the IP addresses of the DNS servers in the lease database of the DHCP server from where the DHCP replies will retrieve them. You can enter up to two DNS server IP addresses in the lease database. The DNS server can be on the same LAN or on a different LAN from the switch. If it is on a different LAN, the switch must be able to access it through a router. How to Obtain Configuration Files Depending on the availability of the IP address and the configuration filename in the DHCP reserved lease, the switch obtains its configuration information in these ways: · The IP address and the configuration filename is reserved for the switch and provided in the DHCP reply (one-file read method). The switch receives its IP address, subnet mask, TFTP server address, and the configuration filename from the DHCP server. The switch sends a unicast message to the TFTP server to retrieve the named configuration file from the base directory of the server and upon receipt, it completes its boot up process. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1803 How to Control Environment Variables System Management · The IP address and the configuration filename is reserved for the switch, but the TFTP server address is not provided in the DHCP reply (one-file read method). The switch receives its IP address, subnet mask, and the configuration filename from the DHCP server. The switch sends a broadcast message to a TFTP server to retrieve the named configuration file from the base directory of the server, and upon receipt, it completes its boot-up process. · Only the IP address is reserved for the switch and provided in the DHCP reply. The configuration filename is not provided (two-file read method). The switch receives its IP address, subnet mask, and the TFTP server address from the DHCP server. The switch sends a unicast message to the TFTP server to retrieve the network-confg or cisconet.cfg default configuration file. (If the network-confg file cannot be read, the switch reads the cisconet.cfg file.) The default configuration file contains the hostnames-to-IP-address mapping for the switch. The switch fills its host table with the information in the file and obtains its hostname. If the hostname is not found in the file, the switch uses the hostname in the DHCP reply. If the hostname is not specified in the DHCP reply, the switch uses the default as its hostname. After obtaining its hostname from the default configuration file or the DHCP reply, the switch reads the configuration file that has the same name as its hostname (hostname-confg or hostname.cfg, depending on whether network-confg or cisconet.cfg was read earlier) from the TFTP server. If the cisconet.cfg file is read, the filename of the host is truncated to eight characters. If the switch cannot read the network-confg, cisconet.cfg, or the hostname file, it reads the router-confg file. If the switch cannot read the router-confg file, it reads the ciscortr.cfg file. Note The switch broadcasts TFTP server requests if the TFTP server is not obtained from the DHCP replies, if all attempts to read the configuration file through unicast transmissions fail, or if the TFTP server name cannot be resolved to an IP address. How to Control Environment Variables With a normally operating switch, you enter the boot loader mode only through the console connection configured for 9600 bps. Unplug the switch power cord, and press the Mode button while reconnecting the power cord. You can release the Mode button after all the amber system LEDs turn on and remain solid. The boot loader switch prompt then appears. The switch boot loader software provides support for nonvolatile environment variables, which can be used to control how the boot loader, or any other software running on the system, operates. Boot loader environment variables are similar to environment variables that can be set on UNIX or DOS systems. Environment variables that have values are stored in flash memory outside of the flash file system. Each line in these files contains an environment variable name and an equal sign followed by the value of the variable. A variable has no value if it is not present; it has a value if it is listed even if the value is a null string. A variable that is set to a null string (for example, " ") is a variable with a value. Many environment variables are predefined and have default values. You can change the settings of the environment variables by accessing the boot loader or by using Cisco IOS commands. Under normal circumstances, it is not necessary to alter the setting of the environment variables. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1804 System Management Common Environment Variables Common Environment Variables This table describes the function of the most common environment variables. Table 160: Common Environment Variables Variable BOOT Boot Loader Command Cisco IOS Global Configuration Command set BOOT filesystem :/ file-url boot system {filesystem : /file-url ... | ... switch {number | all}} A semicolon-separated list of executable files to try to load and execute when automatically booting. Specifies the Cisco IOS image to load during the next boot cycle and the stack members on which the image is loaded. This command changes the setting of the BOOT environment variable. The package provisioning file, also referred to as the packages.conf file, is used by the system to determine which software packages to activate during boot up. · When booting in installed mode, the package provisioning file specified in the boot command is used to determine which packages to activate. For example boot flash:packages.conf. · When booting in bundle mode, the package provisioning file contained in the booted bundle is used to activate the packages included in the bundle. For example, boot flash:image.bin. MANUAL_BOOT set MANUAL_BOOT yes boot manual Decides whether the switch Enables manually booting the switch automatically or manually during the next boot cycle and changes boots. the setting of the MANUAL_BOOT Valid values are 1, yes, 0, and environment variable. no. If it is set to no or 0, the The next time you reboot the system, boot loader attempts to the switch is in boot loader mode. To automatically boot up the boot up the system, use the boot flash: system. If it is set to anything filesystem :/ file-url boot loader else, you must manually boot command, and specify the name of the up the switch from the boot bootable image. loader mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1805 Environment Variables for TFTP System Management Variable CONFIG_FILE SWITCH_NUMBER SWITCH_PRIORITY BAUD ENABLE_BREAK Boot Loader Command Cisco IOS Global Configuration Command set CONFIG_FILE flash:/ boot config-file flash:/ file-url file-url Specifies the filename that Cisco IOS Changes the filename that uses to read and write a nonvolatile Cisco IOS uses to read and copy of the system configuration. This write a nonvolatile copy of the command changes the CONFIG_FILE system configuration. environment variable. set SWITCH_NUMBER stack-member-number switch current-stack-member-number renumber new-stack-member-number Changes the member number Changes the member number of a stack of a stack member. member. set SWITCH_PRIORITY switch stack-member-number priority stack-member-number priority-number Changes the priority value of Changes the priority value of a stack a stack member. member. set BAUD baud-rate line console 0 speed speed-value Configures the baud rate. set ENABLE_BREAK yes/no boot enable-break switch yes/no Enables a break to the auto-boot cycle. You have 5 seconds to enter the break command. Environment Variables for TFTP When the switch is connected to a PC through the Ethernet management port, you can download or upload a configuration file to the boot loader by using TFTP. Make sure the environment variables in this table are configured. Table 161: Environment Variables for TFTP Variable MAC_ADDR Description Specifies the MAC address of the switch. Note We recommend that you do not modify this variable. However, if you modify this variable after the boot loader is up or the value is different from the saved value, enter this command before using TFTP. IP_ADDR Specifies the IP address and the subnet mask for the associated IP subnet of the switch. DEFAULT_ROUTER Specifies the IP address and subnet mask of the default gateway. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1806 System Management Scheduled Reload of the Software Image Scheduled Reload of the Software Image You can schedule a reload of the software image to occur on the switch at a later time (for example, late at night or during the weekend when the switch is used less), or you can synchronize a reload network-wide (for example, to perform a software upgrade on all switches in the network). Note A scheduled reload must take place within approximately 24 days. You have these reload options: · Reload of the software to take affect in the specified minutes or hours and minutes. The reload must take place within approximately 24 hours. You can specify the reason for the reload in a string up to 255 characters in length. · Reload of the software to take place at the specified time (using a 24-hour clock). If you specify the month and day, the reload is scheduled to take place at the specified time and date. If you do not specify the month and day, the reload takes place at the specified time on the current day (if the specified time is later than the current time) or on the next day (if the specified time is earlier than the current time). Specifying 00:00 schedules the reload for midnight. The reload command halts the system. If the system is not set to manually boot up, it reboots itself. If your switch is configured for manual booting, do not reload it from a virtual terminal. This restriction prevents the switch from entering the boot loader mode and then taking it from the remote user's control. If you modify your configuration file, the switch prompts you to save the configuration before reloading. During the save operation, the system requests whether you want to proceed with the save if the CONFIG_FILE environment variable points to a startup configuration file that no longer exists. If you proceed in this situation, the system enters setup mode upon reload. To cancel a previously scheduled reload, use the reload cancel privileged EXEC command. How to Perform Switch Setup Configuration Using DHCP to download a new image and a new configuration to a switch requires that you configure at least two switches. One switch acts as a DHCP and TFTP server and the second switch (client) is configured to download either a new configuration file or a new configuration file and a new image file. Configuring DHCP Autoconfiguration (Only Configuration File) This task describes how to configure DHCP autoconfiguration of the TFTP and DHCP settings on an existing switch in the network so that it can support the autoconfiguration of a new switch. SUMMARY STEPS 1. configure terminal 2. ip dhcp pool poolname 3. boot filename 4. network network-number mask prefix-length Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1807 Configuring DHCP Autoconfiguration (Only Configuration File) System Management 5. default-router address 6. option 150 address 7. exit 8. tftp-server flash:filename.text 9. interface interface-id 10. no switchport 11. ip address address mask 12. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ip dhcp pool poolname Example: Switch(config)# ip dhcp pool pool Creates a name for the DHCP server address pool, and enters DHCP pool configuration mode. Step 3 boot filename Example: Switch(dhcp-config)# boot config-boot.text Specifies the name of the configuration file that is used as a boot image. Step 4 Step 5 network network-number mask prefix-length Example: Switch(dhcp-config)# network 10.10.10.0 255.255.255.0 Specifies the subnet network number and mask of the DHCP address pool. Note The prefix length specifies the number of bits that comprise the address prefix. The prefix is an alternative way of specifying the network mask of the client. The prefix length must be preceded by a forward slash (/). default-router address Example: Specifies the IP address of the default router for a DHCP client. Switch(dhcp-config)# default-router 10.10.10.1 Step 6 option 150 address Example: Specifies the IP address of the TFTP server. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1808 System Management Configuring DHCP Auto-Image Update (Configuration File and Image) Step 7 Step 8 Command or Action Switch(dhcp-config)# option 150 10.10.10.1 Purpose exit Example: Switch(dhcp-config)# exit Returns to global configuration mode. tftp-server flash:filename.text Example: Specifies the configuration file on the TFTP server. Switch(config)# tftp-server flash:config-boot.text Step 9 Step 10 Step 11 Step 12 interface interface-id Example: Specifies the address of the client that will receive the configuration file. Switch(config)# interface gigabitethernet1/0/4 no switchport Example: Switch(config-if)# no switchport Puts the interface into Layer 3 mode. ip address address mask Example: Switch(config-if)# ip address 10.10.10.1 255.255.255.0 Specifies the IP address and mask for the interface. end Example: Switch(config-if)# end Returns to privileged EXEC mode. Related Topics Example: Configuring a Switch as a DHCP Server, on page 1827 Configuring DHCP Auto-Image Update (Configuration File and Image) This task describes DHCP autoconfiguration to configure TFTP and DHCP settings on an existing switch to support the installation of a new switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1809 Configuring DHCP Auto-Image Update (Configuration File and Image) System Management Before you begin You must first create a text file (for example, autoinstall_dhcp) that will be uploaded to the switch. In the text file, put the name of the image that you want to download. SUMMARY STEPS 1. configure terminal 2. ip dhcp pool poolname 3. boot filename 4. network network-number mask prefix-length 5. default-router address 6. option 150 address 7. option 125 hex 8. copy tftp flash filename.txt 9. copy tftp flash imagename.bin 10. exit 11. tftp-server flash: config.text 12. tftp-server flash: imagename.bin 13. tftp-server flash: filename.txt 14. interface interface-id 15. no switchport 16. ip address address mask 17. end 18. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 ip dhcp pool poolname Example: Switch(config)# ip dhcp pool pool1 Creates a name for the DHCP server address pool and enter DHCP pool configuration mode. Step 3 boot filename Example: Switch(dhcp-config)# boot config-boot.text Specifies the name of the file that is used as a boot image. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1810 System Management Configuring DHCP Auto-Image Update (Configuration File and Image) Step 4 Step 5 Step 6 Step 7 Command or Action network network-number mask prefix-length Example: Switch(dhcp-config)# network 10.10.10.0 255.255.255.0 Purpose Specifies the subnet network number and mask of the DHCP address pool. Note The prefix length specifies the number of bits that comprise the address prefix. The prefix is an alternative way of specifying the network mask of the client. The prefix length must be preceded by a forward slash (/). default-router address Example: Specifies the IP address of the default router for a DHCP client. Switch(dhcp-config)# default-router 10.10.10.1 option 150 address Example: Switch(dhcp-config)# option 150 10.10.10.1 Specifies the IP address of the TFTP server. option 125 hex Example: Specifies the path to the text file that describes the path to the image file. Switch(dhcp-config)# option 125 hex 0000.0009.0a05.08661.7574.6f69.6e73.7461.6c6c.5f64.686370 Step 8 Step 9 Step 10 Step 11 copy tftp flash filename.txt Example: Switch(config)# copy tftp flash image.bin copy tftp flash imagename.bin Example: Switch(config)# copy tftp flash image.bin exit Example: Switch(dhcp-config)# exit tftp-server flash: config.text Example: Uploads the text file to the switch. Uploads the tar file for the new image to the switch. Returns to global configuration mode. Specifies the Cisco IOS configuration file on the TFTP server. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1811 Configuring DHCP Auto-Image Update (Configuration File and Image) System Management Command or Action Purpose Switch(config)# tftp-server flash:config-boot.text Step 12 Step 13 tftp-server flash: imagename.bin Example: Switch(config)# tftp-server flash:image.bin Specifies the image name on the TFTP server. tftp-server flash: filename.txt Example: Specifies the text file that contains the name of the image file to download Switch(config)# tftp-server flash:boot-config.text Step 14 Step 15 Step 16 Step 17 Step 18 interface interface-id Example: Specifies the address of the client that will receive the configuration file. Switch(config)# interface gigabitEthernet1/0/4 no switchport Example: Switch(config-if)# no switchport Puts the interface into Layer 3 mode. ip address address mask Example: Switch(config-if)# ip address 10.10.10.1 255.255.255.0 Specifies the IP address and mask for the interface. end Example: Switch(config-if)# end Returns to privileged EXEC mode. copy running-config startup-config Example: Switch(config-if)# end (Optional) Saves your entries in the configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1812 System Management Configuring the Client to Download Files from DHCP Server Related Topics Example: Configuring DHCP Auto-Image Update, on page 1827 Configuring the Client to Download Files from DHCP Server Note You should only configure and enable the Layer 3 interface. Do not assign an IP address or DHCP-based autoconfiguration with a saved configuration. SUMMARY STEPS 1. configure terminal 2. boot host dhcp 3. boot host retry timeout timeout-value 4. banner config-save ^C warning-message ^C 5. end 6. show boot DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 boot host dhcp Example: Switch(conf)# boot host dhcp Enables autoconfiguration with a saved configuration. Step 3 Step 4 boot host retry timeout timeout-value Example: Switch(conf)# boot host retry timeout 300 (Optional) Sets the amount of time the system tries to download a configuration file. Note If you do not set a timeout, the system will try indefinitely to obtain an IP address from the DHCP server. banner config-save ^C warning-message ^C Example: (Optional) Creates warning messages to be displayed when you try to save the configuration file to NVRAM. Switch(conf)# banner config-save ^C Caution Saving Configuration File to NVRAM May Cause You to No longer Automatically Download Configuration Files at Reboot^C Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1813 Manually Assigning IP Information to Multiple SVIs System Management Step 5 Command or Action end Example: Switch(config-if)# end Step 6 show boot Example: Switch# show boot Purpose Returns to privileged EXEC mode. Verifies the configuration. Related Topics Example: Configuring a Switch to Download Configurations from a DHCP Server, on page 1827 Manually Assigning IP Information to Multiple SVIs This task describes how to manually assign IP information to multiple switched virtual interfaces (SVIs): Note If the switch is running the IP services feature set, you can also manually assign IP information to a port if you first put the port into Layer 3 mode by using the no switchport interface configuration command. SUMMARY STEPS 1. configure terminal 2. interface vlan vlan-id 3. ip address ip-address subnet-mask 4. exit 5. ip default-gateway ip-address 6. end 7. show interfaces vlan vlan-id 8. show ip redirects DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1814 System Management Manually Assigning IP Information to Multiple SVIs Step 2 Command or Action interface vlan vlan-id Example: Switch(config)# interface vlan 99 Purpose Enters interface configuration mode, and enters the VLAN to which the IP information is assigned. The range is 1 to 4094. Step 3 ip address ip-address subnet-mask Example: Switch(config-vlan)# ip address 10.10.10.2 255.255.255.0 Enters the IP address and subnet mask. Step 4 exit Example: Switch(config-vlan)# exit Returns to global configuration mode. Step 5 Step 6 ip default-gateway ip-address Example: Switch(config)# ip default-gateway 10.10.10.1 end Example: Switch(config)# end Enters the IP address of the next-hop router interface that is directly connected to the switch where a default gateway is being configured. The default gateway receives IP packets with unresolved destination IP addresses from the switch. Once the default gateway is configured, the switch has connectivity to the remote networks with which a host needs to communicate. Note When your switch is configured to route with IP, it does not need to have a default gateway set. Note The switch capwap relays on default-gateway configuration to support routed access point join the switch. Returns to privileged EXEC mode. Step 7 show interfaces vlan vlan-id Example: Switch# show interfaces vlan 99 Verifies the configured IP address. Step 8 show ip redirects Example: Verifies the configured default gateway. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1815 Modifying the Switch Startup Configuration System Management Command or Action Switch# show ip redirects Purpose Modifying the Switch Startup Configuration Specifying the Filename to Read and Write the System Configuration By default, the Cisco IOS software uses the config.text file to read and write a nonvolatile copy of the system configuration. However, you can specify a different filename, which will be loaded during the next boot cycle. Before you begin Use a standalone switch for this task. SUMMARY STEPS 1. configure terminal 2. boot flash:/file-url 3. end 4. show boot 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 boot flash:/file-url Example: Switch(config)# boot flash:config.text Step 3 end Example: Switch(config)# end Specifies the configuration file to load during the next boot cycle. file-url--The path (directory) and the configuration filename. Filenames and directory names are case-sensitive. Returns to privileged EXEC mode. Step 4 show boot Example: Verifies your entries. The boot global configuration command changes the setting of the CONFIG_FILE environment variable. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1816 System Management Manually Booting the Switch Command or Action Switch# show boot Purpose Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Manually Booting the Switch By default, the switch automatically boots up; however, you can configure it to manually boot up. Before you begin Use a standalone switch for this task. SUMMARY STEPS 1. configure terminal 2. boot manual 3. end 4. show boot 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 boot manual Example: Switch(config)# boot manual Enables the switch to manually boot up during the next boot cycle. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 show boot Example: Verifies your entries. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1817 Booting the Switch in Installed Mode System Management Command or Action Switch# show boot Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose The boot manual global command changes the setting of the MANUAL_BOOT environment variable. The next time you reboot the system, the switch is in boot loader mode, shown by the switch: prompt. To boot up the system, use the boot boot loader command in installed boot mode or bundle boot mode. · switch: boot flash:packages.conf · switch: boot flash:cat3850-universalk9.SSA.03.08.83.EMD.150-8.83.EMD.bin Filenames and directory names are case-sensitive. (Optional) Saves your entries in the configuration file. Booting the Switch in Installed Mode SUMMARY STEPS 1. cp source_file_path destination_file_path 2. software expand file source_file_path 3. reload 4. boot flash:packages.conf 5. show version DETAILED STEPS Step 1 Command or Action Purpose cp source_file_path destination_file_path Example: (Optional) Copies the bin file (image.bin) from the FTP or TFTP server to flash or USB flash. Switch# copy tftp://10.0.0.6/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash: Step 2 software expand file source_file_path Expands the bin file stored in flash, FTP, TFTP, HTTP, or Example: HTTPS server on the booted switch. Expanding the bin file from the TFTP server: Note Ensure that the packages.conf file is available in the expanded list. Switch# software expand file tftp://10.0.0.2/cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin to flash: Preparing expand operation ... [1]: Downloading file Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1818 System Management Booting the Switch in Installed Mode Command or Action Purpose tftp://10.0.0.2/cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin to active switch 1 [1]: Finished downloading file tftp://10.0.0.2/cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37. EXP.bin to active switch 1 [1]: Copying software from active switch 1 to switch 2 [1]: Finished copying software to switch 2 [1 2]: Expanding bundle cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin [1 2]: Copying package files [1 2]: Package files copied [1 2]: Finished expanding bundle cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin Step 3 Step 4 Step 5 18 -rw- 74387812 Dec 7 2012 05:55:43 +00:00 cat3k_caa-base.SSA.03.09.37.EXP.pkg 19 -rw- 2738868 Dec 7 2012 05:55:44 +00:00 cat3k_caa-drivers.SSA.03.09.37.EXP.pkg 20 -rw- 32465772 Dec 7 2012 05:55:44 +00:00 cat3k_caa-infra.SSA.03.09.37.EXP.pkg 21 -rw- 30389036 Dec 7 2012 05:55:44 +00:00 cat3k_caa-iosd-universalk9.SSA.150-9.37.EXP.pkg 22 -rw- 18342624 Dec 7 2012 05:55:44 +00:00 cat3k_caa-platform.SSA.03.09.37.EXP.pkg 23 -rw- 63374028 Dec 7 2012 05:55:44 +00:00 cat3k_caa-wcm.SSA.10.0.10.14.pkg 17 -rw- 1239 Dec 7 2012 05:56:29 +00:00 packages.conf reload Example: Switch: reload Reloads the switch. Note You can boot the switch manually or automatically using the packages.conf file. If you are booting manually, you can proceed to Step 4. Otherwise, the switch boots up automatically. boot flash:packages.conf Example: switch: boot flash:packages.conf show version Example: switch# show version Switch Ports Model SW Image Mode ------ ----- ----- ---------- ---- 16 WS-C3850-6DS-S ct3850-ipservicesk9 INSTALL SW Version ---------03.09.26.EXP Boots the switch with the packages.conf file. Verifies that the switch is in the INSTALL mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1819 Booting the Switch in Bundle Mode System Management Booting the Switch in Bundle Mode There are several methods by which you can boot the switch--either by copying the bin file from the TFTP server and then boot the switch, or by booting the switch straight from flash or USB flash using the commands boot flash:<image.bin> or boot usbflash0:<image.bin> . The following procedure explains how to boot the switch from th TFTP server in the bundle mode. SUMMARY STEPS 1. cp source_file_path destination_file_path 2. switch:BOOT=<source path of .bin file> 3. boot 4. show version DETAILED STEPS Step 1 Command or Action Purpose cp source_file_path destination_file_path Example: (Optional) Copies the bin file (image.bin) from the FTP or TFTP server to flash or USB flash. Switch# copy tftp://10.0.0.6/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash: Step 2 switch:BOOT=<source path of .bin file> Sets the boot parameters. Example: Switch: switch:BOOT=tftp://10.0.0.2/cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin Step 3 boot Example: switch: boot Boots the switch. Step 4 show version Example: switch# show version Switch Ports Model SW Image Mode ------ ----- ----- ---------- ---- 16 WS-C3850-6DS-S ct3850-ipservicesk9 BUNDLE SW Version ---------03.09.40.EXP Verifies that the switch is in the BUNDLE mode. Booting a Specific Software Image On a Switch Stack SUMMARY STEPS 1. configure terminal 2. boot system switch {number | all} flash:image_file| tftp: image_file | usbflash0: image_file 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1820 System Management Configuring a Scheduled Software Image Reload 4. show boot system 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 boot system switch {number | all} flash:image_file| tftp: (Optional) For switches in a stack, specifies the switch image_file | usbflash0: image_file members on which the system image is loaded during the Example: next boot cycle: · Use number to specify a stack member. (Specify only Switch(config)# boot system switch 2 one stack member.) flash:cat3850-universalk9.SSA.03.08.83.EMD.150-8.83.EMD.bin · Use all to specify all stack members. end Example: Returns to privileged EXEC mode. Switch(config)# end Step 4 show boot system Example: Switch# show boot system Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config Verifies your entries. The boot system global command changes the setting of the BOOT environment variable. During the next boot cycle, the switch attempts to automatically boot up the system using information in the BOOT environment variable. (Optional) Saves your entries in the configuration file. Configuring a Scheduled Software Image Reload This task describes how to configure your switch to reload the software image at a later time. SUMMARY STEPS 1. configure terminal 2. copy running-config startup-config 3. reload in [hh:]mm [text] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1821 Configuring a Scheduled Software Image Reload System Management 4. reload at hh: mm [month day | day month] [text] 5. reload cancel 6. show reload DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 Step 3 copy running-config startup-config Example: copy running-config startup-config reload in [hh:]mm [text] Example: Switch(config)# reload in 12 System configuration has been modified. Save? [yes/no]: y Saves your switch configuration information to the startup configuration before you use the reload command. Schedules a reload of the software to take affect in the specified minutes or hours and minutes. The reload must take place within approximately 24 days. You can specify the reason for the reload in a string up to 255 characters in length. Step 4 reload at hh: mm [month day | day month] [text] Example: Switch(config)# reload at 14:00 Step 5 Step 6 reload cancel Example: Switch(config)# reload cancel show reload Example: show reload Specifies the time in hours and minutes for the reload to occur. Note Use the at keyword only if the switch system clock has been set (through Network Time Protocol (NTP), the hardware calendar, or manually). The time is relative to the configured time zone on the switch. To schedule reloads across several switches to occur simultaneously, the time on each switch must be synchronized with NTP. Cancels a previously scheduled reload. Displays information about a previously scheduled reload or identifies if a reload has been scheduled on the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1822 System Management Monitoring Switch Setup Configuration Monitoring Switch Setup Configuration Example: Verifying the Switch Running Configuration Switch# show running-config Building configuration... Current configuration: 1363 bytes ! version 12.4 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Stack1 ! enable secret 5 $1$ej9.$DMUvAUnZOAmvmgqBEzIxE0 ! . <output truncated> . interface gigabitethernet6/0/2 mvr type source <output truncated> ...! interface VLAN1 ip address 172.20.137.50 255.255.255.0 no ip directed-broadcast ! ip default-gateway 172.20.137.1 ! ! snmp-server community private RW snmp-server community public RO snmp-server community private@es0 RW snmp-server community public@es0 RO snmp-server chassis-id 0x12 ! end Examples: Displaying Software Bootup in Install Mode This example displays software bootup in install mode: switch: boot flash:packages.conf Getting rest of image Reading full image into memory....done Reading full base package into memory...: done = 74596432 Nova Bundle Image -------------------------------------Kernel Address : 0x6042f354 Kernel Size : 0x318412/3245074 Initramfs Address : 0x60747768 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1823 Examples: Displaying Software Bootup in Install Mode System Management Initramfs Size : 0xdc08e8/14420200 Compression Format: .mzip Bootable image at @ ram:0x6042f354 Bootable image segment 0 address range [0x81100000, 0x81b80000] is in range [0x80180000, 0x90000000]. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@boot_system: 377 Loading Linux kernel with entry point 0x811060f0 ... Bootloader: Done loading app on core_mask: 0xf ### Launching Linux Kernel (flags = 0x5) All packages are Digitally Signed Starting System Services Nov 7 09:57:05 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-DISC_START: Switch 2 is starting stack discovery ####################################################################################################################### Nov 7 09:59:07 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-DISC_DONE: Switch 2 has finished stack discovery Nov 7 09:59:07 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-SWITCH_ADDED: Switch 2 has been added to the stack Nov 7 09:59:14 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-ACTIVE_ELECTED: Switch 2 has been elected ACTIVE Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.09.12.EMD EARLY DEPLOYMENT ENGINEERING NOVA_WEEKLY BUILD, synced to DSGS_PI2_POSTPC_FLO_DSBU7_NG3K_1105 Copyright (c) 1986-2012 by Cisco Systems, Inc. Compiled Sun 04-Nov-12 22:53 by gereddy License level to iosd is ipservices This example display software bootup in bundle mode: switch: boot flash:cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin Reading full image into memory..................................................................done Nova Bundle Image -------------------------------------Kernel Address : 0x6042ff38 Kernel Size : 0x318412/3245074 Initramfs Address : 0x6074834c Initramfs Size : 0xdc08e8/14420200 Compression Format: .mzip Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1824 System Management Example: Emergency Installation Bootable image at @ ram:0x6042ff38 Bootable image segment 0 address range [0x81100000, 0x81b80000] is in range [0x80180000, 0x90000000]. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ File "flash:cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin" uncompressed and installed, entry point: 0x811060f0 Loading Linux kernel with entry point 0x811060f0 ... Bootloader: Done loading app on core_mask: 0xf ### Launching Linux Kernel (flags = 0x5) All packages are Digitally Signed Starting System Services Nov 7 09:45:49 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-DISC_START: Switch 2 is starting stack discovery ####################################################################################################################### Nov 7 09:47:50 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-DISC_DONE: Switch 2 has finished stack discovery Nov 7 09:47:50 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-SWITCH_ADDED: Switch 2 has been added to the stack Nov 7 09:47:58 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-ACTIVE_ELECTED: Switch 2 has been elected ACTIVE Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.09.12.EMD EARLY DEPLOYMENT ENGINEERING NOVA_WEEKLY BUILD, synced to DSGS_PI2_POSTPC_FLO_DSBU7_NG3K_1105 Copyright (c) 1986-2012 by Cisco Systems, Inc. Compiled Sun 04-Nov-12 22:53 by gereddy License level to iosd is ipservices Related Topics Software Boot Modes, on page 1797 Installed Boot Mode, on page 1797 Bundle Boot Mode, on page 1797 Example: Emergency Installation This sample output is an example when the emergency-install boot command is initiated: switch: emergency-install tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin The bootflash will be erased during install operation, continue (y/n)?y Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1825 Example: Emergency Installation System Management Starting emergency recovery (tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin)... Reading full image into memory......................done Nova Bundle Image -------------------------------------Kernel Address : 0x6042e5cc Kernel Size : 0x318261/3244641 Initramfs Address : 0x60746830 Initramfs Size : 0xdb0fb9/14356409 Compression Format: .mzip Bootable image at @ ram:0x6042e5cc Bootable image segment 0 address range [0x81100000, 0x81b80000] is in range [0x80180000, 0x90000000]. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ File "sda9:c3850-recovery.bin" uncompressed and installed, entry point: 0x811060f0 Loading Linux kernel with entry point 0x811060f0 ... Bootloader: Done loading app on core_mask: 0xf ### Launching Linux Kernel (flags = 0x5) Initiating Emergency Installation of bundle tftp://172.19.211.47/cstohs/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin Downloading bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin... Validating bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin... Installing bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin... Verifying bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin... Package cat3k_caa-base.SSA.03.09.12.EMD.pkg is Digitally Signed Package cat3k_caa-drivers.SSA.03.09.12.EMD.pkg is Digitally Signed Package cat3k_caa-infra.SSA.03.09.12.EMD.pkg is Digitally Signed Package cat3k_caa-iosd-universalk9.SSA.150-9.12.EMD.pkg is Digitally Signed Package cat3k_caa-platform.SSA.03.09.12.EMD.pkg is Digitally Signed Package cat3k_caa-wcm.SSA.03.09.12.EMD.pkg is Digitally Signed Preparing flash... Syncing device... Emergency Install successful... Rebooting Restarting system. Booting...(use DDR clock 667 MHz)Initializing and Testing RAM +++@@@@####...++@@++@@++@@++@ Related Topics Software Boot Modes, on page 1797 Installed Boot Mode, on page 1797 Bundle Boot Mode, on page 1797 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1826 System Management Configuration Examples for Performing Switch Setup Configuration Examples for Performing Switch Setup Example: Configuring a Switch as a DHCP Server Switch# configure terminal Switch(config)# ip dhcp pool pool1 Switch(dhcp-config)# network 10.10.10.0 255.255.255.0 Switch(dhcp-config)# boot config-boot.text Switch(dhcp-config)# default-router 10.10.10.1 Switch(dhcp-config)# option 150 10.10.10.1 Switch(dhcp-config)# exit Switch(config)# tftp-server flash:config-boot.text Switch(config)# interface gigabitethernet1/0/4 Switch(config-if)# no switchport Switch(config-if)# ip address 10.10.10.1 255.255.255.0 Switch(config-if)# end Related Topics Configuring DHCP Autoconfiguration (Only Configuration File), on page 1807 Example: Configuring DHCP Auto-Image Update Related Topics Configuring DHCP Auto-Image Update (Configuration File and Image), on page 1809 Example: Configuring a Switch to Download Configurations from a DHCP Server This example uses a Layer 3 SVI interface on VLAN 99 to enable DHCP-based autoconfiguration with a saved configuration: Switch# configure terminal Switch(config)# boot host dhcp Switch(config)# boot host retry timeout 300 Switch(config)# banner config-save ^C Caution - Saving Configuration File to NVRAM May Cause You to No longer Automatically Download Configuration Files at Reboot^C Switch(config)# vlan 99 Switch(config-vlan)# interface vlan 99 Switch(config-if)# no shutdown Switch(config-if)# end Switch# show boot BOOT path-list: Config file: flash:/config.text Private Config file: flash:/private-config.text Enable Break: no Manual Boot: no HELPER path-list: NVRAM/Config file buffer size: 32768 Timeout for Config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1827 Examples: Scheduling Software Image Reload System Management Download: Config Download via DHCP: Switch# 300 seconds enabled (next boot: enabled) Related Topics Configuring the Client to Download Files from DHCP Server, on page 1813 Examples: Scheduling Software Image Reload This example shows how to reload the software on the switch on the current day at 7:30 p.m: Switch# reload at 19:30 Reload scheduled for 19:30:00 UTC Wed Jun 5 2013 (in 2 hours and 25 minutes) Proceed with reload? [confirm] This example shows how to reload the software on the switch at a future time: Switch# reload at 02:00 jun 20 Reload scheduled for 02:00:00 UTC Thu Jun 20 2013 (in 344 hours and 53 minutes) Proceed with reload? [confirm] Additional References For Performing Switch Setup Related Documents Related Topic Switch setup commands Boot loader commands Pre-download feature IOS XE DHCP configuration Hardware installation Platform-independent command references Document Title System Management Command Reference (Catalyst 3650 Switches) System Management Configuration Guide (Cisco WLC 5700 Series) IP Addressing Configuration Guide Library, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Catalyst 3650 Switch Hardware Installation Guide Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1828 System Management Feature History and Information For Performing Switch Setup Configuration Related Topic Platform-independent configuration information Document Title Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches) IP Addressing Configuration Guide Library, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For Performing Switch Setup Configuration Command History Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1829 Feature History and Information For Performing Switch Setup Configuration System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1830 8 9 C H A P T E R Configuring Right-To-Use Licenses · Finding Feature Information, on page 1831 · Restrictions for Configuring RTU Licenses, on page 1831 · Information About Configuring RTU Licenses, on page 1832 · How to Configure RTU Licenses, on page 1835 · Monitoring and Maintaining RTU Licenses, on page 1840 · Configuration Examples for RTU Licensing, on page 1840 · Additional References for RTU Licensing, on page 1844 · Feature History and Information for RTU Licensing, on page 1845 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Configuring RTU Licenses The following are the restrictions for configuring and using RTU licenses. · AP count licenses can be ordered and pre-activated on your switch. · Imaged based licenses can be upgraded. AP count licenses can be deactivated and moved between switches and controllers. · To activate a permanent license, you must reboot your switch after configuring the new image level. The AP-count license does not require a reboot to activate. · An expired image based evaluation license can not be reactivated after reboot. · Stack members of a switch stack must run the same license level. · Licenses on mixed switch stacks are not supported. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1831 Information About Configuring RTU Licenses System Management · Your switch is pre-installed with the image that you ordered. If an image was not pre-ordered, then the switch is booted with a LAN base image by default. · Adder AP-count licenses are installed in the factory. Related Topics Activating an Imaged Based License, on page 1835 Examples: Activating RTU Image Based Licenses, on page 1840 Information About Configuring RTU Licenses Right-To-Use Licensing Right-to-use (RTU) licensing allows you to order and activate a specific license type and level, and then to manage license usage on your switch. The types of licenses available to order are: · Permanent licenses--Purchased with a specific feature set with no expiration date. · Evaluation licenses--Pre-installed on the switch and is valid for only a 90 day in-use period. To activate a permanent or evaluation license, you are required to accept the End-User License Agreement (EULA). For the evaluation license, you are notified to purchase a permanent license or deactivate the license before the 90 day period expires. A permanent license can be moved from one device to another. To activate a license, you must reboot your switch. An evaluation license is a manufacturing image on your switch and is not transferable to another switch. This type of license cannot be reactivated after reboot. Related Topics Activating an Imaged Based License, on page 1835 Examples: Activating RTU Image Based Licenses, on page 1840 Right-To-Use Image Based Licenses Right-to-use imaged licenses support a set of features based on a specific image-based license: · LAN Base--Layer 2 features. · IP Base--Layer 2 and Layer 3 features. · IP Services--Layer 2, Layer 3, and IPv6 features. (Applicable only to switches and not controllers.) The default image based license is LAN Base. Right-To-Use License States After you configure a specific license type and level, you can manage your licenses by monitoring the license state. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1832 System Management License Activation for Switch Stacks Table 162: RTU License States License State Active, In Use Active, Not In Use Not Activated Description EULA was accepted and the license is in use after device reboot. EULA was accepted and the switch is ready to use when the license is enabled. EULA was not accepted. Guidelines to follow when monitoring your image based license state: · A purchased permanent license is set to Active, In Use state only after a switch reboot. · If more than one license was purchased, a reboot will activate the license with the highest feature set. For instance, the IP Services license is activated and not the LAN Base license. · Remaining licenses purchased after switch reboot, stay in Active, Not In Use state. Note For the AP count license, to change the state to Active, In Use, you must first make sure that the evaluation AP count license is deactivated. License Activation for Switch Stacks Right-to-use licensing is supported on switch stacks. A switch is a set of up to nine stacking-capable switches connected through their StackWise-160 ports. You can connect only one switch type in a stack. One switch in the stack is identified as the active switch and the remaining switches are standby switches. The active switch is the switch that is activated with an RTU license and from its active console, the license level for the standby switches in the stack can be activated at the same time. A new switch is allowed to join the switch stack if its license level matches. If there is a mismatch, then the active switch can reconfigure the license level and reboot it to allow it to join the stack. Mobility Controller Mode AP-count licenses are used only when the switch is in Mobility Controller mode. The MC is the gatekeeper for tracking the AP-count licenses and allows an access point to join or not. Management of AP-count licenses is performed by the switch in mobility controller mode configurable through the CLI. Related Topics Changing Mobility Mode, on page 1838 Right-To-Use AP-Count Licensing Right-to-use licensing (RTU) allows you to order and activate a specific license type, and then to manage license usage on your switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1833 Right-to-Use AP-Count Evaluation Licenses System Management You can order your switch with support for a specific number of adder access point count licenses, but the total number of licenses ordered should not exceed 25. You can also order your adder access point count licenses after receiving the switch. For example, if you have ordered 25 new adder licenses, you can add only those ordered adder licenses to the switch. The licenses can be added in increments of 1, but the total number of licenses added for the switch should not exceed 25 . You can configure your switch to manage the access point count licenses and view the number of access points currently in use from the CLI. The following are two different types of access point licenses: 1. Permanent licenses for the access points · Adder access point count license--You can purchase the adder license to increase the switch capacity at a later time. You can transfer the adder access point count license from one switch to another. 2. Evaluation licenses for the access points · You can activate these licenses to evaluate more access points before purchasing the licenses. · The maximum number of access points that can be evaluated is 25 . · The evaluation period for using the access point licenses is 90 days. · You can activate and deactivate the evaluation licenses from the CLI. Related Topics Activating an AP-Count License, on page 1836 Obtaining an Upgrade or Capacity Adder License, on page 1837 Rehosting a License, on page 1838 Right-to-Use AP-Count Evaluation Licenses If you are considering upgrading to a license with a higher access point count, you can try an evaluation license before upgrading to a permanent version of the license. For example, if you are using a permanent license with a 10 access-point count and want to try an evaluation license with a 15-access-point count, you can try out the evaluation license for 90 days. When an evaluation license is activated, the permanent AP-count licenses are ignored. The maximum supported licenses of 25 access points are available for 90 days. To prevent disruptions in operation, the switch does not change licenses when an evaluation license expires. A warning expiry message is displayed daily starting five days prior to the expiry date. After 90 days, the evaluation license expires with a warning message. You must disable the evaluation license and then purchase the permanent license. When the switch reboots after the evaluation license expiry, the license defaults to a permanent license. Related Topics Activating an AP-Count License, on page 1836 Obtaining an Upgrade or Capacity Adder License, on page 1837 Rehosting a License, on page 1838 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1834 System Management Right-To-Use Adder AP-Count Rehosting Licenses Right-To-Use Adder AP-Count Rehosting Licenses Revoking a license from one device and installing it on another is called rehosting. You might want to rehost a license to change the purpose of a device. To rehost a license, you must deactivate the adder ap-count license from one device and activate the same license on another device. Evaluation licenses cannot be rehosted. How to Configure RTU Licenses Activating an Imaged Based License SUMMARY STEPS 1. license right-to-use activate{ipbase |ipservices | lanbase} {all | evaluation all } [slot slot-number] [ acceptEULA] 2. reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ] 3. show license right-to-use usage [ slot slot-number ] DETAILED STEPS Step 1 Command or Action Purpose license right-to-use activate{ipbase |ipservices | lanbase} {all | evaluation all } [slot slot-number] [ acceptEULA] Activates a type of image based license. Activation can happen on all switches and also include the EULA acceptance. Example: Note Switch# license right-to-use activate ipservices all acceptEULA If you do not accept EULA, the modified configuration will not take effect after reload. The default license (or a license that was not deactivated) becomes active after reload. Step 2 reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ] Example: Switch# reload slot 1 Proceed with reload? [confirm] y Reloads a specific stack member to complete the activation process for the RTU adder AP-count license. Note The reminder to accept a EULA is displayed after reload if it was not accepted earlier. Step 3 show license right-to-use usage [ slot slot-number ] Example: Displays detailed usage information. Switch# show license right-to-use usage Slot# License Name Type usage-duration(y:m:d) In-Use EULA ----------------------------------------------------------------------- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1835 Activating an AP-Count License System Management Command or Action 1 ipservices yes yes 1 ipbase no no 1 ipbase no no 1 lanbase no yes 1 apcount no no 1 apcount no no 1 apcount no no permanent 0 :10 :0 permanent 0 :0 :0 evaluation 0 :0 :0 permanent 0 :0 :7 evaluation 0 :0 :0 base 0 :0 :0 adder 0 :0 :0 Switch# Purpose Related Topics Restrictions for Configuring RTU Licenses, on page 1831 Right-To-Use Licensing, on page 1832 Monitoring and Maintaining RTU Licenses, on page 1840 Examples: Activating RTU Image Based Licenses, on page 1840 Activating an AP-Count License SUMMARY STEPS 1. license right-to-use activate{apcount ap-number slot slot-num} | evaluation} [ acceptEULA] 2. show license right-to-use usage [ slot slot-number ] DETAILED STEPS Step 1 Command or Action Purpose license right-to-use activate{apcount ap-number slot Activates one or more adder AP-count licenses and slot-num} | evaluation} [ acceptEULA] immediately accepts the EULA. Example: Switch# license right to use activate apcount 5 slot 1 acceptEULA Step 2 show license right-to-use usage [ slot slot-number ] Example: Displays detailed usage information. Switch# show license right-to-use usage Slot# License Name Type usage-duration(y:m:d) In-Use EULA ----------------------------------------------------------------------- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1836 System Management Obtaining an Upgrade or Capacity Adder License Command or Action 1 ipservices yes yes 1 ipservices no no 1 ipbase no no 1 ipbase no no 1 lanbase no no 1 apcount no no 1 apcount no yes 1 apcount yes yes permanent 0 :3 :29 evaluation 0 :0 :0 permanent 0 :0 :0 evaluation 0 :0 :0 permanent 0 :0 :0 evaluation 0 :3 :11 base 0 :0 :0 adder 0 :0 :17 Switch# Purpose Related Topics Monitoring and Maintaining RTU Licenses, on page 1840 Right-To-Use AP-Count Licensing, on page 1833 Right-to-Use AP-Count Evaluation Licenses, on page 1834 Obtaining an Upgrade or Capacity Adder License You can use the capacity adder licenses to increase the number of access points supported by the switch. SUMMARY STEPS 1. license right-to-use {activate | deactivate} apcount {ap-number | evaluation } slot slot-num [ acceptEULA] DETAILED STEPS Step 1 Command or Action Purpose license right-to-use {activate | deactivate} apcount Activates one or more adder AP-count licenses and {ap-number | evaluation } slot slot-num [ acceptEULA] immediately accepts the EULA. Example: Switch# license right to use activate apcount 5 slot 2 acceptEULA Related Topics Right-to-Use AP-Count Evaluation Licenses, on page 1834 Right-To-Use AP-Count Licensing, on page 1833 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1837 Rehosting a License System Management Rehosting a License To rehost a license, you have to deactivate the license from one switch and then activate the same license on another switch. SUMMARY STEPS 1. license right-to-use deactivate apcount ap-number slot slot-num [ acceptEULA] 2. license right-to-use activate apcount ap-number slot slot-num [ acceptEULA] DETAILED STEPS Step 1 Command or Action Purpose license right-to-use deactivate apcount ap-number slot Deactivates the license on one switch. slot-num [ acceptEULA] Example: Switch# license right to use deactivate apcount 1 slot 1 acceptEULA Step 2 license right-to-use activate apcount ap-number slot slot-num [ acceptEULA] Example: Switch# license right to use activate apcount 2 slot 2 acceptEULA Activates the license on another switch. Related Topics Right-To-Use AP-Count Licensing, on page 1833 Right-to-Use AP-Count Evaluation Licenses, on page 1834 Changing Mobility Mode SUMMARY STEPS 1. wireless mobility controller 2. write memory 3. reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ] 4. no wireless mobility controller 5. write memory 6. reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ] DETAILED STEPS Step 1 Command or Action wireless mobility controller Example: Purpose Changes a switch in Mobility Agent mode to Mobility Controller mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1838 System Management Changing Mobility Mode Command or Action Switch(config)# wireless mobility controller % Mobility role changed to Mobility Controller. Please save config and reboot the whole stack. Purpose Step 2 write memory Example: Switch# write memory Building configuration... Compressed configuration from 13870 bytes to 5390 bytes[OK] Switch# Step 3 reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ] Example: Switch# reload slot 3 Proceed with reload? [confirm] y Step 4 no wireless mobility controller Example: Switch(config)# no wireless mobility controller % Mobility role changed to Mobility Agent. Please save config and reboot the whole stack. Switch(config)# Changes a switch in Mobility Controller mode to Mobility Agent mode. Step 5 write memory Example: Switch# write memory Building configuration... Compressed configuration from 13870 bytes to 5390 bytes[OK] Switch# Step 6 reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ] Example: Switch# reload slot 3 Proceed with reload? [confirm] y Related Topics Mobility Controller Mode, on page 1833 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1839 Monitoring and Maintaining RTU Licenses System Management Monitoring and Maintaining RTU Licenses Command show license right-to-use default Purpose Displays the default license information. show license right-to-use detail Displays detailed information of all the licenses in the switch stack. show license right-to-use eula {adder | evaluation Displays the end user license agreement. | permanent} show license right-to-use mismatch Displays the license information that does not match. show license right-to-use slot slot-number Displays the license information for a specific slot in a switch stack. show license right-to-use summary Displays a summary of the license information on the entire switch stack. show license right-to-use usage [ slot slot-number Displays detailed information about usage for all ] licenses in the switch stack. show switch Displays detailed information of every member in a switch stack including the state of the license. Related Topics Activating an Imaged Based License, on page 1835 Examples: Activating RTU Image Based Licenses, on page 1840 Activating an AP-Count License, on page 1836 Configuration Examples for RTU Licensing Examples: Activating RTU Image Based Licenses This example shows how to activate an IP Services image license and accept the EULA for a specific slot: Switch# license right-to-use activate ipservices slot 1 acceptEULA % switch-1:stack-mgr:Reboot the switch to invoke the highest activated License level This example shows how to activate a license for evaluation: Switch# license right-to-use activate ipservices evaluation acceptEULA % switch-1:stack-mgr:Reboot the switch to invoke the highest activated License level Related Topics Activating an Imaged Based License, on page 1835 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1840 System Management Examples: Displaying RTU Licensing Information Restrictions for Configuring RTU Licenses, on page 1831 Right-To-Use Licensing, on page 1832 Monitoring and Maintaining RTU Licenses, on page 1840 Examples: Displaying RTU Licensing Information This example shows the consolidated RTU licensing information from the active switch on a switch stack. All of the members in the stack have the same license level. When the evaluation AP-count license is activated, the adder AP-count licenses are ignored. The maximum number of AP-count licenses are available when evaluation is enabled. Switch# show license right-to-use summary License Name Type Count Period left ------------------------------------------------------- ipservices permanent 10 Lifetime apcount evaluation 15 90 ------------------------------------------------------- License Level In Use: ipservices License Level on Reboot: ipbase Evaluation AP-Count: Enabled Total AP Count Licenses: 25 AP Count Licenses In-use: 10 AP Count Licenses Remaining: 15 This example shows a summary of permanent and adder licenses. The evaluation AP-count license is disabled displaying the total number of activated adder AP-count licenses in the switch stack. AP-count licenses in-use mean that they are connected. Switch# show license right-to-use summary License Name Type Count Period left ------------------------------------------------------------- ipservices permanent N/A Lifetime apcount base 0 apcount adder 25 Lifetime ------------------------------------------------------------- License Level In Use: ipservices License Level on Reboot: ipservices eval Evaluation AP-Count: Disabled Total AP Count Licenses: 25 AP Count Licenses In-use: 10 AP Count Licenses Remaining: 15 This example shows the RTU default licenses. Default licenses are pre-installed and cannot be removed or transferred. If no license is activated the switch uses the default license, after a reboot. Switch# show license right-to-use default Slot# License Name Type Count ---------------------------------------------------- 1 ipservices permanent N/A Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1841 Example: Displaying RTU License Details System Management 1 apcount base 0 1 apcount adder 10 Slot# License Name Type Count ---------------------------------------------------- 2 ipservices permanent N/A 2 apcount base 0 2 apcount adder 10 Slot# License Name Type Count ---------------------------------------------------- 3 ipservices permanent N/A 3 apcount base 0 3 apcount adder 10 Example: Displaying RTU License Details This example shows all the detailed information for the RTU licenses on slot 1: Switch# show license right-to-use detail slot 1 Index 1: Index 2: Index 3: Index 4: Index 5: Index 6: Index 7: License Name: ipservices Period left: Lifetime License Type: permanent License State: Active, In use License Count: Non-Counted License Location: Slot 1 License Name: ipservices Period left: 90 License Type: evaluation License State: Not Activated License Count: Non-Counted License Location: Slot 1 License Name: ipbase Period left: Lifetime License Type: permanent License State: Active, Not In use License Count: Non-Counted License Location: Slot 1 License Name: ipbase Period left: 90 License Type: evaluation License State: Not Activated License Count: Non-Counted License Location: Slot 1 License Location: Standby Switch 1 License Name: lanbase Period left: Lifetime License Type: permanent License State: Not Activated License Count: Non-Counted License Location: Slot 1 License Name: apcount Period left: 90 License Type: evaluation License State: Active, In use License Count: 50 License Location: Slot 1 License Name: apcount Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1842 System Management Example: Displaying RTU License Mismatch Index 8: Period left: Lifetime License Type: base License State: Active, Not In use License Count: 0 License Location: Slot 1 License Name: apcount Period left: Lifetime License Type: adder License State: Active, Not In use License Count: 10 License Location: Slot 1 Example: Displaying RTU License Mismatch This example shows the license information of the switches in a stack and a mismatch state of a member switch. The member must match the active. Switch# show switch Switch/Stack Mac Address : 6400.f125.0c80 H/W Current Switch# Role Mac Address Priority Version State ------------------------------------------------------------------------------- 1 Standby 6400.f125.1b00 1 0 Ready *2 Active 6400.f125.0c80 1 V01 Ready 3 Member 6400.f125.1780 1 0 Lic-Mismatch Note To resolve the license mismatch, first check the RTU license summary: Switch# show switch right-to-use summary Then change the license level of the mismatched switched so that it is the same license level of the active switch. This example shows that the IP Base license was activated for the member switch to match the active switch. Switch# license right-to-use activate ipbase slot 1 acceptEULA Example: Displaying RTU Licensing Usage This example shows the detailed licensing usage on your switch stack. The IP Services license in Slot 1 is permanent and usage is one day. An AP-count license in Slot 2 is ready for evaluation. EULA was accepted and state shows in use, but after reboot the evaluation license will be deactivated. Switch# show license right-to-use usage Slot# License Name Type usage-duration(y:m:d) In-Use EULA --------------------------------------------------------------------------------------------- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1843 Additional References for RTU Licensing System Management 1 ipservices permanent 0 :0 :1 1 ipservices evaluation 0 :0 :0 1 ipbase permanent 0 :0 :0 1 ipbase evaluation 0 :0 :0 1 lanbase permanent 0 :0 :0 1 apcount evaluation 0 :0 :0 1 apcount base 0 :0 :0 1 apcount adder 0 :0 :0 yes yes no no no yes no no no no yes yes no yes no yes Slot# License Name Type usage-duration(y:m:d) In-Use EULA ---------------------------------------------------------------------------------------------- 2 ipservices permanent 0 :0 :1 2 ipservices evaluation 0 :0 :0 2 ipbase permanent 0 :0 :0 2 ipbase evaluation 0 :0 :0 2 lanbase permanent 0 :0 :0 2 apcount evaluation 0 :0 :0 2 apcount base 0 :0 :0 2 apcount adder 0 :0 :0 yes no no yes no yes no no no no yes yes no yes no no Slot# License Name Type usage-duration(y:m:d) In-Use EULA ----------------------------------------------------------------------------------------------- 3 ipservices permanent 0 :0 :1 3 ipservices evaluation 0 :0 :0 3 ipbase permanent 0 :0 :0 3 ipbase evaluation 0 :0 :0 3 lanbase permanent 0 :0 :0 3 apcount evaluation 0 :0 :0 3 apcount base 0 :0 :0 3 apcount adder 0 :0 :0 yes yes no no no no no no no no yes yes no yes no no Additional References for RTU Licensing Related Documents Related Topic RTU commands RTU AP image preload feature Standards and RFCs Standard/RFC Title None -- Document Title System Management Command Reference (Catalyst 3650 Switches) System Management Configuration Guide (Cisco WLC 5700 Series) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1844 System Management Feature History and Information for RTU Licensing MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for RTU Licensing Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1845 Feature History and Information for RTU Licensing System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1846 9 0 C H A P T E R Configuring Administrator Usernames and Passwords · Finding Feature Information, on page 1847 · Information About Configuring Administrator Usernames and Passwords, on page 1847 · Configuring Administrator Usernames and Passwords, on page 1848 · Examples: Administrator Usernames and Passwords Configuration, on page 1850 · Additional References for Administrator Usernames and Passwords, on page 1850 · Feature History and Information For Performing Administrator Usernames and Passwords Configuration, on page 1851 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring Administrator Usernames and Passwords You can configure administrator usernames and passwords to prevent unauthorized users from reconfiguring the switch and viewing configuration information. This section provides instructions for initial configuration and for password recovery. You can also set administrator usernames and passwords to manage and configure one or more access points that are associated with the switch. Strong Passwords You can set strong administrator passwords such as encrypted passwords with ASCII keys for the administrator user for managing access points. Use the following guidelines while creating strong passwords: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1847 Configuring Administrator Usernames and Passwords System Management · There should be at least three of the following categories--lowercase letters, uppercase letters, digits, and special characters. · The new password should not be the same as that of the associated username and the username should not be reversed. · The characters in the password should not be repeated more than three times consecutively. · The password should not be cisco, ocsic, admin, nimda, or any variant obtained by changing the capitalization of letters therein, or by substituting "1" "|" or "!" for i, and/or substituting "0" for "o", and/or substituting "$" for "s". · The maximum number of characters accepted for the username and password is 32. Encrypted Passwords You can set three types of keys for the password: · Randomly generated key--This key is generated randomly and it is the most secure option. To export the configuration file from one system to another, the key should also be exported. · Static key--The simplest option is to use a fixed (static) encryption key. By using a fixed key, no key management is required, but if the key is somehow discovered, the data can be decrypted by anyone with the knowledge of that key. This is not a secure option and it is called obfuscation in the CLI. · User defined key--You can define the key by yourself. To export the configuration file from one system to another, both systems should have the same key configured. Configuring Administrator Usernames and Passwords SUMMARY STEPS 1. configure terminal 2. wireless security strong-password 3. username admin-username password {0 unencrypted_password | 7 hidden_password | unencrypted_text} 4. username admin-username secret {0 unencrypted_secret_text | 4 SHA256 encrypted_secret_text | 5 MD5 encrypted_secret_text | LINE} 5. ap mgmtuser username username password {0 unencrypted password | 8 AES encrypted password }secret {0 unencrypted password | 8 AES encrypted password } 6. ap dot1x username username password {0 unencrypted password | 8 AES encrypted password } 7. end 8. ap name apname mgmtuser username usernamepassword password secret secret _text 9. ap name apname dot1x-user username password password DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1848 System Management Configuring Administrator Usernames and Passwords Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose wireless security strong-password Enables strong password policy for the administrator user. Example: Switch(config)# wireless security strong-password username admin-username password {0 unencrypted_password | 7 hidden_password | unencrypted_text} Example: Switch(config)# username adminuser1 password 0 QZsek239@ Specifies a username and password for an administrator. The administrator can configure the switch and view the configured information. username admin-username secret {0 Specifies the secret for the administrator. unencrypted_secret_text | 4 SHA256 encrypted_secret_text | 5 MD5 encrypted_secret_text | LINE} Example: Switch(config)# username adminuser1 secret 0 QZsek239@ ap mgmtuser username username password {0 Specifies administrator username and password for unencrypted password | 8 AES encrypted password }secret managing all of the access points configured to the switch. {0 unencrypted password | 8 AES encrypted password } You can also include the secret text to perform privileged Example: access point management. Switch(config)# ap mgmtuser username cisco password Note 0 Qwci12@ secret 0 Qwci14@! If your password is not strong enough to fulfill the strong password policy, then the password is rejected with a valid error message. For example, the following password is rejected because it is not a strong password. Switch# ap mgmtuser username cisco password 0 abcd secret 0 1234 ap dot1x username username password {0 unencrypted Specifies the 802.1X username and password for managing password | 8 AES encrypted password } all of the access points configured to the switch. Example: Switch(config)# ap dot1x username cisco password 0 Qwci12@ end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. ap name apname mgmtuser username usernamepassword password secret secret _text Example: Configures the administrator username, password, and secret text for managing a specific access point that is configured to the switch. Switch# ap name APf0f7.55c7.7b23 mgmtuser username cisco password Qne35! secret Nzep592$ Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1849 Examples: Administrator Usernames and Passwords Configuration System Management Step 9 Command or Action ap name apname dot1x-user username password password Example: Switch# ap name APf0f7.55c7.7b23 dot1x-user username cisco password Qne35! Purpose Configures the 802.1X username and password for a specific access point. Example Examples: Administrator Usernames and Passwords Configuration This example shows how to configure administrator usernames and passwords with the strong password policy in configuration mode: Switch# configure terminal Switch(config)# wireless security strong-password Switch(config)# username adminuser1 password 0 QZsek239@ Switch(config)# ap mgmtuser username cisco password 0 Qwci12@ secret 0 Qwci14@! Switch(config)# ap dot1x username cisco password 0 Qwci12@ Switch# end This example shows how to configure administrator usernames and passwords for an access point in global EXEC mode: Switch# wireless security strong-password Switch# ap name APf0f7.55c7.7b23 mgmtuser username cisco password Qwci12@ secret Qwci14@ Switch# ap name APf0f7.55c7.7b23 dot1x-user username cisco password Qwci12@ Switch# end Additional References for Administrator Usernames and Passwords Related Documents Related Topic Document Title System management commands System Management Command Reference Guide (Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1850 System Management Feature History and Information For Performing Administrator Usernames and Passwords Configuration Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For Performing Administrator Usernames and Passwords Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1851 Feature History and Information For Performing Administrator Usernames and Passwords Configuration System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1852 9 1 C H A P T E R Configuring 802.11 parameters and Band Selection · Finding Feature Information, on page 1853 · Restrictions on Band Selection, 802.11 Bands, and Parameters, on page 1853 · Information About Configuring Band Selection, 802.11 Bands, and Parameters, on page 1854 · How to Configure 802.11 Bands and Parameters, on page 1855 · Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters, on page 1865 · Configuration Examples for Band Selection, 802.11 Bands, and Parameters, on page 1869 · Additional References for 802.11 Parameters and Band Selection, on page 1871 · Feature History and Information For Performing 802.11 parameters and Band Selection Configuration, on page 1872 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions on Band Selection, 802.11 Bands, and Parameters · Band-selection enabled WLANs do not support time-sensitive applications like voice and video because of roaming delays. · Band selection can be used only with Cisco Aironet 1040, 1140, 1250, 1260, 3500, and the 3600 series access points. · Band selection operates only on access points that are connected to a controller. A FlexConnect access point without a controller connection does not perform band selection after a reboot. · The band-selection algorithm directs dual-band clients only from the 2.4-GHz radio to the 5-GHz radio of the same access point, and it only runs on an access point when both the 2.4-GHz and 5-GHz radios are up and running. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1853 Information About Configuring Band Selection, 802.11 Bands, and Parameters System Management · You can enable both band selection and aggressive load balancing on the controller. They run independently and do not impact one another. · It is not possible to enable or disable band selection and client load balancing globally through the controller GUI or CLI. You can, however, enable or disable band selection and client load balancing for a particular WLAN. Band selection and client load balancing are enabled globally by default. Information About Configuring Band Selection, 802.11 Bands, and Parameters Band Selection Band selection enables client radios that are capable of dual-band (2.4- and 5-GHz) operation to move to a less congested 5-GHz access point. The 2.4-GHz band is often congested. Clients on this band typically experience interference from Bluetooth devices, microwave ovens, and cordless phones as well as co-channel interference from other access points because of the 802.11b/g limit of three nonoverlapping channels. To prevent these sources of interference and improve overall network performance, you can configure band selection on the switch. Band selection is enabled globally by default. Band selection works by regulating probe responses to clients. It makes 5-GHz channels more attractive to clients by delaying probe responses to clients on 2.4-GHz channels. 802.11 Bands You can configure the 802.11b/g/n (2.4-GHz) and 802.11a/n (5-GHz) bands for the controller to comply with the regulatory requirements in your country. By default, both 802.11b/g/n and 802.11a/n are enabled. When a controller is configured to allow only 802.11g traffic, 802.11b client devices are able to successfully connect to an access point but cannot pass traffic. When you configure the controller for 802.11g traffic only, you must mark 11g rates as mandatory. 802.11n Parameter This section provides instructions for managing 802.11n devices such as the Cisco Aironet 1140 and 3600 Series Access Points on your network. The 802.11n devices support the 2.4- and 5-GHz bands and offer high-throughput data rates. The 802.11n high-throughput rates are available on all 802.11n access points for WLANs using WMM with no Layer 2 encryption or with WPA2/AES encryption enabled. Note Some Cisco 802.11n APs may intermittently emit incorrect beacon frames, which can trigger false wIPS alarms. We recommend that you ignore these alarms. The issue is observed in the following Cisco 802.11n APs: 1140, 1250, 2600, 3500, and 3600. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1854 System Management 802.11h Parameter 802.11h Parameter 802.11h informs client devices about channel changes and can limit the transmit power of those client devices. How to Configure 802.11 Bands and Parameters Configuring Band Selection (CLI) SUMMARY STEPS 1. configure terminal 2. wireless client band-select cycle-count cycle_count 3. wireless client band-select cycle-threshold milliseconds 4. wireless client band-select expire suppression seconds 5. wireless client band-select expire dual-band seconds 6. wireless client band-select client-rssi client_rssi 7. end 8. wlan wlan_profile_name wlan_ID SSID_network_name band-select 9. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 wireless client band-select cycle-count cycle_count Example: Switch(config)# wireless client band-select cycle-count 3 Sets the probe cycle count for band select. You can enter a value between 1 and 10 for the cycle_count parameter. Step 3 wireless client band-select cycle-threshold milliseconds Sets the time threshold for a new scanning cycle period. Example: Switch(config)# wireless client band-select cycle-threshold 5000 You can enter a value for threshold between 1 and 1000 for the milliseconds parameter. Step 4 wireless client band-select expire suppression seconds Sets the suppression expire to the band select. Example: You can enter a value for suppression between 10 to 200 Switch(config)# wireless client band-select expire for the seconds parameter. suppression 100 Step 5 wireless client band-select expire dual-band seconds Example: Sets the dual band expire. You can enter a value for dual band between 10 and 300 for the seconds parameter. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1855 Configuring the 802.11 Bands (CLI) System Management Step 6 Step 7 Step 8 Step 9 Command or Action Purpose Switch(config)# wireless client band-select expire dual-band 100 wireless client band-select client-rssi client_rssi Example: Switch(config)# wireless client band-select client-rssi 40 Sets the client RSSI threshold. You can enter a value for minimum dBm of a client RSSI to respond to a probe between 20 and 90 for the client_rssi parameter. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. wlan wlan_profile_name wlan_ID SSID_network_name band-select Example: Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# band-select Configures band selection on specific WLANs. You can enter a value between 1 and 512 for the wlan_ID parameter. You can enter the up to 32 alphanumeric characters for SSID_network_name parameter. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the 802.11 Bands (CLI) You can configure 802.11 bands and parameters. SUMMARY STEPS 1. configure terminal 2. ap dot11 5ghz shutdown 3. ap dot11 24ghz shutdown 4. ap dot11 {5ghz | 24ghz} beaconperiod time_unit 5. ap dot11 {5ghz | 24ghz} fragmentation threshold 6. ap dot11 {5ghz | 24ghz} dtpc 7. wireless client association limit number interval milliseconds 8. ap dot11 {5ghz | 24ghz} rate rate {disable | mandatory | supported} 9. no ap dot11 5ghz shutdown 10. no ap dot11 24ghz shutdown 11. ap dot11 24ghz dot11g 12. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1856 System Management Configuring the 802.11 Bands (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 5ghz shutdown Example: Switch(config)# ap dot11 5ghz shutdown Purpose Enters global configuration mode. Disables the 802.11a band. Note You must disable the 802.11a band before configuring the 802.11a network parameters. Step 3 ap dot11 24ghz shutdown Example: Switch(config)# ap dot11 24ghz shutdown Disables the 802.11b band. Note You must disable the 802.11b band before configuring the 802.11b network parameters. Step 4 Step 5 Step 6 ap dot11 {5ghz | 24ghz} beaconperiod time_unit Example: Switch(config)# ap dot11 5ghz beaconperiod 500 Specifies the rate at which the SSID is broadcast by the access point. The beacon interval is measured in time units (TUs). One TU is 1024 microseconds. You can configure the access point to send a beacon every 20 to 1000 milliseconds. ap dot11 {5ghz | 24ghz} fragmentation threshold Specifies the size at which packets are fragmented. Example: Switch(config)# ap dot11 5ghz fragmentation 300 The threshold is a value between 256 and 2346 bytes (inclusive). Specify a low number for areas where communication is poor or where there is a great deal of radio interference. ap dot11 {5ghz | 24ghz} dtpc Example: Switch(config)# ap dot11 5ghz dtpc Switch(config)# no ap dot11 24ghz dtpc Enables access points to advertise their channels and transmit the power levels in beacons, and probe responses. The default value is enabled. Client devices using dynamic transmit power control (DTPC) receive the channel and power level information from the access points and adjust their settings automatically. For example, a client device used primarily in Japan could rely on DTPC to adjust its channel and power settings automatically when it travels to Italy and joins a network there. Note On access points that run Cisco IOS software, this feature is called world mode. Step 7 The no form of the command disables the 802.11a or 802.11b DTPC setting. wireless client association limit number interval milliseconds Specifies the maximum allowed clients that can be configured. Example: You can configure a maximum number of association Switch(config)# wireless client association limit request on a single access point slot at a given interval. 50 interval 1000 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1857 Configuring the 802.11 Bands (CLI) System Management Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action Purpose The range of association limit that you can configure is from one through 100. The association request limit interval is measured between 100 to 10000 milliseconds. ap dot11 {5ghz | 24ghz} rate rate {disable | mandatory Specifies the rate at which data can be transmitted between | supported} the controller and the client. Example: Switch(config)# ap dot11 5ghz rate 36 mandatory · disabled--Defines that the clients specify the data rates used for communication. · mandatory--Defines that the clients support this data rate in order to associate to an access point on the controller. · supported--Any associated clients that support this data rate may communicate with the access point using that rate. However, the clients are not required to be able to use this rate in order to associate. · rate--Specifies the rate at which data is transmitted. For the 802.11a and 802.11b bands, the data is transmitted at the rate of 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 Mbps. no ap dot11 5ghz shutdown Example: Switch(config)# no ap dot11 5ghz shutdown no ap dot11 24ghz shutdown Example: Switch(config)# no ap dot11 24ghz shutdown ap dot11 24ghz dot11g Example: Switch(config)# ap dot11 24ghz dot11g end Example: Switch(config)# end Enables the 802.11a band. Note The default value is enabled. Enables the 802.11b band. Note The default value is enabled. Enables or disables 802.11g network support. The default value is enabled. You can use this command only if the 802.11b band is enabled. If you disable this feature, the 802.11b band is enabled without 802.11g support. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1858 System Management Configuring the 802.11 Bands (GUI) Configuring the 802.11 Bands (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > 802.11a/n/ac > Network or Configuration > Wireless > 802.11b/g/n > Network to open the Global Parameters page. Select the 802.11a/n/ac (or 802.11b/g) Network Status check box to enable the 802.11a or 802.11b/g band. To disable the band, unselect the check box. The default value is enabled. You can enable both the 802.11a and 802.11b/g bands. If you enabled the 802.11b/g band in Step 2, select the 802.11g Support check box if you want to enable 802.11g network support. The default value is enabled. If you disable this feature, the 802.11b band is enabled without 802.11g support. Specify the period at which the SSID is broadcast by the access point by entering a value between 20 and 1000 milliseconds (inclusive) in the Beacon Period text box. The default value is 100 milliseconds. Note The beacon period in controllers is listed in terms of milliseconds. The beacon period can also be measured in time units, where one time unit equals 1024 microseconds or 102.4 milliseconds. If a beacon interval is listed as 100 milliseconds in a controller, it is only a rounded off value for 102.4 milliseconds. Due to hardware limitation in certain radios, even though the beacon interval is, say 100 time units, it is adjusted to 102 time units, which roughly equals 104.448 milliseconds. When the beacon period is to be represented in terms of time units, the value is adjusted to the nearest multiple of 17. Specify the size at which packets are fragmented by entering a value between 256 and 2346 bytes (inclusive) in the Fragmentation Threshold text box. Enter a low number for areas where communication is poor or where there is a great deal of radio interference. Make access points advertise their channel and transmit power level in beacons and probe responses for CCX clients. Select the DTPC Support check box. Otherwise, unselect this check box. The default value is enabled. Client devices using dynamic transmit power control (DTPC) receive the channel and power level information from the access points and adjust their settings automatically. For example, a client device used primarily in Japan could rely on DTPC to adjust its channel and power settings automatically when it travels to Italy and joins a network there. Note On access points that run Cisco IOS software, this feature is called world mode. Note DTPC and 801.11h power constraint cannot be enabled simultaneously. Specify the maximum allowed clients by entering a value between 1 to 200 in the Maximum Allowed Client text box. The default value is 200. Use the Data Rates options to specify the rates at which data can be transmitted between the access point and the client. These data rates are available: · 802.11a--6, 9, 12, 18, 24, 36, 48, and 54 Mbps · 802.11b/g--1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 Mbps For each data rate, choose one of these options: · Mandatory--Clients must support this data rate in order to associate to an access point on the controller. · Supported--Any associated clients that support this data rate may communicate with the access point using that rate. However, the clients are not required to be able to use this rate in order to associate. · Disabled--The clients specify the data rates used for communication. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1859 Configuring 802.11n Parameters (CLI) System Management Step 9 Step 10 Click Apply. Click Save Configuration. Configuring 802.11n Parameters (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 {5ghz | 24ghz} dot11n 3. ap dot11 {5ghz | 24ghz} dot11n mcs tx rtu 4. wlanwlan_profile_name wlan_ID SSID_network_name wmm require 5. ap dot11 {5ghz | 24ghz} shutdown 6. {ap | no ap} dot11 {5ghz | 24 ghz} dot11n a-mpdu tx priority {all | 0-7} 7. no ap dot11 {5ghz | 24ghz} shutdown 8. ap dot11 {5ghz | 24ghz} dot11n guard-interval {any | long} 9. ap dot11 {5ghz | 24ghz} dot11n rifs rx 10. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {5ghz | 24ghz} dot11n Example: Switch(config)# ap dot11 5ghz dot11n Enables 802.11n support on the network. The no form of the command disables the 802.11n support on the network. Step 3 ap dot11 {5ghz | 24ghz} dot11n mcs tx rtu Example: Switch(config)# ap dot11 5ghz dot11n mcs tx 20 Specifies the modulation and coding scheme (MCS) rates at which data can be transmitted between the access point and the client. You can set a value from 0 through 23 for the mcs tx parameter. The no form of the command disables the MCS rates that is configured. Step 4 wlanwlan_profile_name wlan_ID SSID_network_name wmm require Example: Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# wmm require Enables WMM on the WLAN and uses the 802.11n data rates that you configured. The require parameter requires client devices to use WMM. Devices that do not support WMM cannot join the WLAN. Step 5 ap dot11 {5ghz | 24ghz} shutdown Example: Disables the network. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1860 System Management Configuring 802.11n Parameters (CLI) Step 6 Command or Action Switch(config)# ap dot11 5ghz shutdown Purpose {ap | no ap} dot11 {5ghz | 24 ghz} dot11n a-mpdu tx priority {all | 0-7} Example: Switch(config)# ap dot11 5ghz dot11n a-mpdu tx priority all Specifies the aggregation method used for 802.11n packets. Aggregation is the process of grouping packet data frames together rather than transmitting them separately. Two aggregation methods are available: Aggregated MAC Protocol Data Unit (A-MPDU) and Aggregated MAC Service Data Unit (A-MSDU). Both A-MPDU and A-MSDU are performed in the software. You can specify the aggregation method for various types of traffic from the access point to the clients. The following table defines the priority levels (0-7) assigned per traffic type. Table 163: Traffic Type Priority Levels User Priority 0 1 2 3 4 5 6 7 Traffic Type Best effort Background Spare Excellent effort Controlled load Video, less than 100-ms latency and jitter Voice, less than 100-ms latency and jitter Network control You can configure each priority level independently, or you can use the all parameter to configure all of the priority levels at once. You can configure priority levels so that the traffic uses either A-MPDU transmission or A-MSDU transmission. · When you use the ap command along with the other options, the traffic associated with that priority level uses A-MPDU transmission. · When you use the no ap command along with the other options, the traffic associated with that priority level uses A-MSDU transmission. Configure the priority levels to match the aggregation method used by the clients. By default, A-MPDU is enabled for priority level 0, 4 and 5 and the rest are Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1861 Configuring the 802.11n Parameters (GUI) System Management Step 7 Step 8 Step 9 Step 10 Command or Action Purpose disabled. By default, A-MPDU is enabled for all priorities except 6 and 7. no ap dot11 {5ghz | 24ghz} shutdown Example: Switch(config)# no ap dot11 5ghz shutdown Reenables the network. ap dot11 {5ghz | 24ghz} dot11n guard-interval {any | long} Example: Switch(config)# ap dot11 5ghz dot11n guard-interval long Configures the guard interval for the network. ap dot11 {5ghz | 24ghz} dot11n rifs rx Example: Switch(config)# ap dot11 5ghz dot11n rifs rx Configures the Reduced Interframe Space (RIFS) for the network. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the 802.11n Parameters (GUI) Step 1 Step 2 Step 3 Choose Configuration > Wireless > 802.11a/n/ac or 802.11b/g/n > High Throughput (802.11n) to open the 802.11n/ac (5 GHz or 2.4 GHz) Throughput page. Select the Enable 11n check box to enable 802.11n support on the network. The default value is enabled. Select the check boxes of the desired rates to specify the modulation and coding scheme (MCS) rates at which data can be transmitted between the access point and the client. These data rates, which are calculated for a 20-MHz channel width using a short guard interval, are available: · 0 (7 Mbps) · 1 (14 Mbps) · 2 (21 Mbps) · 3 (29 Mbps) · 4 (43 Mbps) · 5 (58 Mbps) · 6 (65 Mbps) · 7 (72 Mbps) · 8 (14 Mbps) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1862 System Management Configuring the 802.11n Parameters (GUI) Step 4 Step 5 Step 6 · 9 (29 Mbps) · 10 (43 Mbps) · 11 (58 Mbps) · 12 (87 Mbps) · 13 (116 Mbps) · 14 (130 Mbps) · 15 (144 Mbps) · 16 (22 Mbps) · 17 (43 Mbps) · 18 (65 Mbps) · 19 (87 Mbps) · 20 (130 Mbps) · 21 (173 Mbps) · 22 (195 Mbps) · 23 (217 Mbps) · Any associated clients that support the selected rates may communicate with the access point using those rates. However, the clients are not required to be able to use this rate in order to associate. The MCS settings determine the number of spatial streams, the modulation, the coding rate, and the data rate values that are used. Click Apply. Use the 802.11n data rates that you configured by enabling WMM on the WLAN as follows: a) Choose WLANs to open the WLANs page. b) Click the ID number of the WLAN for which you want to configure WMM mode. c) When the WLANs > Edit page appears, choose the QoS tab to open the WLANs > Edit (Qos) page. d) From the WMM Policy drop-down list, choose Required or Allowed to require or allow client devices to use WMM. Devices that do not support WMM cannot join the WLAN. If you choose Allowed, devices that cannot support WMM can join the WLAN but will not benefit from the 802.11n rates. e) Click Apply. Click Save Configuration. Note To determine if an access point supports 802.11n, look at the 11n Supported text box on either the 802.11a/n (or 802.11b/g/n) Cisco APs > Configure page or the 802.11a/n (or 802.11b/g/n) AP Interfaces > Details page. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1863 Configuring 802.11h Parameters (CLI) System Management Configuring 802.11h Parameters (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 5ghz shutdown 3. {ap | no ap} dot11 5ghz channelswitch mode switch_mode 4. ap dot11 5ghz power-constraint value 5. no ap dot11 5ghz shutdown 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 5ghz shutdown Example: Switch(config)# ap dot11 5ghz shutdown Disables the 802.11a network. Step 3 {ap | no ap} dot11 5ghz channelswitch mode switch_mode Enables or disables the access point to announce when it is Example: switching to a new channel. Switch(config)# ap dot11 5ghz channelswitch mode You can enter a 0 or 1 for the channelswitch parameter to 0 specify whether transmissions are restricted until the actual channel switch (0) or are not restricted (1). The default value is disabled. Step 4 ap dot11 5ghz power-constraint value Configures the 802.11h power constraint value in a range Example: from zero through 255. Switch(config)# ap dot11 5ghz power-constraint 200 The default value for the value parameter is 3 dB. Step 5 no ap dot11 5ghz shutdown Example: Switch(config)# no ap dot11 5ghz shutdown Reenables the 802.11a network. Step 6 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the 802.11h Parameters (GUI) Step 1 Disable the 802.11 band as follows: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1864 System Management Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 a) Choose Configuration > Wireless > 802.11a/n/ac > Network to open the 802.11a/n/ac Global Parameters page. b) Unselect the 802.11a Network Status check box. c) Click Apply. Choose Configuration > Wireless > 802.11a/n/ac > DFS (802.11h) to open the 802.11h Global Parameters page. In the Power Constraint area, enter the local power constraint. The valid range is between 0 dBm and 30 dBm. In the Channel Switch Announcement area, enter the channel switch announcement mode. You can enter a value of either 1 or 0. Click Apply. Reenable the 802.11a band as follows: a) Choose Wireless > 802.11a/n/ac > Network to open the 802.11a/n/ac Global Parameters page. b) Select the 802.11a Network Status check box. c) Click Apply. Click Save Configuration. Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters Monitoring Configuration Settings Using Band Selection and 802.11 Bands Commands This section describes the new commands for band selection and 802.11 bands. The following commands can be used to monitor band selection, and 802.11 bands and parameters the switch. Table 164: Monitoring Configuration Settings Using Band Selection and 802.11 Bands Commands Command Purpose show ap dot11 5ghz network Displays 802.11a bands network parameters, 802.11a operational rates, 802.11n MCS settings, and 802.11n status information. show ap dot11 24ghz network Displays 802.11b bands network parameters, 802.11b/g operational rates, 802.11n MCS settings, and 802.11n status information. show wireless dot11h Displays 802.11h configuration parameters. show wireless band-select Displays band select configuration settings. Example: Viewing the Configuration Settings for 5-GHz Band Switch# show ap dot11 5ghz network 802.11a Network : Enabled Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1865 Example: Viewing the Configuration Settings for 5-GHz Band 11nSupport : Enabled 802.11a Low Band : Enabled 802.11a Mid Band : Enabled 802.11a High Band : Enabled 802.11a Operational Rates 802.11a 6M : Mandatory 802.11a 9M : Supported 802.11a 12M : Mandatory 802.11a 18M : Supported 802.11a 24M : Mandatory 802.11a 36M : Supported 802.11a 48M : Supported 802.11a 54M : Supported 802.11n MCS Settings: MCS 0 : Supported MCS 1 : Supported MCS 2 : Supported MCS 3 : Supported MCS 4 : Supported MCS 5 : Supported MCS 6 : Supported MCS 7 : Supported MCS 8 : Supported MCS 9 : Supported MCS 10 : Supported MCS 11 : Supported MCS 12 : Supported MCS 13 : Supported MCS 14 : Supported MCS 15 : Supported MCS 16 : Supported MCS 17 : Supported MCS 18 : Supported MCS 19 : Supported MCS 20 : Supported MCS 21 : Supported MCS 22 : Supported MCS 23 : Supported 802.11n Status: A-MPDU Tx: Priority 0 : Enabled Priority 1 : Disabled Priority 2 : Disabled Priority 3 : Disabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled A-MSDU Tx: Priority 0 : Enabled Priority 1 : Enabled Priority 2 : Enabled Priority 3 : Enabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled Guard Interval : Any Rifs Rx : Enabled Beacon Interval : 100 CF Pollable mandatory : Disabled CF Poll Request Mandatory : Disabled CFP Period : 4 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1866 System Management System Management Example: Viewing the Configuration Settings for 24-GHz Band CFP Maximum Duration : 60 Default Channel : 36 Default Tx Power Level : 1 DTPC Status : Enabled Fragmentation Threshold : 2346 Pico-Cell Status : Disabled Pico-Cell-V2 Status : Disabled TI Threshold : 0 Legacy Tx Beamforming setting : Disabled Traffic Stream Metrics Status : Disabled Expedited BW Request Status : Disabled EDCA profile type check : default-wmm Call Admision Control (CAC) configuration Voice AC Voice AC - Admission control (ACM) : Disabled Voice Stream-Size : 84000 Voice Max-Streams : 2 Voice Max RF Bandwidth : 75 Voice Reserved Roaming Bandwidth : 6 Voice Load-Based CAC mode : Enabled Voice tspec inactivity timeout : Enabled CAC SIP-Voice configuration SIP based CAC : Disabled SIP Codec Type : CODEC_TYPE_G711 SIP call bandwidth : 64 SIP call bandwith sample-size : 20 Video AC Video AC - Admission control (ACM) : Disabled Video max RF bandwidth : Infinite Video reserved roaming bandwidth : 0 Example: Viewing the Configuration Settings for 24-GHz Band Switch# show ap dot11 24ghz network 802.11b Network : Enabled 11gSupport : Enabled 11nSupport : Enabled 802.11b/g Operational Rates 802.11b 1M : Mandatory 802.11b 2M : Mandatory 802.11b 5.5M : Mandatory 802.11g 6M : Supported 802.11g 9M : Supported 802.11b 11M : Mandatory 802.11g 12M : Supported 802.11g 18M : Supported 802.11g 24M : Supported 802.11g 36M : Supported 802.11g 48M : Supported 802.11g 54M : Supported 802.11n MCS Settings: MCS 0 : Supported MCS 1 : Supported MCS 2 : Supported MCS 3 : Supported MCS 4 : Supported MCS 5 : Supported MCS 6 : Supported MCS 7 : Supported MCS 8 : Supported MCS 9 : Supported Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1867 Example: Viewing the Configuration Settings for 24-GHz Band MCS 10 : Supported MCS 11 : Supported MCS 12 : Supported MCS 13 : Supported MCS 14 : Supported MCS 15 : Supported MCS 16 : Supported MCS 17 : Supported MCS 18 : Supported MCS 19 : Supported MCS 20 : Supported MCS 21 : Supported MCS 22 : Supported MCS 23 : Supported 802.11n Status: A-MPDU Tx: Priority 0 : Enabled Priority 1 : Disabled Priority 2 : Disabled Priority 3 : Disabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled A-MSDU Tx: Priority 0 : Enabled Priority 1 : Enabled Priority 2 : Enabled Priority 3 : Enabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled Guard Interval : Any Rifs Rx : Enabled Beacon Interval : 100 CF Pollable Mandatory : Disabled CF Poll Request Mandatory : Disabled CFP Period : 4 CFP Maximum Duration : 60 Default Channel : 11 Default Tx Power Level : 1 DTPC Status : true Call Admission Limit : 105 G711 CU Quantum : 15 ED Threshold : -50 Fragmentation Threshold : 2346 PBCC Mandatory : Disabled Pico-Cell Status : Disabled Pico-Cell-V2 Status : Disabled RTS Threshold : 2347 Short Preamble Mandatory : Enabled Short Retry Limit : 7 Legacy Tx Beamforming setting : Disabled Traffic Stream Metrics Status : Disabled Expedited BW Request Status : Disabled EDCA profile type : default-wmm Call Admision Control (CAC) configuration Voice AC Voice AC - Admission control (ACM) : Disabled Voice Stream-Size : 84000 Voice Max-Streams : 2 Voice Max RF Bandwidth : 75 Voice Reserved Roaming Bandwidth : 6 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1868 System Management System Management Example: Viewing the status of 802.11h Parameters Voice Load-Based CAC mode : Enabled Voice tspec inactivity timeout : Enabled CAC SIP-Voice configuration SIP based CAC : Disabled SIP Codec Type : CODEC_TYPE_G711 SIP call bandwidth : 64 SIP call bandwith sample-size : 20 Video AC Video AC - Admission control (ACM) : Disabled Video max RF bandwidth : Infinite Video reserved roaming bandwidth : 0 Example: Viewing the status of 802.11h Parameters Switch# show wireless dot11h Power Constraint: 0 Channel Switch: 0 Channel Switch Mode: 0 Example: Verifying the Band Selection Settings Switch# show wireless band-select Band Select Probe Response : per WLAN enabling Cycle Count :2 Cycle Threshold (millisec) : 200 Age Out Suppression (sec) : 20 Age Out Dual Band (sec) : 60 Client RSSI (dBm) : 80 Configuration Examples for Band Selection, 802.11 Bands, and Parameters Examples: Band Selection Configuration This example shows how to set the probe cycle count and time threshold for a new scanning cycle period for band select: Switch# configure terminal Switch(config)# wireless client band-select cycle-count 3 Switch(config)# wireless client band-select cycle-threshold 5000 Switch(config)# end This example shows how to set the suppression expire to the band select: Switch# configure terminal Switch(config)# wireless client band-select expire suppression 100 Switch(config)# end This example shows how to set the dual band expire for the band select: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1869 Examples: 802.11 Bands Configuration System Management Switch# configure terminal Switch(config)# wireless client band-select expire dual-band 100 Switch(config)# end This example shows how to set the client RSSI threshold for the band select: Switch# configure terminal Switch(config)# wireless client band-select client-rssi 40 Switch(config)# end This example shows how to configure band selection on specific WLANs: Switch# configure terminal Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# band-select Switch(config)# end Examples: 802.11 Bands Configuration This example shows how to configure 802.11 bands using beacon interval, fragmentation, and dynamic transmit power control: Switch# configure terminal Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 24ghz shutdown Switch(config)# ap dot11 5ghz beaconperiod 500 Switch(config)# ap dot11 5ghz fragmentation 300 Switch(config)# ap dot11 5ghz dtpc Switch(config)# wireless client association limit 50 interval 1000 Switch(config)# ap dot11 5ghz rate 36 mandatory Switch(config)# no ap dot11 5ghz shutdown Switch(config)# no ap dot11 24ghz shutdown Switch(config)# ap dot11 24ghz dot11g Switch(config)#end Examples: 802.11n Configuration This example shows how to configure 802.11n parameters for 5-GHz band using aggregation method: Switch# configure terminal Switch(config)# ap dot11 5ghz dot11n Switch(config)# ap dot11 5ghz dot11n mcs tx 20 Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# wmm require\ Switch(config-wlan)# exit Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz dot11n a-mpdu tx priority all Switch(config)# no ap dot11 5ghz shutdown Switch(config)#exit This example shows how to configure the guard interval for 5-GHz band: Switch# configure terminal Switch(config)# ap dot11 5ghz dot11n Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1870 System Management Examples: 802.11h Configuration Switch(config)# ap dot11 5ghz dot11n mcs tx 20 Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# wmm require\ Switch(config-wlan)# exit Switch(config)# no ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz dot11n guard-interval long Switch(config)#end This example shows how to configure the RIFS for 5-GHz band: Switch# configure terminal Switch(config)# ap dot11 5ghz dot11n Switch(config)# ap dot11 5ghz dot11n mcs tx 20 Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# wmm require\ Switch(config-wlan)# exit Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz dot11n rifs rx Switch(config)#end Examples: 802.11h Configuration This example shows how to configure the access point to announce when it is switching to a new channel using restriction transmission: Switch# configure terminal Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz channelswitch mode 0 Switch(config)# no ap dot11 5ghz shutdown Switch(config)#end This example shows how to configure the 802.11h power constraint for 5-GHz band: Switch# configure terminal Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz power-constraint 200 Switch(config)# no ap dot11 5ghz shutdown Switch(config)#end AdditionalReferencesfor802.11ParametersandBandSelection Related Documents Related Topic Document Title System management commands System Management Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1871 Feature History and Information For Performing 802.11 parameters and Band Selection Configuration System Management Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For Performing 802.11 parameters and Band Selection Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1872 9 2 C H A P T E R Configuring Aggressive Load Balancing · Finding Feature Information, on page 1873 · Restrictions for Aggressive Load Balancing, on page 1873 · Information for Configuring Aggressive Load Balancing Parameters, on page 1874 · How to Configure Aggressive Load Balancing, on page 1875 · Monitoring Aggressive Load Balancing, on page 1876 · Examples: Aggressive Load Balancing Configuration, on page 1876 · Additional References for Aggressive Load Balancing, on page 1877 · Feature History and Information For Performing Aggressive Load Balancing Configuration , on page 1878 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Aggressive Load Balancing · You can configure aggressive load balancing only from the command-line interface. · Aggressive load balancing is disabled by default, you must enable it manually. · You can enable load balancing either separately or together with the band select configurations. · When the band select is enabled on the dual-band clients, the load balancing parameter selects only the lowest load radio from 5-GHz radios. For the 2.4-GHz clients, there is no probe information of the client on 5 GHz and therefore the load balancing algorithm can only be selected between radio on 2.4 GHz. · You can operate load balancing of clients between access points on the same switch but not for the clients between access points on the different switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1873 Information for Configuring Aggressive Load Balancing Parameters System Management · The load balancing uses an existing association denial mechanism based on the number of client on the radio and the band select is implemented by the distributed probe response suppression on the access point only. Information for Configuring Aggressive Load Balancing Parameters Aggressive Load Balancing Enabling aggressive load balancing on the controller allows lightweight access points to load balance wireless clients across access points. You can enable aggressive load balancing using the controller. When a wireless client attempts to associate to a lightweight access point, association response packets are sent to the client with an 802.11 response packet including status code 17. The code 17 indicates that the AP is busy. The AP responds with an association response bearing 'success' if the AP threshold is not met, and with code 17 (AP busy) if the AP utilization threshold is reached or exceeded and another less busy AP heard the client request. For example, if the number of clients on AP1 is more than the number of clients on AP2 plus the load-balancing window, then AP1 is considered to be busier than AP2. When a client attempts to associate to AP1, it receives an 802.11 response packet with status code 17, indicating that the access point is busy, and the client attempts to associate to a different access point. You can configure the controller to deny client associations up to 10 times (if a client attempted to associate 11 times, it would be allowed to associate on the 11th try). You can also enable or disable load balancing on a particular WLAN, which is useful if you want to disable load balancing for a select group of clients (such as time-sensitive voice clients). The maximum number of client associations that the access points can support is dependent upon the following factors: · The maximum number of client associations differs for lightweight and autonomous Cisco IOS access points. · There may be a limit per radio and an overall limit per AP. · AP hardware (the 16-MB APs have a lower limit than the 32-MB and higher APs) The Client Association Limits for Lightweight Access Points are as follows: · For 16-MB APs, the limit is 128 clients per AP. This limit is applicable to 1100 and 1200 series APs. · For 32-MB and higher APs, there is no per-AP limit. The maximum Client Association Limits per-radio for all of the Cisco IOS APs is 200 associations. Note With 32-MB and higher lightweight Cisco IOS APs, with two radios, up to 200 + 200 = 400 associations are supported. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1874 System Management How to Configure Aggressive Load Balancing The maximum Client Association Limits per Autonomous Cisco IOS access point is around 80 to 127 clients per AP. This number varies depending on the following factors: · AP model (whether it is 16 MB or 32 MB or higher) · Cisco IOS software release · Hardware configuration (two radios use more memory than one) · Enabled features (WDS functionality in particular) The per-radio limit is about 200 associations. One association will likely hit the per-AP limit first. Unlike Cisco Unified Wireless Network, autonomous Cisco IOS supports per-SSID/per-AP association limits. This limit is configured using the max-associations CLI, under dot11 SSID. The maximum number is 255 associations (which is also the default number). How to Configure Aggressive Load Balancing Configuring Aggressive Load Balancing SUMMARY STEPS 1. configure terminal 2. wireless load-balancing window client-count 3. wireless load-balancing denial denial-count 4. end 5. wlan wlan_profile_name wlan_ID SSID_network_name load-balance 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 wireless load-balancing window client-count Sets the client window for aggressive load balancing. You Example: can enter a value between 0 and 20 for the client_count parameter. Switch(config)# wireless load-balancing window 1 Step 3 wireless load-balancing denial denial-count Example: Switch(config)# wireless load-balancing denial-count 1 Sets the denial count for load balancing. You can enter a value between 0 and 10 for the denial_count parameter. Step 4 end Example: Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1875 Monitoring Aggressive Load Balancing System Management Step 5 Step 6 Command or Action Switch(config)# end Purpose wlan wlan_profile_name wlan_ID SSID_network_name load-balance Example: Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# load-balance Enables or disables aggressive load balancing on specific WLANs. You can enter a value between 1 and 512 for the wlan_ID parameter. You can enter the up to 32 alphanumeric characters for SSID_network_name parameter. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Monitoring Aggressive Load Balancing This section describes the new command for aggressive load balancing. The following command can be used to monitor aggressive load balancing on the switch. Table 165: Monitoring Aggressive Load Balancing Command Command show wireless load-balancing Purpose Displays the status of the load-balancing feature. Examples: Aggressive Load Balancing Configuration This example shows how to configure the load balancing denial count: Switch# configure terminal Switch(config)# wireless load-balancing denial-count 1 Switch(config)# end Switch# show wireless load-balancing This example shows how to configure the client window for aggressive load balancing: Switch# configure terminal Switch(config)# wireless load-balancing window 1 Switch(config)# end Switch# show wireless load-balancing This example shows how to configure load balancing on specific WLAN: Switch# configure terminal Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# load-balance Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1876 System Management Additional References for Aggressive Load Balancing Switch(config)# end Switch# show wireless load-balancing Additional References for Aggressive Load Balancing Related Documents Related Topic Document Title System management commands System Management Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1877 Feature History and Information For Performing Aggressive Load Balancing Configuration System Management Feature History and Information For Performing Aggressive Load Balancing Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1878 9 3 C H A P T E R Configuring Client Roaming · Finding Feature Information, on page 1879 · Restrictions for Configuring Client Roaming, on page 1879 · Information About Client Roaming, on page 1879 · How to Configure Layer 2 or Layer 3 Roaming, on page 1882 · Monitoring Client Roaming Parameters, on page 1889 · Monitoring Mobility Configurations, on page 1889 · Additional References for Configuring Client Roaming, on page 1890 · Feature History and Information For Performing Client Roaming Configuration , on page 1891 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Configuring Client Roaming The following are the restrictions that you should be aware while configuring client roaming: · Cisco Compatible Extensions (CCX) support is enabled automatically for every WLAN on the switch and cannot be disabled. The switch stores the CCX version of the client in its client database and uses it to generate and respond to CCX frames appropriately. Clients must support CCXv4 or v5 (or CCXv2 for access point assisted roaming) to utilize these roaming enhancements. · Client roaming between 600 Series Access points is not supported. Information About Client Roaming The controllers deliver high-end wireless services to the clients roaming across wireless network. Now, the wireless services are integrated with the switches, thus delivering a value-added Cisco unified new mobility Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1879 Information About Client Roaming System Management architecture. This unified architecture enables client-roaming services to both wireless and wired clients with seamless, fast- roaming services. The new mobility architecture supports fast client roaming services using logical categorization of network into Mobility Domains (MDs), Mobility Groups (MGs), Mobility Subdomains (MSDs), and Switch Peer Groups (SPGs) using systems such as Mobility Oracle (MO), Mobility Controller (MC), and Mobility Agent (MA). · A Mobility Domain is the entire domain across which client roaming is supported. It is a collection of mobility groups. For example, a campus network can be considered as a mobility domain. · A Mobility Group is a collection of mobility subdomains across which fast roaming is supported. The mobility group can be one or more buildings within a campus across which frequent roaming is supported. · A Mobility Subdomain is an autonomous portion of the mobility domain network. Each mobility subdomain contains one mobility controller (MC) and a collection of SPGs. A subdomain is equivalent to an 802.11r key domain. · A Switch Peer Group is a collection of mobility agents. · The Mobility Oracle acts as the point of contact for mobility events that occur across mobility subdomains. The mobility oracle also maintains a local database of each client in the entire mobility domain, their home and current subdomain. There is only one MO for an entire mobility domain. The Cisco WLC 5700 Series Controllers or Cisco Unified Wireless Networking Solution controller can act as MO. · The Mobility Controller provides mobility management services for inter-SPG roaming events. The MC sends the configuration like SPG name and SPG peer member list to all of the mobility agents under its subdomain. The Cisco WLC 5700 Series Controllers, Cisco Catalyst 3850 Switch, or Cisco Unified Wireless Networking Solution controller can act as MC. The MC has MC functionality and MA functionality that is running internally into it. · The Mobility Agent is the component that maintains client mobility state machine for a mobile client. All APs are connected to the mobility agent. The New mobility architecture supports seamless roaming in the following scenarios: · Intra-switch roaming--The client roaming between APs managed by same mobility agent. · Intra-SPG roaming--The client roaming between mobility agents in the same SPG. · Inter-SPG, Intra-subdomain roaming--The client roaming between mobility agents in different SPGs within the same subdomain. · Inter-subdomain roaming--The client roaming between mobility agents across a subdomain. Fast Roaming New mobility architecture supports fast roaming when clients roam within a mobility group by eliminating the need for full authentication. Security polices should be same across the switches for fast roaming. Local, anchor, foreign MAs and MCs When a client joins an MA initially and its point of attachment has not changed, that MA is referred as local or associated MA. The MC to which this MA is associated is referred as local or associated MC. When a client roams between two MAs, the MA to which the client was previously associated is the anchor MA (point of attachment) and the MA to which the client is currently associated is the foreign or associated Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1880 System Management Inter-Subnet Roaming MA (point of presence). The MCs to which these MAs are associated are referred as anchor, foreign, or associated MCs, respectively. Inter-Subnet Roaming Multiple-controller deployments support client roaming across access points managed by controllers in the same mobility group on different subnets. This roaming is transparent to the client because the session is sustained and a tunnel between the controllers allows the client to continue using the same DHCP-assigned or client-assigned IP address as long as the session remains active. The tunnel is torn down, and the client must reauthenticate when the client sends a DHCP Discover with a 0.0.0.0 client IP address or a 169.254.*.* client auto-IP address or when the operator-set user timeout is exceeded. Voice-over-IP Telephone Roaming 802.11 voice-over-IP (VoIP) telephones actively seek out associations with the strongest RF signal to ensure the best quality of service (QoS) and the maximum throughput. The minimum VoIP telephone requirement of 20-millisecond or shorter latency time for the roaming handover is easily met by the Cisco Unified Wireless Network (Cisco UWN) solution, which has an average handover latency of 5 or fewer milliseconds when open authentication is used. This short latency period is controlled by controllers rather than allowing independent access points to negotiate roaming handovers. The Cisco UWN solution supports 802.11 VoIP telephone roaming across lightweight access points managed by controllers on different subnets, as long as the controllers are in the same mobility group. This roaming is transparent to the VoIP telephone because the session is sustained and a tunnel between controllers allows the VoIP telephone to continue using the same DHCP-assigned IP address as long as the session remains active. The tunnel is torn down, and the VoIP client must reauthenticate when the VoIP telephone sends a DHCP Discover with a 0.0.0.0 VoIP telephone IP address or a 169.254.*.* VoIP telephone auto-IP address or when the operator-set user timeout is exceeded. CCX Layer 2 Client Roaming The controller supports five CCX Layer 2 client roaming enhancements: · Access point assisted roaming--This feature helps clients save scanning time. When a CCXv2 client associates to an access point, it sends an information packet to the new access point listing the characteristics of its previous access point. Roaming time decreases when the client recognizes and uses an access point list built by compiling all previous access points to which each client was associated and sent (unicast) to the client immediately after association. The access point list contains the channels, BSSIDs of neighbor access points that support the client's current SSID(s), and time elapsed since disassociation. · Enhanced neighbor list--This feature focuses on improving a CCXv4 client's roam experience and network edge performance, especially when servicing voice applications. The access point provides its associated client information about its neighbors using a neighbor-list update unicast message. · Enhanced neighbor list request (E2E)--The End-2-End specification is a Cisco and Intel joint program that defines new protocols and interfaces to improve the overall voice and roaming experience. It applies only to Intel clients in a CCX environment. Specifically, it enables Intel clients to request a neighbor list at will. When this occurs, the access point forwards the request to the controller. The controller receives the request and replies with the current CCX roaming sublist of neighbors for the access point to which the client is associated. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1881 How to Configure Layer 2 or Layer 3 Roaming System Management Note To see whether a particular client supports E2E, choose Wireless > Clients on the controller GUI, click the Detail link for the desired client, and look at the E2E Version text box in the Client Properties area. · Roam reason report--This feature enables CCXv4 clients to report the reason why they roamed to a new access point. It also allows network administrators to build and monitor a roam history. · Directed roam request--This feature enables the controller to send directed roam requests to the client in situations when the controller can better service the client on an access point different from the one to which it is associated. In this case, the controller sends the client a list of the best access points that it can join. The client can either honor or ignore the directed roam request. Non-CCX clients and clients running CCXv3 or below must not take any action. No configuration is required for this feature. How to Configure Layer 2 or Layer 3 Roaming Configuring Layer 2 or Layer 3 Roaming Before you begin To configure the mobility agent for Layer 2 or Layer 3 roaming, the following requisites should be considered: · SSID and security polices should be same across MAs for Layer 2 and Layer 3 roaming. · Client VLAN ID should be same for Layer 2 roaming and different for Layer 3 roaming. · Bridge domain ID and client VLAN IDs should be same for Layer 2 roaming. Either one or both of the bridge domain ID and client VLAN ID should be different for Layer 3 roaming. SUMMARY STEPS 1. configure terminal 2. wlan wlan_profile_name wlan_ID SSID_network_name 3. no mobility anchor sticky 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan_profile_name wlan_ID SSID_network_name Example: Switch(config)#wlan wlan1 Enters WLAN configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1882 System Management Configuring CCX Client Roaming Parameters (CLI) Step 3 Step 4 Command or Action no mobility anchor sticky Example: Switch(config-wlan)#no mobility anchor sticky end Example: Switch(config)# end Purpose (Optional) Disables Layer 2 anchoring. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring CCX Client Roaming Parameters (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 {5ghz | 24ghz} l2roam rf-params {default | custom min-rssi roam-hyst scan-thresh trans-time} 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {5ghz | 24ghz} l2roam rf-params {default | custom min-rssi roam-hyst scan-thresh trans-time} Example: Configures CCX Layer 2 client roaming parameters. To choose the default RF parameters, enter the default option. Switch#ap dot11 5ghz l2roam rf-params custom -80 To fine-tune the RF parameters that affect client roaming, enter the custom option and then enter any one of the following options: · Minimum RSSI--Indicates minimum Received Signal Strength Indicator (RSSI) required for the client to associate to an access point. If the client's average received signal power dips below this threshold, reliable communication is usually impossible. Therefore, clients must already have found and roamed to another access point with a stronger signal before the minimum RSSI value is reached. You can configure the minimum RSSI range from 80 through 90 dBm and the default is 85 dBm. · Hysteresis--Indicates how much greater the signal strength of a neighboring access point must be for the client to roam to it. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1883 Configuring CCX Client Roaming Parameters (CLI) Command or Action Step 3 end Example: Switch(config)# end System Management Purpose This parameter is intended to reduce the amount of roaming between access points if the client is physically located on or near the border between two access points. You can configure the hysteresis range from 3 through 20 dB and the default is 3 dB. · Scan Threshold--Indicates a minimum RSSI that is allowed before the client should roam to a better access point. When the RSSI drops below the specified value, the client must be able to roam to a better access point within the specified transition time. This parameter also provides a power-save method to minimize the time that the client spends in active or passive scanning. For example, the client can scan slowly when the RSSI is above the threshold and scan more rapidly when the RSSI is below the threshold. You can configure the RSSI range from 70 through 77 dBm and the default value is 72 dBm. · Transition Time--Indicates the maximum time allowed for the client to detect a suitable neighboring access point to roam to and to complete the roam, whenever the RSSI from the client's associated access point is below the scan threshold. The Scan Threshold and Transition Time parameters guarantee a minimum level of client roaming performance. Together with the highest expected client speed and roaming hysteresis, these parameters make it possible to design a wireless LAN network that supports roaming simply by ensuring a certain minimum overlap distance between access points. You can configure the time period in the range from 1 through 10 seconds and the default time is 5 seconds. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1884 System Management Configuring Mobility Oracle Example Configuring Mobility Oracle SUMMARY STEPS 1. configure terminal 2. wireless mobility oracle 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wireless mobility oracle Example: Switch(config)# wireless mobility oracle Step 3 end Example: Switch(config)# end Purpose Enters global configuration mode. Enables mobility oracle on the controller. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Configuring Mobility Controller SUMMARY STEPS 1. configure terminal 2. wireless mobility controller 3. wireless mobility controller peer-group switch-peer-group-name 4. wireless mobility controller peer-group switch-peer-group-name member ip ip-address {public-ip public-ip-address} 5. wireless mobility controller peer-group switch-peer-group-name multicast 6. wireless mobility controller peer-group switch-peer-group-name multicast ip peer-group-multicast-ip-addr 7. wireless mobility controller peer-groupswitch-peer-group-name bridge-domain-id id 8. wireless mobility group member ip ip-address [public-ip public-ip-address] [group group-name] 9. wireless mobility dscp value Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1885 Configuring Mobility Controller System Management 10. wireless mobility group keepalive {count | interval} 11. wireless mobility group name name 12. wireless mobility oracle ipmo-ip-address 13. wireless management interface interface-name 14. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wireless mobility controller Example: Switch(config)# wireless mobility controller Step 3 wireless mobility controller peer-group switch-peer-group-name Example: Switch(config)# wireless mobility controller peer-group SPG1 Purpose Enters global configuration mode. Enables wireless mobility controller. Configures a switch peer group name. You can enter up to 31 case-sensitive ASCII printable characters for the group name. Spaces are not allowed in mobility group. Note The No form of the command deletes the switch peer group. Step 4 wireless mobility controller peer-group Adds a mobility group member to a switch peer group. switch-peer-group-name member ip ip-address {public-ip public-ip-address} Note The No form of the command deletes the member from the switch peer group. Example: Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.0.0.1 Step 5 Step 6 wireless mobility controller peer-group switch-peer-group-name multicast Example: Switch(config)# wireless mobility controller peer-group SPG1 multicast wireless mobility controller peer-group switch-peer-group-name multicast ip peer-group-multicast-ip-addr Example: Switch(config)# wireless mobility controller peer-group SPG1 multicast ip 10.0.0.4 Configures the multicast mode within a switch peer group. Configures the multicast IP address for a switch peer group. Note The No form of the command deletes the multicast IP for the switch peer group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1886 System Management Configuring Mobility Controller Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Purpose wireless mobility controller peer-groupswitch-peer-group-name bridge-domain-id id Example: Switch(config)# wireless mobility controller peer-group SPG bridge-domain-id 10.0.0.5 Configures the bridge domain ID for a switch peer group. The default is zero. Note The No form of command sets the bridge domain ID to the default value. wireless mobility group member ip ip-address [public-ip Adds a mobility group member. public-ip-address] [group group-name] Note The No form of the command removes the Example: member from the group. The default group name is the group name of MC. Switch(config)# wireless mobility group member ip 10.0.0.1 wireless mobility dscp value Example: Switch(config)# wireless mobility dscp 46 Sets the DSCP value for mobility control packet. You can configure the DSCP value in a range from 0 through 63. The default value is 46. wireless mobility group keepalive {count | interval} Configures the wireless mobility group keepalive count Example: which is the number of keepalive retries before a member status is termed DOWN and keepalive interval which is Switch(config)# wireless mobility group keepalive interval between two keepalives. count wireless mobility group name name Example: Switch(config)# wireless mobility group name group1 Specifies the case sensitive wireless mobility group name which can be ASCII printable string up to 31 characters. wireless mobility oracle ipmo-ip-address Example: Switch(config)# wireless mobility oracle ip 10.0.0.5 Configures the mobility oracle IP address. wireless management interface interface-name Example: Switch(config)# wireless management interface Vlan21 Configures the wireless management interface. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1887 Configuring Mobility Agent System Management Example Configuring Mobility Agent SUMMARY STEPS 1. configure terminal 2. wireless mobility controller ip ip-address 3. wireless mobility load-balance 4. wireless mobility load-balance threshold threshold -value 5. wireless management interface interface-name 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 wireless mobility controller ip ip-address Example: Switch(config)# wireless mobility controller ip 10.10.10.20 Sets the IP address of the mobility controller. Step 3 wireless mobility load-balance Example: Switch(config)# wireless mobility load-balance Configures wireless mobility load balancing. Step 4 wireless mobility load-balance threshold threshold -value Configures the number of clients that can be local or Example: anchored on the MA. You can configure the threshold value in a range from 100 to 2000. The default value is 1000. Switch(config)# wireless mobility load-balance threshold 100 Step 5 wireless management interface interface-name Example: Switch(config)# wireless management interface Vlan21 Configures wireless management interface for the mobility agent. Step 6 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1888 System Management Monitoring Client Roaming Parameters Monitoring Client Roaming Parameters This section describes the new commands for the client parameters. The following commands can be used to monitor the client roaming parameters on the switch. Table 166: Monitoring Client Roaming Parameters Commands Command Purpose show ap dot11 {5ghz | 24ghz} l2roam rf-param Displays the current RF parameters configured for client roaming for the 802.11a or 802.11b/g network. show ap dot11 {5ghz | 24ghz} l2roam statistics Displays the CCX Layer 2 client roaming statistics for the 802.11a or 802.11b/g network. show ap dot11 {5ghz | 24ghz} l2roam mac-address mac-address statistics Displays the CCX Layer 2 client roaming statistics for a particular access point. Monitoring Mobility Configurations This section describes the new commands for monitoring mobility configurations. The following command can be used to monitor mobility configurations on the Mobility Oracle, Mobility Controller, and Mobility Agent. Table 167: Monitoring Mobility Configuration Commands on the Mobility Controller and Mobility Agent Command Purpose show wireless mobility summary Displays the summary information for the Mobility Controller and Mobility Agent. show wireless mobility statistics Displays mobility statistics. show wireless mobility dtls connections Displays established DTLS connections. Table 168: Monitoring Mobility Configuration Commands on the Mobility Oracle Command Purpose show wireless mobility oracle summary Displays the status of the Mobility Controllers known to the Mobility Oracle. show wireless mobility oracle client summary Displays the information of a list of clients in the Mobility Oracle database. show wireless mobility oracle client detail Displays the detailed information of a particular client in the client -mac-address Mobility Oracle database. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1889 Additional References for Configuring Client Roaming System Management show wireless mobility oracle mc-ip Displays the information of a list of clients in the Mobility Oracle database that are anchored or associated to a specified Mobility Controller. Table 169: Monitoring Mobility Configuration Commands on the Mobility Controller Command Purpose show wireless mobility controller client summary Displays a list of clients in the subdomain. show wireless mobility controller client mac-address detail show wireless mobility agent ma-ip client summary Displays detailed information for a client in a subdomain. Displays a list of clients anchored or associated to a specified Mobility Agent. show wireless mobility ap-list Displays the list of Cisco APs known to the mobility group. Table 170: Monitoring Mobility Configuration Commands on the Mobility Agent Command Purpose show wireless mobility load-balance summary Displays the summary of mobility load-balance properties. Additional References for Configuring Client Roaming Related Documents Related Topic Mobility configuration Mobility-related commands Document Title Mobility Configuration Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Mobility Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1890 System Management Feature History and Information For Performing Client Roaming Configuration MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For Performing Client Roaming Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1891 Feature History and Information For Performing Client Roaming Configuration System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1892 9 4 C H A P T E R Configuring Application Visibility and Control · Finding Feature Information, on page 1893 · Information About Application Visibility and Control, on page 1893 · Supported AVC Class Map and Policy Map Formats, on page 1894 · Prerequisites for Application Visibility and Control, on page 1896 · Guidelines for Inter-Switch Roaming with Application Visibility and Control, on page 1896 · Restrictions for Application Visibility and Control, on page 1897 · How to Configure Application Visibility and Control, on page 1897 · Monitoring Application Visibility and Control, on page 1914 · Examples: Application Visibility and Control, on page 1917 · Additional References for Application Visibility and Control, on page 1920 · Feature History and Information For Application Visibility and Control, on page 1921 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Application Visibility and Control Application Visibility and Control (AVC) classifies applications using deep packet inspection techniques with the Network-Based Application Recognition engine, and provides application-level visibility and control (QoS) in wireless networks. After the applications are recognized, the AVC feature enables you to either drop, mark, or police the data traffic. AVC is configured by defining a class map in a QoS client policy to match a protocol. Using AVC, we can detect more than 1000 applications. AVC enables you to perform real-time analysis and create policies to reduce network congestion, costly network link usage, and infrastructure upgrades. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1893 Supported AVC Class Map and Policy Map Formats System Management Note You can view list of 30 applications in Top Applications in Monitor Summary section of the UI. Traffic flows are analyzed and recognized using the NBAR2 engine at the access point. Refer to 8.0 protocol pack for the NBAR2-supported protocols or applications. The specific flow is marked with the recognized protocol or application, such as WebEx. This per-flow information can be used for application visibility using Flexible NetFlow (FNF). For more information on FNF, see the Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3E (Cisco WLC 5700 Series). The same application name can also be used for control of traffic using QoS. For more information on QoS, see the QoS Configuration Guide, Cisco IOS XE Release 3E (Cisco WLC 5700 Series). AVC QoS actions are applied with AVC filters in both upstream and downstream directions. The QoS actions supported for upstream flow are drop, mark, and police, and for downstream flow are mark and police. AVC QoS is applicable only when the application is classified correctly and matched with the class map filter in the policy map. For example, if the policy has a filter based on an application name, and the traffic has also been classified to the same application name, then the action specified for this match in the policy will be applied. For all QoS actions, refer Supported AVC Class Map and Policy Map Formats, on page 1894. Supported AVC Class Map and Policy Map Formats Supported AVC Class Map Format Class Map Format match protocol protocol name Class Map Example class-map match-any webex-class match protocol webex-media Direction Both upstream and downstream match protocol attribute category class-map match-any IM category-name match protocol attribute category instant-messaging Both upstream and downstream match protocol attribute class-map match-any Both upstream and downstream sub-category sub-category-name realtimeconferencing match protocol attribute sub-category voice-video-chat-collaboration match protocol attribute application-group application-group-name Combination filters class-map match-any skype Both upstream and downstream match protocol attribute application-group skype-group class-map match-any webex-class match protocol webex match dscp 45 match wlan user-priority 6 Upstream only Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1894 System Management Supported AVC Class Map and Policy Map Formats Supported AVC Policy Format Policy Format QoS Action Upstream client policy based on match protocol filter Mark, police, and drop Downstream client policy based on match protocol Mark and police filter The following table describes the detailed AVC policy format with an example: AVC Policy Format Basic set AVC Policy Example Direction policy-map webex-policy Upstream and downstream class webex-class set dscp ef //or set up,cos Basic police policy-map webex-policy class webex-class police 5000000 Upstream and downstream Basic set and police policy-map webex-policy class webex-class set dscp ef //or set up,cos police 5000000 Upstream and downstream Multiple set and police including policy-map webex-policy Upstream and downstream default class webex-class set dscp af31 //or set up,cos police 4000000 class class-webex-category set dscp ef //or set up,cos police 6000000 class class-default set dscp <> Hierarchical police policy-map webex-policy class webex-class police 5000000 service-policy client-in-police-only Upstream and downstream policy-map client-in-police-only class webex-class police 100000 class class-webex-category set dscp ef //or set up,cos police 6000000 police 200000 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1895 Prerequisites for Application Visibility and Control System Management AVC Policy Format Hierarchical set and police Drop action AVC Policy Example policy-map webex-policy class class-default police 1500000 service policy client-up-child policy-map webex-policy class webex-class police 100000 set dscp ef class class-webex-category police 200000 set dscp af31 Direction Any of the above examples apply Upstream only to this format with this additional example: policy-map webex-policy class webex-class drop class netflix set dscp ef //or set up,cos police 6000000 class class-default set dscp <> Prerequisites for Application Visibility and Control · The access points should be AVC capable. · For the control part of AVC (QoS) to work, the application visibility feature with FNF has to be configured. Guidelines for Inter-Switch Roaming with Application Visibility and Control Follow these guidelines to prevent clients from getting excluded due to malformed QoS policies: · When a new QoS policy is added to the switch, a QoS policy with the same name should be added to other switch within the same roam or mobility domain. · When a switch is loaded with a software image of a later release, the new policy formats are supported. If you have upgraded the software image from an earlier release to a later release, you should save the configuration separately. When an earlier release image is loaded, some QoS policies might show as not supported, and you should restore those QoS policies to supported policy formats. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1896 System Management Restrictions for Application Visibility and Control Restrictions for Application Visibility and Control How to Configure Application Visibility and Control Configuring Application Visibility and Control (CLI) To configure Application Visibility, follow these general steps: 1. Create a flow record by specifying keys and non-key fields to the flow. 2. Create an optional flow exporter by specifying the flow record as an option. 3. Create a flow monitor based on the flow record and flow exporter. 4. Configure WLAN to apply flow monitor in IPv4 input or output direction. To configure Application Control, follow these general steps: 1. Create an AVC QoS policy. 2. Attach AVC QoS policy to the client in one of three ways: configuring WLAN, using ACS or ISE, or adding local policies. Creating a Flow Record By default, wireless avc basic (flow record) is available. When you click Apply from the GUI, then the record is mapped to the flow monitor. Default flow record cannot be edited or deleted. If you require a new flow record, you need to create one and map it to the flow monitor from CLI. SUMMARY STEPS 1. configure terminal 2. flow record flow_record_name 3. description string 4. match ipv4 protocol 5. match ipv4 source address 6. match ipv4 destination address 7. match transport source-port 8. match transport destination-port 9. match flow direction 10. match application name 11. match wireless ssid 12. collect counter bytes long 13. collect counter packets long 14. collect wireless ap mac address 15. collect wireless client mac address 16. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1897 Creating a Flow Record System Management DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 flow record flow_record_name Example: Switch(config)# flow record record1 Switch (config-flow-record)# Enters flow record configuration mode. Step 3 description string Example: (Optional) Describes the flow record as a maximum 63-character string. Switch(config-flow-record)# description IPv4flow Step 4 match ipv4 protocol Specifies a match to the IPv4 protocol. Example: Switch (config-flow-record)# match ipv4 protocol Step 5 match ipv4 source address Example: Switch (config-flow-record)# match ipv4 source address Specifies a match to the IPv4 source address-based field. Step 6 match ipv4 destination address Example: Switch (config-flow-record)# match ipv4 destination address Specifies a match to the IPv4 destination address-based field. Step 7 match transport source-port Example: Switch (config-flow-record)# match transport source-port Specifies a match to the transport layer source-port field. Step 8 match transport destination-port Example: Switch (config-flow-record)# match transport destination-port Specifies a match to the transport layer destination-port field. Step 9 match flow direction Example: Specifies a match to the direction the flow was monitored in. Switch (config-flow-record)# match flow direction Step 10 match application name Example: Specifies a match to the application name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1898 System Management Creating a Flow Exporter (Optional) Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Command or Action Switch (config-flow-record)# match application name Purpose Note This action is mandatory for AVC support, as this allows the flow to be matched against the application. match wireless ssid Example: Specifies a match to the SSID name identifying the wireless network. Switch (config-flow-record)# match wireless ssid collect counter bytes long Specifies to collect counter fields total bytes. Example: Switch (config-flow-record)# collect counter bytes long collect counter packets long Specifies to collect counter fields total packets. Example: Switch (config-flow-record)# collect counter bytes long collect wireless ap mac address Example: Specifies to collect the BSSID with MAC addresses of the access points that the wireless client is associated with. Switch (config-flow-record)# collect wireless ap mac address collect wireless client mac address Example: Switch (config-flow-record)# collect wireless client mac address Specifies to collect MAC address of the client on the wireless network. Note The collect wireless client mac address is mandatory configuration for wireless AVC. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Creating a Flow Exporter (Optional) You can create a flow export to define the export parameters for a flow. This is an optional procedure for configuring flow parameters. SUMMARY STEPS 1. configure terminal 2. flow exporter flow_exporter_name 3. description string 4. destination {hostname | ip-address} 5. transport udp port-value 6. option application-table timeout seconds (optional) 7. option usermac-table timeout seconds (optional) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1899 Creating a Flow Exporter (Optional) System Management 8. end 9. show flow exporter 10. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 flow exporter flow_exporter_name Example: Switch(config)# flow exporter record1 Switch (config-flow-exporter)# Enters flow exporter configuration mode. Step 3 description string Example: Describes the flow record as a maximum 63-character string. Switch(config-flow-exporter)# description IPv4flow Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 destination {hostname | ip-address} Example: Switch (config-flow-exporter) # destination 10.99.1.4 Specifies the hostname or IPv4 address of the system to which the exporter sends data. transport udp port-value Configures a port value for the UDP protocol. Example: Switch (config-flow-exporter) # transport udp 2 option application-table timeout seconds (optional) Example: Switch (config-flow-exporter)# option application-table timeout 500 (Optional) Specifies application table timeout option. The valid range is from 1 to 86400 seconds. option usermac-table timeout seconds (optional) Example: Switch (config-flow-exporter)# option usermac-table timeout 1000 (Optional) Specifies wireless usermac-to-username table option. The valid range is from 1 to 86400 seconds. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. show flow exporter Example: Switch # show flow exporter Verifies your configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1900 System Management Creating a Flow Monitor Step 10 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Creating a Flow Monitor You can create a flow monitor and associate it with a flow record and a flow exporter. SUMMARY STEPS 1. configure terminal 2. flow monitor monitor-name 3. description description 4. record record-name 5. exporter exporter-name 6. cache timeout {active | inactive} (Optional) 7. end 8. show flow monitor DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 flow monitor monitor-name Example: Switch (config)# flow monitor flow-monitor-1 Creates a flow monitor and enters flow monitor configuration mode. Step 3 description description Example: Switch (config-flow-monitor)# description flow-monitor-1 Creates a description for the flow monitor. Step 4 record record-name Specifies the name of a recorder that was created previously. Example: Switch (config-flow-monitor)# record flow-record-1 Step 5 exporter exporter-name Example: Switch (config-flow-monitor)# exporter flow-exporter-1 Specifies the name of an exporter that was created previously. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1901 Creating AVC QoS Policy System Management Step 6 Step 7 Step 8 Command or Action Purpose cache timeout {active | inactive} (Optional) Specifies to configure flow cache parameters. You can Example: configure for a time period of 1 to 604800 seconds (optional). Switch (config-flow-monitor)# cache timeout active 1800 Note To achieve optimal result for the AVC flow Switch (config-flow-monitor)# cache timeout inactive 200 monitor, we recommend you to configure the inactive cache timeout value to be greater than 90 seconds. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. show flow monitor Example: Switch # show flow monitor Verifies your configuration. Creating AVC QoS Policy To create AVC QoS policy, perform these general steps: 1. Create a class map with match protocol filters. 2. Create a policy map. 3. Apply a policy map to the client in one of the following ways: a. Apply a policy map over WLAN either from the CLI or GUI. b. Apply a policy map through the AAA server (ACS server or ISE) from the CLI. For more information, refer to the Cisco Identity Services Engine User Guide and Cisco Secure Access Control System User Guide. c. Apply local policies either from the CLI or GUI. Creating a Class Map You need to create a class map before configuring any match protocol filter. The QoS actions such as marking, policing, and dropping can be applied to the traffic. The AVC match protocol filters are applied only for the wireless clients. Refer 8.0 protocol pack for the protocols supported. SUMMARY STEPS 1. configure terminal 2. class-map class-map-name 3. match protocol {application-name | attribute category category-name | attribute sub-category sub-category-name | attribute application-group application-group-name} 4. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1902 System Management Creating a Policy Map DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 class-map class-map-name Example: Switch(config)# class-map webex-class Creates a class map. Step 3 match protocol {application-name | attribute category Specifies match to the application name, category name, category-name | attribute sub-category subcategory name, or application group. sub-category-name | attribute application-group application-group-name} Example: Switch(config)# class-map webex-class Switch(config-cmap)# match protocol webex-media Switch(config)# class-map class-webex-category Switch(config-cmap)# match protocol attribute category webex-media Switch# class-map class-webex-sub-category Switch(config-cmap)# match protocol attribute sub-category webex-media Step 4 Switch# class-map class-webex-application-group Switch(config-cmap)# match protocol attribute application-group webex-media end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Creating a Policy Map SUMMARY STEPS 1. configure terminal 2. policy-map policy-map-name 3. class [class-map-name | class-default] 4. police rate-bps burst-byte [exceed-action {drop | policed-dscp-transmit}] 5. set {dscp new-dscp | cos cos-value} 6. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1903 Creating a Policy Map System Management DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 policy-map policy-map-name Example: Switch(config)# policy-map webex-policy Switch(config-pmap)# Purpose Enters global configuration mode. Creates a policy map by entering the policy map name, and enters policy-map configuration mode. By default, no policy maps are defined. The default behavior of a policy map is to set the DSCP to 0 if the packet is an IP packet and to set the CoS to 0 if the packet is tagged. No policing is performed. Note To delete an existing policy map, use the no policy-map policy-map-name global configuration command. Step 3 class [class-map-name | class-default] Example: Switch(config-pmap)# class-map webex-class Switch(config-pmap-c)# Defines a traffic classification, and enters policy-map class configuration mode. By default, no policy map and class maps are defined. If a traffic class has already been defined by using the class-map global configuration command, specify its name for class-map-name in this command. A class-default traffic class is predefined and can be added to any policy. It is always placed at the end of a policy map. With an implied match any is included in the class-default class, all packets that have not already matched the other traffic classes will match class-default. Note To delete an existing class map, use the no class class-map-name policy-map configuration command. Step 4 police rate-bps burst-byte [exceed-action {drop | policed-dscp-transmit}] Example: Switch(config-pmap-c)# police 100000 80000 drop Defines a policer for the classified traffic. By default, no policer is defined. · For rate-bps, specify an average traffic rate in bits per second (b/s). The range is 8000 to 10000000000. · For burst-byte, specify the normal burst size in bytes. The range is 8000 to 1000000. · (Optional) Specifies the action to take when the rates are exceeded. Use the exceed-action drop keywords to drop the packet. Use the exceed-action policed-dscp-transmit keywords to mark down the DSCP value (by using the policed-DSCP map) and to send the packet. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1904 System Management Configuring Local Policies (CLI) Step 5 Command or Action set {dscp new-dscp | cos cos-value} Example: Switch(config-pmap-c)# set dscp 45 Step 6 end Example: Switch(config)# end Purpose Classifies IP traffic by setting a new value in the packet. · For dscp new-dscp, enter a new DSCP value to be assigned to the classified traffic. The range is 0 to 63. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. What to do next After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. Configuring Local Policies (CLI) Configuring Local Policies (CLI) To configure local policies, complete these procedures: 1. Create a service template. 2. Create an interface template. 3. Create a parameter map. 4. Create a policy map. 5. Apply a local policy on a WLAN. Creating a Service Template (CLI) SUMMARY STEPS 1. configure terminal 2. service-template service-template-name 3. access-group acl_list 4. vlan vlan_id 5. absolute-timer seconds 6. service-policy qos {input | output} 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1905 Creating a Parameter Map (CLI) System Management Step 2 Step 3 Step 4 Step 5 Command or Action service-template service-template-name Example: Purpose Enters service template configuration mode. Switch(config)# service-template cisco-phone-template Switch(config-service-template)# access-group acl_list Example: Specifies the access list to be applied. Switch(config-service-template)# access-group foo-acl vlan vlan_id Example: Specifies VLAN ID. You can specify a value from 1 to 4094. Switch(config-service-template)# vlan 100 absolute-timer seconds Example: Specifies session timeout value for service template. You can specify a value from 1 to 65535. Switch(config-service-template)# absolute-timer 20 Step 6 Step 7 service-policy qos {input | output} Example: Configures QoS policies for the client. Switch(config-service-template)# service-policy qos input foo-qos end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Creating a Parameter Map (CLI) Parameter map is preferred to use than class map. SUMMARY STEPS 1. configure terminal 2. parameter-map type subscriber attribute-to-service parameter-map-name 3. map-index map { device-type | mac-address | oui | user-role | username} {eq | not-eq | regex filter-name } 4. interface-template interface-template-name 5. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1906 System Management Creating a Policy Map (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 parameter-map type subscriber attribute-to-service parameter-map-name Example: Purpose Enters global configuration mode. Specifies the parameter map type and name. Step 3 Switch(config)# parameter-map type subscriber attribute-to-service Aironet-Policy-para map-index map { device-type | mac-address | oui | Specifies parameter map attribute filter criteria. user-role | username} {eq | not-eq | regex filter-name } Example: Step 4 Switch(config-parameter-map-filter)# 10 map device-type eq "WindowsXP-Workstation" interface-template interface-template-name Example: Enters service template configuration mode. Step 5 Switch(config-parameter-map-filter-submode)# interface-template cisco-phone-template Switch(config-parameter-map-filter-submode)# end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Creating a Policy Map (CLI) SUMMARY STEPS 1. configure terminal 2. policy-map type control subscriber policy-map-name 3. event identity-update {match-all | match-first} 4. class_number class {class_map_name | always } {do-all | do-until-failure | do-until-success} 5. action-index map attribute-to-service table parameter-map-name 6. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1907 Applying a Local Policy for a Device on a WLAN (CLI) System Management DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 policy-map type control subscriber policy-map-name Example: Purpose Enters global configuration mode. Specifies the policy map type. Step 3 Switch(config)# policy-map type control subscriber Aironet-Policy event identity-update {match-all | match-first} Example: Specifies match criteria to the policy map. Step 4 Step 5 Switch(config-policy-map)# event identity-update match-all class_number class {class_map_name | always } {do-all | do-until-failure | do-until-success} Example: Switch(config-class-control-policymap)# 1 class local_policy1_class do-until-success Configures the local profiling policy class map number and specifies how to perform the action. The class map configuration mode includes the following command options: · always--Executes without doing any matching but return success. · do-all--Executes all the actions. · do-until-failure--Execute all the actions until any match failure is encountered. This is the default value. · do-until-success--Execute all the actions until any match success happens. action-index map attribute-to-service table parameter-map-name Example: Specifies parameter map table to be used. Step 6 Switch(config-policy-map)# 10 map attribute-to-service table Aironet-Policy-para end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Applying a Local Policy for a Device on a WLAN (CLI) Before you begin If the service policy contains any device type-based rules in the parameter map, ensure that the device classifier is already enabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1908 System Management Applying a Local Policy for a Device on a WLAN (CLI) Note You should use the device classification command to classify the device for it to be displayed correctly on the show command output. SUMMARY STEPS 1. configure terminal 2. wlan wlan-name 3. service-policy type control subscriber policymapname 4. profiling local http (optional) 5. profiling radius http (optional) 6. no shutdown 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan wlan-name Example: Purpose Enters global configuration mode. Enters WLAN configuration mode. Step 3 Step 4 Step 5 Step 6 Step 7 Switch(config)# wlan wlan1 service-policy type control subscriber policymapname Applies local policy to WLAN. Example: Switch(config-wlan)# service-policy type control subscriber Aironet-Policy profiling local http (optional) Example: Switch(config-wlan)# profiling local http Enables only profiling of devices based on HTTP protocol (optional). profiling radius http (optional) Example: Switch(config-wlan)# profiling radius http Enables profiling of devices on ISE (optional). no shutdown Example: Switch(config-wlan)# no shutdown Specifies not to shut down the WLAN. end Example: Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1909 Configuring Local Policies (GUI) System Management Command or Action Switch(config)# end Purpose Configuring Local Policies (GUI) Configuring Local Policies (GUI) To configure local policies, complete these procedures: 1. Create a service template. 2. Create a policy map. 3. Apply a local policy that you have created to a WLAN. Creating a Service Template (GUI) Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Local Policies > Service Template to open the Service Template page. Create a new template as follows: a) Click New to open the Service Template > New page. b) In the Service Template name text box, enter the new service template name. c) In the VLAN ID text box, enter the VLAN identifier that has to be associated with the policy. The value ranges from 1 to 4094. d) In the Session timeout text box, enter the maximum amount of time, in seconds, after which a client is forced to reauthenticate. The value ranges from 1 to 65535 seconds. e) From the Access control list drop-down list, choose the access control list to be mapped to the policy. f) From the Ingress QoS drop-down list, choose the ingress QoS policy to be applied. g) From the Egress QoS drop-down list, choose the egress QoS policy to be applied. h) Click Apply to save the configuration. Edit a service template as follows: a) From the Service Template page, click the service template to open the Service Template > Edit page. b) In the VLAN ID text box, enter the VLAN identifier that has to be associated with the policy. The value ranges from 1 to 4094. c) In the Session timeout text box, enter the maximum amount of time, in seconds, after which a client is forced to reauthenticate. The value ranges from 1 to 65535 seconds. d) From the Access control list drop-down list, choose the access control list to be mapped to the policy. e) From the Ingress QoS drop-down list, choose the ingress QoS policy to be applied. f) From the Egress QoS drop-down list, choose the egress QoS policy to be applied. g) Click Apply to save the configuration. Remove a service template as follows: a) From the Service Template page, select the service template. b) Click Remove. c) Click Apply to save the configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1910 System Management Creating a Policy Map (GUI) Creating a Policy Map (GUI) Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Local Policies > Policy Map to open the Policy Map page. Create a new policy map as follows: a) Click New to open the Policy Map > New page. b) In the Policy Map name text box, enter the new policy map name. c) Click Add to open the Match Criteria area. d) From the Device Type drop-down list, choose the device type. The match criteria for the device type can be eq, not-eq, or regex with respect to the device type you are choosing. e) From the User Role drop-down list, select the match criteria as eq, not-eq, or regex and enter the user type or user group of the user, for example, student, teacher, and so on. f) From the Service Template drop-down list, choose the service template to be mapped to the policy. g) Click Add. The match criteria is added to the Match Criteria Lists. h) In the Match Criteria Lists area, click Add to add the match criteria to the policy. i) Click Apply to save the configuration. Edit a policy map as follows: a) In the Policy Map page, select the policy map that you want to edit, and click Edit to open the Policy Map > Edit page. b) In the Match Criteria area, choose the device type from the Device Type drop-down list. The match criteria for the device type can be eq, not-eq, or regex with respect to the device type you are choosing. c) In the Match Criteria area, choose the user role from the User Role drop-down list. Select the match criteria as eq, not-eq, or regex and enter the user type or user group of the user d) From the Service Template drop-down list, choose the service template to be mapped to the policy. e) Click Ok to save the configuration or Cancel to discard the configuration. f) Click Add to add more match criteria based on device type, user role, and service template to the policy. g) In the Match Criteria Lists area, select the match criteria and click Move to to move the match criteria with respect to a value entered in the row text box. h) Select the match criteria and click Move up to move the match criteria up in the list. i) Select the match criteria and click Move down to move the match criteria down in the list. j) Select the match criteria and click Remove to remove the match criteria from the policy map list. k) Click Apply to save the configuration. Remove a policy map as follows: a) From the Policy Map page, select the policy map. b) Click Remove. c) Click Apply to save the configuration. Applying Local Policies to WLAN (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > WLAN to open the WLANs page. Click the corresponding WLAN profile. The WLANs > Edit page is displayed. Click the Policy-Mapping tab. Check the Device Classification check box to enable classification based on device type. From the Local Subscriber Policy drop-down list, choose the policy that has to be applied for the WLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1911 Configuring WLAN to Apply Flow Monitor in IPV4 Input/Output Direction System Management Step 6 Step 7 Step 8 Select Local HTTP Profiling to enable profiling on devices based on HTTP (optional). Select Radius HTTP Profiling to enable profiling on devices based on RADIUS (optional). Click Apply to save the configuration. Configuring WLAN to Apply Flow Monitor in IPV4 Input/Output Direction SUMMARY STEPS 1. configure terminal 2. wlan wlan-id 3. ip flow monitor monitor-name {input | output} 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan wlan-id Example: Step 3 Switch (config) # wlan 1 ip flow monitor monitor-name {input | output} Example: Step 4 Switch (config-wlan) # ip flow monitor flow-monitor-1 input end Example: Switch(config)# end Purpose Enters global configuration mode. Enters WLAN configuration submode. For wlan-id, enter the WLAN ID. The range is 1 to 64. Associates a flow monitor to the WLAN for input or output packets. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Application Visibility and Control (GUI) Configuring Application Visibility (GUI) You can apply the default flow record (wireless avc basic) to the default flow monitor (wireless-avc-basic). If you are using the flow record and flow monitor you have created, then the record name and monitor name should be same. This is specific only for configuring AVC from GUI and not for the CLI configuration. You can use the flow monitor you have created either for upstream or downstream, or both, but ensure that you use the same record name while mapping with the flow monitor. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1912 System Management Configuring Application Visibility and Control (GUI) Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > WLAN. The WLAN page appears. Click on the corresponding WLAN ID to open the WLAN > Edit page and click AVC. The Application Visibility page appears. a) Select the Application Visibility Enabled check box to enable AVC on a WLAN. b) In the Upstream Profile text box, enter the name of the AVC profile. c) In the Downstream Profile text box, enter the name of the AVC profile. To enable AVC, you need to enter the profile names for the upstream and downstream profiles. The profile names are the flow monitor names. By default, the flow monitor names (wireless-avc-basic) appear in the Upstream Profile and Downstream Profile text boxes. For the default flow monitor, the default flow record (wireless avc basic) will be taken. The default flow record is generated by the system and is available. You can change the profile names for the upstream and downstream profiles but ensure that the same flow records are available for the flow monitors. The upstream and downstream profiles can have different profile names but there should be flow records available for the flow monitors. Click Apply to apply AVC on the WLAN. To disable AVC on a specific WLAN, perform the following steps: · Choose Configuration > Wireless > WLAN to open the WLAN page. · Click on the corresponding WLAN ID to open the WLAN > Edit page. · Click AVC to open the Application Visibility page. · Uncheck the Application Visibility Enabled check box. · Click Apply to disable AVC on the specific WLAN. Configuring Application Visibility and Control (GUI) Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless. Expand the QoS node by clicking the left pane and choosing QOS-Policy. The QOS-Policy page is displayed. Click Add New to create a new QoS Policy. The Create QoS Policy page is displayed. Select Client from the Policy Type drop-down list. Select the direction into which the policy needs to be applied from the Policy Direction drop-down list. The available options are: · Ingress · Egress Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1913 Monitoring Application Visibility and Control System Management Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 In the Policy Name text box, specify a policy name. In the Description text box, provide a description to the policy. Check the Enable Application Recognition check box to configure the AVC class map for a client policy. Note For an egress client policy, when you enable Application Recognition, the Voice, Video, and User Defined check boxes are disabled. The following options are available: · Trust--Specify a classification type for this policy. · Protocol--Allows you to choose the protocols and configure the marking and policing of the packets. · Category--Allows you to choose the category of the application, for example, browsing. · Subcategory--Allows you to choose the subcategory of the application, for example, file-sharing. · Application-Group--Allows you to choose the application group, for example, ftp-group. · Protocol Choice--Choose the protocols, category, subcategory, or application group from the Available Protocols list into the Assigned Protocols to apply the marking and policing of the packets. · Mark--Specify the marking label for each packet. The following options are available: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · CoS--Matches IEEE 802.1Q class of service. The range is from 0 to 7. · None--Does not mark the packets. · Police (kbps)--Specify the policing rate in kbps. This option is available when the Policy Direction is egress. · Drop--Specify to drop the ingress packets that correspond to the chosen protocols. Note You can add a maximum of five AVC classes for each client policy. Click Add to create an AVC class map. The new class map is listed in a tabular format. Click Apply to create an AVC QoS policy. Click the QoS policy link in the QOS-Policy page to edit the QoS policy. The QOS-Policy > Edit page is displayed. Make changes and click Apply to commit your changes. Remove an AVC class map from the QoS policy by navigating to the corresponding AVC class map row in the AVC class map table and clicking Remove. Click Apply to commit your changes. Monitoring Application Visibility and Control Monitoring Application Visibility and Control (CLI) This section describes the new commands for application visibility. The following commands can be used to monitor application visibility on the switch and access points. Table 171: Monitoring Application Visibility Commands on the switch Command Purpose show avc client client-mac top n application Displays information about top "N" applications for the [aggregate | upstream | downstream] given client MAC. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1914 System Management Monitoring Application Visibility and Control (CLI) show avc wlan ssid top n application [aggregate | upstream | downstream] Displays information about top "N" applications for the given SSID. avc top user[enable | disable] Enables or disables the information about top "N" application. show avc wlan wlan-id application app name Displays to know network usage information on a per user topN [aggregate | upstream | downstream] basis within an application. Note On Catalyst 4500E Supervisor Engine 8-E, in the information about top N users that is displayed, the client's MAC address and username are not displayed. This issue occurs only within 90 seconds after the client is disconnected. show wlan id wlan-id Displays information whether AVC is enabled or disabled on a particular WLAN. show flow monitor flow_monitor_name cache Displays information about flow monitors. show wireless client mac-address mac-address Displays information about policy mapped to the wireless service-policy { input | output } clients. show ip nbar Displays the statistics gathered by the NBAR Protocol protocol-discovery[interfaceinterface-type Discovery feature. interface-number] [stats{byte-count | bit-rate | packet-count | max-bit-rate}] [protocolprotocol-name | top-nnumber] · (Optional) Enter keywords and arguments to fine-tune the statistics displayed. For more information on each of the keywords, refer to the show ip nbar protocol-discoverycommand in Cisco IOS Quality of Service Solutions Command Reference. Note When you configure NBAR, you must enable Protocol Discovery on the interface. show policy-map target show policy-map show policy-map policy-name show policy-map interfaceinterface-type interface-number Displays information about policy map. Table 172: Clearing Application Visibility Statistics Commands Command Purpose clear avc client mac stats Clears the statistics per client. clear avc wlan wlan-name stats Clears the statistics per WLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1915 Monitoring Application Visibility and Control (GUI) System Management Monitoring Application Visibility and Control (GUI) You can view AVC information on a WLAN in a single shot using a AVC on WLAN pie chart on the Home page of the switch. The pie chart displays the AVC data (Aggregate - Application Cumulative usage %) of the first WLAN. In addition, the top 5 WLANs based on clients are displayed first. Click on any one of the WLANs to view the corresponding pie chart information. If AVC is not enabled on the first WLAN, then the Home page does not display the AVC pie chart. Step 1 Step 2 Choose Monitor > Controller > AVC > WLANs. The WLANs page appears. Click the corresponding WLAN profile. The Application Statistics page appears. From the Top Applications drop-down list, choose the number of top applications you want to view and click Apply. The valid range is between 5 to 30, in multiples of 5. a) On the Aggregate, Upstream, and Downstream tabs, you can view the application cumulative and last 90 seconds statistics and usage percent with the following fields: · Application name · Packet count · Byte count · Average packet size · usage (%) Step 3 Step 4 Choose Monitor > Clients > Client Details > Clients. The Clients page appears. Click Client MAC Address and then click AVC Statistics tab. The Application Visibility page appears. a) On the Aggregate, Upstream, and Downstream tabs, you can view the application cumulative and last 90 seconds statistics and usage percent with the following fields: · Application name · Packet count · Byte count · Average packet size · usage (%) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1916 System Management Monitoring SSID and Client Policies Statistics (GUI) Monitoring SSID and Client Policies Statistics (GUI) Statistics are supported only for ingress policies with a maximum of five classes on wireless targets. For very large policies, statistics for ingress policies are not visible at the switch. The frequency of the statistics depends on the number of clients associated with the access point. Type of Statistics SSID Policies Method Details Choose Monitor > Controller > The QoS page is displayed with a Statistics > QoS. list of SSID policies, Radio Type, and AP. Choose an SSID policy, radio, and access point from the drop-down lists and click Apply to view the statistics of the chosen SSID policy. You can view details such as match criteria, confirmed bytes, conformed rate, and exceeded rate. Client Policies Choose Monitor > Clients > Client Details . The Clients page is displayed with a list of client MAC addresses, AP, and other details. Click the MAC address of a client and click the QoS Statistics tab. You can view details such as match criteria, confirmed bytes, conformed rate, and exceeded rate. Examples: Application Visibility and Control Examples: Application Visibility Configuration This example shows how to create a flow record, create a flow monitor, apply the flow record to the flow monitor, and apply the flow monitor on a WLAN: Switch# configure terminal Switch(config)# flow record fr_v4 Switch(config-flow-record)# match ipv4 protocol Switch(config-flow-record)# match ipv4 source address Switch(config-flow-record)# match ipv4 destination address Switch(config-flow-record)# match transport destination-port Switch(config-flow-record)# match flow direction Switch(config-flow-record)# match application name Switch(config-flow-record)# match wireless ssid Switch(config-flow-record)# collect counter bytes long Switch(config-flow-record)# collect counter packets long Switch(config-flow-record)# collect wireless ap mac address Switch(config-flow-record)# collect wireless client mac address Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1917 Examples: Application Visibility and Control QoS Configuration System Management Switch(config)#end Switch# configure terminal Switch# flow monitor fm_v4 Switch(config-flow-monitor)# record fr_v4 Switch(config-flow-monitor)# cache timeout active 1800 Switch(config)#end Switch(config)#wlan wlan1 Switch(config-wlan)#ip flow monitor fm_v4 input Switch(config-wlan)#ip flow mon fm-v4 output Switch(config)#end Examples: Application Visibility and Control QoS Configuration This example shows how to create class maps with apply match protocol filters for application name, category, and subcategory: Switch# configure terminal Switch(config)# class-map cat-browsing Switch(config-cmap)# match protocol attribute category browsing Switch(config-cmap)#end Switch# configure terminal Switch(config)# class-map cat-fileshare Switch(config-cmap)# match protocol attribute category file-sharing Switch(config-cmap)#end Switch# configure terminal Switch(config)# class-map match-any subcat-terminal Switch(config-cmap)# match protocol attribute sub-category terminal Switch(config-cmap)#end Switch# configure terminal Switch(config)# class-map match-any webex-meeting Switch(config-cmap)# match protocol webex-meeting Switch(config-cmap)#end This example shows how to create policy maps and define existing class maps for upstream QoS: Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class cat-browsing Switch(config-pmap-c)# police 150000 Switch(config-pmap-c)# set dscp 12 Switch(config-pmap-c)#end Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class cat-fileshare Switch(config-pmap-c)# police 1000000 Switch(config-pmap-c)# set dscp 20 Switch(config-pmap-c)#end Switch# configure terminal Switch(config)# policy-map test-avc-up Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1918 System Management Examples: Application Visibility and Control QoS Configuration Switch(config-pmap)# class subcat-terminal Switch(config-pmap-c)# police 120000 Switch(config-pmap-c)# set dscp 15 Switch(config-pmap-c)#end Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class webex-meeting Switch(config-pmap-c)# police 50000000 Switch(config-pmap-c)# set dscp 21 Switch(config-pmap-c)#end This example shows how to create policy maps and define existing class maps for downstream QoS: Switch# configure terminal Switch(config)# policy-map test-avc-down Switch(config-pmap)# class cat-browsing Switch(config-pmap-c)# police 200000 Switch(config-pmap-c)# set dscp 10 Switch(config-pmap-c)#end Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class cat-fileshare Switch(config-pmap-c)# police 300000 Switch(config-pmap-c)# set wlan user-priority 2 Switch(config-pmap-c)# set dscp 20 Switch(config-pmap-c)#end Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class subcat-terminal Switch(config-pmap-c)# police 100000 Switch(config-pmap-c)# set dscp 25 Switch(config-pmap-c)#end Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class webex-meeting Switch(config-pmap-c)# police 60000000 Switch(config-pmap-c)# set dscp 41 Switch(config-pmap-c)#end This example shows how to apply defined QoS policy on a WLAN: Switch# configure terminal Switch(config)#wlan alpha Switch(config-wlan)#shut Switch(config-wlan)#end Switch(config-wlan)#service-policy client input test-avc-up Switch(config-wlan)#service-policy client output test-avc-down Switch(config-wlan)#no shut Switch(config-wlan)#end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1919 Example: Configuring QoS Attribute for Local Profiling Policy System Management Example: Configuring QoS Attribute for Local Profiling Policy The following example shows how to configure QoS attribute for a local profiling policy: Switch(config)# class-map type control subscriber match-all local_policy1_class Switch(config-filter-control-classmap)# match device-type android Switch(config)# service-template local_policy1_template Switch(config-service-template)# vlan 40 Switch(config-service-template)# service-policy qos output local_policy1 Switch(config)# policy-map type control subscriber local_policy1 Switch(config-event-control-policymap)# event identity-update match-all Switch(config-class-control-policymap)# 1 class local_policy1_class do-until-success Switch(config-action-control-policymap)# 1 activate service-template local_policy1_template Switch(config)# wlan open_auth 9 Switch(config-wlan)# client vlan VLAN40 Switch(config-wlan)# service-policy type control subscriber local_policy1 Additional References for Application Visibility and Control Related Documents Related Topic Document Title System management commands System Management Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Flexible NetFlow configuration Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Flexible NetFlow commands Flexible NetFlow Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) QoS configuration QoS Configuration Guide, Cisco IOS XE Release 3E (Cisco WLC 5700 Series) QoS commands QoS Command Reference, Cisco IOS XE Release 3E (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1920 System Management Feature History and Information For Application Visibility and Control Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For Application Visibility and Control Release Cisco IOS XE 3.3SE Cisco IOS XE 3E Feature Information This feature was introduced. AVC control with QoS was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1921 Feature History and Information For Application Visibility and Control System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1922 9 5 C H A P T E R Configuring Voice and Video Parameters · Finding Feature Information, on page 1923 · Prerequisites for Voice and Video Parameters, on page 1923 · Restrictions for Voice and Video Parameters, on page 1923 · Information About Configuring Voice and Video Parameters, on page 1924 · How to Configure Voice and Video Parameters, on page 1928 · Monitoring Voice and Video Parameters, on page 1939 · Additional References for Voice and Video Parameters, on page 1942 · Feature History and Information For Performing Voice and Video Parameters Configuration, on page 1943 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Voice and Video Parameters You can confirm the following points before configuring voice and video parameters: · Ensure that the switch has access points connected to it. · Configure SSID. Restrictions for Voice and Video Parameters The following are the restrictions that you should keep in mind while configuring voice and video parameters: · SIP CAC can be used for the 9971 Cisco phones that support TSPEC-based admission control. You can also use the phones that support Status code 17. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1923 Information About Configuring Voice and Video Parameters System Management · SIP snooping is supported for providing voice priority to the non-TSPEC SIP phones. · TSPEC for video CAC is not supported. Information About Configuring Voice and Video Parameters Three parameters on the switch affect voice and/or video quality: · Call Admission Control · Expedited bandwidth requests · Unscheduled automatic power save delivery Call Admission Control (CAC) and UAPSD are supported on Cisco Compatible Extensions (CCX) v4 and v5; however, these parameters are also supported even without CCX but on any device implementing WMM (that supports 802.1e). Expedited bandwidth requests are supported only on CCXv5. Traffic stream metrics (TSM) can be used to monitor and report issues with voice quality. Call Admission Control Call Admission Control (CAC) enables an access point to maintain controlled quality of service (QoS) when the wireless LAN is experiencing congestion. The WMM protocol deployed in CCXv4 maintains QoS under differing network loads. Two types of Over The Air (OTA) CAC are available: static-based CAC and load-based CAC. The switch supports the following QoS policies: · User-defined policies: You can define your own QoS policies. You can have more control over these policies than the existing metal policies. · System-defined precious metal policies: To support backward compatibility. · Platinum: Used for VoIP clients. · Gold: Used for video clients. · Silver: Used for best effort traffic. · Bronze: Used for NRT traffic. Static-Based CAC Voice over WLAN applications supporting WMM and TSPEC can specify how much bandwidth or shared medium time is required to initiate a call. Bandwidth-based, or static, CAC enables the access point to determine whether it is capable of accommodating a particular call. The access point rejects the call if necessary in order to maintain the maximum allowed number of calls with acceptable quality. The QoS setting for a WLAN determines the level of bandwidth-based CAC support. To use bandwidth-based CAC with voice applications, the WLAN must be configured for Platinum QoS. With bandwidth-based CAC, the access point bandwidth availability is determined based on the amount of bandwidth currently used by Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1924 System Management Load-Based CAC the access point clients, to which the bandwidth requested by the Voice over WLAN applications is added. If this total exceeds a configured bandwidth threshold, the new call is rejected. Note You must enable admission control (ACM) for CCXv4 clients that have WMM enabled. Otherwise, bandwidth-based CAC does not operate properly for these CCXv4 clients. Load-Based CAC Load-based CAC incorporates a measurement scheme that takes into account the bandwidth consumed by all traffic types (including that from clients), cochannel access point loads, and coallocated channel interference, for voice and video applications. Load-based CAC also covers the additional bandwidth consumption resulting from PHY and channel impairment. In load-based CAC, the access point continuously measures and updates the utilization of the RF channel (that is, the mean time of bandwidth that has been exhausted), channel interference, and the additional calls that the access point can admit. The access point admits a new call only if the channel has enough unused bandwidth to support that call. By doing so, load-based CAC prevents oversubscription of the channel and maintains QoS under all conditions of WLAN loading and interference. Note If you disable load-based CAC, the access points start using bandwidth-based CAC. IOSd Call Admission Control IOSd Call Admission Control (CAC) controls bandwidth availability from switch to access point. You can configure class-based, unconditional packet marking features on your switch for CAC. CAC is a concept that applies to voice and video traffic only--not data traffic. If an influx of data traffic oversubscribes a particular link in the network, queueing, buffering, and packet drop decisions resolve the congestion. The extra traffic is simply delayed until the interface becomes available to send the traffic, or, if traffic is dropped, the protocol or the end user initiates a timeout and requests a retransmission of the information. Network congestion cannot be resolved in this manner when real-time traffic, sensitive to both latency and packet loss, is present, without jeopardizing the quality of service (QoS) expected by the users of that traffic. For real-time delay-sensitive traffic such as voice, it is better to deny network access under congestion conditions than to allow traffic onto the network to be dropped and delayed, causing intermittent impaired QoS and resulting in customer dissatisfaction. CAC is therefore a deterministic and informed decision that is made before a voice call is established and is based on whether the required network resources are available to provide suitable QoS for the new call. Based on the admit CAC CLI configuration in addition to the existing CAC algorithm, switch allows either voice or video with TSPEC or SIP snooping. The admit cac CLI is mandatory for the voice call to pass through. If the BSSID policer is configured for the voice or video traffic, then additional checks are performed on the packets. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1925 Expedited Bandwidth Requests System Management Expedited Bandwidth Requests The expedited bandwidth request feature enables CCXv5 clients to indicate the urgency of a WMM traffic specifications (TSPEC) request (for example, an e911 call) to the WLAN. When the controller receives this request, it attempts to facilitate the urgency of the call in any way possible without potentially altering the quality of other TSPEC calls that are in progress. You can apply expedited bandwidth requests to both bandwidth-based and load-based CAC. Expedited bandwidth requests are disabled by default. When this feature is disabled, the controller ignores all expedited requests and processes TSPEC requests as normal TSPEC requests. The following table lists examples of TSPEC request handling for normal TSPEC requests and expedited bandwidth requests. Table 173: TSPEC Request Handling Examples CAC Mode Reserved bandwidth Usage for voice calls Normal TSPEC Request TSPEC with Expedited Bandwidth Request Bandwidth-based 75% (default CAC setting) Less than 75% Admitted Between 75% and Rejected 90% (reserved bandwidth for voice calls exhausted) Admitted Admitted More than 90% Rejected Rejected Load-based CAC Less than 75% Admitted Admitted Between 75% and Rejected 85% (reserved bandwidth for voice calls exhausted) Admitted More than 85% Rejected Rejected 28 For bandwidth-based CAC, the voice call bandwidth usage is per access point radio and does not take into account cochannel access points. For load-based CAC, the voice call bandwidth usage is measured for the entire channel. 29 Bandwidth-based CAC (consumed voice and video bandwidth) or load-based CAC (channel utilization [Pb]). Note Admission control for TSPEC G711-20ms and G711-40 ms codec types are supported. U-APSD Unscheduled automatic power save delivery (U-APSD) is a QoS facility defined in IEEE 802.11e that extends the battery life of mobile clients. In addition to extending battery life, this feature reduces the latency of traffic flow delivered over the wireless media. Because U-APSD does not require the client to poll each individual Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1926 System Management Traffic Stream Metrics packet buffered at the access point, it allows delivery of multiple downlink packets by sending a single uplink trigger packet. U-APSD is enabled automatically when WMM is enabled. Traffic Stream Metrics In a voice-over-wireless LAN (VoWLAN) deployment, traffic stream metrics (TSM) can be used to monitor voice-related metrics on the client-access point air interface. It reports both packet latency and packet loss. You can isolate poor voice quality issues by studying these reports. The metrics consist of a collection of uplink (client side) and downlink (access point side) statistics between an access point and a client device that supports CCX v4 or later releases. If the client is not CCX v4 or CCXv5 compliant, only downlink statistics are captured. The client and access point measure these metrics. The access point also collects the measurements every 5 seconds, prepares 90-second reports, and then sends the reports to the controller. The controller organizes the uplink measurements on a client basis and the downlink measurements on an access point basis and maintains an hour's worth of historical data. To store this data, the controller requires 32 MB of additional memory for uplink metrics and 4.8 MB for downlink metrics. TSM can be configured through either the GUI or the CLI on a per radio-band basis (for example, all 802.11a radios). The controller saves the configuration in flash memory so that it persists across reboots. After an access point receives the configuration from the controller, it enables TSM on the specified radio band. This table shows the upper limit for TSM entries in different controller series. TSM Entries 5700 MAX AP TSM entries 100 MAX Client TSM entries 250 MAX TSM entries 100*250=25000 Note Once the upper limit is reached, additional TSM entries cannot be stored and sent to WCS or NCS. If client TSM entries are full and AP TSM entries are available, then only the AP entries are stored, and viceversa. This leads to partial output. TSM cleanup occurs every one hour. Entries are removed only for those APs and clients that are not in the system. Information About Configuring Voice Prioritization Using Preferred Call Numbers You can configure a switch to provide support for SIP calls from VoWLAN clients that do not support TSPEC-based calls. This feature is known as SIP CAC support. If bandwidth is available in the configured voice pool, the SIP call uses the normal flow and the switch allocates the bandwidth to those calls. You can also prioritize up to six preferred call numbers. When a call comes to one of the configured preferred numbers, the switch does not check the configured maximum voice bandwidth. The switch allocates the bandwidth needed for the call, even if it exceeds the maximum bandwidth for voice configured for voice CAC. The preferred call will be rejected if bandwidth allocation exceeds 85% of the radio bandwidth. The bandwidth allocation is 85 percent of the entire bandwidth pool, not just from the maximum configured voice pool. The bandwidth allocation is the same even for roaming calls. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1927 Information About EDCA Parameters System Management You must configure the following parameters before configuring voice prioritization: · Set WLAN QoS to allow voice calls to pass through. · Enable ACM for the radio. · Enable SIP call snooping on the WLAN. Information About EDCA Parameters Enhanced distributed channel access (EDCA) parameters are designed to provide preferential wireless channel access for voice, video, and other quality-of-service (QoS) traffic. How to Configure Voice and Video Parameters Configuring Voice Parameters (CLI) Before you begin Ensure that you have configured SIP-based CAC. You should have created a class map for CAC before beginning this procedure. SUMMARY STEPS 1. show wlan summary 2. show wlan wlan_id 3. configure terminal 4. policy-map policy-map name 5. class {class-name | class-default} 6. admit cac wmm-tspec 7. service-policy policy-map name 8. end 9. wlan wlan_profile_name wlan_ID SSID_network_name wlan shutdown 10. wlan wlan_profile_name wlan_ID SSID_network_name 11. wlan wlan_name call-snoop 12. wlan wlan_name service-policy input input_policy_name 13. wlan wlan_name service-policy output ouput_policy_name 14. wlan wlan_name service-policy input ingress_policy_name 15. wlan wlan_name service-policy output egress_policy_name 16. ap dot11 {5ghz | 24ghz} shutdown 17. ap dot11 {5ghz | 24ghz} cac voice sip 18. ap dot11 {5ghz | 24ghz} cac voice acm 19. ap dot11 {5ghz | 24ghz} cac voice max-bandwidth bandwidth 20. ap dot11 {5ghz | 24ghz} cac voice roam-bandwidth bandwidth 21. no wlan shutdown Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1928 System Management Configuring Voice Parameters (CLI) 22. no ap dot11 {5ghz | 24ghz} shutdown 23. end DETAILED STEPS Step 1 Command or Action show wlan summary Example: Switch# show wlan summary Purpose Specifies all of the WLANs configured on the switch. Step 2 show wlan wlan_id Example: Switch# show wlan 25 Specifies the WLAN that you plan to modify. For voice over WLAN, ensure that the WLAN is configured for WMM and the QoS level is set to Platinum. Step 3 configure terminal Example: Switch# configure terminal Enters global configuration mode. Step 4 policy-map policy-map name Example: Switch(config)# policy-map test_2000 Switch(config-pmap)# Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. In WLAN, you need to configure service-policy for these commands to take effect. Step 5 class {class-name | class-default} Example: Switch(config-pmap)# class test_1000 Switch(config-pmap-c)# Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Specifies the name of the class whose policy you want to create or change. You can also create a system default class for unclassified packets. Step 6 admit cac wmm-tspec Example: Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-c)# (Optional) Admits the request for Call Admission Control (CAC) for policy map. Step 7 service-policy policy-map name Configures the QoS service policy. Example: Switch(config-pmap-c)# service-policy test_2000 Switch(config-pmap-c)# Step 8 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1929 Configuring Voice Parameters (CLI) System Management Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Command or Action Purpose wlan wlan_profile_name wlan_ID SSID_network_name Disables all WLANs with WMM enabled prior to changing wlan shutdown the video parameters. Example: Switch(config)# wlan wlan1 Switch(config-wlan)# wlan shutdown wlan wlan_profile_name wlan_ID SSID_network_name Disables all WLANs with WMM enabled prior to changing Example: the voice parameters. Switch(config)# wlan wlan1 Switch(config-wlan)# wlan shutdown wlan wlan_name call-snoop Example: Switch(config)# wlan wlan1 call-snoop Enables the call-snooping on a particular WLAN. wlan wlan_name service-policy input input_policy_name Configures input SSID policy on a particular WLAN to Example: voice. Switch(config)# wlan wlan1 Switch(config-wlan)# service-policy input platinum-up wlan wlan_name service-policy output ouput_policy_name Example: Switch(config)# wlan wlan1 Switch(config-wlan)# service-policy output platinum Configures output SSID policy on a particular WLAN to voice. wlan wlan_name service-policy input ingress_policy_name Configures ingress SSID policy on a particular WLAN as user-defined policy. Example: Switch(config)# wlan wlan1 Switch(config-wlan)# service-policy input policy1 wlan wlan_name service-policy output egress_policy_name Configures egress SSID policy on a particular WLAN as user-defined policy. Example: Switch(config)# wlan wlan1 Switch(config-wlan)# service-policy output policy2 ap dot11 {5ghz | 24ghz} shutdown Example: Disables the radio network. Switch(config)# ap dot11 5ghz shutdown Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1930 System Management Configuring Video Parameters (CLI) Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Step 23 Command or Action ap dot11 {5ghz | 24ghz} cac voice sip Example: Switch(config)# ap dot11 5ghz cac voice sip ap dot11 {5ghz | 24ghz} cac voice acm Example: Switch(config)# ap dot11 5ghz cac voice acm ap dot11 {5ghz | 24ghz} cac voice max-bandwidth bandwidth Example: Switch(config)# ap dot11 5ghz cac voice max-bandwidth 85 ap dot11 {5ghz | 24ghz} cac voice roam-bandwidth bandwidth Example: Switch(config)# ap dot11 5ghz cac voice roam-bandwidth 10 no wlan shutdown Example: Switch(config-wlan)# no wlan shutdown no ap dot11 {5ghz | 24ghz} shutdown Example: Switch(config)# no ap dot11 5ghz shutdown end Example: Switch(config)# end Purpose Enables or disables SIP IOSd CAC for the 802.11a or 802.11b/g network. Enables or disables bandwidth-based voice CAC for the 802.11a or 802.11b/g network. Sets the percentage of maximum bandwidth allocated to clients for voice applications on the 802.11a or 802.11b/g network. The bandwidth range is 5 to 85%, and the default value is 75%. Once the client reaches the value specified, the access point rejects new videos on this network. Sets the percentage of maximum allocated bandwidth reserved for roaming voice clients. The bandwidth range is 0 to 25%, and the default value is 6%. The switch reserves this much bandwidth from the maximum allocated bandwidth for roaming voice clients. Reenables all WLANs with WMM enabled. Reenables the radio network. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Configuring Video Parameters (CLI) SUMMARY STEPS 1. show wlan summary 2. show wlan wlan_id 3. configure terminal 4. policy-map policy-map name Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1931 Configuring Video Parameters (CLI) System Management 5. class {class-name | class-default} 6. admit cac wmm-tspec 7. service-policy policy-map name 8. end 9. wlanwlan_profile_name 10. ap dot11 {5ghz | 24ghz} shutdown 11. ap dot11 {5ghz | 24ghz} cac video acm 12. ap dot11 {5ghz | 24ghz} cac video load-based 13. ap dot11 {5ghz | 24ghz} cac video max-bandwidth bandwidth 14. ap dot11 {5ghz | 24ghz} cac video roam-bandwidth bandwidth 15. no wlan shutdown wlan_id 16. no ap dot11 {5ghz | 24ghz} shutdown 17. end DETAILED STEPS Step 1 Command or Action show wlan summary Example: Switch# show wlan summary Step 2 show wlan wlan_id Example: Switch# show wlan 25 Step 3 configure terminal Example: Switch# configure terminal Step 4 policy-map policy-map name Example: Switch(config)# policy-map test_2000 Switch(config-pmap)# Step 5 class {class-name | class-default} Example: Switch(config-pmap)# class test_1000 Switch(config-pmap-c)# Step 6 admit cac wmm-tspec Example: Purpose Specifies all of the WLANs configured on the switch. Specifies the WLAN that you plan to modify. Enters global configuration mode. Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. In WLAN, you need to configure service-policy for these commands to take effect. Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Specifies the name of the class whose policy you want to create or change. You can also create a system default class for unclassified packets. (Optional) Admits the request for Call Admission Control (CAC) for policy map. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1932 System Management Configuring Video Parameters (CLI) Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Command or Action Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-c)# Purpose service-policy policy-map name Configures the QoS service policy. Example: Switch(config-pmap-c)# service-policy test_2000 Switch(config-pmap-c)# end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. wlanwlan_profile_name Example: Switch(config)# wlan wlan1 Switch(config-wlan)# wlan shutdown Disables all WLANs with WMM enabled prior to changing the video parameters. ap dot11 {5ghz | 24ghz} shutdown Example: Switch(config)# ap dot11 5ghz shutdown Disables the radio network. ap dot11 {5ghz | 24ghz} cac video acm Example: Switch(config)# ap dot11 5ghz cac video acm Enables or disables bandwidth-based video CAC for the 802.11a or 802.11b/g network. ap dot11 {5ghz | 24ghz} cac video load-based Configures the load-based CAC method. Example: If you do not enter this command, then the default static Switch(config)# ap dot11 5ghz cac video load-based CAC is applied. ap dot11 {5ghz | 24ghz} cac video max-bandwidth bandwidth Example: Switch(config)# ap dot11 5ghz cac video max-bandwidth 20 Sets the percentage of maximum bandwidth allocated to clients for video applications on the 802.11a or 802.11b/g network. The bandwidth range is 5 to 85%, and the default value is 75%. The default value is 0, which means no bandwidth request control. The sum of the voice bandwidth and video bandwidth should not exceed 85% or configured maximum media bandwidth. ap dot11 {5ghz | 24ghz} cac video roam-bandwidth bandwidth Example: Switch(config)# ap dot11 5ghz cac video roam-bandwidth 9 Sets the percentage of maximum allocated bandwidth reserved for roaming clients for video. The bandwidth range is 0 to 25%, and the default value is 0%. no wlan shutdown wlan_id Reenables all WLANs with WMM enabled. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1933 Configuring SIP-Based CAC (CLI) System Management Step 16 Step 17 Command or Action Example: Switch(config-wlan)# no wlan shutdown 25 no ap dot11 {5ghz | 24ghz} shutdown Example: Switch(config)# no ap dot11 5ghz shutdown end Example: Switch(config)# end Purpose Reenables the radio network. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Configuring SIP-Based CAC (CLI) SIP CAC controls the total number of SIP calls that can be made. SUMMARY STEPS 1. configure terminal 2. wlan wlan-name 3. call-snoop 4. service-policy [client] input policy-map name 5. service-policy [client] output policy-map name 6. end 7. show wlan {wlan-id | wlan-name} 8. configure terminal 9. ap dot11 {5ghz | 24ghz} cac {voice | video} acm 10. ap dot11 {5ghz | 24ghz} cac voice sip 11. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan wlan-name Example: Switch(config)# wlan qos-wlan Switch(config-wlan)# Purpose Enters global configuration mode. Enters WLAN configuration submode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1934 System Management Configuring SIP-Based CAC (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action call-snoop Example: Switch(config-wlan)# call-snoop service-policy [client] input policy-map name Example: Switch(config-wlan)# service-policy input platinum-up service-policy [client] output policy-map name Example: Switch(config-wlan)# service-policy output platinum end Example: Switch(config)# end show wlan {wlan-id | wlan-name} Example: Switch# show wlan qos-wlan configure terminal Example: Switch# configure terminal ap dot11 {5ghz | 24ghz} cac {voice | video} acm Example: Switch(config)# ap dot11 5ghz cac voice acm ap dot11 {5ghz | 24ghz} cac voice sip Example: Switch(config)# ap dot11 5ghz cac voice sip end Example: Switch(config)# end Purpose Enables the call-snooping feature for a particular WLAN. Assigns a policy map to WLAN input traffic. Ensure that you provide QoS policy to voice for input traffic. Assigns policy map to WLAN output traffic. Ensure that you provide QoS policy to voice for output traffic. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifies the configured QoS policy on the WLAN. Enters global configuration mode. Enables the ACM static on the radio. When enabling SIP snooping, use the static CAC, not the load-based CAC. Configures SIP-based CAC. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1935 Configuring a Preferred Call Number (CLI) System Management Example Configuring a Preferred Call Number (CLI) Before you begin You must set the following parameters before configuring a preferred call number. · Set WLAN QoS to voice. · Enable ACM for the radio. · Enable SIP call snooping on the WLAN. · Enable SIP-based CAC. SUMMARY STEPS 1. configure terminal 2. wlan wlan-name qos platinum 3. ap dot11 {5ghz | 24ghz} cac {voice | video} acm 4. wlan wlan-name 5. wireless sip preferred-call-no call_index call_number 6. no wireless sip preferred-call-no call_index 7. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan wlan-name qos platinum Example: Switch(config)# wlan wlan1 Switch(config-wlan)# qos platinum Step 3 ap dot11 {5ghz | 24ghz} cac {voice | video} acm Example: Switch(config)# ap dot11 5ghz cac voice acm Step 4 wlan wlan-name Example: Switch(config)# wlan wlan1 Switch(config-wlan)# call-snoop Purpose Enters global configuration mode. Sets QoS to voice on a particular WLAN. Enables the static ACM on the radio. When enabling SIP snooping, use the static CAC, not the load-based CAC. Enables the call-snooping feature for a particular WLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1936 System Management Configuring EDCA Parameters (CLI) Step 5 Step 6 Step 7 Command or Action Purpose wireless sip preferred-call-no call_index call_number Adds a new preferred call. Example: Switch(config)# wireless sip preferred-call-no 1 555333 no wireless sip preferred-call-no call_index Removes a preferred call. Example: Switch(config)# no wireless sip preferred-call-no 1 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Configuring EDCA Parameters (CLI) SUMMARY STEPS 1. configure terminal 2. ap dot11 {5ghz | 24ghz } shutdown 3. ap dot11 {5ghz | 24ghz} edca-parameters {custom-voice | optimized-video-voice | optimized-voice | svp-voice | wmm-default} 4. show ap dot11 {5ghz | 24ghz} network 5. no ap dot11 {5ghz | 24ghz} shutdown 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap dot11 {5ghz | 24ghz } shutdown Example: Switch(config)# ap dot11 5ghz shutdown Purpose Enters global configuration mode. Disables the radio network. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1937 Configuring EDCA Parameters (CLI) System Management Step 3 Step 4 Step 5 Step 6 Command or Action Purpose ap dot11 {5ghz | 24ghz} edca-parameters {custom-voice Enables a specific EDCA parameters for the 802.11a or | optimized-video-voice | optimized-voice | svp-voice | 802.11b/g network. wmm-default} · custom-voice--Enables custom voice parameters for Example: the 802.11a or 802.11b/g network. Switch(config)# ap dot11 5ghz edca-parameters optimized-voice · optimized-video-voice--Enables EDCA voice- and video-optimized parameters for the 802.11a or 802.11b/g network. Choose this option when both voice and video services are deployed on your network. · optimized-voice--Enables non-SpectraLink voice-optimized profile parameters for the 802.11a or 802.11b/g network. Choose this option when voice services other than SpectraLink are deployed on your network. · svp-voice--Enables SpectraLink voice priority parameters for the 802.11a or 802.11b/g network. Choose this option if SpectraLink phones are deployed on your network to improve the quality of calls. · wmm-default--Enables the Wi-Fi Multimedia (WMM) default parameters for the 802.11a or 802.11b/g network. This is the default value. Choose this option when voice or video services are not deployed on your network. show ap dot11 {5ghz | 24ghz} network Example: Switch(config)# show ap dot11 5ghz network no ap dot11 {5ghz | 24ghz} shutdown Example: Switch(config)# no ap dot11 5ghz shutdown end Example: Switch(config)# end Displays the current status of MAC optimization for voice. Reenables the radio network. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1938 System Management Configuring EDCA Parameters (GUI) Example Configuring EDCA Parameters (GUI) Step 1 Step 2 Choose Configuration > Wireless > 802.11a/n/ac > EDCA Parameters or Configuration > Wireless > 802.11b/g/n > EDCA Parameters to open EDCA Parameters page. Choose one of the following options from the EDCA Profile drop-down list: · wmm-default--Enables the Wi-Fi Multimedia (WMM) default parameters. This is the default value. Choose this option when voice or video services are not deployed on your network. · svp-voice--Enables SpectraLink voice priority parameters. Choose this option if SpectraLink phones are deployed on your network to improve the quality of calls. · optimized-voice--Enables EDCA voice-optimized profile parameters. Choose this option when voice services other than SpectraLink are deployed on your network. · optimized-video-voice--Enables EDCA voice- and video-optimized profile parameters. Choose this option when both voice and video services are deployed on your network. · custom-voice--Enables custom voice EDCA parameters for 802.11a. The EDCA parameters under this option also match the 6.0 WMM EDCA parameters when this profile is applied. Note If you deploy video services, admission control (ACM) must be disabled. Step 3 Step 4 Step 5 Step 6 If you want to enable MAC optimization for voice, select the Enable Low Latency MAC check box. Otherwise, leave this check box unselected, which is the default value. This feature enhances voice performance by controlling packet retransmits and appropriately aging out voice packets on lightweight access points, which improves the number of voice calls serviced per access point. Note We do not recommend you to enable low latency MAC. You should enable low latency MAC only if the WLAN allows WMM clients. If WMM is enabled, then low latency MAC can be used with any of the EDCA profiles. Click Apply to commit your changes. To reenable the radio network, choose Network under 802.11a/n or 802.11b/g/n, select the 802.11a/n/ac (or 802.11b/g/n) Network Status check box, and click Apply. Click Save Configuration. Monitoring Voice and Video Parameters This section describes the new commands for the voice and video parameters. The following commands can be used to monitor voice and video parameters. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1939 Monitoring Voice and Video Parameters System Management Table 174: Monitoring Voice Parameters Commands Command Purpose show ap dot11 {5ghz | 24ghz} network Displays the radio-based statistics for voice. show ap name ap_name dot11 24ghz Displays the TSM voice metrics and current status of MAC tsm all optimization for voice. show ap name apname cac voice Displays the information about CAC for a particular access point. show client detail client_mac Displays the U-APSD status for a particular client. show policy-map interface wireless client show access-list Displays the video client policy details. Displays the video client dynamic access-list from the switch. show wireless client voice diag status Displays information about whether voice diagnostics are enabled or disabled. If enabled, this also displays information about the clients in the watch list and the time remaining for the diagnostics of the voice call. Note To work on voice diagnostics CLIs, you need to enter the following command: debug voice-diagnostic mac-addr client_mac_01 client_mac_02 show wireless client voice diag tspec Displays the TSPEC information sent from the clients that are enabled for voice diagnostics. show wireless client voice diag qos-map Displays information about the QoS/DSCP mapping and packet statistics in each of the four queues: VO, VI, BE, BK. The different DSCP values are also displayed. show wireless client voice diag rssi Display the client's RSSI values in the last 5 seconds when voice diagnostics is enabled. show client voice-diag roam-history Displays information about the last three roaming calls. The output contains the timestamp, access point associated with roaming, roaming reason, and if there is a roaming failure, reason for roaming-failure. show policy-map interface wireless Displays information about the voice and video data packet mac mac-address statistics. show wireless media-stream client Displays a summary of the media stream and video client summary information. show controllers d0 | b queue Displays which queue the packets are going through on an access point. show platform qos queue stats interface Displays which queue packets are going through from the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1940 System Management Monitoring Voice and Video Parameters You can monitor the video parameters using the following commands. Table 175: Monitoring Video Parameters Commands Command Purpose show ap join stats summary ap_mac Displays the last join error detail for a specific access point. show ip igmp snooping wireless mgid Displays the TSM voice metrics and current status of MAC optimization for voice. show wireless media-stream multicast-direct Displays the media stream multicast-direct parameters. state show wireless media-stream group summary Displays the summary of the media stream and client information. show wireless media-stream group detail Displays the details of a specific media-stream group. group_name show wireless media-stream client summary Displays the details for a set of media-stream clients. show wireless media-stream client detail Displays the details for a set of media-stream clients. group_name show ap dot11 {5ghz | 24ghz) media-stream Display the details of media stream. rrc show wireless media-stream message details Displays information about the message configuration. show ap name ap-name auto-rf dot11 5ghz Displays the details of channel utilization. | i Util show controllers d0 | b queue Displays which queue the packets are going through on an access point based on 2.4- and 5-GHz bands. show controllers d1 | b queue Displays which queue the packets are going through on an access point based on 2.4- and 5-GHz bands. show cont d1 | b Media Displays the video metric details on the band A or B. show capwap mcast mgid all Displays information about all of the multicast groups and their corresponding multicast group identifications (MGIDs) associated to the access point. show capwap mcast mgid id id Displays information about all of the video clients joined to the multicast group in a specific MGID. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1941 Additional References for Voice and Video Parameters System Management Additional References for Voice and Video Parameters Related Documents Related Topic Multicast configuration Document Title Multicast Configuration Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) VideoStream configuration VideoStream Configuration Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1942 System Management Feature History and Information For Performing Voice and Video Parameters Configuration Feature History and Information For Performing Voice and Video Parameters Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1943 Feature History and Information For Performing Voice and Video Parameters Configuration System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1944 9 6 C H A P T E R Configuring RFID Tag Tracking · Finding Feature Information, on page 1945 · Information About Configuring RFID Tag Tracking, on page 1945 · How to Configure RFID Tag Tracking, on page 1945 · Monitoring RFID Tag Tracking Information, on page 1946 · Additional References RFID Tag Tracking, on page 1947 · Feature History and Information For Performing RFID Tag Tracking Configuration , on page 1948 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring RFID Tag Tracking The Switch enables you to configure radio-frequency identification (RFID) tag tracking. RFID tags are small wireless devices that are affixed to assets for real-time location tracking. They operate by advertising their location using special 802.11 packets, which are processed by access points, the controller, and the location appliance. How to Configure RFID Tag Tracking Configuring RFID Tag Tracking (CLI) SUMMARY STEPS 1. location rfid status 2. (Optional) no location rfid status Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1945 Monitoring RFID Tag Tracking Information System Management 3. location rfid timeout seconds 4. location rfid mobility vendor-name name 5. (Optional) no location rfid mobility name DETAILED STEPS Step 1 Command or Action location rfid status Example: Switch(config)# location rfid status Purpose Enables RFID tag tracking. By default, RFID tag tracking is enabled. Step 2 (Optional) no location rfid status Example: Switch(config)# no location rfid status Disables RFID tag tracking. Step 3 location rfid timeout seconds Example: Switch(config)# location rfid timeout 1500 Specifies a static timeout value (between 60 and 7200 seconds). The static timeout value is the amount of time that the switch maintains tags before expiring them. For example, if a tag is configured to beacon every 30 seconds, we recommend that you set the timeout value to 90 seconds (approximately three times the beacon value). The default value is 1200 seconds. Step 4 location rfid mobility vendor-name name Enables RFID tag mobility for specific tags. When you Example: enter the location rfid mobility vendor-name command, tags are unable to obtain a DHCP address for client mode Switch(config)# location rfid mobility vendor-name when attempting to select and/or download a configuration. Aerosct Note These commands can be used only for Pango tags. Therefore, the only valid entry for vendor_name is "pango" in all lowercase letters. Step 5 (Optional) no location rfid mobility name Example: Switch(config)# no location rfid mobility test Disables RFID tag mobility for specific tags. When you enter the no location rfid mobility command , tags can obtain a DHCP address. If a tag roams from one subnet to another, it obtains a new address rather than retaining the anchor state. Monitoring RFID Tag Tracking Information This section describes the new commands for the RFID tag tracking Information. The following commands can be used to monitor the RFID tag tracking Information on the switch. Table 176: Monitoring RFID Tag Tracking Information Commands Command Purpose Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1946 System Management Additional References RFID Tag Tracking show location rfid config Displays the current configuration for RFID tag tracking. show location rfid detail mac_address Displays the detailed information for a specific RFID tag. show location rfid summary Displays a list of all RFID tags currently connected to the switch. show location rfid client Displays a list of RFID tags that are associated to the switch as clients. Additional References RFID Tag Tracking Related Documents Related Topic Document Title System management commands System Management Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1947 Feature History and Information For Performing RFID Tag Tracking Configuration System Management Feature History and Information For Performing RFID Tag Tracking Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1948 9 7 C H A P T E R Configuring Location Settings · Finding Feature Information, on page 1949 · Information About Configuring Location Settings, on page 1949 · How to Configure Location Settings, on page 1950 · Monitoring Location Settings and NMSP Settings, on page 1954 · Examples: Location Settings Configuration, on page 1955 · Examples: NMSP Settings Configuration, on page 1955 · Additional References for Location Settings, on page 1956 · Feature History and Information For Performing Location Settings Configuration, on page 1957 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring Location Settings The switch determines the location of client devices by gathering Received Signal Strength Indication (RSSI) measurements from access points all around the client of interest. The switch can obtain location reports from up to 16 access points for clients, RFID tags, and rogue access points. You can configure the path loss measurement (S60) request for normal clients or calibrating clients to improve location accuracy. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1949 How to Configure Location Settings System Management How to Configure Location Settings Configuring Location Settings (CLI) SUMMARY STEPS 1. configure terminal 2. location plm {calibrating [multiband | uniband] | client burst_interval 3. location rssi-half-life {calibrating-client | client | rogue-aps | tags } seconds 4. location expiry {calibrating-client | client | rogue-aps | tags } timeout 5. location algorithm {rssi-average | simple} 6. location admin-tag string 7. location civic-location identifier {identifier | host} 8. location custom-location identifier {identifier | host} 9. location geo-location identifier {identifier | host} 10. location prefer {cdp | lldp-med | static} weight priority_value 11. location rfid {status | timeout | vendor-name} 12. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 location plm {calibrating [multiband | uniband] | client Configures the path loss measurement (S60) request for burst_interval calibrating clients or non-calibrating. Example: Switch(config)# location plm client 100 The path loss measurement request improves the location accuracy. You can configure the burst_interval parameter for the normal, noncalibrating client from zero through 3600 seconds, and the default value is 60 seconds. You can configure the path loss measurement request for calibrating clients on the associated 802.11a or 802.11b/g radio or on the associated 802.11a/b/g radio. If a client does not send probes often or sends them only on a few channels, its location cannot be updated or cannot be updated accurately. The location plm command forces clients to send more packets on all channels. When a CCXv4 (or higher) client associates, the Switch sends it a path loss measurement request, which instructs the client to transmit on the bands and channels that the access points are on (typically, channels 1, 6, and 11 for 2.4-GHz-only Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1950 System Management Configuring Location Settings (CLI) Step 3 Step 4 Step 5 Command or Action location rssi-half-life {calibrating-client | client | rogue-aps | tags } seconds Example: Switch(config)# location rssi-half-life calibrating-client 60 Purpose access points) at a configurable interval (such as 60 seconds) indefinitely. Configures the RSSI half life for the clients, calibrating clients, RFID tags, and rogue access points. You can enter the location rssi-half-life parameter value for the clients, calibrating clients, RFID tags, and rogue access points as 0, 1, 2, 5, 10, 20, 30, 60, 90, 120, 180, or 300 seconds, and the default value is 0 seconds. Some client devices transmit at reduced power immediately after changing channels, and RF is variable, so RSSI values might vary considerably from packet to packet. The location rssi-half-life command increases accuracy by averaging nonuniformly arriving data using a configurable forget period (or half life). Note We recommend that you do not use or modify the location rssi-half-life command. location expiry {calibrating-client | client | rogue-aps | Configures the RSSI timeout value for the clients, tags } timeout calibrating clients, RFID tags, and rogue access points. Example: You can enter the RSSI timeout value for the clients, RFID Switch(config)# location expiry calibrating-client tags, and rogue access points from 5 through 3600 seconds, 50 and the default value is 5 seconds. For the calibrating clients, you can enter the RSSI timeout value from 0 through 3600 seconds, and the default value is 5 seconds. Ensuring that recent, strong RSSIs are retained by the CPU is critical to location accuracy. The location expiry command enables you to specify the length of time after which old RSSI averages expire. Note We recommend that you do not use or modify the location expiry command. location algorithm {rssi-average | simple} Example: Switch(config)# location algorithm rssi-average Configures the algorithm used to average RSSI and signal-to-noise ratio (SNR) values. You can enter the location algorithm rssi-average command to specify a more accurate algorithm but requires more CPU overhead or the location algorithm simple command to specify a faster algorithm that requires low CPU overhead but provides less accuracy. Note We recommend that you do not use or modify the location algorithm command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1951 Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues (CLI) System Management Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action location admin-tag string Example: Switch(config)# location admin-tag Purpose Sets administrative tag or site information for the location of client devices. location civic-location identifier {identifier | host} Specifies civic location information. Example: You can set the civic location identifier either as a string Switch(config)# location civic-location identifier or host. host location custom-location identifier {identifier | host} Example: Switch(config)# location custom-location identifier host Specifies custom location information. You can set the custom location identifier either as a string or host. location geo-location identifier {identifier | host} Specifies geographical location information of the client Example: devices. Switch(config)# location geo-location identifier You can set the location identifier either as a string or host. host location prefer {cdp | lldp-med | static} weight priority_value Example: Switch(config)# location prefer weight cdp 50 Sets location information source priority. You can enter the priority weight from zero through 255. location rfid {status | timeout | vendor-name} Example: Switch(config)# location rfid timeout 100 Configures RFID tag tracking options such as RFID tag status, RFID timeout value, and RFID tag vendor name. You can enter the RFID timeout value in a range from 60 and 7200 seconds. end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues (CLI) The Network Mobility Services Protocol (NMSP) manages communication between the mobility services engine and the controller for incoming and outgoing traffic. If your application requires more frequent location updates, you can modify the NMSP notification interval (to a value between 1 and 180 seconds) for clients, active RFID tags, and rogue access points and clients. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1952 System Management Modifying the NMSP Notification threshold for Clients, RFID Tags, and Rogues (CLI) Note The TCP port (16113) that the controller and mobility services engine communicate over must be open (not blocked) on any firewall that exists between the controller and the mobility services engine for NMSP to function. SUMMARY STEPS 1. configure terminal 2. nmsp notification interval {attachment seconds | location seconds | rssi [clients interval | rfid interval | rogues [ap | client ] interval]} 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 nmsp notification interval {attachment seconds | location Sets the NMSP notification interval value for clients, RFID seconds | rssi [clients interval | rfid interval | rogues [ap | tags, and rogue clients and access points. client ] interval]} You can enter the NMSP notification interval value for Example: RSSI measurement from 1 through 180 seconds. Switch(config)# nmsp notification interval rssi rfid 50 Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Modifying the NMSP Notification threshold for Clients, RFID Tags, and Rogues (CLI) SUMMARY STEPS 1. configure terminal 2. location notify-threshold {clients | rogues ap | tags } threshold 3. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1953 Monitoring Location Settings and NMSP Settings System Management DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 location notify-threshold {clients | rogues ap | tags } Configures the NMSP notification threshold for clients, threshold RFID tags, and rogue clients and access points. Example: You can enter the RSSI threshold value from zero through Switch(config)# location notify-threshold clients 10 db. 5 Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example Monitoring Location Settings and NMSP Settings Monitoring Location Settings (CLI) This section describes the new commands for location settings. The following commands can be used to monitor location settings on the switch. Table 177: Monitoring Location Settings Commands Command Purpose show location summary Displays the current location configuration values. show location statistics rfid Displays the location-based RFID statistics. show location detail client_mac_addr Displays the RSSI table for a particular client. Monitoring NMSP Settings (CLI) This section describes the new commands for NMSP settings. The following commands can be used to monitor NMSP settings on the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1954 System Management Examples: Location Settings Configuration Table 178: Monitoring NMSP Settings Commands Command Purpose show nmsp attachment suppress interfaces Displays the attachment suppress interfaces. show nmsp capability Displays the NMSP capabilities. show nmsp notification interval Displays the NMSP notification intervals. show nmsp statistics connection Displays the connection-specific NMSP counters. show nmsp statistics summary Displays the common NMSP counters. show nmsp status Displays the status of active NMSP connections. show nmsp subscription detail Displays all of the mobility services to which the switch is subscribed. show nmsp subscription detail ip_addr Displays details only for the mobility services subscribed to by a specific IP address. show nmsp subscription summary Displays details for all of the mobility services to which the switch is subscribed. Examples: Location Settings Configuration This example shows how to configure the path loss measurement (S60) request for calibrating client on the associated 802.11a or 802.11b/g radio: Switch# configure terminal Switch(config)# location plm calibrating uniband Switch(config)# end Switch# show location summary This example shows how to configure the RSSI half life for a rouge access point: Switch# configure terminal Switch(config)# location rssi-half-life rogue-aps 20 Switch(config)# end Switch# show location summary Examples: NMSP Settings Configuration This example shows how to configure the NMSP notification interval for RFID tags: Switch# configure terminal Switch(config)# nmsp notification interval rssi rfid 50 Switch(config)# end Switch# show nmsp notification interval Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1955 Additional References for Location Settings System Management This example shows how to configure the NMSP notification threshold for clients: Switch# configure terminal Switch(config)# nmsp notify-threshold 5 Switch(config)# end Switch# show nmsp statistics summary Additional References for Location Settings Related Documents Related Topic Document Title System management commands System Management Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1956 System Management Feature History and Information For Performing Location Settings Configuration Feature History and Information For Performing Location Settings Configuration Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1957 Feature History and Information For Performing Location Settings Configuration System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1958 9 8 C H A P T E R Monitoring Flow Control · Finding Feature Information, on page 1959 · Information About Flow Control, on page 1959 · Monitoring Flow Control, on page 1959 · Examples: Monitoring Flow Control, on page 1960 · Additional References for Monitoring Flow Control, on page 1961 · Feature History and Information For Monitoring Flow Control, on page 1961 Finding Feature Information Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Flow Control Flow control is enabled by default on the switch. Flow control provides shim layers between WCM and Cisco IOS for a reliable IPC. Every component in WCM has a dedicated channel. Few of the components in WCM have leveraged flow control in that. There is no configuration of flow control from CLI. You can monitor the flow control for any channel. Monitoring Flow Control This section describes the new commands for flow control. The following commands can be used to monitor flow control on the switch. Table 179: Monitoring Flow Control Command Purpose Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1959 Examples: Monitoring Flow Control System Management show wireless flow-control channel -id Displays information about flow control on a particular channel. show wireless flow-control channel-id statistics Displays statistical information about flow control on a particular channel. Examples: Monitoring Flow Control This example shows how to view information pertaining to any channel: Switch# show wireless flow-control 3 Switch# Channel Name : CAPWAP FC State : Disabled Remote Server State : Enabled Pass-thru Mode : Disabled EnQ Disabled : Disabled Queue Depth : 2048 Max Retries :5 Min Retry Gap (mSec): 3 This example shows how to view flow control for a particular channel: Switch# show wireless flow-control 3 Switch# Channel Name # of times channel went into FC # of times channel came out of FC Total msg count received by the FC Infra Pass-thru msgs send count Pass-thru msgs fail count # of msgs successfully queued # of msgs for which queuing failed # of msgs sent thru after queuing # of msgs sent w/o queuing # of msgs for which send failed # of invalid EAGAINS received Highest watermark reached # of times Q hit max capacity Avg time channel stays in FC (mSec) : CAPWAP :0 :0 :1 :0 :0 :0 :0 :0 :1 :0 :0 :0 :0 :0 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1960 System Management Additional References for Monitoring Flow Control Additional References for Monitoring Flow Control Related Documents Related Topic Document Title System management commands System Management Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For Monitoring Flow Control Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1961 Feature History and Information For Monitoring Flow Control System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1962 9 9 C H A P T E R Configuring SDM Templates · Finding Feature Information, on page 1963 · Information About Configuring SDM Templates, on page 1963 · How to Configure SDM Templates, on page 1965 · Monitoring and Maintaining SDM Templates, on page 1966 · Configuration Examples for Configuring SDM Templates, on page 1966 · Feature History and Information for Configuring SDM Templates, on page 1967 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring SDM Templates SDM Templates You can use SDM templates to configure system resources to optimize support for specific features, depending on how your device is used in the network. You can select a template to provide maximum system usage for some functions. These templates are supported on your device: · Advanced--The advanced template is available on all supported images for this release. It maximizes system resources for features like netflow, multicast groups, security ACEs, QoS ACEs, and so on. · VLAN--The VLAN template is available only on the LAN Base license. The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 device. After you change the template and the system reboots, you can use the show sdm prefer privileged EXEC command to verify the new template configuration. If you enter the show sdm prefer command before you Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1963 SDM Templates System Management enter the reload privileged EXEC command, the show sdm prefer command shows the template currently in use and the template that will become active after a reload. The default is the advanced template. Table 180: Approximate Number of Feature Resources Allowed by Templates Resource Advanced VLAN Number of VLANs 4094 4094 Unicast MAC addresses 32 K 32 K Overflow unicast MAC addresses 512 512 IGMP groups and multicast routes 4K 4K Overflow IGMP groups and multicast routes 512 512 · Directly connected routes 32 K 32 K · Indirectly connected IP hosts 8K 8K Policy-based routing ACEs QoS classification ACEs Security ACEs Netflow ACEs Input Microflow policer ACEs: Output Microflow policer ACEs: FSPAN ACEs Tunnels: Control Plane Entries: Input Netflow flows: Output Netflow flows: SGT/DGT entries: SGT/DGT Overflow entries: 1024 0 3K 3K 3K 3K 1024 1024 256 K 0 256 K 0 256 256 256 0 512 512 8K 8K 16 K 16 K 4K 4K 0 512 Note When the switch is used as a Wireless Mobility Agent, the only template allowed is the advanced template. The tables represent approximate hardware boundaries set when a template is selected. If a section of a hardware resource is full, all processing overflow is sent to the CPU, seriously impacting switch performance. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1964 System Management SDM Templates and Switch Stacks SDM Templates and Switch Stacks In a switch stack, all stack members must use the same SDM template that is stored on the active switch. When a new switch is added to a stack, the SDM configuration that is stored on the active switch overrides the template configured on an individual switch. How to Configure SDM Templates Configuring SDM Templates Configuring the Switch SDM Template Setting the SDM Template SUMMARY STEPS 1. configure terminal 2. sdm prefer { advanced | vlan } 3. end 4. reload DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch> configure terminal Step 2 sdm prefer { advanced | vlan } Example: Switch(config)# sdm prefer advanced Step 3 end Example: Switch(config)# end Purpose Enters global configuration mode. Specifies the SDM template to be used on the switch. The keywords have these meanings: · advanced --Supports advanced features such as Netflow. · vlan --Maximizes VLAN configuration on the switch with no routing supported in hardware. Note The no sdm prefer command and a default template is not supported. Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1965 Monitoring and Maintaining SDM Templates System Management Step 4 Command or Action reload Example: Switch# reload Purpose Reloads the operating system. Monitoring and Maintaining SDM Templates Command show sdm prefer reload no sdm prefer Purpose Displays the SDM template in use. Reloads the switch to activate the newly configured SDM template. Sets the default SDM template. Configuration Examples for Configuring SDM Templates Examples: Configuring SDM Templates This example shows how to configure the VLAN template: Examples: Displaying SDM Templates This is an example output showing the advanced template information: Switch# show sdm prefer Showing SDM Template Info This is the Advanced template. Number of VLANs: Unicast MAC addresses: Overflow Unicast MAC addresses: IGMP and Multicast groups: Overflow IGMP and Multicast groups: Directly connected routes: Indirect routes: Security Access Control Entries: QoS Access Control Entries: Policy Based Routing ACEs: Netflow ACEs: Input Microflow policer ACEs: Output Microflow policer ACEs: Flow SPAN ACEs: Tunnels: Control Plane Entries: 4094 32768 512 8192 512 32768 8192 3072 2816 1024 1024 256 256 256 256 512 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1966 System Management Feature History and Information for Configuring SDM Templates Input Netflow flows: 8192 Output Netflow flows: 16384 These numbers are typical for L2 and IPv4 features. Some features such as IPv6, use up double the entry size; so only half as many entries can be created. Switch# This is an example output showing the VLAN template information: Switch# show sdm prefer vlan Showing SDM Template Info This is the VLAN template for a typical Layer 2 network. Number of VLANs: 4094 Unicast MAC addresses: 32768 Overflow Unicast MAC addresses: 512 IGMP and Multicast groups: 8192 Overflow IGMP and Multicast groups: 512 Directly connected routes: 32768 Indirect routes: 8192 Security Access Control Entries: 3072 QoS Access Control Entries: 3072 Policy Based Routing ACEs: 0 Netflow ACEs: 1024 Input Microflow policer ACEs: 0 Output Microflow policer ACEs: 0 Flow SPAN ACEs: 256 Tunnels: 0 Control Plane Entries: 512 Input Netflow flows: 16384 Output Netflow flows: 8192 These numbers are typical for L2 and IPv4 features. Some features such as IPv6, use up double the entry size; so only half as many entries can be created. Switch# Feature History and Information for Configuring SDM Templates Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1967 Feature History and Information for Configuring SDM Templates System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1968 1 0 0 C H A P T E R Configuring System Message Logs · Finding Feature Information, on page 1969 · Restrictions for Configuring System Message Logs, on page 1969 · Information About Configuring System Message Logs, on page 1969 · How to Configure System Message Logs, on page 1972 · Monitoring and Maintaining System Message Logs, on page 1981 · Configuration Examples for System Message Logs, on page 1981 · Additional References for System Message Logs, on page 1982 · Feature History and Information For System Message Logs, on page 1983 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Restrictions for Configuring System Message Logs When the logging discriminator command is configured, the device may experience memory leak or crash. This usually happens during heavy syslog or debug output. The rate of the memory leak is dependent on the number of logs being produced. In extreme cases, the device may also crash. As a workaround, use the no logging discriminator command to disable the logging discriminator. Information About Configuring System Message Logs System Messsage Logging By default, a switch sends the output from system messages and debug privileged EXEC commands to a logging process. Stack members can trigger system messages. A stack member that generates a system message appends its hostname in the form of hostname-n, where n is a switch , and redirects the output to the logging Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1969 System Log Message Format System Management process on the active switch. Though the active switch is a stack member, it does not append its hostname to system messages. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer, terminal lines, or a UNIX syslog server, depending on your configuration. The process also sends messages to the console. When the logging process is disabled, messages are sent only to the console. The messages are sent as they are generated, so message and debug output are interspersed with prompts or output from other commands. Messages appear on the active consoles after the process that generated them has finished. You can set the severity level of the messages to control the type of messages displayed on the consoles and each of the destinations. You can time-stamp log messages or set the syslog source address to enhance real-time debugging and management. For information on possible messages, see the system message guide for this release. You can access logged system messages by using the switch command-line interface (CLI) or by saving them to a properly configured syslog server. The switch software saves syslog messages in an internal buffer on a standalone switch, and in the case of a switch stack, on the active switch. If a standalone switch or the stack master fails, the log is lost unless you had saved it to flash memory. You can remotely monitor system messages by viewing the logs on a syslog server or by accessing the switch through Telnet, through the console port, or through the Ethernet management port. In a switch stack, all stack member consoles provide the same console output. Note The syslog format is compatible with 4.3 BSD UNIX. System Log Message Format System log messages can contain up to 80 characters and a percent sign (%), which follows the optional sequence number or time-stamp information, if configured. Depending on the switch, messages appear in one of these formats: · seq no:timestamp: %facility-severity-MNEMONIC:description (hostname-n) · seq no:timestamp: %facility-severity-MNEMONIC:description The part of the message preceding the percent sign depends on the setting of these global configuration commands: · service sequence-numbers · service timestamps log datetime · service timestamps log datetime [localtime] [msec] [show-timezone] · service timestamps log uptime Table 181: System Log Message Elements Element seq no: Description Stamps log messages with a sequence number only if the service sequence-numbers global configuration command is configured. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1970 System Management Default System Message Logging Settings Element timestamp formats: mm/dd h h:mm:ss or hh:mm:ss (short uptime) or d h (long uptime) facility severity MNEMONIC description hostname-n Description Date and time of the message or event. This information appears only if the service timestamps log [datetime | log] global configuration command is configured. The facility to which the message refers (for example, SNMP, SYS, and so forth). Single-digit code from 0 to 7 that is the severity of the message. Text string that uniquely describes the message. Text string containing detailed information about the event being reported. Hostname of a stack member and its switch number in the stack. Though the active switch is a stack member, it does not append its hostname to system messages. Default System Message Logging Settings Table 182: Default System Message Logging Settings Feature Default Setting System message logging to the console Enabled. Console severity Debugging. Logging file configuration No filename specified. Logging buffer size 4096 bytes. Logging history size 1 message. Time stamps Disabled. Synchronous logging Disabled. Logging server Disabled. Syslog server IP address None configured. Server facility Local7 Server severity Informational. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1971 Syslog Message Limits System Management Syslog Message Limits If you enabled syslog message traps to be sent to an SNMP network management station by using the snmp-server enable trap global configuration command, you can change the level of messages sent and stored in the switch history table. You also can change the number of messages that are stored in the history table. Messages are stored in the history table because SNMP traps are not guaranteed to reach their destination. By default, one message of the level warning and numerically lower levels are stored in the history table even if syslog traps are not enabled. When the history table is full (it contains the maximum number of message entries specified with the logging history size global configuration command), the oldest message entry is deleted from the table to allow the new message entry to be stored. The history table lists the level keywords and severity level. For SNMP usage, the severity level values increase by 1. For example, emergencies equal 1, not 0, and critical equals 3, not 2. Enabling Syslog Trap Messages You can enable Syslog traps using the snmp-server enable traps syslog command. After enabling Syslog traps, you have to specify the trap message severity. Use the logging snmp-trap command to specify the trap level. By default, the command enables severity 0 to 4. To enable all the severity level, configure the logging snmp-trap 0 7 command. To enable individual trap levels, configure the following commands: · logging snmp-trap emergencies:Enables only severity 0 traps. · logging snmp-trap alert Enables only severity 1 traps. Note that, along with the Syslog traps, the Syslog history should also be applied. Without this configuration, Syslog traps are not sent. Use the logging history informational command to enable the Syslog history. How to Configure System Message Logs Setting the Message Display Destination Device If message logging is enabled, you can send messages to specific locations in addition to the console. This task is optional. SUMMARY STEPS 1. configure terminal 2. logging buffered [size] 3. logging host 4. logging file flash: filename [max-file-size [min-file-size]] [severity-level-number | type] 5. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1972 System Management Setting the Message Display Destination Device 6. terminal monitor DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 logging buffered [size] Example: Switch(config)# logging buffered 8192 Logs messages to an internal buffer on the switch or on a standalone switch or, in the case of a switch stack, on the active switch. The range is 4096 to 2147483647 bytes. The default buffer size is 4096 bytes. If a standalone switch or the active switch fails, the log file is lost unless you previously saved it to flash memory. See Step 4. Note Do not make the buffer size too large because the switch could run out of memory for other tasks. Use the show memory privileged EXEC command to view the free processor memory on the switch. However, this value is the maximum available, and the buffer size should not be set to this amount. logging host Example: Switch(config)# logging 125.1.1.100 Logs messages to a UNIX syslog server host. host specifies the name or IP address of the host to be used as the syslog server. To build a list of syslog servers that receive logging messages, enter this command more than once. logging file flash: filename [max-file-size [min-file-size]] [severity-level-number | type] Example: Switch(config)# logging file flash:log_msg.txt 40960 4096 3 Stores log messages in a file in flash memory on a standalone switch or, in the case of a switch stack, on the active switch. · filename--Enters the log message filename. · (Optional) max-file-size --Specifies the maximum logging file size. The range is 4096 to 2147483647. The default is 4096 bytes. · (Optional) min-file-size--Specifies the minimum logging file size. The range is 1024 to 2147483647. The default is 2048 bytes. · (Optional) severity-level-number | type--Specifies either the logging severity level or the logging type. The severity range is 0 to 7. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1973 Synchronizing Log Messages System Management Step 5 Command or Action end Example: Switch(config)# end Step 6 terminal monitor Example: Switch# terminal monitor Purpose Returns to privileged EXEC mode. Logs messages to a nonconsole terminal during the current session. Terminal parameter-setting commands are set locally and do not remain in effect after the session has ended. You must perform this step for each session to see the debugging messages. Synchronizing Log Messages You can synchronize unsolicited messages and debug privileged EXEC command output with solicited device output and prompts for a specific console port line or virtual terminal line. You can identify the types of messages to be output asynchronously based on the level of severity. You can also configure the maximum number of buffers for storing asynchronous messages for the terminal after which messages are dropped. When synchronous logging of unsolicited messages and debug command output is enabled, unsolicited device output appears on the console or printed after solicited device output appears or is printed. Unsolicited messages and debug command output appears on the console after the prompt for user input is returned. Therefore, unsolicited messages and debug command output are not interspersed with solicited device output and prompts. After the unsolicited messages appear, the console again displays the user prompt. This task is optional. SUMMARY STEPS 1. configure terminal 2. line [console | vty] line-number [ending-line-number] 3. logging synchronous [level [severity-level | all] | limit number-of-buffers] 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 line [console | vty] line-number [ending-line-number] Example: Specifies the line to be configured for synchronous logging of messages. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1974 System Management Disabling Message Logging Step 3 Step 4 Command or Action Switch(config)# line console Purpose · console --Specifies configurations that occur through the switch console port or the Ethernet management port. · line vty line-number--Specifies which vty lines are to have synchronous logging enabled. You use a vty connection for configurations that occur through a Telnet session. The range of line numbers is from 0 to 15. You can change the setting of all 16 vty lines at once by entering: line vty 0 15 You can also change the setting of the single vty line being used for your current connection. For example, to change the setting for vty line 2, enter: line vty 2 When you enter this command, the mode changes to line configuration. logging synchronous [level [severity-level | all] | limit Enables synchronous logging of messages. number-of-buffers] · (Optional) level severity-level--Specifies the message Example: severity level. Messages with a severity level equal to or higher than this value are printed asynchronously. Switch(config)# logging synchronous level 3 limit Low numbers mean greater severity and high numbers 1000 mean lesser severity. The default is 2. · (Optional) level all--Specifies that all messages are printed asynchronously regardless of the severity level. · (Optional) limit number-of-buffers--Specifies the number of buffers to be queued for the terminal after which new messages are dropped. The range is 0 to 2147483647. The default is 20. end Example: Switch(config)# end Returns to privileged EXEC mode. Disabling Message Logging Message logging is enabled by default. It must be enabled to send messages to any destination other than the console. When enabled, log messages are sent to a logging process, which logs messages to designated locations asynchronously to the processes that generated the messages. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1975 Enabling and Disabling Time Stamps on Log Messages System Management Disabling the logging process can slow down the switch because a process must wait until the messages are written to the console before continuing. When the logging process is disabled, messages appear on the console as soon as they are produced, often appearing in the middle of command output. The logging synchronous global configuration command also affects the display of messages to the console. When this command is enabled, messages appear only after you press Return. To reenable message logging after it has been disabled, use the logging on global configuration command. This task is optional. SUMMARY STEPS 1. configure terminal 2. no logging console 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 no logging console Example: Switch(config)# no logging console Disables message logging. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Enabling and Disabling Time Stamps on Log Messages By default, log messages are not time-stamped. This task is optional. SUMMARY STEPS 1. configure terminal 2. Use one of these commands: · service timestamps log uptime · service timestamps log datetime[msec | localtime | show-timezone] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1976 System Management Enabling and Disabling Sequence Numbers in Log Messages 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 Use one of these commands: Enables log time stamps. · service timestamps log uptime · service timestamps log datetime[msec | localtime | show-timezone] Example: Switch(config)# service timestamps log uptime · log uptime--Enables time stamps on log messages, showing the time since the system was rebooted. · log datetime--Enables time stamps on log messages. Depending on the options selected, the time stamp can include the date, time in milliseconds relative to the local time zone, and the time zone name. or Switch(config)# service timestamps log datetime Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Enabling and Disabling Sequence Numbers in Log Messages If there is more than one log message with the same time stamp, you can display messages with sequence numbers to view these messages. By default, sequence numbers in log messages are not displayed. This task is optional. SUMMARY STEPS 1. configure terminal 2. service sequence-numbers 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1977 Defining the Message Severity Level System Management Command or Action Switch# configure terminal Step 2 service sequence-numbers Example: Switch(config)# service sequence-numbers Step 3 end Example: Switch(config)# end Purpose Enables sequence numbers. Returns to privileged EXEC mode. Defining the Message Severity Level Limit messages displayed to the selected device by specifying the severity level of the message. This task is optional. SUMMARY STEPS 1. configure terminal 2. logging console level 3. logging monitor level 4. logging trap level 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 logging console level Example: Switch(config)# logging console 3 Limits messages logged to the console. By default, the console receives debugging messages and numerically lower levels. Step 3 logging monitor level Example: Limits messages logged to the terminal lines. By default, the terminal receives debugging messages and numerically lower levels. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1978 System Management Limiting Syslog Messages Sent to the History Table and to SNMP Command or Action Switch(config)# logging monitor 3 Step 4 logging trap level Example: Switch(config)# logging trap 3 Step 5 end Example: Switch(config)# end Purpose Limits messages logged to the syslog servers. By default, syslog servers receive informational messages and numerically lower levels. Returns to privileged EXEC mode. Limiting Syslog Messages Sent to the History Table and to SNMP This task explains how to limit syslog messages that are sent to the history table and to SNMP. This task is optional. SUMMARY STEPS 1. configure terminal 2. logging history level 3. logging history size number 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 logging history level Example: Switch(config)# logging history 3 Changes the default level of syslog messages stored in the history file and sent to the SNMP server. By default, warnings, errors, critical, alerts, and emergencies messages are sent. Step 3 logging history size number Example: Specifies the number of syslog messages that can be stored in the history table. The default is to store one message. The range is 0 to 500 messages. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1979 Logging Messages to a UNIX Syslog Daemon System Management Command or Action Switch(config)# logging history size 200 Step 4 end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Logging Messages to a UNIX Syslog Daemon This task is optional. Note Some recent versions of UNIX syslog daemons no longer accept by default syslog packets from the network. If this is the case with your system, use the UNIX man syslogd command to decide what options must be added to or removed from the syslog command line to enable logging of remote syslog messages. Before you begin · Log in as root. · Before you can send system log messages to a UNIX syslog server, you must configure the syslog daemon on a UNIX server. SUMMARY STEPS 1. Add a line to the file /etc/syslog.conf. 2. Enter these commands at the UNIX shell prompt. 3. Make sure the syslog daemon reads the new changes. DETAILED STEPS Step 1 Command or Action Add a line to the file /etc/syslog.conf. Example: local7.debug /usr/adm/logs/cisco.log Purpose · local7--Specifies the logging facility. · debug--Specifies the syslog level. The file must already exist, and the syslog daemon must have permission to write to it. Step 2 Enter these commands at the UNIX shell prompt. Example: $ touch /var/log/cisco.log $ chmod 666 /var/log/cisco.log Creates the log file. The syslog daemon sends messages at this level or at a more severe level to this file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1980 System Management Monitoring and Maintaining System Message Logs Step 3 Command or Action Make sure the syslog daemon reads the new changes. Example: $ kill -HUP `cat /etc/syslog.pid` Purpose For more information, see the man syslog.conf and man syslogd commands on your UNIX system. Monitoring and Maintaining System Message Logs Monitoring Configuration Archive Logs Command Purpose show archive log config {all | number Displays the entire configuration log or the log for specified [end-number] | user username [session number] parameters. number [end-number] | statistics} [provisioning] Configuration Examples for System Message Logs Example: Stacking System Message This example shows a partial switch system message for active switch and a stack member (hostname Switch-2): 00:00:46: %LINK-3-UPDOWN: Interface Port-channel1, changed state to up 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/1, changed state to up 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/2, changed state to up 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/1, changed state to down 2 *Mar 1 18:46:11: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) 18:47:02: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) *Mar 1 18:48:50.483 UTC: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) 00:00:46: %LINK-3-UPDOWN: Interface Port-channel1, changed state to up (Switch-2) 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet2/0/1, changed state to up (Switch-2) 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet2/0/2, changed state to up (Switch-2) 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down (Switch-2) 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0/1, changed state to down 2 (Switch-2) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1981 Example: Switch System Message System Management Example: Switch System Message This example shows a partial switch system message on a switch: 00:00:46: %LINK-3-UPDOWN: Interface Port-channel1, changed state to up 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet0/2, changed state to up 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to down 2 *Mar 1 18:46:11: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) 18:47:02: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) *Mar 1 18:48:50.483 UTC: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) Additional References for System Message Logs Related Documents Related Topic System management commands Platform-independent command references Platform-independent configuration information Document Title System Management Command Reference (Catalyst 3650 Switches) Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches) IP Addressing Configuration Guide Library, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1982 System Management Feature History and Information For System Message Logs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information For System Message Logs Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1983 Feature History and Information For System Message Logs System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1984 1 0 1 C H A P T E R Configuring Online Diagnostics · Finding Feature Information, on page 1985 · Information About Configuring Online Diagnostics, on page 1985 · How to Configure Online Diagnostics, on page 1986 · Monitoring and Maintaining Online Diagnostics, on page 1990 · Configuration Examples for Online Diagnostic Tests, on page 1991 · Additional References for Online Diagnostics, on page 1993 · Feature History and Information for Configuring Online Diagnostics, on page 1994 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Configuring Online Diagnostics Online Diagnostics With online diagnostics, you can test and verify the hardware functionality of the switch while the switch is connected to a live network. The online diagnostics contain packet switching tests that check different hardware components and verify the data path and the control signals. The online diagnostics detect problems in these areas: · Hardware components · Interfaces (Ethernet ports and so forth) · Solder joints Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1985 How to Configure Online Diagnostics System Management Online diagnostics are categorized as on-demand, scheduled, or health-monitoring diagnostics. On-demand diagnostics run from the CLI; scheduled diagnostics run at user-designated intervals or at specified times when the switch is connected to a live network; and health-monitoring runs in the background with user-defined intervals. By default, the health-monitoring test runs for every 30 seconds. After you configure online diagnostics, you can manually start diagnostic tests or display the test results. You can also see which tests are configured for the switch or switch stack and the diagnostic tests that have already run. How to Configure Online Diagnostics Starting Online Diagnostic Tests After you configure diagnostic tests to run on the switch, use the diagnostic start privileged EXEC command to begin diagnostic testing. After starting the tests, you cannot stop the testing process. Use this privileged EXEC command to manually start online diagnostic testing: SUMMARY STEPS 1. diagnostic start switch number test {name | test-id | test-id-range | all | basic | complete | minimal | non-disruptive | per-port} DETAILED STEPS Step 1 Command or Action diagnostic start switch number test {name | test-id | test-id-range | all | basic | complete | minimal | non-disruptive | per-port} Example: Switch# diagnostic start switch 2 test basic Purpose Starts the diagnostic tests. The switch number keyword is supported only on stacking switches. The range is from 1 to 4. You can specify the tests by using one of these options: · name--Enters the name of the test. · test-id--Enters the ID number of the test. · test-id-range--Enters the range of test IDs by using integers separated by a comma and a hyphen. · all--Starts all of the tests. · basic-- Starts the basic test suite. · complete--Starts the complete test suite. · minimal--Starts the minimal bootup test suite. · non-disruptive--Starts the non-disruptive test suite. · per-port--Starts the per-port test suite. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1986 System Management Configuring Online Diagnostics Example Configuring Online Diagnostics You must configure the failure threshold and the interval between tests before enabling diagnostic monitoring. Scheduling Online Diagnostics You can schedule online diagnostics to run at a designated time of day or on a daily, weekly, or monthly basis for a switch. Use the no form of this command to remove the scheduling. SUMMARY STEPS 1. configure terminal 2. diagnostic schedule switch number test {name | test-id | test-id-range | all | basic | complete | minimal | non-disruptive | per-port} {daily | on mm dd yyyy hh:mm | port inter-port-number port-number-list | weekly day-of-week hh:mm} DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal Step 2 diagnostic schedule switch number test {name | test-id | Schedules on-demand diagnostic tests for a specific day test-id-range | all | basic | complete | minimal | and time. non-disruptive | per-port} {daily | on mm dd yyyy hh:mm The switch number keyword is supported only on stacking | port inter-port-number port-number-list | weekly day-of-week hh:mm} switches. The range is from 1 to 4. Example: When specifying the tests to be scheduled, use these options: · name--Name of the test that appears in the show Switch(config)# diagnostic schedule switch 3 test diagnostic content command output. 1-5 on July 3 2013 23:10 · test-id--ID number of the test that appears in the show diagnostic content command output. · test-id-range--ID numbers of the tests that appear in the show diagnostic content command output. · all--All test IDs. · basic--Starts the basic on-demand diagnostic tests. · complete--Starts the complete test suite. · minimal--Starts the minimal bootup test suite. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1987 Configuring Health-Monitoring Diagnostics System Management Command or Action Purpose · non-disruptive--Starts the non-disruptive test suite. · per-port--Starts the per-port test suite. You can schedule the tests as follows: · Daily--Use the daily hh:mm parameter. · Specific day and time--Use the on mm dd yyyy hh:mm parameter. · Weekly--Use the weekly day-of-week hh:mm parameter. Configuring Health-Monitoring Diagnostics You can configure health-monitoring diagnostic testing on a switch while it is connected to a live network. You can configure the execution interval for each health-monitoring test, enable the switch to generate a syslog message because of a test failure, and enable a specific test. By default, health monitoring is disabled, but the switch generates a syslog message when a test fails. SUMMARY STEPS 1. configure terminal 2. diagnostic monitor interval switch number test {name | test-id | test-id-range | all} hh:mm:ss milliseconds day 3. diagnostic monitor syslog 4. diagnostic monitor threshold switch number test {name | test-id | test-id-range | all} failure count count 5. diagnostic monitor switch number test {name | test-id | test-id-range | all} 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Step 2 Switch# configure terminal diagnostic monitor interval switch number test {name | Configures the health-monitoring interval of the specified test-id | test-id-range | all} hh:mm:ss milliseconds day tests. Example: The switch number keyword is supported only on stacking switches. The range is from 1 to 9. Switch(config)# diagnostic 2 test 1 12:30:00 750 5 monitor interval switch When specifying the tests, use one of these parameters: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1988 System Management Configuring Health-Monitoring Diagnostics Step 3 Step 4 Step 5 Command or Action Purpose · name--Name of the test that appears in the show diagnostic content command output. · test-id--ID number of the test that appears in the show diagnostic content command output. · test-id-range--ID numbers of the tests that appear in the show diagnostic content command output. · all--All of the diagnostic tests. When specifying the interval, set these parameters: · hh:mm:ss--Monitoring interval in hours, minutes, and seconds. The range for hh is 0 to 24, and the range for mm and ss is 0 to 60. · milliseconds--Monitoring interval in milliseconds (ms). The range is from 0 to 999. · day--Monitoring interval in the number of days. The range is from 0 to 20. diagnostic monitor syslog Example: (Optional) Configures the switch to generate a syslog message when a health-monitoring test fails. Switch(config)# diagnostic monitor syslog diagnostic monitor threshold switch number test {name (Optional) Sets the failure threshold for the | test-id | test-id-range | all} failure count count health-monitoring tests. Example: The switch number keyword is supported only on stacking switches. The range is from 1 to 9. Switch(config)# diagnostic monitor 2 test 1 failure count 20 threshold switch When specifying the tests, use one of these parameters: · name--Name of the test that appears in the show diagnostic content command output. · test-id--ID number of the test that appears in the show diagnostic content command output. · test-id-range--ID numbers of the tests that appear in the show diagnostic content command output. · all--All of the diagnostic tests. The range for the failure threshold count is 0 to 99. diagnostic monitor switch number test {name | test-id | test-id-range | all} Example: Enables the specified health-monitoring tests. The switch number keyword is supported only on stacking switches. The range is from 1 to 9. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1989 Monitoring and Maintaining Online Diagnostics System Management Step 6 Command or Action Purpose When specifying the tests, use one of these parameters: Switch(config)# diagnostic monitor switch 2 test 1 · name--Name of the test that appears in the show diagnostic content command output. · test-id--ID number of the test that appears in the show diagnostic content command output. · test-id-range--ID numbers of the tests that appear in the show diagnostic content command output. · all--All of the diagnostic tests. end Example: Returns to privileged EXEC mode. Switch(config)# end Monitoring and Maintaining Online Diagnostics Displaying Online Diagnostic Tests and Test Results You can display the online diagnostic tests that are configured for the switch ro switch stack and check the test results by using the privileged EXEC show commands in this table: Table 183: Commands for Diagnostic Test Configuration and Results Command Purpose show diagnostic content switch [number Displays the online diagnostics configured for a switch. | all] The switch [number | all] parameter is supported only on stacking switches. show diagnostic status Displays the currently running diagnostic tests. show diagnostic result switch [number | all] [detail | test {name | test-id | test-id-range | all} [detail]] Displays the online diagnostics test results. The switch [number | all] parameter is supported only on stacking switches. show diagnostic switch [number | all] [detail] Displays the online diagnostics test results. The switch [number | all] parameter is supported only on stacking switches. show diagnostic schedule switch [number Displays the online diagnostics test schedule. | all] The switch [number | all] parameter is supported only on stacking switches. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1990 System Management Configuration Examples for Online Diagnostic Tests Command show diagnostic post Purpose Displays the POST results. (The output is the same as the show post command output.) Configuration Examples for Online Diagnostic Tests Examples: Start Diagnostic Tests This example shows how to start a diagnostic test by using the test name: Switch# diagnostic start switch 2 test TestInlinePwrCtlr This example shows how to start all of the basic diagnostic tests: Switch# diagnostic start switch 1 test all Example: Configure a Health Monitoring Test This example shows how to configure a health-monitoring test: Switch(config)# diagnostic monitor threshold switch 1 test 1 failure count 50 Switch(config)# diagnostic monitor interval switch 1 test TestPortAsicStackPortLoopback Examples: Schedule Diagnostic Test This example shows how to schedule diagnostic testing for a specific day and time on a specific switch: Switch(config)# diagnostic schedule test DiagThermalTest on June 3 2013 22:25 This example shows how to schedule diagnostic testing to occur weekly at a certain time on a specific switch: Switch(config)# diagnostic schedule switch 1 test 1,2,4-6 weekly saturday 10:30 Examples: Displaying Online Diagnostics This example shows how to display on demand diagnostic settings: Switch# show diagnostic ondemand settings Test iterations = 1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1991 Examples: Displaying Online Diagnostics System Management Action on test failure = continue This example shows how to display diagnostic events for errors: Switch# show diagnostic events event-type error Diagnostic events (storage for 500 events, 0 events recorded) Number of events matching above criteria = 0 No diagnostic log entry exists. This example shows how to display the description for a diagnostic test: Switch# show diagnostic description switch 1 test all DiagGoldPktTest : The GOLD packet Loopback test verifies the MAC level loopback functionality. In this test, a GOLD packet, for which doppler provides the support in hardware, is sent. The packet loops back at MAC level and is matched against the stored packet. It is a non -disruptive test. DiagThermalTest : This test verifies the temperature reading from the sensor is below the yellow temperature threshold. It is a non-disruptive test and can be run as a health monitoring test. DiagFanTest : This test verifies all fan modules have been inserted and working properly on the board It is a non-disruptive test and can be run as a health monitoring test. DiagPhyLoopbackTest : The PHY Loopback test verifies the PHY level loopback functionality. In this test, a packet is sent which loops back at PHY level and is matched against the stored packet. It is a disruptive test and cannot be run as a health monitoring test. DiagScratchRegisterTest : The Scratch Register test monitors the health of application-specific integrated circuits (ASICs) by writing values into registers and reading back the values from these registers. It is a non-disruptive test and can be run as a health monitoring test. DiagPoETest : This test checks the PoE controller functionality. This is a disruptive test and should not be performed during normal switch operation. DiagStackCableTest : This test verifies the stack ring loopback functionality in the stacking environment. It is a disruptive test and cannot be run as a health monitoring test. DiagMemoryTest : This test runs the exhaustive ASIC memory test during normal switch operation NG3K utilizes mbist for this test. Memory test is very disruptive in nature and requires switch reboot after the test. Switch# Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1992 System Management Additional References for Online Diagnostics This example shows how to display the boot up level: Switch# show diagnostic bootup level Current bootup diagnostic level: minimal Switch# Additional References for Online Diagnostics Related Documents Related Topic System management commands Platform-independent command reference Platform-independent configuration information Document Title System Management Command Reference (Catalyst 3650 Switches) Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1993 Feature History and Information for Configuring Online Diagnostics System Management Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Configuring Online Diagnostics Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1994 1 0 2 C H A P T E R Managing Configuration Files · Prerequisites for Managing Configuration Files, on page 1995 · Restrictions for Managing Configuration Files, on page 1995 · Information About Managing Configuration Files, on page 1995 · How to Manage Configuration File Information, on page 2001 · Additional References, on page 2030 Prerequisites for Managing Configuration Files · You should have at least a basic familiarity with the Cisco IOS environment and the command-line interface. · You should have at least a minimal configuration running on your system. You can create a basic configuration file using the setup command. Restrictions for Managing Configuration Files · Many of the Cisco IOS commands described in this document are available and function only in certain configuration modes on the switch. · Some of the Cisco IOS configuration commands are only available on certain switch platforms, and the command syntax may vary on different platforms. Information About Managing Configuration Files Types of Configuration Files Configuration files contain the Cisco IOS software commands used to customize the functionality of your Cisco switch. Commands are parsed (translated and executed) by the Cisco IOS software when the system is booted (from the startup-config file) or when you enter commands at the CLI in a configuration mode. Startup configuration files (startup-config) are used during system startup to configure the software. Running configuration files (running-config) contain the current configuration of the software. The two configuration Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1995 Configuration Mode and Selecting a Configuration Source System Management files can be different. For example, you may want to change the configuration for a short time period rather than permanently. In this case, you would change the running configuration using the configure terminal EXEC command but not save the configuration using the copy running-config startup-config EXEC command. To change the running configuration, use the configure terminal command, as described in the Modifying the Configuration File (CLI) section. As you use the Cisco IOS configuration modes, commands generally are executed immediately and are saved to the running configuration file either immediately after you enter them or when you exit a configuration mode. To change the startup configuration file, you can either save the running configuration file to the startup configuration using the copy running-config startup-config EXEC command or copy a configuration file from a file server to the startup configuration (see the Copying a Configuration File from a TFTP Server to the Switch (CLI) section for more information). Configuration Mode and Selecting a Configuration Source To enter configuration mode on the switch, enter the configure command at the privileged EXEC prompt. The Cisco IOS software responds with the following prompt asking you to specify the terminal, memory, or a file stored on a network server (network) as the source of configuration commands: Configuring from terminal, memory, or network [terminal]? Configuring from the terminal allows you to enter configuration commands at the command line, as described in the following section. See the Re-executing the Configuration Commands in the Startup Configuration File (CLI) section for more information. Configuring from the network allows you to load and execute configuration commands over the network. See the Copying a Configuration File from a TFTP Server to the Switch (CLI) section for more information. Configuration File Changes Using the CLI The Cisco IOS software accepts one configuration command per line. You can enter as many configuration commands as you want. You can add comments to a configuration file describing the commands you have entered. Precede a comment with an exclamation point (!). Because comments are not stored in NVRAM or in the active copy of the configuration file, comments do not appear when you list the active configuration with the show running-config or more system:running-config EXEC command. Comments are not displayed when you list the startup configuration with the show startup-config or more nvram:startup-config EXEC mode command. Comments are stripped out of the configuration file when it is loaded onto the switch. However, you can list the comments in configuration files stored on a File Transfer Protocol (FTP), Remote Copy Protocol (RCP), or Trivial File Transfer Protocol (TFTP) server. When you configure the software using the CLI, the software executes the commands as you enter them. Location of Configuration Files Configuration files are stored in the following locations: · The running configuration is stored in RAM. · On all platforms except the Class A Flash file system platforms, the startup configuration is stored in nonvolatile random-access memory (NVRAM). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1996 System Management Copy Configuration Files from a Network Server to the Switch · On Class A Flash file system platforms, the startup configuration is stored in the location specified by the CONFIG_FILE environment variable (see the Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI) section). The CONFIG_FILE variable defaults to NVRAM and can be a file in the following file systems: · nvram: (NVRAM) · bootflash: (internal flash memory) · usbflash0: (flash file system) Copy Configuration Files from a Network Server to the Switch You can copy configuration files from a TFTP, rcp, or FTP server to the running configuration or startup configuration of the switch. You may want to perform this function for one of the following reasons: · To restore a backed-up configuration file. · To use the configuration file for another switch. For example, you may add another switch to your network and want it to have a similar configuration to the original switch. By copying the file to the new switch, you can change the relevant parts rather than recreating the whole file. · To load the same configuration commands on to all of the switches in your network so that all of the switches have similar configurations. The copy{ftp: | rcp: | tftp:system:running-config} EXEC command loads the configuration files into the switch as if you were typing the commands on the command line. The switch does not erase the existing running configuration before adding the commands. If a command in the copied configuration file replaces a command in the existing configuration file, the existing command is erased. For example, if the copied configuration file contains a different IP address in a particular command than the existing configuration, the IP address in the copied configuration is used. However, some commands in the existing configuration may not be replaced or negated. In this case, the resulting configuration file is a mixture of the existing configuration file and the copied configuration file, with the copied configuration file having precedence. To restore a configuration file to an exact copy of a file stored on a server, you need to copy the configuration file directly to the startup configuration (using the copy ftp:| rcp:| tftp:} nvram:startup-config command) and reload the switch. To copy configuration files from a server to a switch, perform the tasks described in the following sections. The protocol that you use depends on which type of server you are using. The FTP and rcp transport mechanisms provide faster performance and more reliable delivery of data than TFTP. These improvements are possible because the FTP and rcp transport mechanisms are built on and use the TCP/IP stack, which is connection-oriented. Copying a Configuration File from the Switch to a TFTP Server In some implementations of TFTP, you must create a dummy file on the TFTP server and give it read, write, and execute permissions before copying a file over it. Refer to your TFTP documentation for more information. Copying a Configuration File from the Switch to an RCP Server You can copy a configuration file from the switch to an RCP server. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1997 Restrictions System Management Restrictions One of the first attempts to use the network as a resource in the UNIX community resulted in the design and implementation of the remote shell protocol, which included the remote shell (rsh) and remote copy (rcp) functions. Rsh and rcp give users the ability to execute commands remotely and copy files to and from a file system residing on a remote host or server on the network. The Cisco implementation of rsh and rcp interoperates with standard implementations. The rcp copy commands rely on the rsh server (or daemon) on the remote system. To copy files using rcp, you need not create a server for file distribution, as you do with TFTP. You need only to have access to a server that supports the remote shell (rsh). (Most UNIX systems support rsh.) Because you are copying a file from one place to another, you must have read permission on the source file and write permission on the destination file. If the destination file does not exist, rcp creates it for you. Although the Cisco rcp implementation emulates the functions of the UNIX rcp implementation--copying files among systems on the network--the Cisco command syntax differs from the UNIX rcp command syntax. The Cisco rcp support offers a set of copy commands that use rcp as the transport mechanism. These rcp copy commands are similar in style to the Cisco TFTP copy commands, but they offer an alternative that provides faster performance and reliable delivery of data. These improvements are possible because the rcp transport mechanism is built on and uses the TCP/IP stack, which is connection-oriented. You can use rcp commands to copy system images and configuration files from the switch to a network server and vice versa. You also can enable rcp support to allow users on remote systems to copy files to and from the switch. To configure the Cisco IOS software to allow remote users to copy files to and from the switch, use the ip rcmd rcp-enable global configuration command. The RCP protocol requires a client to send a remote username on each RCP request to a server. When you copy a configuration file from the switch to a server using RCP, the Cisco IOS software sends the first valid username it encounters in the following sequence: 1. The username specified in the copy EXEC command, if a username is specified. 2. The username set by the ip rcmd remote-username global configuration command, if the command is configured. 3. The remote username associated with the current tty (terminal) process. For example, if the user is connected to the switch through Telnet and was authenticated through the username command, the switch software sends the Telnet username as the remote username. 4. The switch host name. For the RCP copy request to execute successfully, an account must be defined on the network server for the remote username. If the server has a directory structure, the configuration file or image is written to or copied from the directory associated with the remote username on the server. For example, if the system image resides in the home directory of a user on the server, you can specify that user name as the remote username. Use the ip rcmd remote-username command to specify a username for all copies. (Rcmd is a UNIX routine used at the super-user level to execute commands on a remote machine using an authentication scheme based on reserved port numbers. Rcmd stands for "remote command"). Include the username in the copy command if you want to specify a username for that copy operation only. If you are writing to the server, the RCP server must be properly configured to accept the RCP write request from the user on the switch. For UNIX systems, you must add an entry to the .rhosts file for the remote user on the RCP server. For example, suppose the switch contains the following configuration lines: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1998 System Management Requirements for the RCP Username hostname Switch1 ip rcmd remote-username User0 If the switch IP address translates to switch1.example.com, then the .rhosts file for User0 on the RCP server should contain the following line: Switch1.example.com Switch1 Requirements for the RCP Username The RCP protocol requires a client to send a remote username on each RCP request to a server. When you copy a configuration file from the switch to a server using RCP, the Cisco IOS software sends the first valid username it encounters in the following sequence: 1. The username specified in the copy EXEC command, if a username is specified. 2. The username set by the ip rcmd remote-username global configuration command, if the command is configured. 3. The remote username associated with the current tty (terminal) process. For example, if the user is connected to the switch through Telnet and is authenticated through the username command, the switch software sends the Telnet username as the remote username. 4. The switch host name. For the RCP copy request to execute, an account must be defined on the network server for the remote username. If the server has a directory structure, the configuration file or image is written to or copied from the directory associated with the remote username on the server. For example, if the system image resides in the home directory of a user on the server, specify that user name as the remote username. Refer to the documentation for your RCP server for more information. Copying a Configuration File from the Switch to an FTP Server You can copy a configuration file from the switch to an FTP server. Understanding the FTP Username and Password The FTP protocol requires a client to send a remote username and password on each FTP request to a server. When you copy a configuration file from the switch to a server using FTP, the Cisco IOS software sends the first valid username it encounters in the following sequence: 1. The username specified in the copy EXEC command, if a username is specified. 2. The username set by the ip ftp username global configuration command, if the command is configured. 3. Anonymous. The switch sends the first valid password it encounters in the following sequence: 1. The password specified in the copy command, if a password is specified. 2. The password set by the ip ftp password command, if the command is configured. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1999 Configuration Files Larger than NVRAM System Management 3. The switch forms a password username @switchname.domain . The variable username is the username associated with the current session, switchname is the configured host name, and domain is the domain of the switch. The username and password must be associated with an account on the FTP server. If you are writing to the server, the FTP server must be properly configured to accept the FTP write request from the user on the switch. If the server has a directory structure, the configuration file or image is written to or copied from the directory associated with the username on the server. For example, if the system image resides in the home directory of a user on the server, specify that user name as the remote username. Refer to the documentation for your FTP server for more information. Use the ip ftp username and ip ftp password global configuration commands to specify a username and password for all copies. Include the username in the copy EXEC command if you want to specify a username for that copy operation only. Configuration Files Larger than NVRAM To maintain a configuration file that exceeds the size of NVRAM, you should be aware of the information in the following sections. Compressing the Configuration File The service compress-config global configuration command specifies that the configuration file be stored compressed in NVRAM. Once the configuration file has been compressed, the switch functions normally. When the system is booted, it recognizes that the configuration file is compressed, expands it, and proceeds normally. The more nvram:startup-config EXEC command expands the configuration before displaying it. Before you compress configuration files, refer to the appropriate hardware installation and maintenance publication. Verify that your system's ROMs support file compression. If not, you can install new ROMs that support file compression. The size of the configuration must not exceed three times the NVRAM size. For a 128-KB size NVRAM, the largest expanded configuration file size is 384 KB. The service compress-config global configuration command works only if you have Cisco IOS software Release 10.0 or later release boot ROMs. Installing new ROMs is a one-time operation and is necessary only if you do not already have Cisco IOS Release 10.0 in ROM. If the boot ROMs do not recognize a compressed configuration, the following message is displayed: Boot ROMs do not support NVRAM compression Config NOT written to NVRAM Storing the Configuration in Flash Memory on Class A Flash File Systems On class A Flash file system switches, you can store the startup configuration in flash memory by setting the CONFIG_FILE environment variable to a file in internal flash memory or flash memory in a PCMCIA slot. See the Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI) section for more information. Care must be taken when editing or changing a large configuration. Flash memory space is used every time a copy system:running-config nvram:startup-config EXEC command is issued. Because file management for flash memory (such as optimizing free space) is not done automatically, you must pay close attention to Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2000 System Management Loading the Configuration Commands from the Network available flash memory. Use the squeeze command to reclaim used space. We recommend that you use a large-capacity Flash card of at least 20 MB. Loading the Configuration Commands from the Network You can also store large configurations on FTP, RCP, or TFTP servers and download them at system startup. To use a network server to store large configurations, see the Copying a Configuration File from the Switch to a TFTP Server (CLI) and Configuring the Switch to Download Configuration Files sections for more information on these commands. Configuring the Switch to Download Configuration Files You can configure the switch to load one or two configuration files at system startup. The configuration files are loaded into memory and read in as if you were typing the commands at the command line. Thus, the configuration for the switch is a mixture of the original startup configuration and the one or two downloaded configuration files. Network Versus Host Configuration Files For historical reasons, the first file the switch downloads is called the network configuration file. The second file the switch downloads is called the host configuration file. Two configuration files can be used when all of the switches on a network use many of the same commands. The network configuration file contains the standard commands used to configure all of the switches. The host configuration files contain the commands specific to one particular host. If you are loading two configuration files, the host configuration file should be the configuration file you want to have precedence over the other file. Both the network and host configuration files must reside on a network server reachable via TFTP, RCP, or FTP, and must be readable. How to Manage Configuration File Information Displaying Configuration File Information (CLI) To display information about configuration files, complete the tasks in this section: SUMMARY STEPS 1. enable 2. show boot 3. more file-url 4. show running-config 5. show startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2001 Modifying the Configuration File (CLI) System Management Step 2 Step 3 Step 4 Step 5 Command or Action Switch> enable show boot Example: Switch# show boot more file-url Example: Switch# more 10.1.1.1 show running-config Example: Switch# show running-config show startup-config Example: Switch# show startup-config Purpose Lists the contents of the BOOT environment variable (if set), the name of the configuration file pointed to by the CONFIG_FILE environment variable, and the contents of the BOOTLDR environment variable. Displays the contents of a specified file. Displays the contents of the running configuration file. (Command alias for the more system:running-config command.) Displays the contents of the startup configuration file. (Command alias for the more nvram:startup-config command.) On all platforms except the Class A Flash file system platforms, the default startup-config file usually is stored in NVRAM. On the Class A Flash file system platforms, the CONFIG_FILE environment variable points to the default startup-config file. The CONFIG_FILE variable defaults to NVRAM. Modifying the Configuration File (CLI) The Cisco IOS software accepts one configuration command per line. You can enter as many configuration commands as you want. You can add comments to a configuration file describing the commands you have entered. Precede a comment with an exclamation point (!). Because comments are not stored in NVRAM or in the active copy of the configuration file, comments do not appear when you list the active configuration with the show running-config or more system:running-config EXEC commands. Comments do not display when you list the startup configuration with the show startup-config or more nvram:startup-config EXEC mode commands. Comments are stripped out of the configuration file when it is loaded onto the switch. However, you can list the comments in configuration files stored on a File Transfer Protocol (FTP), Remote Copy Protocol (RCP), or Trivial File Transfer Protocol (TFTP) server. When you configure the software using the CLI, the software executes the commands as you enter them. To configure the software using the CLI, use the following commands in privileged EXEC mode: SUMMARY STEPS 1. enable 2. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2002 System Management Modifying the Configuration File (CLI) 3. configuration command 4. Do one of the following: · end · ^Z 5. copy system:running-config nvram:startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable configure terminal Example: Enters global configuration mode. Step 3 Step 4 Switch# configure terminal configuration command Example: Switch(config)# configuration command Do one of the following: · end · ^Z Example: Enter the necessary configuration commands. The Cisco IOS documentation set describes configuration commands organized by technology. Ends the configuration session and exits to EXEC mode. Note When you press the Ctrl and Z keys simultaneously, ^Z is displayed to the screen. Step 5 Switch(config)# end copy system:running-config nvram:startup-config Example: Switch# copy system:running-config nvram:startup-config Saves the running configuration file as the startup configuration file. You may also use the copy running-config startup-config command alias, but you should be aware that this command is less precise. On most platforms, this command saves the configuration to NVRAM. On the Class A Flash file system platforms, this step saves the configuration to the location specified by the CONFIG_FILE environment variable (the default CONFIG_FILE variable specifies that the file should be saved to NVRAM). Examples In the following example, the switch prompt name of the switch is configured. The comment line, indicated by the exclamation mark (!), does not execute any command. The hostname command is Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2003 Copying a Configuration File from the Switch to a TFTP Server (CLI) System Management used to change the switch name from switch to new_name. By pressing Ctrl-Z (^Z) or entering the end command, the user quits configuration mode. The copy system:running-config nvram:startup-config command saves the current configuration to the startup configuration. Switch# configure terminal Switch(config)# !The following command provides the switch host name. Switch(config)# hostname new_name new_name(config)# end new_name# copy system:running-config nvram:startup-config When the startup configuration is NVRAM, it stores the current configuration information in text format as configuration commands, recording only non-default settings. The memory is checksummed to guard against corrupted data. Note Some specific commands might not get saved to NVRAM. You need to enter these commands again if you reboot the machine. These commands are noted in the documentation. We recommend that you keep a list of these settings so that you can quickly reconfigure your switch after rebooting. Copying a Configuration File from the Switch to a TFTP Server (CLI) To copy configuration information on a TFTP network server, complete the tasks in this section: SUMMARY STEPS 1. enable 2. copy system:running-config tftp: [[[//location ]/directory ]/filename ] 3. copy nvram:startup-config tftp: [[[//location ]/directory ]/filename ] DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable copy system:running-config tftp: [[[//location ]/directory Copies the running configuration file to a TFTP server. ]/filename ] Example: Step 3 Switch# copy system:running-config tftp: //server1/topdir/file10 copy nvram:startup-config tftp: [[[//location ]/directory Copies the startup configuration file to a TFTP server. ]/filename ] Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2004 System Management What to Do Next Command or Action Switch# copy nvram:startup-config tftp: //server1/1stdir/file10 Purpose Examples The following example copies a configuration file from a switch to a TFTP server: Switch# copy system:running-config tftp://172.16.2.155/tokyo-confg Write file tokyo-confg on host 172.16.2.155? [confirm] Y Writing tokyo-confg!!! [OK] What to Do Next After you have issued the copy command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command. Copying a Configuration File from the Switch to an RCP Server (CLI) To copy a startup configuration file or a running configuration file from the switch to an RCP server, use the following commands beginning in privileged EXEC mode: SUMMARY STEPS 1. enable 2. configure terminal 3. ip rcmd remote-username username 4. end 5. Do one of the following: · copy system:running-config rcp: [[[//[username@]location ]/directory ]/filename ] · copy nvram:startup-config rcp: [[[//[username@]location ]/directory ]/filename ] DETAILED STEPS Step 1 Command or Action enable Example: Step 2 Switch> enable configure terminal Example: Switch# configure terminal Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2005 Examples System Management Step 3 Step 4 Step 5 Command or Action ip rcmd remote-username username Example: Purpose (Optional) Changes the default remote username. Switch(config)# ip rcmd remote-username NetAdmin1 end Example: (Optional) Exits global configuration mode. Switch(config)# end Do one of the following: · copy system:running-config rcp: [[[//[username@]location ]/directory ]/filename ] · copy nvram:startup-config rcp: [[[//[username@]location ]/directory ]/filename ] Example: · Specifies that the switch running configuration file is to be stored on an RCP server or · Specifies that the switch startup configuration file is to be stored on an RCP server Switch# copy system:running-config rcp: //NetAdmin1@example.com/dir-files/file1 Examples Storing a Running Configuration File on an RCP Server The following example copies the running configuration file named runfile2-confg to the netadmin1 directory on the remote host with an IP address of 172.16.101.101: Switch# copy system:running-config rcp://netadmin1@172.16.101.101/runfile2-confg Write file runfile2-confg on host 172.16.101.101?[confirm] Building configuration...[OK] Connected to 172.16.101.101 Switch# Storing a Startup Configuration File on an RCP Server The following example shows how to store a startup configuration file on a server by using RCP to copy the file: Switch# configure terminal Switch(config)# ip rcmd remote-username netadmin2 Switch(config)# end Switch# copy nvram:startup-config rcp: Remote host[]? 172.16.101.101 Name of configuration file to write [start-confg]? Write file start-confg on host 172.16.101.101?[confirm] ![OK] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2006 System Management What to Do Next What to Do Next After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command. Copying a Configuration File from the Switch to the FTP Server (CLI) To copy a startup configuration file or a running configuration file from the switch to an FTP server, complete the following tasks: SUMMARY STEPS 1. enable 2. configure terminal 3. ip ftp username username 4. ip ftp password password 5. end 6. Do one of the following: · copy system:running-config ftp: [[[//[username [:password ]@]location]/directory ]/filename ] or · copy nvram:startup-config ftp: [[[//[username [:password ]@]location]/directory ]/filename ] DETAILED STEPS Step 1 Command or Action enable Example: Step 2 Switch> enable configure terminal Example: Step 3 Switch# configure terminal ip ftp username username Example: Step 4 Switch(config)# ip ftp username NetAdmin1 ip ftp password password Example: Switch(config)# ip ftp password adminpassword Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters global configuration mode on the switch. (Optional) Specifies the default remote username. (Optional) Specifies the default password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2007 Examples System Management Step 5 Step 6 Command or Action end Example: Switch(config)# end Do one of the following: · copy system:running-config ftp: [[[//[username [:password ]@]location]/directory ]/filename ] or · copy nvram:startup-config ftp: [[[//[username [:password ]@]location]/directory ]/filename ] Example: Purpose (Optional) Exits global configuration mode. This step is required only if you override the default remote username or password (see Steps 2 and 3). Copies the running configuration or startup configuration file to the specified location on the FTP server. Switch# copy system:running-config ftp: Examples Storing a Running Configuration File on an FTP Server The following example copies the running configuration file named runfile-confg to the netadmin1 directory on the remote host with an IP address of 172.16.101.101: Switch# copy system:running-config ftp://netadmin1:mypass@172.16.101.101/runfile-confg Write file runfile-confg on host 172.16.101.101?[confirm] Building configuration...[OK] Connected to 172.16.101.101 Switch# Storing a Startup Configuration File on an FTP Server The following example shows how to store a startup configuration file on a server by using FTP to copy the file: Switch# configure terminal Switch(config)# ip ftp username netadmin2 Switch(config)# ip ftp password mypass Switch(config)# end Switch# copy nvram:startup-config ftp: Remote host[]? 172.16.101.101 Name of configuration file to write [start-confg]? Write file start-confg on host 172.16.101.101?[confirm] ![OK] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2008 System Management What to Do Next What to Do Next After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command. Copying a Configuration File from a TFTP Server to the Switch (CLI) To copy a configuration file from a TFTP server to the switch, complete the tasks in this section: SUMMARY STEPS 1. enable 2. copy tftp: [[[//location]/directory]/filename] system:running-config 3. copy tftp: [[[//location]/directory]/filename] nvram:startup-config 4. copy tftp: [[[//location]/directory]/filename]flash-[n]:/directory/startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable copy tftp: [[[//location]/directory]/filename] system:running-config Example: Copies a configuration file from a TFTP server to the running configuration. Step 3 Switch# copy tftp://server1/dir10/datasource system:running-config copy tftp: [[[//location]/directory]/filename] nvram:startup-config Example: Copies a configuration file from a TFTP server to the startup configuration. Step 4 Switch# copy tftp://server1/dir10/datasource nvram:startup-config copy tftp: Copies a configuration file from a TFTP server to the startup [[[//location]/directory]/filename]flash-[n]:/directory/startup-config configuration. Example: Switch# copy tftp://server1/dir10/datasource flash:startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2009 What to Do Next System Management Examples In the following example, the software is configured from the file named tokyo-confg at IP address 172.16.2.155: Switch# copy tftp://172.16.2.155/tokyo-confg system:running-config Configure using tokyo-confg from 172.16.2.155? [confirm] Y Booting tokyo-confg from 172.16.2.155:!!! [OK - 874/16000 bytes] What to Do Next After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command. Copying a Configuration File from the rcp Server to the Switch (CLI) To copy a configuration file from an rcp server to the running configuration or startup configuration, complete the following tasks: SUMMARY STEPS 1. enable 2. configure terminal 3. ip rcmd remote-username username 4. end 5. Do one of the following: · copy rcp:[[[//[username@]location]/directory]/filename]system:running-config · copy rcp:[[[//[username@]location]/directory]/filename]nvram:startup-config DETAILED STEPS Step 1 Command or Action enable Example: Step 2 Switch> enable configure terminal Example: Step 3 Switch# configure terminal ip rcmd remote-username username Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. (Optional) Enters configuration mode from the terminal. This step is required only if you override the default remote username (see Step 3). (Optional) Specifies the remote username. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2010 System Management Examples Step 4 Step 5 Command or Action Purpose Switch(config)# ip rcmd remote-username NetAdmin1 end Example: (Optional) Exits global configuration mode. This step is required only if you override the default remote username (see Step 2). Switch(config)# end Do one of the following: Copies the configuration file from an rcp server to the · copy running configuration or startup configuration. rcp:[[[//[username@]location]/directory]/filename]system:running-config · copy rcp:[[[//[username@]location]/directory]/filename]nvram:startup-config Example: Switch# copy rcp://[user1@example.com/dir10/fileone] nvram:startup-config Examples Copy RCP Running-Config The following example copies a configuration file named host1-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101, and loads and runs the commands on the switch: Switch# copy rcp://netadmin1@172.16.101.101/host1-confg system:running-config Configure using host1-confg from 172.16.101.101? [confirm] Connected to 172.16.101.101 Loading 1112 byte file host1-confg:![OK] Switch# %SYS-5-CONFIG: Configured from host1-config by rcp from 172.16.101.101 Copy RCP Startup-Config The following example specifies a remote username of netadmin1. Then it copies the configuration file named host2-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101 to the startup configuration. Switch# configure terminal Switch(config)# ip rcmd remote-username netadmin1 Switch(config)# end Switch# copy rcp: nvram:startup-config Address of remote host [255.255.255.255]? 172.16.101.101 Name of configuration file[rtr2-confg]? host2-confg Configure using host2-confg from 172.16.101.101?[confirm] Connected to 172.16.101.101 Loading 1112 byte file host2-confg:![OK] [OK] Switch# %SYS-5-CONFIG_NV:Non-volatile store configured from host2-config by rcp from 172.16.101.101 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2011 What to Do Next System Management What to Do Next After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command. Copying a Configuration File from an FTP Server to the Switch (CLI) To copy a configuration file from an FTP server to the running configuration or startup configuration, complete the tasks in this section: SUMMARY STEPS 1. enable 2. configure terminal 3. ip ftp username username 4. ip ftp password password 5. end 6. Do one of the following: · copy ftp: [[[//[username[:password]@]location] /directory ]/filename]system:running-config · copy ftp: [[[ //[username[:password]@]location]/directory]/filename]nvram:startup-config DETAILED STEPS Step 1 Command or Action enable Example: Step 2 Switch> enable configure terminal Example: Step 3 Switch# configure terminal ip ftp username username Example: Step 4 Switch(config)# ip ftp username NetAdmin1 ip ftp password password Example: Switch(config)# ip ftp password adminpassword Purpose Enables privileged EXEC mode. · Enter your password if prompted. (Optional) Allows you to enter global configuration mode. This step is required only if you want to override the default remote username or password (see Steps 3 and 4). (Optional) Specifies the default remote username. (Optional) Specifies the default password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2012 System Management Examples Step 5 Step 6 Command or Action Purpose end Example: (Optional) Exits global configuration mode. This step is required only if you override the default remote username or password (see Steps 3 and 4). Switch(config)# end Do one of the following: · copy ftp: [[[//[username[:password]@]location] /directory ]/filename]system:running-config Using FTP copies the configuration file from a network server to running memory or the startup configuration. · copy ftp: [[[ //[username[:password]@]location]/directory]/filename]nvram:startup-config Example: Switch# copy ftp:nvram:startup-config Examples Copy FTP Running-Config The following example copies a host configuration file named host1-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101, and loads and runs the commands on the switch: Switch# copy ftp://netadmin1:mypass@172.16.101.101/host1-confg system:running-config Configure using host1-confg from 172.16.101.101? [confirm] Connected to 172.16.101.101 Loading 1112 byte file host1-confg:![OK] Switch# %SYS-5-CONFIG: Configured from host1-config by ftp from 172.16.101.101 Copy FTP Startup-Config The following example specifies a remote username of netadmin1. Then it copies the configuration file named host2-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101 to the startup configuration: Switch# configure terminal Switch(config)# ip ftp username netadmin1 Switch(config)# ip ftp password mypass Switch(config)# end Switch# copy ftp: nvram:startup-config Address of remote host [255.255.255.255]? 172.16.101.101 Name of configuration file[host1-confg]? host2-confg Configure using host2-confg from 172.16.101.101?[confirm] Connected to 172.16.101.101 Loading 1112 byte file host2-confg:![OK] [OK] Switch# %SYS-5-CONFIG_NV:Non-volatile store configured from host2-config by ftp from 172.16.101.101 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2013 What to Do Next System Management What to Do Next After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command. Maintaining Configuration Files Larger than NVRAM To maintain a configuration file that exceeds the size of NVRAM, perform the tasks described in the following sections: Compressing the Configuration File (CLI) To compress configuration files, complete the tasks in this section: SUMMARY STEPS 1. enable 2. configure terminal 3. service compress-config 4. end 5. Do one of the following: · Use FTP, RCP, or TFTP to copy the new configuration. · configure terminal 6. copy system:running-config nvram:startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable configure terminal Example: Enters global configuration mode. Step 3 Switch# configure terminal service compress-config Example: Specifies that the configuration file be compressed. Step 4 Switch(config)# service compress-config end Example: Exits global configuration mode. Switch(config)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2014 System Management Storing the Configuration in Flash Memory on Class A Flash File Systems (CLI) Step 5 Step 6 Command or Action Do one of the following: · Use FTP, RCP, or TFTP to copy the new configuration. · configure terminal Example: Switch# configure terminal copy system:running-config nvram:startup-config Example: Switch(config)# copy system:running-config nvram:startup-config Purpose Enters the new configuration: · If you try to load a configuration that is more than three times larger than the NVRAM size, the following error message is displayed: "[buffer overflow - file-size /buffer-size bytes]." When you have finished changing the running-configuration, save the new configuration. Examples The following example compresses a 129-KB configuration file to 11 KB: Switch# configure terminal Switch(config)# service compress-config Switch(config)# end Switch# copy tftp://172.16.2.15/tokyo-confg system:running-config Configure using tokyo-confg from 172.16.2.155? [confirm] y Booting tokyo-confg from 172.16.2.155:!!! [OK - 874/16000 bytes] Switch# copy system:running-config nvram:startup-config Building configuration... Compressing configuration from 129648 bytes to 11077 bytes [OK] Storing the Configuration in Flash Memory on Class A Flash File Systems (CLI) To store the startup configuration in flash memory, complete the tasks in this section: SUMMARY STEPS 1. enable 2. copy nvram:startup-config flash-filesystem:filename 3. configure terminal 4. boot config flash-filesystem: filename 5. end 6. Do one of the following: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2015 Storing the Configuration in Flash Memory on Class A Flash File Systems (CLI) System Management · Use FTP, RCP, or TFTP to copy the new configuration. If you try to load a configuration that is more than three times larger than the NVRAM size, the following error message is displayed: "[buffer overflow - file-size /buffer-size bytes]. " · configure terminal 7. copy system:running-config nvram:startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable copy nvram:startup-config flash-filesystem:filename Example: Copies the current startup configuration to the new location to create the configuration file. Step 3 Switch# copy nvram:startup-config usbflash0:switch-config configure terminal Example: Enters global configuration mode. Step 4 Switch# configure terminal boot config flash-filesystem: filename Example: Specifies that the startup configuration file be stored in flash memory by setting the CONFIG_FILE variable. Switch(config)# boot config usbflash0:switch-config Step 5 Step 6 end Example: Exits global configuration mode. Switch(config)# end Do one of the following: Enters the new configuration. · Use FTP, RCP, or TFTP to copy the new configuration. If you try to load a configuration that is more than three times larger than the NVRAM size, the following error message is displayed: "[buffer overflow - file-size /buffer-size bytes]. " · configure terminal Example: Switch# configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2016 System Management Loading the Configuration Commands from the Network (CLI) Step 7 Command or Action copy system:running-config nvram:startup-config Example: Switch(config)# copy system:running-config nvram:startup-config Purpose When you have finished changing the running-configuration, save the new configuration. Examples The following example stores the configuration file in usbflash0: Switch# copy nvram:startup-config usbflash0:switch-config Switch# configure terminal Switch(config)# boot config usbflash0:switch-config Switch(config)# end Switch# copy system:running-config nvram:startup-config Loading the Configuration Commands from the Network (CLI) To use a network server to store large configurations, complete the tasks in this section: SUMMARY STEPS 1. enable 2. copy system:running-config {ftp: | rcp: | tftp:} 3. configure terminal 4. boot network {ftp:[[[//[username [:password ]@]location ]/directory ]/filename ] | rcp:[[[//[username@]location ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ]} 5. service config 6. end 7. copy system:running-config nvram:startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable copy system:running-config {ftp: | rcp: | tftp:} Example: Saves the running configuration to an FTP, RCP, or TFTP server. Switch# copy system:running-config ftp: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2017 Copying Configuration Files from Flash Memory to the Startup or Running Configuration (CLI) System Management Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action configure terminal Example: Purpose Enters global configuration mode. Switch# configure terminal boot network {ftp:[[[//[username [:password ]@]location Specifies that the startup configuration file be loaded from ]/directory ]/filename ] | rcp:[[[//[username@]location the network server at startup. ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ]} Example: Switch(config)# boot network ftp://user1:guessme@example.com/dir10/file1 service config Example: Enables the switch to download configuration files at system startup. Switch(config)# service config end Example: Exits global configuration mode. Switch(config)# end copy system:running-config nvram:startup-config Example: Saves the configuration. Switch# copy system:running-config nvram:startup-config Copying Configuration Files from Flash Memory to the Startup or Running Configuration (CLI) To copy a configuration file from flash memory directly to your startup configuration in NVRAM or your running configuration, enter one of the commands in Step 2: SUMMARY STEPS 1. enable 2. Do one of the following: · copy filesystem: [partition-number:][filename ] nvram:startup-config · copy filesystem: [partition-number:][filename ] system:running-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2018 System Management Copying Configuration Files Between Flash Memory File Systems (CLI) DETAILED STEPS Step 1 Command or Action enable Example: Step 2 Switch> enable Do one of the following: · copy filesystem: [partition-number:][filename ] nvram:startup-config · copy filesystem: [partition-number:][filename ] system:running-config Example: Switch# copy usbflash0:4:ios-upgrade-1 nvram:startup-config Purpose Enables privileged EXEC mode. · Enter your password if prompted. · Loads a configuration file directly into NVRAM or · Copies a configuration file to your running configuration Examples The following example copies the file named ios-upgrade-1 from partition 4 of the flash memory PC Card in usbflash0 to the switch startup configurations: Switch# copy usbflash0:4:ios-upgrade-1 nvram:startup-config Copy 'ios-upgrade-1' from flash device as 'startup-config' ? [yes/no] yes [OK] Copying Configuration Files Between Flash Memory File Systems (CLI) On platforms with multiple flash memory file systems, you can copy files from one flash memory file system, such as internal flash memory to another flash memory file system. Copying files to different flash memory file systems lets you create backup copies of working configurations and duplicate configurations for other switchs. To copy a configuration file between flash memory file systems, use the following commands in EXEC mode: SUMMARY STEPS 1. enable 2. show source-filesystem: 3. copy source-filesystem: [partition-number:][filename ] dest-filesystem:[partition-number:][filename ] DETAILED STEPS Step 1 Command or Action enable Purpose Enables privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2019 Copying Configuration Files Between Flash Memory File Systems (CLI) System Management Step 2 Step 3 Command or Action Example: Purpose · Enter your password if prompted. Switch> enable show source-filesystem: Example: Displays the layout and contents of flash memory to verify the filename. Switch# show flash: copy source-filesystem: [partition-number:][filename ] dest-filesystem:[partition-number:][filename ] Example: Switch# copy flash: usbflash0: Copies a configuration file between flash memory devices. · The source device and the destination device cannot be the same. For example, the copy usbflash0: usbflash0: command is invalid. Example The following example copies the file named running-config from partition 1 on internal flash memory to partition 1 of usbflash0 on a switch. In this example, the source partition is not specified, so the switch prompts for the partition number: Switch# copy flash: usbflash0: System flash Partition Size Used Free Bank-Size State Copy Mode 1 4096K 3070K 1025K 4096K Read/Write Direct 2 16384K 1671K 14712K 8192K Read/Write Direct [Type ?<no> for partition directory; ? for full directory; q to abort] Which partition? [default = 1] System flash directory, partition 1: File Length Name/status 1 3142748 dirt/network/mars-test/c3600-j-mz.latest 2 850 running-config [3143728 bytes used, 1050576 available, 4194304 total] usbflash0 flash directory: File Length Name/status 1 1711088 dirt/gate/c3600-i-mz 2 850 running-config [1712068 bytes used, 2482236 available, 4194304 total] Source file name? running-config Destination file name [running-config]? Verifying checksum for 'running-config' (file # 2)... OK Erase flash device before writing? [confirm] Flash contains files. Are you sure you want to erase? [confirm] Copy 'running-config' from flash: device as 'running-config' into usbflash0: device WITH erase? [yes/no] yes Erasing device... eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee ...erased! [OK - 850/4194304 bytes] Flash device copy took 00:00:30 [hh:mm:ss] Verifying checksum... OK (0x16) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2020 System Management Copying a Configuration File from an FTP Server to Flash Memory Devices (CLI) Copying a Configuration File from an FTP Server to Flash Memory Devices (CLI) To copy a configuration file from an FTP server to a flash memory device, complete the task in this section: SUMMARY STEPS 1. enable 2. configure terminal 3. ip ftp username username 4. ip ftp password password 5. end 6. copy ftp: [[//location]/directory ]/bundle_name flash: DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Step 3 Switch> enable configure terminal Example: Switch# configure terminal ip ftp username username Example: (Optional) Enters global configuration mode. This step is required only if you override the default remote username or password (see Steps 3 and 4). (Optional) Specifies the remote username. Step 4 Switch(config)# ip ftp username Admin01 ip ftp password password Example: (Optional) Specifies the remote password. Step 5 Step 6 Switch(config)# ip ftp password adminpassword end Example: Switch(config)# end copy ftp: [[//location]/directory ]/bundle_name flash: Example: (Optional) Exits configuration mode. This step is required only if you override the default remote username (see Steps 3 and 4). Copies the configuration file from a network server to the flash memory device using FTP. Switch>copy ftp:/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2021 What to Do Next System Management What to Do Next After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command. Copying a Configuration File from an RCP Server to Flash Memory Devices (CLI) To copy a configuration file from an RCP server to a flash memory device, complete the tasks in this section: SUMMARY STEPS 1. enable 2. configure terminal 3. ip rcmd remote-username username 4. end 5. copy rcp: [[[//[username@]location ]/directory] /bundle_name] flash: DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Step 3 Switch> enable configure terminal Example: Switch# configure terminal ip rcmd remote-username username Example: (Optional) Enters global configuration mode. This step is required only if you override the default remote username or password (see Step 3). (Optional) Specifies the remote username. Step 4 Step 5 Switch(config)# ip rcmd remote-username Admin01 end Example: (Optional) Exits configuration mode. This step is required only if you override the default remote username or password (see Step 3). Switch(config)# end copy rcp: [[[//[username@]location ]/directory] Copies the configuration file from a network server to the /bundle_name] flash: flash memory device using RCP. Respond to any switch Example: prompts for additional information or confirmation. Prompting depends on how much information you provide in the copy command and the current setting of the file Switch# flash: copy rcp://netadmin@172.16.101.101/bundle1 prompt command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2022 System Management Copying a Configuration File from a TFTP Server to Flash Memory Devices (CLI) Copying a Configuration File from a TFTP Server to Flash Memory Devices (CLI) To copy a configuration file from a TFTP server to a flash memory device, complete the tasks in this section: SUMMARY STEPS 1. enable 2. copy tftp: [[[//location ]/directory ]/bundle_name flash: DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable copy tftp: [[[//location ]/directory ]/bundle_name flash: Copies the file from a TFTP server to the flash memory Example: device. Reply to any switch prompts for additional information or confirmation. Prompting depends on how Switch# copy much information you provide in the copy command and the current setting of the file prompt command. tftp:/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash: Examples The following example shows the copying of the configuration file named switch-config from a TFTP server to the flash memory card inserted in usbflash0. The copied file is renamed new-config. Switch# copy tftp:switch-config usbflash0:new-config Re-executing the Configuration Commands in the Startup Configuration File (CLI) To re-execute the commands located in the startup configuration file, complete the task in this section: SUMMARY STEPS 1. enable 2. configure memory Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2023 Clearing the Startup Configuration (CLI) System Management DETAILED STEPS Step 1 Command or Action enable Example: Step 2 Switch> enable configure memory Example: Switch# configure memory Purpose Enables privileged EXEC mode. · Enter your password if prompted. Re-executes the configuration commands located in the startup configuration file. Clearing the Startup Configuration (CLI) You can clear the configuration information from the startup configuration. If you reboot the switch with no startup configuration, the switch enters the Setup command facility so that you can configure the switch from scratch. To clear the contents of your startup configuration, complete the task in this section: SUMMARY STEPS 1. enable 2. erase nvram DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable erase nvram Example: Switch# erase nvram Clears the contents of your startup configuration. Note For all platforms except the Class A Flash file system platforms, this command erases NVRAM. The startup configuration file cannot be restored once it has been deleted. On Class A Flash file system platforms, when you use the erase startup-config EXEC command, the switch erases or deletes the configuration pointed to by the CONFIG_FILE environment variable. If this variable points to NVRAM, the switch erases NVRAM. If the CONFIG_FILE environment variable specifies a flash memory device and configuration filename, the switch deletes the configuration file. That is, the switch marks the file as "deleted," rather than erasing it. This feature allows you to recover a deleted file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2024 System Management Deleting a Specified Configuration File (CLI) Deleting a Specified Configuration File (CLI) To delete a specified configuration on a specific flash device, complete the task in this section: SUMMARY STEPS 1. enable 2. delete flash-filesystem:filename DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable delete flash-filesystem:filename Example: Switch# delete usbflash0:myconfig Deletes the specified configuration file on the specified flash device. Note On Class A and B Flash file systems, when you delete a specific file in flash memory, the system marks the file as deleted, allowing you to later recover a deleted file using the undelete EXEC command. Erased files cannot be recovered. To permanently erase the configuration file, use the squeeze EXEC command. On Class C Flash file systems, you cannot recover a file that has been deleted. If you attempt to erase or delete the configuration file specified by the CONFIG_FILE environment variable, the system prompts you to confirm the deletion. Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI) On Class A flash file systems, you can configure the Cisco IOS software to load the startup configuration file specified by the CONFIG_FILE environment variable. The CONFIG_FILE variable defaults to NVRAM. To change the CONFIG_FILE environment variable, complete the tasks in this section: SUMMARY STEPS 1. enable 2. copy [flash-url | ftp-url | rcp-url | tftp-url | system:running-config | nvram:startup-config] dest-flash-url 3. configure terminal 4. boot config dest-flash-url 5. end 6. copy system:running-config nvram:startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2025 Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI) System Management 7. show boot DETAILED STEPS Step 1 Command or Action enable Example: Step 2 Switch> enable copy [flash-url | ftp-url | rcp-url | tftp-url | system:running-config | nvram:startup-config] dest-flash-url Example: Step 3 Switch# copy system:running-config nvram:startup-config configure terminal Example: Step 4 Switch# configure terminal boot config dest-flash-url Example: Step 5 Switch(config)# boot config 172.16.1.1 end Example: Step 6 Switch(config)# end copy system:running-config nvram:startup-config Example: Step 7 Switch# copy system:running-config nvram:startup-config show boot Example: Switch# show boot Purpose Enables privileged EXEC mode. · Enter your password if prompted. Copies the configuration file to the flash file system from which the switch loads the file on restart. Enters global configuration mode. Sets the CONFIG_FILE environment variable. This step modifies the runtime CONFIG_FILE environment variable. Exits global configuration mode. Saves the configuration performed in Step 3 to the startup configuration. (Optional) Allows you to verify the contents of the CONFIG_FILE environment variable. Examples The following example copies the running configuration file to the switch. This configuration is then used as the startup configuration when the system is restarted: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2026 System Management What to Do Next Switch# copy system:running-config usbflash0:config2 Switch# configure terminal Switch(config)# boot config usbflash0:config2 Switch(config)# end Switch# copy system:running-config nvram:startup-config [ok] Switch# show boot BOOT variable = usbflash0:rsp-boot-m CONFIG_FILE variable = nvram: Current CONFIG_FILE variable = usbflash0:config2 Configuration register is 0x010F What to Do Next After you specify a location for the startup configuration file, the nvram:startup-config command is aliased to the new location of the startup configuration file. The more nvram:startup-config EXEC command displays the startup configuration, regardless of its location. The erase nvram:startup-config EXEC command erases the contents of NVRAM and deletes the file pointed to by the CONFIG_FILE environment variable. When you save the configuration using the copy system:running-config nvram:startup-config command, the switch saves a complete version of the configuration file to the location specified by the CONFIG_FILE environment variable and a distilled version to NVRAM. A distilled version is one that does not contain access list information. If NVRAM contains a complete configuration file, the switch prompts you to confirm your overwrite of the complete version with the distilled version. If NVRAM contains a distilled configuration, the switch does not prompt you for confirmation and proceeds with overwriting the existing distilled configuration file in NVRAM. Note If you specify a file in a flash device as the CONFIG_FILE environment variable, every time you save your configuration file with the copy system:running-config nvram:startup-config command, the old configuration file is marked as "deleted," and the new configuration file is saved to that device. Eventually, Flash memory fills up as the old configuration files still take up memory. Use the squeeze EXEC command to permanently delete the old configuration files and reclaim the space. Configuring the Switch to Download Configuration Files You can specify an ordered list of network configuration and host configuration filenames. The Cisco IOS XE software scans this list until it loads the appropriate network or host configuration file. To configure the switch to download configuration files at system startup, perform at least one of the tasks described in the following sections: · Configuring the Switch to Download the Network Configuration File (CLI) · Configuring the Switch to Download the Host Configuration File (CLI) If the switch fails to load a configuration file during startup, it tries again every 10 minutes (the default setting) until a host provides the requested files. With each failed attempt, the switch displays the following message on the console terminal: Booting host-confg... [timed out] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2027 Configuring the Switch to Download the Network Configuration File (CLI) System Management If there are any problems with the startup configuration file, or if the configuration register is set to ignore NVRAM, the switch enters the Setup command facility. Configuring the Switch to Download the Network Configuration File (CLI) To configure the Cisco IOS software to download a network configuration file from a server at startup, complete the tasks in this section: SUMMARY STEPS 1. enable 2. configure terminal 3. boot network {ftp:[[[//[username [:password ]@]location ]/directory ]/filename ] | rcp:[[[//[username@]location ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ]} 4. service config 5. end 6. copy system:running-config nvram:startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable configure terminal Example: Enters global configuration mode. Step 3 Switch# configure terminal boot network {ftp:[[[//[username [:password ]@]location Specifies the network configuration file to download at ]/directory ]/filename ] | rcp:[[[//[username@]location startup, and the protocol to be used (TFTP, RCP, or FTP). ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ]} · If you do not specify a network configuration filename, the Cisco IOS software uses the default filename Example: network-confg. If you omit the address, the switch uses the broadcast address. Switch(config)# boot network tftp:hostfile1 · You can specify more than one network configuration file. The software tries them in order entered until it loads one. This procedure can be useful for keeping files with different configuration information loaded on a network server. Step 4 service config Example: Enables the system to automatically load the network file on restart. Switch(config)# service config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2028 System Management Configuring the Switch to Download the Host Configuration File (CLI) Step 5 Step 6 Command or Action end Example: Switch(config)# end copy system:running-config nvram:startup-config Example: Switch# copy system:running-config nvram:startup-config Purpose Exits global configuration mode. Saves the running configuration to the startup configuration file. Configuring the Switch to Download the Host Configuration File (CLI) To configure the Cisco IOS software to download a host configuration file from a server at startup, complete the tasks in this section: SUMMARY STEPS 1. enable 2. configure terminal 3. boot host {ftp:[[[//[username [:password ]@]location ]/directory ]/filename ] | rcp:[[[//[username@]location ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ] } 4. service config 5. end 6. copy system:running-config nvram:startup-config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable configure terminal Example: Enters global configuration mode. Step 3 Switch# configure terminal boot host {ftp:[[[//[username [:password ]@]location ]/directory ]/filename ] | rcp:[[[//[username@]location ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ] } Example: Switch(config)# boot host tftp:hostfile1 Specifies the host configuration file to download at startup, and the protocol to be used (FTP, RCP, or TFTP): · If you do not specify a host configuration filename, the switch uses its own name to form a host configuration filename by converting the name to all lowercase letters, removing all domain information, and appending "-confg." If no host name information Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2029 Additional References System Management Command or Action Step 4 Step 5 Step 6 service config Example: Switch(config)# service config end Example: Switch(config)# end copy system:running-config nvram:startup-config Example: Switch# copy system:running-config nvram:startup-config Purpose is available, the software uses the default host configuration filename switch-confg. If you omit the address, the switch uses the broadcast address. · You can specify more than one host configuration file. The Cisco IOS software tries them in order entered until it loads one. This procedure can be useful for keeping files with different configuration information loaded on a network server. Enables the system to automatically load the host file upon restart. Exits global configuration mode. Saves the running configuration to the startup configuration file. Example In the following example, a switch is configured to download the host configuration file named hostfile1 and the network configuration file named networkfile1. The switch uses TFTP and the broadcast address to obtain the file: Switch# configure terminal Switch(config)# boot host tftp:hostfile1 Switch(config)# boot network tftp:networkfile1 Switch(config)# service config Switch(config)# end Switch# copy system:running-config nvram:startup-config Additional References Related Documents Related Topic Cisco IOS commands Document Title Cisco IOS Master Commands List, All Releases Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2030 System Management Additional References Related Topic Document Title Cisco IOS configuration commands Cisco IOS Configuration Fundamentals Command Reference Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards Standard Title No new or modified standards are supported, and support for existing standards has not been modified -- MIBs MIB MIBs Link · No new or modified MIBs are supported, To locate and download MIBs for selected platforms, Cisco and support for existing MIBs has not software releases, and feature sets, use Cisco MIB Locator been modified. found at the following URL: http://www.cisco.com/go/mibs RFCs RFC Title No new or modified RFCs are supported, and support for existing RFCs has not been modified. -- Technical Assistance Description Link The Cisco Support and Documentation website provides http://www.cisco.com/cisco/web/support/index.html online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2031 Additional References System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2032 1 0 3 C H A P T E R Configuration Replace and Configuration Rollback · Prerequisites for Configuration Replace and Configuration Rollback, on page 2033 · Restrictions for Configuration Replace and Configuration Rollback, on page 2034 · Information About Configuration Replace and Configuration Rollback, on page 2034 · How to Use Configuration Replace and Configuration Rollback, on page 2037 · Configuration Examples for Configuration Replace and Configuration Rollback, on page 2043 · Additional References, on page 2045 Prerequisites for Configuration Replace and Configuration Rollback The format of the configuration files used as input by the Configuration Replace and Configuration Rollback feature must comply with standard Cisco software configuration file indentation rules as follows: · Start all commands on a new line with no indentation, unless the command is within a configuration submode. · Indent commands within a first-level configuration submode one space. · Indent commands within a second-level configuration submode two spaces. · Indent commands within subsequent submodes accordingly. These indentation rules describe how the software creates configuration files for such commands as show running-config or copy running-config destination-url. Any configuration file generated on a Cisco device complies with these rules. Free memory larger than the combined size of the two configuration files (the current running configuration and the saved replacement configuration) is required. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2033 Restrictions for Configuration Replace and Configuration Rollback System Management Restrictions for Configuration Replace and Configuration Rollback If the device does not have free memory larger than the combined size of the two configuration files (the current running configuration and the saved replacement configuration), the configuration replace operation is not performed. Certain Cisco configuration commands such as those pertaining to physical components of a networking device (for example, physical interfaces) cannot be added or removed from the running configuration. For example, a configuration replace operation cannot remove the interface ethernet 0 command line from the current running configuration if that interface is physically present on the device. Similarly, the interface ethernet 1 command line cannot be added to the running configuration if no such interface is physically present on the device. A configuration replace operation that attempts to perform these types of changes results in error messages indicating that these specific command lines failed. In very rare cases, certain Cisco configuration commands cannot be removed from the running configuration without reloading the device. A configuration replace operation that attempts to remove this type of command results in error messages indicating that these specific command lines failed. Information About Configuration Replace and Configuration Rollback Configuration Archive The Cisco IOS configuration archive is intended to provide a mechanism to store, organize, and manage an archive of Cisco IOS configuration files to enhance the configuration rollback capability provided by the configure replace command. Before this feature was introduced, you could save copies of the running configuration using the copy running-config destination-url command, storing the replacement file either locally or remotely. However, this method lacked any automated file management. On the other hand, the Configuration Replace and Configuration Rollback feature provides the capability to automatically save copies of the running configuration to the Cisco IOS configuration archive. These archived files serve as checkpoint configuration references and can be used by the configure replace command to revert to previous configuration states. The archive config command allows you to save Cisco IOS configurations in the configuration archive using a standard location and filename prefix that is automatically appended with an incremental version number (and optional timestamp) as each consecutive file is saved. This functionality provides a means for consistent identification of saved Cisco IOS configuration files. You can specify how many versions of the running configuration are kept in the archive. After the maximum number of files are saved in the archive, the oldest file is automatically deleted when the next, most recent file is saved. The show archive command displays information for all configuration files saved in the Cisco IOS configuration archive. The Cisco IOS configuration archive, in which the configuration files are stored and available for use with the configure replace command, can be located on the following file systems: FTP, HTTP, RCP, TFTP. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2034 System Management Configuration Replace Configuration Replace The configure replace privileged EXEC command provides the capability to replace the current running configuration with any saved Cisco IOS configuration file. This functionality can be used to revert to a previous configuration state, effectively rolling back any configuration changes that were made since the previous configuration state was saved. When using the configure replace command, you must specify a saved Cisco IOS configuration as the replacement configuration file for the current running configuration. The replacement file must be a complete configuration generated by a Cisco IOS device (for example, a configuration generated by the copy running-config destination-url command), or, if generated externally, the replacement file must comply with the format of files generated by Cisco IOS devices. When the configure replace command is entered, the current running configuration is compared with the specified replacement configuration and a set of diffs is generated. The algorithm used to compare the two files is the same as that employed by the show archive config differences command. The resulting diffs are then applied by the Cisco IOS parser to achieve the replacement configuration state. Only the diffs are applied, avoiding potential service disruption from reapplying configuration commands that already exist in the current running configuration. This algorithm effectively handles configuration changes to order-dependent commands (such as access lists) through a multiple pass process. Under normal circumstances, no more than three passes are needed to complete a configuration replace operation, and a limit of five passes is performed to preclude any looping behavior. The Cisco IOS copy source-url running-config privileged EXEC command is often used to copy a stored Cisco IOS configuration file to the running configuration. When using the copy source-url running-config command as an alternative to the configure replace target-url privileged EXEC command, the following major differences should be noted: · The copy source-url running-config command is a merge operation and preserves all of the commands from both the source file and the current running configuration. This command does not remove commands from the current running configuration that are not present in the source file. In contrast, the configure replace target-url command removes commands from the current running configuration that are not present in the replacement file and adds commands to the current running configuration that need to be added. · The copy source-url running-config command applies every command in the source file, whether or not the command is already present in the current running configuration. This algorithm is inefficient and, in some cases, can result in service outages. In contrast, the configure replace target-url command only applies the commands that need to be applied--no existing commands in the current running configuration are reapplied. · A partial configuration file may be used as the source file for the copy source-url running-config command, whereas a complete Cisco IOS configuration file must be used as the replacement file for the configure replace target-url command. A locking feature for the configuration replace operation was introduced. When the configure replace command is used, the running configuration file is locked by default for the duration of the configuration replace operation. This locking mechanism prevents other users from changing the running configuration while the replacement operation is taking place, which might otherwise cause the replacement operation to terminate unsuccessfully. You can disable the locking of the running configuration by using the no lock keyword when issuing the configure replace command. The running configuration lock is automatically cleared at the end of the configuration replace operation. You can display any locks that may be currently applied to the running configuration using the show configuration lock command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2035 Configuration Rollback System Management Configuration Rollback The concept of rollback comes from the transactional processing model common to database operations. In a database transaction, you might make a set of changes to a given database table. You then must choose whether to commit the changes (apply the changes permanently) or to roll back the changes (discard the changes and revert to the previous state of the table). In this context, rollback means that a journal file containing a log of the changes is discarded, and no changes are applied. The result of the rollback operation is to revert to the previous state, before any changes were applied. The configure replace command allows you to revert to a previous configuration state, effectively rolling back changes that were made since the previous configuration state was saved. Instead of basing the rollback operation on a specific set of changes that were applied, the Cisco IOS configuration rollback capability uses the concept of reverting to a specific configuration state based on a saved Cisco IOS configuration file. This concept is similar to the database idea of saving a checkpoint (a saved version of the database) to preserve a specific state. If the configuration rollback capability is desired, you must save the Cisco IOS running configuration before making any configuration changes. Then, after entering configuration changes, you can use that saved configuration file to roll back the changes (using the configure replace target-url command). Furthermore, because you can specify any saved Cisco IOS configuration file as the replacement configuration, you are not limited to a fixed number of rollbacks, as is the case in some rollback models. Configuration Rollback Confirmed Change The Configuration Rollback Confirmed Change feature allows configuration changes to be performed with an optional requirement that they be confirmed. If this confirmation is not received, the configuration is returned to the state prior to the changes being applied. The mechanism provides a safeguard against inadvertent loss of connectivity between a network device and the user or management application due to configuration changes. Benefits of Configuration Replace and Configuration Rollback · Allows you to revert to a previous configuration state, effectively rolling back configuration changes. · Allows you to replace the current running configuration file with the startup configuration file without having to reload the switch or manually undo CLI changes to the running configuration file, therefore reducing system downtime. · Allows you to revert to any saved Cisco IOS configuration state. · Simplifies configuration changes by allowing you to apply a complete configuration file to the switch, where only the commands that need to be added or removed are affected. · When using the configure replace command as an alternative to the copy source-url running-config command, increases efficiency and prevents risk of service outages by not reapplying existing commands in the current running configuration. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2036 System Management How to Use Configuration Replace and Configuration Rollback How to Use Configuration Replace and Configuration Rollback Creating a Configuration Archive (CLI) No prerequisite configuration is needed to use the configure replace command. Using the configure replace command in conjunction with the Cisco IOS configuration archive and the archive config command is optional but offers significant benefit for configuration rollback scenarios. Before using the archive config command, the configuration archive must be configured. Perform this task to configure the characteristics of the configuration archive. SUMMARY STEPS 1. enable 2. configure terminal 3. archive 4. path url 5. maximum number 6. time-period minutes 7. end 8. archive config DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable configure terminal Example: Enters global configuration mode. Step 3 Switch# configure terminal archive Example: Enters archive configuration mode. Step 4 Switch(config)# archive path url Example: Specifies the location and filename prefix for the files in the Cisco IOS configuration archive. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2037 Creating a Configuration Archive (CLI) System Management Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Note Switch(config-archive)# path flash:myconfiguration If a directory is specified in the path instead of file, the directory name must be followed by a forward slash as follows: path flash:/directory/. The forward slash is not necessary after a filename; it is only necessary when specifying a directory. maximum number Example: Switch(config-archive)# maximum 14 (Optional) Sets the maximum number of archive files of the running configuration to be saved in the Cisco IOS configuration archive. · The number argument is the maximum number of archive files of the running configuration to be saved in the Cisco IOS configuration archive. Valid values are from 1 to 14. The default is 10. Note Before using this command, you must configure the path command to specify the location and filename prefix for the files in the Cisco IOS configuration archive. time-period minutes Example: Switch(config-archive)# time-period 1440 (Optional) Sets the time increment for automatically saving an archive file of the current running configuration in the Cisco IOS configuration archive. · The minutes argument specifies how often, in minutes, to automatically save an archive file of the current running configuration in the Cisco IOS configuration archive. Note Before using this command, you must configure the path command to specify the location and filename prefix for the files in the Cisco IOS configuration archive. end Example: Switch(config-archive)# end archive config Example: Switch# archive config Exits to privileged EXEC mode. Saves the current running configuration file to the configuration archive. Note The path command must be configured before using this command. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2038 System Management Performing a Configuration Replace or Configuration Rollback Operation (CLI) Performing a Configuration Replace or Configuration Rollback Operation (CLI) Perform this task to replace the current running configuration file with a saved Cisco IOS configuration file. Note You must create a configuration archive before performing this procedure. See Creating a Configuration Archive (CLI) for detailed steps. The following procedure details how to return to that archived configuration in the event of a problem with the current running configuration. SUMMARY STEPS 1. enable 2. configure replace target-url [nolock] [list] [force] [ignore case] [revert trigger [error ][timer minutes] | time minutes] ] 3. configure revert { now | timer {minutes | idle minutes} } 4. configure confirm 5. exit DETAILED STEPS Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 Switch> enable configure replace target-url [nolock] [list] [force] [ignore Replaces the current running configuration file with a saved case] [revert trigger [error ][timer minutes] | time Cisco IOS configuration file. minutes] ] · The target - url argument is a URL (accessible by the Example: Cisco IOS file system) of the saved Cisco IOS configuration file that is to replace the current running Switch# configure replace flash: startup-config configuration, such as the configuration file created time 120 using the archive config command. · The list keyword displays a list of the command lines applied by the Cisco IOS software parser during each pass of the configuration replace operation. The total number of passes performed is also displayed. · The force keyword replaces the current running configuration file with the specified saved Cisco IOS configuration file without prompting you for confirmation. · The time minutes keyword and argument specify the time (in minutes) within which you must enter the configure confirm command to confirm replacement of the current running configuration file. If the configure confirm command is not entered within the Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2039 Performing a Configuration Replace or Configuration Rollback Operation (CLI) System Management Step 3 Step 4 Step 5 Command or Action Purpose specified time limit, the configuration replace operation is automatically reversed (in other words, the current running configuration file is restored to the configuration state that existed prior to entering the configure replace command). · The nolock keyword disables the locking of the running configuration file that prevents other users from changing the running configuration during a configuration replace operation. · The revert trigger keywords set the following triggers for reverting to the original configuration: · error --Reverts to the original configuration upon error. · timer minutes --Reverts to the original configuration if specified time elapses. · The ignore case keyword allows the configuration to ignore the case of the confirmation command. configure revert { now | timer {minutes | idle minutes} } Example: (Optional) To cancel the timed rollback and trigger the rollback immediately, or to reset parameters for the timed rollback, use the configure revertcommand in privileged EXEC mode. Switch# configure revert now · now --Triggers the rollback immediately. · timer --Resets the configuration revert timer. · Use the minutes argument with the timer keyword to specify a new revert time in minutes. · Use the idle keyword along with a time in minutes to set the maximum allowable time period of no activity before reverting to the saved configuration. configure confirm Example: Switch# configure confirm (Optional) Confirms replacement of the current running configuration file with a saved Cisco IOS configuration file. Note Use this command only if the time seconds keyword and argument of the configure replace command are specified. exit Example: Exits to user EXEC mode. Switch# exit Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2040 System Management Monitoring and Troubleshooting the Feature (CLI) Monitoring and Troubleshooting the Feature (CLI) Perform this task to monitor and troubleshoot the Configuration Replace and Configuration Rollback feature. SUMMARY STEPS 1. enable 2. show archive 3. debug archive versioning 4. debug archive config timestamp 5. exit DETAILED STEPS Step 1 Step 2 enable Use this command to enable privileged EXEC mode. Enter your password if prompted. Example: Switch> enable Switch# show archive Use this command to display information about the files saved in the Cisco IOS configuration archive. Example: Switch# show archive There are currently 1 archive configurations saved. The next archive file will be named flash:myconfiguration-2 Archive # Name 0 1 flash:myconfiguration-1 <- Most Recent 2 3 4 5 6 7 8 9 10 11 12 13 14 The following is sample output from the show archive command after several archive files of the running configuration have been saved. In this example, the maximum number of archive files to be saved is set to three. Example: Switch# show archive There are currently 3 archive configurations saved. The next archive file will be named flash:myconfiguration-8 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2041 Monitoring and Troubleshooting the Feature (CLI) System Management Step 3 Step 4 Step 5 Archive # Name 0 1 :Deleted 2 :Deleted 3 :Deleted 4 :Deleted 5 flash:myconfiguration-5 6 flash:myconfiguration-6 7 flash:myconfiguration-7 <- Most Recent 8 9 10 11 12 13 14 debug archive versioning Use this command to enable debugging of the Cisco IOS configuration archive activities to help monitor and troubleshoot configuration replace and rollback. Example: Switch# debug archive versioning Jan 9 06:46:28.419:backup_running_config Jan 9 06:46:28.419:Current = 7 Jan 9 06:46:28.443:Writing backup file flash:myconfiguration-7 Jan 9 06:46:29.547: backup worked debug archive config timestamp Use this command to enable debugging of the processing time for each integral step of a configuration replace operation and the size of the configuration files being handled. Example: Switch# debug archive config timestamp Switch# configure replace flash:myconfiguration force Timing Debug Statistics for IOS Config Replace operation: Time to read file usbflash0:sample_2.cfg = 0 msec (0 sec) Number of lines read:55 Size of file :1054 Starting Pass 1 Time to read file system:running-config = 0 msec (0 sec) Number of lines read:93 Size of file :2539 Time taken for positive rollback pass = 320 msec (0 sec) Time taken for negative rollback pass = 0 msec (0 sec) Time taken for negative incremental diffs pass = 59 msec (0 sec) Time taken by PI to apply changes = 0 msec (0 sec) Time taken for Pass 1 = 380 msec (0 sec) Starting Pass 2 Time to read file system:running-config = 0 msec (0 sec) Number of lines read:55 Size of file :1054 Time taken for positive rollback pass = 0 msec (0 sec) Time taken for negative rollback pass = 0 msec (0 sec) Time taken for Pass 2 = 0 msec (0 sec) Total number of passes:1 Rollback Done exit Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2042 System Management Configuration Examples for Configuration Replace and Configuration Rollback Use this command to exit to user EXEC mode. Example: Switch# exit Switch> Configuration Examples for Configuration Replace and Configuration Rollback Creating a Configuration Archive The following example shows how to perform the initial configuration of the Cisco IOS configuration archive. In this example, flash:myconfiguration is specified as the location and filename prefix for the files in the configuration archive and a value of 10 is set as the maximum number of archive files to be saved. configure terminal ! archive path flash:myconfiguration maximum 10 end Replacing the Current Running Configuration with a Saved Cisco IOS Configuration File The following example shows how to replace the current running configuration with a saved Cisco IOS configuration file named flash:myconfiguration. The configure replace command interactively prompts you to confirm the operation. Switch# configure replace flash:myconfiguration This will apply all necessary additions and deletions to replace the current running configuration with the contents of the specified configuration file, which is assumed to be a complete configuration, not a partial configuration. Enter Y if you are sure you want to proceed. ? [no]: Y Total number of passes: 1 Rollback Done In the following example, the list keyword is specified in order to display the command lines that were applied during the configuration replace operation: Switch# configure replace flash:myconfiguration list This will apply all necessary additions and deletions to replace the current running configuration with the contents of the specified configuration file, which is assumed to be a complete configuration, not a partial configuration. Enter Y if you are sure you want to proceed. ? [no]: Y Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2043 Reverting to the Startup Configuration File System Management !Pass 1 !List of Commands: no snmp-server community public ro snmp-server community mystring ro end Total number of passes: 1 Rollback Done Reverting to the Startup Configuration File The following example shows how to revert to the Cisco IOS startup configuration file using the configure replace command. This example also shows the use of the optional force keyword to override the interactive user prompt: Switch# configure replace flash:startup-config force Total number of passes: 1 Rollback Done Performing a Configuration Replace Operation with the configure confirm Command The following example shows the use of the configure replace command with the time minutes keyword and argument. You must enter the configure confirm command within the specified time limit to confirm replacement of the current running configuration file. If the configure confirm command is not entered within the specified time limit, the configuration replace operation is automatically reversed (in other words, the current running configuration file is restored to the configuration state that existed prior to entering the configure replace command). Switch# configure replace flash:startup-config time 120 This will apply all necessary additions and deletions to replace the current running configuration with the contents of the specified configuration file, which is assumed to be a complete configuration, not a partial configuration. Enter Y if you are sure you want to proceed. ? [no]: Y Total number of passes: 1 Rollback Done Switch# configure confirm The following example shows the use of the configure revert command with the timer keyword. You must enter the configure revert command to cancel the timed rollback and trigger the rollback immediately, or to reset parameters for the timed rollback. Switch# configure revert timer 100 Performing a Configuration Rollback Operation The following example shows how to make changes to the current running configuration and then roll back the changes. As part of the configuration rollback operation, you must save the current running configuration before making changes to the file. In this example, the archive config command is used to save the current running configuration. The generated output of the configure replace command indicates that only one pass was performed to complete the rollback operation. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2044 System Management Additional References Note Before using the archive config command, you must configure the path command to specify the location and filename prefix for the files in the Cisco IOS configuration archive. You first save the current running configuration in the configuration archive as follows: archive config You then enter configuration changes as shown in the following example: configure terminal ! user netops2 password rain user netops3 password snow exit After having made changes to the running configuration file, assume you now want to roll back these changes and revert to the configuration that existed before the changes were made. The show archive command is used to verify the version of the configuration to be used as a replacement file. The configure replace command is then used to revert to the replacement configuration file as shown in the following example: Switch# show archive There are currently 1 archive configurations saved. The next archive file will be named flash:myconfiguration-2 Archive # Name 0 1 flash:myconfiguration-1 <- Most Recent 2 3 4 5 6 7 8 9 10 Switch# configure replace flash:myconfiguration-1 Total number of passes: 1 Rollback Done Additional References Related Documents Related Topic Configuration Locking Commands for managing configuration files Document Title Exclusive Configuration Change Access and Access Session Locking Cisco IOS Configuration Fundamentals Command Reference Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2045 Additional References System Management Related Topic Document Title Information about managing configuration files Managing Configuration Files Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards Standards Title No new or modified standards are supported by this feature, and support for existing standards has not -been modified by this feature. MIBs MIBs MIBs Link No new or modified MIBs are supported by this To locate and download MIBs for selected platforms, Cisco feature, and support for existing MIBs has not IOS releases, and feature sets, use Cisco MIB Locator been modified by this feature. found at the following URL: http://www.cisco.com/go/mibs RFCs RFCs Title No new or modified RFCs are supported by this feature, and support for existing RFCs has not been -modified by this feature. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2046 System Management Additional References Technical Assistance Description Link The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. http://www.cisco.com/cisco/web/support/index.html To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2047 Additional References System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2048 1 0 4 C H A P T E R Working with the Flash File System · Information About the Flash File System, on page 2049 · Displaying Available File Systems, on page 2049 · Setting the Default File System, on page 2052 · Displaying Information About Files on a File System, on page 2052 · Changing Directories and Displaying the Working Directory (CLI), on page 2053 · Creating Directories (CLI), on page 2054 · Copying Files, on page 2055 · Creating, Displaying and Extracting Files (CLI), on page 2057 · Additional References, on page 2059 Information About the Flash File System The flash file system is a single flash device on which you can store files. It also provides several commands to help you manage software bundles and configuration files. The default flash file system on the switch is named flash:. As viewed from the active switch, or any stack member, flash: refers to the local flash device, which is the device attached to the same switch on which the file system is being viewed. In a switch stack, each of the flash devices from the various stack members can be viewed from the active switch. The names of these flash file systems include the corresponding switch member numbers. For example, flash-3:, as viewed from the active switch, refers to the same file system as does flash: on stack member 3. Use the show file systems privileged EXEC command to list all file systems, including the flash file systems in the switch stack. Only one user at a time can manage the software bundles and configuration files for a switch stack. Displaying Available File Systems To display the available file systems on your switch, use the show file systems privileged EXEC command as shown in this example for a standalone switch: Switch# show file systems File Systems: Size(b) Free(b) * 15998976 5135872 - - - - Type flash opaque opaque Flags rw rw rw Prefixes flash: bs: vb: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2049 Displaying Available File Systems System Management 524288 - 520138 nvram rw nvram: - network rw tftp: - opaque rw null: - opaque rw system: - opaque ro xmodem: - opaque ro ymodem: This example shows a switch stack. In this example, the active switch is stack member 1; the file system on stack member 2 is displayed as flash-2:, the file system on stack member 3 is displayed as flash-3: and so on up to stack member 9, displayed as flash-9: for a 9-member stack. The example also shows the crashinfo directories and a USB flash drive plugged into the active switch: Switch# show file systems File Systems: Size(b) Free(b) 145898496 5479424 248512512 85983232 146014208 17301504 146014208 0 146014208 1572864 248512512 30932992 146014208 6291456 146276352 15728640 146276352 73400320 * 741621760 481730560 1622147072 1360527360 729546752 469762048 729546752 469762048 729546752 469762048 1622147072 1340604416 729546752 469762048 1749549056 1487929344 1749549056 1487929344 0 0 - - - - - - - - - - - - - - - - - - 0 0 - - - - 2097152 2055643 - - - - - - - - 2097152 2055643 - - - - - - - - - - - - - - - - Type disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk opaque opaque nvram nvram opaque opaque network nvram opaque network network network network network opaque opaque Flags rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw ro rw rw rw rw rw ro rw rw wo rw rw rw rw rw ro rw Prefixes crashinfo:crashinfo-1: crashinfo-2:stby-crashinfo: crashinfo-3: crashinfo-4: crashinfo-5: crashinfo-6: crashinfo-7: crashinfo-8: crashinfo-9: flash:flash-1: flash-2:stby-flash: flash-3: flash-4: flash-5: flash-6: flash-7: flash-8: flash-9: unix: usbflash0:usbflash0-1: usbflash0-2: stby-usbflash0: usbflash0-3: usbflash0-4: usbflash0-5: usbflash0-6: usbflash0-7: usbflash0-8: usbflash0-9: webui: system: tmpsys: stby-nvram: stby-rcsf: null: tar: tftp: nvram: syslog: rcp: http: ftp: scp: https: cns: revrcsf: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2050 System Management Displaying Available File Systems Table 184: show file systems Field Descriptions Field Size(b) Free(b) Type Flags Value Amount of memory in the file system in bytes. Amount of free memory in the file system in bytes. Type of file system. disk--The file system is for a flash memory device, USB flash, and crashinfo file. network--The file system for network devices; for example, an FTP server or and HTTP server. nvram--The file system is for a NVRAM device. opaque--The file system is a locally generated pseudo file system (for example, the system) or a download interface, such as brimux. unknown--The file system is an unknown type. Permission for file system. ro--read-only. rw--read/write. wo--write-only. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2051 Setting the Default File System System Management Field Prefixes Value Alias for file system. crashinfo:--Crashinfo file. flash:--Flash file system. ftp:--FTP server. http:--HTTP server. https:--Secure HTTP server. nvram:--NVRAM. null:--Null destination for copies. You can copy a remote file to null to find its size. rcp:--Remote Copy Protocol (RCP) server. scp:--Session Control Protocol (SCP) server. system:--Contains the system memory, including the running configuration. tftp:--TFTP network server. usbflash0:--USB flash memory. xmodem:--Obtain the file from a network machine by using the Xmodem protocol. ymodem:--Obtain the file from a network machine by using the Ymodem protocol. Setting the Default File System You can specify the file system or directory that the system uses as the default file system by using the cd filesystem: privileged EXEC command. You can set the default file system to omit the filesystem: argument from related commands. For example, for all privileged EXEC commands that have the optional filesystem: argument, the system uses the file system specified by the cd command. By default, the default file system is flash:. You can display the current default file system as specified by the cd command by using the pwd privileged EXEC command. Displaying Information About Files on a File System You can view a list of the contents of a file system before manipulating its contents. For example, before copying a new configuration file to flash memory, you might want to verify that the file system does not already contain a configuration file with the same name. Similarly, before copying a flash configuration file to another location, you might want to verify its filename for use in another command. To display information about files on a file system, use one of the privileged EXEC commands listed in the following table. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2052 System Management Changing Directories and Displaying the Working Directory (CLI) Table 185: Commands for Displaying Information About Files Command dir [/all] [filesystem:filename] show file systems show file information file-url show file descriptors Description Displays a list of files on a file system. Displays more information about each of the files on a file system. Displays information about a specific file. Displays a list of open file descriptors. File descriptors are the internal representations of open files. You can use this command to see if another user has a file open. For example, to display a list of all files in a file system, use the dir privileged EXEC command: switch# dir flash: Directory of flash:/ 7386 -rwx 2097152 Jan 23 2013 14:06:49 +00:00 nvram_config 7378 drwx 4096 Jan 23 2013 09:35:11 +00:00 mnt 7385 -rw- 221775876 Jan 23 2013 14:15:13 +00:00 cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin 7389 -rwx 556 Jan 21 2013 20:47:30 +00:00 vlan.dat 712413184 bytes total (445063168 bytes free) switch# Changing Directories and Displaying the Working Directory (CLI) Beginning in privileged EXEC mode, follow these steps to change directories and to display the working directory: SUMMARY STEPS 1. dir filesystem: 2. cd directory_name 3. pwd 4. cd DETAILED STEPS Step 1 Command or Action dir filesystem: Example: Switch# dir flash: Purpose Displays the directories on the specified file system. For filesystem:, use flash: for the system board flash device. To access flash partitions of switch members in a stack, use flash-n where n is the stack member number. For example, flash-4. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2053 Creating Directories (CLI) System Management Step 2 Step 3 Step 4 Command or Action cd directory_name Example: Switch# cd new_configs pwd Example: Switch# pwd cd Example: Switch# cd Purpose Navigates to the specified directory. The command example shows how to navigate to the directory named new_configs. Displays the working directory. Navigates to the default directory. Creating Directories (CLI) Beginning in privileged EXEC mode, follow these steps to create a directory: SUMMARY STEPS 1. dir filesystem: 2. mkdir directory_name 3. dir filesystem: DETAILED STEPS Step 1 Command or Action dir filesystem: Example: Purpose Displays the directories on the specified file system. For filesystem:, use flash: for the system board flash device. Step 2 Step 3 Switch# dir flash: mkdir directory_name Example: Switch# mkdir new_configs dir filesystem: Example: Creates a new directory. Directory names are case sensitive and are limited to 45 characters between the slashes (/); the name cannot contain control characters, spaces, slashes, quotes, semicolons, or colons. Verifies your entry. Switch# dir flash: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2054 System Management Removing Directories Removing Directories To remove a directory with all its files and subdirectories, use the delete /force /recursive filesystem:/file-url privileged EXEC command. Use the /recursive keyword to delete the named directory and all subdirectories and the files contained in it. Use the /force keyword to suppress the prompting that confirms a deletion of each file in the directory. You are prompted only once at the beginning of this deletion process. For filesystem, use flash: for the system board flash device. For file-url, enter the name of the directory to be deleted. All of the files in the directory and the directory are removed. Caution When directories are deleted, their contents cannot be recovered. Copying Files To copy a file from a source to a destination, use the copy source-url destination-url privileged EXEC command. For the source and destination URLs, you can use running-config and startup-config keyword shortcuts. For example, the copy running-config startup-config command saves the currently running configuration file to the NVRAM section of flash memory to be used as the configuration during system initialization. You can also copy from special file systems (xmodem:, ymodem:) as the source for the file from a network machine that uses the Xmodem or Ymodem protocol. Network file system URLs include ftp:, rcp:, and tftp: and have these syntaxes: · FTP--ftp:[[//username [:password]@location]/directory]/filename · RCP--rcp:[[//username@location]/directory]/filename · TFTP--tftp:[[//location]/directory]/filename Local writable file systems include flash:. Some invalid combinations of source and destination exist. Specifically, you cannot copy these combinations: · From a running configuration to a running configuration · From a startup configuration to a startup configuration · From a device to the same device (for example, the copy flash: flash: command is invalid) Copying Files from One Switch in a Stack to Another Switch in the Same Stack To copy a file from one switch in a stack to another switch in the same stack, use the flash-X: notation, where X is the switch number. To view all switches in a stack, use the show switch command in privileged EXEC mode, as in the following example of a 9-member switch stack: Switch# show switch Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2055 Copying Files from One Switch in a Stack to Another Switch in the Same Stack System Management Switch/Stack Mac Address : 0006.f6b9.b580 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State ------------------------------------------------------------ *1 Active 0006.f6b9.b580 15 P3B Ready 2 Standby 0006.f6ba.0c80 14 P3B Ready 3 Member 0006.f6ba.3300 7 P3B Ready 4 Member 0006.f6b9.df80 6 P3B Ready 5 Member 0006.f6ba.3880 13 P1A Ready 6 Member 1ce6.c7b6.ef00 4 PP Ready 7 Member 2037.06ce.2580 3 P2A Ready 8 Member 2037.0653.7e00 2 P5A Ready 9 Member 2037.0653.9280 1 P5B Ready To view all file systems available to copy on a specific switch, use the copy command as in the following example of a 5-member stack: Switch# copy flash: ? crashinfo-1: Copy to crashinfo-1: file system crashinfo-2: Copy to crashinfo-2: file system crashinfo-3: Copy to crashinfo-3: file system crashinfo-4: Copy to crashinfo-4: file system crashinfo-5: Copy to crashinfo-5: file system crashinfo: Copy to crashinfo: file system flash-1: Copy to flash-1: file system flash-2: Copy to flash-2: file system flash-3: Copy to flash-3: file system flash-4: Copy to flash-4: file system flash-5: Copy to flash-5: file system flash: Copy to flash: file system ftp: Copy to ftp: file system http: Copy to http: file system https: Copy to https: file system null: Copy to null: file system nvram: Copy to nvram: file system rcp: Copy to rcp: file system revrcsf: Copy to revrcsf: file system running-config Update (merge with) current system configuration scp: Copy to scp: file system startup-config Copy to startup configuration stby-crashinfo: Copy to stby-crashinfo: file system stby-flash: Copy to stby-flash: file system stby-nvram: Copy to stby-nvram: file system stby-rcsf: Copy to stby-rcsf: file system stby-usbflash0: Copy to stby-usbflash0: file system syslog: Copy to syslog: file system system: Copy to system: file system tftp: Copy to tftp: file system tmpsys: Copy to tmpsys: file system usbflash0-1: Copy to usbflash0-1: file system usbflash0-2: Copy to usbflash0-2: file system usbflash0-3: Copy to usbflash0-3: file system usbflash0-4: Copy to usbflash0-4: file system usbflash0-5: Copy to usbflash0-5: file system usbflash0: Copy to usbflash0: file system Switch# This example shows how to copy a config file stored in the flash partition of switch 2 to the flash partition of switch 4. It assumes that switch 2 and switch 4 are in the same stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2056 System Management Deleting Files Switch# copy flash-2:config.txt flash-4:config.txt Deleting Files When you no longer need a file on a flash memory device, you can permanently delete it. To delete a file or directory from a specified flash device, use the delete [/force] [/recursive] [filesystem:]/file-url privileged EXEC command. Use the /recursive keyword for deleting a directory and all subdirectories and the files contained in it. Use the /force keyword to suppress the prompting that confirms a deletion of each file in the directory. You are prompted only once at the beginning of this deletion process. Use the /force and /recursive keywords for deleting old software images that were installed by using the archive download-sw command but are no longer needed. If you omit the filesystem: option, the switch uses the default device specified by the cd command. For file-url, you specify the path (directory) and the name of the file to be deleted. When you attempt to delete any files, the system prompts you to confirm the deletion. Caution When files are deleted, their contents cannot be recovered. This example shows how to delete the file myconfig from the default flash memory device: Switch# delete myconfig Creating, Displaying and Extracting Files (CLI) You can create a file and write files into it, list the files in a file, and extract the files from a file as described in the next sections. Beginning in privileged EXEC mode, follow these steps to create a file, display the contents, and extract it: SUMMARY STEPS 1. archive tar /create destination-url flash: /file-url 2. archive tar /table source-url 3. archive tar /xtract source-url flash:/file-url [dir/file...] 4. more [ /ascii | /binary | /ebcdic] /file-url DETAILED STEPS Step 1 Command or Action archive tar /create destination-url flash: /file-url Example: switch# archive tar /create tftp:172.20.10.30/saved. flash:/new-configs Purpose Creates a file and adds files to it. For destination-url, specify the destination URL alias for the local or network file system and the name of the file to create: · Local flash file system syntax: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2057 Creating, Displaying and Extracting Files (CLI) System Management Step 2 Step 3 Command or Action archive tar /table source-url Example: switch# archive tar /table flash: /new_configs archive tar /xtract source-url flash:/file-url [dir/file...] Example: switch# archive tar /xtract tftp:/172.20.10.30/saved. flash:/new-configs Purpose flash: · FTP syntax: ftp:[[//username[:password]@location]/directory]/-filename. · RCP syntax: rcp:[[//username@location]/directory]/-filename. · TFTP syntax: tftp:[[//location]/directory]/-filename. For flash:/file-url, specify the location on the local flash file system in which the new file is created. You can also specify an optional list of files or directories within the source directory to add to the new file. If none are specified, all files and directories at this level are written to the newly created file. Displays the contents of a file. For source-url, specify the source URL alias for the local or network file system. The -filename. is the file to display. These options are supported: · Local flash file system syntax: flash: · FTP syntax: ftp:[[//username[:password]@location]/directory]/-filename. · RCP syntax: rcp:[[//username@location]/directory]/-filename. · TFTP syntax: tftp:[[//location]/directory]/-filename. You can also limit the file displays by specifying a list of files or directories after the file. Only those files appear. If none are specified, all files and directories appear. Extracts a file into a directory on the flash file system. For source-url, specify the source URL alias for the local file system. The -filename. is the file from which to extract files. These options are supported: · Local flash file system syntax: flash: · FTP syntax: ftp:[[//username[:password]@location]/directory]/-filename. · RCP syntax: rcp:[[//username@location]/directory]/-filename. · TFTP syntax: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2058 System Management Additional References Command or Action Step 4 more [ /ascii | /binary | /ebcdic] /file-url Example: switch# more flash:/new-configs Purpose tftp:[[//location]/directory]/-filename. For flash:/file-url [dir/file...], specify the location on the local flash file system from which the file is extracted. Use the dir/file... option to specify a list of files or directories within the file to be extracted. If none are specified, all files and directories are extracted. Displays the contents of any readable file, including a file on a remote file system. Additional References Related Documents Related Topic Document Title Commands for managing flash: file systems Cisco IOS Configuration Fundamentals Command Reference Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards Standards Title No new or modified standards are supported by this feature, and support for existing standards has not -been modified by this feature. MIBs MIBs MIBs Link No new or modified MIBs are supported by this To locate and download MIBs for selected platforms, Cisco feature, and support for existing MIBs has not IOS releases, and feature sets, use Cisco MIB Locator been modified by this feature. found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2059 Additional References System Management RFCs RFCs Title No new or modified RFCs are supported by this feature, and support for existing RFCs has not been -modified by this feature. Technical Assistance Description Link The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. http://www.cisco.com/cisco/web/support/index.html To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2060 1 0 5 C H A P T E R Working with Cisco IOS XE Software Bundles · About Software Bundles and Packages, on page 2061 · Bundle and Package File Location on the Switch, on page 2061 · Upgrading Cisco IOS XE Software, on page 2062 · Additional References, on page 2070 About Software Bundles and Packages Cisco IOS XE software bundles include a set of Cisco IOS XE package (.pkg) files. You can install the package files on the switch or you can boot the switch from the IOS XE bundle itself. To display information about the contents of a Cisco IOS XE bundle (.bin file), use the show software package command in privileged EXEC mode. Use the command to display information about an individual IOS XE package (.pkg) file as well. Bundle and Package File Location on the Switch When the switch is running in installed mode, the Cisco IOS XE package (.pkg) files and provisioning file (packages.conf) are stored in the system board flash memory (flash:). When the switch is running in bundle mode, the booted Cisco IOS XE software bundle (.bin) file is stored in the system board flash memory (flash:) or USB flash memory (usbflash0:). To display information about the provisioning software that is currently running on the switch, use the show version privileged EXEC command. In the display, check the line that begins with System bundle file is.... When the switch is running in installed mode, this line displays the name and location of the booted Cisco IOS XE provisioning file, typically flash:packages.conf. When the switch is running in bundle mode, this line displays the name and location of the booted Cisco IOS XE bundle file. To display information about the Cisco IOS XE package files that are running on the switch, use the show version running privileged EXEC command. When the switch is running in installed mode, this command displays information about the set of package files contained in the booted provisioning file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2061 Upgrading Cisco IOS XE Software System Management When the switch is running in bundle mode, this command displays information about the set of package files contained in the booted Cisco IOS XE software bundle. Note For usbflash0:, the default format is FAT16, while FAT32 format is also supported. Switch# format usbflash0: ? FAT16 FAT16 filesystem type FAT32 FAT32 filesystem type Upgrading Cisco IOS XE Software The method that you use to upgrade Cisco IOS XE software depends on whether the switch is running in installed mode or in bundle mode. Upgrading Cisco IOS XE Software: Install Mode To upgrade the Cisco IOS XE software when the switch is running in installed mode, use the software install privileged EXEC command to install the packages from a new software bundle file. The software bundle can be installed from the local storage media or it can be installed over the network using TFTP or FTP. The software install command expands the package files from the specified source bundle file and copies them to the local flash: storage device. When the source bundle is specified as a tftp: or ftp: URL, the bundle file is first downloaded into the switch's memory (RAM); the bundle file is not copied to local storage media. After the package files are expanded and copied to flash: the running provisioning file (flash:packages.conf) is updated to reflect the newly installed packages, and the switch displays a reload prompt. Note The software install command is not supported when the switch is running in bundle mode. Use the software expand privileged EXEC command to convert the switch from bundle mode to installed mode. Upgrading Cisco IOS XE Software Install Mode Example This example shows the software install file command being used to expand and copy the packages from a Cisco IOS XE bundle located on a TFTP server in order to upgrade to a new image: Switch# software install file tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Preparing install operation ... [1]: Downloading file tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin to active switch 1 [1]: Finished downloading file tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin to active switch 1 [1]: Starting install operation [1]: Expanding bundle cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin [1]: Copying package files Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2062 System Management Upgrading Cisco IOS XE Software: Bundle Mode [1]: Package files copied [1]: Finished expanding bundle cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin [1]: Verifying and copying expanded package files to flash: [1]: Verified and copied expanded package files to flash: [1]: Starting compatibility checks [1]: Finished compatibility checks [1]: Starting application pre-installation processing [1]: Finished application pre-installation processing [1]: Old files list: Removed cat3k_caa-base.SSA.03.09.17.EMP.pkg Removed cat3k_caa-drivers.SSA.03.09.17.EMP.pkg Removed cat3k_caa-infra.SSA.03.09.17.EMP.pkg Removed cat3k_caa-iosd-universalk9.SSA.150-9.17.EMP.pkg Removed cat3k_caa-platform.SSA.03.09.17.EMP.pkg Removed cat3k_caa-wcm.SSA.03.09.17.EMP.pkg [1]: New files list: Added cat3k_caa-base.SPA.03.02.00.SE.pkg Added cat3k_caa-drivers.SPA.03.02.00.SE.pkg Added cat3k_caa-infra.SPA.03.02.00SE.pkg Added cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg Added cat3k_caa-platform.SPA.03.02.00.SE.pkg Added cat3k_caa-wcm.SPA.03.02.00.SE.pkg [1]: Creating pending provisioning file [1]: Finished installing software. New software will load on reboot. [1]: Setting rollback timer to 45 minutes [1]: Do you want to proceed with reload? [yes/no]: Upgrading Cisco IOS XE Software: Bundle Mode To upgrade the Cisco IOS XE software when the switch is running in bundle mode, follow these steps: 1. Download the bundle file to local storage media. 2. Configure the boot system global configuration command to point to the bundle file. 3. Reload the switch. Upgrading Cisco IOS XE Software Bundle Mode Example This example shows the steps to upgrade the Cisco IOS XE software on a switch that is running in bundle mode. It shows using the copy command to copy the bundle file to flash:, configuring the boot system variable to point to the bundle file, saving a copy of the running configuration, and finally, reloading the switch. Switch# copy tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash: Destination filename [cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin]? Accessing tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin...Loading /tftpboot/cstohs/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin from 172.19.211.47 (via GigabitEthernet0/0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK - 220766688 bytes] 220766688 bytes copied in 124.330 secs (1775651 bytes/sec) Switch# Switch#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch all Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2063 Converting from the Bundle Running Mode to the Install Running Mode System Management flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Switch(config)# end Switch# *Nov 19 14:02:42.441: %SYS-5-CONFIG_I: Configured from console by console Switch# Switch# write memory Building configuration... Compressed configuration from 4941 bytes to 2236 bytes[OK] Switch# reload Reload command is being issued on Active unit, this will reload the whole stack Proceed with reload? [confirm] Converting from the Bundle Running Mode to the Install Running Mode To convert the running mode of a switch from bundle mode to installed mode, use the software expand running privileged EXEC command. This command expands the packages from the booted IOS XE software bundle and copies them and the provisioning file to the specified to destination. When you use the software expand running command to convert the switch from bundle mode to installed mode, specify the to destination as flash:. After you execute the command, configure the boot system command to point to the expanded provisioning file (flash:packages.conf), then reload the switch to boot in installed mode. Note The software expand running command is not supported when the switch is running in installed mode. Converting from the Bundle Running Mode to the Install Running Mode Example This example shows using the software expand running to command to convert the active switch in a switch stack from the bundle running mode to the installed running mode: Switch# dir flash: Directory of flash:/ 7386 -rwx 2097152 Jan 23 2013 14:06:49 +00:00 nvram_config 7378 drwx 4096 Jan 23 2013 09:35:11 +00:00 mnt 7385 -rw- 221775876 Jan 23 2013 14:15:13 +00:00 cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin 7389 -rwx 556 Jan 21 2013 20:47:30 +00:00 vlan.dat 712413184 bytes total (445063168 bytes free) Switch# Switch# software expand running to flash: Preparing expand operation ... [2]: Expanding the running bundle [2]: Copying package files [2]: Package files copied [2]: Finished expanding the running bundle Switch# Switch# dir flash: Directory of flash:/ 7386 -rwx 2097152 Jan 23 2013 14:06:49 +00:00 nvram_config 7378 drwx 4096 Jan 23 2013 09:35:11 +00:00 mnt 7385 -rw- 221775876 Jan 23 2013 14:15:13 +00:00 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2064 System Management Copying IOS XE Package and Bundle Files from One Stack Member to Another cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin 7391 -rw- 74410468 Jan 23 2013 14:16:57 +00:00 cat3k_caa-base.SPA.03.02.00SE.pkg 7392 -rw- 2773680 Jan 23 2013 14:16:57 +00:00 cat3k_caa-drivers.SPA.03.02.00.SE.pkg 7393 -rw- 32478044 Jan 23 2013 14:16:57 +00:00 cat3k_caa-infra.SPA.03.02.00SE.pkg 7394 -rw- 30393116 Jan 23 2013 14:16:57 +00:00 cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg 7389 -rwx 556 Jan 21 2013 20:47:30 +00:00 vlan.dat 7395 -rw- 18313952 Jan 23 2013 14:16:57 +00:00 cat3k_caa-platform.SPA.03.02.00.SE.pkg 7396 -rw- 63402700 Jan 23 2013 14:16:57 +00:00 cat3k_caa-wcm.SPA.10.0.100.0.pkg 7388 -rw- 1218 Jan 23 2013 14:17:43 +00:00 packages.conf 712413184 bytes total (223019008 bytes free) Switch# Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch all flash:packages.conf Switch(config)# end Switch# *Jan 23 14:28:47.722: %SYS-5-CONFIG_I: Configured from console by console Switch# write memory Building configuration... Compressed configuration from 4851 bytes to 2187 bytes[OK] Switch# Switch# reload Reload command is being issued on Active unit, this will reload the whole stack Proceed with reload? [confirm] Copying IOS XE Package and Bundle Files from One Stack Member to Another For switch stacks running in installed mode, use the software install source switch privileged EXEC command to install the running software packages from an existing stack member to one or more other stack members that are running different (but compatible) software packages. Copying IOS XE Package and Bundle Files from One Stack Member to Another Example This example shows a 2-member stack where each switch is running a different (but compatible) software package. The software install source switch command is used to install the packages that are currently running on the standby switch (switch 1) onto the active switch (switch 2): Switch# show version running Package: Base, version: 03.02.00SE, status: active File: cat3k_caa-base.SPA.03.02.00SE.pkg, on: Switch1 Built: Wed Jan 09 21:59:52 PST 2013, by: gereddy Package: Drivers, version: 03.02.00.SE, status: active File: cat3k_caa-drivers.SPA.03.02.00.SE.pkg, on: Switch1 Built: Wed Jan 09 22:03:41 PST 2013, by: gereddy Package: Infra, version: 03.02.00SE, status: active File: cat3k_caa-infra.SPA.03.02.00SE.pkg, on: Switch1 Built: Wed Jan 09 22:00:56 PST 2013, by: gereddy Package: IOS, version: 150-1.EX, status: active File: cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg, on: Switch1 Built: Wed Jan 09 22:02:23 PST 2013, by: gereddy Package: Platform, version: 03.02.00.SE, status: active Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2065 Copying IOS XE Package and Bundle Files from One Stack Member to Another Example System Management File: cat3k_caa-platform.SPA.03.02.00.SE.pkg, on: Switch1 Built: Wed Jan 09 22:01:46 PST 2013, by: gereddy Package: WCM, version: 10.0.100.0, status: active File: cat3k_caa-wcm.SPA.10.0.100.0.pkg, on: Switch1 Built: Wed Jan 09 22:03:05 PST 2013, by: gereddy Switch# Switch# software install source switch 1 Preparing install operation ... [2]: Copying software from source switch 1 to switch 2 [2]: Finished copying software to switch 2 [2]: Starting install operation [2]: Starting compatibility checks [2]: Finished compatibility checks [2]: Starting application pre-installation processing [2]: Finished application pre-installation processing [2]: Old files list: Removed cat3k_caa-base.SSA.03.09.17.EMP.pkg Removed cat3k_caa-drivers.SSA.03.09.17.EMP.pkg Removed cat3k_caa-infra.SSA.03.09.17.EMP.pkg Removed cat3k_caa-iosd-universalk9.SSA.150-9.17.EMP.pkg Removed cat3k_caa-platform.SSA.03.09.17.EMP.pkg Removed cat3k_caa-wcm.SSA.03.09.17.EMP.pkg [2]: New files list: Added cat3k_caa-base.SPA.03.02.00.SE.pkg Added cat3k_caa-drivers.SPA.03.02.00.SE.pkg Added cat3k_caa-infra.SPA.03.02.00.SE.pkg Added cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg Added cat3k_caa-platform.SPA.03.02.00.SE.pkg Added cat3k_caa-wcm.SPA.10.0.100.0.pkg [2]: Creating pending provisioning file [2]: Finished installing software. New software will load on reboot. [2]: Committing provisioning file [2]: Do you want to proceed with reload? [yes/no]: For switch stacks running in bundle mode, follow these steps to copy the bundle file from one stack member to another: 1. Use the copy privileged EXEC command to copy the running bundle from one switch in the stack to the other. 2. Configure the boot system global configuration command to point to the bundle file. 3. Reload the switch. This example shows a 2-member stack where each switch is running a different (but compatible) software packages: Switch# copy flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash-1: Destination filename [cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin]? Copy in progress... ... 220766688 bytes copied in 181.700 secs (1215007 bytes/sec) Switch# Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch 1 flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2066 System Management Upgrading a Switch Running Incompatible Software Switch(config)# end Switch# Upgrading a Switch Running Incompatible Software To upgrade a switch that is running in installed mode with software packages that are incompatible with the switch stack (also running in installed mode), use the software auto-upgrade privileged EXEC command to install the software packages from an existing stack member to the stack member that is running incompatible software. Upon completion of the auto-upgrade installation, the incompatible switch automatically reloads and joins the stack as a fully functioning member. Note If you configure the global software auto-upgrade enable command, the auto-upgrade functionality is initiated automatically when a switch with incompatible software running in installed mode joins the stack that is running in installed mode. For more information, see Cisco IOS Configuration Fundamentals Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches). Upgrading a Switch Running Incompatible Software Example This example shows a 2-member switch stack; switch 2 is the active switch and switch 1 is running incompatible software: Switch# show switch Switch/Stack Mac Address : 6400.f125.1100 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State -----------------------------------------------------------1 Member 6400.f125.1a00 1 0 V-Mismatch *2 Active 6400.f125.1100 1 V01 Ready Switch# Switch# software auto-upgrade % Auto upgrade has been initiated for the following incompatible switches: 1 INFO level system messages will be generated to provide status information during the auto upgrade process Switch# *Oct 19 06:59:14.521: %INSTALLER-6-AUTO_UPGRADE_SW_INITIATED: 2 installer: Auto upgrade initiated for switch 1 *Oct 19 06:59:14.522: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Searching stack for software to upgrade switch 1 *Oct 19 06:59:14.523: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Found donor switch 2 to auto upgrade switch 1 *Oct 19 06:59:14.523: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Upgrading switch 1 with software from switch 2 *Oct 19 07:00:47.829: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Finished installing software on switch 1 *Oct 19 07:00:47.829: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Reloading switch 1 to complete the auto upgrade To upgrade a switch that is running in bundle mode with a software bundle that is incompatible with the switch stack (also running in bundle mode), follow these steps: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2067 Upgrading a Switch Running in Incompatible Running Mode System Management 1. Use the copy privileged EXEC command to copy the running bundle from one switch in the stack to the other. 2. Configure the boot system global configuration command to point to the bundle file. 3. Reload the switch. This example shows a 2-member switch stack running in bundle mode; switch 2 is the active switch and switch 1 is running an incompatible bundle: Switch# show switch Switch/Stack Mac Address : 6400.f125.1100 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State -----------------------------------------------------------1 Member 6400.f125.1a00 1 0 V-Mismatch *2 Active 6400.f125.1100 1 V01 Ready Switch# Switch# copy flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash-1: Destination filename [cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin]? Copy in progress... ... 220766688 bytes copied in 181.700 secs (1215007 bytes/sec) Switch# Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch 1 flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Switch(config)# end Switch# *Nov 19 16:08:14.857: %SYS-5-CONFIG_I: Configured from console by console Switch# reload slot 1 Stack is in Half ring setup; Reloading a switch might cause stack split Proceed with reload? [confirm] Upgrading a Switch Running in Incompatible Running Mode When a switch running in bundle mode tries to join a stack running in installed mode, use the software auto-upgrade privileged EXEC command to install the incompatible switch's running packages and convert the switch to installed mode. Upon completion of the auto-upgrade running mode conversion, the incompatible switch automatically reloads and attempts to join the stack in installed mode. Note If you configure the global software auto-upgrade enable command, the auto-upgrade functionality is initiated automatically when a switch with incompatible software running in installed mode joins the stack that is running in installed mode. For more information, see Cisco IOS Configuration Fundamentals Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches). Upgrading a Switch Running in Incompatible Running Mode Example This example shows a 2-member switch stack running in installed mode; switch 2 is the active switch and switch1 is running in bundle mode: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2068 System Management Upgrading a Switch Running in Incompatible Running Mode Example Switch# show switch Switch/Stack Mac Address : 6400.f125.1100 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State -----------------------------------------------------------1 Member 6400.f125.1a00 1 0 V-Mismatch *2 Active 6400.f125.1100 1 V01 Ready Switch# Switch# software auto-upgrade % Auto upgrade has been initiated for the following incompatible switches: 1 INFO level system messages will be generated to provide status information during the auto upgrade process Switch# *Oct 19 07:17:16.694: %INSTALLER-6-AUTO_UPGRADE_SW_INITIATED: 2 installer: Auto upgrade initiated for switch 1 *Oct 19 07:17:16.694: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Converting switch 1 to installed mode by *Oct 19 07:17:16.694: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: installing its running software *Oct 19 07:18:50.488: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Setting the boot var on switch 1 *Oct 19 07:18:51.553: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Finished installing the running software on switch 1 *Oct 19 07:18:51.553: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Reloading switch 1 to boot in installed mode Note When you use the software auto-upgrade command to convert an incompatible switch to installed mode, the command installs the packages from the incompatible switch's running bundle. If, after you reload and boot the incompatible switch in installed mode, the switch's installed packages are found to be incompatible with the stack, you can use the software auto-upgrade command again. For more information, see Cisco IOS Configuration Fundamentals Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches). To convert a switch that is running in installed mode and joining a stack that is running in bundle mode, follow these steps: 1. Use the copy privileged EXEC command to copy the running bundle from one switch in the stack to the other. 2. Configure the boot system global configuration command to point to the bundle file. 3. Reload the switch. After reloading, the incompatible switch boots in bundle mode and joins the stack as a fully functioning member. This example shows a 2-member switch stack running in bundle mode; switch 2 is the active switch and switch 1 is running in installed mode: Switch# Switch# copy flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash-1: Destination filename [cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin]? Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2069 Additional References System Management Copy in progress... .... 220766688 bytes copied in 181.700 secs (1215007 bytes/sec) Switch# Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch 1 flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Switch(config)# end Switch# *Nov 19 16:08:14.857: %SYS-5-CONFIG_I: Configured from console by console Switch# reload slot 1 Stack is in Half ring setup; Reloading a switch might cause stack split Proceed with reload? [confirm] Additional References Related Documents Related Topic Commands for managing software bundles and packages Document Title Cisco IOS Configuration Fundamentals Command Reference Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards Standards Title No new or modified standards are supported by this feature, and support for existing standards has not -been modified by this feature. MIBs MIBs MIBs Link No new or modified MIBs are supported by this To locate and download MIBs for selected platforms, Cisco feature, and support for existing MIBs has not IOS releases, and feature sets, use Cisco MIB Locator been modified by this feature. found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2070 System Management Additional References RFCs RFCs Title No new or modified RFCs are supported by this feature, and support for existing RFCs has not been -modified by this feature. Technical Assistance Description Link The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. http://www.cisco.com/cisco/web/support/index.html To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2071 Additional References System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2072 1 0 6 C H A P T E R Troubleshooting the Software Configuration This chapter describes how to identify and resolve software problems related to the Cisco IOS software on the switch. Depending on the nature of the problem, you can use the command-line interface (CLI), Device Manager, or Network Assistant to identify and solve problems. Additional troubleshooting information, such as LED descriptions, is provided in the hardware installation guide. · Finding Feature Information, on page 2073 · Information About Troubleshooting the Software Configuration, on page 2073 · How to Troubleshoot the Software Configuration, on page 2081 · Verifying Troubleshooting of the Software Configuration, on page 2092 · Scenarios for Troubleshooting the Software Configuration, on page 2094 · Configuration Examples for Troubleshooting Software, on page 2096 · Additional References for Troubleshooting Software Configuration, on page 2098 · Feature History and Information for Troubleshooting Software Configuration, on page 2099 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About Troubleshooting the Software Configuration Software Failure on a Switch Switch software can be corrupted during an upgrade by downloading the incorrect file to the switch, and by deleting the image file. In all of these cases, the switch does not pass the power-on self-test (POST), and there is no connectivity. Related Topics Recovering from a Software Failure, on page 2081 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2073 Lost or Forgotten Password on a Switch System Management Lost or Forgotten Password on a Switch The default configuration for the switch allows an end user with physical access to the switch to recover from a lost password by interrupting the boot process during power-on and by entering a new password. These recovery procedures require that you have physical access to the switch. Note On these switches, a system administrator can disable some of the functionality of this feature by allowing an end user to reset a password only by agreeing to return to the default configuration. If you are an end user trying to reset a password when password recovery has been disabled, a status message reminds you to return to the default configuration during the recovery process. Related Topics Recovering from a Lost or Forgotten Password, on page 2083 Power over Ethernet Ports A Power over Ethernet (PoE) switch port automatically supplies power to one of these connected devices if the switch detects that there is no power on the circuit: · a Cisco pre-standard powered device (such as a Cisco IP Phone or a Cisco Aironet Access Point) · an IEEE 802.3af-compliant powered device · an IEEE 802.3at-compliant powered device A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power source. The device does not receive redundant power when it is only connected to the PoE port. After the switch detects a powered device, the switch determines the device power requirements and then grants or denies power to the device. The switch can also detect the real-time power consumption of the device by monitoring and policing the power usage. For more information, see the "Configuring PoE" chapter in the Interface and Hardware Component Configuration Guide (Catalyst 3650 Switches) . Related Topics Scenarios to Troubleshoot Power over Ethernet (PoE), on page 2094 Disabled Port Caused by Power Loss If a powered device (such as a Cisco IP Phone 7910) that is connected to a PoE switch port and powered by an AC power source loses power from the AC power source, the device might enter an error-disabled state. To recover from an error-disabled state, enter the shutdown interface configuration command, and then enter the no shutdown interface command. You can also configure automatic recovery on the switch to recover from the error-disabled state. On a switch, the errdisable recovery cause loopback and the errdisable recovery interval seconds global configuration commands automatically take the interface out of the error-disabled state after the specified period of time. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2074 System Management Disabled Port Caused by False Link-Up Disabled Port Caused by False Link-Up If a Cisco powered device is connected to a port and you configure the port by using the power inline never interface configuration command, a false link-up can occur, placing the port into an error-disabled state. To take the port out of the error-disabled state, enter the shutdown and the no shutdown interface configuration commands. You should not connect a Cisco powered device to a port that has been configured with the power inline never command. Ping The switch supports IP ping, which you can use to test connectivity to remote hosts. Ping sends an echo request packet to an address and waits for a reply. Ping returns one of these responses: · Normal response--The normal response (hostname is alive) occurs in 1 to 10 seconds, depending on network traffic. · Destination does not respond--If the host does not respond, a no-answer message is returned. · Unknown host--If the host does not exist, an unknown host message is returned. · Destination unreachable--If the default gateway cannot reach the specified network, a destination-unreachable message is returned. · Network or host unreachable--If there is no entry in the route table for the host or network, a network or host unreachable message is returned. Related Topics Executing Ping, on page 2089 Example: Pinging an IP Host, on page 2096 Layer 2 Traceroute The Layer 2 traceroute feature allows the switch to identify the physical path that a packet takes from a source device to a destination device. Layer 2 traceroute supports only unicast source and destination MAC addresses. Traceroute finds the path by using the MAC address tables of the switches in the path. When the switch detects a device in the path that does not support Layer 2 traceroute, the switch continues to send Layer 2 trace queries and lets them time out. The switch can only identify the path from the source device to the destination device. It cannot identify the path that a packet takes from source host to the source device or from the destination device to the destination host. Layer 2 Traceroute Guidelines · Cisco Discovery Protocol (CDP) must be enabled on all the devices in the network. For Layer 2 traceroute to function properly, do not disable CDP. If any devices in the physical path are transparent to CDP, the switch cannot identify the path through these devices. · A switch is reachable from another switch when you can test connectivity by using the ping privileged EXEC command. All switches in the physical path must be reachable from each other. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2075 IP Traceroute System Management · The maximum number of hops identified in the path is ten. · You can enter the traceroute mac or the traceroute mac ip privileged EXEC command on a switch that is not in the physical path from the source device to the destination device. All switches in the path must be reachable from this switch. · The traceroute mac command output shows the Layer 2 path only when the specified source and destination MAC addresses belong to the same VLAN. If you specify source and destination MAC addresses that belong to different VLANs, the Layer 2 path is not identified, and an error message appears. · If you specify a multicast source or destination MAC address, the path is not identified, and an error message appears. · If the source or destination MAC address belongs to multiple VLANs, you must specify the VLAN to which both the source and destination MAC addresses belong. If the VLAN is not specified, the path is not identified, and an error message appears. · The traceroute mac ip command output shows the Layer 2 path when the specified source and destination IP addresses belong to the same subnet. When you specify the IP addresses, the switch uses the Address Resolution Protocol (ARP) to associate the IP addresses with the corresponding MAC addresses and the VLAN IDs. · If an ARP entry exists for the specified IP address, the switch uses the associated MAC address and identifies the physical path. · If an ARP entry does not exist, the switch sends an ARP query and tries to resolve the IP address. If the IP address is not resolved, the path is not identified, and an error message appears. · When multiple devices are attached to one port through hubs (for example, multiple CDP neighbors are detected on a port), the Layer 2 traceroute feature is not supported. When more than one CDP neighbor is detected on a port, the Layer 2 path is not identified, and an error message appears. · This feature is not supported in Token Ring VLANs. IP Traceroute You can use IP traceroute to identify the path that packets take through the network on a hop-by-hop basis. The command output displays all network layer (Layer 3) devices, such as routers, that the traffic passes through on the way to the destination. Your switches can participate as the source or destination of the traceroute privileged EXEC command and might or might not appear as a hop in the traceroute command output. If the switch is the destination of the traceroute, it is displayed as the final destination in the traceroute output. Intermediate switches do not show up in the traceroute output if they are only bridging the packet from one port to another within the same VLAN. However, if the intermediate switch is a multilayer switch that is routing a particular packet, this switch shows up as a hop in the traceroute output. The traceroute privileged EXEC command uses the Time To Live (TTL) field in the IP header to cause routers and servers to generate specific return messages. Traceroute starts by sending a User Datagram Protocol (UDP) datagram to the destination host with the TTL field set to 1. If a router finds a TTL value of 1 or 0, it drops the datagram and sends an Internet Control Message Protocol (ICMP) time-to-live-exceeded message to the sender. Traceroute finds the address of the first hop by examining the source address field of the ICMP time-to-live-exceeded message. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2076 System Management Time Domain Reflector Guidelines To identify the next hop, traceroute sends a UDP packet with a TTL value of 2. The first router decrements the TTL field by 1 and sends the datagram to the next router. The second router sees a TTL value of 1, discards the datagram, and returns the time-to-live-exceeded message to the source. This process continues until the TTL is incremented to a value large enough for the datagram to reach the destination host (or until the maximum TTL is reached). To learn when a datagram reaches its destination, traceroute sets the UDP destination port number in the datagram to a very large value that the destination host is unlikely to be using. When a host receives a datagram destined to itself containing a destination port number that is unused locally, it sends an ICMP port-unreachable error to the source. Because all errors except port-unreachable errors come from intermediate hops, the receipt of a port-unreachable error means that this message was sent by the destination port. Related Topics Executing IP Traceroute, on page 2090 Example: Performing a Traceroute to an IP Host, on page 2097 Time Domain Reflector Guidelines You can use the Time Domain Reflector (TDR) feature to diagnose and resolve cabling problems. When running TDR, a local device sends a signal through a cable and compares the reflected signal to the initial signal. TDR is supported on 10/100/1000 copper Ethernet ports and on Multigigabit Ethernet (100Mbps/1/2.5/5/10 Gbps) ports. It is not supported on SFP module ports. TDR can detect these cabling problems: · Open, broken, or cut twisted-pair wires--The wires are not connected to the wires from the remote device. · Shorted twisted-pair wires--The wires are touching each other or the wires from the remote device. For example, a shorted twisted pair can occur if one wire of the twisted pair is soldered to the other wire. If one of the twisted-pair wires is open, TDR can find the length at which the wire is open. Note When using the feature with Multigigabit Ethernet ports, the cable length is displayed only when an open or short condition is detected. Use TDR to diagnose and resolve cabling problems in these situations: · Replacing a Switch · Setting up a wiring closet · Troubleshooting a connection between two devices when a link cannot be established or when it is not operating properly When you run TDR, the Switch reports accurate information in these situations: · The cable for the gigabit link is a solid-core cable. · The open-ended cable is not terminated. When you run TDR, the Switch does not report accurate information in these situations: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2077 Debug Commands System Management · The cable for the gigabit link is a twisted-pair cable or is in series with a solid-core cable. · The link is a 10-megabit or a 100-megabit link. · The cable is a stranded cable. · The link partner is a Cisco IP Phone. · The link partner is not IEEE 802.3 compliant. Debug Commands Caution Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. It is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. All debug commands are entered in privileged EXEC mode, and most debug commands take no arguments. Related Topics Redirecting Debug and Error Message Output, on page 2091 Example: Enabling All System Diagnostics, on page 2098 Crashinfo Files The crashinfo files save information that helps Cisco technical support representatives to debug problems that caused the Cisco IOS image to fail (crash). The switch generates two files at the time of the failure: full core and crashinfo. The information in the crashinfo file includes the Cisco IOS image name and version that failed, a list of the processor registers, and a stack trace. You can provide this information to the Cisco technical support representative by using the show tech-support privileged EXEC command. The file names have the following format: [fullcore | crashinfo]_[process that crashed]_[date]-[timestamp]-UTC From IOS, you can view the crashinfo files on each switch by using the following command: Switch# dir crashinfo? crashinfo-1: crashinfo-2: crashinfo-3: crashinfo: Switch# For example, to access the crashinfo directory for switch 1, enter Switch dir crashinfo-1 From the ROMMON prompt, you can view the crashinfo files by using the dir command: Switch: dir sda1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2078 System Management System Reports The following is sample output of a crashinfo file Switch# dir crashinfo: Directory of crashinfo:/ 12 -rwx 15 -rwx 16 -rwx 2768 Dec 31 1969 16:00:15 -08:00 koops.dat 0 Jan 12 2000 22:53:40 -08:00 deleted_crash_files 4246576 Jan 12 2000 22:53:40 -08:00 crashinfo_stack-mgr_20000113-065250-UTC 17 -rwx 26 -rwx 18 -rwx 50 Oct 2 2012 03:18:42 -08:00 last_crashinfo 39 Jan 22 2013 14:14:14 -08:00 last_systemreport 2866565 Jan 12 2000 22:53:41 -08:00 fullcore_stack-mgr_20000113-065250-UTC 20 -rwx 4391796 Feb 1 2000 17:50:44 -08:00 crashinfo_stack-mgr_20000202-014954-UTC 21 -rwx 34817 -rw18434 -rw18435 -rw34821 -rw- 2920325 1050209 1016913 1136167 1094631 Feb 1 2000 17:50:45 -08:00 Jan 10 2013 20:26:23 -08:00 Jan 11 2013 10:35:28 -08:00 Jan 22 2013 14:14:11 -08:00 Jan 2 2013 17:59:23 -08:00 fullcore_stack-mgr_20000202-014954-UTC system-report_1_20130111-042535-UTC.gz system-report_1_20130111-183440-UTC.gz system-report_1_20130122-221322-UTC.gz system-report_1_20130103-015835-UTC.gz 6147 -rw34824 -rwx 6155 -rwx 967429 Jan 3 2013 10:32:44 -08:00 system-report_1_20130103-183156-UTC.gz 50 Jan 22 2013 14:14:14 -08:00 deleted_sysreport_files 373 Jan 22 2013 14:14:13 -08:00 last_systemreport_log 145898496 bytes total (18569216 bytes free) stack3# The file name of the most recent crashinfo file is stored in last_crashinfo. The file name of the most recent system report is stored in last_systemreport. Switch# System Reports When a switch crashes, a system report is automatically generated for each switch in the switch stack. The system report file captures all the trace buffers, and other system-wide logs found on the switch. System reports are located in the crashinfo directory in the following format: system-report_[switch number]_[date]-[timestamp]-UTC.gz After a switch crash, you should check if a system report file was generated. The name of the most recently generated system report file is stored in the last_systemreport file under the crashinfo directory. The system report and crashinfo files assist TAC when troubleshooting your issue. Onboard Failure Logging on the Switch You can use the onboard failure logging (OBFL) feature to collect information about the switch. The information includes uptime, temperature, and voltage information and helps Cisco technical support representatives to troubleshoot switch problems. We recommend that you keep OBFL enabled and do not erase the data stored in the flash memory. By default, OBFL is enabled. It collects information about the switch and small form-factor pluggable (SFP) modules. The switch stores this information in the flash memory: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2079 Fan Failures System Management · CLI commands--Record of the OBFL CLI commands that are entered on a standalone switch or a switch stack member. · Environment data--Unique device identifier (UDI) information for a standalone switch or a stack member and for all the connected FRU devices: the product identification (PID), the version identification (VID), and the serial number. · Message--Record of the hardware-related system messages generated by a standalone switch or a stack member. · Power over Ethernet (PoE)--Record of the power consumption of PoE ports on a standalone switch or a stack member. · Temperature--Temperature of a standalone switch or a stack member. · Uptime data--Time when a standalone switch or a stack member starts, the reason the switch restarts, and the length of time the switch has been running since it last restarted. · Voltage--System voltages of a standalone switch or a stack member. You should manually set the system clock or configure it by using Network Time Protocol (NTP). When the switch is running, you can retrieve the OBFL data by using the show logging onboard privileged EXEC commands. If the switch fails, contact your Cisco technical support representative to find out how to retrieve the data. Related Topics Configuring OBFL, on page 2091 Displaying OBFL Information, on page 2092 Fan Failures By default, the feature is disabled. When more than one of the fans fails in a field-replaceable unit (FRU) or in a power supply, the switch does not shut down, and this error message appears: Multiple fan(FRU/PS) failure detected. System may get overheated. Change fan quickly. The switch might overheat and shut down. To enable the fan failures feature, enter the system env fan-fail-action shut privileged EXEC command. If more than one fan in the switch fails, the switch automatically shuts down, and this error message appears: Faulty (FRU/PS) fans detected, shutting down system! After the first fan shuts down, if the switch detects a second fan failure, the switch waits for 20 seconds before it shuts down. To restart the switch, it must be power cycled. Possible Symptoms of High CPU Utilization Excessive CPU utilization might result in these symptoms, but the symptoms might also result from other causes: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2080 System Management How to Troubleshoot the Software Configuration · Spanning tree topology changes · EtherChannel links brought down due to loss of communication · Failure to respond to management requests (ICMP ping, SNMP timeouts, slow Telnet or SSH sessions) · UDLD flapping · IP SLAs failures because of SLAs responses beyond an acceptable threshold · DHCP or IEEE 802.1x failures if the switch does not forward or respond to requests How to Troubleshoot the Software Configuration Recovering from a Software Failure Before you begin This recovery procedure requires that you have physical access to the switch. This procedure uses boot loader commands and TFTP to recover from a corrupted or incorrect image file. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 From your PC, download the software image file (image.bin) from Cisco.com. Load the software image to your TFTP server. Connect your PC to the switch Ethernet management port. Unplug the switch power cord. Press the Mode button, and at the same time, reconnect the power cord to the switch. From the bootloader (ROMMON) prompt, ensure that you can ping your TFTP server. a) Set the IP address switch: set IP_ADDR ip_address subnet_mask Example: switch: set IP_ADDR 192.0.2.123/255.255.255.0 b) Set the default router IP address switch: set DEFAULT_ROUTER ip_address Example: switch: set DEFAULT_ROUTER 192.0.2.1 c) Verify that you can ping the TFTP server switch: ping ip_address_of_TFTP_server Example: switch: ping 192.0.2.15 ping 192.0.2.1 with 32 bytes of data... Host 192.0.2.1 is alive. switch: Step 7 Verify that you have a recovery image in your recovery partition (sda9:). Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2081 Recovering from a Software Failure System Management This recovery image is required for recovery using the emergency-install feature. Example: switch: dir sda9: Directory of sda9:/ 2 drwx 1024 2 drwx 1024 11 -rw- 18923068 . .. c3850-recovery.bin 36939776 bytes available (20830208 bytes used) switch: Step 8 From the bootloader (ROMMON) prompt, initiate the emergency-install feature that assists you in recovering the software image on your switch. WARNING: The emergency install command will erase your entire boot flash! Example: Switch# emergency-install tftp://192.0.2.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin The bootflash will be erased during install operation, continue (y/n)?y Starting emergency recovery (tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SPA.03.02.00.SE.150-1.EX.bin)... Reading full image into memory......................done Nova Bundle Image -------------------------------------Kernel Address : 0x6042e5cc Kernel Size : 0x318261/3244641 Initramfs Address : 0x60746830 Initramfs Size : 0xdb0fb9/14356409 Compression Format: .mzip Bootable image at @ ram:0x6042e5cc Bootable image segment 0 address range [0x81100000, 0x81b80000] is in range [0x80180000, 0x90000000]. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ File "sda9:c3850-recovery.bin" uncompressed and installed, entry point: 0x811060f0 Loading Linux kernel with entry point 0x811060f0 ... Bootloader: Done loading app on core_mask: 0xf ### Launching Linux Kernel (flags = 0x5) Initiating Emergency Installation of bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Downloading bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin... Validating bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin... Installing bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin... Verifying bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin... Package cat3k_caa-base..pkg is Digitally Signed Package cat3k_caa-drivers.SPA.03.02.00.SE.pkg is Digitally Signed Package cat3k_caa-infra.SPA.03.02.00.SE.pkg is Digitally Signed Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2082 System Management Recovering from a Lost or Forgotten Password Package cat3k_caa-iosd-universalk9.SPA.03.02.00.SE.pkg is Digitally Signed Package cat3k_caa-platform.SPA.03.02.00.SE.pkg is Digitally Signed Package cat3k_caa-wcm.SPA.03.02.00.SE.pkg is Digitally Signed Preparing flash... Syncing device... Emergency Install successful... Rebooting Restarting system. Booting...(use DDR clock 667 MHz)Initializing and Testing RAM +++@@@@####...++@@++@@++@@++@ Related Topics Software Failure on a Switch, on page 2073 Recovering from a Lost or Forgotten Password The default configuration for the switch allows an end user with physical access to the switch to recover from a lost password by interrupting the boot process during power-on and by entering a new password. These recovery procedures require that you have physical access to the switch. Note On these switches, a system administrator can disable some of the functionality of this feature by allowing an end user to reset a password only by agreeing to return to the default configuration. If you are an end user trying to reset a password when password recovery has been disabled, a status message shows this during the recovery process. SUMMARY STEPS 1. Connect a terminal or PC to the switch. 2. Set the line speed on the emulation software to 9600 baud. 3. Power off the standalone switch or the entire switch stack. 4. Reconnect the power cord to the or the active switch. Within 15 seconds, press the Mode button while the System LED is still flashing green. Continue pressing the Mode button until all the system LEDs turn on and remain solid; then release the Mode button. 5. After recovering the password, reload the switch or the active switch . 6. Power on the remaining switches in the stack. DETAILED STEPS Step 1 Connect a terminal or PC to the switch. · Connect a terminal or a PC with terminal-emulation software to the switch console port. If you are recovering the password for a switch stack, connect to the console port of the active switch or Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2083 Procedure with Password Recovery Enabled System Management Step 2 Step 3 Step 4 · Connect a PC to the Ethernet management port. If you are recovering the password for a switch stack, connect to the Ethernet management port of a stack member . Set the line speed on the emulation software to 9600 baud. Power off the standalone switch or the entire switch stack. Reconnect the power cord to the or the active switch. Within 15 seconds, press the Mode button while the System LED is still flashing green. Continue pressing the Mode button until all the system LEDs turn on and remain solid; then release the Mode button. · Switch: Xmodem file system is available. Base ethernet MAC Address: 20:37:06:4d:e9:80 Verifying bootloader digital signature. The system has been interrupted prior to loading the operating system software, console will be reset to 9600 baud rate. Step 5 proceed to the Procedure with Password Recovery Enabled section, and follow the steps. After recovering the password, reload the switch or the active switch . On a switch: Switch> reload Proceed with reload? [confirm] y On the active switch: Switch> reload slot <stack-active-member-number> Proceed with reload? [confirm] y Step 6 Power on the remaining switches in the stack. Related Topics Lost or Forgotten Password on a Switch, on page 2074 Procedure with Password Recovery Enabled If the password-recovery operation is enabled, this message appears: Step 1 Step 2 Initialize the flash file system. Switch: flash_init Ignore the startup configuration with the following command: Switch: SWITCH_IGNORE_STARTUP_CFG=1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2084 System Management Procedure with Password Recovery Enabled Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Boot the switch with the packages.conf file from flash. Switch: boot flash:packages.conf Terminate the initial configuration dialog by answering No. Would you like to enter the initial configuration dialog? [yes/no]: No At the switch prompt, enter privileged EXEC mode. Switch> enable Switch# Copy the startup configuration to running configuration. Switch# copy startup-config running-config Destination filename [running-config]? Press Return in response to the confirmation prompts. The configuration file is now reloaded, and you can change the password. Enter global configuration mode and change the enable password. Switch# configure terminal Switch(config)# Write the running configuration to the startup configuration file. Switch# copy running-config startup-config Confirm that manual boot mode is enabled. Switch# show boot BOOT variable = flash:packages.conf; Manual Boot = yes Enable Break = yes Reload the switch. Switch# reload Return the Bootloader parameters (previously changed in Steps 2 and 3) to their original values. Step 12 Switch: switch: SWITCH_IGNORE_STARTUP_CFG=0 Boot the switch with the packages.conf file from flash. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2085 Procedure with Password Recovery Disabled System Management Step 13 Switch: boot flash:packages.conf After the switch boots up, disable manual boot on the switch. Switch(config)# no boot manual Procedure with Password Recovery Disabled If the password-recovery mechanism is disabled, this message appears: The password-recovery mechanism has been triggered, but is currently disabled. Access to the boot loader prompt through the password-recovery mechanism is disallowed at this point. However, if you agree to let the system be reset back to the default system configuration, access to the boot loader prompt can still be allowed. Would you like to reset the system back to the default configuration (y/n)? Caution Returning the switch to the default configuration results in the loss of all existing configurations. We recommend that you contact your system administrator to verify if there are backup switch and VLAN configuration files. · If you enter n (no), the normal boot process continues as if the Mode button had not been pressed; you cannot access the boot loader prompt, and you cannot enter a new password. You see the message: Press Enter to continue........ · If you enter y (yes), the configuration file in flash memory and the VLAN database file are deleted. When the default configuration loads, you can reset the password. Step 1 Choose to continue with password recovery and delete the existing configuration: Would you like to reset the system back to the default configuration (y/n)? Y Step 2 Display the contents of flash memory: Switch: dir flash: The switch file system appears. Directory of flash:/ . . Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2086 System Management Preventing Switch Stack Problems Step 3 .i' 15494 drwx 4096 Jan 1 2000 00:20:20 +00:00 kirch 15508 -rw- 258065648 Sep 4 2013 14:19:03 +00:00 cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin 162196684 Boot up the system: Switch: boot You are prompted to start the setup program. To continue with password recovery, enter N at the prompt: Continue with the configuration dialog? [yes/no]: N Step 4 At the switch prompt, enter privileged EXEC mode: Switch> enable Step 5 Enter global configuration mode: Switch# configure terminal Step 6 Step 7 Step 8 Step 9 Change the password: Switch(config)# enable secret password The secret password can be from 1 to 25 alphanumeric characters, can start with a number, is case sensitive, and allows spaces but ignores leading spaces. Return to privileged EXEC mode: Switch(config)# exit Switch# Note Before continuing to Step 9, power on any connected stack members and wait until they have completely initialized. Write the running configuration to the startup configuration file: Switch# copy running-config startup-config The new password is now in the startup configuration. You must now reconfigure the switch. If the system administrator has the backup switch and VLAN configuration files available, you should use those. Preventing Switch Stack Problems To prevent switch stack problems, you should do the following: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2087 Preventing Autonegotiation Mismatches System Management · Make sure that the switches that you add to or remove from the switch stack are powered off. For all powering considerations in switch stacks, see the "Switch Installation" chapter in the hardware installation guide. · Press the Mode button on a stack member until the Stack mode LED is on. The last two port LEDs on the switch should be green. Depending on the switch model, the last two ports are either 10/100/1000 ports or small form-factor pluggable (SFP) module. If one or both of the last two port LEDs are not green, the stack is not operating at full bandwidth. · We recommend using only one CLI session when managing the switch stack. Be careful when using multiple CLI sessions to the active switch . Commands that you enter in one session are not displayed in the other sessions. Therefore, it is possible that you might not be able to identify the session from which you entered a command. · Manually assigning stack member numbers according to the placement of the switches in the stack can make it easier to remotely troubleshoot the switch stack. However, you need to remember that the switches have manually assigned numbers if you add, remove, or rearrange switches later. Use the switch current-stack-member-number renumber new-stack-member-number global configuration command to manually assign a stack member number. If you replace a stack member with an identical model, the new switch functions with the exact same configuration as the replaced switch. This is also assuming the new switch is using the same member number as the replaced switch. Removing powered-on stack members causes the switch stack to divide (partition) into two or more switch stacks, each with the same configuration. If you want the switch stacks to remain separate, change the IP address or addresses of the newly created switch stacks. To recover from a partitioned switch stack, follow these steps: 1. Power off the newly created switch stacks. 2. Reconnect them to the original switch stack through their StackWise Plus ports. 3. Power on the switches. Preventing Autonegotiation Mismatches The IEEE 802.3ab autonegotiation protocol manages the switch settings for speed (10 Mb/s, 100 Mb/s, and 1000 Mb/s, excluding SFP module ports) and duplex (half or full). There are situations when this protocol can incorrectly align these settings, reducing performance. A mismatch occurs under these circumstances: · A manually set speed or duplex parameter is different from the manually set speed or duplex parameter on the connected port. · A port is set to autonegotiate, and the connected port is set to full duplex with no autonegotiation. To maximize switch performance and ensure a link, follow one of these guidelines when changing the settings for duplex and speed: · Let both ports autonegotiate both speed and duplex. · Manually set the speed and duplex parameters for the ports on both ends of the connection. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2088 System Management Troubleshooting SFP Module Security and Identification Note If a remote device does not autonegotiate, configure the duplex settings on the two ports to match. The speed parameter can adjust itself even if the connected port does not autonegotiate. Troubleshooting SFP Module Security and Identification Cisco small form-factor pluggable (SFP) modules have a serial EEPROM that contains the module serial number, the vendor name and ID, a unique security code, and cyclic redundancy check (CRC). When an SFP module is inserted in the switch, the switch software reads the EEPROM to verify the serial number, vendor name and vendor ID, and recompute the security code and CRC. If the serial number, the vendor name or vendor ID, the security code, or CRC is invalid, the software generates a security error message and places the interface in an error-disabled state. Note The security error message references the GBIC_SECURITY facility. The switch supports SFP modules and does not support GBIC modules. Although the error message text refers to GBIC interfaces and modules, the security messages actually refer to the SFP modules and module interfaces. If you are using a non-Cisco SFP module, remove the SFP module from the switch, and replace it with a Cisco module. After inserting a Cisco SFP module, use the errdisable recovery cause gbic-invalid global configuration command to verify the port status, and enter a time interval for recovering from the error-disabled state. After the elapsed interval, the switch brings the interface out of the error-disabled state and retries the operation. If the module is identified as a Cisco SFP module, but the system is unable to read vendor-data information to verify its accuracy, an SFP module error message is generated. In this case, you should remove and reinsert the SFP module. If it continues to fail, the SFP module might be defective. Monitoring SFP Module Status You can check the physical or operational status of an SFP module by using the show interfaces transceiver privileged EXEC command. This command shows the operational status, such as the temperature and the current for an SFP module on a specific interface and the alarm status. You can also use the command to check the speed and the duplex settings on an SFP module. Executing Ping If you attempt to ping a host in a different IP subnetwork, you must define a static route to the network or have IP routing configured to route between those subnets. IP routing is disabled by default on all switches. Note Though other protocol keywords are available with the ping command, they are not supported in this release. Use this command to ping another device on the network from the switch: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2089 Monitoring Temperature System Management Command ping ip host | address Purpose Pings a remote host through IP or by supplying the hostname or network address. Switch# ping 172.20.52.3 Related Topics Ping, on page 2075 Example: Pinging an IP Host, on page 2096 Monitoring Temperature The switch monitors the temperature conditions and uses the temperature information to control the fans. Use the show env temperature status privileged EXEC command to display the temperature value, state, and thresholds. The temperature value is the temperature in the switch (not the external temperature).You can configure only the yellow threshold level (in Celsius) by using the system env temperature threshold yellow value global configuration command to set the difference between the yellow and red thresholds. You cannot configure the green or red thresholds. Monitoring the Physical Path You can monitor the physical path that a packet takes from a source device to a destination device. Table 186: Monitoring the Physical Path Command tracetroute mac [interface interface-id] {source-mac-address} [interface interface-id] {destination-mac-address} [vlan vlan-id] [detail] tracetroute mac ip {source-ip-address | source-hostname}{destination-ip-address | destination-hostname} [detail] Purpose Displays the Layer 2 path taken by the packets from the specified source MAC address to the specified destination MAC address. Displays the Layer 2 path taken by the packets from the specified source IP address or hostname to the specified destination IP address or hostname. Executing IP Traceroute Note Though other protocol keywords are available with the traceroute privileged EXEC command, they are not supported in this release. Command traceroute ip host Switch# traceroute ip 192.51.100.1 Purpose Traces the path that packets take through the network. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2090 System Management Running TDR and Displaying the Results Related Topics IP Traceroute , on page 2076 Example: Performing a Traceroute to an IP Host, on page 2097 Running TDR and Displaying the Results When you run TDR on an interface, you can run it on the active switch or a stack member. To run TDR, enter the test cable-diagnostics tdr interface interface-id privileged EXEC command. To display the results, enter the show cable-diagnostics tdr interface interface-id privileged EXEC command. Redirecting Debug and Error Message Output By default, the network server sends the output from debug commands and system error messages to the console. If you use this default, you can use a virtual terminal connection to monitor debug output instead of connecting to the console port or the Ethernet management port. Possible destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. The syslog format is compatible with 4.3 Berkeley Standard Distribution (BSD) UNIX and its derivatives. Note Be aware that the debugging destination you use affects system overhead. When you log messages to the console, very high overhead occurs. When you log messages to a virtual terminal, less overhead occurs. Logging messages to a syslog server produces even less, and logging to an internal buffer produces the least overhead of any method. Related Topics Debug Commands, on page 2078 Using the show platform forward Command The output from the show platform forward privileged EXEC command provides some useful information about the forwarding results if a packet entering an interface is sent through the system. Depending upon the parameters entered about the packet, the output provides lookup table results and port maps used to calculate forwarding destinations, bitmaps, and egress information. Most of the information in the output from the command is useful mainly for technical support personnel, who have access to detailed information about the switch application-specific integrated circuits (ASICs). However, packet forwarding information can also be helpful in troubleshooting. Configuring OBFL Caution We recommend that you do not disable OBFL and that you do not remove the data stored in the flash memory. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2091 Verifying Troubleshooting of the Software Configuration System Management · To enable OBFL, use the hw-switch switch [switch-number] logging onboard [message level level] global configuration command. On switches, the range for switch-number is from 1 to 9. Use the message level level parameter to specify the severity of the hardware-related messages that the switch generates and stores in the flash memory. · To copy the OBFL data to the local network or a specific file system, use the copy onboard switch switch-number url url-destination privileged EXEC command. · To disable OBFL, use the no hw-switch switch [switch-number] logging onboard [message level] global configuration command. · To clear all the OBFL data in the flash memory except for the uptime and CLI command information, use the clear onboard switch switch-number privileged EXEC command. · In a switch stack, you can enable OBFL on a standalone switch or on all stack members by using the hw-switch switch [switch-number] logging onboard [message level level] global configuration command. · You can enable or disable OBFL on a member switch from the active switch. Related Topics Onboard Failure Logging on the Switch, on page 2079 Displaying OBFL Information, on page 2092 Verifying Troubleshooting of the Software Configuration Displaying OBFL Information Table 187: Commands for Displaying OBFL Information Command show onboard switch switch-number clilog Switch# show onboard switch 1 clilog show onboard switch switch-number environment Switch# show onboard switch 1 environment show onboard switch switch-number message Switch# show onboard switch 1 message show onboard switch switch-number counter Switch# show onboard switch 1 counter show onboard switch switch-number temperature Switch# show onboard switch 1 temperature Purpose Displays the OBFL CLI commands that were entered on a standalone switch or the specified stack members. Displays the UDI information for a standalone switch or the specified stack members and for all the connected FRU devices: the PID, the VID, and the serial number. Displays the hardware-related messages generated by a standalone switch or the specified stack members. Displays the counter information on a standalone switch or the specified stack members. Displays the temperature of a standalone switch or the specified switch stack members. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2092 System Management Example: Verifying the Problem and Cause for High CPU Utilization Command show onboard switch switch-number uptime Switch# show onboard switch 1 uptime show onboard switch switch-number voltage Switch# show onboard switch 1 voltage show onboard switch switch-number status Switch# show onboard switch 1 status Purpose Displays the time when a standalone switch or the specified stack members start, the reason the standalone switch or specified stack members restart, and the length of time that the standalone switch or specified stack members have been running since they last restarted. Displays the system voltages of a standalone switch or the specified stack members. Displays the status of a standalone switch or the specified stack members. Related Topics Onboard Failure Logging on the Switch, on page 2079 Configuring OBFL, on page 2091 Example: Verifying the Problem and Cause for High CPU Utilization To determine if high CPU utilization is a problem, enter the show processes cpu sorted privileged EXEC command. Note the underlined information in the first line of the output example. Switch# show processes cpu sorted CPU utilization for five seconds: 8%/0%; one minute: 7%; five minutes: 8% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 309 42289103 752750 56180 1.75% 1.20% 1.22% 0 RIP Timers 140 8820183 4942081 1784 0.63% 0.37% 0.30% 0 HRPC qos request 100 3427318 16150534 212 0.47% 0.14% 0.11% 0 HRPC pm-counters 192 3093252 14081112 219 0.31% 0.14% 0.11% 0 Spanning Tree 143 8 37 216 0.15% 0.01% 0.00% 0 Exec ... <output truncated> This example shows normal CPU utilization. The output shows that utilization for the last 5 seconds is 8%/0%, which has this meaning: · The total CPU utilization is 8 percent, including both time running Cisco IOS processes and time spent handling interrupts. · The time spent handling interrupts is zero percent. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2093 Scenarios for Troubleshooting the Software Configuration System Management Table 188: Troubleshooting CPU Utilization Problems Type of Problem Cause Corrective Action Interrupt percentage value is almost as high as total CPU utilization value. The CPU is receiving too many packets from the network. Determine the source of the network packet. Stop the flow, or change the switch configuration. See the section on "Analyzing Network Traffic." Total CPU utilization is greater One or more Cisco IOS process Identify the unusual event, and than 50% with minimal time is consuming too much CPU time. troubleshoot the root cause. See the spent on interrupts. This is usually triggered by an section on "Debugging Active event that activated the process. Processes." Scenarios for Troubleshooting the Software Configuration Scenarios to Troubleshoot Power over Ethernet (PoE) Table 189: Power over Ethernet Troubleshooting Scenarios Symptom or Problem Possible Cause and Solution Only one port does not have PoE. Verify that the powered device works on another PoE port. Trouble is on only one switch port. Use the show run, or show interface status user EXEC commands PoE and non-PoE devices do not work to verify that the port is not shut down or error-disabled. on this port, but do on other ports. Note Most switches turn off port power when the port is shut down, even though the IEEE specifications make this optional. Verify that the Ethernet cable from the powered device to the switch port is good: Connect a known good non-PoE Ethernet device to the Ethernet cable, and make sure that the powered device establishes a link and exchanges traffic with another host. Verify that the total cable length from the switch front panel to the powered device is not more than 100 meters. Disconnect the Ethernet cable from the switch port. Use a short Ethernet cable to connect a known good Ethernet device directly to this port on the switch front panel (not on a patch panel). Verify that it can establish an Ethernet link and exchange traffic with another host, or ping the port VLAN SVI. Next, connect a powered device to this port, and verify that it powers on. If a powered device does not power on when connected with a patch cord to the switch port, compare the total number of connected powered devices to the switch power budget (available PoE). Use the show inline power command to verify the amount of available power. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2094 System Management Scenarios to Troubleshoot Power over Ethernet (PoE) Symptom or Problem Possible Cause and Solution No PoE on all ports or a group of ports. If there is a continuous, intermittent, or reoccurring alarm related to Trouble is on all switch ports. Nonpowered Ethernet devices cannot power, replace the power supply if possible it is a field-replaceable unit. Otherwise, replace the switch. establish an Ethernet link on any port, If the problem is on a consecutive group of ports but not all ports, and PoE devices do not power on. the power supply is probably not defective, and the problem could be related to PoE regulators in the switch. Use the show log privileged EXEC command to review alarms or system messages that previously reported PoE conditions or status changes. If there are no alarms, use the show interface status command to verify that the ports are not shut down or error-disabled. If ports are error-disabled, use the shut and no shut interface configuration commands to reenable the ports. Use the show env power and show power inline privileged EXEC commands to review the PoE status and power budget (available PoE). Review the running configuration to verify that power inline never is not configured on the ports. Connect a nonpowered Ethernet device directly to a switch port. Use only a short patch cord. Do not use the existing distribution cables. Enter the shut and no shut interface configuration commands, and verify that an Ethernet link is established. If this connection is good, use a short patch cord to connect a powered device to this port and verify that it powers on. If the device powers on, verify that all intermediate patch panels are correctly connected. Disconnect all but one of the Ethernet cables from switch ports. Using a short patch cord, connect a powered device to only one PoE port. Verify the powered device does not require more power than can be delivered by the switch port. Use the show power inline privileged EXEC command to verify that the powered device can receive power when the port is not shut down. Alternatively, watch the powered device to verify that it powers on. If a powered device can power on when only one powered device is connected to the switch, enter the shut and no shut interface configuration commands on the remaining ports, and then reconnect the Ethernet cables one at a time to the switch PoE ports. Use the show interface status and show power inline privileged EXEC commands to monitor inline power statistics and port status. If there is still no PoE at any port, a fuse might be open in the PoE section of the power supply. This normally produces an alarm. Check the log again for alarms reported earlier by system messages. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2095 Configuration Examples for Troubleshooting Software System Management Symptom or Problem Possible Cause and Solution Cisco IP Phone disconnects or resets. Verify all electrical connections from the switch to the powered After working normally, a Cisco phone or wireless access point intermittently reloads or disconnects from PoE. device. Any unreliable connection results in power interruptions and irregular powered device functioning such as erratic powered device disconnects and reloads. Verify that the cable length is not more than 100 meters from the switch port to the powered device. Notice what changes in the electrical environment at the switch location or what happens at the powered device when the disconnect occurs. Notice whether any error messages appear at the same time a disconnect occurs. Use the show log privileged EXEC command to review error messages. Verify that an IP phone is not losing access to the Call Manager immediately before the reload occurs. (It might be a network problem and not a PoE problem.) Replace the powered device with a non-PoE device, and verify that the device works correctly. If a non-PoE device has link problems or a high error rate, the problem might be an unreliable cable connection between the switch port and the powered device. Non-Cisco powered device does not Use the show power inline command to verify that the switch power work on Cisco PoE switch. budget (available PoE) is not depleted before or after the powered A non-Cisco powered device is connected to a Cisco PoE switch, but device is connected. Verify that sufficient power is available for the powered device type before you connect it. never powers on or powers on and then Use the show interface status command to verify that the switch quickly powers off. Non-PoE devices detects the connected powered device. work normally. Use the show log command to review system messages that reported an overcurrent condition on the port. Identify the symptom precisely: Does the powered device initially power on, but then disconnect? If so, the problem might be an initial surge-in (or inrush) current that exceeds a current-limit threshold for the port. Related Topics Power over Ethernet Ports, on page 2074 Configuration Examples for Troubleshooting Software Example: Pinging an IP Host This example shows how to ping an IP host: Switch# ping 172.20.52.3 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2096 System Management Example: Performing a Traceroute to an IP Host Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.20.52.3, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms Switch# Table 190: Ping Output Display Characters Character Description ! Each exclamation point means receipt of a reply. . Each period means the network server timed out while waiting for a reply. U A destination unreachable error PDU was received. C A congestion experienced packet was received. I User interrupted test. ? Unknown packet type. & Packet lifetime exceeded. To end a ping session, enter the escape sequence (Ctrl-^ X by default). Simultaneously press and release the Ctrl, Shift, and 6 keys and then press the X key. Related Topics Ping, on page 2075 Executing Ping, on page 2089 Example: Performing a Traceroute to an IP Host This example shows how to perform a traceroute to an IP host: Switch# traceroute ip 192.0.2.10 Type escape sequence to abort. Tracing the route to 192.0.2.10 1 192.0.2.1 0 msec 0 msec 4 msec 2 192.0.2.203 12 msec 8 msec 0 msec 3 192.0.2.100 4 msec 0 msec 0 msec 4 192.0.2.10 0 msec 4 msec 0 msec The display shows the hop count, the IP address of the router, and the round-trip time in milliseconds for each of the three probes that are sent. Table 191: Traceroute Output Display Characters Character Description * The probe timed out. ? Unknown packet type. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2097 Example: Enabling All System Diagnostics System Management Character Description A Administratively unreachable. Usually, this output means that an access list is blocking traffic. H Host unreachable. N Network unreachable. P Protocol unreachable. Q Source quench. U Port unreachable. To end a trace in progress, enter the escape sequence (Ctrl-^ X by default). Simultaneously press and release the Ctrl, Shift, and 6 keys and then press the X key. Related Topics IP Traceroute , on page 2076 Executing IP Traceroute, on page 2090 Example: Enabling All System Diagnostics Caution Because debugging output takes priority over other network traffic, and because the debug all privileged EXEC command generates more output than any other debug command, it can severely diminish switch performance or even render it unusable. In virtually all cases, it is best to use more specific debug commands. This command disables all-system diagnostics: Switch# debug all The no debug all privileged EXEC command disables all diagnostic output. Using the no debug all command is a convenient way to ensure that you have not accidentally left any debug commands enabled. Related Topics Debug Commands, on page 2078 Additional References for Troubleshooting Software Configuration Related Documents Related Topic System management commands Document Title System Management Command Reference (Catalyst 3650 Switches) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2098 System Management Feature History and Information for Troubleshooting Software Configuration Related Topic Platform-independent command reference Platform_independent configuration information Document Title Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches) Standards and RFCs Standard/RFC Title None -- MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Troubleshooting Software Configuration Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2099 Feature History and Information for Troubleshooting Software Configuration Related Topics Finding Feature Information, on page 19 System Management Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2100 X V I PA R T VideoStream · Configuring VideoStream, on page 2103 · Configuring VideoStream GUI, on page 2111 1 0 7 C H A P T E R Configuring VideoStream · Finding Feature Information, on page 2103 · Prerequisites for VideoStream, on page 2103 · Restrictions for Configuring VideoStream, on page 2103 · Information about VideoStream, on page 2104 · How to Configure VideoStream, on page 2104 · Monitoring Media Streams, on page 2109 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for VideoStream Make sure that the multicast feature is enabled. We recommend configuring IP multicast on the controller with multicast-multicast mode. Check for the IP address on the client machine. The machine should have an IP address from the respective VLAN. Verify that the access points have joined the controllers. Restrictions for Configuring VideoStream IGMP snooping is required to switch ON for this MC2UC feature to be functional. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2103 Information about VideoStream VideoStream Information about VideoStream The IEEE 802.11 wireless multicast delivery mechanism does not provide a reliable way to acknowledge lost or corrupted packets. The multicast frame packets are sent at a predetermined rate irrespective of the wireless client optimal data rate. As a result, if any multicast packet is lost in the air, it is not sent again which may cause an IP multicast stream unviewable. Also if the packets are delivered faster, the packets get congested. The VideoStream feature makes the IP multicast stream delivery reliable over the air, by converting the multicast frame to a unicast frame over the air. Each VideoStream client acknowledges receiving a video IP multicast stream. How to Configure VideoStream Configuring Multicast-Direct Globally for Media-Stream SUMMARY STEPS 1. configure terminal 2. wireless multicast 3. IP igmp snooping 4. IP igmp snooping querier 5. wireless media-stream multicast-direct 6. wireless media-stream message 7. wireless media-stream group<name><startIp><endIp> 8. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wireless multicast Step 3 IP igmp snooping Step 4 IP igmp snooping querier Step 5 wireless media-stream multicast-direct Example: Purpose Enters global configuration mode. Enables multicast for wireless forwarding. Enables IGMP snooping on a per-VLAN basis. If the global setting is disabled, then all VLANs are treated as disabled, whether they are enabled or not. Configures a snooping querier on an interface when there is no multicast router in the VLAN to generate queries. Configures the global multicast-direct feature for the controller. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2104 VideoStream Configuring Media-Stream for 802.11 bands Step 6 Step 7 Step 8 Command or Action Switch(config)#wireless media-stream multicast-direct Purpose wireless media-stream message Example: Switch(config)#wireless media-stream message ? Email Configure Session Announcement Email Notes Configure Session Announcement notes URL Configure Session Announcement URL phone Configure Session Announcement Phone number <cr> Configures various message configuration parameters like phone, URL, email and notes. That is, when a media stream is refused (due to bandwidth constraints), a message can be sent to the user. These parameters configure the messages to send IT support email address, notes (message to display explaining why the stream was refused), URL to which the user can be redirected and the phone number that the user can call about the refused stream. wireless media-stream group<name><startIp><endIp> Example: configures each media stream and its parameters like expected multicast destination addresses, stream bandwidth consumption and stream priority parameters. Switch(config)#wireless media-stream group grp1 231.1.1.1 239.1.1.3 Switch(config-media-stream)#? avg-packet-size Configures average packet size default Set a command to its defaults exit Exit sub-mode max-bandwidth Configures maximum Expected Stream Bandwidth in Kbps no Negate a command or set its defaults policy Configure media stream admission policy qos Configure Over the AIR QoS class, <'video'> ONLY <cr> end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Media-Stream for 802.11 bands SUMMARY STEPS 1. configure terminal 2. ap dot11 24ghz | 5ghz media-stream multicast-direct 3. ap dot11 24ghz | 5ghz media-stream video-redirect 4. ap dot11 24ghz | 5ghz media-stream multicast-direct admission-besteffort 5. ap dot11 24ghz | 5ghz media-stream multicast-direct client-maximum [<value >] 6. ap dot11 24ghz | 5ghz media-stream multicast-direct radio-maximum 20 7. ap dot11 24ghz | 5ghz cac multimedia max-bandwidth [<bandwidth>] 8. ap dot11 24ghz | 5ghz cac media-stream multicast-direct min_client_rate [<dot11_rate> ] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2105 Configuring Media-Stream for 802.11 bands VideoStream 9. ap dot11 5ghz cac media-stream 10. ap dot11 5ghz cac multimedia 11. ap dot11 5ghz cac video 12. ap dot11 5ghz cac voice 13. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz media-stream multicast-direct Example: Switch(config)#ap dot11 24ghz media-stream multicast-direct Configures if media stream (mc2uc) is allowed for 802.11 band Step 3 ap dot11 24ghz | 5ghz media-stream video-redirect Example: Switch(config)#ap dot11 24ghz media-stream video-redirect Configures to redirect unicast video traffic to best effort queue. Step 4 ap dot11 24ghz | 5ghz media-stream multicast-direct admission-besteffort Example: Switch(config)#ap dot11 24ghz media-stream multicast-direct admission-besteffort Configures the media stream to still be sent through the best effort queue if a media stream cannot be prioritized due to bandwidth availability limitations. Add no in the command to drop the stream if the media stream cannot be prioritized due to bandwidth availability limitations. Step 5 ap dot11 24ghz | 5ghz media-stream multicast-direct client-maximum [<value >] Example: Switch(config)#ap dot11 24ghz media-stream multicast-direct client-max 15 Configures maximum number of allowed media streams per individual client. The maximum is 15 and the default is 0. Value 0 denotes unlimited streams. Step 6 Step 7 ap dot11 24ghz | 5ghz media-stream multicast-direct Configures maximum number of radio streams. The range radio-maximum 20 is from 1 to 20. Default is 0. Value 0 denotes unlimited streams. ap dot11 24ghz | 5ghz cac multimedia max-bandwidth Configure maximum media (voice + video) bandwidth in [<bandwidth>] %. The range is between 5% and 85%. Example: Switch(config)#ap dot11 24ghz cac multimedia max-bandwidth 60 Step 8 ap dot11 24ghz | 5ghz cac media-stream multicast-direct Configures the minimum PHY rate needed for a client to min_client_rate [<dot11_rate> ] send media-stream as unicast. Clients communicating Example: below this rate will not receive the media stream as a Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2106 VideoStream Configuring WLAN to Stream Video Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action Switch(config)#ap dot11 24ghz cac media-stream multicast-direct min_client_rate Purpose unicast flow. Typically, this PHY rate is equal to or higher than the rate at which multicast frames are sent. ap dot11 5ghz cac media-stream ap dot11 5ghz cac multimedia ap dot11 5ghz cac video ap dot11 5ghz cac voice end Example: Switch(config)# end Configures CAC parameters for media stream access category. Configures CAC parameters for media access category, used for voice and video. Configures CAC parameters for video access category, used for voice signaling. Configures CAC parameters for voice access category. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring WLAN to Stream Video SUMMARY STEPS 1. configure terminal 2. wlan wlan_name 3. shutdown 4. media-stream multicast-direct 5. no shutdown 6. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan wlan_name Example: Switch(config)#wlan wlan50 Step 3 shutdown Example: Switch(config-wlan)#shutdown Step 4 media-stream multicast-direct Example: Purpose Enters global configuration mode. Enters the WLAN configuration mode. Disables the WLAN for configuring it parameters. Configures the multicast-direct feature on media-stream for the WLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2107 Deleting a Media-Stream VideoStream Step 5 Step 6 Command or Action Switch(config)#media-stream multicast-direct no shutdown Example: Switch(config-wlan)#no shutdown end Example: Switch(config)# end Purpose Enables the WLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Deleting a Media-Stream Before you begin The media-stream should be enabled and configured for it to be deleted. SUMMARY STEPS 1. configure terminal 2. no wireless media-stream group media_stream_name 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 no wireless media-stream group media_stream_name Example: Switch(config)#no wireless media-stream grp1 Deletes the media-stream which bears the name mentioned in the command. Step 3 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2108 VideoStream Monitoring Media Streams Monitoring Media Streams Table 192: Commands for monitoring media streams Commands Description show wireless media-stream client detail group Displays media stream client details of the particular name group. show wireless media-stream client summary Displays the media stream information of all the clients. show wireless media-stream group detail group Displays the media stream configuration details of the name particular group. show wireless media-stream group summary Displays the media stream configuration details of all the groups. show wireless media-stream message details Displays the session announcement message details. show wireless multicast Displays the multicast-direct configuration state. show ap dot11 24ghz | 5ghz media-stream rrc Displays 802.11 media Resource-Reservation-Control configurations. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2109 Monitoring Media Streams VideoStream Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2110 1 0 8 C H A P T E R Configuring VideoStream GUI · Configuring VideoStream (GUI), on page 2111 Configuring VideoStream (GUI) Complete the following steps to configure VideoStream using GUI. Step 1 Step 2 Configure the multicast feature by following these steps: a) Choose Wireless > MediaStream > General. b) Select or unselect the Multicast Direct feature check box. The default value is disabled. Note Enabling the multicast direct feature does not automatically reset the existing client state. The wireless clients must rejoin the multicast stream after enabling the multicast direct feature on the controller. c) In the Session Message Config area, select Session announcement State check box to enable the session announcement mechanism. If the session announcement state is enabled, clients are informed each time a controller is not able to serve the multicast direct data to the client. d) In the Session announcement URL text box, enter the URL where the client can find more information when an error occurs during the multicast media stream transmission. e) In the Session announcement e-mail text box, enter the e-mail address of the person who can be contacted. f) In the Session announcement Phone text box, enter the phone number of the person who can be contacted. g) In the Session announcement Note text box, enter a reason as to why a particular client cannot be served with a multicast media. h) Click Apply. Add a media stream by following these steps: a) Choose Wireless > Media Stream > Streams to open the Media Stream page. b) Click Add New to configure a new media stream. The Media Stream > New page appears. Note The Stream Name, Multicast Destination Start IP Address (IPv4 or IPv6), and Multicast Destination End IP Address (IPv4 or IPv6) text boxes are mandatory. You must enter information in these text boxes. c) In the Stream Name text box, enter the media stream name. The stream name can be up to 64 characters. d) In the Multicast Destination Start IP Address (IPv4 or IPv6) text box, enter the start (IPv4 or IPv6) address of the multicast media stream. e) In the Multicast Destination End IP Address (IPv4 or IPv6) text box, enter the end (IPv4 or IPv6) address of the multicast media stream. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2111 Configuring VideoStream (GUI) VideoStream Step 3 Example: Note Ensure that the Multicast Destination Start and End IP addresses are of the same type, that is both addresses should be of either IPv4 or IPv6 type. f) In the Maximum Expected Bandwidth text box, enter the maximum expected bandwidth that you want to assign to the media stream. The values can range between 1 to 35000 kbps. Example: Note We recommend that you use a template to add a media stream to the controller. g) From the Select from Predefined Templates drop-down list under Resource Reservation Control (RRC) Parameters, choose one of the following options to specify the details about the resource reservation control: · Very Coarse (below 300 kbps) · Coarse (below 500 kbps) · Ordinary (below 750 kbps) · Low (below 1 Mbps) · Medium (below 3 Mbps) · High (below 5 Mbps) Note When you select a predefined template from the drop-down list, the following text boxes under the Resource Reservation Control (RRC) Parameters list their default values that are assigned with the template. · Average Packet Size (100-1500 bytes)--Specifies the average packet size. The value can be in the range of 100 to 1500 bytes. The default value is 1200. · RRC Periodic update--Enables the RRC (Resource Reservation Control Check) Periodic update. By default, this option is enabled. RRC periodically updates the admission decision on the admitted stream according to the correct channel load. As a result, it may deny certain low priority admitted stream requests. · RRC Priority (1-8)--Specifies the priority bit set in the media stream. The priority can be any number between 1 and 8. The larger the value means the higher the priority is. For example, a priority of 1 is the lowest value and a value of 8 is the highest value. The default priority is 4. The low priority stream may be denied in the RRC periodic update. · Traffic Profile Violation--Specifies the action to perform in case of a violation after a re-RRC. Choose an action from the drop-down list. The possible values are as follows: Drop--Specifies that a stream is dropped on periodic revaluation. Fallback--Specifies that a stream is demoted to Best Effort class on periodic reevaluation. The default value is drop. h) Click Apply. Enable the media stream for multicast-direct by following these steps: a) Choose WLANs > WLAN ID to open the WLANs > Edit page. b) Click the QoS tab and select Gold (Video) from the Quality of Service (QoS) drop-down list. c) Click Apply. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2112 VideoStream Configuring VideoStream (GUI) Step 4 Step 5 Step 6 Step 7 Set the EDCA parameters to voice and video optimized (optional) by following these steps: a) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > EDCA Parameters. b) From the EDCA Profile drop-down list, choose the Voice and Video Optimized option. c) Click Apply. Enable the admission control on a band for video (optional) by following these steps: Note Keep the voice bandwidth allocation to a minimum for better performance. a) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > Media to open the 802.11a/n (5 GHZ) or 802.11b/g/n > Media page. b) Click the Video tab. c) Select the Admission Control (ACM) check box to enable bandwidth-based CAC for this radio band. The default value is disabled. d) Click Apply Configure the video bandwidth by following these steps: Note The template bandwidth that is configured for a media stream should be more than the bandwidth for the source media stream. The voice configuration is optional. Keep the voice bandwidth allocation to a minimum for better performance. a) Disable all WMM WLANs. b) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > Media to open the 802.11a/n/ac (5 GHZ) or 802.11b/g/n > Media page. c) Click the Video tab. d) Select the Admission Control (ACM) check box to enable the video CAC for this radio band. The default value is disabled. e) In the Max RF Bandwidth field, enter the percentage of the maximum bandwidth allocated to clients for video applications on this radio band. Once the client reaches the value specified, the access point rejects new requests on this radio band. The range is 5 to 85%. The default value is 9%. f) Click Apply. g) Reenable all WMM WLANs and click Apply. Configure the media bandwidth by following these steps: a) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > Media to open the 802.11a (or 802.11b) > Media > Parameters page. b) Click the Media tab to open the Media page. c) Select the Unicast Video Redirect check box to enable Unicast Video Redirect. The default value is disabled. d) In the Maximum Media Bandwidth (0-85%) text box, enter the percentage of the maximum bandwidth to be allocated for media applications on this radio band. Once the client reaches a specified value, the access point rejects new calls on this radio band. The default value is 85%; valid values are from 0% to 85%. e) In the Client Minimum Phy Rate text box, enter the minimum transmission data rate to the client. If the transmission data rate is below the phy rate, either the video will not start or the client may be classified as a bad client. The bad client video can be demoted for better effort QoS or subject to denial. f) In the Maximum Retry Percent (0-100%) text box, enter the percentage of maximum retries that are allowed. The default value is 80. If it exceeds 80, either the video will not start or the client might be classified as a bad client. The bad client video can be demoted for better effort QoS or subject to denial. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2113 Configuring VideoStream (GUI) VideoStream Step 8 Step 9 Step 10 g) Select the Multicast Direct Enable check box to enable the Multicast Direct Enable field. The default value is enabled. h) From the Max Streams per Radio drop-down list, choose the maximum number of streams allowed per radio from the range 0 to 20. The default value is set to No-limit. If you choose No-limit, there is no limit set for the number of client subscriptions. i) From the Max Streams per Client drop-down list, choose the maximum number of streams allowed per client from the range 0 to 20. The default value is set to No-limit. If you choose No-limit, there is no limit set for the number of client subscriptions. j) Select the Best Effort QoS Admission check box to enable best-effort QoS admission. k) Click Apply. Enable a WLAN by following these steps: a) Choose WLANS > WLAN ID. The WLANs > Edit page appears. b) Select the Status check box. c) Click Apply. Enable the 802.11 a/n/ac or 802.11 b/g/n network by following these steps: a) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > Network. b) Select the 802.11a or 802.11b/g Network Status check box to enable the network status. c) Click Apply. Verify that the clients are associated with the multicast groups and group IDs by following these steps: a) Choose Monitor > Clients. The Clients page appears. b) Check if the 802.11a/n/ac or 802.11b/g/n network clients have the associated access points. c) Choose Monitor > Multicast. The Multicast Groups page appears. d) Select the MGID check box for the VideoStream to the clients. e) Click MGID. The Multicast Group Detail page appears. Check the Multicast Status details. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2114 PART XVII VLAN · Configuring VTP, on page 2117 · Configuring VLANs, on page 2141 · Configuring VLAN Groups, on page 2161 · Configuring VLAN Trunks, on page 2169 · Configuring Voice VLANs, on page 2189 1 0 9 C H A P T E R Configuring VTP · Finding Feature Information, on page 2117 · Prerequisites for VTP, on page 2117 · Restrictions for VTP, on page 2118 · Information About VTP, on page 2118 · How to Configure VTP, on page 2128 · Monitoring VTP, on page 2137 · Configuration Examples for VTP, on page 2138 · Where to Go Next, on page 2138 · Additional References, on page 2139 · Feature History and Information for VTP, on page 2140 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for VTP Before you create VLANs, you must decide whether to use the VLAN Trunking Protocol (VTP) in your network. Using VTP, you can make configuration changes centrally on one or more switches and have those changes automatically communicated to all the other switches in the network. Without VTP, you cannot send information about VLANs to other switches. VTP is designed to work in an environment where updates are made on a single switch and are sent through VTP to other switches in the domain. It does not work well in a situation where multiple updates to the VLAN database occur simultaneously on switches in the same domain, which would result in an inconsistency in the VLAN database. The switch supports a total of 4094 VLANs. However, the number of configured features affects the usage of the switch hardware. If the switch is notified by VTP of a new VLAN and the switch is already using the maximum available hardware resources, it sends a message that there are not enough hardware resources Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2117 Restrictions for VTP VLAN available and shuts down the VLAN. The output of the show vlan user EXEC command shows the VLAN in a suspended state. You can enable or disable VTP per port by entering the [no] vtp interface configuration command. When you disable VTP on trunking ports, all VTP instances for that port are disabled. You cannot set VTP to off for the MST database and on for the VLAN database on the same port. When you globally set VTP mode to off, it applies to all the trunking ports in the system. However, you can specify on or off on a per-VTP instance basis. For example, you can configure the switch as a VTP server for the VLAN database but with VTP off for the MST database. Because trunk ports send and receive VTP advertisements, you must ensure that at least one trunk port is configured on the switch or switch stack and that this trunk port is connected to the trunk port of another switch. Otherwise, the switch cannot receive any VTP advertisements. Related Topics VTP Advertisements, on page 2121 Adding a VTP Client Switch to a VTP Domain (CLI), on page 2135 VTP Domain, on page 2119 VTP Modes, on page 2120 Restrictions for VTP The following are restrictions for a VTP: · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Caution Before adding a VTP client switch to a VTP domain, always verify that its VTP configuration revision number is lower than the configuration revision number of the other switches in the VTP domain. Switches in a VTP domain always use the VLAN configuration of the switch with the highest VTP configuration revision number. If you add a switch that has a revision number higher than the revision number in the VTP domain, it can erase all VLAN information from the VTP server and VTP domain. Information About VTP VTP VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations and configuration inconsistencies that can cause several problems, such as duplicate VLAN names, incorrect VLAN-type specifications, and security violations. VTP functionality is supported across the stack, and all switches in the stack maintain the same VLAN and VTP configuration inherited from the active switch. When a switch learns of a new VLAN through VTP messages or when a new VLAN is configured by the user, the new VLAN information is communicated to all switches in the stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2118 VLAN VTP Domain When a switch joins the stack or when stacks merge, the new switches get VTP information from the active switch. VTP Domain A VTP domain (also called a VLAN management domain) consists of one switch or several interconnected switches or switch stacks under the same administrative responsibility sharing the same VTP domain name. A switch can be in only one VTP domain. You make global VLAN configuration changes for the domain. By default, the switch is in the VTP no-management-domain state until it receives an advertisement for a domain over a trunk link (a link that carries the traffic of multiple VLANs) or until you configure a domain name. Until the management domain name is specified or learned, you cannot create or modify VLANs on a VTP server, and VLAN information is not propagated over the network. If the switch receives a VTP advertisement over a trunk link, it inherits the management domain name and the VTP configuration revision number. The switch then ignores advertisements with a different domain name or an earlier configuration revision number. Note Before adding a VTP client switch to a VTP domain, always verify that its VTP configuration revision number is lower than the configuration revision number of the other switches in the VTP domain. Switches in a VTP domain always use the VLAN configuration of the switch with the highest VTP configuration revision number. If you add a switch that has a revision number higher than the revision number in the VTP domain, it can erase all VLAN information from the VTP server and VTP domain. When you make a change to the VLAN configuration on a VTP server, the change is propagated to all switches in the VTP domain. VTP advertisements are sent over all IEEE trunk connections, including IEEE 802.1Q. VTP dynamically maps VLANs with unique names and internal index associates across multiple LAN types. Mapping eliminates excessive device administration required from network administrators. If you configure a switch for VTP transparent mode, you can create and modify VLANs, but the changes are not sent to other switches in the domain, and they affect only the individual switch. However, configuration changes made when the switch is in this mode are saved in the switch running configuration and can be saved to the switch startup configuration file. Related Topics Adding a VTP Client Switch to a VTP Domain (CLI), on page 2135 Prerequisites for VTP, on page 2117 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2119 VTP Modes VTP Modes Table 193: VTP Modes VTP Mode VTP server VTP client VLAN Description In VTP server mode, you can create, modify, and delete VLANs, and specify other configuration parameters (such as the VTP version) for the entire VTP domain. VTP servers advertise their VLAN configurations to other switches in the same VTP domain and synchronize their VLAN configurations with other switches based on advertisements received over trunk links. VTP server is the default mode. In VTP server mode, VLAN configurations are saved in NVRAM. If the switch detects a failure while writing a configuration to NVRAM, VTP mode automatically changes from server mode to client mode. If this happens, the switch cannot be returned to VTP server mode until the NVRAM is functioning. A VTP client functions like a VTP server and transmits and receives VTP updates on its trunks, but you cannot create, change, or delete VLANs on a VTP client. VLANs are configured on another switch in the domain that is in server mode. In VTP versions 1 and 2 in VTP client mode, VLAN configurations are not saved in NVRAM. In VTP version 3, VLAN configurations are saved in NVRAM in client mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2120 VLAN VTP Advertisements VTP Mode VTP transparent VTP off Related Topics Prerequisites for VTP, on page 2117 Configuring VTP Mode (CLI), on page 2128 Description VTP transparent switches do not participate in VTP. A VTP transparent switch does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, in VTP version 2 or version 3, transparent switches do forward VTP advertisements that they receive from other switches through their trunk interfaces. You can create, modify, and delete VLANs on a switch in VTP transparent mode. When the switch is in VTP transparent mode, the VTP and VLAN configurations are saved in NVRAM, but they are not advertised to other switches. In this mode, VTP mode and domain name are saved in the switch running configuration, and you can save this information in the switch startup configuration file by using the copy running-config startup-config privileged EXEC command. In a switch stack, the running configuration and the saved configuration are the same for all switches in a stack. A switch in VTP off mode functions in the same manner as a VTP transparent switch, except that it does not forward VTP advertisements on trunks. VTP Advertisements Each switch in the VTP domain sends periodic global configuration advertisements from each trunk port to a reserved multicast address. Neighboring switches receive these advertisements and update their VTP and VLAN configurations as necessary. Because trunk ports send and receive VTP advertisements, you must ensure that at least one trunk port is configured on the switch stack and that this trunk port is connected to the trunk port of another switch. Otherwise, the switch cannot receive any VTP advertisements. VTP advertisements distribute this global domain information: · VTP domain name · VTP configuration revision number · Update identity and update timestamp · MD5 digest VLAN configuration, including maximum transmission unit (MTU) size for each VLAN Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2121 VTP Version 2 VLAN · Frame format VTP advertisements distribute this VLAN information for each configured VLAN: · VLAN IDs (including IEEE 802.1Q) · VLAN name · VLAN type · VLAN state · Additional VLAN configuration information specific to the VLAN type In VTP version 3, VTP advertisements also include the primary server ID, an instance number, and a start index. Related Topics Prerequisites for VTP, on page 2117 VTP Version 2 If you use VTP in your network, you must decide which version of VTP to use. By default, VTP operates in version 1. VTP version 2 supports these features that are not supported in version 1: · Token Ring support--VTP version 2 supports Token Ring Bridge Relay Function (TrBRF) and Token Ring Concentrator Relay Function (TrCRF) VLANs. · Unrecognized Type-Length-Value (TLV) support--A VTP server or client propagates configuration changes to its other trunks, even for TLVs it is not able to parse. The unrecognized TLV is saved in NVRAM when the switch is operating in VTP server mode. · Version-Dependent Transparent Mode--In VTP version 1, a VTP transparent switch inspects VTP messages for the domain name and version and forwards a message only if the version and domain name match. Although VTP version 2 supports only one domain, a VTP version 2 transparent switch forwards a message only when the domain name matches. · Consistency Checks--In VTP version 2, VLAN consistency checks (such as VLAN names and values) are performed only when you enter new information through the CLI or SNMP. Consistency checks are not performed when new information is obtained from a VTP message or when information is read from NVRAM. If the MD5 digest on a received VTP message is correct, its information is accepted. Related Topics Enabling the VTP Version (CLI), on page 2131 VTP Version 3 VTP version 3 supports these features that are not supported in version 1 or version 2: · Enhanced authentication--You can configure the authentication as hidden or secret. When hidden, the secret key from the password string is saved in the VLAN database file, but it does not appear in plain text in the configuration. Instead, the key associated with the password is saved in hexadecimal format Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2122 VLAN VTP Pruning in the running configuration. You must reenter the password if you enter a takeover command in the domain. When you enter the secret keyword, you can directly configure the password secret key. · Support for extended range VLAN (VLANs 1006 to 4094) database propagation--VTP versions 1 and 2 propagate only VLANs 1 to 1005. Note VTP pruning still applies only to VLANs 1 to 1005, and VLANs 1002 to 1005 are still reserved and cannot be modified. · Support for any database in a domain--In addition to propagating VTP information, version 3 can propagate Multiple Spanning Tree (MST) protocol database information. A separate instance of the VTP protocol runs for each application that uses VTP. · VTP primary server and VTP secondary servers--A VTP primary server updates the database information and sends updates that are honored by all devices in the system. A VTP secondary server can only back up the updated VTP configurations received from the primary server to its NVRAM. By default, all devices come up as secondary servers. You can enter the vtp primary privileged EXEC command to specify a primary server. Primary server status is only needed for database updates when the administrator issues a takeover message in the domain. You can have a working VTP domain without any primary servers. Primary server status is lost if the device reloads or domain parameters change, even when a password is configured on the switch. Related Topics Enabling the VTP Version (CLI), on page 2131 VTP Pruning VTP pruning increases network available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to reach the destination devices. Without VTP pruning, a switch floods broadcast, multicast, and unknown unicast traffic across all trunk links within a VTP domain even though receiving switches might discard them. VTP pruning is disabled by default. VTP pruning blocks unneeded flooded traffic to VLANs on trunk ports that are included in the pruning-eligible list. Only VLANs included in the pruning-eligible list can be pruned. By default, VLANs 2 through 1001 are pruning eligible switch trunk ports. If the VLANs are configured as pruning-ineligible, the flooding continues. VTP pruning is supported in all VTP versions. Figure 99: Flooding Traffic without VTP Pruning VTP pruning is disabled in the switched network. Port 1 on Switch A and Port 2 on Switch D are assigned to the Red VLAN. If a broadcast is sent from the host connected to Switch A, Switch A floods the broadcast and every switch in the network receives it, even though Switches C, E, and F have no ports in the Red VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2123 VTP and Switch Stacks VLAN Figure 100: Optimized Flooded Traffic VTP Pruning VTP pruning is enabled in the switched network. The broadcast traffic from Switch A is not forwarded to Switches C, E, and F because traffic for the Red VLAN has been pruned on the links shown (Port 5 on Switch B and Port 4 on Switch D). Enabling VTP pruning on a VTP server enables pruning for the entire management domain. Making VLANs pruning-eligible or pruning-ineligible affects pruning eligibility for those VLANs on that trunk only (not on all switches in the VTP domain). VTP pruning takes effect several seconds after you enable it. VTP pruning does not prune traffic from VLANs that are pruning-ineligible. VLAN 1 and VLANs 1002 to 1005 are always pruning-ineligible; traffic from these VLANs cannot be pruned. Extended-range VLANs (VLAN IDs higher than 1005) are also pruning-ineligible. Related Topics Enabling VTP Pruning (CLI), on page 2133 VTP and Switch Stacks VTP configuration is the same in all members of a switch stack. When the switch stack is in VTP server, client, or transparent mode, all switches in the stack carry the same VTP configuration. · When a switch joins the stack, it inherits the VTP and VLAN properties of the active switch. · All VTP updates are carried across the stack. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2124 VLAN VTP Configuration Guidelines · When VTP mode is changed in a switch in the stack, the other switches in the stack also change VTP mode, and the switch VLAN database remains consistent. VTP version 3 functions the same on a standalone switch or a stack except when the switch stack is the primary server for the VTP database. In this case, the MAC address of the active switch is used as the primary server ID. If the active switch reloads or is powered off, a new active switch is elected. · If you do not configure the persistent MAC address feature, when the new active switch is elected, it sends a takeover message using the current stack MAC address. Note By default the persistent MAC address is on. VTP Configuration Guidelines VTP Configuration Requirements When you configure VTP, you must configure a trunk port so that the switch can send and receive VTP advertisements to and from other switches in the domain. VTP Settings The VTP information is saved in the VTP VLAN database. When VTP mode is transparent, the VTP domain name and mode are also saved in the switch running configuration file, and you can save it in the switch startup configuration file by entering the copy running-config startup-config privileged EXEC command. You must use this command if you want to save VTP mode as transparent, even if the switch resets. When you save VTP information in the switch startup configuration file and reboot the switch, the switch configuration is selected as follows: · If the VTP mode is transparent in the startup configuration and the VLAN database and the VTP domain name from the VLAN database matches that in the startup configuration file, the VLAN database is ignored (cleared), and the VTP and VLAN configurations in the startup configuration file are used. The VLAN database revision number remains unchanged in the VLAN database. · If the VTP mode or domain name in the startup configuration do not match the VLAN database, the domain name and VTP mode and configuration for VLAN IDs 1 to 1005 use the VLAN database information. Related Topics Configuring VTP on a Per-Port Basis (CLI), on page 2134 Configuring a VTP Version 3 Primary Server (CLI), on page 2131 Domain Names for Configuring VTP When configuring VTP for the first time, you must always assign a domain name. You must configure all switches in the VTP domain with the same domain name. Switches in VTP transparent mode do not exchange VTP messages with other switches, and you do not need to configure a VTP domain name for them. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2125 Passwords for the VTP Domain VLAN Note If the NVRAM and DRAM storage is sufficient, all switches in a VTP domain should be in VTP server mode. Caution Do not configure a VTP domain if all switches are operating in VTP client mode. If you configure the domain, it is impossible to make changes to the VLAN configuration of that domain. Make sure that you configure at least one switch in the VTP domain for VTP server mode. Related Topics Adding a VTP Client Switch to a VTP Domain (CLI), on page 2135 Passwords for the VTP Domain You can configure a password for the VTP domain, but it is not required. If you do configure a domain password, all domain switches must share the same password and you must configure the password on each switch in the management domain. Switches without a password or with the wrong password reject VTP advertisements. If you configure a VTP password for a domain, a switch that is booted without a VTP configuration does not accept VTP advertisements until you configure it with the correct password. After the configuration, the switch accepts the next VTP advertisement that uses the same password and domain name in the advertisement. If you are adding a new switch to an existing network with VTP capability, the new switch learns the domain name only after the applicable password has been configured on it. Caution When you configure a VTP domain password, the management domain does not function properly if you do not assign a management domain password to each switch in the domain. Related Topics Configuring a VTP Version 3 Password (CLI), on page 2129 Example: Configuring a Switch as the Primary Server, on page 2138 VTP Version Follow these guidelines when deciding which VTP version to implement: · All switches in a VTP domain must have the same domain name, but they do not need to run the same VTP version. · A VTP version 2-capable switch can operate in the same VTP domain as a switch running VTP version 1 if version 2 is disabled on the version 2-capable switch (version 2 is disabled by default). · If a switch running VTP version 1, but capable of running VTP version 2, receives VTP version 3 advertisements, it automatically moves to VTP version 2. · If a switch running VTP version 3 is connected to a switch running VTP version 1, the VTP version 1 switch moves to VTP version 2, and the VTP version 3 switch sends scaled-down versions of the VTP packets so that the VTP version 2 switch can update its database. · A switch running VTP version 3 cannot move to version 1 or 2 if it has extended VLANs. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2126 VLAN VTP Version · Do not enable VTP version 2 on a switch unless all of the switches in the same VTP domain are version-2-capable. When you enable version 2 on a switch, all of the version-2-capable switches in the domain enable version 2. If there is a version 1-only switch, it does not exchange VTP information with switches that have version 2 enabled. · Cisco recommends placing VTP version 1 and 2 switches at the edge of the network because they do not forward VTP version 3 advertisements. · If there are TrBRF and TrCRF Token Ring networks in your environment, you must enable VTP version 2 or version 3 for Token Ring VLAN switching to function properly. To run Token Ring and Token Ring-Net, disable VTP version 2. · VTP version 1 and version 2 do not propagate configuration information for extended range VLANs (VLANs 1006 to 4094). You must configure these VLANs manually on each device. VTP version 3 supports extended-range VLANs and support for extended range VLAN database propagation. · When a VTP version 3 device trunk port receives messages from a VTP version 2 device, it sends a scaled-down version of the VLAN database on that particular trunk in VTP version 2 format. A VTP version 3 device does not send VTP version 2-formatted packets on a trunk unless it first receives VTP version 2 packets on that trunk port. · When a VTP version 3 device detects a VTP version 2 device on a trunk port, it continues to send VTP version 3 packets, in addition to VTP version 2 packets, to allow both kinds of neighbors to coexist on the same trunk. · A VTP version 3 device does not accept configuration information from a VTP version 2 or version 1 device. · Two VTP version 3 regions can only communicate in transparent mode over a VTP version 1 or version 2 region. · Devices that are only VTP version 1 capable cannot interoperate with VTP version 3 devices. · VTP version 1 and version 2 do not propagate configuration information for extended range VLANs (VLANs 1006 to 4094). You must manually configure these VLANs on each device. · If you configure the switch for VTP client mode, the switch does not create the VLAN database file (vlan.dat). If the switch is then powered off, it resets the VTP configuration to the default. To keep the VTP configuration with VTP client mode after the switch restarts, you must first configure the VTP domain name before the VTP mode. Caution If all switches are operating in VTP client mode, do not configure a VTP domain name. If you do, it is impossible to make changes to the VLAN configuration of that domain. Therefore, make sure you configure at least one switch as a VTP server. Related Topics Enabling the VTP Version (CLI), on page 2131 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2127 How to Configure VTP VLAN How to Configure VTP Configuring VTP Mode (CLI) You can configure VTP mode as one of these: · VTP server mode--In VTP server mode, you can change the VLAN configuration and have it propagated throughout the network. · VTP client mode--In VTP client mode, you cannot change its VLAN configuration. The client switch receives VTP updates from a VTP server in the VTP domain and then modifies its configuration accordingly. · VTP transparent mode--In VTP transparent mode, VTP is disabled on the switch. The switch does not send VTP updates and does not act on VTP updates received from other switch. However, a VTP transparent switch running VTP version 2 does forward received VTP advertisements on its trunk links. · VTP off mode--VTP off mode is the same as VTP transparent mode except that VTP advertisements are not forwarded. When you configure a domain name, it cannot be removed; you can only reassign a switch to a different domain. SUMMARY STEPS 1. configure terminal 2. vtp domain domain-name 3. vtp mode {client | server | transparent | off} {vlan | mst | unknown} 4. vtp password password 5. end 6. show vtp status 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 vtp domain domain-name Example: Switch(config)# vtp domain eng_group Configures the VTP administrative-domain name. The name can be 1 to 32 characters. All switches operating in VTP server or client mode under the same administrative responsibility must be configured with the same domain name. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2128 VLAN Configuring a VTP Version 3 Password (CLI) Step 3 Step 4 Step 5 Command or Action Purpose This command is optional for modes other than server mode. VTP server mode requires a domain name. If the switch has a trunk connection to a VTP domain, the switch learns the domain name from the VTP server in the domain. You should configure the VTP domain before configuring other VTP parameters. vtp mode {client | server | transparent | off} {vlan | mst Configures the switch for VTP mode (client, server, | unknown} transparent, or off). Example: Switch(config)# vtp mode server · vlan--The VLAN database is the default if none are configured. · mst--The multiple spanning tree (MST) database. · unknown--An unknown database type. vtp password password Example: Switch(config)# vtp password mypassword end Example: Switch(config)# end (Optional) Sets the password for the VTP domain. The password can be 8 to 64 characters. If you configure a VTP password, the VTP domain does not function properly if you do not assign the same password to each switch in the domain. Returns to privileged EXEC mode. Step 6 show vtp status Example: Switch# show vtp status Verifies your entries in the VTP Operating Mode and the VTP Domain Name fields of the display. Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config Related Topics VTP Modes, on page 2120 (Optional) Saves the configuration in the startup configuration file. Only VTP mode and domain name are saved in the switch running configuration and can be copied to the startup configuration file. Configuring a VTP Version 3 Password (CLI) You can configure a VTP version 3 password on the switch. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2129 Configuring a VTP Version 3 Password (CLI) VLAN SUMMARY STEPS 1. configure terminal 2. vtp password password [hidden | secret] 3. end 4. show vtp password 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 Step 3 vtp password password [hidden | secret] Example: Switch(config)# vtp password mypassword hidden (Optional) Sets the password for the VTP domain. The password can be 8 to 64 characters. · (Optional) hidden--Saves the secret key generated from the password string in the nvram:vlan.dat file. If you configure a takeover by configuring a VTP primary server, you are prompted to reenter the password. · (Optional) secret--Directly configures the password. The secret password must contain 32 hexadecimal characters. end Example: Switch(config)# end Returns to privileged EXEC mode. Step 4 show vtp password Example: Switch# show vtp password Verifies your entries. The output appears like this: VTP password: 89914640C8D90868B6A0D8103847A733 Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves the configuration in the startup configuration file. Related Topics Passwords for the VTP Domain, on page 2126 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2130 VLAN Configuring a VTP Version 3 Primary Server (CLI) Example: Configuring a Switch as the Primary Server, on page 2138 Configuring a VTP Version 3 Primary Server (CLI) When you configure a VTP server as a VTP primary server, the takeover operation starts. SUMMARY STEPS 1. vtp primary [vlan | mst] [force] DETAILED STEPS Step 1 Command or Action vtp primary [vlan | mst] [force] Example: Switch# vtp primary vlan force Purpose Changes the operational state of a switch from a secondary server (the default) to a primary server and advertises the configuration to the domain. If the switch password is configured as hidden, you are prompted to reenter the password. · (Optional) vlan--Selects the VLAN database as the takeover feature. This is the default. · (Optional) mst--Selects the multiple spanning tree (MST) database as the takeover feature. · (Optional) force--Overwrites the configuration of any conflicting servers. If you do not enter force, you are prompted for confirmation before the takeover. Related Topics VTP Settings, on page 2125 Enabling the VTP Version (CLI) VTP version 2 and version 3 are disabled by default. · When you enable VTP version 2 on a switch , every VTP version 2-capable switch in the VTP domain enables version 2. To enable VTP version 3, you must manually configure it on each switch . · With VTP versions 1 and 2, you can configure the version only on switches in VTP server or transparent mode. If a switch is running VTP version 3, you can change to version 2 when the switch is in client mode if no extended VLANs exist, and no hidden password was configured. Caution VTP version 1 and VTP version 2 are not interoperable on switches in the same VTP domain. Do not enable VTP version 2 unless every switch in the VTP domain supports version 2. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2131 Enabling the VTP Version (CLI) VLAN · In TrCRF and TrBRF Token Ring environments, you must enable VTP version 2 or VTP version 3 for Token Ring VLAN switching to function properly. For Token Ring and Token Ring-Net media, disable VTP version 2. Caution In VTP version 3, both the primary and secondary servers can exist on an instance in the domain. SUMMARY STEPS 1. configure terminal 2. vtp version {1 | 2 | 3} 3. end 4. show vtp status 5. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 vtp version {1 | 2 | 3} Example: Switch(config)# vtp version 2 Step 3 end Example: Switch(config)# end Step 4 show vtp status Example: Switch# show vtp status Step 5 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Enters the global configuration mode. Enables the VTP version on the switch. The default is VTP version 1. Returns to privileged EXEC mode. Verifies that the configured VTP version is enabled. (Optional) Saves the configuration in the startup configuration file. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2132 VLAN Enabling VTP Pruning (CLI) Related Topics VTP Version, on page 2126 VTP Version 2, on page 2122 VTP Version 3, on page 2122 Enabling VTP Pruning (CLI) Pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the destination devices. You can only enable VTP pruning on a switch in VTP server mode. With VTP versions 1 and 2, when you enable pruning on the VTP server, it is enabled for the entire VTP domain. In VTP version 3, you must manually enable pruning on each switch in the domain. Only VLANs included in the pruning-eligible list can be pruned. By default, VLANs 2 through 1001 are pruning-eligible on trunk ports. Reserved VLANs and extended-range VLANs cannot be pruned. Before you begin VTP pruning is not designed to function in VTP transparent mode. If one or more switches in the network are in VTP transparent mode, you should do one of these actions: · Turn off VTP pruning in the entire network. · Turn off VTP pruning by making all VLANs on the trunk of the switch upstream to the VTP transparent switch pruning ineligible. To configure VTP pruning on an interface, use the switchport trunk pruning vlan interface configuration command. VTP pruning operates when an interface is trunking. You can set VLAN pruning-eligibility, whether or not VTP pruning is enabled for the VTP domain, whether or not any given VLAN exists, and whether or not the interface is currently trunking. SUMMARY STEPS 1. configure terminal 2. vtp pruning 3. end 4. show vtp status DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 vtp pruning Example: Enables pruning in the VTP administrative domain. By default, pruning is disabled. You need to enable pruning on only one switch in VTP server mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2133 Configuring VTP on a Per-Port Basis (CLI) VLAN Command or Action Switch(config)# vtp pruning Step 3 end Example: Switch(config)# end Step 4 show vtp status Example: Switch# show vtp status Purpose Returns to privileged EXEC mode. Verifies your entries in the VTP Pruning Mode field of the display. Related Topics VTP Pruning, on page 2123 Configuring VTP on a Per-Port Basis (CLI) With VTP version 3, you can enable or disable VTP on a per-port basis. You can enable VTP only on ports that are in trunk mode. Incoming and outgoing VTP traffic are blocked, not forwarded. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. vtp 4. end 5. show running-config interface interface-id 6. show vtp status DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Identifies an interface, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2134 VLAN Adding a VTP Client Switch to a VTP Domain (CLI) Step 3 Command or Action vtp Example: Switch(config)# vtp Step 4 end Example: Switch(config)# end Step 5 show running-config interface interface-id Example: Switch# show running-config interface gigabitethernet1/0/1 Step 6 show vtp status Example: Switch# show vtp status Purpose Enables VTP on the specified port. Returns to privileged EXEC mode. Verifies the change to the port. Verifies the configuration. Related Topics VTP Settings, on page 2125 Adding a VTP Client Switch to a VTP Domain (CLI) Follow these steps to verify and reset the VTP configuration revision number on a switch before adding it to a VTP domain. Before you begin Before adding a VTP client to a VTP domain, always verify that its VTP configuration revision number is lower than the configuration revision number of the other switches in the VTP domain. Switches in a VTP domain always use the VLAN configuration of the switch with the highest VTP configuration revision number. With VTP versions 1 and 2, adding a switch that has a revision number higher than the revision number in the VTP domain can erase all VLAN information from the VTP server and VTP domain. With VTP version 3, the VLAN information is not erased. You can use the vtp mode transparent global configuration command to disable VTP on the switch and then to change its VLAN information without affecting the other switches in the VTP domain. SUMMARY STEPS 1. show vtp status 2. configure terminal Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2135 Adding a VTP Client Switch to a VTP Domain (CLI) 3. vtp domain domain-name 4. end 5. show vtp status 6. configure terminal 7. vtp domain domain-name 8. end 9. show vtp status DETAILED STEPS Step 1 Command or Action show vtp status Example: Switch# show vtp status Step 2 configure terminal Example: Switch# configure terminal Step 3 vtp domain domain-name Example: Switch(config)# vtp domain domain123 Step 4 end Example: Switch(config)# end Step 5 show vtp status Example: Switch# show vtp status Step 6 configure terminal Example: VLAN Purpose Checks the VTP configuration revision number. If the number is 0, add the switch to the VTP domain. If the number is greater than 0, follow these substeps: · Write down the domain name. · Write down the configuration revision number. · Continue with the next steps to reset the switch configuration revision number. Enters the global configuration mode. Changes the domain name from the original one displayed in Step 1 to a new name. Returns to privileged EXEC mode. The VLAN information on the switch is updated and the configuration revision number is reset to 0. Verifies that the configuration revision number has been reset to 0. Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2136 VLAN Monitoring VTP Command or Action Switch# configure terminal Step 7 vtp domain domain-name Example: Switch(config)# vtp domain domain012 Step 8 end Example: Switch(config)# end Step 9 show vtp status Example: Switch# show vtp status Purpose Enters the original domain name on the switch Returns to privileged EXEC mode. The VLAN information on the switch is updated. (Optional) Verifies that the domain name is the same as in Step 1 and that the configuration revision number is 0. Related Topics VTP Domain, on page 2119 Prerequisites for VTP, on page 2117 Domain Names for Configuring VTP, on page 2125 Monitoring VTP This section describes commands used to display and monitor the VTP configuration. You monitor VTP by displaying VTP configuration information: the domain name, the current VTP revision, and the number of VLANs. You can also display statistics about the advertisements sent and received by the switch. Table 194: VTP Monitoring Commands Command show vtp counters show vtp devices [conflict] Purpose Displays counters about VTP messages that have been sent and received. Displays information about all VTP version 3 devices in the domain. Conflicts are VTP version 3 devices with conflicting primary servers. The show vtp devices command does not display information when the switch is in transparent or off mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2137 Configuration Examples for VTP VLAN Command show vtp interface [interface-id] show vtp password show vtp status Purpose Displays VTP status and configuration for all interfaces or the specified interface. Displays the VTP password. The form of the password displayed depends on whether or not the hidden keyword was entered and if encryption is enabled on the switch. Displays the VTP switch configuration information. Configuration Examples for VTP Example: Configuring a Switch as the Primary Server This example shows how to configure a switch as the primary server for the VLAN database (the default) when a hidden or secret password was configured: Switch# vtp primary vlan Enter VTP password: mypassword This switch is becoming Primary server for vlan feature in the VTP domain VTP Database Conf Switch ID Primary Server Revision System Name ------------ ---- -------------- -------------- -------- -------------------- VLANDB Yes 00d0.00b8.1400=00d0.00b8.1400 1 stp7 Do you want to continue (y/n) [n]? y Related Topics Configuring a VTP Version 3 Password (CLI), on page 2129 Passwords for the VTP Domain, on page 2126 Where to Go Next After configuring VTP, you can configure the following: · VLANs · VLAN groups · VLAN trunking · Voice VLANs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2138 VLAN Additional References Additional References Related Documents Related Topic Document Title For complete syntax and usage information VLAN Command Reference (Catalyst 3650 Switches) for the commands used in this chapter. Layer 2/3 Command Reference (Catalyst 3650 Switches) Additional configuration commands and procedures. LAN Switching Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Layer 2/3 Configuration Guide (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2139 Feature History and Information for VTP VLAN Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for VTP Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2140 1 1 0 C H A P T E R Configuring VLANs · Finding Feature Information, on page 2141 · Prerequisites for VLANs, on page 2141 · Restrictions for VLANs, on page 2142 · Information About VLANs, on page 2142 · How to Configure VLANs, on page 2147 · Monitoring VLANs, on page 2158 · Where to Go Next, on page 2158 · Additional References, on page 2159 · Feature History and Information for VLANs, on page 2160 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for VLANs The following are prerequisites and considerations for configuring VLANs: · Before you create VLANs, you must decide whether to use VLAN Trunking Protocol (VTP) to maintain global VLAN configuration for your network. · If you plan to configure many VLANs on the switch and to not enable routing, you can set the Switch Database Management (SDM) feature to the VLAN template, which configures system resources to support the maximum number of unicast MAC addresses. · Switches running the LAN Base feature set support only static routing on SVIs. · A VLAN should be present in the switch to be able to add it to the VLAN group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2141 Restrictions for VLANs VLAN Restrictions for VLANs The following are restrictions for VLANs: · The switch supports per-VLAN spanning-tree plus (PVST+) or rapid PVST+ with a maximum of 128 spanning-tree instances. One spanning-tree instance is allowed per VLAN. · The switch supports IEEE 802.1Q trunking methods for sending VLAN traffic over Ethernet ports. · Configuring an interface VLAN router's MAC address is not supported. The interface VLAN already has an MAC address assigned by default. · Private VLANs are not supported on the switch. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Information About VLANs Logical Networks A VLAN is a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment. Any switch port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to end stations in the VLAN. Each VLAN is considered a logical network, and packets destined for stations that do not belong to the VLAN must be forwarded through a router or a switch supporting fallback bridging. In a switch stack, VLANs can be formed with ports across the stack. Because a VLAN is considered a separate logical network, it contains its own bridge Management Information Base (MIB) information and can support its own implementation of spanning tree. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2142 VLAN Figure 101: VLANs as Logically Defined Networks Supported VLANs VLANs are often associated with IP subnetworks. For example, all the end stations in a particular IP subnet belong to the same VLAN. Interface VLAN membership on the switch is assigned manually on an interface-by-interface basis. When you assign switch interfaces to VLANs by using this method, it is known as interface-based, or static, VLAN membership. Traffic between VLANs must be routed. The switch can route traffic between VLANs by using switch virtual interfaces (SVIs). An SVI must be explicitly configured and assigned an IP address to route traffic between VLANs. Supported VLANs The switch supports VLANs in VTP client, server, and transparent modes. VLANs are identified by a number from 1 to 4094. VLAN 1 is the default VLAN and is created during system initialization. VLAN IDs 1002 through 1005 are reserved for Token Ring and FDDI VLANs. All of the VLANs except 1002 to 1005 are available for user configuration. There are 3 VTP versions: VTP version 1, version 2, and version 3. All VTP versions support both normal and extended range VLANs, but only with VTP version 3, does the switch propagate extended range VLAN configuration information. When extended range VLANs are created in VTP versions 1 and 2, their configuration information is not propagated. Even the local VTP database entries on the switch are not updated, but the extended range VLANs configuration information is created and stored in the running configuration file. You can configure up to 4094 VLANs on the switch. Related Topics Creating or Modifying an Ethernet VLAN (CLI), on page 2147 Deleting a VLAN (CLI), on page 2150 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2143 VLAN Port Membership Modes VLAN Assigning Static-Access Ports to a VLAN (CLI), on page 2151 Monitoring VLANs, on page 2158 Creating an Extended-Range VLAN (CLI), on page 2153 Creating an Extended-Range VLAN with an Internal VLAN ID VLAN Port Membership Modes You configure a port to belong to a VLAN by assigning a membership mode that specifies the kind of traffic the port carries and the number of VLANs to which it can belong. When a port belongs to a VLAN, the switch learns and manages the addresses associated with the port on a per-VLAN basis. Table 195: Port Membership Modes and Characteristics Membership Mode Static-access Trunk (IEEE 802.1Q) : · IEEE 802.1Q-- Industry-standard trunking encapsulation. Voice VLAN VLAN Membership Characteristics VTP Characteristics A static-access port can belong to one VLAN and is manually assigned to that VLAN. VTP is not required. If you do not want VTP to globally propagate information, set the VTP mode to transparent. To participate in VTP, there must be at least one trunk port on the switch or the switch stack connected to a trunk port of a second switch or switch stack. A trunk port is a member of all VTP is recommended but not VLANs by default, including required. VTP maintains VLAN extended-range VLANs, but configuration consistency by membership can be limited by managing the addition, deletion, configuring the allowed-VLAN list. and renaming of VLANs on a You can also modify the network-wide basis. VTP pruning-eligible list to block exchanges VLAN configuration flooded traffic to VLANs on trunk messages with other switches over ports that are included in the list. trunk links. A voice VLAN port is an access VTP is not required; it has no effect port attached to a Cisco IP Phone, on a voice VLAN. configured to use one VLAN for voice traffic and another VLAN for data traffic from a device attached to the phone. Related Topics Assigning Static-Access Ports to a VLAN (CLI), on page 2151 Monitoring VLANs, on page 2158 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2144 VLAN VLAN Configuration Files VLAN Configuration Files Configurations for VLAN IDs 1 to 1005 are written to the vlan.dat file (VLAN database), and you can display them by entering the show vlan privileged EXEC command. The vlan.dat file is stored in flash memory. If the VTP mode is transparent, they are also saved in the switch running configuration file. In a switch stack, the whole stack uses the same vlan.dat file and running configuration. On some switches, the vlan.dat file is stored in flash memory on the active switch. You use the interface configuration mode to define the port membership mode and to add and remove ports from VLANs. The results of these commands are written to the running-configuration file, and you can display the file by entering the show running-config privileged EXEC command. When you save VLAN and VTP information (including extended-range VLAN configuration information) in the startup configuration file and reboot the switch, the switch configuration is selected as follows: · If the VTP mode is transparent in the startup configuration, and the VLAN database and the VTP domain name from the VLAN database matches that in the startup configuration file, the VLAN database is ignored (cleared), and the VTP and VLAN configurations in the startup configuration file are used. The VLAN database revision number remains unchanged in the VLAN database. · If the VTP mode or domain name in the startup configuration does not match the VLAN database, the domain name and VTP mode and configuration for the VLAN IDs 1 to 1005 use the VLAN database information. · In VTP versions 1 and 2, if VTP mode is server, the domain name and VLAN configuration for VLAN IDs 1 to 1005 use the VLAN database information. VTP version 3 also supports VLANs 1006 to 4094. Normal-Range VLAN Configuration Guidelines Normal-range VLANs are VLANs with IDs from 1 to 1005. Follow these guidelines when creating and modifying normal-range VLANs in your network: · Normal-range VLANs are identified with a number between 1 and 1001. VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs. · VLAN configurations for VLANs 1 to 1005 are always saved in the VLAN database. If the VTP mode is transparent, VTP and VLAN configurations are also saved in the switch running configuration file. · If the switch is in VTP server or VTP transparent mode, you can add, modify or remove configurations for VLANs 2 to 1001 in the VLAN database. (VLAN IDs 1 and 1002 to 1005 are automatically created and cannot be removed.) · Extended-range VLANs created in VTP transparent mode are not saved in the VLAN database and are not propagated. VTP version 3 supports extended range VLAN (VLANs 1006 to 4094) database propagation in VTP server mode. · Before you can create a VLAN, the switch must be in VTP server mode or VTP transparent mode. If the switch is a VTP server, you must define a VTP domain or VTP will not function. · The switch does not support Token Ring or FDDI media. The switch does not forward FDDI, FDDI-Net, TrCRF, or TrBRF traffic, but it does propagate the VLAN configuration through VTP. · The switch supports 128 spanning tree instances. If a switch has more active VLANs than supported spanning-tree instances, spanning tree can be enabled on 128 VLANs and is disabled on the remaining Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2145 Extended-Range VLAN Configuration Guidelines VLAN VLANs. If you have already used all available spanning-tree instances on a switch, adding another VLAN anywhere in the VTP domain creates a VLAN on that switch that is not running spanning-tree. If you have the default allowed list on the trunk ports of that switch (which is to allow all VLANs), the new VLAN is carried on all trunk ports. Depending on the topology of the network, this could create a loop in the new VLAN that would not be broken, particularly if there are several adjacent switches that all have run out of spanning-tree instances. You can prevent this possibility by setting allowed lists on the trunk ports of switches that have used up their allocation of spanning-tree instances. If the number of VLANs on the switch exceeds the number of supported spanning-tree instances, we recommend that you configure the IEEE 802.1s Multiple STP (MSTP) on your switch to map multiple VLANs to a single spanning-tree instance. · When a switch in a stack learns a new VLAN or deletes or modifies an existing VLAN (either through VTP over network ports or through the CLI), the VLAN information is communicated to all stack members. · When a switch joins a stack or when stacks merge, VTP information (the vlan.dat file) on the new switches will be consistent with the active switch. Related Topics Creating or Modifying an Ethernet VLAN (CLI), on page 2147 Deleting a VLAN (CLI), on page 2150 Assigning Static-Access Ports to a VLAN (CLI), on page 2151 Monitoring VLANs, on page 2158 Extended-Range VLAN Configuration Guidelines Extended-range VLANs are VLANs with IDs from 1006 to 4094. Follow these guidelines when creating extended-range VLANs: · VLAN IDs in the extended range are not saved in the VLAN database and are not recognized by VTP unless the switch is running VTP version 3. · You cannot include extended-range VLANs in the pruning eligible range. · For VTP version 1 or 2, you can set the VTP mode to transparent in global configuration mode. You should save this configuration to the startup configuration so that the switch boots up in VTP transparent mode. Otherwise, you lose the extended-range VLAN configuration if the switch resets. If you create extended-range VLANs in VTP version 3, you cannot convert to VTP version 1 or 2. · . When the maximum number of spanning-tree instances are on the switch, spanning tree is disabled on any newly created VLANs. If the number of VLANs on the switch exceeds the maximum number of spanning-tree instances, we recommend that you configure the IEEE 802.1s Multiple STP (MSTP) on your switch to map multiple VLANs to a single spanning-tree instance. · In a switch stack, the whole stack uses the same running configuration and saved configuration, and extended-range VLAN information is shared across the stack. Related Topics Creating an Extended-Range VLAN (CLI), on page 2153 Creating an Extended-Range VLAN with an Internal VLAN ID Monitoring VLANs, on page 2158 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2146 VLAN How to Configure VLANs How to Configure VLANs How to Configure Normal-Range VLANs You can set these parameters when you create a new normal-range VLAN or modify an existing VLAN in the VLAN database: · VLAN ID · VLAN name · VLAN type · Ethernet · Fiber Distributed Data Interface [FDDI] · FDDI network entity title [NET] · TrBRF or TrCRF · Token Ring · Token Ring-Net · VLAN state (active or suspended) · Maximum transmission unit (MTU) for the VLAN · Security Association Identifier (SAID) · Bridge identification number for TrBRF VLANs · Ring number for FDDI and TrCRF VLANs · Parent VLAN number for TrCRF VLANs · Spanning Tree Protocol (STP) type for TrCRF VLANs · VLAN number to use when translating from one VLAN type to another You can cause inconsistency in the VLAN database if you attempt to manually delete the vlan.dat file. If you want to modify the VLAN configuration, follow the procedures in this section. Creating or Modifying an Ethernet VLAN (CLI) Before you begin With VTP version 1 and 2, if the switch is in VTP transparent mode, you can assign VLAN IDs greater than 1006, but they are not added to the VLAN database. The switch supports only Ethernet interfaces. Because FDDI and Token Ring VLANs are not locally supported, you only configure FDDI and Token Ring media-specific characteristics for VTP global advertisements to other switches. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2147 Creating or Modifying an Ethernet VLAN (CLI) VLAN Although the switch does not support Token Ring connections, a remote device with Token Ring connections could be managed from one of the supported switches. Switches running VTP Version 2 advertise information about these Token Ring VLANs: · Token Ring TrBRF VLANs · Token Ring TrCRF VLANs SUMMARY STEPS 1. configure terminal 2. vlan vlan-id 3. name vlan-name 4. media { ethernet | fd-net | fddi | tokenring | trn-net } 5. remote-span 6. end 7. show vlan {name vlan-name | id vlan-id} DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 vlan vlan-id Example: Switch(config)# vlan 20 Step 3 name vlan-name Example: Enters a VLAN ID, and enters VLAN configuration mode. Enter a new VLAN ID to create a VLAN, or enter an existing VLAN ID to modify that VLAN. Note The available VLAN ID range for this command is 1 to 4094. Additional vlan command options include: · access-map--Creates VLAN access-maps or enters the vlan access map command mode. · configuration--Enters the vlan feature configuration mode. · dot1q--Configures VLAN dot1q tag native parameters. · filter--Applies a VLAN filter map to a VLAN list. · group--Creates a VLAN group. (Optional) Enters a name for the VLAN. If no name is entered for the VLAN, the default is to append the vlan-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2148 VLAN Creating or Modifying an Ethernet VLAN (CLI) Step 4 Command or Action Switch(config-vlan)# name test20 Purpose value with leading zeros to the word VLAN. For example, VLAN0004 is a default VLAN name for VLAN 4. The following additional VLAN configuration command options are available: · are--Sets the maximum number of All Router Explorer (ARE) hops for the VLAN. · backupcrf--Enables or disables the backup concentrator relay function (CRF) mode for the VLAN. · bridge--Sets the value of the bridge number for the FDDI net or Token Ring net type VLANs. · exit--Applies changes, bumps the revision number, and exits. · media--Sets the media type of the VLAN. · no--Negates the command or default. · parent--Sets the value of the ID for the parent VLAN for FDDI or Token Ring type VLANs. · remote-span--Configures a remote SPAN VLAN. · ring--Sets the ring number value for FDDI or Token Ring type VLANs. · said--Sets the IEEE 802.10 SAID value. · shutdown--Shuts down the VLAN switching. · state--Sets the operational VLAN state to active or suspended. · ste--Sets the maximum number of Spanning Tree Explorer (STE) hops for the VLAN. · stp--Sets the Spanning Tree characteristics of the VLAN. media { ethernet | fd-net | fddi | tokenring | trn-net } Example: Switch(config-vlan)# media ethernet Configures the VLAN media type. Command options include: · ethernet--Sets the VLAN media type as Ethernet. · fd-net--Sets the VLAN media type as FDDI net. · fddi--Sets the VLAN media type as FDDI. · tokenring--Sets the VLAN media type as Token Ring. · trn-net--Sets the VLAN media type as Token Ring net. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2149 Deleting a VLAN (CLI) VLAN Step 5 Command or Action remote-span Example: Switch(config-vlan)# remote-span Step 6 end Example: Switch(config)# end Step 7 show vlan {name vlan-name | id vlan-id} Example: Switch# show vlan name test20 id 20 Purpose (Optional) Configures the VLAN as the RSPAN VLAN for a remote SPAN session. For more information on remote SPAN, see the Catalyst 3650 Network Management Configuration Guide. Returns to privileged EXEC mode. Verifies your entries. Related Topics Supported VLANs, on page 2143 Normal-Range VLAN Configuration Guidelines, on page 2145 Monitoring VLANs, on page 2158 Deleting a VLAN (CLI) When you delete a VLAN from a switch that is in VTP server mode, the VLAN is removed from the VLAN database for all switches in the VTP domain. When you delete a VLAN from a switch that is in VTP transparent mode, the VLAN is deleted only on that specific switch or a switch stack. You cannot delete the default VLANs for the different media types: Ethernet VLAN 1 and FDDI or Token Ring VLANs 1002 to 1005. Caution When you delete a VLAN, any ports assigned to that VLAN become inactive. They remain associated with the VLAN (and thus inactive) until you assign them to a new VLAN. SUMMARY STEPS 1. configure terminal 2. no vlan vlan-id 3. end 4. show vlan brief Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2150 VLAN Assigning Static-Access Ports to a VLAN (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 no vlan vlan-id Example: Switch(config)# no vlan 4 Step 3 end Example: Switch(config)# end Step 4 show vlan brief Example: Switch# show vlan brief Purpose Enters the global configuration mode. Removes the VLAN by entering the VLAN ID. Returns to privileged EXEC mode. Verifies the VLAN removal. Related Topics Supported VLANs, on page 2143 Normal-Range VLAN Configuration Guidelines, on page 2145 Monitoring VLANs, on page 2158 Assigning Static-Access Ports to a VLAN (CLI) You can assign a static-access port to a VLAN without having VTP globally propagate VLAN configuration information by disabling VTP (VTP transparent mode). If you assign an interface to a VLAN that does not exist, the new VLAN is created. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode access 4. switchport access vlan vlan-id 5. end 6. show running-config interface interface-id 7. show interfaces interface-id switchport Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2151 Assigning Static-Access Ports to a VLAN (CLI) VLAN DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode Step 2 interface interface-id Example: Enters the interface to be added to the VLAN. Switch(config)# interface gigabitethernet2/0/1 Step 3 switchport mode access Example: Switch(config-if)# switchport mode access Defines the VLAN membership mode for the port (Layer 2 access port). Step 4 switchport access vlan vlan-id Example: Switch(config-if)# switchport access vlan 2 Assigns the port to a VLAN. Valid VLAN IDs are 1 to 4094. Step 5 end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 6 show running-config interface interface-id Example: Switch# show running-config interface gigabitethernet2/0/1 Verifies the VLAN membership mode of the interface. Step 7 show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet2/0/1 switchport Verifies your entries in the Administrative Mode and the Access Mode VLAN fields of the display. Related Topics Supported VLANs, on page 2143 Normal-Range VLAN Configuration Guidelines, on page 2145 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2152 VLAN How to Configure Extended-Range VLANs Monitoring VLANs, on page 2158 VLAN Port Membership Modes, on page 2144 How to Configure Extended-Range VLANs Extended-range VLANs enable service providers to extend their infrastructure to a greater number of customers. The extended-range VLAN IDs are allowed for any switchport commands that allow VLAN IDs. With VTP version 1 or 2, extended-range VLAN configurations are not stored in the VLAN database, but because VTP mode is transparent, they are stored in the switch running configuration file, and you can save the configuration in the startup configuration file. Extended-range VLANs created in VTP version 3 are stored in the VLAN database. You can change only the MTU size and the remote SPAN configuration state on extended-range VLANs; all other characteristics must remain at the default state. Creating an Extended-Range VLAN (CLI) SUMMARY STEPS 1. configure terminal 2. vlan vlan-id 3. remote-span 4. exit 5. interface vlan 6. ip mtu mtu-size 7. end 8. show vlan id vlan-id 9. copy running-config startup config DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 vlan vlan-id Example: Switch(config)# vlan 2000 Switch(config-vlan)# Enters an extended-range VLAN ID and enters VLAN configuration mode. The range is 1006 to 4094. Step 3 remote-span Example: (Optional) Configures the VLAN as the RSPAN VLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2153 Creating an Extended-Range VLAN (CLI) VLAN Command or Action Switch(config-vlan)# remote-span Step 4 exit Example: Switch(config-vlan)# exit Switch(config)# Step 5 interface vlan Example: Switch(config)# interface vlan 200 Switch(config-if)# Step 6 ip mtu mtu-size Example: Switch(config-if)# ip mtu 1024 Switch(config-if)# Step 7 end Example: Switch(config)# end Step 8 show vlan id vlan-id Example: Switch# show vlan id 2000 Step 9 copy running-config startup config Example: Switch# copy running-config startup-config Purpose Returns to configuration mode. Enters the interface configuration mode for the selected VLAN. (Optional) Modifies the VLAN by changing the MTU size. You can configure the MTU size between 68 to 1500 bytes. Note Although all VLAN commands appear in the CLI help, only the ip mtu mtu-size and remote-span commands are supported for extended-range VLANs. Returns to privileged EXEC mode. Verifies that the VLAN has been created. Saves your entries in the switch startup configuration file. To save an extended-range VLAN configuration, you need to save the VTP transparent mode configuration and the extended-range VLAN configuration in the switch startup configuration file. Otherwise, if the switch resets, it will default to VTP server mode, and the extended-range VLAN IDs will not be saved. Note This step is not required for VTP version 3 because VLANs are saved in the VLAN database. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2154 VLAN How to Configure VLANs (GUI) Related Topics Supported VLANs, on page 2143 Extended-Range VLAN Configuration Guidelines, on page 2146 Monitoring VLANs, on page 2158 How to Configure VLANs (GUI) Creating Layer2 VLAN (GUI) To create a Layer2 VLAN using the switch web UI, you must follow the steps defined in this procedure. Step 1 To create a Layer2 VLAN, choose Configuration > Controller > System > VLAN > Layer2 VLAN. The VLAN Layer2 page appears. You must provide values for all parameters listed in the Layer2 page. Parameter VLAN ID Name State Description VLAN tag identifier, or 0 for no VLAN tag. VLAN name. VLAN state. Values are the following: · Active · Suspended Step 2 Click Apply. Creating Layer3 Interface (GUI) To create a Layer3 interface using the switch web UI, you must follow the steps defined in this procedure. Step 1 To create a Layer3 interface, choose Configuration > Controller > System > VLAN > Layer3 Interface. The Layer3 interface page appears. You must provide values for all parameters listed in the window. Parameter Description DHCP Relay Information IP Address Mask Address IPv6 Address IPv4 DHCP Server IPv6 DHCP Server Description Description for the Layer3 interface. Information on controller built-in DHCP relay agents. IP address/subnet mask of the VLAN SVI (Switch Virtual Interface). Mask address of the DHCP server. IPv6 address of the DHCP server. IPv4 address of the DHCP server. IPv6 address of the DHCP server. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2155 Viewing Layer2 VLAN (GUI) VLAN Step 2 Click Apply. Viewing Layer2 VLAN (GUI) You can view the details of the Layer2 VLANs configured in the switch interface using the web UI. Step 1 Procedure Command or Action Purpose Choose Configuration > Controller > System > VLAN The Layer2 VLAN page appears, listing the following > Layer2 VLAN . details of the Layer2 VLANs in the switch. Parameter Description VLAN ID Displays VLAN tag identifier. Name VLAN name. State VLAN state. Values are as follows: · Active · Suspended MTU Maximum transmission unit. Viewing Layer3 Interface (GUI) You can view the details of the Layer3 interfaces configured in the switch interface using the web UI. Choose Configuration > Controller > System > VLAN > Layer3 Interface . The Layer2 VLAN page appears, listing the following details of the Layer3 interfaces in the switch. Parameter Interface Name Status Description Layer3 interface name. Status of the Layer3 interface. Values are the following: · Up · Down Protocol IP Address Protocol used for Layer3 interface. IP address used for Layer3 security and mobility managers. Removing Layer2 VLAN (GUI) To remove a Layer2 VLANs using the switch web UI, you must: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2156 VLAN Removing Layer3 Interface (GUI) Step 1 Step 2 Step 3 Choose Configuration > Controller > System > VLAN > Layer2 VLAN . The Layer2 VLAN page appears, listing the following details of the Layer2 VLANs associated with the switch. Parameter VLAN ID Name State Description Displays VLAN tag identifier. VLAN name. VLAN state. Values are as follows: · Active · Suspended MTU Maximum transmission unit. Check the checkbox of the Layer2 VLAN you need to delete from the Layer2 VLANs displayed in the Layer2 VLAN list . You will receive a confirmation message confirming deletion of the selected Layer2 VLAN. Click Ok. Removing Layer3 Interface (GUI) To remove a Layer3 interface using the switch web UI, you must: Step 1 Step 2 Step 3 Choose Configuration > Controller > System > VLAN > Layer3 Interface. The Layer3 interface page appears, listing the following details of the Layer3 interfaces associated with the switch. Parameter Interface Name Status Description Layer3 interface name. Status of the Layer3 interface. Values are the following: · Up · Down Protocol IP Address Protocol used for Layer3 interface. IP address used for Layer3 security and mobility managers. Check the checkbox of the Layer3 interfaces you need to delete from the Layer3 interfaces displayed in the Layer3 interfaces. You will receive a confirmation message confirming deletion of the selected Layer3 interface. Click Ok. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2157 Monitoring VLANs VLAN Monitoring VLANs Table 196: Privileged EXEC show Commands Command Purpose show interfaces [vlan vlan-id] Displays characteristics for all interfaces or for the specified VLAN configured on the switch . show vlan [ access-map name | brief Displays parameters for all VLANs or the specified VLAN on the | dot1q { tag native } | filter [ switch. The following command options are available: access-map | vlan ] | group [ group-name name ] | id vlan-id | · access-map--Displays the VLAN access-maps. ifindex | mtu | name name | · brief--Displays VTP VLAN status in brief. remote-span | summary ] · dot1q--Displays the dot1q parameters. · filter--Displays VLAN filter information. · group--Displays the VLAN group with its name and the connected VLANs that are available. · id--Displays VTP VLAN status by identification number. · ifindex--Displays SNMP ifIndex. · mtu--Displays VLAN MTU information. · name--Displays the VTP VLAN information by specified name. · remote-spanDisplays the remote SPAN VLANs. · summary--Displays a summary of VLAN information. Related Topics Supported VLANs, on page 2143 Normal-Range VLAN Configuration Guidelines, on page 2145 Creating or Modifying an Ethernet VLAN (CLI), on page 2147 Deleting a VLAN (CLI), on page 2150 Assigning Static-Access Ports to a VLAN (CLI), on page 2151 Extended-Range VLAN Configuration Guidelines, on page 2146 Creating an Extended-Range VLAN (CLI), on page 2153 Creating an Extended-Range VLAN with an Internal VLAN ID VLAN Port Membership Modes, on page 2144 Where to Go Next After configuring VLANs, you can configure the following: · VLAN groups Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2158 VLAN Additional References · VLAN Trunking Protocol (VTP) · VLAN trunks · Voice VLANs Additional References Related Documents Related Topic Document Title For complete syntax and usage VLAN Command Reference (Catalyst 3650 Switches) information for the commands used in this chapter. Layer 2/3 Command Reference (Catalyst 3650 Switches) VLAN access-maps Security Configuration Guide (Catalyst 3650 Switches) Security Command Reference (Catalyst 3650 Switches) VLAN and Mobility Agents Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Cisco Flexible NetFlow Cisco Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Flexible Netflow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) IGMP Snooping IP Multicast Routing Command Reference (Catalyst 3650 Switches) IP Multicast Routing Configuration Guide (Catalyst 3650 Switches) IPv6 IPv6 Configuration Guide (Catalyst 3650 Switches) IPv6 Command Reference (Catalyst 3650 Switches) SPAN Network Management Command Reference (Catalyst 3650 Switches) Network Management Configuration Guide (Catalyst 3650 Switches) Platform-independent configuration Identity Based Networking Services Configuration Guide, Cisco IOS information XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2159 Feature History and Information for VLANs VLAN Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for VLANs Release Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE Modification This feature was introduced. VLAN GUI support. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2160 1 1 1 C H A P T E R Configuring VLAN Groups · Finding Feature Information, on page 2161 · Prerequisites for VLAN Groups, on page 2161 · Restrictions for VLAN Groups, on page 2161 · Information About VLAN Groups, on page 2162 · How to Configure VLAN Groups, on page 2162 · Where to Go Next, on page 2166 · Additional References, on page 2166 · Feature History and Information for VLAN Groups, on page 2167 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for VLAN Groups A VLAN should be present in the switch to be able to add it to the VLAN group. Restrictions for VLAN Groups The number of VLANs mapped to a VLAN group is not limited by Cisco IOS Software Release. But if the number of VLANs in a VLAN group exceed the recommended value of 32, the mobility behavior is unexpected and in the VLAN group, L2 multicast breaks for some VLANs. So it is the responsibility of the administrator to configure feasible number of VLANs in a VLAN group. When a VLAN is added to a VLAN group mapped to a WLAN which already has 32 VLANs, a warning is generated. But when a new VLAN group is mapped to a WLAN with more than 32 VLANs, an error is generated. For expected behavior of the VLAN group, the VLANs mapped in the group must be present in the switch. The static IP client behavior is not supported. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2161 Information About VLAN Groups VLAN Information About VLAN Groups Whenever a wireless client connects to a wireless network (WLAN), the client is placed in a VLAN that is associated with the WLAN. In a large venue such as an auditorium, a stadium, or a conference room where there are numerous wireless clients, having only a single WLAN to accommodate many clients might be a challenge. The VLAN group feature uses a single WLAN that can support multiple VLANs. The clients can get assigned to one of the configured VLANs. This feature maps a WLAN to a single VLAN or multiple VLANs using the VLAN groups. When a wireless client associates to the WLAN, the VLAN is derived by an algorithm based on the MAC address of the wireless client. A VLAN is assigned to the client and the client gets the IP address from the assigned VLAN. This feature also extends the current AP group architecture and AAA override architecture, where the AP groups and AAA override can override a VLAN or a VLAN group to which the WLAN is mapped. Related Topics Creating VLAN Groups (CLI), on page 2162 How to Configure VLAN Groups Creating VLAN Groups (CLI) SUMMARY STEPS 1. configure terminal 2. vlan group WORD vlan-list vlan-ID 3. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global command mode. Step 2 vlan group WORD vlan-list vlan-ID Creates a VLAN group with the given group name Example: (vlangrp1) and adds all the VLANs listed in the command. The VLAN list ranges from 1 to 4096 and the recommended Switch(config)#vlan group vlangrp1 vlan-list 91-95 number of VLANs in a group is 32. Step 3 end Example: Switch(config)#end Exits the global configuration mode and returns to privileged EXEC mode. Alternatively, press CTRL-Z to exit the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2162 VLAN Removing VLAN Group (CLI) Related Topics Information About VLAN Groups, on page 2162 Removing VLAN Group (CLI) SUMMARY STEPS 1. configure terminal 2. vlan group WORD vlan-list vlan-ID 3. no vlan group WORD vlan-list vlan-ID 4. end DETAILED STEPS Step 1 Step 2 Step 3 Step 4 configure terminal Example: Switch# configure terminal Enters global command mode. vlan group WORD vlan-list vlan-ID Example: Switch(config)#vlan group vlangrp1 vlan-list 91-95 Creates a VLAN group with the given group name (vlangrp1) and adds all the VLANs listed in the command. The VLAN list ranges from 1 to 4096 and the recommended number of VLANs in a group is 32. no vlan group WORD vlan-list vlan-ID Example: Switch(config)#no vlan group vlangrp1 vlan-list 91-95 Removes the VLAN group with the given group name (vlangrp1). end Example: Switch(config)#end Exits the global configuration mode and returns to privileged EXEC mode. Alternatively, press CTRL-Z to exit the global configuration mode. Creating VLAN Groups (GUI) To create a VLAN group using the switch web UI, you must: Step 1 Choose Configuration > Controller > System > VLAN > VLAN Group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2163 Adding a VLAN Group to WLAN (CLI) VLAN Step 2 The VLAN Group page appears. You must provide values for all parameters listed in the VLAN Group window. Parameter VLAN Group Name VLAN List Description Group name for the VLANs. The VLAN list to configure the mesh access point (MAP) access port. Click Apply. Adding a VLAN Group to WLAN (CLI) SUMMARY STEPS 1. configure terminal 2. wlan WORD number 3. client vlan WORD 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan WORD number Example: Switch(config)#wlan wlanname 512 Step 3 client vlan WORD Example: Switch(config-wlan)#client vlan vlangrp1 Step 4 end Example: Switch(config-wlan)#end Purpose Enters global command mode. Enables the WLAN to map a VLAN group using an identifier. The WLAN identifier values range from 1 to 512. Maps the VLAN group to the WLAN by entering the VLAN identifier, VLAN group, or the VLAN name. Exits the global configuration mode and returns to privileged EXEC mode . Alternatively, press CTRL-Z to exit the global configuration mode. Adding a VLAN Group to WLAN (GUI) To add a VLAN group to WLAN using the switch web UI, you must follow the steps defined in this procedure. Step 1 To add a VLAN group to a WLAN, choose Configuration > Wireless > WLANs > WLAN Profile > General. The general parameter page of the WLAN group appears. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2164 VLAN Removing VLAN Groups (GUI) Step 2 Step 3 Select the VLAN group values listed in the Interface/Interface Group drop-down list to associate the selected WLAN profile to a VLAN group. Click Apply. Removing VLAN Groups (GUI) To remove a VLAN groups using the switch web UI, you must: Step 1 Step 2 Step 3 Choose Configuration > Controller > System > VLAN > VLAN Group. The VLAN Group page appears, listing the following details of the VLAN groups associated with the switch. Parameter Description VLAN Group Name Group name for the VLANs. VLAN List The VLAN list to configure the mesh access point (MAP) access port. Check the checkbox of the VLAN group you need to delete from the VLAN group names displayed in the VLAN group list . You will receive a confirmation message confirming deletion of the selected VLAN group. Click Ok. Viewing VLANs in VLAN Groups (CLI) Commands show vlan group show vlan group group-name <group_name> show wireless vlan group <group_name> Description Displays the list of VLAN groups with its name and the VLANs that are available. Displays the specified VLAN group details. Displays the specified wireless VLAN group details. Viewing VLAN Groups (GUI) To view a VLAN groups using the switch web UI, you must: Step 1 Choose Configuration > Controller > System > VLAN > VLAN Group. The VLAN Group page appears, listing the following details of the VLAN groups associated with the switch. Parameter Description VLAN Group Name Group name for the VLANs. VLAN List The VLAN list to configure the mesh access point (MAP) access port. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2165 Where to Go Next VLAN Step 2 Click Apply. Where to Go Next After configuring VLAN groups, you can configure the following: · VLANs · VLAN Trunking Protocol (VTP) · VLAN trunks · Voice VLANs Additional References Related Documents Related Topic Document Title For complete syntax and usage VLAN Command Reference (Catalyst 3650 Switches) information for the commands used in this chapter. Layer 2/3 Command Reference (Catalyst 3650 Switches) VLAN access-maps Security Configuration Guide (Catalyst 3650 Switches) Security Command Reference (Catalyst 3650 Switches) VLAN and Mobility Agents Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Cisco Flexible NetFlow Cisco Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Flexible Netflow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) IGMP Snooping IP Multicast Routing Command Reference (Catalyst 3650 Switches) IP Multicast Routing Configuration Guide (Catalyst 3650 Switches) IPv6 IPv6 Configuration Guide (Catalyst 3650 Switches) IPv6 Command Reference (Catalyst 3650 Switches) SPAN Network Management Command Reference (Catalyst 3650 Switches) Network Management Configuration Guide (Catalyst 3650 Switches) Platform-independent configuration Identity Based Networking Services Configuration Guide, Cisco IOS information XE Release 3SE (Catalyst 3650 Switches) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2166 VLAN Feature History and Information for VLAN Groups Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for VLAN Groups Release Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE Modification This feature was introduced. VLAN GUI support. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2167 Feature History and Information for VLAN Groups VLAN Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2168 1 1 2 C H A P T E R Configuring VLAN Trunks · Finding Feature Information, on page 2169 · Prerequisites for VLAN Trunks, on page 2169 · Restrictions for VLAN Trunks, on page 2170 · Information About VLAN Trunks, on page 2170 · How to Configure VLAN Trunks, on page 2174 · Where to Go Next, on page 2187 · Additional References, on page 2187 · Feature History and Information for VLAN Trunks, on page 2188 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for VLAN Trunks The IEEE 802.1Q trunks impose these limitations on the trunking strategy for a network: · In a network of Cisco switches connected through IEEE 802.1Q trunks, the switches maintain one spanning-tree instance for each VLAN allowed on the trunks. Non-Cisco devices might support one spanning-tree instance for all VLANs. When you connect a Cisco switch to a non-Cisco device through an IEEE 802.1Q trunk, the Cisco switch combines the spanning-tree instance of the VLAN of the trunk with the spanning-tree instance of the non-Cisco IEEE 802.1Q switch. However, spanning-tree information for each VLAN is maintained by Cisco switches separated by a cloud of non-Cisco IEEE 802.1Q switches. The non-Cisco IEEE 802.1Q cloud separating the Cisco switches is treated as a single trunk link between the switches. · Make sure the native VLAN for an IEEE 802.1Q trunk is the same on both ends of the trunk link. If the native VLAN on one end of the trunk is different from the native VLAN on the other end, spanning-tree loops might result. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2169 Restrictions for VLAN Trunks VLAN · Disabling spanning tree on the native VLAN of an IEEE 802.1Q trunk without disabling spanning tree on every VLAN in the network can potentially cause spanning-tree loops. We recommend that you leave spanning tree enabled on the native VLAN of an IEEE 802.1Q trunk or disable spanning tree on every VLAN in the network. Make sure your network is loop-free before disabling spanning tree. Restrictions for VLAN Trunks The following are restrictions for VLAN trunks: · Dynamic Trunking Protocol (DTP) is not supported on tunnel ports. · The switch does not support Layer 3 trunks; you cannot configure subinterfaces or use the encapsulation keyword on Layer 3 interfaces. The switch does support Layer 2 trunks and Layer 3 VLAN interfaces, which provide equivalent capabilities. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Information About VLAN Trunks Trunking Overview A trunk is a point-to-point link between one or more Ethernet switch interfaces and another networking device such as a router or a switch. Ethernet trunks carry the traffic of multiple VLANs over a single link, and you can extend the VLANs across an entire network. The following trunking encapsulations are available on all Ethernet interfaces: · IEEE 802.1Q-- Industry-standard trunking encapsulation. Trunking Modes Ethernet trunk interfaces support different trunking modes. You can set an interface as trunking or nontrunking or to negotiate trunking with the neighboring interface. To autonegotiate trunking, the interfaces must be in the same VTP domain. Trunk negotiation is managed by the Dynamic Trunking Protocol (DTP), which is a Point-to-Point Protocol (PPP). However, some internetworking devices might forward DTP frames improperly, which could cause misconfigurations. Related Topics Configuring a Trunk Port (CLI), on page 2174 Layer 2 Interface Modes, on page 2171 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2170 VLAN Layer 2 Interface Modes Layer 2 Interface Modes Table 197: Layer 2 Interface Modes Mode Function switchport mode access Puts the interface (access port) into permanent nontrunking mode and negotiates to convert the link into a nontrunk link. The interface becomes a nontrunk interface regardless of whether or not the neighboring interface is a trunk interface. switchport mode dynamic Makes the interface able to convert the link to a trunk link. The interface auto becomes a trunk interface if the neighboring interface is set to trunk or desirable mode. The default switchport mode for all Ethernet interfaces is dynamic auto. switchport mode dynamic Makes the interface actively attempt to convert the link to a trunk link. The desirable interface becomes a trunk interface if the neighboring interface is set to trunk, desirable, or auto mode. switchport mode trunk Puts the interface into permanent trunking mode and negotiates to convert the neighboring link into a trunk link. The interface becomes a trunk interface even if the neighboring interface is not a trunk interface. switchport nonegotiate Prevents the interface from generating DTP frames. You can use this command only when the interface switchport mode is access or trunk. You must manually configure the neighboring interface as a trunk interface to establish a trunk link. Related Topics Configuring a Trunk Port (CLI), on page 2174 Trunking Modes, on page 2170 Allowed VLANs on a Trunk By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to 4094, are allowed on each trunk. However, you can remove VLANs from the allowed list, preventing traffic from those VLANs from passing over the trunk. To reduce the risk of spanning-tree loops or storms, you can disable VLAN 1 on any individual VLAN trunk port by removing VLAN 1 from the allowed list. When you remove VLAN 1 from a trunk port, the interface continues to send and receive management traffic, for example, Cisco Discovery Protocol (CDP), Port Aggregation Protocol (PAgP), Link Aggregation Control Protocol (LACP), DTP, and VTP in VLAN 1. If a trunk port with VLAN 1 disabled is converted to a nontrunk port, it is added to the access VLAN. If the access VLAN is set to 1, the port will be added to VLAN 1, regardless of the switchport trunk allowed setting. The same is true for any VLAN that has been disabled on the port. A trunk port can become a member of a VLAN if the VLAN is enabled, if VTP knows of the VLAN, and if the VLAN is in the allowed list for the port. When VTP detects a newly enabled VLAN and the VLAN is in the allowed list for a trunk port, the trunk port automatically becomes a member of the enabled VLAN. When Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2171 Load Sharing on Trunk Ports VLAN VTP detects a new VLAN and the VLAN is not in the allowed list for a trunk port, the trunk port does not become a member of the new VLAN. Related Topics Defining the Allowed VLANs on a Trunk (CLI), on page 2176 Load Sharing on Trunk Ports Load sharing divides the bandwidth supplied by parallel trunks connecting switches. To avoid loops, STP normally blocks all but one parallel link between switches. Using load sharing, you divide the traffic between the links according to which VLAN the traffic belongs. You configure load sharing on trunk ports by using STP port priorities or STP path costs. For load sharing using STP port priorities, both load-sharing links must be connected to the same switch. For load sharing using STP path costs, each load-sharing link can be connected to the same switch or to two different switches. Network Load Sharing Using STP Priorities When two ports on the same switch form a loop, the switch uses the STP port priority to decide which port is enabled and which port is in a blocking state. You can set the priorities on a parallel trunk port so that the port carries all the traffic for a given VLAN. The trunk port with the higher priority (lower values) for a VLAN is forwarding traffic for that VLAN. The trunk port with the lower priority (higher values) for the same VLAN remains in a blocking state for that VLAN. One trunk port sends or receives all traffic for the VLAN. Figure 102: Load Sharing by Using STP Port Priorities This figure shows two trunks connecting supported switches. · VLANs 8 through 10 are assigned a port priority of 16 on Trunk 1. · VLANs 3 through 6 retain the default port priority of 128 on Trunk 1. · VLANs 3 through 6 are assigned a port priority of 16 on Trunk 2. · VLANs 8 through 10 retain the default port priority of 128 on Trunk 2. Trunk 1 carries traffic for VLANs 8 through 10, and Trunk 2 carries traffic for VLANs 3 through 6. If the active trunk fails, the trunk with the lower priority takes over and carries the traffic for all of the VLANs. No duplication of traffic occurs over any trunk port. Related Topics Configuring Load Sharing Using STP Port Priorities (CLI), on page 2180 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2172 VLAN Network Load Sharing Using STP Path Cost Network Load Sharing Using STP Path Cost You can configure parallel trunks to share VLAN traffic by setting different path costs on a trunk and associating the path costs with different sets of VLANs, blocking different ports for different VLANs. The VLANs keep the traffic separate and maintain redundancy in the event of a lost link. Figure 103: Load-Sharing Trunks with Traffic Distributed by Path Cost Trunk ports 1 and 2 are configured as 100BASE-T ports. These VLAN path costs are assigned: · VLANs 2 through 4 are assigned a path cost of 30 on Trunk port 1. · VLANs 8 through 10 retain the default 100BASE-T path cost on Trunk port 1 of 19. · VLANs 8 through 10 are assigned a path cost of 30 on Trunk port 2. · VLANs 2 through 4 retain the default 100BASE-T path cost on Trunk port 2 of 19. Related Topics Configuring Load Sharing Using STP Path Cost (CLI), on page 2184 Feature Interactions Trunking interacts with other features in these ways: · A trunk port cannot be a secure port. · Trunk ports can be grouped into EtherChannel port groups, but all trunks in the group must have the same configuration. When a group is first created, all ports follow the parameters set for the first port to be added to the group. If you change the configuration of one of these parameters, the switch propagates the setting that you entered to all ports in the group: · Allowed-VLAN list. · STP port priority for each VLAN. · STP Port Fast setting. · Trunk status: If one port in a port group ceases to be a trunk, all ports cease to be trunks. · We recommend that you configure no more than 24 trunk ports in Per VLAN Spanning Tree (PVST) mode and no more than 40 trunk ports in Multiple Spanning Tree (MST) mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2173 How to Configure VLAN Trunks VLAN · If you try to enable IEEE 802.1x on a trunk port, an error message appears, and IEEE 802.1x is not enabled. If you try to change the mode of an IEEE 802.1x-enabled port to trunk, the port mode is not changed. · A port in dynamic mode can negotiate with its neighbor to become a trunk port. If you try to enable IEEE 802.1x on a dynamic port, an error message appears, and IEEE 802.1x is not enabled. If you try to change the mode of an IEEE 802.1x-enabled port to dynamic, the port mode is not changed. How to Configure VLAN Trunks To avoid trunking misconfigurations, configure interfaces connected to devices that do not support DTP to not forward DTP frames, that is, to turn off DTP. · If you do not intend to trunk across those links, use the switchport mode access interface configuration command to disable trunking. · To enable trunking to a device that does not support DTP, use the switchport mode trunk and switchport nonegotiate interface configuration commands to cause the interface to become a trunk but to not generate DTP frames. Configuring an Ethernet Interface as a Trunk Port Configuring a Trunk Port (CLI) Because trunk ports send and receive VTP advertisements, to use VTP you must ensure that at least one trunk port is configured on the switch and that this trunk port is connected to the trunk port of a second switch. Otherwise, the switch cannot receive any VTP advertisements. Before you begin By default, an interface is in Layer 2 mode. The default mode for Layer 2 interfaces is switchport mode dynamic auto. If the neighboring interface supports trunking and is configured to allow trunking, the link is a Layer 2 trunk or, if the interface is in Layer 3 mode, it becomes a Layer 2 trunk when you enter the switchport interface configuration command. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode {dynamic {auto | desirable} | trunk} 4. switchport access vlan vlan-id 5. switchport trunk native vlan vlan-id 6. end 7. show interfaces interface-id switchport 8. show interfaces interface-id trunk 9. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2174 VLAN Configuring a Trunk Port (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters the global configuration mode. Step 2 interface interface-id Example: Specifies the port to be configured for trunking, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 Step 3 Step 4 switchport mode {dynamic {auto | desirable} | trunk} Configures the interface as a Layer 2 trunk (required only Example: if the interface is a Layer 2 access port or tunnel port or to specify the trunking mode). Switch(config-if)# switchport mode dynamic desirable · dynamic auto--Sets the interface to a trunk link if the neighboring interface is set to trunk or desirable mode. This is the default. · dynamic desirable--Sets the interface to a trunk link if the neighboring interface is set to trunk, desirable, or auto mode. · trunk--Sets the interface in permanent trunking mode and negotiate to convert the link to a trunk link even if the neighboring interface is not a trunk interface. switchport access vlan vlan-id Example: (Optional) Specifies the default VLAN, which is used if the interface stops trunking. Switch(config-if)# switchport access vlan 200 Step 5 switchport trunk native vlan vlan-id Example: Specifies the native VLAN for IEEE 802.1Q trunks. Switch(config-if)# switchport trunk native vlan 200 Step 6 end Example: Switch(config)# end Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2175 Defining the Allowed VLANs on a Trunk (CLI) VLAN Step 7 Command or Action show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet1/0/2 switchport Purpose Displays the switch port configuration of the interface in the Administrative Mode and the Administrative Trunking Encapsulation fields of the display. Step 8 show interfaces interface-id trunk Example: Displays the trunk configuration of the interface. Switch# show interfaces gigabitethernet1/0/2 trunk Step 9 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Related Topics Trunking Modes, on page 2170 Layer 2 Interface Modes, on page 2171 Defining the Allowed VLANs on a Trunk (CLI) VLAN 1 is the default VLAN on all trunk ports in all Cisco switches, and it has previously been a requirement that VLAN 1 always be enabled on every trunk link. You can use the VLAN 1 minimization feature to disable VLAN 1 on any individual VLAN trunk link so that no user traffic (including spanning-tree advertisements) is sent or received on VLAN 1. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode trunk 4. switchport trunk allowed vlan { word | add | all | except | none | remove} vlan-list 5. end 6. show interfaces interface-id switchport 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2176 VLAN Defining the Allowed VLANs on a Trunk (CLI) Command or Action Switch# configure terminal Purpose Step 2 interface interface-id Example: Specifies the port to be configured, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 switchport mode trunk Example: Switch(config-if)# switchport mode trunk Configures the interface as a VLAN trunk port. Step 4 Step 5 switchport trunk allowed vlan { word | add | all | except (Optional) Configures the list of VLANs allowed on the | none | remove} vlan-list trunk. Example: Switch(config-if)# switchport trunk allowed vlan remove 2 The vlan-list parameter is either a single VLAN number from 1 to 4094 or a range of VLANs described by two VLAN numbers, the lower one first, separated by a hyphen. Do not enter any spaces between comma-separated VLAN parameters or in hyphen-specified ranges. All VLANs are allowed by default. end Example: Returns to privileged EXEC mode. Switch(config)# end Step 6 show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet1/0/1 switchport Verifies your entries in the Trunking VLANs Enabled field of the display. Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Related Topics Allowed VLANs on a Trunk, on page 2171 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2177 Changing the Pruning-Eligible List (CLI) VLAN Changing the Pruning-Eligible List (CLI) The pruning-eligible list applies only to trunk ports. Each trunk port has its own eligibility list. VTP pruning must be enabled for this procedure to take effect. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport trunk pruning vlan {add | except | none | remove} vlan-list [,vlan [,vlan [,,,]] 4. end 5. show interfaces interface-id switchport 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Selects the trunk port for which VLANs should be pruned, and enters interface configuration mode. Switch(config)# interface gigabitethernet2/0/1 Step 3 Step 4 switchport trunk pruning vlan {add | except | none | remove} vlan-list [,vlan [,vlan [,,,]] end Example: Configures the list of VLANs allowed to be pruned from the trunk. For explanations about using the add, except, none, and remove keywords, see the command reference for this release. Separate non-consecutive VLAN IDs with a comma and no spaces; use a hyphen to designate a range of IDs. Valid IDs are 2 to 1001. Extended-range VLANs (VLAN IDs 1006 to 4094) cannot be pruned. VLANs that are pruning-ineligible receive flooded traffic. The default list of VLANs allowed to be pruned contains VLANs 2 to 1001. Returns to privileged EXEC mode. Switch(config)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2178 VLAN Configuring the Native VLAN for Untagged Traffic (CLI) Step 5 Command or Action show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet2/0/1 switchport Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies your entries in the Pruning VLANs Enabled field of the display. (Optional) Saves your entries in the configuration file. Configuring the Native VLAN for Untagged Traffic (CLI) A trunk port configured with IEEE 802.1Q tagging can receive both tagged and untagged traffic. By default, the switch forwards untagged traffic in the native VLAN configured for the port. The native VLAN is VLAN 1 by default. The native VLAN can be assigned any VLAN ID. If a packet has a VLAN ID that is the same as the outgoing port native VLAN ID, the packet is sent untagged; otherwise, the switch sends the packet with a tag. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport trunk native vlan vlan-id 4. end 5. show interfaces interface-id switchport 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Defines the interface that is configured as the IEEE 802.1Q trunk, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2179 Configuring Trunk Ports for Load Sharing VLAN Step 3 Command or Action Purpose switchport trunk native vlan vlan-id Configures the VLAN that is sending and receiving Example: untagged traffic on the trunk port. For vlan-id, the range is 1 to 4094. Switch(config-if)# switchport trunk native vlan 12 Step 4 end Example: Switch(config-if)# end Step 5 show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet1/0/2 switchport Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Returns to privileged EXEC mode. Verifies your entries in the Trunking Native Mode VLAN field. (Optional) Saves your entries in the configuration file. Configuring Trunk Ports for Load Sharing Configuring Load Sharing Using STP Port Priorities (CLI) If your switch is a member of a switch stack, you must use the spanning-tree [vlan vlan-id] cost cost interface configuration command instead of the spanning-tree [vlan vlan-id] port-priority priority interface configuration command to select an interface to put in the forwarding state. Assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last. These steps describe how to configure a network with load sharing using STP port priorities. SUMMARY STEPS 1. configure terminal 2. vtp domain domain-name 3. vtp mode server 4. end 5. show vtp status 6. show vlan 7. configure terminal 8. interface interface-id Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2180 VLAN Configuring Load Sharing Using STP Port Priorities (CLI) 9. switchport mode trunk 10. end 11. show interfaces interface-id switchport 12. Repeat the above steps on Switch A for a second port in the switch or switch stack. 13. Repeat the above steps on Switch B to configure the trunk ports that connect to the trunk ports configured on Switch A. 14. show vlan 15. configure terminal 16. interface interface-id 17. spanning-tree vlan vlan-range port-priority priority-value 18. exit 19. interface interface-id 20. spanning-tree vlan vlan-range port-priority priority-value 21. end 22. show running-config 23. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode on Switch A. Switch# configure terminal Step 2 vtp domain domain-name Example: Switch(config)# vtp domain workdomain Configures a VTP administrative domain. The domain name can be 1 to 32 characters. Step 3 vtp mode server Example: Switch(config)# vtp mode server Configures Switch A as the VTP server. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Step 5 show vtp status Example: Verifies the VTP configuration on both Switch A and Switch B. In the display, check the VTP Operating Mode and the VTP Domain Name fields. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2181 Configuring Load Sharing Using STP Port Priorities (CLI) VLAN Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action Switch# show vtp status Purpose show vlan Example: Switch# show vlan Verifies that the VLANs exist in the database on Switch A. configure terminal Example: Switch# configure terminal Enters global configuration mode. interface interface-id Example: Defines the interface to be configured as a trunk, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 switchport mode trunk Example: Switch(config-if)# switchport mode trunk Configures the port as a trunk port. end Example: Switch(config-if)# end Returns to privileged EXEC mode. show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet1/0/1 switchport Verifies the VLAN configuration. Repeat the above steps on Switch A for a second port in the switch or switch stack. Repeat the above steps on Switch B to configure the trunk ports that connect to the trunk ports configured on Switch A. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2182 VLAN Configuring Load Sharing Using STP Port Priorities (CLI) Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Command or Action show vlan Example: Switch# show vlan Purpose When the trunk links come up, VTP passes the VTP and VLAN information to Switch B. This command verifies that Switch B has learned the VLAN configuration. configure terminal Example: Switch# configure terminal Enters global configuration mode on Switch A. interface interface-id Example: Defines the interface to set the STP port priority, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 spanning-tree vlan vlan-range port-priority priority-value Example: Switch(config-if)# spanning-tree vlan 8-10 port-priority 16 exit Example: Switch(config-if)# exit Assigns the port priority for the VLAN range specified. Enter a port priority value from 0 to 240. Port priority values increment by 16. Returns to global configuration mode. interface interface-id Example: Defines the interface to set the STP port priority, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/2 spanning-tree vlan vlan-range port-priority priority-value Example: Switch(config-if)# spanning-tree vlan 3-6 port-priority 16 Assigns the port priority for the VLAN range specified. Enter a port priority value from 0 to 240. Port priority values increment by 16. end Example: Returns to privileged EXEC mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2183 Configuring Load Sharing Using STP Path Cost (CLI) VLAN Step 22 Step 23 Command or Action Switch(config-if)# end show running-config Example: Switch# show running-config copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics Network Load Sharing Using STP Priorities, on page 2172 Configuring Load Sharing Using STP Path Cost (CLI) These steps describe how to configure a network with load sharing using STP path costs. SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport mode trunk 4. exit 5. Repeat Steps 2 through 4 on a second interface in Switch A or in Switch A stack. 6. end 7. show running-config 8. show vlan 9. configure terminal 10. interface interface-id 11. spanning-tree vlan vlan-range cost cost-value 12. end 13. Repeat Steps 9 through 13 on the other configured trunk interface on Switch A, and set the spanning-tree path cost to 30 for VLANs 8, 9, and 10. 14. exit 15. show running-config 16. copy running-config startup-config Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2184 VLAN Configuring Load Sharing Using STP Path Cost (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode on Switch A. Step 2 interface interface-id Example: Defines the interface to be configured as a trunk, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 switchport mode trunk Example: Switch(config-if)# switchport mode trunk Configures the port as a trunk port. Step 4 exit Example: Switch(config-if)# exit Returns to global configuration mode. Step 5 Step 6 Repeat Steps 2 through 4 on a second interface in Switch A or in Switch A stack. end Returns to privileged EXEC mode. Example: Switch(config)# end Step 7 show running-config Example: Switch# show running-config Verifies your entries. In the display, make sure that the interfaces are configured as trunk ports. Step 8 show vlan Example: Switch# show vlan When the trunk links come up, Switch A receives the VTP information from the other switches. This command verifies that Switch A has learned the VLAN configuration. Step 9 configure terminal Example: Enters global configuration mode. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2185 Configuring Load Sharing Using STP Path Cost (CLI) VLAN Step 10 Step 11 Command or Action Switch# configure terminal Purpose interface interface-id Example: Defines the interface on which to set the STP cost, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 spanning-tree vlan vlan-range cost cost-value Example: Sets the spanning-tree path cost to 30 for VLANs 2 through 4. Switch(config-if)# spanning-tree vlan 2-4 cost 30 Step 12 Step 13 Step 14 Step 15 Step 16 end Example: Switch(config-if)# end Returns to global configuration mode. Repeat Steps 9 through 13 on the other configured trunk interface on Switch A, and set the spanning-tree path cost to 30 for VLANs 8, 9, and 10. exit Returns to privileged EXEC mode. Example: Switch(config)# exit show running-config Example: Switch# show running-config Verifies your entries. In the display, verify that the path costs are set correctly for both trunk interfaces. copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Related Topics Network Load Sharing Using STP Path Cost, on page 2173 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2186 VLAN Where to Go Next Where to Go Next After configuring VLAN trunks, you can configure the following: · VLANs · VLAN groups · Voice VLANs Additional References Related Documents Related Topic Document Title For complete syntax and usage information VLAN Command Reference (Catalyst 3650 Switches) for the commands used in this chapter. Layer 2/3 Command Reference (Catalyst 3650 Switches) Spanning Tree Protocol (STP) Network Management Command Reference (Catalyst 3650 Switches) Network Management Configuration Guide (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2187 Feature History and Information for VLAN Trunks VLAN MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for VLAN Trunks Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2188 1 1 3 C H A P T E R Configuring Voice VLANs · Finding Feature Information, on page 2189 · Prerequisites for Voice VLANs, on page 2189 · Restrictions for Voice VLANs, on page 2190 · Information About Voice VLAN, on page 2190 · How to Configure Voice VLAN, on page 2193 · Monitoring Voice VLAN, on page 2196 · Where to Go Next, on page 2196 · Additional References, on page 2197 · Feature History and Information for Voice VLAN, on page 2198 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Voice VLANs The following are the prerequisites for voice VLANs: · Voice VLAN configuration is only supported on switch access ports; voice VLAN configuration is not supported on trunk ports. Note Trunk ports can carry any number of voice VLANs, similar to regular VLANs. The configuration of voice VLANs is not supported on trunk ports. · Before you enable voice VLAN, enable QoS on the switch by entering the trust device cisco-phone interface configuration command. If you use the auto QoS feature, these settings are automatically configured. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2189 Restrictions for Voice VLANs VLAN · You must enable CDP on the switch port connected to the Cisco IP Phone to send the configuration to the phone. (CDP is globally enabled by default on all switch interfaces.) Restrictions for Voice VLANs You cannot configure static secure MAC addresses in the voice VLAN. Information About Voice VLAN Voice VLANs The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. When the switch is connected to a Cisco 7960 IP Phone, the phone sends voice traffic with Layer 3 IP precedence and Layer 2 class of service (CoS) values, which are both set to 5 by default. Because the sound quality of an IP phone call can deteriorate if the data is unevenly sent, the switch supports quality of service (QoS) based on IEEE 802.1p CoS. QoS uses classification and scheduling to send network traffic from the switch in a predictable manner. The Cisco 7960 IP Phone is a configurable device, and you can configure it to forward traffic with an IEEE 802.1p priority. You can configure the switch to trust or override the traffic priority assigned by a Cisco IP Phone. Figure 104: Cisco 7960 IP Phone Connected to aSwitch This network configuration is one way to connect a Cisco 7960 IP Phone. The Cisco IP Phone contains an integrated three-port 10/100 switch. The ports provide dedicated connections to these devices: · Port 1 connects to the switch or other voice-over-IP (VoIP) device. · Port 2 is an internal 10/100 interface that carries the IP phone traffic. · Port 3 (access port) connects to a PC or other device. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2190 VLAN Cisco IP Phone Voice Traffic Cisco IP Phone Voice Traffic You can configure an access port with an attached Cisco IP Phone to use one VLAN for voice traffic and another VLAN for data traffic from a device attached to the phone. You can configure access ports on the switch to send Cisco Discovery Protocol (CDP) packets that instruct an attached phone to send voice traffic to the switch in any of these ways: · In the voice VLAN tagged with a Layer 2 CoS priority value · In the access VLAN tagged with a Layer 2 CoS priority value · In the access VLAN, untagged (no Layer 2 CoS priority value) Note In all configurations, the voice traffic carries a Layer 3 IP precedence value (the default is 5 for voice traffic and 3 for voice control traffic). Related Topics Configuring Cisco IP Phone Voice Traffic (CLI), on page 2193 Monitoring Voice VLAN, on page 2196 Cisco IP Phone Data Traffic The switch can also process tagged data traffic (traffic in IEEE 802.1Q or IEEE 802.1p frame types) from the device attached to the access port on the Cisco IP Phone. You can configure Layer 2 access ports on the switch to send CDP packets that instruct the attached phone to configure the phone access port in one of these modes: · In trusted mode, all traffic received through the access port on the Cisco IP Phone passes through the phone unchanged. · In untrusted mode, all traffic in IEEE 802.1Q or IEEE 802.1p frames received through the access port on the Cisco IP Phone receive a configured Layer 2 CoS value. The default Layer 2 CoS value is 0. Untrusted mode is the default. Note Untagged traffic from the device attached to the Cisco IP Phone passes through the phone unchanged, regardless of the trust state of the access port on the phone. Related Topics Configuring the Priority of Incoming Data Frames (CLI), on page 2195 Monitoring Voice VLAN, on page 2196 Voice VLAN Configuration Guidelines · Because a Cisco 7960 IP Phone also supports a connection to a PC or other device, a port connecting the switch to a Cisco IP Phone can carry mixed traffic. You can configure a port to decide how the Cisco IP Phone carries voice traffic and data traffic. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2191 Voice VLAN Configuration Guidelines VLAN · The voice VLAN should be present and active on the switch for the IP phone to correctly communicate on the voice VLAN. Use the show vlan privileged EXEC command to see if the VLAN is present (listed in the display). If the VLAN is not listed, create the voice VLAN. · The Power over Ethernet (PoE) switches are capable of automatically providing power to Cisco pre-standard and IEEE 802.3af-compliant powered devices if they are not being powered by an AC power source. · The Port Fast feature is automatically enabled when voice VLAN is configured. When you disable voice VLAN, the Port Fast feature is not automatically disabled. · If the Cisco IP Phone and a device attached to the phone are in the same VLAN, they must be in the same IP subnet. These conditions indicate that they are in the same VLAN: · They both use IEEE 802.1p or untagged frames. · The Cisco IP Phone uses IEEE 802.1p frames, and the device uses untagged frames. · The Cisco IP Phone uses untagged frames, and the device uses IEEE 802.1p frames. · The Cisco IP Phone uses IEEE 802.1Q frames, and the voice VLAN is the same as the access VLAN. · The Cisco IP Phone and a device attached to the phone cannot communicate if they are in the same VLAN and subnet but use different frame types because traffic in the same subnet is not routed (routing would eliminate the frame type difference). · Voice VLAN ports can also be these port types: · Dynamic access port. · IEEE 802.1x authenticated port. Note If you enable IEEE 802.1x on an access port on which a voice VLAN is configured and to which a Cisco IP Phone is connected, the phone loses connectivity to the switch for up to 30 seconds. · Protected port. · A source or destination port for a SPAN or RSPAN session. · Secure port. Note When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to two plus the maximum number of secure addresses allowed on the access VLAN. When the port is connected to a Cisco IP Phone, the phone requires up to two MAC addresses. The phone address is learned on the voice VLAN and might also be learned on the access VLAN. Connecting a PC to the phone requires additional MAC addresses. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2192 VLAN How to Configure Voice VLAN How to Configure Voice VLAN Configuring Cisco IP Phone Voice Traffic (CLI) You can configure a port connected to the Cisco IP Phone to send CDP packets to the phone to configure the way in which the phone sends voice traffic. The phone can carry voice traffic in IEEE 802.1Q frames for a specified voice VLAN with a Layer 2 CoS value. It can use IEEE 802.1p priority tagging to give voice traffic a higher priority and forward all voice traffic through the native (access) VLAN. The Cisco IP Phone can also send untagged voice traffic or use its own configuration to send voice traffic in the access VLAN. In all configurations, the voice traffic carries a Layer 3 IP precedence value (the default is 5). SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. trust device cisco-phone 4. switchport voice vlan {vlan-id | dot1p | none | untagged} 5. end 6. Use one of the following: · show interfaces interface-id switchport · show running-config interface interface-id 7. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the interface connected to the phone, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 trust device cisco-phone Example: Switch(config-if)# trust-device cisco-phone Configures the interface to trust incoming traffic packets for the Cisco IP phone. Step 4 switchport voice vlan {vlan-id | dot1p | none | untagged} Configures the voice VLAN. Example: Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2193 Configuring Cisco IP Phone Voice Traffic (CLI) VLAN Step 5 Command or Action Switch(config-if)# switchport voice vlan dot1p Purpose · vlan-id--Configures the phone to forward all voice traffic through the specified VLAN. By default, the Cisco IP Phone forwards the voice traffic with an IEEE 802.1Q priority of 5. Valid VLAN IDs are 1 to 4094. · dot1p--Configures the switch to accept voice and data IEEE 802.1p priority frames tagged with VLAN ID 0 (the native VLAN). By default, the switch drops all voice and data traffic tagged with VLAN 0. If configured for 802.1p the Cisco IP Phone forwards the traffic with an IEEE 802.1p priority of 5. · none--Allows the phone to use its own configuration to send untagged voice traffic. · untagged--Configures the phone to send untagged voice traffic. end Example: Switch(config-if)# end Returns to privileged EXEC mode. Step 6 Use one of the following: · show interfaces interface-id switchport · show running-config interface interface-id Example: Switch# show interfaces gigabitethernet1/0/1 switchport or Switch# show running-config interface gigabitethernet1/0/1 Verifies your voice VLAN entries or your QoS and voice VLAN entries. Step 7 copy running-config startup-config Example: Switch# copy running-config startup-config (Optional) Saves your entries in the configuration file. Related Topics Cisco IP Phone Voice Traffic, on page 2191 Monitoring Voice VLAN, on page 2196 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2194 VLAN Configuring the Priority of Incoming Data Frames (CLI) Configuring the Priority of Incoming Data Frames (CLI) You can connect a PC or other data device to a Cisco IP Phone port. To process tagged data traffic (in IEEE 802.1Q or IEEE 802.1p frames), you can configure the switch to send CDP packets to instruct the phone how to send data packets from the device attached to the access port on the Cisco IP Phone. The PC can generate packets with an assigned CoS value. You can configure the phone to not change (trust) or to override (not trust) the priority of frames arriving on the phone port from connected devices. Follow these steps to set the priority of data traffic received from the non-voice port on the Cisco IP Phone: SUMMARY STEPS 1. configure terminal 2. interface interface-id 3. switchport priority extend {cos value | trust} 4. end 5. show interfaces interface-id switchport 6. copy running-config startup-config DETAILED STEPS Step 1 Command or Action configure terminal Example: Purpose Enters the global configuration mode. Switch# configure terminal Step 2 interface interface-id Example: Specifies the interface connected to the Cisco IP Phone, and enters interface configuration mode. Switch(config)# interface gigabitethernet1/0/1 Step 3 Step 4 switchport priority extend {cos value | trust} Sets the priority of data traffic received from the Cisco IP Example: Phone access port: · cos value--Configures the phone to override the Switch(config-if)# switchport priority extend trust priority received from the PC or the attached device with the specified CoS value. The value is a number from 0 to 7, with 7 as the highest priority. The default priority is cos 0. · trust--Configures the phone access port to trust the priority received from the PC or the attached device. end Example: Returns to privileged EXEC mode. Switch(config-if)# end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2195 Monitoring Voice VLAN VLAN Step 5 Command or Action show interfaces interface-id switchport Example: Switch# show interfaces gigabitethernet1/0/1 switchport Step 6 copy running-config startup-config Example: Switch# copy running-config startup-config Purpose Verifies your entries. (Optional) Saves your entries in the configuration file. Related Topics Cisco IP Phone Data Traffic, on page 2191 Monitoring Voice VLAN, on page 2196 Monitoring Voice VLAN To display voice VLAN configuration for an interface, use the show interfaces interface-id switchport privileged EXEC command. Related Topics Configuring Cisco IP Phone Voice Traffic (CLI), on page 2193 Cisco IP Phone Voice Traffic, on page 2191 Configuring the Priority of Incoming Data Frames (CLI), on page 2195 Cisco IP Phone Data Traffic, on page 2191 Where to Go Next After configuring voice VLANs, you can configure the following: · VLANs · VLAN groups · VLAN Trunking · VTP Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2196 VLAN Additional References Additional References Related Documents Related Topic Document Title For complete syntax and usage information VLAN Command Reference (Catalyst 3650 Switches) for the commands used in this chapter. Layer 2/3 Command Reference (Catalyst 3650 Switches) Additional configuration commands and procedures. LAN Switching Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Layer 2/3 Configuration Guide (Catalyst 3650 Switches) Platform-independent configuration information Identity Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2197 Feature History and Information for Voice VLAN VLAN Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature History and Information for Voice VLAN Release Cisco IOS XE 3.3SE Modification This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2198 PART XVIII WLAN · Configuring DHCP for WLANs, on page 2201 · Configuring WLAN Security, on page 2211 · Configuring Access Point Groups, on page 2223 1 1 4 C H A P T E R Configuring DHCP for WLANs · Finding Feature Information, on page 2201 · Prerequisites for Configuring DHCP for WLANs, on page 2201 · Restrictions for Configuring DHCP for WLANs, on page 2202 · Information About the Dynamic Host Configuration Protocol, on page 2202 · How to Configure DHCP for WLANs, on page 2206 · Additional References, on page 2209 · Feature Information for DHCP for WLANs, on page 2209 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring DHCP for WLANs · To be able to use the DHCP option 82, you must configure DHCP on Cisco IOS software. By default, DHCP option 82 is enabled for all clients. You can control the wireless client behavior using the WLAN suboptions. · It is recommended to enable dhcp snooping on the Switches irrespective of the DHCP address requirement being checked or unchecked on the WLAN. This avoids any client connectivity issues when DHCP snopping is not turned on. This example shows how to enable DHCP snooping on the Switches: Switch(config)# ip dhcp snooping 136, 139 Switch(config)# ip dhcp snooping Switch(config)# ip dhcp snooping trust Switch(config)# ip dhcp snooping trust Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2201 Restrictions for Configuring DHCP for WLANs WLAN Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Information About the Dynamic Host Configuration Protocol, on page 2202 Internal DHCP Servers, on page 2203 External DHCP Servers, on page 2203 DHCP Assignments, on page 2204 Information About DHCP Option 82, on page 2204 Configuring DHCP Scopes, on page 2205 Information About DHCP Scopes, on page 2205 Restrictions for Configuring DHCP for WLANs · If you override the DHCP server in a WLAN, you must ensure that you configure the underlying Cisco IOS configuration to make sure that the DHCP server is reachable. · WLAN DHCP override works only if DHCP service is enabled on the switch. You can configure DHCP service in the following ways: · Configuring the DHCP pool on the switch. · Configuring a DHCP relay agent on the SVI. Note: the VLAN of the SVI must be mapped to the WLAN where DHCP override is configured. Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Information About the Dynamic Host Configuration Protocol, on page 2202 Internal DHCP Servers, on page 2203 External DHCP Servers, on page 2203 DHCP Assignments, on page 2204 Information About DHCP Option 82, on page 2204 Configuring DHCP Scopes, on page 2205 Information About DHCP Scopes, on page 2205 Information About the Dynamic Host Configuration Protocol You can configure WLANs to use the same or different Dynamic Host Configuration Protocol (DHCP) servers or no DHCP server. Two types of DHCP servers are available: internal and external. Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2202 WLAN Internal DHCP Servers Internal DHCP Servers The switches contain an internal DHCP server. This server is typically used in branch offices that do not already have a DHCP server. The wireless network generally contains a maximum of 10 access points or fewer, with the access points on the same IP subnet as the switch. The internal server provides DHCP addresses to wireless clients, direct-connect access points, and DHCP requests that are relayed from access points. Only lightweight access points are supported. When you want to use the internal DHCP server, you must set the management interface IP address of the switch as the DHCP server IP address. DHCP option 43 is not supported on the internal server. Therefore, the access point must use an alternative method to locate the management interface IP address of the switch, such as local subnet broadcast, Domain Name System (DNS), or priming. An internal DHCP server pool only serves the wireless clients of that switch, not clients of other switches. Also, an internal DHCP server can serve only wireless clients, not wired clients. When clients use the internal DHCP server of the switch, IP addresses are not preserved across reboots. As a result, multiple clients can be assigned with the same IP address. To resolve any IP address conflicts, clients must release their existing IP address and request a new one. Wired guest clients are always on a Layer 2 network connected to a local or foreign switch. Note DHCPv6 is not supported in the internal DHCP servers. Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 External DHCP Servers The operating system is designed to appear as a DHCP Relay to the network and as a DHCP server to clients with industry-standard external DHCP servers that support DHCP Relay, which means that each switch appears as a DHCP Relay agent to the DHCP server and as a DHCP server at the virtual IP address to wireless clients. Because the switch captures the client IP address that is obtained from a DHCP server, it maintains the same IP address for that client during intra switch, inter switch, and inter-subnet client roaming. Note External DHCP servers can support DHCPv6. Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2203 DHCP Assignments WLAN DHCP Assignments You can configure DHCP on a per-interface or per-WLAN basis. We recommend that you use the primary DHCP server address that is assigned to a particular interface. You can assign DHCP servers for individual interfaces. You can configure the management interface, AP-manager interface, and dynamic interface for a primary and secondary DHCP server, and you can configure the service-port interface to enable or disable DHCP servers. You can also define a DHCP server on a WLAN. In this case, the server overrides the DHCP server address on the interface assigned to the WLAN. Security Considerations For enhanced security, we recommend that you require all clients to obtain their IP addresses from a DHCP server. To enforce this requirement, you can configure all WLANs with a DHCP Addr. Assignment Required setting, which disallows client static IP addresses. If DHCP Addr. Assignment Required is selected, clients must obtain an IP address via DHCP. Any client with a static IP address is not allowed on the network. The switch monitors DHCP traffic because it acts as a DHCP proxy for the clients. Note WLANs that support management over wireless must allow management (device-servicing) clients to obtain an IP address from a DHCP server. If slightly less security is tolerable, you can create WLANs with DHCP Addr. Assignment Required disabled. Clients then have the option of using a static IP address or obtaining an IP address from a designated DHCP server. Note DHCP Addr. Assignment Required is not supported for wired guest LANs. You can create separate WLANs with DHCP Addr. Assignment Required configured as disabled. This is applicable only if DHCP proxy is enabled for the switch. You must not define the primary/secondary configuration DHCP server you should disable the DHCP proxy. These WLANs drop all DHCP requests and force clients to use a static IP address. These WLANs do not support management over wireless connections. Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 Information About DHCP Option 82 DHCP option 82 provides additional security when DHCP is used to allocate network addresses. It enables the switch to act as a DHCP relay agent to prevent DHCP client requests from untrusted sources. You can configure the switch to add option 82 information to DHCP requests from clients before forwarding the requests to the DHCP server. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2204 WLAN Figure 105: DHCP Option 82 Configuring DHCP Scopes The access point forwards all DHCP requests from a client to the switch. The switch adds the DHCP option 82 payload and forwards the request to the DHCP server. The payload can contain the MAC address or the MAC address and SSID of the access point, depending on how you configure this option. Note Any DHCP packets that already include a relay agent option are dropped at the switch. For DHCP option 82 to operate correctly, DHCP proxy must be enabled. Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 Configuring DHCP Scopes Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 Information About DHCP Scopes Switches have built-in DHCP relay agents. However, when you desire network segments that do not have a separate DHCP server, the switches can have built-in DHCP scopes that assign IP addresses and subnet masks to wireless clients. Typically, one switch can have one or more DHCP scopes that each provide a range of IP addresses. DHCP scopes are needed for internal DHCP to work. Once DHCP is defined on the switch, you can then point the primary DHCP server IP address on the management, AP-manager, and dynamic interfaces to the switch's management interface. Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2205 How to Configure DHCP for WLANs WLAN Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 Configuring DHCP Scopes (CLI), on page 2208 How to Configure DHCP for WLANs Configuring DHCP for WLANs (CLI) Use this procedure to configure the following DHCP parameters on a WLAN: · DHCP Option 82 Payload · DHCP Required · DHCP Override Before you begin · You must have admin privileges for configuring the WLAN. · To configure the DHCP override, you must have the IP address of the DHCP server. SUMMARY STEPS 1. configure terminal 2. shutdown 3. wlan profile-name 4. ip dhcp opt82 {ascii | format {add-ssid | ap-ethmac} | rid} 5. ip dhcp required 6. ip dhcp server ip-address 7. no shutdown 8. end 9. show wlan wlan-name DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 shutdown Example: Switch(config)# shutdown Purpose Enters global configuration mode. Shut down the WLAN. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2206 WLAN Configuring DHCP for WLANs (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose wlan profile-name Example: Switch# wlan test4 Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN. ip dhcp opt82 {ascii | format {add-ssid | ap-ethmac} | rid} Specifies the DHCP82 payload on the WLAN. The keyword Example: and arguments are as follows: Switch(config)# ip dhcp opt82 format add-ssid · ascii--Configures ASCII for DHCP Option 82. If this is not configured, the option 82 format is set to ASCII format. · format--Specifies the DHCP option 82 format. The following options are available: · add-ssid--Set RemoteID format that is the AP radio MAC address and SSID. · ap-ethmac--Set RemoteID format that is the AP Ethernet MAC address. Note If the format option is not configured, only the AP radio MAC address is used. · rid--Adds the Cisco 2 byte RID for DHCP option 82. ip dhcp required Example: Switch(config-wlan)# ip dhcp required ip dhcp server ip-address Example: Switch(config-wlan)# ip dhcp server 200.1.1.2 no shutdown Example: Switch(config-wlan)# no shutdown end Example: Switch(config)# end show wlan wlan-name Example: Switch(config-wlan)# show wlan test-wlan Makes it mandatory for clients to get their IP address from the DHCP server. Static clients are not allowed. Defines a DHCP server on the WLAN that overrides the DHCP server address on the interface assigned to the WLAN. Restarts the WLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifies the DHCP configuration. Related Topics Information About the Dynamic Host Configuration Protocol, on page 2202 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2207 Configuring DHCP Scopes (CLI) WLAN Internal DHCP Servers, on page 2203 External DHCP Servers, on page 2203 DHCP Assignments, on page 2204 Information About DHCP Option 82, on page 2204 Configuring DHCP Scopes, on page 2205 Information About DHCP Scopes, on page 2205 Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 Configuring DHCP Scopes (CLI) SUMMARY STEPS 1. configure terminal 2. ip dhcp pool pool-name 3. network network-name mask-address 4. dns-server hostname 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ip dhcp pool pool-name Example: Switch(config)#ip dhcp pool test-pool Step 3 network network-name mask-address Example: Switch(dhcp-config)#network 209.165.200.224 255.255.255.0 Step 4 dns-server hostname Example: Switch(dhcp-config)#dns-server example.com Step 5 end Example: Switch(config)# end Purpose Enters global configuration mode. Configures the DHCP pool address. Specifies the network number in dotted-decimal notation and the mask address. Specifies the DNS name server. You can specify an IP address or a hostname. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Information About DHCP Scopes, on page 2205 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2208 WLAN Additional References Additional References Related Documents Related Topic System Management Document Title System Management Configuration Guide (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information for DHCP for WLANs Feature Name DHCP functionality for WLAN Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2209 Feature Information for DHCP for WLANs WLAN Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2210 1 1 5 C H A P T E R Configuring WLAN Security · Finding Feature Information, on page 2211 · Prerequisites for Layer 2 Security, on page 2211 · Information About AAA Override, on page 2212 · How to Configure WLAN Security, on page 2212 · Additional References, on page 2220 · Feature Information about WLAN Layer 2 Security, on page 2221 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Layer 2 Security WLANs with the same SSID must have unique Layer 2 security policies so that clients can make a WLAN selection based on information advertised in beacon and probe responses. The available Layer 2 security policies are as follows: · None (open WLAN) · Static WEP or 802.1X Note Because static WEP and 802.1X are both advertised by the same bit in beacon and probe responses, they cannot be differentiated by clients. Therefore, they cannot both be used by multiple WLANs with the same SSID. · WPA/WPA2 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2211 Information About AAA Override WLAN Note Although WPA and WPA2 cannot be used by multiple WLANs with the same SSID, you can configure two WLANs with the same SSID with WPA/TKIP with PSK and Wi-Fi Protected Access (WPA )/Temporal Key Integrity Protocol (TKIP) with 802.1X, or with WPA/TKIP with 802.1X or WPA/AES with 802.1X. Related Topics Configuring Static WEP + 802.1X Layer 2 Security Parameters (CLI), on page 2212 Configuring Layer 2 Parameters (GUI), on page 2217 Configuring Static WEP Layer 2 Security Parameters (CLI), on page 2213 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI), on page 2214 Configuring 802.1X Layer 2 Security Parameters (CLI), on page 2216 Configuring Advanced WLAN Properties (CLI) Information About AAA Override, on page 2212 Information About AAA Override The AAA Override option of a WLAN enables you to configure the WLAN for identity networking. It enables you to apply VLAN tagging, Quality of Service (QoS), and Access Control Lists (ACLs) to individual clients based on the returned RADIUS attributes from the AAA server. Related Topics Configuring Advanced WLAN Properties (CLI) Prerequisites for Layer 2 Security, on page 2211 How to Configure WLAN Security Configuring Static WEP + 802.1X Layer 2 Security Parameters (CLI) Before you begin You must have administrator privileges. SUMMARY STEPS 1. configure terminal 2. wlan profile-name 3. security static-wep-key {authentication {open | sharedkey} | encryption {104 | 40} [ascii | hex] {0|8}} wep-key wep-key-index1-4 4. end Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2212 WLAN Configuring Static WEP Layer 2 Security Parameters (CLI) DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 wlan profile-name Example: Switch# wlan test4 Step 3 security static-wep-key {authentication {open | sharedkey} | encryption {104 | 40} [ascii | hex] {0|8}} wep-key wep-key-index1-4 Example: Switch(config-wlan)# security static-wep-key encryption 40 hex 0 test 2 Purpose Enters global configuration mode. Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Configures static WEP security on a WLAN. The keywords and arguments are as follows: · authentication--Configures 802.11 authentication. · encryption--Sets the static WEP keys and indices. · open--Configures open system authentication. · sharedkey--Configures shared key authentication. · 104, 40--Specifies the WEP key size. · hex, ascii--Specifies the input format of the key. · wep-key-index , wep-key-index1-4--Type of password that follows. A value of 0 indicates that an unencrypted password follows. A value of 8 indicates that an AES encrypted follows. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Prerequisites for Layer 2 Security, on page 2211 Configuring Static WEP Layer 2 Security Parameters (CLI) Before you begin You must have administrator privileges. SUMMARY STEPS 1. configure terminal 2. wlan profile-name 3. security static-wep-key [authentication {open | shared} | encryption {104 | 40} {ascii | hex} [0 | 8]] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2213 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) WLAN 4. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name Example: Switch# wlan test4 Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Step 3 security static-wep-key [authentication {open | shared} The keywords are as follows: | encryption {104 | 40} {ascii | hex} [0 | 8]] · static-wep-key--Configures Static WEP Key Example: authentication. Switch(config-wlan)# security static-wep-key authentication open · authentication--Specifies the authentication type you can set. The values are open and shared. · encryption--Specifies the encryption type that you can set. The valid values are 104 and 40. 40-bit keys must contain 5 ASCII text characters or 10 hexadecimal characters. 104-bit keys must contain 13 ASCII text characters or 26 hexadecimal characters · ascii--Specifies the key format as ASCII. · hex--Specifies the key format as HEX. Step 4 end Example: Switch(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Prerequisites for Layer 2 Security, on page 2211 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) Note The default security policy is WPA2. Before you begin You must have administrator privileges. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2214 WLAN Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) SUMMARY STEPS 1. configure terminal 2. wlan profile-name 3. security wpa 4. security wpa wpa1 5. security wpa wpa1 ciphers [aes | tkip] 6. security wpa wpa2 7. security wpa wpa2 ciphers [aes | tkip] 8. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name Example: Switch# wlan test4 Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Step 3 security wpa Example: Switch(config-wlan)# security wpa Enables WPA. Step 4 security wpa wpa1 Example: Switch(config-wlan)# security wpa wpa1 Enables WPA1. Step 5 security wpa wpa1 ciphers [aes | tkip] Specifies the WPA1 cipher. Choose one of the following Example: encryption types: Switch(config-wlan)# security wpa wpa1 ciphers aes · aes--Specifies WPA/AES support. · tkip--Specifies WPA/TKIP support. Step 6 Step 7 security wpa wpa2 Example: Switch(config-wlan)# security wpa Enables WPA 2. security wpa wpa2 ciphers [aes | tkip] Configure WPA2 cipher. Choose one of the following Example: encryption types: Switch(config-wlan)# security wpa wpa2 ciphers tkip · aes--Specifies WPA/AES support. · tkip--Specifies WPA/TKIP support. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2215 Configuring 802.1X Layer 2 Security Parameters (CLI) WLAN Step 8 Command or Action end Example: Switch(config)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Prerequisites for Layer 2 Security, on page 2211 Configuring 802.1X Layer 2 Security Parameters (CLI) Before you begin You must have administrator privileges. SUMMARY STEPS 1. configure terminal 2. wlan profile-name 3. security dot1x 4. security [authentication-list auth-list-name | encryption {0 | 104 | 40} 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name Example: Switch# wlan test4 Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Step 3 security dot1x Example: Switch(config-wlan)# security dot1x Specifies 802.1X security. Step 4 security [authentication-list auth-list-name | encryption The keywords and arguments are as follows: {0 | 104 | 40} · authentication-list--Specifies the authentication list Example: for IEEE 802.1X. Switch(config-wlan)# security encryption 104 · encryption--Specifies the length of the CKIP encryption key. The valid values are 0, 40, and 104. Zero (0) signifies no encryption. This is the default. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2216 WLAN Configuring Layer 2 Parameters (GUI) Step 5 Command or Action end Example: Switch(config)# end Purpose Note All keys within a WLAN must be of the same size. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Related Topics Prerequisites for Layer 2 Security, on page 2211 Configuring Layer 2 Parameters (GUI) Before you begin · You must have administrator privileges. Step 1 Step 2 Step 3 Click Configuration > WLAN > . The WLANs page appears. Click the WLANs profile of the WLAN you want to configure. The WLANs > Edit > page appears. Click the Security > Layer 2 > tab. Parameter Layer2 Security Description Layer2 security for the selected WLAN. Values are the following: · None--No Layer 2 security selected. · WPA+WPA2--Wi-Fi Protected Access. · 802.1X--WEP 802.1X data encryption type. For information on these settings, see the Layer 2 802.1X Parameters topic. · Static WEP--Static WEP encryption parameters. · Static WEP + 802.1x--Both Static WEP and 802.1X parameters. MAC Filtering MAC address filtering. You can locally configure clients by their MAC addresses in the MAC Filters > New page . Otherwise, configure the clients on a RADIUS server. Note MAC Filtering is also known as MAC Authentication By Pass (MAB). Fast Transition Check box to enable or disable a fast transition between access points. Over the DS Check box to enable or disable a fast transition over a distributed system. Reassociation Timeout Time in seconds after which a fast transition reassociation times out. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2217 Configuring Layer 2 Parameters (GUI) WLAN To configure the WPA + WPA2 parameters, provide the following details: Parameter WPA Policy Description Check box to enable or disable WPA policy. WPA Encryption WPA2 encryption type: TKIP or AES. Available only if the WPA policy is enabled. WPA2 Policy. Check box to enable or disable WPA2 policy. WPA2 Encryption WPA2 encryption type: TKIP or AES. Available only if the WPA2 policy is enabled. Authentication Key Management The rekeying mechanism parameter.. Values are the following: · 802.1X · CCKM · PSK · 802.1x + CCKM PSK Format Enabled when you select the PSK value for Authentication Key Management. Choose ASCII or the HEX format and enter the preshared key. To configure 802.1x parameters, provide the following details: Parameter Description 802.11 data encryption WEP 802.11 data encryption type. Type Security type. Key size Key size. Values are the following: · None · 40 bits · 104 bits The third-party AP WLAN (17) can only be configured with 802.1X encryption. Drop-down configurable 802.1X parameters are not available for this WLAN. To specify Static WEP, configure the following parameters: Parameter 802.11 Data Encryption Description Static WEP encryption type. Current Key Displays the current selected key details. Type Security type. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2218 WLAN Configuring Layer 2 Parameters (GUI) Parameter Key size Description Key size. Values are the following: · Not set · 40 bits · 104 bits Key Index Encryption Key Key Format Allow Shared Key Authentication Key index from 1 to 4. One unique WEP key index can be applied to each WLAN. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption. Encryption key. Encryption key format in ASCII or HEX. Key authentication that you can enable or disable. To configure Static WEP + 802.1X Parameters Parameter Description Static WEP Parameters 802.11 Data Encryption Static WEP encryption type. Current Key Displays the current selected key details. Type Security type. Key size Key size. Values are the following: · Not set · 40 bits · 104 bits Key Index Encryption Key Key Format Allow Shared Key Authentication Key index from 1 to 4. One unique WEP key index can be applied to each WLAN. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption. Encryption key. Encryption key format in ASCII or HEX. Key authentication that you can enable or disable. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2219 Additional References WLAN Step 4 Parameter 802.1x Parameters 802.11 Data Encryption Current Key Type Key size Description Static WEP encryption type. Display Only. The current selected key details. Security type. Key size. Values are the following: · Not set · 40 bits · 104 bits Key Index Encryption Key Key Format Allow Shared Key Authentication Key index from 1 to 4. Note One unique WEP key index can be applied to each WLAN. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption. Encryption key. Encryption key format in ASCII or HEX. Key authentication that you can enable or disable. Click Apply. Related Topics Prerequisites for Layer 2 Security, on page 2211 Additional References Related Documents Related Topic Document Title WLAN command reference WLAN Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Security configuration guide Security Configuration Guide (Catalyst 3650 Switches) Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2220 WLAN Feature Information about WLAN Layer 2 Security Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Feature Information about WLAN Layer 2 Security This table lists the features in this module and provides links to specific configuration information. Feature Name WLAN Security functionality Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2221 Feature Information about WLAN Layer 2 Security WLAN Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2222 1 1 6 C H A P T E R Configuring Access Point Groups · Finding Feature Information, on page 2223 · Prerequisites for Configuring AP Groups, on page 2223 · Restrictions for Configuring Access Point Groups, on page 2224 · Information About Access Point Groups, on page 2224 · How to Configure Access Point Groups, on page 2225 · Additional References, on page 2228 · Feature History and Information for Access Point Groups, on page 2229 Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring AP Groups The following are the prerequisites for creating access point groups on a switch: · The required access control list (ACL) must be defined on the router that serves the VLAN or subnet. · Multicast traffic is supported with access point group VLANs. However, if the client roams from one access point to another, the client might stop receiving multicast traffic, unless IGMP snooping is enabled. Related Topics Information About Access Point Groups, on page 2224 Restrictions for Configuring Access Point Groups, on page 2224 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2223 Restrictions for Configuring Access Point Groups WLAN Restrictions for Configuring Access Point Groups · Suppose that the interface mapping for a WLAN in the AP group table is the same as the WLAN interface. If the WLAN interface is changed, the interface mapping for the WLAN in the AP group table also changes to the new WLAN interface. Suppose that the interface mapping for a WLAN in the AP group table is different from the one defined for the WLAN. If the WLAN interface is changed, then the interface mapping for the WLAN in the AP group table does not change to the new WLAN interface. · If you clear the configuration on the switch, all of the access point groups disappear except for the default access point group "default-group," which is created automatically. · The default access point group can have up to 16 WLANs associated with it. The WLAN IDs for the default access point group must be less than or equal to 16. If a WLAN with an ID greater than 16 is created in the default access point group, the WLAN SSID will not be broadcasted. All WLAN IDs in the default access point group must have an ID that is less than or equal to 16. WLANs with IDs greater than 16 can be assigned to custom access point groups. Related Topics Information About Access Point Groups, on page 2224 Prerequisites for Configuring AP Groups, on page 2223 Information About Access Point Groups After you create up to 512 WLANs on the switch, you can selectively publish them (using access point groups) to different access points to better manage your wireless network. In a typical deployment, all users on a WLAN are mapped to a single interface on the switch. Therefore, all users that are associated with that WLAN are on the same subnet or VLAN. However, you can choose to distribute the load among several interfaces or to a group of users based on specific criteria such as individual departments (such as Marketing) by creating access point groups. Additionally, these access point groups can be configured in separate VLANs to simplify network administration. Figure 106: Access Point Groups In the figure, three configured dynamic interfaces are mapped to three different VLANs (VLAN 61, VLAN 62, and VLAN 63). Three access point groups are defined, and each is a member of a different VLAN, but all are members of the same SSID. A client within the wireless SSID is assigned an IP address from the VLAN subnet on which its access point is a member. For example, any user that associates with an access point that is a member of access point group VLAN 61 is assigned an IP address from that subnet. In the figure, the switch internally treats roaming between access points as a Layer 3 roaming event. In this way, WLAN clients maintain their original IP addresses. After all access points have joined the switch, you can create access point groups and assign up to 16 WLANs to each group. Each access point advertises only the enabled WLANs that belong to its access point group. The access point does not advertise disabled WLANs in its access point group or WLANs that belong to another group. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2224 WLAN How to Configure Access Point Groups Related Topics Creating Access Point Groups, on page 2225 Viewing Access Point Group, on page 2227 Assigning an Access Point to an AP Group, on page 2227 Prerequisites for Configuring AP Groups, on page 2223 Restrictions for Configuring Access Point Groups, on page 2224 How to Configure Access Point Groups Creating Access Point Groups Before you begin You must have administrator privileges to perform this operation. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2225 Creating Access Point Groups WLAN SUMMARY STEPS 1. configure terminal 2. ap group ap-group-name 3. wlan wlan-name 4. (Optional) vlan vlan-name 5. end DETAILED STEPS Step 1 Command or Action configure terminal Example: Switch# configure terminal Step 2 ap group ap-group-name Example: Switch(config)# ap group my-ap-group Step 3 wlan wlan-name Example: Switch(config-apgroup)# wlan wlan-name Step 4 (Optional) vlan vlan-name Example: Switch(config-apgroup)# vlan test-vlan Step 5 end Example: Switch(config)# end Purpose Enters global configuration mode. Creates an access point group. Associates the AP group to a WLAN. Assigns the access point group to a VLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Example This example shows how to create an AP group: Switch# configure terminal Switch(config-apgroup)# ap group test-ap-group-16 Switch(config-wlan-apgroup)# wlan test-ap-group-16 Switch(config-wlan-apgroup)# vlan VLAN1300 Related Topics Information About Access Point Groups, on page 2224 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2226 WLAN Assigning an Access Point to an AP Group Assigning an Access Point to an AP Group Before you begin You must have administrator privileges to perform this operation. SUMMARY STEPS 1. ap name ap-name ap-group-name ap-group DETAILED STEPS Step 1 Command or Action Purpose ap name ap-name ap-group-name ap-group Example: Switch# ap name 1240-101 ap-groupname apgroup_16 Assigns the access point to the access point group. The keywords and arguments are as follows: · name--Specifies that the argument following this keyword is the name of an AP that is associated to the switch. · ap-name--AP that you want to associate to the AP group. · ap-group-name--Specifies that the argument following this keyword is the name of the AP group that is configured on the switch. · ap-group--Name of the access point group that is configured on the switch. Related Topics Information About Access Point Groups, on page 2224 Viewing Access Point Group Before you begin You must have administrator privileges to perform this operation. SUMMARY STEPS 1. show ap groups [extended ] DETAILED STEPS Step 1 Command or Action show ap groups [extended ] Example: Switch# show ap groups Purpose Displays the AP groups configured on the switch. The extended keyword displays all AP Groups information defined in the system in detail. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2227 Additional References WLAN Related Topics Information About Access Point Groups, on page 2224 Additional References Related Documents Related Topic Document Title WLAN commands WLAN Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Lightweight Access Point configuration Lightweight Access Point Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Lightweight Access Point commands Lightweight Access Point Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Error Message Decoder Description Link To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool. MIBs MIB All supported MIBs for this release. MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs Technical Assistance Description Link The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2228 WLAN Feature History and Information for Access Point Groups Feature History and Information for Access Point Groups This table lists the features in this modules and provides links to specific configuration information. Feature Name AP Groups Release Cisco IOS XE 3.3SE Feature Information This feature was introduced. Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2229 Feature History and Information for Access Point Groups WLAN Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2230 INDEX <$nopage>HTTP over SSL 1349, 1352 see HTTPS 1349, 1352 <$nopage>IEEE 802.3ad 584 See EtherChannel 584 <$nopage>PAgP 581 See EtherChannel 581 <$nopage>Port Aggregation Protocol 581 See EtherChannel 581 <$nopage>Secure Copy Protocol 1342 11n Mode parameter 1862 128-bit 354 802.11a (or 802.11b/g) Global Parameters page 1859 802.11a (or 802.11b/g) Network Status parameter 1859, 1865 802.11g Support parameter 1859 802.11h Global Parameters page 1865 802.11h, described 1855 802.11n 1854 devices 1854 802.1x 1447 802.1X authentication for access points 664 described 664 A ABRs 1145 access control entries 1364 See ACEs 1364 access groups 1375 Layer 3 1375 access groups, applying IPv4 ACLs to interfaces 1386 access lists 1369 See ACLs 1369 Access Point Authentication 664 Access Point Communication Protocols 640 access point core dumps, uploading 675 using the GUI 675 Access Point Retransmission Interval 652 Access Point Retry Count 652 access points 640, 641, 683, 1881 assisted roaming 1881 priming 640 supporting oversized images 683 access points (continued) viewing join information 641 using the GUI 641 access template 1963 accounting 1281, 1290, 1315 with RADIUS 1315 with TACACS+ 1281, 1290 accounting, defined 1281 ACEs 1364 Ethernet 1364 IP 1364 ACLs 918, 1364, 1369, 1370, 1372, 1373, 1374, 1375, 1376, 1378, 1383, 1384, 1385, 1386, 1390, 1396, 1398, 1400, 1409, 1410, 1411 applying 918, 1384, 1386, 1409, 1410, 1411 on bridged packets 1410 on multicast packets 1411 on routed packets 1410 on switched packets 1409 time ranges to 1384 to an interface 1386 to QoS 918 comments in 1398 compiling 1400 defined 1369 examples of 1400 extended IPv4 1369, 1378 creating 1378 matching criteria 1369 interface 1375 IP 1369, 1370, 1376, 1383 implicit deny 1383 implicit masks 1370 matching criteria 1369 undefined 1376 IPv4 1369, 1375, 1385, 1386 applying to interfaces 1386 creating 1369 interfaces 1375 matching criteria 1369 numbers 1369 terminal lines, setting on 1385 unsupported features 1369 Layer 4 information in 1375 logging messages 1372 matching 1375 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-1 INDEX ACLs (continued) monitoring 1396 port 1364 precedence of 1364 QoS 918 router 1364 router ACLs and VLAN map configuration guidelines 1374 standard IPv4 1369, 1376 creating 1376 matching criteria 1369 support in hardware 1372 time ranges to 1375 types supported 1364 unsupported features 1369 IPv4 1369 using router ACLs with VLAN maps 1374 VLAN maps 1373, 1390 configuration guidelines 1373 configuring 1390 acronyms 57 ACS 431 activation, AP-count 1836 activation, base 1835 active link 117, 614, 626 active links 612 adding 1447, 1449 Additional References 2139, 2159, 2166, 2187, 2197 VLAN trunks 2187 VLANs 2159, 2166 voice VLANs 2197 VTP 2139 address aliasing 170 address formats 354 address resolution 1776 Address Resolution Protocol 1117 See ARP 1117 addresses 168, 354, 500, 1775, 1776, 1788 dynamic 500, 1775 accelerated aging 500 default aging 500 defined 1775 learning 1775 IPv6 354 MAC, discovering 1776 multicast 168, 500 group address range 168 STP address management 500 static 1788 adding and removing 1788 adjacency tables, with CEF 1235 administrative distances 1147, 1253 defined 1253 OSPF 1147 aggregatable global unicast addresses 354 aggregate addresses, BGP 1193 aggregate-port learners 599 aging time 513, 545, 1783 accelerated 513, 545 for MSTP 545 for STP 513 MAC address table 1783 All APs page 1082 alternate 492 port 492 AnchorTime parameter 1074 and ARP 2075 and CDP 2075 and IPv6 354 and routing 117 and routing protocols 117 and SSH 1342 and switch stacks 359 AP Mode parameter 1082 applications 356 area border routers 1145 See ABRs 1145 area routing 1201 IS-IS 1201 ARP 1124, 1126, 1776 defined 1776 encapsulation 1126 static cache configuration 1124 table 1776 address resolution 1776 AS-path filters, BGP 1174 assigning address 360 assigning information 1722, 1723, 1724 member number 1722 priority value 1723 provisioning a new member 1724 assigning IPv4 and IPv6 addresses to 363 assigning IPv6 addresses to 360 attributes 1318, 1319 vendor-proprietary 1319 vendor-specific 1318 attributes, RADIUS 1318, 1319, 1324 vendor-proprietary 1319, 1324 vendor-specific 1318 authenticating to 1330, 1331 boundary switch 1330 KDC 1330 network services 1331 authentication 1168, 1281, 1285, 1286, 1308, 1310, 1335 EIGRP 1168 local mode with AAA 1335 RADIUS 1308, 1310 key 1308 login 1310 TACACS+ 1281, 1285, 1286 defined 1281 key 1285 login 1286 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-2 INDEX authentication key 1285 authentication keys, and routing protocols 1255 authentication, defined 1281 authoritative time source, described 1772 authorization 1281, 1289, 1314 with RADIUS 1314 with TACACS+ 1281, 1289 authorization, defined 1281 auto mode 153 auto-advise 1717 auto-copy 1717 auto-extract 1717 auto-MDIX 112 configuring 112 described 112 auto-MDIX, configuring 112 auto-QoS 1016 Auto-QoS 1020 monitoring 1020 Auto-RP 242, 251 benefits 242 auto-upgrade 1717 autoconfiguration 356 automatic 1445 automatic advise (auto-advise) in switch stacks 1717 automatic copy (auto-copy) in switch stacks 1717 automatic creation of 581, 584 automatic extraction (auto-extract) in switch stacks 1717 automatic QoS 1014 See QoS 1014 automatic upgrades (auto-upgrade) in switch stacks 1717 automatic upgrades with auto-upgrade 1717 autonegotiation 2088 mismatches 2088 Autonomous Access Points Converted to Lightweight Mode 674 autonomous systems, in BGP 1172 average rate shaping 926 B BackboneFast 560, 570 described 560 enabling 570 backup 492 port 492 backup interfaces 612 See Flex Links 612 bandwidth 927, 977 bandwidth percent 927 banners 1775, 1781, 1782 configuring 1781, 1782 login 1782 message-of-the-day login 1781 default configuration 1775 Beacon Period parameter 1859 Berkeley r-tools replacement 1342 BGP 1171, 1172, 1173, 1174, 1175, 1176, 1177, 1181, 1190, 1193, 1195 aggregate addresses 1193 CIDR 1176 community filtering 1190 default configuration 1177 described 1171 enabling 1181 multipath support 1173 neighbors, types of 1172 path selection 1173 prefix filtering 1175 resetting sessions 1172 route maps 1174 route reflectors 1176 routing domain confederation 1195 Version 4 1172 binding configuration 1445 automatic 1445 manual 1445 binding database 1428 address, DHCP server 1428 See DHCP, Cisco IOS server database 1428 binding physical and logical interfaces 580 binding table 1445 bindings 1428, 1445 address, Cisco IOS DHCP server 1428 IP source guard 1445 blocking 497 state 497 boot network command 2001, 2017 bootstrap router (BSR), described 242 boundary switch 1330 BPDU 492, 493, 533, 555 contents 493 filtering 555 RSTP format 533 bridge identifier (bridge ID) 494 bridge protocol data units 492 bridged NetFlow 40 bridged packets, ACLs on 1410 broadcast flooding 1118 broadcast packets 1118 directed 1118 flooded 1118 broadcast storms 1118 broadcast traffic 2075 BSRs 264 candidate 264 bundle files 2061 displaying contents of 2061 downloading 2061 uploading 2061 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-3 INDEX C CA trustpoint 1350, 1352 configuring 1352 defined 1350 Caching Source-Active State: Example command 1110 Call Admission Control 970 CCX 702 link test 702 CCX Layer 2 client roaming 1881 described 1881 CDP 123, 152, 933 and trusted boundary 933 defined with LLDP 123 power negotiation extensions 152 CDP with power consumption, described 152 CDP with power negotiation, described 152 CEF 367, 1235 distributed 1235 IPv6 367 CEFv6 367 Change Rules Priority parameter 1687 changing the default for lines 1273 Channel Announcement parameter 1865 Channel Assignment Leader parameter 1074 Channel Assignment Method parameter 1073 channel groups 580 binding physical and logical interfaces 580 numbering of 580 Channel Scan Duration parameter 1065 CipherSuites 1351 Cisco 3300 Series Mobility Services Engine (MSE), using with wIPS 1693 Cisco 7960 IP Phone 2190 Cisco Discovery Protocol (CDP) 769 Cisco Express Forwarding 1235 See CEF 1235 Cisco Group Management Protocol 298 See CGMP 298 Cisco intelligent power management 152 Cisco IOS DHCP server 1428 See DHCP, Cisco IOS DHCP server 1428 Cisco IOS IP SLAs 804 Cisco IP Phone Data Traffic 2191 Cisco IP Phone Voice Traffic 2191 Cisco Networking Services 752 Cisco Workgroup Bridges 685 CIST regional root 524, 525 See MSTP 524, 525 CIST root 525 See MSTP 525 civic location 125 class 942 class maps for QoS 918, 919 described 918, 919 class-based unconditional packet marking 950 classification 915, 916, 918 device specific 916 Layer 2 915 Layer 3 915 classless routing 1115 CleanAir 55 components 55 clearing 313 caches 313 databases 313 tables 313 CLNS 1200 See ISO CLNS 1200 clock 1771 See system clock 1771 CNS 752 CoA Request Commands 1302 collect parameters 24 command modes 1996 global configuration 1996 commands, setting privilege levels 1272 comments 1996, 2002 adding to configuration file 1996 adding to configuration files 2002 communication, global 1308, 1317 communication, per-server 1308 CONFIG_FILE environment variable 2025 specifying 2025 configurable leave timer, IGMP 173 configuration archive 2037 creating 2037 configuration commands 2001, 2017 loading from the network 2001, 2017 Configuration Engine 750 restrictions 750 configuration examples 1328 Configuration Examples 77 Configuration Examples command 379 Configuration Examples for Configuring EtherChannels command 606 Configuration Examples for Configuring MLD Snooping Queries command 351 Configuration Examples for Configuring MSDP command 1109 Configuration Examples for Configuring SDM Templates command 1966 Configuration Examples for Setting Passwords and Privilege Levels command 1275 configuration files 1269, 1995, 1996, 1997, 2000, 2001, 2004, 2005, 2007, 2009, 2014, 2017, 2018, 2019, 2021, 2025, 2027, 2029, 2055, 2145 compressing 2014 CONFIG_FILE environment variable 2025 copying 1997, 2004, 2009, 2018, 2019, 2021 between Flash memory devices 2019 from a network server 1997, 2021 from a TFTP server 2009 from Flash memory 2018 to a TFTP server 1997, 2004 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-4 INDEX configuration files (continued) copying (continued) to an rcp server 1997 displaying 2001 information 2001 downloading 2001, 2029 host configuration files 2029 failing to load 2027 host 2029 See host configuration file 2029 invalid combinations when copying 2055 larger than NVRAM 2000, 2014 loading from the network 2001, 2017 location 1996 modifying 1996 network 2001 See network configuration file 2001 password recovery disable considerations 1269 running 2005, 2007 See also running configuration 2005, 2007 storing in Flash memory 2000 types 1995 configuration guidelines 375, 1352, 1447 configuration guidelines, multi-VRF CE 1218 Configure RF Group Mode 1066 Using GUI 1066 configuring 112, 147, 365, 592, 1285, 1286, 1289, 1290, 1308, 1310, 1314, 1315, 1317, 1331, 1342, 1352, 1355, 1358, 1722, 1723, 1965 accounting 1290, 1315 authentication 1310 authentication key 1285 authorization 1289, 1314 communication, global 1308, 1317 communication, per-server 1308 Layer 2 interfaces 592 login authentication 1286 member number 1722 multiple UDP ports 1308 on Layer 2 interfaces 592 priority value 1723 Configuring a Default MDSP Peer: Example command 1109 Configuring a Multicast Router Port: Example command 352 configuring a secure HTTP client 1358 configuring a secure HTTP server 1355 Configuring a static IP address 675 Configuring a Static Multicast Group: Example command 351 Configuring CleanAir 68 Using the GUI 68 Configuring Default Router Preference: Example command 379 Configuring Interference Reporting 62, 65 2.4-GHz devices 62 5-GHz devices 65 Configuring IPv4 and IPv6 Protocol Stacks: Example command 380 Configuring IPv6 Addressing and Enabling IPv6 Routing: Example command 379 Configuring IPv6 ICMP Rate Limiting: Example command 381 Configuring LACP Hot-Standby Ports: Example 607 Configuring Layer 2 EtherChannels: Examples command 606 Configuring Layer 3 EtherChannels: Examples command 607 Configuring MLD Snooping Queries: Example command 352 configuring multicast VRFs 1225 Configuring RIP for IPv6: Example command 381 Configuring SDM templates: Examples: command 1966 Configuring Spectrum Expert 70 Using the GUI 70 Configuring Static Routing for IPv6: Example command 381 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication: Example command 1324 Configuring the Switch to Use Vendor-Specific RADIUS Attributes: Examples command 1323 Configuring VACL Logging 1395 Control and Provisioning of Wireless Access Points protocol (CAPWAP) 640 described 640 controllers 640 discovery process 640 Controlling Source Information that Your Switch Forwards: Example command 1110 Controlling Source Information that Your Switch Originates: Example command 1110 Controlling Source Information that Your Switch Receives: Example command 1110 copy rcp command 2021 copy rcp running-config command 2010, 2012 copy rcp startup-config command 2010, 2012 copy running-config rcp command 2005 copy running-config tftp command 2004 copy startup-config command 2015 copy startup-config rcp command 2005, 2007 copy startup-config tftp command 2004 copy tftp startup-config command 2009 corrupted software, recovery steps with Xmodem 2081 CoS 913, 2195 in Layer 2 frames 913 override priority 2195 CoS-to-DSCP map for QoS 935 country codes 695 described 695 Country Codes 696 Coverage Exception Level per AP parameter 1077 coverage hole detection 1076, 1077 configuring per controller 1076, 1077 using the GUI 1076, 1077 coverage hole detection and correction 1062 crashinfo file 2078 crashinfo, description 2078 credentials 1328 cross-stack EtherChannel 578, 579, 590, 592, 595 configuring 592 on Layer 2 interfaces 592 described 578 illustration 578 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-5 INDEX cross-stack UplinkFast, STP 558, 559 Fast Uplink Transition Protocol 558 normal-convergence events 559 cross-stack UplinkFast,STP 557, 559 described 557 fast-convergence events 559 custom location 125 customer edge devices 1215 customizeable web pages, web-based authentication 1564 D Data Rates parameter 1859 daylight saving time 1778 DCA Channel Sensitivity parameter 1074 DCA Channels parameter 1074 debugging 2078, 2091, 2098 enabling all system diagnostics 2098 redirecting error message output 2091 using commands 2078 default configuration 127, 174, 175, 246, 301, 343, 344, 360, 375, 503, 535, 589, 616, 632, 835, 1177, 1217, 1264, 1285, 1305, 1352, 1774, 1775, 1776 banners 1775 BGP 1177 DNS 1774 EtherChannel 589 Flex Links 616 IGMP 174 IGMP filtering 175 IGMP snooping 175, 343, 344 IGMP throttling 175 IP multicast routing 301 IPv6 360 LLDP 127 MAC address table 1776 MAC address-table move update 616 MSTP 535 multi-VRF CE 1217 password and privilege level 1264 PIM 246 RADIUS 1305 RSPAN 835 SPAN 835 SSL 1352 STP 503 TACACS+ 1285 UDLD 632 default enable password 664 default gateway 1128 default networks 1240 default router preference 355 See DRP 355 default router preference (DRP) 355 default routes 1240 default routing 1113 default setting 117 default settings 31 default web-based authentication configuration 1567 802.1X 1567 default wireless QoS configuration 936 default-group access point group 2224 defined 353, 751, 752, 769, 1281, 1350 Event Service 751 NameSpace Mapper 752 defining AAA server groups 1312 definition 2142 VLAN 2142 deletion 2150 VLAN 2150 described 112, 117, 355, 356, 578, 581, 1328, 1349, 1352, 1445, 1985, 2075, 2079 designated 492 port 492 switch 492 desktop template 1719 destination-IP address-based forwarding 587 destination-IP address-based forwarding, EtherChannel 586 destination-MAC address forwarding 586 destination-MAC address forwarding, EtherChannel 586 Detect and Report Adhoc Networks parameter 1676 detecting indirect link failures,STP 560 device 499 root 499 device priority 511, 543 MSTP 543 STP 511 device stack 770 devices supported 87, 151 DHCP 356, 1423, 1431 DHCP for IPv6 356 See DHCPv6 356 enabling 1423, 1431 relay agent 1431 server 1423 DHCP for IPv6 356 See DHCPv6 356 dhcp option 43 674 dhcp option 60 674 DHCP option 82 1425, 1432, 1438, 2204, 2205 described 2204 displaying 1438 example 2205 forwarding address, specifying 1432 helper address 1432 overview 1425 DHCP server port-based address allocation 1439, 1441 default configuration 1439 enabling 1441 DHCP servers 2203 internal 2203 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-6 INDEX DHCP snooping 1424, 1425, 1445 accepting untrusted packets form edge switch 1424 option 82 data insertion 1425 trusted interface 1424 untrusted messages 1424 DHCP snooping binding database 1428, 1429, 1434, 1439 adding bindings 1439 binding file 1428, 1429 format 1429 location 1428 configuration guidelines 1434 configuring 1439 described 1428 enabling 1439 DHCPv6 356, 375, 376, 378 configuration guidelines 375 default configuration 375 described 356 enabling client function 378 enabling DHCPv6 server function 376 Differentiated Services (Diff-Serv) architecture 912 Differentiated Services Code Point 914 Diffusing Update Algorithm (DUAL) 1160 directed roam request 1882 directories 2053, 2054, 2055 changing 2053 creating 2054 displaying the working 2053 removing 2055 disabled 498 state 498 disabling 350 disabling recovery of 1269 displaying 1359, 2092 displaying crash information 2078 Displaying IPv6: Example command 381 Displaying SDM Templates: Examples: command 1966 Distance Vector Multicast Routing Protocol 298 See DVMRP 298 distance-vector protocols 1113 distribute-list command 1253 DNS 355, 1774, 1780 default configuration 1774 in IPv6 355 overview 1774 setting up 1780 DNS-based SSM mapping 285 domain name server (DNS) discovery 640 Domain Name System 1774 See DNS 1774 domain names 1774, 2125 DNS 1774 domains, ISO IGRP routing 1201 DRP 355, 365 configuring 365 described 355 DRP (continued) IPv6 355 DSCP 914 DSCP maps 935 DSCP-to-CoS map for QoS 936 DTLS data encryption. See <Default Para Font>data encryption 648 DTPC Support parameter 1859 DUAL finite state machine, EIGRP 1161 dual-rate three-color policing 925 DVMRP 317 mrinfo requests, responding to 317 neighbors 317 displaying information 317 tunnels 317 displaying neighbor information 317 dynamic addresses 500 See addresses 500 dynamic channel assignment (DCA) 1061 described 1061 dynamic routing 1113 Dynamic Threshold and Scaling 930 dynamic transmit power control, configuring 1859 E EDCA Profile parameter 1939 EDRRM 59 effects on 359 IPv6 routing 359 egress priority queues 929 EIGRP 1160, 1162, 1166, 1168, 1169 authentication 1168 components 1160 definition 1160 interface parameters, configuring 1166 monitoring 1169 stub routing 1162 EIGRP IPv6 357 EIGRP IPv6 Commands 357 ELIN location 125 enable 1266, 2091 Enable Coverage Hole Detection parameter 1076 Enable Low Latency MAC parameter 1939 enable password 1267 enable secret 1267 enable secret password 1267 enabling 348, 1447, 1449 enabling all system diagnostics 2098 enabling and disabling 344 Enabling CleanAir 60, 63 2.4-GHz 60 5-GHz 63 enabling client function 378 Enabling DHCPv6 Client Function: Example command 381 enabling DHCPv6 server function 376 Enabling DHCPv6 Server Function: Example command 380 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-7 INDEX Enabling MLD Immediate Leave: Example command 352 encrypting 1267 encryption for passwords 1267 encryption methods 1341 encryption, CipherSuite 1351 Enhanced IGRP 1160 See EIGRP 1160 Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 357 EIGRP IPv6 Commands 357 Router ID 357 enhanced neighbor list 1881 described 1881 request (E2E) 1881 enhanced PoE 152 erase command 2025 erase startup-config command 2024 EtherChannel 578, 580, 581, 582, 583, 584, 585, 586, 588, 589, 590, 592, 595, 596, 598, 599, 600, 601, 602, 603, 604, 1119 automatic creation of 581, 584 channel groups 580 binding physical and logical interfaces 580 numbering of 580 configuration guidelines 590 configuring 592, 595 Layer 2 interfaces 592 Layer 3 595 default configuration 589 extended load balancing 598 forwarding methods 586, 596, 598 IEEE 802.3ad, described 584 interaction 590 with STP 590 LACP 584, 585, 600, 601, 602, 603, 604 hot-standby ports 600 interaction with other features 585 max bundles 601 min links 602 modes 584 port priority 604 system priority 603 Layer 3 interface 1119 load balancing 586, 596 logical interfaces, described 580 PAgP 581, 582, 583, 584, 599 about aggregate-port learners 583 about learn method and priority 583 aggregate-port learners 599 described 581 interaction with other features 584 learn method and priority configuration 599 modes 582 port-channel interfaces 580 numbering of 580 stack changes, effects of 588 EtherChannel | interaction 590 with VLANs 590 EtherChannel failover 580 EtherChannel guard 562, 571 described 562 enabling 571 EtherChannels 578, 592, 1447 Ethernet management port 117, 118, 119 active link 117 and routing 117 and routing protocols 117 default setting 117 described 117 for network management 117 supported features 119 unsupported features 119 Ethernet management port configuration 120 Ethernet management port, internal 117, 119 and routing 117 and routing protocols 117 unsupported features 119 Ethernet VLAN 2147 EUI 354 Event Service 751 Example for Configuring Auto-MDIX command 114 Example for Configuring Layer 3 Interfaces command 108 Example for Performing a Traceroute to an IP Host command 2097 Example for Pinging an IP Host command 2096 Examples 996, 997, 998, 999, 1004, 1006, 1007, 1008 acl classification 996 average rate shaping 1004 CoS Layer 2 classification 997 DSCP classification 997 hierarchical classification 998 IP precedence classification 997 policing 1006 policing supported units 1007 queue-limit policy 1004 single-rate two-color policing 1007 table map marking 1008 VLAN ID Layer 2 classification 997 voice and video classification 999 Examples for controlling switch access with RADIUS 1323 executing 2089, 2090 exiting 1274 Expiration Timeout for Rogue AP and Rogue Client Entries parameter 1675 export formats 26 exporters 25 extended crashinfo file 2078 extended load balancing 598 extended system ID 494, 506, 522 MSTP 522 STP 494, 506 extended universal identifier 354 See EUI 354 extended-range VLAN 2153 extended-range VLAN configuration guidelines 2146 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-8 extended-range VLANs 2153 external neighbors, BGP 1172 F Fa0 port 117 See Ethernet management port<$nopage> 117 fallback bridging 492, 502 STP 492 keepalive messages 492 VLAN-bridge STP 502 false RPs 257 FAQ 78 Fast Uplink Transition Protocol 558 fastethernet0 port 117 See Ethernet management port<$nopage> 117 feature history 1051 auto-QoS 1051 feature information 220, 279, 296, 319, 2140, 2160, 2188, 2198 IGMP 220 IP Multicast 319 PIM 279 SSM 296 VLAN trunks 2188 VLANs 2160 voice VLAN 2198 VTP 2140 feature limitations 359 features not supported 358 fiber-optic, detecting unidirectional links 630 file system 2049, 2052, 2055 displaying available file systems 2049 displaying file information 2052 local file system names 2049 network file system names 2055 setting the default 2052 files 2055, 2057, 2078 copying 2055 crashinfo, description 2078 deleting 2057 tar 2057 creating 2057 displaying the contents of 2057 extracting 2057 filtering 1388 non-IP traffic 1388 filters, IP 1363 See ACLs, IP [filters 1363 IP 1363 zzz] 1363 flash device, 2049 number of 2049 flash memory 2079 Flash memory 2000 storing configuration files 2000 INDEX Flash memory devices 2019 files 2019 copying 2019 flash: file system 2049 Flex Links 612, 613, 616, 617, 619, 621, 622, 623 configuring 616, 617 configuring VLAN load balancing 619 default configuration 616 description 612 link load balancing 613 monitoring 621 preemption scheme 617 preferred VLAN example 623 switchport backup example 622 forced preemption mode example 622 VLAN load balancing examples 622 Flex Links failover 613 flow exporter 33 flow monitor 36 flow record 23, 32 for IPv6 357 for network management 117 forward-delay time 513, 545 MSTP 545 STP 513 forwarding 360, 498 state 498 forwarding methods 586, 596, 598 Fragmentation Threshold parameter 1859 FTP Server 2029 configuration files, downloading 2029 G General (controller) page 1068 configuring an RF group 1068 general query 625 Generating IGMP Reports 614 geo location 125 global configuration mode 1996 entering 1996 Global configuration templates 1015 global leave, IGMP 206 Group Mode parameter 1084 H hello time 512, 544 MSTP 544 STP 512 hierarchical classification 917 hierarchical policies 998 Hierarchical QoS 911 hierarchical shaping 926 high-power devices operating in low-power mode 152 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-9 INDEX host configuration files 2001, 2011, 2013, 2029 comparison with network configuration files 2001 copying from an rcp server to startup configuration (example) 2011, 2013 description 2001 loading from a server 2029 host signalling 169 hot-standby ports 600 HTTP secure server 1349, 1352 HTTP(S) Over IPv6 358 HTTPS 1349, 1350, 1352, 1355 configuring 1355 described 1349, 1352 self-signed certificate 1350 hub 118 I IBPG 1170 ICMP 355, 1362, 1373, 2076 IPv6 355 time-exceeded messages 2076 traceroute and 2076 unreachable messages 1362 unreachables and ACLs 1373 ICMP Echo operation 817 configuring 817 IP SLAs 817 ICMP ping 2075, 2089 executing 2089 overview 2075 ICMP Router Discovery Protocol 1128 See IRDP 1128 ICMPv6 355 Identifying the RADIUS Server Host: Examples command 1323 identifying the server 1285, 1308 IEEE 802.1Q tagging 2179 IEEE 802.1s 521 See MSTP 521 IEEE 802.3ad, described 584 IEEE power classification levels 152 IGMP 168, 169, 170, 171, 172, 173, 174, 176, 179, 181, 183, 185, 200, 203, 205, 206, 207, 211, 348, 350, 351 configurable last member query count 203 enabling 203 configurable leave timer 173, 200 described 173 enabling 200 configuring the switch 176, 185 as a member of a group 176 statically connected member 185 default configuration 174 flooded multicast traffic 205, 206, 207 controlling the length of time 205 disabling on an interface 207 global leave 206 IGMP (continued) flooded multicast traffic (continued) recovering from flood mode 206 host-query interval, modifying 179 join messages 170 leave processing, enabling 348 leaving multicast group 172 maximum query response time value 183 multicast reachability 176 pruning groups 183 queries 171 query timeout 181 query timeout 181 report suppression 173, 211, 350 described 173 disabling 211, 350 snooping 351 supported versions 168 Version 1 169 Version 2 169 Version 3 169 IGMP filtering 174, 175 default configuration 175 described 174 IGMP groups 190, 191 configuring filtering 191 setting the maximum number 190 IGMP Helper 241 IGMP Immediate Leave 199, 200 configuration guidelines 200 enabling 199 IGMP profile 187, 188 applying 188 configuration mode 187 IGMP robustness-variable 202 IGMP snooping 168, 169, 170, 172, 173, 175, 193, 194, 195, 209, 213, 343, 344, 351 and address aliasing 170 and stack changes 173 default configuration 175, 343, 344 definition 169 enabling and disabling 193, 344 global configuration 193 Immediate Leave 172 in the switch stack 173 method 195 monitoring 213, 351 querier 209 configuration guidelines 209 configuring 209 supported versions 168 VLAN configuration 194 IGMP throttling 174, 175, 191, 214 configuring 191 default configuration 175 described 174 IN-10 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IGMP throttling (continued) displaying action 214 IGMPv3 169 Immediate Leave, IGMP 172, 348 described 172 enabling 348 in IPv6 355 inline power 711 input, output parameters 960 inter-subnet roaming 1881 described 1881 Inter-Switch Link 824 See ISL 824 inter-VLAN routing 1112 interaction with other features 584, 585 interface 148, 159 interface configuration 39 interfaces 112 auto-MDIX, configuring 112 interference 1061 Interference threshold parameter 1064 Interior Gateway Protocol 1145 See IGP 1145 internal BGP 1170 See IBGP 1170 internal neighbors, BGP 1172 internal power supplies 147 See power supplies<$nopage> 147 Internet Group Management Protocol 298 See IGMP 298 Internet Protocol version 6 353 See IPv6 353 Interval parameter 1074 Intrusion Detection System 825 See IDS appliances 825 inventory management TLV 125 Invoke Channel Update Now button 1073 Invoke Power Update Now button 1070 IP ACLs 918, 1371 for QoS classification 918 named 1371 IP addresses 354, 1120, 1121, 1135, 1776 128-bit 354 classes of 1121 discovering 1776 for IP routing 1120 IPv6 354 monitoring 1135 IP addresses and subnets 2075 IP broadcast address 1133 IP directed broadcasts 1130 IP multicast boundaries 300 IP multicast boundary 262, 310 IP multicast group addresses 168 INDEX IP multicast routing 168, 238, 241, 242, 243, 259, 267, 273, 298, 301, 303, 304, 305, 307, 309, 314 addresses 168 all-hosts 168 all-multicast-routers 168 host group address range 168 Auto-RP 267 using with BSR 267 bootstrap router 242, 267 overview 242 using with Auto-RP 267 configuring 301, 304, 305 basic multicast routing 301 IP multicast forwarding 304 IP static multicast route 305 default configuration 301 enabling 303 PIM mode 303 group-to-RP mappings 241, 242 Auto-RP 241 BSR 242 MBONE 307, 309 described 307 enabling sdr listener support 307 limiting sdr cache entry lifetime 309 SAP packets for conference session announcement 307 multicast forwarding, described 243 PIMv1 and PIMv2 interoperability 238 protocol interaction 298 RP 259, 267, 273 configuring PIMv2 BSR 259 monitoring mapping information 273 using Auto-RP and BSR 267 stacking 301 active switch functions 301 stack member functions 301 statistics, displaying system and network 314 IP phones 932 ensuring port security with QoS 932 trusted boundary for QoS 932 IP precedence 914 IP routing 1136 enabling 1136 IP SLA 805, 807, 808, 809, 820 configuration guidelines 808 monitoring 820 responder 805, 809 described 805 enabling 809 threshold monitoring 807 IP SLAs 804, 805, 806, 807, 809, 814, 817 benefits 804 configuration 809 ICMP echo operation 817 measuring network performance 805 multi-operations scheduling 806 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-11 INDEX IP SLAs (continued) response time 806 SNMP support 804 supported metrics 804 UDP jitter operation 807, 814 IP source guard 1445, 1447, 1449 802.1x 1447 binding configuration 1445 automatic 1445 manual 1445 binding table 1445 configuration guidelines 1447 described 1445 DHCP snooping 1445 enabling 1447, 1449 EtherChannels 1447 port security 1447 routed ports 1447 static bindings 1447, 1449 adding 1447, 1449 static hosts 1449 TCAM entries 1447 trunk interfaces 1447 VRF 1447 IP traceroute 2076, 2090 executing 2090 overview 2076 IP unicast routing 354, 1112, 1113, 1115, 1117, 1118, 1119, 1120, 1121, 1123, 1128, 1130, 1133, 1136, 1234, 1238, 1240, 1241, 1251, 1253, 1255 administrative distances 1253 authentication keys 1255 broadcast 1118, 1133 address 1133 flooding 1118 packets 1118 storms 1118 classless routing 1115 configuring static routes 1238 default 1113, 1128, 1240 gateways 1128 networks 1240 routes 1240 routing 1113 directed broadcasts 1130 dynamic routing 1113 enabling 1136 EtherChannel Layer 3 interface 1119 inter-VLAN 1112 IP addressing 1120, 1121 classes 1121 configuring 1120 IPv6 354 IRDP 1117 Layer 3 interfaces 1119 MAC address and IP address 1117 IP unicast routing (continued) passive interfaces 1251 protocols 1113 distance-vector 1113 link-state 1113 proxy ARP 1117 redistribution 1241 routed ports 1119 See also RIP[IP unicast routing 1113 zzz] 1113 static routing 1113 steps to configure 1120 subnet mask 1121 subnet zero 1123 unicast reverse path forwarding 1234 with SVIs 1119 IP-precedence-to-DSCP map for QoS 935 IPv4 ACLs 1375, 1376, 1378, 1381, 1386 applying to interfaces 1386 extended, creating 1378 interfaces 1375 named 1381 standard, creating 1376 IPv6 339, 353, 354, 355, 356, 357, 358, 359, 360, 367, 374, 904 address formats 354 addresses 354 and switch stacks 359 applications 356 assigning address 360 autoconfiguration 356 CEFv6 367 default configuration 360 default router preference (DRP) 355 defined 353 Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 357 EIGRP IPv6 Commands 357 Router ID 357 feature limitations 359 features not supported 358 forwarding 360 ICMP 355 monitoring 374 neighbor discovery 355 OSPF 357 path MTU discovery 355 SDM templates 339 stack master functions 359 Stateless Autoconfiguration 356 supported features 354 switch limitations 359 understanding static routes 356 IPv6 on 359 IPv6 routing 359 IRDP 1117, 1128 configuring 1128 definition 1117 IN-12 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IS-IS 1201 area routing 1201 system routing 1201 ISL 354 and IPv6 354 ISO CLNS 1200, 1201 dynamic routing protocols 1201 OSI standard 1200 J Japanese country codes 696 join messages, IGMP 170 K KDC 1328, 1330 described 1328 See also Kerberos<$nopage>[KDC 1328 zzz] 1328 keepalive messages 492 Kerberos 1328, 1330, 1331 authenticating to 1330, 1331 boundary switch 1330 KDC 1330 network services 1331 configuration examples 1328 configuring 1331 credentials 1328 described 1328 KDC 1328 operation 1330 realm 1328 server 1328 switch as trusted third party 1328 terms 1328 TGT 1328 tickets 1328 key 1285, 1308 key distribution center 1328 See KDC<$nopage> 1328 L LACP 579, 584, 585, 592, 600, 601, 602, 603, 604 hot-standby ports 600 interaction with other features 585 max bundles 601 min links 602 modes 584 port priority 604 system priority 603 Layer 2 916 Layer 2 EtherChannel configuration guidelines 591 Layer 2 interface modes 2171 INDEX Layer 2 interfaces 592 Layer 2 NetFlow 41 Layer 2 traceroute 2075 and ARP 2075 and CDP 2075 broadcast traffic 2075 described 2075 IP addresses and subnets 2075 MAC addresses and VLANs 2075 multicast traffic 2075 multiple devices on a port 2075 unicast traffic 2075 usage guidelines 2075 Layer 3 915 Layer 3 EtherChannel configuration guidelines 592 Layer 3 interfaces 360, 363, 1119 assigning IPv4 and IPv6 addresses to 363 assigning IPv6 addresses to 360 types of 1119 Layer 3 packets, classification methods 914 Layer 4 915 Leaking IGMP Reports 614 learn method and priority configuration 599 leave processing, enabling 348 license ap-count activation 1836 license base image activation 1835 lightweight mode, reverting to autonomous mode 674 limiting the services to the user 1289, 1314 Link Failure, detecting unidirectional 528 Link Latency 702 link local unicast addresses 354 link redundancy 612 See Flex Links 612 link test 702 types of packets 702 link-state protocols 1113 listening 498 state 498 LLDP 123, 127, 129 configuring 127 default configuration 127 enabling 127 overview 123 switch stack considerations 123 transmission timer and holdtime, setting 129 LLDP-MED 124, 131 configuring 131 TLVs 131 overview 124 supported TLVs 124 load balancing 586, 596 load balancing advantages 587 load sharing 2172, 2180, 2184 trunk ports 2172 local mode with AAA 1335 local SPAN 826 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-13 INDEX location TLV 125 logging into 1274 logging messages, ACL 1372 logical interfaces, described 580 login 1286, 1310 login authentication 1286, 1310 with RADIUS 1310 with TACACS+ 1286 login banners 1775 LWAPP-enabled access points 675, 677 reverting to autonomous mode 677 sending crash information to controller 675 M MAC address of 1721 MAC address of access point 675 displayed on controller GUI 675 MAC address-table move update 614, 616, 619, 621 configuration guidelines 616 configuring 619 default configuration 616 description 614 obtain and process messages 621 MAC addresses 1117, 1775, 1776, 1783, 1788 aging time 1783 and VLAN association 1776 building the address table 1775 default configuration 1776 discovering 1776 dynamic 1775 learning 1775 IP address association 1117 static 1788 characteristics of 1788 MAC addresses and VLANs 2075 MAC extended access lists 1362, 1389 applying to Layer 2 interfaces 1362, 1389 MAC/PHY configuration status TLV 123 management address TLV 123 managing 147 managing switch stacks 1720 manual 1445 manual upgrades with auto-advise 1717 mapping tables for QoS 935, 936 configuring 935, 936 CoS-to-DSCP 935 DSCP-to-CoS 936 IP-precedence-to-DSCP 935 marking 922, 960 action in policy map 960 packet header 922 router specific information 922 table map 922 match 23 datalink 23 flow 23 interface 23 ipv4 23 ipv6 23 transport 23 match parameters 23 max bundles 601 maximum aging time 513, 546 MSTP 546 STP 513 maximum hop count, MSTP 547 maximum-paths command 1237 MBONE 307 MCS data rates 1862 mDNS 322 mDNS gateway 323 mDNS Gateway 323 mDNS-SD 322 mDNS-SD, wireless 322 member number 1722 merged 1711 messages, to users through banners 1775 metric translations, between routing protocols 1246 metrics, in BGP 1174 MFIB 299 Min Failed Client Count per AP parameter 1077 min links 602 mirroring traffic for analysis 825 mismatches 2088 mismatches, autonegotiation 2088 MLD Messages 340 MLD Queries 341 MLD Reports 342 MLD Snooping 340 MLDv1 Done message 342 mobility groups 1057 difference from RF groups 1057 modes 582, 584 Modular QoS CLI 914 monitor intervals, configuring using the GUI 1065 monitoring 44, 155, 212, 213, 214, 273, 294, 313, 316, 351, 374, 621, 820, 826, 994, 1135, 1158, 1169, 1236, 1359, 1396, 1397, 2089, 2137, 2196 access groups 1396 CEF 1236 EIGRP 1169 Flex Links 621 IGMP 212, 213, 351 snooping 213, 351 IP 313, 1135 address tables 1135 multicast routing 313 IP multicast routing 316 IP SLA operations 820 IN-14 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) INDEX monitoring (continued) IPv4 ACL configuration 1396 IPv6 374 multicast router interfaces 214 network traffic for analysis with probe 826 OSPF 1158 QoS 994 RP mapping information 273 SFP status 2089 SSM mapping 294 VLAN 1397 filters 1397 maps 1397 voice VLAN 2196 VTP 2137 Monitoring CleanAir 73, 75 Using CLI 73 Using GUI 75 Monitoring Interference Devices 76 GUI 76 monitoring power 157 monitoring status of 2089 Monitoring Worst Air Quality of Radio Bands 77 Using the GUI 77 monitors 26 MQC 903 mrouter Port 613 MSDP 240, 1091 overview 1091 MST mode 2173 MSTP 501, 519, 520, 521, 522, 523, 524, 525, 526, 527, 529, 535, 536, 538, 539, 540, 542, 543, 544, 545, 546, 547, 548, 549, 550, 551, 554, 555, 562, 563, 564, 565, 566, 571, 572, 573 boundary ports 519, 527 configuration guidelines 519 described 527 BPDU filtering 555, 566 described 555 enabling 566 BPDU guard 554, 565 described 554 enabling 565 CIST regional root 524, 525 CIST root 525 CIST, described 523 configuration guidelines 521 configuring 536, 538, 539, 540, 542, 543, 544, 545, 546, 547, 548, 549 device priority 543 forward-delay time 545 hello time 544 link type for rapid convergence 548 maximum aging time 546 maximum hop count 547 MST region 536 neighbor type 549 path cost 542 MSTP (continued) configuring (continued) port priority 540 root device 538 secondary root device 539 CST 524 operations between regions 524 default configuration 535 displaying status 551 enabling the mode 536 EtherChannel guard 562, 571 described 562 enabling 571 extended system ID 522, 539 effects on root device 522 effects on secondary root device 539 unexpected behavior 522 IEEE 802.1s 525, 527 implementation 527 port role naming change 527 terminology 525 instances supported 501 interface state, blocking to forwarding 554 interoperability and compatibility among modes interoperability with IEEE 802.1D 529, 550 described 529 restarting migration process 550 IST 524 operations within a region 524 loop guard 563, 573 described 563 enabling 573 mapping VLANs to MST instance 536 MST region 523, 526, 536 CIST 523 configuring 536 described 523 hop-count mechanism 526 IST 523 supported spanning-tree instances 523 PortFast 554, 564 described 554 enabling 564 preventing root switch selection 562 root device 522 configuring 522 effects of extended system ID 522 unexpected behavior 522 root guard 562, 572 described 562 enabling 572 shutdown Port Fast-enabled port 554 stack changes, effects of 529 status, displaying 551 MTU 141 system 141 501, 520 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-15 INDEX multi-operations scheduling, IP SLAs 806 multi-VRF CE 1214, 1216, 1217, 1218, 1230 configuration example 1230 configuration guidelines 1218 default configuration 1217 defined 1214 network components 1216 packet-forwarding process 1216 Multicast Client Aging Robustness 341 Multicast Fast Convergence 613, 624 multicast forwarding 243 Multicast group concept 300 multicast groups 170, 172, 198, 346 joining 170 leaving 172 static joins 198, 346 multicast packets 1411 ACLs on 1411 Multicast Router Discovery 341 multicast router interfaces, monitoring 214 multicast router ports, adding 197 Multicast Source Discovery Protocol 240 multicast traffic 2075 multiple devices on a port 2075 multiple UDP ports 1308 multiple VPN routing/forwarding in customer edge devices 1214 See multi-VRF CE 1214 N NameSpace Mapper 752 native VLAN 2179 neighbor discovery 355 neighbor discovery, IPv6 355 neighbor discovery/recovery, EIGRP 1160 Neighbor Packet Frequency parameter 1065 NetFlow 1372 Network Assistant 1720 managing switch stacks 1720 network configuration files 2001 comparison with host configuration files 2001 description 2001 Network Load Sharing 2172, 2173 STP path cost 2173 STP priorities 2172 Network Mobility Services Protocol (NMSP) 1952 modifying the notification interval for clients, RFID tags, and rogues 1952 network performance, measuring with IP SLAs 805 network policy TLV 124 network services 1331 Non-Cisco Workgroup Bridges 685 non-IP traffic filtering 1388 nonhierarchical policy maps 960 configuring 960 normal-range 2145 VLAN configuration guidelines 2145 NSAPs, as ISO IGRP addresses 1201 NSF Awareness 1202 IS-IS 1202 NTP 1772 associations 1772 defined 1772 overview 1772 time 1772 services 1772 number of 1963 numbering of 580 NVRAM 2014 file compression 2014 O OBFL 2079, 2091, 2092 configuring 2091 described 2079 displaying 2092 offline configuration 1715, 1724 provisioned configuration, defined 1715 provisioned switch, defined 1715 provisioning a new member 1724 on Layer 2 interfaces 592 on-board failure logging 2079 online diagnostics 1985 described 1985 overview 1985 operation 1330 operation of 1283, 1298 optimizing system resources 1963 OSPF 357, 1147, 1148, 1150, 1158 area parameters, configuring 1147 configuring 1150 default configuration 1147 metrics 1147 route 1147 for IPv6 357 LSA group pacing 1148 monitoring 1158 route summarization 1147 router IDs 1148 virtual links 1147 overview 1091, 1261, 1265, 1281, 1297, 1985, 2075, 2076 P PaGP 579 PAgP 581, 582, 584, 592, 599 aggregate-port learners 599 described 581 interaction with other features 584 IN-16 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) PAgP (continued) learn method and priority configuration 599 modes 582 parallel paths, in routing tables 1237 partitioned 1711, 2087 passive interfaces 1147, 1251 configuring 1251 OSPF 1147 password 2126 password and privilege level 1264 password recovery disable considerations 1269 passwords 1261, 1264, 1266, 1267, 1269, 1270, 1271, 2074 default configuration 1264 disabling recovery of 1269 encrypting 1267 overview 1261 recovery of 2074 setting 1266, 1267, 1270, 1271 enable 1266 enable secret 1267 Telnet 1270 with usernames 1271 path cost 492, 510, 542 MSTP 542 STP 510 path MTU discovery 355 PBR 1247, 1250, 1251 defined 1247 fast-switched policy-based routing 1250 local policy-based routing 1251 persistent self-signed certificate 1350 PIM 237, 238, 239, 244, 246, 268, 270, 272, 273, 303 default configuration 246 dense mode 244 RPF lookups 244 enabling a mode 303 monitoring 272 router-query message interval, modifying 270 shortest path tree, delaying the use of 268 sparse mode 239, 244 join messages and shared tree 239 prune messages 239 RPF lookups 244 versions 238, 273 interoperability 238 troubleshooting interoperability problems 273 v2 improvements 238 PIM DM 239 PIM domain border 259 PIM shared tree 244 PIM source tree 244 PIM stub routing 240, 246 ping 2075, 2089, 2096 character output description 2096 executing 2089 overview 2075 INDEX ping link test 702 PoE 87, 151, 152, 153, 155, 157 auto mode 153 CDP with power consumption, described 152 CDP with power negotiation, described 152 Cisco intelligent power management 152 devices supported 87, 151 high-power devices operating in low-power mode 152 IEEE power classification levels 152 monitoring 155 monitoring power 157 policing power consumption 157 policing power usage 155 power management modes 153 power negotiation extensions to CDP 152 powered-device detection and initial power allocation 152 standards supported 152 static mode 153 supported watts per port 87, 151 PoE ports 2074 police 979 policer allocation for VLAN 1006 policing 917, 921, 924 described 917 physical ports 921 token-bucket algorithm 921 policing power consumption 157 policing power usage 155 policy 944, 956 interface attachment 956 policy map 944 Policy Map 1911 policy maps 964 configuring 964 policy maps for QoS 919, 960, 964 characteristics of 919 nonhierarchical on physical ports 960 configuring 960 on SVIs 964 configuring 964 policy-based routing 1247 See PBR 1247 port 492, 499 priority 492 root 499 port ACLs 1364, 1365 defined 1364 types of 1365 port description TLV 123 port priority 508, 540, 604 MSTP 540 STP 508 port security 1447 port VLAN ID TLV 123 port-based authentication 1560, 1567, 1568, 1569, 1573, 1574, 1581 configuration guidelines 1568 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-17 INDEX port-based authentication (continued) configuring 1569, 1573, 1574 RADIUS server 1569, 1574 RADIUS server parameters on the switch 1573 default configuration 1567 device roles 1560 displaying statistics 1581 enabling 1573 802.1X authentication 1573 switch 1560 as proxy 1560 port-channel interfaces 580 numbering of 580 power management modes 153 power management TLV 125 power negotiation extensions 152 power negotiation extensions to CDP 152 Power Neighbor Count parameter 1071 Power over Ethernet 711 power supply 147 configuring 147 managing 147 Power Threshold parameter 1071 powered-device detection and initial power allocation 152 preemption delay, default configuration 616 preemption, default configuration 616 preferential treatment of traffic 903 See QoS 903 prefix lists, BGP 1175 prerequisites 235, 281, 297, 901, 1013, 2117, 2141, 2169, 2189 auto-QoS 1013 IP multicast routing 297 PIM 235 QoS 901 SSM 281 VLAN trunks 2169 VLANs 2141 voice VLANs 2189 VTP 2117 preventing unauthorized access 1261 prioritization 912 priority 982, 2195 overriding CoS 2195 priority value 1723 privilege levels 1265, 1272, 1273, 1274 changing the default for lines 1273 exiting 1274 logging into 1274 overview 1265 setting a command with 1272 probe request forwarding 689 probe requests, described 689 Protecting Enable and Enable Secret Passwords with Encryption: Example command 1276 Protection Type parameter 1082 protocol-dependent modules, EIGRP 1161 Protocol-Independent Multicast Protocol 298 See PIM 298 provider edge devices 1215 provisioned configuration, defined 1715 provisioned switch, defined 1715 provisioning a new member 1724 provisioning new members for a switch stack 1715 proxy ARP 1117 definition 1117 with IP routing disabled 1117 proxy reports 614 pruning-eligible list 2178 PVST mode 2173 PVST+ 500, 501, 502 described 500 IEEE 802.1Q trunking interoperability 502 instances supported 501 Q QoS 914, 917, 918, 919, 921, 927, 928, 932, 935, 936, 960, 964, 984, 1015, 1021, 1904 auto-QoS 1015, 1021 disabling 1021 effects on running configuration 1015 basic model 917 egress port 917 ingress port 917 classification 914, 917, 918, 919 class maps, described 918, 919 defined 917 forwarding treatment 914 IP ACLs, described 918 MAC ACLs, described 918 configuring 960, 964, 984 egress queue characteristics 984 policy maps on physical ports 960 policy maps, VLANs 964 egress queues 917 described 917 implicit deny 918 IP phones 932 detection and trusted settings 932 mapping tables 935, 936 CoS-to-DSCP 935 DSCP-to-CoS 936 IP-precedence-to-DSCP 935 marked-down actions 1904 marking, described 917 policers 1904 configuring 1904 policies, attaching to an interface 921 policing 917, 921 described 917 token bucket algorithm 921 IN-18 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) INDEX QoS (continued) policy maps 919 characteristics of 919 nonhierarchical on physical ports 919 queues 927, 928, 984 configuring egress characteristics 984 location of 927 WTD, described 928 QoS components 902 QoS Policy, WLAN 993 queries, IGMP 171 queue buffer 929, 930 allocation 930 queue buffers 984 queue limit 987 R radio resource management (RRM) 1059, 1062, 1065, 1070, 1073, 1074, 1076 configuring 1065 monitor intervals using the GUI 1065 coverage hole detection 1062, 1076 configuring per controller using the GUI 1076 described 1062 specifying channels 1073, 1074 update interval 1059 Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC parameter 1070 RADIUS 1296, 1297, 1298, 1305, 1308, 1310, 1312, 1314, 1315, 1317, 1318, 1319, 1322, 1324 attributes 1318, 1319, 1324 vendor-proprietary 1319, 1324 vendor-specific 1318 configuring 1308, 1310, 1314, 1315, 1317 accounting 1315 authentication 1310 authorization 1314 communication, global 1308, 1317 communication, per-server 1308 multiple UDP ports 1308 default configuration 1305 defining AAA server groups 1312 identifying the server 1308 key 1308 limiting the services to the user 1314 login 1310 operation of 1298 overview 1297 server load balancing 1322 suggested network environments 1297 tracking services accessed by user 1315 RADIUS Change of Authorization 1299 rapid convergence 530 Rapid Spanning Tree Protocol 521 See RSTP 521 rcp (remote copy protocol) 1997 server 1997 configuration files, copying 1997 realm 1328 recovery of 2074 recovery procedures 2081 redirecting error message output 2091 redundancy 499, 557, 578 EtherChannel 578 STP 499, 557 backbone 499 multidrop backbone 557 redundant links and UplinkFast 568, 569 reference 528 references 1010, 1050 auto-QoS 1050 QoS 1010 reliable transport protocol, EIGRP 1160 remaining ratio 927 Remote Authentication Dial-In User Service 1296 See RADIUS 1296 remote SPAN 827 removing a provisioned member 1725 rendezvous point 248 replacing 1714 replacing a failed member 1714 report suppression 350 disabling 350 report suppression, IGMP 173, 211, 350 described 173 disabling 211, 350 resets, in BGP 1172 responder, IP SLA 805, 809 described 805 enabling 809 response time, measuring with IP SLAs 806 restricting access 1261, 1281, 1296 overview 1261 RADIUS 1296 TACACS+ 1281 restrictions 167, 236, 282, 298, 491, 520, 553, 750, 936, 1013, 2118, 2142, 2170, 2190 auto-QoS 1013 Auto-RP 236 Configuration Engine 750 IGMP 167 IP multicast routing 298 MSTP 520 Optional Spanning-Tree Features 553 PIM 236 SSM 282 STP 491 VLAN trunks 2170 VLANs 2142 voice VLANs 2190 VTP 2118 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-19 INDEX restrictions (continued) wired targets 936 Reverse Address Resolution Protocol 1117 See RARP 1117 reverse path check 243 RF group leader 1057, 1058 described 1057, 1058 RF group name 1059 described 1059 RF groups 1058, 1059, 1084 cascading 1058 monitoring status 1084 using the GUI 1084 overview 1059 pinning 1058 viewing status 1084 using the GUI 1084 RF-Network Name parameter 1068 RFC 169, 1137, 1145, 1170, 1772 1058, RIP 1137 1112, IP multicast and IGMP 169 1163, BGP 1170 1267, BGP 1170 1305, NTP 1772 1587, NSSAs 1145 1771, BGP 1170 RFC 5176 Compliance 1300 RFID Tracking 691 Right-To-Use 1831, 1832, 1833, 1835, 1836 AP-count activation 1836 base image activation 1835 evaluation license 1832 image based licenses 1832 license overview 1832 license states 1832 permanent license 1832 restrictions 1831 switch stacks 1833 RIP 357, 1138, 1139, 1141, 1142 authentication 1141 configuring 1139 described 1138 for IPv6 357 hop counts 1138 split horizon 1142 summary addresses 1142 RLDP. See <Default Para Font>Rogue Location Discovery Protocol (RLDP) 1673 roam reason report 1882 rogue access points 1082, 1676 alarm 1082 automatically containing 1676 using the GUI 1676 Rogue Detection parameter 1675 Rogue Location Discovery Protocol parameter 1675 Rogue Policies page 1675 rogue states 1681 role 492 port 492 root 492, 493 port 492 switch 492, 493 root device 506, 538 MSTP 538 STP 506 route calculation timers, OSPF 1148 route maps 1174, 1247 BGP 1174 policy-based routing 1247 route reflectors, BGP 1176 route selection, BGP 1173 route summarization, OSPF 1147 route targets, VPN 1216 route-map command 1249 routed packets, ACLs on 1410 routed ports 1119, 1120, 1447 configuring 1119 IP addresses on 1120 router ACLs 1364, 1366 defined 1364 types of 1366 Router ID 357 router ID, OSPF 1148 routing 118, 1113, 1241 default 1113 dynamic 1113 redistribution of information 1241 static 1113 routing domain confederation, BGP 1195 Routing Information Protocol 1113 See RIP 1113 RP 249, 254 sparse-mode cloud 254 RP announcement messages 257 RPs 265 candidate 265 rsh (remote shell) 1997 RSPAN 824, 825, 826, 827, 828, 829, 830, 831, 832, 833, 834, 835, 836, 842, 843, 845, 848 and stack changes 834 characteristics 832 configuration guidelines 836 default configuration 835 destination ports 831 in a device stack 826 interaction with other features 833 monitored ports 830 monitoring ports 831 overview 825 received traffic 829 session limits 824 IN-20 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) RSPAN (continued) sessions 828, 842, 843, 845, 848 creating 842, 843 defined 828 limiting source traffic to specific VLANs 845 specifying monitored ports 842, 843 with ingress traffic enabled 848 source ports 830 transmitted traffic 829 VLAN-based 831 RSTP 529, 530, 531, 532, 533, 534, 548, 550 active topology 530 BPDU 533, 534 format 533 processing 534 designated port, defined 530 designated switch, defined 530 interoperability with IEEE 802.1D 529, 534, 550 described 529 restarting migration process 550 topology changes 534 overview 529 port roles 530, 532 described 530 synchronized 532 rapid convergence 530, 531, 548 cross-stack rapid convergence 531 described 530 edge ports and Port Fast 530 point-to-point links 531, 548 root ports 531 root port, defined 530 running configuration 2005, 2008, 2011, 2013 copying 2005, 2008, 2011, 2013 from an rcp server (example) 2011, 2013 to an rcp server 2005, 2008 S sampler 27, 37 SCP 1342 and SSH 1342 configuring 1342 SDM 1719, 1963, 1965 switch stack consideration 1719 templates 1963, 1965 configuring 1965 number of 1963 SDM template 1963, 1965 configuring 1965 types of 1963 SDM template selection 1965 SDM templates 339 sdr 307 SE-Connect 71 INDEX secure HTTP client 1358, 1359 configuring 1358 displaying 1359 secure HTTP server 1355, 1359 configuring 1355 displaying 1359 Secure Shell 1340 Secure Socket Layer 1349 See SSL<$nopage> 1349 security and identification 2089 See also downloading and uploading[software images 2081 See also IP traceroute 2076 See also Kerberos<$nopage>[KDC 1328 zzz] 1328 See DHCPv6 356 See DRP 355 See EtherChannel 581, 584 See Ethernet management port<$nopage> 117 See EUI 354 see HTTPS 1349, 1352 See IPv6 353 See KDC<$nopage> 1328 See power supplies<$nopage> 147 See RADIUS 1296 See SCP 1342 See SSL<$nopage> 1349 See TACACS+<$nopage> 1281 self-signed certificate 1350 server 1328 server load balancing 1322 service compress-config command 2014 Service Discovery Gateway 324 filtering 324 query 324 service list 324 service list 325 service-provider network, MSTP and RSTP 521 services 752 networking 752 Set to Factory Default button 1065 setting 1266, 1267, 1270, 1271 enable 1266 enable secret 1267 Telnet 1270 with usernames 1271 setting a command with 1272 setting a password 1270 Setting a Telnet Password for a Terminal Line: Example command 1276 Setting or Changing a Static Enable Password: Example command 1275 setting packet forwarding 2091 Setting the Privilege Level for a Command: Example command 1276 SFP security and identification 2089 SFP status 2089 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-21 INDEX SFPs 2089 monitoring status of 2089 security and identification 2089 status, displaying 2089 shaping 926, 989 show access-lists hw-summary command 1373 show forward command 2091 show interfaces switchport 624 show platform forward command 2091 Simple Network Management Protocol (SNMP) 769 single-switch EtherChannel 579 SNMP 804, 1784, 1785, 1787 and IP SLAs 804 traps 1784, 1785, 1787 enabling MAC address notification 1784, 1785, 1787 SNMP and Syslog Over IPv6 357 snooping 351 software images 2081 recovery procedures 2081 See also downloading and uploading[software images 2081 source-and-destination MAC address forwarding, EtherChannel 586 source-and-destination-IP address based forwarding, EtherChannel 586 source-IP address based forwarding, EtherChannel 586 source-IP address-based forwarding 587 source-MAC address forwarding 586 source-MAC address forwarding, EtherChannel 586 Source-specific multicast 286 See SSM 286 SPAN 824, 825, 828, 829, 830, 831, 833, 834, 835, 837, 839, 841, 850 and stack changes 834 configuration guidelines 835 default configuration 835 destination ports 831 interaction with other features 833 monitored ports 830 monitoring ports 831 overview 825 received traffic 829 session limits 824 sessions 828, 835, 837, 839, 841, 850 creating 837, 850 defined 828 limiting source traffic to specific VLANs 841 removing destination (monitoring) ports 835 specifying monitored ports 837, 850 with ingress traffic enabled 839 source ports 830 transmitted traffic 829 VLAN-based 831 SPAN traffic 829 Spanning Tree 496 states 496 spanning-tree 492 port priority 492 Spectrum Expert 72 configuring using CLI 72 split horizon, RIP 1142 SSH 1340, 1341 encryption methods 1341 user authentication methods, supported 1341 SSH server 1344 SSID and client policy statistics 1917 monitoring using GUI 1917 SSID policy 959 SSL 1349, 1352, 1355, 1358, 1359 configuration guidelines 1352 configuring a secure HTTP client 1358 configuring a secure HTTP server 1355 described 1349 monitoring 1359 SSM 283, 286, 293 differs from Internet standard multicast 283 IGMPv3 283 monitoring 293 PIM 283 SSM mapping 285, 288, 289, 291, 294 DNS-based 285, 289 monitoring 294 static traffic forwarding 291 SSM Mapping 284 SSM operations 284 stack changes 359 effects on 359 IPv6 routing 359 stack changes, effects of 588 stack changes, effects on 173, 301, 502, 588, 590, 834, 1114, 1368, 1776, 1965 ACL configuration 1368 cross-stack EtherChannel 590 EtherChannel 588 IGMP snooping 173 IP routing 1114 MAC address tables 1776 multicast routing 301 SDM template selection 1965 SPAN and RSPAN 834 STP 502 stack changes,effects on 529 MSTP 529 stack master 359 IPv6 359 stack master functions 359 stack member 359, 1714, 1722, 1723, 1724, 1725 configuring 1722, 1723 member number 1722 priority value 1723 IPv6 359 provisioning a new member 1724 removing a provisioned member 1725 replacing 1714 stacks 2065, 2067, 2068 copying a bundle file from one member to another 2065 IN-22 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) INDEX stacks (continued) upgrading 2065 upgrading, incompatible running mode 2068 upgrading, incompatible software 2067 stacks switch 1714 replacing a failed member 1714 stacks, 493, 501 MSTP instances supported 501 STP 493 bridge ID 493 root port selection 493 switch 493, 501 stacks, switch 301, 359, 1715, 1717, 1721, 1723, 1724, 1774, 1776, 2087 assigning information 1723, 1724 priority value 1723 provisioning a new member 1724 auto-advise 1717 auto-extract 1717 auto-upgrade 1717 IPv6 on 359 MAC address considerations 1776 MAC address of 1721 multicast routing, active switch and member roles 301 offline configuration 1715, 1724 provisioned configuration, defined 1715 provisioned switch, defined 1715 provisioning a new member 1724 partitioned 2087 system prompt consideration 1774 version-mismatch (VM) mode 1717 automatic upgrades with auto-upgrade 1717 upgrades with auto-extract 1717 stacks, switch version-mismatch (VM) mode 1717 manual upgrades with auto-advise 1717 stacks,switch 1711, 1717, 1722, 1725 assigning information 1722 member number 1722 auto-copy 1717 merged 1711 offline configuration 1725 removing a provisioned member 1725 partitioned 1711 standards supported 152 startup configuration 1997, 2001, 2006, 2008, 2011, 2013, 2017, 2023, 2024 clearing 2024 copying configuration files to 1997 copying from an rcp server 2011, 2013 (example) 2011, 2013 copying to an rcp server (example) 2006, 2008 loading from the network 2001, 2017 re-executing configuration commands in 2023 Stateless Autoconfiguration 356 static addresses 1775 See addresses 1775 static bindings 1447, 1449 adding 1447, 1449 static hosts 1449 Static IP address 675 described 675 static joins 346 static mode 153 static routes 356, 1238 configuring 1238 understanding 356 static routing 1113 static SSM mapping 285 statistics 148, 159, 314, 1158, 1581 802.1X 1581 interface 148, 159 IP multicast routing 314 OSPF 1158 status, displaying 2089 STP 491, 492, 493, 494, 495, 496, 497, 498, 499, 500, 501, 502, 503, 504, 505, 506, 507, 508, 510, 511, 512, 513, 514, 515, 520, 555, 556, 557, 560, 562, 568, 569, 570, 571 accelerating root port selection 556 BackboneFast 560, 570 described 560 enabling 570 BPDU message exchange 492 configuring 504, 506, 507, 508, 510, 511, 512, 513, 514 device priority 511 forward-delay time 513 hello time 512 maximum aging time 513 path cost 510 port priority 508 root device 506 secondary root device 507 spanning-tree mode 504 transmit hold-count 514 cross-stack UplinkFast 557 described 557 default configuration 503 designated ,defined 494 switch 494 designated port,defined 494 detecting indirect link failures 560 disabling 505 displaying status 515 EtherChannel guard 562, 571 described 562 enabling 571 extended system ID 491, 494, 506, 507 effects on root device 506 effects on the secondary root device 507 overview 494 unexpected behavior 491 IEEE 802.1D and bridge ID 494 IEEE 802.1D and multicast addresses 500 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-23 INDEX STP (continued) IEEE 802.1t and VLAN identifier 494 instances supported 501 interface states 496, 497, 498 blocking 497 disabled 498 forwarding 497, 498 learning 498 listening 498 interoperability and compatibility among modes keepalive messages 492 limitations with IEEE 802.1Q trunks 502 modes supported 500 overview 492 protocols supported 500 redundant connectivity 499 root 491, 493 election 493 switch 491, 493 unexpected behavior 491 root device 494, 495, 506 configuring 495 effects of extended system ID 494, 506 root port selection on a stack 493 root port, defined 493 stack changes, effects of 502 status, displaying 515 UplinkFast 555, 568, 569 described 555 disabling 569 enabling 568 VLAN-bridge 502 STP path cost 2184 STP port priorities 2180 stratum, NTP 1772 stub routing, EIGRP 1162 subnet mask 1121 subnet zero 1123 subnets 323 Subnetwork Access Protocol (SNAP) 769 suggested network environments 1297 summer time 1778 supported features 119, 354 supported watts per port 87, 151 SVIs 1119, 1366 and IP unicast routing 1119 and router ACLs 1366 Switch Access 1275 displaying 1275 switch as trusted third party 1328 switch limitations 359 switch stack 2091 switch stack consideration 1719 switch stack licenses 1833 switch stacks 343, 2124 switched packets, ACLs on 1409 501, 520 Switched Port Analyzer 823 See SPAN 823 switchport backup interface 625 system 141 system capabilities TLV 123 system clock 1771, 1777, 1778 configuring 1777, 1778 daylight saving time 1778 manually 1777 summer time 1778 time zones 1777 overview 1771 system description TLV 123 system MTU 141, 1202 and IS-IS LSPs 1202 System MTU 141 system name 1774, 1779 default configuration 1774 manual configuration 1779 system name TLV 123 system priority 603 system prompt, default setting 1774 system resources, optimizing 1963 system routing 1201 IS-IS 1201 T table map marking 1009 CoS 1009 table maps 967 TACACS+ 1281, 1283, 1285, 1286, 1289, 1290, 1291 accounting, defined 1281 authentication, defined 1281 authorization, defined 1281 configuring 1285, 1286, 1289, 1290 accounting 1290 authentication key 1285 authorization 1289 login authentication 1286 default configuration 1285 defined 1281 displaying 1291 identifying the server 1285 key 1285 limiting the services to the user 1289 login 1286 operation of 1283 overview 1281 tracking services accessed by user 1290 tar files 2057 creating 2057 displaying the contents of 2057 extracting 2057 TCAM entries 1447 IN-24 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) INDEX tcp mss 702 Telnet 1270 setting a password 1270 templates 1963, 1965 configuring 1965 number of 1963 temporary self-signed certificate 1350 Terminal Access Controller Access Control System Plus 1281 See TACACS+<$nopage> 1281 terminal lines, setting a password 1270 terminology 902 terms 1328 TFTP server 1997, 2004, 2009, 2029 configuration files 1997, 2004, 2009, 2029 copying from 2009 copying to 1997, 2004 downloading 2029 TGT 1328 threshold monitoring, IP SLA 807 tickets 1328 time 1771 See NTP and system clock 1771 time ranges in ACLs 1375, 1384 time zones 1777 time-exceeded messages 2076 time-range command 1375 TLVs 123 defined 123 Token Rings 2131 Topology Change Notification Processing 343 traceroute and 2076 traceroute command 2076 See also IP traceroute 2076 traceroute, Layer 2 2075 and ARP 2075 and CDP 2075 broadcast traffic 2075 described 2075 IP addresses and subnets 2075 MAC addresses and VLANs 2075 multicast traffic 2075 multiple devices on a port 2075 unicast traffic 2075 usage guidelines 2075 tracking services accessed by user 1290, 1315 traffic 1367 fragmented 1367 traffic conditioning 924 traffic shaping 926 traffic stream metrics (TSM) 1927 described 1927 traps 1784, 1785, 1787 configuring MAC address notification 1784, 1785, 1787 enabling 1784, 1785, 1787 troubleshooting 273, 1021, 2075, 2076, 2078, 2089, 2091 auto-QoS 1021 troubleshooting (continued) displaying crash information 2078 PIMv1 and PIMv2 interoperability problems 273 setting packet forwarding 2091 SFP security and identification 2089 show forward command 2091 with debug commands 2078 with ping 2075 with traceroute 2076 Troubleshooting Examples command 2096 troubleshooting join process 641 trunk 2174, 2176 configuration 2174 trunk interfaces 1447 trunk port 2174 trunking 2170 trunking modes 2170 trunks 2171 allowed VLANs 2171 trust 932 trust behavior 931 wired ports 931 wireless ports 931 trustpoints, CA 1350 twisted-pair, detecting unidirectional links 630 types of 1963 U U-APSD 1926 described 1926 UDLD 629, 630, 631, 632, 634 aggressive 630 aggressive mode 632 message time 632 default configuration 632 disabling 634 per interface 634 echoing detection mechanism 631 enabling 632, 634 globally 632 per interface 634 fiber-optic links 630 neighbor database 631 neighbor database maintenance 631 normal 630 normal mode 630 overview 630 restrictions 629 twisted-pair links 630 UDP jitter operation, IP SLAs 807, 814 UDP jitter, configuring 814 understanding 356 understanding static routes 356 unicast MAC address filtering 1789 configuration 1789 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-25 INDEX unicast traffic 2075 unsupported features 119 upgrades with auto-extract 1717 upgrading software 2062, 2063, 2067, 2068 bundle mode 2063 incompatible running mode 2068 incompatible software 2067 install mode 2062 UplinkFast 555, 568, 569 described 555 disabling 569 enabling 568 usage guidelines 2075 user authentication methods, supported 1341 User Datagram Protocol 1118, 1132 See UDP 1118, 1132 username-based authentication 1271 using commands 2078 V Validate Rogue Clients Against AAA parameter 1675 VCI strings 674 vendor-proprietary 1319 vendor-specific 1318 version-mismatch (VM) mode 1717 automatic upgrades with auto-upgrade 1717 manual upgrades with auto-advise 1717 upgrades with auto-extract 1717 Virtual Private Network 1214 See VPN 1214 VLAN 2142 definition 2142 VLAN ACLs 1364 See VLAN maps 1364 VLAN filtering and SPAN 831 VLAN ID, discovering 1776 VLAN load balancing on Flex Links 613, 616 configuration guidelines 616 described 613 VLAN map entries, order of 1373 VLAN maps 1364, 1373, 1390, 1391, 1392, 1393, 1394, 1397, 1407, 1408 applying 1394 common uses for 1407 configuration guidelines 1373 configuring 1390 creating 1392 defined 1364 denying access to a server example 1408 denying and permitting packets 1391, 1393 displaying 1397 VLAN monitoring commands 2158 VLAN Port Membership Modes 2144 VLANs 500, 502, 841, 845 aging dynamic addresses 500 VLANs (continued) limiting source traffic with RSPAN 845 limiting source traffic with SPAN 841 STP and IEEE 802.1Q trunks 502 VLAN-bridge STP 502 Voice RSSI parameter 1076 voice VLAN 2191, 2193, 2195 configuration guidelines 2191 configuring IP phones for data traffic 2195 override CoS of incoming frame 2195 configuring ports for voice traffic in 2193 802.1p priority tagged frames 2193 voice VLANs 2190 voice-over-IP (VoIP) telephone roaming 1881 VPN 1214, 1216, 1227 configuring routing in 1227 forwarding 1216 in service provider networks 1214 VRF 1447 VRF-aware services 1220, 1221, 1222, 1223, 1224 ARP 1220 configuring 1220 ping 1221 RADIUS 1223 SNMP 1221 syslog 1223 tftp 1224 traceroute 1224 uRPF 1222 VRFs, configuring multicast 1225 VTP 2118, 2125, 2126 configuration requirements 2125 version 2126 VTP advertisements 2121 VTP domain 2119, 2135 VTP mode 2128 VTP modes 2120 VTP password 2129 VTP primary 2131 VTP pruning 2123, 2133 VTP settings 2125 VTP version 2131 VTP version 2 2122 VTP version 3 2122 VTP versions 2143 W web-based authentication 1559, 1564 customizeable web pages 1564 description 1559 web-based authentication, interactions with other features 1566 wired access 905 wired location service 125, 126, 134 configuring 134 location TLV 125 IN-26 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) wired location service (continued) understanding 126 wireless access 905 wireless intrusion prevention system (wIPS) 1693 described 1693 with debug commands 2078 with ping 2075 with RADIUS 1310, 1314, 1315 with STP 590 with TACACS+ 1281, 1286, 1289, 1290 with traceroute 2076 with usernames 1271 WMM parameter 1939 world mode 1859 WTD 928 default 928 Z zzz] 1328 INDEX Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-27 INDEX IN-28 Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)DITA Open Toolkit XEP 4.9 build 20070312; modified using iText 2.1.7 by 1T3XT