Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Unknown

PDF - Complete Book (28.29 MB)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) - Configuring Internal Power Supplies [Cisco Catalyst 3650 Series Switches] - Cisco

[PDF] Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE ...

Oct 30, 2013 · ... 529. Interoperability with IEEE 802.1D STP 529. RSTP Overview 529. Port ... AC power cord into the switch and a grounded 100 to 240 VAC ...

PDF preview unavailable. Download the PDF instead.

b consolidated 3650 3se cg
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
First Published: 2013-10-30
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 527-0883

© 2013 Cisco Systems, Inc. All rights reserved.

CONTENTS

PREFACE CHAPTER 1
CHAPTER 2

Preface xcv Document Conventions xcv Related Documentation xcvii Obtaining Documentation and Submitting a Service Request xcvii
Using the Command-Line Interface 1 Information About Using the Command-Line Interface 1 Command Modes 1 Using the Help System 3 Understanding Abbreviated Commands 4 No and Default Forms of Commands 4 CLI Error Messages 4 Configuration Logging 5 How to Use the CLI to Configure Features 5 Configuring the Command History 5 Changing the Command History Buffer Size 5 Recalling Commands 5 Disabling the Command History Feature 6 Enabling and Disabling Editing Features 6 Editing Commands Through Keystrokes 7 Editing Command Lines That Wrap 8 Searching and Filtering Output of show and more Commands 9 Accessing the CLI on a Switch Stack 9 Accessing the CLI Through a Console Connection or Through Telnet 10
Using the Web Graphical User Interface 11

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) iii

Contents

PART I CHAPTER 3

Prerequisites for Using the Web GUI 11 Information About Using The Web GUI 11
Web GUI Features 11 Connecting the Console Port of the Switch 12 Logging On to the Web GUI 13 Enabling Web and Secure Web Modes 13 Configuring the Switch Web GUI 13
Cisco Flexible NetFlow 17
Configuring Flexible NetFlow 19 Finding Feature Information 19 Prerequisites for Flexible NetFlow 19 Prerequisites for Wireless Flexible NetFlow 19 Restrictions for Flexible NetFlow 20 Information About NetFlow 21 Flexible NetFlow Overview 21 Wireless Flexible NetFlow Overview 22 Flow Records 23 Flexible NetFlow Match Parameters 23 Flexible NetFlow Collect Parameters 24 Exporters 25 Export Formats 26 Monitors 26 Samplers 27 Supported Flexible NetFlow Fields 27 Default Settings 31 How to Configure Flexible NetFlow 31 Creating a Flow Record 32 Creating a Flow Exporter 33 Creating a Flow Monitor 36 Creating a Sampler 37 Applying a Flow to an Interface 39 Configuring a Bridged NetFlow on a VLAN 40

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) iv

Contents

PART II CHAPTER 4

Configuring Layer 2 NetFlow 41 Configuring WLAN to Apply Flow Monitor in Data Link Input/Output Direction 42 Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction 43 Monitoring Flexible NetFlow 44 Configuration Examples for Flexible NetFlow 45 Example: Configuring a Flow 45 Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction) 46 Example: Configuring IPv6 and Transport Flag Flexible NetFlow in WLAN (Egress Direction) 46 Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions) 47 Additional References 48 Feature Information for Flexible NetFlow 49
CleanAir 51
Configuring Cisco CleanAir 53 Finding Feature Information 53 Prerequisites for CleanAir 53 Restrictions for CleanAir 54 Information About CleanAir 55 Cisco CleanAir Components 55 Terms Used in Cisco CleanAir 57 Interference Types that Cisco CleanAir can Detect 57 Interference Device Merging 58 Persistent Devices 59 Persistent Devices Detection 59 Persistent Device Avoidance 59 EDRRM and AQR Update Mode 59 CleanAir High Availability 59 How to Configure CleanAir 60 Enabling CleanAir for 2.4-GHz Band 60 Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices 60 Configuring Interference Reporting for 2.4-GHz Devices 62 Enabling CleanAir for 5-GHz Band 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices 64

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) v

Contents

PART III CHAPTER 5

Configuring Interference Reporting for 5-GHz devices 65 Configuring EDRRM for CleanAir-Events 67 Configuring Persistent Device Avoidance 67 Configuring Cisco CleanAir using the Controller GUI 68 Configuring Cisco CleanAir on the Cisco Wireless LAN Controller (GUI) 68 Configuring Cisco CleanAir on an Access Point (GUI) 70 Configuring Cisco Spectrum Expert 70 Configuring Spectrum Expert (GUI) 70 Configuring Spectrum Expert (CLI) 72 Monitoring CleanAir Parameters 73 Monitoring the Interference Devices 76
Monitoring the Interference Devices (GUI) 76 Monitoring the Worst Air Quality of Radio Bands (GUI) 77 Configuration Examples for Configuring CleanAir 77 CleanAir FAQs 78 Additional References 80
Interface and Hardware Component 81
Configuring Interface Characteristics 83 Finding Feature Information 83 Information About Configuring Interface Characteristics 83 Interface Types 83 Port-Based VLANs 83 Switch Ports 84 Routed Ports 85 Switch Virtual Interfaces 86 EtherChannel Port Groups 87 Power over Ethernet Ports 87 Using the Switch USB Ports 87 USB Mini-Type B Console Port 87 Interface Connections 88 Default Ethernet Interface Configuration 89 Interface Speed and Duplex Mode 90

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) vi

Contents

CHAPTER 6

Speed and Duplex Configuration Guidelines 90 IEEE 802.3x Flow Control 91 Layer 3 Interfaces 92 How to Configure Interface Characteristics 93 Configuring Interfaces Procedure 93 Adding a Description for an Interface 93 Configuring a Range of Interfaces 94 Configuring and Using Interface Range Macros 95 Configuring Ethernet Interfaces 97
Setting the Interface Speed and Duplex Parameters 97 Configuring IEEE 802.3x Flow Control 98 Configuring Layer 3 Interfaces 99 Configuring Logical Layer 3 GRE Tunnel Interfaces 100 Configuring SVI Autostate Exclude 102 Shutting Down and Restarting the Interface 102 Configuring the Console Media Type 103 Configuring the USB Inactivity Timeout 104 Monitoring Interface Characteristics 105 Monitoring Interface Status 105 Clearing and Resetting Interfaces and Counters 106 Configuration Examples for Interface Characteristics 107 Adding a Description to an Interface: Example 107 Configuring a Range of Interfaces: Examples 107 Configuring and Using Interface Range Macros: Examples 107 Setting Interface Speed and Duplex Mode: Example 108 Configuring Layer 3 Interfaces: Example 108 Configuring the Console Media Type: Example 108 Configuring the USB Inactivity Timeout: Example 109 Additional References for the Interface Characteristics Feature 110 Feature History and Information for Configuring Interface Characteristics 110
Configuring Auto-MDIX 111 Prerequisites for Auto-MDIX 111 Restrictions for Auto-MDIX 111

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) vii

Contents

CHAPTER 7 CHAPTER 8

Information about Configuring Auto-MDIX 112 Auto-MDIX on an Interface 112
How to Configure Auto-MDIX 112 Configuring Auto-MDIX on an Interface 112
Monitoring Auto-MDIX 114 Example for Configuring Auto-MDIX 114 Additional References 114 Feature History and Information for Auto-MDIX 115
Configuring Ethernet Management Port 117 Finding Feature Information 117 Prerequisites for Ethernet Management Ports 117 Information about the Ethernet Management Port 117 Ethernet Management Port Direct Connection to a Switch 118 Ethernet Management Port Connection to Stack Switches using a Hub 118 Ethernet Management Port and Routing 118 Supported Features on the Ethernet Management Port 119 How to Configure the Ethernet Management Port 120 Disabling and Enabling the Ethernet Management Port 120 Additional References 121 Feature Information for Ethernet Management Ports 122
Configuring LLDP, LLDP-MED, and Wired Location Service 123 Finding Feature Information 123 LLDP, LLDP-MED, and Wired Location Service Overview 123 LLDP 123 LLDP Supported TLVs 124 LLDP and Cisco Switch Stacks 124 LLDP and Cisco Medianet 124 LLDP-MED 124 LLDP-MED Supported TLVs 124 Wired Location Service 126 Default LLDP Configuration 127 Configuration Guidelines 127

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) viii

Contents

CHAPTER 9 CHAPTER 10

How to Configure LLDP, LLDP-MED, and Wired Location Service 127 Enabling LLDP 127 Configuring LLDP Characteristics 129 Configuring LLDP-MED TLVs 131 Configuring Network-Policy TLV 132 Configuring Location TLV and Wired Location Service 134 Enabling Wired Location Service on the Switch 137
Configuration Examples for LLDP, LLDP-MED, and Wired Location Service 138 Configuring Network-Policy TLV: Examples 138
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service 138 Additional References for LLDP, LLDP-MED, and Wired Location Service 140 Feature Information for LLDP, LLDP-MED, and Wired Location Service 140
Configuring System MTU 141 Configuring System MTU 141 Finding Feature Information 141 Information about the MTU 141 Restrictions for System MTU 141 System MTU Value Application 141 Configuring the System MTU 142 Configuring the System MTU 142 Configuring Protocol-Specific MTU 142 Configuration Examples for System MTU 143 Example: Configuring the System MTU 143 Example: Configuring Protocol-Specific MTU 144 Additional References for System MTU 144 Feature Information for System MTU 145
Configuring Internal Power Supplies 147 Information About Internal Power Supplies 147 How to Configure Internal Power Supplies 147 Configuring an Internal Power Supply 147 Monitoring Internal Power Supplies 148 Configuration Examples for Internal Power Supplies 148

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) ix

Contents

CHAPTER 11
CHAPTER 12
PART IV CHAPTER 13

Additional References 149 Feature History and Information for Internal Power Supplies 150
Configuring PoE 151 Finding Feature Information 151 Information about PoE 151 Power over Ethernet Ports 151 Supported Protocols and Standards 152 Powered-Device Detection and Initial Power Allocation 152 Power Management Modes 153 How to Configure PoE 156 Configuring a Power Management Mode on a PoE Port 156 Configuring Power Policing 157 Monitoring Power Status 159 Additional References 160 Feature Information for PoE 160
Configuring EEE 161 Finding Feature Information 161 Information About EEE 161 EEE Overview 161 Default EEE Configuration 161 Restrictions for EEE 162 How to Configure EEE 162 Enabling or Disabling EEE 162 Monitoring EEE 163 Configuration Examples for Configuring EEE 163 Additional References 164 Feature History and Information for Configuring EEE 164
IP Multicast Routing 165
Configuring IGMP 167 Finding Feature Information 167

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) x

Contents
Restrictions for Configuring IGMP 167 Information About IGMP 168
IP Multicast Group Addresses 168 IGMP Versions 168
IGMP Version 1 169 IGMP Version 2 169 IGMP Version 3 169 IGMPv3 Host Signalling 169 IGMP Snooping 169 Joining a Multicast Group 170 Leaving a Multicast Group 172 Immediate Leave 172 IGMP Configurable-Leave Timer 173 IGMP Report Suppression 173 IGMP Snooping and Switch Stacks 173 IGMP Filtering and Throttling Overview 174 Default IGMP Configuration 174 Default IGMP Snooping Configuration 175 Default IGMP Filtering and Throttling Configuration 175 How to Configure IGMP 176 Configuring the Switch as a Member of a Group (CLI) 176 Controlling Access to IP Multicast Group (CLI) 178 Modifying the IGMP Host-Query Message Interval (CLI) 179 Changing the IGMP Query Timeout for IGMPv2 (CLI) 181 Changing the Maximum Query Response Time for IGMPv2 (CLI) 183 Configuring the Switch as a Statically Connected Member (CLI) 185 Configuring IGMP Profiles (CLI) 187 Applying IGMP Profiles (CLI) 188 Setting the Maximum Number of IGMP Groups (CLI) 190 Configuring the IGMP Throttling Action (CLI) 191 How to Configure IGMP Snooping 193 Enabling or Disabling IGMP Snooping on a Switch (CLI) 193 Enabling or Disabling IGMP Snooping on a VLAN Interface (CLI) 194 Setting the Snooping Method (CLI) 195
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xi

Contents

CHAPTER 14

Configuring a Multicast Router Port (CLI) 197 Configuring a Host Statically to Join a Group (CLI) 198 Enabling IGMP Immediate Leave (CLI) 199 Configuring the IGMP Leave Timer (CLI) 200 Configuring the IGMP Robustness-Variable (CLI) 202 Configuring the IGMP Last Member Query Count (CLI) 203 Configuring TCN-Related Commands 205 Configuring the IGMP Snooping Querier (CLI) 209 Disabling IGMP Report Suppression (CLI) 211 Monitoring IGMP 212 Displaying IGMP Snooping Information 213 Displaying IGMP Filtering and Throttling Configuration 214 Configuration Examples for IGMP 215 Example: Configuring the Switch as a Member of a Multicast Group 215 Example: Controlling Access to Multicast Groups 215 Examples: Configuring IGMP Snooping 216 Examples: Configuring Filtering and Throttling 217 Example: Interface Configuration as a Routed Port 217 Example: Interface Configuration as an SVI 218 Where to Go Next for IGMP 218 Additional References 218 Feature History and Information for IGMP 220
Configuring Wireless Multicast 221 Finding Feature Information 221 Prerequisites for Configuring Wireless Multicast 221 Restrictions for Configuring Wireless Multicast 221 Information About Wireless Multicast 222 Information About Multicast Optimization 222 How to Configure Wireless Multicast 223 Configuring Wireless Multicast-MCMC Mode (CLI) 223 Configuring Wireless Multicast-MCUC Mode (CLI) 224 Configuring IPv6 Snooping (CLI) 225 Configuring IPv6 Snooping Policy (CLI) 225

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xii

CHAPTER 15

Configuring Layer 2 Port as Multicast Router Port (CLI) 226 Configuring RA Guard (CLI) 227 Configuring Non-IP Wireless Multicast (CLI) 228 Configuring Wireless Broadcast (CLI) 229 Configuring IP Multicast VLAN for WLAN (CLI) 230 Monitoring Wireless Multicast 231 Where to Go Next for Wireless Multicast 231 Additional References 232
Configuring PIM 235 Finding Feature Information 235 Prerequisites for Configuring PIM 235 Restrictions for Configuring PIM 236 Restrictions for Configuring Auto-RP 236 Restrictions for Configuring Auto-RP and BSR 236 Information About PIM 237 PIM Versions 238 PIMv1 and PIMv2 Interoperability 238 PIM Modes 239 PIM DM 239 PIM-SM 239 PIM Stub Routing 240 IGMP Helper 241 Auto-RP 241 Auto-RP Benefits 242 PIM v2 BSR 242 Multicast Forwarding and Reverse Path Check 243 PIM Shared Tree and Source Tree 244 Default PIM Routing Configuration 246 How to Configure PIM 246 Enabling PIM Stub Routing (CLI) 246 Configuring a Rendezvous Point 248 Manually Assigning an RP to Multicast Groups (CLI) 249 Setting Up Auto-RP in a New Internetwork (CLI) 251

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xiii

Contents

CHAPTER 16

Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI) 254 Preventing Join Messages to False RPs (CLI) 257 Filtering Incoming RP Announcement Messages (CLI) 257 Configuring PIMv2 BSR 259 Defining the PIM Domain Border (CLI) 259 Defining the IP Multicast Boundary (CLI) 262 Configuring Candidate BSRs (CLI) 264 Configuring the Candidate RPs (CLI) 265 Configuring Auto-RP and BSR for the Network (CLI) 267 Delaying the Use of PIM Shortest-Path Tree (CLI) 268 Modifying the PIM Router-Query Message Interval (CLI) 270 Monitoring PIM 272 Monitoring RP Mapping 273 Troubleshooting PIMv1 and PIMv2 Interoperability Problems 273 Configuration Examples for PIM 273 Example: Enabling PIM Stub Routing 273 Example: Verifying PIM Stub Routing 274 Example: Manually Assigning an RP to Multicast Groups 274 Example: Configuring Auto-RP 274 Example: Defining the IP Multicast Boundary to Deny Auto-RP Information 275 Example: Filtering Incoming RP Announcement Messages 275 Example: Preventing Join Messages to False RPs 275 Example: Configuring Candidate BSRs 276 Example: Configuring Candidate RPs 276 Where to Go Next for PIM 276 Additional References 277 Feature History and Information for PIM 279
Configuring SSM 281 Finding Feature Information 281 Prerequisites for Configuring SSM 281 Restrictions for Configuring SSM 282 Information About SSM 283 SSM Components Overview 283

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xiv

CHAPTER 17

SSM and Internet Standard Multicast (ISM) 283 SSM IP Address Range 284 SSM Operations 284 SSM Mapping 284
Static SSM Mapping 285 DNS-Based SSM Mapping 285 How to Configure SSM 286 Configuring SSM (CLI) 286 Configuring Source Specific Multicast Mapping 288 Configuring Static SSM Mapping (CLI) 288 Configuring DNS-Based SSM Mapping (CLI) 289 Configuring Static Traffic Forwarding with SSM Mapping (CLI) 291 Monitoring SSM 293 Monitoring SSM Mapping 294 Where to Go Next for SSM 294 Additional References 294 Feature History and Information for SSM 296
Configuring IP Multicast Routing 297 Finding Feature Information 297 Prerequisites for Configuring IP Multicast Routing 297 Restrictions for Configuring IP Multicast Routing 298 Information About IP Multicast Routing 298 Cisco's Implementation of IP Multicast Routing 298 Multicast Forwarding Information Base Overview 299 Multicast Group Concept 300 Multicast Boundaries 300 Multicast Routing and Switch Stacks 301 Default Multicast Routing Configuration 301 How to Configure Basic IP Multicast Routing 301 Configuring Basic IP Multicast Routing (CLI) 301 Configuring IP Multicast Forwarding (CLI) 304 Configuring a Static Multicast Route (mroute) (CLI) 305 Configuring sdr Listener Support 307

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xv

Contents

CHAPTER 18

Enabling sdr Listener Support (CLI) 307 Limiting How Long an sdr Cache Entry Exists (CLI) 309 Configuring an IP Multicast Boundary (CLI) 310 Monitoring and Maintaining IP Multicast Routing 313 Clearing Caches, Tables, and Databases 313 Displaying System and Network Statistics 314 Monitoring IP Multicast Routing 316 Configuration Examples for IP Multicast Routing 316 Example: Configuring an IP Multicast Boundary 316 Example: Responding to mrinfo Requests 317 Where to Go Next for IP Multicast 317 Additional References 318 Feature History and Information for IP Multicast 319
Configuring the Service Discovery Gateway 321 Finding Feature Information 321 Restrictions for Configuring the Service Discovery Gateway 321 Information about the Service Discovery Gateway and mDNS 322 mDNS 322 mDNS-SD 322 Service Discovery Gateway 323 mDNS Gateway and Subnets 323 Filtering 324 How to Configure the Service Discovery Gateway 325 Configuring the Service List (CLI) 325 Configuring Service List (GUI) 327 Enabling mDNS Gateway and Redistributing Services (CLI) 329 Enabling Multicast DNS Gateway (GUI) 331 Monitoring Service Discovery Gateway 332 Configuration Examples 332 Example: Specify Alternative Source Interface for Outgoing mDNS Packets 332 Example: Redistribute Service Announcements 333 Example: Disable Bridging of mDNS Packets to Wireless Clients 333 Example: Creating a Service-List, Applying a Filter and Configuring Parameters 333

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xvi

PART V CHAPTER 19

Example: Enabling mDNS Gateway and Redistributing Services 333 Example: Global mDNS Configuration 334 Example: Interface mDNS Configuration 334 Where to Go Next for Configuring Services Discovery Gateway 335 Additional References 335 Feature History and Information for Services Discovery Gateway 336
IPv6 337
Configuring MLD Snooping 339 Finding Feature Information 339 Information About Configuring IPv6 MLD Snooping 339 Understanding MLD Snooping 340 MLD Messages 340 MLD Queries 341 Multicast Client Aging Robustness 341 Multicast Router Discovery 341 MLD Reports 342 MLD Done Messages and Immediate-Leave 342 Topology Change Notification Processing 343 MLD Snooping in Switch Stacks 343 How to Configure IPv6 MLD Snooping 343 Default MLD Snooping Configuration 343 MLD Snooping Configuration Guidelines 344 Enabling or Disabling MLD Snooping on the Switch (CLI) 344 Enabling or Disabling MLD Snooping on a VLAN (CLI) 345 Configuring a Static Multicast Group (CLI) 346 Configuring a Multicast Router Port (CLI) 347 Enabling MLD Immediate Leave (CLI) 348 Configuring MLD Snooping Queries (CLI) 348 Disabling MLD Listener Message Suppression (CLI) 350 Displaying MLD Snooping Information 351 Configuration Examples for Configuring MLD Snooping 351 Configuring a Static Multicast Group: Example 351

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xvii

Contents

CHAPTER 20

Configuring a Multicast Router Port: Example 352 Enabling MLD Immediate Leave: Example 352 Configuring MLD Snooping Queries: Example 352
Configuring IPv6 Unicast Routing 353 Finding Feature Information 353 Information About Configuring IPv6 Unicast Routing 353 Understanding IPv6 353 IPv6 Addresses 354 Supported IPv6 Unicast Routing Features 354 Unsupported IPv6 Unicast Routing Features 358 IPv6 Feature Limitations 359 IPv6 and Switch Stacks 359 Default IPv6 Configuration 360 Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI) 360 Configuring IPv4 and IPv6 Protocol Stacks (CLI) 363 Configuring Default Router Preference (CLI) 365 Configuring IPv6 ICMP Rate Limiting (CLI) 366 Configuring CEF and dCEF for IPv6 367 Configuring Static Routing for IPv6 (CLI) 368 Configuring RIP for IPv6 (CLI) 370 Configuring OSPF for IPv6 (CLI) 371 Configuring EIGRP for IPv6 374 Displaying IPv6 374 Configuring DHCP for IPv6 Address Assignment 375 Default DHCPv6 Address Assignment Configuration 375 DHCPv6 Address Assignment Configuration Guidelines 375 Enabling DHCPv6 Server Function (CLI) 376 Enabling DHCPv6 Client Function (CLI) 378 Configuration Examples for IPv6 Unicast Routing 379 Configuring IPv6 Addressing and Enabling IPv6 Routing: Example 379 Configuring Default Router Preference: Example 379 Configuring IPv4 and IPv6 Protocol Stacks: Example 380 Enabling DHCPv6 Server Function: Example 380

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xviii

Contents

CHAPTER 21

Enabling DHCPv6 Client Function: Example 381 Configuring IPv6 ICMP Rate Limiting: Example 381 Configuring Static Routing for IPv6: Example 381 Configuring RIP for IPv6: Example 381 Displaying IPv6: Example 381
Configuring IPv6 Client IP Address Learning 383 Prerequisites for IPv6 Client Address Learning 383 Information About IPv6 Client Address Learning 383 SLAAC Address Assignment 384 Stateful DHCPv6 Address Assignment 385 Static IP Address Assignment 386 Router Solicitation 386 Router Advertisement 386 Neighbor Discovery 387 Neighbor Discovery Suppression 387 RA Guard 387 RA Throttling 388 Configuring IPv6 Unicast (CLI) 388 Configuring RA Guard Policy (CLI) 389 Applying RA Guard Policy (CLI) 390 Configuring RA Throttle Policy (CLI) 391 Applying RA Throttle Policy on VLAN (CLI) 392 Configuring IPv6 Snooping (CLI) 393 Configuring IPv6 ND Suppress Policy (CLI) 394 Configuring IPv6 Snooping on VLAN/PortChannel 395 Configuring IPv6 on Switch (CLI) 396 Configuring DHCP Pool (CLI) 396 Configuring Stateless Auto Address Configuration Without DHCP (CLI) 397 Configuring Stateless Auto Address Configuration With DHCP (CLI) 399 Configuring Stateful DHCP Locally (CLI) 400 Configuring Stateful DHCP Externally (CLI) 402 Monitoring IPv6 Clients (GUI) 404 Verifying IPv6 Address Learning Configuration 404

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xix

Contents

CHAPTER 22 CHAPTER 23

Additional References 405 Feature Information for IPv6 Client Address Learning 406
Configuring IPv6 WLAN Security 407 Prerequisites for IPv6 WLAN Security 407 Restrictions for IPv6 WLAN Security 407 Information About IPv6 WLAN Security 407 How to Configure IPv6 WLAN Security 410 Configuring Local Authentication 410 Creating a Local User 410 Creating an Client VLAN and Interface 410 Configuring a EAP Profile 412 Creating a Local Authentication Model 414 Creating a Client WLAN 416 Configuring Local Authentication with WPA2+AES 417 Configuring External RADIUS Server 421 Configuring RADIUS Authentication Server Host 421 Configuring RADIUS Authentication Server Group 422 Creating a Client VLAN 424 Creating 802.1x WLAN Using an External RADIUS Server 425 Additional References 426 Feature Information for IPv6 WLAN Security 427
Configuring IPv6 ACL 429 Prerequisites for IPv6 ACL 429 Restrictions for IPv6 ACL 429 Information About IPv6 ACL 430 Understanding IPv6 ACLs 430 Types of ACL 431 Per User IPv6 ACL 431 Filter ID IPv6 ACL 431 Downloadable IPv6 ACL 431 IPv6 ACLs and Switch Stacks 432 Configuring IPv6 ACLs 432

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xx

CHAPTER 24

Default IPv6 ACL Configuration 433 Interaction with Other Features and Switches 433 How To Configure an IPv6 ACL 433 Creating IPv6 ACL 433 Applying an IPv6 to an Interface 437 Creating WLAN IPv6 ACL 438 Verifying IPv6 ACL 439 Displaying IPv6 ACLs 439 Configuration Examples for IPv6 ACL 439 Example: Creating IPv6 ACL 439 Example: Applying IPv6 ACLs 440 Example: Displaying IPv6 ACLs 440 Example: Configuring RA Throttling and NS Suppression 440 Example: Configuring RA Guard Policy 442 Example: Configuring IPv6 Neighbor Binding 443 Additional References 444 Feature Information for IPv6 ACLs 444
Configuring IPv6 Web Authentication 447 Prerequisites for IPv6 Web Authentication 447 Restrictions for IPv6 Web Authentication 447 Information About IPv6 Web Authentication 448 Web Authentication Process 448 How to Configure IPv6 Web Authentication 449 Disabling WPA 449 Enabling Security on the WLAN 450 Enabling a Parameter Map on the WLAN 451 Enabling Authentication List on WLAN 451 Configuring a Global WebAuth WLAN Parameter Map 451 Configuring the WLAN 452 Enabling IPv6 in Global Configuration Mode 453 Verifying IPv6 Web Authentication 454 Verifying the Parameter Map 454 Verifying Authentication List 455

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxi

Contents

CHAPTER 25 CHAPTER 26 CHAPTER 27

Additional References 456 Feature Information for IPv6 Web Authentication 456
Configuring IPv6 Client Mobility 459 Prerequisites for IPv6 Client Mobility 459 Restrictions For IPv6 Client Mobility 459 Information About IPv6 Client Mobility 460 Using Router Advertisment 460 RA Throttling and NS suppression 461 IPv6 Address Learning 462 Handling Multiple IP Addresses 462 IPv6 Configuration 462 High Availability 463 Verifying IPv6 Client Mobility 463 Monitoring IPv6 Client Mobility 463 Additional References 464 Feature Information For IPv6 Client Mobility 465
Configuring IPv6 Mobility 467 Pre-requisites for IPv6 Mobility 467 Information About IPv6 Mobility 467 Inter Controller Roaming 467 Intra Subnet Roaming with Sticky Anchoring, and Inter Subnet Roaming 468 How to Configure IPv6 Mobility 468 Monitoring IPv6 Mobility 468 Additional References 470 Feature Information for IPv6 Mobility 471
Configuring IPv6 NetFlow 473 Prerequisites For IPv6 Netflow 473 Restrictions For IPv6 Netflow 473 Information About IPv6 Netflow 474 Understanding Flexible Netflow 474 IPv6 Netflow 475

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxii

PART VI CHAPTER 28

How To Configure IPv6 Netflow 475 Configuring a Customized Flow Record 475 Configuring the Flow Exporters 478 Configuring a Customized Flow Monitor 480 Applying a Flow Monitor to an Interface 482 Configuring and Enabling Flow Sampling 484
Verifying IPv6 Netflow 486 Monitoring IPv6 Netflow 486 Additional References 486 Feature Information for IPv6 NetFlow 487
Layer 2/3 489
Configuring Spanning Tree Protocol 491 Finding Feature Information 491 Restrictions for STP 491 Information About Spanning Tree Protocol 492 Spanning Tree Protocol 492 Spanning-Tree Topology and BPDUs 492 Bridge ID, Device Priority, and Extended System ID 494 Port Priority Versus Path Cost 495 Spanning-Tree Interface States 496 How a Switch or Port Becomes the Root Switch or Root Port 499 Spanning Tree and Redundant Connectivity 499 Spanning-Tree Address Management 500 Accelerated Aging to Retain Connectivity 500 Spanning-Tree Modes and Protocols 500 Supported Spanning-Tree Instances 501 Spanning-Tree Interoperability and Backward Compatibility 501 STP and IEEE 802.1Q Trunks 502 VLAN-Bridge Spanning Tree 502 Spanning Tree and Switch Stacks 502 Default Spanning-Tree Configuration 503 How to Configure Spanning-Tree Features 504

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxiii

Contents

CHAPTER 29

Changing the Spanning-Tree Mode (CLI) 504 Disabling Spanning Tree (CLI) 505 Configuring the Root Switch (CLI) 506 Configuring a Secondary Root Device (CLI) 507 Configuring Port Priority (CLI) 508 Configuring Path Cost (CLI) 510 Configuring the Device Priority of a VLAN (CLI) 511 Configuring the Hello Time (CLI) 512 Configuring the Forwarding-Delay Time for a VLAN (CLI) 513 Configuring the Maximum-Aging Time for a VLAN (CLI) 513 Configuring the Transmit Hold-Count (CLI) 514 Monitoring Spanning-Tree Status 515 Additional References for Spanning-Tree Protocol 516 Feature Information for STP 517
Configuring Multiple Spanning-Tree Protocol 519 Finding Feature Information 519 Prerequisites for MSTP 519 Restrictions for MSTP 520 Information About MSTP 521 MSTP Configuration 521 MSTP Configuration Guidelines 521 Root Switch 522 Multiple Spanning-Tree Regions 523 IST, CIST, and CST 523 Operations Within an MST Region 524 Operations Between MST Regions 524 IEEE 802.1s Terminology 525 Illustration of MST Regions 525 Hop Count 526 Boundary Ports 527 IEEE 802.1s Implementation 527 Port Role Naming Change 527 Interoperation Between Legacy and Standard Switches 528

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxiv

Contents

CHAPTER 30

Detecting Unidirectional Link Failure 528 MSTP and Switch Stacks 529 Interoperability with IEEE 802.1D STP 529 RSTP Overview 529
Port Roles and the Active Topology 530 Rapid Convergence 530 Synchronization of Port Roles 532 Bridge Protocol Data Unit Format and Processing 533 Topology Changes 534 Protocol Migration Process 535 Default MSTP Configuration 535 How to Configure MSTP Features 536 Specifying the MST Region Configuration and Enabling MSTP (CLI) 536 Configuring the Root Switch (CLI) 538 Configuring a Secondary Root Switch (CLI) 539 Configuring Port Priority (CLI) 540 Configuring Path Cost (CLI) 542 Configuring the Switch Priority (CLI) 543 Configuring the Hello Time (CLI) 544 Configuring the Forwarding-Delay Time (CLI) 545 Configuring the Maximum-Aging Time (CLI) 546 Configuring the Maximum-Hop Count (CLI) 547 Specifying the Link Type to Ensure Rapid Transitions (CLI) 548 Designating the Neighbor Type (CLI) 549 Restarting the Protocol Migration Process (CLI) 550 Monitoring MST Configuration and Status 551 Additional References for MSTP 551 Feature Information for MSTP 552
Configuring Optional Spanning-Tree Features 553 Finding Feature Information 553 Restriction for Optional Spanning-Tree Features 553 Information About Optional Spanning-Tree Features 554 PortFast 554

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxv

Contents

CHAPTER 31

BPDU Guard 554 BPDU Filtering 555 UplinkFast 555 Cross-Stack UplinkFast 557
How Cross-Stack UplinkFast Works 558 Events That Cause Fast Convergence 559 BackboneFast 560 EtherChannel Guard 562 Root Guard 562 Loop Guard 563 How to Configure Optional Spanning-Tree Features 564 Enabling PortFast (CLI) 564 Enabling BPDU Guard (CLI) 565 Enabling BPDU Filtering (CLI) 566 Enabling UplinkFast for Use with Redundant Links (CLI) 568 Disabling UplinkFast (CLI) 569 Enabling BackboneFast (CLI) 570 Enabling EtherChannel Guard (CLI) 571 Enabling Root Guard (CLI) 572 Enabling Loop Guard (CLI) 573 Monitoring the Spanning-Tree Status 574 Additional References for Optional Spanning Tree Features 575 Feature Information for Optional Spanning-Tree Features 576
Configuring EtherChannels 577 Finding Feature Information 577 Restrictions for EtherChannels 577 Information About EtherChannels 578 EtherChannel Overview 578 EtherChannel Modes 579 EtherChannel on Switches 579 EtherChannel Link Failover 580 Channel Groups and Port-Channel Interfaces 580 Port Aggregation Protocol 581

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxvi

PAgP Modes 582 PAgP Learn Method and Priority 583 PAgP Interaction with Other Features 584 Link Aggregation Control Protocol 584 LACP Modes 584 LACP and Link Redundancy 585 LACP Interaction with Other Features 585 EtherChannel On Mode 585 Load-Balancing and Forwarding Methods 586 MAC Address Forwarding 586 IP Address Forwarding 587 Load-Balancing Advantages 587 EtherChannel and Switch Stacks 588 Switch Stack and PAgP 589 Switch Stacks and LACP 589 Default EtherChannel Configuration 589 EtherChannel Configuration Guidelines 590 Layer 2 EtherChannel Configuration Guidelines 591 Layer 3 EtherChannel Configuration Guidelines 592 How to Configure EtherChannels 592 Configuring Layer 2 EtherChannels (CLI) 592 Configuring Layer 3 EtherChannels (CLI) 595 Configuring EtherChannel Load-Balancing (CLI) 596 Configuring EtherChannel Extended Load-Balancing (CLI) 598 Configuring the PAgP Learn Method and Priority (CLI) 599 Configuring LACP Hot-Standby Ports 600 Configuring the LACP Max Bundle Feature (CLI) 601 Configuring the Port Channel Min-Links Feature (CLI) 602 Configuring the LACP System Priority (CLI) 603 Configuring the LACP Port Priority (CLI) 604 Monitoring EtherChannel, PAgP, and LACP Status 605 Configuration Examples for Configuring EtherChannels 606 Configuring Layer 2 EtherChannels: Examples 606 Configuring Layer 3 EtherChannels: Examples 607

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

xxvii

Contents

CHAPTER 32

Configuring LACP Hot-Standby Ports: Example 607 Additional References for EtherChannels 608 Feature Information for EtherChannels 609
Configuring Flex Links and the MAC Address-Table Move Update Feature 611 Finding Feature Information 611 Restrictions for Configuring Flex Links and MAC Address-Table Move Update 611 Information About Flex Links and MAC Address-Table Move Update 612 Flex Links 612 Flex Links Configuration 612 VLAN Flex Links Load Balancing and Support 613 Multicast Fast Convergence with Flex Links Failover 613 Learning the Other Flex Links Port as the mrouter Port 613 Generating IGMP Reports 614 Leaking IGMP Reports 614 MAC Address-Table Move Update 614 Flex Links VLAN Load Balancing Configuration Guidelines 616 MAC Address-Table Move Update Configuration Guidelines 616 Default Flex Links and MAC Address-Table Move Update Configuration 616 How to Configure Flex Links and the MAC Address-Table Move Update Feature 616 Configuring Flex Links (CLI) 616 Configuring a Preemption Scheme for a Pair of Flex Links (CLI) 617 Configuring VLAN Load Balancing on Flex Links (CLI) 619 Configuring MAC Address-Table Move Update (CLI) 619 Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages (CLI) 621 Monitoring Flex Links, Multicast Fast Convergence, and MAC Address-Table Move Update 621 Configuration Examples for Flex Links 622 Configuring Flex Links: Examples 622 Configuring VLAN Load Balancing on Flex Links: Examples 622 Configuring the MAC Address-Table Move Update: Examples 623 Configuring Multicast Fast Convergence with Flex Links Failover: Examples 624 Additional References for Flex Links and MAC Address-Table Move Update 626 Feature Information for Flex Links and MAC Address-Table Move Update 627

xxviii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents

CHAPTER 33
PART VII CHAPTER 34

Configuring UniDirectional Link Detection 629 Finding Feature Information 629 Restrictions for Configuring UDLD 629 Information About UDLD 630 Modes of Operation 630 Normal Mode 630 Aggressive Mode 630 Methods to Detect Unidirectional Links 631 Neighbor Database Maintenance 631 Event-Driven Detection and Echoing 631 UDLD Reset Options 632 Default UDLD Configuration 632 How to Configure UDLD 632 Enabling UDLD Globally (CLI) 632 Enabling UDLD on an Interface (CLI) 634 Monitoring and Maintaining UDLD 635 Additional References for UDLD 635 Feature Information for UDLD 636
Lightweight Access Point 637
Configuring the Switch for Access Point Discovery 639 Finding Feature Information 639 Prerequisites for Configuring the Switch for Access Point Discovery 639 Restrictions for Configuring the Switch for Access Point Discovery 640 Information About Configuring the Switch for Access Point Discovery 640 Access Point Communication Protocols 640 Viewing Access Point Join Information 641 Troubleshooting the Access Point Join Process 641 How to Configure Access Point Discovery 642 Configuring the Syslog Server for Access Points (CLI) 642 Monitoring Access Point Join Information (CLI) 643 Searching for Access Point Radios (GUI) 644

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxix

Contents

CHAPTER 35 CHAPTER 36 CHAPTER 37

Monitoring the Interface Details (GUI) 644 Configuration Examples for Configuring the Switch for Access Point Discovery 645
Displaying the MAC Addresses of all Access Points: Example 645 DHCP Option 43 for Lightweight Cisco Aironet Access Points Configuration Example 646
Configuring Data Encryption 647 Finding Feature Information 647 Prerequisites for Configuring Data Encryption 647 Restrictions for Configuring Data Encryption 647 Information About Data Encryption 648 How to Configure Data Encryption 648 Configuring Data Encryption (CLI) 648 Configuring Data Encryption (GUI) 649 Configuration Examples for Configuring Data Encryption 649 Displaying Data Encryption States for all Access Points: Examples 649
Configuring Retransmission Interval and Retry Count 651 Finding Feature Information 651 Prerequisites for Configuring the Access Point Retransmission Interval and Retry Count 651 Information About Retransmission Interval and Retry Count 652 How to Configure Access Point Retransmission Interval and Retry Count 652 Configuring the Access Point Retransmission Interval and Retry Count (CLI) 652 Configuring the Access Point Retransmission Interval and Retry Count (GUI) 653 Viewing CAPWAP Maximum Transmission Unit Information (CLI) 654 Viewing CAPWAP Maximum Transmission Unit Information (GUI) 655 Configuration Examples for Configuring Access Point Retransmission Interval and Retry Count 655 Viewing the CAPWAP Retransmission Details: Example 655 Viewing Maximum Transmission Unit Information: Example 655
Configuring Adaptive Wireless Intrusion Prevention System 657 Finding Feature Information 657 Prerequisites for Configuring wIPS 657 How to Configure wIPS on Access Points 657 Configuring wIPS on an Access Point (CLI) 657

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxx

Contents

CHAPTER 38 CHAPTER 39

Configuring wIPS on an Access Point (GUI) 659 Monitoring wIPS Information 659 Configuration Examples for Configuring wIPS on Access Points 660
Displaying the Monitor Configuration Channel Set: Example 660 Displaying wIPS Information: Examples 661
Configuring Authentication for Access Points 663 Finding Feature Information 663 Prerequisites for Configuring Authentication for Access Points 663 Restrictions for Configuring Authentication for Access Points 664 Information about Configuring Authentication for Access Points 664 How to Configure Authentication for Access Points 664 Configuring Global Credentials for Access Points (CLI) 664 Configuring Global Credentials for Access Points (GUI) 666 Configuring Authentication for Access Points (CLI) 667 Configuring Authentication for Access Points (GUI) 669 Configuring the Switch for Authentication (CLI) 670 Configuration Examples for Configuring Authentication for Access Points 672 Displaying the Authentication Settings for Access Points: Examples 672
Converting Autonomous Access Points to Lightweight Mode 673 Finding Feature Information 673 Prerequisites for Converting Autonomous Access Points to Lightweight Mode 673 Information About Autonomous Access Points Converted to Lightweight Mode 674 Reverting from Lightweight Mode to Autonomous Mode 674 Using DHCP Option 43 and DHCP Option 60 674 How Converted Access Points Send Crash Information to the Switch 675 Uploading Memory Core Dumps from Converted Access Points 675 Displaying MAC Addresses for Converted Access Points 675 Configuring a Static IP Address for a Lightweight Access Point 675 How to Convert a Lightweight Access Point Back to an Autonomous Access Point 676 Converting a Lightweight Access Point Back to an Autonomous Access Point (CLI) 676 Converting a Lightweight Access Point Back to an Autonomous Access Point (Using the Mode Button and a TFTP Server) 676

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxxi

Contents

CHAPTER 40 CHAPTER 41 CHAPTER 42 CHAPTER 43

Authorizing Access Points (CLI) 677 Authorizing Access Points (GUI) 678 Disabling the Reset Button on Converted Access Points (CLI) 679 Monitoring the AP Crash Log Information 680 How to Configure a Static IP Address on an Access Point 680
Configuring a Static IP Address on an Access Point (CLI) 680 Configuring a Static IP Address on an Access Point (GUI) 682 Recovering the Access Point Using the TFTP Recovery Procedure 683 Configuration Examples for Converting Autonomous Access Points to Lightweight Mode 683 Displaying the IP Address Configuration for Access Points: Example 683 Displaying Access Point Crash File Information: Example 683
Using Cisco Workgroup Bridges 685 Finding Feature Information 685 Information About Cisco Workgroup Bridges and non-Cisco Workgroup bridges 685 Monitoring the Status of Workgroup Bridges 686 Debugging WGB Issues (CLI) 686 Configuration Examples for Configuring Workgroup Bridges 688 WGB Configuration: Example 688
Configuring Probe Request Forwarding 689 Finding Feature Information 689 Information About Configuring Probe Request Forwarding 689 How to Configure Probe Request Forwarding (CLI) 689
Optimizing RFID Tracking 691 Finding Feature Information 691 Optimizing RFID Tracking on Access Points 691 How to Optimize RFID Tracking on Access Points 691 Optimizing RFID Tracking on Access Points (CLI) 691 Configuration Examples for Optimizing RFID Tracking 693 Displaying all the Access Points in Monitor Mode: Example 693
Configuring Country Codes 695

xxxii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

CHAPTER 44 CHAPTER 45

Finding Feature Information 695 Prerequisites for Configuring Country Codes 695 Information About Configuring Country Codes 696 How to Configure Country Codes (CLI) 696 Configuration Examples for Configuring Country Codes 699
Displaying Channel List for Country Codes: Example 699
Configuring Link Latency 701 Finding Feature Information 701 Prerequisites for Configuring Link Latency 701 Restrictions for Configuring Link Latency 701 Information About Configuring Link Latency 702 TCP MSS 702 Link Tests 702 How to Configure Link Latency 703 Configuring Link Latency (CLI) 703 Configuring Link Latency (GUI) 705 How to Configure TCP MSS 706 Configuring TCP MSS (CLI) 706 Configuring TCP MSS (GUI) 706 Performing a Link Test (CLI) 707 Configuration Examples for Configuring Link Latency 708 Running a Link Test: Example 708 Displaying Link Latency Information: Example 708 Displaying TCP MSS Settings: Example 709
Configuring Power over Ethernet 711 Finding Feature Information 711 Information About Configuring Power over Ethernet 711 How to Configure Power over Ethernet 711 Configuring Power over Ethernet (CLI) 711 Configuring Power over Ethernet (GUI) 712 Configuration Examples for Configuring Power over Ethernet 714 Displaying Power over Ethernet Information: Example 714

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

xxxiii

Contents

PART VIII CHAPTER 46
CHAPTER 47 CHAPTER 48
CHAPTER 49

Mobility 715
Information About Mobility 717 Overview 717 Wired and Wireless Mobility 718 Features of Mobility 718 Sticky Anchoring for Low Latency Roaming 719 Bridge Domain ID and L2/L3 Roaming 720 Link Down Behavior 720 Platform Specific Scale Requirement for the Mobility Controller 720
Mobility Network Elements 723 Mobility Agent 723 Mobility Controller 724 Mobility Oracle 725 Guest Controller 725
Mobility Control Protocols 727 About Mobility Control Protocols 727 Initial Association and Roaming 727 Initial Association 728 Intra Switch Handoff 729 Intra Switch Peer Group Handoff 729 Inter Switch Peer Group Handoff 730 Inter Sub Domain Handoff 731 Inter Mobility Group Handoff 733
Configuring Mobility 735 Configuring Mobility Controller 735 Configuring Converged Access Controllers 735 Creating Peer Groups, Peer Group Member, and Bridge Domain ID (CLI) 735 Creating Peer Groups, Peer Group Member, and Bridge Domain ID (GUI) 737 Configuring Local Mobility Group (CLI) 737

xxxiv

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents

PART IX CHAPTER 50

Configuring Local Mobility Group (GUI) 738 Adding a Peer Mobility Group (CLI) 739 Adding a Peer Mobility Group (GUI) 739 Configuring Optional Parameters for Roaming Behavior 740 Pointing the Mobility Controller to a Mobility Oracle (CLI) 740 Pointing the Mobility Controller to a Mobility Oracle (GUI) 741 Configuring Guest Controller 741 Configuring Guest Anchor 742 Configuring Mobility Agent 743 Configuring Mobility Agent by Pointing to Mobility Controller (CLI) 743 Configuring Mobility Agent by Pointing to Mobility Controller (GUI) 744 Configuring the Mobility Controller for the Mobility Agent (CLI) 745 Adding a Mobility Controller Role to the Mobility Agent 745 Configuring Optional Parameters on a Mobility Agent (CLI) 746
Network Management 747
Configuring Cisco IOS Configuration Engine 749 Finding Feature Information 749 Prerequisites for Configuring the Configuration Engine 749 Restrictions for Configuring the Configuration Engine 750 Information About Configuring the Configuration Engine 750 Cisco Configuration Engine Software 750 Configuration Service 751 Event Service 751 NameSpace Mapper 752 Cisco Networking Services IDs and Device Hostnames 752 ConfigID 752 DeviceID 752 Hostname and DeviceID 753 Hostname, DeviceID, and ConfigID 753 Cisco IOS CNS Agents 753 Initial Configuration 753 Incremental (Partial) Configuration 754

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xxxv

Contents

CHAPTER 51 CHAPTER 52

Synchronized Configuration 754 Automated CNS Configuration 755 How to Configure the Configuration Engine 756 Enabling the CNS Event Agent 756 Enabling the Cisco IOS CNS Agent 757 Enabling an Initial Configuration for Cisco IOS CNS Agent 758 Refreshing DeviceIDs 763 Enabling a Partial Configuration for Cisco IOS CNS Agent 765 Monitoring CNS Configurations 766 Additional References 767 Feature History and Information for the Configuration Engine 767
Configuring the Cisco Discovery Protocol 769 Finding Feature Information 769 Information About CDP 769 CDP Overview 769 CDP and Stacks 770 Default CDP Configuration 770 How to Configure CDP 770 Configuring CDP Characteristics 770 Disabling CDP 772 Enabling CDP 772 Disabling CDP on an Interface 774 Enabling CDP on an Interface 775 Monitoring and Maintaining CDP 776 Additional References 777 Feature History and Information for Cisco Discovery Protocol 777
Configuring Simple Network Management Protocol 779 Finding Feature Information 779 Prerequisites for SNMP 779 Restrictions for SNMP 781 Information About SNMP 781 SNMP Overview 781

xxxvi

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

CHAPTER 53

SNMP Manager Functions 782 SNMP Agent Functions 782 SNMP Community Strings 783 SNMP MIB Variables Access 783 SNMP Notifications 783 SNMP ifIndex MIB Object Values 784 Default SNMP Configuration 784 SNMP Configuration Guidelines 785 How to Configure SNMP 786 Disabling the SNMP Agent 786 Configuring Community Strings 786 Configuring SNMP Groups and Users 789 Configuring SNMP Notifications 791 Setting the Agent Contact and Location Information 795 Limiting TFTP Servers Used Through SNMP 796 Configuring Trap Flags for SNMP 797 Enabling SNMP Wireless Trap Notification 799 Monitoring SNMP Status 800 SNMP Examples 800
Configuring Service Level Agreements 803 Finding Feature Information 803 Restrictions on SLAs 803 Information About SLAs 804 Cisco IOS IP Service Level Agreements (SLAs) 804 Network Performance Measurement with Cisco IOS IP SLAs 805 IP SLA Responder and IP SLA Control Protocol 805 Response Time Computation for IP SLAs 806 IP SLAs Operation Scheduling 806 IP SLA Operation Threshold Monitoring 807 UDP Jitter 807 Configuration Guidelines 808 How to Configure IP SLAs Operations 809 Configuring the IP SLA Responder 809

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

xxxvii

Contents

CHAPTER 54

Implementing IP SLA Network Performance Measurement 810 Analyzing IP Service Levels by Using the UDP Jitter Operation 814 Analyzing IP Service Levels by Using the ICMP Echo Operation 817 Monitoring IP SLA Operations 820 Monitoring IP SLA Operation Examples 821 Feature History and Information for Service Level Agreements 822
Configuring SPAN and RSPAN 823 Finding Feature Information 823 Prerequisites for SPAN and RSPAN 823 Restrictions for SPAN and RSPAN 824 Information About SPAN and RSPAN 825 SPAN and RSPAN 825 Local SPAN 826 Remote SPAN 827 SPAN and RSPAN Concepts and Terminology 827 SPAN and RSPAN Interaction with Other Features 833 SPAN and RSPAN and Device Stacks 834 Flow-Based SPAN 834 Default SPAN and RSPAN Configuration 835 Configuration Guidelines 835 SPAN Configuration Guidelines 835 RSPAN Configuration Guidelines 836 FSPAN and FRSPAN Configuration Guidelines 836 How to Configure SPAN and RSPAN 837 Creating a Local SPAN Session 837 Creating a Local SPAN Session and Configuring Incoming Traffic 839 Specifying VLANs to Filter 841 Configuring a VLAN as an RSPAN VLAN 842 Creating an RSPAN Source Session 844 Specifying VLANs to Filter 845 Creating an RSPAN Destination Session 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic 848 Configuring an FSPAN Session 850

xxxviii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

CHAPTER 55

Configuring an FRSPAN Session 853 Monitoring SPAN and RSPAN Operations 855 SPAN and RSPAN Configuration Examples 855
Example: Configuring Local SPAN 855 Examples: Creating an RSPAN VLAN 857 Additional References 858 Feature History and Information for SPAN and RSPAN 859
Configuring Wireshark 861 Finding Feature Information 861 Prerequisites for Wireshark 861 Restrictions for Wireshark 861 Information About Wireshark 863 Wireshark Overview 863 Capture Points 863 Attachment Points 863 Filters 864 Actions 864 Storage of Captured Packets to Buffer in Memory 865 Storage of Captured Packets to a .pcap File 865 Packet Decoding and Display 866 Packet Storage and Display 866 Wireshark Capture Point Activation and Deactivation 866 Wireshark Features 867 Guidelines for Wireshark 869 Default Wireshark Configuration 871 How to Configure Wireshark 872 Defining a Capture Point 872 Adding or Modifying Capture Point Parameters 876 Deleting Capture Point Parameters 878 Deleting a Capture Point 879 Activating and Deactivating a Capture Point 880 Clearing the Capture Point Buffer 881 Monitoring Wireshark 882

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

xxxix

Contents

PART X CHAPTER 56

Configuration Examples for Wireshark 882 Example: Displaying a Brief Output from a .pcap File 882 Example: Displaying Detailed Output from a .pcap File 884 Example: Simple Capture and Display 887 Example: Simple Capture and Store 888 Example: Using Buffer Capture 889 Example: Capture Sessions 893 Example: Capture and Store in Lock-step Mode 894 Example: Simple Capture and Store of Packets in Egress Direction 895
Additional References 897 Feature History and Information for WireShark 898
QoS 899
Configuring QoS 901 Finding Feature Information 901 Prerequisites for QoS 901 QoS Components 902 QoS Terminology 902 Information About QoS 903 QoS Overview 903 Modular QoS Command-Line Interface 903 Wireless QoS Overview 903 QoS and IPv6 for Wireless 904 Wired and Wireless Access Supported Features 905 Supported QoS Features on Wireless Targets 906 Port Policies 907 Radio Policies 909 SSID Policies 909 Client Policies 910 Hierarchical QoS 911 Hierarchical Wireless QoS 911 QoS Implementation 912 Layer 2 Frame Prioritization Bits 913

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xl

Layer 3 Packet Prioritization Bits 914 End-to-End QoS Solution Using Classification 914 Packet Classification 914 QoS Wired Model 917 Ingress Port Activity 917 Egress Port Activity 917 Classification 918 Access Control Lists 918 Class Maps 918 Policy Maps 919 Policing 921 Token-Bucket Algorithm 921 Marking 922 Packet Header Marking 922 Switch Specific Information Marking 922 Table Map Marking 922 Traffic Conditioning 924 Policing 924 Shaping 926 Queueing and Scheduling 927 Bandwidth 927 Weighted Tail Drop 928 Priority Queues 929 Queue Buffer 929 Queuing in Wireless 931 Trust Behavior 931 Trust Behavior for Wired and Wireless Ports 931 Port Security on a Trusted Boundary for Cisco IP Phones 932 Wireless QoS Mobility 933 Inter-Switch Roaming 933 Intra-Switch Roaming 934 Precious Metal Policies for Wireless QoS 934 Standard QoS Default Settings 935 Default Wired QoS Configuration 935

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xli

Contents

Default Wireless QoS Configuration 936 Restrictions for QoS on Wired Targets 936 Restrictions for QoS on Wireless Targets 939 How to Configure QoS 942
Configuring Class, Policy, and Table Maps 942 Creating a Traffic Class (CLI) 942 Creating a Traffic Policy (CLI) 944 Configuring Client Policies (GUI) 949 Configuring Class-Based Packet Marking (CLI) 950 Configuring Class Maps for Voice and Video (CLI) 955 Attaching a Traffic Policy to an Interface (CLI) 956 Configuring SSID Policies (GUI) 958 Applying an SSID or Client Policy on a WLAN (CLI) 959 Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI) 960 Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI) 964 Configuring Table Maps (CLI) 967
Configuring Trust 970 Configuring Trust Behavior for Wireless Traffic (CLI) 970
Configuring QoS Features and Functionality 970 Configuring Call Admission Control (CLI) 970 Configuring Bandwidth (CLI) 977 Configuring Police (CLI) 979 Configuring Priority (CLI) 982
Configuring Queues and Shaping 984 Configuring Egress Queue Characteristics 984 Configuring Queue Buffers (CLI) 984 Configuring Queue Limits (CLI) 987 Configuring Shaping (CLI) 989
Configuring Precious Metal Policies (CLI) 991 Configuring QoS Policies for Multicast Traffic (CLI) 992 Applying a QoS Policy on a WLAN (GUI) 993 Monitoring QoS 994 Configuration Examples for QoS 996 Examples: Classification by Access Control Lists 996

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlii

Contents

CHAPTER 57

Examples: Class of Service Layer 2 Classification 997 Examples: Class of Service DSCP Classification 997 Examples: VLAN ID Layer 2 Classification 997 Examples: Classification by DSCP or Precedence Values 997 Examples: Hierarchical Classification 998 Examples: Hierarchical Policy Configuration 998 Examples: Classification for Voice and Video 999 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic 1000 Examples: Configuring Downstream SSID Policy 1001 Examples: Client Policies 1002 Examples: Average Rate Shaping Configuration 1004 Examples: Queue-limit Configuration 1004 Examples: Queue Buffers Configuration 1005 Examples: Policing Action Configuration 1006 Examples: Policer VLAN Configuration 1006 Examples: Policing Units 1007 Examples: Single-Rate Two-Color Policing Configuration 1007 Examples: Dual-Rate Three-Color Policing Configuration 1008 Examples: Table Map Marking Configuration 1008 Example: Table Map Configuration to Retain CoS Markings 1009 Where to Go Next 1010 Additional References for QoS 1010 Feature History and Information for QoS 1011
Configuring Auto-QoS 1013 Finding Feature Information 1013 Prerequisites for Auto-QoS 1013 Restrictions for Auto-QoS 1013 Information About Configuring Auto-QoS 1014 Auto-QoS Overview 1014 Auto-QoS Global Configuration Templates 1015 Auto-QoS Policy and Class Maps 1015 Effects of Auto-QoS on Running Configuration 1015 How to Configure Auto-QoS 1016

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xliii

Contents

PART XI CHAPTER 58

Configuring Auto-QoS (CLI) 1016 Upgrading Auto-QoS (CLI) 1018 Monitoring Auto-QoS 1020 Troubleshooting Auto-QoS 1021 Configuration Examples for Auto-QoS 1021 Example: auto qos trust cos 1021 Example: auto qos trust dscp 1024 Example: auto qos video cts 1026 Example: auto qos video ip-camera 1029 Example: auto qos video media-player 1032 Example: auto qos voip trust 1035 Example: auto qos voip cisco-phone 1037 Example: auto qos voip cisco-softphone 1041 auto qos classify police 1046 Where to Go Next for Auto-QoS 1050 Additional References for Auto-QoS 1050 Feature History and Information for Auto-QoS 1051
Radio Resource Management 1053
Configuring Radio Resource Management 1055 Finding Feature Information 1055 Prerequisites for Configuring Radio Resource Management 1055 Restrictions for Radio Resource Management 1056 Information About Radio Resource Management 1056 Radio Resource Monitoring 1056 Information About RF Groups 1057 RF Group Leader 1057 RF Group Name 1059 Mobility Controller 1059 Mobility Agent 1059 Information About Rogue Access Point Detection in RF Groups 1060 Transmit Power Control 1060 Overriding the TPC Algorithm with Minimum and Maximum Transmit Power Settings 1060

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xliv

Contents
Dynamic Channel Assignment 1061 Coverage Hole Detection and Correction 1062 How to Configure RRM 1063 Configuring Advanced RRM CCX Parameters (CLI) 1063 Configuring Neighbor Discovery Type (CLI) 1063 Configuring RRM Profile Thresholds, Monitoring Channels, and Monitoring Intervals (GUI) 1064 Configuring RF Groups 1065
Configuring the RF Group Mode (GUI) 1066 Configuring RF Group Selection Mode (CLI) 1066 Configuring an RF Group Name (CLI) 1067 Configuring an RF Group Name (GUI) 1068 Configuring Members in a 802.11 Static RF Group (CLI) 1068 Configuring Transmit Power Control 1069 Configuring the Tx-Power Control Threshold (CLI) 1069 Configuring the Tx-Power Level (CLI) 1069 Configuring Transmit Power Control (GUI) 1070 Configuring 802.11 RRM Parameters 1071 Configuring Advanced 802.11 Channel Assignment Parameters (CLI) 1071 Configuring Dynamic Channel Assignment (GUI) 1073 Configuring 802.11 Coverage Hole Detection (CLI) 1075 Configuring Coverage Hole Detection (GUI) 1076 Configuring 802.11 Event Logging (CLI) 1077 Configuring 802.11 Statistics Monitoring (CLI) 1078 Configuring the 802.11 Performance Profile (CLI) 1079 Configuring Rogue Access Point Detection in RF Groups 1080 Configuring Rogue Access Point Detection in RF Groups (CLI) 1080 Enabling Rogue Access Point Detection in RF Groups (GUI) 1082 Monitoring RRM Parameters and RF Group Status 1082 Monitoring RRM Parameters 1082 Monitoring RF Group Status (CLI) 1083 Monitoring RF Group Status (GUI) 1084 Examples: RF Group Configuration 1084 Information About ED-RRM 1084 Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI) 1085
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlv

Contents

PART XII CHAPTER 59

Configuring ED-RRM (GUI) 1085 Additional References for Radio Resource Management 1086 Feature History and Information For Performing Radio Resource Management Configuration 1087
Routing 1089
Configuring MSDP 1091 Finding Feature Information 1091 Information About Configuring MSDP 1091 Understanding MSDP 1091 MSDP Operation 1092 MSDP Benefits 1092 How to Configure MSDP 1093 Default MSDP Configuration 1093 Configuring a Default MSDP Peer 1093 Caching Source-Active State 1095 Controlling Source Information that Your Switch Originates 1096 Redistributing Sources 1096 Filtering Source-Active Request Messages 1098 Controlling Source Information that Your Switch Forwards 1100 Using a Filter 1100 Using TTL to Limit the Multicast Data Sent in SA Messages 1102 Controlling Source Information that Your Switch Receives 1103 Configuring an MSDP Mesh Group 1104 Shutting Down an MSDP Peer 1105 Including a Bordering PIM Dense-Mode Region in MSDP 1106 Configuring an Originating Address other than the RP Address 1107 Monitoring and Maintaining MSDP 1108 Configuration Examples for Configuring MSDP 1109 Configuring a Default MSDP Peer: Example 1109 Caching Source-Active State: Example 1110 Controlling Source Information that Your Switch Originates: Example 1110 Controlling Source Information that Your Switch Forwards: Example 1110 Controlling Source Information that Your Switch Receives: Example 1110

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlvi

Contents

CHAPTER 60

Configuring IP Unicast Routing 1111 Finding Feature Information 1112 Information About Configuring IP Unicast Routing 1112 Information About IP Routing 1112 Types of Routing 1113 IP Routing and Switch Stacks 1114 Classless Routing 1115 Address Resolution 1116 Proxy ARP 1117 ICMP Router Discovery Protocol 1117 UDP Broadcast Packets and Protocols 1118 Broadcast Packet Handling 1118 IP Broadcast Flooding 1118 How to Configure IP Routing 1119 How to Configure IP Addressing 1120 Default IP Addressing Configuration 1120 Assigning IP Addresses to Network Interfaces 1121 Using Subnet Zero 1123 Enabling Classless Routing 1123 Configuring Address Resolution Methods 1124 Defining a Static ARP Cache 1124 Setting ARP Encapsulation 1126 Enabling Proxy ARP 1127 Routing Assistance When IP Routing is Disabled 1127 Proxy ARP 1128 Default Gateway 1128 ICMP Router Discovery Protocol (IRDP) 1128 Configuring Broadcast Packet Handling 1130 Enabling Directed Broadcast-to-Physical Broadcast Translation 1130 Forwarding UDP Broadcast Packets and Protocols 1132 Establishing an IP Broadcast Address 1133 Flooding IP Broadcasts 1134 Monitoring and Maintaining IP Addressing 1135

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlvii

Contents

How to Configure IP Unicast Routing 1136 Enabling IP Unicast Routing 1136 Example of Enabling IP Routing 1137 What to Do Next 1137
Information About RIP 1137 Summary Addresses and Split Horizon 1138
How to Configure RIP 1138 Default RIP Configuration 1138 Configuring Basic RIP Parameters 1139 Configuring RIP Authentication 1141 Configuring Summary Addresses and Split Horizon 1142 Configuring Split Horizon 1143
Configuration Example for Summary Addresses and Split Horizon 1144 Information About OSPF 1145
OSPF Nonstop Forwarding 1145 OSPF NSF Awareness 1146 OSPF NSF Capability 1146
OSPF Area Parameters 1147 Other OSPF Parameters 1147 LSA Group Pacing 1148 Loopback Interfaces 1148 How to Configure OSPF 1148 Default OSPF Configuration 1148 Configuring Basic OSPF Parameters 1150 Configuring OSPF Interfaces 1151 Configuring OSPF Area Parameters 1153 Configuring Other OSPF Parameters 1155 Changing LSA Group Pacing 1157 Configuring a Loopback Interface 1158 Monitoring OSPF 1158 Configuration Examples for OSPF 1159 Example: Configuring Basic OSPF Parameters 1159 Information About EIGRP 1160 EIGRP Features 1160

xlviii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

EIGRP Components 1160 EIGRP Nonstop Forwarding 1161
EIGRP NSF Awareness 1161 EIGRP NSF Capability 1161 EIGRP Stub Routing 1162 How to Configure EIGRP 1163 Default EIGRP Configuration 1163 Configuring Basic EIGRP Parameters 1165 Configuring EIGRP Interfaces 1166 Configuring EIGRP Route Authentication 1168 Monitoring and Maintaining EIGRP 1169 Information About BGP 1170 BGP Network Topology 1170 Nonstop Forwarding Awareness 1172 Information About BGP Routing 1172 Routing Policy Changes 1172 BGP Decision Attributes 1173 Route Maps 1174 BGP Filtering 1174 Prefix List for BGP Filtering 1175 BGP Community Filtering 1175 BGP Neighbors and Peer Groups 1176 Aggregate Routes 1176 Routing Domain Confederations 1176 BGP Route Reflectors 1176 Route Dampening 1177 More BGP Information 1177 How to Configure BGP 1177 Default BGP Configuration 1177 Enabling BGP Routing 1181 Managing Routing Policy Changes 1183 Configuring BGP Decision Attributes 1184 Configuring BGP Filtering with Route Maps 1186 Configuring BGP Filtering by Neighbor 1187

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xlix

Contents

Configuring BGP Filtering by Access Lists and Neighbors 1188 Configuring Prefix Lists for BGP Filtering 1189 Configuring BGP Community Filtering 1190 Configuring BGP Neighbors and Peer Groups 1191 Configuring Aggregate Addresses in a Routing Table 1193 Configuring Routing Domain Confederations 1195 Configuring BGP Route Reflectors 1196 Configuring Route Dampening 1197 Monitoring and Maintaining BGP 1198 Configuration Examples for BGP 1199 Example: Configuring BGP on Routers 1199 Information About ISO CLNS Routing 1200 Connectionless Routing 1200 IS-IS Dynamic Routing 1201 Nonstop Forwarding Awareness 1202 IS-IS Global Parameters 1202 IS-IS Interface Parameters 1203 How to Configure ISO CLNS Routing 1203 Default IS-IS Configuration 1203 Enabling IS-IS Routing 1205 Configuring IS-IS Global Parameters 1207 Configuring IS-IS Interface Parameters 1210 Monitoring and Maintaining ISO IGRP and IS-IS 1212 Configuration Examples for ISO CLNS Routing 1213 Example: Configuring IS-IS Routing 1213 Information About Multi-VRF CE 1214 Understanding Multi-VRF CE 1214
Network Topology 1215 Packet-Forwarding Process 1216 Network Components 1216 VRF-Aware Services 1216 How to Configure Multi-VRF CE 1217 Default Multi-VRF CE Configuration 1217 Multi-VRF CE Configuration Guidelines 1218

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) l

Configuring VRFs 1218 Configuring VRF-Aware Services 1220
Configuring VRF-Aware Services for ARP 1220 Configuring VRF-Aware Services for Ping 1221 Configuring VRF-Aware Services for SNMP 1221 Configuring VRF-Aware Servcies for uRPF 1222 Configuring VRF-Aware RADIUS 1223 Configuring VRF-Aware Services for Syslog 1223 Configuring VRF-Aware Services for Traceroute 1224 Configuring VRF-Aware Services for FTP and TFTP 1224 Configuring Multicast VRFs 1225 Configuring a VPN Routing Session 1227 Configuring BGP PE to CE Routing Sessions 1228 Monitoring Multi-VRF CE 1230 Configuration Examples for Multi-VRF CE 1230 Multi-VRF CE Configuration Example 1230 Configuring Unicast Reverse Path Forwarding 1234 Protocol-Independent Features 1234 Distributed Cisco Express Forwarding 1235 Information About Cisco Express Forwarding 1235 How to Configure Cisco Express Forwarding 1235 Number of Equal-Cost Routing Paths 1237 Information About Equal-Cost Routing Paths 1237 How to Configure Equal-Cost Routing Paths 1237 Static Unicast Routes 1238 Information About Static Unicast Routes 1238 Configuring Static Unicast Routes 1239 Default Routes and Networks 1240 Information About Default Routes and Networks 1240 How to Configure Default Routes and Networks 1240 Route Maps to Redistribute Routing Information 1241 Information About Route Maps 1241 How to Configure a Route Map 1242 How to Control Route Distribution 1245

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) li

Contents

PART XIII CHAPTER 61
CHAPTER 62

Policy-Based Routing 1247 Information About Policy-Based Routing 1247 How to Configure PBR 1248
Filtering Routing Information 1251 Setting Passive Interfaces 1251 Controlling Advertising and Processing in Routing Updates 1253 Filtering Sources of Routing Information 1253
Managing Authentication Keys 1255 Prerequisites 1255 How to Configure Authentication Keys 1255
Monitoring and Maintaining the IP Network 1256
Security 1259
Preventing Unauthorized Access 1261 Finding Feature Information 1261 Preventing Unauthorized Access 1261
Controlling Switch Access with Passwords and Privilege Levels 1263 Finding Feature Information 1263 Restrictions for Controlling Switch Access with Passwords and Privileges 1263 Information About Passwords and Privilege Levels 1264 Default Password and Privilege Level Configuration 1264 Additional Password Security 1264 Password Recovery 1264 Terminal Line Telnet Configuration 1265 Username and Password Pairs 1265 Privilege Levels 1265 How to Control Switch Access with Passwords and Privilege Levels 1266 Setting or Changing a Static Enable Password 1266 Protecting Enable and Enable Secret Passwords with Encryption 1267 Disabling Password Recovery 1269 Setting a Telnet Password for a Terminal Line 1270 Configuring Username and Password Pairs 1271

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lii

Contents

CHAPTER 63

Setting the Privilege Level for a Command 1272 Changing the Default Privilege Level for Lines 1273 Logging into and Exiting a Privilege Level 1274 Monitoring Switch Access 1275 Configuration Examples for Setting Passwords and Privilege Levels 1275 Example: Setting or Changing a Static Enable Password 1275 Example: Protecting Enable and Enable Secret Passwords with Encryption 1276 Example: Setting a Telnet Password for a Terminal Line 1276 Example: Setting the Privilege Level for a Command 1276 Additional References 1276
Configuring TACACS+ 1279 Finding Feature Information 1279 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) 1279 Information About TACACS+ 1281 TACACS+ and Switch Access 1281 TACACS+ Overview 1281 TACACS+ Operation 1283 Method List Description 1283 TACACS+ Configuration Options 1284 TACACS+ Login Authentication 1284 TACACS+ Authorization for Privileged EXEC Access and Network Services 1284 TACACS+ Accounting 1284 Default TACACS+ Configuration 1285 How to Configure TACACS+ 1285 Identifying the TACACS+ Server Host and Setting the Authentication Key 1285 Configuring TACACS+ Login Authentication 1286 Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services 1289 Starting TACACS+ Accounting 1290 Establishing a Session with a Router if the AAA Server is Unreachable 1291 Monitoring TACACS+ 1291 Additional References 1292 Feature Information for TACACS+ 1293

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) liii

Contents

CHAPTER 64

Configuring RADIUS 1295 Finding Feature Information 1295 Prerequisites for Controlling Switch Access with RADIUS 1295 Restrictions for Controlling Switch Access with RADIUS 1296 Information about RADIUS 1296 RADIUS and Switch Access 1296 RADIUS Overview 1297 RADIUS Operation 1298 RADIUS Change of Authorization 1299 Change-of-Authorization Requests 1299 CoA Request Response Code 1301 CoA Request Commands 1302 Stacking Guidelines for Session Termination 1304 Default RADIUS Configuration 1305 RADIUS Server Host 1305 RADIUS Login Authentication 1306 AAA Server Groups 1306 AAA Authorization 1307 RADIUS Accounting 1307 Vendor-Specific RADIUS Attributes 1307 Vendor-Proprietary RADIUS Server Communication 1307 How to Configure RADIUS 1308 Identifying the RADIUS Server Host 1308 Configuring RADIUS Login Authentication 1310 Defining AAA Server Groups 1312 Configuring RADIUS Authorization for User Privileged Access and Network Services 1314 Starting RADIUS Accounting 1315 Establishing a Session with a Router if the AAA Server is Unreachable 1316 Configuring Settings for All RADIUS Servers 1317 Configuring the Switch to Use Vendor-Specific RADIUS Attributes 1318 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 1319 Configuring CoA on the Switch 1320 Configuring RADIUS Server Load Balancing 1322

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) liv

Contents

CHAPTER 65
CHAPTER 66 CHAPTER 67

Monitoring CoA Functionality 1322 Configuration Examples for Controlling Switch Access with RADIUS 1323
Examples: Identifying the RADIUS Server Host 1323 Examples: Configuring the Switch to Use Vendor-Specific RADIUS Attributes 1323 Example: Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 1324 Additional References 1324 Feature Information for RADIUS 1325
Configuring Kerberos 1327 Finding Feature Information 1327 Prerequisites for Controlling Switch Access with Kerberos 1327 Restrictions for Controlling Switch Access with Kerberos 1328 Information about Kerberos 1328 Kerberos and Switch Access 1328 Kerberos Overview 1328 Kerberos Operation 1330 Authenticating to a Boundary Switch 1330 Obtaining a TGT from a KDC 1331 Authenticating to Network Services 1331 How to Configure Kerberos 1331 Monitoring the Kerberos Configuration 1331 Additional References 1332 Feature Information for Kerberos 1333
Configuring Local Authentication and Authorization 1335 Finding Feature Information 1335 How to Configure Local Authentication and Authorization 1335 Configuring the Switch for Local Authentication and Authorization 1335 Monitoring Local Authentication and Authorization 1337 Additional References 1337 Feature Information for Local Authentication and Authorization 1338
Configuring Secure Shell (SSH) 1339 Finding Feature Information 1339

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lv

Contents

CHAPTER 68 CHAPTER 69

Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP) 1339 Restrictions for Configuring the Switch for SSH 1340 Information about SSH 1340
SSH and Switch Access 1340 SSH Servers, Integrated Clients, and Supported Versions 1341 SSH Configuration Guidelines 1341 Secure Copy Protocol Overview 1342 Secure Copy Protocol Concepts 1342 How to Configure SSH 1343 Setting Up the Switch to Run SSH 1343 Configuring the SSH Server 1344 Monitoring the SSH Configuration and Status 1346 Additional References 1346 Feature Information for SSH 1347
Configuring Secure Socket Layer HTTP 1349 Finding Feature Information 1349 Information about Secure Sockets Layer (SSL) HTTP 1349 Certificate Authority Trustpoints 1350 CipherSuites 1351 Default SSL Configuration 1352 SSL Configuration Guidelines 1352 Secure HTTP Servers and Clients Overview 1352 How to Configure Secure HTTP Servers and Clients 1352 Configuring a CA Trustpoint 1352 Configuring the Secure HTTP Server 1355 Configuring the Secure HTTP Client 1358 How to Configure Secure HTTP Servers and Clients 1359 Monitoring Secure HTTP Server and Client Status 1359 Additional References 1359 Feature Information for SSL HTTP 1360
Configuring IPv4 ACLs 1361 Finding Feature Information 1361

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lvi

Prerequisites for Configuring Network Security with ACLs 1361 Restrictions for Configuring Network Security with ACLs 1361 Information about Network Security with ACLs 1363
Cisco TrustSec and ACLs 1363 ACL Overview 1363
Access Control Entries 1364 ACL Supported Types 1364 Supported ACLs 1364 ACL Precedence 1364 Port ACLs 1365 Router ACLs 1366 VLAN Maps 1366 ACEs and Fragmented and Unfragmented Traffic 1367 Example: ACEs and Fragmented and Unfragmented Traffic 1367 ACLs and Switch Stacks 1368 Active Switch and ACL Functions 1368 Stack Member and ACL Functions 1368 Active Switch Failure and ACLs 1368 Standard and Extended IPv4 ACLs 1369 IPv4 ACL Switch Unsupported Features 1369 Access List Numbers 1369 Numbered Standard IPv4 ACLs 1370 Numbered Extended IPv4 ACLs 1370 Named IPv4 ACLs 1371 ACL Logging 1372 Smart Logging 1372 Hardware and Software Treatment of IP ACLs 1372 VLAN Map Configuration Guidelines 1373 VLAN Maps with Router ACLs 1374 VLAN Maps and Router ACL Configuration Guidelines 1374 Time Ranges for ACLs 1375 IPv4 ACL Interface Considerations 1375 How to Configure ACLs 1376 Configuring IPv4 ACLs 1376

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lvii

Contents

Creating a Numbered Standard ACL 1376 Creating a Numbered Extended ACL 1378 Creating Named Standard ACLs 1381 Creating Extended Named ACLs 1383 Configuring Time Ranges for ACLs 1384 Applying an IPv4 ACL to a Terminal Line 1385 Applying an IPv4 ACL to an Interface 1386 Creating Named MAC Extended ACLs 1388 Applying a MAC ACL to a Layer 2 Interface 1389 Configuring VLAN Maps 1390 Creating a VLAN Map 1392 Applying a VLAN Map to a VLAN 1394 Configuring VACL Logging 1395 Monitoring IPv4 ACLs 1396 Configuration Examples for ACLs 1397 Examples: Using Time Ranges with ACLs 1397 Examples: Including Comments in ACLs 1398 Examples: Troubleshooting ACLs 1399 IPv4 ACL Configuration Examples 1400
ACLs in a Small Networked Office 1400 Examples: ACLs in a Small Networked Office 1400 Example: Numbered ACLs 1401 Examples: Extended ACLs 1401 Examples: Named ACLs 1402 Examples: Time Range Applied to an IP ACL 1403 Examples: Commented IP ACL Entries 1403 Examples: ACL Logging 1403 Configuration Examples for ACLs and VLAN Maps 1405 Example: Creating an ACL and a VLAN Map to Deny a Packet 1405 Example: Creating an ACL and a VLAN Map to Permit a Packet 1405 Example: Default Action of Dropping IP Packets and Forwarding MAC Packets 1405 Example: Default Action of Dropping MAC Packets and Forwarding IP Packets 1406 Example: Default Action of Dropping All Packets 1406 Configuration Examples for Using VLAN Maps in Your Network 1407

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lviii

Contents

CHAPTER 70 CHAPTER 71

Example: Wiring Closet Configuration 1407 Example: Restricting Access to a Server on Another VLAN 1408 Example: Denying Access to a Server on Another VLAN 1408 Configuration Examples of Router ACLs and VLAN Maps Applied to VLANs 1409 Example: ACLs and Switched Packets 1409 Example: ACLs and Bridged Packets 1410 Example: ACLs and Routed Packets 1410 Example: ACLs and Multicast Packets 1411 Additional References 1412 Feature Information for ACLs 1412
Configuring IPv6 ACLs 1413 Finding Feature Information 1413 Information about IPv6 ACLs 1413 Switch Stacks and IPv6 ACLs 1414 Interactions with Other Features and Switches 1414 Restrictions for IPv6 ACLs 1414 Default Configuration for IPv6 ACLs 1415 How to Configure IPv6 ACLs 1415 How to Attach an IPv6 ACL to an Interface 1419 Monitoring IPv6 ACLs 1420 Additional References 1421
Configuring DHCP 1423 Finding Feature Information 1423 Information About DHCP 1423 DHCP Server 1423 DHCP Relay Agent 1423 DHCP Snooping 1424 Option-82 Data Insertion 1425 Cisco IOS DHCP Server Database 1428 DHCP Snooping Binding Database 1428 DHCP Snooping and Switch Stacks 1429 How to Configure DHCP Features 1430

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lix

Contents

CHAPTER 72 CHAPTER 73

Default DHCP Snooping Configuration 1430 DHCP Snooping Configuration Guidelines 1431 Configuring the DHCP Server 1431 DHCP Server and Switch Stacks 1431 Configuring the DHCP Relay Agent 1431 Specifying the Packet Forwarding Address 1432 Prerequisites for Configuring DHCP Snooping and Option 82 1434 Enabling DHCP Snooping and Option 82 1435 Enabling the Cisco IOS DHCP Server Database 1438 Monitoring DHCP Snooping Information 1438 Configuring DHCP Server Port-Based Address Allocation 1439 Information About Configuring DHCP Server Port-Based Address Allocation 1439 Default Port-Based Address Allocation Configuration 1439 Port-Based Address Allocation Configuration Guidelines 1439 Enabling the DHCP Snooping Binding Database Agent 1439 Enabling DHCP Server Port-Based Address Allocation 1441 Monitoring DHCP Server Port-Based Address Allocation 1442 Additional References 1442 Feature Information for DHCP Snooping and Option 82 1443
Configuring IP Source Guard 1445 Finding Feature Information 1445 Information About IP Source Guard 1445 IP Source Guard 1445 IP Source Guard for Static Hosts 1446 IP Source Guard Configuration Guidelines 1447 How to Configure IP Source Guard 1447 Enabling IP Source Guard 1447 Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port 1449 Monitoring IP Source Guard 1453 Additional References 1454
Configuring Dynamic ARP Inspection 1455 Finding Feature Information 1455

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lx

CHAPTER 74

Restrictions for Dynamic ARP Inspection 1455 Understanding Dynamic ARP Inspection 1457
Interface Trust States and Network Security 1458 Rate Limiting of ARP Packets 1459 Relative Priority of ARP ACLs and DHCP Snooping Entries 1460 Logging of Dropped Packets 1460 Default Dynamic ARP Inspection Configuration 1460 Relative Priority of ARP ACLs and DHCP Snooping Entries 1461 Configuring ARP ACLs for Non-DHCP Environments 1461 Configuring Dynamic ARP Inspection in DHCP Environments 1463 How to Limit the Rate of Incoming ARP Packets 1466 How to Perform Validation Checks 1467 Monitoring DAI 1469 Verifying the DAI Configuration 1469 Additional References 1470
Configuring IEEE 802.1x Port-Based Authentication 1471 Finding Feature Information 1471 Information About 802.1x Port-Based Authentication 1471 Port-Based Authentication Process 1472 Port-Based Authentication Initiation and Message Exchange 1474 Authentication Manager for Port-Based Authentication 1475 Port-Based Authentication Methods 1475 Per-User ACLs and Filter-Ids 1476 Port-Based Authentication Manager CLI Commands 1476 Ports in Authorized and Unauthorized States 1478 Port-Based Authentication and Switch Stacks 1479 802.1x Host Mode 1480 802.1x Multiple Authentication Mode 1480 Multi-auth Per User VLAN assignment 1481 MAC Move 1482 MAC Replace 1483 802.1x Accounting 1483 802.1x Accounting Attribute-Value Pairs 1484

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxi

Contents

802.1x Readiness Check 1485 Switch-to-RADIUS-Server Communication 1485 802.1x Authentication with VLAN Assignment 1485 802.1x Authentication with Per-User ACLs 1487 802.1x Authentication with Downloadable ACLs and Redirect URLs 1488
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL 1489 Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs 1490 VLAN ID-based MAC Authentication 1490 802.1x Authentication with Guest VLAN 1490 802.1x Authentication with Restricted VLAN 1491 802.1x Authentication with Inaccessible Authentication Bypass 1492 Inaccessible Authentication Bypass Support on Multiple-Authentication Ports 1493 Inaccessible Authentication Bypass Authentication Results 1493 Inaccessible Authentication Bypass Feature Interactions 1493 802.1x Critical Voice VLAN 1494 802.1x User Distribution 1494 802.1x User Distribution Configuration Guidelines 1495 IEEE 802.1x Authentication with Voice VLAN Ports 1495 IEEE 802.1x Authentication with Port Security 1496 IEEE 802.1x Authentication with Wake-on-LAN 1496 IEEE 802.1x Authentication with MAC Authentication Bypass 1497 Network Admission Control Layer 2 IEEE 802.1x Validation 1498 Flexible Authentication Ordering 1498 Open1x Authentication 1498 Multidomain Authentication 1499 802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) 1500 Voice Aware 802.1x Security 1501 Common Session ID 1501 How to Configure 802.1x Port-Based Authentication 1502 Default 802.1x Authentication Configuration 1502 802.1x Authentication Configuration Guidelines 1504 802.1x Authentication 1504 VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
1505

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxii

Contents
MAC Authentication Bypass 1506 Maximum Number of Allowed Devices Per Port 1506 Configuring 802.1x Readiness Check 1506 Configuring Voice Aware 802.1x Security 1507 Configuring 802.1x Violation Modes 1509 Configuring 802.1x Authentication 1510 Configuring 802.1x Port-Based Authentication 1511 Configuring the Switch-to-RADIUS-Server Communication 1513 Configuring the Host Mode 1515 Configuring Periodic Re-Authentication 1516 Changing the Quiet Period 1517 Changing the Switch-to-Client Retransmission Time 1519 Setting the Switch-to-Client Frame-Retransmission Number 1520 Setting the Re-Authentication Number 1521 Enabling MAC Move 1522 Enabling MAC Replace 1523 Configuring 802.1x Accounting 1524 Configuring a Guest VLAN 1526 Configuring a Restricted VLAN 1527 Configuring Number of Authentication Attempts on a Restricted VLAN 1529 Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN 1530 Example of Configuring Inaccessible Authentication Bypass 1534 Configuring 802.1x Authentication with WoL 1534 Configuring MAC Authentication Bypass 1535 Formatting a MAC Authentication Bypass Username and Password 1536 Configuring 802.1x User Distribution 1537 Example of Configuring VLAN Groups 1538 Configuring NAC Layer 2 802.1x Validation 1539 Configuring an Authenticator Switch with NEAT 1541 Configuring a Supplicant Switch with NEAT 1543 Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs 1545 Configuring Downloadable ACLs 1545 Configuring a Downloadable Policy 1547 Configuring VLAN ID-based MAC Authentication 1549
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxiii

Contents

CHAPTER 75

Configuring Flexible Authentication Ordering 1550 Configuring Open1x 1551 Disabling 802.1x Authentication on the Port 1553 Resetting the 802.1x Authentication Configuration to the Default Values 1554 Monitoring 802.1x Statistics and Status 1555 Additional References 1556 Feature Information for 802.1x Port-Based Authentication 1557
Configuring Web-Based Authentication 1559 Finding Feature Information 1559 Information About Web-Based Authentication 1559 Device Roles 1560 Host Detection 1560 Session Creation 1561 Authentication Process 1561 Local Web Authentication Banner 1561 Web Authentication Customizable Web Pages 1564 Guidelines 1564 Authentication Proxy Web Page Guidelines 1565 Redirection URL for Successful Login Guidelines 1566 Web-based Authentication Interactions with Other Features 1566 Port Security 1566 LAN Port IP 1566 Gateway IP 1567 ACLs 1567 Context-Based Access Control 1567 EtherChannel 1567 How to Configure Web-Based Authentication 1567 Default Web-Based Authentication Configuration 1567 Web-Based Authentication Configuration Guidelines and Restrictions 1568 Web-Based Authentication Configuration Task List 1569 Configuring the Authentication Rule and Interfaces 1569 Configuring AAA Authentication 1571 Configuring Switch-to-RADIUS-Server Communication 1573

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxiv

CHAPTER 76

Configuring the HTTP Server 1575 Customizing the Authentication Proxy Web Pages 1576 Specifying a Redirection URL for Successful Login 1578
Configuring the Web-Based Authentication Parameters 1579 Configuring a Web Authentication Local Banner 1579 Removing Web-Based Authentication Cache Entries 1580 Monitoring Web-Based Authentication Status 1581 Feature Information for Web-Based Authentication 1581
Configuring Port-Based Traffic Control 1583 Overview of Port-Based Traffic Control 1584 Finding Feature Information 1584 Information About Storm Control 1584 Storm Control 1584 How Traffic Activity is Measured 1584 Traffic Patterns 1585 How to Configure Storm Control 1586 Configuring Storm Control and Threshold Levels 1586 Finding Feature Information 1588 Information About Protected Ports 1588 Protected Ports 1588 Default Protected Port Configuration 1589 Protected Ports Guidelines 1589 How to Configure Protected Ports 1589 Configuring a Protected Port 1589 Monitoring Protected Ports 1590 Where to Go Next 1590 Additional References 1591 Feature Information 1591 Finding Feature Information 1591 Information About Port Blocking 1592 Port Blocking 1592 How to Configure Port Blocking 1592 Blocking Flooded Traffic on an Interface 1592

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxv

Contents

CHAPTER 77

Monitoring Port Blocking 1594 Where to Go Next 1594 Additional References 1594 Feature Information 1595 Prerequisites for Port Security 1595 Restrictions for Port Security 1595 Information About Port Security 1595
Port Security 1595 Types of Secure MAC Addresses 1596 Sticky Secure MAC Addresses 1596 Security Violations 1596 Port Security Aging 1598 Port Security and Switch Stacks 1598 Default Port Security Configuration 1598 Port Security Configuration Guidelines 1598 Overview of Port-Based Traffic Control 1600 How to Configure Port Security 1600 Enabling and Configuring Port Security 1600 Enabling and Configuring Port Security Aging 1605 Configuration Examples for Port Security 1606 Additional References 1607 Finding Feature Information 1608 Information About Protocol Storm Protection 1608 Protocol Storm Protection 1608 Default Protocol Storm Protection Configuration 1609 How to Configure Protocol Storm Protection 1609 Enabling Protocol Storm Protection 1609 Monitoring Protocol Storm Protection 1610 Additional References 1610
Configuring IPv6 First Hop Security 1613 Finding Feature Information 1613 Prerequisites for First Hop Security in IPv6 1613 Restrictions for First Hop Security in IPv6 1613

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxvi

Contents

CHAPTER 78 CHAPTER 79

Information about First Hop Security in IPv6 1614 How to Configure an IPv6 Snooping Policy 1616
How to Attach an IPv6 Snooping Policy to an Interface 1618 How to Attach an IPv6 Snooping Policy to a Layer 2 EtherChannel Interface 1619 How to Attach an IPv6 Snooping Policy to VLANs Globally 1620 How to Configure the IPv6 Binding Table Content 1621 How to Configure an IPv6 Neighbor Discovery Inspection Policy 1622 How to Attach an IPv6 Neighbor Discovery Inspection Policy to an Interface 1624 How to Attach an IPv6 Neighbor Discovery Inspection Policy to a Layer 2 EtherChannel Interface
1625 How to Attach an IPv6 Neighbor Discovery Inspection Policy to VLANs Globally 1626 How to Configure an IPv6 Router Advertisement Guard Policy 1627 How to Attach an IPv6 Router Advertisement Guard Policy to an Interface 1629 How to Attach an IPv6 Router Advertisement Guard Policy to a Layer 2 EtherChannel Interface
1630 How to Attach an IPv6 Router Advertisement Guard Policy to VLANs Globally 1631 How to Configure an IPv6 DHCP Guard Policy 1632 How to Attach an IPv6 DHCP Guard Policy to an Interface or a VLAN on an Interface 1634 How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface 1635 How to Attach an IPv6 DHCP Guard Policy to VLANs Globally 1637 Additional References 1637
Configuring Cisco TrustSec 1639 Configuring Cisco TrustSec 1639 Finding Feature Information 1639 Information About Cisco TrustSec 1640 Restrictions for Cisco TrustSec 1641 Feature Information for Cisco TrustSec 1642 Additional References 1642
Configuring Wireless Guest Access 1645 Finding Feature Information 1645 Prerequisites for Guest Access 1645 Restrictions for Guess Access 1646

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxvii

Contents

Information about Wireless Guest Access 1646 Fast Secure Roaming 1646 How to Configure Guest Access 1647
Creating a Lobby Administrator Account 1647 Configuring Guest User Accounts 1648 Configuring Mobility Agent (MA) 1649 Configuring Mobility Controller 1650 Obtaining a Web Authentication Certificate 1652 Displaying a Web Authentication Certificate 1652 Choosing the Default Web Authentication Login Page 1653 Choosing a Customized Web Authentication Login Page from an External Web Server 1654 Assigning Login, Login Failure, and Logout Pages per WLAN 1656 Configuring AAA-Override 1657 Configuring Client Load Balancing 1658 Configuring Preauthentication ACL 1659 Configuring IOS ACL Definition 1660 Configuring Webpassthrough 1661 Configuration Examples for Guest Access 1662 Example: Creating a Lobby Ambassador Account 1662 Example: Obtaining Web Authentication Certificate 1662 Example: Displaying a Web Authentication Certificate 1664 Example: Configuring Guest User Accounts 1664 Example: Configuring Mobility Controller 1665 Example: Choosing the Default Web Authentication Login Page 1665 Example: Choosing a Customized Web Authentication Login Page from an External Web Server
1666 Example: Assigning Login, Login Failure, and Logout Pages per WLAN 1666 Example: Configuring AAA-Override 1667 Example: Configuring Client Load Balancing 1667 Example: Configuring Preauthentication ACL 1667 Example: Configuring IOS ACL Definition 1668 Example: Configuring Webpassthrough 1668 Additional References for Guest Access 1668 Feature History and Information for Guest Access 1669

lxviii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents

CHAPTER 80 CHAPTER 81 CHAPTER 82

Managing Rogue Devices 1671 Finding Feature Information 1671 Information About Rogue Devices 1671 How to Configure Rogue Detection 1674 Configuring Rogue Detection (CLI) 1674 Configuring Rogue Detection (GUI) 1675 Monitoring Rogue Detection 1676 Examples: Rogue Detection Configuration 1677 Additional References for Rogue Detection 1677 Feature History and Information For Performing Rogue Detection Configuration 1678
Classifying Rogue Access Points 1679 Finding Feature Information 1679 Information About Classifying Rogue Access Points 1679 Restrictions for Classifying Rogue Access Points 1682 How to Classify Rogue Access Points 1683 Configuring Rogue Classification Rules (CLI) 1683 Configuring Rogue Classification Rules (GUI) 1686 Viewing and Classifying Rogue Devices (GUI) 1688 Examples: Classifying Rogue Access Points 1690 Additional References for Classifying Rogue Access Points 1690 Feature History and Information For Classifying Rogue Access Points 1691
Configuring wIPS 1693 Finding Feature Information 1693 Information About wIPS 1693 How to Configure wIPS on an Access Point 1700 Configuring wIPS on an Access Point (CLI) 1700 Configuring wIPS on an Access Point (GUI) 1701 Monitoring wIPS Information 1701 Examples: wIPS Configuration 1701 Additional References for Configuring wIPS 1702 Feature History for Performing wIPS Configuration 1702

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxix

Contents

CHAPTER 83
PART XIV CHAPTER 84

Configuring Intrusion Detection System 1703 Finding Feature Information 1703 Information About Intrusion Detection System 1703 How to Configure Intrusion Detection System 1704 Configuring IDS Sensors 1704 Monitoring Intrusion Detection System 1705
Stack Manager and High Availability 1707
Managing Switch Stacks 1709 Finding Feature Information 1709 Prerequisites for Switch Stacks 1709 Restrictions for Switch Stacks 1709 Information About Switch Stacks 1710 Switch Stack Overview 1710 Supported Features in a Switch Stack 1710 Switch Stack Membership 1711 Changes to Switch Stack Membership 1711 Stack Member Numbers 1712 Stack Member Priority Values 1713 Switch Stack Bridge ID and MAC Address 1713 Persistent MAC Address on the Switch Stack 1713 Active and Standby Switch Election and Reelection 1713 Switch Stack Configuration Files 1714 Offline Configuration to Provision a Stack Member 1715 Effects of Adding a Provisioned Switch to a Switch Stack 1716 Effects of Replacing a Provisioned Switch in a Switch Stack 1717 Effects of Removing a Provisioned Switch from a Switch Stack 1717 Upgrading a Switch Running Incompatible Software 1717 Auto-Upgrade 1717 Auto-Advise 1718 SDM Template Mismatch in Switch Stacks 1719 Switch Stack Management Connectivity 1720

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxx

Contents

CHAPTER 85

Connectivity to Specific Stack Members 1720 Connectivity to the Switch Stack Through an IP Address 1720 Connectivity to the Switch Stack Through Console Ports or Ethernet Management Ports 1720 How to Configure a Switch Stack 1721 Default Switch Stack Configuration 1721 Enabling the Persistent MAC Address Feature 1721 Assigning a Stack Member Number 1722 Setting the Stack Member Priority Value 1723 Provisioning a New Member for a Switch Stack 1724 Removing Provisioned Switch Information 1725 Displaying Incompatible Switches in the Switch Stack 1726 Upgrading an Incompatible Switch in the Switch Stack 1727 Troubleshooting the Switch Stack 1727 Accessing the Diagnostic Console of a Stack Member 1727 Temporarily Disabling a Stack Port 1728 Reenabling a Stack Port While Another Member Starts 1729 Monitoring the Switch Stack 1729 Configuration Examples for Switch Stacks 1730 Switch Stack Configuration Scenarios 1730 Enabling the Persistent MAC Address Feature: Example 1731 Provisioning a New Member for a Switch Stack: Example 1732 show switch stack-ports summary Command Output: Example 1732 Software Loopback: Examples 1734 Software Loopback with Connected Stack Cables: Examples 1735 Software Loopback with no Connected Stack Cable: Example 1735 Finding a Disconnected Stack Cable: Example 1735 Fixing a Bad Connection Between Stack Ports: Example 1736 Additional References for Switch Stacks 1737 Feature History and Information for Switch Stacks 1738
Configuring Cisco NSF with SSO 1739 Finding Feature Information 1739 Prerequisites for NSF with SSO 1739 Restrictions for NSF with SSO 1740

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxi

Contents

CHAPTER 86

Information About NSF with SSO 1740 Overview of NSF with SSO 1740 SSO Operation 1740 NSF Operation 1742 Cisco Express Forwarding 1742 BGP Operation 1743 OSPF Operation 1744 EIGRP Operation 1744
How to Configure Cisco NSF with SSO 1745 Configuring SSO 1745 Configuring SSO Example 1746 Configuring CEF NSF 1746 Verifying CEF NSF 1746 Configuring BGP for NSF 1747 Verifying BGP NSF 1748 Configuring OSPF NSF 1749 Verifying OSPF NSF 1749 Configuring EIGRP NSF 1750 Verifying EIGRP NSF 1751
Additional References for NSF with SSO 1752 Feature History and Information for NSF with SSO 1753
Configuring Wireless High Availability 1755 Finding Feature Information 1755 Information about High Availability 1755 Information about Access Point Stateful Switch Over 1755 Initiating Graceful Switchover 1756 Configuring EtherChannels 1756 Configuring LACP 1756 Troubleshooting High Availability 1758 Access the Standby Console 1758 Before a Switchover 1759 After a Switchover 1760 Monitoring the Switch Stack 1761

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxii

PART XV CHAPTER 87

LACP Configuration: Example 1761 Flex Link Configuration: Example 1763 Viewing Redundancy Switchover History (GUI) 1765 Viewing Switchover States (GUI) 1766
System Management 1769
Administering the System 1771 Finding Feature Information 1771 Information About Administering the Switch 1771 System Time and Date Management 1771 System Clock 1771 Network Time Protocol 1772 NTP Stratum 1772 NTP Associations 1772 NTP Security 1772 NTP Implementation 1773 NTP Version 4 1773 System Name and Prompt 1774 Stack System Name and Prompt 1774 Default System Name and Prompt Configuration 1774 DNS 1774 Default DNS Settings 1774 Login Banners 1775 Default Banner Configuration 1775 MAC Address Table 1775 MAC Address Table Creation 1775 MAC Addresses and VLANs 1776 MAC Addresses and Switch Stacks 1776 Default MAC Address Table Settings 1776 ARP Table Management 1776 How to Administer the Switch 1777 Configuring the Time and Date Manually 1777 Setting the System Clock 1777

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

lxxiii

Contents

CHAPTER 88

Configuring the Time Zone 1777 Configuring Summer Time (Daylight Saving Time) 1778 Configuring a System Name 1779 Setting Up DNS 1780 Configuring a Message-of-the-Day Login Banner 1781 Configuring a Login Banner 1782 Managing the MAC Address Table 1783 Changing the Address Aging Time 1783 Configuring MAC Address Change Notification Traps 1784 Configuring MAC Address Move Notification Traps 1785 Configuring MAC Threshold Notification Traps 1787 Adding and Removing Static Address Entries 1788 Configuring Unicast MAC Address Filtering 1789 Monitoring and Maintaining Administration of the Switch 1790 Configuration Examples for Switch Administration 1791 Example: Setting the System Clock 1791 Examples: Configuring Summer Time 1791 Example: Configuring a MOTD Banner 1791 Example: Configuring a Login Banner 1792 Example: Configuring MAC Address Change Notification Traps 1792 Example: Configuring MAC Threshold Notification Traps 1792 Example: Adding the Static Address to the MAC Address Table 1792 Example: Configuring Unicast MAC Address Filtering 1793 Additional References for Switch Administration 1793 Feature History and Information for Switch Administration 1794
Performing Switch Setup Configuration 1795 Finding Feature Information 1795 Information About Performing Switch Setup Configuration 1795 Switch Boot Process 1795 Software Installer Features 1796 Software Boot Modes 1797 Installed Boot Mode 1797 Bundle Boot Mode 1797

lxxiv

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents
Boot Mode for a Switch Stack 1798 Switches Information Assignment 1798 Default Switch Information 1799 DHCP-Based Autoconfiguration Overview 1799
DHCP Client Request Process 1800 DHCP-based Autoconfiguration and Image Update 1801
Restrictions for DHCP-based Autoconfiguration 1801 DHCP Autoconfiguration 1801 DHCP Auto-Image Update 1802 DHCP Server Configuration Guidelines 1802 Purpose of the TFTP Server 1803 Purpose of the DNS Server 1803 How to Obtain Configuration Files 1803 How to Control Environment Variables 1804 Common Environment Variables 1805 Environment Variables for TFTP 1806 Scheduled Reload of the Software Image 1807 How to Perform Switch Setup Configuration 1807 Configuring DHCP Autoconfiguration (Only Configuration File) 1807 Configuring DHCP Auto-Image Update (Configuration File and Image) 1809 Configuring the Client to Download Files from DHCP Server 1813 Manually Assigning IP Information to Multiple SVIs 1814 Modifying the Switch Startup Configuration 1816 Specifying the Filename to Read and Write the System Configuration 1816 Manually Booting the Switch 1817 Booting the Switch in Installed Mode 1818 Booting the Switch in Bundle Mode 1820 Booting a Specific Software Image On a Switch Stack 1820 Configuring a Scheduled Software Image Reload 1821 Monitoring Switch Setup Configuration 1823 Example: Verifying the Switch Running Configuration 1823 Examples: Displaying Software Bootup in Install Mode 1823 Example: Emergency Installation 1825 Configuration Examples for Performing Switch Setup 1827
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxv

Contents

CHAPTER 89

Example: Configuring a Switch as a DHCP Server 1827 Example: Configuring DHCP Auto-Image Update 1827 Example: Configuring a Switch to Download Configurations from a DHCP Server 1827 Examples: Scheduling Software Image Reload 1828 Additional References For Performing Switch Setup 1828 Feature History and Information For Performing Switch Setup Configuration 1829
Configuring Right-To-Use Licenses 1831 Finding Feature Information 1831 Restrictions for Configuring RTU Licenses 1831 Information About Configuring RTU Licenses 1832 Right-To-Use Licensing 1832 Right-To-Use Image Based Licenses 1832 Right-To-Use License States 1832 License Activation for Switch Stacks 1833 Mobility Controller Mode 1833 Right-To-Use AP-Count Licensing 1833 Right-to-Use AP-Count Evaluation Licenses 1834 Right-To-Use Adder AP-Count Rehosting Licenses 1835 How to Configure RTU Licenses 1835 Activating an Imaged Based License 1835 Activating an AP-Count License 1836 Obtaining an Upgrade or Capacity Adder License 1837 Rehosting a License 1838 Changing Mobility Mode 1838 Monitoring and Maintaining RTU Licenses 1840 Configuration Examples for RTU Licensing 1840 Examples: Activating RTU Image Based Licenses 1840 Examples: Displaying RTU Licensing Information 1841 Example: Displaying RTU License Details 1842 Example: Displaying RTU License Mismatch 1843 Example: Displaying RTU Licensing Usage 1843 Additional References for RTU Licensing 1844 Feature History and Information for RTU Licensing 1845

lxxvi

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents

CHAPTER 90 CHAPTER 91

Configuring Administrator Usernames and Passwords 1847 Finding Feature Information 1847 Information About Configuring Administrator Usernames and Passwords 1847 Configuring Administrator Usernames and Passwords 1848 Examples: Administrator Usernames and Passwords Configuration 1850 Additional References for Administrator Usernames and Passwords 1850 Feature History and Information For Performing Administrator Usernames and Passwords Configuration 1851
Configuring 802.11 parameters and Band Selection 1853 Finding Feature Information 1853 Restrictions on Band Selection, 802.11 Bands, and Parameters 1853 Information About Configuring Band Selection, 802.11 Bands, and Parameters 1854 Band Selection 1854 802.11 Bands 1854 802.11n Parameter 1854 802.11h Parameter 1855 How to Configure 802.11 Bands and Parameters 1855 Configuring Band Selection (CLI) 1855 Configuring the 802.11 Bands (CLI) 1856 Configuring the 802.11 Bands (GUI) 1859 Configuring 802.11n Parameters (CLI) 1860 Configuring the 802.11n Parameters (GUI) 1862 Configuring 802.11h Parameters (CLI) 1864 Configuring the 802.11h Parameters (GUI) 1864 Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters 1865 Monitoring Configuration Settings Using Band Selection and 802.11 Bands Commands 1865 Example: Viewing the Configuration Settings for 5-GHz Band 1865 Example: Viewing the Configuration Settings for 24-GHz Band 1867 Example: Viewing the status of 802.11h Parameters 1869 Example: Verifying the Band Selection Settings 1869 Configuration Examples for Band Selection, 802.11 Bands, and Parameters 1869 Examples: Band Selection Configuration 1869

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

lxxvii

Contents

CHAPTER 92 CHAPTER 93

Examples: 802.11 Bands Configuration 1870 Examples: 802.11n Configuration 1870 Examples: 802.11h Configuration 1871 Additional References for 802.11 Parameters and Band Selection 1871 Feature History and Information For Performing 802.11 parameters and Band Selection Configuration 1872
Configuring Aggressive Load Balancing 1873 Finding Feature Information 1873 Restrictions for Aggressive Load Balancing 1873 Information for Configuring Aggressive Load Balancing Parameters 1874 Aggressive Load Balancing 1874 How to Configure Aggressive Load Balancing 1875 Configuring Aggressive Load Balancing 1875 Monitoring Aggressive Load Balancing 1876 Examples: Aggressive Load Balancing Configuration 1876 Additional References for Aggressive Load Balancing 1877 Feature History and Information For Performing Aggressive Load Balancing Configuration 1878
Configuring Client Roaming 1879 Finding Feature Information 1879 Restrictions for Configuring Client Roaming 1879 Information About Client Roaming 1879 Inter-Subnet Roaming 1881 Voice-over-IP Telephone Roaming 1881 CCX Layer 2 Client Roaming 1881 How to Configure Layer 2 or Layer 3 Roaming 1882 Configuring Layer 2 or Layer 3 Roaming 1882 Configuring CCX Client Roaming Parameters (CLI) 1883 Configuring Mobility Oracle 1885 Configuring Mobility Controller 1885 Configuring Mobility Agent 1888 Monitoring Client Roaming Parameters 1889 Monitoring Mobility Configurations 1889

lxxviii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents

CHAPTER 94 CHAPTER 95

Additional References for Configuring Client Roaming 1890 Feature History and Information For Performing Client Roaming Configuration 1891
Configuring Application Visibility and Control 1893 Finding Feature Information 1893 Information About Application Visibility and Control 1893 Supported AVC Class Map and Policy Map Formats 1894 Prerequisites for Application Visibility and Control 1896 Guidelines for Inter-Switch Roaming with Application Visibility and Control 1896 Restrictions for Application Visibility and Control 1897 How to Configure Application Visibility and Control 1897 Configuring Application Visibility and Control (CLI) 1897 Creating a Flow Record 1897 Creating a Flow Exporter (Optional) 1899 Creating a Flow Monitor 1901 Creating AVC QoS Policy 1902 Configuring WLAN to Apply Flow Monitor in IPV4 Input/Output Direction 1912 Configuring Application Visibility and Control (GUI) 1912 Configuring Application Visibility (GUI) 1912 Configuring Application Visibility and Control (GUI) 1913 Monitoring Application Visibility and Control 1914 Monitoring Application Visibility and Control (CLI) 1914 Monitoring Application Visibility and Control (GUI) 1916 Monitoring SSID and Client Policies Statistics (GUI) 1917 Examples: Application Visibility and Control 1917 Examples: Application Visibility Configuration 1917 Examples: Application Visibility and Control QoS Configuration 1918 Example: Configuring QoS Attribute for Local Profiling Policy 1920 Additional References for Application Visibility and Control 1920 Feature History and Information For Application Visibility and Control 1921
Configuring Voice and Video Parameters 1923 Finding Feature Information 1923 Prerequisites for Voice and Video Parameters 1923

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

lxxix

Contents

CHAPTER 96 CHAPTER 97

Restrictions for Voice and Video Parameters 1923 Information About Configuring Voice and Video Parameters 1924
Call Admission Control 1924 Static-Based CAC 1924 Load-Based CAC 1925
IOSd Call Admission Control 1925 Expedited Bandwidth Requests 1926 U-APSD 1926 Traffic Stream Metrics 1927 Information About Configuring Voice Prioritization Using Preferred Call Numbers 1927 Information About EDCA Parameters 1928 How to Configure Voice and Video Parameters 1928 Configuring Voice Parameters (CLI) 1928 Configuring Video Parameters (CLI) 1931 Configuring SIP-Based CAC (CLI) 1934 Configuring a Preferred Call Number (CLI) 1936 Configuring EDCA Parameters (CLI) 1937 Configuring EDCA Parameters (GUI) 1939 Monitoring Voice and Video Parameters 1939 Additional References for Voice and Video Parameters 1942 Feature History and Information For Performing Voice and Video Parameters Configuration 1943
Configuring RFID Tag Tracking 1945 Finding Feature Information 1945 Information About Configuring RFID Tag Tracking 1945 How to Configure RFID Tag Tracking 1945 Configuring RFID Tag Tracking (CLI) 1945 Monitoring RFID Tag Tracking Information 1946 Additional References RFID Tag Tracking 1947 Feature History and Information For Performing RFID Tag Tracking Configuration 1948
Configuring Location Settings 1949 Finding Feature Information 1949 Information About Configuring Location Settings 1949

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) lxxx

Contents

CHAPTER 98 CHAPTER 99

How to Configure Location Settings 1950 Configuring Location Settings (CLI) 1950 Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues (CLI) 1952 Modifying the NMSP Notification threshold for Clients, RFID Tags, and Rogues (CLI) 1953
Monitoring Location Settings and NMSP Settings 1954 Monitoring Location Settings (CLI) 1954 Monitoring NMSP Settings (CLI) 1954
Examples: Location Settings Configuration 1955 Examples: NMSP Settings Configuration 1955 Additional References for Location Settings 1956 Feature History and Information For Performing Location Settings Configuration 1957
Monitoring Flow Control 1959 Finding Feature Information 1959 Information About Flow Control 1959 Monitoring Flow Control 1959 Examples: Monitoring Flow Control 1960 Additional References for Monitoring Flow Control 1961 Feature History and Information For Monitoring Flow Control 1961
Configuring SDM Templates 1963 Finding Feature Information 1963 Information About Configuring SDM Templates 1963 SDM Templates 1963 SDM Templates and Switch Stacks 1965 How to Configure SDM Templates 1965 Configuring SDM Templates 1965 Configuring the Switch SDM Template 1965 Monitoring and Maintaining SDM Templates 1966 Configuration Examples for Configuring SDM Templates 1966 Examples: Configuring SDM Templates 1966 Examples: Displaying SDM Templates 1966 Feature History and Information for Configuring SDM Templates 1967

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

lxxxi

Contents

CHAPTER 100

Configuring System Message Logs 1969 Finding Feature Information 1969 Restrictions for Configuring System Message Logs 1969 Information About Configuring System Message Logs 1969 System Messsage Logging 1969 System Log Message Format 1970 Default System Message Logging Settings 1971 Syslog Message Limits 1972 Enabling Syslog Trap Messages 1972 How to Configure System Message Logs 1972 Setting the Message Display Destination Device 1972 Synchronizing Log Messages 1974 Disabling Message Logging 1975 Enabling and Disabling Time Stamps on Log Messages 1976 Enabling and Disabling Sequence Numbers in Log Messages 1977 Defining the Message Severity Level 1978 Limiting Syslog Messages Sent to the History Table and to SNMP 1979 Logging Messages to a UNIX Syslog Daemon 1980 Monitoring and Maintaining System Message Logs 1981 Monitoring Configuration Archive Logs 1981 Configuration Examples for System Message Logs 1981 Example: Stacking System Message 1981 Example: Switch System Message 1982 Additional References for System Message Logs 1982 Feature History and Information For System Message Logs 1983

CHAPTER 101

Configuring Online Diagnostics 1985 Finding Feature Information 1985 Information About Configuring Online Diagnostics 1985 Online Diagnostics 1985 How to Configure Online Diagnostics 1986 Starting Online Diagnostic Tests 1986 Configuring Online Diagnostics 1987

lxxxii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents

Scheduling Online Diagnostics 1987 Configuring Health-Monitoring Diagnostics 1988 Monitoring and Maintaining Online Diagnostics 1990 Displaying Online Diagnostic Tests and Test Results 1990 Configuration Examples for Online Diagnostic Tests 1991 Examples: Start Diagnostic Tests 1991 Example: Configure a Health Monitoring Test 1991 Examples: Schedule Diagnostic Test 1991 Examples: Displaying Online Diagnostics 1991 Additional References for Online Diagnostics 1993 Feature History and Information for Configuring Online Diagnostics 1994

CHAPTER 102

Managing Configuration Files 1995 Prerequisites for Managing Configuration Files 1995 Restrictions for Managing Configuration Files 1995 Information About Managing Configuration Files 1995 Types of Configuration Files 1995 Configuration Mode and Selecting a Configuration Source 1996 Configuration File Changes Using the CLI 1996 Location of Configuration Files 1996 Copy Configuration Files from a Network Server to the Switch 1997 Copying a Configuration File from the Switch to a TFTP Server 1997 Copying a Configuration File from the Switch to an RCP Server 1997 Copying a Configuration File from the Switch to an FTP Server 1999 Configuration Files Larger than NVRAM 2000 Compressing the Configuration File 2000 Storing the Configuration in Flash Memory on Class A Flash File Systems 2000 Loading the Configuration Commands from the Network 2001 Configuring the Switch to Download Configuration Files 2001 Network Versus Host Configuration Files 2001 How to Manage Configuration File Information 2001 Displaying Configuration File Information (CLI) 2001 Modifying the Configuration File (CLI) 2002 Copying a Configuration File from the Switch to a TFTP Server (CLI) 2004

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

lxxxiii

Contents

What to Do Next 2005 Copying a Configuration File from the Switch to an RCP Server (CLI) 2005
Examples 2006 What to Do Next 2007 Copying a Configuration File from the Switch to the FTP Server (CLI) 2007 Examples 2008 What to Do Next 2009 Copying a Configuration File from a TFTP Server to the Switch (CLI) 2009 What to Do Next 2010 Copying a Configuration File from the rcp Server to the Switch (CLI) 2010 Examples 2011 What to Do Next 2012 Copying a Configuration File from an FTP Server to the Switch (CLI) 2012 Examples 2013 What to Do Next 2014 Maintaining Configuration Files Larger than NVRAM 2014 Compressing the Configuration File (CLI) 2014 Storing the Configuration in Flash Memory on Class A Flash File Systems (CLI) 2015 Loading the Configuration Commands from the Network (CLI) 2017 Copying Configuration Files from Flash Memory to the Startup or Running Configuration (CLI) 2018 Copying Configuration Files Between Flash Memory File Systems (CLI) 2019 Copying a Configuration File from an FTP Server to Flash Memory Devices (CLI) 2021 What to Do Next 2022 Copying a Configuration File from an RCP Server to Flash Memory Devices (CLI) 2022 Copying a Configuration File from a TFTP Server to Flash Memory Devices (CLI) 2023 Re-executing the Configuration Commands in the Startup Configuration File (CLI) 2023 Clearing the Startup Configuration (CLI) 2024 Deleting a Specified Configuration File (CLI) 2025 Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI) 2025 What to Do Next 2027 Configuring the Switch to Download Configuration Files 2027 Configuring the Switch to Download the Network Configuration File (CLI) 2028 Configuring the Switch to Download the Host Configuration File (CLI) 2029

lxxxiv

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents

Additional References 2030

CHAPTER 103

Configuration Replace and Configuration Rollback 2033 Prerequisites for Configuration Replace and Configuration Rollback 2033 Restrictions for Configuration Replace and Configuration Rollback 2034 Information About Configuration Replace and Configuration Rollback 2034 Configuration Archive 2034 Configuration Replace 2035 Configuration Rollback 2036 Configuration Rollback Confirmed Change 2036 Benefits of Configuration Replace and Configuration Rollback 2036 How to Use Configuration Replace and Configuration Rollback 2037 Creating a Configuration Archive (CLI) 2037 Performing a Configuration Replace or Configuration Rollback Operation (CLI) 2039 Monitoring and Troubleshooting the Feature (CLI) 2041 Configuration Examples for Configuration Replace and Configuration Rollback 2043 Creating a Configuration Archive 2043 Replacing the Current Running Configuration with a Saved Cisco IOS Configuration File 2043 Reverting to the Startup Configuration File 2044 Performing a Configuration Replace Operation with the configure confirm Command 2044 Performing a Configuration Rollback Operation 2044 Additional References 2045

CHAPTER 104

Working with the Flash File System 2049 Information About the Flash File System 2049 Displaying Available File Systems 2049 Setting the Default File System 2052 Displaying Information About Files on a File System 2052 Changing Directories and Displaying the Working Directory (CLI) 2053 Creating Directories (CLI) 2054 Removing Directories 2055 Copying Files 2055 Copying Files from One Switch in a Stack to Another Switch in the Same Stack 2055 Deleting Files 2057

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

lxxxv

Contents

Creating, Displaying and Extracting Files (CLI) 2057 Additional References 2059

CHAPTER 105

Working with Cisco IOS XE Software Bundles 2061 About Software Bundles and Packages 2061 Bundle and Package File Location on the Switch 2061 Upgrading Cisco IOS XE Software 2062 Upgrading Cisco IOS XE Software: Install Mode 2062 Upgrading Cisco IOS XE Software Install Mode Example 2062 Upgrading Cisco IOS XE Software: Bundle Mode 2063 Upgrading Cisco IOS XE Software Bundle Mode Example 2063 Converting from the Bundle Running Mode to the Install Running Mode 2064 Converting from the Bundle Running Mode to the Install Running Mode Example 2064 Copying IOS XE Package and Bundle Files from One Stack Member to Another 2065 Copying IOS XE Package and Bundle Files from One Stack Member to Another Example 2065 Upgrading a Switch Running Incompatible Software 2067 Upgrading a Switch Running Incompatible Software Example 2067 Upgrading a Switch Running in Incompatible Running Mode 2068 Upgrading a Switch Running in Incompatible Running Mode Example 2068 Additional References 2070

CHAPTER 106

Troubleshooting the Software Configuration 2073 Finding Feature Information 2073 Information About Troubleshooting the Software Configuration 2073 Software Failure on a Switch 2073 Lost or Forgotten Password on a Switch 2074 Power over Ethernet Ports 2074 Disabled Port Caused by Power Loss 2074 Disabled Port Caused by False Link-Up 2075 Ping 2075 Layer 2 Traceroute 2075 Layer 2 Traceroute Guidelines 2075 IP Traceroute 2076 Time Domain Reflector Guidelines 2077

lxxxvi

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

Contents
Debug Commands 2078 Crashinfo Files 2078
System Reports 2079 Onboard Failure Logging on the Switch 2079 Fan Failures 2080 Possible Symptoms of High CPU Utilization 2080 How to Troubleshoot the Software Configuration 2081 Recovering from a Software Failure 2081 Recovering from a Lost or Forgotten Password 2083
Procedure with Password Recovery Enabled 2084 Procedure with Password Recovery Disabled 2086 Preventing Switch Stack Problems 2087 Preventing Autonegotiation Mismatches 2088 Troubleshooting SFP Module Security and Identification 2089 Monitoring SFP Module Status 2089 Executing Ping 2089 Monitoring Temperature 2090 Monitoring the Physical Path 2090 Executing IP Traceroute 2090 Running TDR and Displaying the Results 2091 Redirecting Debug and Error Message Output 2091 Using the show platform forward Command 2091 Configuring OBFL 2091 Verifying Troubleshooting of the Software Configuration 2092 Displaying OBFL Information 2092 Example: Verifying the Problem and Cause for High CPU Utilization 2093 Scenarios for Troubleshooting the Software Configuration 2094 Scenarios to Troubleshoot Power over Ethernet (PoE) 2094 Configuration Examples for Troubleshooting Software 2096 Example: Pinging an IP Host 2096 Example: Performing a Traceroute to an IP Host 2097 Example: Enabling All System Diagnostics 2098 Additional References for Troubleshooting Software Configuration 2098 Feature History and Information for Troubleshooting Software Configuration 2099

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

lxxxvii

Contents

PART XVI CHAPTER 107

VideoStream 2101
Configuring VideoStream 2103 Finding Feature Information 2103 Prerequisites for VideoStream 2103 Restrictions for Configuring VideoStream 2103 Information about VideoStream 2104 How to Configure VideoStream 2104 Configuring Multicast-Direct Globally for Media-Stream 2104 Configuring Media-Stream for 802.11 bands 2105 Configuring WLAN to Stream Video 2107 Deleting a Media-Stream 2108 Monitoring Media Streams 2109

CHAPTER 108

Configuring VideoStream GUI 2111 Configuring VideoStream (GUI) 2111

PART XVII CHAPTER 109

VLAN 2115
Configuring VTP 2117 Finding Feature Information 2117 Prerequisites for VTP 2117 Restrictions for VTP 2118 Information About VTP 2118 VTP 2118 VTP Domain 2119 VTP Modes 2120 VTP Advertisements 2121 VTP Version 2 2122 VTP Version 3 2122 VTP Pruning 2123 VTP and Switch Stacks 2124 VTP Configuration Guidelines 2125

lxxxviii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

VTP Configuration Requirements 2125 VTP Settings 2125 Domain Names for Configuring VTP 2125 Passwords for the VTP Domain 2126 VTP Version 2126 How to Configure VTP 2128 Configuring VTP Mode (CLI) 2128 Configuring a VTP Version 3 Password (CLI) 2129 Configuring a VTP Version 3 Primary Server (CLI) 2131 Enabling the VTP Version (CLI) 2131 Enabling VTP Pruning (CLI) 2133 Configuring VTP on a Per-Port Basis (CLI) 2134 Adding a VTP Client Switch to a VTP Domain (CLI) 2135 Monitoring VTP 2137 Configuration Examples for VTP 2138 Example: Configuring a Switch as the Primary Server 2138 Where to Go Next 2138 Additional References 2139 Feature History and Information for VTP 2140

CHAPTER 110

Configuring VLANs 2141 Finding Feature Information 2141 Prerequisites for VLANs 2141 Restrictions for VLANs 2142 Information About VLANs 2142 Logical Networks 2142 Supported VLANs 2143 VLAN Port Membership Modes 2144 VLAN Configuration Files 2145 Normal-Range VLAN Configuration Guidelines 2145 Extended-Range VLAN Configuration Guidelines 2146 How to Configure VLANs 2147 How to Configure Normal-Range VLANs 2147 Creating or Modifying an Ethernet VLAN (CLI) 2147

Contents

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

lxxxix

Contents

Deleting a VLAN (CLI) 2150 Assigning Static-Access Ports to a VLAN (CLI) 2151 How to Configure Extended-Range VLANs 2153 Creating an Extended-Range VLAN (CLI) 2153 How to Configure VLANs (GUI) 2155 Creating Layer2 VLAN (GUI) 2155 Creating Layer3 Interface (GUI) 2155 Viewing Layer2 VLAN (GUI) 2156 Viewing Layer3 Interface (GUI) 2156 Removing Layer2 VLAN (GUI) 2156 Removing Layer3 Interface (GUI) 2157 Monitoring VLANs 2158 Where to Go Next 2158 Additional References 2159 Feature History and Information for VLANs 2160

CHAPTER 111

Configuring VLAN Groups 2161 Finding Feature Information 2161 Prerequisites for VLAN Groups 2161 Restrictions for VLAN Groups 2161 Information About VLAN Groups 2162 How to Configure VLAN Groups 2162 Creating VLAN Groups (CLI) 2162 Removing VLAN Group (CLI) 2163 Creating VLAN Groups (GUI) 2163 Adding a VLAN Group to WLAN (CLI) 2164 Adding a VLAN Group to WLAN (GUI) 2164 Removing VLAN Groups (GUI) 2165 Viewing VLANs in VLAN Groups (CLI) 2165 Viewing VLAN Groups (GUI) 2165 Where to Go Next 2166 Additional References 2166 Feature History and Information for VLAN Groups 2167

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xc

Contents

CHAPTER 112

Configuring VLAN Trunks 2169 Finding Feature Information 2169 Prerequisites for VLAN Trunks 2169 Restrictions for VLAN Trunks 2170 Information About VLAN Trunks 2170 Trunking Overview 2170 Trunking Modes 2170 Layer 2 Interface Modes 2171 Allowed VLANs on a Trunk 2171 Load Sharing on Trunk Ports 2172 Network Load Sharing Using STP Priorities 2172 Network Load Sharing Using STP Path Cost 2173 Feature Interactions 2173 How to Configure VLAN Trunks 2174 Configuring an Ethernet Interface as a Trunk Port 2174 Configuring a Trunk Port (CLI) 2174 Defining the Allowed VLANs on a Trunk (CLI) 2176 Changing the Pruning-Eligible List (CLI) 2178 Configuring the Native VLAN for Untagged Traffic (CLI) 2179 Configuring Trunk Ports for Load Sharing 2180 Configuring Load Sharing Using STP Port Priorities (CLI) 2180 Configuring Load Sharing Using STP Path Cost (CLI) 2184 Where to Go Next 2187 Additional References 2187 Feature History and Information for VLAN Trunks 2188

CHAPTER 113

Configuring Voice VLANs 2189 Finding Feature Information 2189 Prerequisites for Voice VLANs 2189 Restrictions for Voice VLANs 2190 Information About Voice VLAN 2190 Voice VLANs 2190 Cisco IP Phone Voice Traffic 2191

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xci

Contents

Cisco IP Phone Data Traffic 2191 Voice VLAN Configuration Guidelines 2191 How to Configure Voice VLAN 2193 Configuring Cisco IP Phone Voice Traffic (CLI) 2193 Configuring the Priority of Incoming Data Frames (CLI) 2195 Monitoring Voice VLAN 2196 Where to Go Next 2196 Additional References 2197 Feature History and Information for Voice VLAN 2198

PART XVIII CHAPTER 114

WLAN 2199
Configuring DHCP for WLANs 2201 Finding Feature Information 2201 Prerequisites for Configuring DHCP for WLANs 2201 Restrictions for Configuring DHCP for WLANs 2202 Information About the Dynamic Host Configuration Protocol 2202 Internal DHCP Servers 2203 External DHCP Servers 2203 DHCP Assignments 2204 Information About DHCP Option 82 2204 Configuring DHCP Scopes 2205 Information About DHCP Scopes 2205 How to Configure DHCP for WLANs 2206 Configuring DHCP for WLANs (CLI) 2206 Configuring DHCP Scopes (CLI) 2208 Additional References 2209 Feature Information for DHCP for WLANs 2209

CHAPTER 115

Configuring WLAN Security 2211 Finding Feature Information 2211 Prerequisites for Layer 2 Security 2211 Information About AAA Override 2212 How to Configure WLAN Security 2212

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xcii

Contents

Configuring Static WEP + 802.1X Layer 2 Security Parameters (CLI) 2212 Configuring Static WEP Layer 2 Security Parameters (CLI) 2213 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) 2214 Configuring 802.1X Layer 2 Security Parameters (CLI) 2216 Configuring Layer 2 Parameters (GUI) 2217 Additional References 2220 Feature Information about WLAN Layer 2 Security 2221

CHAPTER 116

Configuring Access Point Groups 2223 Finding Feature Information 2223 Prerequisites for Configuring AP Groups 2223 Restrictions for Configuring Access Point Groups 2224 Information About Access Point Groups 2224 How to Configure Access Point Groups 2225 Creating Access Point Groups 2225 Assigning an Access Point to an AP Group 2227 Viewing Access Point Group 2227 Additional References 2228 Feature History and Information for Access Point Groups 2229

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xciii

Contents
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xciv

Preface

· Document Conventions, on page xcv · Related Documentation, on page xcvii · Obtaining Documentation and Submitting a Service Request, on page xcvii

Document Conventions

This document uses the following conventions:

Convention ^ or Ctrl

Description
Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For example, the key combination ^D or Ctrl-D means that you hold down the Control key while you press the D key. (Keys are indicated in capital letters but are not case sensitive.)

bold font

Commands and keywords and user-entered text appear in bold font.

Italic font

Document titles, new or emphasized terms, and arguments for which you supply values are in italic font.

Courier font Bold Courier font [x]

Terminal sessions and information the system displays appear in courier font. Bold Courier font indicates text that the user must enter. Elements in square brackets are optional.

... | [x | y]

An ellipsis (three consecutive nonbolded periods without spaces) after a syntax element indicates that the element can be repeated.
A vertical line, called a pipe, indicates a choice within a set of keywords or arguments.
Optional alternative keywords are grouped in brackets and separated by vertical bars.

{x | y}

Required alternative keywords are grouped in braces and separated by vertical bars.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xcv

Preface

Preface

Convention [x {y | z}]
string
<> [] !, #

Description Nested set of square brackets or braces indicate optional or required choices within optional or required elements. Braces and a vertical bar within square brackets indicate a required choice within an optional element.
A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.
Nonprinting characters such as passwords are in angle brackets.
Default responses to system prompts are in square brackets.
An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.

Reader Alert Conventions This document may use the following conventions for reader alerts:

Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.

Tip Means the following information will help you solve a problem.

Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.
Warning IMPORTANT SAFETY INSTRUCTIONS This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the translated safety warnings that accompanied this device. Statement 1071 SAVE THESE INSTRUCTIONS

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) xcvi

Preface

Related Documentation

Related Documentation
Note Before installing or upgrading the switch, refer to the switch release notes.
· Cisco Catalyst 3650 Switch documentation, located at: http://www.cisco.com/go/cat3650_docs
· Cisco SFP, SFP+, and QSFP+ modules documentation, including compatibility matrixes, located at: http://www.cisco.com/en/US/products/hw/modules/ps5455/tsd_products_support_series_home.html
· Error Message Decoder, located at: https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

xcvii

Obtaining Documentation and Submitting a Service Request

Preface

xcviii

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

1 C H A P T E R
Using the Command-Line Interface
· Information About Using the Command-Line Interface, on page 1 · How to Use the CLI to Configure Features, on page 5
Information About Using the Command-Line Interface
Command Modes
The Cisco IOS user interface is divided into many different modes. The commands available to you depend on which mode you are currently in. Enter a question mark (?) at the system prompt to obtain a list of commands available for each command mode. You can start a CLI session through a console connection, through Telnet, a SSH, or by using the browser. When you start a session, you begin in user mode, often called user EXEC mode. Only a limited subset of the commands are available in user EXEC mode. For example, most of the user EXEC commands are one-time commands, such as show commands, which show the current configuration status, and clear commands, which clear counters or interfaces. The user EXEC commands are not saved when the switch reboots. To have access to all commands, you must enter privileged EXEC mode. Normally, you must enter a password to enter privileged EXEC mode. From this mode, you can enter any privileged EXEC command or enter global configuration mode. Using the configuration modes (global, interface, and line), you can make changes to the running configuration. If you save the configuration, these commands are stored and used when the switch reboots. To access the various configuration modes, you must start at global configuration mode. From global configuration mode, you can enter interface configuration mode and line configuration mode. This table describes the main command modes, how to access each one, the prompt you see in that mode, and how to exit the mode.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1

Command Modes

Using the Command-Line Interface

Table 1: Command Mode Summary

Mode

Access Method Prompt

User EXEC Begin a session using Telnet, SSH, Switch>
or console.

Exit Method

About This Mode

Enter logout or quit. Use this mode to · Change terminal settings.
· Perform basic tests.
· Display system information.

Privileged While in user EXEC

EXEC

mode, enter the

Switch#

enable command.

Enter disable to exit. Use this mode to verify commands that you have entered. Use a password to protect access to this mode.

Global

While in privileged

configuration EXEC mode, enter

the configure

command.

Switch(config)#

To exit to privileged EXEC mode, enter exit or end, or press Ctrl-Z.

Use this mode to configure parameters that apply to the entire switch.

VLAN

While in global

To exit to global

configuration configuration mode, Switch(config-vlan)# configuration mode,

enter the vlan

enter the exit

vlan-id command.

command.

To return to privileged EXEC mode, press Ctrl-Z or enter end.

Use this mode to configure VLAN parameters. When VTP mode is transparent, you can create extended-range VLANs (VLAN IDs greater than 1005) and save configurations in the switch startup configuration file.

Interface While in global configuration configuration mode, Switch(config-if)#
enter the interface command (with a specific interface).

To exit to global configuration mode, enter exit.
To return to privileged EXEC mode, press Ctrl-Z or enter end.

Use this mode to configure parameters for the Ethernet ports.

Line

While in global

To exit to global

configuration configuration mode, Switch(config-line)# configuration mode,

specify a line with

enter exit.

the line vty or line console command.

To return to privileged EXEC

mode, press Ctrl-Z

or enter end.

Use this mode to configure parameters for the terminal line.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2

Using the Command-Line Interface

Using the Help System

Using the Help System
You can enter a question mark (?) at the system prompt to display a list of commands available for each command mode. You can also obtain a list of associated keywords and arguments for any command.

SUMMARY STEPS

1. help 2. abbreviated-command-entry ? 3. abbreviated-command-entry <Tab> 4. ? 5. command ? 6. command keyword ?

DETAILED STEPS

Step 1

Command or Action help Example:
Switch# help

Step 2

abbreviated-command-entry ?
Example:
Switch# di? dir disable disconnect

Step 3

abbreviated-command-entry <Tab>
Example:
Switch# sh conf<tab> Switch# show configuration

Purpose Obtains a brief description of the help system in any command mode.
Obtains a list of commands that begin with a particular character string.
Completes a partial command name.

Step 4

? Example:
Switch> ?

Lists all commands available for a particular command mode.

Step 5

command ? Example:
Switch> show ?

Lists the associated keywords for a command.

Step 6

command keyword ?

Lists the associated arguments for a keyword.

Example:

Switch(config)# cdp holdtime ? <10-255> Length of time (in sec) that receiver
must keep this packet

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 3

Understanding Abbreviated Commands

Using the Command-Line Interface

Understanding Abbreviated Commands
You need to enter only enough characters for the switch to recognize the command as unique. This example shows how to enter the show configuration privileged EXEC command in an abbreviated form:
Switch# show conf

No and Default Forms of Commands
Almost every configuration command also has a no form. In general, use the no form to disable a feature or function or reverse the action of a command. For example, the no shutdown interface configuration command reverses the shutdown of an interface. Use the command without the keyword no to reenable a disabled feature or to enable a feature that is disabled by default.
Configuration commands can also have a default form. The default form of a command returns the command setting to its default. Most commands are disabled by default, so the default form is the same as the no form. However, some commands are enabled by default and have variables set to certain default values. In these cases, the default command enables the command and sets variables to their default values.

CLI Error Messages
This table lists some error messages that you might encounter while using the CLI to configure your switch.
Table 2: Common CLI Error Messages

Error Message

Meaning

How to Get Help

% Ambiguous command: "show con"

You did not enter enough characters for your switch to recognize the command.

Reenter the command followed by a question mark (?) without any space between the command and the question mark.
The possible keywords that you can enter with the command appear.

% Incomplete command.

You did not enter all of the

Reenter the command followed by a question mark

keywords or values required by (?) with a space between the command and the

this command.

question mark.

The possible keywords that you can enter with the command appear.

% Invalid input detected at `^' marker.

You entered the command incorrectly. The caret (^) marks the point of the error.

Enter a question mark (?) to display all of the commands that are available in this command mode.
The possible keywords that you can enter with the command appear.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 4

Using the Command-Line Interface

Configuration Logging

Configuration Logging
You can log and view changes to the switch configuration. You can use the Configuration Change Logging and Notification feature to track changes on a per-session and per-user basis. The logger tracks each configuration command that is applied, the user who entered the command, the time that the command was entered, and the parser return code for the command. This feature includes a mechanism for asynchronous notification to registered applications whenever the configuration changes. You can choose to have the notifications sent to the syslog.

Note Only CLI or HTTP changes are logged.

How to Use the CLI to Configure Features

Configuring the Command History
The software provides a history or record of commands that you have entered. The command history feature is particularly useful for recalling long or complex commands or entries, including access lists. You can customize this feature to suit your needs.
Changing the Command History Buffer Size
By default, the switch records ten command lines in its history buffer. You can alter this number for a current terminal session or for all sessions on a particular line. This procedure is optional.

SUMMARY STEPS

1. terminal history [size number-of-lines]

DETAILED STEPS

Step 1

Command or Action terminal history [size number-of-lines] Example:
Switch# terminal history size 200

Purpose
Changes the number of command lines that the switch records during the current terminal session in privileged EXEC mode. You can configure the size from 0 to 256.

Recalling Commands
To recall commands from the history buffer, perform one of the actions listed in this table. These actions are optional.

Note The arrow keys function only on ANSI-compatible terminals such as VT100s.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 5

Disabling the Command History Feature

Using the Command-Line Interface

SUMMARY STEPS

1. Ctrl-P or use the up arrow key 2. Ctrl-N or use the down arrow key 3. show history

DETAILED STEPS

Step 1

Command or Action Ctrl-P or use the up arrow key

Step 2 Ctrl-N or use the down arrow key

Step 3

show history Example:
Switch# show history

Purpose
Recalls commands in the history buffer, beginning with the most recent command. Repeat the key sequence to recall successively older commands.
Returns to more recent commands in the history buffer after recalling commands with Ctrl-P or the up arrow key. Repeat the key sequence to recall successively more recent commands.
Lists the last several commands that you just entered in privileged EXEC mode. The number of commands that appear is controlled by the setting of the terminal history global configuration command and the history line configuration command.

Disabling the Command History Feature
The command history feature is automatically enabled. You can disable it for the current terminal session or for the command line. This procedure is optional.

SUMMARY STEPS

1. terminal no history

DETAILED STEPS

Step 1

Command or Action terminal no history Example:
Switch# terminal no history

Purpose
Disables the feature during the current terminal session in privileged EXEC mode.

Enabling and Disabling Editing Features
Although enhanced editing mode is automatically enabled, you can disable it and reenable it.

SUMMARY STEPS

1. terminal editing 2. terminal no editing

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 6

Using the Command-Line Interface

Editing Commands Through Keystrokes

DETAILED STEPS

Step 1

Command or Action terminal editing Example:
Switch# terminal editing

Step 2

terminal no editing Example:
Switch# terminal no editing

Purpose Reenables the enhanced editing mode for the current terminal session in privileged EXEC mode.
Disables the enhanced editing mode for the current terminal session in privileged EXEC mode.

Editing Commands Through Keystrokes
The keystrokes help you to edit the command lines. These keystrokes are optional.

Note The arrow keys function only on ANSI-compatible terminals such as VT100s.

Table 3: Editing Commands

Editing Commands

Description

Ctrl-B or use the left arrow key Moves the cursor back one character.

Ctrl-F or use the right arrow Moves the cursor forward one character. key

Ctrl-A

Moves the cursor to the beginning of the command line.

Ctrl-E

Moves the cursor to the end of the command line.

Esc B

Moves the cursor back one word.

Esc F

Moves the cursor forward one word.

Ctrl-T

Transposes the character to the left of the cursor with the character located at the cursor.

Delete or Backspace key

Erases the character to the left of the cursor.

Ctrl-D

Deletes the character at the cursor.

Ctrl-K

Deletes all characters from the cursor to the end of the command line.

Ctrl-U or Ctrl-X

Deletes all characters from the cursor to the beginning of the command line.

Ctrl-W

Deletes the word to the left of the cursor.

Esc D

Deletes from the cursor to the end of the word.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 7

Editing Command Lines That Wrap

Using the Command-Line Interface

Esc C Esc L Esc U Ctrl-V or Esc Q Return key
Space bar Ctrl-L or Ctrl-R

Capitalizes at the cursor.
Changes the word at the cursor to lowercase.
Capitalizes letters from the cursor to the end of the word.
Designates a particular keystroke as an executable command, perhaps as a shortcut.
Scrolls down a line or screen on displays that are longer than the terminal screen can display. Note The More prompt is used for any output that has more lines than
can be displayed on the terminal screen, including show command output. You can use the Return and Space bar keystrokes whenever you see the More prompt.
Scrolls down one screen.
Redisplays the current command line if the switch suddenly sends a message to your screen.

Editing Command Lines That Wrap
You can use a wraparound feature for commands that extend beyond a single line on the screen. When the cursor reaches the right margin, the command line shifts ten spaces to the left. You cannot see the first ten characters of the line, but you can scroll back and check the syntax at the beginning of the command. The keystroke actions are optional.
To scroll back to the beginning of the command entry, press Ctrl-B or the left arrow key repeatedly. You can also press Ctrl-A to immediately move to the beginning of the line.

Note The arrow keys function only on ANSI-compatible terminals such as VT100s. The following example shows how to wrap a command line that extends beyond a single line on the screen.

SUMMARY STEPS

1. access-list 2. Ctrl-A 3. Return key

DETAILED STEPS

Step 1

Command or Action access-list Example:

Switch(config)# access-list 101 permit tcp 10.15.22.25 255.255.255.0 10.15.22.35

Purpose
Displays the global configuration command entry that extends beyond one line.
When the cursor first reaches the end of the line, the line is shifted ten spaces to the left and redisplayed. The dollar

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 8

Using the Command-Line Interface

Searching and Filtering Output of show and more Commands

Command or Action

Purpose

Switch(config)# $ 101 permit tcp 10.15.22.25

sign ($) shows that the line has been scrolled to the left.

255.255.255.0 10.15.22.35 255.25

Each time the cursor reaches the end of the line, the line is

Switch(config)# $t tcp 10.15.22.25 255.255.255.0 131.108.1.20 255.255.255.0 eq

again shifted ten spaces to the left.

Switch(config)# $15.22.25 255.255.255.0 10.15.22.35

255.255.255.0 eq 45

Step 2

Ctrl-A
Example:
Switch(config)# access-list 101 permit tcp 10.15.22.25 255.255.255.0 10.15.2$

Checks the complete syntax.
The dollar sign ($) appears at the end of the line to show that the line has been scrolled to the right.

Step 3 Return key

Execute the commands.
The software assumes that you have a terminal screen that is 80 columns wide. If you have a different width, use the terminal width privileged EXEC command to set the width of your terminal.
Use line wrapping with the command history feature to recall and modify previous complex command entries.

Searching and Filtering Output of show and more Commands
You can search and filter the output for show and more commands. This is useful when you need to sort through large amounts of output or if you want to exclude output that you do not need to see. Using these commands is optional.

SUMMARY STEPS

1. {show | more} command | {begin | include | exclude} regular-expression

DETAILED STEPS

Step 1

Command or Action

Purpose

{show | more} command | {begin | include | exclude} Searches and filters the output.

regular-expression

Expressions are case sensitive. For example, if you enter

Example:

| exclude output, the lines that contain output are not

Switch# show interfaces | include protocol

displayed, but the lines that contain output appear.

Vlan1 is up, line protocol is up

Vlan10 is up, line protocol is down

GigabitEthernet1/0/1 is up, line protocol is down

GigabitEthernet1/0/2 is up, line protocol is up

Accessing the CLI on a Switch Stack
You can access the CLI through a console connection, through Telnet, a SSH, or by using the browser.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 9

Accessing the CLI Through a Console Connection or Through Telnet

Using the Command-Line Interface

You manage the switch stack and the stack member interfaces through the active switch. You cannot manage stack members on an individual switch basis. You can connect to the active switch through the console port or the Ethernet management port of one or more stack members. Be careful with using multiple CLI sessions on the active switch. Commands that you enter in one session are not displayed in the other sessions. Therefore, it is possible to lose track of the session from which you entered commands.
Note We recommend using one CLI session when managing the switch stack.
If you want to configure a specific stack member port, you must include the stack member number in the CLI command interface notation. To debug the standby switch, use the session standby ios privileged EXEC command from the active switch to access the IOS console of the standby switch. To debug a specific stack member, use the session switch stack-member-number privileged EXEC command from the active switch to access the diagnostic shell of the stack member. For more information about these commands, see the switch command reference.
Accessing the CLI Through a Console Connection or Through Telnet
Before you can access the CLI, you must connect a terminal or a PC to the switch console or connect a PC to the Ethernet management port and then power on the switch, as described in the hardware installation guide that shipped with your switch. If your switch is already configured, you can access the CLI through a local console connection or through a remote Telnet session, but your switch must first be configured for this type of access. You can use one of these methods to establish a connection with the switch:
Procedure · Connect the switch console port to a management station or dial-up modem, or connect the Ethernet management port to a PC. For information about connecting to the console or Ethernet management port, see the switch hardware installation guide. · Use any Telnet TCP/IP or encrypted Secure Shell (SSH) package from a remote management station. The switch must have network connectivity with the Telnet or SSH client, and the switch must have an enable secret password configured. · The switch supports up to 16 simultaneous Telnet sessions. Changes made by one Telnet user are reflected in all other Telnet sessions.
· The switch supports up to five simultaneous secure SSH sessions.
After you connect through the console port, through the Ethernet management port, through a Telnet session or through an SSH session, the user EXEC prompt appears on the management station.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 10

2 C H A P T E R
Using the Web Graphical User Interface
· Prerequisites for Using the Web GUI, on page 11 · Information About Using The Web GUI, on page 11 · Connecting the Console Port of the Switch , on page 12 · Logging On to the Web GUI, on page 13 · Enabling Web and Secure Web Modes , on page 13 · Configuring the Switch Web GUI, on page 13
Prerequisites for Using the Web GUI
· The GUI must be used on a PC running Windows 7, Windows XP SP1 (or later releases), or Windows 2000 SP4 (or later releases).
· The switch GUI is compatible with Microsoft Internet Explorer version 10.x, Mozilla Firefox 20.x, or Google Chrome 26.x.
Information About Using The Web GUI
A web browser, or graphical user interface (GUI), is built into each switch. You can use either the service port interface or the management interface to access the GUI. We recommend that you use the service-port interface. Click Help at the top of any page in the GUI to display online help. You might need to disable your browser's pop-up blocker to view the online help.
Web GUI Features
The switch web GUI supports the following: The Configuration Wizard--After initial configuration of the IP address and the local username/password or auth via the authentication server (privilege 15 needed), the wizard provides a method to complete the initial wireless configuration. Start the wizard through Configuration -> Wizard and follow the nine-step process to configure the following:
· Admin Users · SNMP System Summary · Management Port
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 11

Connecting the Console Port of the Switch

Using the Web Graphical User Interface

· Wireless Management · RF Mobility and Country code · Mobility configuration · WLANs · 802.11 Configuration · Set Time
The Monitor tab:
· Displays summary details of switch, clients, and access points. · Displays all radio and AP join statistics. · Displays air quality on access points. · Displays list of all Cisco Discovery Protocol (CDP) neighbors on all interfaces and the CDP traffic
information. · Displays all rogue access points based on their classification-friendly, malicious, ad hoc, classified, and
unclassified.
The Configuration tab:
· Enables you to configure the switch for all initial operation using the web Configuration Wizard. The wizard allows you to configure user details, management interface, and so on.
· Enables you to configure the system, internal DHCP server, management, and mobility management parameters.
· Enables you to configure the switch, WLAN, and radios. · Enables you to configure and set security policies on your switch. · Enables you to access the switch operating system software management commands.
The Administration tab enables you to configure system logs.

Connecting the Console Port of the Switch
Before you begin Before you can configure the switch for basic operations, you need to connect it to a PC that uses a VT-100 terminal emulation program (such as HyperTerminal, ProComm, Minicom, or Tip).

Step 1 Step 2
Step 3

Connect one end of a null-modem serial cable to the switch's RJ-45 console port and the other end to your PC's serial port.
Plug the AC power cord into the switch and a grounded 100 to 240 VAC, 50/60-Hz electrical outlet. Turn on the power supply. The bootup script displays operating system software initialization (code download and power-on self-test verification) and basic configuration. If the switch passes the power-on self-test, the bootup script runs the configuration wizard, which prompts you for basic configuration input.
Enter yes. Proceed with basic initial setup configuration parameters in the CLI setup wizard. Specify the IP address for the service port which is the gigabitethernet 0/0 interface.
After entering the configuration parameters in the configuration wizard, you can access the Web GUI. Now, the switch is configured with the IP address for service port.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 12

Using the Web Graphical User Interface

Logging On to the Web GUI

Logging On to the Web GUI
Enter the switch IP address in your browser's address bar. For a secure connection, enter https://ip-address. For a less secure connection, enter http://ip-address.

Enabling Web and Secure Web Modes

Step 1
Step 2 Step 3 Step 4 Step 5 Step 6 Step 7
Step 8
Step 9
Step 10 Step 11

Choose Configuration > Switch > Management > Protocol Management > HTTP-HTTPS. The HTTP-HTTPS Configuration page appears.
To enable web mode, which allows users to access the switch GUI using "http://ip-address," choose Enabled from the HTTP Access drop-down list. Otherwise, choose Disabled. Web mode (HTTP) is not a secure connection. To enable secure web mode, which allows users to access the switch GUI using "https://ip-address," choose Enabled from the HTTPS Access drop-down list. Otherwise, choose Disabled. Secure web mode (HTTPS) is a secure connection. Choose to track the device in the IP Device Tracking check box. Choose to enable the trust point in the Enable check box. Choose the trustpoints from the Trustpoints drop-down list. Enter the amount of time, in seconds, before the web session times out due to inactivity in the HTTP Timeout-policy (1 to 600 sec) text box. The valid range is from 1 to 600 seconds.
Enter the server life time in the Server Life Time (1 to 86400 sec) text box. The valid range is from1 to 86400 seconds.
Enter the maximum number of connection requests that the server can accept in the Maximum number of Requests (1 to 86400) text box. The valid range is from 1 to 86400 connections.
Click Apply. Click Save Configuration.

Configuring the Switch Web GUI
The configuration wizard enables you to configure basic settings on the switch. You can run the wizard after you receive the switch from the factory or after the switch has been reset to factory defaults. The configuration wizard is available in both GUI and CLI formats.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 13

Configuring the Switch Web GUI

Using the Web Graphical User Interface

Step 1 Step 2
Step 3 Step 4 Step 5 Step 6
Step 7
Step 8

Connect your PC to the service port and configure an IPv4 address to use the same subnet as the switch. The switch is loaded with IOS XE image and the service port interface is configured as gigabitethernet 0/0. Start Internet Explorer 10 (or later), Firefox 2.0.0.11 (or later), or Google Chrome on your PC and enter the management interface IP address on the browser window. The management interface IP address is same as the gigabitethernet 0/0 (also known as service port interface). When you log in for the first time, you need to enter HTTP username and password. By default, the username is admin and the password is cisco. You can use both HTTP and HTTPS when using the service port interface. HTTPS is enabled by default and HTTP can also be enabled. When you log in for the first time, the Accessing Cisco Switch <Model Number> <Hostname> page appears.
On the Accessing Cisco Switch page, click the Wireless Web GUI link to access switch web GUI Home page. Choose Configuration > Wizard to perform all steps that you need to configure the switch initially. The Admin Users page appears.
On the Admin Users page, enter the administrative username to be assigned to this switch in the User Name text box and the administrative password to be assigned to this switch in the Password and Confirm Password text boxes. Click Next. The default username is admin and the default password is cisco. You can also create a new administrator user for the switch. You can enter up to 24 ASCII characters for username and password. The SNMP System Summary page appears.
On the SNMP System Summary page, enter the following SNMP system parameters for the switch, and click Next: · Customer-definable switch location in the Location text box.
· Customer-definable contact details such as phone number with names in the Contact text box.
· Choose enabled to send SNMP notifications for various SNMP traps or disabled not to send SNMP notifications for various SNMP traps from the SNMP Global Trap drop-down list.
· Choose enabled to send system log messages or disabled not to send system log messages from the SNMP Logging drop-down list.
Note The SNMP trap server, must be reachable through the distribution ports (and not through the gigabitethernet0/0 service or management interface).
The Management Port page appears.
In the Management Port page, enter the following parameters for the management port interface (gigabitethernet 0/0) and click Next.
· Interface IP address that you assigned for the service port in the IP Address text box.
· Network mask address of the management port interface in the Netmask text box.
· The IPv4 Dynamic Host Configuration Protocol (DHCP) address for the selected port in the IPv4 DHCP Server text box.
The Wireless Management page appears.
In the Wireless Management page, enter the following wireless interface management details, and click Next.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 14

Using the Web Graphical User Interface

Configuring the Switch Web GUI

Step 9 Step 10

· Choose the interface--VLAN, or Ten Gigabit Ethernet from the Select Interface drop-down list.
· VLAN tag identifier, or 0 for no VLAN tag in the VLAN id text box.
· IP address of wireless management interface where access points are connected in the IP Address text box.
· Network mask address of the wireless management interface in the Netmask text box.
· DHCP IPv4 IP address in the IPv4 DHCP Server text box.
When selecting VLAN as interface, you can specify the ports as ­Trunk or Access ports from the selected list displayed in the Switch Port Configuration text box. The RF Mobility and Country Code page appears.
In the RF Mobility and Country Code page, enter the RF mobility domain name in the RF Mobility text box, choose current country code from the Country Code drop-down list, and click Next. From the GUI, you can select only one country code. Note Before configuring RF grouping parameters and mobility configuration, ensure that you refer to the relevant
conceptual content and then proceed with the configuration. The Mobility Configuration page with mobility global configuration settings appears.
In the Mobility Configuration page, view and enter the following mobility global configuration settings, and click Next.
· Choose Mobility Controller or Mobility Agent from the Mobility Role drop-down list: · If Mobility Agent is chosen, enter the mobility controller IP address in the Mobility Controller IP Address text box and mobility controller IP address in the Mobility Controller Public IP Address text box.
· If Mobility Controller is chosen, then the mobility controller IP address and mobility controller public IP address are displayed in the respective text boxes.
· Displays mobility protocol port number in the Mobility Protocol Port text box.
· Displays the mobility switch peer group name in the Mobility Switch Peer Group Name text box.
· Displays whether DTLS is enabled in the DTLS Mode text box. DTLS is a standards-track Internet Engineering Task Force (IETF) protocol based on TLS.
· Displays mobility domain identifier for 802.11 radios in the Mobility Domain ID for 802.11 radios text box.
· The amount of time (in seconds) between each ping request sent to an peer switch in the Mobility Keepalive Interval (1-30)sec text box. Valid range is from 1 to 30 seconds, and the default value is 10 seconds.
· Number of times a ping request is sent to an peer switch before the peer is considered to be unreachable in the Mobility Keepalive Count (3-20) text box. The valid range is from 3 to 20, and the default value is 3.
· The DSCP value that you can set for the mobility switch in the Mobility Control Message DSCP Value (0-63) text box. The valid range is 0 to 63, and the default value is 0.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 15

Configuring the Switch Web GUI

Using the Web Graphical User Interface

Step 11 Step 12 Step 13
Step 14

· Displays the number of mobility switch peer group member configured in the Switch Peer Group Members Configured text box.
The WLANs page appears.
In the WLANs page, enter the following WLAN configuration parameters, and click Next. · WLAN identifier in the WLAN ID text box. · SSID of the WLAN that the client is associated with in the SSID text box. · Name of the WLAN used by the client in the Profile Name text box.
The 802.11 Configuration page appears.
In the 802.11 Configuration page, check either one or both 802.11a/n/ac and 802.11b/g/n check boxes to enable the 802.11 radios, and click Next. The Set Time page appears.
In the Set Time page, you can configure the time and date on the switch based on the following parameters, and click Next.
· Displays current timestamp on the switch in the Current Time text box. · Choose either Manual or NTP from the Mode drop-down list.
On using the NTP server, all access points connected to the switch, synchronizes its time based on the NTP server settings available. · Choose date on the switch from the Year, Month, and Day drop-down list. · Choose time from the Hours, Minutes, and Seconds drop-down list. · Enter the time zone in the Zone text box and select the off setting required when compared to the current time configured on the switch from the Offset drop-down list.
The Save Wizard page appears.
In the Save Wizard page, you can review the configuration settings performed on the switch using these steps, and if you wish to change any configuration value, click Previous and navigate to that page. You can save the switch configuration created using the wizard only if a success message is displayed for all the wizards. If the Save Wizard page displays errors, you must recreate the wizard for initial configuration of the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 16

I P A R T
Cisco Flexible NetFlow
· Configuring Flexible NetFlow, on page 19

3 C H A P T E R
Configuring Flexible NetFlow
· Finding Feature Information, on page 19 · Prerequisites for Flexible NetFlow, on page 19 · Restrictions for Flexible NetFlow, on page 20 · Information About NetFlow, on page 21 · How to Configure Flexible NetFlow, on page 31 · Monitoring Flexible NetFlow, on page 44 · Configuration Examples for Flexible NetFlow, on page 45 · Additional References, on page 48 · Feature Information for Flexible NetFlow, on page 49
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Flexible NetFlow
The following are prerequisites for your Flexible NetFlow configuration: · You must configure a source interface. If you do not configure a source interface, the exporter will remain in a disabled state. · You must configure a valid record name for every flow monitor.
Prerequisites for Wireless Flexible NetFlow
The following are the prerequisites for wireless Flexible NetFlow: · Ensure that the networking device is running a Cisco release that supports wireless Flexible NetFlow. · Ensure that the target is connected to a WLAN.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 19

Restrictions for Flexible NetFlow

Cisco Flexible NetFlow

· The networking device must be configured to support protocol types such as IP, IPv6, and datalink. · Valid flow record and monitor are required before generating the flow.

Restrictions for Flexible NetFlow

The following are restrictions for Flexible NetFlow: · Traditional NetFlow (TNF) accounting is not supported. · Flexible NetFlow v5 export format is not supported, only NetFlow v9 export format is supported. · Both ingress and egress NetFlow accounting is supported. · Microflow policing feature shares the NetFlow hardware resource with FNF. · Only one flow monitor per interface and per direction is supported. · Layer 2, IPv4, and IPv6 traffic types are supported; however, the switch can apply a flow monitor to only one of these types at a time for a given direction and interface. · Layer 2, VLAN, WLAN and Layer 3 interfaces are supported, but the switch does not support SVI and tunnels. · The following NetFlow table sizes are supported:

Trim Level

Ingress NetFlow Table

Egress NetFlow Table

LAN Base

Not supported

Not supported

IP Base

8K

16 K

IP Services

8K

16 K

· Depending on the switch type, a switch will have one or two forwarding ASICs. The capacities listed in the above table are on a per-ASIC basis.
· The switch can support either one or two ASICs. Each ASIC has 8K ingress and 16 K egress entries.
· The NetFlow tables are on separate compartments and cannot be combined. Depending on which ASIC processed the packet, the flows will be created in the table in the corresponding ASIC.
· Both full flow accounting and sampled NetFlow accounting are supported.
· NetFlow hardware implementation supports four hardware samplers. You can select a sampler rate from 1 out of 2 to 1 out of 1024. Only random sampling mode is supported.
· With the microflow policing feature (which is enabled only for wireless implementation), NetFlow can and should be used only in full flow mode i.e. NetFlow policing cannot be used. For wireless traffic, applying a sampler is not permitted, as it hinders microflow QoS.
· Only full flow accounting is supported for wireless traffic.
· NetFlow hardware uses hash tables internally. Hash collisions can occur in the hardware. Therefore, in spite of the internal overflow Content Addressable Memory (CAM), the actual NetFlow table utilization could be about 80 percent.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 20

Cisco Flexible NetFlow

Information About NetFlow

· Depending on what fields are used for the flow, a single flow could take two consecutive entries. IPv6 flows also take two entries. In these situations, the effective usage of NetFlow entries is half the table size, which is separate from the above hash collision limitation.
· The switch supports up to 16 flow monitors.
· Microflow policing uses a separate set of flow monitors (limit 3).
· SSID-based NetFlow accounting is supported. SSID is treated in a manner similar to an interface. However, certain fields are not supported (such as AP MAC address and user ID ).
· NetFlow v9 format NetFlow export is supported.
· The NetFlow software implementation supports distributed NetFlow export, so the flows are exported from the same switch in which the flow was created.
· Ingress flows are present in the ASIC that first received the packets for the flow. Egress flows are present in the ASIC from which the packets actually left the switch set up.
· The reported value for the bytes count field (called "bytes long") is Layer-2-packet-size--18 bytes. For classic Ethernet traffic (802.3), this will be accurate. For all other Ethernet types, this field will not be accurate. Use the "bytes layer2" field, which always reports the accurate Layer 2 packet size. For information about supported Flexible NetFlow fields, see Supported Flexible NetFlow Fields, on page 27.
Information About NetFlow
NetFlow is a Cisco technology that provides statistics on packets flowing through the switch. NetFlow is the standard for acquiring IP operational data from IP networks. NetFlow provides data to enable network and security monitoring, network planning, traffic analysis, and IP accounting. Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis parameters for your specific requirements. Flexible NetFlow facilitates the creation of more complex configurations for traffic analysis and data export through the use of reusable configuration components.
Flexible NetFlow Overview
Flexible NetFlow uses flows to provide statistics for accounting, network monitoring, and network planning.
A flow is a unidirectional stream of packets that arrives on a source interface and has the same values for the keys. A key is an identified value for a field within the packet. You create a flow using a flow record to define the unique keys for your flow.
The switch supports the Flexible NetFlow feature that enables enhanced network anomalies and security detection. Flexible NetFlow allows you to define an optimal flow record for a particular application by selecting the keys from a large collection of predefined fields.
All key values must match for the packet to count in a given flow. A flow might gather other fields of interest, depending on the export record version that you configure. Flows are stored in the Flexible NetFlow cache.
You can export the data that Flexible NetFlow gathers for your flow by using an exporter and export this data to a remote Flexible NetFlow collector.
You define the size of the data that you want to collect for a flow using a monitor. The monitor combines the flow record and exporter with the Flexible NetFlow cache information.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 21

Wireless Flexible NetFlow Overview

Cisco Flexible NetFlow

Wireless Flexible NetFlow Overview
The wireless Flexible NetFlow infrastructure supports the following:
· Flexible NetFlow Version 9.0 · User-based rate limiting · Microflow policing · Voice and video flow monitoring · Reflexive access control list (ACL)
Microflow Policing and User-Based Rate Limiting
Microflow policing associates a 2-color 1-rate policer and related drop statistics to each flow present in the NetFlow table. When the flow mask comprises all packet fields, this functionality is known as microflow policing. When the flow mask comprises either source or destination only, this functionality is known as user-based rate limiting.
Voice and Video Flow Monitoring
Voice and video flows are full flow mask-based entries. The ASIC provides the flexibility to program the policer parameters, share policers across multiple flows and rewrite the IP address and Layer 4 port numbers of these flows.
Note For dynamic entries, the NetFlow engine will use the policer parameters that are derived for the flow based on the policy (ACL/QoS-based policies). Dynamic entries cannot share policer across multiple flows.
Reflexive ACL
Reflexive ACLs allow IP packets to be filtered based on upper-layer session information. The ACLs allow outbound traffic and limit inbound traffic in response to the sessions that originate inside the trusted network. The reflexive ACLs are transparent to the filtering mechanism until a data packet that matches the reflexive entry activates it. At this time, a temporary ACL entry is created and added to the IP-named access lists. The information obtained from the data packet to generate the reflexive ACL entry is permit/deny bit, the source IP address and port, the destination IP address, port, and the protocol type. During reflexive ACL entry evaluation, if the protocol type is either TCP or UDP, then the port information must match exactly. For other protocols, there is no port information to match. After this ACL is installed, the firewall is then opened for the reply packets to pass through. At this time, a potential hacker could have access to the network behind the firewall. To narrow this window, an idle timeout period can be defined. However, in the case of TCP, if two FIN bits or an RST is detected, the ACL entry can be removed.
Related Topics Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction, on page 43 Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction), on page 46 Example: Configuring IPv6 and Transport Flag Flexible NetFlow in WLAN (Egress Direction), on page 46 Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions), on page 47

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 22

Cisco Flexible NetFlow

Flow Records

Flow Records
A flow record defines the keys that Flexible NetFlow uses to identify packets in the flow, as well as other fields of interest that Flexible NetFlow gathers for the flow. You can define a flow record with any combination of keys and fields of interest. The switch supports a rich set of keys. A flow record also defines the types of counters gathered per flow. You can configure 64-bit packet or byte counters. The switch enables the following match fields as the defaults when you create a flow record:
· match datalink--Layer 2 attributes
· match flow--Flow identifying attributes
· match interface--Interface attributes
· match ipv4--IPv4 attributes
· match ipv6--IPv6 attributes
· match transport--Transport layer fields

Related Topics Creating a Flow Record, on page 32

Flexible NetFlow Match Parameters
The following table describes Flexible NetFlow match parameters. You must configure at least one of the following match parameters for the flow records.
Table 4: Match Parameters

Command

Purpose

match datalink {dot1q | ethertype | mac | vlan }

Specifies a match to datalink or Layer 2 fields. The following command options are available:
· dot1q--Matches to the dot1q field.
· ethertype--Matches to the ethertype of the packet.
· mac--Matches the source or destination MAC fields.
· vlan--Matches to the VLAN that the packet is located on (input or output).

match flow direction match interface {input | output}

Specifies a match to the flow identifying fields.
Specifies a match to the interface fields. The following command options are available:
· input--Matches to the input interface. · output--Matches to the output interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 23

Flexible NetFlow Collect Parameters

Cisco Flexible NetFlow

Command

Purpose

match ipv4 {destination | protocol | source | tos | ttl | version}

Specifies a match to the IPv4 fields. The following command options are available:
· destination--Matches to the IPv4 destination address-based fields.

· protocol--Matches to the IPv4 protocols.

· source--Matches to the IPv4 source address based fields.

· tos--Matches to the IPv4 Type of Service fields.

· ttl--Matches to the IPv4 Time To Live fields.

· version--Matches to the IP version from the IPv4 header.

match ipv6 {destination | hop-limit | protocol | source | traffic-class | version }

Specifies a match to the IPv6 fields. The following command options are available:
· destination--Matches to the IPv6 destination address-based fields.
· hop-limit--Matches to the IPv6 hop limit fields.
· protocol--Matches to the IPv6 payload protocol fields.
· source--Matches to the IPv6 source address based fields.
· traffic-class--Matches to the IPv6 traffic class.
· version--Matches to the IP version from the IPv6 header.

match transport {destination-port | igmp | icmp | Specifies a match to the Transport Layer fields. The

source-port}

following command options are available:

· destination-port--Matches to the transport destination port.

· icmp--Matches to ICMP fields, including ICMP IPv4 and IPv6 fields.

· igmp--Matches to IGMP fields.

· source-port--Matches to the transport source port.

Flexible NetFlow Collect Parameters
The following table describes the Flexible NetFlow collect parameters.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 24

Cisco Flexible NetFlow

Exporters

Table 5: Collect Parameters

Command

Purpose

collect counter { bytes { layer2 { long } | long } | Collects the counter fields total bytes and total

packets { long } }

packets.

collect interface {input | output}

Collects the fields from the input or output interface.

collect timestamp absolute {first | last}

Collects the fields for the absolute time the first packet was seen or the absolute time the most recent packet was last seen (in milliseconds).

collect transport tcp flags

Collects the following transport TCP flags: · ack--TCP acknowledgement flag · cwr--TCP congestion window reduced flag · ece--TCP ECN echo flag · fin--TCP finish flag · psh--TCP push flag · rst--TCP reset flag · syn--TCP synchronize flag · urg--TCP urgent flag

Note On the switch, you cannot specify which TCP flag to collect. You can only specify to collect transport TCP flags. All TCP flags will be collected with this command.

Exporters

An exporter contains network layer and transport layer details for the Flexible NetFlow export packet. The following table lists the configuration options for an exporter.
Table 6: Flexible NetFlow Exporter Configuration Options

Exporter Configuration default description destination dscp exit

Description Sets a command to its default values. Provides a description for the flow exporter. Export destination. Optional DSCP value. Exits from the flow exporter configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 25

Export Formats

Cisco Flexible NetFlow

Exporter Configuration export-protocol no option source template transport ttl

Description Export protocol version. Negates the command or its default. Selects option for exporting. Originating interface for the net flow. Flow exporter template configuration. Transport protocol. Optional TTL or hop limit.

The switch exports data to the collector whenever a timeout occurs or when the flow is terminated (TCP Fin or Rst received, for example). You can configure the following timers to force a flow export:
· Active timeout--The flow continues to have the packets for the past m seconds since the flow was created.
· Inactive timeout--The flow does not have any packets for the past n seconds.

Related Topics Creating a Flow Exporter, on page 33

Export Formats
The switch supports only NetFlow Version 9 export formats. NetFlow Version 9 export format provides the following features and functionality:
· Variable field specification format · Support for IPv4 destination address export · More efficient network utilization

Note For information about the Version 9 export format, see RFC 3954.

Monitors

A monitor references the flow record and flow exporter. You apply a monitor to an interface on the switch. Note the following when applying a flow monitor to an interface:
· If you apply a flow monitor in the input direction: · Use the match keyword and use the input interface as a key field. · Use the collect keyword and use the output interface as a collect field. This field will be present in the exported records but with a value of 0.
· If you apply a flow monitor in the output direction:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 26

Cisco Flexible NetFlow

Samplers

· Use the match keyword and use the output interface as a key field.
· Use the collect keyword and use the input interface as a collect field. This field will be present in the exported records but with a value of 0.

Related Topics Creating a Flow Monitor, on page 36

Samplers

If you are using sampled mode, you use the sampler to specify the rate at which packets are sampled.
Related Topics Creating a Sampler, on page 37

Supported Flexible NetFlow Fields
The following tables provide a consolidated list of supported fields in Flexible NetFlow (FNF) for various traffic types and traffic direction.

Note If the packet has a VLAN field, then that length is not accounted for.

Field

Layer 2 Layer 2

In

Out

Key or Collect Fields

Interface Yes -- input

IPv4 In IP v4 Out IPv6 In IPv6 Out Notes

Yes --

Yes --

If you apply a flow monitor in the input direction:
· Use the match keyword and use the input interface as a key field.
· Use the collect keyword and use the output interface as a collect field. This field will be present in the exported records but with a value of 0.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 27

Supported Flexible NetFlow Fields

Cisco Flexible NetFlow

Field

Layer 2 Layer 2

In

Out

Interface --

Yes

output

IPv4 In IP v4 Out IPv6 In IPv6 Out Notes

--

Yes

-- Yes

If you apply a flow monitor in the output direction:
· Use the match keyword and use the output interface as a key field.
· Use the collect keyword and use the input interface as a collect field. This field will be present in the exported records but with a value of 0.

Field

Layer 2 In Layer 2 Out IPv4 In

Key Fields

Flow

Yes

Yes

Yes

direction

Ethertype Yes

Yes

--

VLAN

Yes

--

Yes

input

VLAN

--

output

Yes

--

dot1q

Yes

--

Yes

VLAN

input

dot1q

--

VLAN

output

Yes

--

dot1q

Yes

Yes

Yes

priority

MAC

Yes

Yes

Yes

source

address

input

IP v4 Out IPv6 In

Yes

Yes

--

--

--

Yes

Yes

--

--

Yes

Yes

--

Yes

Yes

Yes

Yes

IPv6 Out Notes

Yes

--

--

Supported

only for a

switch port.

Yes

Supported

only for a

switch port.

--

Supported

only for a

switch port.

Yes

Supported

only for a

switch port.

Yes

Supported

only for a

switch port.

Yes

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 28

Cisco Flexible NetFlow

Supported Flexible NetFlow Fields

Field

Layer 2 In Layer 2 Out IPv4 In

MAC

--

--

--

source

address

output

MAC

Yes

--

Yes

destination

address

input

MAC

--

destination

address

output

Yes

--

IPv4

--

--

Yes

version

IPv4 TOS --

--

Yes

IPv4

--

--

Yes

protocol

IPv4 TTL --

--

Yes

IPv4 source --

--

Yes

address

IPv4

--

--

Yes

destination

address

ICMP IPv4 --

--

Yes

type

ICMP IPv4 --

--

Yes

code

IGMP type --

--

Yes

Field

Layer 2 In Layer 2 Out IPv4 In

Key Fields continued

IP v4 Out --

IPv6 In --

--

Yes

Yes

--

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

--

Yes

--

Yes

--

Yes

--

Yes

--

IP v4 Out IPv6 In

IPv6 Out --

Notes

--

Yes

Yes

Yes

Yes

Must use if

any of

src/dest

port, ICMP

code/type,

IGMP type

or TCP

flags are

used.

Yes

--

--

-- -- -- IPv6 Out Notes

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 29

Supported Flexible NetFlow Fields

Cisco Flexible NetFlow

Field
IPv6 version
IPv6 protocol

Layer 2 In Layer 2 Out IPv4 In

--

--

Yes

--

--

Yes

IPv6 source --

--

--

address

IPv6

--

--

--

destination

address

IPv6

--

--

Yes

traffic-class

IPv6

--

--

Yes

hop-limit

ICMP IPv6 --

--

--

type

ICMP IPv6 --

--

--

code

source-port --

--

Yes

dest-port --

--

Yes

Field
Collect Fields

Layer 2 In Layer 2 Out IPv4 In

IP v4 Out Yes

IPv6 In Yes

Yes

Yes

--

Yes

--

Yes

Yes

Yes

Yes

Yes

--

Yes

--

Yes

Yes

Yes

Yes

Yes

IP v4 Out IPv6 In

IPv6 Out Yes Yes
Yes

Notes
Same as IP version.
Same as IP protocol. Must use if any of src/dest port, ICMP code/type, IGMP type or TCP flags are used.

Yes

Yes

Same as IP

TOS.

Yes

Same as IP

TTL.

Yes

Yes

Yes Yes IPv6 Out Notes

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 30

Cisco Flexible NetFlow

Default Settings

Field

Layer 2 In Layer 2 Out IPv4 In

Bytes long Yes

Yes

Yes

Packets Yes

Yes

Yes

long

Timestamp Yes

Yes

Yes

absolute

first

Timestamp Yes

Yes

Yes

absolute last

TCP flags Yes

Yes

Yes

Bytes

Yes

Yes

Yes

layer2 long

IP v4 Out Yes

IPv6 In Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

IPv6 Out Yes
Yes

Notes
Packet size = (Ethernet frame size including FCS - 18 bytes)
Recommended:
Avoid this field and use Bytes layer2 long.

Yes

Yes

Yes

Collects all

flags.

Yes

Default Settings
The following table lists the Flexible NetFlow default settings for the switch.
Table 7: Default Flexible NetFlow Settings

Setting Flow active timeout Flow timeout inactive

Default 1800 seconds 15 seconds

How to Configure Flexible NetFlow
To configure Flexible NetFlow, follow these general steps: 1. Create a flow record by specifying keys and non-key fields to the flow.
2. Create an optional flow exporter by specifying the protocol and transport destination port, destination, and other parameters.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 31

Creating a Flow Record

Cisco Flexible NetFlow

3. Create a flow monitor based on the flow record and flow exporter. 4. Create an optional sampler. 5. Apply the flow monitor to a Layer 2 port, Layer 3 port, or VLAN. 6. If applicable to your configuration, configure a WLAN to apply a flow monitor to.

Creating a Flow Record
You can create a flow record and add keys to match on and fields to collect in the flow.

SUMMARY STEPS

1. configure terminal 2. flow record name 3. description string 4. match type 5. collect type 6. end 7. show flow record [name record-name] 8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

flow record name Example:
Switch(config)# flow record test Switch(config-flow-record)#

Creates a flow record and enters flow record configuration mode.

Step 3

description string Example:

(Optional) Describes this flow record as a maximum 63-character string.

Switch(config-flow-record)# description Ipv4Flow

Step 4

match type Example:
Switch(config-flow-record)# match ipv4 source address

Specifies a match key. For information about possible match key values, see Flexible NetFlow Match Parameters, on page 23.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 32

Cisco Flexible NetFlow

Creating a Flow Exporter

Command or Action

Purpose

Switch(config-flow-record)# match ipv4 destination address
Switch(config-flow-record)# match flow direction

Step 5

collect type Example:

Specifies the collection field. For information about possible collection field values, see Flexible NetFlow Collect Parameters, on page 24.

Switch(config-flow-record)# collect counter bytes layer2 long
Switch(config-flow-record)# collect counter bytes long
Switch(config-flow-record)# collect timestamp absolute first Switch(config-flow-record)# collect transport tcp
flags

Step 6

end Example:
Switch(config-flow-record)# end

Returns to privileged EXEC mode.

Step 7

show flow record [name record-name] Example:
Switch show flow record test

(Optional) Displays information about NetFlow flow records.

Step 8

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

What to do next Define an optional flow exporter by specifying the export format, protocol, destination, and other parameters. Related Topics
Flow Records, on page 23

Creating a Flow Exporter
You can create a flow export to define the export parameters for a flow.

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 33

Creating a Flow Exporter

Cisco Flexible NetFlow

2. flow exporter name 3. description string 4. dscp value 5. destination { ipv4-address } 6. source { source type } 7. transport udp number 8. end 9. show flow exporter [name record-name] 10. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

flow exporter name Example:
Switch(config)# flow exporter ExportTest Switch (config-flow-exporter)#

Creates a flow exporter and enters flow exporter configuration mode.

Step 3

description string Example:

(Optional) Describes this flow record as a maximum 63-character string.

Switch(config-flow-exporter)# description ExportV9

Step 4

dscp value Example:
Switch(config-flow-exporter)# dscp 0

(Optional) Specifies the differentiated services codepoint value. The range is from 0 to 63.

Step 5

destination { ipv4-address } Example:
Switch(config-flow-exporter)# destination 192.0.2.1

Sets the destination IPv4 address or hostname for this exporter.

Step 6

source { source type } Example:
Switch(config-flow-exporter)# source

(Optional) Specifies the interface to use to reach the NetFlow collector at the configured destination. The following interfaces can be configured as source:
· Auto Template--Auto-Template interface

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 34

Cisco Flexible NetFlow

Creating a Flow Exporter

Step 7 Step 8 Step 9 Step 10

Command or Action
gigabitEthernet1/0/1

Purpose · Capwap--CAPWAP tunnel interface · GigabitEthernet--Gigabit Ethernet IEEE 802 · GroupVI--Group virtual interface · Internal Interface--Internal interface · Loopback--Loopback interface · Null--Null interface · Port-channel--Ethernet Channel of interface · TenGigabitEthernet--10-Gigabit Ethernet · Tunnel--Tunnel interface · Vlan--Catalyst VLANs

transport udp number Example:

(Optional) Specifies the UDP port to use to reach the NetFlow collector. The range is from 0 to 65535.

Switch(config-flow-exporter)# transport udp 200

end Example:
Switch(config-flow-record)# end

Returns to privileged EXEC mode.

show flow exporter [name record-name] Example:
Switch show flow exporter ExportTest

(Optional) Displays information about NetFlow flow exporters.

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

What to do next Define a flow monitor based on the flow record and flow exporter. Related Topics
Exporters, on page 25

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 35

Creating a Flow Monitor

Cisco Flexible NetFlow

Creating a Flow Monitor
You can create a flow monitor and associate it with a flow record and a flow exporter.

SUMMARY STEPS

1. configure terminal 2. flow monitor name 3. description string 4. exporter name 5. record name 6. cache { timeout {active | inactive} seconds | type normal } 7. end 8. show flow monitor [name record-name] 9. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

flow monitor name Example:
Switch(config)# flow monitor MonitorTest Switch (config-flow-monitor)#

Creates a flow monitor and enters flow monitor configuration mode.

Step 3

description string Example:
Switch(config-flow-monitor)# description Ipv4Monitor

(Optional) Describes this flow record as a maximum 63-character string.

Step 4

exporter name Example:

Associates a flow exporter with this flow monitor.

Switch(config-flow-monitor)# exporter ExportTest

Step 5

record name Example:

Associates a flow record with the specified flow monitor.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 36

Cisco Flexible NetFlow

Creating a Sampler

Command or Action
Switch(config-flow-monitor)# record test

Purpose

Step 6

cache { timeout {active | inactive} seconds | type normal Associates a flow cache with the specified flow monitor. } Example:
Switch(config-flow-monitor)# cache timeout active 15000

Step 7

end Example:
Switch(config-flow-monitor)# end

Returns to privileged EXEC mode.

Step 8

show flow monitor [name record-name] Example:
Switch show flow monitor name MonitorTest

(Optional) Displays information about NetFlow flow monitors.

Step 9

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

What to do next Apply the flow monitor to a Layer 2 interface, Layer 3 interface, or VLAN. Related Topics
Monitors, on page 26

Creating a Sampler
You can create a sampler to define the NetFlow sampling rate for a flow.

SUMMARY STEPS

1. configure terminal 2. sampler name 3. description string 4. mode {random} 5. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 37

Creating a Sampler

Cisco Flexible NetFlow

6. show sampler [name] 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

sampler name
Example:
Switch(config)# sampler SampleTest Switch(config-flow-sampler)#

Creates a sampler and enters flow sampler configuration mode.

Step 3

description string Example:

(Optional) Describes this flow record as a maximum 63-character string.

Switch(config-flow-sampler)# description samples

Step 4

mode {random}

Defines the random sample mode.

Example:

Switch(config-flow-sampler)# mode random 1 out-of 1024

Step 5

end Example:
Switch(config-flow-sampler)# end

Returns to privileged EXEC mode.

Step 6

show sampler [name] Example:
Switch show sample SampleTest

(Optional) Displays information about NetFlow samplers.

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 38

Cisco Flexible NetFlow

Applying a Flow to an Interface

What to do next Apply the flow monitor to a source interface, subinterface, VLAN interface, or a VLAN. Related Topics
Samplers, on page 27

Applying a Flow to an Interface
You can apply a flow monitor and an optional sampler to an interface.

SUMMARY STEPS

1. configure terminal 2. interface type 3. {ip flow monitor | ipv6 flow monitor}name [sampler name] { input |output } 4. end 5. show flow interface [interface-type number] 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface type Example:
Switch(config)# interface GigabitEthernet1/0/1 Switch(config-if)#

Enters interface configuration mode and configures an interface. Command parameters for the interface configuration include:
· Auto-- Auto-Template interface · Capwap--CAPWAP tunnel interface · GigabitEthernet--GigabitEthernet IEEE 802 · GroupVI--Group Virtual interface · Internal Interface--Internal Interface · Loopback--Loopback interface · Null--Null interface · Port-channel--Ethernet channel of interface · TenGigabitEthernet--10- Gigabit Ethernet · Tunnel--Tunnel interface

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 39

Configuring a Bridged NetFlow on a VLAN

Cisco Flexible NetFlow

Step 3

Command or Action

Purpose · Vlan--Catalyst VLANs · Range--Interface range

{ip flow monitor | ipv6 flow monitor}name [sampler name] { input |output }
Example:

Associate an IPv4 or an IPv6 flow monitor, and an optional sampler to the interface for input or output packets.

Switch(config-if)# ip flow monitor MonitorTest input

Step 4

end Example:
Switch(config-flow-monitor)# end

Returns to privileged EXEC mode.

Step 5

show flow interface [interface-type number] Example:
Switch# show flow interface

(Optional) Displays information about NetFlow on an interface.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring a Bridged NetFlow on a VLAN
You can apply a flow monitor and an optional sampler to a VLAN.

SUMMARY STEPS

1. configure terminal 2. vlan [configuration] vlan-id 3. ip flow monitor name [sampler name] {input |output} 4. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 40

Cisco Flexible NetFlow

Configuring Layer 2 NetFlow

Command or Action
Switch# configure terminal

Purpose

Step 2

vlan [configuration] vlan-id Example:
Switch(config)# vlan configuration 30 Switch(config-vlan-config)#

Enters VLAN or VLAN configuration mode.

Step 3

ip flow monitor name [sampler name] {input |output} Associates a flow monitor and an optional sampler to the

Example:

VLAN for input or output packets.

Switch(config-vlan-config)# ip flow monitor MonitorTest input

Step 4

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring Layer 2 NetFlow
You can define Layer 2 keys in Flexible NetFlow records that you can use to capture flows in Layer 2 interfaces.

SUMMARY STEPS

1. configure terminal 2. flow record name 3. match datalink {dot1q |ethertype | mac | vlan} 4. end 5. show flow record [name ] 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 flow record name

Enters flow record configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 41

Configuring WLAN to Apply Flow Monitor in Data Link Input/Output Direction

Cisco Flexible NetFlow

Command or Action Example:
Switch(config)# flow record L2_record Switch(config-flow-record)#

Step 3

match datalink {dot1q |ethertype | mac | vlan}
Example:
Switch(config-flow-record)# match datalink ethertype

Step 4

end Example:
Switch(config-flow-record)# end

Step 5

show flow record [name ] Example:
Switch# show flow record

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Specifies the Layer 2 attribute as a key.
Returns to privileged EXEC mode.
(Optional) Displays information about NetFlow on an interface. (Optional) Saves your entries in the configuration file.

Configuring WLAN to Apply Flow Monitor in Data Link Input/Output Direction

SUMMARY STEPS

1. configure terminal 2. wlan wlan-name 3. datalink flow monitor monitor-name {input | output} 4. end 5. show wlan wlan-name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 42

Cisco Flexible NetFlow

Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction

Step 2 Step 3 Step 4 Step 5

Command or Action wlan wlan-name Example:

Purpose
Enters WLAN configuration submode. For wlan-name, enter the profile name. The range is 1 to 32 characters.

Switch (config) # wlan mywlan

datalink flow monitor monitor-name {input | output} Applies flow monitor to Layer 2 traffic in the direction of

Example:

interest.

Switch (config-wlan) # datalink flow monitor flow-monitor-1 {input | output}
end Example:

Returns to privileged EXEC mode.

Switch (config) # end
show wlan wlan-name Example:

(Optional) Verifies your configuration.

Switch # show wlan mywlan

Example

Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction

SUMMARY STEPS

1. configure terminal 2. wlan wlan-id 3. {ip | ipv6} flow monitor monitor-name {input | output} 4. end 5. show wlan wlan-name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 43

Monitoring Flexible NetFlow

Cisco Flexible NetFlow

Step 2 Step 3 Step 4 Step 5

Command or Action wlan wlan-id Example:

Purpose
Enters WLAN configuration submode. For wlan-id, enter the WLAN ID. The range is 1 to 64.

Switch (config) # wlan 1

{ip | ipv6} flow monitor monitor-name {input | output} Associates a flow monitor to the WLAN for input or output

Example:

packets.

Switch (config-wlan) # ip flow monitor flow-monitor-1 input
end Example:

Returns to privileged EXEC mode.

Switch (config) # end
show wlan wlan-name Example:

(Optional) Verifies your configuration.

Switch # show wlan mywlan

Example
Related Topics Wireless Flexible NetFlow Overview, on page 22 Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction), on page 46 Example: Configuring IPv6 and Transport Flag Flexible NetFlow in WLAN (Egress Direction), on page 46 Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions), on page 47

Monitoring Flexible NetFlow

The commands in the following table can be used to monitor Flexible NetFlow.
Table 8: Flexible NetFlow Monitoring Commands

Command

Purpose

show flow exporter [broker | export-ids | name | Displays information about NetFlow flow exporters

name | statistics | templates]

and statistics.

show flow exporter [ name exporter-name]

Displays information about NetFlow flow exporters and statistics.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 44

Cisco Flexible NetFlow

Configuration Examples for Flexible NetFlow

Command

Purpose

show flow interface

Displays information about NetFlow interfaces.

show flow monitor [ name exporter-name]

Displays information about NetFlow flow monitors and statistics.

show flow monitor statistics

Displays the statistics for the flow monitor

show flow monitor cache format {table | record | Displays the contents of the cache for the flow

csv}

monitor, in the format specified.

show flow record [ name record-name]

Displays information about NetFlow flow records.

show flow ssid

Displays NetFlow monitor installation status for a WLAN.

show sampler [broker | name | name]

Displays information about NetFlow samplers.

show wlan wlan-name

Displays the WLAN configured on the device.

Configuration Examples for Flexible NetFlow
Example: Configuring a Flow
This example shows how to create a flow and apply it to an interface:
Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# flow export export1 Switch(config-flow-exporter)# destination 10.0.101.254 Switch(config-flow-exporter)# transport udp 2055 Switch(config-flow-exporter)# exit Switch(config)# flow record record1 Switch(config-flow-record)# match ipv4 source address Switch(config-flow-record)# match ipv4 destination address Switch(config-flow-record)# match ipv4 protocol Switch(config-flow-record)# match transport source-port Switch(config-flow-record)# match transport destination-port Switch(config-flow-record)# collect counter byte long Switch(config-flow-record)# collect counter packet long Switch(config-flow-record)# collect timestamp absolute first Switch(config-flow-record)# collect timestamp absolute last Switch(config-flow-record)# exit Switch(config)# flow monitor monitor1 Switch(config-flow-monitor)# record record1 Switch(config-flow-monitor)# exporter export1 Switch(config-flow-monitor)# exit Switch(config)# interface tenGigabitEthernet 1/0/1 Switch(config-if)# ip flow monitor monitor1 input Switch(config-if)# end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 45

Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction)

Cisco Flexible NetFlow

Example: Configuring IPv4 Flexible NetFlow in WLAN (Ingress Direction)
The following example shows how to configure IPv4 Flexible NetFlow on WLAN ingress direction:
Switch# configure terminal Switch(config)# flow record fr_v4 Switch(config-flow-record)# match ipv4 destination address Switch(config-flow-record)# match ipv4 source address Switch(config-flow-record)# match ipv4 protocol Switch(config-flow-record)# match ipv4 tos Switch(config-flow-record)# match ipv4 ttl Switch(config-flow-record)# match ipv4 version Switch(config-flow-record)# match wireless ssid Switch(config-flow-record)# collect wireless ap mac address Switch(config-flow-record)# collect counter packets long Switch(config-flow-record)# collect counter bytes long Switch(config-flow-record)# collect timestamp absolute first Switch(config-flow-record)# collect timestamp absolute last Switch(config-flow-record)# exit
Switch(config)# flow monitor fm_v4 Switch(config-flow-monitor)# record fr_v4 Switch(config-flow-record)# exit
Switch(config)# wlan 1 Switch(config-wlan)# ip flow monitor fm_v4 in Switch(config-wlan)# end
Switch# show flow monitor fm_v4 cache
Related Topics Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction, on page 43 Wireless Flexible NetFlow Overview, on page 22
Example: Configuring IPv6 and Transport Flag Flexible NetFlow in WLAN (Egress Direction)
The following example shows how to configure IPv6 and transport flag Flexible NetFlow on WLAN egress direction:
Switch# configure terminal Switch(config)# flow record fr_v6 Switch(config-flow-record)# match ipv6 destination address Switch(config-flow-record)# match ipv6 source address Switch(config-flow-record)# match ipv6 hop-limit Switch(config-flow-record)# match ipv6 protocol Switch(config-flow-record)# match ipv6 traffic Switch(config-flow-record)# match ipv6 version Switch(config-flow-record)# match wireless ssid Switch(config-flow-record)# collect wireless ap mac address Switch(config-flow-record)# collect counter bytes long Switch(config-flow-record)# collect transport tcp flags Switch(config-flow-record)# exit

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 46

Cisco Flexible NetFlow

Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions)

Switch(config)# flow monitor fm_v6 Switch(config-flow-monitor)# record fr_v6 Switch(config-flow-monitor)# exit
Switch(config)# wlan 1 Switch(config-wlan)# ipv6 flow monitor fm_v6 out Switch(config-wlan)# end
Switch# show flow monitor fm_v6 cache
Note On the switch, you cannot specify which TCP flag to collect. You can only specify to collect transport TCP flags.
Related Topics Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction, on page 43 Wireless Flexible NetFlow Overview, on page 22
Example: Configuring IPv6 Flexible NetFlow in WLAN (Both Ingress and Egress Directions)
The following example shows how to configure IPv6 Flexible NetFlow on WLAN in both directions:
Switch# configure terminal Switch (config)# flow record fr_v6 Switch (config-flow-record)# match ipv6 destination address Switch (config-flow-record)# match ipv6 source address Switch (config-flow-record)# match ipv6 hop-limit Switch (config-flow-record)# match ipv6 protocol Switch (config-flow-record)# match ipv6 traffic Switch (config-flow-record)# match ipv6 version Switch (config-flow-record)# match wireless ssid Switch (config-flow-record)# collect wireless ap mac address Switch (config-flow-record)# collect counter packets long Switch (config-flow-record)# exit
Switch (config)# flow monitor fm_v6 Switch (config-flow-monitor)# record fr_v6 Switch (config-flow-monitor)# exit
Switch (config)# wlan 1 Switch (config-wlan)# ipv6 flow monitor fm_v6 in Switch (config-wlan)# ipv6 flow monitor fm_v6 out Switch (config-wlan)# end
Switch# show flow monitor fm_v6 cache
Related Topics Configuring WLAN to Apply Flow Monitor in IPV4 and IPv6 Input/Output Direction, on page 43 Wireless Flexible NetFlow Overview, on page 22

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 47

Additional References

Cisco Flexible NetFlow

Additional References

Related Documents Related Topic Platform-independent command references
Platform-independent configuration information
Flexible NetFlow CLI Commands

Document Title
Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
Cisco Flexible NetFlow Command Reference (Catalyst 3650 Switches)
Flexible NetFlow Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title RFC 3954 Cisco Systems NetFlow Services Export Version 9

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 48

Cisco Flexible NetFlow

Feature Information for Flexible NetFlow

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for Flexible NetFlow
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 49

Feature Information for Flexible NetFlow

Cisco Flexible NetFlow

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 50

I I P A R T
CleanAir
· Configuring Cisco CleanAir, on page 53

4 C H A P T E R
Configuring Cisco CleanAir
· Finding Feature Information, on page 53 · Prerequisites for CleanAir, on page 53 · Restrictions for CleanAir, on page 54 · Information About CleanAir, on page 55 · How to Configure CleanAir, on page 60 · Configuring Cisco CleanAir using the Controller GUI, on page 68 · Configuring Cisco Spectrum Expert, on page 70 · Monitoring CleanAir Parameters, on page 73 · Configuration Examples for Configuring CleanAir, on page 77 · CleanAir FAQs, on page 78 · Additional References, on page 80
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for CleanAir
You can configure Cisco CleanAir only on CleanAir-enabled access points. Only Cisco CleanAir-enabled access points using the following access point modes can perform Cisco CleanAir spectrum monitoring:
· Local--In this mode, each Cisco CleanAir-enabled access point radio provides air quality and interference detection reports for the current operating channel only.
· Monitor--When Cisco CleanAir is enabled in monitor mode, the access point provides air quality and interference detection reports for all monitored channels. The following options are available:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 53

Restrictions for CleanAir

CleanAir

· All-- All channels
· DCA--Channel selection governed by the DCA list
· Country--All channel legal within a regulatory domain
Note The access point does not participate in AQ HeatMap in Prime Infrastructure.
· SE-Connect--This mode enables a user to connect a Spectrum Expert application running on an external Microsoft Windows XP or Vista PC to a Cisco CleanAir-enabled access point in order to display and analyze detailed spectrum data. The Spectrum Expert application connects directly to the access point, bypassing the switch. An access point in SE-Connect mode does not provide any Wi-Fi, RF, or spectrum data to the switch. All CleanAir system functionality is suspended while the AP is in this mode, and no clients are served. This mode is intended for remote troubleshooting only. Up to three active Spectrum Expert connections are possible.
Related Topics Enabling CleanAir for 2.4-GHz Band, on page 60 Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices, on page 60 Configuring Interference Reporting for 2.4-GHz Devices, on page 62 Enabling CleanAir for 5-GHz Band, on page 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices, on page 64 Configuring Interference Reporting for 5-GHz devices, on page 65
Restrictions for CleanAir
· Access points in monitor mode do not transmit Wi-Fi traffic or 802.11 packets. They are excluded from radio resource management (RRM) planning and are not included in the neighbor access point list. IDR clustering depends on the switch's ability to detect neighboring in-network access points. Correlating interference device detections from multiple access points is limited between monitor-mode access points.
· Cisco recommends a ratio of 1 monitor mode access point for every 5 local mode access points, this may also vary based on the network design and expert guidance for best coverage.
· Spectrum Expert (Windows XP laptop client) and AP should be pingable, otherwise; it will not work.
Related Topics Enabling CleanAir for 2.4-GHz Band, on page 60 Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices, on page 60 Configuring Interference Reporting for 2.4-GHz Devices, on page 62 Enabling CleanAir for 5-GHz Band, on page 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices, on page 64 Configuring Interference Reporting for 5-GHz devices, on page 65

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 54

CleanAir

Information About CleanAir

Information About CleanAir
Cisco CleanAir is a spectrum intelligence solution designed to proactively manage the challenges of a shared wireless spectrum. All of the users of the shared spectrum can be seen (both native devices and foreign interferers). It also enables the network to act upon this information. For example, the interfering device can be manually removed or the system can automatically change the channel away from the interference.
A Cisco CleanAir system consists of CleanAir-enabled access points, wireless controller modules, mobility controllers, mobility anchors and next generation switches. The access points join the mobility controller directly or through the mobility anchor. They collect information about all devices that operate in the industrial, scientific, and medical (ISM) bands, identify and evaluate the information as a potential interference source, and forward it to the switch. The switch controls the access points, collects spectrum data, and forwards information to Cisco Prime Infrastructure (PI) or a Cisco Mobility Services Engine (MSE) upon request.
Any networking configurations can be performed only on the mobility controller, configurations cannot be performed in the MA mode. However, any radio level CleanAir configurations can be done using mobility anchor.
For every device operating in the unlicensed band, Cisco CleanAir tells what it is, where it is, how it is impacting the wireless network, and what actions should be taken. It simplifies RF.
Wireless LAN systems operate in unlicensed 2.4-GHz and 5-GHz ISM bands. Many devices like microwave ovens, cordless phones, and Bluetooth devices also operate in these bands and can negatively affect the Wi-Fi operations.
Some of the most advanced WLAN services, such as voice over wireless and IEEE 802.11n radio communications, could be significantly impaired by the interference caused by other legal users of the ISM bands. The integration of Cisco CleanAir functionality addresses this problem of radio frequency (RF) interference.
Cisco CleanAir Components
The basic Cisco CleanAir architecture consists of Cisco CleanAir-enabled APs and switch. Cisco Prime Infrastructure (PI), Mobility Services Engine (MSE) and Cisco Spectrum Expert are optional system components. Cisco PI and MSE provide user interfaces for advanced spectrum capabilities such as historic charts, tracking interference devices, location services and impact analysis.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 55

Cisco CleanAir Components Figure 1: Cisco CleanAir Solution

CleanAir

An access point equipped with Cisco CleanAir technology collects information about non-Wi-Fi interference sources, processes it, and forwards it to the MA. The access point sends AQR and IDR reports to the controller.
The mobility controller (MC) controls and configures CleanAir-capable access points, collects and processes spectrum data, and provides it to the PI and/or the MSE. The MC provides local user interfaces (GUI and CLI) to configure basic CleanAir features and services and display current spectrum information. The MC also does detection, merging and mitigation of interference devices using RRM TPC and DCM. For details on Interference Device Merging, see Interference Device Merging, on page 58.
Cisco PI provides advanced user interfaces for CleanAir that include feature enabling and configuration, consolidated display information, historic AQ records and reporting engines. PI also shows charts of interference devices, AQ trends, and alerts.
Cisco MSE is required for location and historic tracking of interference devices, and provides coordination and consolidation of interference reports across multiple controllers. MSE also provides adaptive Wireless Intrusion Prevention System (WIPS) service that provides comprehensive over-the-air threat detection, location and mitigation. MSE also merges all the interference data.
To obtain detailed spectrum data that can be used to generate RF analysis plots similar to those provided by a spectrum analyzer, you can configure a Cisco CleanAir-enabled access point to connect directly to a Microsoft Windows XP or Vista PC running the Cisco Spectrum Expert application.
The switch performs the following tasks in a Cisco CleanAir system:
· Configures Cisco CleanAir capabilities on the access point. · Provides interfaces (GUI, CLI, and SNMP) for configuring Cisco CleanAir features and retrieving data. · Displays spectrum data. · Collects and processes AQRs from the access point and stores them in the air quality database. AQRs
contains information about the total interference from all identified sources represented by Air Quality Index (AQI) and summary for the most severe interference categories. The CleanAir system can also
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 56

CleanAir

Terms Used in Cisco CleanAir

include unclassified interference information under per interference type reports which enable you to take action in cases where the interference due to unclassified interfering devices is frequent. · Collects and processes Interference Device Reports (IDRs) from the access point and stores them in the interference device database. · Forwards spectrum data to Prime Infrastructure and the MSE.

Terms Used in Cisco CleanAir

Table 9: CleanAir-related Terms

Term AQI AQR
DC EDRRM IDR ISI MA
MC
RSSI

Decription
Air Quality Index. The AQI is an indicator of air quality, based on the air pollutants. An AQI of 0 is bad and an AQI > 85 is good.
Air Quality Report. AQRs contain information about the total interference from all identified sources represented by AQI and summary of the most severe interference categories. AQRs are sent every 15 minutes to the Mobility Controller and every 30 seconds in the Rapid mode.
Duty Cycle. Percentage of time that the channel is utilized by a device.
EDRRM Event Driven RRM. EDRRM allows an access point in distress to bypass normal RRM intervals and immediately change channels.
Interference Device Reports that the access point sends to the controller.
Interference Severity Index. The ISI is an indicator of the severity of the interference.
Mobility Agent. An MA is either an access switch that has a wireless module running on it or an MC with an internal MA running on it. An MA is the wireless component that maintains client mobility state machine for a mobile client that is connected to an access point to the device that the MA is running on.
Mobility Controller. An MC provides mobility management services for inter-peer group roaming events. The MC provides a central point of contact for management and sends the configuration to all the mobility agents under its sub-domain of their mobility configuration, peer group membership and list of members.
Received Signal Strength Indicator. RSSI is a measurement of the power present in a received radio signal. It is the power at which an access point sees the interferer device.

Interference Types that Cisco CleanAir can Detect
Cisco CleanAir can detect interference, report on the location and severity of the interference, and recommend different mitigation strategies. Two such mitigation strategies are persistent device avoidance and spectrum event-driven RRM. New
Wi-Fi chip-based RF management systems share these characteristics:
· Any RF energy that cannot be identified as a Wi-Fi signal is reported as noise. · Noise measurements that are used to assign a channel plan tend to be averaged over a period of time to
avoid instability or rapid changes that can be disruptive to certain client devices. · Averaging measurements reduces the resolution of the measurement. As such, a signal that disrupts
clients might not look like it needs to be mitigated after averaging.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 57

Interference Device Merging

CleanAir

· All RF management systems available today are reactive in nature.
Cisco CleanAir is different and can positively identify not only the source of the noise but also its location and potential impact to a WLAN. Having this information allows you to consider the noise within the context of the network and make intelligent and, where possible, proactive decisions. For CleanAir, two types of interference events are common:
· Persistent interference · Spontaneous interference
Persistent interference events are created by devices that are stationary in nature and have intermittent but largely repeatable patterns of interference. For example, consider the case of a microwave oven located in a break room. Such a device might be active for only 1 or 2 minutes at a time. When operating, however, it can be disruptive to the performance of the wireless network and associated clients. Using Cisco CleanAir, you can positively identify the device as a microwave oven rather than indiscriminate noise. You can also determine exactly which part of the band is affected by the device, and because you can locate it, you can understand which access points are most severely affected. You can then use this information to direct RRM in selecting a channel plan that avoids this source of interference for the access points within its range. Because this interference is not active for a large portion of the day, existing RF management applications might attempt to again change the channels of the affected access points. Persistent device avoidance is unique, however, in that it remains in effect as long as the source of interference is periodically detected to refresh the persistent status. The Cisco CleanAir system knows that the microwave oven exists and includes it in all future planning. If you move either the microwave oven or the surrounding access points, the algorithm updates RRM automatically.
Note Spectrum event-driven RRM can be triggered only by Cisco CleanAir-enabled access points in local mode.
Spontaneous interference is interference that appears suddenly on a network, perhaps jamming a channel or a range of channels completely. The Cisco CleanAir spectrum event-driven RRM feature allows you to set a threshold for air quality (AQ) that, if exceeded, triggers an immediate channel change for the affected access point. Most RF management systems can avoid interference, but this information takes time to propagate through the system. Cisco CleanAir relies on AQ measurements to continuously evaluate the spectrum and can trigger a move within 30 seconds. For example, if an access point detects interference from a video camera, it can recover by changing channels within 30 seconds of the camera becoming active. Cisco CleanAir also identifies and locates the source of interference so that more permanent mitigation of the device can be performed at a later time.
In the case of Bluetooth devices, Cisco CleanAir-enabled access points can detect and report interference only if the devices are actively transmitting. Bluetooth devices have extensive power save modes. For example, interference can be detected when data or voice is being streamed between the connected devices.
Interference Device Merging
The Interference Devices (ID) messages are processed on a Mobility Controller (MC). The Mobility Anchor (MA) forwards the ID messages from APs and hence they are processed on the MC. The MC has visibility of the neighbor information across APs connected to different MAs.
ID merging logic requires AP neighbor information. Neighbor information is obtained from the RRM module. This api only gives neighbor information to the APs directly connected to MC.
Currently the AP neighbor list on MA is synced to MC once every 3 minutes; hence the AP neighbor list obtained by this api could be at most 3 mins old. This delay results in delay in merging of Devices as they

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 58

CleanAir

Persistent Devices

are discovered. The subsequent periodic merge will pick up the updated neighbor information and merge is performed
Persistent Devices
Some interference devices such as outdoor bridges and Microwave Ovens only transmit when needed. These devices can cause significant interference to the local WLAN due to short duration and periodic operation remain largely undetected by normal RF management metrics. With CleanAir the RRM DCA algorithm can detect, measure, register and remember the impact and adjust the DCA algorithm. This minimizes the use of channels affected by the persistent devices in the channel plan local to the interference source. Cisco CleanAir detects and stores the persistent device information in the switch and this information is used to mitigate interfering channels.
Persistent Devices Detection
CleanAir-capable Monitor Mode access point collects information about persistent devices on all configured channels and store the information in controller. Local/Bridge mode AP detects interference devices on the serving channels only.
Persistent Device Avoidance
When a Persistent Device (PD) is detected in the CleanAir module, it is reported to the RRM module on the MA. This information is used in the channel selection by the subsequent EDRRM Event Driven RRM (ED-RRM) signal sent to the RRM module.
EDRRM and AQR Update Mode
EDRRM is a feature that allows an access point that is in distress to bypass normal RRM intervals and immediately change channels. A CleanAir access point always monitors AQ and reports the AQ every 15 minutes. AQ only reports classified interference devices. The key benefit of EDRRM is very fast action time. If an interfering device is operating on an active channel and causes enough AQ degradation to trigger an EDRRM, then no clients will be able to use that channel or the access point. You must remove the access point from the channel. EDRRM is not enabled by default, you must first enable CleanAir and then enable EDRRM.
AQRs are only available on the MC. The mode configuration and timers are held in Radio Control Block (RCB) on MA (for APs connected to MA). There is no change to the current API available for EMS/NMS. No change is required for directly connected APs as RCB (spectrum config and timers) is available locally. For remote APs (APs connected to MA), three new control messages are added. These three messages are for enable, restart timer and disable rapid update mode for a given AP MAC address and slot.
Related Topics Configuring EDRRM for CleanAir-Events, on page 67
CleanAir High Availability
CleanAir configuration (network and radio) is stateful during the switchover. On the MC, Embedded Instrumentation Core (EICORE) provides the sync on network configurations across active and standby nodes. The radio configurations are synced using the HA Infrastructre. The CleanAir configurations on MA are pulled from the MC upon joining. The network configuration is not stored in the EICORE on MA, hence it is synced using HA Infrastructure.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 59

How to Configure CleanAir

CleanAir

CleanAir Data (AQ and IDR) reports are not stateful, that is, the standby and active nodes are not synced. On switchover, the APs send the reports to the current active slot. The RRM Client (HA Infra Client) is used for CleanAir HA sync.

How to Configure CleanAir

Enabling CleanAir for 2.4-GHz Band

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz cleanair 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 24ghz cleanair Example:

Step 3

Switch(config)#ap dot11 24ghz cleanair Switch(config)#no ap dot11 24ghz cleanair
end Example:
Switch(config)# end

Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78

Purpose Enters global configuration mode.
Enables the CleanAir feature on 802.11b network. Add no in the command to disable CleanAir on the 802.11b network.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz cleanair alarm air-quality threshold threshold_value

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 60

CleanAir

Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices

3. ap dot11 24ghz cleanair alarm device {bt-discovery | bt-link | canopy | cont-tx | dect-like | fh | inv | jammer | mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee }
4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 24ghz cleanair alarm air-quality threshold threshold_value
Example:

Purpose Enters global configuration mode.
Configures the alarm for the threshold value for air-quality for all the 2.4-GHz devices. Add the no form of this command to disable the alarm.

Step 3

Switch(config)#ap dot11 24ghz cleanair alarm air-quality threshold 50

ap dot11 24ghz cleanair alarm device {bt-discovery | Configures the alarm for the 2.4-GHz devices. Add the no

bt-link | canopy | cont-tx | dect-like | fh | inv | jammer | form command to disable the alarm.

mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee }

· bt-discovery--Bluetooth Discovery.

Example:

· bt-link--Bluetooth Link.

Switch(config)#ap dot11 24ghz cleanair alarm device canopy

· canopy--Canopy devices. · cont-tx--Continuous Transmitter.

· dect-like--Digital Enhanced Cordless Communication (DECT)-like phone.

· fh--802.11 frequency hopping devices.

· inv--Devices using spectrally inverted WiFi signals.

· jammer--Jammer.

· mw-oven--Microwave oven.

· nonstd--Devices using non standard Wi-Fi channels.

· report--Interference device reporting.

· superag--802.11 SuperAG devices.

· tdd-tx--TDD Transmitter.

· video--Video cameras.

· wimax-fixed--WiMax Fixed.

· wimax-mobile--WiMax Mobile.

· xbox--Xbox.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 61

Configuring Interference Reporting for 2.4-GHz Devices

CleanAir

Step 4

Command or Action
end Example:
Switch(config)# end
Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78

Purpose · zigbee--802.15.4 devices.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Interference Reporting for 2.4-GHz Devices

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz cleanair device{bt-discovery | bt-link | canopy | cont-tx | dect-like | fh | inv | jammer
| mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee } 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz cleanair device{bt-discovery | bt-link | Configures the 2.4 GHz interference devices to report to

canopy | cont-tx | dect-like | fh | inv | jammer | mw-oven the switch. Use the no form of this command to disable the

| nonstd | report | superag | tdd-tx | video | wimax-fixed configuration.

| wimax-mobile | xbox | zigbee }

· bt-discovery--Bluetooth Discovery

Example:

· bt-link--Bluetooth Link

Switch(config)# ap dot11 24ghz cleanair device bt-discovery
Switch(config)# ap dot11 24ghz cleanair device bt-link
Switch(config)# ap dot11 24ghz cleanair device canopy
Switch(config)# ap dot11 24ghz cleanair device cont-tx
Switch(config)# ap dot11 24ghz cleanair device dect-like

· canopy--Canopy devices · cont-tx- Continuous Transmitter · dect-like- Digital Enhanced Cordless Communication
(DECT) like phone · fh- 802.11 frequency hopping devices · inv- Devices using spectrally inverted WiFi signals · jammer- Jammer · mw-oven- Microwave Oven

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 62

CleanAir

Enabling CleanAir for 5-GHz Band

Step 3

Command or Action

Purpose

Switch(config)# ap dot11 24ghz cleanair device fh · nonstd- Devices using non-standard WiFi channels

Switch(config)# ap dot11 24ghz cleanair device inv · report- no description

Switch(config)# ap dot11 24ghz cleanair device jammer
Switch(config)# ap dot11 24ghz cleanair device mw-oven

· superag- 802.11 SuperAG devices · tdd-tx- TDD Transmitter · video- Video cameras

Switch(config)# ap dot11 24ghz cleanair device nonstd
Switch(config)# ap dot11 24ghz cleanair device report

· wimax-fixed- WiMax Fixed · wimax-mobile- WiMax Mobile · xbox- Xbox

Switch(config)# ap dot11 24ghz cleanair device superag

· zigbee- 802.15.4 devices

Switch(config)# ap dot11 24ghz cleanair device tdd-tx

Switch(config)# ap dot11 24ghz cleanair device video

Switch(config)# ap dot11 24ghz cleanair device wimax-fixed

Switch(config)# ap dot11 24ghz cleanair device wimax-mobile

Switch(config)# ap dot11 24ghz cleanair device xbox

Switch(config)# ap dot11 24ghz cleanair device zigbee

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78 Monitoring the Interference Devices (GUI), on page 76

Enabling CleanAir for 5-GHz Band

SUMMARY STEPS

1. configure terminal 2. ap dot11 5ghz cleanair 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 63

Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices

CleanAir

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 5ghz cleanair Example:
Switch(config)#ap dot11 5ghz cleanair

Switch(config)#no ap dot11 5ghz cleanair

Step 3

end Example:
Switch(config)# end

Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78

Purpose Enters global configuration mode.
Enables the CleanAir feature on 802.11a network. Add no in the command to disable CleanAir on the 802.11a network.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices

SUMMARY STEPS

1. configure terminal 2. ap dot11 5ghz cleanair alarm air-quality threshold threshold_value 3. ap dot11 5ghz cleanair alarm device{canopy | cont-tx | dect-like | inv | jammer | nonstd | radar |
report | superag | tdd-tx | video | wimax-fixed | wimax-mobile} 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 5ghz cleanair alarm air-quality threshold threshold_value
Example:

Purpose Enters global configuration mode.
Configures the alarm for the threshold value for air-quality for all the 5-GHz devices. Add the No form of the command to disable the alarm.

Switch(config)#ap dot11 5ghz cleanair alarm air-quality threshold 50

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 64

CleanAir

Configuring Interference Reporting for 5-GHz devices

Step 3 Step 4

Command or Action

Purpose

ap dot11 5ghz cleanair alarm device{canopy | cont-tx | Configures the alarm for the 5-GHz devices. Add the no

dect-like | inv | jammer | nonstd | radar | report | superag form of the command to disable the alarm.

| tdd-tx | video | wimax-fixed | wimax-mobile}

· canopy--Canopy devices.

Example:

· cont-tx--Continuous Transmitter.

Switch(config)#ap dot11 5ghz cleanair alarm device · dect-like--Digital Enhanced Cordless Communication (DECT) like phone.

· fh--802.11 frequency hopping devices.

· inv--Devices using spectrally inverted WiFi signals.

· jammer--Jammer.

· nonstd--Devices using non-standard WiFi channels.

· radar--Radars.

· report--Interference device reporting.

· superag--802.11 SuperAG devices.

· tdd-tx--TDD Transmitter.

· video--Video cameras.

· wimax-fixed--WiMax Fixed.

· wimax-mobile--WiMax Mobile.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78

Configuring Interference Reporting for 5-GHz devices

SUMMARY STEPS

1. configure terminal 2. ap dot11 5ghz cleanair device{canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | report |
superag | tdd-tx | video | wimax-fixed | wimax-mobile} 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 65

Configuring Interference Reporting for 5-GHz devices

CleanAir

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 5ghz cleanair device{canopy | cont-tx | dect-like Configures the 5-GHz interference devices to report to the

| inv | jammer | nonstd | radar | report | superag | tdd-tx switch. Add the no form of the command to disable

| video | wimax-fixed | wimax-mobile}

interference device reporting.

Example:

· canopy--Canopy devices

Switch(config)#ap dot11 5ghz cleanair device canopy Switch(config)#ap dot11 5ghz cleanair device cont-tx Switch(config)#ap dot11 5ghz cleanair device dect-like Switch(config)#ap dot11 5ghz cleanair device inv Switch(config)#ap dot11 5ghz cleanair device jammer Switch(config)#ap dot11 5ghz cleanair device nonstd Switch(config)#ap dot11 5ghz cleanair device radar Switch(config)#ap dot11 5ghz cleanair device report Switch(config)#ap dot11 5ghz cleanair device superag Switch(config)#ap dot11 5ghz cleanair device tdd-tx Switch(config)#ap dot11 5ghz cleanair device video Switch(config)#ap dot11 5ghz cleanair device wimax-fixed

· cont-tx--Continuous Transmitter · dect-like--Digital Enhanced Cordless Communication
(DECT) like phone · fh--802.11 frequency hopping devices · inv--Devices using spectrally inverted WiFi signals · jammer--Jammer · nonstd--Devices using non-standard WiFi channels · radar--Radars · report--Interference device reporting · superag--802.11 SuperAG devices · tdd-tx--TDD Transmitter · video--Video cameras · wimax-fixed--WiMax Fixed · wimax-mobile--WiMax Mobile

Switch(config)#ap dot11 5ghz cleanair device wimax-mobile

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Prerequisites for CleanAir, on page 53 Restrictions for CleanAir, on page 54 CleanAir FAQs, on page 78 Monitoring the Interference Devices (GUI), on page 76

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 66

CleanAir

Configuring EDRRM for CleanAir-Events

Configuring EDRRM for CleanAir-Events

SUMMARY STEPS

1. configure terminal 2. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event 3. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event [sensitivity {high | low | medium}] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 {24ghz | 5ghz} rrm channel cleanair-event Enables EDRRM cleanair-event. Add the no form of the

Example:

command to disable EDRRM.

Step 3

Switch(config)#ap dot11 24ghz rrm channel cleanair-event

Switch(config)#no ap dot11 24ghz rrm channel cleanair-event

ap dot11 {24ghz | 5ghz} rrm channel cleanair-event Configures the EDRRM sensitivity of cleanair-event.

[sensitivity {high | low | medium}]

· High--Specifies the most sensitivity to non Wi­Fi

Example:

interference as indicated by the air quality (AQ) value.

Switch(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high

· Low--Specifies the least sensitivity to non Wi­Fi interference as indicated by the AQ value.
· Medium--Specifies medium sensitivity to non Wi­Fi interference as indicated by the AQ value.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics EDRRM and AQR Update Mode, on page 59

Configuring Persistent Device Avoidance

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 67

Configuring Cisco CleanAir using the Controller GUI

CleanAir

2. ap dot11 {24ghz | 5ghz} rrm channel device 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 {24ghz | 5ghz} rrm channel device Example:

Enables the persistent non Wi­Fi device avoidance in the 802.11 channel assignment. Add the no form of the command to disable the persistent device avoidance.

Switch(config)#ap dot11 24ghz rrm channel device

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Cisco CleanAir using the Controller GUI
Configuring Cisco CleanAir on the Cisco Wireless LAN Controller (GUI)

Step 1 Step 2 Step 3
Step 4 Step 5

Choose Configuration > Wireless > 802.11a/n or 802.11b/g/n > CleanAir to open the 802.11a (or 802.11b) > CleanAir page. Select the CleanAir check box to enable Cisco CleanAir functionality on the 802.11a/n or 802.11b/g/n network, or unselect it to prevent the switch from detecting spectrum interference. By default, the Cisco CleanAir is disabled. Select the Report Interferers check box to enable the Cisco CleanAir system to report any detected sources of interference, or unselect it to prevent the switch from reporting interferers. The default value is selected.
Note Device Security alarms, Event Driven RRM, and the Persistence Device Avoidance algorithm do not work if Report Interferers are disabled.
Select the Persistent Device Propagation check box to enable propagation of information about persistent devices that can be detected by CleanAir. Persistent device propagation enables you to propagate information about persistent devices to the neighboring access points connected to the same switch. Persistent interferers are present at the location and interfere with the WLAN operations even if they are not detectable at all times. Ensure that any sources of interference that need to be detected and reported by the Cisco CleanAir system appear in the Interferences to Detect box and any that do not need to be detected appear in the Interferences to Ignore box. Use the > and < buttons to move interference sources between these two boxes. By default, all interference sources are detected. The sources of interference that you can choose depend on the type of radio, 802.11a/n/ac or 802.11b/g/n, and are as follows:
· 802.11 FH--A 802.11 FH device

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 68

CleanAir

Configuring Cisco CleanAir on the Cisco Wireless LAN Controller (GUI)

Step 6
Step 7 Step 8

· 802.15.4--A 802.15.4 or ZigBee device · Continuous Transmitter--A continuous transmitter · Bluetooth Discovery--A Bluetooth device · DECT-like Phone--A digital enhanced cordless communication (DECT)-compatible phone · Microsoft--A Microsoft device · SuperAG--A 802.11a/g SuperAG device · Microwave Phone--A microwave phone · Jammer--A jamming device · Canopy--A canopy bridge device · TDD Transmitter--A time division duplex (TDD) transmitter device · Video Camera--An analog video camera · WiFi Invalid Channel--A WiFi invalid channel · WiFi Inverted--A device using spectrally inverted Wi-Fi signals (I and Q signals of the RF signal are inverted) · WiMAX Fixed--A WiMAX fixed device (802.11a/n only) · WiMAX Mobile--A WiMAX mobile device (802.11a/n only)
Note Access points that are associated to the switch send interference reports only for the interferers that appear in the Interferences to Detect box. This functionality allows you to filter out interferers that you do not want as well as any that may be flooding the network and causing performance problems for the switch or Prime Infrastructure. Filtering allows the system to resume normal performance levels.
Configure Cisco CleanAir alarms as follows: a) Select the Enable AQI (Air Quality Index) Trap check box to enable the triggering of air quality alarms, or unselect
the box to disable this feature. The default value is selected. b) If you selected the Enable AQI Trap check box in Step a, enter a value between 1 and 100 (inclusive) in the AQI
Alarm Threshold text box to specify the threshold at which you want the air quality alarm to be triggered. When the air quality falls below the threshold level, the alarm is triggered. A value of 1 represents the worst air quality, and 100 represents the best. The default value is 35. c) Enter the AQI threshold in the AQI Alarm Threshold text box. An alarm is generated when the air quality reaches a threshold value. The default is 35. The range is from 1 and 100. d) Select the Enable Interference For Security Alarm check box to trigger interferer alarms when the switch detects specified device types, or unselect it to disable this feature. The default value is selected e) Make sure that any sources of interference that need to trigger interferer alarms appear in the Trap on These Types box and any that do not need to trigger interferer alarms appear in the Do Not Trap on These Types box. Use the > and < buttons to move interference sources between these two boxes. By default, all interference sources trigger interferer alarms.
For example, if you want the switch to send an alarm when it detects a jamming device, select the Enable Interference For Security Alarm check box and move the jamming device to the Trap on These Types box.
Click Apply.
Trigger spectrum event-driven radio resource management (RRM) to run when a Cisco CleanAir-enabled access point detects a significant level of interference as follows: a) Look at the EDRRM field to see the current status of spectrum event-driven RRM and, if enabled, the Sensitivity
Threshold field to see the threshold level at which event-driven RRM is invoked. b) If you want to change the current status of event-driven RRM or the sensitivity level, go to the 802.11a (or 802.11b)
> RRM > Dynamic Channel Assignment (DCA) page. c) Select the EDRRM check box to trigger RRM to run when an access point detects a certain level of interference, or
unselect it to disable this feature. The default value is selected.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 69

Configuring Cisco CleanAir on an Access Point (GUI)

CleanAir

Step 9

d) If you selected the EDRRM check box in Step c, choose Low, Medium, High , or Custom from the Sensitivity Threshold drop-down list to specify the threshold at which you want RRM to be triggered. When the interference for the access point rises above the threshold level, RRM initiates a local dynamic channel assignment (DCA) run and changes the channel of the affected access point radio if possible to improve network performance. EDRRM prevents the access point from returning to the original channel for three hours after the event.
High--Represents an increased sensitivity to changes in the environment.
Custom--Allows you to set a threshold value in the Custom Sensitivity Threshold field. The default sensitivity is 35.
Low--Represents a decreased sensitivity to changes in the environment.
The EDRRM AQ threshold value for low sensitivity is 35, medium sensitivity is 50, and high sensitivity is 60.
e) Click Apply.
Click Save Configuration.

Configuring Cisco CleanAir on an Access Point (GUI)

Step 1 Step 2
Step 3 Step 4 Step 5

Choose Configuration > Wireless > Access Points > Radios > 802.11a/n or 802.11b/g/n to open the 802.11a/n (or 802.11b/g/n) Radios page. Select the check box adjacent to the desired access point and click Configure. The 802.11a/n (or 802.11b/g/n) Radios page appears.
The CleanAir Capable field shows whether this access point can support CleanAir functionality. If it can, go to the next step to enable or disable CleanAir for this access point. If the access point cannot support CleanAir functionality, you cannot enable CleanAir for this access point.
Note By default, the Cisco CleanAir functionality is enabled on the radios.
Enable Cisco CleanAir functionality for this access point by choosing Enable from the CleanAir Admin Status drop-down list. To disable CleanAir functionality for this access point, choose Disable. The default value is Enable. This setting overrides the global CleanAir configuration for this access point. Click Apply. Click Save Configuration.

Configuring Cisco Spectrum Expert
Configuring Spectrum Expert (GUI)
Before you begin · Spectrum Expert (Windows XP laptop client) and access point should be pingable, otherwise; it will not work.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 70

CleanAir

Configuring Spectrum Expert (GUI)

· Prior to establishing a connection between the Spectrum Expert console and the access point, make sure that IP address routing is properly configured and the network spectrum interface (NSI) ports are open in any intervening firewalls.
· The access point must be a TCP server listening on ports 37540 for 2.4 GHz and 37550 for 5 GHz frequencies. These ports must be opened for the spectrum expert application to connect to the access point using the NSI protocol.
· You can view the NSI key from the switch CLI by using the show ap name ap_name config dot11 {24ghz | 5ghz} command.

Step 1
Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10
Step 11 Step 12

Ensure that Cisco CleanAir functionality is enabled for the access point that will be connected to the Spectrum Expert console.
Note The SE-Connect mode is set for the entire access point, not just a single radio. However, the Spectrum Expert console connects to a single radio at a time.
Choose Configuration > Wireless > Access Points > All APs to open the All APs page. Click the name of the desired access point to open the All APs > Details page. Choose SE-Connect from the AP Mode drop-down list. This mode is available only for access points that are capable of supporting Cisco CleanAir functionality. For the SE-Connect mode to appear as an available option, the access point must have at least one spectrum-capable radio in the Enable state. Click Apply to commit your changes. Click OK when prompted to reboot the access point. On the Windows PC, access the Cisco Software Center from this URL:
http://www.cisco.com/cisco/software/navigator.html
Click Product > Wireless > Cisco Spectrum Intelligence > Cisco Spectrum Expert > Cisco Spectrum Expert Wi-Fi, and then download the Spectrum Expert 4.1.11 executable (*.exe) file. Run the Spectrum Expert application on the PC. When the Connect to Sensor dialog box appears, enter the IP address of the access point, choose the access point radio, and enter the 16-byte network spectrum interface (NSI) key to authenticate. The Spectrum Expert application opens a TCP/IP connection directly to the access point using the NSI protocol.
When an access point in SE-Connect mode joins a switch, it sends a Spectrum Capabilities notification message, and the switch responds with a Spectrum Configuration Request. The request contains the 16-byte random NSI key generated by the switch for NSI authentication. The switch generates one key per access point, which the access point stores until it is rebooted.
Note You can establish up to three Spectrum Expert console connections per access point radio.
Verify that the Spectrum Expert console is connected to the access point by selecting the Slave Remote Sensor text box in the bottom right corner of the Spectrum Expert application. If the two devices are connected, the IP address of the access point appears in this text box. Use the Spectrum Expert application to view and analyze spectrum data from the access point.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 71

Configuring Spectrum Expert (CLI)

CleanAir

Configuring Spectrum Expert (CLI)
Before you begin
· Spectrum Expert (Windows XP laptop client) and access point should be pingable, otherwise; it will not work.
· Prior to establishing a connection between the Spectrum Expert console and the access point, make sure that IP address routing is properly configured and the network spectrum interface (NSI) ports are open in any intervening firewalls.
· The access point must be a TCP server listening on ports 37540 for 2.4-GHz and 37550 for 5-GHz frequencies. These ports must be opened for the spectrum expert application to connect to the access point using the NSI protocol.
· You can view the NSI key from the switch CLI by using the show ap name ap_name config dot11 {24ghz | 5ghz} command.

Step 1
Step 2 Step 3

To configure the access point for SE-Connect mode, enter this command: ap name ap_name mode se-connect Example:
Switch#ap name Cisco_AP3500 mode se-connect

When prompted to reboot the access point, enter Y. To view the NSI key for the access point, enter this command: show ap name ap_name config dot11 {24ghz | 5ghz} Example:
Switch#show ap name Cisco_AP3500 config dot11 24ghz

<snippet> CleanAir Management Information
CleanAir Capable CleanAir Management Admin State CleanAir Management Operation State CleanAir NSI Key CleanAir Sensor State

: Yes : Enabled : Up : 274F1F9B1A5206683FAF57D87BFFBC9B : Configured

<snippet>

What to do next On the Windows PC, download Cisco Spectrum Expert:
· Access the Cisco Software Center from this URL: http://www.cisco.com/cisco/software/navigator.html · Click Product > Wireless > Cisco Spectrum Intelligence > Cisco Spectrum Expert > Cisco Spectrum
Expert Wi-Fi, and then download the Spectrum Expert 4.1.11 executable (*.exe) file. · Run the Spectrum Expert application on the PC.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 72

CleanAir

Monitoring CleanAir Parameters

· When the Connect to Sensor dialog box appears, enter the IP address of the access point, choose the access point radio, and enter the 16-byte network spectrum interface (NSI) key to authenticate. The Spectrum Expert application opens a TCP/IP connection directly to the access point using the NSI protocol.
When an access point in SE-Connect mode joins a switch, it sends a Spectrum Capabilities notification message, and the switch responds with a Spectrum Configuration Request. The request contains the 16-byte random NSI key generated by the switch for use in NSI authentication. The switch generates one key per access point, which the access point stores until it is rebooted.

Note You can establish up to three Spectrum Expert console connections per access point radio.
· Verify that the Spectrum Expert console is connected to the access point by selecting the Slave Remote Sensor text box in the bottom right corner of the Spectrum Expert application. If the two devices are connected, the IP address of the access point appears in this text box.
· Use the Spectrum Expert application to view and analyze spectrum data from the access point.

Monitoring CleanAir Parameters

You can monitor CleanAir parameters using the following commands:
Table 10: Commands for Monitoring CleanAir

Commands

Description

show ap dot11 24ghz cleanair air-quality summary Displays CleanAir Air Quality (AQ) data for 2.4-GHz band

show ap dot11 24ghz cleanair air-quality worst Displays CleanAir Air Quality (AQ) worst data for 2.4-GHz band

show ap dot11 24ghz cleanair config

Displays CleanAir Configuration for 2.4-GHz band

show ap dot11 24ghz cleanair device type all Displays all CleanAir Interferers for 2.4-GHz band

show ap dot11 24ghz cleanair device type bt-discovery

Displays CleanAir Interferers of type BT Discovery for 2.4-GHz band

show ap dot11 24ghz cleanair device type bt-link Displays CleanAir Interferers of type BT Link for 2.4-GHz band

show ap dot11 24ghz cleanair device type canopy Displays CleanAir Interferers of type Canopy for 2.4-GHz band

show ap dot11 24ghz cleanair device type cont-tx Displays CleanAir Interferers of type Continuous transmitter for 2.4-GHz band

show ap dot11 24ghz cleanair device type dect-like

Displays CleanAir Interferers of type DECT Like for 2.4-GHz band

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 73

Monitoring CleanAir Parameters

CleanAir

Commands show ap dot11 24ghz cleanair device type fh

Description
Displays CleanAir Interferers of type 802.11FH for 2.4-GHz band

show ap dot11 24ghz cleanair device type inv Displays CleanAir Interferers of type WiFi Inverted for 2.4-GHz band

show ap dot11 24ghz cleanair device type jammer Displays CleanAir Interferers of type Jammer for 2.4-GHz band

show ap dot11 24ghz cleanair device type mw-oven

Displays CleanAir Interferers of type MW Oven for 2.4-GHz band

show ap dot11 24ghz cleanair device type nonstd Displays CleanAir Interferers of type WiFi Inv. Ch for 2.4-GHz band

show ap dot11 24ghz cleanair device type persistent

Displays CleanAir Interferers of type Persistent for 2.4-GHz band

show ap dot11 24ghz cleanair device type superag Displays CleanAir Interferers of type SuperAG for 2.4-GHz band

show ap dot11 24ghz cleanair device type tdd-tx Displays CleanAir Interferers of type TDD Transmit for 2.4-GHz band

show ap dot11 24ghz cleanair device type video Displays CleanAir Interferers of type Video Camera for 2.4-GHz band

show ap dot11 24ghz cleanair device type wimax-fixed

Displays CleanAir Interferers of type WiMax Fixed for 2.4-GHz band

show ap dot11 24ghz cleanair device type wimax-mobile

Displays CleanAir Interferers of type WiMax Mobile for 2.4-GHz band

show ap dot11 24ghz cleanair device type xbox Displays CleanAir Interferers of type Xbox for 2.4-GHz band

show ap dot11 24ghz cleanair device type zigbee Displays CleanAir Interferers of type zigbee for 2.4-GHz band

show ap dot11 5ghz cleanair air-quality summary Displays CleanAir Air Quality (AQ) data for 5-GHz band

show ap dot11 5ghz cleanair air-quality worst Displays CleanAir Air Quality (AQ) worst data for 5-GHz band

show ap dot11 5ghz cleanair config

Displays CleanAir Configuration for 5-GHz band

show ap dot11 5ghz cleanair device type all

Displays all CleanAir Interferers for 5-GHz band

show ap dot11 5ghz cleanair device type canopy Displays CleanAir Interferers of type Canopy for 5-GHz band

show ap dot11 5ghz cleanair device type cont-tx Displays CleanAir Interferers of type Continuous TX for 5-GHz band

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 74

CleanAir

Monitoring CleanAir Parameters

Commands

Description

show ap dot11 5ghz cleanair device type dect-like Displays CleanAir Interferers of type DECT Like for 5-GHz band

show ap dot11 5ghz cleanair device type inv

Displays CleanAir Interferers of type WiFi Inverted for 5-GHz band

show ap dot11 5ghz cleanair device type jammer Displays CleanAir Interferers of type Jammer for 5-GHz band

show ap dot11 5ghz cleanair device type nonstd Displays CleanAir Interferers of type WiFi Inv. Ch for 5-GHz band

show ap dot11 5ghz cleanair device type persistent Displays CleanAir Interferers of type Persistent for 5-GHz band

show ap dot11 5ghz cleanair device type superag Displays CleanAir Interferers of type SuperAG for 5-GHz band

show ap dot11 5ghz cleanair device type tdd-tx Displays CleanAir Interferers of type TDD Transmit for 5-GHz band

show ap dot11 5ghz cleanair device type video Displays CleanAir Interferers of type Video Camera for 5-GHz band

show ap dot11 5ghz cleanair device type wimax-fixed

Displays CleanAir Interferers of type WiMax Fixed for 5-GHz band

show ap dot11 5ghz cleanair device type wimax-mobile

Displays CleanAir Interferers of type WiMax Mobile for 5-GHz band

You can also check the CleanAir status of the access points using the switch GUI:

Choose Monitor > Wireless > Access Points > 802.11 a/n/acor 802.11 b/g/n.
The Radios page is displayed showing a list of access points that are associated with the switch. You can see the CleanAir Admin and CleanAir Status.
The Cisco CleanAir status is one of the following:
· UP--The spectrum sensor for the access point radio is currently operational (error code 0). · DOWN--The spectrum sensor for the access point radio is currently not operational because an error has occurred.
The most likely reason for the error is that the access point radio is disabled (error code 8). To correct this error, enable the radio. · ERROR--The spectrum sensor for the access point radio has crashed (error code 128), making CleanAir monitoring nonoperational for this radio. If this error occurs, reboot the access point. If the error continues to appear, you might want to disable Cisco CleanAir functionality on the radio. · N/A--This access point radio is not capable of supporting Cisco CleanAir functionality.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 75

Monitoring the Interference Devices

CleanAir

Monitoring the Interference Devices
When a CleanAir-enabled access point detects interference devices, detections of the same device from multiple sensors are merged together to create clusters. Each cluster is given a unique ID. Some devices conserve power by limiting the transmit time until actually needed which results in the spectrum sensor to temporarily stop detecting the device. This device is then correctly marked as down. A down device is correctly removed from the spectrum database. In cases when all the interferer detections for a specific devices are reported, the cluster ID is kept alive for an extended period of time to prevent possible device detection bouncing. If the same device is detected again, it is merged with the original cluster ID and the device detection history is preserved.
For example, some bluetooth headsets operate on battery power. These devices employ methods to reduce power consumption, such as turning off the transmitter when not actually needed. Such devices can appear to come and go from the classification. To manage these devices, CleanAir keeps the cluster IDs longer and they are remerged into a single record upon detection. This process smoothens the user records and accurately represents the device history.
Monitoring the Interference Devices (GUI)
Before you begin
You can configure Cisco CleanAir only on CleanAir-enabled access points.

Step 1 Step 2

Choose Monitor > Interferers > Cisco CleanAir > 802.11a/n or 802.11b/g/n > Interference Devices to open the Cisco APs > Interference Devices page. This page shows the following information:
· AP Name--The name of the access point where the interference device is detected. · Interferer Type--Type of the interferer. · Affected Channel--Channel that the device affects. · Severity--Severity index of the interfering device. · Duty Cycle (%)--Proportion of time during which the interfering device was active. · RSSI--Receive signal strength indicator (RSSI) of the access point. · DevID--Device identification number that uniquely identified the interfering device. · ClusterID--Cluster identification number that uniquely identifies the type of the devices.
Click the Filter icon or choose the Quick Filter option from the Show drop-down list to display the information about interference devices based on a particular criteria.

Related Topics Configuring Interference Reporting for 2.4-GHz Devices, on page 62 Configuring Interference Reporting for 5-GHz devices, on page 65

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 76

CleanAir

Monitoring the Worst Air Quality of Radio Bands (GUI)

Monitoring the Worst Air Quality of Radio Bands (GUI)
Choose Monitor > Cisco CleanAir > Worst Air-Quality to open the Air Quality Report page. This page shows the air quality of both the 802.11a/n and 802.11b/g/n radio bands. This page displays the following information:
· AP Name--Name of the access point that reported the worst air quality for the 802.11 radio band. · Channel Number--Radio channel with the worst reported air quality. · Minimum Air Quality Index--Minimum air quality for this radio channel. The range is from 1 to 100. An air
quality index (AQI) value of 100 is the best, and 1 is the worst. · Average Air Quality Index--Average air quality for this radio channel. The range is from 1 to 100. An air quality
index (AQI) value of 100 is the best, and 1 is the worst. · Interference Device Count--Number of interferers detected by the radios on the 802.11 radio band.

Configuration Examples for Configuring CleanAir
Enabling CleanAir on 2.4-GHz Band and an Access Point: Example This example shows how to enable CleanAir on the 2.4-GHz band and an access point operating in the channel:
Switch#configure terminal Switch(config)#ap dot11 24ghz cleanair Switch(config)#exit Switch#ap name TAP1 dot11 24ghz cleanair Switch#end
Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices: Example This example shows how to configure a CleanAir Alarm for 2.4-GHz Air-Quality threshold of 50 dBm and an Xbox device:
Switch#configure terminal Switch(config)#ap dot11 24ghz cleanair alarm air-quality threshold 50 Switch(config)#ap dot11 24ghz cleanair alarm device xbox Switch(config)#end
Configuring Interference Reporting for 5-GHz Devices: Example This example shows how to configure interference reporting for 5-GHz devices:
Switch#configure terminal Switch(config)#ap dot11 5ghz cleanair alarm device xbox Switch(config)#end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 77

CleanAir FAQs

CleanAir

Configuring EDRRM for CleanAir-Events: Example This example shows how to enable an EDRRM cleanair-event in the 2.4-GHz band and configure high sensitivity to non Wi­Fi interference:
Switch#configure terminal Switch(config)#ap dot11 24ghz rrm channel cleanair-event Switch(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high Switch(config)#end
Configuring Persistent Device Avoidance: Example This example shows how to enable persistent non Wi­Fi device avoidance in the 2.4-GHz band:
Switch#configure terminal Switch(config)#ap dot11 24ghz rrm channel device Switch(config)#end
Configuring an Access Point for SE-Connect Mode: Example This example shows how to configure an access point in the SE-Connect mode:
Switch#ap name Cisco_AP3500 mode se-connect

CleanAir FAQs

Q. How do I check if my MC is up? A. To check if the MC is up, use the command: show wireless mobility summary.
This example shows how to display the mobility summary:
Switch#show wireless mobility summary

Mobility Controller Summary:

Mobility Role

: Mobility Controller

Mobility Protocol Port

: 16666

Mobility Group Name

: MG-AK

Mobility Oracle

: Disabled

Mobility Oracle IP Address

: 0.0.0.0

DTLS Mode

: Enabled

Mobility Domain ID for 802.11r

: 0x39b2

Mobility Keepalive Interval

: 10

Mobility Keepalive Count

:3

Mobility Control Message DSCP Value

: 48

Mobility Domain Member Count

:2

Link Status is Control Link Status : Data Link Status

Controllers configured in the Mobility Domain:

IP

Public IP

Group Name

Multicast IP

Link Status

-------------------------------------------------------------------------------

9.6.136.10

-

MG-AK

0.0.0.0

UP : UP

Q. Multiple access points detect the same interference device, however, the switch shows them as separate clusters or different suspected devices clustered together. Why does this happen?
A. Access points must be RF neighbors for the switch to consider the merging of devices that are detected by these access points. The access point takes time to establish neighbor relationships. A few minutes

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 78

CleanAir

CleanAir FAQs

after the switch reboots or a change in the RF group and similar events, clustering will not be very accurate.

Q. Can I merge two monitor mode access points using a switch? A. No, you cannot merge two monitor mode access points using a switch. You can merge the monitor mode
access points only using MSE.

Q. How do I view neighbor access points? A. To view neighbor access points, use the command: show ap ap_name auto-rf dot11{24ghz | 5ghz}
This example shows how to display the neighbor access points:
Switch#show ap name AS-5508-5-AP3 auto-rf dot11 24ghz

<snippet> Nearby APs
AP 0C85.259E.C350 slot 0 AP 0C85.25AB.CCA0 slot 0 AP 0C85.25C7.B7A0 slot 0 AP 0C85.25DE.2C10 slot 0 AP 0C85.25DE.C8E0 slot 0 AP 0C85.25DF.3280 slot 0 AP 0CD9.96BA.5600 slot 0 AP 24B6.5734.C570 slot 0 <snippet>

: -12 dBm on 1 (10.10.0.5) : -24 dBm on 6 (10.10.0.5) : -26 dBm on 11 (10.10.0.5) : -24 dBm on 6 (10.10.0.5) : -14 dBm on 11 (10.10.0.5) : -31 dBm on 6 (10.10.0.5) : -44 dBm on 6 (10.0.0.2) : -48 dBm on 11 (10.0.0.2)

Q. What are the debug commands available for CleanAir? A. The debug commands for CleanAir are:
debug cleanair {all | error | event | internal-event | nmsp | packet}
debug rrm {all | channel | detail | error | group | ha | manager | message | packet | power | prealarm | profile | radar | rf-change | scale | spectrum}

Q. Why are CleanAir Alarms not generated for interferer devices? A. Verify that the access points are CleanAir-capable and CleanAir is enabled both on the access point and
the switch.

Q. Can the Cisco Catalyst 3850 and 3650 Series Switches function as a Mobility Agent (MA)? A. Yes, the Cisco Catalyst 3850 and 3650 Series Switches can function as an MA.
Q. Are CleanAir configurations available on the MA? A. From Release 3.3 SE, CleanAir configurations are available on the MA. You can use the following two
CleanAir commands on the MA:
· show ap dot11 5ghz cleanair config · show ap dot11 24ghz cleanair config

Related Topics Enabling CleanAir for 2.4-GHz Band, on page 60 Configuring a CleanAir Alarm for 2.4-GHz Air-Quality and Devices, on page 60 Configuring Interference Reporting for 2.4-GHz Devices, on page 62 Enabling CleanAir for 5-GHz Band, on page 63 Configuring a CleanAir Alarm for 5-GHz Air-Quality and Devices, on page 64 Configuring Interference Reporting for 5-GHz devices, on page 65

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 79

Additional References

CleanAir

Additional References

Related Documents Related Topic CleanAir commands and their details
High Availability configurations
High Availability commands and their details

Document Title
CleanAir Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
High Availability Configuration Guide, Cisco IOS XE Release 3SE (Cisco 5700 Series Wireless Controllers)
High Availability Command Reference, Cisco IOS XE Release 3SE (Cisco 5700 Series Wireless Controllers)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 80

I I I PA R T
Interface and Hardware Component
· Configuring Interface Characteristics, on page 83 · Configuring Auto-MDIX, on page 111 · Configuring Ethernet Management Port, on page 117 · Configuring LLDP, LLDP-MED, and Wired Location Service, on page 123 · Configuring System MTU, on page 141 · Configuring Internal Power Supplies, on page 147 · Configuring PoE, on page 151 · Configuring EEE, on page 161

5 C H A P T E R
Configuring Interface Characteristics
· Finding Feature Information, on page 83 · Information About Configuring Interface Characteristics, on page 83 · How to Configure Interface Characteristics, on page 93 · Monitoring Interface Characteristics, on page 105 · Configuration Examples for Interface Characteristics, on page 107 · Additional References for the Interface Characteristics Feature, on page 110 · Feature History and Information for Configuring Interface Characteristics, on page 110
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring Interface Characteristics
Interface Types
This section describes the different types of interfaces supported by the switch. The rest of the chapter describes configuration procedures for physical interface characteristics.
Note The stack ports on the rear of the stacking-capable switches are not Ethernet ports and cannot be configured.
Port-Based VLANs
A VLAN is a switched network that is logically segmented by function, team, or application, without regard to the physical location of the users. Packets received on a port are forwarded only to ports that belong to the
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 83

Switch Ports

Interface and Hardware Component

same VLAN as the receiving port. Network devices in different VLANs cannot communicate with one another without a Layer 3 device to route traffic between the VLANs.
VLAN partitions provide hard firewalls for traffic in the VLAN, and each VLAN has its own MAC address table. A VLAN comes into existence when a local port is configured to be associated with the VLAN, when the VLAN Trunking Protocol (VTP) learns of its existence from a neighbor on a trunk, or when a user creates a VLAN. VLANs can be formed with ports across the stack.
To configure VLANs, use the vlan vlan-id global configuration command to enter VLAN configuration mode. The VLAN configurations for normal-range VLANs (VLAN IDs 1 to 1005) are saved in the VLAN database. If VTP is version 1 or 2, to configure extended-range VLANs (VLAN IDs 1006 to 4094), you must first set VTP mode to transparent. Extended-range VLANs created in transparent mode are not added to the VLAN database but are saved in the switch running configuration. With VTP version 3, you can create extended-range VLANs in client or server mode. These VLANs are saved in the VLAN database.
In a switch stack, the VLAN database is downloaded to all switches in a stack, and all switches in the stack build the same VLAN database. The running configuration and the saved configuration are the same for all switches in a stack.
Add ports to a VLAN by using the switchport interface configuration commands:
· Identify the interface.
· For a trunk port, set trunk characteristics, and, if desired, define the VLANs to which it can belong.
· For an access port, set and define the VLAN to which it belongs.

Switch Ports
Access Ports Trunk Ports

Switch ports are Layer 2-only interfaces associated with a physical port. Switch ports belong to one or more VLANs. A switch port can be an access port or a trunk port. You can configure a port as an access port or trunk port or let the Dynamic Trunking Protocol (DTP) operate on a per-port basis to set the switchport mode by negotiating with the port on the other end of the link. Switch ports are used for managing the physical interface and associated Layer 2 protocols and do not handle routing or bridging. Configure switch ports by using the switchport interface configuration commands.
An access port belongs to and carries the traffic of only one VLAN (unless it is configured as a voice VLAN port). Traffic is received and sent in native formats with no VLAN tagging. Traffic arriving on an access port is assumed to belong to the VLAN assigned to the port. If an access port receives a tagged packet (Inter-Switch Link [ISL] or IEEE 802.1Q tagged), the packet is dropped, and the source address is not learned. The types of access ports supported are:
· Static access ports are manually assigned to a VLAN (or through a RADIUS server for use with IEEE 802.1x.
You can also configure an access port with an attached Cisco IP Phone to use one VLAN for voice traffic and another VLAN for data traffic from a device attached to the phone.
A trunk port carries the traffic of multiple VLANs and by default is a member of all VLANs in the VLAN database.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 84

Interface and Hardware Component

Tunnel Ports

Tunnel Ports
Routed Ports

Although by default, a trunk port is a member of every VLAN known to the VTP, you can limit VLAN membership by configuring an allowed list of VLANs for each trunk port. The list of allowed VLANs does not affect any other port but the associated trunk port. By default, all possible VLANs (VLAN ID 1 to 4094) are in the allowed list. A trunk port can become a member of a VLAN only if VTP knows of the VLAN and if the VLAN is in the enabled state. If VTP learns of a new, enabled VLAN and the VLAN is in the allowed list for a trunk port, the trunk port automatically becomes a member of that VLAN and traffic is forwarded to and from the trunk port for that VLAN. If VTP learns of a new, enabled VLAN that is not in the allowed list for a trunk port, the port does not become a member of the VLAN, and no traffic for the VLAN is forwarded to or from the port.
Tunnel ports are used in IEEE 802.1Q tunneling to segregate the traffic of customers in a service-provider network from other customers who are using the same VLAN number. You configure an asymmetric link from a tunnel port on a service-provider edge switch to an IEEE 802.1Q trunk port on the customer switch. Packets entering the tunnel port on the edge switch, already IEEE 802.1Q-tagged with the customer VLANs, are encapsulated with another layer of an IEEE 802.1Q tag (called the metro tag), containing a VLAN ID unique in the service-provider network, for each customer. The double-tagged packets go through the service-provider network keeping the original customer VLANs separate from those of other customers. At the outbound interface, also a tunnel port, the metro tag is removed, and the original VLAN numbers from the customer network are retrieved.
Tunnel ports cannot be trunk ports or access ports and must belong to a VLAN unique to each customer.
A routed port is a physical port that acts like a port on a router; it does not have to be connected to a router. A routed port is not associated with a particular VLAN, as is an access port. A routed port behaves like a regular router interface, except that it does not support VLAN subinterfaces. Routed ports can be configured with a Layer 3 routing protocol. A routed port is a Layer 3 interface only and does not support Layer 2 protocols, such as DTP and STP.
Configure routed ports by putting the interface into Layer 3 mode with the no switchport interface configuration command. Then assign an IP address to the port, enable routing, and assign routing protocol characteristics by using the ip routing and router protocol global configuration commands.

Note Entering a no switchport interface configuration command shuts down the interface and then re-enables it, which might generate messages on the device to which the interface is connected. When you put an interface that is in Layer 2 mode into Layer 3 mode, the previous configuration information related to the affected interface might be lost.
The number of routed ports that you can configure is not limited by software. However, the interrelationship between this number and the number of other features being configured might impact CPU performance because of hardware limitations.

Note The IP base feature set supports static routing and the Routing Information Protocol (RIP). For full Layer 3 routing or for fallback bridging, you must enable the IP services feature set on the standalone switch, or the active switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 85

Switch Virtual Interfaces

Interface and Hardware Component

Switch Virtual Interfaces
A switch virtual interface (SVI) represents a VLAN of switch ports as one interface to the routing or bridging function in the system. You can associate only one SVI with a VLAN. You configure an SVI for a VLAN only to route between VLANs or to provide IP host connectivity to the switch. By default, an SVI is created for the default VLAN (VLAN 1) to permit remote switch administration. Additional SVIs must be explicitly configured.
Note You cannot delete interface VLAN 1.
SVIs provide IP host connectivity only to the system. Although the switch stack or switch supports a total of 1005 VLANs and SVIs, the interrelationship between the number of SVIs and routed ports and the number of other features being configured might impact CPU performance because of hardware limitations. SVIs are created the first time that you enter the vlan interface configuration command for a VLAN interface. The VLAN corresponds to the VLAN tag associated with data frames on an ISL or IEEE 802.1Q encapsulated trunk or the VLAN ID configured for an access port. Configure a VLAN interface for each VLAN for which you want to route traffic, and assign it an IP address.
Note When you create an SVI, it does not become active until it is associated with a physical port.
SVI Autostate Exclude The line state of an SVI with multiple ports on a VLAN is in the up state when it meets these conditions: · The VLAN exists and is active in the VLAN database on the switch · The VLAN interface exists and is not administratively down. · At least one Layer 2 (access or trunk) port exists, has a link in the up state on this VLAN, and is in the spanning-tree forwarding state on the VLAN.
Note The protocol link state for VLAN interfaces come up when the first switchport belonging to the corresponding VLAN link comes up and is in STP forwarding state.
The default action, when a VLAN has multiple ports, is that the SVI goes down when all ports in the VLAN go down. You can use the SVI autostate exclude feature to configure a port so that it is not included in the SVI line-state up-or-down calculation. For example, if the only active port on the VLAN is a monitoring port, you might configure autostate exclude on that port so that the VLAN goes down when all other ports go down. When enabled on a port, autostate exclude applies to all VLANs that are enabled on that port. The VLAN interface is brought up when one Layer 2 port in the VLAN has had time to converge (transition from STP listening-learning state to forwarding state). This prevents features such as routing protocols from using the VLAN interface as if it were fully operational and minimizes other problems, such as routing black holes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 86

Interface and Hardware Component

EtherChannel Port Groups

EtherChannel Port Groups
EtherChannel port groups treat multiple switch ports as one switch port. These port groups act as a single logical port for high-bandwidth connections between switches or between switches and servers. An EtherChannel balances the traffic load across the links in the channel. If a link within the EtherChannel fails, traffic previously carried over the failed link changes to the remaining links. You can group multiple trunk ports into one logical trunk port, group multiple access ports into one logical access port, group multiple tunnel ports into one logical tunnel port, or group multiple routed ports into one logical routed port. Most protocols operate over either single ports or aggregated switch ports and do not recognize the physical ports within the port group. Exceptions are the DTP, the Cisco Discovery Protocol (CDP), and the Port Aggregation Protocol (PAgP), which operate only on physical ports. When you configure an EtherChannel, you create a port-channel logical interface and assign an interface to the EtherChannel. For Layer 3 interfaces, you manually create the logical interface by using the interface port-channel global configuration command. Then you manually assign an interface to the EtherChannel by using the channel-group interface configuration command. For Layer 2 interfaces, use the channel-group interface configuration command to dynamically create the port-channel logical interface. This command binds the physical and logical ports together.
Power over Ethernet Ports
A PoE-capable switch port automatically supplies power to one of these connected devices if the switch senses that there is no power on the circuit:
· a Cisco pre-standard powered device (such as a Cisco IP Phone or a Cisco Aironet Access Point)
· an IEEE 802.3af-compliant powered device
· an IEEE 802.3at-compliant powered device
A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power source. The device does not receive redundant power when it is only connected to the PoE port. After the switch detects a powered device, the switch determines the device power requirements and then grants or denies power to the device. The switch can also sense the real-time power consumption of the device by monitoring and policing the power usage.
Using the Switch USB Ports
USB Mini-Type B Console Port
The switch has the following console ports available on its front panel: · USB mini-Type B console connection
· RJ-45 console port
Console output appears on devices connected to both ports, but console input is active on only one port at a time. By default, the USB connector takes precedence over the RJ-45 connector.
Note Windows PCs require a driver for the USB port. See the hardware installation guide for driver installation instructions.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 87

Console Port Change Logs

Interface and Hardware Component

Use the supplied USB Type A-to-USB mini-Type B cable to connect a PC or other device to the switch. The connected device must include a terminal emulation application. When the switch detects a valid USB connection to a powered-on device that supports host functionality (such as a PC), input from the RJ-45 console is immediately disabled, and input from the USB console is enabled. Removing the USB connection immediately reenables input from the RJ-45 console connection. An LED on the switch shows which console connection is in use.
Console Port Change Logs
At software startup, a log shows whether the USB or the RJ-45 console is active. Each switch in a stack issues this log. Every switch always first displays the RJ-45 media type.
In the sample output, switch 1 has a connected USB console cable. Because the bootloader did not change to the USB console, the first log from switch 1 shows the RJ-45 console. A short time later, the console changes and the USB console log appears. Switch 2 and switch 3 have connected RJ-45 console cables.
switch-stack-1 *Mar 1 00:01:00.171: %USB_CONSOLE-6-MEDIA_RJ45: Console media-type is RJ45. *Mar 1 00:01:00.431: %USB_CONSOLE-6-MEDIA_USB: Console media-type is USB.
switch-stack-2 *Mar 1 00:01:09.835: %USB_CONSOLE-6-MEDIA_RJ45: Console media-type is RJ45.
switch-stack-3 *Mar 1 00:01:10.523: %USB_CONSOLE-6-MEDIA_RJ45: Console media-type is RJ45.
When the USB cable is removed or the PC de-activates the USB connection, the hardware automatically changes to the RJ-45 console interface:
switch-stack-1 Mar 1 00:20:48.635: %USB_CONSOLE-6-MEDIA_RJ45: Console media-type is RJ45.
You can configure the console type to always be RJ-45, and you can configure an inactivity timeout for the USB connector.
Interface Connections
Devices within a single VLAN can communicate directly through any switch. Ports in different VLANs cannot exchange data without going through a routing device. With a standard Layer 2 switch, ports in different VLANs have to exchange information through a router. By using the switch with routing enabled, when you configure both VLAN 20 and VLAN 30 with an SVI to which an IP address is assigned, packets can be sent from Host A to Host B directly through the switch with no need for an external router.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 88

Interface and Hardware Component Figure 2: Connecting VLANs with the Switch

Default Ethernet Interface Configuration

Note Switches running the LAN base feature set support configuring only 16 static routes on SVIs.

Default Ethernet Interface Configuration
To configure Layer 2 parameters, if the interface is in Layer 3 mode, you must enter the switchport interface configuration command without any parameters to put the interface into Layer 2 mode. This shuts down the interface and then re-enables it, which might generate messages on the device to which the interface is connected. When you put an interface that is in Layer 3 mode into Layer 2 mode, the previous configuration information related to the affected interface might be lost, and the interface is returned to its default configuration.
This table shows the Ethernet interface default configuration, including some features that apply only to Layer 2 interfaces.
Table 11: Default Layer 2 Ethernet Interface Configuration

Feature

Default Setting

Operating mode

Layer 2 or switching mode (switchport command).

Allowed VLAN range

VLANs 1­ 4094.

Default VLAN (for access ports)

VLAN 1 (Layer 2 interfaces only).

Native VLAN (for IEEE 802.1Q trunks) VLAN 1 (Layer 2 interfaces only).

VLAN trunking

Switchport mode dynamic auto (supports DTP) (Layer 2 interfaces only).

Port enable state

All ports are enabled.

Port description

None defined.

Speed

Autonegotiate. (Not supported on the 10-Gigabit interfaces.)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 89

Interface Speed and Duplex Mode

Interface and Hardware Component

Feature

Default Setting

Duplex mode

Autonegotiate. (Not supported on the 10-Gigabit interfaces.)

Flow control

Flow control is set to receive: off. It is always off for sent packets.

EtherChannel (PAgP)

Disabled on all Ethernet ports.

Port blocking (unknown multicast and Disabled (not blocked) (Layer 2 interfaces only). unknown unicast traffic)

Broadcast, multicast, and unicast storm Disabled. control

Protected port

Disabled (Layer 2 interfaces only).

Port security

Disabled (Layer 2 interfaces only).

Port Fast

Disabled.

Auto-MDIX

Enabled.
Note The switch might not support a pre-standard powered device--such as Cisco IP phones and access points that do not fully support IEEE 802.3af--if that powered device is connected to the switch through a crossover cable. This is regardless of whether auto-MIDX is enabled on the switch port.

Power over Ethernet (PoE)

Enabled (auto).

Interface Speed and Duplex Mode
Ethernet interfaces on the switch operate at 10, 100, 1000, or 10,000 Mb/s and in either full- or half-duplex mode. In full-duplex mode, two stations can send and receive traffic at the same time. Normally, 10-Mb/s ports operate in half-duplex mode, which means that stations can either receive or send traffic. Switch models include Gigabit Ethernet (10/100/1000-Mb/s) ports, 10-Gigabit Ethernet ports, and small form-factor pluggable (SFP) module slots supporting SFP modules.
Speed and Duplex Configuration Guidelines
When configuring an interface speed and duplex mode, note these guidelines: · The 10-Gigabit Ethernet ports do not support the speed and duplex features. These ports operate only at 10,000 Mb/s and in full-duplex mode.
· Gigabit Ethernet (10/100/1000-Mb/s) ports support all speed options and all duplex options (auto, half, and full). However, Gigabit Ethernet ports operating at 1000 Mb/s do not support half-duplex mode.
· For SFP module ports, the speed and duplex CLI options change depending on the SFP module type:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 90

Interface and Hardware Component

IEEE 802.3x Flow Control

· The 1000BASE-x (where -x is -BX, -CWDM, -LX, -SX, and -ZX) SFP module ports support the nonegotiate keyword in the speed interface configuration command. Duplex options are not supported.
· The 1000BASE-T SFP module ports support the same speed and duplex options as the 10/100/1000-Mb/s ports.
For information about which SFP modules are supported on your switch, see the product release notes. · If both ends of the line support autonegotiation, we highly recommend the default setting of auto
negotiation. · If one interface supports autonegotiation and the other end does not, configure duplex and speed on both
interfaces; do not use the auto setting on the supported side. · When STP is enabled and a port is reconfigured, the switch can take up to 30 seconds to check for loops.
The port LED is amber while STP reconfigures.
Caution Changing the interface speed and duplex mode configuration might shut down and re-enable the interface during the reconfiguration.
IEEE 802.3x Flow Control
Flow control enables connected Ethernet ports to control traffic rates during congestion by allowing congested nodes to pause link operation at the other end. If one port experiences congestion and cannot receive any more traffic, it notifies the other port by sending a pause frame to stop sending until the condition clears. Upon receipt of a pause frame, the sending device stops sending any data packets, which prevents any loss of data packets during the congestion period.
Note Flow control is not supported on Catalyst 3850 and Catalyst 3650 Series Switches (CSCul33405).
Note The switch ports can receive, but not send, pause frames.
You use the flowcontrol interface configuration command to set the interface's ability to receive pause frames to on, off, or desired. The default state is off. When set to desired, an interface can operate with an attached device that is required to send flow-control packets or with an attached device that is not required to but can send flow-control packets. These rules apply to flow control settings on the device:
· receive on (or desired): The port cannot send pause frames but can operate with an attached device that is required to or can send pause frames; the port can receive pause frames.
· receive off: Flow control does not operate in either direction. In case of congestion, no indication is given to the link partner, and no pause frames are sent or received by either device.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 91

Layer 3 Interfaces

Interface and Hardware Component

Layer 3 Interfaces
The switch supports these types of Layer 3 interfaces: · SVIs: You should configure SVIs for any VLANs for which you want to route traffic. SVIs are created when you enter a VLAN ID following the interface vlan global configuration command. To delete an SVI, use the no interface vlan global configuration command. You cannot delete interface VLAN 1.
Note When you create an SVI, it does not become active until it is associated with a physical port.
When configuring SVIs, you can also configure SVI autostate exclude on a port in the SVI to exclude that port from being included in determining SVI line-state status.
· Routed ports: Routed ports are physical ports configured to be in Layer 3 mode by using the no switchport interface configuration command.
· Layer 3 EtherChannel ports: EtherChannel interfaces made up of routed ports.
A Layer 3 switch can have an IP address assigned to each routed port and SVI. There is no defined limit to the number of SVIs and routed ports that can be configured in a switch or in a switch stack. However, the interrelationship between the number of SVIs and routed ports and the number of other features being configured might have an impact on CPU usage because of hardware limitations. If the switch is using its maximum hardware resources, attempts to create a routed port or SVI have these results:
· If you try to create a new routed port, the switch generates a message that there are not enough resources to convert the interface to a routed port, and the interface remains as a switchport.
· If you try to create an extended-range VLAN, an error message is generated, and the extended-range VLAN is rejected.
· If the switch is notified by VLAN Trunking Protocol (VTP) of a new VLAN, it sends a message that there are not enough hardware resources available and shuts down the VLAN. The output of the show vlan user EXEC command shows the VLAN in a suspended state.
· If the switch attempts to boot up with a configuration that has more VLANs and routed ports than hardware can support, the VLANs are created, but the routed ports are shut down, and the switch sends a message that this was due to insufficient hardware resources.
All Layer 3 interfaces require an IP address to route traffic. This procedure shows how to configure an interface as a Layer 3 interface and how to assign an IP address to an interface.
Note If the physical port is in Layer 2 mode (the default), you must enter the no switchport interface configuration command to put the interface into Layer 3 mode. Entering a no switchport command disables and then re-enables the interface, which might generate messages on the device to which the interface is connected. Furthermore, when you put an interface that is in Layer 2 mode into Layer 3 mode, the previous configuration information related to the affected interface might be lost, and the interface is returned to its default configuration

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 92

Interface and Hardware Component

How to Configure Interface Characteristics

How to Configure Interface Characteristics

Configuring Interfaces Procedure
These general instructions apply to all interface configuration processes.

Step 1

Procedure

Command or Action

Purpose

Enter the configure terminal command at the privileged EXEC prompt:

Example:

Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#

Step 2

Enter the interface global configuration command. Identify Note the interface type, the switch number (only on stacking-capable switches), and the number of the connector. In this example, Gigabit Ethernet port 1 on switch 1 is selected:
Example:
Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)#

You do not need to add a space between the interface type and the interface number. For example, in the preceding line, you can specify either gigabitethernet 1/0/1, gigabitethernet1/0/1, gi 1/0/1, or gi1/0/1.

Step 3 Step 4

Follow each interface command with the interface

You can also configure a range of interfaces by using the

configuration commands that the interface requires. The interface range or interface range macro global

commands that you enter define the protocols and

configuration commands. Interfaces configured in a range

applications that will run on the interface. The commands must be the same type and must be configured with the

are collected and applied to the interface when you enter same feature options.

another interface command or enter end to return to

privileged EXEC mode.

After you configure an interface, verify its status by using Enter the show interfaces privileged EXEC command to

the show privileged EXEC commands.

see a list of all interfaces on or configured for the switch.

Example:

A report is provided for each interface that the device supports or for the specified interface.

Adding a Description for an Interface

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 93

Configuring a Range of Interfaces

Interface and Hardware Component

2. interface interface-id 3. description string 4. end 5. show interfaces interface-id description

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the interface for which you are adding a description, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2

Step 3

description string Example:
Switch(config-if)# description Connects to Marketing

Adds a description (up to 240 characters) for an interface.

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 5 show interfaces interface-id description

Verifies your entry.

Configuring a Range of Interfaces
To configure multiple interfaces with the same configuration parameters, use the interface range global configuration command. When you enter the interface-range configuration mode, all command parameters that you enter are attributed to all interfaces within that range until you exit this mode.

SUMMARY STEPS

1. configure terminal 2. interface range {port-range | macro macro_name} 3. end 4. show interfaces [interface-id]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 94

Interface and Hardware Component

Configuring and Using Interface Range Macros

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

interface range {port-range | macro macro_name} Example:
Switch(config)# interface range macro

Step 3

end Example:
Switch(config)# end

Step 4

show interfaces [interface-id] Example:
Switch# show interfaces

Purpose Enters global configuration mode.
Specifies the range of interfaces (VLANs or physical ports) to be configured, and enter interface-range configuration mode.
· You can use the interface range command to configure up to five port ranges or a previously defined macro.
· The macro variable is explained in the Configuring and Using Interface Range Macros, on page 95.
· In a comma-separated port-range, you must enter the interface type for each entry and enter spaces before and after the comma.
· In a hyphen-separated port-range, you do not need to re-enter the interface type, but you must enter a space before the hyphen.
Note Use the normal configuration commands to apply the configuration parameters to all interfaces in the range. Each command is executed as it is entered.
Returns to privileged EXEC mode.
Verifies the configuration of the interfaces in the range.

Configuring and Using Interface Range Macros
You can create an interface range macro to automatically select a range of interfaces for configuration. Before you can use the macro keyword in the interface range macro global configuration command string, you must use the define interface-range global configuration command to define the macro.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 95

Configuring and Using Interface Range Macros

Interface and Hardware Component

SUMMARY STEPS

1. configure terminal 2. define interface-range macro_name interface-range 3. interface range macro macro_name 4. end 5. show running-config | include define

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2
Step 3 Step 4

define interface-range macro_name interface-range Defines the interface-range macro, and save it in NVRAM.

Example:
Switch(config)# define interface-range enet_list gigabitethernet1/0/1 - 2

· The macro_name is a 32-character maximum character string.
· A macro can contain up to five comma-separated interface ranges.

· Each interface-range must consist of the same port type.

Note Before you can use the macro keyword in the interface range macro global configuration command string, you must use the define interface-range global configuration command to define the macro.

interface range macro macro_name Example:
Switch(config)# interface range macro enet_list

Selects the interface range to be configured using the values saved in the interface-range macro called macro_name.
You can now use the normal configuration commands to apply the configuration to all interfaces in the defined macro.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Step 5

show running-config | include define Example:
Switch# show running-config | include define

Shows the defined interface range macro configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 96

Interface and Hardware Component

Configuring Ethernet Interfaces

Configuring Ethernet Interfaces
Setting the Interface Speed and Duplex Parameters

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. speed {10 | 100 | 1000 | auto [10 | 100 | 1000] | nonegotiate} 4. duplex {auto | full | half} 5. end 6. show interfaces interface-id 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the physical interface to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/3

Step 3

speed {10 | 100 | 1000 | auto [10 | 100 | 1000] | nonegotiate} Example:
Switch(config-if)# speed 10

This command is not available on a 10-Gigabit Ethernet interface.
Enter the appropriate speed parameter for the interface:
· Enter 10, 100, or 1000 to set a specific speed for the interface. The 1000 keyword is available only for 10/100/1000 Mb/s ports.
· Enter auto to enable the interface to autonegotiate speed with the connected device. If you use the 10, 100, or the 1000 keywords with the auto keyword, the port autonegotiates only at the specified speeds.
· The nonegotiate keyword is available only for SFP module ports. SFP module ports operate only at 1000 Mb/s but can be configured to not negotiate if connected to a device that does not support autonegotiation.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 97

Configuring IEEE 802.3x Flow Control

Interface and Hardware Component

Step 4

Command or Action duplex {auto | full | half} Example:
Switch(config-if)# duplex half

Step 5

end Example:
Switch(config-if)# end

Step 6

show interfaces interface-id Example:
Switch# show interfaces gigabitethernet1/0/3

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose This command is not available on a 10-Gigabit Ethernet interface. Enter the duplex parameter for the interface. Enable half-duplex mode (for interfaces operating only at 10 or 100 Mb/s). You cannot configure half-duplex mode for interfaces operating at 1000 Mb/s. You can configure the duplex setting when the speed is set to auto. Returns to privileged EXEC mode.
Displays the interface speed and duplex mode configuration.
(Optional) Saves your entries in the configuration file.

Configuring IEEE 802.3x Flow Control

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. flowcontrol {receive} {on | off | desired} 4. end 5. show interfaces interface-id

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 98

Interface and Hardware Component

Configuring Layer 3 Interfaces

Step 2

Command or Action interface interface-id Example:

Purpose
Specifies the physical interface to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3

flowcontrol {receive} {on | off | desired} Example:
Switch(config-if)# flowcontrol receive on

Configures the flow control mode for the port.

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 5

show interfaces interface-id Example:
Switch# show interfaces gigabitethernet1/0/1

Verifies the interface flow control settings.

Configuring Layer 3 Interfaces

SUMMARY STEPS

1. configure terminal 2. interface {gigabitethernet interface-id} | {vlan vlan-id} | {port-channel port-channel-number} 3. no switchport 4. ip address ip_address subnet_mask 5. no shutdown 6. end 7. show interfaces [interface-id]

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 99

Configuring Logical Layer 3 GRE Tunnel Interfaces

Interface and Hardware Component

Step 2

Command or Action

Purpose

interface {gigabitethernet interface-id} | {vlan vlan-id} Specifies the interface to be configured as a Layer 3

| {port-channel port-channel-number}

interface, and enter interface configuration mode.

Example:

Switch(config)# interface gigabitethernet1/0/2

Step 3

no switchport Example:
Switch(config-if)# no switchport

For physical ports only, enters Layer 3 mode.

Step 4

ip address ip_address subnet_mask Example:
Switch(config-if)# ip address 192.20.135.21 255.255.255.0

Configures the IP address and IP subnet.

Step 5

no shutdown Example:
Switch(config-if)# no shutdown

Enables the interface.

Step 6

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 7 show interfaces [interface-id]

Verifies the configuration.

Configuring Logical Layer 3 GRE Tunnel Interfaces
Before you begin Generic Routing Encapsulation (GRE) is a tunneling protocol used to encapsulate network layer protocols inside virtual point-to-point links. A GRE tunnel only provides encapsulation and not encryption.

Attention

Beginning in Cisco IOS XE Release 3.7.2E, GRE tunnels are supported on the hardware on Cisco Catalyst switches. When GRE is configured without tunnel options, packets are hardware-switched. When GRE is configured with tunnel options (such as key, checksum, etc.), packets are switched in the software. A maximum of 10 GRE tunnels are supported.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 100

Interface and Hardware Component

Configuring Logical Layer 3 GRE Tunnel Interfaces

Note Other features like Access Control Lists (ACL) and Quality of Service (QoS) are not supported for the GRE tunnels.

To configure a GRE tunnel, perform this task:

SUMMARY STEPS

1. interface tunnel number 2. ip addressip_addresssubnet_mask 3. tunnel source{ip_address |type_number} 4. tunnel destination{host_name | ip_address} 5. tunnel mode gre ip 6. end

DETAILED STEPS

Step 1

Command or Action interface tunnel number Example:
Switch(config)#interface tunnel 2

Purpose Enables tunneling on the interface.

Step 2

ip addressip_addresssubnet_mask

Configures the IP address and IP subnet.

Example:

Switch(config)#ip address 100.1.1.1 255.255.255.0

Step 3

tunnel source{ip_address |type_number} Example:
Switch(config)#tunnel source 10.10.10.1

Configures the tunnel source.

Step 4

tunnel destination{host_name | ip_address} Example:
Switch(config)#tunnel destination 10.10.10.2

Configures the tunnel destination.

Step 5

tunnel mode gre ip Example:
Switch(config)#tunnel mode gre ip

Configures the tunnel mode.

Step 6

end Example:
Switch(config)#end

Exist configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 101

Configuring SVI Autostate Exclude

Interface and Hardware Component

Configuring SVI Autostate Exclude

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport autostate exclude 4. end 5. show running config interface interface-id

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies a Layer 2 interface (physical port or port channel), and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2

Step 3

switchport autostate exclude Example:

Excludes the access or trunk port when defining the status of an SVI line state (up or down)

Switch(config-if)# switchport autostate exclude

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 5 show running config interface interface-id

(Optional) Shows the running configuration. Verifies the configuration.

Shutting Down and Restarting the Interface
Shutting down an interface disables all functions on the specified interface and marks the interface as unavailable on all monitoring command displays. This information is communicated to other network servers through all dynamic routing protocols. The interface is not mentioned in any routing updates.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 102

Interface and Hardware Component

Configuring the Console Media Type

SUMMARY STEPS

1. configure terminal 2. interface {vlan vlan-id} | {gigabitethernet interface-id} | {port-channel port-channel-number} 3. shutdown 4. no shutdown 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface {vlan vlan-id} | {gigabitethernet interface-id} Selects the interface to be configured. | {port-channel port-channel-number} Example:
Switch(config)# interface gigabitethernet1/0/2

Step 3

shutdown Example:
Switch(config-if)# shutdown

Shuts down an interface.

Step 4

no shutdown Example:
Switch(config-if)# no shutdown

Restarts an interface.

Step 5

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Configuring the Console Media Type
Beginning in privileged EXEC mode, follow these steps to set the console media type to RJ-45. If you configure the console as RJ-45, USB console operation is disabled, and input comes only through the RJ-45 connector. This configuration applies to all switches in a stack.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 103

Configuring the USB Inactivity Timeout

Interface and Hardware Component

SUMMARY STEPS

1. configure terminal 2. line console 0 3. media-type rj45 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

line console 0 Example:
Switch(config)# line console 0

Step 3

media-type rj45 Example:
Switch(config-line)# media-type rj45

Step 4

end Example:
Switch(config)# end

Purpose Enters the global configuration mode.
Configures the console and enters line configuration mode.
Configures the console media type to be only RJ-45 port. If you do not enter this command and both types are connected, the USB port is used by default.
Returns to privileged EXEC mode.

Configuring the USB Inactivity Timeout
The configurable inactivity timeout reactivates the RJ-45 console port if the USB console port is activated but no input activity occurs on it for a specified time period. When the USB console port is deactivated due to a timeout, you can restore its operation by disconnecting and reconnecting the USB cable.

Note The configured inactivity timeout applies to all switches in a stack. However, a timeout on one switch does not cause a timeout on other switches in the stack.
Beginning in privileged EXEC mode, follow these steps to configure an inactivity timeout.

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 104

Interface and Hardware Component

Monitoring Interface Characteristics

2. line console 0 3. usb-inactivity-timeout timeout-minutes

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

line console 0 Example:
Switch(config)# line console 0

Configures the console and enters line configuration mode.

Step 3

usb-inactivity-timeout timeout-minutes Example:
Switch(config-line)# usb-inactivity-timeout 30

Specify an inactivity timeout for the console port. The range is 1 to 240 minutes. The default is to have no timeout configured.

Monitoring Interface Characteristics

Monitoring Interface Status
Commands entered at the privileged EXEC prompt display information about the interface, including the versions of the software and the hardware, the configuration, and statistics about the interfaces. This table lists some of the available interface monitoring commands.
Table 12: Show Commands for Interfaces

Command

Purpose

show interfaces [interface-id]

Displays the status and configuration of all interfaces or a specific interface.

show interfaces interface-id status [err-disabled]

Displays interface status or a list of interfaces in the error-disabled state.

show interfaces [interface-id] switchport Displays administrative and operational status of switching (nonrouting) ports. You can use this command to find out if a port is in routing or in switching mode.

show interfaces [interface-id] description Displays the description configured on an interface or all interfaces and the interface status.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 105

Clearing and Resetting Interfaces and Counters

Interface and Hardware Component

Command

Purpose

show ip interface [interface-id]

Displays the usability status of all interfaces configured for IP routing or the specified interface.

show interface [interface-id] stats

Displays the input and output packets by the switching path for the interface.

show interfaces interface-id

(Optional) Displays speed and duplex on the interface.

show interfaces transceiver dom-supported-list

(Optional) Displays Digital Optical Monitoring (DOM) status on the connect SFP modules.

show interfaces transceiver properties (Optional) Displays temperature, voltage, or amount of current on the interface.

show interfaces [interface-id] [{transceiver Displays physical and operational status about an SFP module. properties | detail}] module number]

show running-config interface [interface-id]

Displays the running configuration in RAM for the interface.

show version

Displays the hardware configuration, software version, the names and sources of configuration files, and the boot images.

show controllers ethernet-controller interface-id phy

Displays the operational state of the auto-MDIX feature on the interface.

Clearing and Resetting Interfaces and Counters

Table 13: Clear Commands for Interfaces

Command

Purpose

clear counters [interface-id]

Clears interface counters.

clear interface interface-id

Resets the hardware logic on an interface.

clear line [number | console 0 | vty number] Resets the hardware logic on an asynchronous serial line.

Note The clear counters privileged EXEC command does not clear counters retrieved by using Simple Network Management Protocol (SNMP), but only those seen with the show interface privileged EXEC command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 106

Interface and Hardware Component

Configuration Examples for Interface Characteristics

Configuration Examples for Interface Characteristics

Adding a Description to an Interface: Example

Switch# configure terminal

Enter configuration commands, one per line. End with CNTRL/Z.

Switch(config)# interface gigabitethernet1/0/2

Switch(config-if)# description Connects to Marketing

Switch(config-if)# end

Switch# show interfaces gigabitethernet1/0/2 description

Interface Status

Protocol Description

Gi1/0/2 admin down

down

Connects to Marketing

Configuring a Range of Interfaces: Examples
This example shows how to use the interface range global configuration command to set the speed to 100 Mb/s on ports 1 to 4 on switch 1:
Switch# configure terminal Switch(config)# interface range gigabitethernet1/0/1 - 4 Switch(config-if-range)# speed 100
This example shows how to use a comma to add different interface type strings to the range to enable Gigabit Ethernet ports 1 to 3 and 10-Gigabit Ethernet ports 1 and 2 to receive flow-control pause frames:
Switch# configure terminal Switch(config)# interface range gigabitethernet1/0/1 - 3 , tengigabitethernet1/0/1 - 2 Switch(config-if-range)# flowcontrol receive on
If you enter multiple configuration commands while you are in interface-range mode, each command is executed as it is entered. The commands are not batched and executed after you exit interface-range mode. If you exit interface-range configuration mode while the commands are being executed, some commands might not be executed on all interfaces in the range. Wait until the command prompt reappears before exiting interface-range configuration mode.
Configuring and Using Interface Range Macros: Examples
This example shows how to define an interface-range named enet_list to include ports 1 and 2 on switch 1 and to verify the macro configuration:
Switch# configure terminal Switch(config)# define interface-range enet_list gigabitethernet1/0/1 - 2 Switch(config)# end Switch# show running-config | include define define interface-range enet_list GigabitEthernet1/0/1 - 2
This example shows how to create a multiple-interface macro named macro1:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 107

Setting Interface Speed and Duplex Mode: Example

Interface and Hardware Component

Switch# configure terminal Switch(config)# define interface-range macro1 gigabitethernet1/0/1 - 2, gigabitethernet1/0/5
- 7, tengigabitethernet1/0/1 -2 Switch(config)# end
This example shows how to enter interface-range configuration mode for the interface-range macro enet_list:
Switch# configure terminal Switch(config)# interface range macro enet_list Switch(config-if-range)#
This example shows how to delete the interface-range macro enet_list and to verify that it was deleted.
Switch# configure terminal Switch(config)# no define interface-range enet_list Switch(config)# end Switch# show run | include define Switch#
Setting Interface Speed and Duplex Mode: Example
This example shows how to set the interface speed to 100 Mb/s and the duplex mode to half on a 10/100/1000 Mb/s port:
Switch# configure terminal Switch(config)# interface gigabitethernet1/0/3 Switch(config-if)# speed 10 Switch(config-if)# duplex half
This example shows how to set the interface speed to 100 Mb/s on a 10/100/1000 Mb/s port:
Switch# configure terminal Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# speed 100
Configuring Layer 3 Interfaces: Example
Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# no switchport Switch(config-if)# ip address 192.20.135.21 255.255.255.0 Switch(config-if)# no shutdown
Configuring the Console Media Type: Example
This example disables the USB console media type and enables the RJ-45 console media type.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 108

Interface and Hardware Component

Configuring the USB Inactivity Timeout: Example

Switch# configure terminal Switch(config)# line console 0 Switch(config-line)# media-type rj45
This configuration terminates any active USB console media type in the stack. A log shows that this termination has occurred. This example shows that the console on switch 1 reverted to RJ-45.
*Mar 1 00:25:36.860: %USB_CONSOLE-6-CONFIG_DISABLE: Console media-type USB disabled by system configuration, media-type reverted to RJ45.
At this point no switches in the stack allow a USB console to have input. A log entry shows when a console cable is attached. If a USB console cable is connected to switch 2, it is prevented from providing input.
*Mar 1 00:34:27.498: %USB_CONSOLE-6-CONFIG_DISALLOW: Console media-type USB is disallowed by system configuration, media-type remains RJ45. (switch-stk-2)
This example reverses the previous configuration and immediately activates any USB console that is connected.
Switch# configure terminal Switch(config)# line console 0 Switch(config-line)# no media-type rj45
Configuring the USB Inactivity Timeout: Example
This example configures the inactivity timeout to 30 minutes:
Switch# configure terminal Switch(config)# line console 0 Switch(config-line)# usb-inactivity-timeout 30
To disable the configuration, use these commands:
Switch# configure terminal Switch(config)# line console 0 Switch(config-line)# no usb-inactivity-timeout
If there is no (input) activity on a USB console port for the configured number of minutes, the inactivity timeout setting applies to the RJ-45 port, and a log shows this occurrence:
*Mar 1 00:47:25.625: %USB_CONSOLE-6-INACTIVITY_DISABLE: Console media-type USB disabled due to inactivity, media-type reverted to RJ45.
At this point, the only way to reactivate the USB console port is to disconnect and reconnect the cable. When the USB cable on the switch has been disconnected and reconnected, a log similar to this appears:
*Mar 1 00:48:28.640: %USB_CONSOLE-6-MEDIA_USB: Console media-type is USB.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 109

Additional References for the Interface Characteristics Feature

Interface and Hardware Component

Additional References for the Interface Characteristics Feature

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Configuring Interface Characteristics

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 110

6 C H A P T E R
Configuring Auto-MDIX
· Prerequisites for Auto-MDIX, on page 111 · Restrictions for Auto-MDIX, on page 111 · Information about Configuring Auto-MDIX, on page 112 · How to Configure Auto-MDIX, on page 112 · Monitoring Auto-MDIX, on page 114 · Example for Configuring Auto-MDIX, on page 114 · Additional References, on page 114 · Feature History and Information for Auto-MDIX, on page 115
Prerequisites for Auto-MDIX
To configure Layer 2 parameters, if the interface is in Layer 3 mode, you must enter the switchport interface configuration command without any parameters to put the interface into Layer 2 mode. This shuts down the interface and then re-enables it, which might generate messages on the device to which the interface is connected. When you put an interface that is in Layer 3 mode into Layer 2 mode, the previous configuration information related to the affected interface might be lost, and the interface is returned to its default configuration. Automatic medium-dependent interface crossover (auto-MDIX) is enabled by default. Auto-MDIX is supported on all 10/100/1000-Mb/s and on 10/100/1000BASE-TX small form-factor pluggable (SFP)-module interfaces. It is not supported on 1000BASE-SX or -LX SFP module interfaces.
Restrictions for Auto-MDIX
The switch might not support a pre-standard powered device--such as Cisco IP phones and access points that do not fully support IEEE 802.3af--if that powered device is connected to the switch through a crossover cable. This is regardless of whether auto-MIDX is enabled on the switch port.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 111

Information about Configuring Auto-MDIX

Interface and Hardware Component

Information about Configuring Auto-MDIX

Auto-MDIX on an Interface
When automatic medium-dependent interface crossover (auto-MDIX) is enabled on an interface, the interface automatically detects the required cable connection type (straight through or crossover) and configures the connection appropriately. When connecting switches without the auto-MDIX feature, you must use straight-through cables to connect to devices such as servers, workstations, or routers and crossover cables to connect to other switches or repeaters. With auto-MDIX enabled, you can use either type of cable to connect to other devices, and the interface automatically corrects for any incorrect cabling. For more information about cabling requirements, see the hardware installation guide.
This table shows the link states that result from auto-MDIX settings and correct and incorrect cabling.
Table 14: Link Conditions and Auto-MDIX Settings

Local Side Auto-MDIX Remote Side Auto-MDIX

On

On

On

Off

Off

On

Off

Off

With Correct Cabling Link up Link up Link up Link up

With Incorrect Cabling Link up Link up Link up Link down

How to Configure Auto-MDIX

Configuring Auto-MDIX on an Interface

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. speed auto 5. duplex auto 6. end 7. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 112

Interface and Hardware Component

Configuring Auto-MDIX on an Interface

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/1

Step 4

speed auto Example:
Switch(config-if)# speed auto

Step 5

duplex auto Example:
Switch(config-if)# duplex auto

Step 6

end Example:
Switch(config-if)# end

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enables privileged EXEC mode. Enter your password if prompted.
Enters global configuration mode
Specifies the physical interface to be configured, and enter interface configuration mode.
Configures the interface to autonegotiate speed with the connected device.
Configures the interface to autonegotiate duplex mode with the connected device.
Returns to privileged EXEC mode.
(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 113

Monitoring Auto-MDIX

Interface and Hardware Component

Monitoring Auto-MDIX

Command

Purpose

show controllers ethernet-controllerinterface-id Verifies the operational state of the auto-MDIX

phy

feature on the interface.

Example for Configuring Auto-MDIX
This example shows how to enable auto-MDIX on a port:
Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# speed auto Switch(config-if)# duplex auto Switch(config-if)# mdix auto Switch(config-if)# end

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 114

Interface and Hardware Component

Feature History and Information for Auto-MDIX

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Auto-MDIX

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 115

Feature History and Information for Auto-MDIX

Interface and Hardware Component

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 116

7 C H A P T E R
Configuring Ethernet Management Port
· Finding Feature Information, on page 117 · Prerequisites for Ethernet Management Ports, on page 117 · Information about the Ethernet Management Port, on page 117 · How to Configure the Ethernet Management Port, on page 120 · Additional References, on page 121 · Feature Information for Ethernet Management Ports, on page 122
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Ethernet Management Ports
When connecting a PC to the Ethernet management port, you must first assign an IP address.
Information about the Ethernet Management Port
The Ethernet management port, also referred to as the Gi0/0 or GigabitEthernet0/0 port, is a VRF (VPN routing/forwarding) interface to which you can connect a PC. You can use the Ethernet management port instead of the switch console port for network management. When managing a switch stack, connect the PC to the Ethernet management port on a stack member.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 117

Ethernet Management Port Direct Connection to a Switch

Interface and Hardware Component

Ethernet Management Port Direct Connection to a Switch
Figure 3: Connecting a Switch to a PC
This figure displays how to connect the Ethernet management port to the PC for a switch or a standalone

switch.
Ethernet Management Port Connection to Stack Switches using a Hub
In a stack with only stack switches, all the Ethernet management ports on the stack members are connected to a hub to which the PC is connected. The active link is from the Ethernet management port on the active switchthrough the hub, to the PC. If the active switch fails and a new active switch is elected, the active link is now from the Ethernet management port on the new active switch to the PC.
Figure 4: Connecting a Switch Stack to a PC
This figure displays how a PC uses a hub to connect to a switch stack.
Ethernet Management Port and Routing
By default, the Ethernet management port is enabled. The switch cannot route packets from the Ethernet management port to a network port, and the reverse. Even though the Ethernet management port does not support routing, you may need to enable routing protocols on the port.
Figure 5: Network Example with Routing Protocols Enabled
In the following figure, you must enable routing protocols on the Ethernet management port when the PC is multiple hops away from the switch and the packets must pass through multiple Layer 3 devices to reach the

PC. In the above figure , if the Ethernet management port and the network ports are associated with the same routing process, the routes are propagated as follows:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 118

Interface and Hardware Component

Supported Features on the Ethernet Management Port

· The routes from the Ethernet management port are propagated through the network ports to the network. · The routes from the network ports are propagated through the Ethernet management port to the network.
Because routing is not supported between the Ethernet management port and the network ports, traffic between these ports cannot be sent or received. If this happens, data packet loops occur between the ports, which disrupt the switch and network operation. To prevent the loops, configure route filters to avoid routes between the Ethernet management port and the network ports.
Supported Features on the Ethernet Management Port
The Ethernet management port supports these features: · Express Setup (only in switch stacks) · Network Assistant · Telnet with passwords · TFTP · Secure Shell (SSH) · DHCP-based autoconfiguration · SMNP (only the ENTITY-MIB and the IF-MIB) · IP ping · Interface features · Speed--10 Mb/s, 100 Mb/s, and autonegotiation · Duplex mode--Full, half, and autonegotiation · Loopback detection
· Cisco Discovery Protocol (CDP) · DHCP relay agent · IPv4 and IPv6 access control lists (ACLs) · Routing protocols
Caution Before enabling a feature on the Ethernet management port, make sure that the feature is supported. If you try to configure an unsupported feature on the Ethernet Management port, the feature might not work properly, and the switch might fail.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 119

How to Configure the Ethernet Management Port

Interface and Hardware Component

How to Configure the Ethernet Management Port

Disabling and Enabling the Ethernet Management Port
To disable or enable the Ethernet management port in the CLI, follow this procedure.

SUMMARY STEPS

1. configure terminal 2. interface gigabitethernet0/0 3. shutdown 4. no shutdown 5. exit 6. show interfaces gigabitethernet0/0

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

interface gigabitethernet0/0 Example:
Switch(config)# interface gigabitethernet0/0

Step 3

shutdown Example:
Switch(config-if)# shutdown

Step 4

no shutdown Example:
Switch(config-if)# no shutdown

Step 5

exit Example:
Switch(config-if)# exit

Step 6

show interfaces gigabitethernet0/0 Example:
Switch# show interfaces gigabitethernet0/0

Purpose Enters global configuration mode.
Specifies the Ethernet management port in the CLI.
Disables the Ethernet management port.
Enables the Ethernet management port.
Exits interface configuration mode.
Displays the link status. To find out the link status to the PC, you can monitor the LED for the Ethernet management port. The LED is green (on) when the link is active, and the LED is off when the link is down. The LED is amber when there is a POST failure.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 120

Interface and Hardware Component

Additional References

What to do next
Proceed to manage or configure your switch using the Ethernet management port. Refer to the Network Management Configuration Guide (Catalyst 3650 Switches).

Additional References

Related Documents

Related Topic

Document Title

Bootloader configuration System Management Configuration Guide (Catalyst 3650 Switches)

Bootloader commands System Management Command Reference (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 121

Feature Information for Ethernet Management Ports

Interface and Hardware Component

Feature Information for Ethernet Management Ports

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 122

8 C H A P T E R

Configuring LLDP, LLDP-MED, and Wired Location Service

· Finding Feature Information, on page 123 · LLDP, LLDP-MED, and Wired Location Service Overview, on page 123 · How to Configure LLDP, LLDP-MED, and Wired Location Service, on page 127 · Configuration Examples for LLDP, LLDP-MED, and Wired Location Service, on page 138 · Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service, on page 138 · Additional References for LLDP, LLDP-MED, and Wired Location Service, on page 140 · Feature Information for LLDP, LLDP-MED, and Wired Location Service, on page 140
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.

LLDP, LLDP-MED, and Wired Location Service Overview

LLDP

The Cisco Discovery Protocol (CDP) is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches). CDP allows network management applications to automatically discover and learn about other Cisco devices connected to the network.
To support non-Cisco devices and to allow for interoperability between other devices, the switch supports the IEEE 802.1AB Link Layer Discovery Protocol (LLDP). LLDP is a neighbor discovery protocol that is used for network devices to advertise information about themselves to other devices on the network. This protocol runs over the data-link layer, which allows two systems running different network layer protocols to learn about each other.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 123

LLDP Supported TLVs

Interface and Hardware Component

LLDP Supported TLVs
LLDP supports a set of attributes that it uses to discover neighbor devices. These attributes contain type, length, and value descriptions and are referred to as TLVs. LLDP supported devices can use TLVs to receive and send information to their neighbors. This protocol can advertise details such as configuration information, device capabilities, and device identity. The switch supports these basic management TLVs. These are mandatory LLDP TLVs.
· Port description TLV · System name TLV · System description TLV · System capabilities TLV · Management address TLV
These organizationally specific LLDP TLVs are also advertised to support LLDP-MED. · Port VLAN ID TLV (IEEE 802.1 organizationally specific TLVs) · MAC/PHY configuration/status TLV (IEEE 802.3 organizationally specific TLVs)

LLDP and Cisco Switch Stacks
A switch stack appears as a single switch in the network. Therefore, LLDP discovers the switch stack, not the individual stack members.
LLDP and Cisco Medianet
When you configure LLDP or CDP location information on a per-port basis, remote devices can send Cisco Medianet location information to the switch. For information, go to http://www.cisco.com/en/US/docs/ios/netmgmt/configuration/guide/nm_cdp_discover.html.

LLDP-MED

LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint devices such as IP phones and network devices such as switches. It specifically provides support for voice over IP (VoIP) applications and provides additional TLVs for capabilities discovery, network policy, Power over Ethernet, inventory management and location information. By default, all LLDP-MED TLVs are enabled.

LLDP-MED Supported TLVs
LLDP-MED supports these TLVs: · LLDP-MED capabilities TLV Allows LLDP-MED endpoints to determine the capabilities that the connected device supports and has enabled.
· Network policy TLV Allows both network connectivity devices and endpoints to advertise VLAN configurations and associated Layer 2 and Layer 3 attributes for the specific application on that port. For example, the switch can notify

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 124

Interface and Hardware Component

LLDP-MED Supported TLVs

a phone of the VLAN number that it should use. The phone can connect to any switch, obtain its VLAN number, and then start communicating with the call control.
By defining a network-policy profile TLV, you can create a profile for voice and voice-signaling by specifying the values for VLAN, class of service (CoS), differentiated services code point (DSCP), and tagging mode. These profile attributes are then maintained centrally on the switch and propagated to the phone.
· Power management TLV
Enables advanced power management between LLDP-MED endpoint and network connectivity devices. Allows switches and phones to convey power information, such as how the device is powered, power priority, and how much power the device needs.
LLDP-MED also supports an extended power TLV to advertise fine-grained power requirements, end-point power priority, and end-point and network connectivity-device power status. LLDP is enabled and power is applied to a port, the power TLV determines the actual power requirement of the endpoint device so that the system power budget can be adjusted accordingly. The switch processes the requests and either grants or denies power based on the current power budget. If the request is granted, the switch updates the power budget. If the request is denied, the switch turns off power to the port, generates a syslog message, and updates the power budget. If LLDP-MED is disabled or if the endpoint does not support the LLDP-MED power TLV, the initial allocation value is used throughout the duration of the connection.
You can change power settings by entering the power inline {auto [max max-wattage] | never | static [max max-wattage]} interface configuration command. By default the PoE interface is in auto mode; If no value is specified, the maximum is allowed (30 W).
· Inventory management TLV
Allows an endpoint to send detailed inventory information about itself to the switch, including information hardware revision, firmware version, software version, serial number, manufacturer name, model name, and asset ID TLV.
· Location TLV
Provides location information from the switch to the endpoint device. The location TLV can send this information:
· Civic location information
Provides the civic address information and postal information. Examples of civic location information are street address, road name, and postal community name information.
· ELIN location information
Provides the location information of a caller. The location is determined by the Emergency location identifier number (ELIN), which is a phone number that routes an emergency call to the local public safety answering point (PSAP) and which the PSAP can use to call back the emergency caller.
· Geographic location information
Provides the geographical details of a switch location such as latitude, longitude, and altitude of a switch.
· custom location
Provides customized name and value of a switch location.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 125

Wired Location Service

Interface and Hardware Component

Wired Location Service
The switch uses the location service feature to send location and attachment tracking information for its connected devices to a Cisco Mobility Services Engine (MSE). The tracked device can be a wireless endpoint, a wired endpoint, or a wired switch or controller. The switch notifies the MSE of device link up and link down events through the Network Mobility Services Protocol (NMSP) location and attachment notifications. The MSE starts the NMSP connection to the switch, which opens a server port. When the MSE connects to the switch there are a set of message exchanges to establish version compatibility and service exchange information followed by location information synchronization. After connection, the switch periodically sends location and attachment notifications to the MSE. Any link up or link down events detected during an interval are aggregated and sent at the end of the interval. When the switch determines the presence or absence of a device on a link-up or link-down event, it obtains the client-specific information such as the MAC address, IP address, and username. If the client is LLDP-MEDor CDP-capable, the switch obtains the serial number and UDI through the LLDP-MED location TLV or CDP. Depending on the device capabilities, the switch obtains this client information at link up:
· Slot and port specified in port connection
· MAC address specified in the client MAC address
· IP address specified in port connection
· 802.1X username if applicable
· Device category is specified as a wired station
· State is specified as new
· Serial number, UDI
· Model number
· Time in seconds since the switch detected the association
Depending on the device capabilities, the switch obtains this client information at link down: · Slot and port that was disconnected
· MAC address
· IP address
· 802.1X username if applicable
· Device category is specified as a wired station
· State is specified as delete
· Serial number, UDI
· Time in seconds since the switch detected the disassociation
When the switch shuts down, it sends an attachment notification with the state delete and the IP address before closing the NMSP connection to the MSE. The MSE interprets this notification as disassociation for all the wired clients associated with the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 126

Interface and Hardware Component

Default LLDP Configuration

If you change a location address on the switch, the switch sends an NMSP location notification message that identifies the affected ports and the changed address information.

Default LLDP Configuration
Table 15: Default LLDP Configuration
Feature LLDP global state LLDP holdtime (before discarding) LLDP timer (packet update frequency) LLDP reinitialization delay LLDP tlv-select LLDP interface state LLDP receive LLDP transmit LLDP med-tlv-select

Default Setting Disabled 120 seconds 30 seconds 2 seconds Disabled to send and receive all TLVs Disabled Disabled Disabled Disabled to send all LLDP-MED TLVs. When LLDP is globally enabled, LLDP-MED-TLV is also enabled.

Configuration Guidelines
· If the interface is configured as a tunnel port, LLDP is automatically disabled.
· If you first configure a network-policy profile on an interface, you cannot apply the switchport voice vlan command on the interface. If the switchport voice vlan vlan-id is already configured on an interface, you can apply a network-policy profile on the interface. This way the interface has the voice or voice-signaling VLAN network-policy profile applied on the interface.
· You cannot configure static secure MAC addresses on an interface that has a network-policy profile.
· You cannot configure a network-policy profile on a private-VLAN port.
· For wired location to function, you must first enter the ip device tracking global configuration command.

How to Configure LLDP, LLDP-MED, and Wired Location Service
Enabling LLDP
Beginning in privileged EXEC mode, follow these steps to enable LLDP:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 127

Enabling LLDP

Interface and Hardware Component

SUMMARY STEPS

1. configure terminal 2. lldp run 3. interface interface-id 4. lldp transmit 5. lldp receive 6. end 7. show lldp 8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

lldp run Example:
Switch (config)# lldp run

Step 3

interface interface-id Example:
Switch (config)# interface gigabitethernet2/0/1

Step 4

lldp transmit Example:
Switch(config-if)# lldp transmit

Step 5

lldp receive Example:
Switch(config-if)# lldp receive

Step 6

end Example:
Switch(config-if)# end

Purpose Enters global configuration mode.
Enables LLDP globally on the switch.
Specifies the interface on which you are enabling LLDP, and enter interface configuration mode.
Enables the interface to send LLDP packets.
Enables the interface to receive LLDP packets.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 128

Interface and Hardware Component

Configuring LLDP Characteristics

Step 7

Command or Action show lldp Example:
Switch# show lldp

Step 8

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies the configuration.
(Optional) Saves your entries in the configuration file.

Configuring LLDP Characteristics
You can configure the frequency of LLDP updates, the amount of time to hold the information before discarding it, and the initialization delay time. You can also select the LLDP and LLDP-MED TLVs to send and receive. Beginning in privileged EXEC mode, follow these steps to configure the LLDP characteristics.

Note Steps 2 through 5 are optional and can be performed in any order.

SUMMARY STEPS

1. configure terminal 2. lldp holdtime seconds 3. lldp reinit delay 4. lldp timer rate 5. lldp tlv-select 6. interface interface-id 7. lldp med-tlv-select 8. end 9. show lldp 10. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 129

Configuring LLDP Characteristics

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9

Command or Action lldp holdtime seconds Example:
Switch(config)# lldp holdtime 120
lldp reinit delay Example:
Switch(config)# lldp reinit 2
lldp timer rate Example:
Switch(config)# lldp timer 30
lldp tlv-select Example:
Switch(config)# tlv-select
interface interface-id Example:
Switch (config)# interface gigabitethernet2/0/1
lldp med-tlv-select Example:
Switch (config-if)# lldp med-tlv-select inventory management
end Example:
Switch (config-if)# end
show lldp Example:
Switch# show lldp

Interface and Hardware Component
Purpose (Optional) Specifies the amount of time a receiving device should hold the information from your device before discarding it. The range is 0 to 65535 seconds; the default is 120 seconds. (Optional) Specifies the delay time in seconds for LLDP to initialize on an interface. The range is 2 to 5 seconds; the default is 2 seconds.
(Optional) Sets the sending frequency of LLDP updates in seconds. The range is 5 to 65534 seconds; the default is 30 seconds.
(Optional) Specifies the LLDP TLVs to send or receive.
Specifies the interface on which you are enabling LLDP, and enter interface configuration mode.
(Optional) Specifies the LLDP-MED TLVs to send or receive.
Returns to privileged EXEC mode.
Verifies the configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 130

Interface and Hardware Component

Configuring LLDP-MED TLVs

Step 10

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Configuring LLDP-MED TLVs
By default, the switch only sends LLDP packets until it receives LLDP-MED packets from the end device. It then sends LLDP packets with MED TLVs, as well. When the LLDP-MED entry has been aged out, it again only sends LLDP packets.
By using the lldp interface configuration command, you can configure the interface not to send the TLVs listed in the following table.
Table 16: LLDP-MED TLVs

LLDP-MED TLV inventory-management location network-policy power-management

Description LLDP-MED inventory management TLV LLDP-MED location TLV LLDP-MED network policy TLV LLDP-MED power management TLV

Beginning in privileged EXEC mode, follow these steps to enable a TLV on an interface:

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. lldp med-tlv-select 4. end 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 131

Configuring Network-Policy TLV

Interface and Hardware Component

Step 2

Command or Action interface interface-id Example:
Switch(config)# interface gigabitethernet2/0/1

Step 3

lldp med-tlv-select Example:
Switch(config-if)# lldp med-tlv-select inventory management

Step 4

end Example:
Switch(config-if)# end

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Specifies the interface on which you are configuring an LLDP-MED TLV, and enter interface configuration mode.
Specifies the TLV to enable.
Returns to privileged EXEC mode.
(Optional) Saves your entries in the configuration file.

Configuring Network-Policy TLV
Beginning in privileged EXEC mode, follow these steps to create a network-policy profile, configure the policy attributes, and apply it to an interface.

SUMMARY STEPS

1. configure terminal 2. network-policy profile profile number 3. {voice | voice-signaling} vlan [vlan-id {cos cvalue | dscp dvalue}] | [[dot1p {cos cvalue | dscp dvalue}]
| none | untagged] 4. exit 5. interface interface-id 6. network-policy profile number 7. lldp med-tlv-select network-policy 8. end 9. show network-policy profile 10. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 132

Interface and Hardware Component

Configuring Network-Policy TLV

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

network-policy profile profile number Example:
Switch(config)# network-policy profile 1

Specifies the network-policy profile number, and enter network-policy configuration mode. The range is 1 to 4294967295.

Step 3 Step 4

{voice | voice-signaling} vlan [vlan-id {cos cvalue | dscp Configures the policy attributes:

dvalue}] | [[dot1p {cos cvalue | dscp dvalue}] | none | untagged]

· voice--Specifies the voice application type.

Example:

· voice-signaling--Specifies the voice-signaling application type.

Switch(config-network-policy)# voice vlan 100 cos 4

· vlan--Specifies the native VLAN for voice traffic.
· vlan-id--(Optional) Specifies the VLAN for voice traffic. The range is 1 to 4094.

· cos cvalue--(Optional) Specifies the Layer 2 priority class of service (CoS) for the configured VLAN. The range is 0 to 7; the default is 5.

· dscp dvalue--(Optional) Specifies the differentiated services code point (DSCP) value for the configured VLAN. The range is 0 to 63; the default is 46.

· dot1p--(Optional) Configures the telephone to use IEEE 802.1p priority tagging and use VLAN 0 (the native VLAN).

· none--(Optional) Do not instruct the IP telephone about the voice VLAN. The telephone uses the configuration from the telephone key pad.

· untagged--(Optional) Configures the telephone to send untagged voice traffic. This is the default for the telephone.

· untagged--(Optional) Configures the telephone to send untagged voice traffic. This is the default for the telephone.

exit Example:

Returns to global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 133

Configuring Location TLV and Wired Location Service

Interface and Hardware Component

Step 5 Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action
Switch(config)# exit

Purpose

interface interface-id Example:

Specifies the interface on which you are configuring a network-policy profile, and enter interface configuration mode.

Switch (config)# interface gigabitethernet2/0/1

network-policy profile number Example:
Switch(config-if)# network-policy 1

Specifies the network-policy profile number.

lldp med-tlv-select network-policy Example:
Switch(config-if)# lldp med-tlv-select network-policy

Specifies the network-policy TLV.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

show network-policy profile Example:
Switch# show network-policy profile

Verifies the configuration.

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring Location TLV and Wired Location Service
Beginning in privileged EXEC mode, follow these steps to configure location information for an endpoint and to apply it to an interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 134

Interface and Hardware Component

Configuring Location TLV and Wired Location Service

SUMMARY STEPS

1. configure terminal 2. location {admin-tag string | civic-location identifier {id | host} | elin-location string identifier id |
custom-location identifier {id | host} | geo-location identifier {id | host}} 3. exit 4. interface interface-id 5. location {additional-location-information word | civic-location-id {id | host} | elin-location-id id |
custom-location-id {id | host} | geo-location-id {id | host} } 6. end 7. Use one of the following:
· show location admin-tag string · show location civic-location identifier id · show location elin-location identifier id
8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

location {admin-tag string | civic-location identifier {id Specifies the location information for an endpoint.

| host} | elin-location string identifier id | custom-location identifier {id | host} | geo-location identifier {id | host}}

· admin-tag--Specifies an administrative tag or site information.

Example:

· civic-location--Specifies civic location information.

Switch(config)# location civic-location identifier 1
Switch(config-civic)# number 3550 Switch(config-civic)# primary-road-name "Cisco Way" Switch(config-civic)# city "San Jose" Switch(config-civic)# state CA Switch(config-civic)# building 19 Switch(config-civic)# room C6 Switch(config-civic)# county "Santa Clara" Switch(config-civic)# country US

· elin-location--Specifies emergency location information (ELIN).
· custom-location--Specifies custom location information.
· geo-location--Specifies geo-spatial location information.
· identifier id--Specifies the ID for the civic, ELIN, custom, or geo location.
· host--Specifies the host civic, custom, or geo location.
· string--Specifies the site or location information in alphanumeric format.

exit Example:

Returns to global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 135

Configuring Location TLV and Wired Location Service

Interface and Hardware Component

Command or Action
Switch(config-civic)# exit

Purpose

Step 4

interface interface-id Example:

Specifies the interface on which you are configuring the location information, and enter interface configuration mode.

Switch (config)# interface gigabitethernet2/0/1

Step 5 Step 6

location {additional-location-information word |

Enters location information for an interface:

civic-location-id {id | host} | elin-location-id id | custom-location-id {id | host} | geo-location-id {id | host} }

· additional-location-information--Specifies additional information for a location or place.

Example:

· civic-location-id--Specifies global civic location information for an interface.

Switch(config-if)# location elin-location-id 1

· elin-location-id--Specifies emergency location information for an interface.

· custom-location-id--Specifies custom location information for an interface.

· geo-location-id--Specifies geo-spatial location information for an interface.

· host--Specifies the host location identifier.

· word--Specifies a word or phrase with additional location information.

· id--Specifies the ID for the civic, ELIN, custom, or geo location. The ID range is 1 to 4095.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 7

Use one of the following: · show location admin-tag string · show location civic-location identifier id · show location elin-location identifier id
Example:
Switch# show location admin-tag
or

Verifies the configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 136

Interface and Hardware Component

Enabling Wired Location Service on the Switch

Command or Action
Switch# show location civic-location identifier
or
Switch# show location elin-location identifier

Step 8

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Enabling Wired Location Service on the Switch
Beginning in privileged EXEC mode, follow these steps to enable wired location service on the switch.

SUMMARY STEPS

1. configure terminal 2. nmsp notification interval {attachment | location} interval-seconds 3. end 4. show network-policy profile 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

nmsp notification interval {attachment | location} interval-seconds
Example:

Specifies the NMSP notification interval. attachment--Specifies the attachment notification interval. location--Specifies the location notification interval.

Switch(config)# nmsp notification interval location interval-seconds--Duration in seconds before the switch

10

sends the MSE the location or attachment updates. The

range is 1 to 30; the default is 30.

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 137

Configuration Examples for LLDP, LLDP-MED, and Wired Location Service

Interface and Hardware Component

Command or Action
Switch(config)# end

Step 4

show network-policy profile Example:
Switch# show network-policy profile

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies the configuration. (Optional) Saves your entries in the configuration file.

Configuration Examples for LLDP, LLDP-MED, and Wired Location Service
Configuring Network-Policy TLV: Examples
This example shows how to configure VLAN 100 for voice application with CoS and to enable the network-policy profile and network-policy TLV on an interface:
Switch# configure terminal Switch(config)# network-policy 1 Switch(config-network-policy)# voice vlan 100 cos 4 Switch(config-network-policy)# exit Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# network-policy profile 1 Switch(config-if)# lldp med-tlv-select network-policy
This example shows how to configure the voice application type for the native VLAN with priority tagging:
Switchconfig-network-policy)# voice vlan dot1p cos 4 Switchconfig-network-policy)# voice vlan dot1p dscp 34
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service
Commands for monitoring and maintaining LLDP, LLDP-MED, and wired location service.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 138

Interface and Hardware Component

Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service

Command clear lldp counters clear lldp table clear nmsp statistics show lldp
show lldp entry entry-name
show lldp interface [interface-id]
show lldp neighbors [interface-id] [detail]
show lldp traffic show location admin-tag string show location civic-location identifier id show location elin-location identifier id show network-policy profile show nmsp

Description
Resets the traffic counters to zero.
Deletes the LLDP neighbor information table.
Clears the NMSP statistic counters.
Displays global information, such as frequency of transmissions, the holdtime for packets being sent, and the delay time before LLDP initializes on an interface.
Displays information about a specific neighbor. You can enter an asterisk (*) to display all neighbors, or you can enter the neighbor name.
Displays information about interfaces with LLDP enabled. You can limit the display to a specific interface.
Displays information about neighbors, including device type, interface type and number, holdtime settings, capabilities, and port ID. You can limit the display to neighbors of a specific interface or expand the display for more detailed information.
Displays LLDP counters, including the number of packets sent and received, number of packets discarded, and number of unrecognized TLVs.
Displays the location information for the specified administrative tag or site.
Displays the location information for a specific global civic location.
Displays the location information for an emergency location
Displays the configured network-policy profiles.
Displays the NMSP information

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 139

Additional References for LLDP, LLDP-MED, and Wired Location Service

Interface and Hardware Component

Additional References for LLDP, LLDP-MED, and Wired Location Service

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for LLDP, LLDP-MED, and Wired Location Service

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 140

9 C H A P T E R
Configuring System MTU
· Configuring System MTU, on page 141
Configuring System MTU
This module describes how to configure the Maximum Transmission Unit for a system on Catalyst 3650 Series Switches and Catalyst 3850 Series Switches.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information about the MTU
The default maximum transmission unit (MTU) size for frames received and sent on all switch interfaces is 1500 bytes.
Restrictions for System MTU
When configuring the system MTU values, follow these guidelines: · The switch does not support the MTU on a per-interface basis. · If you enter the system mtu bytes global configuration command, the command does not take effect on the switch. This command only affects the system MTU size on Fast Ethernet switch ports.
System MTU Value Application
In a switch stack, the MTU values applied to member switches depends upon the stack configuration. The following stack configurations are supported:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 141

Configuring the System MTU

Interface and Hardware Component

The upper limit of the IP or IPv6 MTU value is based on the switch or switch stack configuration and refers to the currently applied system MTU or the system jumbo MTU value. For more information about setting the MTU sizes, see the system mtu global configuration command in the command reference for this release.

Configuring the System MTU
Configuring the System MTU

SUMMARY STEPS

1. enable 2. configure terminal 3. system mtu bytes 4. exit 5. show system mtu

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

system mtu bytes Example:
Switch(config)# system mtu 1600

Step 4 Step 5

exit Example:
Switch(config)# exit
show system mtu Example:
Switch# show system mtu

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters global configuration mode.
Applies the Maximum Transmission Unit (MTU) size for all Ethernet interfaces on the switch or the switch stack.
· The MTU range is from 1500 to 9198. The default is 1500.
Exits global configuration mode and returns to privileged EXEC mode.
Displays the configured global MTU size.

Configuring Protocol-Specific MTU
When system MTU changes, the range for the ip mtu command for interface also changes.

SUMMARY STEPS

1. enable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 142

Interface and Hardware Component

Configuration Examples for System MTU

2. configure terminal 3. interface type number 4. ip mtu bytes 5. ipv6 mtu bytes 6. end 7. show system mtu

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

interface type number Example:
Switch(config)# interface gigabitethernet 0/0

Step 4

ip mtu bytes Example:
Switch(config-if)# ip mtu 900

Step 5 Step 6 Step 7

ipv6 mtu bytes Example:
Switch(config-if)# ipv6 mtu 1300
end Example:
Switch(config-if)# end
show system mtu Example:
Switch# show system mtu

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters global configuration mode.
Configures an interface and enters interface configuration mode.
Sets the maximum transmission unit (MTU) size of IP packets sent on an interface.
· The range is from 832 to 1500. Set the MTU size of IPv6 packets sent on an interface.
· The range is from 1280 to 1500.
Exits interface configuration mode and returns to privileged EXEC mode.
Displays the configured global MTU size.

Configuration Examples for System MTU
Example: Configuring the System MTU
Switch# configure terminal Switch(config)# system mtu 1600

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 143

Example: Configuring Protocol-Specific MTU

Interface and Hardware Component

Switch(config)# exit
Example: Configuring Protocol-Specific MTU
Switch# configure terminal Switch(config)# interface gigabitethernet 0/0 Switch(config-if)# ip mtu 900 Switch(config-if)# ipv6 mtu 1286 Switch(config-if)# end

Additional References for System MTU

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 144

Interface and Hardware Component

Feature Information for System MTU

Feature Information for System MTU

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 145

Feature Information for System MTU

Interface and Hardware Component

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 146

1 0 C H A P T E R

Configuring Internal Power Supplies

· Information About Internal Power Supplies , on page 147 · How to Configure Internal Power Supplies, on page 147 · Monitoring Internal Power Supplies, on page 148 · Configuration Examples for Internal Power Supplies, on page 148 · Additional References, on page 149 · Feature History and Information for Internal Power Supplies, on page 150
Information About Internal Power Supplies
See the switch installation guide for information about the power supplies.

How to Configure Internal Power Supplies

Configuring an Internal Power Supply
You can use the power supply EXEC command to configure and manage the internal power supply on the switch. The switch does not support the no power supply EXEC command.

SUMMARY STEPS

1. power supply switch_number slot{A | B} { off | on } 2. show environment power

DETAILED STEPS

Step 1

Command or Action power supply switch_number slot{A | B} { off | on } Example:
Switch# power supply 1 slot A on

Purpose Sets the specified power supply to off or on by using one of these keywords:
· A --Selects the power supply in slot A.
· B --Selects power supply in slot B.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 147

Monitoring Internal Power Supplies

Interface and Hardware Component

Command or Action

Step 2

show environment power Example:
Switch# show environment power

Purpose Note

Power supply slot B is the closest to the outer edge of the switch.

· off --Set the power supply off. · on --Set the power supply on.

By default, the switch power supply is on. Verifies your settings.

Monitoring Internal Power Supplies

Table 17: Show Commands for Power Supplies

Command

Purpose

show environment power [ all | switch switch_number ]

(Optional) Displays the status of the internal power supplies for each switch in the stack or for the specified switch. The range is 1 to 9, depending on the switch member numbers in the stack.
The switch keywords are available only on stacking-capable switches.

Configuration Examples for Internal Power Supplies
This example shows how to set the power supply in slot A to off:
Switch# power supply 1 slot A off Disabling Power supply A may result in a power loss to PoE devices and/or switches ... Continue? (yes/[no]): yes Switch# Jun 10 04:52:54.389: %PLATFORM_ENV-6-FRU_PS_OIR: FRU Power Supply 1 powered off Jun 10 04:52:56.717: %PLATFORM_ENV-1-FAN_NOT_PRESENT: Fan is not present Switch#
This example shows how to set the power supply in slot A to on:
Switch# power supply 1 slot A on Jun 10 04:54:39.600: %PLATFORM_ENV-6-FRU_PS_OIR: FRU Power Supply 1 powered on
This example shows the output of the show env power command:
Switch# show env power

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 148

Interface and Hardware Component

Additional References

SW PID --- -----------------1A PWR-C2-640WAC 1B Not Present

Serial#

Status

---------- ---------------

DCB1705B05B OK

Sys Pwr ------Good

PoE Pwr ------Good

Watts ----640

Switch#

Table 18: show env power Status Descriptions

Field OK Not Present No Input Power Disabled
Not Responding Failure-Fan

Description The power supply is present and power is good. No power supply is installed. The power supply is present but there is no input power. The power supply and input power are present, but power supply is switched off by CLI. The power supply is not recognizable or is faulty. The power supply fan is faulty.

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 149

Feature History and Information for Internal Power Supplies

Interface and Hardware Component

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Internal Power Supplies

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 150

1 1 C H A P T E R
Configuring PoE
· Finding Feature Information, on page 151 · Information about PoE, on page 151 · How to Configure PoE, on page 156 · Monitoring Power Status, on page 159 · Additional References, on page 160 · Feature Information for PoE, on page 160
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information about PoE
Power over Ethernet Ports
A PoE-capable switch port automatically supplies power to one of these connected devices if the switch senses that there is no power on the circuit:
· a Cisco pre-standard powered device (such as a Cisco IP Phone or a Cisco Aironet Access Point) · an IEEE 802.3af-compliant powered device · an IEEE 802.3at-compliant powered device
A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power source. The device does not receive redundant power when it is only connected to the PoE port. After the switch detects a powered device, the switch determines the device power requirements and then grants or denies power to the device. The switch can also sense the real-time power consumption of the device by monitoring and policing the power usage.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 151

Supported Protocols and Standards

Interface and Hardware Component

Supported Protocols and Standards
The switch uses these protocols and standards to support PoE:
· CDP with power consumption--The powered device notifies the switch of the amount of power it is consuming. The switch does not reply to the power-consumption messages. The switch can only supply power to or remove power from the PoE port.
· Cisco intelligent power management--The powered device and the switch negotiate through power-negotiation CDP messages for an agreed-upon power-consumption level. The negotiation allows a high-power Cisco powered device, which consumes more than 7 W, to operate at its highest power mode. The powered device first boots up in low-power mode, consumes less than 7 W, and negotiates to obtain enough power to operate in high-power mode. The device changes to high-power mode only when it receives confirmation from the switch.
High-power devices can operate in low-power mode on switches that do not support power-negotiation CDP.
Cisco intelligent power management is backward-compatible with CDP with power consumption; the switch responds according to the CDP message that it receives. CDP is not supported on third-party powered devices; therefore, the switch uses the IEEE classification to determine the power usage of the device.
· IEEE 802.3af--The major features of this standard are powered-device discovery, power administration, disconnect detection, and optional powered-device power classification. For more information, see the standard.
· IEEE 802.3at--The PoE+ standard increases the maximum power that can be drawn by a powered device from 15.4 W per port to 30 W per port.

Powered-Device Detection and Initial Power Allocation
The switch detects a Cisco pre-standard or an IEEE-compliant powered device when the PoE-capable port is in the no-shutdown state, PoE is enabled (the default), and the connected device is not being powered by an AC adaptor.
After device detection, the switch determines the device power requirements based on its type:
· A Cisco prestandard powered device does not provide its power requirement when the switch detects it, so the switch allocates 15.4 W as the initial allocation for power budgeting.
The initial power allocation is the maximum amount of power that a powered device requires. The switch initially allocates this amount of power when it detects and powers the powered device. As the switch receives CDP messages from the powered device and as the powered device negotiates power levels with the switch through CDP power-negotiation messages, the initial power allocation might be adjusted.
· The switch classifies the detected IEEE device within a power consumption class. Based on the available power in the power budget, the switch determines if a port can be powered. Table 19: IEEE Power Classifications, on page 152 lists these levels.

Table 19: IEEE Power Classifications

Class

Maximum Power Level Required from the Switch

0 (class status unknown) 15.4 W

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 152

Interface and Hardware Component

Power Management Modes

Class 1 2 3 4

Maximum Power Level Required from the Switch 4W 7W 15.4 W 30 W (For IEEE 802.3at Type 2 powered devices)

The switch monitors and tracks requests for power and grants power only when it is available. The switch tracks its power budget (the amount of power available on the switch for PoE). The switch performs power-accounting calculations when a port is granted or denied power to keep the power budget up to date.
After power is applied to the port, the switch uses CDP to determine the CDP-specific power consumption requirement of the connected Cisco powered devices, which is the amount of power to allocate based on the CDP messages. The switch adjusts the power budget accordingly. This does not apply to third-party PoE devices. The switch processes a request and either grants or denies power. If the request is granted, the switch updates the power budget. If the request is denied, the switch ensures that power to the port is turned off, generates a syslog message, and updates the LEDs. Powered devices can also negotiate with the switch for more power.
With PoE+, powered devices use IEEE 802.3at and LLDP power with media dependent interface (MDI) type, length, and value descriptions (TLVs), Power-via-MDI TLVs, for negotiating power up to 30 W. Cisco pre-standard devices and Cisco IEEE powered devices can use CDP or the IEEE 802.3at power-via-MDI power negotiation mechanism to request power levels up to 30 W.

Note The initial allocation for Class 0, Class 3, and Class 4 powered devices is 15.4 W. When a device starts up and uses CDP or LLDP to send a request for more than 15.4 W, it can be allocated up to the maximum of 30 W.

Note The CDP-specific power consumption requirement is referred to as the actual power consumption requirement in the software configuration guides and command references.
If the switch detects a fault caused by an undervoltage, overvoltage, overtemperature, oscillator-fault, or short-circuit condition, it turns off power to the port, generates a syslog message, and updates the power budget and LEDs.
The PoE feature operates the same whether or not the switch is a stack member. The power budget is per-switch and independent of any other switch in the stack. Election of a new active switch does not affect PoE operation. The active switch keeps track of the PoE status for all switches and ports in the stack and includes the status in output displays.
Power Management Modes
The switch supports these PoE modes:
· auto--The switch automatically detects if the connected device requires power. If the switch discovers a powered device connected to the port and if the switch has enough power, it grants power, updates the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 153

Power Management Modes

Interface and Hardware Component

power budget, turns on power to the port on a first-come, first-served basis, and updates the LEDs. For LED information, see the hardware installation guide.
If the switch has enough power for all the powered devices, they all come up. If enough power is available for all powered devices connected to the switch, power is turned on to all devices. If there is not enough available PoE, or if a device is disconnected and reconnected while other devices are waiting for power, it cannot be determined which devices are granted or are denied power.
If granting power would exceed the system power budget, the switch denies power, ensures that power to the port is turned off, generates a syslog message, and updates the LEDs. After power has been denied, the switch periodically rechecks the power budget and continues to attempt to grant the request for power.
If a device being powered by the switch is then connected to wall power, the switch might continue to power the device. The switch might continue to report that it is still powering the device whether the device is being powered by the switch or receiving power from an AC power source.
If a powered device is removed, the switch automatically detects the disconnect and removes power from the port. You can connect a nonpowered device without damaging it.
You can specify the maximum wattage that is allowed on the port. If the IEEE class maximum wattage of the powered device is greater than the configured maximum value, the switch does not provide power to the port. If the switch powers a powered device, but the powered device later requests through CDP messages more than the configured maximum value, the switch removes power to the port. The power that was allocated to the powered device is reclaimed into the global power budget. If you do not specify a wattage, the switch delivers the maximum value. Use the auto setting on any PoE port. The auto mode is the default setting.
· static--The switch pre-allocates power to the port (even when no powered device is connected) and guarantees that power will be available for the port. The switch allocates the port configured maximum wattage, and the amount is never adjusted through the IEEE class or by CDP messages from the powered device. Because power is pre-allocated, any powered device that uses less than or equal to the maximum wattage is guaranteed to be powered when it is connected to the static port. The port no longer participates in the first-come, first-served model.
However, if the powered-device IEEE class is greater than the maximum wattage, the switch does not supply power to it. If the switch learns through CDP messages that the powered device is consuming more than the maximum wattage, the switch shuts down the powered device.
If you do not specify a wattage, the switch pre-allocates the maximum value. The switch powers the port only if it discovers a powered device. Use the static setting on a high-priority interface.
· never--The switch disables powered-device detection and never powers the PoE port even if an unpowered device is connected. Use this mode only when you want to make sure that power is never applied to a PoE-capable port, making the port a data-only port.
For most situations, the default configuration (auto mode) works well, providing plug-and-play operation. No further configuration is required. However, perform this task to configure a PoE port for a higher priority, to make it data only, or to specify a maximum wattage to disallow high-power powered devices on a port.
When you make PoE configuration changes, the port being configured drops power. Depending on the new configuration, the state of the other PoE ports, and the state of the power budget, the port might not be powered up again. For example, port 1 is in the auto and on state, and you configure it for static mode. The switch removes power from port 1, detects the powered device, and repowers the port. If port 1 is in the auto and on state and you configure it with a maximum wattage of 10 W, the switch removes power from the port and then redetects the powered device. The switch repowers the port only if the powered device is a class 1, class 2, or a Cisco-only powered device.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 154

Interface and Hardware Component

Power Monitoring and Power Policing

Power Monitoring and Power Policing
When policing of the real-time power consumption is enabled, the switch takes action when a powered device consumes more power than the maximum amount allocated, also referred to as the cutoff-power value.
When PoE is enabled, the switch senses the real-time power consumption of the powered device. The switch monitors the real-time power consumption of the connected powered device; this is called power monitoring or power sensing. The switch also polices the power usage with the power policing feature.
Power monitoring is backward-compatible with Cisco intelligent power management and CDP-based power consumption. It works with these features to ensure that the PoE port can supply power to the powered device.
The switch senses the real-time power consumption of the connected device as follows:
1. The switch monitors the real-time power consumption on individual ports.
2. The switch records the power consumption, including peak power usage. The switch reports the information through the CISCO-POWER-ETHERNET-EXT-MIB.
3. If power policing is enabled, the switch polices power usage by comparing the real-time power consumption to the maximum power allocated to the device. The maximum power consumption is also referred to as the cutoff power on a PoE port.
If the device uses more than the maximum power allocation on the port, the switch can either turn off power to the port, or the switch can generate a syslog message and update the LEDs (the port LED is now blinking amber) while still providing power to the device based on the switch configuration. By default, power-usage policing is disabled on all PoE ports.
If error recovery from the PoE error-disabled state is enabled, the switch automatically takes the PoE port out of the error-disabled state after the specified amount of time.
If error recovery is disabled, you can manually re-enable the PoE port by using the shutdown and no shutdown interface configuration commands.
4. If policing is disabled, no action occurs when the powered device consumes more than the maximum power allocation on the PoE port, which could adversely affect the switch.
Power Consumption Values
You can configure the initial power allocation and the maximum power allocation on a port. However, these values are only the configured values that determine when the switch should turn on or turn off power on the PoE port. The maximum power allocation is not the same as the actual power consumption of the powered device. The actual cutoff power value that the switch uses for power policing is not equal to the configured power value.
When power policing is enabled, the switch polices the power usage at the switch port, which is greater than the power consumption of the device. When you are manually set the maximum power allocation, you must consider the power loss over the cable from the switch port to the powered device. The cutoff power is the sum of the rated power consumption of the powered device and the worst-case power loss over the cable.
We recommend that you enable power policing when PoE is enabled on your switch. For example, if policing is disabled and you set the cutoff-power value by using the power inline auto max 6300 interface configuration command, the configured maximum power allocation on the PoE port is 6.3 W (6300 mW). The switch provides power to the connected devices on the port if the device needs up to 6.3 W. If the CDP-power negotiated value or the IEEE classification value exceeds the configured cutoff value, the switch does not provide power to the connected device. After the switch turns on power on the PoE port, the switch does not police the real-time power consumption of the device, and the device can consume more power than the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 155

How to Configure PoE

Interface and Hardware Component

maximum allocated amount, which could adversely affect the switch and the devices connected to the other PoE ports.
Because a standalone switch supports internal power supplies, the total amount of power available for the powered devices varies depending on the power supply configuration.
· If a power supply is removed and replaced by a new power supply with less power and the switch does not have enough power for the powered devices, the switch denies power to the PoE ports in auto mode in descending order of the port numbers. If the switch still does not have enough power, the switch then denies power to the PoE ports in static mode in descending order of the port numbers.
· If the new power supply supports more power than the previous one and the switch now has more power available, the switch grants power to the PoE ports in static mode in ascending order of the port numbers. If it still has power available, the switch then grants power to the PoE ports in auto mode in ascending order of the port numbers.

How to Configure PoE

Configuring a Power Management Mode on a PoE Port

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. power inline {auto [max max-wattage] | never | static [max max-wattage]} 4. end 5. show power inline [interface-id | module switch-number]

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

interface interface-id Example:
Switch(config)# interface gigabitethernet2/0/1

Step 3

power inline {auto [max max-wattage] | never | static [max max-wattage]}
Example:
Switch(config-if)# power inline auto

Purpose Enters global configuration mode.
Specifies the physical port to be configured, and enters interface configuration mode.
Configures the PoE mode on the port. The keywords have these meanings:
· auto--Enables powered-device detection. If enough power is available, automatically allocates power to the PoE port after device detection. This is the default setting.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 156

Interface and Hardware Component

Configuring Power Policing

Step 4 Step 5

Command or Action

Purpose · max max-wattage--Limits the power allowed on the port. The range for PoE+ ports is 4000 to 30000 mW. If no value is specified, the maximum is allowed.
· never --Disables device detection, and disable power to the port.

Note If a port has a Cisco powered device connected to it, do not use the power inline never command to configure the port. A false link-up can occur, placing the port into the error-disabled state.

· static--Enables powered-device detection. Pre-allocate (reserve) power for a port before the switch discovers the powered device. The switch reserves power for this port even when no device is connected and guarantees that power will be provided upon device detection.

The switch allocates power to a port configured in static mode before it allocates power to a port configured in auto mode.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

show power inline [interface-id | module switch-number] Displays PoE status for a switch or a switch stack, for the

Example:

specified interface, or for a specified stack member.

Switch# show power inline

The module switch-number keywords are supported only on stacking-capable switches.

Configuring Power Policing
By default, the switch monitors the real-time power consumption of connected powered devices. You can configure the switch to police the power usage. By default, policing is disabled.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. power inline police [action{log | errdisable}] 4. exit 5. Use one of the following:
· errdisable detect cause inline-power · errdisable recovery cause inline-power

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 157

Configuring Power Policing

Interface and Hardware Component

· errdisable recovery interval interval
6. exit 7. Use one of the following:
· show power inline police · show errdisable recovery

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

interface interface-id Example:
Switch(config)# interface gigabitethernet2/0/1

Step 3

power inline police [action{log | errdisable}] Example:
Switch(config-if)# power inline police

Purpose Enters global configuration mode.
Specifies the physical port to be configured, and enter interface configuration mode.
If the real-time power consumption exceeds the maximum power allocation on the port, configures the switch to take one of these actions:
· power inline police--Shuts down the PoE port, turns off power to it, and puts it in the error-disabled state.

Note You can enable error detection for the PoE error-disabled cause by using the errdisable detect cause inline-power global configuration command. You can also enable the timer to recover from the PoE error-disabled state by using the errdisable recovery cause inline-power interval interval global configuration command.

· power inline police action errdisable--Turns off power to the port if the real-time power consumption exceeds the maximum power allocation on the port.
· power inline police action log--Generates a syslog message while still providing power to the port.

Step 4

exit Example:
Switch(config-if)# exit

If you do not enter the action log keywords, the default action shuts down the port and puts the port in the error-disabled state.
Returns to global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 158

Interface and Hardware Component

Monitoring Power Status

Step 5

Command or Action
Use one of the following:
· errdisable detect cause inline-power · errdisable recovery cause inline-power · errdisable recovery interval interval
Example:
Switch(config)# errdisable detect cause inline-power

Purpose
(Optional) Enables error recovery from the PoE error-disabled state, and configures the PoE recover mechanism variables.
By default, the recovery interval is 300 seconds.
For interval interval, specifies the time in seconds to recover from the error-disabled state. The range is 30 to 86400.

Switch(config)# errdisable recovery cause inline-power

Switch(config)# errdisable recovery interval 100

Step 6 Step 7

exit Example:
Switch(config)# exit
Use one of the following: · show power inline police · show errdisable recovery
Example:
Switch# show power inline police
Switch# show errdisable recovery

Returns to privileged EXEC mode.
Displays the power monitoring status, and verify the error recovery settings.

Monitoring Power Status
Table 20: Show Commands for Power Status
Command show env power switch [switch-number]
show power inline [interface-id | module switch-number] show power inline police

Purpose
(Optional) Displays the status of the internal power supplies for each switch in the stack or for the specified switch. The range is 1 to 9, depending on the switch member numbers in the stack. These keywords are available only on stacking-capable switches.
Displays PoE status for a switch or switch stack, for an interface, or for a specific switch in the stack.
Displays the power policing data.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 159

Additional References

Interface and Hardware Component

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for PoE
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 160

1 2 C H A P T E R
Configuring EEE
· Finding Feature Information, on page 161 · Information About EEE, on page 161 · Restrictions for EEE, on page 162 · How to Configure EEE, on page 162 · Monitoring EEE, on page 163 · Configuration Examples for Configuring EEE, on page 163 · Additional References, on page 164 · Feature History and Information for Configuring EEE, on page 164
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About EEE
EEE Overview
Energy Efficient Ethernet (EEE) is an IEEE 802.3az standard that is designed to reduce power consumption in Ethernet networks during idle periods. EEE can be enabled on devices that support low power idle (LPI) mode. Such devices can save power by entering LPI mode during periods of low utilization. In LPI mode, systems on both ends of the link can save power by shutting down certain services. EEE provides the protocol needed to transition into and out of LPI mode in a way that is transparent to upper layer protocols and applications.
Default EEE Configuration
EEE is disabled by default.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 161

Restrictions for EEE

Interface and Hardware Component

Restrictions for EEE
EEE has the following restrictions:
· Changing the EEE configuration resets the interface because the device has to restart Layer 1 autonegotiation.
· You might want to enable the Link Layer Discovery Protocol (LLDP) for devices that require longer wakeup times before they are able to accept data on their receive paths. Doing so enables the device to negotiate for extended system wakeup times from the transmitting link partner.

How to Configure EEE
You can enable or disable EEE on an interface that is connected to an EEE-capable link partner.

Enabling or Disabling EEE

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. power efficient-ethernet auto 4. no power efficient-ethernet auto 5. end 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

interface interface-id Example:

Specifies the interface to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3

power efficient-ethernet auto Example:

Enables EEE on the specified interface. When EEE is enabled, the device advertises and autonegotiates EEE to its link partner.

Switch(config-if)# power efficient-ethernet auto

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 162

Interface and Hardware Component

Monitoring EEE

Step 4

Command or Action no power efficient-ethernet auto Example:

Purpose Disables EEE on the specified interface.

Switch(config-if)# no power efficient-ethernet auto

Step 5

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Monitoring EEE
Table 21: Commands for Displaying EEE Settings
Command show eee capabilities interface interface-id show eee status interface interface-id

Purpose
Displays EEE capabilities for the specified interface.
Displays EEE status information for the specified interface.

Configuration Examples for Configuring EEE
This example shows how to enable EEE for an interface:
Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# power efficient-ethernet auto
This example shows how to disable EEE for an interface:
Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# no power efficient-ethernet auto

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 163

Additional References

Interface and Hardware Component

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Configuring EEE

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 164

I V P A R T
IP Multicast Routing
· Configuring IGMP, on page 167 · Configuring Wireless Multicast, on page 221 · Configuring PIM, on page 235 · Configuring SSM, on page 281 · Configuring IP Multicast Routing, on page 297 · Configuring the Service Discovery Gateway, on page 321

1 3 C H A P T E R
Configuring IGMP
· Finding Feature Information, on page 167 · Restrictions for Configuring IGMP, on page 167 · Information About IGMP, on page 168 · How to Configure IGMP, on page 176 · Monitoring IGMP, on page 212 · Configuration Examples for IGMP, on page 215 · Where to Go Next for IGMP, on page 218 · Additional References, on page 218 · Feature History and Information for IGMP, on page 220
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Configuring IGMP
The following are the restrictions for configuring IGMP: · The switch supports IGMP Versions 1, 2 , and 3.
Note For IGMP Version 3, only IGMP Version 3 BISS (Basic IGMPv3 Snooping Support) is supported.
· IGMP Version 3 uses new membership report messages that might not be correctly recognized by older IGMP snooping switches.
· IGMP filtering and throttling is not supported under the WLAN. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 167

Information About IGMP

IP Multicast Routing

Information About IGMP
To participate in IP multicasting, multicast hosts, routers, and multilayer switches must have the Internet Group Management Protocol (IGMP) operating. This protocol defines the querier and host roles:
· A querier is a network device that sends query messages to discover which network devices are members of a given multicast group.
· A host is a receiver that sends report messages (in response to query messages) to inform a querier of a host membership.
A set of queriers and hosts that receive multicast data streams from the same source is called a multicast group. Queriers and hosts use IGMP messages to join and leave multicast groups. Any host, regardless of whether it is a member of a group, can send to a group. However, only the members of a group receive the message. Membership in a multicast group is dynamic; hosts can join and leave at any time. There is no restriction on the location or number of members in a multicast group. A host can be a member of more than one multicast group at a time. How active a multicast group is and what members it has can vary from group to group and from time to time. A multicast group can be active for a long time, or it can be very short-lived. Membership in a group can constantly change.
IP Multicast Group Addresses
IP multicast traffic uses group addresses, which are class D addresses. The high-order bits of a Class D address are 1110. Therefore, host group addresses can be in the range 224.0.0.0 through 239.255.255.255. Multicast addresses in the range 224.0.0.0 to 224.0.0.255 are reserved for use by routing protocols and other network control traffic. The address 224.0.0.0 is guaranteed not to be assigned to any group. IGMP packets are sent using these IP multicast group addresses:
· IGMP general queries are destined to the address 224.0.0.1 (all systems on a subnet).
· IGMP group-specific queries are destined to the group IP address for which the switch is querying.
· IGMP group membership reports are destined to the group IP address for which the switch is reporting.
· IGMP Version 2 (IGMPv2) leave messages are destined to the address 224.0.0.2 (all multicast routers on a subnet). In some old host IP stacks, leave messages might be destined to the group IP address rather than to the all-routers address.
Related Topics Configuring the Switch as a Member of a Group (CLI), on page 176 Example: Configuring the Switch as a Member of a Multicast Group, on page 215
IGMP Versions
The switch supports IGMP version 1, IGMP version 2, and IGMP version 3. These versions are interoperable on the switch. For example, if IGMP snooping is enabled and the querier's version is IGMPv2, and the switch receives an IGMPv3 report from a host, then the switch can forward the IGMPv3 report to the multicast router.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 168

IP Multicast Routing

IGMP Version 1

IGMP Version 1
IGMP version 1 (IGMPv1) primarily uses a query-response model that enables the multicast router and multilayer switch to find which multicast groups are active (have one or more hosts interested in a multicast group) on the local subnet. IGMPv1 has other processes that enable a host to join and leave a multicast group. For more information, see RFC 1112.
IGMP Version 2
IGMPv2 extends IGMP functionality by providing such features as the IGMP leave process to reduce leave latency, group-specific queries, and an explicit maximum query response time. IGMPv2 also adds the capability for routers to elect the IGMP querier without depending on the multicast protocol to perform this task. For more information, see RFC 2236.
Note IGMP version 2 is the default version for the switch.
IGMP Version 3
The switch supports IGMP version 3. The following are considerations for the switch and IGMP version 3: · An IGMPv3 switch supports Basic IGMPv3 Snooping Support (BISS), which includes support for the snooping features on IGMPv1 and IGMPv2 switches and for IGMPv3 membership report messages. BISS constrains the flooding of multicast traffic when your network includes IGMPv3 hosts. It constrains traffic to approximately the same set of ports as the IGMP snooping feature on IGMPv2 or IGMPv1 hosts.
· The switch supports IGMPv3 snooping based only on the destination multicast IP address. It does not support snooping based on a source IP address or proxy report.
· IGMPv3 join and leave messages are not supported on switches running IGMP filtering or Multicast VLAN registration (MVR).
· An IGMPv3 switch can receive messages from and forward messages to a device running the Source Specific Multicast (SSM) feature.
IGMPv3 Host Signalling
In IGMPv3, hosts signal membership to last hop routers of multicast groups. Hosts can signal group membership with filtering capabilities with respect to sources. A host can either signal that it wants to receive traffic from all sources sending to a group except for some specific sources (called exclude mode), or that it wants to receive traffic only from some specific sources sending to the group (called include mode). IGMPv3 can operate with both Internet Standard Multicast (ISM) and Source Specific Multicast (SSM). In ISM, both exclude and include mode reports are applicable. In SSM, only include mode reports are accepted by the last-hop router. Exclude mode reports are ignored.
IGMP Snooping
Layer 2 switches can use IGMP snooping to constrain the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast devices. As the name implies, IGMP snooping requires the LAN switch to snoop on the IGMP

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 169

Joining a Multicast Group

IP Multicast Routing

transmissions between the host and the router and to keep track of multicast groups and member ports. When the switch receives an IGMP report from a host for a particular multicast group, the switch adds the host port number to the forwarding table entry; when it receives an IGMP Leave Group message from a host, it removes the host port from the table entry. It also periodically deletes entries if it does not receive IGMP membership reports from the multicast clients.
Note For more information on IP multicast and IGMP, see RFC 1112 and RFC 2236.
The multicast router (which could be a switch with the IP services feature set on the active switch) sends out periodic general queries to all VLANs. All hosts interested in this multicast traffic send join requests and are added to the forwarding table entry. The switch creates one entry per VLAN in the IGMP snooping IP multicast forwarding table for each group from which it receives an IGMP join request.
The switch supports IP multicast group-based bridging, instead of MAC-addressed based groups. With multicast MAC address-based groups, if an IP address being configured translates (aliases) to a previously configured MAC address or to any reserved multicast MAC addresses (in the range 224.0.0.xxx), the command fails. Because the switch uses IP multicast groups, there are no address aliasing issues.
The IP multicast groups learned through IGMP snooping are dynamic. However, you can statically configure multicast groups by using the ip igmp snooping vlan vlan-id static ip_address interface interface-id global configuration command. If you specify group membership for a multicast group address statically, your setting supersedes any automatic manipulation by IGMP snooping. Multicast group membership lists can consist of both user-defined and IGMP snooping-learned settings.
You can configure an IGMP snooping querier to support IGMP snooping in subnets without multicast interfaces because the multicast traffic does not need to be routed.
If a port spanning-tree, a port group, or a VLAN ID change occurs, the IGMP snooping-learned multicast groups from this port on the VLAN are deleted.
Related Topics Enabling or Disabling IGMP Snooping on a Switch (CLI), on page 193 Examples: Configuring IGMP Snooping, on page 216
Joining a Multicast Group
Figure 6: Initial IGMP Join Message
When a host connected to the switch wants to join an IP multicast group and it is an IGMP version 2 client, it sends an unsolicited IGMP join message, specifying the IP multicast group to join. Alternatively, when the switch receives a general query from the router, it forwards the query to all ports in the VLAN. IGMP version 1 or version 2 hosts wanting to join the multicast group respond by sending a join message to the switch. The switch CPU creates a multicast forwarding-table entry for the group if it is not already present. The CPU also adds the interface where the join message was received to the forwarding-table entry. The host associated with that interface receives multicast traffic for that multicast group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 170

IP Multicast Routing

Joining a Multicast Group

Router A sends a general query to the switch, which forwards the query to ports 2 through 5, which are all members of the same VLAN. Host 1 wants to join multicast group 224.1.2.3 and multicasts an IGMP membership report (IGMP join message) to the group. The switch CPU uses the information in the IGMP report to set up a forwarding-table entry that includes the port numbers connected to Host 1 and to the router.
Table 22: IGMP Snooping Forwarding Table

Destination Address 224.1.2.3

Type of Packet IGMP

Ports 1, 2

The switch hardware can distinguish IGMP information packets from other packets for the multicast group. The information in the table tells the switching engine to send frames addressed to the 224.1.2.3 multicast IP address that are not IGMP packets to the router and to the host that has joined the group.
Figure 7: Second Host Joining a Multicast Group
If another host (for example, Host 4) sends an unsolicited IGMP join message for the same group, the CPU receives that message and adds the port number of Host 4 to the forwarding table. Because the forwarding table directs IGMP messages only to the CPU, the message is not flooded to other ports on the switch. Any

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 171

Leaving a Multicast Group
known multicast traffic is forwarded to the group and not to the

IP Multicast Routing

CPU.
Table 23: Updated IGMP Snooping Forwarding Table

Destination Address 224.1.2.3

Type of Packet IGMP

Ports 1, 2, 5

Related Topics Configuring the Switch as a Member of a Group (CLI), on page 176 Example: Configuring the Switch as a Member of a Multicast Group, on page 215

Leaving a Multicast Group
The router sends periodic multicast general queries, and the switch forwards these queries through all ports in the VLAN. Interested hosts respond to the queries. If at least one host in the VLAN wants to receive multicast traffic, the router continues forwarding the multicast traffic to the VLAN. The switch forwards multicast group traffic only to those hosts listed in the forwarding table for that IP multicast group maintained by IGMP snooping.
When hosts want to leave a multicast group, they can silently leave, or they can send a leave message. When the switch receives a leave message from a host, it sends a group-specific query to learn if any other devices connected to that interface are interested in traffic for the specific multicast group. The switch then updates the forwarding table for that MAC group so that only those hosts interested in receiving multicast traffic for the group are listed in the forwarding table. If the router receives no reports from a VLAN, it removes the group for the VLAN from its IGMP cache.

Immediate Leave
The switch uses IGMP snooping Immediate Leave to remove from the forwarding table an interface that sends a leave message without the switch sending group-specific queries to the interface. The VLAN interface is pruned from the multicast tree for the multicast group specified in the original leave message. Immediate

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 172

IP Multicast Routing

IGMP Configurable-Leave Timer

Leave ensures optimal bandwidth management for all hosts on a switched network, even when multiple multicast groups are simultaneously in use. Immediate Leave is only supported on IGMP version 2 hosts. IGMP version 2 is the default version for the switch.
Note You should only use the Immediate Leave feature on VLANs where a single host is connected to each port. If Immediate Leave is enabled in VLANs where more than one host is connected to a port, some hosts might inadvertently be dropped.
IGMP Configurable-Leave Timer
You can configure the time that the switch waits after sending a group-specific query to determine if hosts are still interested in a specific multicast group. The IGMP leave response time can be configured from 100 to 5000 milliseconds. The timer can be set either globally or on a per-VLAN basis. The VLAN configuration of the leave time overrides the global configuration. Related Topics
Configuring the IGMP Leave Timer (CLI), on page 200
IGMP Report Suppression
Note IGMP report suppression is supported only when the multicast query has IGMPv1 and IGMPv2 reports. This feature is not supported when the query includes IGMPv3 reports.
The switch uses IGMP report suppression to forward only one IGMP report per multicast router query to multicast devices. When IGMP report suppression is enabled (the default), the switch sends the first IGMP report from all hosts for a group to all the multicast routers. The switch does not send the remaining IGMP reports for the group to the multicast routers. This feature prevents duplicate reports from being sent to the multicast devices. If the multicast router query includes requests only for IGMPv1 and IGMPv2 reports, the switch forwards only the first IGMPv1 or IGMPv2 report from all hosts for a group to all the multicast routers. If the multicast router query also includes requests for IGMPv3 reports, the switch forwards all IGMPv1, IGMPv2, and IGMPv3 reports for a group to the multicast devices. If you disable IGMP report suppression, all IGMP reports are forwarded to the multicast routers.
IGMP Snooping and Switch Stacks
IGMP snooping functions across the switch stack; that is, IGMP control information from one switch is distributed to all switches in the stack. Regardless of the stack member through which IGMP multicast data enters the stack, the data reaches the hosts that have registered for that group. If a switch in the stack fails or is removed from the stack, only the members of the multicast group that are on that switch will not receive the multicast data. All other members of a multicast group on other switches in the stack continue to receive multicast data streams. However, multicast groups that are common for both Layer 2 and Layer 3 (IP multicast routing) might take longer to converge if the active switch is removed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 173

IGMP Filtering and Throttling Overview

IP Multicast Routing

IGMP Filtering and Throttling Overview
In some environments, for example, metropolitan or multiple-dwelling unit (MDU) installations, you might want to control the set of multicast groups to which a user on a switch port can belong. You can control the distribution of multicast services, such as IP/TV, based on some type of subscription or service plan. You might also want to limit the number of multicast groups to which a user on a switch port can belong.
With the IGMP filtering feature, you can filter multicast joins on a per-port basis by configuring IP multicast profiles and associating them with individual switch ports. An IGMP profile can contain one or more multicast groups and specifies whether access to the group is permitted or denied. If an IGMP profile denying access to a multicast group is applied to a switch port, the IGMP join report requesting the stream of IP multicast traffic is dropped, and the port is not allowed to receive IP multicast traffic from that group. If the filtering action permits access to the multicast group, the IGMP report from the port is forwarded for normal processing. You can also set the maximum number of IGMP groups that a Layer 2 interface can join.
IGMP filtering controls only group-specific query and membership reports, including join and leave reports. It does not control general IGMP queries. IGMP filtering has no relationship with the function that directs the forwarding of IP multicast traffic. The filtering feature operates in the same manner whether CGMP or MVR is used to forward the multicast traffic.
IGMP filtering applies only to the dynamic learning of IP multicast group addresses, not static configuration.
With the IGMP throttling feature, you can set the maximum number of IGMP groups that a Layer 2 interface can join. If the maximum number of IGMP groups is set, the IGMP snooping forwarding table contains the maximum number of entries, and the interface receives an IGMP join report, you can configure an interface to drop the IGMP report or to replace the randomly selected multicast entry with the received IGMP report.

Note IGMPv3 join and leave messages are not supported on switches running IGMP filtering.
Related Topics Configuring the IGMP Throttling Action (CLI), on page 191 Examples: Configuring Filtering and Throttling, on page 217

Default IGMP Configuration
This table displays the default IGMP configuration for the switch.
Table 24: Default IGMP Configuration

Feature

Default Setting

Multilayer switch as a member of a multicast group No group memberships are defined.

Access to multicast groups

All groups are allowed on an interface.

IGMP version

Version 2 on all interfaces.

IGMP host-query message interval

60 seconds on all interfaces.

IGMP query timeout

60 seconds on all interfaces.

IGMP maximum query response time

10 seconds on all interfaces.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 174

IP Multicast Routing

Default IGMP Snooping Configuration

Feature

Default Setting

Multilayer switch as a statically connected member Disabled.

Default IGMP Snooping Configuration
This table displays the default IGMP snooping configuration for the switch.
Table 25: Default IGMP Snooping Configuration

Feature IGMP snooping Multicast routers IGMP snooping Immediate Leave Static groups TCN1 flood query count TCN query solicitation IGMP snooping querier IGMP report suppression
1 (1) TCN = Topology Change Notification

Default Setting Enabled globally and per VLAN None configured Disabled None configured 2 Disabled Disabled Enabled

Default IGMP Filtering and Throttling Configuration
This table displays the default IGMP filtering and throttling configuration for the switch.
Table 26: Default IGMP Filtering Configuration

Feature IGMP filters IGMP maximum number of IGMP groups

Default Setting
None applied.
No maximum set. Note When the maximum number of groups is
in the forwarding table, the default IGMP throttling action is to deny the IGMP report.

IGMP profiles IGMP profile action

None defined. Deny the range addresses.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 175

How to Configure IGMP

IP Multicast Routing

How to Configure IGMP
Configuring the Switch as a Member of a Group (CLI)
You can configure the switch as a member of a multicast group and discover multicast reachability in a network. If all the multicast-capable routers and multilayer switches that you administer are members of a multicast group, pinging that group causes all of these devices to respond. The devices respond to ICMP echo-request packets addressed to a group of which they are members. Another example is the multicast trace-route tools provided in the software.

Caution Performing this procedure might impact the CPU performance because the CPU will receive all data traffic for the group address.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip igmp join-group group-address 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

interface interface-id Example:
Switch(config)# interface

Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode.
The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 176

IP Multicast Routing

Configuring the Switch as a Member of a Group (CLI)

Command or Action
gigabitethernet 1/0/1

Step 4

ip igmp join-group group-address Example:
Switch(config-if)# ip igmp join-group 225.2.2.2

Step 5

end Example:
Switch(config-if)# end

Step 6

show ip igmp interface [interface-id] Example:
Switch# show ip igmp interface

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217.
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218.
These interfaces must have IP addresses assigned to them. Configures the switch to join a multicast group. By default, no group memberships are defined. For group-address, specify the multicast IP address in dotted decimal notation.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Related Topics Joining a Multicast Group, on page 170 Example: Configuring the Switch as a Member of a Multicast Group, on page 215 IP Multicast Group Addresses, on page 168

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 177

Controlling Access to IP Multicast Group (CLI)

IP Multicast Routing

Controlling Access to IP Multicast Group (CLI)
The switch sends IGMP host-query messages to find which multicast groups have members on attached local networks. The switch then forwards to these group members all packets addressed to the multicast group. You can place a filter on each interface to restrict the multicast groups that hosts on the subnet serviced by the interface can join.
To limit the number of joins on the interface, configure the port for the filter which associates with the IGMP profile.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp profile 4. permit 5. exit 6. interface interface-id 7. ip igmp filter filter_number 8. end 9. show ip igmp interface [interface-id]

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

ip igmp profile Example:
Switch(config)# ip igmp profile 10 Switch(config-igmp-profile)# ?
permit Example:
Switch(config-igmp-profile)#

Enters an IGMP filter profile number from 1 to 4294967295. For additional information about configuring IGMP filter profiles, see Configuring IGMP Profiles (CLI), on page 187.
Enters an IGMP profile configuration action. The following IGMP profile configuration actions are supported:
· deny--Matching IP addresses are denied. · exit--Exits from the IGMP profile configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 178

IP Multicast Routing

Modifying the IGMP Host-Query Message Interval (CLI)

Command or Action
permit 229.9.9.0

Step 5

exit Example:
Switch(config-igmp-profile)# exit

Step 6

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Step 7

ip igmp filter filter_number Example:
Switch(config-if)# ip igmp filter 10

Step 8

end Example:
Switch(config-igmp-profile)# end

Step 9

show ip igmp interface [interface-id] Example:
Switch# show ip igmp interface

Purpose · no--Negates a command or set its defaults. · permit--Matching addresses are permitted. · range--Adds a range to the set.
Returns to global configuration mode.
Specifies the interface to be configured, and enters interface configuration mode.
Specifies the IGMP filter profile number. For additional information about applying IGMP filter profiles, see Applying IGMP Profiles (CLI), on page 188.
Returns to privileged EXEC mode.
Verifies your entries.

Related Topics Example: Controlling Access to Multicast Groups, on page 215
Modifying the IGMP Host-Query Message Interval (CLI)
The switch periodically sends IGMP host-query messages to discover which multicast groups are present on attached networks. These messages are sent to the all-hosts multicast group (224.0.0.1) with a time-to-live (TTL) of 1. The switch sends host-query messages to refresh its knowledge of memberships present on the network. If, after some number of queries, the software discovers that no local hosts are members of a multicast group, the software stops forwarding multicast packets to the local network from remote origins for that group and sends a prune message upstream toward the source.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 179

Modifying the IGMP Host-Query Message Interval (CLI)

IP Multicast Routing

The switch elects a PIM designated router (DR) for the LAN (subnet). The DR is the router or multilayer switch with the highest IP address for IGMPv2. For IGMPv1, the DR is elected according to the multicast routing protocol that runs on the LAN. The designated router is responsible for sending IGMP host-query messages to all hosts on the LAN. In sparse mode, the designated router also sends PIM register and PIM join messages toward the RP router.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip igmp query-interval seconds 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode.
The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217.
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group,

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 180

IP Multicast Routing

Changing the IGMP Query Timeout for IGMPv2 (CLI)

Command or Action

Step 4

ip igmp query-interval seconds Example:
Switch(config-if)# ip igmp query-interval 75

Step 5

end Example:
Switch(config-if)# end

Step 6

show ip igmp interface [interface-id] Example:
Switch# show ip igmp interface

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218.
These interfaces must have IP addresses assigned to them. Configures the frequency at which the designated router sends IGMP host-query messages. By default, the designated router sends IGMP host-query messages every 60 seconds to keep the IGMP overhead very low on hosts and networks. The range is 1 to 65535. Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Changing the IGMP Query Timeout for IGMPv2 (CLI)
If you are using IGMPv2, you can specify the period of time before the switch takes over as the querier for the interface. By default, the switch waits twice the query interval period controlled by the ip igmp query-interval interface configuration command. After that time, if the switch has received no queries, it becomes the querier.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip igmp querier-timeout seconds

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 181

Changing the IGMP Query Timeout for IGMPv2 (CLI)

IP Multicast Routing

5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Step 4

ip igmp querier-timeout seconds Example:
Switch(config-if)# ip igmp querier-timeout 120

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.
Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217.
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218.
These interfaces must have IP addresses assigned to them.
Specifies the IGMP query timeout. The default is 60 seconds (twice the query interval). The range is 60 to 300.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 182

IP Multicast Routing

Changing the Maximum Query Response Time for IGMPv2 (CLI)

Step 5

Command or Action end Example:
Switch(config-if)# end

Step 6

show ip igmp interface [interface-id] Example:
Switch# show ip igmp interface

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Changing the Maximum Query Response Time for IGMPv2 (CLI)
If you are using IGMPv2, you can change the maximum query response time advertised in IGMP queries. The maximum query response time enables the switch to quickly detect that there are no more directly connected group members on a LAN. Decreasing the value enables the switch to prune groups faster.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip igmp query-max-response-time seconds 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 183

Changing the Maximum Query Response Time for IGMPv2 (CLI)

Step 2

Command or Action configure terminal Example:
Switch# configure terminal

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Step 4

ip igmp query-max-response-time seconds Example:
Switch(config-if)# ip igmp query-max-response-time 15

Step 5

end Example:
Switch(config-if)# end

Step 6

show ip igmp interface [interface-id] Example:
Switch# show ip igmp interface

IP Multicast Routing
Purpose Enters the global configuration mode.
Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217.
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218.
These interfaces must have IP addresses assigned to them. Changes the maximum query response time advertised in IGMP queries. The default is 10 seconds. The range is 1 to 25.
Returns to privileged EXEC mode.
Verifies your entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 184

IP Multicast Routing

Configuring the Switch as a Statically Connected Member (CLI)

Step 7

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Configuring the Switch as a Statically Connected Member (CLI)
At various times, either there is not a group member on a network segment or a host that cannot report its group membership by using IGMP. However, you may want multicast traffic to be sent to that network segment. The following commands are used to pull multicast traffic down to a network segment:
· ip igmp join-group--The switch accepts the multicast packets in addition to forwarding them. Accepting the multicast packets prevents the switch from fast switching.
· ip igmp static-group--The switch does not accept the packets itself, but only forwards them. This method enables fast switching. The outgoing interface appears in the IGMP cache, but the switch itself is not a member, as evidenced by lack of an L (local) flag in the multicast route entry.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip igmp static-group group-address 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 185

Configuring the Switch as a Statically Connected Member (CLI)

IP Multicast Routing

Step 3

Command or Action interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Step 4

ip igmp static-group group-address Example:
Switch(config-if)# ip igmp static-group 239.100.100.101

Step 5

end Example:
Switch(config-if)# end

Step 6

show ip igmp interface [interface-id] Example:
Switch# show ip igmp interface gigabitethernet 1/0/1

Step 7

copy running-config startup-config Example:
Switch# copy running-config

Purpose Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode. The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217.
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218.
These interfaces must have IP addresses assigned to them. Configures the switch as a statically connected member of a group. By default, this feature is disabled.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 186

IP Multicast Routing

Configuring IGMP Profiles (CLI)

Command or Action
startup-config

Purpose

Configuring IGMP Profiles (CLI)
To configure an IGMP profile, use the ip igmp profile global configuration command with a profile number to create an IGMP profile and to enter IGMP profile configuration mode. From this mode, you can specify the parameters of the IGMP profile to be used for filtering IGMP join requests from a port. When you are in IGMP profile configuration mode, you can create the profile by using these commands:
· deny--Specifies that matching addresses are denied; this is the default.
· exit--Exits from igmp-profile configuration mode.
· no--Negates a command or returns to its defaults.
· permit--Specifies that matching addresses are permitted.
· range--Specifies a range of IP addresses for the profile. You can enter a single IP address or a range with a start and an end address.
The default is for the switch to have no IGMP profiles configured. When a profile is configured, if neither the permit nor deny keyword is included, the default is to deny access to the range of IP addresses.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp profile profile number 4. permit | deny 5. range ip multicast address 6. end 7. show ip igmp profile profile number 8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 187

Applying IGMP Profiles (CLI)

IP Multicast Routing

Step 3

Command or Action ip igmp profile profile number Example:
Switch(config)# ip igmp profile 3

Step 4

permit | deny Example:
Switch(config-igmp-profile)# permit

Step 5

range ip multicast address Example:
Switch(config-igmp-profile)# range 229.9.9.0

Step 6

end Example:
Switch(config-igmp-profile)# end

Step 7

show ip igmp profile profile number Example:
Switch# show ip igmp profile 3

Step 8

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Assigns a number to the profile you are configuring, and enters IGMP profile configuration mode. The profile number range is 1 to 4294967295. Note To delete a profile, use the no ip igmp profile
profile number global configuration command. (Optional) Sets the action to permit or deny access to the IP multicast address. If no action is configured, the default for the profile is to deny access.
Enters the IP multicast address or range of IP multicast addresses to which access is being controlled. If entering a range, enter the low IP multicast address, a space, and the high IP multicast address. You can use the range command multiple times to enter multiple addresses or ranges of addresses. Note To delete an IP multicast address or range of IP
multicast addresses, use the no range ip multicast address IGMP profile configuration command.
Returns to privileged EXEC mode.
Verifies the profile configuration.
(Optional) Saves your entries in the configuration file.

Applying IGMP Profiles (CLI)
To control access as defined in an IGMP profile, use the ip igmp filter interface configuration command to apply the profile to the appropriate interfaces. You can apply IGMP profiles only to Layer 2 access ports; you cannot apply IGMP profiles to routed ports or SVIs. You cannot apply profiles to ports that belong to an

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 188

IP Multicast Routing

Applying IGMP Profiles (CLI)

EtherChannel port group. You can apply a profile to multiple interfaces, but each interface can have only one profile applied to it.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip igmp filter profile number 5. end 6. show running-config interface interface-id 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/1

Specifies the physical interface, and enters interface configuration mode. The interface must be a Layer 2 port that does not belong to an EtherChannel port group.

Step 4

ip igmp filter profile number Example:
Switch(config-if)# ip igmp filter 321

Step 5

end Example:
Switch(config-if)# end

Applies the specified IGMP profile to the interface. The range is 1 to 4294967295. Note To remove a profile from an interface, use the
no ip igmp filter profile number interface configuration command.
Returns to privileged EXEC mode.

Step 6

show running-config interface interface-id Example:

Verifies the configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 189

Setting the Maximum Number of IGMP Groups (CLI)

IP Multicast Routing

Command or Action
Switch# show running-config interface gigabitethernet1/0/1

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Setting the Maximum Number of IGMP Groups (CLI)
You can set the maximum number of IGMP groups that a Layer 2 interface can join by using the ip igmp max-groups interface configuration command. Use the no form of this command to set the maximum back to the default, which is no limit.
This restriction can be applied to Layer 2 ports only; you cannot set a maximum number of IGMP groups on routed ports or SVIs. You also can use this command on a logical EtherChannel interface but cannot use it on ports that belong to an EtherChannel port group.
Beginning in privileged EXEC mode, follow these steps to set the maximum number of IGMP groups in the forwarding table:

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip igmp max-groups number 5. end 6. show running-config interface interface-id 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 190

IP Multicast Routing

Configuring the IGMP Throttling Action (CLI)

Step 3

Command or Action interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/2

Purpose
Specifies the interface to be configured, and enters interface configuration mode. The interface can be a Layer 2 port that does not belong to an EtherChannel group or a EtherChannel interface.

Step 4

ip igmp max-groups number Example:
Switch(config-if)# ip igmp max-groups 20

Step 5

end Example:
Switch(config-if)# end

Sets the maximum number of IGMP groups that the interface can join. The range is 0 to 4294967294. The default is to have no maximum set.
Note The switch supports a maximum number of 4096 Layer 2 IGMP groups and 2048 Layer 3 IGMP groups.
Returns to privileged EXEC mode.

Step 6

show running-config interface interface-id Example:
Switch# show running-config interface gigabitethernet1/0/1

Verifies your entries.

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring the IGMP Throttling Action (CLI)
After you set the maximum number of IGMP groups that a Layer 2 interface can join, you can configure an interface to replace the existing group with the new group for which the IGMP report was received by using the ip igmp max-groups action replace interface configuration command. Use the no form of this command to return to the default, which is to drop the IGMP join report.
Follow these guidelines when configuring the IGMP throttling action:
· This restriction can be applied only to Layer 2 ports. You can use this command on a logical EtherChannel interface but cannot use it on ports that belong to an EtherChannel port group.
· When the maximum group limitation is set to the default (no maximum), entering the ip igmp max-groups action {deny | replace} command has no effect.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 191

Configuring the IGMP Throttling Action (CLI)

IP Multicast Routing

· If you configure the throttling action and set the maximum group limitation after an interface has added multicast entries to the forwarding table, the forwarding-table entries are either aged out or removed, depending on the throttling action.
· If you configure the throttling action as deny, the entries that were previously in the forwarding table are not removed but are aged out. After these entries are aged out and the maximum number of entries is in the forwarding table, the switch drops the next IGMP report received on the interface.
· If you configure the throttling action as replace, the entries that were previously in the forwarding table are removed. When the maximum number of entries is in the forwarding table, the switch replaces a randomly selected entry with the received IGMP report.
To prevent the switch from removing the forwarding-table entries, you can configure the IGMP throttling action before an interface adds entries to the forwarding table.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip igmp max-groups action {deny | replace} 5. end 6. show running-config interface interface-id 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Specifies the physical interface to be configured, and enters interface configuration mode. The interface can be a Layer 2 port that does not belong to an EtherChannel group or an EtherChannel interface. The interface cannot be a trunk port.

ip igmp max-groups action {deny | replace} Example:
Switch(config-if)# ip igmp max-groups action

When an interface receives an IGMP report and the maximum number of entries is in the forwarding table, specifies the action that the interface takes:
· deny--Drops the report.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 192

IP Multicast Routing

How to Configure IGMP Snooping

Command or Action
replace

Step 5

end Example:
Switch(config-if)# end

Step 6

show running-config interface interface-id Example:
Switch# show running-config interface gigabitethernet1/0/1

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose · replace--Replaces the existing group with the new group for which the IGMP report was received.
Note To return to the default action of dropping the report, use the no ip igmp max-groups action interface configuration command.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Related Topics IGMP Filtering and Throttling Overview, on page 174 Examples: Configuring Filtering and Throttling, on page 217

How to Configure IGMP Snooping

Enabling or Disabling IGMP Snooping on a Switch (CLI)
By default, IGMP snooping is globally enabled on the switch. When globally enabled or disabled, it is also enabled or disabled in all existing VLAN interfaces. IGMP snooping is by default enabled on all VLANs, but can be enabled and disabled on a per-VLAN basis.
Global IGMP snooping overrides the VLAN IGMP snooping. If global snooping is disabled, you cannot enable VLAN snooping. If global snooping is enabled, you can enable or disable VLAN snooping.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping 4. end 5. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 193

Enabling or Disabling IGMP Snooping on a VLAN Interface (CLI)

IP Multicast Routing

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

ip igmp snooping Example:
Switch(config)# ip igmp snooping

Step 4

end Example:
Switch(config)# end

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.
Globally enables IGMP snooping in all existing VLAN interfaces. Note To globally disable IGMP snooping on all VLAN
interfaces, use the no ip igmp snooping global configuration command. Returns to privileged EXEC mode.
(Optional) Saves your entries in the configuration file.

Related Topics IGMP Snooping, on page 169 Examples: Configuring IGMP Snooping, on page 216
Enabling or Disabling IGMP Snooping on a VLAN Interface (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id 4. end 5. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 194

IP Multicast Routing

Setting the Snooping Method (CLI)

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

ip igmp snooping vlan vlan-id Example:
Switch(config)# ip igmp snooping vlan 7

Step 4

end Example:
Switch(config)# end

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.
Enables IGMP snooping on the VLAN interface. The VLAN ID range is 1 to 1001 and 1006 to 4094. IGMP snooping must be globally enabled before you can enable VLAN snooping. Note To disable IGMP snooping on a VLAN interface,
use the no ip igmp snooping vlan vlan-id global configuration command for the specified VLAN number. Returns to privileged EXEC mode.
(Optional) Saves your entries in the configuration file.

Setting the Snooping Method (CLI)
Multicast-capable router ports are added to the forwarding table for every Layer 2 multicast entry. The switch learns of the ports through one of these methods:
· Snooping on IGMP queries
· Statically connecting to a multicast router port using the ip igmp snooping mrouter global configuration command
Beginning in privileged EXEC mode, follow these steps to alter the method in which a VLAN interface accesses a multicast router:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 195

Setting the Snooping Method (CLI)

IP Multicast Routing

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id mrouter interface {GigabitEthernet | Port-Channel |
TenGigabitEthernet} 4. end 5. show ip igmp snooping 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

ip igmp snooping vlan vlan-id mrouter interface

Enables IGMP snooping on a VLAN. The VLAN ID range

{GigabitEthernet | Port-Channel | TenGigabitEthernet} is 1 to 1001 and 1006 to 4094.

Example:

Switch(config)# ip igmp snooping vlan 1 mrouter interface GigabitEthernet1/0/3

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 5

show ip igmp snooping Example:
Switch# show ip igmp snooping

Verifies the configuration.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 196

IP Multicast Routing

Configuring a Multicast Router Port (CLI)

Configuring a Multicast Router Port (CLI)
To add a multicast router port (add a static connection to a multicast router), use the ip igmp snooping vlan mrouter global configuration command on the switch.

Note Static connections to multicast routers are supported only on switch ports.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id mrouter interface interface-id 4. end 5. show ip igmp snooping mrouter [vlan vlan-id] 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

ip igmp snooping vlan vlan-id mrouter interface interface-id
Example:

Specifies the multicast router VLAN ID and the interface to the multicast router.
· The VLAN ID range is 1 to 1001 and 1006 to 4094.

Switch(config)# ip igmp snooping vlan 5 mrouter interface gigabitethernet1/0/1

· The interface can be a physical interface or a port channel. The port-channel range is 1 to 128.

Note To remove a multicast router port from the VLAN, use the no ip igmp snooping vlan vlan-id mrouter interface interface-id global configuration command.

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 197

Configuring a Host Statically to Join a Group (CLI)

IP Multicast Routing

Command or Action
Switch(config)# end

Step 5

show ip igmp snooping mrouter [vlan vlan-id] Example:
Switch# show ip igmp snooping mrouter vlan 5

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Verifies that IGMP snooping is enabled on the VLAN interface.
(Optional) Saves your entries in the configuration file.

Configuring a Host Statically to Join a Group (CLI)
Hosts or Layer 2 ports normally join multicast groups dynamically, but you can also statically configure a host on an interface.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id static ip_address interface interface-id 4. end 5. show ip igmp snooping groups 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

ip igmp snooping vlan vlan-id static ip_address interface Statically configures a Layer 2 port as a member of a

interface-id

multicast group:

Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 198

IP Multicast Routing

Enabling IGMP Immediate Leave (CLI)

Step 4

Command or Action

Purpose

Switch(config)# ip igmp snooping vlan 105 static 230.0.0.1 interface gigabitethernet1/0/1

· vlan-id is the multicast group VLAN ID. The range is 1 to 1001 and 1006 to 4094.
· ip-address is the group IP address.

· interface-id is the member port. It can be a physical interface or a port channel (1 to 128).

Note To remove the Layer 2 port from the multicast group, use the no ip igmp snooping vlan vlan-id static mac-address interface interface-id global configuration command.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 5

show ip igmp snooping groups Example:
Switch# show ip igmp snooping groups

Verifies the member port and the IP address.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Enabling IGMP Immediate Leave (CLI)
When you enable IGMP Immediate Leave, the switch immediately removes a port when it detects an IGMP Version 2 leave message on that port. You should only use the Immediate-Leave feature when there is a single receiver present on every port in the VLAN.

Note Immediate Leave is supported only on IGMP Version 2 hosts. IGMP Version 2 is the default version for the switch.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping vlan vlan-id immediate-leave 4. end 5. show ip igmp snooping vlan vlan-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 199

Configuring the IGMP Leave Timer (CLI)

IP Multicast Routing

6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

ip igmp snooping vlan vlan-id immediate-leave Example:
Switch(config)# ip igmp snooping vlan 21 immediate-leave

Step 4

end Example:
Switch(config)# end

Step 5

show ip igmp snooping vlan vlan-id Example:
Switch# show ip igmp snooping vlan 21

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.
Enables IGMP Immediate Leave on the VLAN interface. Note To disable IGMP Immediate Leave on a VLAN,
use the no ip igmp snooping vlan vlan-id immediate-leave global configuration command. Returns to privileged EXEC mode.
Verifies that Immediate Leave is enabled on the VLAN interface.
(Optional) Saves your entries in the configuration file.

Configuring the IGMP Leave Timer (CLI)
Follow these guidelines when configuring the IGMP leave timer: · You can configure the leave time globally or on a per-VLAN basis. · Configuring the leave time on a VLAN overrides the global setting. · The default leave time is 1000 milliseconds.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 200

IP Multicast Routing

Configuring the IGMP Leave Timer (CLI)

· The IGMP configurable leave time is only supported on hosts running IGMP Version 2. IGMP version 2 is the default version for the switch.
· The actual leave latency in the network is usually the configured leave time. However, the leave time might vary around the configured time, depending on real-time CPU load conditions, network delays and the amount of traffic sent through the interface.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping last-member-query-interval time 4. ip igmp snooping vlan vlan-id last-member-query-interval time 5. end 6. show ip igmp snooping 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

ip igmp snooping last-member-query-interval time Example:
Switch(config)# ip igmp snooping last-member-query-interval 1000
ip igmp snooping vlan vlan-id last-member-query-interval time Example:
Switch(config)# ip igmp snooping vlan 210 last-member-query-interval 1000

Configures the IGMP leave timer globally. The range is 100 to 32768 milliseconds. The default is 1000 seconds.
Note To globally reset the IGMP leave timer to the default setting, use the no ip igmp snooping last-member-query-interval global configuration command.
(Optional) Configures the IGMP leave time on the VLAN interface. The range is 100 to 32768 milliseconds.
Note Configuring the leave time on a VLAN overrides the globally configured timer.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 201

Configuring the IGMP Robustness-Variable (CLI)

IP Multicast Routing

Command or Action

Step 5

end Example:
Switch(config)# end

Step 6

show ip igmp snooping Example:
Switch# show ip igmp snooping

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Note To remove the configured IGMP leave-time
setting from the specified VLAN, use the no ip igmp snooping vlan vlan-id last-member-query-interval global configuration command. Returns to privileged EXEC mode.
(Optional) Displays the configured IGMP leave time.
(Optional) Saves your entries in the configuration file.

Related Topics IGMP Configurable-Leave Timer, on page 173
Configuring the IGMP Robustness-Variable (CLI)
Use the following procedure to configure the IGMP robustness variable on the switch. The robustness variable is the integer used by IGMP snooping during calculations for IGMP messages. The robustness variable provides fine tuning to allow for expected packet loss.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping robustness-variable count 4. ip igmp snooping vlan vlan-id robustness-variable count 5. end 6. show ip igmp snooping 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable

Purpose Enables privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 202

IP Multicast Routing

Configuring the IGMP Last Member Query Count (CLI)

Command or Action Example:
Switch> enable

Purpose · Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

ip igmp snooping robustness-variable count Example:
Switch(config)# ip igmp snooping robustness-variable 3

Configures the IGMP robustness variable. The range is 1 to 3 times.
The recommended value for the robustness variable is 2. Use this command to change the value of the robustness variable for IGMP snooping from the default (2) to a specified value.

ip igmp snooping vlan vlan-id robustness-variable count (Optional) Configures the IGMP robustness variable on the

Example:

VLAN interface. The range is 1 to 3 times. The recommended value for the robustness variable is 2.

Switch(config)#ip igmp snooping vlan 100 robustness-variable 3

Note Configuring the robustness variable count on a VLAN overrides the globally configured value.

Step 5

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 6

show ip igmp snooping Example:
Switch# show ip igmp snooping

(Optional) Displays the configured IGMP robustness variable count.

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring the IGMP Last Member Query Count (CLI)
To configure the number of times the switch sends IGMP group-specific or group-source-specific (with IGMP version 3) query messages in response to receiving a group-specific or group-source-specific leave message, use this command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 203

Configuring the IGMP Last Member Query Count (CLI)

IP Multicast Routing

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping last-member-query-count count 4. ip igmp snooping vlan vlan-id last-member-query-count count 5. end 6. show ip igmp snooping 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

ip igmp snooping last-member-query-count count Example:
Switch(config)# ip igmp snooping last-member-query-count 3

Configures the IGMP last member query count. The range is 1 to 7 messages. The default is 2 messages.

Step 4

ip igmp snooping vlan vlan-id last-member-query-count (Optional) Configures the IGMP last member query count

count

on the VLAN interface. The range is 1 to 7 messages.

Example:
Switch(config)#ip igmp snooping vlan 100 last-member-query-count 3

Note Configuring the last member query count on a VLAN overrides the globally configured timer.

Step 5

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 6

show ip igmp snooping Example:

(Optional) Displays the configured IGMP last member query count.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 204

IP Multicast Routing

Configuring TCN-Related Commands

Command or Action
Switch# show ip igmp snooping

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Configuring TCN-Related Commands

Controlling the Multicast Flooding Time After a TCN Event (CLI)
You can control the time that multicast traffic is flooded after a topology change notification (TCN) event by using the ip igmp snooping tcn flood query count global configuration command. This command configures the number of general queries for which multicast data traffic is flooded after a TCN event. Some examples of TCN events are when the client changed its location and the receiver is on same port that was blocked but is now forwarding, and when a port went down without sending a leave message.
If you set the TCN flood query count to 1 by using the ip igmp snooping tcn flood query count command, the flooding stops after receiving 1 general query. If you set the count to 7, the flooding continues until 7 general queries are received. Groups are relearned based on the general queries received during the TCN event.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping tcn flood query count count 4. end 5. show ip igmp snooping 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 205

Recovering from Flood Mode (CLI)

IP Multicast Routing

Step 3 Step 4

Command or Action

Purpose

ip igmp snooping tcn flood query count count Example:

Specifies the number of IGMP general queries for which the multicast traffic is flooded. The range is 1 to 10. By default, the flooding query count is 2.

Switch(config)# ip igmp snooping tcn flood query Note count 3

To return to the default flooding query count, use the no ip igmp snooping tcn flood query count global configuration command.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 5

show ip igmp snooping Example:
Switch# show ip igmp snooping

Verifies the TCN settings.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Recovering from Flood Mode (CLI)
When a topology change occurs, the spanning-tree root sends a special IGMP leave message (also known as global leave) with the group multicast address 0.0.0.0. However, when you enable the ip igmp snooping tcn query solicit global configuration command, the switch sends the global leave message whether or not it is the spanning-tree root. When the router receives this special leave, it immediately sends general queries, which expedite the process of recovering from the flood mode during the TCN event. Leaves are always sent if the switch is the spanning-tree root regardless of this configuration command. By default, query solicitation is disabled.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping tcn query solicit 4. end 5. show ip igmp snooping 6. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 206

IP Multicast Routing

Disabling Multicast Flooding During a TCN Event (CLI)

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

ip igmp snooping tcn query solicit Example:

Sends an IGMP leave message (global leave) to speed the process of recovering from the flood mode caused during a TCN event. By default, query solicitation is disabled.

Switch(config)# ip igmp snooping tcn query solicit Note

To return to the default query solicitation, use the no ip igmp snooping tcn query solicit global configuration command.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Step 5

show ip igmp snooping Example:
Switch# show ip igmp snooping

Verifies the TCN settings.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Disabling Multicast Flooding During a TCN Event (CLI)
When the switch receives a TCN, multicast traffic is flooded to all the ports until 2 general queries are received. If the switch has many ports with attached hosts that are subscribed to different multicast groups, this flooding might exceed the capacity of the link and cause packet loss. You can use the ip igmp snooping tcn flood interface configuration command to control this operation function.

SUMMARY STEPS

1. enable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 207

Disabling Multicast Flooding During a TCN Event (CLI)

IP Multicast Routing

2. configure terminal 3. interface interface-id 4. no ip igmp snooping tcn flood 5. end 6. show ip igmp snooping 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

interface interface-id Example:

Specifies the interface to be configured, and enters interface configuration mode.

Switch(config)# interface gigabitethernet 1/0/1

Step 4 Step 5

no ip igmp snooping tcn flood Example:

Disables the flooding of multicast traffic during a spanning-tree TCN event.
By default, multicast flooding is enabled on an interface.

Switch(config-if)# no ip igmp snooping tcn flood Note

To re-enable multicast flooding on an interface, use the ip igmp snooping tcn flood interface configuration command.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Step 6

show ip igmp snooping Example:
Switch# show ip igmp snooping

Verifies the TCN settings.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 208

IP Multicast Routing

Configuring the IGMP Snooping Querier (CLI)

Step 7

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Configuring the IGMP Snooping Querier (CLI)
Follow these guidelines when configuring the IGMP snooping querier:
· Configure the VLAN in global configuration mode.
· Configure an IP address on the VLAN interface. When enabled, the IGMP snooping querier uses the IP address as the query source address.
· If there is no IP address configured on the VLAN interface, the IGMP snooping querier tries to use the configured global IP address for the IGMP querier. If there is no global IP address specified, the IGMP querier tries to use the VLAN switch virtual interface (SVI) IP address (if one exists). If there is no SVI IP address, the switch uses the first available IP address configured on the switch. The first IP address available appears in the output of the show ip interface privileged EXEC command. The IGMP snooping querier does not generate an IGMP general query if it cannot find an available IP address on the switch.
· The IGMP snooping querier supports IGMP Versions 1 and 2.
· When administratively enabled, the IGMP snooping querier moves to the nonquerier state if it detects the presence of a multicast router in the network.
· When it is administratively enabled, the IGMP snooping querier moves to the operationally disabled state under these conditions:
· IGMP snooping is disabled in the VLAN.
· PIM is enabled on the SVI of the corresponding VLAN.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp snooping querier 4. ip igmp snooping querier address ip_address 5. ip igmp snooping querier query-interval interval-count 6. ip igmp snooping querier tcn query [count count | interval interval] 7. ip igmp snooping querier timer expiry timeout 8. ip igmp snooping querier version version 9. end 10. show ip igmp snooping vlan vlan-id 11. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 209

Configuring the IGMP Snooping Querier (CLI)

IP Multicast Routing

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

ip igmp snooping querier Example:
Switch(config)# ip igmp snooping querier

Enables the IGMP snooping querier.

Step 4 Step 5

ip igmp snooping querier address ip_address

(Optional) Specifies an IP address for the IGMP snooping

Example:

querier. If you do not specify an IP address, the querier tries to use the global IP address configured for the IGMP

querier.
Switch(config)# ip igmp snooping querier address

172.16.24.1

Note The IGMP snooping querier does not generate

an IGMP general query if it cannot find an IP

address on the switch.

ip igmp snooping querier query-interval interval-count (Optional) Sets the interval between IGMP queriers. The

Example:

range is 1 to 18000 seconds.

Switch(config)# ip igmp snooping querier query-interval 30

Step 6

ip igmp snooping querier tcn query [count count | interval interval]
Example:

(Optional) Sets the time between Topology Change Notification (TCN) queries. The count range is 1 to 10. The interval range is 1 to 255 seconds.

Switch(config)# ip igmp snooping querier tcn query interval 20

Step 7

ip igmp snooping querier timer expiry timeout Example:

(Optional) Sets the length of time until the IGMP querier expires. The range is 60 to 300 seconds.

Switch(config)# ip igmp snooping querier timer expiry 180

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 210

IP Multicast Routing

Disabling IGMP Report Suppression (CLI)

Step 8 Step 9 Step 10 Step 11

Command or Action ip igmp snooping querier version version Example:

Purpose
(Optional) Selects the IGMP version number that the querier feature uses. Select 1 or 2.

Switch(config)# ip igmp snooping querier version 2

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

show ip igmp snooping vlan vlan-id Example:
Switch# show ip igmp snooping vlan 30

(Optional) Verifies that the IGMP snooping querier is enabled on the VLAN interface. The VLAN ID range is 1 to 1001 and 1006 to 4094.

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Disabling IGMP Report Suppression (CLI)

Note IGMP report suppression is supported only when the multicast query has IGMPv1 and IGMPv2 reports. This feature is not supported when the query includes IGMPv3 reports.

IGMP report suppression is enabled by default. When it is enabled, the switch forwards only one IGMP report per multicast router query. When report suppression is disabled, all IGMP reports are forwarded to the multicast routers.

SUMMARY STEPS

1. enable 2. configure terminal 3. no ip igmp snooping report-suppression 4. end 5. show ip igmp snooping 6. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 211

Monitoring IGMP

IP Multicast Routing

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

no ip igmp snooping report-suppression Example:
Switch(config)# no ip igmp snooping report-suppression

Step 4

end Example:
Switch(config)# end

Step 5

show ip igmp snooping Example:
Switch# show ip igmp snooping

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.
Disables IGMP report suppression. Note To re-enable IGMP report suppression, use the
ip igmp snooping report-suppression global configuration command. Returns to privileged EXEC mode.
Verifies that IGMP report suppression is disabled.
(Optional) Saves your entries in the configuration file.

Monitoring IGMP
You can display specific statistics, such as the contents of IP routing tables, caches, and databases.
Note This release does not support per-route statistics.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 212

IP Multicast Routing

Displaying IGMP Snooping Information

You can display information to learn resource usage and solve network problems. You can also display information about node reachability and discover the routing path that packets of your device are taking through the network.
You can use any of the privileged EXEC commands in the following table to display various routing statistics.
Table 27: Commands for Displaying System and Network Statistics

Command

Purpose

ping [group-name | group-address]

Sends an ICMP Echo Request to a multicast group address.

show ip igmp filter

Displays IGMP filter information.

show ip igmp groups [type-number | detail ]

Displays the multicast groups that are directly connected to the switch and that were learned through IGMP.

show ip igmp interface [type number]

Displays multicast-related information about an interface.

show ip igmp membership [ name/group address | Displays IGMP membership information for

all | tracked ]

forwarding.

show ip igmp profile [ profile_number]

Displays IGMP profile information.

show ip igmp ssm-mapping [ hostname/IP address Displays IGMP SSM mapping information. ]

show ip igmp static-group {class-map [ interface Displays static group information. [ type ] ]

show ip igmp vrf

Displays the selected VPN routing/forwarding instance by name.

Displaying IGMP Snooping Information
You can display IGMP snooping information for dynamically learned and statically configured router ports and VLAN interfaces. You can also display MAC address multicast entries for a VLAN configured for IGMP snooping.
Table 28: Commands for Displaying IGMP Snooping Information

Command show ip igmp snooping detail

Purpose Displays the operational state information.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 213

Displaying IGMP Filtering and Throttling Configuration

IP Multicast Routing

Command
show ip igmp snooping groups [ count | [vlan vlan-id [A.B.C.D | count ] ]

Purpose
Displays multicast table information for the switch or about a specific parameter:
· count--Displays the total number of groups.
· vlan--Displays group information by VLAN ID.

show ip igmp snooping igmpv2-tracking

Displays the IGMP snooping tracking.
Note This command displays group and IP address entries only for wireless multicast IGMP joins and not for wired IGMP joins. Wireless IP multicast must be enabled for this command to display.

show ip igmp snooping mrouter [vlan vlan-id]
show ip igmp snooping querier [ detail | vlan vlan-id]
show ip igmp snooping [vlan vlan-id [ detail ] ] show ip igmp snooping wireless mgid

Displays information on dynamically learned and manually configured multicast router interfaces.
Note When you enable IGMP snooping, the switch automatically learns the interface to which a multicast router is connected. These are dynamically learned interfaces.
(Optional) Enter vlan vlan-id to display information for a single VLAN.
Displays information about the IP address and receiving port for the most-recently received IGMP query messages in the VLAN.
(Optional) Enter detail to display the detailed IGMP querier information in a VLAN.
(Optional) Enter vlan vlan-id to display information for a single VLAN.
Displays the snooping configuration information for all VLANs on the switch or for a specified VLAN.
(Optional) Enter vlan vlan-id to display information for a single VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094.
Displays wireless-related events.

Displaying IGMP Filtering and Throttling Configuration
You can display IGMP profile characteristics, and you can display the IGMP profile and maximum group configuration for all interfaces on the switch or for a specified interface. You can also display the IGMP throttling configuration for all interfaces on the switch or for a specified interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 214

IP Multicast Routing

Configuration Examples for IGMP

Table 29: Commands for Displaying IGMP Filtering and Throttling Configuration

Command show ip igmp profile [profile number]
show running-config [interface interface-id]

Purpose
Displays the specified IGMP profile or all the IGMP profiles defined on the switch.
Displays the configuration of the specified interface or the configuration of all interfaces on the switch, including (if configured) the maximum number of IGMP groups to which an interface can belong and the IGMP profile applied to the interface.

Configuration Examples for IGMP
Example: Configuring the Switch as a Member of a Multicast Group
This example shows how to enable the switch to join multicast group 255.2.2.2:
Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip igmp join-group 255.2.2.2 Switch(config-if)#
Related Topics Configuring the Switch as a Member of a Group (CLI), on page 176 Joining a Multicast Group, on page 170 IP Multicast Group Addresses, on page 168
Example: Controlling Access to Multicast Groups
To limit the number of joins on the interface, configure the port for filter which associates with the IGMP profile.
Switch# configure terminal Switch(config)# ip igmp profile 10 Switch(config-igmp-profile)# ?
IGMP profile configuration commands: deny matching addresses are denied exit Exit from igmp profile configuration mode no Negate a command or set its defaults permit matching addresses are permitted range add a range to the set
Switch(config-igmp-profile)# range 172.16.5.1 Switch(config-igmp-profile)# exit Switch(config)# Switch(config)# interface gigabitEthernet 2/0/10 Switch(config-if)# ip igmp filter 10

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 215

Examples: Configuring IGMP Snooping

IP Multicast Routing

Related Topics Controlling Access to IP Multicast Group (CLI), on page 178
Examples: Configuring IGMP Snooping
This example shows how to enable a static connection to a multicast router:
Switch# configure terminal Switch(config)# ip igmp snooping vlan 200 mrouter interface gigabitethernet1/0/2 Switch(config)# end
This example shows how to statically configure a host on a port:
Switch# configure terminal Switch(config)# ip igmp snooping vlan 105 static 224.2.4.12 interface gigabitethernet1/0/1 Switch(config)# end
This example shows how to enable IGMP Immediate Leave on VLAN 130:
Switch# configure terminal Switch(config)# ip igmp snooping vlan 130 immediate-leave Switch(config)# end
This example shows how to set the IGMP snooping querier source address to 10.0.0.64:
Switch# configure terminal Switch(config)# ip igmp snooping querier 10.0.0.64 Switch(config)# end
This example shows how to set the IGMP snooping querier maximum response time to 25 seconds:
Switch# configure terminal Switch(config)# ip igmp snooping querier query-interval 25 Switch(config)# end
This example shows how to set the IGMP snooping querier timeout to 60 seconds:
Switch# configure terminal Switch(config)# ip igmp snooping querier timer expiry 60 Switch(config)# end
This example shows how to set the IGMP snooping querier feature to Version 2:
Switch# configure terminal Switch(config)# no ip igmp snooping querier version 2 Switch(config)# end
Related Topics Enabling or Disabling IGMP Snooping on a Switch (CLI), on page 193 IGMP Snooping, on page 169

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 216

IP Multicast Routing

Examples: Configuring Filtering and Throttling

Examples: Configuring Filtering and Throttling
This example shows how to create IGMP profile 4 allowing access to the single IP multicast address and how to verify the configuration. If the action was to deny (the default), it would not appear in the show ip igmp profile output display.
Switch(config)# ip igmp profile 4 Switch(config-igmp-profile)# permit Switch(config-igmp-profile)# range 229.9.9.0 Switch(config-igmp-profile)# end Switch# show ip igmp profile 4 IGMP Profile 4
permit range 229.9.9.0 229.9.9.0
This example shows how to apply IGMP profile 4 to a port:
Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip igmp filter 4 Switch(config-if)# end
This example shows how to limit to 25 the number of IGMP groups that a port can join:
Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip igmp max-groups 25 Switch(config-if)# end
Related Topics Configuring the IGMP Throttling Action (CLI), on page 191 IGMP Filtering and Throttling Overview, on page 174
Example: Interface Configuration as a Routed Port
This example shows how to configure an interface on the switch as a routed port. This configuration is required on the interface for several IP multicast routing configuration procedures that require running the no switchport command.
Switch configure terminal Switch(config)# interface GigabitEthernet1/0/9 Switch(config-if)# description interface to be use as routed port Switch(config-if)# no switchport Switch(config-if)# ip address 20.20.20.1 255.255.255.0 Switch(config-if)# ip pim sparse-dense-mode Switch(config-if)# ip igmp join-group 224.1.2.3 source 15.15.15.2 Switch(config-if)# end Switch# configure terminal Switch# show run interface gigabitEthernet 1/0/9
Current configuration : 166 bytes ! interface GigabitEthernet1/0/9
no switchport ip address 20.20.20.1 255.255.255.0 ip pim sparse-dense-mode

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 217

Example: Interface Configuration as an SVI

IP Multicast Routing

ip igmp static-group 224.1.2.3 source 15.15.15.2 end
Example: Interface Configuration as an SVI
This example shows how to configure an interface on the switch as an SVI. This configuration is required on the interface for several IP multicast routing configuration procedures that require running the no switchport command.
Switch(config)# interface vlan 150 Switch(config-if)# ip address 20.20.20.1 255.255.255.0 Switch(config-if)# ip pim sparse-dense-mode Switch(config-if)# ip igmp join-group 224.1.2.3 source 15.15.15.2 Switch(config-if)# end Switch# configure terminal Switch(config)# ip igmp snooping vlan 20 static 224.1.2.3 interface gigabitEthernet 1/0/9 Switch# show run interface vlan 150
Current configuration : 137 bytes ! interface Vlan150
ip address 20.20.20.1 255.255.255.0 ip pim sparse-dense-mode ip igmp static-group 224.1.2.3 source 15.15.15.2 end

Where to Go Next for IGMP
You can configure the following: · Wireless Multicast · PIM · SSM · IP Multicast Routing · Service Discovery Gateway

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage

IP Multicast Routing Command Reference (Catalyst 3650 Switches)

information for the commands used in

this chapter.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 218

IP Multicast Routing

Additional References

Related Topic
Platform-independent configuration information

Document Title
· IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs
Standard/RFC Title RFC 1112 Host Extensions for IP Multicasting
RFC 2236 Internet Group Management Protocol, Version 2

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 219

Feature History and Information for IGMP

IP Multicast Routing

Feature History and Information for IGMP
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 220

1 4 C H A P T E R
Configuring Wireless Multicast
· Finding Feature Information, on page 221 · Prerequisites for Configuring Wireless Multicast, on page 221 · Restrictions for Configuring Wireless Multicast, on page 221 · Information About Wireless Multicast, on page 222 · How to Configure Wireless Multicast, on page 223 · Monitoring Wireless Multicast, on page 231 · Where to Go Next for Wireless Multicast, on page 231 · Additional References, on page 232
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring Wireless Multicast
· The IP multicast routing must be enabled and the PIM version and PIM mode must be configured. The default routes should be available in the device. After performing these tasks, the device can then forward multicast packets and can populate its multicast routing table.
· To participate in IP multicasting, the multicast hosts, routers, and multilayer switches must have IGMP operating.
· When enabling multicast mode on the switch, a CAPWAP multicast group address should also be configured. Access points listen to the CAPWAP multicast group using IGMP.
Restrictions for Configuring Wireless Multicast
The following are the restrictions for configuring IP multicast routing:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 221

Information About Wireless Multicast

IP Multicast Routing

· Access points in monitor mode, sniffer mode, or rogue detector mode do not join the CAPWAP multicast group address.
· The CAPWAP multicast group configured on the switch should be different for different switches.
· Multicast routing should not be enabled for the management interface.
Information About Wireless Multicast
If the network supports packet multicasting, the multicast method that the switch uses can be configured. The switch performs multicasting in two modes:
· Unicast mode--The switch unicasts every multicast packet to every access point associated to the switch. This mode is inefficient but might be required on networks that do not support multicasting.
· Multicast mode--The switch sends multicast packets to a CAPWAP multicast group. This method reduces overhead on the switch processor and shifts the work of packet replication to the network, which is much more efficient than the unicast method.
When the multicast mode is enabled and the switch receives a multicast packet from the wired LAN, the switch encapsulates the packet using CAPWAP and forwards the packet to the CAPWAP multicast group address. The switch always uses the management VLAN for sending multicast packets. Access points in the multicast group receive the packet and forward it to all the BSSIDs mapped to the VLAN on which clients receive multicast traffic.
The switch supports all the capabilities of v1 including Multicast Listener Discovery (MLD) v1 snooping but the v2 and v3 capabilities are limited. This feature keeps track of and delivers IPv6 multicast flows to the clients that request them. To support IPv6 multicast, global multicast mode should be enabled.
Internet Group Management Protocol (IGMP) snooping is introduced to better direct multicast packets. When this feature is enabled, the switch snooping gathers IGMP reports from the clients, processes them, creates unique multicast group IDs (MGIDs) based on the Layer 3 multicast address and the VLAN number, and sends the IGMP reports to the IGMP querier. The switch then updates the access point MGID table on the access point with the client MAC address. When the switch receives multicast traffic for a particular multicast group, it forwards it to all the access points, but only those access points that have active clients listening or subscribed to that multicast group send multicast traffic on that particular WLAN. IP packets are forwarded with an MGID that is unique for an ingress VLAN and the destination multicast group. Layer 2 multicast packets are forwarded with an MGID that is unique for the ingress VLAN.
MGID is a 14-bit value filled in the 16-bit reserved field of wireless information in CAPWAP header. The remaining 2 bits should be set to zero.
Related Topics Configuring Wireless Multicast-MCMC Mode (CLI), on page 223 Configuring Wireless Multicast-MCUC Mode (CLI), on page 224
Information About Multicast Optimization
Multicast used to be based on the group of the multicast addresses and the VLAN as one entity, MGID. With the VLAN group, duplicate packets might increase. Using the VLAN group feature, every client listens to the multicast stream on a different VLAN. As a result, the switch creates different MGIDs for each multicast address and VLAN. Therefore, in a worst case situation, the upstream router sends one copy for each VLAN,

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 222

IP Multicast Routing

How to Configure Wireless Multicast

which results in as many copies as the number of VLANs in the group. Because the WLAN remains the same for all clients, multiple copies of the multicast packet are sent over the wireless network. To suppress the duplication of a multicast stream on the wireless medium between the switch and the access points, the multicast optimization feature can be used.
Multicast optimization enables you to create a multicast VLAN that can be used for multicast traffic. One of the VLANs in the switch can be configured as a multicast VLAN where multicast groups are registered. The clients are allowed to listen to a multicast stream on the multicast VLAN. The MGID is generated using the mulicast VLAN and multicast IP addresses. If multiple clients on different VLANs of the same WLAN are listening to a single multicast IP address, a single MGID is generated. The switch makes sure that all multicast streams from the clients on this VLAN group always go out on the multicast VLAN to ensure that the upstream router has one entry for all the VLANs of the VLAN group. Only one multicast stream hits the VLAN group even if the clients are on different VLANs. Therefore, the multicast packets that are sent out over the network is just one stream.
Related Topics Configuring IP Multicast VLAN for WLAN (CLI), on page 230

How to Configure Wireless Multicast

Configuring Wireless Multicast-MCMC Mode (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. wireless multicast 4. ap capwap multicast ipaddr 5. end

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters global command mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 223

Configuring Wireless Multicast-MCUC Mode (CLI)

IP Multicast Routing

Step 3 Step 4 Step 5

Command or Action wireless multicast Example:
Switch(config)# wireless multicast

Purpose
Enables the multicast traffic for wireless clients. The default value is disable. Add no in the command to disable the multicast traffic for wireless clients.

Switch(config)# no wireless multicast

ap capwap multicast ipaddr Example:
Switch(config)# ap capwap multicast 231.1.1.1

Enables the forwarding mode in multicast. Add no in the command to disable the multicast mode.

Switch(config)# no ap capwap multicast 231.1.1.1

end Example:
Switch(config)# end

Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode.

Related Topics Information About Wireless Multicast, on page 222

Configuring Wireless Multicast-MCUC Mode (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. wireless multicast 4. no ap capwap multicast ipaddr 5. end

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2 Step 3

configure terminal Example:
Switch# configure terminal
wireless multicast Example:

Enters global command mode.
Enables the multicast traffic for wireless clients and enables mDNS bridging. The default value is disable. Add no in

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 224

IP Multicast Routing

Configuring IPv6 Snooping (CLI)

Step 4 Step 5

Command or Action
Switch(config)# wireless multicast

Purpose
the command to disable the multicast traffic for wireless clients and disable mDNS bridging.

no ap capwap multicast ipaddr Example:

Enables forwarding mode in multicast. Add no in the command to disable the multicast mode.

Switch(config)# no ap capwap multicast 231.1.1.1

end Example:
Switch(config)# end

Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode.

Related Topics Information About Wireless Multicast, on page 222

Configuring IPv6 Snooping (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ipv6 mld snooping

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2 Step 3

configure terminal Example:
Switch# configure terminal
ipv6 mld snooping Example:
Switch(config)# ipv6 mld snooping

Enters global command mode. Enables MLD snooping.

Configuring IPv6 Snooping Policy (CLI)

SUMMARY STEPS

1. enable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 225

Configuring Layer 2 Port as Multicast Router Port (CLI)

IP Multicast Routing

2. configure terminal 3. ipv6 snooping policy policy-name 4. security-level guard 5. device-role node 6. protocol {dhcp | ndp}

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2 Step 3 Step 4

configure terminal Example:
Switch# configure terminal

Enters global command mode.

ipv6 snooping policy policy-name Example:
Switch(config)# ipv6 snooping policy mypolicy

Configures an IPv6 snooping policy with a name.

security-level guard Example:

Configures security level to inspect and drop any unauthorized messages.

Switch(config-ipv6-snooping)# security-level guard

Step 5 Step 6

device-role node Example:
Switch(config-ipv6-snooping)# device-role node
protocol {dhcp | ndp} Example:
Switch(config-ipv6-snooping)# protocol ndp

Configures the role of the device, which is a node, to the attached port.
Sets the protocol to glean addresses in DHCP or NDP packets.

Configuring Layer 2 Port as Multicast Router Port (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ipv6 mld snooping vlan vlan-id mrouter interface Port-channel port-channel-interface-number

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 226

IP Multicast Routing

Configuring RA Guard (CLI)

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2 Step 3

configure terminal Example:
Switch# configure terminal

Enters global command mode.

ipv6 mld snooping vlan vlan-id mrouter interface Port-channel port-channel-interface-number

Configures a Layer 2 port as a Multicast router port. The VLAN is the client VLAN.

Example:

Switch(config)# ipv6 mld snooping vlan 2 mrouter interface Port-channel 22

Configuring RA Guard (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ipv6 nd raguard policy policy-name 4. trusted-port 5. device-role {host | monitor | router | switch}

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2 Step 3

configure terminal Example:
Switch# configure terminal
ipv6 nd raguard policy policy-name Example:
Switch(config)# ipv6 nd raguard policy myraguardpolicy

Enters global command mode. Configures a policy for RA Guard.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 227

Configuring Non-IP Wireless Multicast (CLI)

IP Multicast Routing

Step 4 Step 5

Command or Action trusted-port Example:
Switch(config-nd-raguard)# trusted-port
device-role {host | monitor | router | switch} Example:
Switch(config-nd-raguard)# device-role router

Purpose Sets up a trusted port.
Sets the role of the device attached to the port.

Configuring Non-IP Wireless Multicast (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. wireless multicast non-ip 4. wireless multicast non-ip vlanid 5. end

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2 Step 3 Step 4 Step 5

configure terminal Example:
Switch# configure terminal
wireless multicast non-ip Example:
Switch(config)# wireless multicast non-ip
Switch(config)# no wireless multicast non-ip
wireless multicast non-ip vlanid Example:
Switch(config)# wireless multicast non-ip 5
Switch(config)# no wireless multicast non-ip 5
end Example:

Enters global command mode.
Enables non-IP multicast in all VLANs. Default value is enable. Wireless multicast must be enabled for the traffic to pass. Add no in the command to disable the non-IP multicast in all VLANs.
Enables non-IP multicast per VLAN. Default value is enable. Both wireless multicast and wireless multicast non-IP must be enabled for traffic to pass. Add no in the command to disable the non-IP multicast per VLAN.
Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 228

IP Multicast Routing

Configuring Wireless Broadcast (CLI)

Command or Action
Switch(config)# end

Purpose

Configuring Wireless Broadcast (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. wireless broadcast 4. wireless broadcast vlan vlanid 5. end

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2 Step 3 Step 4 Step 5

configure terminal Example:
Switch# configure terminal
wireless broadcast Example:
Switch(config)# wireless broadcast
Switch(config)# no wireless broadcast
wireless broadcast vlan vlanid Example:
Switch(config)# wireless broadcast vlan 3
Switch(config)# no wireless broadcast vlan 3
end Example:
Switch(config)# end

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters global command mode.
Enables broadcast packets for wireless clients. Default value is disable. Enabling wireless broadcast enables broadcast traffic for each VLAN. Add no in the command to disable broadcasting packets.
Enables broadcast packets for single VLAN. Default value is enable. Wireless broadcast must be enabled for broadcasting. Add no in the command to disable the broadcast traffic for each VLAN.
Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 229

Configuring IP Multicast VLAN for WLAN (CLI)

IP Multicast Routing

Configuring IP Multicast VLAN for WLAN (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. wlan wlan_name 4. shutdown 5. ip multicast vlan {vlan_name vlan_id} 6. no shutdown 7. end

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7

configure terminal Example:
Switch# configure terminal
wlan wlan_name Example:
Switch(config)# wlan test 1
shutdown Example:
Switch(config-wlan)# shutdown
ip multicast vlan {vlan_name vlan_id} Example:
Switch(config-wlan)# ip multicast vlan 5 Switch(config-wlan)# no ip multicast vlan 5
no shutdown Example:
Switch(config-wlan)# no shutdown
end Example:

Enters global command mode.
Enters the configuration mode to configure various parameters in the WLAN. Disables WLAN.
Configures multicast VLAN for WLAN. Add no in the command to disable the multicast VLAN for WLAN.
Enables the disabled WLAN.
Exits the configuration mode. Alternatively, press Ctrl-Z to exit the configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 230

IP Multicast Routing

Monitoring Wireless Multicast

Command or Action
Switch(config)# end

Purpose

Related Topics Information About Multicast Optimization, on page 222

Monitoring Wireless Multicast

Table 30: Commands for Monitoring Wireless Multicast

Commands show wireless multicast

Description
Displays the multicast status and IP multicast mode, each VLAN's broadcast and non-IP multicast status. Also displays the mDNS bridging state.

show wireless multicast group summary Displays all (Source, Group and VLAN) lists and the corresponding MGID value.

show wireless multicast [source source] group group vlan vlanid
show ip igmp snooping wireless mcast-spi-count

Displays details of the given (S,G,V) and shows all of the clients associated with it and their MC2UC status
.
Displays statistics of the number of multicast SPIs per MGID sent between IOS and the Wireless Controller Module.

show ip igmp snooping wireless mgid

Displays the MGID mappings.

show ip igmp snooping igmpv2-tracking Displays the client-to-SGV mappings and SGV-to-client mappings.

show ip igmp snooping querier vlan vlanid Displays IGMP querier information for the specified VLAN.

show ip igmp snooping querier detail

Displays detailed IGMP querier information of all the VLANs.

show ipv6 mld snooping querier vlan vlanid Displays MLD querier information for the specified VLAN.

show ipv6 mld snooping wireless mgid Displays MGIDs for IPv6 multicast group.

Where to Go Next for Wireless Multicast
You can configure the following: · IGMP · PIM · SSM · IP Multicast Routing

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 231

Additional References

IP Multicast Routing

· Service Discovery Gateway

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage

IP Multicast Routing Command Reference (Catalyst 3650 Switches)

information for the commands used in

this chapter.

Platform-independent configuration information

· IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title --

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 232

IP Multicast Routing

Additional References

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 233

Additional References

IP Multicast Routing

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 234

1 5 C H A P T E R
Configuring PIM
· Finding Feature Information, on page 235 · Prerequisites for Configuring PIM, on page 235 · Restrictions for Configuring PIM, on page 236 · Restrictions for Configuring Auto-RP, on page 236 · Restrictions for Configuring Auto-RP and BSR, on page 236 · Information About PIM, on page 237 · How to Configure PIM, on page 246 · Monitoring PIM , on page 272 · Troubleshooting PIMv1 and PIMv2 Interoperability Problems, on page 273 · Configuration Examples for PIM, on page 273 · Where to Go Next for PIM , on page 276 · Additional References, on page 277 · Feature History and Information for PIM, on page 279
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring PIM
The following are the prerequisites for configuring PIM and PIM stub routing: · Before configuring PIM stub routing, you must have IP multicast routing configured on both the stub router and the central router. You must also have PIM mode (dense-mode, sparse-mode, or sparse-dense-mode) configured on the uplink interface of the stub router. · Before configuring PIM stub routing, you must also configure either Enhanced Interior Gateway Routing Protocol (EIGRP) stub routing or Open Shortest Path First (OSPF) stub routing on the switch. The PIM stub router does not route the transit traffic between the distribution routers. Unicast (EIGRP) stub routing enforces this behavior. You must configure unicast stub routing to assist the PIM stub router behavior.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 235

Restrictions for Configuring PIM

IP Multicast Routing

Note For information about EIGRP or OSPF configurations, see the Catalyst 3650 Routing Configuration Guide, Release 3SE.
Restrictions for Configuring PIM
The following are the restrictions for configuring PIM: · PIM · PIM is not supported when running the LAN Base feature set.
· PIM stub routing · The IP Services image contains complete multicast routing. · In a network using PIM stub routing, the only allowable route for IP traffic to the user is through a switch that is configured with PIM stub routing. · The redundant PIM stub router topology is not supported. Only the nonredundant access router topology is supported by the PIM stub feature. · Only directly connected multicast (IGMP) receivers and sources are allowed in the Layer 2 access domains. The PIM protocol is not supported in access domains. · PIM stub routing is supported when running the IP Base and IP Services feature sets.
Restrictions for Configuring Auto-RP
The following are restrictions for configuring Auto-RP (if used in your network configuration): · Auto-RP is not supported when running the LAN Base feature set. · If you configure PIM in sparse mode or sparse-dense mode and do not configure Auto-RP, you must manually configure an RP. · If routed interfaces are configured in sparse mode, Auto-RP can still be used if all devices are configured with a manual RP address for the Auto-RP groups. · If routed interfaces are configured in sparse mode and you enter the ip pim autorp listener global configuration command, Auto-RP can still be used even if all devices are not configured with a manual RP address for the Auto-RP groups.
Restrictions for Configuring Auto-RP and BSR
The following are restrictions for configuring Auto-RP and BSR (if used in your network configuration): · If your network is all Cisco routers and multilayer switches, you can use either Auto-RP or BSR.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 236

IP Multicast Routing

Information About PIM

· If you have non-Cisco routers in your network, you must use BSR.
· If you have Cisco PIMv1 and PIMv2 routers and multilayer switches and non-Cisco routers, you must use both Auto-RP and BSR. If your network includes routers from other vendors, configure the Auto-RP mapping agent and the BSR on a Cisco PIMv2 device. Ensure that no PIMv1 device is located in the path a between the BSR and a non-Cisco PIMv2 device.
Note There are two approaches to using PIMv2. You can use Version 2 exclusively in your network or migrate to Version 2 by employing a mixed PIM version environment.
· Because bootstrap messages are sent hop-by-hop, a PIMv1 device prevents these messages from reaching all routers and multilayer switches in your network. Therefore, if your network has a PIMv1 device in it and only Cisco routers and multilayer switches, it is best to use Auto-RP.
· If you have a network that includes non-Cisco routers, configure the Auto-RP mapping agent and the BSR on a Cisco PIMv2 router or multilayer switch. Ensure that no PIMv1 device is on the path between the BSR and a non-Cisco PIMv2 router.
· If you have non-Cisco PIMv2 routers that need to interoperate with Cisco PIMv1 routers and multilayer switches, both Auto-RP and a BSR are required. We recommend that a Cisco PIMv2 device be both the Auto-RP mapping agent and the BSR.
Information About PIM
Protocol-Independent Multicast (PIM) is called protocol-independent because regardless of the unicast routing protocols used to populate the unicast routing table, PIM uses this information to perform multicast forwarding instead of maintaining a separate multicast routing table. PIM can leverage whichever unicast routing protocols are used to populate the unicast routing table, including EIGRP, OSPF, BGP, or static routes. PIM uses this unicast routing information to perform the multicast forwarding function, so it is IP protocol independent. Although PIM is called a multicast routing protocol, it actually uses the unicast routing table to perform the reverse path forwarding (RPF) check function instead of building up a completely independent multicast routing table. PIM does not send and receive multicast routing updates between routers as the other routing protocols do. PIM is defined in RFC 4601, Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification. PIM is defined in these Internet Engineering Task Force (IETF) Internet drafts:
· Protocol Independent Multicast (PIM): Motivation and Architecture
· Protocol Independent Multicast (PIM), Dense Mode Protocol Specification
· Protocol Independent Multicast (PIM), Sparse Mode Protocol Specification
· draft-ietf-idmr-igmp-v2-06.txt, Internet Group Management Protocol, Version 2
· draft-ietf-pim-v2-dm-03.txt, PIM Version 2 Dense Mode

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 237

PIM Versions

IP Multicast Routing

PIM Versions
PIMv2 includes these improvements over PIMv1: · A single, active rendezvous point (RP) exists per multicast group, with multiple backup RPs. This single RP compares to multiple active RPs for the same group in PIMv1. · A bootstrap router (BSR) provides a fault-tolerant, automated RP discovery and distribution function that enables routers and multilayer switches to dynamically learn the group-to-RP mappings. · Sparse mode and dense mode are properties of a group, as opposed to an interface.
Note We strongly recommend using sparse-dense mode as opposed to either sparse mode or dense mode only.
· PIM join and prune messages have more flexible encoding for multiple address families. · A more flexible hello packet format replaces the query packet to encode current and future capability
options. · Register messages sent to an RP specify whether they are sent by a border router or a designated router. · PIM packets are no longer inside IGMP packets; they are standalone packets.
PIMv1 and PIMv2 Interoperability
To avoid misconfiguring multicast routing on your switch, review the information in this section. The Cisco PIMv2 implementation provides interoperability and transition between Version 1 and Version 2, although there might be some minor problems. You can upgrade to PIMv2 incrementally. PIM Versions 1 and 2 can be configured on different routers and multilayer switches within one network. Internally, all routers and multilayer switches on a shared media network must run the same PIM version. Therefore, if a PIMv2 device detects a PIMv1 device, the Version 2 device downgrades itself to Version 1 until all Version 1 devices have been shut down or upgraded. PIMv2 uses the BSR to discover and announce RP-set information for each group prefix to all the routers and multilayer switches in a PIM domain. PIMv1, together with the Auto-RP feature, can perform the same tasks as the PIMv2 BSR. However, Auto-RP is a standalone protocol, separate from PIMv1, and is a proprietary Cisco protocol. PIMv2 is a standards track protocol in the IETF.
Note We recommend that you use PIMv2. The BSR function interoperates with Auto-RP on Cisco routers and multilayer switches.
When PIMv2 devices interoperate with PIMv1 devices, Auto-RP should have already been deployed. A PIMv2 BSR that is also an Auto-RP mapping agent automatically advertises the RP elected by Auto-RP. That is, Auto-RP sets its single RP on every router or multilayer switch in the group. Not all routers and switches in the domain use the PIMv2 hash function to select multiple RPs. Dense-mode groups in a mixed PIMv1 and PIMv2 region need no special configuration; they automatically interoperate.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 238

IP Multicast Routing

PIM Modes

Sparse-mode groups in a mixed PIMv1 and PIMv2 region are possible because the Auto-RP feature in PIMv1 interoperates with the PIMv2 RP feature. Although all PIMv2 devices can also use PIMv1, we recommend that the RPs be upgraded to PIMv2. To ease the transition to PIMv2, we recommend:
· Using Auto-RP throughout the region.
· Configuring sparse-dense mode throughout the region.
If Auto-RP is not already configured in the PIMv1 regions, configure Auto-RP.

PIM Modes
PIM can operate in dense mode (DM), sparse mode (SM), or in sparse-dense mode (PIM DM-SM), which handles both sparse groups and dense groups at the same time.

PIM DM

PIM DM builds source-based multicast distribution trees. In dense mode, a PIM DM router or multilayer switch assumes that all other routers or multilayer switches forward multicast packets for a group. If a PIM DM device receives a multicast packet and has no directly connected members or PIM neighbors present, a prune message is sent back to the source to stop unwanted multicast traffic. Subsequent multicast packets are not flooded to this router or switch on this pruned branch because branches without receivers are pruned from the distribution tree, leaving only branches that contain receivers.
When a new receiver on a previously pruned branch of the tree joins a multicast group, the PIM DM device detects the new receiver and immediately sends a graft message up the distribution tree toward the source. When the upstream PIM DM device receives the graft message, it immediately puts the interface on which the graft was received into the forwarding state so that the multicast traffic begins flowing to the receiver.

PIM-SM

PIM-SM uses shared trees and shortest-path-trees (SPTs) to distribute multicast traffic to multicast receivers in the network. In PIM-SM, a router or multilayer switch assumes that other routers or switches do not forward multicast packets for a group, unless there is an explicit request for the traffic (join message). When a host joins a multicast group using IGMP, its directly connected PIM-SM device sends PIM join messages toward the root, also known as the rendezvous point (RP). This join message travels router-by-router toward the root, constructing a branch of the shared tree as it goes.
The RP keeps track of multicast receivers. It also registers sources through register messages received from the source's first-hop router (designated router [DR]) to complete the shared tree path from the source to the receiver. When using a shared tree, sources must send their traffic to the RP so that the traffic reaches all receivers.
Prune messages are sent up the distribution tree to prune multicast group traffic. This action permits branches of the shared tree or SPT that were created with explicit join messages to be torn down when they are no longer needed.
When the number of PIM-enabled interfaces exceeds the hardware capacity and PIM-SM is enabled with the SPT threshold is set to infinity, the switch does not create (source, group (S, G) ) entries in the multicast routing table for the some directly connected interfaces if they are not already in the table. The switch might not correctly forward traffic from these interfaces.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 239

Multicast Source Discovery Protocol (MSDP)

IP Multicast Routing

Multicast Source Discovery Protocol (MSDP)
Multicast Source Discovery Protocol (MSDP) is used for inter-domain source discovery when PIM SM is used. Each PIM administrative domain has its own RP. In order for the RP in one domain to signal new sources to the RP in the other domain, MSDP is used.
When RP in a domain receives a PIM register message for a new source, with MSDP configured it sends a new source-active (SA) message to all its MSDP peers in other domains. Each intermediate MSDP peer floods this SA message away from the originating RP. The MSDP peers install this SA message in their MSDP sa-cache. If the RPs in other domains have any join requests for the group in the SA message (indicated by the presence of a (*,G) entry with non empty outgoing interface list), the domain is interested in the group, and the RP triggers an (S,G) join toward the source.
PIM Stub Routing
The PIM stub routing feature, available in all of the switch software images, reduces resource usage by moving routed traffic closer to the end user.
The PIM stub routing feature supports multicast routing between the distribution layer and the access layer. It supports two types of PIM interfaces: uplink PIM interfaces and PIM passive interfaces. A routed interface configured with the PIM passive mode does not pass or forward PIM control traffic, it only passes and forwards IGMP traffic.
In a network using PIM stub routing, the only allowable route for IP traffic to the user is through a switch that is configured with PIM stub routing. PIM passive interfaces are connected to Layer 2 access domains, such as VLANs, or to interfaces that are connected to other Layer 2 devices. Only directly connected multicast (IGMP) receivers and sources are allowed in the Layer 2 access domains. The PIM passive interfaces do not send or process any received PIM control packets.
When using PIM stub routing, you should configure the distribution and remote routers to use IP multicast routing and configure only the switch as a PIM stub router. The switch does not route transit traffic between distribution routers. You also need to configure a routed uplink port on the switch. The switch uplink port cannot be used with SVIs. If you need PIM for an SVI uplink port, you should upgrade to the IP Services feature set.
You must also configure EIGRP stub routing when configuring PIM stub routing on the switch. For information about this procedure, refer to the Catalyst 3850 IP Routing Configuration Guide.
The redundant PIM stub router topology is not supported. The redundant topology exists when there is more than one PIM router forwarding multicast traffic to a single access domain. PIM messages are blocked, and the PIM asset and designated router election mechanisms are not supported on the PIM passive interfaces. Only the nonredundant access router topology is supported by the PIM stub feature. By using a nonredundant topology, the PIM passive interface assumes that it is the only interface and designated router on that access domain.
Figure 8: PIM Stub Router Configuration
In the following figure, Switch A routed uplink port 25 is connected to the router and PIM stub routing is enabled on the VLAN 100 interfaces and on Host 3. This configuration allows the directly connected hosts

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 240

IP Multicast Routing
to receive traffic from multicast source

IGMP Helper

200.1.1.3.
Related Topics Enabling PIM Stub Routing (CLI), on page 246 Example: Enabling PIM Stub Routing, on page 273

IGMP Helper
PIM stub routing moves routed traffic closer to the end user and reduces network traffic. You can also reduce traffic by configuring a stub router (switch) with the IGMP helper feature.
You can configure a stub router (switch) with the ip igmp helper help-address interface configuration command to enable the switch to send reports to the next-hop interface. Hosts that are not directly connected to a downstream router can then join a multicast group sourced from an upstream network. The IGMP packets from a host wanting to join a multicast stream are forwarded upstream to the next-hop device when this feature is configured. When the upstream central router receives the helper IGMP reports or leaves, it adds or removes the interfaces from its outgoing interface list for that group.
For complete syntax and usage information for the ip igmp helper-address command, see the IP Multicast Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches).

Auto-RP

The PIM-SM protocols require the presence of a rendezvous point (RP) in the network. An RP acts as the meeting place for sources and receivers of multicast data. If a static RP configuration is used, then the configuration needs to be applied on all the routers in the multicast network. To automate this process, the Auto-RP protocol was devised.
This Cisco proprietary feature eliminates the need to manually configure the RP information in every router and multilayer switch in the network. For Auto-RP to work, you configure a Cisco router or multilayer switch as the mapping agent. It uses IP multicast to learn which routers or switches in the network are possible candidate RPs to receive candidate RP announcements. Candidate RPs periodically send multicast RP-announce messages to a particular group or group range to announce their availability.
Mapping agents listen to these candidate RP announcements and use the information to create entries in their group-to-RP mapping caches. Only one mapping cache entry is created for any group-to-RP range received, even if multiple candidate RPs are sending RP announcements for the same range. As the RP-announce messages arrive, the mapping agent selects the router or switch with the highest IP address as the active RP and stores this RP address in the group-to-RP mapping cache.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 241

Auto-RP Benefits

IP Multicast Routing

Mapping agents periodically multicast the contents of their group-to-RP mapping caches. Thus, all routers and switches automatically discover which RP to use for the groups that they support. If a router or switch fails to receive RP-discovery messages and the group-to-RP mapping information expires, it changes to a statically configured RP that was defined with the ip pim rp-address global configuration command. If no statically configured RP exists, the router or switch changes the group to dense-mode operation.
Multiple RPs serve different group ranges or serve as hot backups of each other.
Related Topics Setting Up Auto-RP in a New Internetwork (CLI), on page 251 Example: Configuring Auto-RP, on page 274
Auto-RP Benefits
Auto-RP uses IP multicast to automate the distribution of group-to-RP mappings to all Cisco routers and multilayer switches in a PIM network. Auto-RP has these benefits:
· Easy to use multiple RPs within a network to serve different group ranges.
· Provides load splitting among different RPs and arrangement of RPs according to the location of group participants.
· Avoids inconsistent, manual RP configurations on every router and multilayer switch in a PIM network, which can cause connectivity problems.
PIM v2 BSR
PIMv2 BSR (Bootstrap Router) is another method to distribute group-to-RP mapping information to all PIM routers and multilayer switches in the network. It eliminates the need to manually configure RP information in every router and switch in the network. However, instead of using IP multicast to distribute group-to-RP mapping information, BSR uses hop-by-hop flooding of special BSR messages to distribute the mapping information.
The BSR is elected from a set of candidate routers and switches in the domain that have been configured to function as BSRs. The election mechanism is similar to the root-bridge election mechanism used in bridged LANs. The BSR election is based on the BSR priority of the device contained in the BSR messages that are sent hop-by-hop through the network. Each BSR device examines the message and forwards out all interfaces only the message that has either a higher BSR priority than its BSR priority or the same BSR priority, but with a higher BSR IP address. Using this method, the BSR is elected.
The elected BSR sends BSR messages with a TTL of 1. Neighboring PIMv2 routers or multilayer switches receive the BSR message and multicast it out all other interfaces (except the one on which it was received) with a TTL of 1. In this way, BSR messages travel hop-by-hop throughout the PIM domain. Because BSR messages contain the IP address of the current BSR, the flooding mechanism enables candidate RPs to automatically learn which device is the elected BSR.
Candidate RPs send candidate RP advertisements showing the group range for which they are responsible to the BSR, which stores this information in its local candidate-RP cache. The BSR periodically advertises the contents of this cache in BSR messages to all other PIM devices in the domain. These messages travel hop-by-hop through the network to all routers and switches, which store the RP information in the BSR message in their local RP cache. The routers and switches select the same RP for a given group because they all use a common RP hashing algorithm.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 242

IP Multicast Routing

Multicast Forwarding and Reverse Path Check

Related Topics Configuring Candidate BSRs (CLI), on page 264 Example: Configuring Candidate BSRs, on page 276
Multicast Forwarding and Reverse Path Check
With unicast routing, routers and multilayer switches forward traffic through the network along a single path from the source to the destination host whose IP address appears in the destination address field of the IP packet. Each router and switch along the way makes a unicast forwarding decision, using the destination IP address in the packet, by looking up the destination address in the unicast routing table and forwarding the packet through the specified interface to the next hop toward the destination. With multicasting, the source is sending traffic to an arbitrary group of hosts represented by a multicast group address in the destination address field of the IP packet. To decide whether to forward or drop an incoming multicast packet, the router or multilayer switch uses a reverse path forwarding (RPF) check on the packet as follows: 1. The router or multilayer switch examines the source address of the arriving multicast packet to decide
whether the packet arrived on an interface that is on the reverse path back to the source.
2. If the packet arrives on the interface leading back to the source, the RPF check is successful and the packet is forwarded to all interfaces in the outgoing interface list (which might not be all interfaces on the router).
3. If the RPF check fails, the packet is discarded.
Some multicast routing protocols, such as DVMRP, maintain a separate multicast routing table and use it for the RPF check. However, PIM uses the unicast routing table to perform the RPF check.
Note DVMRP is not supported on the switch.
Figure 9: RPF Check
The following figure shows port 2 receiving a multicast packet from source 151.10.3.21. The following table shows that the port on the reverse path to the source is port 1, not port 2. Because the RPF check fails, the multilayer switch discards the packet. Another multicast packet from source 151.10.3.21 is received on port 1, and the routing table shows this port is on the reverse path to the source. Because the RPF check passes, the switch forwards the packet to all port in the outgoing port list

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 243

PIM Shared Tree and Source Tree

IP Multicast Routing

Table 31: Routing Table Example for an RPF Check

Network 151.10.0.0/16 198.14.32.0/32 204.1.16.0/24

Port Gigabit Ethernet 1/0/1 Gigabit Ethernet 1/0/3 Gigabit Ethernet 1/0/4

PIM uses both source trees and RP-rooted shared trees to forward datagrams. The RPF check is performed differently for each:
· If a PIM router or multilayer switch has a source-tree state (that is, an (S, G) entry is present in the multicast routing table), it performs the RPF check against the IP address of the source of the multicast packet.
· If a PIM router or multilayer switch has a shared-tree state (and no explicit source-tree state), it performs the RPF check on the RP address (which is known when members join the group).

Sparse-mode PIM uses the RPF lookup function to decide where it needs to send joins and prunes: · (S, G) joins (which are source-tree states) are sent toward the source. · (*,G) joins (which are shared-tree states) are sent toward the RP.

Note DVMRP is not supported on the switch.
PIM Shared Tree and Source Tree
By default, members of a group receive data from senders to the group across a single data-distribution tree rooted at the RP.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 244

IP Multicast Routing

PIM Shared Tree and Source Tree

Figure 10: Shared Tree and Source Tree (Shortest-Path Tree)
The following figure shows this type of shared-distribution tree. Data from senders is delivered to the RP for distribution to group members joined to the shared

tree. If the data rate warrants, leaf routers (routers without any downstream connections) on the shared tree can use the data distribution tree rooted at the source. This type of distribution tree is called a shortest-path tree or source tree. By default, the software switches to a source tree upon receiving the first data packet from a source. This process describes the move from a shared tree to a source tree: 1. A receiver joins a group; leaf Router C sends a join message toward the RP. 2. The RP puts a link to Router C in its outgoing interface list. 3. A source sends data; Router A encapsulates the data in a register message and sends it to the RP. 4. The RP forwards the data down the shared tree to Router C and sends a join message toward the source.
At this point, data might arrive twice at Router C, once encapsulated and once natively. 5. When data arrives natively (unencapsulated) at the RP, it sends a register-stop message to Router A. 6. By default, reception of the first data packet prompts Router C to send a join message toward the source. 7. When Router C receives data on (S, G), it sends a prune message for the source up the shared tree. 8. The RP deletes the link to Router C from the outgoing interface of (S, G). The RP triggers a prune message
toward the source.
Join and prune messages are sent for sources and RPs. They are sent hop-by-hop and are processed by each PIM device along the path to the source or RP. Register and register-stop messages are not sent hop-by-hop. They are sent by the designated router that is directly connected to a source and are received by the RP for the group. Multiple sources sending to groups use the shared tree. You can configure the PIM device to stay on the shared tree. You can configure the PIM device to stay on the shared tree. For more information, see Delaying the Use of PIM Shortest-Path Tree (CLI), on page 268.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 245

Default PIM Routing Configuration

IP Multicast Routing

Default PIM Routing Configuration
This table displays the default PIM routing configuration for the switch.
Table 32: Default Multicast Routing Configuration

Feature Multicast routing PIM version PIM mode PIM stub routing PIM RP address PIM domain border PIM multicast boundary Candidate BSRs Candidate RPs Shortest-path tree threshold rate PIM router query message interval

Default Setting Disabled on all interfaces. Version 2. No mode is defined. None configured. None configured. Disabled. None. Disabled. Disabled. 0 kb/s. 30 seconds.

How to Configure PIM

Enabling PIM Stub Routing (CLI)
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip pim passive 5. end 6. show ip pim interface 7. show ip igmp groups detail 8. show ip mroute 9. show running-config 10. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 246

IP Multicast Routing

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Step 4 Step 5

ip pim passive Example:
Switch(config-if)# ip pim passive
end Example:
Switch(config-if)# end

Enabling PIM Stub Routing (CLI)
Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.
Specifies the interface on which you want to enable PIM stub routing, and enters interface configuration mode. The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218
These interfaces must have IP addresses assigned to them. Configures the PIM stub feature on the interface.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 247

Configuring a Rendezvous Point

IP Multicast Routing

Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action show ip pim interface Example:
Switch# show ip pim interface
show ip igmp groups detail Example:
Switch# show ip igmp groups detail
show ip mroute Example:
Switch# show ip mroute
show running-config Example:
Switch# show running-config
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Displays the PIM stub that is enabled on each interface.
(Optional) Displays the interested clients that have joined the specific multicast source group.
(Optional) Displays the IP multicast routing table.
(Optional) Verifies your entries.
(Optional) Saves your entries in the configuration file.

Related Topics PIM Stub Routing, on page 240 Example: Enabling PIM Stub Routing, on page 273
Configuring a Rendezvous Point
You must have a rendezvous point (RP), if the interface is in sparse-dense mode and if you want to handle the group as a sparse group. You can use several methods, as described in these sections:
· Manual assignment For information about this procedure, see Manually Assigning an RP to Multicast Groups (CLI), on page 249.
· As a standalone, Cisco-proprietary protocol separate from PIMv1 For information about these procedures, see the following sections: · Setting Up Auto-RP in a New Internetwork (CLI), on page 251

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 248

IP Multicast Routing

Manually Assigning an RP to Multicast Groups (CLI)

· Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI), on page 254 · Preventing Join Messages to False RPs (CLI), on page 257 · Filtering Incoming RP Announcement Messages (CLI), on page 257
· Using a standards track protocol in the Internet Engineering Task Force (IETF) For information about this procedure, see Configuring PIMv2 BSR, on page 259.

Note You can use Auto-RP, BSR, or a combination of both, depending on the PIM version that you are running and the types of routers in your network. For information about working with different PIM versions in your network, see PIMv1 and PIMv2 Interoperability, on page 238.
Manually Assigning an RP to Multicast Groups (CLI)
If the rendezvous point (RP) for a group is learned through a dynamic mechanism (such as Auto-RP or BSR), you need not perform this task for that RP.
Senders of multicast traffic announce their existence through register messages received from the source first-hop router (designated router) and forwarded to the RP. Receivers of multicast packets use RPs to join a multicast group by using explicit join messages.

Note RPs are not members of the multicast group; they serve as a meeting place for multicast sources and group members.

You can configure a single RP for multiple groups defined by an access list. If there is no RP configured for a group, the multilayer switch responds to the group as dense and uses the dense-mode PIM techniques.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip pim rp-address ip-address [access-list-number] [override] 4. access-list access-list-number {deny | permit} source [source-wildcard] 5. end 6. show running-config 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 249

Manually Assigning an RP to Multicast Groups (CLI)

IP Multicast Routing

Command or Action
Switch> enable

Purpose

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

ip pim rp-address ip-address [access-list-number] [override] Example:
Switch(config)# ip pim rp-address 10.1.1.1 20 override
access-list access-list-number {deny | permit} source [source-wildcard] Example:
Switch(config)# access-list 25 permit 10.5.0.1 255.224.0.0

Configures the address of a PIM RP.
By default, no PIM RP address is configured. You must configure the IP address of RPs on all routers and multilayer switches (including the RP).
Note If there is no RP configured for a group, the switch treats the group as dense, using the dense-mode PIM techniques.
A PIM device can be an RP for more than one group. Only one RP address can be used at a time within a PIM domain. The access list conditions specify for which groups the device is an RP.
· For ip-address, enter the unicast address of the RP in dotted-decimal notation.
· (Optional) For access-list-number, enter an IP standard access list number from 1 to 99. If no access list is configured, the RP is used for all groups.
· (Optional) The override keyword indicates that if there is a conflict between the RP configured with this command and one learned by Auto-RP or BSR, the RP configured with this command prevails.
Creates a standard access list, repeating the command as many times as necessary.
· For access-list-number, enter the access list number specified in Step 2.
· The deny keyword denies access if the conditions are matched.
· The permit keyword permits access if the conditions are matched.
· For source, enter the multicast group address for which the RP should be used.
· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 250

IP Multicast Routing

Setting Up Auto-RP in a New Internetwork (CLI)

Command or Action

Step 5

end Example:
Switch(config)# end

Step 6

show running-config Example:
Switch# show running-config

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose source. Place ones in the bit positions that you want to ignore.
The access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Setting Up Auto-RP in a New Internetwork (CLI)
If you are setting up Auto-RP in a new internetwork, you do not need a default RP because you configure all the interfaces for sparse-dense mode.

Note Omit Step 3 in the following procedure, if you want to configure a PIM router as the RP for the local group.

SUMMARY STEPS

1. enable 2. show running-config 3. configure terminal 4. ip pim send-rp-announce interface-id scope ttl group-list access-list-number interval seconds 5. access-list access-list-number {deny | permit} source [source-wildcard] 6. ip pim send-rp-discovery scope ttl 7. end 8. show running-config 9. show ip pim rp mapping 10. show ip pim rp 11. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 251

Setting Up Auto-RP in a New Internetwork (CLI)

IP Multicast Routing

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

show running-config Example:
Switch# show running-config

Step 3

configure terminal Example:
Switch# configure terminal

Verifies that a default RP is already configured on all PIM devices and the RP in the sparse-mode network. It was previously configured with the ip pim rp-address global configuration command.
Note This step is not required for spare-dense-mode environments.
The selected RP should have good connectivity and be available across the network. Use this RP for the global groups (for example, 224.x.x.x and other global groups). Do not reconfigure the group address range that this RP serves. RPs dynamically discovered through Auto-RP take precedence over statically configured RPs. Assume that it is desirable to use a second RP for the local groups.
Enters the global configuration mode.

Step 4

ip pim send-rp-announce interface-id scope ttl group-list Configures another PIM device to be the candidate RP for

access-list-number interval seconds

local groups.

Example:
Switch(config)# ip pim send-rp-announce gigabitethernet 1/0/5 scope 20 group-list 10 interval 120

· For interface-id, enter the interface type and number that identifies the RP address. Valid interfaces include physical ports, port channels, and VLANs.
· For scope ttl, specify the time-to-live value in hops. Enter a hop count that is high enough so that the RP-announce messages reach all mapping agents in the network. There is no default setting. The range is 1 to 255.

· For group-list access-list-number, enter an IP standard access list number from 1 to 99. If no access list is configured, the RP is used for all groups.

· For interval seconds, specify how often the announcement messages must be sent. The default is 60 seconds. The range is 1 to 16383.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 252

IP Multicast Routing

Setting Up Auto-RP in a New Internetwork (CLI)

Step 5
Step 6 Step 7 Step 8 Step 9

Command or Action

Purpose

access-list access-list-number {deny | permit} source Creates a standard access list, repeating the command as

[source-wildcard]

many times as necessary.

Example:
Switch(config)# access-list 10 permit 10.10.0.0

· For access-list-number, enter the access list number specified in Step 3.
· The deny keyword denies access if the conditions are matched.

· The permit keyword permits access if the conditions are matched.

· For source, enter the multicast group address range for which the RP should be used.

· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

Note Recall that the access list is always terminated by an implicit deny statement for everything.

ip pim send-rp-discovery scope ttl

Finds a switch whose connectivity is not likely to be

Example:

interrupted, and assign it the role of RP-mapping agent.

For scope ttl, specify the time-to-live value in hops to limit

Switch(config)# ip pim send-rp-discovery scope 50 the RP discovery packets. All devices within the hop count

from the source device receive the Auto-RP discovery

messages. These messages tell other devices which

group-to-RP mapping to use to avoid conflicts (such as

overlapping group-to-RP ranges). There is no default

setting. The range is 1 to 255.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

show running-config Example:
Switch# show running-config

Verifies your entries.

show ip pim rp mapping Example:
Switch# show ip pim rp mapping

Displays active RPs that are cached with associated multicast routing entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 253

Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI)

IP Multicast Routing

Step 10 Step 11

Command or Action show ip pim rp Example:
Switch# show ip pim rp
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Displays the information cached in the routing table.
(Optional) Saves your entries in the configuration file.

Related Topics Auto-RP, on page 241 Example: Configuring Auto-RP, on page 274
Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI)
This section contains suggestions for the initial deployment of Auto-RP into an existing sparse-mode cloud to minimize disruption of the existing multicast infrastructure. This procedure is optional.

SUMMARY STEPS

1. enable 2. show running-config 3. configure terminal 4. ip pim send-rp-announce interface-id scope ttl group-list access-list-number interval seconds 5. access-list access-list-number {deny | permit} source [source-wildcard] 6. ip pim send-rp-discovery scope ttl 7. end 8. show running-config 9. show ip pim rp mapping 10. show ip pim rp 11. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 254

IP Multicast Routing

Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI)

Step 2 Step 3 Step 4
Step 5

Command or Action show running-config Example:
Switch# show running-config
configure terminal Example:
Switch# configure terminal

Purpose
Verifies that a default RP is already configured on all PIM devices and the RP in the sparse-mode network. It was previously configured with the ip pim rp-address global configuration command.
Note This step is not required for spare-dense-mode environments.
The selected RP should have good connectivity and be available across the network. Use this RP for the global groups (for example, 224.x.x.x and other global groups). Do not reconfigure the group address range that this RP serves. RPs dynamically discovered through Auto-RP take precedence over statically configured RPs. Assume that it is desirable to use a second RP for the local groups.
Enters the global configuration mode.

ip pim send-rp-announce interface-id scope ttl group-list Configures another PIM device to be the candidate RP for

access-list-number interval seconds

local groups.

Example:
Switch(config)# ip pim send-rp-announce gigabitethernet 1/0/5 scope 20 group-list 10 interval 120

· For interface-id, enter the interface type and number that identifies the RP address. Valid interfaces include physical ports, port channels, and VLANs.
· For scope ttl, specify the time-to-live value in hops. Enter a hop count that is high enough so that the RP-announce messages reach all mapping agents in the network. There is no default setting. The range is 1 to 255.

· For group-list access-list-number, enter an IP standard access list number from 1 to 99. If no access list is configured, the RP is used for all groups.

· For interval seconds, specify how often the announcement messages must be sent. The default is 60 seconds. The range is 1 to 16383.

access-list access-list-number {deny | permit} source [source-wildcard] Example:
Switch(config)# access-list 10 permit 224.0.0.0 15.255.255.255

Creates a standard access list, repeating the command as many times as necessary.
· For access-list-number, enter the access list number specified in Step 3.
· The deny keyword denies access if the conditions are matched.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 255

Adding Auto-RP to an Existing Sparse-Mode Cloud (CLI)

IP Multicast Routing

Step 6
Step 7 Step 8 Step 9 Step 10

Command or Action

Purpose · The permit keyword permits access if the conditions are matched.
· For source, enter the multicast group address range for which the RP should be used.
· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

Recall that the access list is always terminated by an implicit deny statement for everything.

ip pim send-rp-discovery scope ttl

Finds a switch whose connectivity is not likely to be

Example:

interrupted, and assigns it the role of RP-mapping agent.

For scope ttl, specify the time-to-live value in hops to limit

Switch(config)# ip pim send-rp-discovery scope 50 the RP discovery packets. All devices within the hop count

from the source device receive the Auto-RP discovery

messages. These messages tell other devices which

group-to-RP mapping to use to avoid conflicts (such as

overlapping group-to-RP ranges). There is no default

setting. The range is 1 to 255.

Note To remove the switch as the RP-mapping agent, use the no ip pim send-rp-discovery global configuration command.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

show running-config Example:
Switch# show running-config

Verifies your entries.

show ip pim rp mapping
Example:
Switch# show ip pim rp mapping

Displays active RPs that are cached with associated multicast routing entries.

show ip pim rp Example:

Displays the information cached in the routing table.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 256

IP Multicast Routing

Preventing Join Messages to False RPs (CLI)

Step 11

Command or Action
Switch# show ip pim rp
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Preventing Join Messages to False RPs (CLI)
Determine whether the ip pim accept-rp command was previously configured throughout the network by using the show running-config privileged EXEC command. If the ip pim accept-rp command is not configured on any device, this problem can be addressed later. In those routers or multilayer switches already configured with the ip pim accept-rp command, you must enter the command again to accept the newly advertised RP.
To accept all RPs advertised with Auto-RP and reject all other RPs by default, use the ip pim accept-rp auto-rp global configuration command.
This procedure is optional. Related Topics
Example: Preventing Join Messages to False RPs, on page 275
Filtering Incoming RP Announcement Messages (CLI)
You can add configuration commands to the mapping agents to prevent a maliciously configured router from masquerading as a candidate RP and causing problems.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip pim rp-announce-filter rp-list access-list-number group-list access-list-number 4. access-list access-list-number {deny | permit} source [source-wildcard] 5. end 6. show running-config 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 257

Filtering Incoming RP Announcement Messages (CLI)

IP Multicast Routing

Step 2

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Step 3 Step 4

ip pim rp-announce-filter rp-list access-list-number Filters incoming RP announcement messages.

group-list access-list-number Example:

Enter this command on each mapping agent in the network. Without this command, all incoming RP-announce messages are accepted by default.

Switch(config)# ip 10 group-list 14

pim

rp-announce-filter

rp-list

For rp-list access-list-number, configure an access list of

candidate RP addresses that, if permitted, is accepted for

the group ranges supplied in the group-list

access-list-number variable. If this variable is omitted, the

filter applies to all multicast groups.

If more than one mapping agent is used, the filters must be consistent across all mapping agents to ensure that no conflicts occur in the group-to-RP mapping information.

access-list access-list-number {deny | permit} source [source-wildcard] Example:
Switch(config)# access-list 10 permit 10.8.1.0 255.255.224.0

Creates a standard access list, repeating the command as many times as necessary.
· For access-list-number, enter the access list number specified in Step 2.
· The deny keyword denies access if the conditions are matched.
· The permit keyword permits access if the conditions are matched.
· Create an access list that specifies from which routers and multilayer switches the mapping agent accepts candidate RP announcements (rp-list ACL).

· Create an access list that specifies the range of multicast groups from which to accept or deny (group-list ACL).

· For source, enter the multicast group address range for which the RP should be used.
· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

The access list is always terminated by an implicit deny statement for everything.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 258

IP Multicast Routing

Configuring PIMv2 BSR

Step 5

Command or Action end Example:
Switch(config)# end

Step 6

show running-config Example:
Switch# show running-config

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Related Topics Example: Filtering Incoming RP Announcement Messages, on page 275
Configuring PIMv2 BSR
The process for configuring PIMv2 BSR may involve the following optional tasks: · Defining the PIM domain border · Defining the IP multicast boundary · Configuring candidate BSRs · Configuring candidate RPs
Defining the PIM Domain Border (CLI)
As IP multicast becomes more widespread, the chance of one PIMv2 domain bordering another PIMv2 domain increases. Because two domains probably do not share the same set of RPs, BSR, candidate RPs, and candidate BSRs, you need to constrain PIMv2 BSR messages from flowing into or out of the domain. Allowing messages to leak across the domain borders could adversely affect the normal BSR election mechanism and elect a single BSR across all bordering domains and comingle candidate RP advertisements, resulting in the election of RPs in the wrong domain.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 259

Defining the PIM Domain Border (CLI)

IP Multicast Routing

Figure 11: Constraining PIMv2 BSR Messages
This figure displays how you can configure the PIM domain border by using the ip pim bsr-border command.

This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id 4. ip pim bsr-border 5. end 6. show running-config 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Specifies the interface to be configured, and enters interface configuration mode.
The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 260

IP Multicast Routing

Defining the PIM Domain Border (CLI)

Command or Action

Step 4

ip pim bsr-border Example:
Switch(config-if)# ip pim bsr-border

Step 5

end Example:
Switch(config)# end

Step 6

show running-config Example:
Switch# show running-config

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218
These interfaces must have IP addresses assigned to them. Defines a PIM bootstrap message boundary for the PIM domain. Enter this command on each interface that connects to other bordering PIM domains. This command instructs the switch to neither send nor receive PIMv2 BSR messages on this interface. Note To remove the PIM border, use the no ip pim
bsr-border interface configuration command.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 261

Defining the IP Multicast Boundary (CLI)

IP Multicast Routing

Defining the IP Multicast Boundary (CLI)
You define a multicast boundary to prevent Auto-RP messages from entering the PIM domain. You create an access list to deny packets destined for 224.0.1.39 and 224.0.1.40, which carry Auto-RP information.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. access-list access-list-number deny source [source-wildcard] 4. interface interface-id 5. ip multicast boundary access-list-number 6. end 7. show running-config 8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

access-list access-list-number deny source [source-wildcard]
Example:
Switch(config)# access-list 12 deny 224.0.1.39 access-list 12 deny 224.0.1.40

Creates a standard access list, repeating the command as many times as necessary.
· For access-list-number, the range is 1 to 99.
· The deny keyword denies access if the conditions are matched.
· For source, enter multicast addresses 224.0.1.39 and 224.0.1.40, which carry Auto-RP information.
· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.
The access list is always terminated by an implicit deny statement for everything.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 262

IP Multicast Routing

Defining the IP Multicast Boundary (CLI)

Step 4 Step 5

Command or Action

Purpose

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Specifies the interface to be configured, and enters interface configuration mode.
The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217

· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218

ip multicast boundary access-list-number Example:

These interfaces must have IP addresses assigned to them.
Configures the boundary, specifying the access list you created in Step 2.

Switch(config-if)# ip multicast boundary 12

Step 6

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 7

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 8

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 263

Configuring Candidate BSRs (CLI)

IP Multicast Routing

Related Topics Example: Defining the IP Multicast Boundary to Deny Auto-RP Information, on page 275
Configuring Candidate BSRs (CLI)
You can configure one or more candidate BSRs. The devices serving as candidate BSRs should have good connectivity to other devices and be in the backbone portion of the network. This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip pim bsr-candidate interface-id hash-mask-length [priority] 4. end 5. show running-config 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

ip pim bsr-candidate interface-id hash-mask-length [priority] Example:
Switch(config)# ip pim bsr-candidate gigabitethernet 1/0/3 28 100

Configures your switch to be a candidate BSR.
· For interface-id, enter the interface on this switch from which the BSR address is derived to make it a candidate. This interface must be enabled with PIM. Valid interfaces include physical ports, port channels, and VLANs.
· For hash-mask-length, specify the mask length (32 bits maximum) that is to be ANDed with the group address before the hash function is called. All groups with the same seed hash correspond to the same RP. For example, if this value is 24, only the first 24 bits of the group addresses matter.
· (Optional) For priority, enter a number from 0 to 255. The BSR with the larger priority is preferred. If the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 264

IP Multicast Routing

Configuring the Candidate RPs (CLI)

Command or Action

Step 4

end Example:
Switch(config-if)# end

Step 5

show running-config Example:
Switch# show running-config

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose priority values are the same, the device with the highest IP address is selected as the BSR. The default is 0.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Related Topics PIM v2 BSR, on page 242 Example: Configuring Candidate BSRs, on page 276
Configuring the Candidate RPs (CLI)
You can configure one or more candidate RPs. Similar to BSRs, the RPs should also have good connectivity to other devices and be in the backbone portion of the network. An RP can serve the entire IP multicast address space or a portion of it. Candidate RPs send candidate RP advertisements to the BSR. When deciding which devices should be RPs, consider these options:
· In a network of Cisco routers and multilayer switches where only Auto-RP is used, any device can be configured as an RP.
· In a network that includes only Cisco PIMv2 routers and multilayer switches and with routers from other vendors, any device can be used as an RP.
· In a network of Cisco PIMv1 routers, Cisco PIMv2 routers, and routers from other vendors, configure only Cisco PIMv2 routers and multilayer switches as RPs.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip pim rp-candidate interface-id [group-list access-list-number] 4. access-list access-list-number {deny | permit} source [source-wildcard]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 265

Configuring the Candidate RPs (CLI)

IP Multicast Routing

5. end 6. show running-config 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4
Step 5

ip pim rp-candidate interface-id [group-list

Configures your switch to be a candidate RP.

access-list-number]

· For interface-id, specify the interface whose associated

Example:

IP address is advertised as a candidate RP address.

Valid interfaces include physical ports, port channels,

Switch(config)# ip pim rp-candidate gigabitethernet

and VLANs.

1/0/5 group-list 10

· (Optional) For group-list access-list-number, enter an

IP standard access list number from 1 to 99. If no

group-list is specified, the switch is a candidate RP for

all groups.

access-list access-list-number {deny | permit} source [source-wildcard] Example:
Switch(config)# access-list 10 permit 239.0.0.0 0.255.255.255

Creates a standard access list, repeating the command as many times as necessary.
· For access-list-number, enter the access list number specified in Step 2.
· The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched.

· For source, enter the number of the network or host from which the packet is being sent.

· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

The access list is always terminated by an implicit deny statement for everything.

end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 266

IP Multicast Routing

Configuring Auto-RP and BSR for the Network (CLI)

Command or Action Example:
Switch(config-if)# end

Step 6

show running-config Example:
Switch# show running-config

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies your entries (Optional) Saves your entries in the configuration file

Related Topics Example: Configuring Candidate RPs, on page 276
Configuring Auto-RP and BSR for the Network (CLI)
If there are only Cisco devices in your network (no routers from other vendors), there is no need to configure a BSR. Configure Auto-RP in a network that is running both PIMv1 and PIMv2. If you have non-Cisco PIMv2 routers that need to interoperate with Cisco PIMv1 routers and multilayer switches, both Auto-RP and a BSR are required. We recommend that a Cisco PIMv2 router or multilayer switch be both the Auto-RP mapping agent and the BSR. If you must have one or more BSRs, we have these recommendations:
· Configure the candidate BSRs as the RP-mapping agents for Auto-RP. For information about these procedures, see: · Configuring a Rendezvous Point, on page 248
· Configuring Candidate BSRs (CLI), on page 264
· For group prefixes advertised through Auto-RP, the PIMv2 BSR mechanism should not advertise a subrange of these group prefixes served by a different set of RPs. In a mixed PIMv1 and PIMv2 domain, backup RPs should serve the same group prefixes. This prevents the PIMv2 DRs from selecting a different RP from those PIMv1 DRs, due to the longest match lookup in the RP-mapping database.
Before you begin Beginning in privileged EXEC mode, follow these steps to verify the consistency of group-to-RP mappings. This procedure is optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 267

Delaying the Use of PIM Shortest-Path Tree (CLI)

IP Multicast Routing

SUMMARY STEPS

1. show ip pim rp [ hostname or IP address | mapping [ hostname or IP address | elected | in-use ] | metric [ hostname or IP address ] ]
2. show ip pim rp-hash group

DETAILED STEPS

Step 1

Command or Action
show ip pim rp [ hostname or IP address | mapping [ hostname or IP address | elected | in-use ] | metric [ hostname or IP address ] ]
Example:

Switch# show ip pim rp mapping

Purpose
On any Cisco device, displays available RP mappings and metrics:
· (Optional) For the hostname, specify the IP name of the group about which to display RPs.
· (Optional) For the IP address, specify the IP address of the group about which to display RPs.
· (Optional) Use the mapping keyword to display all group-to-RP mappings of which the Cisco device is aware (either configured or learned from Auto-RP).
· (Optional) Use the metric keyword to display the RP RPF metric.

Step 2

show ip pim rp-hash group Example:
Switch# show ip pim rp-hash 239.1.1.1

On a PIMv2 router or multilayer switch, confirms that the same RP is the one that a PIMv1 system chooses.
For group, enter the group address for which to display RP information.

Delaying the Use of PIM Shortest-Path Tree (CLI)
The change from shared to source tree happens when the first data packet arrives at the last-hop router. This change occurs because the ip pim spt-threshold global configuration command controls that timing.
The shortest-path tree requires more memory than the shared tree but reduces delay. You might want to postpone its use. Instead of allowing the leaf router to immediately move to the shortest-path tree, you can specify that the traffic must first reach a threshold.
You can configure when a PIM leaf router should join the shortest-path tree for a specified group. If a source sends at a rate greater than or equal to the specified kbps rate, the multilayer switch triggers a PIM join message toward the source to construct a source tree (shortest-path tree). If the traffic rate from the source drops below the threshold value, the leaf router switches back to the shared tree and sends a prune message toward the source.
You can specify to which groups the shortest-path tree threshold applies by using a group list (a standard access list). If a value of 0 is specified or if the group list is not used, the threshold applies to all groups.
This procedure is optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 268

IP Multicast Routing

Delaying the Use of PIM Shortest-Path Tree (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. access-list access-list-number {deny | permit} source [source-wildcard] 4. ip pim spt-threshold {kbps | infinity} [group-list access-list-number] 5. end 6. show running-config 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 3 Step 4

access-list access-list-number {deny | permit} source [source-wildcard] Example:
Switch(config)# access-list 16 permit 225.0.0.0 0.255.255.255

Creates a standard access list. · For access-list-number, the range is 1 to 99.
· The deny keyword denies access if the conditions are matched.
· The permit keyword permits access if the conditions are matched.

· For source, specify the multicast group to which the threshold will apply.

· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

ip pim spt-threshold {kbps | infinity} [group-list access-list-number] Example:
Switch(config)# ip pim spt-threshold

The access list is always terminated by an implicit deny statement for everything.
Specifies the threshold that must be reached before moving to shortest-path tree (spt).
· For kbps, specify the traffic rate in kilobits per second. The default is 0 kbps.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 269

Modifying the PIM Router-Query Message Interval (CLI)

IP Multicast Routing

Command or Action
infinity group-list 16

Step 5

end Example:
Switch(config)# end

Step 6

show running-config Example:
Switch# show running-config

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Note

Because of switch hardware limitations, 0 kbps is the only valid entry even though the range is 0 to 4294967.

· Specify infinity if you want all sources for the specified group to use the shared tree, never switching to the source tree.
· (Optional) For group-list access-list-number, specify the access list created in Step 2. If the value is 0 or if the group list is not used, the threshold applies to all groups.

Returns to privileged EXEC mode.

Verifies your entries.

(Optional) Saves your entries in the configuration file.

Modifying the PIM Router-Query Message Interval (CLI)
PIM routers and multilayer switches send PIM router-query messages to find which device will be the designated router (DR) for each LAN segment (subnet). The DR is responsible for sending IGMP host-query messages to all hosts on the directly connected LAN.
With PIM DM operation, the DR has meaning only if IGMPv1 is in use. IGMPv1 does not have an IGMP querier election process, so the elected DR functions as the IGMP querier. With PIM-SM operation, the DR is the device that is directly connected to the multicast source. It sends PIM register messages to notify the RP that multicast traffic from a source needs to be forwarded down the shared tree. In this case, the DR is the device with the highest IP address.
This procedure is optional.

SUMMARY STEPS

1. enable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 270

IP Multicast Routing

Modifying the PIM Router-Query Message Interval (CLI)

2. configure terminal 3. interface interface-id 4. ip pim query-interval seconds 5. end 6. show ip igmp interface [interface-id] 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Step 4

ip pim query-interval seconds Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.
Specifies the interface to be configured, and enters interface configuration mode. The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218
These interfaces must have IP addresses assigned to them.
Configures the frequency at which the switch sends PIM router-query messages. The default is 30 seconds. The range is 1 to 65535.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 271

Monitoring PIM

IP Multicast Routing

Command or Action
Switch(config-if)# ip pim query-interval 45

Step 5

end Example:
Switch(config-if)# end

Step 6

show ip igmp interface [interface-id] Example:
Switch# show ip igmp interface

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file.

Monitoring PIM

Use the privileged EXEC commands in the following table to monitor your PIM configurations.
Table 33: PIM Monitoring Commands

Command

Purpose

show ip pim all-vrfs tunnel [tunnel tunnel_number Displays all VRFs. | verbose]

show ip pim autorp

Displays global auto-RP information.

show ip pim boundary

Displays information about mroutes filtered by administratively scoped IPv4 multicast boundaries configured on an interface.

show ip pim interface

Displays information about interfaces configured for Protocol Independent Multicast (PIM).

show ip pim neighbor

Displays the PIM neighbor information.

show ip pim tunnel [tunnel | verbose]

Displays information about Protocol Independent Multicast (PIM) tunnel interfaces

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 272

IP Multicast Routing

Monitoring RP Mapping

Command

Purpose

show ip pim vrf { word { all-vrfs | autorp |

Displays the VPN routing/forwarding instance.

boundary | bsr-router | interface | mdt | neighbor

| rp | rp-hash | tunnel } }

Monitoring RP Mapping
Use the privileged EXEC commands in the following table to monitor RP mapping.
Table 34: RP Mapping Monitoring Commands

Command

Purpose

show ip pim bsr

Displays information about the elected BSR.

show ip pim bsr-router

Displays information about the BSRv2.

show ip pim rp [ hostname or IP address | mapping Displays how the switch learns of the RP (through [ hostname or IP address | elected [hostname or IP the BSR or the Auto-RP mechanism). address] | in-use [hostname or IP address] ] | metric [ hostname or IP address ] ]

show ip pim rp-hash hostname or IP group address Displays the RP that was selected for the specified group.

Troubleshooting PIMv1 and PIMv2 Interoperability Problems
When debugging interoperability problems between PIMv1 and PIMv2, check these in the order shown:
1. Verify RP mapping with the show ip pim rp-hash privileged EXEC command, making sure that all systems agree on the same RP for the same group.
2. Verify interoperability between different versions of DRs and RPs. Make sure that the RPs are interacting with the DRs properly (by responding with register-stops and forwarding decapsulated data packets from registers).

Configuration Examples for PIM
Example: Enabling PIM Stub Routing
In this example, IP multicast routing is enabled, Switch A PIM uplink port 25 is configured as a routed uplink port with spare-dense-mode enabled. PIM stub routing is enabled on the VLAN 100 interfaces and on Gigabit Ethernet port 20.
Switch(config)# ip multicast-routing distributed Switch(config)# interface GigabitEthernet3/0/25

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 273

Example: Verifying PIM Stub Routing

IP Multicast Routing

Switch(config-if)# no switchport Switch(config-if)# ip address 3.1.1.2 255.255.255.0 Switch(config-if)# ip pim sparse-dense-mode Switch(config-if)# exit Switch(config)# interface vlan100 Switch(config-if)# ip pim passive Switch(config-if)# exit Switch(config)# interface GigabitEthernet3/0/20 Switch(config-if)# ip pim passive Switch(config-if)# exit Switch(config)# interface vlan100 Switch(config-if)# ip address 100.1.1.1 255.255.255.0 Switch(config-if)# ip pim passive Switch(config-if)# exit Switch(config)# interface GigabitEthernet3/0/20 Switch(config-if)# no switchport Switch(config-if)# ip address 10.1.1.1 255.255.255.0 Switch(config-if)# ip pim passive Switch(config-if)# end
Related Topics Enabling PIM Stub Routing (CLI), on page 246 PIM Stub Routing, on page 240
Example: Verifying PIM Stub Routing
To verify that PIM stub is enabled for each interface, use the show ip pim interface privileged EXEC command:
Switch# show ip pim interface Address Interface Ver/ Nbr Query DR DR Mode Count Intvl Prior 3.1.1.2 GigabitEthernet3/0/25 v2/SD 1 30 1 3.1.1.2 100.1.1.1 Vlan100 v2/P 0 30 1 100.1.1.1 10.1.1.1 GigabitEthernet3/0/20 v2/P 0 30 1 10.1.1.1
Example: Manually Assigning an RP to Multicast Groups
This example shows how to configure the address of the RP to 147.106.6.22 for multicast group 225.2.2.2 only:
Switch(config)# access-list 1 permit 225.2.2.2 0.0.0.0 Switch(config)# ip pim rp-address 147.106.6.22 1
Example: Configuring Auto-RP
This example shows how to send RP announcements out all PIM-enabled interfaces for a maximum of 31 hops. The IP address of port 1 is the RP. Access list 5 describes the group for which this switch serves as RP:
Switch(config)# ip pim send-rp-announce gigabitethernet1/0/1 scope 31 group-list 5 Switch(config)# access-list 5 permit 224.0.0.0 15.255.255.255

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 274

IP Multicast Routing

Example: Defining the IP Multicast Boundary to Deny Auto-RP Information

Related Topics Setting Up Auto-RP in a New Internetwork (CLI), on page 251 Auto-RP, on page 241
Example: Defining the IP Multicast Boundary to Deny Auto-RP Information
This example shows a portion of an IP multicast boundary configuration that denies Auto-RP information:
Switch(config)# access-list 1 deny 224.0.1.39 Switch(config)# access-list 1 deny 224.0.1.40 Switch(config)# access-list 1 permit all Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip multicast boundary 1
Related Topics Defining the IP Multicast Boundary (CLI), on page 262
Example: Filtering Incoming RP Announcement Messages
This example shows a sample configuration on an Auto-RP mapping agent that is used to prevent candidate RP announcements from being accepted from unauthorized candidate RPs:
Switch(config)# ip pim rp-announce-filter rp-list 10 group-list 20 Switch(config)# access-list 10 permit host 172.16.5.1 Switch(config)# access-list 10 permit host 172.16.2.1 Switch(config)# access-list 20 deny 239.0.0.0 0.0.255.255 Switch(config)# access-list 20 permit 224.0.0.0 15.255.255.255
The mapping agent accepts candidate RP announcements from only two devices, 172.16.5.1 and 172.16.2.1. The mapping agent accepts candidate RP announcements from these two devices only for multicast groups that fall in the group range of 224.0.0.0 to 239.255.255.255. The mapping agent does not accept candidate RP announcements from any other devices in the network. Furthermore, the mapping agent does not accept candidate RP announcements from 172.16.5.1 or 172.16.2.1 if the announcements are for any groups in the 239.0.0.0 through 239.255.255.255 range. This range is the administratively scoped address range. Related Topics
Filtering Incoming RP Announcement Messages (CLI), on page 257
Example: Preventing Join Messages to False RPs
If all interfaces are in sparse mode, use a default-configured RP to support the two well-known groups 224.0.1.39 and 224.0.1.40. Auto-RP uses these two well-known groups to collect and distribute RP-mapping information. When this is the case and the ip pim accept-rp auto-rp command is configured, another ip pim accept-rp command accepting the RP must be configured as follows:
Switch(config)# ip pim accept-rp 172.10.20.1 1 Switch(config)# access-list 1 permit 224.0.1.39 Switch(config)# access-list 1 permit 224.0.1.40

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 275

Example: Configuring Candidate BSRs

IP Multicast Routing

Related Topics Preventing Join Messages to False RPs (CLI), on page 257
Example: Configuring Candidate BSRs
This example shows how to configure a candidate BSR, which uses the IP address 172.21.24.18 on a port as the advertised BSR address, uses 30 bits as the hash-mask-length, and has a priority of 10.
Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip address 172.21.24.18 255.255.255.0 Switch(config-if)# ip pim sparse-dense-mode Switch(config-if)# ip pim bsr-candidate gigabitethernet1/0/2 30 10
Related Topics Configuring Candidate BSRs (CLI), on page 264 PIM v2 BSR, on page 242
Example: Configuring Candidate RPs
This example shows how to configure the switch to advertise itself as a candidate RP to the BSR in its PIM domain. Standard access list number 4 specifies the group prefix associated with the RP that has the address identified by a port. That RP is responsible for the groups with the prefix 239.
Switch(config)# ip pim rp-candidate gigabitethernet1/0/2 group-list 4 Switch(config)# access-list 4 permit 239.0.0.0 0.255.255.255
Related Topics Configuring the Candidate RPs (CLI), on page 265
Where to Go Next for PIM
You can configure the following: · IGMP · Wireless Multicast · SSM · IP Multicast Routing · Service Discovery Gateway

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 276

IP Multicast Routing

Additional References

Additional References

Related Documents
Related Topic PIM is defined in RFC 4601 and in these Internet Engineering Task Force (IETF) Internet drafts.

Document Title
· Protocol Independent Multicast (PIM): Motivation and Architecture
· Protocol Independent Multicast (PIM), Dense Mode Protocol Specification
· Protocol Independent Multicast (PIM), Sparse Mode Protocol Specification
· draft-ietf-idmr-igmp-v2-06.txt, Internet Group Management Protocol, Version 2
· draft-ietf-pim-v2-dm-03.txt, PIM Version 2 Dense Mode

For complete syntax and usage information for the commands used in IP Multicast Routing Command

this chapter.

Reference (Catalyst 3650 Switches)

IGMP Helper command syntax and usage information.

IP Multicast Routing Command Reference (Catalyst 3650 Switches)

Multicast Source Discovery Protocol (MSDP)

IP Routing: Protocol-Independent Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Enhanced Interior Gateway Routing Protocol (EIGRP) stub routing

IP Routing: EIGRP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Open Shortest Path First (OSPF) stub routing

IP Routing: OSPF Configuration Guide, Cisco IOS XE 3SE (Catalyst 3650 Switches)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 277

Additional References

IP Multicast Routing

Related Topic Platform-independent configuration information

Document Title
· IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title RFC 4601 Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 278

IP Multicast Routing

Feature History and Information for PIM

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for PIM
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 279

Feature History and Information for PIM

IP Multicast Routing

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 280

1 6 C H A P T E R
Configuring SSM
· Finding Feature Information, on page 281 · Prerequisites for Configuring SSM, on page 281 · Restrictions for Configuring SSM, on page 282 · Information About SSM, on page 283 · How to Configure SSM, on page 286 · Monitoring SSM, on page 293 · Where to Go Next for SSM, on page 294 · Additional References, on page 294 · Feature History and Information for SSM, on page 296
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring SSM
The following are the prerequisites for configuring source-specific multicast (SSM) and SSM mapping: · Before you configure SSM mapping, you must perform the following tasks: · Enable IP multicast routing. For information about this procedure, see Configuring Basic IP Multicast Routing (CLI), on page 301. · Enable PIM sparse mode. For information about this procedure, see How to Configure PIM, on page 246. · Configure SSM. For information about this procedure, see Configuring SSM (CLI), on page 286.
· Before you configure static SSM mapping, you must configure access control lists (ACLs) that define the group ranges to be mapped to source addresses.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 281

Restrictions for Configuring SSM

IP Multicast Routing

· Before you can configure and use SSM mapping with DNS look ups, you must be able to add records to a running DNS server. If you do not already have a DNS server running, you need to install one.
Note You can use a product such as Cisco Network Registrar to add records to a running DNS server.
Restrictions for Configuring SSM
The following are the restrictions for configuring SSM:
· To run SSM with IGMPv3, SSM must be supported in the Cisco IOS router, the host where the application is running, and the application itself.
· The SSM mapping feature does not have all the benefits of full SSM. Because SSM mapping takes a group join from a host and identifies this group with an application associated with one or more sources, it can only support one such application per group. Full SSM applications can still share the same group as in SSM mapping.
· Enable IGMPv3 carefully on the last hop router when you rely solely on SSM mapping as a transition solution for full SSM. When you enable both SSM mapping and IGMPv3 and the hosts already support IGMPv3 (but not SSM), the hosts send IGMPv3 group reports. SSM mapping does not support these IGMPv3 group reports, and the router does not correctly associate sources with these reports.
· Existing applications in a network predating SSM do not work within the SSM range unless they are modified to support (S, G) channel subscriptions. Therefore, enabling SSM in a network can cause problems for existing applications if they use addresses within the designated SSM range.
· IGMPv3 uses new membership report messages that might not be correctly recognized by older IGMP snooping switches.
· Address management is still necessary to some degree when SSM is used with Layer 2 switching mechanisms. Cisco Group Management Protocol (CGMP), IGMP snooping, or Router-Port Group Management Protocol (RGMP) support only group-specific filtering, not (S, G) channel-specific filtering. If different receivers in a switched network request different (S, G) channels sharing the same group, they do not benefit from these existing mechanisms. Instead, both receivers receive all (S, G) channel traffic and filter out the unwanted traffic on input.
Because SSM can re-use the group addresses in the SSM range for many independent applications, this situation can lead to decreased traffic filtering in a switched network. For this reason, it is important to use random IP addresses from the SSM range for an application to minimize the chance for re-use of a single address within the SSM range between different applications. For example, an application service providing a set of television channels should, even with SSM, use a different group for each television (S, G) channel. This setup guarantees that multiple receivers to different channels within the same application service never experience traffic aliasing in networks that include Layer 2 switches.
· In PIM-SSM, the last hop router continues to periodically send (S, G) join messages if appropriate (S, G) subscriptions are on the interfaces. Therefore, as long as receivers send (S, G) subscriptions, the shortest path tree (SPT) state from the receivers to the source is maintained, even if the source does not send traffic for longer periods of time (or even never).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 282

IP Multicast Routing

Information About SSM

The opposite situation occurs with PIM-SM, where (S, G) state is maintained only if the source is sending traffic and receivers are joining the group. If a source stops sending traffic for more than 3 minutes in PIM-SM, the (S, G) state is deleted and only reestablished after packets from the source arrive again through the RPT (rendezvous point tree). Because no mechanism in PIM-SSM notifies a receiver that a source is active, the network must maintain the (S, G) state in PIM-SSM as long as receivers are requesting receipt of that channel.
Information About SSM
The source-specific multicast (SSM) feature is an extension of IP multicast in which datagram traffic is forwarded to receivers from only those multicast sources that the receivers have explicitly joined. For multicast groups configured for SSM, only SSM distribution trees (no shared trees) are created.
This section describes how to configure source-specific multicast (SSM). For a complete description of the SSM commands in this section, refer to the IP Multicast Command Reference. To locate documentation for other commands that appear in this chapter, use the command reference master index, or search online.
SSM Components Overview
SSM is a datagram delivery model that best supports one-to-many applications, also known as broadcast applications. SSM is a core networking technology for the Cisco implementation of IP multicast solutions targeted for audio and video broadcast application environments. The switch supports the following components that support SSM implementation:
· Protocol independent multicast source-specific mode (PIM-SSM)
PIM-SSM is the routing protocol that supports the implementation of SSM and is derived from PIM sparse mode (PIM-SM).
· Internet Group Management Protocol version 3 (IGMPv3)
SSM and Internet Standard Multicast (ISM)
The current IP multicast infrastructure in the Internet and many enterprise intranets is based on the PIM-SM protocol and Multicast Source Discovery Protocol (MSDP). These protocols have the limitations of the Internet Standard Multicast (ISM) service model. For example, with ISM, the network must maintain knowledge about which hosts in the network are actively sending multicast traffic.
The ISM service consists of the delivery of IP datagrams from any source to a group of receivers called the multicast host group. The datagram traffic for the multicast host group consists of datagrams with an arbitrary IP unicast source address (S) and the multicast group address (G) as the IP destination address. Systems receive this traffic by becoming members of the host group. Membership in a host group simply requires signaling the host group through IGMP version 1, 2, or 3.
In SSM, delivery of datagrams is based on (S, G) channels. In both SSM and ISM, no signaling is required to become a source. However, in SSM, receivers must subscribe or unsubscribe to (S, G) channels to receive or not receive traffic from specific sources. In other words, receivers can receive traffic only from (S, G) channels to which they are subscribed, whereas in ISM, receivers need not know the IP addresses of sources from which they receive their traffic. The proposed standard approach for channel subscription signaling uses IGMP and includes modes membership reports, which are supported only in IGMP version 3.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 283

SSM IP Address Range

IP Multicast Routing

SSM IP Address Range
SSM can coexist with the ISM service by applying the SSM delivery model to a configured subset of the IP multicast group address range. Cisco IOS software allows SSM configuration for the IP multicast address range of 224.0.0.0 through 239.255.255.255. When an SSM range is defined, existing IP multicast receiver applications do not receive any traffic when they try to use an address in the SSM range (unless the application is modified to use an explicit (S, G) channel subscription).
SSM Operations
An established network, in which IP multicast service is based on PIM-SM, can support SSM services. SSM can also be deployed alone in a network without the full range of protocols required for interdomain PIM-SM (for example, MSDP, Auto-RP, or bootstrap router [BSR]) if only SSM service is needed.
If SSM is deployed in a network already configured for PIM-SM, only the last-hop routers support SSM. Routers that are not directly connected to receivers do not require support for SSM. In general, these not-last-hop routers must only run PIM-SM in the SSM range and might need additional access control configuration to suppress MSDP signalling, registering, or PIM-SM shared tree operations from occurring within the SSM range.
Use the ip pim ssm global configuration command to configure the SSM range and to enable SSM. This configuration has the following effects:
· For groups within the SSM range, (S, G) channel subscriptions are accepted through IGMPv3 include-mode membership reports.
· PIM operations within the SSM range of addresses change to PIM-SSM, a mode derived from PIM-SM. In this mode, only PIM (S, G) join and prune messages are generated by the router, and no (S, G) rendezvous point tree (RPT) or (*, G) RPT messages are generated. Incoming messages related to RPT operations are ignored or rejected, and incoming PIM register messages are immediately answered with register-stop messages. PIM-SSM is backward-compatible with PIM-SM unless a router is a last-hop router. Therefore, routers that are not last-hop routers can run PIM-SM for SSM groups (for example, if they do not yet support SSM).
· No MSDP source-active (SA) messages within the SSM range are accepted, generated, or forwarded.
SSM Mapping
In a typical set-top box (STB) deployment, each TV channel uses one separate IP multicast group and has one active server host sending the TV channel. A single server can send multiple TV channels, but each to a different group. In this network environment, if a router receives an IGMPv1 or IGMPv2 membership report for a particular group, the report addresses the well-known TV server for the TV channel associated with the multicast group.
When SSM mapping is configured, if a router receives an IGMPv1 or IGMPv2 membership report for a particular group, the router translates this report into one or more channel memberships for the well-known sources associated with this group.
When the router receives an IGMPv1 or IGMPv2 membership report for a group, the router uses SSM mapping to determine one or more source IP addresses for the group. SSM mapping then translates the membership report as an IGMPv3 report and continues as if it had received an IGMPv3 report. The router then sends PIM joins and continues to be joined to these groups as long as it continues to receive the IGMPv1 or IGMPv2 membership reports, and the SSM mapping for the group remains the same.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 284

IP Multicast Routing

Static SSM Mapping

SSM mapping enables the last hop router to determine the source addresses either by a statically configured table on the router or through a DNS server. When the statically configured table or the DNS mapping changes, the router leaves the current sources associated with the joined groups.
Static SSM Mapping
With static SSM mapping, you can configure the last hop router to use a static map to determine the sources that are sending to groups. Static SSM mapping requires that you configure ACLs to define group ranges. After configuring the ACLs to define group ranges, you can then map the groups permitted by those ACLs to sources by using the ip igmp ssm-map static global configuration command.
You can configure static SSM mapping in smaller networks when a DNS is not needed or to locally override DNS mappings. When configured, static SSM mappings take precedence over DNS mappings.
Related Topics Configuring Static SSM Mapping (CLI), on page 288 Configuring Static Traffic Forwarding with SSM Mapping (CLI), on page 291
DNS-Based SSM Mapping
You can use DNS-based SSM mapping to configure the last hop router to perform a reverse DNS lookup to determine sources sending to groups. When DNS-based SSM mapping is configured, the router constructs a domain name that includes the group address and performs a reverse lookup into the DNS. The router looks up IP address resource records and uses them as the source addresses associated with this group. SSM mapping supports up to 20 sources for each group. The router joins all sources configured for a group.
Figure 12: DNS-Based SSM Mapping
The following figure displays DNS-based SSM

mapping. The SSM mapping mechanism that enables the last hop router to join multiple sources for a group can provide source redundancy for a TV broadcast. In this context, the last hop router provides redundancy using SSM mapping to simultaneously join two video sources for the same TV channel. However, to prevent the last hop
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 285

How to Configure SSM

IP Multicast Routing

router from duplicating the video traffic, the video sources must use a server-side switchover mechanism. One video source is active, and the other backup video source is passive. The passive source waits until an active source failure is detected before sending the video traffic for the TV channel. Thus, the server-side switchover mechanism ensures that only one of the servers is actively sending video traffic for the TV channel.
To look up one or more source addresses for a group that includes G1, G2, G3, and G4, you must configure these DNS records on the DNS server:
G4.G3.G2.G1 [multicast-domain] [timeout] IN A source-address-1 IN A source-address-2 IN A source-address-n
See your DNS server documentation for more information about configuring DNS resource records. Related Topics
Configuring DNS-Based SSM Mapping (CLI), on page 289

How to Configure SSM
For a complete description of the source-specific multicast (SSM) commands in this section, see the IP Multicast Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches). To locate documentation for other commands that appear in this chapter, use the command reference master index, or search online.

Configuring SSM (CLI)
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip pim ssm [default | range access-list] 4. interface type number 5. ip pim {sparse-mode | sparse-dense-mode} 6. ip igmp version 3

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:

Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 286

IP Multicast Routing

Configuring SSM (CLI)

Command or Action
Switch# configure terminal

Step 3

ip pim ssm [default | range access-list] Example:
Switch(config)# ip pim ssm range 20

Step 4

interface type number Example:
Switch(config)# interface gigabitethernet 1/0/1

Step 5

ip pim {sparse-mode | sparse-dense-mode} Example:
Switch(config-if)# ip pim sparse-dense-mode

Step 6

ip igmp version 3 Example:
Switch(config-if)# ip igmp version 3

Purpose
Defines the SSM range of IP multicast addresses.
Selects an interface that is connected to hosts on which IGMPv3 can be enabled, and enters the interface configuration mode. The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218
These interfaces must have IP addresses assigned to them. Enables PIM on an interface. You must use either sparse mode or sparse-dense mode.
Enables IGMPv3 on this interface. The default version of IGMP is set to Version 2.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 287

Configuring Source Specific Multicast Mapping

IP Multicast Routing

Configuring Source Specific Multicast Mapping
The Source Specific Multicast (SSM) mapping feature supports SSM transition when supporting SSM on the end system is impossible or unwanted due to administrative or technical reasons. You can use SSM mapping to leverage SSM for video delivery to legacy STBs that do not support IGMPv3 or for applications that do not use the IGMPv3 host stack.
Configuring Static SSM Mapping (CLI)
The following procedure describes how to configure static SSM mapping.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp ssm-map enable 4. no ip igmp ssm-map query dns 5. ip igmp ssm-map static access-list source-address 6. Repeat Step 4 to configure additional static SSM mappings, if required. 7. end 8. show running-config 9. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

ip igmp ssm-map enable Example:
Switch(config)# ip igmp ssm-map enable

Enables SSM mapping for groups in the configured SSM range.
Note By default, this command enables DNS-based SSM mapping.

Step 4

no ip igmp ssm-map query dns Example:
Switch(config)# no ip igmp ssm-map dns

(Optional) Disables DNS-based SSM mapping.
Note Disable DNS-based SSM mapping if you only want to rely on static SSM mapping. By default, the ip igmp ssm-map global configuration command enables DNS-based SSM mapping.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 288

IP Multicast Routing

Configuring DNS-Based SSM Mapping (CLI)

Step 5
Step 6 Step 7

Command or Action ip igmp ssm-map static access-list source-address Example:
Switch(config)# ip igmp ssm-map static 11 172.16.8.11

Purpose
Configures static SSM mapping.
The ACL supplied for access-list defines the groups to be mapped to the source IP address entered for the source-address.
Note You can configure additional static SSM mappings. If additional SSM mappings are configured and the router receives an IGMPv1 or IGMPv2 membership report for a group in the SSM range, the switch determines the source addresses associated with the group by using each configured ip igmp ssm-map static command. The switch associates up to 20 sources per group.

Repeat Step 4 to configure additional static SSM mappings, -- if required.

end

Returns to privileged EXEC mode.

Example:

Switch(config)# end

Step 8

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 9

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Related Topics Static SSM Mapping, on page 285
Configuring DNS-Based SSM Mapping (CLI)
To configure DNS-based SSM mapping, you need to create a DNS server zone or add records to an existing zone. If the routers that are using DNS-based SSM mapping are also using DNS for other purposes, you should use a normally configured DNS server. If DNS-based SSM mapping is the only DNS implementation being used on the router, you can configure a false DNS setup with an empty root zone or a root zone that points back to itself.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 289

Configuring DNS-Based SSM Mapping (CLI)

IP Multicast Routing

SUMMARY STEPS

1. enable 2. configure terminal 3. ip igmp ssm-map enable 4. ip igmp ssm-map query dns 5. ip domain multicast domain-prefix 6. ip name-server server-address1 [server-address2... server-address6] 7. Repeat Step 5 to configure additional DNS servers for redundancy, if required. 8. end 9. show running-config 10. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

ip igmp ssm-map enable Example:
Switch(config)# ip igmp ssm-map enable

Enables SSM mapping for groups in a configured SSM range.

Step 4

ip igmp ssm-map query dns Example:
Switch(config)# ip igmp ssm-map query dns

Step 5

ip domain multicast domain-prefix Example:
Switch(config)# ip domain multicast

(Optional) Enables DNS-based SSM mapping.
By default, the ip igmp ssm-map command enables DNS-based SSM mapping. Only the no form of this command is saved to the running configuration.
Note Use this command to reenable DNS-based SSM mapping if DNS-based SSM mapping is disabled.
(Optional) Changes the domain prefix used by the switch for DNS-based SSM mapping.
By default, the switch uses the ip-addr.arpa domain prefix.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 290

IP Multicast Routing

Configuring Static Traffic Forwarding with SSM Mapping (CLI)

Step 6
Step 7 Step 8 Step 9 Step 10

Command or Action
ssm-map.cisco.com

Purpose

ip name-server server-address1 [server-address2... server-address6] Example:
Switch(config)# ip name-server 172.16.1.111 172.16.1.2

Specifies the address of one or more name servers to use for name and address resolution.

Repeat Step 5 to configure additional DNS servers for redundancy, if required.
end Example:

-- Returns to privileged EXEC mode.

Switch(config)# end

show running-config Example:
Switch# show running-config

Verifies your entries.

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Related Topics DNS-Based SSM Mapping, on page 285
Configuring Static Traffic Forwarding with SSM Mapping (CLI)
Use static traffic forwarding with SSM mapping to statically forward SSM traffic for certain groups.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface type number 4. ip igmp static-group group-address source ssm-map 5. end 6. show running-config 7. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 291

Configuring Static Traffic Forwarding with SSM Mapping (CLI)

IP Multicast Routing

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

interface type number Example:
Switch(config)# interface gigabitethernet 1/0/1
ip igmp static-group group-address source ssm-map Example:
Switch(config-if)# ip igmp static-group 239.1.2.1 source

Selects an interface on which to statically forward traffic for a multicast group using SSM mapping, and enters interface configuration mode.
The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218
These interfaces must have IP addresses assigned to them.
Note Static forwarding of traffic with SSM mapping works with either DNS-based SSM mapping or statically configured SSM mapping.
Configures SSM mapping to statically forward a (S, G) channel from the interface.
Use this command if you want to statically forward SSM traffic for certain groups. Use DNS-based SSM mapping to determine the source addresses of the channels.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 292

IP Multicast Routing

Monitoring SSM

Command or Action
ssm-map

Step 5

end Example:
Switch(config-if)# end

Step 6

show running-config Example:
Switch# show running-config

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file.

Related Topics Static SSM Mapping, on page 285

Monitoring SSM

Use the privileged EXEC commands in the following table to monitor SSM.
Table 35: Commands for Monitoring SSM

Command show ip igmp groups detail
show ip mroute

Purpose
Displays the (S, G) channel subscription through IGMPv3.
Displays whether a multicast group supports SSM service or whether a source-specific host report was received.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 293

Monitoring SSM Mapping

IP Multicast Routing

Monitoring SSM Mapping
Use the privileged EXEC commands in the following table to monitor SSM mapping.
Table 36: SSM Mapping Monitoring Commands

Command

Purpose

show ip igmp ssm-mapping

Displays information about SSM mapping.

show ip igmp ssm-mapping group-address

Displays the sources that SSM mapping uses for a particular group.

show ip igmp groups [group-name | group-address Displays the multicast groups with receivers that are

| interface-type interface-number] [detail]

directly connected to the router and that were learned

through IGMP.

show host

Displays the default domain name, the style of name lookup service, a list of name server hosts, and the cached list of hostnames and addresses.

debug ip igmp group-address

Displays the IGMP packets received and sent and IGMP host-related events.

Where to Go Next for SSM
You can configure the following: · IGMP · Wireless Multicast · PIM · IP Multicast Routing · Service Discovery Gateway

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage

IP Multicast Routing Command Reference (Catalyst 3650 Switches)

information for the commands used in

this chapter.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 294

IP Multicast Routing

Additional References

Related Topic
Platform-independent configuration information

Document Title
· IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title RFC 4601 Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 295

Feature History and Information for SSM

IP Multicast Routing

Feature History and Information for SSM
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 296

1 7 C H A P T E R
Configuring IP Multicast Routing
· Finding Feature Information, on page 297 · Prerequisites for Configuring IP Multicast Routing, on page 297 · Restrictions for Configuring IP Multicast Routing, on page 298 · Information About IP Multicast Routing, on page 298 · How to Configure Basic IP Multicast Routing, on page 301 · Monitoring and Maintaining IP Multicast Routing, on page 313 · Configuration Examples for IP Multicast Routing, on page 316 · Where to Go Next for IP Multicast, on page 317 · Additional References, on page 318 · Feature History and Information for IP Multicast, on page 319
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring IP Multicast Routing
The following are the prerequisites for configuring IP multicast routing: · To use the IP multicast routing feature on the switch, the switch or active switch must be running the IP Services feature set. · You must enable IP multicast routing and configure the PIM version and PIM mode on the switch. After performing these tasks, the switch can then forward multicast packets and can populate its multicast routing table. · To participate in IP multicasting, the multicast hosts, routers, and multilayer switch must have IGMP operating.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 297

Restrictions for Configuring IP Multicast Routing

IP Multicast Routing

Restrictions for Configuring IP Multicast Routing
The following are the restrictions for configuring IP multicast routing: · IP multicast routing is not supported on switches running the LAN Base feature set. · Layer 3 IPv6 multicast routing is not supported on the switch. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.
Information About IP Multicast Routing
IP multicasting is an efficient way to use network resources, especially for bandwidth-intensive services such as audio and video. IP multicast routing enables a host (source) to send packets to a group of hosts (receivers) anywhere within the IP network by using a special form of IP address called the IP multicast group address. The sending host inserts the multicast group address into the IP destination address field of the packet, and IP multicast routers and multilayer switches forward incoming IP multicast packets out all interfaces that lead to members of the multicast group. Any host, regardless of whether it is a member of a group, can send to a group. However, only the members of a group receive the message.
Cisco's Implementation of IP Multicast Routing
Cisco IOS software supports the following protocols to implement IP multicast routing: · Internet Group Management Protocol (IGMP) is used among hosts on a LAN and the routers (and multilayer switches) on that LAN to track the multicast groups of which hosts are members. · Protocol-Independent Multicast (PIM) protocol is used among routers and multilayer switches to track which multicast packets to forward to each other and to their directly connected LANs.
Note The switch does not support the Distance Vector Multicast Routing Protocol (DVMRP) nor the Cisco Group Management Protocol (CGMP).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 298

IP Multicast Routing

Multicast Forwarding Information Base Overview

Figure 13: IP Multicast Routing Protocols
The following figure shows where the Cisco-supported protocols for the switch operate within the IP multicast

environment. According to IPv4 multicast standards, the MAC destination multicast address begins with 0100:5e and is appended by the last 23 bits of the IP address. For example, if the IP destination address is 239.1.1.39, the MAC destination address is 0100:5e01:0127. A multicast packet is unmatched when the destination IPv4 address does not match the destination MAC address. The switch forwards the unmatched packet in hardware based upon the MAC address table. If the destination MAC address is not in the MAC address table, the switch floods the packet to the all port in the same VLAN as the receiving port. Related Topics
Configuring Basic IP Multicast Routing (CLI), on page 301
Multicast Forwarding Information Base Overview
The switch uses the Multicast Forwarding Information Base (MFIB) architecture and the Multicast Routing Information Base (MRIB) for IP multicast. The MFIB architecture provides both modularity and separation between the multicast control plane (Protocol Independent Multicast [PIM] and Internet Group Management Protocol [IGMP]) and the multicast forwarding plane (MFIB). This architecture is used in Cisco IOS IPv6 multicast implementations. MFIB itself is a multicast routing protocol independent forwarding engine; that is, it does not depend on PIM or any other multicast routing protocol. It is responsible for:
· Forwarding multicast packets · Registering with the MRIB to learn the entry and interface flags set by the control plane · Handling data-driven events that must be sent to the control plane · Maintaining counts, rates, and bytes of received, dropped, and forwarded multicast packets
The MRIB is the communication channel between MRIB clients. Examples of MRIB clients are PIM, IGMP, the multicast routing (mroute) table, and the MFIB.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 299

Multicast Group Concept

IP Multicast Routing

Related Topics Configuring IP Multicast Forwarding (CLI), on page 304
Multicast Group Concept
Multicast is based on the concept of a group. An arbitrary group of receivers expresses an interest in receiving a particular data stream. This group does not have any physical or geographical boundaries. The hosts can be located anywhere on the Internet. Hosts that are interested in receiving data flowing to a particular group must join the group using IGMP. Hosts must be a member of the group to receive the data stream. Related Topics
Configuring an IP Multicast Boundary (CLI), on page 310 Example: Configuring an IP Multicast Boundary, on page 316
Multicast Boundaries
Administratively-scoped boundaries can be used to limit the forwarding of multicast traffic outside of a domain or subdomain. This approach uses a special range of multicast addresses, called administratively-scoped addresses, as the boundary mechanism. If you configure an administratively-scoped boundary on a routed interface, multicast traffic whose multicast group addresses fall in this range cannot enter or exit this interface, which provides a firewall for multicast traffic in this address range.
Note Multicast boundaries and TTL thresholds control the scoping of multicast domains; however, TTL thresholds are not supported by the switch. You should use multicast boundaries instead of TTL thresholds to limit the forwarding of multicast traffic outside of a domain or a subdomain.
Figure 14: Administratively-Scoped Boundaries
The following figure shows that Company XYZ has an administratively-scoped boundary set for the multicast address range 239.0.0.0/8 on all routed interfaces at the perimeter of its network. This boundary prevents any multicast traffic in the range 239.0.0.0 through 239.255.255.255 from entering or leaving the network. Similarly, the engineering and marketing departments have an administratively-scoped boundary of 239.128.0.0/16 around the perimeter of their networks. This boundary prevents multicast traffic in the range of 239.128.0.0 through 239.128.255.255 from entering or leaving their respective

networks. You can define an administratively-scoped boundary on a routed interface for multicast group addresses. A standard access list defines the range of addresses affected. When a boundary is defined, no multicast data
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 300

IP Multicast Routing

Multicast Routing and Switch Stacks

packets are allowed to flow across the boundary from either direction. The boundary allows the same multicast group address to be reused in different administrative domains. The IANA has designated the multicast address range 239.0.0.0 to 239.255.255.255 as the administratively-scoped addresses. This range of addresses can then be reused in domains administered by different organizations. The addresses would be considered local, not globally unique. Related Topics
Configuring an IP Multicast Boundary (CLI), on page 310 Example: Configuring an IP Multicast Boundary, on page 316
Multicast Routing and Switch Stacks
For all multicast routing protocols, the entire stack appears as a single router to the network and operates as a single multicast router. In a switch stack, the active switch performs these functions:
· It is responsible for completing the IP multicast routing functions of the stack. It fully initializes and runs the IP multicast routing protocols.
· It builds and maintains the multicast routing table for the entire stack.
· It is responsible for distributing the multicast routing table to all stack members.
The stack members perform these functions: · They act as multicast routing standby devices and are ready to take over if there is a active switch failure. If the active switch fails, all stack members delete their multicast routing tables. The newly elected active switch starts building the routing tables and distributes them to the stack members.
· They do not build multicast routing tables. Instead, they use the multicast routing table that is distributed by the active switch.

Default Multicast Routing Configuration
This table describes the default multicast routing configuration for the switch.
Table 37: Default Multicast Routing Configuration

Feature Multicast routing

Default Setting Disabled on all interfaces.

How to Configure Basic IP Multicast Routing
Configuring Basic IP Multicast Routing (CLI)
You must enable IP multicast routing and configure the PIM version and mode. After performing these tasks, the software can then forward multicast packets, and the switch can populate its multicast routing table.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 301

Configuring Basic IP Multicast Routing (CLI)

IP Multicast Routing

You can configure an interface to be in PIM dense mode, sparse mode, or sparse-dense mode. The switch populates its multicast routing table and forwards multicast packets it receives from its directly connected LANs according to the mode setting. You must enable PIM in one of these modes for an interface to perform IP multicast routing.
Enabling PIM on an interface also enables IGMP operation on that interface.

Note If you enable PIM on multiple interfaces, when most of these interfaces are not on the outgoing interface list, and IGMP snooping is disabled, the outgoing interface might not be able to sustain line rate for multicast traffic because of the extra replication.

In populating the multicast routing table, dense-mode interfaces are always added to the table. Sparse-mode interfaces are added to the table only when periodic join messages are received from downstream devices or when there is a directly connected member on the interface.
When forwarding from a LAN, sparse-mode operation occurs if there is a rendezvous point (RP) known for the group. An RP acts as the meeting place for sources and receivers of multicast data. If an RP exists, the packets are encapsulated and sent toward the RP. When no RP is known, the packet is flooded in a dense-mode fashion. If the multicast traffic from a specific source is sufficient, the receiver's first-hop router might send join messages toward the source to build a source-based distribution tree.
By default, multicast routing is disabled, and there is no default mode setting.
This procedure is required.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip multicast-routing 4. interface interface-id 5. ip pim {dense-mode | sparse-mode | sparse-dense-mode} 6. end 7. show running-config 8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 302

IP Multicast Routing

Configuring Basic IP Multicast Routing (CLI)

Step 3

Command or Action ip multicast-routing Example:
Switch(config)# ip multicast-routing

Purpose
Enables IP multicast routing.
IP multicast routing is supported with Multicast Forwarding Information Base (MFIB) and Multicast Routing Information Base (MRIB).

Step 4 Step 5 Step 6

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Specifies the Layer 3 interface on which you want to enable multicast routing, and enters interface configuration mode.
The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218

These interfaces must have IP addresses assigned to them.

ip pim {dense-mode | sparse-mode | sparse-dense-mode} Enables a PIM mode on the interface.

Example:

By default, no mode is configured.

Switch(config-if)# ip pim sparse-dense-mode

The keywords have these meanings: · dense-mode--Enables dense mode of operation.

· sparse-mode--Enables sparse mode of operation. If you configure sparse mode, you must also configure an RP.

· sparse-dense-mode--Causes the interface to be treated in the mode in which the group belongs. Sparse-dense mode is the recommended setting.

· state-refresh--PM dense mode state-refresh configuration.

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 303

Configuring IP Multicast Forwarding (CLI)

IP Multicast Routing

Command or Action
Switch(config-if)# end

Step 7

show running-config Example:
Switch# show running-config

Step 8

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies your entries. (Optional) Saves your entries in the configuration file.

Related Topics Cisco's Implementation of IP Multicast Routing, on page 298
Configuring IP Multicast Forwarding (CLI)
You can use the following procedure to configure IPv4 Multicast Forwarding Information Base (MFIB) interrupt-level IP multicast forwarding of incoming packets or outgoing packets on the switch.

Note After you have enabled IP multicast routing by using the ip multicast-routing command, IPv4 multicast forwarding is enabled. Because IPv4 multicast forwarding is enabled by default, you can use the no form of the ip mfib command to disable IPv4 multicast forwarding.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip mfib 4. exit 5. show running-config 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 304

IP Multicast Routing

Configuring a Static Multicast Route (mroute) (CLI)

Command or Action
Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

ip mfib Example:
Switch(config)# ip mfib

Step 4

exit Example:
Switch(config)# exit

Step 5

show running-config Example:
Switch# show running-config

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enters the global configuration mode. Enables IP multicast forwarding. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file.

Related Topics Multicast Forwarding Information Base Overview , on page 299
Configuring a Static Multicast Route (mroute) (CLI)
You can use the following procedure to configure static mroutes. Static mroutes are similar to unicast static routes but differ in the following ways:
· Static mroutes are used to calculate RPF information, not to forward traffic.
· Static mroutes cannot be redistributed.
Static mroutes are strictly local to the switch on which they are defined. Because Protocol Independent Multicast (PIM) does not have its own routing protocol, there is no mechanism to distribute static mroutes throughout the network. Consequently, the administration of static mroutes tends to be more complicated than the administration of unicast static routes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 305

Configuring a Static Multicast Route (mroute) (CLI)

IP Multicast Routing

When static mroutes are configured, they are stored on the switch in a separate table referred to as the static mroute table. When configured, the ip mroute command enters a static mroute into the static mroute table for the source address or source address range specified for the source-address and mask arguments. Sources that match the source address or that fall in the source address range specified for the source-address argument will RPF to either the interface associated with the IP address specified for the rpf-address argument or the local interface on the switch specified for the interface-type and interface-number arguments. If an IP address is specified for the rpf-address argument, a recursive lookup is done from the unicast routing table on this address to find the directly connected neighbor.
If there are multiple static mroutes configured, the switch performs a longest-match lookup of the mroute table. When the mroute with the longest match (of the source-address) is found, the search terminates and the information in the matching static mroute is used. The order in which the static mroutes are configured is not important.
The administrative distance of an mroute may be specified for the optional distance argument. If a value is not specified for the distance argument, the distance of the mroute defaults to zero. If the static mroute has the same distance as another RPF source, the static mroute will take precedence. There are only two exceptions to this rule: directly connected routes and the default unicast route.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip mroute [vrf vrf-name] source-address mask { fallback-lookup {global | vrf vrf-name }[ protocol ]
{rpf-address | interface-type interface-number}} [distance] 4. exit 5. show running-config 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

ip mroute [vrf vrf-name] source-address mask {

The source IP address 10.1.1.1 is configured to be reachable

fallback-lookup {global | vrf vrf-name }[ protocol ]

through the interface associated with IP address 10.2.2.2.

{rpf-address | interface-type interface-number}} [distance]

Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 306

IP Multicast Routing

Configuring sdr Listener Support

Command or Action
Switch(configure)# ip mroute 10.1.1.1 255.255.255.255 10.2.2.2

Step 4

exit Example:
Switch(config)# exit

Step 5

show running-config Example:
Switch# show running-config

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Returns to privileged EXEC mode. (Optional) Verifies your entries. (Optional) Saves your entries in the configuration file.

Configuring sdr Listener Support
The MBONE is the small subset of Internet routers and hosts that are interconnected and capable of forwarding IP multicast traffic. Other multimedia content is often broadcast over the MBONE. Before you can join a multimedia session, you need to know what multicast group address and port are being used for the session, when the session is going to be active, and what sort of applications (audio, video, and so forth) are required on your workstation. The MBONE Session Directory Version 2 (sdr) tool provides this information. This freeware application can be downloaded from several sites on the World Wide Web, one of which is http://www.video.ja.net/mice/index.html.
SDR is a multicast application that listens to a well-known multicast group address and port for Session Announcement Protocol (SAP) multicast packets from SAP clients, which announce their conference sessions. These SAP packets contain a session description, the time the session is active, its IP multicast group addresses, media format, contact person, and other information about the advertised multimedia session. The information in the SAP packet is displayed in the SDR Session Announcement window.
Enabling sdr Listener Support (CLI)
By default, the switch does not listen to session directory advertisements.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. interface interface-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 307

Enabling sdr Listener Support (CLI)

IP Multicast Routing

4. ip sap listen 5. end 6. show running-config 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Step 4

ip sap listen Example:
Switch(config-if)# ip sap listen

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.
Specifies the interface to be enabled for sdr, and enters interface configuration mode. The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a configuration example, see Example: Interface Configuration as a Routed Port, on page 217
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218
These interfaces must have IP addresses assigned to them.
Enables the switch software to listen to session directory announcements.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 308

IP Multicast Routing

Limiting How Long an sdr Cache Entry Exists (CLI)

Step 5

Command or Action end Example:
Switch(config-if)# end

Step 6

show running-config Example:
Switch# show running-config

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Limiting How Long an sdr Cache Entry Exists (CLI)
By default, entries are never deleted from the sdr cache. You can limit how long the entry remains active so that if a source stops advertising SAP information, old advertisements are not unnecessarily kept.
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. ip sap cache-timeout minutes 4. end 5. show running-config 6. show ip sap 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:

Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 309

Configuring an IP Multicast Boundary (CLI)

IP Multicast Routing

Command or Action
Switch# configure terminal

Step 3

ip sap cache-timeout minutes Example:
Switch(config)# ip sap cache-timeout 30

Step 4

end Example:
Switch(config)# end

Step 5

show running-config Example:
Switch# show running-config

Step 6

show ip sap Example:
Switch# show ip sap

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Limits how long a Session Announcement Protocol (SAP) cache entry stays active in the cache. By default, entries are never deleted from the cache. For minutes, the range is 1 to 1440 minutes (24 hours). Returns to privileged EXEC mode.
Verifies your entries.
Displays the SAP cache.
(Optional) Saves your entries in the configuration file.

Configuring an IP Multicast Boundary (CLI)
This procedure is optional.

SUMMARY STEPS

1. enable 2. configure terminal 3. access-list {access-list-number 1-99 | access-list-number 100-199 | access-list-number 1300-1999
|access-list-number 2000-2699 | dynamic-extended | rate-limit} 4. interface interface-id 5. ip multicast boundary access-list-number 6. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 310

IP Multicast Routing

Configuring an IP Multicast Boundary (CLI)

7. show running-config 8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3 Step 4

access-list {access-list-number 1-99 | access-list-number Creates a standard access list, repeating the command as

100-199 | access-list-number 1300-1999

many times as necessary.

|access-list-number 2000-2699 | dynamic-extended | rate-limit}

· For access-list-number, the ranges are as follows:

Example:

· access-list-number 1--99 (IP standard access list)

· access-list-number 100--199 ( IP extended access

Switch(config)# access-list 99 permit any

list)

· access-list-number 1300--1999 (IP standard access list - expanded range)

· access-list-number 2000--2699 (IP extended access list - expanded range)

· The dynamic-extended keyword extends the dynamic ACL absolute timer.
· The rate-limit keyword permits a simple rate-limit specific access list.

interface interface-id Example:
Switch(config)# interface gigabitEthernet1/0/1

The access list is always terminated by an implicit deny statement for everything.
Specifies the interface to be configured, and enters interface configuration mode.
The specified interface must be one of the following:
· A routed port--A physical port that has been configured as a Layer 3 port by entering the no switchport interface configuration command. You will also need to enable IP PIM sparse-dense-mode on the interface, and join the interface as a statically connected member to an IGMP static group. For a

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 311

Configuring an IP Multicast Boundary (CLI)

IP Multicast Routing

Command or Action

Step 5

ip multicast boundary access-list-number Example:
Switch(config-if)# ip multicast boundary 99

Step 6

end Example:
Switch(config-if)# end

Step 7

show running-config Example:
Switch# show running-config

Purpose configuration example, see Example: Interface Configuration as a Routed Port, on page 217
· An SVI--A VLAN interface created by using the interface vlan vlan-id global configuration command. You will also need to enable IP PIM sparse-dense-mode on the VLAN, join the VLAN as a statically connected member to an IGMP static group, and then enable IGMP snooping on the VLAN, the IGMP static group, and physical interface. For a configuration example, see Example: Interface Configuration as an SVI, on page 218
These interfaces must have IP addresses assigned to them.
Configures the boundary, specifying the access list you created in Step 2. Additional command options include:
· For access-list-number, the ranges are as follows: · access-list-number 1--99 (IP standard access list) · access-list-number 100--199 ( IP extended access list) · access-list-number 1300--1999 (IP standard access list - expanded range) · access-list-number 2000--2699 (IP extended access list - expanded range)
· Word--IP named access list. · filter-autorp--Filter AutoRP packet contents. · in--Restrict (s,g) creation when this interface is the
RPF. · out--Restrict interface addition to outgoing list.
Returns to privileged EXEC mode.
Verifies your entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 312

IP Multicast Routing

Monitoring and Maintaining IP Multicast Routing

Step 8

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

What to do next
Proceed to the other supported IP multicast routing procedures.
Related Topics Multicast Boundaries, on page 300 Multicast Group Concept, on page 300 Example: Configuring an IP Multicast Boundary, on page 316

Monitoring and Maintaining IP Multicast Routing

Clearing Caches, Tables, and Databases
You can remove all contents of a particular cache, table, or database. Clearing a cache, table, or database might be necessary when the contents of the particular structure are or suspected to be invalid. You can use any of the privileged EXEC commands in the following table to clear IP multicast caches, tables, and databases.
Table 38: Commands for Clearing Caches, Tables, and Databases

Command

Purpose

clear ip igmp group {group [ hostname | IP address] Deletes entries from the IGMP cache. | vrf name group [ hostname | IP address] }

clear ip mfib { counters [group | source] | global Clears all active IPv4 Multicast Forwarding

counters [group | source] | vrf * }

Information Base (MFIB) traffic counters.

clear ip mrm {status-report [ source ] }

IP multicast routing clear commands.

clear ip mroute { * | [hostname | IP address] | vrf Deletes entries from the IP multicast routing table. name group [ hostname | IP address] }

clear ip msdp { peer | sa-cache | statistics | vrf } Clears the Multicast Source Discovery Protocol (MSDP) cache.

clear ip multicast { limit | redundancy statistics } Clears the IP multicast information.

clear ip pim { df [ int | rp rp address ] | interface | Clears the PIM cache. rp-mapping [rp address] | vrf vpn name { df | interface | rp-mapping }

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 313

Displaying System and Network Statistics

IP Multicast Routing

Command clear ip sap [group-address | "session-name"]

Purpose
Deletes the Session Directory Protocol Version 2 cache or an sdr cache entry.

Displaying System and Network Statistics
You can display specific statistics, such as the contents of IP routing tables, caches, and databases.

Note This release does not support per-route statistics.

You can display information to learn resource usage and solve network problems. You can also display information about node reachability and discover the routing path that packets of your device are taking through the network.
You can use any of the privileged EXEC commands in the following table to display various routing statistics.
Table 39: Commands for Displaying System and Network Statistics

Command

Purpose

ping [group-name | group-address]

Sends an ICMP Echo Request to a multicast group address.

show ip igmp filter

Displays IGMP filter information.

show ip igmp groups [type-number | detail ]

Displays the multicast groups that are directly connected to the switch and that were learned through IGMP.

show ip igmp interface [type number]

Displays multicast-related information about an interface.

show ip igmp membership [ name/group address | Displays IGMP membership information for

all | tracked ]

forwarding.

show ip igmp profile [ profile_number]

Displays IGMP profile information.

show ip igmp ssm-mapping [ hostname/IP address Displays IGMP SSM mapping information. ]

show ip igmp static-group {class-map [ interface Displays static group information. [ type ] ]

show ip igmp vrf

Displays the selected VPN Routing/Forwarding instance by name.

show ip mfib [ type number ]

Displays the IP multicast forwarding information base.

show ip mrib { client | route | vrf }

Displays the multicast routing information base.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 314

IP Multicast Routing

Displaying System and Network Statistics

Command

Purpose

show ip mrm { interface | manager | status-report Displays the IP multicast routing monitor information. }

show ip mroute [group-name | group-address] [source] [ count | interface | proxy | pruned | summary | verbose]

Displays the contents of the IP multicast routing table.

show ip msdp { count | peer | rpf-peer | sa-cache | Displays the Multicast Source Discovery Protocol

summary | vrf }

(MSDP) information.

show ip multicast [ interface | limit | mpls | redundancy | vrf ]

Displays global multicast information.

show ip pim interface [type number] [count | detail Displays information about interfaces configured for

| df | stats ]

PIM. This command is available in all software

images.

show ip pim all-vrfs { tunnel }

Display all VRFs.

show ip pim autorp

Display global auto-RP information.

show ip pim boundary [ type number ]

Displays boundary information.

show ip pim bsr-router

Display bootstrap router information (version 2).

show ip pim interface [ type number ]

Displays PIM interface information.

show ip pim mdt [ bgp ]

Displays multicast tunnel information.

show ip pim neighbor [type number]

Lists the PIM neighbors discovered by the switch. This command is available in all software images.

show ip pim rp [group-name | group-address]

Displays the RP routers associated with a sparse-mode multicast group. This command is available in all software images.

show ip pim rp-hash [group-name | group-address] Displays the RP to be chosen based upon the group selected.

show ip pim tunnel [ tunnel | verbose ]

Displays the registered tunnels.

show ip pim vrf name

Displays VPN routing and forwarding instances.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 315

Monitoring IP Multicast Routing

IP Multicast Routing

Command show ip rpf {source-address | name}
show ip sap [group | "session-name" | detail]

Purpose
Displays how the switch is doing Reverse-Path Forwarding (that is, from the unicast routing table, DVMRP routing table, or static mroutes). Command parameters include:
· Host name or IP address--IP name or group address.
· Select--Group-based VRF select information. · vrf--Selects VPN Routing/Forwarding instance.
Displays the Session Announcement Protocol (SAP) Version 2 cache. Command parameters include:
· A.B.C.D--IP group address. · WORD--Session name (in double quotes). · detail--Session details.

Monitoring IP Multicast Routing
You can use the privileged EXEC commands in the following table to monitor IP multicast routers, packets, and paths.
Table 40: Commands for Monitoring IP Multicast Routing

Command mrinfo { [hostname | address] | vrf }
mstat { [hostname | address] | vrf } mtrace { [hostname | address] | vrf }

Purpose
Queries a multicast router or multilayer switch about which neighboring multicast devices are peering with it.
Displays IP multicast packet rate and loss information.
Traces the path from a source to a destination branch for a multicast distribution tree for a given group.

Configuration Examples for IP Multicast Routing
Example: Configuring an IP Multicast Boundary
This example shows how to set up a boundary for all administratively-scoped addresses:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 316

IP Multicast Routing

Example: Responding to mrinfo Requests

Switch(config)# access-list 1 deny 239.0.0.0 0.255.255.255 Switch(config)# access-list 1 permit 224.0.0.0 15.255.255.255 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip multicast boundary 1
Related Topics Configuring an IP Multicast Boundary (CLI), on page 310 Multicast Boundaries, on page 300 Multicast Group Concept, on page 300
Example: Responding to mrinfo Requests
The software answers mrinfo requests sent by mrouted systems and Cisco routers and multilayer switches. The software returns information about neighbors through DVMRP tunnels and all the routed interfaces. This information includes the metric (always set to 1), the configured TTL threshold, the status of the interface, and various flags. You can also use the mrinfo privileged EXEC command to query the router or switch itself, as in this example:
Switch# mrinfo 171.69.214.27 (mm1-7kd.cisco.com) [version cisco 11.1] [flags: PMS]: 171.69.214.27 -> 171.69.214.26 (mm1-r7kb.cisco.com) [1/0/pim/querier] 171.69.214.27 -> 171.69.214.25 (mm1-45a.cisco.com) [1/0/pim/querier] 171.69.214.33 -> 171.69.214.34 (mm1-45c.cisco.com) [1/0/pim] 171.69.214.137 -> 0.0.0.0 [1/0/pim/querier/down/leaf] 171.69.214.203 -> 0.0.0.0 [1/0/pim/querier/down/leaf] 171.69.214.18 -> 171.69.214.20 (mm1-45e.cisco.com) [1/0/pim] 171.69.214.18 -> 171.69.214.19 (mm1-45c.cisco.com) [1/0/pim] 171.69.214.18 -> 171.69.214.17 (mm1-45a.cisco.com) [1/0/pim]
Where to Go Next for IP Multicast
You can configure the following: · IGMP
· Wireless Multicast
· PIM
· SSM
· Service Discovery Gateway

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 317

Additional References

IP Multicast Routing

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage information IP Multicast Routing Command Reference (Catalyst 3650

for the commands used in this chapter.

Switches)

For information on configuring the Multicast Routing Command Reference (Catalyst 3650 Switches) Source Discovery Protocol (MSDP).

Platform-independent configuration information

· IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: IGMP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
· IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC RFC 1112 RFC 2236
RFC 4601

Title
Host Extensions for IP Multicasting
Internet Group Management Protocol, Version 2
Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 318

IP Multicast Routing

Feature History and Information for IP Multicast

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for IP Multicast

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 319

Feature History and Information for IP Multicast

IP Multicast Routing

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 320

1 8 C H A P T E R
Configuring the Service Discovery Gateway
· Finding Feature Information, on page 321 · Restrictions for Configuring the Service Discovery Gateway, on page 321 · Information about the Service Discovery Gateway and mDNS, on page 322 · How to Configure the Service Discovery Gateway, on page 325 · Monitoring Service Discovery Gateway, on page 332 · Configuration Examples, on page 332 · Where to Go Next for Configuring Services Discovery Gateway, on page 335 · Additional References, on page 335 · Feature History and Information for Services Discovery Gateway, on page 336
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Configuring the Service Discovery Gateway
The following are restrictions for configuring the Service Discovery Gateway: · The Service Discovery Gateway does not support topologies with multiple hops. All network segments must be connected directly to it. The Service Discovery Gateway can learn services from all connected segments to build its cache and respond to requests acting as a proxy.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 321

Information about the Service Discovery Gateway and mDNS

IP Multicast Routing

Information about the Service Discovery Gateway and mDNS

mDNS

mDNS was defined to achieve zero configuration, with zero configuration being defined as providing the following features:
· Addressing--Allocating IP addresses to hosts
· Naming--Using names to refer to hosts instead of IP addresses
· Service discovery--Finding services automatically on the network

With mDNS, network users no longer have to assign IP addresses, assign host names, or type in names to access services on the network. Users only need to ask to see what network services are available, and choose from a list.
With mDNS, addressing is accomplished through the use of DHCP/DHCPv6 or IPv4 and IPv6 Link Local scoped addresses. The benefit of zero-configuration occurs when no infrastructure services such as DHCP or DNS are present and self-assigned link-local addressing can be used. The client can then select a random IPv4 address in the link-local range (169.254.0.0/24) or use its IPv6 link-local address (FE80::/10) for communication.
With mDNS, naming (name-to-address translation on a local network using mDNS) queries are sent over the local network using link-local scoped IP multicast. Because these DNS queries are sent to a multicast address (IPv4 address 224.0.0.251 or IPv6 address FF02::FB), no single DNS server with global knowledge is required to answer the queries. When a service or device sees a query for any service it is aware of, it provides a DNS response with the information from its cache.
With mDNS, service discovery is accomplished by browsing. An mDNS query is sent out for a given service type and domain, and any device that is aware of matching services replies with service information. The result is a list of available services for the user to choose from.
The mDNS protocol (mDNS-RFC), together with DNS Service Discovery (DNS-SD-RFC) achieves the zero-configuration addressing, naming, and service discovery.

mDNS-SD

Multicast DNS Service Discovery (mDNS-SD) uses DNS protocol semantics and multicast over well-known multicast addresses to achieve zero configuration service discovery. DNS packets are sent to and received on port 5353 using a multicast address of 224.0.0.251 and its IPv6 equivalent FF02::FB.
Because mDNS uses a link-local multicast address, its scope is limited to a single physical or logical LAN. If the networking reach needs to be extended to a distributed campus or to a wide-area environment consisting of many different networking technologies, mDNS gateway is implemented. An mDNS gateway provides a transport for mDNS packets across Layer 3 boundaries by filtering, caching, and redistributing services from one Layer 3 domain to another.

mDNS-SD Considerations for Wireless Clients · mDNS packets can be sent out of Layer 3 interfaces that might not have an IP address.
· Packets with mDNS multicast IP and multicast MAC are sent on a multicast CAPWAP tunnel, if multicast-multicast mode is enabled. A multicast CAPWAP tunnel is a special CAPWAP tunnel used

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 322

IP Multicast Routing

Service Discovery Gateway

for reducing the number of copies of multicast packet that are required to be generated for each AP CAPWAP tunnel. Sending packets on the multicast CAPWAP tunnel requires the outer IP header to be destined to the multicast CAPWAP tunnel's address, which all APs are subscribed to. · All mDNS packet handling is done at a foreign switch for roamed clients. A foreign switch is the new switch that a roamed wireless client is actually attached to, which is called the point of attachment.
Service Discovery Gateway
The Service Discovery Gateway feature enables multicast Domain Name System (mDNS) to operate across Layer 3 boundaries (different subnets). An mDNS gateway provides transport for service discovery across Layer 3 boundaries by filtering, caching, and redistributing services from one Layer 3 domain (subnet) to another. Prior to implementation of this feature, mDNS was limited in scope to within a subnet because of the use of link-local scoped multicast addresses. This feature enhances Bring Your Own Device (BYOD). Related Topics
Configuring the Service List (CLI), on page 325 Example: Creating a Service-List, Applying a Filter and Configuring Parameters, on page 333 Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Example: Specify Alternative Source Interface for Outgoing mDNS Packets, on page 332 Example: Redistribute Service Announcements, on page 333 Example: Disable Bridging of mDNS Packets to Wireless Clients, on page 333 Example: Enabling mDNS Gateway and Redistributing Services, on page 333 Example: Global mDNS Configuration, on page 334 Example: Interface mDNS Configuration, on page 334
mDNS Gateway and Subnets
You need to enable an mDNS gateway for service discovery to operate across subnets. You can enable mDNS gateway for a device or for an interface.
Note You need to configure service routing globally before configuring at the interface level.
After the device or interface is enabled, you can redistribute service discovery information across subnets. You can create service policies and apply filters on either incoming service discovery information (called IN-bound filtering) or outgoing service discovery information (called OUT-bound filtering).
Note If redistribution is enabled globally, global configuration is given higher priority than interface configuration.
Figure 15: Sample Networking Scenario
For example, if the mDNS gateway functionality is enabled on the router in this figure, then service information can be sent from one subnet to another and vice-versa. For example, the printer and fax service information being advertised in the network with IP address 192.0.2.6 are redistributed to the network with IP address 198.51.100.4. The printer and fax service information in the network with IP address 192.0.2.6 is learned by

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 323

Filtering
mDNS-enabled hosts and devices in the other network.

IP Multicast Routing

Filtering

After configuring the mDNS gateway and subnets, you can filter services that you want to redistribute. While creating a service list, the permit or deny command options are used:
· The permit command option allows you to permit or transport specific service list information.
· The deny option allows you to deny service list information that is available to be transported to other subnets.
You need to include a sequence number when using the permit or deny command option. The same service list name can be associated with multiple sequence numbers and each sequence number will be mapped to a rule.

Note If no filters are configured, then the default action is to deny service list information to be transported through the device or interface.
Query is another option provided when creating service lists. You can create queries using a service list. If you want to browse for a service, then active queries can be used. This function is helpful to keep the records refreshed in the cache.

Note Active queries can only be used globally and cannot be used at the interface level.
A service end-point (such as a printer or fax) sends unsolicited announcements when a service starts up. After that, it sends unsolicited announcements whenever a network change event occurs (such as an interface coming up or going down). The device always respond to queries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 324

IP Multicast Routing

How to Configure the Service Discovery Gateway

After creating a service list and using the permit or deny command options, you can filter using match statements (commands) based on service-instance, service-type, or message-type (announcement or query).
Related Topics Configuring the Service List (CLI), on page 325 Example: Creating a Service-List, Applying a Filter and Configuring Parameters, on page 333 Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Example: Specify Alternative Source Interface for Outgoing mDNS Packets, on page 332 Example: Redistribute Service Announcements, on page 333 Example: Disable Bridging of mDNS Packets to Wireless Clients, on page 333 Example: Enabling mDNS Gateway and Redistributing Services, on page 333 Example: Global mDNS Configuration, on page 334 Example: Interface mDNS Configuration, on page 334

How to Configure the Service Discovery Gateway

Configuring the Service List (CLI)
This procedure describes how to create a service list, apply a filter for the service list, and configure parameters for the service list name.

SUMMARY STEPS

1. enable 2. configure terminal 3. service-list mdns-sd service-list-name {deny sequence-number | permit sequence-number | query} 4. match message-type {announcement | any | query} 5. match service-instance { LINE } 6. match service-type {LINE } 7. end

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 325

Configuring the Service List (CLI)

IP Multicast Routing

Step 3 Step 4

Command or Action

Purpose

service-list mdns-sd service-list-name {deny sequence-number | permit sequence-number | query}

Enters mDNS service discovery service list mode. In this mode, you can:

Example:
Switch(config)# service-list mdns-sd sl1 permit 3

· Create a service list and apply a filter on the service list according to the permit or deny option applied to the sequence number.

Switch(config)# service-list mdns-sd sl4 query

· Create a service list and associate a query for the service list name if the query option is used.

Note The sequence number sets the priority of the rule. A rule with a lower sequence number is selected first and the service announcement or query is allowed or denied accordingly. You define the sequence number as per your network requirements.

match message-type {announcement | any | query} Example:
Switch(config-mdns-sd-sl)# match message-type announcement

(Optional) Sets the message type to match. You can match the following message types:
· announcement
· any
· query

These commands configure the parameters for the service list name that is created in step 2.
If the match message-type is an announcement, then the service list rule only allows service advertisements or announcements for the device. If the match message-type is a query, then only a query from the client for a certain service in the network is allowed.
Multiple service maps of the same name with different sequence numbers can be created and the evaluation of the filters will be ordered on the sequence number. Service lists are an ordered sequence of individual statements, each one has a permit or deny result. Evaluation of service list consists of a list scan, in a predetermined order, and an evaluation of the criteria of each statement that matches. A list scan is stopped once the first statement match is found and an action permit/deny associated with the statement match is performed. The default action after scanning through the entire list is to deny.
Note You cannot use the match command if you have used the query option in the previous step. The match command can be used only for the permit or deny option.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 326

IP Multicast Routing

Configuring Service List (GUI)

Step 5 Step 6 Step 7

Command or Action

Purpose

match service-instance { LINE }

(Optional) Sets the service instance to match.

Example:

This command configures the parameters for the service

list name that is created in step 2.

Switch(config-mdns-sd-sl)## servInst 1

match service-instance Note

You cannot use the match command if you have used the query option in the previous step. The

match command can be used only for the permit

or deny option.

match service-type {LINE } Example:
Switch(config-mdns-sd-sl)# match service-type _ipp._tcp

(Optional) Sets the value of the mDNS service type string to match.
This command configures the parameters for the service list name that is created in step 2.
Note You cannot use the match command if you have used the query option in the previous step. The match command can be used only for the permit or deny option.

end Example:
Switch(config-mdns-sd-sl)# end

Returns to privileged EXEC mode.

What to do next
Proceed to enable the mDNS gateway and redistribution of services.
Related Topics Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Creating a Service-List, Applying a Filter and Configuring Parameters, on page 333

Configuring Service List (GUI)

SUMMARY STEPS

1. Choose Configuration > Controller > mDNS > Service List. 2. Click Create Service. 3. In the Service List Name text box, enter the service list name. 4. From the Service rule drop-down list, choose from the following options:
· permit--permits the service list. · deny--denies the service list.
5. In the Sequence number text box, enter the priority of the rule. 6. From the Message type drop-down list, choose the message type to match from the following options:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 327

Configuring Service List (GUI)

IP Multicast Routing

DETAILED STEPS

· announcement--The service list rule allows only service advertisements or announcements for the device.
· query--The service list rule allows only a query from the client for a service in the network. · any--The service list rule allows any type of message.
7. In the Service instance text box, enter the service instance to match. 8. In the Custom text box, enter the mDNS service type string to match. 9. Click Apply. 10. Click Save Configuration.

Step 1 Step 2 Step 3 Step 4
Step 5 Step 6
Step 7 Step 8
Step 9 Step 10

Choose Configuration > Controller > mDNS > Service List. Click Create Service. The Service List > Create Service page is displayed. In the Service List Name text box, enter the service list name. From the Service rule drop-down list, choose from the following options:
· permit--permits the service list. · deny--denies the service list.
In the Sequence number text box, enter the priority of the rule. A rule with a lower sequence number is selected first and the service announcement or query is allowed or denied accordingly. You define the sequence number as per your network requirements.
From the Message type drop-down list, choose the message type to match from the following options:
· announcement--The service list rule allows only service advertisements or announcements for the device. · query--The service list rule allows only a query from the client for a service in the network. · any--The service list rule allows any type of message.
Multiple service maps of the same name with different sequence numbers can be created and the evaluation of the filters will be ordered on the sequence number. Service lists are an ordered sequence of individual statements, each one has a permit or deny result. Evaluation of service list consists of a list scan, in a predetermined order, and an evaluation of the criteria of each statement that matches. A list scan is stopped once the first statement match is found and an action permit/deny associated with the statement match is performed. The default action after scanning through the entire list is to deny.
In the Service instance text box, enter the service instance to match. In the Custom text box, enter the mDNS service type string to match. The Learned Service box shows the services that are added after enabling the learned service type configured by navigating to Configuration > Controller > mDNS > Global. For example, _roap._tcp.local. The Selected Service box shows the learned service that you have selected for an mDNS service.
Click Apply. Click Save Configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 328

IP Multicast Routing

Enabling mDNS Gateway and Redistributing Services (CLI)

What to do next Proceed to enable the mDNS gateway and redistribution of services.
Enabling mDNS Gateway and Redistributing Services (CLI)
After enabling mDNS gateway for a device, you can apply filters (apply IN-bound filtering or OUT-bound filtering) and active queries by using service-policy and service-policy-query commands, respectively. You can redistribute services and service announcements using the redistribute mdns-sd command, and set some part of the system memory for cache using the cache-memory-max command.

Note By default, mDNS gateway is disabled on all interfaces.

SUMMARY STEPS

1. enable 2. configure terminal 3. service-routing mdns-sd 4. service-policy service-policy-name {IN | OUT} 5. redistribute mdns-sd 6. cache-memory-max cache-config-percentage 7. service-policy-query service-list-query-name service-list-query-periodicity 8. exit 9. wireless multicast 10. no wireless mdns-bridging 11. end

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Switch> enable

Step 2

configure terminal Example:
Switch# configure terminal

Enters the global configuration mode.

Step 3

service-routing mdns-sd Example:
Switch (config)# service-routing mdns-sd

Enables mDNS gateway functionality for a device and enters multicast DNS configuration (config-mdns) mode.
Note This command enables the mDNS function globally.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 329

Enabling mDNS Gateway and Redistributing Services (CLI)

IP Multicast Routing

Step 4

Command or Action

Purpose
Note Enter the service-routing mdns-sd source-interface if-name command in either global-config or interface-config mode, to specify an alternate source interface for outgoing mDNS packets, so its IP address can be used when there is none configured on the outgoing interface.

service-policy service-policy-name {IN | OUT}

(Optional) For a service list, applies a filter on incoming

Example:

service discovery information (IN-bound filtering) or outgoing service discovery information (OUT-bound

filtering).
Switch (config-mdns)# service-policy serv-pol1 IN

Step 5

redistribute mdns-sd Example:
Switch (config-mdns)# redistribute mdns-sd

Step 6

cache-memory-max cache-config-percentage Example:
Switch (config-mdns)# cache-memory-max 20

Step 7 Step 8 Step 9

service-policy-query service-list-query-name service-list-query-periodicity Example:
Switch (config-mdns)# service-policy-query sl-query1 100
exit Example:
Switch (config-mdns)#exit
wireless multicast Example:
Switch (config)# wireless multicast

(Optional) Redistributes services or service announcements across subnets. Note If redistribution is enabled globally, global
configuration is given higher priority than interface configuration. (Optional) Sets some part of the system memory (in percentage) for cache. Note By default, 10 percent of the system memory is set aside for cache. You can override the default value by using this command. (Optional) Configures service list-query periodicity.
(Optional) Returns to global configuration mode.
(Optional) Enables wireless Ethernet multicast support.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 330

IP Multicast Routing

Enabling Multicast DNS Gateway (GUI)

Step 10

Command or Action no wireless mdns-bridging Example:

Purpose
(Optional) Disables bridging of mDNS packets to wireless clients.

Switch (config)# no wireless mdns-bridging

Step 11

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Related Topics Service Discovery Gateway , on page 323 Filtering, on page 324 Example: Specify Alternative Source Interface for Outgoing mDNS Packets, on page 332 Example: Redistribute Service Announcements, on page 333 Example: Disable Bridging of mDNS Packets to Wireless Clients, on page 333 Example: Enabling mDNS Gateway and Redistributing Services, on page 333 Example: Global mDNS Configuration, on page 334 Example: Interface mDNS Configuration, on page 334

Enabling Multicast DNS Gateway (GUI)

SUMMARY STEPS

1. Choose Configuration > Controller > mDNS > Global. 2. Select the mDNS gateway check box. 3. From the Learn Service drop-down list, choose from the following options:
· Enable-- Allows the switch to learn all the announced services. It is used to learn services by enabling all announcement/queries by using Service Policy IN of type GUI-permit-all and in Service Policy OUT of type GUI-deny-all.
· Disable-- Denies all the traffics IN and OUT. It is used to deny services by disabling all announcement/queries by using Service Policy IN of type GUI-deny-all and in Service Policy OUT of type GUI-deny-all.
· Custom-- You can set your own IN and OUT policy. It allows you to define a custom service list.
4. Click Apply. 5. Click Save Configuration.

DETAILED STEPS

Step 1 Choose Configuration > Controller > mDNS > Global.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 331

Monitoring Service Discovery Gateway

IP Multicast Routing

Step 2 Step 3
Step 4 Step 5

The Global Service Rules page is displayed.
Select the mDNS gateway check box. From the Learn Service drop-down list, choose from the following options:
· Enable-- Allows the switch to learn all the announced services. It is used to learn services by enabling all announcement/queries by using Service Policy IN of type GUI-permit-all and in Service Policy OUT of type GUI-deny-all.
· Disable-- Denies all the traffics IN and OUT. It is used to deny services by disabling all announcement/queries by using Service Policy IN of type GUI-deny-all and in Service Policy OUT of type GUI-deny-all.
· Custom-- You can set your own IN and OUT policy. It allows you to define a custom service list.
Click Apply. Click Save Configuration.

Monitoring Service Discovery Gateway

Table 41: Monitoring Service Discovery Gateway

Command

Purpose

show mdns requests [detail | name record-name| type record-type [ name record-name]]

This command displays information for outstanding mDNS requests, including record name and record type information.

show mdns cache [interface type number | name This command displays mDNS cache information. record-name [type record-type]| type record-type]

show mdns statistics {all | service-list list-name | This command displays mDNS statistics. service-policy {all | interface type number }}

Configuration Examples
Example: Specify Alternative Source Interface for Outgoing mDNS Packets
The following example displays how to specify an alternate source interface for outgoing mDNS packets, so its IP address can be used when there is none configured on the outgoing interface.
Switch(config)# service-routing mdns-sd Switch(config-mdns)# source-interface if-name
Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 332

IP Multicast Routing

Example: Redistribute Service Announcements

Example: Redistribute Service Announcements
The following example displays how to redistribute service announcements received on one interface over all the interfaces or over a specific interface.
Switch(config)# service-routing mdns-sd Switch(config-mdns)# Redistribute mdns-sd if-name
Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324
Example: Disable Bridging of mDNS Packets to Wireless Clients
The following example displays how to disable bridging of mDNS packets to wireless clients.
Switch(config)# wireless multicast Switch(config)# no wireless mdns-bridging
Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324
Example: Creating a Service-List, Applying a Filter and Configuring Parameters
The following example shows the creation of a service-list sl1. The permit command option is being applied on sequence number 3 and all services with message-type announcement are filtered and available for transport across various subnets associated with the device.
Switch# configure terminal Switch(config)# service-list mdns-sd sl1 permit 3 Switch(config-mdns-sd-sl)#match message-type announcement Switch(config-mdns)# exit
Related Topics Configuring the Service List (CLI), on page 325 Service Discovery Gateway , on page 323 Filtering, on page 324
Example: Enabling mDNS Gateway and Redistributing Services
The following example shows how to enable an mDNS gateway for a device and enable redistribution of services across subnets. IN-bound filtering is applied on the service-list serv-pol1. Twenty percent of system memory is made available for cache and service-list-query periodicity is configured at 100 seconds.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 333

Example: Global mDNS Configuration

IP Multicast Routing

Switch# configure terminal Switch# service-routing mdns-sd Switch(config-mdns)# service-policy serv-pol1 IN Switch(config-mdns)# redistribute mdns-sd Switch(config-mdns)# cache-memory-max 20 Switch(config-mdns)# service-policy-query sl-query1 100 Switch(config-mdns)# exit
Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324
Example: Global mDNS Configuration
The following example displays how to globally configure mDNS.
Switch# configure terminal Switch(config)# service-list mdns-sd mypermit-all permit 10 Switch(config-mdns-sd-s1)# exit Switch(config)# service-list mdns-sd querier query Switch(config-mdns-sd-s1)# service-type _dns._udp Switch(config-mdns-sd-s1)# end Switch# configure terminal Switch(config)# service-routing mdns-sd Switch(config-mdns)# service-policy mypermit-all IN Switch(config-mdns)# service-policy mypermit-all OUT
Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324
Example: Interface mDNS Configuration
The following example displays how to configure mDNS for an interface.
Switch(config)#interface Vlan136 Switch(config-if)# description *** Mgmt VLAN *** Switch(config-if)# ip address 9.7.136.10 255.255.255.0 Switch(config-if)# ip helper-address 9.1.0.100 Switch(config-if)# service-routing mdns-sd Switch(config-if-mdns-sd)# service-policy mypermit-all IN Switch(config-if-mdns-sd)# service-policy mypermit-all OUT Switch(config-if-mdns-sd)# service-policy-query querier 60
Related Topics Enabling mDNS Gateway and Redistributing Services (CLI), on page 329 Service Discovery Gateway , on page 323 Filtering, on page 324
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 334

IP Multicast Routing

Where to Go Next for Configuring Services Discovery Gateway

Where to Go Next for Configuring Services Discovery Gateway
You can configure the following: · IGMP · Wireless Multicast · PIM · SSM · IP Multicast Routing

Additional References

Related Documents Related Topic Configuring DNS
DNS conceptual information
Platform-independent configuration information

Document Title
IP Addressing: DNS Configuration Guide, Cisco IOS XE Release 3SE
'Information About DNS' section in IP Addressing: DNS Configuration Guide, Cisco IOS XE Release 3SE
IP Addressing: DNS Configuration Guide, Cisco IOS XE Release 3SE

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC RFC 6763

Title DNS-Based Service Discovery

Multicast DNS Internet-Draft Multicast

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 335

Feature History and Information for Services Discovery Gateway

IP Multicast Routing

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Services Discovery Gateway

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 336

V P A R T
IPv6
· Configuring MLD Snooping, on page 339 · Configuring IPv6 Unicast Routing, on page 353 · Configuring IPv6 Client IP Address Learning, on page 383 · Configuring IPv6 WLAN Security, on page 407 · Configuring IPv6 ACL, on page 429 · Configuring IPv6 Web Authentication , on page 447 · Configuring IPv6 Client Mobility, on page 459 · Configuring IPv6 Mobility, on page 467 · Configuring IPv6 NetFlow, on page 473

1 9 C H A P T E R
Configuring MLD Snooping
This module contains details of configuring MLD snooping · Finding Feature Information, on page 339 · Information About Configuring IPv6 MLD Snooping, on page 339 · How to Configure IPv6 MLD Snooping, on page 343 · Displaying MLD Snooping Information, on page 351 · Configuration Examples for Configuring MLD Snooping, on page 351
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring IPv6 MLD Snooping
You can use Multicast Listener Discovery (MLD) snooping to enable efficient distribution of IP Version 6 (IPv6) multicast data to clients and routers in a switched network on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack.
Note To use IPv6 on a Catalyst 2960-XR switch, you must configure the dual IPv4 and IPv6 Switch Database Management (SDM) template on the switch.
Note For complete syntax and usage information for the commands used in this chapter, see the command reference for this release or the Cisco IOS documentation referenced in the procedures.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 339

IPv6 Understanding MLD Snooping
Understanding MLD Snooping
In IP Version 4 (IPv4), Layer 2 switches can use Internet Group Management Protocol (IGMP) snooping to limit the flooding of multicast traffic by dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast devices. In IPv6, MLD snooping performs a similar function. With MLD snooping, IPv6 multicast data is selectively forwarded to a list of ports that want to receive the data, instead of being flooded to all ports in a VLAN. This list is constructed by snooping IPv6 multicast control packets. MLD is a protocol used by IPv6 multicast routers to discover the presence of multicast listeners (nodes wishing to receive IPv6 multicast packets) on the links that are directly attached to the routers and to discover which multicast packets are of interest to neighboring nodes. MLD is derived from IGMP; MLD Version 1 (MLDv1) is equivalent to IGMPv2, and MLD Version 2 (MLDv2) is equivalent to IGMPv3. MLD is a subprotocol of Internet Control Message Protocol Version 6 (ICMPv6), and MLD messages are a subset of ICMPv6 messages, identified in IPv6 packets by a preceding Next Header value of 58. The switch supports two versions of MLD snooping:
· MLDv1 snooping detects MLDv1 control packets and sets up traffic bridging based on IPv6 destination multicast addresses.
· MLDv2 basic snooping (MBSS) uses MLDv2 control packets to set up traffic forwarding based on IPv6 destination multicast addresses.
The switch can snoop on both MLDv1 and MLDv2 protocol packets and bridge IPv6 multicast data based on destination IPv6 multicast addresses.
Note The switch does not support MLDv2 enhanced snooping, which sets up IPv6 source and destination multicast address-based forwarding.
MLD snooping can be enabled or disabled globally or per VLAN. When MLD snooping is enabled, a per-VLAN IPv6 multicast address table is constructed in software and hardware. The switch then performs IPv6 multicast-address based bridging in hardware. According to IPv6 multicast standards, the switch derives the MAC multicast address by performing a logical-OR of the four low-order octets of the switch MAC address with the MAC address of 33:33:00:00:00:00. For example, the IPv6 MAC address of FF02:DEAD:BEEF:1:3 maps to the Ethernet MAC address of 33:33:00:01:00:03. A multicast packet is unmatched when the destination IPv6 address does not match the destination MAC address. The switch forwards the unmatched packet in hardware based the MAC address table. If the destination MAC address is not in the MAC address table, the switch floods the packet to all ports in the same VLAN as the receiving port.
MLD Messages
MLDv1 supports three types of messages: · Listener Queries are the equivalent of IGMPv2 queries and are either General Queries or Multicast-Address-Specific Queries (MASQs). · Multicast Listener Reports are the equivalent of IGMPv2 reports · Multicast Listener Done messages are the equivalent of IGMPv2 leave messages.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 340

IPv6 MLD Queries

MLD Queries

MLDv2 supports MLDv2 queries and reports, as well as MLDv1 Report and Done messages. Message timers and state transitions resulting from messages being sent or received are the same as those of IGMPv2 messages. MLD messages that do not have valid link-local IPv6 source addresses are ignored by MLD routers and switches.
The switch sends out MLD queries, constructs an IPv6 multicast address database, and generates MLD group-specific and MLD group-and-source-specific queries in response to MLD Done messages. The switch also supports report suppression, report proxying, Immediate-Leave functionality, and static IPv6 multicast group address configuration. When MLD snooping is disabled, all MLD queries are flooded in the ingress VLAN. When MLD snooping is enabled, received MLD queries are flooded in the ingress VLAN, and a copy of the query is sent to the CPU for processing. From the received query, MLD snooping builds the IPv6 multicast address database. It detects multicast router ports, maintains timers, sets report response time, learns the querier IP source address for the VLAN, learns the querier port in the VLAN, and maintains multicast-address aging.

Note When the IPv6 multicast router is a Catalyst 6500 switch and you are using extended VLANs (in the range 1006 to 4094), IPv6 MLD snooping must be enabled on the extended VLAN on the Catalyst 6500 switch in order for the Catalyst 2960, 2960-S, 2960-C, or 2960-X switch to receive queries on the VLAN. For normal-range VLANs (1 to 1005), it is not necessary to enable IPv6 MLD snooping on the VLAN on the Catalyst 6500 switch.
When a group exists in the MLD snooping database, the switch responds to a group-specific query by sending an MLDv1 report. When the group is unknown, the group-specific query is flooded to the ingress VLAN.
When a host wants to leave a multicast group, it can send out an MLD Done message (equivalent to IGMP Leave message). When the switch receives an MLDv1 Done message, if Immediate- Leave is not enabled, the switch sends an MASQ to the port from which the message was received to determine if other devices connected to the port should remain in the multicast group.
Multicast Client Aging Robustness
You can configure port membership removal from addresses based on the number of queries. A port is removed from membership to an address only when there are no reports to the address on the port for the configured number of queries. The default number is 2.
Multicast Router Discovery
Like IGMP snooping, MLD snooping performs multicast router discovery, with these characteristics:
· Ports configured by a user never age out.
· Dynamic port learning results from MLDv1 snooping queries and IPv6 PIMv2 packets.
· If there are multiple routers on the same Layer 2 interface, MLD snooping tracks a single multicast router on the port (the router that most recently sent a router control packet).
· Dynamic multicast router port aging is based on a default timer of 5 minutes; the multicast router is deleted from the router port list if no control packet is received on the port for 5 minutes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 341

IPv6 MLD Reports

· IPv6 multicast router discovery only takes place when MLD snooping is enabled on the switch.
· Received IPv6 multicast router control packets are always flooded to the ingress VLAN, whether or not MLD snooping is enabled on the switch.
· After the discovery of the first IPv6 multicast router port, unknown IPv6 multicast data is forwarded only to the discovered router ports (before that time, all IPv6 multicast data is flooded to the ingress VLAN).

MLD Reports

The processing of MLDv1 join messages is essentially the same as with IGMPv2. When no IPv6 multicast routers are detected in a VLAN, reports are not processed or forwarded from the switch. When IPv6 multicast routers are detected and an MLDv1 report is received, an IPv6 multicast group address is entered in the VLAN MLD database. Then all IPv6 multicast traffic to the group within the VLAN is forwarded using this address. When MLD snooping is disabled, reports are flooded in the ingress VLAN.
When MLD snooping is enabled, MLD report suppression, called listener message suppression, is automatically enabled. With report suppression, the switch forwards the first MLDv1 report received by a group to IPv6 multicast routers; subsequent reports for the group are not sent to the routers. When MLD snooping is disabled, report suppression is disabled, and all MLDv1 reports are flooded to the ingress VLAN.
The switch also supports MLDv1 proxy reporting. When an MLDv1 MASQ is received, the switch responds with MLDv1 reports for the address on which the query arrived if the group exists in the switch on another port and if the port on which the query arrived is not the last member port for the address.

MLD Done Messages and Immediate-Leave
When the Immediate-Leave feature is enabled and a host sends an MLDv1 Done message (equivalent to an IGMP leave message), the port on which the Done message was received is immediately deleted from the group.You enable Immediate-Leave on VLANs and (as with IGMP snooping), you should only use the feature on VLANs where a single host is connected to the port. If the port was the last member of a group, the group is also deleted, and the leave information is forwarded to the detected IPv6 multicast routers.
When Immediate Leave is not enabled in a VLAN (which would be the case when there are multiple clients for a group on the same port) and a Done message is received on a port, an MASQ is generated on that port. The user can control when a port membership is removed for an existing address in terms of the number of MASQs. A port is removed from membership to an address when there are no MLDv1 reports to the address on the port for the configured number of queries.
The number of MASQs generated is configured by using the ipv6 mld snooping last-listener-query count global configuration command. The default number is 2.
The MASQ is sent to the IPv6 multicast address for which the Done message was sent. If there are no reports sent to the IPv6 multicast address specified in the MASQ during the switch maximum response time, the port on which the MASQ was sent is deleted from the IPv6 multicast address database. The maximum response time is the time configured by using the ipv6 mld snooping last-listener-query-interval global configuration command. If the deleted port is the last member of the multicast address, the multicast address is also deleted, and the switch sends the address leave information to all detected multicast routers.
When Immediate Leave is not enabled and a port receives an MLD Done message, the switch generates MASQs on the port and sends them to the IPv6 multicast address for which the Done message was sent. You can optionally configure the number of MASQs that are sent and the length of time the switch waits for a response before deleting the port from the multicast group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 342

IPv6 Topology Change Notification Processing

When you enable MLDv1 Immediate Leave, the switch immediately removes a port from a multicast group when it detects an MLD Done message on that port. You should only use the Immediate-Leave feature when there is a single receiver present on every port in the VLAN. When there are multiple clients for a multicast group on the same port, you should not enable Immediate-Leave in a VLAN.
Topology Change Notification Processing
When topology change notification (TCN) solicitation is enabled by using the ipv6 mld snooping tcn query solicit global configuration command, MLDv1 snooping sets the VLAN to flood all IPv6 multicast traffic with a configured number of MLDv1 queries before it begins sending multicast data only to selected ports. You set this value by using the ipv6 mld snooping tcn flood query count global configuration command. The default is to send two queries. The switch also generates MLDv1 global Done messages with valid link-local IPv6 source addresses when the switch becomes the STP root in the VLAN or when it is configured by the user. This is same as done in IGMP snooping.
MLD Snooping in Switch Stacks
The MLD IPv6 group address databases are maintained on all switches in the stack, regardless of which switch learns of an IPv6 multicast group. Report suppression and proxy reporting are done stack-wide. During the maximum response time, only one received report for a group is forwarded to the multicast routers, regardless of which switch the report arrives on.
The election of a new stack master does not affect the learning or bridging of IPv6 multicast data; bridging of IPv6 multicast data does not stop during a stack master re-election. When a new switch is added to the stack, it synchronizes the learned IPv6 multicast information from the stack master. Until the synchronization is complete, data ingress on the newly added switch is treated as unknown multicast data.

How to Configure IPv6 MLD Snooping

Default MLD Snooping Configuration

Table 42: Default MLD Snooping Configuration

Feature MLD snooping (Global) MLD snooping (per VLAN)
IPv6 Multicast addresses IPv6 Multicast router ports MLD snooping Immediate Leave MLD snooping robustness variable

Default Setting Disabled. Enabled. MLD snooping must be globally enabled for VLAN MLD snooping to take place. None configured. None configured. Disabled. Global: 2; Per VLAN: 0. Note The VLAN value overrides the global setting. When
the VLAN value is 0, the VLAN uses the global count.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 343

IPv6 MLD Snooping Configuration Guidelines

Feature Last listener query count
Last listener query interval
TCN query solicit TCN query count MLD listener suppression

Default Setting Global: 2; Per VLAN: 0. Note The VLAN value overrides the global setting. When
the VLAN value is 0, the VLAN uses the global count.
Global: 1000 (1 second); VLAN: 0. Note The VLAN value overrides the global setting. When
the VLAN value is 0, the VLAN uses the global interval.
Disabled. 2. Disabled.

MLD Snooping Configuration Guidelines
When configuring MLD snooping, consider these guidelines:
· You can configure MLD snooping characteristics at any time, but you must globally enable MLD snooping by using the ipv6 mld snooping global configuration command for the configuration to take effect.
· When the IPv6 multicast router is a Catalyst 6500 switch and you are using extended VLANs (in the range 1006 to 4094), IPv6 MLD snooping must be enabled on the extended VLAN on the Catalyst 6500 switch in order for the switch to receive queries on the VLAN. For normal-range VLANs (1 to 1005), it is not necessary to enable IPv6 MLD snooping on the VLAN on the Catalyst 6500 switch.
· MLD snooping and IGMP snooping act independently of each other. You can enable both features at the same time on the switch.
· The maximum number of multicast entries allowed on the switch or switch stack is determined by the configured SDM template.
· · The maximum number of address entries allowed for the switch or switch stack is 4000.

Enabling or Disabling MLD Snooping on the Switch (CLI)
By default, IPv6 MLD snooping is globally disabled on the switch and enabled on all VLANs. When MLD snooping is globally disabled, it is also disabled on all VLANs. When you globally enable MLD snooping, the VLAN configuration overrides the global configuration. That is, MLD snooping is enabled only on VLAN interfaces in the default state (enabled).
You can enable and disable MLD snooping on a per-VLAN basis or for a range of VLANs, but if you globally disable MLD snooping, it is disabled in all VLANs. If global snooping is enabled, you can enable or disable VLAN snooping.
Beginning in privileged EXEC mode, follow these steps to globally enable MLD snooping on the switch:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 344

IPv6 Enabling or Disabling MLD Snooping on a VLAN (CLI)

Step 1

Procedure Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ipv6 mld snooping Example:
Switch(config)# ipv6 mld snooping

Enables MLD snooping on the switch.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

copy running-config startup-config Example:

(Optional) Save your entries in the configuration file.

Switch(config)# copy running-config startup-config

Step 5

reload Example:
Switch(config)# reload

Reload the operating system.

Enabling or Disabling MLD Snooping on a VLAN (CLI)
Beginning in privileged EXEC mode, follow these steps to enable MLD snooping on a VLAN.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 345

IPv6 Configuring a Static Multicast Group (CLI)

Step 2

Command or Action ipv6 mld snooping Example:
Switch(config)# ipv6 mld snooping

Step 3

ipv6 mld snooping vlan vlan-id Example:
Switch(config)# ipv6 mld snooping vlan 1

Step 4

end Example:
Switch(config)# ipv6 mld snooping vlan 1

Purpose Enables MLD snooping on the switch.
Enables MLD snooping on the VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094. Note MLD snooping must be globally enabled for
VLAN snooping to be enabled. Returns to privileged EXEC mode.

Configuring a Static Multicast Group (CLI)
Hosts or Layer 2 ports normally join multicast groups dynamically, but you can also statically configure an IPv6 multicast address and member ports for a VLAN.
Beginning in privileged EXEC mode, follow these steps to add a Layer 2 port as a member of a multicast group:

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode

Switch# configure terminal

Step 2

ipv6 mld snooping vlan vlan-id static ipv6_multicast_address interface interface-id Example:
Switch(config)# ipv6 mld snooping vlan 1 static FF12::3 interface gigabitethernet 0/1

Configures a multicast group with a Layer 2 port as a member of a multicast group:
· vlan-id is the multicast group VLAN ID. The VLAN ID range is 1 to 1001 and 1006 to 4094.
· ipv6_multicast_address is the 128-bit group IPv6 address. The address must be in the form specified in RFC 2373.

· interface-id is the member port. It can be a physical interface or a port channel (1 to 48).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 346

IPv6 Configuring a Multicast Router Port (CLI)

Step 3

Command or Action end Example:
Switch(config)# end

Step 4

Use one of the following: · show ipv6 mld snooping address · show ipv6 mld snooping address vlan vlan-id
Example:
Switch# show ipv6 mld snooping address
or
Switch# show ipv6 mld snooping vlan 1

Purpose Returns to privileged EXEC mode.
Verifies the static member port and the IPv6 address.

Configuring a Multicast Router Port (CLI)

Step 1

Note Static connections to multicast routers are supported only on switch ports. Beginning in privileged EXEC mode, follow these steps to add a multicast router port to a VLAN:

Procedure
Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ipv6 mld snooping vlan vlan-id mrouter interface interface-id

Specifies the multicast router VLAN ID, and specify the interface to the multicast router.

Example:

· The VLAN ID range is 1 to 1001 and 1006 to 4094.

Switch(config)# ipv6 mld snooping vlan 1 mrouter interface gigabitethernet 0/2

· The interface can be a physical interface or a port channel. The port-channel range is 1 to 48.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 347

IPv6 Enabling MLD Immediate Leave (CLI)

Step 4

Command or Action show ipv6 mld snooping mrouter [ vlan vlan-id ] Example:
Switch# show ipv6 mld snooping mrouter vlan 1

Purpose
Verifies that IPv6 MLD snooping is enabled on the VLAN interface.

Enabling MLD Immediate Leave (CLI)
Beginning in privileged EXEC mode, follow these steps to enable MLDv1 Immediate Leave:

Step 1

Procedure
Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ipv6 mld snooping vlan vlan-id immediate-leave
Example:
Switch(config)# ipv6 mld snooping vlan 1 immediate-leave

Enables MLD Immediate Leave on the VLAN interface.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

show ipv6 mld snooping vlan vlan-id Example:
Switch# show ipv6 mld snooping vlan 1

Verifies that Immediate Leave is enabled on the VLAN interface.

Configuring MLD Snooping Queries (CLI)
Beginning in privileged EXEC mode, follow these steps to configure MLD snooping query characteristics for the switch or for a VLAN:

Step 1

Procedure
Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 348

IPv6 Configuring MLD Snooping Queries (CLI)

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Command or Action
ipv6 mld snooping robustness-variable value Example:
Switch(config)# ipv6 mld snooping robustness-variable 3

Purpose
(Optional) Sets the number of queries that are sent before switch will deletes a listener (port) that does not respond to a general query. The range is 1 to 3; the default is 2.

ipv6 mld snooping vlan vlan-id robustness-variable (Optional) Sets the robustness variable on a VLAN basis,

value

which determines the number of general queries that MLD

Example:

snooping sends before aging out a multicast address when there is no MLD report response. The range is 1 to 3; the

Switch(config)# ipv6 mld snooping vlan 1 robustness-variable 3

default is 0. When set to 0, the number used is the global robustness variable value.

ipv6 mld snooping last-listener-query-count count
Example:
Switch(config)# ipv6 mld snooping last-listener-query-count 7

(Optional) Sets the number of MASQs that the switch sends before aging out an MLD client. The range is 1 to 7; the default is 2. The queries are sent 1 second apart.

ipv6 mld snooping vlan vlan-id last-listener-query-count count
Example:
Switch(config)# ipv6 mld snooping vlan 1 last-listener-query-count 7

(Optional) Sets the last-listener query count on a VLAN basis. This value overrides the value configured globally. The range is 1 to 7; the default is 0. When set to 0, the global count value is used. Queries are sent 1 second apart.

ipv6 mld snooping last-listener-query-interval interval (Optional) Sets the maximum response time that the switch

Example:

waits after sending out a MASQ before deleting a port from the multicast group. The range is 100 to 32,768

Switch(config)# ipv6 mld snooping last-listener-query-interval 2000

thousands of a second. The default is 1000 (1 second).

ipv6 mld snooping vlan vlan-id last-listener-query-interval interval
Example:
Switch(config)# ipv6 mld snooping vlan 1 last-listener-query-interval 2000

(Optional) Sets the last-listener query interval on a VLAN basis. This value overrides the value configured globally. The range is 0 to 32,768 thousands of a second. The default is 0. When set to 0, the global last-listener query interval is used.

ipv6 mld snooping tcn query solicit
Example:
Switch(config)# ipv6 mld snooping tcn query solicit

(Optional) Enables topology change notification (TCN) solicitation, which means that VLANs flood all IPv6 multicast traffic for the configured number of queries before sending multicast data to only those ports requesting to receive it. The default is for TCN to be disabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 349

IPv6 Disabling MLD Listener Message Suppression (CLI)

Step 9
Step 10 Step 11

Command or Action

Purpose

ipv6 mld snooping tcn flood query count count

(Optional) When TCN is enabled, specifies the number of

Example:

TCN queries to be sent. The range is from 1 to 10; the default is 2.

Switch(config)# ipv6 mld snooping tcn flood query

count 5

end

Returns to privileged EXEC mode.

show ipv6 mld snooping querier [ vlan vlan-id]
Example:
Switch(config)# show ipv6 mld snooping querier vlan 1

(Optional) Verifies that the MLD snooping querier information for the switch or for the VLAN.

Disabling MLD Listener Message Suppression (CLI)
MLD snooping listener message suppression is enabled by default. When it is enabled, the switch forwards only one MLD report per multicast router query. When message suppression is disabled, multiple MLD reports could be forwarded to the multicast routers.
Beginning in privileged EXEC mode, follow these steps to disable MLD listener message suppression:

Step 1

Procedure
Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enter global configuration mode.

Step 2

no ipv6 mld snooping listener-message-suppression
Example:
Switch(config)# no ipv6 mld snooping listener-message-suppression

Disable MLD message suppression.

Step 3

end Example:
Switch(config)# end

Return to privileged EXEC mode.

Step 4

show ipv6 mld snooping Example:
Switch# show ipv6 mld snooping

Verify that IPv6 MLD snooping report suppression is disabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 350

IPv6 Displaying MLD Snooping Information

Displaying MLD Snooping Information

You can display MLD snooping information for dynamically learned and statically configured router ports and VLAN interfaces. You can also display IPv6 group address multicast entries for a VLAN configured for MLD snooping.
Table 43: Commands for Displaying MLD Snooping Information

Command

Purpose

show ipv6 mld snooping [ vlan Displays the MLD snooping configuration information for all VLANs

vlan-id ]

on the switch or for a specified VLAN.

(Optional) Enter vlan vlan-id to display information for a single VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094.

show ipv6 mld snooping mrouter Displays information on dynamically learned and manually configured

[ vlan vlan-id ]

multicast router interfaces. When you enable MLD snooping, the switch

automatically learns the interface to which a multicast router is connected.

These are dynamically learned interfaces.

(Optional) Enters vlan vlan-id to display information for a single VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094.

show ipv6 mld snooping querier Displays information about the IPv6 address and incoming port for the

[ vlan vlan-id ]

most-recently received MLD query messages in the VLAN.

(Optional) Enters vlan vlan-id to display information for a single VLAN.The VLAN ID range is 1 to 1001 and 1006 to 4094.

show ipv6 mld snooping address Displays all IPv6 multicast address information or specific IPv6 multicast

[ vlan vlan-id ] [ count |

address information for the switch or a VLAN.

dynamic | user ]

· Enters count to show the group count on the switch or in a VLAN.

· Enters dynamic to display MLD snooping learned group information for the switch or for a VLAN.

· Entesr user to display MLD snooping user-configured group information for the switch or for a VLAN.

show ipv6 mld snooping address Displays MLD snooping for the specified VLAN and IPv6 multicast

vlan vlan-id [

address.

ipv6-multicast-address ]

Configuration Examples for Configuring MLD Snooping
Configuring a Static Multicast Group: Example
This example shows how to statically configure an IPv6 multicast group:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 351

IPv6 Configuring a Multicast Router Port: Example
Switch# configure terminal Switch(config)# ipv6 mld snooping vlan 2 static FF12::3 interface gigabitethernet
1/0/1 Switch(config)# end
Configuring a Multicast Router Port: Example
This example shows how to add a multicast router port to VLAN 200:
Switch# configure terminal Switch(config)# ipv6 mld snooping vlan 200 mrouter interface gigabitethernet
0/2 Switch(config)# exit
Enabling MLD Immediate Leave: Example
This example shows how to enable MLD Immediate Leave on VLAN 130:
Switch# configure terminal Switch(config)# ipv6 mld snooping vlan 130 immediate-leave Switch(config)# exit
Configuring MLD Snooping Queries: Example
This example shows how to set the MLD snooping global robustness variable to 3:
Switch# configure terminal Switch(config)# ipv6 mld snooping robustness-variable 3 Switch(config)# exit
This example shows how to set the MLD snooping last-listener query count for a VLAN to 3:
Switch# configure terminal Switch(config)# ipv6 mld snooping vlan 200 last-listener-query-count 3 Switch(config)# exit
This example shows how to set the MLD snooping last-listener query interval (maximum response time) to 2000 (2 seconds):
Switch# configure terminal Switch(config)# ipv6 mld snooping last-listener-query-interval 2000 Switch(config)# exit
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 352

2 0 C H A P T E R
Configuring IPv6 Unicast Routing
· Finding Feature Information, on page 353 · Information About Configuring IPv6 Unicast Routing, on page 353 · Configuring DHCP for IPv6 Address Assignment, on page 375 · Configuration Examples for IPv6 Unicast Routing, on page 379
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring IPv6 Unicast Routing
This chapter describes how to configure IPv6 unicast routing on the switch.
Note To use all IPv6 features in this chapter, the switch or stack master must be running the IP services feature set. Switches running the IP base feature set support IPv6 static routing, RIP for IPv6, and OSPF. Switches running the LAN base feature set support only IPv6 host functionality.
Understanding IPv6
IPv4 users can move to IPv6 and receive services such as end-to-end security, quality of service (QoS), and globally unique addresses. The IPv6 address space reduces the need for private addresses and Network Address Translation (NAT) processing by border routers at network edges. For information about how Cisco Systems implements IPv6, go to: http://www.cisco.com/en/US/products/ps6553/products_ios_technology_home.html For information about IPv6 and other features in this chapter
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 353

IPv6 IPv6 Addresses
· See the Cisco IOS IPv6 Configuration Library. · Use the Search field on Cisco.com to locate the Cisco IOS software documentation. For example, if you
want information about static routes, you can enter Implementing Static Routes for IPv6 in the search field to learn about static routes.
IPv6 Addresses
The switch supports only IPv6 unicast addresses. It does not support site-local unicast addresses, or anycast addresses. The IPv6 128-bit addresses are represented as a series of eight 16-bit hexadecimal fields separated by colons in the format: n:n:n:n:n:n:n:n. This is an example of an IPv6 address: 2031:0000:130F:0000:0000:09C0:080F:130B For easier implementation, leading zeros in each field are optional. This is the same address without leading zeros: 2031:0:130F:0:0:9C0:80F:130B You can also use two colons (::) to represent successive hexadecimal fields of zeros, but you can use this short version only once in each address: 2031:0:130F::09C0:080F:130B For more information about IPv6 address formats, address types, and the IPv6 packet header, see the "Implementing IPv6 Addressing and Basic Connectivity" chapter of Cisco IOS IPv6 Configuration Library on Cisco.com. In the "Information About Implementing Basic Connectivity for IPv6" chapter, these sections apply to the switch:
· IPv6 Address Formats · IPv6 Address Type: Unicast · IPv6 Address Type: Multicast · IPv6 Address Output Display · Simplified IPv6 Packet Header
Supported IPv6 Unicast Routing Features
The switch supports hop-by-hop extension header packets, which are routed in software. The switch provides IPv6 routing capability over Routing Information Protocol (RIP) for IPv6, and Open Shortest Path First (OSPF) Version 3 Protocol. It supports up to 16 equal-cost routes and can simultaneously forward IPv4 and IPv6 frames at line rate.
128-Bit Wide Unicast Addresses The switch supports aggregatable global unicast addresses and link-local unicast addresses. It does not support site-local unicast addresses. · Aggregatable global unicast addresses are IPv6 addresses from the aggregatable global unicast prefix. The address structure enables strict aggregation of routing prefixes and limits the number of routing table
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 354

IPv6 DNS for IPv6

entries in the global routing table. These addresses are used on links that are aggregated through organizations and eventually to the Internet service provider.
These addresses are defined by a global routing prefix, a subnet ID, and an interface ID. Current global unicast address allocation uses the range of addresses that start with binary value 001 (2000::/3). Addresses with a prefix of 2000::/3(001) through E000::/3(111) must have 64-bit interface identifiers in the extended unique identifier (EUI)-64 format.
· Link local unicast addresses can be automatically configured on any interface by using the link-local prefix FE80::/10(1111 1110 10) and the interface identifier in the modified EUI format. Link-local addresses are used in the neighbor discovery protocol (NDP) and the stateless autoconfiguration process. Nodes on a local link use link-local addresses and do not require globally unique addresses to communicate. IPv6 routers do not forward packets with link-local source or destination addresses to other links.

For more information, see the section about IPv6 unicast addresses in the "Implementing IPv6 Addressing and Basic Connectivity" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.

DNS for IPv6

IPv6 supports Domain Name System (DNS) record types in the DNS name-to-address and address-to-name lookup processes. The DNS AAAA resource record types support IPv6 addresses and are equivalent to an A address record in IPv4. The switch supports DNS resolution for IPv4 and IPv6.

Path MTU Discovery for IPv6 Unicast
The switch supports advertising the system maximum transmission unit (MTU) to IPv6 nodes and path MTU discovery. Path MTU discovery allows a host to dynamically discover and adjust to differences in the MTU size of every link along a given data path. In IPv6, if a link along the path is not large enough to accommodate the packet size, the source of the packet handles the fragmentation.

ICMPv6

The Internet Control Message Protocol (ICMP) in IPv6 generates error messages, such as ICMP destination unreachable messages, to report errors during processing and other diagnostic functions. In IPv6, ICMP packets are also used in the neighbor discovery protocol and path MTU discovery.

Neighbor Discovery

The switch supports NDP for IPv6, a protocol running on top of ICMPv6, and static neighbor entries for IPv6 stations that do not support NDP. The IPv6 neighbor discovery process uses ICMP messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local link), to verify the reachability of the neighbor, and to keep track of neighboring routers.
The switch supports ICMPv6 redirect for routes with mask lengths less than 64 bits. ICMP redirect is not supported for host routes or for summarized routes with mask lengths greater than 64 bits.
Neighbor discovery throttling ensures that the switch CPU is not unnecessarily burdened while it is in the process of obtaining the next hop forwarding information to route an IPv6 packet. The switch drops any additional IPv6 packets whose next hop is the same neighbor that the switch is actively trying to resolve. This drop avoids further load on the CPU.

Default Router Preference
The switch supports IPv6 default router preference (DRP), an extension in router advertisement messages. DRP improves the ability of a host to select an appropriate router, especially when the host is multihomed and the routers are on different links. The switch does not support the Route Information Option in RFC 4191.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 355

IPv6 IPv6 Stateless Autoconfiguration and Duplicate Address Detection

An IPv6 host maintains a default router list from which it selects a router for traffic to offlink destinations. The selected router for a destination is then cached in the destination cache. NDP for IPv6 specifies that routers that are reachable or probably reachable are preferred over routers whose reachability is unknown or suspect. For reachable or probably reachable routers, NDP can either select the same router every time or cycle through the router list. By using DRP, you can configure an IPv6 host to prefer one router over another, provided both are reachable or probably reachable.
For more information about DRP for IPv6, see the Cisco IOS IPv6 Configuration Library on Cisco.com.

IPv6 Stateless Autoconfiguration and Duplicate Address Detection
The switch uses stateless autoconfiguration to manage link, subnet, and site addressing changes, such as management of host and mobile IP addresses. A host autonomously configures its own link-local address, and booting nodes send router solicitations to request router advertisements for configuring interfaces.
For more information about autoconfiguration and duplicate address detection, see the "Implementing IPv6 Addressing and Basic Connectivity" chapter of Cisco IOS IPv6 Configuration Library on Cisco.com.

IPv6 Applications

The switch has IPv6 support for these applications: · Ping, traceroute, Telnet, and TFTP · Secure Shell (SSH) over an IPv6 transport · HTTP server access over IPv6 transport · DNS resolver for AAAA over IPv4 transport · Cisco Discovery Protocol (CDP) support for IPv6 addresses

For more information about managing these applications, see the Cisco IOS IPv6 Configuration Library on Cisco.com.

DHCP for IPv6 Address Assignment
DHCPv6 enables DHCP servers to pass configuration parameters, such as IPv6 network addresses, to IPv6 clients. The address assignment feature manages non-duplicate address assignment in the correct prefix based on the network where the host is connected. Assigned addresses can be from one or multiple prefix pools. Additional options, such as default domain and DNS name-server address, can be passed back to the client. Address pools can be assigned for use on a specific interface, on multiple interfaces, or the server can automatically find the appropriate pool.
For more information and to configure these features, see the Cisco IOS IPv6 Configuration Guide.
This document describes only the DHCPv6 address assignment. For more information about configuring the DHCPv6 client, server, or relay agent functions, see the "Implementing DHCP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.

Static Routes for IPv6
Static routes are manually configured and define an explicit route between two networking devices. Static routes are useful for smaller networks with only one path to an outside network or to provide security for certain types of traffic in a larger network.
For more information about static routes, see the "Implementing Static Routes for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 356

IPv6 RIP for IPv6

RIP for IPv6 OSPF for IPv6 HSRP for IPv6
EIGRP IPv6

Routing Information Protocol (RIP) for IPv6 is a distance-vector protocol that uses hop count as a routing metric. It includes support for IPv6 addresses and prefixes and the all-RIP-routers multicast group address FF02::9 as the destination address for RIP update messages. For more information about RIP for IPv6, see the "Implementing RIP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
The switch running the IP Base feature set supports Open Shortest Path First (OSPF) for IPv6, a link-state protocol for IP. For more information, seeCisco IOS IPv6 Configuration Library on Cisco.com.
Switches running the IPServices and IPBase feature set support the Hot Standby Router Protocol (HSRP) for IPv6. HSRP provides routing redundancy for routing IPv6 traffic not dependent on the availability of any single router. IPv6 hosts learn of available routers through IPv6 neighbor discovery router advertisement messages. These messages are multicast periodically or are solicited by hosts. An HSRP IPv6 group has a virtual MAC address that is derived from the HSRP group number and a virtual IPv6 link-local address that is, by default, derived from the HSRP virtual MAC address. Periodic messages are sent for the HSRP virtual IPv6 link-local address when the HSRP group is active. These messages stop after a final one is sent when the group leaves the active state. For more information about configuring HSRP for IPv6, see the "HSRP for IPv6" section. For more information about configuring HSRP for IPv4, see the "Configuring HSRP" section.
Switches running the IP services feature set support the Enhanced Interior Gateway Routing Protocol (EIGRP) for IPv6. It is configured on the interfaces on which it runs and does not require a global IPv6 address.

Note Switches running the IP base feature set do not support any IPv6 EIGRP features, including IPv6 EIGRP stub routing.
Before running, an instance of EIGRP IPv6 requires an implicit or explicit router ID. An implicit router ID is derived from a local IPv4 address, so any IPv4 node always has an available router ID. However, EIGRP IPv6 might be running in a network with only IPv6 nodes and therefore might not have an available IPv4 router ID. For more information about EIGRP for IPv6, see the "Implementing EIGRP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
SNMP and Syslog Over IPv6 To support both IPv4 and IPv6, IPv6 network management requires both IPv6 and IPv4 transports. Syslog over IPv6 supports address data types for these transports. SNMP and syslog over IPv6 provide these features: · Support for both IPv4 and IPv6
· IPv6 transport for SNMP and to modify the SNMP agent to support traps for an IPv6 host

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 357

IPv6 HTTP(S) Over IPv6

· SNMP- and syslog-related MIBs to support IPv6 addressing · Configuration of IPv6 hosts as trap receivers

For support over IPv6, SNMP modifies the existing IP transport mapping to simultaneously support IPv4 and IPv6. These SNMP actions support IPv6 transport management:
· Opens User Datagram Protocol (UDP) SNMP socket with default settings · Provides a new transport mechanism called SR_IPV6_TRANSPORT · Sends SNMP notifications over IPv6 transport · Supports SNMP-named access lists for IPv6 transport · Supports SNMP proxy forwarding using IPv6 transport · Verifies SNMP Manager feature works with IPv6 transport

For information on SNMP over IPv6, including configuration procedures, see the "Managing Cisco IOS Applications over IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
For information about syslog over IPv6, including configuration procedures, see the "Implementing IPv6 Addressing and Basic Connectivity" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.

HTTP(S) Over IPv6

The HTTP client sends requests to both IPv4 and IPv6 HTTP servers, which respond to requests from both IPv4 and IPv6 HTTP clients. URLs with literal IPv6 addresses must be specified in hexadecimal using 16-bit values between colons.
The accept socket call chooses an IPv4 or IPv6 address family. The accept socket is either an IPv4 or IPv6 socket. The listening socket continues to listen for both IPv4 and IPv6 signals that indicate a connection. The IPv6 listening socket is bound to an IPv6 wildcard address.
The underlying TCP/IP stack supports a dual-stack environment. HTTP relies on the TCP/IP stack and the sockets for processing network-layer interactions.
Basic network connectivity (ping) must exist between the client and the server hosts before HTTP connections can be made.
For more information, see the "Managing Cisco IOS Applications over IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.

Unsupported IPv6 Unicast Routing Features
The switch does not support these IPv6 features: · IPv6 policy-based routing · IPv6 virtual private network (VPN) routing and forwarding (VRF) table support · Support for IPv6 routing protocols: multiprotocol Border Gateway Protocol (BGP) and Intermediate System-to-Intermediate System (IS-IS) routing · IPv6 packets destined to site-local addresses · Tunneling protocols, such as IPv4-to-IPv6 or IPv6-to-IPv4 · The switch as a tunnel endpoint supporting IPv4-to-IPv6 or IPv6-to-IPv4 tunneling protocols

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 358

IPv6 IPv6 Feature Limitations
· IPv6 unicast reverse-path forwarding · IPv6 Web Cache Communication Protocol (WCCP)
IPv6 Feature Limitations
Because IPv6 is implemented in switch hardware, some limitations occur due to the IPv6 compressed addresses in the hardware memory. These hardware limitations result in some loss of functionality and limits some features. These are feature limitations.
· The switch cannot forward SNAP-encapsulated IPv6 packets in hardware. They are forwarded in software. · The switch cannot apply QoS classification on source-routed IPv6 packets in hardware.
IPv6 and Switch Stacks
The switch supports IPv6 forwarding across the stack and IPv6 host functionality on the stack master. The stack master runs the IPv6 unicast routing protocols and computes the routing tables. They receive the tables and create hardware IPv6 routes for forwarding. The stack master also runs all IPv6 applications.
Note To route IPv6 packets in a stack, all switches in the stack should be running the IP Base feature set. If a new switch becomes the stack master, it recomputes the IPv6 routing tables and distributes them to the member switches. While the new stack master is being elected and is resetting, the switch stack does not forward IPv6 packets. The stack MAC address changes, which also changes the IPv6 address. When you specify the stack IPv6 address with an extended unique identifier (EUI) by using the ipv6 address ipv6-prefix/prefix length eui-64 interface configuration command, the address is based on the interface MAC address. See the Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI), on page 360. If you configure the persistent MAC address feature on the stack and the stack master changes, the stack MAC address does not change for approximately 4 minutes. These are the functions of IPv6 stack master and members: · Stack master: · runs IPv6 routing protocols · generates routing tables · distributes routing tables to stack members that use dCEFv6 · runs IPv6 host functionality and IPv6 applications
· Stack member (must be running the IP services feature set): · receives CEFv6 routing tables from the stack master · programs the routes into hardware
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 359

IPv6 Default IPv6 Configuration

Note IPv6 packets are routed in hardware across the stack if the packet does not have exceptions (IPv6Options) and the switches in the stack have not run out of hardware resources.
· flushes the CEFv6 tables on master re-election

Default IPv6 Configuration

Table 44: Default IPv6 Configuration

Feature SDM template IPv6 routing CEFv6 or dCEFv6

Default Setting Advance desktop. Default is advanced template Disabled globally and on all interfaces Note When IPv6 routing is enabled, CEFv6 and dCEF6 are automatically
enabled.

IPv6 addresses None configured

Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI)
This section describes how to assign IPv6 addresses to individual Layer 3 interfaces and to globally forward IPv6 traffic on the switch.
Before configuring IPv6 on the switch, consider these guidelines:
· Not all features discussed in this chapter are supported by the switch. See the Unsupported IPv6 Unicast Routing Features, on page 358.
· · In the ipv6 address interface configuration command, you must enter the ipv6-address and ipv6-prefix
variables with the address specified in hexadecimal using 16-bit values between colons. The prefix-length variable (preceded by a slash [/]) is a decimal value that shows how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address).
To forward IPv6 traffic on an interface, you must configure a global IPv6 address on that interface. Configuring an IPv6 address on an interface automatically configures a link-local address and activates IPv6 for the interface. The configured interface automatically joins these required multicast groups for that link:
· solicited-node multicast group FF02:0:0:0:0:1:ff00::/104 for each unicast address assigned to the interface (this address is used in the neighbor discovery process.)
· all-nodes link-local multicast group FF02::1
· all-routers link-local multicast group FF02::2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 360

IPv6 Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI)

Step 1 Step 2
Step 3 Step 4 Step 5

To remove an IPv6 address from an interface, use the no ipv6 address ipv6-prefix/prefix length eui-64 or no ipv6 address ipv6-address link-local interface configuration command. To remove all manually configured IPv6 addresses from an interface, use the no ipv6 address interface configuration command without arguments. To disable IPv6 processing on an interface that has not been explicitly configured with an IPv6 address, use the no ipv6 enable interface configuration command. To globally disable IPv6 routing, use the no ipv6 unicast-routing global configuration command.
For more information about configuring IPv6 routing, see the "Implementing Addressing and Basic Connectivity for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
Beginning in privileged EXEC mode, follow these steps to assign an IPv6 address to a Layer 3 interface and enable IPv6 routing:

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

sdm prefer dual-ipv4-and-ipv6 {advanced | vlan} Example:
Switch(config)# sdm prefer dual-ipv4-and-ipv6 default

Selects an SDM template that supports IPv4 and IPv6.
· advanced--Sets the switch to the default template to balance system resources.
· vlan--Maximizes VLAN configuration on the switch with no routing supported in hardware.

end Example:

Note Advanced is available at all license levels. VLAN template is available only in lanbase.
Returns to privileged EXEC mode.

Switch(config)# end

reload Example:
Switch# reload

Reloads the operating system.

configure terminal Example:
Switch# configure terminal

Enters global configuration mode after the switch reloads.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 361

IPv6 Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI)

Step 6 Step 7 Step 8
Step 9 Step 10 Step 11

Command or Action

Purpose

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Enters interface configuration mode, and specifies the Layer 3 interface to configure. The interface can be a physical interface, a switch virtual interface (SVI), or a Layer 3 EtherChannel.

no switchport Example:
Switch(config-if)# no switchport

Removes the interface from Layer 2 configuration mode (if it is a physical interface).

Use one of the following:
· ipv6 address ipv6-prefix/prefix length eui-64 · ipv6 address ipv6-address/prefix length · ipv6 address ipv6-address link-local · ipv6 enable · ipv6 addressWORD · ipv6 addressautoconfig · ipv6 addressdhcp Example:
Switch(config-if)# ipv6 address 2001:0DB8:c18:1::/64 eui 64
Switch(config-if)# ipv6 address 2001:0DB8:c18:1::/64
Switch(config-if)# ipv6 address 2001:0DB8:c18:1:: link-local

· Specifies a global IPv6 address with an extended unique identifier (EUI) in the low-order 64 bits of the IPv6 address. Specify only the network prefix; the last 64 bits are automatically computed from the switch MAC address. This enables IPv6 processing on the interface.
· Manually configures an IPv6 address on the interface.
· Specifies a link-local address on the interface to be used instead of the link-local address that is automatically configured when IPv6 is enabled on the interface. This command enables IPv6 processing on the interface.
· Automatically configures an IPv6 link-local address on the interface, and enables the interface for IPv6 processing. The link-local address can only be used to communicate with nodes on the same link.

Switch(config-if)# ipv6 enable

exit Example:
Switch(config-if)# exit

Returns to global configuration mode.

ip routing Example:
Switch(config)# ip routing

Enables IP routing on the switch.

ipv6 unicast-routing Example:

Enables forwarding of IPv6 unicast data packets.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 362

IPv6 Configuring IPv4 and IPv6 Protocol Stacks (CLI)

Step 12 Step 13

Command or Action
Switch(config)# ipv6 unicast-routing

Purpose

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

show ipv6 interface interface-id Example:

Verifies your entries.

Switch# show ipv6 interface gigabitethernet 1/0/1

Step 14

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring IPv4 and IPv6 Protocol Stacks (CLI)
Beginning in privileged EXEC mode, follow these steps to configure a Layer 3 interface to support both IPv4 and IPv6 and to enable IPv6 routing.

Note To disable IPv6 processing on an interface that has not been configured with an IPv6 address, use the no ipv6 enable interface configuration command.

SUMMARY STEPS

1. configure terminal 2. ip routing 3. ipv6 unicast-routing 4. interface interface-id 5. no switchport 6. ip address ip-address mask [secondary] 7. Use one of the following:
· ipv6 address ipv6-prefix/prefix length eui-64 · ipv6 address ipv6-address/prefix length · ipv6 address ipv6-address link-local · ipv6 enable · ipv6 addressWORD · ipv6 addressautoconfig

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 363

IPv6 Configuring IPv4 and IPv6 Protocol Stacks (CLI)

· ipv6 addressdhcp
8. end 9. Use one of the following:
· show interface interface-id · show ip interface interface-id · show ipv6 interface interface-id
10. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ip routing Example:
Switch(config)# ip routing

Enables routing on the switch.

Step 3

ipv6 unicast-routing Example:
Switch(config)# ipv6 unicast-routing

Enables forwarding of IPv6 data packets on the switch.

Step 4

interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

Step 5

no switchport Example:
Switch(config-if)# no switchport

Removes the interface from Layer 2 configuration mode (if it is a physical interface).

Step 6

ip address ip-address mask [secondary] Example:

Specifies a primary or secondary IPv4 address for the interface.

Switch(config-if)# ip address 10.1.2.3 255.255.255

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 364

IPv6 Configuring Default Router Preference (CLI)

Step 7

Command or Action
Use one of the following:
· ipv6 address ipv6-prefix/prefix length eui-64 · ipv6 address ipv6-address/prefix length · ipv6 address ipv6-address link-local · ipv6 enable · ipv6 addressWORD · ipv6 addressautoconfig · ipv6 addressdhcp

Step 8 Step 9 Step 10

end Example:
Switch(config)# end
Use one of the following: · show interface interface-id · show ip interface interface-id · show ipv6 interface interface-id
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose · Specifies a global IPv6 address. Specify only the network prefix; the last 64 bits are automatically computed from the switch MAC address. · Specifies a link-local address on the interface to be used instead of the automatically configured link-local address when IPv6 is enabled on the interface. · Automatically configures an IPv6 link-local address on the interface, and enables the interface for IPv6 processing. The link-local address can only be used to communicate with nodes on the same link.
Note To remove all manually configured IPv6 addresses from an interface, use the no ipv6 address interface configuration command without arguments.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Configuring Default Router Preference (CLI)
Router advertisement messages are sent with the default router preference (DRP) configured by the ipv6 nd router-preference interface configuration command. If no DRP is configured, RAs are sent with a medium preference.
A DRP is useful when two routers on a link might provide equivalent, but not equal-cost routing, and policy might dictate that hosts should prefer one of the routers.
For more information about configuring DRP for IPv6, see the "Implementing IPv6 Addresses and Basic Connectivity" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
Beginning in privileged EXEC mode, follow these steps to configure a DRP for a router on an interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 365

IPv6 Configuring IPv6 ICMP Rate Limiting (CLI)

Step 1

Procedure Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

interface interface-id Example:

Enters interface configuration mode and identifies the Layer 3 interface on which you want to specify the DRP.

Switch(config)# interface gigabitethernet 1/0/1

Step 3

ipv6 nd router-preference {high | medium | low} Example:

Specifies a DRP for the router on the switch interface.

Switch(config-if)# ipv6 nd router-preference medium

Step 4

end Example:
Switch(config)# end

Step 5

show ipv6 interface Example:
Switch# show ipv6 interface

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Returns to privileged EXEC mode. Verifies the configuration. (Optional) Saves your entries in the configuration file.

Configuring IPv6 ICMP Rate Limiting (CLI)
ICMP rate limiting is enabled by default with a default interval between error messages of 100 milliseconds and a bucket size (maximum number of tokens to be stored in a bucket) of 10. Beginning in privileged EXEC mode, follow these steps to change the ICMP rate-limiting parameters:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 366

IPv6 Configuring CEF and dCEF for IPv6

Step 1

Procedure Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2 Step 3

ipv6 icmp error-interval interval [bucketsize] Example:
Switch(config)# ipv6 icmp error-interval 50 20

Configures the interval and bucket size for IPv6 ICMP error messages:
· interval--The interval (in milliseconds) between tokens being added to the bucket. The range is from 0 to 2147483647 milliseconds.
· bucketsize--(Optional) The maximum number of tokens stored in the bucket. The range is from 1 to 200.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

show ipv6 interface [interface-id] Example:

Verifies your entries.

Switch# show ipv6 interface gigabitethernet 1/0/1

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring CEF and dCEF for IPv6
Cisco Express Forwarding (CEF) is a Layer 3 IP switching technology to improve network performance. CEF implements an advanced IP look-up and forwarding algorithm to deliver maximum Layer 3 switching performance. It is less CPU-intensive than fast-switching route-caching, allowing more CPU processing power to be dedicated to packet forwarding. In a switch stack, the hardware uses distributed CEF (dCEF) in the stack. IPv4 CEF and dCEF are enabled by default. IPv6 CEF and dCEF are disabled by default, but automatically enabled when you configure IPv6 routing.
IPv6 CEF and dCEF are automatically disabled when IPv6 routing is unconfigured. IPv6 CEF and dCEF cannot disabled through configuration. You can verify the IPv6 state by entering the show ipv6 cef privileged EXEC command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 367

IPv6 Configuring Static Routing for IPv6 (CLI)

To route IPv6 unicast packets, you must first globally configure forwarding of IPv6 unicast packets by using the ipv6 unicast-routing global configuration command, and you must configure an IPv6 address and IPv6 processing on an interface by using the ipv6 address interface configuration command.
For more information about configuring CEF and dCEF, see Cisco IOS IPv6 Configuration Library on Cisco.com.

Configuring Static Routing for IPv6 (CLI)
Before configuring a static IPv6 route, you must enable routing by using the ip routing global configuration command, enable the forwarding of IPv6 packets by using the ipv6 unicast-routing global configuration command, and enable IPv6 on at least one Layer 3 interface by configuring an IPv6 address on the interface.
For more information about configuring static IPv6 routing, see the "Implementing Static Routes for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

ipv6 route ipv6-prefix/prefix length {ipv6-address | interface-id [ipv6-address]} [administrative distance] Example:
Switch(config)# ipv6 route 2001:0DB8::/32 gigabitethernet2/0/1 130

Configures a static IPv6 route.
· ipv6-prefix--The IPv6 network that is the destination of the static route. It can also be a hostname when static host routes are configured.
· /prefix length--The length of the IPv6 prefix. A decimal value that shows how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). A slash mark must precede the decimal value.
· ipv6-address--The IPv6 address of the next hop that can be used to reach the specified network. The IPv6 address of the next hop need not be directly connected; recursion is done to find the IPv6 address of the directly connected next hop. The address must be in the form documented in RFC 2373, specified in hexadecimal using 16-bit values between colons.
· interface-id--Specifies direct static routes from point-to-point and broadcast interfaces. With point-to-point interfaces, there is no need to specify the IPv6 address of the next hop. With broadcast interfaces, you should always specify the IPv6 address of the next hop, or ensure that the specified prefix is assigned to the link, specifying a link-local address as

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 368

IPv6 Configuring Static Routing for IPv6 (CLI)

Command or Action

Step 3

end Example:
Switch(config)# end

Purpose the next hop. You can optionally specify the IPv6 address of the next hop to which packets are sent.
Note You must specify an interface-id when using a link-local address as the next hop (the link-local next hop must also be an adjacent router).
· administrative distance--(Optional) An administrative distance. The range is 1 to 254; the default value is 1, which gives static routes precedence over any other type of route except connected routes. To configure a floating static route, use an administrative distance greater than that of the dynamic routing protocol.
Returns to privileged EXEC mode.

Step 4

Use one of the following:

Verifies your entries by displaying the contents of the IPv6

· show ipv6 static [ ipv6-address | ipv6-prefix/prefix routing table.

length ] [interface interface-id ] [detail]][recursive] · interface interface-id--(Optional) Displays only those

[detail]

static routes with the specified interface as an egress

· show ipv6 route static [updated]

interface.

Example:
Switch# show ipv6 static 2001:0DB8::/32 interface gigabitethernet2/0/1
or

· recursive--(Optional) Displays only recursive static routes. The recursive keyword is mutually exclusive with the interface keyword, but it can be used with or without the IPv6 prefix included in the command syntax.

Switch# show ipv6 route static

· detail--(Optional) Displays this additional information:

· For valid recursive routes, the output path set, and maximum resolution depth.

· For invalid routes, the reason why the route is not valid.

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 369

IPv6 Configuring RIP for IPv6 (CLI)

Configuring RIP for IPv6 (CLI)
Before configuring the switch to run IPv6 RIP, you must enable routing by using the ip routing global configuration command, enable the forwarding of IPv6 packets by using the ipv6 unicast-routing global configuration command, and enable IPv6 on any Layer 3 interfaces on which IPv6 RIP is to be enabled.
For more information about configuring RIP routing for IPv6, see the "Implementing RIP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com,

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

ipv6 router rip name Example:
Switch(config)# ipv6 router rip cisco

Configures an IPv6 RIP routing process, and enters router configuration mode for the process.

Step 3

maximum-paths number-paths Example:
Switch(config-router)# maximum-paths 6

(Optional) Define the maximum number of equal-cost routes that IPv6 RIP can support. The range is from 1 to 32, and the default is 16 routes.

Step 4

exit Example:
Switch(config-router)# exit

Returns to global configuration mode.

Step 5

interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

Step 6

ipv6 rip name enable Example:
Switch(config-if)# ipv6 rip cisco enable

Enables the specified IPv6 RIP routing process on the interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 370

IPv6 Configuring OSPF for IPv6 (CLI)

Step 7
Step 8 Step 9 Step 10

Command or Action ipv6 rip name default-information {only | originate} Example:
Switch(config-if)# ipv6 rip cisco default-information only

Purpose
(Optional) Originates the IPv6 default route (::/0) into the RIP routing process updates sent from the specified interface.
Note To avoid routing loops after the IPv6 default route (::/0) is originated from any interface, the routing process ignores all default routes received on any interface.

· only--Select to originate the default route, but suppress all other routes in the updates sent on this interface.
· originate--Select to originate the default route in addition to all other routes in the updates sent on this interface.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Use one of the following: · show ipv6 rip [name] [ interfaceinterface-id] [ database ] [ next-hops ] · show ipv6 rip
Example:
Switch# show ipv6 rip cisco interface gigabitethernet2/0/1
or
Switch# show ipv6 rip

· Displays information about current IPv6 RIP processes.
· Displays the current contents of the IPv6 routing table.

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring OSPF for IPv6 (CLI)
You can customize OSPF for IPv6 for your network. However, the defaults for OSPF in IPv6 are set to meet the requirements of most customers and features. Follow these guidelines:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 371

IPv6 Configuring OSPF for IPv6 (CLI)

Step 1 Step 2 Step 3

· Be careful when changing the defaults for IPv6 commands. Changing the defaults might adversely affect OSPF for the IPv6 network.
· Before you enable IPv6 OSPF on an interface, you must enable routing by using the ip routing global configuration command, enable the forwarding of IPv6 packets by using the ipv6 unicast-routing global configuration command, and enable IPv6 on Layer 3 interfaces on which you are enabling IPv6 OSPF.
For more information about configuring OSPF routing for IPv6, see the "Implementing OSPF for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

ipv6 router ospf process-id Example:
Switch(config)# ipv6 router ospf 21

Enables OSPF router configuration mode for the process. The process ID is the number assigned administratively when enabling the OSPF for IPv6 routing process. It is locally assigned and can be a positive integer from 1 to 65535.

area area-id range {ipv6-prefix/prefix length} [advertise (Optional) Consolidates and summarizes routes at an area

| not-advertise] [cost cost]

boundary.

Example:
Switch(config)# area .3 range 2001:0DB8::/32 not-advertise

· area-id--Identifier of the area about which routes are to be summarized. It can be specified as either a decimal value or as an IPv6 prefix.
· ipv6-prefix/prefix length--The destination IPv6 network and a decimal value that shows how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). A slash mark (/) must precede the decimal value.

· advertise--(Optional) Sets the address range status to advertise and generate a Type 3 summary link-state advertisement (LSA).

· not-advertise--(Optional) Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is suppressed, and component networks remain hidden from other networks.

· cost cost--(Optional) Sets the metric or cost for this summary route, which is used during OSPF SPF calculation to determine the shortest paths to the destination. The value can be 0 to 16777215.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 372

IPv6 Configuring OSPF for IPv6 (CLI)

Step 4 Step 5 Step 6 Step 7 Step 8 Step 9
Step 10

Command or Action maximum paths number-paths Example:
Switch(config)# maximum paths 16

Purpose
(Optional) Defines the maximum number of equal-cost routes to the same destination that IPv6 OSPF should enter in the routing table. The range is from 1 to 32, and the default is 16 paths.

exit Example:
Switch(config-if)# exit

Returns to global configuration mode.

interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

ipv6 ospf process-id area area-id [instance instance-id] Enables OSPF for IPv6 on the interface.

Example:

· instance instance-id--(Optional) Instance identifier.

Switch(config-if)# ipv6 ospf 21 area .3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Use one of the following: · show ipv6 ospf [ process-id ] [ area-id ] interface [ interface-id ] · show ipv6 ospf [ process-id ] [ area-id ]
Example:
Switch# show ipv6 ospf 21 interface gigabitethernet2/0/1
or
Switch# show ipv6 ospf 21

· Displays information about OSPF interfaces.
· Displays general information about OSPF routing processes.

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 373

IPv6 Configuring EIGRP for IPv6

Configuring EIGRP for IPv6
Before configuring the switch to run IPv6 EIGRP, enable routing by entering the ip routing global configuration command, enable the forwarding of IPv6 packets by entering the ipv6 unicast-routing global configuration command, and enable IPv6 on any Layer 3 interfaces on which you want to enable IPv6 EIGRP.
To set an explicit router ID, use the show ipv6 eigrp command to see the configured router IDs, and then use the router-id command.
As with EIGRP IPv4, you can use EIGRPv6 to specify your EIGRP IPv6 interfaces and to select a subset of those as passive interfaces. Use the passive-interface command to make an interface passive, and then use the no passive-interface command on selected interfaces to make them active. EIGRP IPv6 does not need to be configured on a passive interface.
For more configuration procedures, see the "Implementing EIGRP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.

Displaying IPv6
For complete syntax and usage information on these commands, see the Cisco IOS command reference publications.
Table 45: Commands for Monitoring IPv6

Command

Purpose

show ipv6 access-list

Displays a summary of access lists.

show ipv6 cef

Displays Cisco Express Forwarding for IPv6.

show ipv6 interface interface-id Displays IPv6 interface status and configuration.

show ipv6 mtu

Displays IPv6 MTU per destination cache.

show ipv6 neighbors

Displays IPv6 neighbor cache entries.

show ipv6 ospf

Displays IPv6 OSPF information.

show ipv6 prefix-list

Displays a list of IPv6 prefix lists.

show ipv6 protocols

Displays IPv6 routing protocols on the switch.

show ipv6 rip

Displays IPv6 RIP routing protocol status.

show ipv6 route

Displays the IPv6 route table entries.

show ipv6 routers

Displays the local IPv6 routers.

show ipv6 static

Displays IPv6 static routes.

show ipv6 traffic

Displays IPv6 traffic statistics.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 374

IPv6 Configuring DHCP for IPv6 Address Assignment

Table 46: Commands for Displaying EIGRP IPv6 Information

Command

Purpose

show ipv6 eigrp [as-number] interface

Displays information about interfaces configured for EIGRP IPv6.

show ipv6 eigrp [as-number] neighbor

Displays the neighbors discovered by EIGRP IPv6.

show ipv6 eigrp [as-number] traffic

Displays the number of EIGRP IPv6 packets sent and received.

show ipv6 eigrp topology [as-number | ipv6-address] Displays EIGRP entries in the IPv6 topology table. [active | all-links | detail-links | pending | summary | zero-successors| Base]

Configuring DHCP for IPv6 Address Assignment
This section describes only the DHCPv6 address assignment. For more information about configuring the DHCPv6 client, server, or relay agent functions, see the "Implementing DHCP for IPv6" chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
Default DHCPv6 Address Assignment Configuration
By default, no DHCPv6 features are configured on the switch.
DHCPv6 Address Assignment Configuration Guidelines
When configuring DHCPv6 address assignment, consider these guidelines: · In the procedures, the specified interface must be one of these Layer 3 interfaces: · DHCPv6 IPv6 routing must be enabled on a Layer 3 interface. · SVI: a VLAN interface created by using the interface vlan vlan_id command. · EtherChannel port channel in Layer 3 mode: a port-channel logical interface created by using the interface port-channel port-channel-number command.
· The switch can act as a DHCPv6 client, server, or relay agent. The DHCPv6 client, server, and relay function are mutually exclusive on an interface.
· The DHCPv6 client, server, or relay agent runs only on the master switch. When there is a stack master re-election, the new master switch retains the DHCPv6 configuration. However, the local RAM copy of the DHCP server database lease information is not retained.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 375

IPv6 Enabling DHCPv6 Server Function (CLI)

Enabling DHCPv6 Server Function (CLI)
Use the no form of the DHCP pool configuration mode commands to change the DHCPv6 pool characteristics. To disable the DHCPv6 server function on an interface, use the no ipv6 dhcp server interface configuration command.
Beginning in privileged EXEC mode, follow these steps to enable the DHCPv6 server function on an interface.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

ipv6 dhcp pool poolname Example:
Switch(config)# ipv6 dhcp pool 7

Enters DHCP pool configuration mode, and define the name for the IPv6 DHCP pool. The pool name can be a symbolic string (such as Engineering) or an integer (such as 0).

Step 3 Step 4 Step 5

address prefix IPv6-prefix {lifetime} {t1 t1 | infinite} Example:
Switch(config-dhcpv6)# address prefix 2001:1000::0/64 lifetime 3600

(Optional) Specifies an address prefix for address assignment.
This address must be in hexadecimal, using 16-bit values between colons.
lifetime t1 t1--Specifies a time interval (in seconds) that an IPv6 address prefix remains in the valid state. The range is 5 to 4294967295 seconds. Specify infinite for no time interval.

link-address IPv6-prefix Example:
Switch(config-dhcpv6)# link-address 2001:1002::0/64

(Optional) Specifies a link-address IPv6 prefix.
When an address on the incoming interface or a link-address in the packet matches the specified IPv6 prefix, the server uses the configuration information pool.
This address must be in hexadecimal, using 16-bit values between colons.

vendor-specific vendor-id Example:
Switch(config-dhcpv6)# vendor-specific 9

(Optional) Enters vendor-specific configuration mode and specifies a vendor-specific identification number. This number is the vendor IANA Private Enterprise Number. The range is 1 to 4294967295.

Step 6

suboption number {address IPv6-address | ascii ASCII-string | hex hex-string}
Example:

(Optional) Enters a vendor-specific suboption number. The range is 1 to 65535. Enter an IPv6 address, ASCII text, or a hex string as defined by the suboption parameters.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 376

IPv6 Enabling DHCPv6 Server Function (CLI)

Step 7 Step 8 Step 9 Step 10
Step 11 Step 12

Command or Action

Purpose

Switch(config-dhcpv6-vs)# suboption 1 address 1000:235D::

exit Example:
Switch(config-dhcpv6-vs)# exit

Returns to DHCP pool configuration mode.

exit Example:
Switch(config-dhcpv6)# exit

Returns to global configuration mode.

interface interface-id Example:

Enters interface configuration mode, and specifies the interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

ipv6 dhcp server [poolname | automatic] [rapid-commit] Enables DHCPv6 server function on an interface.

[preference value] [allow-hint]

· poolname--(Optional) User-defined name for the

Example:

IPv6 DHCP pool. The pool name can be a symbolic

string (such as Engineering) or an integer (such as 0).

Switch(config-if)# ipv6 dhcp server automatic

· automatic--(Optional) Enables the system to automatically determine which pool to use when allocating addresses for a client.

· rapid-commit--(Optional) Allows two-message exchange method.

· preference value--(Optional) Configures the preference value carried in the preference option in the advertise message sent by the server. The range is from 0 to 255. The preference value default is 0.

· allow-hint--(Optional) Specifies whether the server should consider client suggestions in the SOLICIT message. By default, the server ignores client hints.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Do one of the following:

· Verifies DHCPv6 pool configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 377

IPv6 Enabling DHCPv6 Client Function (CLI)

Step 13

Command or Action · show ipv6 dhcp pool · show ipv6 dhcp interface
Example:
Switch# show ipv6 dhcp pool
or
Switch# show ipv6 dhcp interface
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose · Verifies that the DHCPv6 server function is enabled on an interface.
(Optional) Saves your entries in the configuration file.

Enabling DHCPv6 Client Function (CLI)
This task explains how to enable the DHCPv6 client on an interface.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Enters interface configuration mode, and specifies the interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

Step 3

ipv6 address dhcp [rapid-commit]

Enables the interface to acquire an IPv6 address from the

Example:

DHCPv6 server.

rapid-commit--(Optional) Allow two-message exchange

Switch(config-if)# ipv6 address dhcp rapid-commit method for address assignment.

Step 4

ipv6 dhcp client request [vendor-specific] Example:
Switch(config-if)# ipv6 dhcp client request vendor-specific

(Optional) Enables the interface to request the vendor-specific option.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 378

IPv6 Configuration Examples for IPv6 Unicast Routing

Step 5

Command or Action end Example:
Switch(config)# end

Step 6

show ipv6 dhcp interface Example:
Switch# show ipv6 dhcp interface

Purpose Returns to privileged EXEC mode.
Verifies that the DHCPv6 client is enabled on an interface.

Configuration Examples for IPv6 Unicast Routing
Configuring IPv6 Addressing and Enabling IPv6 Routing: Example
This example shows how to enable IPv6 with both a link-local address and a global address based on the IPv6 prefix 2001:0DB8:c18:1::/64. The EUI-64 interface ID is used in the low-order 64 bits of both addresses. Output from the show ipv6 interface EXEC command is included to show how the interface ID (20B:46FF:FE2F:D940) is appended to the link-local prefix FE80::/64 of the interface.
Switch(config)# ipv6 unicast-routing Switch(config)# interface gigabitethernet1/0/11 Switch(config-if)# no switchport Switch(config-if)# ipv6 address 2001:0DB8:c18:1::/64 eui 64 Switch(config-if)# end Switch# show ipv6 interface gigabitethernet1/0/11 GigabitEthernet1/0/11 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::20B:46FF:FE2F:D940 Global unicast address(es): 2001:0DB8:c18:1:20B:46FF:FE2F:D940, subnet is 2001:0DB8:c18:1::/64 [EUI] Joined group address(es):
FF02::1 FF02::2 FF02::1:FF2F:D940 MTU is 1500 bytes ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds ND advertised reachable time is 0 milliseconds ND advertised retransmit interval is 0 milliseconds ND router advertisements are sent every 200 seconds ND router advertisements live for 1800 seconds Hosts use stateless autoconfig for addresses.
Configuring Default Router Preference: Example
This example shows how to configure a DRP of high for the router on an interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 379

IPv6 Configuring IPv4 and IPv6 Protocol Stacks: Example
Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ipv6 nd router-preference high Switch(config-if)# end
Configuring IPv4 and IPv6 Protocol Stacks: Example
This example shows how to enable IPv4 and IPv6 routing on an interface.
Switch(config)# ip routing Switch(config)# ipv6 unicast-routing Switch(config)# interface fastethernet1/0/11 Switch(config-if)# no switchport Switch(config-if)# ip address 192.168.99.1 255.255.255.0 Switch(config-if)# ipv6 address 2001:0DB8:c18:1::/64 eui 64 Switch(config-if)# end
Enabling DHCPv6 Server Function: Example
This example shows how to configure a pool called engineering with an IPv6 address prefix:
Switch# configure terminal Switch(config)# ipv6 dhcp pool engineering Switch(config-dhcpv6)#address prefix 2001:1000::0/64 Switch(config-dhcpv6)# end
This example shows how to configure a pool called testgroup with three link-addresses and an IPv6 address prefix:
Switch# configure terminal Switch(config)# ipv6 dhcp pool testgroup Switch(config-dhcpv6)# link-address 2001:1001::0/64 Switch(config-dhcpv6)# link-address 2001:1002::0/64 Switch(config-dhcpv6)# link-address 2001:2000::0/48 Switch(config-dhcpv6)# address prefix 2001:1003::0/64 Switch(config-dhcpv6)# end
This example shows how to configure a pool called 350 with vendor-specific options:
Switch# configure terminal Switch(config)# ipv6 dhcp pool 350 Switch(config-dhcpv6)# address prefix 2001:1005::0/48 Switch(config-dhcpv6)# vendor-specific 9 Switch(config-dhcpv6-vs)# suboption 1 address 1000:235D::1 Switch(config-dhcpv6-vs)# suboption 2 ascii "IP-Phone" Switch(config-dhcpv6-vs)# end
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 380

IPv6 Enabling DHCPv6 Client Function: Example
Enabling DHCPv6 Client Function: Example
This example shows how to acquire an IPv6 address and to enable the rapid-commit option:
Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ipv6 address dhcp rapid-commit
Configuring IPv6 ICMP Rate Limiting: Example
This example shows how to configure an IPv6 ICMP error message interval of 50 milliseconds and a bucket size of 20 tokens.
Switch(config)#ipv6 icmp error-interval 50 20
Configuring Static Routing for IPv6: Example
This example shows how to configure a floating static route to an interface with an administrative distance of 130:
Switch(config)# ipv6 route 2001:0DB8::/32 gigabitethernet2/0/1 130
Configuring RIP for IPv6: Example
This example shows how to enable the RIP routing process cisco with a maximum of eight equal-cost routes and to enable it on an interface:
Switch(config)# ipv6 router rip cisco Switch(config-router)# maximum-paths 8 Switch(config)# exit Switch(config)# interface gigabitethernet2/0/11 Switch(config-if)# ipv6 rip cisco enable
Displaying IPv6: Example
This is an example of the output from the show ipv6 interface privileged EXEC command:
Switch# show ipv6 interface Vlan1 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::20B:46FF:FE2F:D940 Global unicast address(es):
3FFE:C000:0:1:20B:46FF:FE2F:D940, subnet is 3FFE:C000:0:1::/64 [EUI] Joined group address(es):
FF02::1 FF02::2 FF02::1:FF2F:D940 MTU is 1500 bytes ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 381

IPv6 Displaying IPv6: Example
ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds ND advertised reachable time is 0 milliseconds ND advertised retransmit interval is 0 milliseconds ND router advertisements are sent every 200 seconds ND router advertisements live for 1800 seconds <output truncated>
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 382

2 1 C H A P T E R
Configuring IPv6 Client IP Address Learning
· Prerequisites for IPv6 Client Address Learning, on page 383 · Information About IPv6 Client Address Learning, on page 383 · Configuring IPv6 Unicast (CLI), on page 388 · Configuring RA Guard Policy (CLI), on page 389 · Applying RA Guard Policy (CLI), on page 390 · Configuring RA Throttle Policy (CLI), on page 391 · Applying RA Throttle Policy on VLAN (CLI), on page 392 · Configuring IPv6 Snooping (CLI), on page 393 · Configuring IPv6 ND Suppress Policy (CLI), on page 394 · Configuring IPv6 Snooping on VLAN/PortChannel, on page 395 · Configuring IPv6 on Switch (CLI), on page 396 · Configuring DHCP Pool (CLI), on page 396 · Configuring Stateless Auto Address Configuration Without DHCP (CLI), on page 397 · Configuring Stateless Auto Address Configuration With DHCP (CLI), on page 399 · Configuring Stateful DHCP Locally (CLI), on page 400 · Configuring Stateful DHCP Externally (CLI), on page 402 · Monitoring IPv6 Clients (GUI), on page 404 · Verifying IPv6 Address Learning Configuration, on page 404 · Additional References, on page 405 · Feature Information for IPv6 Client Address Learning, on page 406
Prerequisites for IPv6 Client Address Learning
Before configuring IPv6 client address learning, configure the wireless clients to support IPv6. Related Topics
Configuring RA Guard Policy (CLI), on page 389
Information About IPv6 Client Address Learning
Client Address Learning is configured on switch to learn the wireless client's IPv4 and IPv6 address and clients transition state maintained by the switch on an association, re-association, de-authentication and timeout.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 383

IPv6 SLAAC Address Assignment
There are three ways for IPv6 client to acquire IPv6 addresses: · Stateless Address Auto-Configuration (SLACC) · Stateful DHCPv6 · Static Configuration
For all of these methods, the IPv6 client always sends neighbor solicitation DAD (Duplicate Address Detection) request to ensure there is no duplicate IP address on the network. The switch snoops the client's NDP and DHCPv6 packets to learn about its client IP addresses.
SLAAC Address Assignment
The most common method for IPv6 client address assignment is Stateless Address Auto-Configuration (SLAAC). SLAAC provides simple plug-and-play connectivity where clients self-assign an address based on the IPv6 prefix. This process is achieved Stateless Address Auto-Configuration (SLAAC) is configured as follows:
· Host sends a router solicitation message. · Hosts waits for a Router Advertisement message. · Hosts take the first 64 bits of the IPv6 prefix from the Router Advertisement message and combines it
with the 64 bit EUI-64 address (in the case of ethernet, this is created from the MAC Address) to create a global unicast message. The host also uses the source IP address, in the IP header, of the Router Advertisement message, as its default gateway. · Duplicate Address Detection is performed by IPv6 clients in order to ensure that random addresses that are picked do not collide with other clients. · The choice of algorithm is up to the client and is often configurable. The last 64 bits of the IP v6 address can be learned based on the following 2 algorithms: · EUI-64 which is based on the MAC address of the interface, or · Private addresses that are randomly generated.
Figure 16: SLAAC Address Assignment
The following Cisco IOS configuration commands from a Cisco-capable IPv6 router are used to enable SLAAC addressing and router advertisements:
ipv6 unicast-routing interface Vlan20
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 384

IPv6 Stateful DHCPv6 Address Assignment
description IPv6-SLAAC ip address 192.168.20.1 255.255.255.0 ipv6 address FE80:DB8:0:20::1 linklocal ipv6 address 2001:DB8:0:20::1/64 ipv6 enable end
Related Topics Configuring IPv6 Snooping (CLI), on page 393 Configuring DHCP Pool (CLI), on page 396 Configuring Stateless Auto Address Configuration Without DHCP (CLI), on page 397 Configuring Stateless Auto Address Configuration With DHCP (CLI), on page 399 Configuring Stateful DHCP Locally (CLI), on page 400 Configuring Stateful DHCP Externally (CLI), on page 402
Stateful DHCPv6 Address Assignment
Figure 17: Stateful DHCPv6 Address Assignment
The use of DHCPv6 is not required for IPv6 client connectivity if SLAAC is already deployed. There are two modes of operation for DHCPv6 called Stateless and Stateful. The DHCPv6 Stateless mode is used to provide clients with additional network information that is not available in the router advertisement, but not an IPv6 address as this is already provided by SLAAC. This information can include the DNS domain name, DNS server(s), and other DHCP vendor-specific options. This interface configuration is for a Cisco IOS IPv6 router implementing stateless DHCPv6 with SLAAC enabled:
ipv6 unicast-routing ipv6 dhcp pool IPV6_DHCPPOOL address prefix 2001:db8:5:10::/64 domain-name cisco.com dns-server 2001:db8:6:6::1 interface Vlan20 description IPv6-DHCP-Stateless ip address 192.168.20.1 255.255.255.0 ipv6 nd other-config-flag ipv6 dhcp server IPV6_DHCPPOOL ipv6 address 2001:DB8:0:20::1/64 end
The DHCPv6 Stateful option, also known as managed mode, operates similarly to DHCPv4 in that it assigns unique addresses to each client instead of the client generating the last 64 bits of the address as in SLAAC. This interface configuration is for a Cisco IOS IPv6 router implementing stateful DHCPv6 on a local Switch:
ipv6 unicast-routing ipv6 dhcp pool IPV6_DHCPPOOL address prefix 2001:db8:5:10::/64 domain-name cisco.com dns-server 2001:db8:6:6::1 interface Vlan20
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 385

IPv6 Static IP Address Assignment
description IPv6-DHCP-Stateful ip address 192.168.20.1 255.255.255.0 ipv6 address 2001:DB8:0:20::1/64 ipv6 nd prefix 2001:DB8:0:20::/64 no-advertise ipv6 nd managed-config-flag ipv6 nd other-config-flag ipv6 dhcp server IPV6_DHCPPOOL end
This interface configuration is for a Cisco IOS IPv6 router implementing stateful DHCPv6 on an external DHCP server:
ipv6 unicast-routing domain-name cisco.com dns-server 2001:db8:6:6::1 interface Vlan20 description IPv6-DHCP-Stateful ip address 192.168.20.1 255.255.255.0 ipv6 address 2001:DB8:0:20::1/64 ipv6 nd prefix 2001:DB8:0:20::/64 no-advertise ipv6 nd managed-config-flag ipv6 nd other-config-flag ipv6 dhcp_relay destination 2001:DB8:0:20::2 end
Related Topics Configuring IPv6 Snooping (CLI), on page 393 Configuring DHCP Pool (CLI), on page 396 Configuring Stateless Auto Address Configuration Without DHCP (CLI), on page 397 Configuring Stateless Auto Address Configuration With DHCP (CLI), on page 399 Configuring Stateful DHCP Locally (CLI), on page 400 Configuring Stateful DHCP Externally (CLI), on page 402
Static IP Address Assignment
Statically configured address on a client.
Router Solicitation
A Router Solicitation message is issued by a host controller to facilitate local routers to transmit Router Advertisement from which it can obtain information about local routing or perform Stateless Auto-configuration. Router Advertisements are transmitted periodically and the host prompts with an immediate Router Advertisement using a Router Solicitation such as - when it boots or following a restart operation. Related Topics
Configuring IPv6 ND Suppress Policy (CLI), on page 394
Router Advertisement
A Router Advertisement message is issued periodically by a router or in response to a Router Solicitation message from a host. The information contained in these messages is used by hosts to perform Stateless Auto-configuration and to modify its routing table. Related Topics
Configuring IPv6 ND Suppress Policy (CLI), on page 394
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 386

IPv6 Neighbor Discovery

Neighbor Discovery
IPv6 Neighbor Discovery is a set of messages and processes that determine relationships between neighboring nodes. Neighbor Discovery replaces ARP, ICMP Router Discovery, and ICMP Redirect used in IPv4.
IPv6 Neighbor Discovery inspection analyzes neighbor discovery messages in order to build a trusted binding table database, and IPv6 neighbor discovery packets that do not comply are dropped. The neighbor binding table in the switch tracks each IPv6 address and its associated MAC address. Clients are expired from the table according to Neighbor Binding timers.
Related Topics Configuring IPv6 ND Suppress Policy (CLI), on page 394
Neighbor Discovery Suppression
The IPv6 addresses of wireless clients are cached by the switch. When the switch receives an NS multicast looking for an IPv6 address, and if the target address is known to the switch and belongs to one of its clients, the switch will reply with an NA message on behalf of the client. The result of this process generates the equivalent of the Address Resolution Protocol (ARP) table of IPv4 but is more efficient - uses generally fewer messages.

Note The switch acts like proxy and respond with NA, only when the ipv6 nd suppress command is configured
If the switch does not have the IPv6 address of a wireless client, the switch will not respond with NA and forward the NS packet to the wireless side. To resolve this, an NS Multicast Forwarding knob is provided. If this knob is enabled, the switch gets the NS packet for the IPv6 address that it does not have (cache miss) and forwards it to the wireless side. This packet reaches the intended wireless client and the client replies with NA.
This cache miss scenario occurs rarely, and only very few clients which do not implement complete IPv6 stack may not advertise their IPv6 address during NDP.
Related Topics Configuring IPv6 ND Suppress Policy (CLI), on page 394

RA Guard

IPv6 clients configure IPv6 addresses and populate their router tables based on IPv6 router advertisement (RA) packets. The RA guard feature is similar to the RA guard feature of wired networks. RA guard increases the security of the IPv6 network by dropping the unwanted or rogue RA packets that come from wireless clients. If this feature is not configured, malicious IPv6 wireless clients announce themselves as the router for the network often with high priority, which would take higher precedence over legitimate IPv6 routers.
RA-Guard also examines the incoming RA's and decides whether to switch or block them based solely on information found in the message or in the switch configuration. The information available in the frames received is useful for RA validation:
· Port on which the frame is received
· IPv6 source address

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 387

IPv6 RA Throttling
· Prefix list
The following configuration information created on the switch is available to RA-Guard to validate against the information found in the received RA frame:
· Trusted/Untrusted ports for receiving RA-guard messages · Trusted/Untrusted IPv6 source addresses of RA-sender · Trusted/Untrusted Prefix list and Prefix ranges · Router Preference
RA guard occurs at the switch. You can configure the switch to drop RA messages at the switch. All IPv6 RA messages are dropped, which protects other wireless clients and upstream wired network from malicious IPv6 clients.
//Create a policy for RA Guard// ipv6 nd raguard policy raguard-router trusted-port device-role router //Applying the RA Guard Policy on port/interface// interface tengigabitethernet1/0/1 (Katana) interface gigabitethernet1/0/1 (Edison)
ipv6 nd raguard attach-policy raguard-router
Related Topics Configuring RA Guard Policy (CLI), on page 389 Applying RA Guard Policy (CLI), on page 390 Configuring RA Throttle Policy (CLI), on page 391 Applying RA Throttle Policy on VLAN (CLI), on page 392
RA Throttling
RA throttling allows the controller to enforce limits to RA packets headed toward the wireless network. By enabling RA throttling, routers that send many RA packets can be trimmed to a minimum frequency that will still maintain an IPv6 client connectivity. If a client sends an RS packet, an RA is sent back to the client. This RA is allowed through the controller and unicasted to the client. This process ensures that the new clients or roaming clients are not affected by the RA throttling. Related Topics
Configuring RA Guard Policy (CLI), on page 389 Applying RA Guard Policy (CLI), on page 390 Configuring RA Throttle Policy (CLI), on page 391 Applying RA Throttle Policy on VLAN (CLI), on page 392
Configuring IPv6 Unicast (CLI)
IPv6 unicasting must always be enabled on the switch and the controller. IPv6 unicast routing is disabled.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 388

IPv6 Configuring RA Guard Policy (CLI)

Before you begin
To enable the forwarding of IPv6 unicast datagrams, use the ipv6 unicast-routing command in global configuration mode. To disable the forwarding of IPv6 unicast datagrams, use the no form of this command.

SUMMARY STEPS

1. configure terminal 2. ipv6 unicast routing

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ipv6 unicast routing Example:
Switch (config)# ipv6 unicast routing

enable the forwarding of IPv6 unicast datagrams

Configuring RA Guard Policy (CLI)
Configure RA Guard policy on the switch to add IPv6 client addresses and populate the router table based on IPv6 router advertisement packets.

SUMMARY STEPS

1. configure terminal 2. ipv6 nd raguard policy raguard-router 3. trustedport 4. device-role router 5. exit

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ipv6 nd raguard policy raguard-router Example:

Defines the RA guard policy name and enters RA guard policy configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 389

IPv6 Applying RA Guard Policy (CLI)

Step 3 Step 4 Step 5

Command or Action
Switch(config)# ipv6 nd raguard policy raguard-router
trustedport Example:
Switch(config-ra-guard)# trustedport
device-role router Example:
Switch(config-ra-guard)# device-role router
exit Example:
Switch(config-ra-guard)# exit

Purpose
(Optional) Specifies that this policy is being applied to trusted ports.
Specifies the role of the device attached to the port.
Exits RA guard policy configuration mode and returns to global configuration mode.

Related Topics Prerequisites for IPv6 Client Address Learning, on page 383 RA Guard, on page 387 RA Throttling, on page 388 Applying RA Guard Policy (CLI), on page 390 Configuring RA Throttle Policy (CLI), on page 391 Applying RA Throttle Policy on VLAN (CLI), on page 392

Applying RA Guard Policy (CLI)
Applying the RA Guard policy on the switch will block all the untrusted RA's.

SUMMARY STEPS

1. configure terminal 2. interface tengigabitethernet 1/0/1 3. ipv6 nd raguard attach-policy raguard-router 4. exit

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface tengigabitethernet 1/0/1 Example:

Specifies an interface type and number, and places the device in interface configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 390

IPv6 Configuring RA Throttle Policy (CLI)

Step 3 Step 4

Command or Action

Purpose

Switch (config)# interface tengigabitethernet 1/0/1

ipv6 nd raguard attach-policy raguard-router Applies the IPv6 RA Guard feature to a specified interface.
Example:
Switch(config-if)# ipv6 nd raguard attach-policy raguard-router

exit Example:
Switch(config-if)# exit

Exits interface configuration mode.

Related Topics Configuring RA Guard Policy (CLI), on page 389 RA Guard, on page 387 RA Throttling, on page 388 Configuring RA Throttle Policy (CLI), on page 391 Applying RA Throttle Policy on VLAN (CLI), on page 392

Configuring RA Throttle Policy (CLI)
Configure RA Throttle policy to allow the enforce the limits

SUMMARY STEPS

1. configure terminal 2. ipv6 nd ra-throttler policy ra-throttler1 3. throttleperiod500 4. max-through10 5. allow-atleast 5 at-most 10

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ipv6 nd ra-throttler policy ra-throttler1
Example:
Switch(config)# ipv6 nd ra-throttler policy ra-throttler1

Define the router advertisement (RA) throttler policy name and enter IPv6 RA throttle policy configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 391

IPv6 Applying RA Throttle Policy on VLAN (CLI)

Step 3 Step 4 Step 5

Command or Action

Purpose

throttleperiod500

Configures the throttle period in an IPv6 RA throttler policy.

Example:
Switch(config-nd-ra-throttle)# throttleperiod 500

max-through10 Example:
Switch(config-nd-ra-throttle)# max-through 500

Limits multicast RAs per VLAN per throttle period.

allow-atleast 5 at-most 10
Example:
Switch(config-nd-ra-throttle)# allow-atleast 5 at-most 10

Limits the number of multicast RAs per device per throttle period in an RA throttler policy.

Related Topics Configuring RA Guard Policy (CLI), on page 389 Applying RA Guard Policy (CLI), on page 390 RA Guard, on page 387 RA Throttling, on page 388 Applying RA Throttle Policy on VLAN (CLI), on page 392

Applying RA Throttle Policy on VLAN (CLI)
Applying the RA Throttle policy on a VLAN. By enabling RA throttling, routers that send many RA packets can be trimmed to a minimum frequency that will still maintain an IPv6 client connectivity.

SUMMARY STEPS

1. configure terminal 2. vlan configuration 1 3. ipv6 nd ra throttler attach-policy ra-throttler1

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

vlan configuration 1 Example:
Switch(config)# vlan configuration 1

Configures a VLAN or a collection of VLANs and enters VLAN configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 392

IPv6 Configuring IPv6 Snooping (CLI)

Step 3

Command or Action
ipv6 nd ra throttler attach-policy ra-throttler1 Example:
Switch(config-vlan)# ipv6 nd ra throttler attach-policy ra-throttler1

Purpose
Attaches an IPv6 RA throttler policy to a VLAN or a collection of VLANs.

Related Topics Configuring RA Guard Policy (CLI), on page 389 Applying RA Guard Policy (CLI), on page 390 Configuring RA Throttle Policy (CLI), on page 391 RA Guard, on page 387 RA Throttling, on page 388

Configuring IPv6 Snooping (CLI)
IPv6 snooping must always be enabled on the switch and the controller.

Before you begin Enable IPv6 on the client machine.

SUMMARY STEPS

1. vlan configuration 1 2. ipv6 snooping 3. ipv6 nd suppress 4. exit

DETAILED STEPS

Step 1

Command or Action vlan configuration 1 Example:
Switch(config)# vlan configuration 1

Step 2

ipv6 snooping Example:

Purpose Enters Vlan configuration mode.
Enables IPv6 snooping on the Vlan.

Step 3

Switch(config-vlan)# ipv6 snooping
ipv6 nd suppress Example:

Enables the IPv6 ND suppress on the Vlan.

Switch(config-vlan-config)# ipv6 nd suppress

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 393

IPv6 Configuring IPv6 ND Suppress Policy (CLI)

Step 4

Command or Action exit Example:
Switch(config-vlan-config)# exit

Purpose
Saves the configuration and comes out of the Vlan configuration mode.

Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385

Configuring IPv6 ND Suppress Policy (CLI)
The IPv6 neighbor discovery (ND) multicast suppress feature stops as many ND multicast neighbor solicit (NS) messages as possible by dropping them (and responding to solicitations on behalf of the targets) or converting them into unicast traffic. This feature runs on a layer 2 switch or a wireless controller and is used to reduce the amount of control traffic necessary for proper link operations.
When an address is inserted into the binding table, an address resolution request sent to a multicast address is intercepted, and the device either responds on behalf of the address owner or, at layer 2, converts the request into a unicast message and forwards it to its destination.

SUMMARY STEPS

1. enable 2. configure terminal 3. ipv6 nd suppress policy

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch(config)# enable

Step 2

configure terminal Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters the global configuration mode.

Switch# configure terminal

Step 3

ipv6 nd suppress policy Example:
Switch (config)# ipv6 nd suppress policy
Related Topics Router Solicitation, on page 386 Router Advertisement, on page 386

Defines the ND suppress policy name and enters ND suppress policy configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 394

IPv6 Configuring IPv6 Snooping on VLAN/PortChannel

Neighbor Discovery, on page 387 Neighbor Discovery Suppression, on page 387

Configuring IPv6 Snooping on VLAN/PortChannel
Neighbor Discover (ND) suppress can be enabled or disabled on either the VLAN or a switchport.

Before you begin

SUMMARY STEPS

1. vlan config901 2. ipv6 nd suppress 3. end 4. interface gi1/0/1 5. ipv6 nd suppress 6. end

DETAILED STEPS

Step 1

Command or Action vlan config901 Example:
Switch(config)# vlan config901

Step 2

ipv6 nd suppress Example:
Switch(config-vlan)# ipv6 nd suppress

Step 3

end Example:
Switch(config-vlan)# end

Step 4

interface gi1/0/1 Example:
Switch (config)# interface gi1/0/1

Step 5

ipv6 nd suppress Example:
Switch(config-vlan)# ipv6 nd suppress

Step 6

end Example:
Switch(config-vlan)# end

Purpose Creates a VLAN and enter the VLAN configuration mode
Applies the IPv6 nd suppress on VLAN.
Exits vlan configuration mode and enters the global configuration mode. Creates a gigabitethernet port interface.
Applies the IPv6 nd suppress on the interface.
Exits vlan configuration mode and enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 395

IPv6 Configuring IPv6 on Switch (CLI)

Configuring IPv6 on Switch (CLI)
Use this configuration example to configure IPv6 on an interface.

Before you begin Enable IPv6 on the client and IPv6 support on the wired infrastructure.

SUMMARY STEPS

1. interface vlan 1 2. ip address fe80::1 link-local 3. ipv6 enable 4. end

DETAILED STEPS

Step 1

Command or Action interface vlan 1 Example:
Switch(config)# interface vlan 1

Step 2

ip address fe80::1 link-local
Example:
Switch(config-if)# ip address 198.51.100.1 255.255.255.0
Switch(config-if)# ipv6 address fe80::1 link-local
Switch(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64
Switch(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64

Step 3

ipv6 enable Example:
Switch(config)# ipv6 enable

Step 4

end Example:
Switch(config)# end

Purpose Creates a interface and enters interface configuration mode. Configures IPv6 address on the interface using the link-local option.
(Optional) Enables IPv6 on the interface. Exits from the interface mode.

Configuring DHCP Pool (CLI)

SUMMARY STEPS

1. ipv6 dhcp pool Vlan21

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 396

IPv6 Configuring Stateless Auto Address Configuration Without DHCP (CLI)

2. address prefix 2001:DB8:0:1:FFFF:1234::/64 lifetime 300 10 3. dns-server 2001:100:0:1::1 4. domain-name example.com 5. end

DETAILED STEPS

Step 1

Command or Action ipv6 dhcp pool Vlan21 Example:
Switch(config)# ipv6 dhcp pool vlan1

Purpose
Enters the configuration mode and configures the IPv6 DHCP pool on the Vlan.

Step 2

address prefix 2001:DB8:0:1:FFFF:1234::/64 lifetime 300 10
Example:
Switch(config-dhcpv6)# address prefix 2001:DB8:0:1:FFFF:1234::/64 lifetime 300 10

Enters the configuration-dhcp mode and configures the address pool and its lifetime on a Vlan.

Step 3

dns-server 2001:100:0:1::1 Example:
Switch(config-dhcpv6)# dns-server 2001:20:21::1

Configures the DNS servers for the DHCP pool.

Step 4

domain-name example.com Example:
Switch(config-dhcpv6)# domain-name example.com

Configures the domain name to complete unqualified host names.

Step 5

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385

ConfiguringStatelessAutoAddressConfigurationWithoutDHCP (CLI)

SUMMARY STEPS

1. interface vlan 1 2. ip address fe80::1 link-local 3. ipv6 enable 4. no ipv6 nd managed-config-flag 5. no ipv6 nd other-config-flag

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 397

IPv6 Configuring Stateless Auto Address Configuration Without DHCP (CLI)

6. end

DETAILED STEPS

Step 1

Command or Action interface vlan 1 Example:
Switch(config)# interface vlan 1

Purpose Creates a interface and enters interface configuration mode.

Step 2

ip address fe80::1 link-local
Example:
Switch(config-if)# ip address 198.51.100.1 255.255.255.0
Switch(config-if)# ipv6 address fe80::1 link-local
Switch(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64
Switch(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64

Configures IPv6 address on the interface using the link-local option.

Step 3

ipv6 enable Example:
Switch(config)# ipv6 enable

(Optional) Enables IPv6 on the interface.

Step 4

no ipv6 nd managed-config-flag Example:

Ensures the attached hosts do not use stateful autoconfiguration to obtain addresses.

Switch(config)#interface vlan 1 Switch(config-if)# no ipv6 nd managed-config-flag

Step 5

no ipv6 nd other-config-flag Example:
Switch(config-if)# no ipv6 nd other-config-flag

Ensures the attached hosts do not use stateful autoconfiguration to obtain non-address options from DHCP (domain etc).

Step 6

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 398

IPv6 Configuring Stateless Auto Address Configuration With DHCP (CLI)

Configuring Stateless Auto Address Configuration With DHCP (CLI)

SUMMARY STEPS

1. interface vlan 1 2. ip address fe80::1 link-local 3. ipv6 enable 4. no ipv6 nd managed-config-flag 5. ipv6 nd other-config-flag 6. end

DETAILED STEPS

Step 1

Command or Action interface vlan 1 Example:
Switch(config)# interface vlan 1

Purpose Creates a interface and enters interface configuration mode.

Step 2

ip address fe80::1 link-local
Example:
Switch(config-if)# ip address 198.51.100.1 255.255.255.0
Switch(config-if)# ipv6 address fe80::1 link-local
Switch(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64
Switch(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64

Configures IPv6 address on the interface using the link-local option.

Step 3

ipv6 enable Example:
Switch(config)# ipv6 enable

(Optional) Enables IPv6 on the interface.

Step 4

no ipv6 nd managed-config-flag Example:

Ensures the attached hosts do not use stateful autoconfiguration to obtain addresses.

Switch(config)#interface vlan 1 Switch(config-if)# no ipv6 nd managed-config-flag

Step 5

ipv6 nd other-config-flag Example:
Switch(config-if)# no ipv6 nd other-config-flag

Ensures the attached hosts do not use stateful autoconfiguration to obtain non-address options from DHCP (domain etc).

Step 6

end Example:
Switch(config)# end

Exits from the interface mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 399

IPv6 Configuring Stateful DHCP Locally (CLI)

Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385

Configuring Stateful DHCP Locally (CLI)
This interface configuration is for a Cisco IOS IPv6 router implementing stateful DHCPv6 on a local Switch

SUMMARY STEPS

1. configure terminal 2. ipv6 unicast-routing 3. ipv6 dhcp pool IPv6_DHCPPOOL 4. address prefix 2001:DB8:0:1:FFFF:1234::/64 5. dns-server 2001:100:0:1::1 6. domain-name example.com 7. exit 8. interface vlan1 9. description IPv6-DHCP-Stateful 10. ipv6 address 2001:DB8:0:20::1/64 11. ip address 192.168.20.1 255.255.255.0 12. ipv6 nd prefix 2001:db8::/64 no-advertise 13. ipv6 nd managed-config-flag 14. ipv6 nd other-config-flag 15. ipv6 dhcp server IPv6_DHCPPOOL

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3 Step 4

ipv6 unicast-routing Example:
Switch(config)# ipv6 unicast-routing

Configures IPv6 for unicasting.

ipv6 dhcp pool IPv6_DHCPPOOL Example:
Switch (config)# ipv6 dhcp pool IPv6_DHCPPOOL

Enters the configuration mode and configures the IPv6 DHCP pool on the VLAN.

address prefix 2001:DB8:0:1:FFFF:1234::/64 Specifies the address range to provide in the pool. Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 400

IPv6 Configuring Stateful DHCP Locally (CLI)

Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14

Command or Action
Switch (config-dhcpv6)# address prefix 2001:DB8:0:1:FFFF:1234::/64

Purpose

dns-server 2001:100:0:1::1

Provides the DNS server option to DHCP clients.

Example:

Switch (config-dhcpv6)# dns-server 2001:100:0:1::1

domain-name example.com

Provides the domain name option to DHCP clients.

Example:

Switch (config-dhcpv6)# domain-name example.com

exit Example:
Switch (config-dhcpv6)# exit

Returns to the previous mode.

interface vlan1 Example:
Switch (config)# interface vlan 1

Enters the interface mode to configure the stateful DHCP.

description IPv6-DHCP-Stateful

Enter description for the stateful IPv6 DHCP.

Example:

Switch (config-if)# description IPv6-DHCP-Stateful

ipv6 address 2001:DB8:0:20::1/64
Example:
Switch (config-if)# ipv6 address 2001:DB8:0:20::1/64

Enters the IPv6 address for the stateful IPv6 DHCP.

ip address 192.168.20.1 255.255.255.0
Example:
Switch (config-if)# ip address 192.168.20.1 255.255.255.0

Enters the IPv6 address for the stateful IPv6 DHCP.

ipv6 nd prefix 2001:db8::/64 no-advertise Example:

Configures the IPv6 routing prefix advertisement that must not be advertised.

Switch (config-if)# ipv6 nd prefix 2001:db8::/64 no-advertise

ipv6 nd managed-config-flag Example:

Configures IPv6 interfaces neighbor discovery to allow the hosts to uses DHCP for address configuration.

Switch (config-if)# ipv6 nd managed-config-flag

ipv6 nd other-config-flag Example:
Switch (config-if)# ipv6 nd other-config-flag

Configures IPv6 interfaces neighbor discovery to allow the hosts to uses DHCP for non-address configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 401

IPv6 Configuring Stateful DHCP Externally (CLI)

Step 15

Command or Action

Purpose

ipv6 dhcp server IPv6_DHCPPOOL

Configures the DHCP server on the interface.

Example:
Switch (config-if)# ipv6 dhcp server IPv6_DHCPPOOL

Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385

Configuring Stateful DHCP Externally (CLI)
This interface configuration is for a Cisco IOS IPv6 router implementing stateful DHCPv6 on an external DHCP server.

SUMMARY STEPS

1. configure terminal 2. ipv6 unicast-routing 3. dns-server 2001:100:0:1::1 4. domain-name example.com 5. exit 6. interface vlan1 7. description IPv6-DHCP-Stateful 8. ipv6 address 2001:DB8:0:20::1/64 9. ip address 192.168.20.1 255.255.255.0 10. ipv6 nd prefix 2001:db8::/64 no-advertise 11. ipv6 nd managed-config-flag 12. ipv6 nd other-config-flag 13. ipv6 dhcp_relaydestination 2001:DB8:0:20::2

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ipv6 unicast-routing Example:
Switch(config)# ipv6 unicast-routing

Configures the IPv6 for unicasting.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 402

IPv6 Configuring Stateful DHCP Externally (CLI)

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13

Command or Action

Purpose

dns-server 2001:100:0:1::1

Provides the DNS server option to DHCP clients.

Example:
Switch (config-dhcpv6)# dns-server 2001:100:0:1::1

domain-name example.com

Provides the domain name option to DHCP clients.

Example:

Switch (config-dhcpv6)# domain-name example.com

exit Example:
Switch (config-dhcpv6)# exit

Returns to the previous mode.

interface vlan1 Example:
Switch (config)# interface vlan 1

Enters the interface mode to configure the stateful DHCP.

description IPv6-DHCP-Stateful

Enter description for the stateful IPv6 DHCP.

Example:

Switch (config-if)# description IPv6-DHCP-Stateful

ipv6 address 2001:DB8:0:20::1/64
Example:
Switch (config-if)# ipv6 address 2001:DB8:0:20::1/64

Enters the IPv6 address for the stateful IPv6 DHCP.

ip address 192.168.20.1 255.255.255.0
Example:
Switch (config-if)# ip address 192.168.20.1 255.255.255.0

Enters the IPv6 address for the stateful IPv6 DHCP.

ipv6 nd prefix 2001:db8::/64 no-advertise Example:

Configures the IPv6 routing prefix advertisement that must not be advertised.

Switch (config-if)# ipv6 nd prefix 2001:db8::/64 no-advertise

ipv6 nd managed-config-flag Example:

Configures IPv6 interfaces neighbor discovery to allow the hosts to uses DHCP for address configuration.

Switch (config-if)# ipv6 nd managed-config-flag

ipv6 nd other-config-flag Example:
Switch (config-if)# ipv6 nd other-config-flag

Configures IPv6 interfaces neighbor discovery to allow the hosts to uses DHCP for non-address configuration.

ipv6 dhcp_relaydestination 2001:DB8:0:20::2 Example:

Configures the DHCP server on the interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 403

IPv6 Monitoring IPv6 Clients (GUI)

Command or Action

Purpose

Switch (config-if)# ipv6 dhcp_relay destination 2001:DB8:0:20::2

Related Topics SLAAC Address Assignment, on page 384 Stateful DHCPv6 Address Assignment, on page 385

Monitoring IPv6 Clients (GUI)
To view the IPv6 clients associated with the Switch

Select Monitor > Clients
The Clients page is displayed. The Clients page contains the following details:
· Client MAC Address-- Displays the MAC address of the client. · AP Name-- Displays the access point name to which the client is connected to. · WLAN-- Displays the WLAN associated with the client. · State-- Displays the client authentication. · Protocol-- Displays the protocol used.
To view the client related general details, click the Client MAC Address parameter in the Clients page. The Client > Detail page displays IPv6 addresses of the client under the General tab.

Verifying IPv6 Address Learning Configuration
This example displays the output of the show ipv6 dhcp pool command. This command displays the IPv6 service configuration on the switch. The vlan 21 configured pool detail displays 6 clients that are currently using addresses from the pool.

SUMMARY STEPS

1. show ipv6 dhcp pool

DETAILED STEPS

Step 1

Command or Action

Purpose

show ipv6 dhcp pool

Displays the IPv6 service configuration on the switch.

Example:
Switchshow ipv6 dhcp pool DHCPv6 pool: vlan21 Address allocation prefix: 2001:DB8:0:1:FFFF:1234::/64 valid 86400 preferred
86400 (6 in use, 0 conflicts)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 404

IPv6 Additional References

Command or Action
DNS server: 2001:100:0:1::1 Domain name: example.com Active clients: 6

Purpose

Additional References

Related Documents

Related Topic

Document Title

IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches)

IP command reference IP Command Reference (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 405

IPv6 Feature Information for IPv6 Client Address Learning

Feature Information for IPv6 Client Address Learning

This table lists the features in this module and provides links to specific configuration information:

Feature

Release

Modification

IPv6 Client Address Learning Functionality

Cisco IOS XE 3.3SE

This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 406

2 2 C H A P T E R
Configuring IPv6 WLAN Security
· Prerequisites for IPv6 WLAN Security, on page 407 · Restrictions for IPv6 WLAN Security, on page 407 · Information About IPv6 WLAN Security, on page 407 · How to Configure IPv6 WLAN Security, on page 410 · Additional References , on page 426 · Feature Information for IPv6 WLAN Security, on page 427
Prerequisites for IPv6 WLAN Security
A client VLAN must be mapped to the WLAN configured on the switch
Restrictions for IPv6 WLAN Security
RADIUS Server Support · If multiple RADIUS servers are configured for redundancy, the user database must be identical in all the servers for the backup to work properly.
Radius ACS Support · You must configure RADIUS on both your Cisco Secure Access Control Server (ACS) and your switch · RADIUS is supported on Cisco Secure ACS version 3.2 and later releases.
Information About IPv6 WLAN Security
Information About RADIUS Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol that provides centralized security for users attempting to gain management access to a network. It serves as a back-end database similar to Local EAP and provides authentication and accounting services.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 407

IPv6 Information About IPv6 WLAN Security
· Authentication--The process of verifying users when they attempt to log into the switch Users must enter a valid username and password for the switch to authenticate users to the RADIUS server. If multiple databases are configured, then specify the sequence in which the backend database must be tried.
· Accounting-- The process of recording user actions and changes. Whenever a user successfully executes an action, the RADIUS accounting server logs the changed attributes, the user ID of the person who made the change, the remote host where the user is logged in, the date and time when the command was executed, the authorization level of the user, and a description of the action performed and the values provided. If the RADIUS accounting server is unreachable, the users can continue their sessions uninterrupted.
User Datagram Protocol-- RADIUS uses User Datagram Protocol (UDP) for its transport. It maintains a database and listens on UDP port 1812 for incoming authentication requests and UDP port 1813 for incoming accounting requests. The switch, which requires access control, acts as the client and requests AAA services from the server. The traffic between the switch and the server is encrypted by an algorithm defined in the protocol and a shared secret key configured on both devices. Configures multiple RADIUS accounting and authentication servers. For example, you can have one central RADIUS authentication server but several RADIUS accounting servers in different regions. If you configure multiple servers of the same type and the first one fails or becomes unreachable, the controller automatically tries the second one, then the third one if necessary, and so on. When RADIUS method is configured for the WLAN, the switch will use the RADIUS method configured for the WLAN. When the WLAN is configured to use local EAP, the RADIUS method configured on the WLAN points to Local. The WLAN must also be configured with the name of the local EAP profile to use. If no RADIUS method is configured in the WLAN, the switch will use the default RADIUS method defined in global mode.
Information About Local EAP Local EAP is an authentication method that allows users and wireless clients to be authenticated locally. It is designed for use in remote offices that maintain connectivity to wireless clients when the back-end system is disrupted or the external authentication server goes down. When you enable local EAP, the switch serves as the authentication server and the local user database, which removes dependence on an external authentication server. Local EAP retrieves user credentials from the local user database or the LDAP back-end database to authenticate users. Local EAP supports LEAP, EAP-FAST, EAP-TLS, PEAPv0/MSCHAPv2, and PEAPv1/GTC authentication between the controller and wireless clients.
Note The LDAP back-end database supports these local EAP methods: EAP-TLS, EAP-FAST/GTC, and PEAPv1/GTC. LEAP, EAP-FAST/MSCHAPv2, and PEAPv0. MSCHAPv2 is supported only if the LDAP server is set up to return a clear-text password.
Note Switch support Local EAP authentication against external LDAP databases such as Microsoft Active Directory and Novell's eDirectory. For more information about configuring the controller for Local EAP authentication against Novell's eDirectory, see the Configure Unified Wireless Network for Authentication Against Novell's eDirectory Database whitepaper.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 408

IPv6 Figure 18: Local EAP Example

Information About IPv6 WLAN Security

Related Topics Creating a Local User, on page 410 Creating an Client VLAN and Interface, on page 410 Configuring a EAP Profile, on page 412 Creating a Client VLAN, on page 424 Creating 802.1x WLAN Using an External RADIUS Server, on page 425
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 409

IPv6 How to Configure IPv6 WLAN Security

How to Configure IPv6 WLAN Security

Configuring Local Authentication

Creating a Local User

SUMMARY STEPS

1. configure terminal 2. username aaa_test 3. password 0 aaa_test 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

username aaa_test Example: Switch(config)# username aaa_test

Creates a username.

Step 3

password 0 aaa_test

Assigns a password for the username.

Example:

Switch(config)# usernameaaa_test password 0
aaa_test

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode.

Switch# configure terminal Switch(config)# username aaa_test password 0 aaa_test Switch(config)# end
Related Topics Information About IPv6 WLAN Security, on page 407
Creating an Client VLAN and Interface

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 410

IPv6 Creating an Client VLAN and Interface

2. vlan 3. exit 4. interface vlan vlan_ID 5. ip address 6. ipv6 address 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

vlan Example:
Switch(config)# vlan 137

Creates a VLAN.

Step 3

exit Example:
Switch (config-vlan)# exit

Exits VLAN configuration mode.

Step 4

interface vlan vlan_ID Example:
Switch (config)# interface vlan 137

Associates the VLAN to an interface.

Step 5

ip address
Example:
Switch(config-if)# ip address 10.7.137.10 255.255.255.0

Assigns an IP address to the VLAN interface.

Step 6

ipv6 address

Assigns an IPv6 address to the VLAN interface.

Example:

Switch(config-if)#ipv6 address 2001:db8::20:1/64

Step 7

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode.

Example
Switch# configure terminal Switch(config)# vlan 137 Switch(config-vlan)#exit Switch(config)#interface vlan 137 Switch(config-if)#ip address 10.7.137.10 255.255.255.0

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 411

IPv6 Configuring a EAP Profile

Switch(config-if)#ipv6 address 2001:db8::20:1/64 Switch(config-if)#end
Related Topics Information About IPv6 WLAN Security, on page 407
Configuring a EAP Profile

SUMMARY STEPS

1. eap profile name 2. method leap 3. method tls 4. method peap 5. method mschapv2 6. method md5 7. method gtc 8. method fast profile my-fast 9. description my_localeap profile 10. exit 11. eap method fast profilemyFast 12. authority-id [identity|information] 13. local-key 0 key-name 14. pac-password 0 password 15. end

DETAILED STEPS

Step 1

Command or Action eap profile name Example:
Switch(config)# eap profile wcm_eap_prof

Step 2

method leap Example:
Switch(config-eap-profile)# method leap

Step 3

method tls Example:
Switch(config-eap-profile)# method tls

Step 4

method peap Example:
Switch(config-eap-profile)# method peap

Purpose Creates a EAP profile. Configures EAP-LEAP method on the profile. Configures EAP-TLS method on the profile. Configures PEAP method on the profile.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 412

IPv6 Configuring a EAP Profile

Step 5 Step 6 Step 7 Step 8
Step 9 Step 10 Step 11 Step 12
Step 13 Step 14

Command or Action method mschapv2 Example:
Switch(config-eap-profile)# method mschapv2

Purpose Configures EAP-MSCHAPV2 method on the profile.

method md5 Example:
Switch(config-eap-profile)# method md5

Configures EAP-MD5 method on the profile.

method gtc Example:
Switch(config-eap-profile)# method gtc

Configures EAP-GTC method on the profile.

method fast profile my-fast

Creates a EAP profile named my-fast.

Example:

Switch(config-eap-profile)# eap method fast profile my-fast Switch (config-eap-profile)#description my_local
eap profile

description my_localeap profile

Provides a description for the local profile.

Example:

Switch (config-eap-profile)#description my_local eap profile

exit Example:
Switch (config-eap-profile)# exit

Exits the eap-profile configuration mode.

eap method fast profilemyFast

Configures the EAP method profile.

Example:

Switch (config)# eap method fast profile myFast

authority-id [identity|information] Example:

Configure the authority ID and information for the EAP method profile.

Switch(config-eap-method-profile)# authority-id identity my_identity Switch(config-eap-method-profile)#authority-id information my_information

local-key 0 key-name
Example:
Switch(config-eap-method-profile)# local-key 0 test

Configures the local server key.

pac-password 0 password Example:

Configures the PAC password for manual PAC provisioning.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 413

IPv6 Creating a Local Authentication Model

Step 15

Command or Action

Purpose

Switch(config-eap-method-profile)# pac-password 0 test

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode.

Example
Switch(config)#eap profile wcm_eap_prof Switch(config-eap-profile)#method leap Switch(config-eap-profile)#method tls Switch(config-eap-profile)#method peap Switch(config-eap-profile)#method mschapv2 Switch(config-eap-profile)#method md5 Switch(config-eap-profile)#method gtc Switch(config-eap-profile)#eap method fast profile my-fast Switch (config-eap-profile)#description my_local eap profile Switch(config-eap-profile)# exit Switch (config)# eap method fast profile myFast Switch(config-eap-method-profile)#authority-id identity my_identity Switch(config-eap-method-profile)#authority-id information my_information Switch(config-eap-method-profile)#local-key 0 test Switch(config-eap-method-profile)#pac-password 0 test Switch(config-eap-method-profile)# end
Related Topics Information About IPv6 WLAN Security, on page 407
Creating a Local Authentication Model

SUMMARY STEPS

1. aaa new-model 2. authentication dot1x default local 3. dot1x method_list local 4. aaa authentication dot1x dot1x_name local 5. aaa authorization credential-download name local 6. aaa local authentication auth-name authorization authorization-name 7. session ID 8. dot1x system-auth-control

DETAILED STEPS

Step 1

Command or Action aaa new-model Example:
Switch(config)# aaa new-model

Purpose Creates a AAA authentication model.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 414

IPv6 Creating a Local Authentication Model

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Command or Action

Purpose

authentication dot1x default local Example:

Implies that the dot1x must use the default local RADIUS when no other method is found.

Switch(config)# aaa authentication dot1x default local

dot1x method_list local

Assigns the local authentication for wcm_local method list.

Example:

Switch(config)# aaa authentication dot1x wcm_local local

aaa authentication dot1x dot1x_name local

Configures the local authentication for the dot1x method.

Example:

Switch(config)# aaa authentication dot1x aaa_auth local

aaa authorization credential-download name local
Example:
Switch(config)# aaa authorization credential-download wcm_author local

Configures local database to download EAP credentials from Local/RADIUS/LDAP.

aaa local authentication auth-name authorization Selects local authentication and authorization. authorization-name
Example:
Switch(config)# aaa local authentication wcm_local authorization wcm_author

session ID Example:
Switch(config)# aaa session-id common

Configures a session ID for AAA.

dot1x system-auth-control Example:
Switch(config)# dot1x system-auth-control

Enables dot.1x system authentication control.

Example
Switch(config)# aaa new-model Switch(config)# aaa authentication dot1x default local Switch(config)# aaa authentication dot1x wcm-local local Switch(config)# aaa authentication dot1x aaa_auth local Switch(config)# aaa authorization credential-download wcm_author local Switch(config)# aaa local authentication wcm_local authorization wcm_author Switch(config)# aaa session-id common Switch(config)# dot1x system-auth-control

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 415

IPv6 Creating a Client WLAN

Creating a Client WLAN

Note This example uses 802.1x with dynamic WEP. You can use any other security mechanism supported by the wireless client and configurable on the switch

SUMMARY STEPS

1. configure terminal 2. wlan wlan name <identifier> SSID 3. broadcast-ssid 4. no security wpa 5. security dot1x 6. security dot1x authentication-list wcm-local 7. local-auth wcm_eap_prof 8. client vlan 137 9. no shutdown 10. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

wlan wlan name <identifier> SSID

Creates a WLAN.

Example:

Switch(config)# wlan wlanProfileName 1 ngwcSSID

Step 3

broadcast-ssid Example:
Switch(config-wlan)# broadcast-ssid

Configures to broadcast the SSID on a WLAN.

Step 4

no security wpa Example:
Switch(config-wlan)# no security wpa

Disables the wpa for WLAN to enable 802.1x.

Step 5

security dot1x Example:
Switch(config-wlan)# security dot1x

Configures the 802.1x encryption security for the WLAN.

Step 6

security dot1x authentication-list wcm-local Example:

Configures the server group mapping to the WLAN for dot1x authentication.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 416

IPv6 Configuring Local Authentication with WPA2+AES

Step 7 Step 8 Step 9 Step 10

Command or Action
Switch(config-wlan)# security dot1x authentication-list wcm-local

Purpose

local-auth wcm_eap_prof Example:

Configures the eap profile on the WLAN for local authentication.

Switch (config-wlan)# local-auth wcm_eap_profile

client vlan 137 Example:
Switch(config-wlan)# client vlan 137

Associates the VLAN to a WLAN.

no shutdown Example:
Switch(config-wlan)# no shutdown

Enables the WLAN.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode.

Example
Switch# config terminal Switch(config)#wlan wlanProfileName 1 ngwcSSID Switch(config-wlan)#broadcast-ssid Switch(config-wlan)#no security wpa Switch(config-wlan)#security dot1x Switch(config-wlan)#security dot1x authentication-list wcm-local Switch (config-wlan)# local-auth wcm_eap_prof Switch(config-wlan)#client vlan 137 Switch(config-wlan)#no shutdown Switch(config-wlan)#end Switch#
Related Topics Creating Client VLAN for WPA2+AES, on page 419
Configuring Local Authentication with WPA2+AES

SUMMARY STEPS

1. configure terminal 2. aaa new model 3. dot1x system-auth-control 4. aaa authentication dot1x default local 5. aaa local authorization credential-download default local 6. aaa local authentication default authorization default 7. eap profile wcm_eap_profile 8. method leap

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 417

IPv6 Configuring Local Authentication with WPA2+AES

9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

aaa new model Example:
Switch(config)# aaa new-model

Creates a AAA authentication model.

Step 3

dot1x system-auth-control Example:
Switch(config)# dot1x system-auth-control

Enables dot1x system authentication control.

Step 4

aaa authentication dot1x default local Example:

Configures the local authentication for the default dot1x method.

Switch(config)# aaa authentication dot1x default local

Step 5

aaa local authorization credential-download default local
Example:
Switch(config)# aaa authorization credential-download default local

Configures default database to download EAP credentials from local server.

Step 6

aaa local authentication default authorization default Selects the default local authentication and authorization.
Example:
Switch(config)# aaa local authentication default authorization default

Step 7

eap profile wcm_eap_profile Example:
Switch(config)#eap profile wcm_eap_profile

Creates an EAP profile.

Step 8

method leap Example:
Switch(config)# method leap

Configures EAP-LEAP method on the profile.

Step 9

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode.

Switch# configure terminal Switch(config)# aaa new-model

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 418

IPv6 Creating Client VLAN for WPA2+AES

Switch(config)# dot1x system-auth-control Switch(config)# aaa authentication dot1x default local Switch(config)# aaa authorization credential-download default local Switch(config)# aaa local authentication default authorization default Switch(config)#eap profile wcm_eap_profile Switch(config)# method leap Switch(config)# end
Creating Client VLAN for WPA2+AES
Create a VLAN for the WPA2+AES type of local authentication. This VLAN is later mapped to a WLAN.

SUMMARY STEPS

1. configure terminal 2. vlan vlan_ID 3. exit 4. interface vlan vlan_ID 5. ip address 6. ipv6 address 7. exit

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

vlan vlan_ID Example:
Switch (config)# vlan 105

Creates a VLAN.

Step 3

exit Example:
Switch (config-vlan)# exit

Exits from the VLAN mode.

Step 4

interface vlan vlan_ID Example:
Switch(config)# interface vlan 105

Associates the VLAN to the interface.

Step 5

ip address
Example:
Switch(config-if)# ip address 10.8.105.10 255.255.255.0

Assigns IP address to the VLAN interface.

Step 6

ipv6 address

Assigns IPv6 address to the VLAN interface.

Example:

Switch(config-if)#ipv6 address 2001:db8::10:1/64

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 419

IPv6 Creating WLAN for WPA2+AES

Step 7

Command or Action exit Example:
Switch (config-if)# exit

Purpose Exits from the interface mode.

Switch# configure terminal Switch(config)# vlan105 Switch (config-vlan)# exit Switch (config)# interface vlan 105 Switch(config-if)#ip address 10.8.105.10 255.255.255.0 Switch(config-if)#ipv6 address 2001:db8::10:1/64 Switch(config-if)#exit Switch(config)#
Related Topics Creating a Client WLAN , on page 416
Creating WLAN for WPA2+AES
Create a WLAN and map it to the client VLAN created for WPA2+AES.

SUMMARY STEPS

1. configure terminal 2. wlan wpas2-aes-wlan 1 wpas2-aes-wlan 3. client vlan 105 4. local-auth wcm_eap_profile 5. security dot1x authentication-list default 6. no shutdown 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

wlan wpas2-aes-wlan 1 wpas2-aes-wlan

Creates a WLAN.

Example:

Switch(config)#wlan wpa2-aes-wlan 1 wpa2-aes-wlan Switch(config-wlan)#

Step 3

client vlan 105
Example:
Switch(config-wlan)#client vlan 105 Switch(config-wlan)#

Maps the WLAN to the client VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 420

IPv6 Configuring External RADIUS Server

Step 4 Step 5 Step 6 Step 7

Command or Action local-auth wcm_eap_profile Example:
Switch(config-wlan)#local-auth wcm_eap_profile
security dot1x authentication-list default Example:
Switch(config-wlan)#security dot1x authentication-list default
no shutdown Example:
Switch(config-wlan)#no shutdown Switch(config-wlan)#
end Example:
Switch(config)# end

Purpose Creates and sets the EAP profile on the WLAN.
Uses the default dot1x authentication list.
Enables the WLAN.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Switch# configure terminal Switch(config)#wlan wpa2-aes-wlan 1 wpa2-aes-wlan Switch(config-wlan)#client vlan 105 Switch(config-wlan)#local-auth wcm_eap_profile Switch(config-wlan)#security dot1x authentication-list default Switch(config-wlan)#no shutdown Switch(config-wlan)# exit

Configuring External RADIUS Server

Configuring RADIUS Authentication Server Host

SUMMARY STEPS

1. configure terminal 2. radius server One 3. address ipv4 address auth-portauth_port_number acct-port acct_port_number 4. address ipv6 address auth-portauth_port_number acct-port acct_port_number 5. key 0cisco 6.

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 421

IPv6 Configuring RADIUS Authentication Server Group

Step 2 Step 3 Step 4 Step 5 Step 6

Command or Action radius server One Example:
Switch (config)# radius server One

Purpose Creates a radius server.

address ipv4 address auth-portauth_port_number Configures the IPv4 address for the radius server. acct-port acct_port_number
Example:
Switch (config-radius-server)# address ipv4 10.10.10.10 auth-port 1812 acct-port 1813

address ipv6 address auth-portauth_port_number Configures the IPv6 address for the radius server. acct-port acct_port_number
Example:
Switch (config-radius-server)# address ipv6 2001:db8::25:2 auth-port 1812 acct-port 1813

key 0cisco

exit

Example:

Switch (config-radius-server)# key 0 cisco

Example:
Switch (config-radius-server)# exit

Exits from the radius server mode.

Switch# configure terminal Switch (config)# radius server One Switch (config-radius-server)# address ipv4 10.10.10.10 auth-port 1812 acct-port 1813 Switch (config-radius-server)# address ipv6 2001:db8::25:2 auth-port 1812 acct-port 1813 Switch (config-radius-server)# key 0 cisco Switch (config-radius-server)#exit
Related Topics Configuring RADIUS Authentication Server Group , on page 422
Configuring RADIUS Authentication Server Group

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. aaa group server radius wcm_rad 4. server <ip address>auth-port1812acct-port1813 5. aaa authentication dot1x method_list group wcm_rad 6. dot1x system-auth-control 7. aaa session-idcommon

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 422

IPv6 Configuring RADIUS Authentication Server Group

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

aaa new-model Example:
Switch(config)#aaa new-model

Creates a AAA authentication model.

Step 3

aaa group server radius wcm_rad
Example:
Switch(config)# aaa group server radius wcm_rad Switch(config-sg-radius)#

Creates an radius server-group.

Step 4

server <ip address>auth-port1812acct-port1813 Adds servers to the radius group created in Step 3.

Example:

Configures the UDP port for RADIUS accounting server and authentication server.

Switch(config-sg-radius)# server One auth-port 1812

acct-port 1813

Switch(config-sg-radius)# server Two auth-port 1812

acct-port 1813

Switch(config-sg-radius)# server Three auth-port

1812 acct-port 1813

Step 5

aaa authentication dot1x method_list group wcm_rad
Example:
Switch(config)# aaa authentication dot1x method_list group wcm_rad

Maps the method list to the radius group.

Step 6

dot1x system-auth-control Example:
Switch(config)# dot1x system-auth-control

Enables the system authorization control for the radius group.

Step 7

aaa session-idcommon Example:
Switch(config)# aaa session-id common

Ensures that all session IDs information sent out, from the radius group, for a given call are identical.

Switch# configure terminal Switch(config)# aaa new-model Switch(config)# aaa group server radius wcm_rad Switch(config-sg-radius)# server One auth-port 1812 acct-port 1813 Switch(config-sg-radius)# server Two auth-port 1812 acct-port 1813 Switch(config-sg-radius)# server Three auth-port 1812 acct-port 1813 Switch(config)# aaa authentication dot1x method_list group wcm_rad Switch(config)# dot1x system-auth-control Switch(config)# aaa session-id common Switch(config)#

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 423

IPv6 Creating a Client VLAN

Related Topics Configuring RADIUS Authentication Server Host , on page 421
Creating a Client VLAN

SUMMARY STEPS

1. configure terminal 2. vlan 137 3. exit 4. interface vlan 137 5. ip address 10.7.137.10 255.255.255.0 6. ipv6 address 2001:db8::30:1/64 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

vlan 137 Example:
Switch(config)# vlan 137

Creates a VLAN and associate it to the interface.

Step 3

exit Example:
Switch (config-vlan)# exit

Exits from the VLAN mode.

Step 4

interface vlan 137 Example:
Switch (config)# interface vlan 137

Assigns a VLAN to an interface.

Step 5

ip address 10.7.137.10 255.255.255.0
Example:
Switch(config-if)# ip address 10.7.137.10 255.255.255.0

Assigns an IPv4 address to the VLAN interface.

Step 6

ipv6 address 2001:db8::30:1/64

Assigns an IPv6 address to the VLAN interface.

Example:

Switch(config-if)# ipv6 address 2001:db8::30:1/64

Step 7

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 424

IPv6 Creating 802.1x WLAN Using an External RADIUS Server

Switch# configure terminal Switch(config)# vlan137 Switch(config-vlan)# exit Switch(config)# interface vlan137 Switch(config-if)# ip address 10.7.137.10 255.255.255.0 Switch(config-if)# ipv6 address 2001:db8::30:1/64 Switch(config-if)# end
Related Topics Information About IPv6 WLAN Security, on page 407 Creating 802.1x WLAN Using an External RADIUS Server, on page 425
Creating 802.1x WLAN Using an External RADIUS Server

SUMMARY STEPS

1. configure terminal 2. wlan ngwc-1x<ssid>ngwc-1x 3. broadcast-ssid 4. no security wpa 5. security dot1x 6. security dot1x authentication-list wcm-rad 7. client vlan 137 8. no shutdown 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan ngwc-1x<ssid>ngwc-1x Example:
Switch(config)# wlan ngwc_8021x 2 ngwc_8021x

Step 3

broadcast-ssid Example:
Switch(config-wlan)# broadcast-ssid

Step 4

no security wpa Example:
Switch(config-wlan)# no security wpa

Step 5

security dot1x Example:
Switch(config-wlan)# security dot1x

Purpose Enters global command mode. Creates a new WLAN for 802.1x authentication. Configures to broadcast the SSID on WLAN. Disables the WPA for WLAN to enable 802.1x. Configures the 802.1x encryption security for the WLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 425

IPv6 Additional References

Step 6 Step 7 Step 8 Step 9

Command or Action security dot1x authentication-list wcm-rad Example:
Switch(config-wlan)# security dot1x authentication-list wcm-rad
client vlan 137 Example:
Switch(config-wlan)# client vlan 137
no shutdown Example:
Switch(config-wlan)# no shutdown
end Example:
Switch(config)# end

Purpose Configures the server group mapping to the WLAN for dot1x authentication.
Associates the VLAN to a WLAN.
Enables the WLAN.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode.

Example
Switch# configure terminal Switch(config)#wlan ngwc_8021x 2 ngwc_8021x Switch(config-wlan)# broadcast-ssid Switch(config-wlan)# no security wpa Switch(config-wlan)# security dot1x Switch(config-wlan)# security dot1x authentication-list wcm-rad Switch(config-wlan)# client vlan 137 Switch(config-wlan)# no shutdown Switch(config-wlan)# end
Related Topics Creating a Client VLAN, on page 424 Information About IPv6 WLAN Security, on page 407

Additional References

Related Documents

Related Topic

Document Title

IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches)

WLAN command reference WLAN Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

WLAN configuration

WLAN Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 426

IPv6 Feature Information for IPv6 WLAN Security

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for IPv6 WLAN Security

This table lists the features in this module and provides links to specific configuration information:

Feature

Release

Modification

IPv6 WLAN Security Functionality

Cisco IOS XE 3.3SE

This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 427

IPv6 Feature Information for IPv6 WLAN Security
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 428

2 3 C H A P T E R
Configuring IPv6 ACL
· Prerequisites for IPv6 ACL, on page 429 · Restrictions for IPv6 ACL, on page 429 · Information About IPv6 ACL, on page 430 · Configuring IPv6 ACLs , on page 432 · How To Configure an IPv6 ACL, on page 433 · Verifying IPv6 ACL, on page 439 · Configuration Examples for IPv6 ACL, on page 439 · Additional References, on page 444 · Feature Information for IPv6 ACLs, on page 444
Prerequisites for IPv6 ACL
You can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them to interfaces similarly to the way that you create and apply IP Version 4 (IPv4) named ACLs. You can also create and apply input router ACLs to filter Layer 3 management traffic when the switch is running the IP base feature set. Related Topics
Creating IPv6 ACL, on page 433
Restrictions for IPv6 ACL
With IPv4, you can configure standard and extended numbered IP ACLs, named IP ACLs, and MAC ACLs. IPv6 supports only named ACLs. The switch supports most of the Cisco IOS-supported IPv6 ACLs with some exceptions:
· The switch does not support matching on these keywords: flowlabel, routing header, and undetermined-transport.
· The switch does not support reflexive ACLs (the reflect keyword). · The switch does not apply MAC-based ACLs on IPv6 frames. · When configuring an ACL, there is no restriction on keywords entered in the ACL, regardless of whether
or not they are supported on the platform. When you apply the ACL to an interface that requires hardware
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 429

IPv6 Information About IPv6 ACL
forwarding (physical ports or SVIs), the switch checks to determine whether or not the ACL can be supported on the interface. If not, attaching the ACL is rejected. · If an ACL is applied to an interface and you attempt to add an access control entry (ACE) with an unsupported keyword, the switch does not allow the ACE to be added to the ACL that is currently attached to the interface
Information About IPv6 ACL
An access control list (ACL) is a set of rules used to limit access to a particular interface (for example, if you want to restrict a wireless client from pinging the management interface of the controller). ACLs are configured on the switchnd applied to the management interface, the AP-manager interface, any of the dynamic interfaces, or a WLAN to control data traffic to and from wireless clients or to the controller central processing unit (CPU) to control all traffic destined for the CPU. You can also create a preauthentication ACL for web authentication. Such an ACL is used to allow certain types of traffic before authentication is complete. IPv6 ACLs support the same options as IPv4 ACLs including source, destination, source and destination ports.
Note You can enable only IPv4 traffic in your network by blocking IPv6 traffic. That is, you can configure an IPv6 ACL to deny all IPv6 traffic and apply it on specific or all WLANs.
Understanding IPv6 ACLs
A switch supports two types of IPv6 ACLs: · IPv6 router ACLs are supported on outbound or inbound traffic on Layer 3 interfaces, which can be routed ports, switch virtual interfaces (SVIs), or Layer 3 EtherChannels. IPv6 router ACLs apply only to IPv6 packets that are routed. · IPv6 port ACLs are supported on inbound traffic on Layer 2 interfaces only. IPv6 port ACLs are applied to all IPv6 packets entering the interface.
A switch running the IP base feature set supports only input router IPv6 ACLs. It does not support port ACLs or output IPv6 router ACLs.
Note If you configure unsupported IPv6 ACLs, an error message appears and the configuration does not take affect.
The switch does not support VLAN ACLs (VLAN maps) for IPv6 traffic. You can apply both IPv4 and IPv6 ACLs to an interface. As with IPv4 ACLs, IPv6 port ACLs take precedence over router ACLs:
· When an input router ACL and input port ACL exist in an SVI, packets received on ports to which a port ACL is applied are filtered by the port ACL. Routed IP packets received on other ports are filtered by the router ACL. Other packets are not filtered.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 430

IPv6 Types of ACL
· When an output router ACL and input port ACL exist in an SVI, packets received on the ports to which a port ACL is applied are filtered by the port ACL. Outgoing routed IPv6 packets are filtered by the router ACL. Other packets are not filtered.
Note If any port ACL (IPv4, IPv6, or MAC) is applied to an interface, that port ACL is used to filter packets, and any router ACLs attached to the SVI of the port VLAN are ignored. Related Topics Creating IPv6 ACL, on page 433 Applying an IPv6 to an Interface, on page 437 Creating WLAN IPv6 ACL, on page 438 Displaying IPv6 ACLs, on page 439
Types of ACL
Per User IPv6 ACL
For the per-user ACL, the full access control entries (ACE) as the text strings are configured on the ACS. The ACE is not configured on the Controller. The ACE is sent to the switch in the ACCESS-Accept attribute and applies it directly for the client. When a wireless client roams into an foreign switch, the ACEs are sent to the foreign switch as an AAA attribute in the mobility Handoff message.
Filter ID IPv6 ACL
For the filter-Id ACL, the full ACEs and the acl name(filter-id) is configured on the switch and only the filter-id is configured on the ACS. The filter-id is sent to the switch in the ACCESS-Accept attribute, and the switch looks up the filter-id for the ACEs, and then applies the ACEs to the client. When the client L2 roams to the foreign switch, only the filter-id is sent to the foreign switch in the mobility Handoff message. The foreign switch has to configure the filter-id and ACEs beforehand.
Downloadable IPv6 ACL
For the downloadable ACL(dACL), the full ACEs and the dacl name are all configured on the ACS only.
Note The controller does not configure any ACL. The ACS sends the dacl name to the switch in its ACCESS-Accept attribute, which takes the dacl name and sends the dACL name back to the ACS, for the ACEs, using the access-request attribute. The ACS responds to the corresponding ACEs of the switch in the access-accept attribute. When the wireless client roams to an foreign switch, only the dacl name is sent to the foreign switch in the mobility Handoff message. The foreign switch contacts the ACS server with the dacl name to retrieve the ACEs.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 431

IPv6 IPv6 ACLs and Switch Stacks

IPv6 ACLs and Switch Stacks
The stack master supports IPv6 ACLs in hardware and distributes the IPv6 ACLs to the stack members.

Note For full IPv6 functionality in a switch stack, all stack members must be running the IP services feature set.
If a new switch takes over as stack master, it distributes the ACL configuration to all stack members. The member switches sync up the configuration distributed by the new stack master and flush out entries that member switches sync up the configuration distributed by the new stack master and flush out entries that are not required.
When an ACL is modified, attached to, or detached from an interface, the stack master distributes the change to all stack members.

Configuring IPv6 ACLs
To filter IPv6 traffic, you perform these steps:

Before you begin Before configuring IPv6 ACLs, you must select one of the dual IPv4 and IPv6 SDM templates.

SUMMARY STEPS

1. Create an IPv6 ACL, and enter IPv6 access list configuration mode. 2. Configure the IPv6 ACL to block (deny) or pass (permit) traffic. 3. Apply the IPv6 ACL to the interface where the traffic needs to be filtered. 4. Apply the IPv6 ACL to an interface. For router ACLs, you must also configure an IPv6 address on the
Layer 3 interface to which the ACL is applied.

DETAILED STEPS

Step 1 Step 2 Step 3 Step 4

Command or Action

Purpose

Create an IPv6 ACL, and enter IPv6 access list configuration mode.

Configure the IPv6 ACL to block (deny) or pass (permit) traffic.

Apply the IPv6 ACL to the interface where the traffic needs to be filtered.

Apply the IPv6 ACL to an interface. For router ACLs, you must also configure an IPv6 address on the Layer 3 interface to which the ACL is applied.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 432

IPv6 Default IPv6 ACL Configuration

Default IPv6 ACL Configuration
There are no IPv6 ACLs configured or applied.
Interaction with Other Features and Switches
· If an IPv6 router ACL is configured to deny a packet, the packet is not routed. A copy of the packet is sent to the Internet Control Message Protocol (ICMP) queue to generate an ICMP unreachable message for the frame.
· If a bridged frame is to be dropped due to a port ACL, the frame is not bridged. · You can create both IPv4 and IPv6 ACLs on a switch or switch stack, and you can apply both IPv4 and
IPv6 ACLs to the same interface. Each ACL must have a unique name; an error message appears if you try to use a name that is already configured. You use different commands to create IPv4 and IPv6 ACLs and to attach IPv4 or IPv6 ACLs to the same Layer 2 or Layer 3 interface. If you use the wrong command to attach an ACL (for example, an IPv4 command to attach an IPv6 ACL), you receive an error message.
· You cannot use MAC ACLs to filter IPv6 frames. MAC ACLs can only filter non-IP frames. · If the hardware memory is full, for any additional configured ACLs, packets are dropped to the CPU,
and the ACLs are applied in software. When the hardware is full a message is printed to the console indicating the ACL has been unloaded and the packets will be dropped on the interface.
Note Only packets of the same type as the ACL that could not be added (ipv4, ipv6, MAC) will be dropped on the interface.

How To Configure an IPv6 ACL

Creating IPv6 ACL
Beginning in privileged EXEC mode, follow these steps to create an IPv6 ACL:

SUMMARY STEPS

1. configure terminal 2. ipv6 access-list acl_name 3. {deny|permit} protocol 4. {deny|permit} tcp 5. {deny|permit} udp 6. {deny|permit} icmp 7. end 8. show ipv6 access-list 9. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 433

IPv6 Creating IPv6 ACL

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ipv6 access-list acl_name Example:
ipv6 access-list access-list-name

Use a name to define an IPv6 access list and enter IPv6 access-list configuration mode.

Step 3

{deny|permit} protocol

Enter deny or permit to specify whether to deny or permit

Example:
{deny | permit} protocol {source-ipv6-prefix/prefix-length | any | host

the packet if conditions are matched. These are the conditions:
· For protocol, enter the name or number of an Internet

source-ipv6-address} [operator [port-number]]{destination-ipv6-prefix/prefix-length
| any |host destination-ipv6-address}

protocol: ahp, esp, icmp, ipv6, pcp, stcp, tcp, or udp, or an integer in the range 0 to 255 representing an IPv6 protocol number.

[operator [port-number]][dscp value] [fragments][log] [log-input] [routing][sequence value]

· The source-ipv6-prefix/prefix-length or destination-ipv6-prefix/ prefix-length is the source or

[time-range name]

destination IPv6 network or class of networks for

which to set deny or permit conditions, specified in

hexadecimal and using 16-bit values between colons

(see RFC 2373).

· Enter any as an abbreviation for the IPv6 prefix ::/0.

· For host source-ipv6-address or destination-ipv6-address, enter the source or destination IPv6 host address for which to set deny or permit conditions, specified in hexadecimal using 16-bit values between colons.

· (Optional) For operator, specify an operand that compares the source or destination ports of the specified protocol. Operands are lt (less than), gt (greater than), eq (equal), neq (not equal), and range.

If the operator follows the source-ipv6-prefix/prefix-length argument, it must match the source port. If the operator follows the destination-ipv6- prefix/prefix-length argument, it must match the destination port.
· (Optional) The port-number is a decimal number from 0 to 65535 or the name of a TCP or UDP port. You can use TCP port names only when filtering TCP. You can use UDP port names only when filtering UDP.
· (Optional) Enter dscp value to match a differentiated services code point value against the traffic class value

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 434

IPv6 Creating IPv6 ACL

Step 4 Step 5

Command or Action

Purpose in the Traffic Class field of each IPv6 packet header. The acceptable range is from 0 to 63.
· (Optional) Enter fragments to check noninitial fragments. This keyword is visible only if the protocol is ipv6.
· (Optional) Enter log to cause an logging message to be sent to the console about the packet that matches the entry. Enter log-input to include the input interface in the log entry. Logging is supported only for router ACLs.
· (Optional) Enter routing to specify that IPv6 packets be routed.
· (Optional) Enter sequence value to specify the sequence number for the access list statement. The acceptable range is from 1 to 4294967295
· (Optional) Enter time-range name to specify the time range that applies to the deny or permit statement.

{deny|permit} tcp

(Optional) Define a TCP access list and the access

Example:

conditions.

{deny | permit} tcp {source-ipv6-prefix/prefix-length | any |

Enter tcp for Transmission Control Protocol. The parameters are the same as those described in Step 3, with these

hostsource-ipv6-address} [operator

additional optional parameters:

[port-number]]{destination-ipv6-prefix/prefix-length · ack--Acknowledgment bit set.
| any |hostdestination-ipv6-address}

[operator [port-number]][ack] [dscp value][established] [fin] [log][log-input] [neq {port |protocol}] [psh] [range{port | protocol}] [rst][routing] [sequence

· established--An established connection. A match occurs if the TCP datagram has the ACK or RST bits set.

value] [syn] [time-range name][urg]

· fin--Finished bit set; no more data from sender.

· neq {port | protocol}--Matches only packets that are not on a given port number.

· psh--Push function bit set.

· range {port | protocol}--Matches only packets in the port number range.

· rst--Reset bit set.

· syn--Synchronize bit set.

· urg--Urgent pointer bit set.

{deny|permit} udp Example:

(Optional) Define a UDP access list and the access conditions.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 435

IPv6 Creating IPv6 ACL

Step 6
Step 7 Step 8 Step 9

Command or Action

Purpose

{deny | permit} udp

Enter udp for the User Datagram Protocol. The UDP

{source-ipv6-prefix/prefix-length | any |

parameters are the same as those described for TCP, except

hostsource-ipv6-address} [operator

that the operator [port]] port number or name must be a

[port-number]]{destination-ipv6-prefix/prefix-length UDP port number or name, and the established parameter

| any | hostdestination-ipv6-address}

is not valid for UDP.

[operator [port-number]][dscp value]

[log][log-input]

[neq {port |protocol}] [range {port |protocol}]

[routing][sequence value][time-range name]

{deny|permit} icmp
Example:
{deny | permit} icmp {source-ipv6-prefix/prefix-length | any | hostsource-ipv6-address} [operator [port-number]] {destination-ipv6-prefix/prefix-length | any | hostdestination-ipv6-address} [operator [port-number]][icmp-type [icmp-code] |icmp-message] [dscpvalue] [log] [log-input] [routing] [sequence value][time-range name]

(Optional) Define an ICMP access list and the access conditions.
Enter icmp for Internet Control Message Protocol. The ICMP parameters are the same as those described for most IP protocols in Step 3a, with the addition of the ICMP message type and code parameters. These optional keywords have these meanings:
· icmp-type--Enter to filter by ICMP message type, a number from 0 to 255.
· icmp-code--Enter to filter ICMP packets that are filtered by the ICMP message code type, a number from 0 to 255.

· icmp-message--Enter to filter ICMP packets by the ICMP message type name or the ICMP message type and code name. To see a list of ICMP message type names and code names, use the ? key or see command reference for this release.

end Example:
Switch(config)# end
show ipv6 access-list Example:
show ipv6 access-list
copy running-config startup-config Example:
copy running-config startup-config

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verify the access list configuration.
(Optional) Save your entries in the configuration file.

Related Topics Prerequisites for IPv6 ACL, on page 429 Understanding IPv6 ACLs, on page 430 Applying an IPv6 to an Interface, on page 437 Creating WLAN IPv6 ACL, on page 438 Displaying IPv6 ACLs, on page 439

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 436

IPv6 Applying an IPv6 to an Interface

Applying an IPv6 to an Interface
This section describes how to apply IPv6 ACLs to network interfaces. You can apply an IPv6 ACL to outbound or inbound traffic on layer 2 and Layer 3 interfaces. You can apply IPv6 ACLs only to inbound management traffic on Layer 3 interfaces.
Beginning in privileged EXEC mode, follow these steps to control access to an interface:

SUMMARY STEPS

1. configure terminal 2. interface interface_id 3. no switchport 4. ipv6 address ipv6_address 5. ipv6 traffic-filter acl_name 6. end 7. show running-config interface tenGigabitEthernet 1/0/3 8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

interface interface_id Example:
Switch# interface interface-id

Identifies a Layer 2 interface (for port ACLs) or Layer 3 Switch Virtual interface (for router ACLs) on which to apply an access list, and enters interface configuration mode.

Step 3

no switchport Example:
Switch# no switchport

Changes the interface from Layer 2 mode (the default) to Layer 3 mode (only if applying a router ACL).

Step 4

ipv6 address ipv6_address Example:
Switch# ipv6 address ipv6-address

Configures an IPv6 address on a Layer 3 interface (for router ACLs).
Note This command is not required on Layer 2 interfaces or if the interface has already been configured with an explicit IPv6 address.

Step 5

ipv6 traffic-filter acl_name Example:

Applies the access list to incoming or outgoing traffic on the interface.

Switch# ipv6 traffic-filter access-list-name {in | out}

Step 6

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 437

IPv6 Creating WLAN IPv6 ACL

Step 7 Step 8

Command or Action

Purpose

show running-config interface tenGigabitEthernet 1/0/3 Shows the configuration summary.
Example:
Switch# show running-config interface tenGigabitEthernet 1/0/3 .......................... .......................... Building configuration ............ .......................... Current configuration : 98 bytes ! interface TenGigabitEthernet1/0/3
switchport mode trunk ipv6 traffic-filter MyFilter out end

copy running-config startup-config Example:
copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Related Topics Creating IPv6 ACL, on page 433 Understanding IPv6 ACLs, on page 430 Creating WLAN IPv6 ACL, on page 438 Displaying IPv6 ACLs, on page 439

Creating WLAN IPv6 ACL

SUMMARY STEPS

1. ipv6 traffic-filter acl acl_name 2. ipv6 traffic-filter acl web

DETAILED STEPS

Step 1

Command or Action
ipv6 traffic-filter acl acl_name Example:
Switch(config-wlan)# ipv6 traffic-filter acl <acl_name>

Purpose Creates a named WLAN ACL.

Step 2

ipv6 traffic-filter acl web

Creates a pre-authentication for WLAN ACL.

Example:

Switch(config-wlan)# ipv6 traffic-filter acl web <acl_name-preauth>

Switch(config-wlan)# ipv6 traffic-filter acl <acl_name> Switch(config-wlan)#ipv6 traffic-filter acl web <acl_name-preauth>

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 438

IPv6 Verifying IPv6 ACL

Related Topics Creating IPv6 ACL, on page 433 Applying an IPv6 to an Interface, on page 437 Understanding IPv6 ACLs, on page 430 Displaying IPv6 ACLs, on page 439

Verifying IPv6 ACL

Displaying IPv6 ACLs
You can display information about all configured access lists, all IPv6 access lists, or a specific access list by using one or more of the privileged EXEC commands.

Step 1 Step 2

Procedure

Command or Action show access-list Example:
Switch# show access-lists

Purpose Displays all access lists configured on the switch

show ipv6 access-list acl_name Example:

Displays all configured IPv6 access list or the access list specified by name.

Switch# show ipv6 access-list [access-list-name]

Related Topics Creating IPv6 ACL, on page 433 Applying an IPv6 to an Interface, on page 437 Creating WLAN IPv6 ACL, on page 438 Understanding IPv6 ACLs, on page 430

Configuration Examples for IPv6 ACL

Example: Creating IPv6 ACL
This example configures the IPv6 access list named CISCO. The first deny entry in the list denies all packets that have a destination TCP port number greater than 5000. The second deny entry denies packets that have a source UDP port number less than 5000. The second deny also logs all matches to the console. The first permit entry in the list permits all ICMP packets. The second permit entry in the list permits all other traffic. The second permit entry is necessary because an implicit deny -all condition is at the end of each IPv6 access list.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 439

IPv6 Example: Applying IPv6 ACLs

Note Logging is supported only on Layer 3 interfaces.
Switch(config)# ipv6 access-list CISCO Switch(config-ipv6-acl)# deny tcp any any gt 5000 Switch (config-ipv6-acl)# deny ::/0 lt 5000 ::/0 log Switch(config-ipv6-acl)# permit icmp any any Switch(config-ipv6-acl)# permit any any

Example: Applying IPv6 ACLs
This example shows how to apply the access list Cisco to outbound traffic on a Layer 3 interface.
Switch(config)# interface TenGigabitEthernet 1/0/3 Switch(config-if)# no switchport Switch(config-if)# ipv6 address 2001::/64 eui-64 Switch(config-if)# ipv6 traffic-filter CISCO out

Example: Displaying IPv6 ACLs
This is an example of the output from the show access-lists privileged EXEC command. The output shows all access lists that are configured on the switch or switch stack.
Switch #show access-lists Extended IP access list hello 10 permit ip any any IPv6 access list ipv6 permit ipv6 any any sequence 10
This is an example of the output from the show ipv6 access-lists privileged EXEC command. The output shows only IPv6 access lists configured on the switch or switch stack.
Switch# show ipv6 access-list IPv6 access list inbound permit tcp any any eq bgp (8 matches) sequence 10 permit tcp any any eq telnet (15 matches) sequence 20 permit udp any any sequence 30
IPv6 access list outbound deny udp any any sequence 10 deny tcp any any eq telnet sequence 20

Example: Configuring RA Throttling and NS Suppression
This task describes how to create an RA throttle policy in order to help the power-saving wireless clients from being disturbed by frequent unsolicited periodic RA's. The unsolicited multicast RA is throttled by the controller.

Before you begin Enable IPv6 on the client machine.

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 440

IPv6 Example: Configuring RA Throttling and NS Suppression

2. ipv6 nd ra-throttler policy Mythrottle 3. throttle-period 20 4. max-through 5 5. allow at-least 3 at-most 5 6. switch (config)# vlan configuration 100 7. ipv6 nd suppress 8. ipv6 nd ra-th attach-policy attach-policy_name 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ipv6 nd ra-throttler policy Mythrottle
Example:
Switch (config)# ipv6 nd ra-throttler policy Mythrottle

Creates a RA throttler policy called Mythrottle.

Step 3

throttle-period 20 Example:

Determines the time interval segment during which throttling applies.

Switch (config-nd-ra-throttle)# throttle-period 20

Step 4

max-through 5 Example:
Switch (config-nd-ra-throttle)# max-through 5

Determines how many initial RA's are allowed.

Step 5

allow at-least 3 at-most 5
Example:
Switch (config-nd-ra-throttle)# allow at-least 3 at-most 5

Determines how many RA's are allowed after the initial RAs have been transmitted, until the end of the interval segment.

Step 6

switch (config)# vlan configuration 100 Example:
Switch (config)# vlan configuration 100

Creates a per vlan configuration.

Step 7

ipv6 nd suppress Example:
Switch (config)# ipv6 nd suppress

Disables the neighbor discovery on the Vlan.

Step 8

ipv6 nd ra-th attach-policy attach-policy_name Enables the router advertisement throttling.
Example:
Switch (config)# ipv6 nd ra-throttle attach-policy attach-policy_name

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 441

IPv6 Example: Configuring RA Guard Policy

Step 9

Command or Action end Example:
Switch(config)# end

Purpose
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example: Configuring RA Guard Policy

SUMMARY STEPS

1. ipv6 nd raguard policy MyPloicy 2. trusted-port 3. device-role router 4. interface tenGigabitEthernet 1/0/1 5. ipv6 nd raguard attach-policyMyPolicy 6. vlan configuration 19-21,23 7. ipv6 nd suppress 8. ipv6 snooping 9. ipv6 nd raguard attach-policy MyPolicy 10. ipv6 nd ra-throttler attach-policy Mythrottle

DETAILED STEPS

Step 1

Command or Action

Purpose

ipv6 nd raguard policy MyPloicy

Example:
Switch (config)# ipv6 nd raguard policy MyPolicy

Step 2

trusted-port Example:
Switch (config-nd-raguard)# trusted-port

Configures the trusted port for the policy created above.

Step 3

device-role router
Example:
Switch (config-nd-raguard)# device-role [host|monitor|router|switch] Switch (config-nd-raguard)# device-role router

Defines the trusted device that can send RAs to the trusted port created above.

Step 4

interface tenGigabitEthernet 1/0/1
Example:
Switch (config)# interface tenGigabitEthernet 1/0/1

Configures the interface to the trusted device.

Step 5

ipv6 nd raguard attach-policyMyPolicy Example:

Configures and attaches the policy to trust the RA's received from the port.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 442

IPv6 Example: Configuring IPv6 Neighbor Binding

Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action

Purpose

Switch (config-if)# ipv6 nd raguard attach-policy Mypolicy

vlan configuration 19-21,23 Example:
Switch (config)# vlan configuration 19-21,23

Configures the wireless client vlans.

ipv6 nd suppress Example:
Switch (config-vlan-config)# ipv6 nd suppress

Suppresses the ND messages over wireless.

ipv6 snooping Example:
Switch (config-vlan-config)# ipv6 snooping

Captures IPv6 traffic.

ipv6 nd raguard attach-policy MyPolicy
Example:
Switch (config-vlan-config)# ipv6 nd raguard attach-policy Mypolicy

Attaches the RA Guard policy to the wireless client vlans.

ipv6 nd ra-throttler attach-policy Mythrottle Example:

Attaches the RA throttling policy to the wireless client vlans.

Switch (config-vlan-config)#ipv6 nd ra-throttler attach-policy Mythrottle

Example: Configuring IPv6 Neighbor Binding

SUMMARY STEPS

1. ipv6 neighbor binding [vlan ]19 2001:db8::25:4 interface tenGigabitEthernet 1/0/3 aaa.bbb.ccc

DETAILED STEPS

Step 1

Command or Action

Purpose

ipv6 neighbor binding [vlan ]19 2001:db8::25:4 Sets and validates the neighbor 2001:db8::25: 4 only valid

interface tenGigabitEthernet 1/0/3 aaa.bbb.ccc when transmitting on VLAN 19 through interface te1/0/3

Example:

with the source mac-address as aaa.bbb.ccc.

Switch (config)# ipv6 neighbor binding vlan 19 2001:db8::25:4 interface tenGigabitEthernet 1/0/3
aaa.bbb.ccc

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 443

IPv6 Additional References

Additional References

Related Documents

Related Topic

Document Title

IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches)

ACL configuration

Security Configuration Guide (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for IPv6 ACLs
This table lists the features in this module and provides links to specific configuration information:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 444

IPv6
Feature IPv6 ACL Functionality

Feature Information for IPv6 ACLs

Release Cisco IOS XE 3.3SE

Modification
This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 445

IPv6 Feature Information for IPv6 ACLs
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 446

2 4 C H A P T E R
Configuring IPv6 Web Authentication
· Prerequisites for IPv6 Web Authentication, on page 447 · Restrictions for IPv6 Web Authentication, on page 447 · Information About IPv6 Web Authentication, on page 448 · How to Configure IPv6 Web Authentication, on page 449 · Verifying IPv6 Web Authentication, on page 454 · Additional References , on page 456 · Feature Information for IPv6 Web Authentication, on page 456
Prerequisites for IPv6 Web Authentication
The following configurations must be in place before you start with IPv6 Web Authentication: · IPv6 Device Tracking. · IPv6 DHCP Snooping. · Disable security of type 802.1x on the wlan. · Each WLAN must have a vlan associated to it. · Change the default wlan setting from shutdown to no shutdown.
Related Topics Enabling Security on the WLAN, on page 450
Restrictions for IPv6 Web Authentication
The following restrictions are implied when using IPv6 web authentication: Related Topics
Enabling Security on the WLAN, on page 450
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 447

IPv6 Information About IPv6 Web Authentication
Information About IPv6 Web Authentication
Web authentication is a Layer 3 security feature and the switch disallows IP traffic (except DHCP and DNS -related packets) from a particular client until it supplies a valid username and password. It is a simple authentication method without the need for a supplicant or client utility. Web authentication is typically used by customers who deploy a guest-access network. Traffic from both, HTTP and HTTPS, page is allowed to display the login page.
Note Web authentication does not provide data encryption and is typically used as simple guest access for either a hot spot or campus atmosphere, where connectivity is always a factor.
A WLAN is configured as security webauth for web based authentication. The switch supports the following types of web based authentication:
· Web Authentication ­ The client enters the credentials in a web page which is then validated by the Wlan controller.
· Web Consent ­ The Wlan controller presents a policy page with Accept/Deny buttons. Click Accept button to access the network.
A Wlan is typically configured for open authentication, that is without Layer 2 authentication, when web-based authentication mechanism is used.
Web Authentication Process
The following events occur when a WLAN is configured for web authentication: · The user opens a web browser and enters a URL address, for example, http://www.example.com. The client sends out a DNS request for this URL to get the IP address for the destination. The switch bypasses the DNS request to the DNS server, which in turn responds with a DNS reply that contains the IP address of the destination www.example.com. This, in turn, is forwarded to the wireless clients. · The client then tries to open a TCP connection with the destination IP address. It sends out a TCP SYN packet destined to the IP address of www.example.com. · The switch has rules configured for the client and cannot act as a proxy for www.example.com. It sends back a TCP SYN-ACK packet to the client with source as the IP address of www.example.com. The client sends back a TCP ACK packet in order to complete the three-way TCP handshake and the TCP connection is fully established. · The client sends an HTTP GET packet destined to www.example.com. The switch intercepts this packet and sends it for redirection handling. The HTTP application gateway prepares an HTML body and sends it back as the reply to the HTTP GET requested by the client. This HTML makes the client go to the default web-page of the switch, for example, http://<Virtual-Server-IP>/login.html. · The client closes the TCP connection with the IP address, for example, www.example.com. · If the client wants to go to virtual IP, the client tries to open a TCP connection with the virtual IP address of the switch. It sends a TCP SYN packet for virtual IP to the switch.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 448

IPv6 How to Configure IPv6 Web Authentication

· The switch responds back with a TCP SYN-ACK and the client sends back a TCP ACK to the switch in order to complete the handshake.
· The client sends an HTTP GET for /login.html destined to virtual IP in order to request for the login page.
· This request is allowed to the web server of the switch, and the server responds with the default login page. The client receives the login page in the browser window where the user can log in.
Related Topics Disabling WPA, on page 449 Enabling Security on the WLAN, on page 450 Enabling a Parameter Map on the WLAN, on page 451 Enabling Authentication List on WLAN, on page 451 Configuring a Global WebAuth WLAN Parameter Map, on page 451 Configuring the WLAN, on page 452 Enabling IPv6 in Global Configuration Mode, on page 453 Verifying the Parameter Map, on page 454 Verifying Authentication List, on page 455

How to Configure IPv6 Web Authentication

Disabling WPA

Before you begin
Disable 802.1x. A typical web authentication does not use Layer 2 security. Use this configuration to remove Layer 2 security.

SUMMARY STEPS

1. configure terminal 2. wlan test1 2 test1 3. no security wpa

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

wlan test1 2 test1 Example:

Creates a WLAN and assign an SSID to it.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 449

IPv6 Enabling Security on the WLAN

Step 3

Command or Action
Switch(config)# wlan test1 2 test1
no security wpa Example:
Switch(config-wlan)# no security wpa

Purpose Disables the WPA support for Wlan.

What to do next Enable the following:
· Security Web Authentication. · Parameter Local. · Authentication List.
Related Topics Web Authentication Process, on page 448

Enabling Security on the WLAN

SUMMARY STEPS

1. parameter-map type web-auth global 2. virtual-ip ipv4 192.0.2.1 3. virtual-ip ipv6 2001:db8::24:2

DETAILED STEPS

Step 1

Command or Action

Purpose

parameter-map type web-auth global

Applies the parameter map to all the web-auth wlans.

Example:
Switch(config)# parameter-map type web-auth global

Step 2

virtual-ip ipv4 192.0.2.1
Example:
Switch(config-params-parameter-map)# virtual-ip ipv4 192.0.2.1

Defines the virtual gateway IPv4 address.

Step 3

virtual-ip ipv6 2001:db8::24:2
Example:
Switch(config-params-parameter-map)# virtual-ip ipv6 2001:db8::24:2

Defines the virtual gateway IPv6 address.

Related Topics Prerequisites for IPv6 Web Authentication, on page 447 Restrictions for IPv6 Web Authentication, on page 447

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 450

IPv6 Enabling a Parameter Map on the WLAN

Web Authentication Process, on page 448

Enabling a Parameter Map on the WLAN

SUMMARY STEPS

1. security web-auth parameter-map <mapname>

DETAILED STEPS

Step 1

Command or Action
security web-auth parameter-map <mapname> Example:
Switch(config-wlan)# security web-auth parameter-map webparalocal

Purpose
Enables web authentication for the wlan and creates a parameter map.

Related Topics Web Authentication Process, on page 448

Enabling Authentication List on WLAN

SUMMARY STEPS

1. security web-auth authentication-list webauthlistlocal

DETAILED STEPS

Step 1

Command or Action
security web-auth authentication-list webauthlistlocal Example:
Switch(config-wlan)# security web-auth

Purpose
Enables web authentication for the wlan and creates a local web authentication list.

Related Topics Web Authentication Process, on page 448

Configuring a Global WebAuth WLAN Parameter Map
Use this example to configure a global web auth WLAN and add a parameter map to it.

SUMMARY STEPS

1. parameter-map type webauth global 2. virtual-ip ipv6 2001:db8:4::1 3. ratelimit init-state-sessions 120

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 451

IPv6 Configuring the WLAN

4. max-https-conns 70

DETAILED STEPS

Step 1

Command or Action

Purpose

parameter-map type webauth global Example:

Configures a global webauth and adds a parameter map to it.

Switch (config)# parameter-map type webauth global

Step 2

virtual-ip ipv6 2001:db8:4::1 Example:

Defines a virtual gateway IP address that appears to the wireless clients for authentication.

Switch (config-params-parameter-map)# virtual-ip ipv6 2001:db8:4::1

Step 3

ratelimit init-state-sessions 120
Example:
Switch (config-params-parameter-map)# ratelimit init-state-sessions 120

Sets the global ratelimit to limit the bandwidth that the web clients can use on the switch to avoid over-flooding attacks.

Step 4

max-https-conns 70
Example:
Switch (config-params-parameter-map)# max-http-conns 70

Sets the maximum number of attempted http connections on the switch to avoid over-flooding atatcks.

Related Topics Web Authentication Process, on page 448 Configuring the WLAN, on page 452

Configuring the WLAN

Before you begin
· The WLAN must have a Vlan associated with it. By default, a new Wlan is always associated with Vlan 1, which can be changed as per the configuration requirements.
· Configure and enable the WLAN to no shutdown. By default, the Wlan is configured with the shutdown parameter and is disabled.

SUMMARY STEPS

1. wlan 1 2. client vlan interface ID 3. security web-auth authentication list webauthlistlocal 4. security web-auth parameter-map global 5. no security wpa 6. no shutdown 7. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 452

IPv6 Enabling IPv6 in Global Configuration Mode

DETAILED STEPS

Step 1

Command or Action

Purpose

wlan 1

Creates a wlan and assign an SSID to it.

Example:
Switch(config-wlan)# wlan 1 name vicweb ssid vicweb

Step 2 Step 3
Step 4 Step 5 Step 6 Step 7

client vlan interface ID Example:
Switch(config-wlan)# client vlan VLAN0136
security web-auth authentication list webauthlistlocal Example:
Switch(config-wlan)# security web-auth authentication-list webauthlistlocal
security web-auth parameter-map global Example:
Switch(config-wlan)# security web-auth parameter-map global
no security wpa Example:
Switch(config-wlan)# no security wpa
no shutdown Example:
Switch(config-wlan)# no shutdown
end Example:
Switch(config)# end

Assigns the client to vlan interface.
Configures web authentication for the wlan.
Configures the parameter map on the wlan.
Configures the security policy for a wlan. This enables the wlan. Configures and enables the Wlan.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Configuring a Global WebAuth WLAN Parameter Map, on page 451 Web Authentication Process, on page 448 Enabling IPv6 in Global Configuration Mode, on page 453

Enabling IPv6 in Global Configuration Mode
Enable IPv6 in global configuration for web authentication.

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 453

IPv6 Verifying IPv6 Web Authentication

2. web-auth global 3. virtual IPv6

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

web-auth global Example:

Globally configures the parameter map type as web authentication.

Switch(config)# parameter-map type webauth global

Step 3

virtual IPv6
Example:
Switch(config-params-parameter-map)# virtual-ip ipv6

Selects IPv6 as the virtaul IP for web authentication.
Note You can also select IPv4 as the preferred IP for web authentication.

Related Topics Configuring the WLAN, on page 452 Web Authentication Process, on page 448 Verifying the Parameter Map, on page 454

Verifying IPv6 Web Authentication

Verifying the Parameter Map
Use the show running configuration command to verify the parameter map configured for Wlan.

SUMMARY STEPS

1. show running config

DETAILED STEPS

Step 1

Command or Action show running config Example:
Switchshow running config

Purpose
Displays the entire running configuration for the switch. Grep for parameter map to view the result.

wlan alpha 2 alpha no security wpa no security wpa akm dot1x no security wpa wpa2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 454

IPv6 Verifying Authentication List

no security wpa wpa2 ciphers aes security web-auth security web-auth authentication-list webauthlistlocal security web-auth parameter-map webparalocal
Related Topics Enabling IPv6 in Global Configuration Mode, on page 453 Web Authentication Process, on page 448 Verifying Authentication List, on page 455

Verifying Authentication List
Use the show running configuration command to verify the authentication list configured for the Wlan.

SUMMARY STEPS

1. show running configuration 2. end

DETAILED STEPS

Step 1

Command or Action show running configuration Example:
Switch#show running-config

Step 2

end Example:
Switch(config)# end

Purpose Displays the Wlan configuration.
Switch# show running-config
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Switch#show running-config .................................. .................................. .................................. wlan alpha 2 alpha no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes security web-auth security web-auth authentication-list webauthlistlocal security web-auth parameter-map webparalocal .................................. .................................. ..................................
Related Topics
Verifying the Parameter Map, on page 454
Web Authentication Process, on page 448

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 455

IPv6 Additional References

Additional References

Related Documents

Related Topic

Document Title

IPv6 command reference

IPv6 Command Reference (Catalyst 3650 Switches)

Web Authentication configuration Security Configuration Guide (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for IPv6 Web Authentication
This table lists the features in this module and provides links to specific configuration information:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 456

IPv6 Feature Information for IPv6 Web Authentication

Feature IPv6 Web Authentication Functionality

Release Cisco IOS XE 3.3SE

Modification
This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 457

IPv6 Feature Information for IPv6 Web Authentication
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 458

2 5 C H A P T E R
Configuring IPv6 Client Mobility
· Prerequisites for IPv6 Client Mobility, on page 459 · Restrictions For IPv6 Client Mobility, on page 459 · Information About IPv6 Client Mobility, on page 460 · Verifying IPv6 Client Mobility, on page 463 · Monitoring IPv6 Client Mobility, on page 463 · Additional References, on page 464 · Feature Information For IPv6 Client Mobility, on page 465
Prerequisites for IPv6 Client Mobility
To enable wireless IPv6 client connectivity, the underlying wired network must support IPv6 routing and an address assignment mechanism such as SLAAC or DHCPv6. The switch must have L2 adjacency to the IPv6 router, and the VLAN needs to be tagged when the packets enter the switch. APs do not require connectivity on an IPv6 network, as all traffic is encapsulated inside the IPv4 CAPWAP tunnel between the AP and switch.
Restrictions For IPv6 Client Mobility
· When using the IPv6 Client Mobility, clients must support IPv6 with either static stateless auto configuration (such as Windows XP clients) or stateful DHCPv6 IP addressing (such as Windows 7 clients).
· To allow smooth operation of stateful DHCPv6 IP addressing, you must have a switch or router that supports the DHCP for IPv6 feature (such as the switch) that is configured to act like a DHCPv6 server, or you need a dedicated server such as a Windows 2008 server with a built-in DHCPv6 server. Cisco Catalyst 3850 switch and Cisco Catalyst 5700 switch can act as (internal) a DHCPv6 server.
Note To load the SDM IPv6 template in the Cisco Catalyst 3850 switch, enter the sdm prefer dual-ipv4 and v6 default command and then reset the switch.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 459

IPv6 Information About IPv6 Client Mobility
Information About IPv6 Client Mobility
The Switch supports IPv6 mobility for IPv6-only or dual-stack nodes. The IPv6 Client Mobility is divided into:
· Link Layer and · Network Layer
The link layer is handled by the 802.11 protocol which enables the client to roam to any AP in the same BSS (basic service set) identified by the same SSID without losing the link layer connectivity. However, link layer mobility is not enough to make wireless client Layer 3 applications continue to work seamlessly while roaming. Cisco IOSd's wireless mobility module uses mobility tunneling to retain seamless connectivity for the client's Layer 3 PoP (point of presence) when the client roams across different subnets on different switches. IPv6 is the next-generation network layer Internet protocol intended to replace IPv4 in the TCP/IP suite of protocols. This new version increases the internet global address space to accommodate users and applications that require unique global IP addresses. IPv6 incorporates 128-bit source and destination addresses, which provide significantly more addresses than the 32-bit IPv4 addresses. To support IPv6 clients across controllers, ICMPv6 messages must be dealt with specially to ensure the IPv6 client remains on the same Layer 3 network. The switch keep track of IPv6 clients by intercepting the ICMPv6 messages to provide seamless mobility and protect the network from network attacks. The NDP (neighbor discovery packets) packets are converted from multicast to unicast and delivered individually per client. This unique solution ensures that Neighbor Discovery and Router Advertisement packets are not leaked across Vlans. Clients can receive specific Neighbor Discovery and Router Advertisement packets ensuring correct IPv6 addressing and avoids unnecessary multicast traffic. The configuration for IPv6 mobility is the same as IPv4 mobility and requires no separate software on the client side to achieve seamless roaming. The switch must be part of the same mobility group. Both IPv4 and IPv6 client mobility are enabled by default. IPv6 client mobility is used for the following:
· Retaining the client IPv6 multiple addresses in Layer-2 and Layer-3 roaming. · IPv6 Neighbor Discovery Prootcol (NDP) packet management. · Client IPv6 addresses learning.
Using Router Advertisment
The Neighbor Discovery Protocol(NDP) operates in the link-layer and is responsible for the discovery of other nodes on the link. It determines the link-layer addresses of other nodes, finds the available routers, and maintains reachability information about the paths to other active neighbor nodes. Router Advertisement (RA) is one of the IPv6 Neighbor Discovery Protocol (NDP) packets that is used by the hosts to discover available routers, acquire the network prefix to generate the IPv6 addresses, link MTU, and so on. The routers send RA on a regular basis, or in response to hosts Router Solicitation messages.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 460

IPv6 RA Throttling and NS suppression
IPv6 wireless client mobility manages the IPv6 RA packet . The converged access switch forwards the link-local all-nodes multicast RA packets to the local and roaming wireless nodes mapped on same VLAN the RA was received on. Figure 1 illustrates the link-local all-nodes mcast RA forwarding issue in the wireless node mobility.
Figure 19: Roaming Client Receiving Invalid RA from Router 2
Figure 2 illustrates how a roaming client "MN" receives RA from VLAN 200 in a foreign switch and how it acquires an new IP address and breaks into L3 mobility's point of presence.
Figure 20: Roaming Client Receives Valid RA from Router 1
Related Topics Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463
RA Throttling and NS suppression
To safeguard the power-saving wireless clients form being disturbed by frequent unsolicited periodic RAs, the controller can throttle the unsolicited multicast RA. Related Topics
Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 461

IPv6 IPv6 Address Learning
IPv6 Address Learning
There are three ways for IPv6 client to acquire IPv6 addresses: · Stateless Address Auto-Configuration (SLAAC) · Stateful DHCPv6 · Static configuration
For these methods, the IPv6 client always sends NS DAD (duplicate address detection) to ensure that there is no duplicated IP address on the network. The switch snoops the clients NDP and DHCPv6 packets to learn about its client IP addresses and then updates the controllers database. The database then informs the controller for the clients new IP address. Related Topics
Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463
Handling Multiple IP Addresses
In the case when the new IP address is received after RUN state, whether an addition or removal, the controller updates the new IP addresses on its local database for display purposes. Essentially, the IPv6 uses the existing or same PEM state machine code flow as in IPv4. When the IP addresses are requested by external entities, for example, from Prime Infrastructure, the controller will include all the available IP addresses, IPv4 and IPv6, in the API/SPI interface to the external entities. An IPv6 client can acquire multiple IP addresses from stack for different purposes. For example, a link-local address for link local traffic, and a routable unique local or global address. When the client is in the DHCP request state and the controller receives the first IP address notification from the database for either an IPv4 or IPv6 address, the PEM moves the client into the RUN state. When a new IP address is received after the RUN state, either for addition or removal, the controller updates the new IP addresses on its local database for display purposes. When the IP addresses are requested by external entities, for example, from Prime Infrastructure, the controller provides the available IP addresses, both IPv4 and IPv6, to the external entities. Related Topics
Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463
IPv6 Configuration
The switch supports IPv6 client as seamlessly as the IPv4 clients. The administrator must manually configure the Vlans to enable the IPV6, IPv6's snooping and throttling functionality. This will enable the NDP packets to throttle between the switch and its various clients Related Topics
Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 462

IPv6 High Availability

High Availability
The switch will sync with the wireless clients when the clients IP address is hard to learn. When a switchover happens, the IPv6 neighbor binding table is synced to standby state. However, the wireless client will itself disassociate and reassociate to a new active state once the switchover is complete and the neighbor binding table is updated with latest information for that client.
If, during the reassociation, the client moves to another AP then the original entry in the binding table is marked as down for sometime and will be aged-out.
For the new entries joining the switch from another AP, the new IP address is learned and notified to the controller's database.

Note This feature is available only for the Cisco Catalyst 3850 Switch.
Related Topics Verifying IPv6 Client Mobility, on page 463 Monitoring IPv6 Client Mobility, on page 463

Verifying IPv6 Client Mobility

The commands listed in the Table 1 applies to the IPv6 client mobility.
Table 47: Commands for Verifying IPv6 Client Mobility on Cisco 5760 WLC

Command
debug mobility ipv6 debug client mac-address (mac-addr)

Description
Enables all the wireless client IPv6 mobility debugs. Displays wireless client debugging. Enter a MAC address for debugging information.

Related Topics Using Router Advertisment, on page 460 RA Throttling and NS suppression, on page 461 IPv6 Address Learning, on page 462 Handling Multiple IP Addresses, on page 462 IPv6 Configuration, on page 462 Monitoring IPv6 Client Mobility, on page 463 High Availability, on page 463

Monitoring IPv6 Client Mobility
The commands in Table 2 are used to monitor IPv6 Client mobility on the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 463

IPv6 Additional References

Table 48: Monitoring IPv6 Client Mobility Commands

Commands
show wireless client summary
show wireless client mac-address (mac-addr)

Description
Displays the wireless specific configuration of active clients.
Displays the wireless specific configuration of active clients based on their MAC address.

Related Topics Verifying IPv6 Client Mobility, on page 463 Using Router Advertisment, on page 460 RA Throttling and NS suppression, on page 461 IPv6 Address Learning, on page 462 Handling Multiple IP Addresses, on page 462 IPv6 Configuration, on page 462 High Availability, on page 463

Additional References

Related Documents

Related Topic

Document Title

IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches)

Mobility configuration Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 464

IPv6 Feature Information For IPv6 Client Mobility

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information For IPv6 Client Mobility

This table lists the features in this module and provides links to specific configuration information:

Feature

Release

Modification

IPv6 Client Mobility Functionality

Cisco IOS XE 3.3SE

This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 465

IPv6 Feature Information For IPv6 Client Mobility
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 466

2 6 C H A P T E R
Configuring IPv6 Mobility
· Pre-requisites for IPv6 Mobility, on page 467 · Information About IPv6 Mobility, on page 467 · How to Configure IPv6 Mobility, on page 468 · Monitoring IPv6 Mobility, on page 468 · Additional References, on page 470 · Feature Information for IPv6 Mobility, on page 471
Pre-requisites for IPv6 Mobility
The mobility and its related infrastructure must be configured and ready for use.
Information About IPv6 Mobility
Mobility, or roaming, is a wireless LAN client's ability to maintain its association seamlessly from one access point to another securely and with as little latency as possible. This section explains how mobility works whenswitch are included in a wireless network. When a wireless client associates and authenticates to an access point, the access point's switch places an entry for that client in its client database. This entry includes the client's MAC and IP addresses, security context and associations, quality of service (QoS) contexts, the WLAN, and the associated access point. The switch uses this information to forward frames and manage traffic to and from the wireless client. When the wireless client moves its association from one access point to another, the switch simply updates the client database with the newly associated access point. If necessary, new security context and associations are established as well. The process becomes more complicated, however, when a client roams from an access point joined to one switch to an access point joined to a different switch. It also varies based on whether theswitch are operating on the same subnet.
Inter Controller Roaming
When the client associates to an access point joined to a new switch, the new switch exchanges mobility messages with the original switch, and the client database entry is moved to the new switch if sticky anchoring is disabled.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 467

IPv6 Intra Subnet Roaming with Sticky Anchoring, and Inter Subnet Roaming

Related Topics Monitoring IPv6 Mobility, on page 468
Intra Subnet Roaming with Sticky Anchoring, and Inter Subnet Roaming
Inter-subnet roaming is similar to inter-controller roaming in that the switch exchange mobility messages on the client roam. However, instead of moving the client database entry to the new switch, the original switch marks the client with an "Anchor" entry in its own client database. The database entry is copied to the new switch client database and marked with a "Foreign" entry in the new switch. The roam remains transparent to the wireless client, and the client maintains its original IP address.
In inter-subnet roaming, WLANs on both anchor and foreign switch need to have the same network access privileges and no source-based routing or source-based firewalls in place. Otherwise, the clients may have network connectivity issues after the handoff.
For more information on configuring mobility see, the Cisco 5700 Wireless LAN Controller Mobility Configuration Guide, Cisco IOS XE, Release 3.2SE.
Related Topics Monitoring IPv6 Mobility, on page 468

How to Configure IPv6 Mobility

Monitoring IPv6 Mobility
This chapter displays the mobility related IPv6 configuration. To see the mobility related configurations refer to the Cisco 5700 Wireless LAN Controller Mobility Configuration Guide, Cisco IOS XE 3.2SE.

SUMMARY STEPS

1. show ipv6 neighbors binding mac C0C1.C06B.C4E2

DETAILED STEPS

Step 1

Command or Action

Purpose

show ipv6 neighbors binding mac C0C1.C06B.C4E2 Displays the IPv6 related mobility configurations.

Example:
Switch# show ipv6 neighbors binding mac C0C1.C06B.C4E2

Example

Switch# show ipv6 neighbors binding mac C0C1.C06B.C4E2

Binding Table has 45 entries, 37 dynamic (limit 100)

Codes: L - Local, S - Static, ND - Neighbor Discovery, DH - DHCP, PKT - Other Packet, API

- API created

Preflevel flags (prlvl):

0001:MAC and LLA match

0002:Orig trunk

0004:Orig access

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 468

IPv6 Monitoring IPv6 Mobility

0008:Orig trusted trunk 0040:Cga authenticated

0010:Orig trusted access 0020:DHCP assigned 0080:Cert authenticated 0100:Statically assigned

IPv6 address

state Time left

L FE80:20:25::16

REACHABLE

L FE80:20:24::16

REACHABLE

L FE80:20:23::16

REACHABLE

ND FE80:20:23::13

REACHABLE 223 s try 0

ND FE80:20:22::17

REACHABLE 92 s try 0

L FE80:20:22::16

REACHABLE

ND FE80:20:22::13

REACHABLE 136 s try 0

ND FE80:20:22::12

REACHABLE 281 s try 0

ND FE80:20:22::2

REACHABLE 295 s try 0

ND FE80:20:21::17

REACHABLE 60 s try 0

L FE80:20:21::16

REACHABLE

ND FE80:20:21::13

REACHABLE 252 s try 0

ND FE80:20:21::12

REACHABLE 297 s

ND FE80:20:21::2

REACHABLE 307 s try 0

ND FE80::F866:8BE0:12E4:39CF

REACHABLE 89 s try 0

ND FE80::6D0A:DB33:D69E:91C7

REACHABLE 171 s try 0

ND FE80::985:8189:9937:BB05

REACHABLE 287 s

ND FE80::20:24:13

REACHABLE 145 s try 0

L 2001:20:23::16

REACHABLE

DH 2001:20:22:0:C96C:AF29:5DDC:2689

REACHABLE 286 s try 0(16574

DH 2001:20:22:0:A46B:90B2:F0DB:F952

STALE

32401 s

DH 2001:20:22:0:7DFD:14EC:B1E4:1172

STALE

24394 s

DH 2001:20:22:0:7CB3:D6DD:FD6A:50F

STALE

29195 s

DH 2001:20:22:0:6D32:AF24:FDE1:2504

STALE

118821 s

DH 2001:20:22:0:5106:5AD:FE98:A2F0

STALE

31362 s

ND 2001:20:22::201:13

REACHABLE 264 s try 0

L 2001:20:22::16

REACHABLE

ND 2001:20:22::13

REACHABLE 131 s try 0

ND 2001:20:22::2

REACHABLE 274 s try 0

Link-Layer addr Interface vlan prlvl age

2037.064C.BA71 Vl25

25 0100 3137mn

2037.064C.BA41 Vl24

24 0100 3137mn

2037.064C.BA44 Vl23

23 0100 3137mn

2037.0653.6BC4 Te1/0/1

23 0005 85s

2037.064D.06F6 Te1/0/1

22 0005 3mn

2037.064C.BA76 Vl22

22 0100 3137mn

2037.0653.6BF6 Te1/0/1

22 0005 165s

2037.064C.94F6 Te1/0/1

22 0005 23s

0022.550E.8FC3 Te1/0/1

22 0005 18s

2037.064D.06E8 Te1/0/1

21 0005 4mn

2037.064C.BA68 Vl21

21 0100 3137mn

2037.0653.6BE8 Te1/0/1

21 0005 57s

2037.064C.94E8 Te1/0/1

21 0005 4s

0022.550E.8FC2 Te1/0/1

21 0005 2s

C0C1.C06B.C4E2 Ca4

21 0005 3mn

0050.B606.A6CE Te1/0/1

22 0005 135s

8CA9.8295.09CC Ca0

21 0005 15s

2037.0653.6BC1 Te1/0/1

24 0005 155s

2037.064C.BA44 Vl23

23 0100 3137mn

0050.B606.A6CE Te1/0/1

22 0024 19s

0050.B606.A6CE Te1/0/1

22 0024 2339mn

0050.B606.A6CE Te1/0/1

22 0024 2339mn

0050.B606.A6CE Te1/0/1

22 0024 2333mn

0050.B606.A6CE Te1/0/1

22 0024 509mn

0050.B606.A6CE Te1/0/1

22 0024 2328mn

0050.B606.A6CE Te1/0/1

22 0005 49s

2037.064C.BA76 Vl22

22 0100 3137mn

2037.0653.6BF6 Te1/0/1

22 0005 175s

0022.550E.8FC3 Te1/0/1

22 0005 28s

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 469

IPv6 Additional References

ND 2001:20:21:0:F866:8BE0:12E4:39CF REACHABLE 21 s try 0 ND 2001:20:21:0:C085:9D4C:4521:B777 REACHABLE 290 s try 0 ND 2001:20:21:0:6233:4BFF:FE1A:744C REACHABLE 108 s try 0 ND 2001:20:21:0:447E:745D:2F48:1C68 REACHABLE 276 s ND 2001:20:21:0:3920:DDE8:B29:AD51 REACHABLE 87 s try 0 ND 2001:20:21:0:1016:A333:FAD5:6E66 REACHABLE 18 s try 0 ND 2001:20:21:0:C42:E317:BA9B:EB17 REACHABLE 61 s try 0 ND 2001:20:21:0:985:8189:9937:BB05 REACHABLE 173 s try 0 ND 2001:20:21::201:20 REACHABLE 43 s try 0 ND 2001:20:21::17 REACHABLE 50 s try 0 L 2001:20:21::16 REACHABLE ND 2001:20:21::13 REACHABLE 237 s try 0 ND 2001:20:21::12 REACHABLE 512 ms try 0 ND 2001:20:21::2 REACHABLE 294 s try 0

C0C1.C06B.C4E2 Ca4 0021.CC73.AA17 Te1/0/1 6033.4B1A.744C Ca4 8CA9.8295.09CC Ca0 C0C1.C06B.C4E2 Ca4 0021.CC73.AA17 Te1/0/1 6033.4B1A.744C Ca4 8CA9.8295.09CC Ca0 0021.CC73.AA17 Te1/0/1 2037.064D.06E8 Te1/0/1 2037.064C.BA68 Vl21 2037.0653.6BE8 Te1/0/1 2037.064C.94E8 Te1/0/1 0022.550E.8FC2 Te1/0/1

21 0005 4mn 21 0005 11s 21 0005 3mn 21 0005 34s 21 0005 3mn 21 0005 4mn 21 0005 4mn 21 0005 135s 21 0005 4mn 21 0005 4mn 21 0100 3137mn 21 0005 67s 21 0005 5mn 21 0005 12s

Related Topics Inter Controller Roaming, on page 467 Intra Subnet Roaming with Sticky Anchoring, and Inter Subnet Roaming, on page 468

Additional References

Related Documents

Related Topic

Document Title

IPv6 command reference IPv6 Command Reference (Catalyst 3650 Switches)

Mobility configurations Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 470

IPv6 Feature Information for IPv6 Mobility

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for IPv6 Mobility

This table lists the features in this module and provides links to specific configuration information:

Feature

Release

Modification

IPv6 Mobility Functionality

Cisco IOS XE 3.3SE

This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 471

IPv6 Feature Information for IPv6 Mobility
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 472

2 7 C H A P T E R
Configuring IPv6 NetFlow
· Prerequisites For IPv6 Netflow, on page 473 · Restrictions For IPv6 Netflow, on page 473 · Information About IPv6 Netflow, on page 474 · How To Configure IPv6 Netflow, on page 475 · Verifying IPv6 Netflow, on page 486 · Monitoring IPv6 Netflow, on page 486 · Additional References, on page 486 · Feature Information for IPv6 NetFlow, on page 487
Prerequisites For IPv6 Netflow
The networking device must be running a Cisco IOSd release that supports Cisco IOS Flexible NetFlow.
IPv6 Traffic · One of the following must be enabled on your router and on any interfaces on which you want to enable Flexible NetFlow: · Cisco Express Forwarding IPv6 or · Distributed Cisco Express Forwarding IPv6.
Restrictions For IPv6 Netflow
The following restrictions apply to IPv6 Netflow configurations: · Locally generated traffic (traffic that is generated by the router, Cisco WLC 5760, on which the Flexible NetFlow Output Accounting feature is configured) is not counted as flow traffic for the Output Flexible NetFlow Accounting feature. · The Flexible NetFlow Output Accounting feature counts CEF-switched packets only. Process switched transit packets are not counted.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 473

IPv6 Information About IPv6 Netflow
Information About IPv6 Netflow
NetFlow is a monitoring feature used on customer applications for network monitoring, user monitoring and profiling, network planning, security analysis, billing and accounting, and data warehousing and mining. You can use Flexible NetFlow on uplink ports to monitor user-defined flows, collect flow statistics, and perform per-flow policing. It collects and exports flow statistics to a collector device.
Note Flexible NetFlow is supported only on the Catalyst 3750-X and 3560-X switch running the IP base or IP services feature set and equipped with the network services module. It is not supported on switches running the NPE or the LAN base image.
Note Not all of the Flexible NetFlow commands in the command reference are available on the switch. Unsupported commands are either not visible or generate an error message if entered.
Understanding Flexible Netflow
With Flexible NetFlow, traffic is processed and packets are classified into flows. New flows are inserted in the NetFlow table, and statistics are automatically updated. You must configure both ingress and egress NetFlow monitoring. The network services module supports one monitor per interface per direction. Flexible NetFlow consists of the following components:
· Records-- These are combinations of key and non-key fields assigned to monitor Flexible NetFlow monitors to define the cache used to store data.
· Flow monitors-- These are applied to interfaces to perform network traffic monitoring. A flow monitor includes a user-defined record, an optional flow exporter, and a cache that is automatically created when the monitor is applied to the first interface. The switch supports normal caches that age out according to settings.
· Flow exporters-- These export the data in the flow monitor cache to a remote system, such as a server running NetFlow collector.
· Flow samplers-- These reduce the load that Flexible NetFlow puts on the networking device to monitor traffic by limiting the number of packets that are analyzed.
You can configure unidirectional flow (destination or source-address based flows), and flow aging. The following features are supported on the network services module:
· Configuring collection statistics for Layer 2-switched (non-routing) traffic, Layer 3 (CAPWAP) IPv4 and IPv6 traffic, and Layer 4 TCP, IGMP, and ICMP traffic.
· NetFlow counting, maintenance, troubleshooting (debugging commands). · NetFlow analysis is performed on traffic crossing the physical interfaces on the network services module.
The switch processes egress (outbound) traffic after forwarding decisions are performed. Locally switched or routed traffic is forced through service module ports by configuring private VLANs or protected ports. The following NetFlow characteristics are not supported:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 474

IPv6 IPv6 Netflow

IPv6 Netflow

· Netflow-5 protocol · Predefined flow records · ISL · Policy-based NetFlow · Cisco TrustSec monitoring
Though other modules that can be installed in the switch have 1-Gigabit and 10-Gigabit uplink interfaces, NetFlow is supported only on the network services module.
Flexible Netflow (FNF) allows the user to define a flow record (a particular set of key, non-key, counter and time-stamp fields of interest) that is optimal for a particular application by selecting the fields from a big collection of pre-defined fields, using CLI configuration commands.
The collection of the pre-defined fields includes the following fields:
· Data-link layer (L2) header fields · IPv6 header fields · Transport layer (L4) header fields · Application layer (L5) header fields · Routing attributes (generic, IPv4, IPv6) · Interface fields · Counter fields · Timestamp fields
Related Topics Configuring a Customized Flow Record , on page 475 Configuring the Flow Exporters , on page 478 Configuring a Customized Flow Monitor, on page 480 Applying a Flow Monitor to an Interface, on page 482 Configuring and Enabling Flow Sampling , on page 484

How To Configure IPv6 Netflow

Configuring a Customized Flow Record
You can match the following fields for the flow record:
· IPv4 or IPv6 destination address · Datalink fields, to identify Layer 2 source and destination address and VLAN for traffic entering or
leaving the interfaces, providing the MAC address of the directly connected host. Class of Service (CoS) and Ethertype datalink header fields are also available. · Transport field source and destination ports, to identify the type of application: ICMP, IGMP, or TCP traffic.
You can collect the following fields for the flow record:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 475

IPv6 Configuring a Customized Flow Record

· The total number of bytes, flows or packets sent by the exporter (exporter) or the number of bytes or packets in a 64-bit counter (long). The timestamp based on system uptime from the time the first packet was sent or from the time the most recent (last) packet was seen.
· The SNMP index of the input or output interface. The interface for traffic entering or leaving the service module is based on the switch forwarding cache. This field is typically used in conjunction with datalink, IPv4, and IPv6 addresses, and provides the actual first-hop interface for directly connected hosts.
· A value of 0 means that interface information is not available in the cache. · Some NetFlow collectors require this information in the flow record.
The following steps configure the customized flow record:

SUMMARY STEPS

1. configure terminal 2. flow record recordname 3. description description 4. match{ipv4 | ipv6}{destination | hop-limit | protocol | source | traffic-class| version} address 5. match datalink [dot1q | ethertype | mac | vlan] 6. match transport [destination-port | icmp | source-port] 7. match interface [input |output] 8. match flow direction 9. collect counter {bytes [ layer2 | long] | packets [ long]} 10. collect timestamp absolute [first | last] 11. collect interface [input | output] 12. collect transport tcp flags {ack | cwr | ece | fin | psh | rst | syn | urg} 13. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

flow record recordname Example:
Switch(config)# flow record TestRecordName

Step 3

description description
Example:
Switch(config-flow-record)# description SampleNetflowDescription

Step 4

match{ipv4 | ipv6}{destination | hop-limit | protocol | source | traffic-class| version} address
Example:

Purpose Enters global configuration mode.
Creates a flow record and enters Flexible NetFlow flow record configuration mode. This command can also modify an existing flow record. (Optional) Creates a description for the flow record.
Configures key ipv4 and ipv6 fields for the flow record.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 476

IPv6 Configuring a Customized Flow Record

Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13

Command or Action

Purpose

Switch(config-flow-record)# match ipv6 destination address

match datalink [dot1q | ethertype | mac | vlan]

Configures key datalink (layer 2) fields for the flow record.

Example:

Switch(config-flow-record)# match datalink [dot1q | ethertype | mac | vlan]

match transport [destination-port | icmp | source-port]
Example:
Switch(config-flow-record)# match transport [destination-port | icmp | source-port]

Configures key transport layer fields for the flow record.

match interface [input |output]

Configures key interface fields for the flow record.

Example:

Switch(config-flow-record)# match interface input

match flow direction

Configures key flow identity fields for the flow record.

Example:

Switch(config-flow-record)# match flow direction

collect counter {bytes [ layer2 | long] | packets [ long]} Configures the counter key field for the flow record.
Example:
Switch(config-flow-record)#collect counter bytes layer2 long

collect timestamp absolute [first | last]
Example:
Switch(config-flow-record)# collect timestamp absolute [first | last ]

Configures the timestamp key field for the flow record.

collect interface [input | output]
Example:
Switch(config-flow-record)# collect interface [input | output]

Configures the interface key field for the flow record.

collect transport tcp flags {ack | cwr | ece | fin | psh | rst Configures transports tcp flag fields for the flow record. | syn | urg}
Example:
Switch(config-flow-record)# collect transport tcp flags ack

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 477

IPv6 Configuring the Flow Exporters

Example
Switch(config)# flow record Switch(config-flow-record)# description record to monitor network traffic Switch(config-flow-record)# match ipv6 destination address Switch(config-flow-record)# match datalink [dot1q | ethertype | mac | vlan] Switch(config-flow-record)# match transport [destination-port | icmp |igmp | source-port] Switch(config-flow-record)# match interface input Switch(config-flow-record)# match flow direction Switch(config-flow-record)#collect counter bytes layer2 long Switch(config-flow-record)# collect timestamp absolute first Switch(config-flow-record)# collect interface [input | output] Switch(config-flow-record)# collect transport tcp flags ack Switch(config-flow-record)# end
Related Topics IPv6 Netflow, on page 475 Configuring the Flow Exporters , on page 478 Configuring a Customized Flow Monitor, on page 480 Applying a Flow Monitor to an Interface, on page 482 Configuring and Enabling Flow Sampling , on page 484
Configuring the Flow Exporters
The following steps are used to configure the NetFlow exporter.

Note The optional export-protocol flow exporter configuration command specifies the NetFlow export protocol used by the exporter. The switch supports only netflow-v9. Though visible in the CLI help, netflow-5 is not supported.

SUMMARY STEPS

1. configure terminal 2. flow exporter exporter-name 3. description description 4. destination {hostname | ip-address} vrf vrf-name 5. dscp <0-63> 6. source interface-id 7. option {exporter-stats | interface-table | sampler-table} timeout seconds] 8. export-protocolnetflow-v9 9. template data timeout seconds 10. transport udp udp-port 11. ttl seconds 12. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 478

IPv6 Configuring the Flow Exporters

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

flow exporter exporter-name
Example:
Switch(config)# flow exporter TestNetFlowExporterName

Creates the flow exporter and enters Flexible NetFlow flow exporter configuration mode. This command can also modify an existing flow exporter.

Step 3

description description
Example:
Switch(config-flow-exporter)# description SampleNetFlowExporterDescription

(Optional) Configures a description for the exporter that appears in the configuration and in the display of the show flow exporter command.

Step 4

destination {hostname | ip-address} vrf vrf-name
Example:
Switch(config-flow-exporter)# destination 198.51.100.120 vrf SampleVrfName

(Optional) Configures the flow exports destination.

Step 5

dscp <0-63> Example:
Switch(config-flow-exporter)# dscp 23

(Optional) Configures differentiated services code point (DSCP) parameters for datagrams sent by the exporter. The DSCP range is from 0 to 63. The default is 0.

Step 6

source interface-id

(Optional) Specifies the local interface from which the

Example:

exporter uses the IP address as the source IP address for exported datagrams.

Switch(config-flow-exporter)# source {

Auto-Template|Capwap|GigabitEthernet|GroupVI|InternalInterface|Loopback|Null|Port-channel|TenGigabitEthernet|Tunnel|Vlan}

Step 7

option {exporter-stats | interface-table | sampler-table} timeout seconds]
Example:
Switch(config-flow-exporter)# option exporter-stats timeout 600

(Optional) Configures options data parameters for the exporter. You can configure all three options concurrently. The range for the timeout is 1 to 86400 seconds. The default is 600.

Step 8

export-protocolnetflow-v9
Example:
Switch(config-flow-exporter)# export-protocol netflow-v9

Configures export-protocol parameters for the exporter.

Step 9

template data timeout seconds
Example:
Switch(config-flow-exporter)# template data timeout 600 Switch(config-flow-exporter)#

(Optional) Configures re-sending of templates based on a timeout. The range is 1 to 86400 seconds (86400 seconds equals 24 hours). The default is 600.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 479

IPv6 Configuring a Customized Flow Monitor

Step 10 Step 11 Step 12

Command or Action transport udp udp-port Example:
Switch(config-flow-exporter)# transport udp 67

Purpose
Specifies the UDP port on which the destination system is listening for exported datagrams. The range for udp-port is from 1 to 65536.

ttl seconds Example:
Switch(config-flow-exporter)# ttl 100

(Optional) Configures the time-to-live (TTL) value for datagrams sent by the exporter. The range is from 1 to 255 seconds. The default is 255.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example
Switch(config)# flow exporter QoS-Collector Switch(config-flow-exporter)# description QoS Collector Bldg 19 Switch(config-flow-exporter)# destination 172.20.244.28 Switch(config-flow-exporter)# source vlan 1 Switch(config-flow-exporter)# dscp 3 Switch(config-flow-exporter)# transport udp 2055 Switch(config-flow-exporter)# end

What to do next
Configuring a Customized Flow Monitor.
Related Topics Configuring a Customized Flow Record , on page 475 IPv6 Netflow, on page 475 Configuring a Customized Flow Monitor, on page 480 Applying a Flow Monitor to an Interface, on page 482 Configuring and Enabling Flow Sampling , on page 484

Configuring a Customized Flow Monitor
The following steps are used to configure a NetFlow monitor.

SUMMARY STEPS

1. configure terminal 2. flow monitor monitor -name 3. description description 4. record {TestNetflowRecordName|TestRecord} 5. cache {timeout [active| inactive|update] (seconds) | type (normal)} 6. cache {timeout [active| inactive|update] (seconds) | type (normal)} 7. exporter TestNetFlowExporterName

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 480

IPv6 Configuring a Customized Flow Monitor

8. cache {timeout [active| inactive|update] (seconds) | type (normal)} 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

flow monitor monitor -name Example:
Switch(config)# flow monitor SampleMonitorName

Creates a flow monitor and enters Flexible NetFlow flow monitor configuration mode. You can also use this command to modify an existing flow monitor.

Step 3

description description
Example:
Switch(config-flow-monitor)# Description SampleNetFlowMonitorName

(Optional) Configures a description for the flow monitor.

Step 4

record {TestNetflowRecordName|TestRecord}
Example:
Switch(config-flow-monitor)#record TestNetflowRecordName

Specifies the record for the flow monitor.

Step 5

cache {timeout [active| inactive|update] (seconds) | type (normal)}
Example:
Switch(config-flow-monitor)# cache type normal

(Optional) Modifies the flow monitor cache parameters such as timeout values, number of cache entries, and the cache type.
· timeout active seconds--Configures the active flow timeout. This defines the granularity of the traffic analysis. The range is from 1 to 604800 seconds. The default is 1800. Typical values are 60 or 300 seconds. See the Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters document for recommended values.
· type normal--Configures normal flow removal from the flow cache.
Note Although visible in the command line help, the entries keyword and inactive and update timeouts are not supported.

Step 6

cache {timeout [active| inactive|update] (seconds) | type (normal)}
Example:
Switch(config-flow-monitor)# cache type normal

Repeat step 5 to configure additional cache parameters for the flow monitor.

Step 7

exporter TestNetFlowExporterName Example:

(Optional) Specifies the name of an exporter that was created previously.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 481

IPv6 Applying a Flow Monitor to an Interface

Step 8 Step 9

Command or Action
Switch(config-flow-monitor)# exporter TestNetFlowExporterName

Purpose

cache {timeout [active| inactive|update] (seconds) | type (normal)}
Example:
Switch(config-flow-monitor)# cache type normal

Repeat step 5 to configure additional cache parameters for the flow monitor.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example
Switch(config)# flow monitor FLOW-MONITOR-1 Switch(config-flow-monitor)# Used for ipv6 traffic analysis Switch(config-flow-monitor)# record FLOW-RECORD-1 Switch(config-flow-monitor)# cache timeout active 300 Switch(config-flow-monitor)# cache type normal Switch(config-flow-monitor)# exporter EXPORTER-1 Switch(config-flow-monitor)# exit

What to do next
Apply a flow monitor to an interface
Related Topics Configuring a Customized Flow Record , on page 475 Configuring the Flow Exporters , on page 478 IPv6 Netflow, on page 475 Applying a Flow Monitor to an Interface, on page 482 Configuring and Enabling Flow Sampling , on page 484

Applying a Flow Monitor to an Interface
The following are used to configure a NetFlow monitor to an interface.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. wlan ssid 4. [ ip | ipv6 | datalink] flow monitor monitor -name sampler [sampler | input | output] 5. exit 6. Repeat steps 2 and 3 7. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 482

IPv6 Applying a Flow Monitor to an Interface

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

interface interface-id

Identifies an interface and enters interface configuration

Example:

mode. Flexible Net Flow is supported only on the service module 1-Gigabit or 10-Gigabit Ethernet interfaces.

Switch(config)# interface tengigabitEthernet 1/0/1 Note

You cannot attach a NetFlow monitor to a port

channel interface. If both service module

interfaces are part of an EtherChannel, you

should attach the monitor to both physical

interfaces.

Step 3

wlan ssid Example:
Switch (config)# wlan test 1 test

Configures the flow monitor on WLAN.

Step 4

[ ip | ipv6 | datalink] flow monitor monitor Activates a previously created flow monitor by assigning

-name sampler [sampler | input | output]

it to the interface to analyze incoming or outgoing traffic.

Example:
Switch(config-if)# ipv6 flow monitor SampleMonitorName input

· ip--Enters record matching IPv4 IP addresses. · ipv6--Enters record matching IPv6 IP addresses.
Note This keyword is visible only when the dual IPv4 and IPv6 Switch Database Management (SDM) template is configured on the switch.

· input--Applies the flow monitor on input traffic. · output--Applies the flow monitor on output traffic. · sampler--(Optional) Applies the flow monitor sampler.

Step 5

exit
Example:
Switch(config-if)# exit Switch(config)#

Returns to global configuration mode.

Step 6

Repeat steps 2 and 3 Example:

Configures additional cache parameters for the flow monitor.

Step 7

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 483

IPv6 Configuring and Enabling Flow Sampling

Example
Switch(config)# interface tengigabitethernet 1/0/1 Switch(config-if)# ip flow monitor FLOW-MONITOR-1 input Switch(config-if)# ip flow monitor FLOW-MONITOR-2 output Switch(config-if)# end
Related Topics Configuring a Customized Flow Record , on page 475 Configuring the Flow Exporters , on page 478 Configuring a Customized Flow Monitor, on page 480 IPv6 Netflow, on page 475 Configuring and Enabling Flow Sampling , on page 484

Configuring and Enabling Flow Sampling
The following steps are used to configure and enable flow sampling.

SUMMARY STEPS

1. configure terminal 2. sampler sampler -name 3. description description 4. mode {deterministic|random} (<1-1> )out-of <2-1024> 5. end 6. interface interface-id 7. wlan ssid 8. {ip | ipv6 | datalink] flow monitor monitor-name sampler sampler-name {input | output} 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

sampler sampler -name Example:
Switch(config)# sampler SampleNameForSAMPLER

Creates a flow monitor and enters Flexible NetFlow sampler configuration mode. You can also use this command to modify an existing sampler.

Step 3

description description

(Optional) Configures a description for the sampler.

Example:

Switch(config-sampler)#description SamplerName_1

Step 4

mode {deterministic|random} (<1-1> )out-of <2-1024>

Specifies the mode and window size from which to select packets. The window size range is from 2 to 1024.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 484

IPv6 Configuring and Enabling Flow Sampling

Step 5 Step 6 Step 7 Step 8
Step 9

Command or Action Example:
Switch(config-sampler)#mode random 1 out-of 2

Purpose
Note Although visible in the CLI help, the mode deterministic keyword is not supported.

end Example:
Switch(config-sampler)# end

Returns to global configuration mode.

interface interface-id Example:

Identifies an interface and enters interface configuration mode.

Switch(config)# interface tengigabitethernet 1/0/1

wlan ssid Example:
Switch(config)# wlan test 1 test

Configures to apply flow sampler on WLAN.

{ip | ipv6 | datalink] flow monitor monitor-name sampler sampler-name {input | output}

Activates a previously created IPv4 or IPv6 flow monitor by assigning it to the interface to analyze traffic.

Example:

Switch(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLE-1 input

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example
Switch(config)# sampler SAMPLER-1 Switch(config-sampler)# description Sample at 50 Switch(config-sampler)# mode random 1 out-of 2 Switch(config-sampler)# exit Switch(config)# interface tengigabitethernet 1/0/1 Switch(config)# wlan test 1 test Switch(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLE-1 input
What to do next
How to configure netflow v9 for IPv6.
Related Topics Configuring a Customized Flow Record , on page 475 Configuring the Flow Exporters , on page 478 Configuring a Customized Flow Monitor, on page 480 Applying a Flow Monitor to an Interface, on page 482 IPv6 Netflow, on page 475

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 485

IPv6 Verifying IPv6 Netflow

Verifying IPv6 Netflow

This section describes the Netflow related show commands for IPv6. The following commands can be used to verify Netflow on the switch.

Command show flow record

Purpose Displays the status of the flow records.

show flow ssid <ssid_name>

Displays SSID interface information.

show flow monitor {monitor name} {cache|provisioning|statistics}

Displays the flow monitor information.

show flow exporter exporter-name

Displays the status of a flow exporter.

show flow monitor monitor -name

Displays the current status of a flow monitor.

show flow interface interface-id

Verifies that the Flexible NetFlow is configured on the interface.

show flow monitor monitor -name cache format Displays data in the flow monitor cache. [csv | record | table}

show sampler sampler -name

Displays the current status of a flow sampler.

Monitoring IPv6 Netflow

This section describes the Netflow commands for IPv6.The following commands can be used to monitor Netflow on the switch.

Command show running-config flow record

Purpose Displays the configured flow records.

show running-config flow exporter exporter-name Verifies the configured flow exporter.

show running-config flow monitor monitor -name Verifies the flow monitor configuration.

Additional References

Related Documents

Related Topic

Document Title

IPv6 command reference

IPv6 Command Reference (Catalyst 3650 Switches)

Flexible NetFlow command reference Cisco Flexible NetFlow Command Reference (Catalyst 3650 Switches)

Flexible NetFlow configuration

Cisco Flexible NetFlow Configuration Guide (Catalyst 3650 Switches)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 486

IPv6 Feature Information for IPv6 NetFlow

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for IPv6 NetFlow

This table lists the features in this module and provides links to specific configuration information:

Feature

Release

Modification

IPv6 NetFlow Functionality

Cisco IOS XE 3.3SE

This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 487

IPv6 Feature Information for IPv6 NetFlow
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 488

V I P A R T
Layer 2/3
· Configuring Spanning Tree Protocol, on page 491 · Configuring Multiple Spanning-Tree Protocol, on page 519 · Configuring Optional Spanning-Tree Features, on page 553 · Configuring EtherChannels, on page 577 · Configuring Flex Links and the MAC Address-Table Move Update Feature, on page 611 · Configuring UniDirectional Link Detection, on page 629

2 8 C H A P T E R
Configuring Spanning Tree Protocol
· Finding Feature Information, on page 491 · Restrictions for STP, on page 491 · Information About Spanning Tree Protocol, on page 492 · How to Configure Spanning-Tree Features, on page 504 · Monitoring Spanning-Tree Status, on page 515 · Additional References for Spanning-Tree Protocol, on page 516 · Feature Information for STP, on page 517
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for STP
· An attempt to configure a switch as the root switch fails if the value necessary to be the root switch is less than 1.
· If your network consists of switches that support and do not support the extended system ID, it is unlikely that the switch with the extended system ID support will become the root switch. The extended system ID increases the switch priority value every time the VLAN number is greater than the priority of the connected switches running older software.
· The root switch for each spanning-tree instance should be a backbone or distribution switch. Do not configure an access switch as the spanning-tree primary root.
· You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Related Topics
Configuring the Root Switch (CLI), on page 506 Bridge ID, Device Priority, and Extended System ID, on page 494 Spanning-Tree Topology and BPDUs, on page 492
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 491

Information About Spanning Tree Protocol

Layer 2/3

Accelerated Aging to Retain Connectivity, on page 500
Information About Spanning Tree Protocol
Spanning Tree Protocol
Spanning Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing loops in the network. For a Layer 2 Ethernet network to function properly, only one active path can exist between any two stations. Multiple active paths among end stations cause loops in the network. If a loop exists in the network, end stations might receive duplicate messages. Switches might also learn end-station MAC addresses on multiple Layer 2 interfaces. These conditions result in an unstable network. Spanning-tree operation is transparent to end stations, which cannot detect whether they are connected to a single LAN segment or a switched LAN of multiple segments. The STP uses a spanning-tree algorithm to select one switch of a redundantly connected network as the root of the spanning tree. The algorithm calculates the best loop-free path through a switched Layer 2 network by assigning a role to each port based on the role of the port in the active topology:
· Root--A forwarding port elected for the spanning-tree topology
· Designated--A forwarding port elected for every switched LAN segment
· Alternate--A blocked port providing an alternate path to the root bridge in the spanning tree
· Backup--A blocked port in a loopback configuration
The switch that has all of its ports as the designated role or as the backup role is the root switch. The switch that has at least one of its ports in the designated role is called the designated switch. Spanning tree forces redundant data paths into a standby (blocked) state. If a network segment in the spanning tree fails and a redundant path exists, the spanning-tree algorithm recalculates the spanning-tree topology and activates the standby path. Switches send and receive spanning-tree frames, called bridge protocol data units (BPDUs), at regular intervals. The switches do not forward these frames but use them to construct a loop-free path. BPDUs contain information about the sending switch and its ports, including switch and MAC addresses, switch priority, port priority, and path cost. Spanning tree uses this information to elect the root switch and root port for the switched network and the root port and designated port for each switched segment. When two ports on a switch are part of a loop, the spanning-tree and path cost settings control which port is put in the forwarding state and which is put in the blocking state. The spanning-tree port priority value represents the location of a port in the network topology and how well it is located to pass traffic. The path cost value represents the media speed.
Note By default, the switch sends keepalive messages (to ensure the connection is up) only on interfaces that do not have small form-factor pluggable (SFP) modules. You can change the default for an interface by entering the [no] keepalive interface configuration command with no keywords.
Spanning-Tree Topology and BPDUs
The stable, active spanning-tree topology of a switched network is controlled by these elements:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 492

Layer 2/3

Spanning-Tree Topology and BPDUs
· The unique bridge ID (switch priority and MAC address) associated with each VLAN on each switch. In a switch stack, all switches use the same bridge ID for a given spanning-tree instance.
· The spanning-tree path cost to the root switch. · The port identifier (port priority and MAC address) associated with each Layer 2 interface.
When the switches in a network are powered up, each functions as the root switch. Each switch sends a configuration BPDU through all of its ports. The BPDUs communicate and compute the spanning-tree topology. Each configuration BPDU contains this information:
· The unique bridge ID of the switch that the sending switch identifies as the root switch · The spanning-tree path cost to the root · The bridge ID of the sending switch · Message age · The identifier of the sending interface · Values for the hello, forward delay, and max-age protocol timers
When a switch receives a configuration BPDU that contains superior information (lower bridge ID, lower path cost, and so forth), it stores the information for that port. If this BPDU is received on the root port of the switch, the switch also forwards it with an updated message to all attached LANs for which it is the designated switch. If a switch receives a configuration BPDU that contains inferior information to that currently stored for that port, it discards the BPDU. If the switch is a designated switch for the LAN from which the inferior BPDU was received, it sends that LAN a BPDU containing the up-to-date information stored for that port. In this way, inferior information is discarded, and superior information is propagated on the network. A BPDU exchange results in these actions:
· One switch in the network is elected as the root switch (the logical center of the spanning-tree topology in a switched network). See the figure following the bullets. For each VLAN, the switch with the highest switch priority (the lowest numerical priority value) is elected as the root switch. If all switches are configured with the default priority (32768), the switch with the lowest MAC address in the VLAN becomes the root switch. The switch priority value occupies the most significant bits of the bridge ID, as shown in the following figure.
· A root port is selected for each switch (except the root switch). This port provides the best path (lowest cost) when the switch forwards packets to the root switch. When selecting the root port on a switch stack, spanning tree follows this sequence: · Selects the lowest root bridge ID · Selects the lowest path cost to the root switch · Selects the lowest designated bridge ID · Selects the lowest designated path cost · Selects the lowest port ID

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 493

Bridge ID, Device Priority, and Extended System ID

Layer 2/3

· Only one outgoing port on the stack root switch is selected as the root port. The remaining switches in the stack become its designated switches (Switch 2 and Switch 3) as shown in the following figure.
· The shortest distance to the root switch is calculated for each switch based on the path cost.
· A designated switch for each LAN segment is selected. The designated switch incurs the lowest path cost when forwarding packets from that LAN to the root switch. The port through which the designated switch is attached to the LAN is called the designated port.
Figure 21: Spanning-Tree Port States in a Switch Stack
One stack member is elected as the stack root switch. The stack root switch contains the outgoing root port

(Switch1). All paths that are not needed to reach the root switch from anywhere in the switched network are placed in the spanning-tree blocking mode. Related Topics
Configuring the Root Switch (CLI), on page 506 Restrictions for STP, on page 491
Bridge ID, Device Priority, and Extended System ID
The IEEE 802.1D standard requires that each switch has an unique bridge identifier (bridge ID), which controls the selection of the root switch. Because each VLAN is considered as a different logical bridge with PVST+ and Rapid PVST+, the same switch must have a different bridge ID for each configured VLAN. Each VLAN on the switch has a unique 8-byte bridge ID. The 2 most-significant bytes are used for the switch priority, and the remaining 6 bytes are derived from the switch MAC address. The switch supports the IEEE 802.1t spanning-tree extensions, and some of the bits previously used for the switch priority are now used as the VLAN identifier. The result is that fewer MAC addresses are reserved for
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 494

Layer 2/3

Port Priority Versus Path Cost

the switch, and a larger range of VLAN IDs can be supported, all while maintaining the uniqueness of the bridge ID.
The 2 bytes previously used for the switch priority are reallocated into a 4-bit priority value and a 12-bit extended system ID value equal to the VLAN ID.
Table 49: Device Priority Value and Extended System ID

Priority Value

Extended System ID (Set Equal to the VLAN ID)

Bit Bit Bit Bit Bit Bit Bit Bit 9 Bit 8 Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 16 15 14 13 12 11 10

32768 16384 8192 4096 2048 1024 512 256 128 64 32 16 8 4 2 1

Spanning tree uses the extended system ID, the switch priority, and the allocated spanning-tree MAC address to make the bridge ID unique for each VLAN. Because the switch stack appears as a single switch to the rest of the network, all switches in the stack use the same bridge ID for a given spanning tree. If the stack master fails, the stack members recalculate their bridge IDs of all running spanning trees based on the new MAC address of the new stack master.
Support for the extended system ID affects how you manually configure the root switch, the secondary root switch, and the switch priority of a VLAN. For example, when you change the switch priority value, you change the probability that the switch will be elected as the root switch. Configuring a higher value decreases the probability; a lower value increases the probability.
If any root switch for the specified VLAN has a switch priority lower than 24576, the switch sets its own priority for the specified VLAN to 4096 less than the lowest switch priority. 4096 is the value of the least-significant bit of a 4-bit switch priority value as shown in the table.
Related Topics Configuring the Root Switch (CLI), on page 506 Restrictions for STP, on page 491 Configuring the Root Switch (CLI), on page 538 Root Switch, on page 522 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Port Priority Versus Path Cost
If a loop occurs, spanning tree uses port priority when selecting an interface to put into the forwarding state. You can assign higher priority values (lower numerical values) to interfaces that you want selected first and lower priority values (higher numerical values) that you want selected last. If all interfaces have the same priority value, spanning tree puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces.
The spanning-tree path cost default value is derived from the media speed of an interface. If a loop occurs, spanning tree uses cost when selecting an interface to put in the forwarding state. You can assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last. If all interfaces have the same cost value, spanning tree puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces.
If your switch is a member of a switch stack, you must assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last instead of adjusting its port priority. For details, see Related Topics.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 495

Spanning-Tree Interface States

Layer 2/3

Related Topics Configuring Port Priority (CLI), on page 508 Configuring Path Cost (CLI), on page 510
Spanning-Tree Interface States
Propagation delays can occur when protocol information passes through a switched LAN. As a result, topology changes can take place at different times and at different places in a switched network. When an interface transitions directly from nonparticipation in the spanning-tree topology to the forwarding state, it can create temporary data loops. Interfaces must wait for new topology information to propagate through the switched LAN before starting to forward frames. They must allow the frame lifetime to expire for forwarded frames that have used the old topology. Each Layer 2 interface on a switch using spanning tree exists in one of these states:
· Blocking--The interface does not participate in frame forwarding.
· Listening--The first transitional state after the blocking state when the spanning tree decides that the interface should participate in frame forwarding.
· Learning--The interface prepares to participate in frame forwarding.
· Forwarding--The interface forwards frames.
· Disabled--The interface is not participating in spanning tree because of a shutdown port, no link on the port, or no spanning-tree instance running on the port.
An interface moves through these states: · From initialization to blocking
· From blocking to listening or to disabled
· From listening to learning or to disabled
· From learning to forwarding or to disabled
· From forwarding to disabled

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 496

Layer 2/3 Figure 22: Spanning-Tree Interface States

Blocking State

Blocking State

An interface moves through the states. When you power up the switch, spanning tree is enabled by default, and every interface in the switch, VLAN, or network goes through the blocking state and the transitory states of listening and learning. Spanning tree stabilizes each interface at the forwarding or blocking state. When the spanning-tree algorithm places a Layer 2 interface in the forwarding state, this process occurs: 1. The interface is in the listening state while spanning tree waits for protocol information to move the
interface to the blocking state.
2. While spanning tree waits for the forward-delay timer to expire, it moves the interface to the learning state and resets the forward-delay timer.
3. In the learning state, the interface continues to block frame forwarding as the switch learns end-station location information for the forwarding database.
4. When the forward-delay timer expires, spanning tree moves the interface to the forwarding state, where both learning and frame forwarding are enabled.
A Layer 2 interface in the blocking state does not participate in frame forwarding. After initialization, a BPDU is sent to each switch interface. A switch initially functions as the root until it exchanges BPDUs with other switches. This exchange establishes which switch in the network is the root or root switch. If there is only one switch in the network, no exchange occurs, the forward-delay timer expires, and the interface moves to the listening state. An interface always enters the blocking state after switch initialization. An interface in the blocking state performs these functions:
· Discards frames received on the interface
· Discards frames switched from another interface for forwarding
· Does not learn addresses
· Receives BPDUs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 497

Listening State

Layer 2/3

Listening State

The listening state is the first state a Layer 2 interface enters after the blocking state. The interface enters this state when the spanning tree decides that the interface should participate in frame forwarding. An interface in the listening state performs these functions:
· Discards frames received on the interface · Discards frames switched from another interface for forwarding · Does not learn addresses · Receives BPDUs

Learning State

A Layer 2 interface in the learning state prepares to participate in frame forwarding. The interface enters the learning state from the listening state. An interface in the learning state performs these functions:
· Discards frames received on the interface · Discards frames switched from another interface for forwarding · Learns addresses · Receives BPDUs

Forwarding State

A Layer 2 interface in the forwarding state forwards frames. The interface enters the forwarding state from the learning state. An interface in the forwarding state performs these functions:
· Receives and forwards frames received on the interface · Forwards frames switched from another interface · Learns addresses · Receives BPDUs

Disabled State

A Layer 2 interface in the disabled state does not participate in frame forwarding or in the spanning tree. An interface in the disabled state is nonoperational. A disabled interface performs these functions:
· Discards frames received on the interface · Discards frames switched from another interface for forwarding · Does not learn addresses · Does not receive BPDUs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 498

Layer 2/3

How a Switch or Port Becomes the Root Switch or Root Port

How a Switch or Port Becomes the Root Switch or Root Port
If all switches in a network are enabled with default spanning-tree settings, the switch with the lowest MAC address becomes the root switch.
Figure 23: Spanning-Tree Topology
Switch A is elected as the root switch because the switch priority of all the switches is set to the default (32768) and Switch A has the lowest MAC address. However, because of traffic patterns, number of forwarding interfaces, or link types, Switch A might not be the ideal root switch. By increasing the priority (lowering the numerical value) of the ideal switch so that it becomes the root switch, you force a spanning-tree recalculation

to form a new topology with the ideal switch as the root.
When the spanning-tree topology is calculated based on default parameters, the path between source and destination end stations in a switched network might not be ideal. For instance, connecting higher-speed links to an interface that has a higher number than the root port can cause a root-port change. The goal is to make the fastest link the root port.
For example, assume that one port on Switch B is a Gigabit Ethernet link and that another port on Switch B (a 10/100 link) is the root port. Network traffic might be more efficient over the Gigabit Ethernet link. By changing the spanning-tree port priority on the Gigabit Ethernet port to a higher priority (lower numerical value) than the root port, the Gigabit Ethernet port becomes the new root port.
Related Topics Configuring Port Priority (CLI), on page 508
Spanning Tree and Redundant Connectivity
Figure 24: Spanning Tree and Redundant Connectivity
You can create a redundant backbone with spanning tree by connecting two switch interfaces to another device or to two different devices. Spanning tree automatically disables one interface but enables it if the other one fails. If one link is high-speed and the other is low-speed, the low-speed link is always disabled. If the speeds

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 499

Spanning-Tree Address Management

Layer 2/3

are the same, the port priority and port ID are added together, and spanning tree disables the link with the

highest value. You can also create redundant links between switches by using EtherChannel groups.
Spanning-Tree Address Management
IEEE 802.1D specifies 17 multicast addresses, ranging from 0x00180C2000000 to 0x0180C2000010, to be used by different bridge protocols. These addresses are static addresses that cannot be removed. Regardless of the spanning-tree state, each switch in the stack receives but does not forward packets destined for addresses between 0x0180C2000000 and 0x0180C200000F. If spanning tree is enabled, the CPU on the switch or on each switch in the stack receives packets destined for 0x0180C2000000 and 0x0180C2000010. If spanning tree is disabled, the switch or each switch in the stack forwards those packets as unknown multicast addresses.
Accelerated Aging to Retain Connectivity
The default for aging dynamic addresses is 5 minutes, the default setting of the mac address-table aging-time global configuration command. However, a spanning-tree reconfiguration can cause many station locations to change. Because these stations could be unreachable for 5 minutes or more during a reconfiguration, the address-aging time is accelerated so that station addresses can be dropped from the address table and then relearned. The accelerated aging is the same as the forward-delay parameter value (spanning-tree vlan vlan-id forward-time seconds global configuration command) when the spanning tree reconfigures. Because each VLAN is a separate spanning-tree instance, the switch accelerates aging on a per-VLAN basis. A spanning-tree reconfiguration on one VLAN can cause the dynamic addresses learned on that VLAN to be subject to accelerated aging. Dynamic addresses on other VLANs can be unaffected and remain subject to the aging interval entered for the switch. Related Topics
Configuring the Root Switch (CLI), on page 506 Restrictions for STP, on page 491
Spanning-Tree Modes and Protocols
The switch supports these spanning-tree modes and protocols: · PVST+--This spanning-tree mode is based on the IEEE 802.1D standard and Cisco proprietary extensions. It is the default spanning-tree mode used on all Ethernet port-based VLANs. The PVST+ runs on each
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 500

Layer 2/3

Supported Spanning-Tree Instances

VLAN on the switch up to the maximum supported, ensuring that each has a loop-free path through the network.
The PVST+ provides Layer 2 load-balancing for the VLAN on which it runs. You can create different logical topologies by using the VLANs on your network to ensure that all of your links are used but that no one link is oversubscribed. Each instance of PVST+ on a VLAN has a single root switch. This root switch propagates the spanning-tree information associated with that VLAN to all other switches in the network. Because each switch has the same information about the network, this process ensures that the network topology is maintained.
· Rapid PVST+--This spanning-tree mode is the same as PVST+ except that is uses a rapid convergence based on the IEEE 802.1w standard. To provide rapid convergence, the Rapid PVST+ immediately deletes dynamically learned MAC address entries on a per-port basis upon receiving a topology change. By contrast, PVST+ uses a short aging time for dynamically learned MAC address entries.
Rapid PVST+ uses the same configuration as PVST+ (except where noted), and the switch needs only minimal extra configuration. The benefit of Rapid PVST+ is that you can migrate a large PVST+ install base to Rapid PVST+ without having to learn the complexities of the Multiple Spanning Tree Protocol (MSTP) configuration and without having to reprovision your network. In Rapid PVST+ mode, each VLAN runs its own spanning-tree instance up to the maximum supported.
· MSTP--This spanning-tree mode is based on the IEEE 802.1s standard. You can map multiple VLANs to the same spanning-tree instance, which reduces the number of spanning-tree instances required to support a large number of VLANs. The MSTP runs on top of the RSTP (based on IEEE 802.1w), which provides for rapid convergence of the spanning tree by eliminating the forward delay and by quickly transitioning root ports and designated ports to the forwarding state. In a switch stack, the cross-stack rapid transition (CSRT) feature performs the same function as RSTP. You cannot run MSTP without RSTP or CSRT.
Related Topics Changing the Spanning-Tree Mode (CLI), on page 504
Supported Spanning-Tree Instances
In PVST+ or Rapid PVST+ mode, the switch or switch stack supports up to 128 spanning-tree instances.
In MSTP mode, the switch or switch stack supports up to 65 MST instances. The number of VLANs that can be mapped to a particular MST instance is unlimited.
Related Topics Disabling Spanning Tree (CLI), on page 505 Default Spanning-Tree Configuration, on page 503 Default MSTP Configuration, on page 535
Spanning-Tree Interoperability and Backward Compatibility
In a mixed MSTP and PVST+ network, the common spanning-tree (CST) root must be inside the MST backbone, and a PVST+ switch cannot connect to multiple MST regions.
When a network contains switches running Rapid PVST+ and switches running PVST+, we recommend that the Rapid PVST+ switches and PVST+ switches be configured for different spanning-tree instances. In the Rapid PVST+ spanning-tree instances, the root switch must be a Rapid PVST+ switch. In the PVST+ instances, the root switch must be a PVST+ switch. The PVST+ switches should be at the edge of the network.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 501

STP and IEEE 802.1Q Trunks

Layer 2/3

All stack members run the same version of spanning tree (all PVST+, all Rapid PVST+, or all MSTP).
Table 50: PVST+, MSTP, and Rapid-PVST+ Interoperability and Compatibility

PVST+ MSTP Rapid PVST+

PVST+

MSTP

Rapid PVST+

Yes

Yes (with restrictions) Yes (reverts to PVST+)

Yes (with restrictions) Yes

Yes (reverts to PVST+)

Yes (reverts to PVST+) Yes (reverts to PVST+) Yes

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523

STP and IEEE 802.1Q Trunks
The IEEE 802.1Q standard for VLAN trunks imposes some limitations on the spanning-tree strategy for a network. The standard requires only one spanning-tree instance for all VLANs allowed on the trunks. However, in a network of Cisco switches connected through IEEE 802.1Q trunks, the switches maintain one spanning-tree instance for each VLAN allowed on the trunks.
When you connect a Cisco switch to a non-Cisco device through an IEEE 802.1Q trunk, the Cisco switch uses PVST+ to provide spanning-tree interoperability. If Rapid PVST+ is enabled, the switch uses it instead of PVST+. The switch combines the spanning-tree instance of the IEEE 802.1Q VLAN of the trunk with the spanning-tree instance of the non-Cisco IEEE 802.1Q switch.
However, all PVST+ or Rapid PVST+ information is maintained by Cisco switches separated by a cloud of non-Cisco IEEE 802.1Q switches. The non-Cisco IEEE 802.1Q cloud separating the Cisco switches is treated as a single trunk link between the switches.
PVST+ is automatically enabled on IEEE 802.1Q trunks, and no user configuration is required. The external spanning-tree behavior on access ports and Inter-Switch Link (ISL) trunk ports is not affected by PVST+.

VLAN-Bridge Spanning Tree
Cisco VLAN-bridge spanning tree is used with the fallback bridging feature (bridge groups), which forwards non-IP protocols such as DECnet between two or more VLAN bridge domains or routed ports. The VLAN-bridge spanning tree allows the bridge groups to form a spanning tree on top of the individual VLAN spanning trees to prevent loops from forming if there are multiple connections among VLANs. It also prevents the individual spanning trees from the VLANs being bridged from collapsing into a single spanning tree.
To support VLAN-bridge spanning tree, some of the spanning-tree timers are increased. To use the fallback bridging feature, you must have the IP services feature set enabled on your switch.

Spanning Tree and Switch Stacks
When the switch stack is operating in PVST+ or Rapid PVST+ mode:
· A switch stack appears as a single spanning-tree node to the rest of the network, and all stack members use the same bridge ID for a given spanning tree. The bridge ID is derived from the MAC address of the active switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 502

Layer 2/3

Default Spanning-Tree Configuration

· When a new switch joins the stack, it sets its bridge ID to the active switch bridge ID. If the newly added switch has the lowest ID and if the root path cost is the same among all stack members, the newly added switch becomes the stack root.
· When a stack member leaves the stack, spanning-tree reconvergence occurs within the stack (and possibly outside the stack). The remaining stack member with the lowest stack port ID becomes the stack root.
· If a neighboring switch external to the switch stack fails or is powered down, normal spanning-tree processing occurs. Spanning-tree reconvergence might occur as a result of losing a switch in the active topology.
· If a new switch external to the switch stack is added to the network, normal spanning-tree processing occurs. Spanning-tree reconvergence might occur as a result of adding a switch in the network.

Default Spanning-Tree Configuration

Table 51: Default Spanning-Tree Configuration

Feature

Default Setting

Enable state

Enabled on VLAN 1.

Spanning-tree mode

PVST+. (Rapid PVST+ and MSTP are disabled.)

Switch priority

32768

Spanning-tree port priority (configurable on a

128

per-interface basis)

Spanning-tree port cost (configurable on a per-interface basis)

1000 Mb/s: 4 100 Mb/s: 19 10 Mb/s: 100

Spanning-tree VLAN port priority (configurable on 128 a per-VLAN basis)

Spanning-tree VLAN port cost (configurable on a per-VLAN basis)

1000 Mb/s: 4 100 Mb/s: 19 10 Mb/s: 100

Spanning-tree timers

Hello time: 2 seconds Forward-delay time: 15 seconds Maximum-aging time: 20 seconds Transmit hold count: 6 BPDUs

Related Topics Disabling Spanning Tree (CLI), on page 505 Supported Spanning-Tree Instances, on page 501

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 503

How to Configure Spanning-Tree Features

Layer 2/3

How to Configure Spanning-Tree Features

Changing the Spanning-Tree Mode (CLI)
The switch supports three spanning-tree modes: per-VLAN spanning tree plus (PVST+), Rapid PVST+, or multiple spanning tree protocol (MSTP). By default, the switch runs the PVST+ protocol. If you want to enable a mode that is different from the default mode, this procedure is required. Beginning in privileged EXEC mode, follow these steps to change the spanning-tree mode:

SUMMARY STEPS

1. configure terminal 2. spanning-tree mode {pvst | mst | rapid-pvst} 3. interface interface-id 4. spanning-tree link-type point-to-point 5. end 6. clear spanning-tree detected-protocols

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3 Step 4

spanning-tree mode {pvst | mst | rapid-pvst} Example:
Switch(config)# spanning-tree mode pvst

Configures a spanning-tree mode. All stack members run the same version of spanning tree.
· Select pvst to enable PVST+ (the default setting).
· Select mst to enable MSTP (and RSTP).
· Select rapid-pvst to enable rapid PVST+.

interface interface-id Example:
Switch(config)# interface GigabitEthernet1/0/1
spanning-tree link-type point-to-point Example:
Switch(config-if)# spanning-tree link-type point-to-point

(Recommended for Rapid PVST+ mode only) Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports, VLANs, and port channels. The VLAN ID range is 1 to 4094. The port-channel range is 1 to 48.
(Recommended for Rapid PVST+ mode only) Specifies that the link type for this port is point-to-point.
If you connect this port (local port) to a remote port through a point-to-point link and the local port becomes a designated

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 504

Layer 2/3

Disabling Spanning Tree (CLI)

Step 5 Step 6

Command or Action
end Example:

Purpose port, the switch negotiates with the remote port and rapidly changes the local port to the forwarding state.
Returns to privileged EXEC mode.

Switch(config-if)# end
clear spanning-tree detected-protocols Example:
Switch# clear spanning-tree detected-protocols

(Recommended for Rapid PVST+ mode only) If any port on the switch is connected to a port on a legacy IEEE 802.1D switch, this command restarts the protocol migration process on the entire switch.
This step is optional if the designated switch detects that this switch is running rapid PVST+.

Related Topics Spanning-Tree Modes and Protocols, on page 500

Disabling Spanning Tree (CLI)
Spanning tree is enabled by default on VLAN 1 and on all newly created VLANs up to the spanning-tree limit. Disable spanning tree only if you are sure there are no loops in the network topology.

Caution When spanning tree is disabled and loops are present in the topology, excessive traffic and indefinite packet duplication can drastically reduce network performance.
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to disable a spanning tree:

SUMMARY STEPS

1. configure terminal 2. no spanning-tree vlan vlan-id 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 505

Configuring the Root Switch (CLI)

Layer 2/3

Step 2 Step 3

Command or Action no spanning-tree vlan vlan-id Example:
Switch(config)# no spanning-tree vlan 300
end Example:
Switch(config)# end

Purpose For vlan-id, the range is 1 to 4094.
Returns to privileged EXEC mode.

Related Topics Supported Spanning-Tree Instances, on page 501 Default Spanning-Tree Configuration, on page 503

Configuring the Root Switch (CLI)
To configure a switch as the root for the specified VLAN, use the spanning-tree vlan vlan-id root global configuration command to modify the switch priority from the default value (32768) to a significantly lower value. When you enter this command, the software checks the switch priority of the root switches for each VLAN. Because of the extended system ID support, the switch sets its own priority for the specified VLAN to 24576 if this value will cause this switch to become the root for the specified VLAN.
Use the diameter keyword to specify the Layer 2 network diameter (that is, the maximum number of switch hops between any two end stations in the Layer 2 network). When you specify the network diameter, the switch automatically sets an optimal hello time, forward-delay time, and maximum-age time for a network of that diameter, which can significantly reduce the convergence time. You can use the hello keyword to override the automatically calculated hello time.
This procedure is optional.
Beginning in privileged EXEC mode, follow these steps to configure a switch to become the root for the specified VLAN:

SUMMARY STEPS

1. configure terminal 2. spanning-tree vlan vlan-id root primary [diameter net-diameter ] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 506

Layer 2/3

Configuring a Secondary Root Device (CLI)

Step 2 Step 3

Command or Action spanning-tree vlan vlan-id root primary [diameter net-diameter ] Example:
Switch(config)# spanning-tree vlan 20-24 root primary diameter 4
end Example:
Switch(config)# end

Purpose
Configures a switch to become the root for the specified VLAN.
· For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094.
· (Optional) For diameter net-diameter, specify the maximum number of switches between any two end stations. The range is 2 to 7.
Returns to privileged EXEC mode.

What to do next
After configuring the switch as the root switch, we recommend that you avoid manually configuring the hello time, forward-delay time, and maximum-age time through the spanning-tree vlan vlan-id hello-time, spanning-tree vlan vlan-id forward-time, and the spanning-tree vlan vlan-id max-age global configuration commands.
Related Topics Bridge ID, Device Priority, and Extended System ID, on page 494 Spanning-Tree Topology and BPDUs, on page 492 Accelerated Aging to Retain Connectivity, on page 500 Restrictions for STP, on page 491

Configuring a Secondary Root Device (CLI)
When you configure a switch as the secondary root, the switch priority is modified from the default value (32768) to 28672. With this priority, the switch is likely to become the root switch for the specified VLAN if the primary root switch fails. This is assuming that the other network switches use the default switch priority of 32768, and therefore, are unlikely to become the root switch.
You can execute this command on more than one switch to configure multiple backup root switches. Use the same network diameter and hello-time values that you used when you configured the primary root switch with the spanning-tree vlan vlan-id root primary global configuration command.
This procedure is optional.
Beginning in privileged EXEC mode, follow these steps to configure a switch to become a secondary root for the specified VLAN:

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 507

Configuring Port Priority (CLI)

Layer 2/3

2. spanning-tree vlan vlan-id root secondary [diameter net-diameter] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

spanning-tree vlan vlan-id root secondary [diameter net-diameter] Example:
Switch(config)# spanning-tree vlan 20-24 root secondary diameter 4
end Example:

Configures a switch to become the secondary root for the specified VLAN.
· For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094.
· (Optional) For diameter net-diameter, specify the maximum number of switches between any two end stations. The range is 2 to 7.
Use the same network diameter value that you used when configuring the primary root switch.
Returns to privileged EXEC mode.

Switch(config)# end

Configuring Port Priority (CLI)

Note If your switch is a member of a switch stack, you must use the spanning-tree [vlan vlan-id] cost cost interface configuration command instead of the spanning-tree [vlan vlan-id] port-priority priority interface configuration command to select an interface to put in the forwarding state. Assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last.

This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure port priority:

SUMMARY STEPS

1. configure terminal 2. interface interface-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 508

Layer 2/3

Configuring Port Priority (CLI)

3. spanning-tree port-priority priority 4. spanning-tree vlan vlan-id port-priority priority 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3 Step 4
Step 5

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/2

Specifies an interface to configure, and enters interface configuration mode.
Valid interfaces include physical ports and port-channel logical interfaces (port-channel port-channel-number).

spanning-tree port-priority priority

Configures the port priority for an interface.

Example:
Switch(config-if)# spanning-tree port-priority 0

For priority, the range is 0 to 240, in increments of 16; the default is 128. Valid values are 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, and 240. All other values are rejected. The lower the number, the higher the priority.

spanning-tree vlan vlan-id port-priority priority Example:
Switch(config-if)# spanning-tree vlan 20-25 port-priority 0

Configures the port priority for a VLAN.
· For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094.
· For priority, the range is 0 to 240, in increments of 16; the default is 128. Valid values are 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, and 240. All other values are rejected. The lower the number, the higher the priority.

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Related Topics Port Priority Versus Path Cost, on page 495 How a Switch or Port Becomes the Root Switch or Root Port, on page 499

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 509

Configuring Path Cost (CLI)

Layer 2/3

Configuring Path Cost (CLI)
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure path cost:

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. spanning-tree cost cost 4. spanning-tree vlan vlan-id cost cost 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3 Step 4

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/1

Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports and port-channel logical interfaces (port-channel port-channel-number).

spanning-tree cost cost Example:
Switch(config-if)# spanning-tree cost 250

Configures the cost for an interface.
If a loop occurs, spanning tree uses the path cost when selecting an interface to place into the forwarding state. A lower path cost represents higher-speed transmission.
For cost, the range is 1 to 200000000; the default value is derived from the media speed of the interface.

spanning-tree vlan vlan-id cost cost

Configures the cost for a VLAN.

Example:

If a loop occurs, spanning tree uses the path cost when

selecting an interface to place into the forwarding state. A

Switch(config-if)# spanning-tree vlan 10,12-15,20 lower path cost represents higher-speed transmission.

cost 300

· For vlan-id, you can specify a single VLAN identified

by VLAN ID number, a range of VLANs separated

by a hyphen, or a series of VLANs separated by a

comma. The range is 1 to 4094.

· For cost, the range is 1 to 200000000; the default value is derived from the media speed of the interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 510

Layer 2/3

Configuring the Device Priority of a VLAN (CLI)

Step 5

Command or Action end Example:
Switch(config-if)# end

Purpose Returns to privileged EXEC mode.

The show spanning-tree interface interface-id privileged EXEC command displays information only for ports that are in a link-up operative state. Otherwise, you can use the show running-config privileged EXEC command to confirm the configuration.
Related Topics Port Priority Versus Path Cost, on page 495

Configuring the Device Priority of a VLAN (CLI)
You can configure the switch priority and make it more likely that a standalone switch or a switch in the stack will be chosen as the root switch.

Note Exercise care when using this command. For most situations, we recommend that you use the spanning-tree vlan vlan-id root primary and the spanning-tree vlan vlan-id root secondary global configuration commands to modify the switch priority.
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the switch priority of a VLAN:

SUMMARY STEPS

1. configure terminal 2. spanning-tree vlan vlan-id priority priority 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

spanning-tree vlan vlan-id priority priority

Configures the switch priority of a VLAN.

Example:
Switch(config)# spanning-tree vlan 20 priority 8192

· For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 511

Configuring the Hello Time (CLI)

Layer 2/3

Command or Action

Step 3

end Example:
Switch(config-if)# end

Purpose · For priority, the range is 0 to 61440 in increments of 4096; the default is 32768. The lower the number, the more likely the switch will be chosen as the root switch.
Valid priority values are 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344, and 61440. All other values are rejected.
Returns to privileged EXEC mode.

Configuring the Hello Time (CLI)
The hello time is the time interval between configuration messages generated and sent by the root switch. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure hello time:

SUMMARY STEPS

1. spanning-tree vlan vlan-id hello-time seconds 2. end

DETAILED STEPS

Step 1

Command or Action

Purpose

spanning-tree vlan vlan-id hello-time seconds

Configures the hello time of a VLAN. The hello time is the

Example:

time interval between configuration messages generated and sent by the root switch. These messages mean that the

switch is alive.
Switch(config)# spanning-tree vlan 20-24 hello-time

3

· For vlan-id, you can specify a single VLAN identified

by VLAN ID number, a range of VLANs separated

by a hyphen, or a series of VLANs separated by a

comma. The range is 1 to 4094.

· For seconds, the range is 1 to 10; the default is 2.

Step 2

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 512

Layer 2/3

Configuring the Forwarding-Delay Time for a VLAN (CLI)

Configuring the Forwarding-Delay Time for a VLAN (CLI)
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the forwarding delay time for a VLAN:

SUMMARY STEPS

1. configure terminal 2. spanning-tree vlan vlan-id forward-time seconds 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

spanning-tree vlan vlan-id forward-time seconds Example:
Switch(config)# spanning-tree vlan 20,25 forward-time 18

Step 3

end Example:
Switch(config)# end

Configures the forward time of a VLAN. The forwarding delay is the number of seconds an interface waits before changing from its spanning-tree learning and listening states to the forwarding state.
· For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094.
· For seconds, the range is 4 to 30; the default is 15.
Returns to privileged EXEC mode.

Configuring the Maximum-Aging Time for a VLAN (CLI)
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the maximum-aging time for a VLAN:

SUMMARY STEPS

1. configure terminal 2. spanning-tree vlan vlan-id max-age seconds 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 513

Configuring the Transmit Hold-Count (CLI)

Layer 2/3

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

spanning-tree vlan vlan-id max-age seconds Example:
Switch(config)# spanning-tree vlan 20 max-age 30

Configures the maximum-aging time of a VLAN. The maximum-aging time is the number of seconds a switch waits without receiving spanning-tree configuration messages before attempting a reconfiguration.
· For vlan-id, you can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094.

· For seconds, the range is 6 to 40; the default is 20.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Configuring the Transmit Hold-Count (CLI)
You can configure the BPDU burst size by changing the transmit hold count value.

Note Changing this parameter to a higher value can have a significant impact on CPU utilization, especially in Rapid PVST+ mode. Lowering this value can slow down convergence in certain scenarios. We recommend that you maintain the default setting.

This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure transmit hold-count:

SUMMARY STEPS

1. configure terminal 2. spanning-tree transmit hold-count value 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 514

Layer 2/3

Monitoring Spanning-Tree Status

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

spanning-tree transmit hold-count value Example:

Configures the number of BPDUs that can be sent before pausing for 1 second.
For value, the range is 1 to 20; the default is 6.

Switch(config)# spanning-tree transmit hold-count 6

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Monitoring Spanning-Tree Status

Table 52: Commands for Displaying Spanning-Tree Status

show spanning-tree active

Displays spanning-tree information on active interfaces only.

show spanning-tree detail

Displays a detailed summary of interface information.

show spanning-tree vlan vlan-id

Displays spanning-tree information for the specified VLAN.

show spanning-tree interface interface-id

Displays spanning-tree information for the specified interface.

show spanning-tree interface interface-id portfast Displays spanning-tree portfast information for the specified interface.

show spanning-tree summary [totals]

Displays a summary of interface states or displays the total lines of the STP state section.

To clear spanning-tree counters, use the clear spanning-tree [interface interface-id] privileged EXEC command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 515

Additional References for Spanning-Tree Protocol

Layer 2/3

Additional References for Spanning-Tree Protocol

Related Documents Related Topic Spanning tree protocol commands

Document Title
LAN Switching Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 516

Layer 2/3
Feature Information for STP
Release Cisco IOS XE 3.3SE

Feature Information for STP
Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 517

Feature Information for STP

Layer 2/3

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 518

2 9 C H A P T E R
Configuring Multiple Spanning-Tree Protocol
· Finding Feature Information, on page 519 · Prerequisites for MSTP, on page 519 · Restrictions for MSTP, on page 520 · Information About MSTP, on page 521 · How to Configure MSTP Features, on page 536 · Monitoring MST Configuration and Status, on page 551 · Additional References for MSTP, on page 551 · Feature Information for MSTP, on page 552
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for MSTP
· For two or more switches to be in the same multiple spanning tree (MST) region, they must have the same VLAN-to-instance map, the same configuration revision number, and the same name.
· For two or more stacked switches to be in the same MST region, they must have the same VLAN-to-instance map, the same configuration revision number, and the same name.
· For load-balancing across redundant paths in the network to work, all VLAN-to-instance mapping assignments must match; otherwise, all traffic flows on a single link. You can achieve load-balancing across a switch stack by manually configuring the path cost.
· For load-balancing between a per-VLAN spanning tree plus (PVST+) and an MST cloud or between a rapid-PVST+ and an MST cloud to work, all MST boundary ports must be forwarding. MST boundary ports are forwarding when the internal spanning tree (IST) master of the MST cloud is the root of the common spanning tree (CST). If the MST cloud consists of multiple MST regions, one of the MST regions must contain the CST root, and all of the other MST regions must have a better path to the root
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 519

Restrictions for MSTP

Layer 2/3

contained within the MST cloud than a path through the PVST+ or rapid-PVST+ cloud. You might have to manually configure the switches in the clouds.
Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523

Restrictions for MSTP
· You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. · The switch stack supports up to 65 MST instances. The number of VLANs that can be mapped to a
particular MST instance is unlimited.
· PVST+, Rapid PVST+, and MSTP are supported, but only one version can be active at any time. (For example, all VLANs run PVST+, all VLANs run Rapid PVST+, or all VLANs run MSTP.)
· All stack members must run the same version of spanning tree (all PVST+, Rapid PVST+, or MSTP).
· VLAN Trunking Protocol (VTP) propagation of the MST configuration is not supported. However, you can manually configure the MST configuration (region name, revision number, and VLAN-to-instance mapping) on each switch within the MST region by using the command-line interface (CLI) or through the Simple Network Management Protocol (SNMP) support.
· Partitioning the network into a large number of regions is not recommended. However, if this situation is unavoidable, we recommend that you partition the switched LAN into smaller LANs interconnected by routers or non-Layer 2 devices.
· A region can have one member or multiple members with the same MST configuration; each member must be capable of processing rapid spanning tree protocol (RSTP) Bridge Protocol Data Units (BPDUs). There is no limit to the number of MST regions in a network, but each region can only support up to 65 spanning-tree instances. You can assign a VLAN to only one spanning-tree instance at a time.
· After configuring a switch as the root switch, we recommend that you avoid manually configuring the hello time, forward-delay time, and maximum-age time through the spanning-tree mst hello-time, spanning-tree mst forward-time, and the spanning-tree mst max-age global configuration commands.

Table 53: PVST+, MSTP, and Rapid PVST+ Interoperability and Compatibility

PVST+ MSTP Rapid PVST+

PVST+

MSTP

Rapid PVST+

Yes

Yes (with restrictions) Yes (reverts to PVST+)

Yes (with restrictions) Yes

Yes (reverts to PVST+)

Yes (reverts to PVST+) Yes (reverts to PVST+) Yes

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 520

Layer 2/3

Information About MSTP

Configuring the Root Switch (CLI), on page 538 Root Switch, on page 522
Information About MSTP
MSTP Configuration
MSTP, which uses RSTP for rapid convergence, enables multiple VLANs to be grouped into and mapped to the same spanning-tree instance, reducing the number of spanning-tree instances needed to support a large number of VLANs. The MSTP provides for multiple forwarding paths for data traffic, enables load balancing, and reduces the number of spanning-tree instances required to support a large number of VLANs. It improves the fault tolerance of the network because a failure in one instance (forwarding path) does not affect other instances (forwarding paths).

Note The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.
The most common initial deployment of MSTP is in the backbone and distribution layers of a Layer 2 switched network. This deployment provides the highly available network required in a service-provider environment.
When the switch is in the MST mode, the RSTP, which is based on IEEE 802.1w, is automatically enabled. The RSTP provides rapid convergence of the spanning tree through explicit handshaking that eliminates the IEEE 802.1D forwarding delay and quickly transitions root ports and designated ports to the forwarding state.
Both MSTP and RSTP improve the spanning-tree operation and maintain backward compatibility with equipment that is based on the (original) IEEE 802.1D spanning tree, with existing Cisco-proprietary Multiple Instance STP (MISTP), and with existing Cisco PVST+ and rapid per-VLAN spanning-tree plus (Rapid PVST+).
A switch stack appears as a single spanning-tree node to the rest of the network, and all stack members use the same switch ID.

MSTP Configuration Guidelines
· When you enable MST by using the spanning-tree mode mst global configuration command, RSTP is automatically enabled.
· For configuration guidelines about UplinkFast, BackboneFast, and cross-stack UplinkFast, see the relevant sections in the Related Topics section.
· When the switch is in MST mode, it uses the long path-cost calculation method (32 bits) to compute the path cost values. With the long path-cost calculation method, the following path cost values are supported:

Speed 10 Mb/s 100 Mb/s 1 Gb/s

Path Cost Value 2,000,000 200,000 20,000

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 521

Root Switch

Layer 2/3

Speed 10 Gb/s 100 Gb/s

Path Cost Value 2,000 200

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Prerequisites for MSTP, on page 519 Restrictions for MSTP, on page 520 Spanning-Tree Interoperability and Backward Compatibility, on page 501 Optional Spanning-Tree Configuration Guidelines BackboneFast, on page 560 UplinkFast, on page 555

Root Switch
The switch maintains a spanning-tree instance for the group of VLANs mapped to it. A switch ID, consisting of the switch priority and the switch MAC address, is associated with each instance. For a group of VLANs, the switch with the lowest switch ID becomes the root switch.
When you configure a switch as the root, you modify the switch priority from the default value (32768) to a significantly lower value so that the switch becomes the root switch for the specified spanning-tree instance. When you enter this command, the switch checks the switch priorities of the root switches. Because of the extended system ID support, the switch sets its own priority for the specified instance to 24576 if this value will cause this switches to become the root for the specified spanning-tree instance.
If any root switch for the specified instance has a switch priority lower than 24576, the switch sets its own priority to 4096 less than the lowest switch priority. (4096 is the value of the least-significant bit of a 4-bit switch priority value. For more information, select "Bridge ID, Switch Priority, and Extended System ID" link in Related Topics.
If your network consists of switches that support and do not support the extended system ID, it is unlikely that the switch with the extended system ID support will become the root switch. The extended system ID increases the switch priority value every time the VLAN number is greater than the priority of the connected switches running older software.
The root switch for each spanning-tree instance should be a backbone or distribution switch. Do not configure an access switch as the spanning-tree primary root.
Use the diameter keyword, which is available only for MST instance 0, to specify the Layer 2 network diameter (that is, the maximum number of switch hops between any two end stations in the Layer 2 network). When you specify the network diameter, the switch automatically sets an optimal hello time, forward-delay time, and maximum-age time for a network of that diameter, which can significantly reduce the convergence time. You can use the hello keyword to override the automatically calculated hello time.
Related Topics Configuring the Root Switch (CLI), on page 538 Restrictions for MSTP, on page 520 Bridge ID, Device Priority, and Extended System ID, on page 494

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 522

Layer 2/3

Multiple Spanning-Tree Regions

Multiple Spanning-Tree Regions
For switches to participate in multiple spanning-tree (MST) instances, you must consistently configure the switches with the same MST configuration information. A collection of interconnected switches that have the same MST configuration comprises an MST region.
The MST configuration controls to which MST region each switch belongs. The configuration includes the name of the region, the revision number, and the MST VLAN-to-instance assignment map. You configure the switch for a region by specifying the MST region configuration on it. You can map VLANs to an MST instance, specify the region name, and set the revision number. For instructions and an example, select the "Specifying the MST Region Configuration and Enabling MSTP" link in Related Topics.
A region can have one or multiple members with the same MST configuration. Each member must be capable of processing RSTP bridge protocol data units (BPDUs). There is no limit to the number of MST regions in a network, but each region can support up to 65 spanning-tree instances. Instances can be identified by any number in the range from 0 to 4094. You can assign a VLAN to only one spanning-tree instance at a time.
Related Topics Illustration of MST Regions, on page 525 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Prerequisites for MSTP, on page 519 Restrictions for MSTP, on page 520 Spanning-Tree Interoperability and Backward Compatibility, on page 501 Optional Spanning-Tree Configuration Guidelines BackboneFast, on page 560 UplinkFast, on page 555
IST, CIST, and CST
Unlike PVST+ and Rapid PVST+ in which all the spanning-tree instances are independent, the MSTP establishes and maintains two types of spanning trees:
· An internal spanning tree (IST), which is the spanning tree that runs in an MST region.
Within each MST region, the MSTP maintains multiple spanning-tree instances. Instance 0 is a special instance for a region, known as the internal spanning tree (IST). All other MST instances are numbered from 1 to 4094.
The IST is the only spanning-tree instance that sends and receives BPDUs. All of the other spanning-tree instance information is contained in M-records, which are encapsulated within MSTP BPDUs. Because the MSTP BPDU carries information for all instances, the number of BPDUs that need to be processed to support multiple spanning-tree instances is significantly reduced.
All MST instances within the same region share the same protocol timers, but each MST instance has its own topology parameters, such as root switch ID, root path cost, and so forth. By default, all VLANs are assigned to the IST.
An MST instance is local to the region; for example, MST instance 1 in region A is independent of MST instance 1 in region B, even if regions A and B are interconnected.
· A common and internal spanning tree (CIST), which is a collection of the ISTs in each MST region, and the common spanning tree (CST) that interconnects the MST regions and single spanning trees.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 523

Operations Within an MST Region

Layer 2/3

The spanning tree computed in a region appears as a subtree in the CST that encompasses the entire switched domain. The CIST is formed by the spanning-tree algorithm running among switches that support the IEEE 802.1w, IEEE 802.1s, and IEEE 802.1D standards. The CIST inside an MST region is the same as the CST outside a region.
Operations Within an MST Region
The IST connects all the MSTP switches in a region. When the IST converges, the root of the IST becomes the CIST regional root (called the IST master before the implementation of the IEEE 802.1s standard). It is the switch within the region with the lowest switch ID and path cost to the CIST root. The CIST regional root is also the CIST root if there is only one region in the network. If the CIST root is outside the region, one of the MSTP switches at the boundary of the region is selected as the CIST regional root.
When an MSTP switch initializes, it sends BPDUs claiming itself as the root of the CIST and the CIST regional root, with both of the path costs to the CIST root and to the CIST regional root set to zero. The switch also initializes all of its MST instances and claims to be the root for all of them. If the switch receives superior MST root information (lower switch ID, lower path cost, and so forth) than currently stored for the port, it relinquishes its claim as the CIST regional root.
During initialization, a region might have many subregions, each with its own CIST regional root. As switches receive superior IST information, they leave their old subregions and join the new subregion that contains the true CIST regional root. All subregions shrink except for the one that contains the true CIST regional root.
For correct operation, all switches in the MST region must agree on the same CIST regional root. Therefore, any two switches in the region only synchronize their port roles for an MST instance if they converge to a common CIST regional root.
Related Topics Illustration of MST Regions, on page 525
Operations Between MST Regions
If there are multiple regions or legacy IEEE 802.1D switches within the network, MSTP establishes and maintains the CST, which includes all MST regions and all legacy STP switches in the network. The MST instances combine with the IST at the boundary of the region to become the CST.
The IST connects all the MSTP switches in the region and appears as a subtree in the CIST that encompasses the entire switched domain. The root of the subtree is the CIST regional root. The MST region appears as a virtual switch to adjacent STP switches and MST regions.
Only the CST instance sends and receives BPDUs, and MST instances add their spanning-tree information into the BPDUs to interact with neighboring switches and compute the final spanning-tree topology. Because of this, the spanning-tree parameters related to BPDU transmission (for example, hello time, forward time, max-age, and max-hops) are configured only on the CST instance but affect all MST instances. Parameters related to the spanning-tree topology (for example, switch priority, port VLAN cost, and port VLAN priority) can be configured on both the CST instance and the MST instance.
MSTP switches use Version 3 RSTP BPDUs or IEEE 802.1D STP BPDUs to communicate with legacy IEEE 802.1D switches. MSTP switches use MSTP BPDUs to communicate with MSTP switches.
Related Topics Illustration of MST Regions, on page 525

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 524

Layer 2/3

IEEE 802.1s Terminology

IEEE 802.1s Terminology
Some MST naming conventions used in Cisco's prestandard implementation have been changed to identify some internal or regional parameters. These parameters are significant only within an MST region, as opposed to external parameters that are relevant to the whole network. Because the CIST is the only spanning-tree instance that spans the whole network, only the CIST parameters require the external rather than the internal or regional qualifiers.
· The CIST root is the root switch for the unique instance that spans the whole network, the CIST.
· The CIST external root path cost is the cost to the CIST root. This cost is left unchanged within an MST region. Remember that an MST region looks like a single switch for the CIST. The CIST external root path cost is the root path cost calculated between these virtual switches and switches that do not belong to any region.
· The CIST regional root was called the IST master in the prestandard implementation. If the CIST root is in the region, the CIST regional root is the CIST root. Otherwise, the CIST regional root is the closest switch to the CIST root in the region. The CIST regional root acts as a root switch for the IST.
· The CIST internal root path cost is the cost to the CIST regional root in a region. This cost is only relevant to the IST, instance 0.

Table 54: Prestandard and Standard Terminology

IEEE Standard CIST regional root CIST internal root path cost CIST external root path cost MSTI regional root MSTI internal root path cost

Cisco Prestandard IST master IST master path cost Root path cost Instance root Root path cost

Cisco Standard CIST regional root CIST internal path cost Root path cost Instance root Root path cost

Illustration of MST Regions
This figure displays three MST regions and a legacy IEEE 802.1D switch (D). The CIST regional root for region 1 (A) is also the CIST root. The CIST regional root for region 2 (B) and the CIST regional root for region 3 (C) are the roots for their respective subtrees within the CIST. The RSTP runs in all regions.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 525

Hop Count Figure 25: MST Regions, CIST Masters, and CST Root

Layer 2/3

Related Topics Multiple Spanning-Tree Regions, on page 523 Operations Within an MST Region, on page 524 Operations Between MST Regions, on page 524

Hop Count

The IST and MST instances do not use the message-age and maximum-age information in the configuration BPDU to compute the spanning-tree topology. Instead, they use the path cost to the root and a hop-count mechanism similar to the IP time-to-live (TTL) mechanism.
By using the spanning-tree mst max-hops global configuration command, you can configure the maximum hops inside the region and apply it to the IST and all MST instances in that region. The hop count achieves the same result as the message-age information (triggers a reconfiguration). The root switch of the instance always sends a BPDU (or M-record) with a cost of 0 and the hop count set to the maximum value. When a switch receives this BPDU, it decrements the received remaining hop count by one and propagates this value as the remaining hop count in the BPDUs it generates. When the count reaches zero, the switch discards the BPDU and ages the information held for the port.
The message-age and maximum-age information in the RSTP portion of the BPDU remain the same throughout the region, and the same values are propagated by the region designated ports at the boundary.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 526

Layer 2/3

Boundary Ports

Boundary Ports
In the Cisco prestandard implementation, a boundary port connects an MST region to a single spanning-tree region running RSTP, to a single spanning-tree region running PVST+ or rapid PVST+, or to another MST region with a different MST configuration. A boundary port also connects to a LAN, the designated switch of which is either a single spanning-tree switch or a switch with a different MST configuration. There is no definition of a boundary port in the IEEE 802.1s standard. The IEEE 802.1Q-2002 standard identifies two kinds of messages that a port can receive:
· internal (coming from the same region)
· external (coming from another region)
When a message is internal, the CIST part is received by the CIST, and each MST instance receives its respective M-record. When a message is external, it is received only by the CIST. If the CIST role is root or alternate, or if the external BPDU is a topology change, it could have an impact on the MST instances. An MST region includes both switches and LANs. A segment belongs to the region of its designated port. Therefore, a port in a different region than the designated port for a segment is a boundary port. This definition allows two ports internal to a region to share a segment with a port belonging to a different region, creating the possibility of a port receiving both internal and external messages. The primary change from the Cisco prestandard implementation is that a designated port is not defined as boundary, unless it is running in an STP-compatible mode.
Note If there is a legacy STP switch on the segment, messages are always considered external.
The other change from the Cisco prestandard implementation is that the CIST regional root switch ID field is now inserted where an RSTP or legacy IEEE 802.1Q switch has the sender switch ID. The whole region performs like a single virtual switch by sending a consistent sender switch ID to neighboring switches. In this example, switch C would receive a BPDU with the same consistent sender switch ID of root, whether or not A or B is designated for the segment.
IEEE 802.1s Implementation
The Cisco implementation of the IEEE MST standard includes features required to meet the standard, as well as some of the desirable prestandard functionality that is not yet incorporated into the published standard.
Port Role Naming Change
The boundary role is no longer in the final MST standard, but this boundary concept is maintained in Cisco's implementation. However, an MST instance port at a boundary of the region might not follow the state of the corresponding CIST port. Two boundary roles currently exist:
· The boundary port is the root port of the CIST regional root--When the CIST instance port is proposed and is in sync, it can send back an agreement and move to the forwarding state only after all the corresponding MSTI ports are in sync (and thus forwarding). The MSTI ports now have a special master role.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 527

Interoperation Between Legacy and Standard Switches

Layer 2/3

· The boundary port is not the root port of the CIST regional root--The MSTI ports follow the state and role of the CIST port. The standard provides less information, and it might be difficult to understand why an MSTI port can be alternately blocking when it receives no BPDUs (MRecords). In this case, although the boundary role no longer exists, the show commands identify a port as boundary in the type column of the output.
Interoperation Between Legacy and Standard Switches
Because automatic detection of prestandard switches can fail, you can use an interface configuration command to identify prestandard ports. A region cannot be formed between a standard and a prestandard switch, but they can interoperate by using the CIST. Only the capability of load-balancing over different instances is lost in that particular case. The CLI displays different flags depending on the port configuration when a port receives prestandard BPDUs. A syslog message also appears the first time a switch receives a prestandard BPDU on a port that has not been configured for prestandard BPDU transmission.
Figure 26: Standard and Prestandard Switch Interoperation
Assume that A is a standard switch and B a prestandard switch, both configured to be in the same region. A is the root switch for the CIST, and B has a root port (BX) on segment X and an alternate port (BY) on segment Y. If segment Y flaps, and the port on BY becomes the alternate before sending out a single prestandard BPDU, AY cannot detect that a prestandard switch is connected to Y and continues to send standard BPDUs. The port BY is fixed in a boundary, and no load balancing is possible between A and B. The same problem exists on segment X, but B might transmit topology

changes.
Note We recommend that you minimize the interaction between standard and prestandard MST implementations.
Detecting Unidirectional Link Failure
This feature is not yet present in the IEEE MST standard, but it is included in this Cisco IOS release. The software checks the consistency of the port role and state in the received BPDUs to detect unidirectional link failures that could cause bridging loops. When a designated port detects a conflict, it keeps its role, but reverts to the discarding state because disrupting connectivity in case of inconsistency is preferable to opening a bridging loop.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 528

Layer 2/3

MSTP and Switch Stacks
Figure 27: Detecting Unidirectional Link Failure
This figure illustrates a unidirectional link failure that typically creates a bridging loop. Switch A is the root switch, and its BPDUs are lost on the link leading to switch B. RSTP and MST BPDUs include the role and state of the sending port. With this information, switch A can detect that switch B does not react to the superior BPDUs it sends and that switch B is the designated, not root switch. As a result, switch A blocks (or keeps

blocking) its port, which prevents the bridging loop.
MSTP and Switch Stacks
A switch stack appears as a single spanning-tree node to the rest of the network, and all stack members use the same bridge ID for a given spanning tree. The bridge ID is derived from the MAC address of the active switch. If a switch that does not support MSTP is added to a switch stack that does support MSTP or the reverse, the switch is put into a version mismatch state. If possible, the switch is automatically upgraded or downgraded to the same version of software that is running on the switch stack.
Interoperability with IEEE 802.1D STP
A switch running MSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy IEEE 802.1D switches. If this switch receives a legacy IEEE 802.1D configuration BPDU (a BPDU with the protocol version set to 0), it sends only IEEE 802.1D BPDUs on that port. An MSTP switch also can detect that a port is at the boundary of a region when it receives a legacy BPDU, an MSTP BPDU (Version 3) associated with a different region, or an RSTP BPDU (Version 2). However, the switch does not automatically revert to the MSTP mode if it no longer receives IEEE 802.1D BPDUs because it cannot detect whether the legacy switch has been removed from the link unless the legacy switch is the designated switch. A switch might also continue to assign a boundary role to a port when the switch to which this switch is connected has joined the region. To restart the protocol migration process (force the renegotiation with neighboring switches), use the clear spanning-tree detected-protocols privileged EXEC command. If all the legacy switches on the link are RSTP switches, they can process MSTP BPDUs as if they are RSTP BPDUs. Therefore, MSTP switches send either a Version 0 configuration and TCN BPDUs or Version 3 MSTP BPDUs on a boundary port. A boundary port connects to a LAN, the designated switch of which is either a single spanning-tree switch or a switch with a different MST configuration.
RSTP Overview
The RSTP takes advantage of point-to-point wiring and provides rapid convergence of the spanning tree. Reconfiguration of the spanning tree can occur in less than 1 second (in contrast to 50 seconds with the default settings in the IEEE 802.1D spanning tree).
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 529

Port Roles and the Active Topology

Layer 2/3

Port Roles and the Active Topology
The RSTP provides rapid convergence of the spanning tree by assigning port roles and by learning the active topology. The RSTP builds upon the IEEE 802.1D STP to select the switch with the highest switch priority (lowest numerical priority value) as the root switch. The RSTP then assigns one of these port roles to individual ports:
· Root port--Provides the best path (lowest cost) when the switch forwards packets to the root switch.
· Designated port--Connects to the designated switch, which incurs the lowest path cost when forwarding packets from that LAN to the root switch. The port through which the designated switch is attached to the LAN is called the designated port.
· Alternate port--Offers an alternate path toward the root switch to that provided by the current root port.
· Backup port--Acts as a backup for the path provided by a designated port toward the leaves of the spanning tree. A backup port can exist only when two ports are connected in a loopback by a point-to-point link or when a switch has two or more connections to a shared LAN segment.
· Disabled port--Has no role within the operation of the spanning tree.

A port with the root or a designated port role is included in the active topology. A port with the alternate or backup port role is excluded from the active topology.
In a stable topology with consistent port roles throughout the network, the RSTP ensures that every root port and designated port immediately transition to the forwarding state while all alternate and backup ports are always in the discarding state (equivalent to blocking in IEEE 802.1D). The port state controls the operation of the forwarding and learning processes.
Table 55: Port State Comparison

Operational Status
Enabled Enabled Enabled Enabled Disabled

STP Port State (IEEE 802.1D) Blocking Listening Learning Forwarding Disabled

RSTP Port State
Discarding Discarding Learning Forwarding Discarding

Is Port Included in the Active Topology? No No Yes Yes No

To be consistent with Cisco STP implementations, this guide defines the port state as blocking instead of discarding. Designated ports start in the listening state.

Rapid Convergence
The RSTP provides for rapid recovery of connectivity following the failure of a switch, a switch port, or a LAN. It provides rapid convergence for edge ports, new root ports, and ports connected through point-to-point links as follows:
· Edge ports--If you configure a port as an edge port on an RSTP switch by using the spanning-tree portfast interface configuration command, the edge port immediately transitions to the forwarding state.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 530

Layer 2/3

Rapid Convergence
An edge port is the same as a Port Fast-enabled port, and you should enable it only on ports that connect to a single end station.
· Root ports--If the RSTP selects a new root port, it blocks the old root port and immediately transitions the new root port to the forwarding state.
· Point-to-point links--If you connect a port to another port through a point-to-point link and the local port becomes a designated port, it negotiates a rapid transition with the other port by using the proposal-agreement handshake to ensure a loop-free topology.
Figure 28: Proposal and Agreement Handshaking for Rapid Convergence
Switch A is connected to Switch B through a point-to-point link, and all of the ports are in the blocking state. Assume that the priority of Switch A is a smaller numerical value than the priority of Switch B. Switch A sends a proposal message (a configuration BPDU with the proposal flag set) to Switch B, proposing itself as the designated switch.
After receiving the proposal message, Switch B selects as its new root port the port from which the proposal message was received, forces all nonedge ports to the blocking state, and sends an agreement message (a BPDU with the agreement flag set) through its new root port.
After receiving Switch B's agreement message, Switch A also immediately transitions its designated port to the forwarding state. No loops in the network are formed because Switch B blocked all of its nonedge ports and because there is a point-to-point link between Switches A and B.
When Switch C is connected to Switch B, a similar set of handshaking messages are exchanged. Switch C selects the port connected to Switch B as its root port, and both ends immediately transition to the forwarding state. With each iteration of this handshaking process, one more switch joins the active topology. As the network converges, this proposal-agreement handshaking progresses from the root toward the leaves of the spanning tree.
In a switch stack, the cross-stack rapid transition (CSRT) feature ensures that a stack member receives acknowledgments from all stack members during the proposal-agreement handshaking before moving the port to the forwarding state. CSRT is automatically enabled when the switch is in MST mode.
The switch learns the link type from the port duplex mode: a full-duplex port is considered to have a point-to-point connection; a half-duplex port is considered to have a shared connection. You can override the default setting that is controlled by the duplex setting by using the spanning-tree link-type interface configuration command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 531

Synchronization of Port Roles

Layer 2/3

Synchronization of Port Roles
When the switch receives a proposal message on one of its ports and that port is selected as the new root port, the RSTP forces all other ports to synchronize with the new root information. The switch is synchronized with superior root information received on the root port if all other ports are synchronized. An individual port on the switch is synchronized if
· That port is in the blocking state. · It is an edge port (a port configured to be at the edge of the network). If a designated port is in the forwarding state and is not configured as an edge port, it transitions to the blocking state when the RSTP forces it to synchronize with new root information. In general, when the RSTP forces a port to synchronize with root information and the port does not satisfy any of the above conditions, its port state is set to blocking.
Figure 29: Sequence of Events During Rapid Convergence
After ensuring that all of the ports are synchronized, the switch sends an agreement message to the designated switch corresponding to its root port. When the switches connected by a point-to-point link are in agreement about their port roles, the RSTP immediately transitions the port states to forwarding.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 532

Layer 2/3

Bridge Protocol Data Unit Format and Processing

Bridge Protocol Data Unit Format and Processing

The RSTP BPDU format is the same as the IEEE 802.1D BPDU format except that the protocol version is set to 2. A new 1-byte Version 1 Length field is set to zero, which means that no version 1 protocol information is present.
Table 56: RSTP BPDU Flags

Bit

Function

0

Topology change (TC)

1

Proposal

2­3:

Port role:

00

Unknown

01

Alternate port

10

Root port

11

Designated port

4

Learning

5

Forwarding

6

Agreement

7

Topology change acknowledgement (TCA)

The sending switch sets the proposal flag in the RSTP BPDU to propose itself as the designated switch on that LAN. The port role in the proposal message is always set to the designated port.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 533

Processing Superior BPDU Information

Layer 2/3

The sending switch sets the agreement flag in the RSTP BPDU to accept the previous proposal. The port role in the agreement message is always set to the root port.
The RSTP does not have a separate topology change notification (TCN) BPDU. It uses the topology change (TC) flag to show the topology changes. However, for interoperability with IEEE 802.1D switches, the RSTP switch processes and generates TCN BPDUs.
The learning and forwarding flags are set according to the state of the sending port.
Processing Superior BPDU Information
If a port receives superior root information (lower switch ID, lower path cost, and so forth) than currently stored for the port, the RSTP triggers a reconfiguration. If the port is proposed and is selected as the new root port, RSTP forces all the other ports to synchronize.
If the BPDU received is an RSTP BPDU with the proposal flag set, the switch sends an agreement message after all of the other ports are synchronized. If the BPDU is an IEEE 802.1D BPDU, the switch does not set the proposal flag and starts the forward-delay timer for the port. The new root port requires twice the forward-delay time to transition to the forwarding state.
If the superior information received on the port causes the port to become a backup or alternate port, RSTP sets the port to the blocking state but does not send the agreement message. The designated port continues sending BPDUs with the proposal flag set until the forward-delay timer expires, at which time the port transitions to the forwarding state.
Processing Inferior BPDU Information
If a designated port receives an inferior BPDU (such as a higher switch ID or a higher path cost than currently stored for the port) with a designated port role, it immediately replies with its own information.
Topology Changes
This section describes the differences between the RSTP and the IEEE 802.1D in handling spanning-tree topology changes.
· Detection--Unlike IEEE 802.1D in which any transition between the blocking and the forwarding state causes a topology change, only transitions from the blocking to the forwarding state cause a topology change with RSTP (only an increase in connectivity is considered a topology change). State changes on an edge port do not cause a topology change. When an RSTP switch detects a topology change, it deletes the learned information on all of its nonedge ports except on those from which it received the TC notification.
· Notification--Unlike IEEE 802.1D, which uses TCN BPDUs, the RSTP does not use them. However, for IEEE 802.1D interoperability, an RSTP switch processes and generates TCN BPDUs.
· Acknowledgement--When an RSTP switch receives a TCN message on a designated port from an IEEE 802.1D switch, it replies with an IEEE 802.1D configuration BPDU with the TCA bit set. However, if the TC-while timer (the same as the topology-change timer in IEEE 802.1D) is active on a root port connected to an IEEE 802.1D switch and a configuration BPDU with the TCA bit set is received, the TC-while timer is reset.
This behavior is only required to support IEEE 802.1D switches. The RSTP BPDUs never have the TCA bit set.
· Propagation--When an RSTP switch receives a TC message from another switch through a designated or root port, it propagates the change to all of its nonedge, designated ports and to the root port (excluding

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 534

Layer 2/3

Protocol Migration Process

the port on which it is received). The switch starts the TC-while timer for all such ports and flushes the information learned on them.
· Protocol migration--For backward compatibility with IEEE 802.1D switches, RSTP selectively sends IEEE 802.1D configuration BPDUs and TCN BPDUs on a per-port basis.
When a port is initialized, the migrate-delay timer is started (specifies the minimum time during which RSTP BPDUs are sent), and RSTP BPDUs are sent. While this timer is active, the switch processes all BPDUs received on that port and ignores the protocol type.
If the switch receives an IEEE 802.1D BPDU after the port migration-delay timer has expired, it assumes that it is connected to an IEEE 802.1D switch and starts using only IEEE 802.1D BPDUs. However, if the RSTP switch is using IEEE 802.1D BPDUs on a port and receives an RSTP BPDU after the timer has expired, it restarts the timer and starts using RSTP BPDUs on that port.

Protocol Migration Process
A switch running MSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy IEEE 802.1D switches. If this switch receives a legacy IEEE 802.1D configuration BPDU (a BPDU with the protocol version set to 0), it sends only IEEE 802.1D BPDUs on that port. An MSTP switch also can detect that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (Version 3) associated with a different region, or an RST BPDU (Version 2).
However, the switch does not automatically revert to the MSTP mode if it no longer receives IEEE 802.1D BPDUs because it cannot detect whether the legacy switch has been removed from the link unless the legacy switch is the designated switch. A switch also might continue to assign a boundary role to a port when the switch to which it is connected has joined the region.
Related Topics Restarting the Protocol Migration Process (CLI), on page 550

Default MSTP Configuration

Table 57: Default MSTP Configuration

Feature

Default Setting

Spanning-tree mode

MSTP

Switch priority (configurable on a per-CIST port basis)

32768

Spanning-tree port priority (configurable on a

128

per-CIST port basis)

Spanning-tree port cost (configurable on a per-CIST 1000 Mb/s: 20000

port basis)

100 Mb/s: 20000

10 Mb/s: 20000

Hello time

3 seconds

Forward-delay time

20 seconds

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 535

How to Configure MSTP Features

Layer 2/3

Feature Maximum-aging time Maximum hop count

Default Setting 20 seconds 20 hops

Related Topics Supported Spanning-Tree Instances, on page 501 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

How to Configure MSTP Features

Specifying the MST Region Configuration and Enabling MSTP (CLI)
This procedure is required.

SUMMARY STEPS

1. configure terminal 2. spanning-tree mst configuration 3. instance instance-id vlan vlan-range 4. name name 5. revision version 6. show pending 7. exit 8. spanning-tree mode mst 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

spanning-tree mst configuration Example:

Enters MST configuration mode.

Switch(config)# spanning-tree mst configuration

instance instance-id vlan vlan-range Example:

Maps VLANs to an MST instance. · For instance-id, the range is 0 to 4094.

Switch(config-mst)# instance 1 vlan 10-20

· For vlan vlan-range, the range is 1 to 4094.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 536

Layer 2/3

Specifying the MST Region Configuration and Enabling MSTP (CLI)

Command or Action

Step 4 Step 5 Step 6 Step 7 Step 8

name name Example:
Switch(config-mst)# name region1
revision version Example:
Switch(config-mst)# revision 1
show pending Example:
Switch(config-mst)# show pending
exit Example:
Switch(config-mst)# exit
spanning-tree mode mst Example:
Switch(config)# spanning-tree mode mst

Step 9

end Example:
Switch(config)# end

Purpose When you map VLANs to an MST instance, the mapping is incremental, and the VLANs specified in the command are added to or removed from the VLANs that were previously mapped.
To specify a VLAN range, use a hyphen; for example, instance 1 vlan 1-63 maps VLANs 1 through 63 to MST instance 1. To specify a VLAN series, use a comma; for example, instance 1 vlan 10, 20, 30 maps VLANs 10, 20, and 30 to MST instance 1. Specifies the configuration name. The name string has a maximum length of 32 characters and is case sensitive.
Specifies the configuration revision number. The range is 0 to 65535.
Verifies your configuration by displaying the pending configuration.
Applies all changes, and returns to global configuration mode.
Enables MSTP. RSTP is also enabled. Changing spanning-tree modes can disrupt traffic because all spanning-tree instances are stopped for the previous mode and restarted in the new mode. You cannot run both MSTP and PVST+ or both MSTP and Rapid PVST+ at the same time. Returns to privileged EXEC mode.

Related Topics MSTP Configuration Guidelines, on page 521

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 537

Configuring the Root Switch (CLI)

Layer 2/3

Multiple Spanning-Tree Regions, on page 523 Prerequisites for MSTP, on page 519 Restrictions for MSTP, on page 520 Spanning-Tree Interoperability and Backward Compatibility, on page 501 Optional Spanning-Tree Configuration Guidelines BackboneFast, on page 560 UplinkFast, on page 555 Default MSTP Configuration, on page 535 Configuring the Root Switch (CLI), on page 538 Bridge ID, Device Priority, and Extended System ID, on page 494 Configuring a Secondary Root Switch (CLI), on page 539 Configuring Port Priority (CLI), on page 540 Configuring Path Cost (CLI), on page 542 Configuring the Switch Priority (CLI), on page 543 Configuring the Hello Time (CLI), on page 544 Configuring the Forwarding-Delay Time (CLI), on page 545 Configuring the Maximum-Aging Time (CLI), on page 546 Configuring the Maximum-Hop Count (CLI), on page 547 Specifying the Link Type to Ensure Rapid Transitions (CLI), on page 548 Designating the Neighbor Type (CLI), on page 549 Restarting the Protocol Migration Process (CLI), on page 550

Configuring the Root Switch (CLI)
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the root switch.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.
You must also know the specified MST instance ID. Step 2 in the example uses 0 as the instance ID because that was the instance ID set up by the instructions listed under Related Topics.

SUMMARY STEPS

1. configure terminal 2. spanning-tree mst instance-id root primary 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 538

Layer 2/3

Configuring a Secondary Root Switch (CLI)

Command or Action
Switch# configure terminal

Purpose

Step 2 Step 3

spanning-tree mst instance-id root primary

Configures a switch as the root switch.

Example:

For instance-id, you can specify a single instance, a range

of instances separated by a hyphen, or a series of instances

Switch(config)# spanning-tree mst 0 root primary separated by a comma. The range is 0 to 4094.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Related Topics Root Switch, on page 522 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Restrictions for MSTP, on page 520 Bridge ID, Device Priority, and Extended System ID, on page 494 Configuring a Secondary Root Switch (CLI), on page 539

Configuring a Secondary Root Switch (CLI)
When you configure a switch with the extended system ID support as the secondary root, the switch priority is modified from the default value (32768) to 28672. The switch is then likely to become the root switch for the specified instance if the primary root switch fails. This is assuming that the other network switches use the default switch priority of 32768 and therefore are unlikely to become the root switch.
You can execute this command on more than one switch to configure multiple backup root switches. Use the same network diameter and hello-time values that you used when you configured the primary root switch with the spanning-tree mst instance-id root primary global configuration command.
This procedure is optional.
Beginning in privileged EXEC mode, follow these steps to configure a secondary root switch.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.
You must also know the specified MST instance ID. This example uses 0 as the instance ID because that was the instance ID set up by the instructions listed under Related Topics.

SUMMARY STEPS

1. configure terminal 2. spanning-tree mst instance-id root secondary 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 539

Configuring Port Priority (CLI)

Layer 2/3

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

spanning-tree mst instance-id root secondary

Configures a switch as the secondary root switch.

Example:

For instance-id, you can specify a single instance, a range

of instances separated by a hyphen, or a series of instances

Switch(config)# spanning-tree mst 0 root secondary separated by a comma. The range is 0 to 4094.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Configuring the Root Switch (CLI), on page 538
Configuring Port Priority (CLI)
If a loop occurs, the MSTP uses the port priority when selecting an interface to put into the forwarding state. You can assign higher priority values (lower numerical values) to interfaces that you want selected first and lower priority values (higher numerical values) that you want selected last. If all interfaces have the same priority value, the MSTP puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces.

Note If the switch is a member of a switch stack, you must use the spanning-tree mst [instance-id] cost cost interface configuration command instead of the spanning-tree mst [instance-id] port-priority priority interface configuration command to select a port to put in the forwarding state. Assign lower cost values to ports that you want selected first and higher cost values to ports that you want selected last. For more information, see the path costs topic listed under Related Topics.
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure a different port priority for the switch.
Before you begin A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 540

Layer 2/3

Configuring Port Priority (CLI)

You must also know the specified MST instance ID and the interface used. This example uses 0 as the instance ID and GigabitEthernet1/0/1 as the interface because that was the instance ID and interface set up by the instructions listed under Related Topics.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. spanning-tree mst instance-id port-priority priority 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3
Step 4

interface interface-id Example:

Specifies an interface to configure, and enters interface configuration mode.

Switch(config)# interface GigabitEthernet1/0/1
spanning-tree mst instance-id port-priority priority Example:
Switch(config-if)# spanning-tree mst 0 port-priority 64

Configures port priority.
· For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series of instances separated by a comma. The range is 0 to 4094.
· For priority, the range is 0 to 240 in increments of 16. The default is 128. The lower the number, the higher the priority.
The priority values are 0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, and 240. All other values are rejected.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

The show spanning-tree mst interface interface-id privileged EXEC command displays information only if the port is in a link-up operative state. Otherwise, you can use the show running-config interface privileged EXEC command to confirm the configuration.
Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 541

Configuring Path Cost (CLI)

Layer 2/3

Configuring Path Cost (CLI), on page 542

Configuring Path Cost (CLI)
The MSTP path cost default value is derived from the media speed of an interface. If a loop occurs, the MSTP uses cost when selecting an interface to put in the forwarding state. You can assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last. If all interfaces have the same cost value, the MSTP puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces.
This procedure is optional.
Beginning in privileged EXEC mode, follow these steps to configure a different path cost for the switch.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.
You must also know the specified MST instance ID and the interface used. This example uses 0 as the instance ID and GigabitEthernet1/0/1 as the interface because that was the instance ID and interface set up by the instructions listed under Related Topics.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. spanning-tree mst instance-id cost cost 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/1
spanning-tree mst instance-id cost cost Example:
Switch(config-if)# spanning-tree mst 0 cost 17031970

Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports and port-channel logical interfaces. The port-channel range is 1 to 48.
Configures the cost.
If a loop occurs, the MSTP uses the path cost when selecting an interface to place into the forwarding state. A lower path cost represents higher-speed transmission.
· For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 542

Layer 2/3

Configuring the Switch Priority (CLI)

Command or Action

Step 4

end Example:
Switch(config-if)# end

Purpose of instances separated by a comma. The range is 0 to 4094.
· For cost, the range is 1 to 200000000; the default value is derived from the media speed of the interface.
Returns to privileged EXEC mode.

The show spanning-tree mst interface interface-id privileged EXEC command displays information only for ports that are in a link-up operative state. Otherwise, you can use the show running-config privileged EXEC command to confirm the configuration.
Related Topics Configuring Port Priority (CLI), on page 540 Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Configuring the Switch Priority (CLI)
Changing the priority of a switch makes it more likely to be chosen as the root switch whether it is a standalone switch or a switch in the stack.

Note Exercise care when using this command. For normal network configurations, we recommend that you use the spanning-tree mst instance-id root primary and the spanning-tree mst instance-id root secondary global configuration commands to specify a switch as the root or secondary root switch. You should modify the switch priority only in circumstances where these commands do not work.
This procedure is optional.
Beginning in privileged EXEC mode, follow these steps to configure a different switch priority for the switch.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.
You must also know the specified MST instance ID used. This example uses 0 as the instance ID because that was the instance ID set up by the instructions listed under Related Topics.

SUMMARY STEPS

1. configure terminal 2. spanning-tree mst instance-id priority priority 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 543

Configuring the Hello Time (CLI)

Layer 2/3

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

spanning-tree mst instance-id priority priority

Configures the switch priority.

Example:
Switch(config)# spanning-tree mst 0 priority 40960

· For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series of instances separated by a comma. The range is 0 to 4094.

· For priority, the range is 0 to 61440 in increments of 4096; the default is 32768. The lower the number, the more likely the switch will be chosen as the root switch.

Priority values are 0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344, and 61440. These are the only acceptable values.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Configuring the Hello Time (CLI)
The hello time is the time interval between configuration messages generated and sent by the root switch. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to configure the hello time for all MST instances.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.

SUMMARY STEPS

1. configure terminal 2. spanning-tree mst hello-time seconds 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 544

Layer 2/3

Configuring the Forwarding-Delay Time (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

spanning-tree mst hello-time seconds Example:
Switch(config)# spanning-tree mst hello-time 4
end Example:

Configures the hello time for all MST instances. The hello time is the time interval between configuration messages generated and sent by the root switch. These messages indicate that the switch is alive.
For seconds, the range is 1 to 10; the default is 3.
Returns to privileged EXEC mode.

Switch(config)# end

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Configuring the Forwarding-Delay Time (CLI)
Beginning in privileged EXEC mode, follow these steps to configure the forwarding-delay time for all MST instances. This procedure is optional.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.

SUMMARY STEPS

1. configure terminal 2. spanning-tree mst forward-time seconds 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 545

Configuring the Maximum-Aging Time (CLI)

Layer 2/3

Step 2 Step 3

Command or Action

Purpose

spanning-tree mst forward-time seconds

Configures the forward time for all MST instances. The

Example:

forwarding delay is the number of seconds a port waits before changing from its spanning-tree learning and

listening states to the forwarding state.
Switch(config)# spanning-tree mst forward-time 25

For seconds, the range is 4 to 30; the default is 20.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Configuring the Maximum-Aging Time (CLI)
Beginning in privileged EXEC mode, follow these steps to configure the maximum-aging time for all MST instances. This procedure is optional.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.

SUMMARY STEPS

1. configure terminal 2. spanning-tree mst max-age seconds 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

spanning-tree mst max-age seconds Example:
Switch(config)# spanning-tree mst max-age 40

Configures the maximum-aging time for all MST instances. The maximum-aging time is the number of seconds a switch waits without receiving spanning-tree configuration messages before attempting a reconfiguration.
For seconds, the range is 6 to 40; the default is 20.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 546

Layer 2/3

Configuring the Maximum-Hop Count (CLI)

Step 3

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Configuring the Maximum-Hop Count (CLI)
Beginning in privileged EXEC mode, follow these steps to configure the maximum-hop count for all MST instances. This procedure is optional.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.

SUMMARY STEPS

1. configure terminal 2. spanning-tree mst max-hops hop-count 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

spanning-tree mst max-hops hop-count Example:
Switch(config)# spanning-tree mst max-hops 25
end Example:
Switch(config)# end

Specifies the number of hops in a region before the BPDU is discarded, and the information held for a port is aged. For hop-count, the range is 1 to 255; the default is 20.
Returns to privileged EXEC mode.

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 547

Specifying the Link Type to Ensure Rapid Transitions (CLI)

Layer 2/3

Specifying the Link Type to Ensure Rapid Transitions (CLI)
If you connect a port to another port through a point-to-point link and the local port becomes a designated port, the RSTP negotiates a rapid transition with the other port by using the proposal-agreement handshake to ensure a loop-free topology.
By default, the link type is controlled from the duplex mode of the interface: a full-duplex port is considered to have a point-to-point connection; a half-duplex port is considered to have a shared connection. If you have a half-duplex link physically connected point-to-point to a single port on a remote switch running MSTP, you can override the default setting of the link type and enable rapid transitions to the forwarding state.
Beginning in privileged EXEC mode, follow these steps to override the default link-type setting. This procedure is optional.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.
You must also know the specified MST instance ID and the interface used. This example uses 0 as the instance ID and GigabitEthernet1/0/1 as the interface because that was the instance ID and interface set up by the instructions listed under Related Topics.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. spanning-tree link-type point-to-point 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

interface interface-id Example:
Switch(config)# interface GigabitEthernet1/0/1
spanning-tree link-type point-to-point Example:

Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports, VLANs, and port-channel logical interfaces. The VLAN ID range is 1 to 4094. The port-channel range is 1 to 48.
Specifies that the link type of a port is point-to-point.

Switch(config-if)# spanning-tree link-type point-to-point

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 548

Layer 2/3

Designating the Neighbor Type (CLI)

Step 4

Command or Action end Example:

Purpose Returns to privileged EXEC mode.

Switch(config-if)# end

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Designating the Neighbor Type (CLI)
A topology could contain both prestandard and IEEE 802.1s standard compliant devices. By default, ports can automatically detect prestandard devices, but they can still receive both standard and prestandard BPDUs. When there is a mismatch between a device and its neighbor, only the CIST runs on the interface.
You can choose to set a port to send only prestandard BPDUs. The prestandard flag appears in all the show commands, even if the port is in STP compatibility mode.
Beginning in privileged EXEC mode, follow these steps to override the default link-type setting. This procedure is optional.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. spanning-tree mst pre-standard 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies an interface to configure, and enters interface configuration mode. Valid interfaces include physical ports.

Switch(config)# interface GigabitEthernet1/0/1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 549

Restarting the Protocol Migration Process (CLI)

Layer 2/3

Step 3 Step 4

Command or Action spanning-tree mst pre-standard Example:

Purpose Specifies that the port can send only prestandard BPDUs.

Switch(config-if)# spanning-tree mst pre-standard

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536

Restarting the Protocol Migration Process (CLI)
This procedure restarts the protocol migration process and forces renegotiation with neighboring switches. It reverts the switch to MST mode. It is needed when the switch no longer receives IEEE 802.1D BPDUs after it has been receiving them.
Beginning in privileged EXEC mode, follow these steps to restart the protocol migration process (force the renegotiation with neighboring switches) on the switch.

Before you begin
A multiple spanning tree (MST) must be specified and enabled on the switch. For instructions, see Related Topics.
If you want to use the interface version of the command, you must also know the MST interface used. This example uses GigabitEthernet1/0/1 as the interface because that was the interface set up by the instructions listed under Related Topics.

SUMMARY STEPS

1. Enter one of the following commands:
· clear spanning-tree detected-protocols · clear spanning-tree detected-protocols interface interface-id

DETAILED STEPS

Step 1

Command or Action
Enter one of the following commands:
· clear spanning-tree detected-protocols · clear spanning-tree detected-protocols interface
interface-id Example:
Switch# clear spanning-tree detected-protocols

Purpose
The switch reverts to the MSTP mode, and the protocol migration process restarts.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 550

Layer 2/3

Monitoring MST Configuration and Status

Command or Action or
Switch# clear spanning-tree detected-protocols interface GigabitEthernet1/0/1

Purpose

What to do next
This procedure may need to be repeated if the switch receives more legacy IEEE 802.1D configuration BPDUs (BPDUs with the protocol version set to 0).
Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 Protocol Migration Process, on page 535

Monitoring MST Configuration and Status

Table 58: Commands for Displaying MST Status

show spanning-tree mst configuration show spanning-tree mst configuration digest
show spanning-tree mst

Displays the MST region configuration.
Displays the MD5 digest included in the current MSTCI.
Displays MST information for the all instances. Note This command displays information for
ports in a link-up operative state.

show spanning-tree mst instance-id

Displays MST information for the specified instance.
Note This command displays information only if the port is in a link-up operative state.

show spanning-tree mst interface interface-id Displays MST information for the specified interface.

Additional References for MSTP
Related Documents Related Topic Spanning tree protocol commands

Document Title
LAN Switching Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 551

Feature Information for MSTP

Layer 2/3

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for MSTP
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 552

3 0 C H A P T E R
Configuring Optional Spanning-Tree Features
· Finding Feature Information, on page 553 · Restriction for Optional Spanning-Tree Features, on page 553 · Information About Optional Spanning-Tree Features, on page 554 · How to Configure Optional Spanning-Tree Features, on page 564 · Monitoring the Spanning-Tree Status, on page 574 · Additional References for Optional Spanning Tree Features, on page 575 · Feature Information for Optional Spanning-Tree Features, on page 576
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restriction for Optional Spanning-Tree Features
· PortFast minimizes the time that interfaces must wait for spanning tree to converge, so it is effective only when used on interfaces connected to end stations. If you enable PortFast on an interface connecting to another switch, you risk creating a spanning-tree loop.
· You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches. Related Topics
Enabling PortFast (CLI), on page 564 PortFast, on page 554
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 553

Information About Optional Spanning-Tree Features

Layer 2/3

Information About Optional Spanning-Tree Features

PortFast

PortFast immediately brings an interface configured as an access or trunk port to the forwarding state from a blocking state, bypassing the listening and learning states.
Figure 30: PortFast-Enabled Interfaces
You can use PortFast on interfaces connected to a single workstation or server to allow those devices to immediately connect to the network, rather than waiting for the spanning tree to

converge. Interfaces connected to a single workstation or server should not receive bridge protocol data units (BPDUs). An interface with PortFast enabled goes through the normal cycle of spanning-tree status changes when the switch is restarted. You can enable this feature by enabling it on either the interface or on all nontrunking ports. Related Topics
Enabling PortFast (CLI), on page 564 Restriction for Optional Spanning-Tree Features, on page 553
BPDU Guard
The Bridge Protocol Data Unit (BPDU) guard feature can be globally enabled on the switch or can be enabled per port, but the feature operates with some differences. When you enable BPDU guard at the global level on PortFast-enabled ports, spanning tree shuts down ports that are in a PortFast-operational state if any BPDU is received on them. In a valid configuration, PortFast-enabled ports do not receive BPDUs. Receiving a BPDU on a Port Fast-enabled port means an invalid configuration, such as the connection of an unauthorized device, and the BPDU guard feature puts the port in the error-disabled state. When this happens, the switch shuts down the entire port on which the violation occurred. When you enable BPDU guard at the interface level on any port without also enabling the PortFast feature, and the port receives a BPDU, it is put in the error-disabled state.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 554

Layer 2/3

BPDU Filtering

The BPDU guard feature provides a secure response to invalid configurations because you must manually put the interface back in service. Use the BPDU guard feature in a service-provider network to prevent an access port from participating in the spanning tree.
Related Topics Enabling BPDU Guard (CLI), on page 565
BPDU Filtering
The BPDU filtering feature can be globally enabled on the switch or can be enabled per interface, but the feature operates with some differences.
Enabling BPDU filtering on PortFast-enabled interfaces at the global level keeps those interfaces that are in a PortFast-operational state from sending or receiving BPDUs. The interfaces still send a few BPDUs at link-up before the switch begins to filter outbound BPDUs. You should globally enable BPDU filtering on a switch so that hosts connected to these interfaces do not receive BPDUs. If a BPDU is received on a PortFast-enabled interface, the interface loses its PortFast-operational status, and BPDU filtering is disabled.
Enabling BPDU filtering on an interface without also enabling the PortFast feature keeps the interface from sending or receiving BPDUs.

Caution Enabling BPDU filtering on an interface is the same as disabling spanning tree on it and can result in spanning-tree loops.
You can enable the BPDU filtering feature for the entire switch or for an interface. Related Topics
Enabling BPDU Filtering (CLI), on page 566

UplinkFast

Figure 31: Switches in a Hierarchical Network
Switches in hierarchical networks can be grouped into backbone switches, distribution switches, and access switches. This complex network has distribution switches and access switches that each have at least one

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 555

UplinkFast
redundant link that spanning tree blocks to prevent

Layer 2/3

loops. If a switch loses connectivity, it begins using the alternate paths as soon as the spanning tree selects a new root port. You can accelerate the choice of a new root port when a link or switch fails or when the spanning tree reconfigures itself by enabling UplinkFast. The root port transitions to the forwarding state immediately without going through the listening and learning states, as it would with the normal spanning-tree procedures. When the spanning tree reconfigures the new root port, other interfaces flood the network with multicast packets, one for each address that was learned on the interface. You can limit these bursts of multicast traffic by reducing the max-update-rate parameter (the default for this parameter is 150 packets per second). However, if you enter zero, station-learning frames are not generated, so the spanning-tree topology converges more slowly after a loss of connectivity.
Note UplinkFast is most useful in wiring-closet switches at the access or edge of the network. It is not appropriate for backbone devices. This feature might not be useful for other types of applications. UplinkFast provides fast convergence after a direct link failure and achieves load-balancing between redundant Layer 2 links using uplink groups. An uplink group is a set of Layer 2 interfaces (per VLAN), only one of which is forwarding at any given time. Specifically, an uplink group consists of the root port (which is forwarding) and a set of blocked ports, except for self-looping ports. The uplink group provides an alternate path in case the currently forwarding link fails.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 556

Layer 2/3

Cross-Stack UplinkFast
Figure 32: UplinkFast Example Before Direct Link Failure
This topology has no link failures. Switch A, the root switch, is connected directly to Switch B over link L1 and to Switch C over link L2. The Layer 2 interface on Switch C that is connected directly to Switch B is in

a blocking state.
Figure 33: UplinkFast Example After Direct Link Failure
If Switch C detects a link failure on the currently active link L2 on the root port (a direct link failure), UplinkFast unblocks the blocked interface on Switch C and transitions it to the forwarding state without going through the listening and learning states. This change takes approximately 1 to

5 seconds. Related Topics
Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523 Enabling UplinkFast for Use with Redundant Links (CLI), on page 568 Events That Cause Fast Convergence, on page 559
Cross-Stack UplinkFast
Cross-Stack UplinkFast (CSUF) provides a fast spanning-tree transition (fast convergence in less than 1 second under normal network conditions) across a switch stack. During the fast transition, an alternate redundant link on the switch stack is placed in the forwarding state without causing temporary spanning-tree loops or loss of connectivity to the backbone. With this feature, you can have a redundant and resilient network in some configurations. CSUF is automatically enabled when you enable the UplinkFast feature. CSUF might not provide a fast transition all the time; in these cases, the normal spanning-tree transition occurs, completing in 30 to 40 seconds. For more information, see Related Topics.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 557

How Cross-Stack UplinkFast Works

Layer 2/3

Related Topics Enabling UplinkFast for Use with Redundant Links (CLI), on page 568 Events That Cause Fast Convergence, on page 559
How Cross-Stack UplinkFast Works
Cross-Stack UplinkFast (CSUF) ensures that one link in the stack is elected as the path to the root.
Figure 34: Cross-Stack UplinkFast Topology
The stack-root port on Switch 1 provides the path to the root of the spanning tree. The alternate stack-root ports on Switches 2 and 3 can provide an alternate path to the spanning-tree root if the current stack-root switch fails or if its link to the spanning-tree root fails.
Link 1, the root link, is in the spanning-tree forwarding state. Links 2 and 3 are alternate redundant links that are in the spanning-tree blocking state. If Switch 1 fails, if its stack-root port fails, or if Link 1 fails, CSUF selects either the alternate stack-root port on Switch 2 or Switch 3 and puts it into the forwarding state in less than 1 second.

When certain link loss or spanning-tree events occur (described in the following topic), the Fast Uplink Transition Protocol uses the neighbor list to send fast-transition requests to stack members. The switch sending the fast-transition request needs to do a fast transition to the forwarding state of a port that it has chosen as the root port, and it must obtain an acknowledgment from each stack switch before performing the fast transition.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 558

Layer 2/3

Events That Cause Fast Convergence

Each switch in the stack decides if the sending switch is a better choice than itself to be the stack root of this spanning-tree instance by comparing the root, cost, and bridge ID. If the sending switch is the best choice as the stack root, each switch in the stack returns an acknowledgment; otherwise, it sends a fast-transition request. The sending switch then has not received acknowledgments from all stack switches. When acknowledgments are received from all stack switches, the Fast Uplink Transition Protocol on the sending switch immediately transitions its alternate stack-root port to the forwarding state. If acknowledgments from all stack switches are not obtained by the sending switch, the normal spanning-tree transitions (blocking, listening, learning, and forwarding) take place, and the spanning-tree topology converges at its normal rate (2 * forward-delay time + max-age time). The Fast Uplink Transition Protocol is implemented on a per-VLAN basis and affects only one spanning-tree instance at a time. Related Topics
Enabling UplinkFast for Use with Redundant Links (CLI), on page 568 Events That Cause Fast Convergence, on page 559
Events That Cause Fast Convergence
Depending on the network event or failure, the CSUF fast convergence might or might not occur. Fast convergence (less than 1 second under normal network conditions) occurs under these circumstances:
· The stack-root port link fails. If two switches in the stack have alternate paths to the root, only one of the switches performs the fast transition.
· The failed link, which connects the stack root to the spanning-tree root, recovers.
· A network reconfiguration causes a new stack-root switch to be selected.
· A network reconfiguration causes a new port on the current stack-root switch to be chosen as the stack-root port.
Note The fast transition might not occur if multiple events occur simultaneously. For example, if a stack member is powered off, and at the same time, the link connecting the stack root to the spanning-tree root comes back up, the normal spanning-tree convergence occurs.
Normal spanning-tree convergence (30 to 40 seconds) occurs under these conditions: · The stack-root switch is powered off, or the software failed.
· The stack-root switch, which was powered off or failed, is powered on.
· A new switch, which might become the stack root, is added to the stack.
Related Topics Enabling UplinkFast for Use with Redundant Links (CLI), on page 568 UplinkFast, on page 555 Cross-Stack UplinkFast, on page 557

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 559

BackboneFast

Layer 2/3

How Cross-Stack UplinkFast Works, on page 558
BackboneFast
BackboneFast detects indirect failures in the core of the backbone. BackboneFast is a complementary technology to the UplinkFast feature, which responds to failures on links directly connected to access switches. BackboneFast optimizes the maximum-age timer, which controls the amount of time the switch stores protocol information received on an interface. When a switch receives an inferior BPDU from the designated port of another switch, the BPDU is a signal that the other switch might have lost its path to the root, and BackboneFast tries to find an alternate path to the root.
BackboneFast starts when a root port or blocked interface on a switch receives inferior BPDUs from its designated switch. An inferior BPDU identifies a switch that declares itself as both the root bridge and the designated switch. When a switch receives an inferior BPDU, it means that a link to which the switch is not directly connected (an indirect link) has failed (that is, the designated switch has lost its connection to the root switch). Under spanning-tree rules, the switch ignores inferior BPDUs for the maximum aging time (default is 20 seconds).
The switch tries to find if it has an alternate path to the root switch. If the inferior BPDU arrives on a blocked interface, the root port and other blocked interfaces on the switch become alternate paths to the root switch. (Self-looped ports are not considered alternate paths to the root switch.) If the inferior BPDU arrives on the root port, all blocked interfaces become alternate paths to the root switch. If the inferior BPDU arrives on the root port and there are no blocked interfaces, the switch assumes that it has lost connectivity to the root switch, causes the maximum aging time on the root port to expire, and becomes the root switch according to normal spanning-tree rules.
If the switch has alternate paths to the root switch, it uses these alternate paths to send a root link query (RLQ) request. The switch sends the RLQ request on all alternate paths to learn if any stack member has an alternate root to the root switch and waits for an RLQ reply from other switches in the network and in the stack. The switch sends the RLQ request on all alternate paths and waits for an RLQ reply from other switches in the network.
When a stack member receives an RLQ reply from a nonstack member on a blocked interface and the reply is destined for another nonstacked switch, it forwards the reply packet, regardless of the spanning-tree interface state.
When a stack member receives an RLQ reply from a nonstack member and the response is destined for the stack, the stack member forwards the reply so that all the other stack members receive it.
If the switch discovers that it still has an alternate path to the root, it expires the maximum aging time on the interface that received the inferior BPDU. If all the alternate paths to the root switch indicate that the switch has lost connectivity to the root switch, the switch expires the maximum aging time on the interface that received the RLQ reply. If one or more alternate paths can still connect to the root switch, the switch makes all interfaces on which it received an inferior BPDU its designated ports and moves them from the blocking state (if they were in the blocking state), through the listening and learning states, and into the forwarding state.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 560

Layer 2/3

BackboneFast
Figure 35: BackboneFast Example Before Indirect Link Failure
This is an example topology with no link failures. Switch A, the root switch, connects directly to Switch B over link L1 and to Switch C over link L2. The Layer 2 interface on Switch C that connects directly to Switch

B is in the blocking state.
Figure 36: BackboneFast Example After Indirect Link Failure
If link L1 fails, Switch C cannot detect this failure because it is not connected directly to link L1. However, because Switch B is directly connected to the root switch over L1, it detects the failure, elects itself the root, and begins sending BPDUs to Switch C, identifying itself as the root. When Switch C receives the inferior BPDUs from Switch B, Switch C assumes that an indirect failure has occurred. At that point, BackboneFast allows the blocked interface on Switch C to move immediately to the listening state without waiting for the maximum aging time for the interface to expire. BackboneFast then transitions the Layer 2 interface on Switch C to the forwarding state, providing a path from Switch B to Switch A. The root-switch election takes approximately 30 seconds, twice the Forward Delay time if the default Forward Delay time of 15 seconds is set. BackboneFast reconfigures the topology to account for the failure of link

L1.
Figure 37: Adding a Switch in a Shared-Medium Topology
If a new switch is introduced into a shared-medium topology, BackboneFast is not activated because the inferior BPDUs did not come from the recognized designated switch (Switch B). The new switch begins sending inferior BPDUs that indicate it is the root switch. However, the other switches ignore these inferior

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 561

EtherChannel Guard

Layer 2/3

BPDUs, and the new switch learns that Switch B is the designated switch to Switch A, the root

switch.
Related Topics Specifying the MST Region Configuration and Enabling MSTP (CLI), on page 536 MSTP Configuration Guidelines, on page 521 Multiple Spanning-Tree Regions, on page 523 Enabling BackboneFast (CLI), on page 570

EtherChannel Guard
You can use EtherChannel guard to detect an EtherChannel misconfiguration between the switch and a connected device. A misconfiguration can occur if the switch interfaces are configured in an EtherChannel, but the interfaces on the other device are not. A misconfiguration can also occur if the channel parameters are not the same at both ends of the EtherChannel.
If the switch detects a misconfiguration on the other device, EtherChannel guard places the switch interfaces in the error-disabled state, and displays an error message.
Related Topics Enabling EtherChannel Guard (CLI), on page 571

Root Guard

Figure 38: Root Guard in a Service-Provider Network
The Layer 2 network of a service provider (SP) can include many connections to switches that are not owned by the SP. In such a topology, the spanning tree can reconfigure itself and select a customer switch as the root switch. You can avoid this situation by enabling root guard on SP switch interfaces that connect to switches in your customer's network. If spanning-tree calculations cause an interface in the customer network to be selected as the root port, root guard then places the interface in the root-inconsistent (blocked) state to prevent the customer's switch from becoming the root switch or being in the path to the root.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 562

Layer 2/3

Loop Guard

If a switch outside the SP network becomes the root switch, the interface is blocked (root-inconsistent state), and spanning tree selects a new root switch. The customer's switch does not become the root switch and is not in the path to the root. If the switch is operating in multiple spanning-tree (MST) mode, root guard forces the interface to be a designated port. If a boundary port is blocked in an internal spanning-tree (IST) instance because of root guard, the interface also is blocked in all MST instances. A boundary port is an interface that connects to a LAN, the designated switch of which is either an IEEE 802.1D switch or a switch with a different MST region configuration. Root guard enabled on an interface applies to all the VLANs to which the interface belongs. VLANs can be grouped and mapped to an MST instance.
Caution Misuse of the root guard feature can cause a loss of connectivity.
Related Topics Enabling Root Guard (CLI), on page 572
Loop Guard
You can use loop guard to prevent alternate or root ports from becoming designated ports because of a failure that leads to a unidirectional link. This feature is most effective when it is enabled on the entire switched network. Loop guard prevents alternate and root ports from becoming designated ports, and spanning tree does not send BPDUs on root or alternate ports. When the switch is operating in PVST+ or rapid-PVST+ mode, loop guard prevents alternate and root ports from becoming designated ports, and spanning tree does not send BPDUs on root or alternate ports. When the switch is operating in MST mode, BPDUs are not sent on nonboundary ports only if the interface is blocked by loop guard in all MST instances. On a boundary port, loop guard blocks the interface in all MST instances.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 563

How to Configure Optional Spanning-Tree Features

Layer 2/3

Related Topics Enabling Loop Guard (CLI), on page 573
How to Configure Optional Spanning-Tree Features
Enabling PortFast (CLI)
An interface with the PortFast feature enabled is moved directly to the spanning-tree forwarding state without waiting for the standard forward-time delay. If you enable the voice VLAN feature, the PortFast feature is automatically enabled. When you disable voice VLAN, the PortFast feature is not automatically disabled. You can enable this feature if your switch is running PVST+, Rapid PVST+, or MSTP.

Caution Use PortFast only when connecting a single end station to an access or trunk port. Enabling this feature on an interface connected to a switch or hub could prevent spanning tree from detecting and disabling loops in your network, which could cause broadcast storms and address-learning problems.
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable PortFast on the switch.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. spanning-tree portfast [trunk] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies an interface to configure, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 564

Layer 2/3

Enabling BPDU Guard (CLI)

Step 3 Step 4

Command or Action

Purpose

spanning-tree portfast [trunk] Example:

Enables PortFast on an access port connected to a single workstation or server. By specifying the trunk keyword, you can enable PortFast on a trunk port.

Switch(config-if)# spanning-tree portfast trunk Note

To enable PortFast on trunk ports, you must use the spanning-tree portfast trunk interface configuration command. The spanning-tree portfast command will not work on trunk ports.

Make sure that there are no loops in the network between the trunk port and the workstation or server before you enable PortFast on a trunk port.

end Example:

By default, PortFast is disabled on all interfaces. Returns to privileged EXEC mode.

Switch(config-if)# end

What to do next You can use the spanning-tree portfast default global configuration command to globally enable the PortFast feature on all nontrunking ports. Related Topics
PortFast, on page 554 Restriction for Optional Spanning-Tree Features, on page 553
Enabling BPDU Guard (CLI)
You can enable the BPDU guard feature if your switch is running PVST+, Rapid PVST+, or MSTP.

Caution Configure PortFast only on ports that connect to end stations; otherwise, an accidental topology loop could cause a data packet loop and disrupt switch and network operation.

This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable BPDU guard on the switch.

SUMMARY STEPS

1. configure terminal 2. spanning-tree portfast bpduguard default 3. interface interface-id 4. spanning-tree portfast 5. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 565

Enabling BPDU Filtering (CLI)

Layer 2/3

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3 Step 4 Step 5

spanning-tree portfast bpduguard default Example:

Globally enables BPDU guard. By default, BPDU guard is disabled.

Switch(config)# spanning-tree portfast bpduguard default

interface interface-id Example:

Specifies the interface connected to an end station, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2
spanning-tree portfast Example:

Enables the PortFast feature.

Switch(config-if)# spanning-tree portfast
end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

What to do next
To prevent the port from shutting down, you can use the errdisable detect cause bpduguard shutdown vlan global configuration command to shut down just the offending VLAN on the port where the violation occurred.
You also can use the spanning-tree bpduguard enable interface configuration command to enable BPDU guard on any port without also enabling the PortFast feature. When the port receives a BPDU, it is put it in the error-disabled state. Related Topics
BPDU Guard, on page 554
Enabling BPDU Filtering (CLI)
You can also use the spanning-tree bpdufilter enable interface configuration command to enable BPDU filtering on any interface without also enabling the PortFast feature. This command prevents the interface from sending or receiving BPDUs.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 566

Layer 2/3

Enabling BPDU Filtering (CLI)

Caution Enabling BPDU filtering on an interface is the same as disabling spanning tree on it and can result in spanning-tree loops.
You can enable the BPDU filtering feature if your switch is running PVST+, Rapid PVST+, or MSTP.

Caution Configure PortFast only on interfaces that connect to end stations; otherwise, an accidental topology loop could cause a data packet loop and disrupt switch and network operation.
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable BPDU filtering on the switch.

SUMMARY STEPS

1. configure terminal 2. spanning-tree portfast bpdufilter default 3. interface interface-id 4. spanning-tree portfast 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3 Step 4

spanning-tree portfast bpdufilter default Example:

Globally enables BPDU filtering. By default, BPDU filtering is disabled.

Switch(config)# spanning-tree portfast bpdufilter default

interface interface-id Example:

Specifies the interface connected to an end station, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2
spanning-tree portfast Example:

Enables the PortFast feature on the specified interface.

Switch(config-if)# spanning-tree portfast

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 567

Enabling UplinkFast for Use with Redundant Links (CLI)

Layer 2/3

Step 5

Command or Action end Example:
Switch(config-if)# end

Purpose Returns to privileged EXEC mode.

Related Topics BPDU Filtering, on page 555

Enabling UplinkFast for Use with Redundant Links (CLI)

Note When you enable UplinkFast, it affects all VLANs on the switch or switch stack. You cannot configure UplinkFast on an individual VLAN.
You can configure the UplinkFast or the Cross-Stack UplinkFast (CSUF) feature for Rapid PVST+ or for the MSTP, but the feature remains disabled (inactive) until you change the spanning-tree mode to PVST+.
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable UplinkFast and CSUF.

Before you begin
UplinkFast cannot be enabled on VLANs that have been configured with a switch priority. To enable UplinkFast on a VLAN with switch priority configured, first restore the switch priority on the VLAN to the default value using the no spanning-tree vlan vlan-id priority global configuration command.

SUMMARY STEPS

1. configure terminal 2. spanning-tree uplinkfast [max-update-rate pkts-per-second] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

spanning-tree uplinkfast [max-update-rate pkts-per-second]
Example:

Enables UplinkFast.
(Optional) For pkts-per-second, the range is 0 to 32000 packets per second; the default is 150.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 568

Layer 2/3

Disabling UplinkFast (CLI)

Command or Action
Switch(config)# spanning-tree uplinkfast max-update-rate 200

Step 3

end Example:
Switch(config)# end

Purpose If you set the rate to 0, station-learning frames are not generated, and the spanning-tree topology converges more slowly after a loss of connectivity.
When you enter this command, CSUF also is enabled on all nonstack port interfaces.
Returns to privileged EXEC mode.

When UplinkFast is enabled, the switch priority of all VLANs is set to 49152. If you change the path cost to a value less than 3000 and you enable UplinkFast or UplinkFast is already enabled, the path cost of all interfaces and VLAN trunks is increased by 3000 (if you change the path cost to 3000 or above, the path cost is not altered). The changes to the switch priority and the path cost reduce the chance that a switch will become the root switch.
When UplinkFast is disabled, the switch priorities of all VLANs and path costs of all interfaces are set to default values if you did not modify them from their defaults.
When you enable the UplinkFast feature using these instructions, CSUF is automatically globally enabled on nonstack port interfaces.
Related Topics UplinkFast, on page 555 Cross-Stack UplinkFast, on page 557 How Cross-Stack UplinkFast Works, on page 558 Events That Cause Fast Convergence, on page 559

Disabling UplinkFast (CLI)
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to disable UplinkFast and Cross-Stack UplinkFast (CSUF).

Before you begin UplinkFast must be enabled.

SUMMARY STEPS

1. configure terminal 2. no spanning-tree uplinkfast 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 569

Enabling BackboneFast (CLI)

Layer 2/3

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2 Step 3

no spanning-tree uplinkfast Example:
Switch(config)# no spanning-tree uplinkfast
end Example:
Switch(config)# end

Purpose Enters the global configuration mode.
Disables UplinkFast and CSUF on the switch and all of its VLANs. Returns to privileged EXEC mode.

When UplinkFast is disabled, the switch priorities of all VLANs and path costs of all interfaces are set to default values if you did not modify them from their defaults.
When you disable the UplinkFast feature using these instructions, CSUF is automatically globally disabled on nonstack port interfaces.

Enabling BackboneFast (CLI)
You can enable BackboneFast to detect indirect link failures and to start the spanning-tree reconfiguration sooner.
You can configure the BackboneFast feature for Rapid PVST+ or for the MSTP, but the feature remains disabled (inactive) until you change the spanning-tree mode to PVST+.
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable BackboneFast on the switch.

Before you begin
If you use BackboneFast, you must enable it on all switches in the network. BackboneFast is not supported on Token Ring VLANs. This feature is supported for use with third-party switches.

SUMMARY STEPS

1. configure terminal 2. spanning-tree backbonefast 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 570

Layer 2/3

Enabling EtherChannel Guard (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2 Step 3

spanning-tree backbonefast Example:
Switch(config)# spanning-tree backbonefast
end Example:
Switch(config)# end

Purpose Enters the global configuration mode.
Enables BackboneFast.
Returns to privileged EXEC mode.

Related Topics BackboneFast, on page 560

Enabling EtherChannel Guard (CLI)
You can enable EtherChannel guard to detect an EtherChannel misconfiguration if your switch is running PVST+, Rapid PVST+, or MSTP. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable EtherChannel Guard on the switch.

SUMMARY STEPS

1. configure terminal 2. spanning-tree etherchannel guard misconfig 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

spanning-tree etherchannel guard misconfig Example:

Enables EtherChannel guard.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 571

Enabling Root Guard (CLI)

Layer 2/3

Step 3

Command or Action

Purpose

Switch(config)# spanning-tree etherchannel guard misconfig

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

What to do next
You can use the show interfaces status err-disabled privileged EXEC command to show which switch ports are disabled because of an EtherChannel misconfiguration. On the remote device, you can enter the show etherchannel summary privileged EXEC command to verify the EtherChannel configuration.
After the configuration is corrected, enter the shutdown and no shutdown interface configuration commands on the port-channel interfaces that were misconfigured.
Related Topics EtherChannel Guard, on page 562
Enabling Root Guard (CLI)
Root guard enabled on an interface applies to all the VLANs to which the interface belongs. Do not enable the root guard on interfaces to be used by the UplinkFast feature. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the case of a failure. However, if root guard is also enabled, all the backup interfaces used by the UplinkFast feature are placed in the root-inconsistent state (blocked) and are prevented from reaching the forwarding state.

Note You cannot enable both root guard and loop guard at the same time.
You can enable this feature if your switch is running PVST+, Rapid PVST+, or MSTP. This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable root guard on the switch.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. spanning-tree guard root 4. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 572

Layer 2/3

Enabling Loop Guard (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3 Step 4

interface interface-id Example:

Specifies an interface to configure, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2
spanning-tree guard root Example:

Enables root guard on the interface. By default, root guard is disabled on all interfaces.

Switch(config-if)# spanning-tree guard root
end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Related Topics Root Guard, on page 562

Enabling Loop Guard (CLI)
You can use loop guard to prevent alternate or root ports from becoming designated ports because of a failure that leads to a unidirectional link. This feature is most effective when it is configured on the entire switched network. Loop guard operates only on interfaces that are considered point-to-point by the spanning tree.

Note You cannot enable both loop guard and root guard at the same time.

You can enable this feature if your switch is running PVST+, Rapid PVST+, or MSTP.
This procedure is optional. Beginning in privileged EXEC mode, follow these steps to enable loop guard on the switch.

SUMMARY STEPS

1. Enter one of the following commands: · show spanning-tree active · show spanning-tree mst
2. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 573

Monitoring the Spanning-Tree Status

Layer 2/3

3. spanning-tree loopguard default 4. end

DETAILED STEPS

Step 1

Command or Action Enter one of the following commands:
· show spanning-tree active · show spanning-tree mst Example:

Switch# show spanning-tree active
or

Purpose Verifies which interfaces are alternate or root ports.

Step 2

Switch# show spanning-tree mst
configure terminal Example:

Enters global configuration mode.

Step 3 Step 4

Switch# configure terminal
spanning-tree loopguard default Example:

Enables loop guard. By default, loop guard is disabled.

Switch(config)# spanning-tree loopguard default

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Related Topics Loop Guard, on page 563

Monitoring the Spanning-Tree Status

Table 59: Commands for Monitoring the Spanning-Tree Status

show spanning-tree active
show spanning-tree detail show spanning-tree interface interface-id

Displays spanning-tree information on active interfaces only.
Displays a detailed summary of interface information.
Displays spanning-tree information for the specified interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 574

Layer 2/3

Additional References for Optional Spanning Tree Features

show spanning-tree mst interface interface-id show spanning-tree summary [totals]

Displays MST information for the specified interface.
Displays a summary of interface states or displays the total lines of the spanning-tree state section.

Additional References for Optional Spanning Tree Features

Related Documents Related Topic Spanning tree protocol commands

Document Title
LAN Switching Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 575

Feature Information for Optional Spanning-Tree Features

Layer 2/3

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for Optional Spanning-Tree Features

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 576

3 1 C H A P T E R
Configuring EtherChannels
· Finding Feature Information, on page 577 · Restrictions for EtherChannels, on page 577 · Information About EtherChannels, on page 578 · How to Configure EtherChannels, on page 592 · Monitoring EtherChannel, PAgP, and LACP Status, on page 605 · Configuration Examples for Configuring EtherChannels, on page 606 · Additional References for EtherChannels, on page 608 · Feature Information for EtherChannels, on page 609
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for EtherChannels
The following are restrictions for EtherChannels: · All ports in an EtherChannel must be assigned to the same VLAN or they must be configured as trunk ports. · Layer 3 EtherChannels are not supported if running the LAN Base license feature set. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 577

Information About EtherChannels

Layer 2/3

Information About EtherChannels
EtherChannel Overview
An EtherChannel consists of individual Ethernet links bundled into a single logical link.
Figure 39: Typical EtherChannel Configuration

The EtherChannel provides full-duplex bandwidth up to 8 Gb/s (Gigabit EtherChannel) or 80 Gb/s (10-Gigabit EtherChannel) between your switch and another switch or host. Each EtherChannel can consist of up to eight compatibly configured Ethernet ports. The number of EtherChannels is limited to 128. The LAN Base feature set supports up to 24 EtherChannels. All ports in each EtherChannel must be configured as either Layer 2 or Layer 3 ports. The EtherChannel Layer 3 ports are made up of routed ports. Routed ports are physical ports configured to be in Layer 3 mode by using the no switchport interface configuration command. Related Topics
Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 578

Layer 2/3

EtherChannel Modes

EtherChannel Modes
You can configure an EtherChannel in one of these modes: Port Aggregation Protocol (PAgP), Link Aggregation Control Protocol (LACP), or On. Configure both ends of the EtherChannel in the same mode:
· When you configure one end of an EtherChannel in either PAgP or LACP mode, the system negotiates with the other end of the channel to determine which ports should become active. If the remote port cannot negotiate an EtherChannel, the local port is put into an independent state and continues to carry data traffic as would any other single link. The port configuration does not change, but the port does not participate in the EtherChannel.
· When you configure an EtherChannel in the on mode, no negotiations take place. The switch forces all compatible ports to become active in the EtherChannel. The other end of the channel (on the other switch) must also be configured in the on mode; otherwise, packet loss can occur.
Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591
EtherChannel on Switches
You can create an EtherChannel on a switch, on a single switch in the stack, or on multiple switches in the stack (known as cross-stack EtherChannel).
Figure 40: Single-Switch EtherChannel

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 579

EtherChannel Link Failover Figure 41: Cross-Stack EtherChannel

Layer 2/3

Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591
EtherChannel Link Failover
If a link within an EtherChannel fails, traffic previously carried over that failed link moves to the remaining links within the EtherChannel. If traps are enabled on the switch, a trap is sent for a failure that identifies the switch, the EtherChannel, and the failed link. Inbound broadcast and multicast packets on one link in an EtherChannel are blocked from returning on any other link of the EtherChannel. Related Topics
Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591
Channel Groups and Port-Channel Interfaces
An EtherChannel comprises a channel group and a port-channel interface. The channel group binds physical ports to the port-channel interface. Configuration changes applied to the port-channel interface apply to all the physical ports bound together in the channel group.
Figure 42: Relationship of Physical Ports, Channel Group and Port-Channel Interface
The channel-group command binds the physical port and the port-channel interface together. Each EtherChannel has a port-channel logical interface numbered from 1 to 128. This port-channel interface number corresponds to the one specified with the channel-group interface configuration command.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 580

Layer 2/3

Port Aggregation Protocol

· With Layer 2 ports, use the channel-group interface configuration command to dynamically create the port-channel interface. You also can use the interface port-channel port-channel-number global configuration command to manually create the port-channel interface, but then you must use the channel-group channel-group-number command to bind the logical interface to a physical port. The channel-group-number can be the same as the port-channel-number, or you can use a new number. If you use a new number, the channel-group command dynamically creates a new port channel.
· With Layer 3 ports, you should manually create the logical interface by using the interface port-channel global configuration command followed by the no switchport interface configuration command. You then manually assign an interface to the EtherChannel by using the channel-group interface configuration command.
· With Layer 3 ports, use the no switchport interface command to configure the interface as a Layer 3 interface, and then use the channel-group interface configuration command to dynamically create the port-channel interface.
Related Topics Creating Port-Channel Logical Interfaces (CLI) EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Configuring the Physical Interfaces (CLI)
Port Aggregation Protocol
The Port Aggregation Protocol (PAgP) is a Cisco-proprietary protocol that can be run only on Cisco switches and on those switches licensed by vendors to support PAgP. PAgP facilitates the automatic creation of EtherChannels by exchanging PAgP packets between Ethernet ports. PAgP can be enabled on cross-stack EtherChannels.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 581

PAgP Modes

Layer 2/3

PAgP Modes
Silent Mode

By using PAgP, the switch or switch stack learns the identity of partners capable of supporting PAgP and the capabilities of each port. It then dynamically groups similarly configured ports (on a single switch in the stack) into a single logical link (channel or aggregate port). Similarly configured ports are grouped based on hardware, administrative, and port parameter constraints. For example, PAgP groups the ports with the same speed, duplex mode, native VLAN, VLAN range, and trunking status and type. After grouping the links into an EtherChannel, PAgP adds the group to the spanning tree as a single switch port.

PAgP modes specify whether a port can send PAgP packets, which start PAgP negotiations, or only respond to PAgP packets received.
Table 60: EtherChannel PAgP Modes

Mode auto
desirable

Description
Places a port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. This setting minimizes the transmission of PAgP packets.
Places a port into an active negotiating state, in which the port starts negotiations with other ports by sending PAgP packets. This mode is supported when the EtherChannel members are from different switches in the switch stack (cross-stack EtherChannel).

Switch ports exchange PAgP packets only with partner ports configured in the auto or desirable modes. Ports configured in the on mode do not exchange PAgP packets.
Both the auto and desirable modes enable ports to negotiate with partner ports to form an EtherChannel based on criteria such as port speed. and for Layer 2 EtherChannels, based on trunk state and VLAN numbers.
Ports can form an EtherChannel when they are in different PAgP modes as long as the modes are compatible. For example:
· A port in the desirable mode can form an EtherChannel with another port that is in the desirable or auto mode.
· A port in the auto mode can form an EtherChannel with another port in the desirable mode.

A port in the auto mode cannot form an EtherChannel with another port that is also in the auto mode because neither port starts PAgP negotiation.
Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Creating Port-Channel Logical Interfaces (CLI) Configuring the Physical Interfaces (CLI)

If your switch is connected to a partner that is PAgP-capable, you can configure the switch port for nonsilent operation by using the non-silent keyword. If you do not specify non-silent with the auto or desirable mode, silent mode is assumed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 582

Layer 2/3

PAgP Learn Method and Priority

Use the silent mode when the switch is connected to a device that is not PAgP-capable and seldom, if ever, sends packets. An example of a silent partner is a file server or a packet analyzer that is not generating traffic. In this case, running PAgP on a physical port connected to a silent partner prevents that switch port from ever becoming operational. However, the silent setting allows PAgP to operate, to attach the port to a channel group, and to use the port for transmission.
Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Creating Port-Channel Logical Interfaces (CLI) Configuring the Physical Interfaces (CLI)
PAgP Learn Method and Priority
Network devices are classified as PAgP physical learners or aggregate-port learners. A device is a physical learner if it learns addresses by physical ports and directs transmissions based on that knowledge. A device is an aggregate-port learner if it learns addresses by aggregate (logical) ports. The learn method must be configured the same at both ends of the link.
When a device and its partner are both aggregate-port learners, they learn the address on the logical port-channel. The device sends packets to the source by using any of the ports in the EtherChannel. With aggregate-port learning, it is not important on which physical port the packet arrives.
PAgP cannot automatically detect when the partner device is a physical learner and when the local device is an aggregate-port learner. Therefore, you must manually set the learning method on the local device to learn addresses by physical ports. You also must set the load-distribution method to source-based distribution, so that any given source MAC address is always sent on the same physical port.
You also can configure a single port within the group for all transmissions and use other ports for hot-standby. The unused ports in the group can be swapped into operation in just a few seconds if the selected single port loses hardware-signal detection. You can configure which port is always selected for packet transmission by changing its priority with the pagp port-priority interface configuration command. The higher the priority, the more likely that the port will be selected.
Note The switch supports address learning only on aggregate ports even though the physical-port keyword is provided in the CLI. The pagp learn-method command and the pagp port-priority command have no effect on the switch hardware, but they are required for PAgP interoperability with devices that only support address learning by physical ports, such as the Catalyst 1900 switch.
When the link partner of the switch is a physical learner, we recommend that you configure the switch as a physical-port learner by using the pagp learn-method physical-port interface configuration command. Set the load-distribution method based on the source MAC address by using the port-channel load-balance src-mac global configuration command. The switch then sends packets to the physcial learner using the same port in the EtherChannel from which it learned the source address. Only use the pagp learn-method command in this situation.
Related Topics Configuring the PAgP Learn Method and Priority (CLI), on page 599 EtherChannel Configuration Guidelines, on page 590

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 583

PAgP Interaction with Other Features

Layer 2/3

Default EtherChannel Configuration, on page 589 Monitoring EtherChannel, PAgP, and LACP Status, on page 605 Layer 2 EtherChannel Configuration Guidelines, on page 591
PAgP Interaction with Other Features
The Dynamic Trunking Protocol (DTP) and the Cisco Discovery Protocol (CDP) send and receive packets over the physical ports in the EtherChannel. Trunk ports send and receive PAgP protocol data units (PDUs) on the lowest numbered VLAN.
In Layer 2 EtherChannels, the first port in the channel that comes up provides its MAC address to the EtherChannel. If this port is removed from the bundle, one of the remaining ports in the bundle provides its MAC address to the EtherChannel. For Layer 3 EtherChannels, the MAC address is allocated by the active switch as soon as the interface is created (through the interface port-channel global configuration command).
PAgP sends and receives PAgP PDUs only from ports that are up and have PAgP enabled for the auto or desirable mode.

Link Aggregation Control Protocol
The LACP is defined in IEEE 802.3ad and enables Cisco switches to manage Ethernet channels between switches that conform to the IEEE 802.3ad protocol. LACP facilitates the automatic creation of EtherChannels by exchanging LACP packets between Ethernet ports.
By using LACP, the switch or switch stack learns the identity of partners capable of supporting LACP and the capabilities of each port. It then dynamically groups similarly configured ports into a single logical link (channel or aggregate port). Similarly configured ports are grouped based on hardware, administrative, and port parameter constraints. For example, LACP groups the ports with the same speed, duplex mode, native VLAN, VLAN range, and trunking status and type. After grouping the links into an EtherChannel, LACP adds the group to the spanning tree as a single switch port.

LACP Modes

LACP modes specify whether a port can send LACP packets or only receive LACP packets.
Table 61: EtherChannel LACP Modes

Mode active
passive

Description
Places a port into an active negotiating state in which the port starts negotiations with other ports by sending LACP packets.
Places a port into a passive negotiating state in which the port responds to LACP packets that it receives, but does not start LACP packet negotiation. This setting minimizes the transmission of LACP packets.

Both the active and passive LACP modes enable ports to negotiate with partner ports to an EtherChannel based on criteria such as port speed, and for Layer 2 EtherChannels, based on trunk state and VLAN numbers.
Ports can form an EtherChannel when they are in different LACP modes as long as the modes are compatible. For example:
· A port in the active mode can form an EtherChannel with another port that is in the active or passive mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 584

Layer 2/3

LACP and Link Redundancy

· A port in the passive mode cannot form an EtherChannel with another port that is also in the passive mode because neither port starts LACP negotiation.
Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591
LACP and Link Redundancy
LACP port-channel operation, bandwidth availability, and link redundancy can be further refined with the LACP port-channel min-links and the LACP max-bundle features. The LACP port-channel min-links feature:
· Configures the minimum number of ports that must be linked up and bundled in the LACP port channel.
· Prevents a low-bandwidth LACP port channel from becoming active.
· Causes an LACP port channel to become inactive if there are too few active members ports to supply the required minimum bandwidth.
The LACP max-bundle feature: · Defines an upper limit on the number of bundled ports in an LACP port channel.
· Allows hot-standby ports with fewer bundled ports. For example, in an LACP port channel with five ports, you can specify a max-bundle of three, and the two remaining ports are designated as hot-standby ports.
Related Topics Configuring the LACP Max Bundle Feature (CLI), on page 601 Configuring LACP Hot-Standby Ports: Example, on page 607 Configuring the Port Channel Min-Links Feature (CLI), on page 602
LACP Interaction with Other Features
The DTP and the CDP send and receive packets over the physical ports in the EtherChannel. Trunk ports send and receive LACP PDUs on the lowest numbered VLAN. In Layer 2 EtherChannels, the first port in the channel that comes up provides its MAC address to the EtherChannel. If this port is removed from the bundle, one of the remaining ports in the bundle provides its MAC address to the EtherChannel. For Layer 3 EtherChannels, the MAC address is allocated by the active switch as soon as the interface is created through the interface port-channel global configuration command. LACP sends and receives LACP PDUs only from ports that are up and have LACP enabled for the active or passive mode.
EtherChannel On Mode
EtherChannel on mode can be used to manually configure an EtherChannel. The on mode forces a port to join an EtherChannel without negotiations. The on mode can be useful if the remote device does not support

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 585

Load-Balancing and Forwarding Methods

Layer 2/3

PAgP or LACP. In the on mode, a usable EtherChannel exists only when the switches at both ends of the link are configured in the on mode.
Ports that are configured in the on mode in the same channel group must have compatible port characteristics, such as speed and duplex. Ports that are not compatible are suspended, even though they are configured in the on mode.
Caution You should use care when using the on mode. This is a manual configuration, and ports on both ends of the EtherChannel must have the same configuration. If the group is misconfigured, packet loss or spanning-tree loops can occur.
Load-Balancing and Forwarding Methods
EtherChannel balances the traffic load across the links in a channel by reducing part of the binary pattern formed from the addresses in the frame to a numerical value that selects one of the links in the channel. You can specify one of several different load-balancing modes, including load distribution based on MAC addresses, IP addresses, source addresses, destination addresses, or both source and destination addresses. The selected mode applies to all EtherChannels configured on the switch.
You configure the load-balancing and forwarding method by using the port-channel load-balance and the port-channel load-balance extendedglobal configuration commands.
Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 EtherChannel Configuration Guidelines, on page 590 Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592
MAC Address Forwarding
With source-MAC address forwarding, when packets are forwarded to an EtherChannel, they are distributed across the ports in the channel based on the source-MAC address of the incoming packet. Therefore, to provide load-balancing, packets from different hosts use different ports in the channel, but packets from the same host use the same port in the channel.
With destination-MAC address forwarding, when packets are forwarded to an EtherChannel, they are distributed across the ports in the channel based on the destination host's MAC address of the incoming packet. Therefore, packets to the same destination are forwarded over the same port, and packets to a different destination are sent on a different port in the channel.
With source-and-destination MAC address forwarding, when packets are forwarded to an EtherChannel, they are distributed across the ports in the channel based on both the source and destination MAC addresses. This forwarding method, a combination source-MAC and destination-MAC address forwarding methods of load distribution, can be used if it is not clear whether source-MAC or destination-MAC address forwarding is better suited on a particular switch. With source-and-destination MAC-address forwarding, packets sent from host A to host B, host A to host C, and host C to host B could all use different ports in the channel.
Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 EtherChannel Configuration Guidelines, on page 590

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 586

Layer 2/3

IP Address Forwarding

Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592
IP Address Forwarding
With source-IP address-based forwarding, packets are distributed across the ports in the EtherChannel based on the source-IP address of the incoming packet. To provide load balancing, packets from different IP addresses use different ports in the channel, and packets from the same IP address use the same port in the channel.
With destination-IP address-based forwarding, packets are distributed across the ports in the EtherChannel based on the destination-IP address of the incoming packet. To provide load balancing, packets from the same IP source address sent to different IP destination addresses could be sent on different ports in the channel. Packets sent from different source IP addresses to the same destination IP address are always sent on the same port in the channel.
With source-and-destination IP address-based forwarding, packets are distributed across the ports in the EtherChannel based on both the source and destination IP addresses of the incoming packet. This forwarding method, a combination of source-IP and destination-IP address-based forwarding, can be used if it is not clear whether source-IP or destination-IP address-based forwarding is better suited on a particular switch. In this method, packets sent from the IP address A to IP address B, from IP address A to IP address C, and from IP address C to IP address B could all use different ports in the channel.
Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 EtherChannel Configuration Guidelines, on page 590 Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592
Load-Balancing Advantages
Different load-balancing methods have different advantages, and the choice of a particular load-balancing method should be based on the position of the switch in the network and the kind of traffic that needs to be load-distributed.
Figure 43: Load Distribution and Forwarding Methods
In the following figure, an EtherChannel of four workstations communicates with a router. Because the router is a single MAC-address device, source-based forwarding on the switch EtherChannel ensures that the switch uses all available bandwidth to the router. The router is configured for destination-based forwarding because

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 587

EtherChannel and Switch Stacks

Layer 2/3

the large number of workstations ensures that the traffic is evenly distributed from the router

EtherChannel. Use the option that provides the greatest variety in your configuration. For example, if the traffic on a channel is going only to a single MAC address, using the destination-MAC address always chooses the same link in the channel. Using source addresses or IP addresses might result in better load-balancing. Related Topics
Configuring EtherChannel Load-Balancing (CLI), on page 596 EtherChannel Configuration Guidelines, on page 590 Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592
EtherChannel and Switch Stacks
If a stack member that has ports participating in an EtherChannel fails or leaves the stack, the active switch removes the failed stack member switch ports from the EtherChannel. The remaining ports of the EtherChannel, if any, continue to provide connectivity. When a switch is added to an existing stack, the new switch receives the running configuration from the active switch and updates itself with the EtherChannel-related stack configuration. The stack member also receives the operational information (the list of ports that are up and are members of a channel). When two stacks merge that have EtherChannels configured between them, self-looped ports result. Spanning tree detects this condition and acts accordingly. Any PAgP or LACP configuration on a winning switch stack is not affected, but the PAgP or LACP configuration on the losing switch stack is lost after the stack reboots.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 588

Layer 2/3

Switch Stack and PAgP

Switch Stack and PAgP
With PAgP, if the active switch fails or leaves the stack, the standby switch becomes the new active switch. A spanning-tree reconvergence is not triggered unless there is a change in the EtherChannel bandwidth. The new active switch synchronizes the configuration of the stack members to that of the active switch. The PAgP configuration is not affected after an active switch change unless the EtherChannel has ports residing on the old active switch.
Switch Stacks and LACP
With LACP, the system ID uses the stack MAC address from the active switch. When an active switch fails or leaves the stack and the standby switch becomes the new active switch change, the LACP system ID is unchanged. By default, the LACP configuration is not affected after the active switch changes.

Default EtherChannel Configuration
The default EtherChannel configuration is described in this table.
Table 62: Default EtherChannel Configuration

Feature Channel groups Port-channel logical interface PAgP mode PAgP learn method PAgP priority LACP mode LACP learn method LACP port priority LACP system priority LACP system ID Load-balancing

Default Setting None assigned. None defined.
No default. Aggregate-port learning on all ports. 128 on all ports. No default. Aggregate-port learning on all ports. 32768 on all ports. 32768. LACP system priority and the switch or stack MAC address. Load distribution on the switch is based on the source-MAC address of the incoming packet.

Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Overview, on page 578 EtherChannel Modes, on page 579 EtherChannel on Switches, on page 579 EtherChannel Link Failover, on page 580 LACP Modes, on page 584

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 589

EtherChannel Configuration Guidelines

Layer 2/3

PAgP Modes , on page 582 Silent Mode, on page 582 Creating Port-Channel Logical Interfaces (CLI) Channel Groups and Port-Channel Interfaces, on page 580 Configuring the Physical Interfaces (CLI) Configuring EtherChannel Load-Balancing (CLI), on page 596 Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 Configuring the PAgP Learn Method and Priority (CLI), on page 599 PAgP Learn Method and Priority, on page 583 Configuring the LACP System Priority (CLI), on page 603 Configuring the LACP Port Priority (CLI), on page 604
EtherChannel Configuration Guidelines
If improperly configured, some EtherChannel ports are automatically disabled to avoid network loops and other problems. Follow these guidelines to avoid configuration problems:
· Do not try to configure more than 128 EtherChannels on the switch or switch stack.
· Configure a PAgP EtherChannel with up to eight Ethernet ports of the same type.
· Configure a LACP EtherChannel with up to 16 Ethernet ports of the same type. Up to eight ports can be active, and up to eight ports can be in standby mode.
· Configure all ports in an EtherChannel to operate at the same speeds and duplex modes.
· Enable all ports in an EtherChannel. A port in an EtherChannel that is disabled by using the shutdown interface configuration command is treated as a link failure, and its traffic is transferred to one of the remaining ports in the EtherChannel.
· When a group is first created, all ports follow the parameters set for the first port to be added to the group. If you change the configuration of one of these parameters, you must also make the changes to all ports in the group: · Allowed-VLAN list
· Spanning-tree path cost for each VLAN
· Spanning-tree port priority for each VLAN
· Spanning-tree Port Fast setting
· Do not configure a port to be a member of more than one EtherChannel group.
· Do not configure an EtherChannel in both the PAgP and LACP modes. EtherChannel groups running PAgP and LACP can coexist on the same switch or on different switches in the stack. Individual EtherChannel groups can run either PAgP or LACP, but they cannot interoperate.
· Do not configure a secure port as part of an EtherChannel or the reverse.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 590

Layer 2/3

Layer 2 EtherChannel Configuration Guidelines

· Do not configure a port that is an active or a not-yet-active member of an EtherChannel as an IEEE 802.1x port. If you try to enable IEEE 802.1x on an EtherChannel port, an error message appears, and IEEE 802.1x is not enabled.
· If EtherChannels are configured on switch interfaces, remove the EtherChannel configuration from the interfaces before globally enabling IEEE 802.1x on a switch by using the dot1x system-auth-control global configuration command.
· If cross-stack EtherChannel is configured and the switch stack partitions, loops and forwarding issues can occur.
Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592 EtherChannel Overview, on page 578 EtherChannel Modes, on page 579 EtherChannel on Switches, on page 579 EtherChannel Link Failover, on page 580 LACP Modes, on page 584 PAgP Modes , on page 582 Silent Mode, on page 582 Creating Port-Channel Logical Interfaces (CLI) Channel Groups and Port-Channel Interfaces, on page 580 Configuring the Physical Interfaces (CLI) Configuring EtherChannel Load-Balancing (CLI), on page 596 Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 Configuring the PAgP Learn Method and Priority (CLI), on page 599 PAgP Learn Method and Priority, on page 583 Configuring the LACP System Priority (CLI), on page 603 Configuring the LACP Port Priority (CLI), on page 604
Layer 2 EtherChannel Configuration Guidelines
When configuring Layer 2 EtherChannels, follow these guidelines:
· Assign all ports in the EtherChannel to the same VLAN, or configure them as trunks. Ports with different native VLANs cannot form an EtherChannel.
· An EtherChannel supports the same allowed range of VLANs on all the ports in a trunking Layer 2 EtherChannel. If the allowed range of VLANs is not the same, the ports do not form an EtherChannel even when PAgP is set to the auto or desirable mode.
· Ports with different spanning-tree path costs can form an EtherChannel if they are otherwise compatibly configured. Setting different spanning-tree path costs does not, by itself, make ports incompatible for the formation of an EtherChannel.
Related Topics Configuring Layer 2 EtherChannels (CLI), on page 592

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 591

Layer 3 EtherChannel Configuration Guidelines

Layer 2/3

EtherChannel Overview, on page 578 EtherChannel Modes, on page 579 EtherChannel on Switches, on page 579 EtherChannel Link Failover, on page 580 LACP Modes, on page 584 PAgP Modes , on page 582 Silent Mode, on page 582 Creating Port-Channel Logical Interfaces (CLI) Channel Groups and Port-Channel Interfaces, on page 580 Configuring the Physical Interfaces (CLI) Configuring EtherChannel Load-Balancing (CLI), on page 596 Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 Configuring the PAgP Learn Method and Priority (CLI), on page 599 PAgP Learn Method and Priority, on page 583 Configuring the LACP System Priority (CLI), on page 603 Configuring the LACP Port Priority (CLI), on page 604
Layer 3 EtherChannel Configuration Guidelines
· For Layer 3 EtherChannels, assign the Layer 3 address to the port-channel logical interface, not to the physical ports in the channel.
Related Topics Configuring EtherChannel Load-Balancing (CLI), on page 596 Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587

How to Configure EtherChannels
After you configure an EtherChannel, configuration changes applied to the port-channel interface apply to all the physical ports assigned to the port-channel interface, and configuration changes applied to the physical port affect only the port where you apply the configuration.

Configuring Layer 2 EtherChannels (CLI)
You configure Layer 2 EtherChannels by assigning ports to a channel group with the channel-group interface configuration command. This command automatically creates the port-channel logical interface.

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 592

Layer 2/3

Configuring Layer 2 EtherChannels (CLI)

2. interface interface-id 3. switchport mode {access | trunk} 4. switchport access vlan vlan-id 5. channel-group channel-group-number mode {auto [non-silent] | desirable [non-silent ] | on } | { active
| passive} 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet2/0/1
switchport mode {access | trunk} Example:
Switch(config-if)# switchport mode access

Specifies a physical port, and enters interface configuration mode.
Valid interfaces are physical ports.
For a PAgP EtherChannel, you can configure up to eight ports of the same type and speed for the same group.
For a LACP EtherChannel, you can configure up to 16 Ethernet ports of the same type. Up to eight ports can be active, and up to eight ports can be in standby mode.
Assigns all ports as static-access ports in the same VLAN, or configure them as trunks.
If you configure the port as a static-access port, assign it to only one VLAN. The range is 1 to 4094.

Step 4

switchport access vlan vlan-id Example:
Switch(config-if)# switchport access vlan 22

(Optional) If you configure the port as a static-access port, assign it to only one VLAN. The range is 1 to 4094.

Step 5

channel-group channel-group-number mode {auto [non-silent] | desirable [non-silent ] | on } | { active | passive} Example:
Switch(config-if)# channel-group 5 mode auto

Assigns the port to a channel group, and specifies the PAgP or the LACP mode.
For mode, select one of these keywords:
· auto --Enables PAgP only if a PAgP device is detected. It places the port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. This keyword is not supported when EtherChannel members are from different switches in the switch stack.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 593

Configuring Layer 2 EtherChannels (CLI)

Layer 2/3

Command or Action

Step 6

end Example:
Switch(config-if)# end

Purpose
· desirable --Unconditionally enables PAgP. It places the port into an active negotiating state, in which the port starts negotiations with other ports by sending PAgP packets. This keyword is not supported when EtherChannel members are from different switches in the switch stack.
· on --Forces the port to channel without PAgP or LACP. In the on mode, an EtherChannel exists only when a port group in the on mode is connected to another port group in the on mode.
· non-silent --(Optional) If your switch is connected to a partner that is PAgP-capable, configures the switch port for nonsilent operation when the port is in the auto or desirable mode. If you do not specify non-silent, silent is assumed. The silent setting is for connections to file servers or packet analyzers. This setting allows PAgP to operate, to attach the port to a channel group, and to use the port for transmission.
· active--Enables LACP only if a LACP device is detected. It places the port into an active negotiating state in which the port starts negotiations with other ports by sending LACP packets.
· passive --Enables LACP on the port and places it into a passive negotiating state in which the port responds to LACP packets that it receives, but does not start LACP packet negotiation.
Returns to privileged EXEC mode.

Related Topics EtherChannel Overview, on page 578 EtherChannel Modes, on page 579 EtherChannel on Switches, on page 579 EtherChannel Link Failover, on page 580 LACP Modes, on page 584 PAgP Modes , on page 582 Silent Mode, on page 582 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 594

Layer 2/3

Configuring Layer 3 EtherChannels (CLI)

Configuring Layer 3 EtherChannels (CLI)
Beginning in privileged EXEC mode, follow these steps to assign an Ethernet port to a Layer 3 EtherChannel. This procedure is required.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. no ip address 4. no switchport 5. channel-group channel-group-number mode { auto [ non-silent ] | desirable [ non-silent ]
| on } | { active | passive } 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/2

Specifies a physical port, and enters interface configuration mode.
Valid interfaces include physical ports.
For a PAgP EtherChannel, you can configure up to eight ports of the same type and speed for the same group.
For a LACP EtherChannel, you can configure up to 16 Ethernet ports of the same type. Up to eight ports can be active, and up to eight ports can be in standby mode.

no ip address Example:

Ensures that there is no IP address assigned to the physical port.

Switch(config-if)# no ip address

Step 4

no switchport Example:
Switch(config-if)# no switchport

Puts the port into Layer 3 mode.

Step 5

channel-group channel-group-number mode { auto [ Assigns the port to a channel group, and specifies the PAgP

non-silent ] | desirable [ non-silent ] | on } | or the LACP mode.

{ active | passive }

For mode, select one of these keywords:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 595

Configuring EtherChannel Load-Balancing (CLI)

Layer 2/3

Command or Action Example:
Switch(config-if)# channel-group 5 mode auto

Step 6

end Example:
Switch(config-if)# end

Purpose
· auto--Enables PAgP only if a PAgP device is detected. It places the port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. This keyword is not supported when EtherChannel members are from different switches in the switch stack.
· desirable--Unconditionally enables PAgP. It places the port into an active negotiating state, in which the port starts negotiations with other ports by sending PAgP packets. This keyword is not supported when EtherChannel members are from different switches in the switch stack.
· on--Forces the port to channel without PAgP or LACP. In the on mode, an EtherChannel exists only when a port group in the on mode is connected to another port group in the on mode.
· non-silent--(Optional) If your switch is connected to a partner that is PAgP capable, configures the switch port for nonsilent operation when the port is in the auto or desirable mode. If you do not specify non-silent, silent is assumed. The silent setting is for connections to file servers or packet analyzers. This setting allows PAgP to operate, to attach the port to a channel group, and to use the port for transmission.
· active--Enables LACP only if a LACP device is detected. It places the port into an active negotiating state in which the port starts negotiations with other ports by sending LACP packets.
· passive --Enables LACP on the port and places it into a passive negotiating state in which the port responds to LACP packets that it receives, but does not start LACP packet negotiation.
Returns to privileged EXEC mode.

Configuring EtherChannel Load-Balancing (CLI)
You can configure EtherChannel load-balancing to use one of several different forwarding methods. This task is optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 596

Layer 2/3

Configuring EtherChannel Load-Balancing (CLI)

SUMMARY STEPS

1. configure terminal 2. port-channel load-balance { dst-ip | dst-mac | dst-mixed-ip-port | dst-port | extended
[dst-ip | dst-mac | dst-port | ipv6-label | l3-proto | src-ip | src-mac | src-port ] | src-dst-ip | src-dst-mac src-dst-mixed-ip-port src-dst-portsrc-ip | src-mac | src-mixed-ip-port | src-port} 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

port-channel load-balance { dst-ip | dst-mac | Configures an EtherChannel load-balancing method.

dst-mixed-ip-port | dst-port | extended [dst-ip | The default is src-mac. dst-mac | dst-port | ipv6-label | l3-proto |

src-ip | src-mac | src-port ] | src-dst-ip | Select one of these load-distribution methods:

src-dst-mac src-dst-mixed-ip-port src-dst-portsrc-ip | src-mac | src-mixed-ip-port | src-port}

· dst-ip--Specifies destination-host IP address.

Example:

· dst-mac--Specifies the destination-host MAC address of the incoming packet.

Switch(config)# port-channel load-balance src-mac · dst-mixed-ip-port--Specifies the host IP address and TCP/UDP port.

· dst-port--Specifies the destination TCP/UDP port.

· extended--Specifies extended load balance methods--combinations of source and destination methods beyond those available with the standard command.

· ipv6-label--Specifies the IPv6 flow label.

· l3-proto--Specifies the Layer 3 protocol.

· src-dst-ip--Specifies the source and destination host IP address.

· src-dst-mac--Specifies the source and destination host MAC address.

· src-dst-mixed-ip-port--Specifies the source and destination host IP address and TCP/UDP port.

· src-dst-port--Specifies the source and destination TCP/UDP port.

· src-ip--Specifies the source host IP address.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 597

Configuring EtherChannel Extended Load-Balancing (CLI)

Layer 2/3

Command or Action

Step 3

end Example:
Switch(config)# end

Purpose · src-mac--Specifies the source MAC address of the incoming packet. · src-mixed-ip-port--Specifies the source host IP address and TCP/UDP port. · src-port--Specifies the source TCP/UDP port.
Returns to privileged EXEC mode.

Related Topics Load-Balancing and Forwarding Methods, on page 586 MAC Address Forwarding, on page 586 IP Address Forwarding, on page 587 Load-Balancing Advantages, on page 587 EtherChannel Configuration Guidelines, on page 590 Layer 2 EtherChannel Configuration Guidelines, on page 591 Default EtherChannel Configuration, on page 589 Layer 3 EtherChannel Configuration Guidelines, on page 592

Configuring EtherChannel Extended Load-Balancing (CLI)
Configure EtherChannel extended load-balancing when you want to use a combination of load-balancing methods. This task is optional.

SUMMARY STEPS

1. configure terminal 2. port-channel load-balance extended [ dst-ip | dst-mac dst-port | ipv6-label | l3-proto
| src-ip | src-mac | src-port ] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 598

Layer 2/3

Configuring the PAgP Learn Method and Priority (CLI)

Step 2 Step 3

Command or Action

Purpose

port-channel load-balance extended [ dst-ip |

Configures an EtherChannel extended load-balancing

dst-mac dst-port | ipv6-label | l3-proto | src-ip method.

| src-mac | src-port ]

The default is src-mac.

Example:

Select one of these load-distribution methods:

Switch(config)# port-channel load-balance extended dst-ip dst-mac src-ip

· dst-ip--Specifies destination-host IP address.
· dst-mac--Specifies the destination-host MAC address of the incoming packet.

· dst-port--Specifies the destination TCP/UDP port.

· ipv6-label--Specifies the IPv6 flow label.

· l3-proto--Specifies the Layer 3 protocol.

· src-ip--Specifies the source host IP address.

· src-mac--Specifies the source MAC address of the incoming packet.

· src-port--Specifies the source TCP/UDP port.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Configuring the PAgP Learn Method and Priority (CLI)
This task is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. pagp learn-method physical-port 4. pagp port-priority priority 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 599

Configuring LACP Hot-Standby Ports

Layer 2/3

Step 2

Command or Action interface interface-id Example:

Purpose
Specifies the port for transmission, and enters interface configuration mode.

Switch(config)# interface gigabitethernet 1/0/2

Step 3
Step 4 Step 5

pagp learn-method physical-port

Selects the PAgP learning method.

Example:

By default, aggregation-port learning is selected, which

means the switch sends packets to the source by using any

Switch(config-if)# pagp learn-method physical port of the ports in the EtherChannel. With aggregate-port

learning, it is not important on which physical port the

packet arrives.

Selects physical-port to connect with another switch that is a physical learner. Make sure to configure the port-channel load-balance global configuration command to src-mac.

The learning method must be configured the same at both ends of the link.

pagp port-priority priority Example:
Switch(config-if)# pagp port-priority 200

Assigns a priority so that the selected port is chosen for packet transmission.
For priority, the range is 0 to 255. The default is 128. The higher the priority, the more likely that the port will be used for PAgP transmission.

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Related Topics PAgP Learn Method and Priority, on page 583 EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Monitoring EtherChannel, PAgP, and LACP Status, on page 605 Layer 2 EtherChannel Configuration Guidelines, on page 591
Configuring LACP Hot-Standby Ports
When LACP is enabled, the software, by default, tries to configure the maximum number of LACP-compatible ports in a channel, up to a maximum of 16 ports. Only eight LACP links can be active at one time; the remaining eight links are placed in hot-standby mode. If one of the active links becomes inactive, a link that is in the hot-standby mode becomes active in its place.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 600

Layer 2/3

Configuring the LACP Max Bundle Feature (CLI)

You can override the default behavior by specifying the maximum number of active ports in a channel, in which case, the remaining ports become hot-standby ports. For example, if you specify a maximum of five ports in a channel, up to 11 ports become hot-standby ports.
If you configure more than eight links for an EtherChannel group, the software automatically decides which of the hot-standby ports to make active based on the LACP priority. To every link between systems that operate LACP, the software assigns a unique priority made up of these elements (in priority order):
· LACP system priority
· System ID (the switch MAC address)
· LACP port priority
· Port number
In priority comparisons, numerically lower values have higher priority. The priority decides which ports should be put in standby mode when there is a hardware limitation that prevents all compatible ports from aggregating.
Determining which ports are active and which are hot standby is a two-step procedure. First the system with a numerically lower system priority and system ID is placed in charge of the decision. Next, that system decides which ports are active and which are hot standby, based on its values for port priority and port number. The port priority and port number values for the other system are not used.
You can change the default values of the LACP system priority and the LACP port priority to affect how the software selects active and standby links.
Configuring the LACP Max Bundle Feature (CLI)
When you specify the maximum number of bundled LACP ports allowed in a port channel, the remaining ports in the port channel are designated as hot-standby ports.
Beginning in privileged EXEC mode, follow these steps to configure the maximum number of LACP ports in a port channel. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface port-channel channel-number 3. lacp max-bundle max-bundle-number 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface port-channel channel-number Example:

Enters interface configuration mode for a port channel. The range is 1 to 128.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 601

Configuring the Port Channel Min-Links Feature (CLI)

Layer 2/3

Command or Action
Switch(config)# interface port-channel 2

Step 3

lacp max-bundle max-bundle-number Example:
Switch(config-if)# lacp max-bundle 3

Step 4

end Example:
Switch(config)# end

Purpose
Specifies the maximum number of LACP ports in the port-channel bundle. The range is 1 to 8.
Returns to privileged EXEC mode.

Related Topics LACP and Link Redundancy , on page 585 Configuring LACP Hot-Standby Ports: Example, on page 607
Configuring the Port Channel Min-Links Feature (CLI)
You can specify the minimum number of active ports that must be in the link-up state and bundled in an EtherChannel for the port channel interface to transition to the link-up state.
Beginning in privileged EXEC mode, follow these steps to configure the minimum number of links that are required for a port channel. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface port-channel channel-number 3. port-channel min-links min-links-number 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface port-channel channel-number Example:
Switch(config)# interface port-channel 2

Enters interface configuration mode for a port-channel. For channel-number, the range is 1 to 128.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 602

Layer 2/3

Configuring the LACP System Priority (CLI)

Step 3

Command or Action port-channel min-links min-links-number Example:
Switch(config-if)# port-channel min-links 3

Step 4

end Example:
Switch(config)# end

Purpose Specifies the minimum number of member ports that must be in the link-up state and bundled in the EtherChannel for the port channel interface to transition to the link-up state. For min-links-number , the range is 2 to 8.
Returns to privileged EXEC mode.

Related Topics LACP and Link Redundancy , on page 585 Configuring LACP Hot-Standby Ports: Example, on page 607
Configuring the LACP System Priority (CLI)
You can configure the system priority for all the EtherChannels that are enabled for LACP by using the lacp system-priority global configuration command. You cannot configure a system priority for each LACP-configured channel. By changing this value from the default, you can affect how the software selects active and standby links.
You can use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby mode (denoted with an H port-state flag).
Beginning in privileged EXEC mode, follow these steps to configure the LACP system priority. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. lacp system-priority priority 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

lacp system-priority priority Example:
Switch(config)# lacp system-priority 32000

Configures the LACP system priority. The range is 1 to 65535. The default is 32768. The lower the value, the higher the system priority.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 603

Configuring the LACP Port Priority (CLI)

Layer 2/3

Step 3

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Related Topics EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Monitoring EtherChannel, PAgP, and LACP Status, on page 605
Configuring the LACP Port Priority (CLI)
By default, all ports use the same port priority. If the local system has a lower value for the system priority and the system ID than the remote system, you can affect which of the hot-standby links become active first by changing the port priority of LACP EtherChannel ports to a lower value than the default. The hot-standby ports that have lower port numbers become active in the channel first. You can use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby mode (denoted with an H port-state flag).

Note If LACP is not able to aggregate all the ports that are compatible (for example, the remote system might have more restrictive hardware limitations), all the ports that cannot be actively included in the EtherChannel are put in the hot-standby state and are used only if one of the channeled ports fails.
Beginning in privileged EXEC mode, follow these steps to configure the LACP port priority. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. lacp port-priority priority 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 604

Layer 2/3

Monitoring EtherChannel, PAgP, and LACP Status

Step 2

Command or Action interface interface-id Example:

Purpose
Specifies the port to be configured, and enters interface configuration mode.

Switch(config)# interface gigabitethernet 1/0/2

Step 3

lacp port-priority priority Example:
Switch(config-if)# lacp port-priority 32000

Configures the LACP port priority.
The range is 1 to 65535. The default is 32768. The lower the value, the more likely that the port will be used for LACP transmission.

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Related Topics EtherChannel Configuration Guidelines, on page 590 Default EtherChannel Configuration, on page 589 Layer 2 EtherChannel Configuration Guidelines, on page 591 Monitoring EtherChannel, PAgP, and LACP Status, on page 605

Monitoring EtherChannel, PAgP, and LACP Status

You can display EtherChannel, PAgP, and LACP status using the commands listed in this table.
Table 63: Commands for Monitoring EtherChannel, PAgP, and LACP Status

Command

Description

clear lacp { channel-group-number counters Clears LACP channel-group information and traffic

| counters }

counters.

clear pagp { channel-group-number counters Clears PAgP channel-group information and traffic

| counters }

counters.

show etherchannel [ channel-group-number { Displays EtherChannel information in a brief, detailed, detail | port | port-channel | protocol and one-line summary form. Also displays the | summary }] [ detail | load-balance | load-balance or frame-distribution scheme, port, port | port-channel | protocol | summary port-channel, and protocol information.
]

show pagp [ channel-group-number ] { counters Displays PAgP information such as traffic

| internal | neighbor }

information, the internal PAgP configuration, and

neighbor information.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 605

Configuration Examples for Configuring EtherChannels

Layer 2/3

Command

Description

show pagp [ channel-group-number ] dual-active Displays the dual-active detection status.

show lacp [ channel-group-number ] { counters | Displays LACP information such as traffic

internal | neighbor | sys-id}

information, the internal LACP configuration, and

neighbor information.

show running-config

Verifies your configuration entries.

show etherchannel load-balance

Displays the load balance or frame distribution scheme among ports in the port channel.

Related Topics Configuring the PAgP Learn Method and Priority (CLI), on page 599 PAgP Learn Method and Priority, on page 583 Configuring the LACP System Priority (CLI), on page 603 Configuring the LACP Port Priority (CLI), on page 604

Configuration Examples for Configuring EtherChannels

Configuring Layer 2 EtherChannels: Examples
This example shows how to configure an EtherChannel on a single switch in the stack. It assigns two ports as static-access ports in VLAN 10 to channel 5 with the PAgP mode desirable:
Switch# configure terminal Switch(config)# interface range gigabitethernet2/0/1 -2 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# channel-group 5 mode desirable non-silent Switch(config-if-range)# end

This example shows how to configure an EtherChannel on a single switch in the stack. It assigns two ports as static-access ports in VLAN 10 to channel 5 with the LACP mode active:
Switch# configure terminal Switch(config)# interface range gigabitethernet2/0/1 -2 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# channel-group 5 mode active Switch(config-if-range)# end

This example shows how to configure a cross-stack EtherChannel. It uses LACP passive mode and assigns two ports on stack member 1 and one port on stack member 2 as static-access ports in VLAN 10 to channel 5:
Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 606

Layer 2/3

Configuring Layer 3 EtherChannels: Examples

Switch(config)# interface range gigabitethernet2/0/4 -5 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# channel-group 5 mode passive Switch(config-if-range)# exit Switch(config)# interface gigabitethernet3/0/3 Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan 10 Switch(config-if)# channel-group 5 mode passive Switch(config-if)# exit
Configuring Layer 3 EtherChannels: Examples
This example shows how to configure a Layer 3 EtherChannel. It assigns two ports to channel 5 with the LACP mode active:
Switch# configure terminal Switch(config)# interface range gigabitethernet2/0/1 -2 Switch(config-if-range)# no ip address Switch(config-if-range)# no switchport Switch(config-if-range)# channel-group 5 mode active Switch(config-if-range)# end
This example shows how to configure a cross-stack Layer 3 EtherChannel. It assigns two ports on stack member 2 and one port on stack member 3 to channel 7 using LACP active mode:
Switch# configure terminal Switch(config)# interface range gigabitethernet2/0/4 -5 Switch(config-if-range)# no ip address Switch(config-if-range)# no switchport Switch(config-if-range)# channel-group 7 mode active Switch(config-if-range)# exit Switch(config)# interface gigabitethernet3/0/3 Switch(config-if)# no ip address Switch(config-if)# no switchport Switch(config-if)# channel-group 7 mode active Switch(config-if)# exit

Configuring LACP Hot-Standby Ports: Example
This example shows how to configure an Etherchannel (port channel 2) that will be active when there are at least three active ports, will comprise up to seven active ports and the remaining ports (up to nine) as hot-standby ports :
Switch# configure terminal Switch(config)# interface port-channel 2 Switch(config-if)# port-channel min-links 3 Switch(config-if)# lacp max-bundle 7

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 607

Additional References for EtherChannels

Layer 2/3

Related Topics Configuring the LACP Max Bundle Feature (CLI), on page 601 LACP and Link Redundancy , on page 585 Configuring the Port Channel Min-Links Feature (CLI), on page 602

Additional References for EtherChannels

Related Documents
Related Topic Layer 2 command reference

Document Title Layer 2/3 Command Reference (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 608

Layer 2/3

Feature Information for EtherChannels

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for EtherChannels
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 609

Feature Information for EtherChannels

Layer 2/3

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 610

3 2 C H A P T E R
Configuring Flex Links and the MAC Address-Table Move Update Feature
· Finding Feature Information, on page 611 · Restrictions for Configuring Flex Links and MAC Address-Table Move Update, on page 611 · Information About Flex Links and MAC Address-Table Move Update, on page 612 · How to Configure Flex Links and the MAC Address-Table Move Update Feature, on page 616 · Monitoring Flex Links, Multicast Fast Convergence, and MAC Address-Table Move Update, on page
621 · Configuration Examples for Flex Links, on page 622 · Additional References for Flex Links and MAC Address-Table Move Update, on page 626 · Feature Information for Flex Links and MAC Address-Table Move Update, on page 627
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Configuring Flex Links and MAC Address-Table Move Update
· Flex Links are supported only on Layer 2 ports and port channels. · You can configure up to 16 backup links. · You can configure only one Flex Links backup link for any active link, and it must be a different interface
from the active interface. · An interface can belong to only one Flex Links pair. An interface can be a backup link for only one active
link. An active link cannot belong to another Flex Links pair.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 611

Information About Flex Links and MAC Address-Table Move Update

Layer 2/3

· Neither of the links can be a port that belongs to an EtherChannel. However, you can configure two port channels (EtherChannel logical interfaces) as Flex Links, and you can configure a port channel and a physical interface as Flex Links, with either the port channel or the physical interface as the active link.
· A backup link does not have to be the same type (Gigabit Ethernet or port channel) as the active link. However, you should configure both Flex Links with similar characteristics so that there are no loops or changes in behavior if the standby link begins to forward traffic.
· STP is disabled on Flex Links ports. A Flex Links port does not participate in STP, even if the VLANs present on the port are configured for STP. When STP is not enabled, be sure that there are no loops in the configured topology.
· You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.

Information About Flex Links and MAC Address-Table Move Update

Flex Links

Flex Links are a pair of a Layer 2 interfaces (switch ports or port channels) where one interface is configured to act as a backup to the other. The feature provides an alternative solution to the Spanning Tree Protocol (STP). Users can disable STP and still retain basic link redundancy. Flex Links are typically configured in service provider or enterprise networks where customers do not want to run STP on the switch. If the switch is running STP, Flex Links are not necessary because STP already provides link-level redundancy or backup.
You configure Flex Links on one Layer 2 interface (the active link) by assigning another Layer 2 interface as the Flex Links or backup link. On switches, the Flex Links can be on the same switch or on another switch in the stack. When one of the links is up and forwarding traffic, the other link is in standby mode, ready to begin forwarding traffic if the other link shuts down. At any given time, only one of the interfaces is in the linkup state and forwarding traffic. If the primary link shuts down, the standby link starts forwarding traffic. When the active link comes back up, it goes into standby mode and does not forward traffic. STP is disabled on Flex Links interfaces.

Flex Links Configuration
In the following figure, ports 1 and 2 on switch A are connected to uplink switches B and C. Because they are configured as Flex Links, only one of the interfaces is forwarding traffic; the other is in standby mode. If port 1 is the active link, it begins forwarding traffic between port 1 and switch B; the link between port 2 (the backup link) and switch C is not forwarding traffic. If port 1 goes down, port 2 comes up and starts forwarding traffic to switch C. When port 1 comes back up, it goes into standby mode and does not forward traffic; port 2 continues forwarding traffic.
You can also configure a preemption function, specifying the preferred port for forwarding traffic. For example, you can configure the Flex Links pair with preemption mode. In the scenario shown, when port 1 comes back up and has more bandwidth than port 2, port 1 begins forwarding traffic after 60 seconds. Port 2 becomes the standby port. You do this by entering the switchport backup interface preemption mode bandwidth and switchport backup interface preemption delay interface configuration commands.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 612

Layer 2/3 Figure 44: Flex Links Configuration Example

VLAN Flex Links Load Balancing and Support

If a primary (forwarding) link goes down, a trap notifies the network management stations. If the standby link goes down, a trap notifies the users. Flex Links are supported only on Layer 2 ports and port channels, not on VLANs or on Layer 3 ports.
VLAN Flex Links Load Balancing and Support
VLAN Flex Links load balancing allows users to configure a Flex Links pair so that both ports simultaneously forward the traffic for some mutually exclusive VLANs. For example, if Flex Links ports are configured for 1 to 100 VLANs, the traffic of the first 50 VLANs can be forwarded on one port and the rest on the other port. If one of the ports fail, the other active port forwards all the traffic. When the failed port comes back up, it resumes forwarding traffic in the preferred VLANs. In addition to providing the redundancy, this Flex Links pair can be used for load balancing. Flex Links VLAN load balancing does not impose any restrictions on uplink switches.
Figure 45: VLAN Flex Links Load-Balancing Configuration Example
The following figure displays a VLAN Flex Links load-balancing
configuration.
Multicast Fast Convergence with Flex Links Failover
Multicast fast convergence reduces the multicast traffic convergence time after a Flex Links failure. Multicast fast convergence is implemented by a combination of learning the backup link as an mrouter port, generating IGMP reports, and leaking IGMP reports.
Learning the Other Flex Links Port as the mrouter Port
In a typical multicast network, there is a querier for each VLAN. A switch deployed at the edge of a network has one of its Flex Links ports receiving queries. Flex Links ports are also always forwarding at any given time. A port that receives queries is added as an mrouter port on the switch. An mrouter port is part of all the multicast groups learned by the switch. After a changeover, queries are received by the other Flex Links port.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 613

Generating IGMP Reports

Layer 2/3

The other Flex Links port is then learned as the mrouter port. After changeover, multicast traffic then flows through the other Flex Links port. To achieve faster convergence of traffic, both Flex Links ports are learned as mrouter ports whenever either Flex Links port is learned as the mrouter port. Both Flex Links ports are always part of multicast groups.
Although both Flex Links ports are part of the groups in normal operation mode, all traffic on the backup port is blocked. The normal multicast data flow is not affected by the addition of the backup port as an mrouter port. When the changeover happens, the backup port is unblocked, allowing the traffic to flow. In this case, the upstream multicast data flows as soon as the backup port is unblocked.
Generating IGMP Reports
When the backup link comes up after the changeover, the upstream new distribution switch does not start forwarding multicast data, because the port on the upstream router, which is connected to the blocked Flex Links port, is not part of any multicast group. The reports for the multicast groups were not forwarded by the downstream switch because the backup link is blocked. The data does not flow on this port, until it learns the multicast groups, which occurs only after it receives reports.
The reports are sent by hosts when a general query is received, and a general query is sent within 60 seconds in normal scenarios. When the backup link starts forwarding, to achieve faster convergence of multicast data, the downstream switch immediately sends proxy reports for all the learned groups on this port without waiting for a general query.
Leaking IGMP Reports
To achieve multicast traffic convergence with minimal loss, a redundant data path must be set up before the Flex Links active link goes down. This can be achieved by leaking only IGMP report packets on the Flex Links backup link. These leaked IGMP report messages are processed by upstream distribution routers, so multicast data traffic gets forwarded to the backup interface. Because all incoming traffic on the backup interface is dropped at the ingress of the access switch, no duplicate multicast traffic is received by the host. When the Flex Links active link fails, the access switch starts accepting traffic from the backup link immediately. The only disadvantage of this scheme is that it consumes bandwidth on the link between the distribution switches and on the backup link between the distribution and access switches. This feature is disabled by default and can be configured by using the switchport backup interface interface-id multicast fast-convergence command.
When this feature has been enabled at changeover, the switch does not generate the proxy reports on the backup port, which became the forwarding port.
MAC Address-Table Move Update
The MAC address-table move update feature allows the switch to provide rapid bidirectional convergence when a primary (forwarding) link goes down and the standby link begins forwarding traffic.
Figure 46: MAC Address-Table Move Update Example
In the following figure, switch A is an access switch, and ports 1 and 2 on switch A are connected to uplink switches B and D through a Flex Links pair. Port 1 is forwarding traffic, and port 2 is in the backup state. Traffic from the PC to the server is forwarded from port 1 to port 3. The MAC address of the PC has been

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 614

Layer 2/3

MAC Address-Table Move Update
learned on port 3 of switch C. Traffic from the server to the PC is forwarded from port 3 to port 1.

If the MAC address-table move update feature is not configured and port 1 goes down, port 2 starts forwarding traffic. However, for a short time, switch C keeps forwarding traffic from the server to the PC through port 3, and the PC does not get the traffic because port 1 is down. If switch C removes the MAC address of the PC on port 3 and relearns it on port 4, traffic can then be forwarded from the server to the PC through port 2. If the MAC address-table move update feature is configured and enabled on the switches, and port 1 goes down, port 2 starts forwarding traffic from the PC to the server. The switch sends a MAC address-table move update packet from port 2. Switch C gets this packet on port 4 and immediately learns the MAC address of the PC on port 4, which reduces the reconvergence time. You can configure the access switch, switch A, to send MAC address-table move update messages. You can also configure the uplink switches B, C, and D to get and process the MAC address-table move update messages. When switch C gets a MAC address-table move update message from switch A, switch C learns the MAC address of the PC on port 4. Switch C updates the MAC address table, including the forwarding table entry for the PC. Switch A does not need to wait for the MAC address-table update. The switch detects a failure on port 1 and immediately starts forwarding server traffic from port 2, the new forwarding port. This change occurs in less than 100 milliseconds (ms). The PC is directly connected to switch A, and the connection status does not change. Switch A does not need to update the PC entry in the MAC address table.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 615

Flex Links VLAN Load Balancing Configuration Guidelines

Layer 2/3

Flex Links VLAN Load Balancing Configuration Guidelines
· For Flex Links VLAN load balancing, you must choose the preferred VLANs on the backup interface. · You cannot configure a preemption mechanism and VLAN load balancing for the same Flex Links pair.
MAC Address-Table Move Update Configuration Guidelines
· You can enable and configure this feature on the access switch to send the MAC address-table move updates.
· You can enable and configure this feature on the uplink switches to get the MAC address-table move updates.
Default Flex Links and MAC Address-Table Move Update Configuration
· Flex Links is not configured, and there are no backup interfaces defined. · The preemption mode is off. · The preemption delay is 35 seconds. · The MAC address-table move update feature is not configured on the switch.

How to Configure Flex Links and the MAC Address-Table Move Update Feature

Configuring Flex Links (CLI)

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport backup interface interface-id 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 616

Layer 2/3

Configuring a Preemption Scheme for a Pair of Flex Links (CLI)

Step 2

Command or Action interface interface-id Example:
Switch(conf)# interface gigabitethernet1/0/1

Step 3

switchport backup interface interface-id Example:
Switch(conf-if)# switchport backup interface gigabitethernet1/0/2

Step 4

end Example:
Switch(conf-if)# end

Purpose Specifies the interface, and enters interface configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface).
Configures a physical Layer 2 interface (or port channel) as part of a Flex Links pair with the interface. When one link is forwarding traffic, the other interface is in standby mode.
Returns to privileged EXEC mode.

Configuring a Preemption Scheme for a Pair of Flex Links (CLI)

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport backup interface interface-id 4. switchport backup interface interface-id preemption mode [forced | bandwidth | off] 5. switchport backup interface interface-id preemption delay delay-time 6. end 7. show interface [interface-id] switchport backup 8. copy running-config startup config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode

Switch# configure terminal

Step 2

interface interface-id Example:
Switch(conf)# interface gigabitethernet1/0/1

Specifies the interface, and enters interface configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface). The port-channel range is 1 to 128.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 617

Configuring a Preemption Scheme for a Pair of Flex Links (CLI)

Layer 2/3

Step 3

Command or Action switchport backup interface interface-id Example:
Switch(conf-if)# switchport backup interface gigabitethernet1/0/2

Purpose
Configures a physical Layer 2 interface (or port channel) as part of a Flex Links pair with the interface. When one link is forwarding traffic, the other interface is in standby mode.

Step 4 Step 5

switchport backup interface interface-id preemption mode [forced | bandwidth | off] Example:
Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 preemption mode forced

Configures a preemption mechanism and delay for a Flex Links interface pair. You can configure the preemption as:
· forced--(Optional) The active interface always preempts the backup.
· bandwidth--(Optional) The interface with the higher bandwidth always acts as the active interface.
· off--(Optional) No preemption occurs from active to backup.

switchport backup interface interface-id preemption delay delay-time Example:
Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 preemption delay 50

Configures the time delay until a port preempts another port.
Note Setting a delay time only works with forced and bandwidth modes.

Step 6

end Example:
Switch(conf-if)# end

Returns to privileged EXEC mode.

Step 7

show interface [interface-id] switchport backup Example:
Switch# show interface gigabitethernet1/0/2 switchport backup

Verifies the configuration.

Step 8

copy running-config startup config Example:
Switch# copy running-config startup config

(Optional) Saves your entries in the switch startup configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 618

Layer 2/3

Configuring VLAN Load Balancing on Flex Links (CLI)

Configuring VLAN Load Balancing on Flex Links (CLI)

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport backup interface interface-id prefer vlan vlan-range 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:
Switch (config)# interface gigabitethernet2/0/6

Specifies the interface, and enters interface configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface). The port-channel range is 1 to 128.

Step 3

switchport backup interface interface-id prefer vlan vlan-range
Example:

Configures a physical Layer 2 interface (or port channel) as part of a Flex Links pair with the interface and specifies the VLANs carried on the interface. The VLAN ID range is 1 to 4094.

Switch (config-if)# switchport backup interface gigabitethernet2/0/8 prefer vlan 2

Step 4

end Example:
Switch (config-if)# end

Returns to privileged EXEC mode.

Configuring MAC Address-Table Move Update (CLI)

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. Use one of the following:
· switchport backup interface interface-id · switchport backup interface interface-id mmu primary vlan vlan-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 619

Configuring MAC Address-Table Move Update (CLI)

Layer 2/3

4. end 5. mac address-table move update transmit 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:
Switch#interface gigabitethernet1/0/1

Specifies the interface, and enters interface configuration mode. The interface can be a physical Layer 2 interface or a port channel (logical interface). The port-channel range is 1 to 128.

Step 3 Step 4

Use one of the following: · switchport backup interface interface-id · switchport backup interface interface-id mmu primary vlan vlan-id
Example:
Switch(config-if)# switchport backup interface gigabitethernet0/2 mmu primary vlan 2
end Example:

Configures a physical Layer 2 interface (or port channel), as part of a Flex Links pair with the interface. The MAC address-table move update VLAN is the lowest VLAN ID on the interface.
Configure a physical Layer 2 interface (or port channel) and specifies the VLAN ID on the interface, which is used for sending the MAC address-table move update.
When one link is forwarding traffic, the other interface is in standby mode.
Returns to global configuration mode.

Switch(config-if)# end

Step 5

mac address-table move update transmit Example:
Switch(config)# mac address-table move update transmit

Enables the access switch to send MAC address-table move updates to other switches in the network if the primary link goes down and the switch starts forwarding traffic through the standby link.

Step 6

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 620

Layer 2/3

Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages (CLI)

Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages (CLI)

SUMMARY STEPS

1. configure terminal 2. mac address-table move update receive 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode

Switch# configure terminal

Step 2

mac address-table move update receive Example:

Enables the switch to obtain and processes the MAC address-table move updates.

Switch (config)# mac address-table move update receive

Step 3

end Example:
Switch (config)# end

Returns to privileged EXEC mode.

Monitoring Flex Links, Multicast Fast Convergence, and MAC Address-Table Move Update

Command

Purpose

show interface [interface-id] switchport backup

Displays the Flex Links backup interface configured for an interface or all the configured Flex Links and the state of each active and backup interface (up or standby mode).

show ip igmp profile address-table move update Displays the specified IGMP profile or all the IGMP

profile-id

profiles defined on the switch.

show mac address-table move update

Displays the MAC address-table move update information on the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 621

Configuration Examples for Flex Links

Layer 2/3

Configuration Examples for Flex Links
Configuring Flex Links: Examples
This example shows how to verify the configuration after you configure an interface with a backup interface:
Switch# show interface switchport backup
Switch Backup Interface Pairs: Active Interface Backup Interface State -----------------------------------------------------------------------GigabitEthernet1/0/1 GigabitEthernet1/0/2 Active Up/Backup Standby
This example shows how to verify the configuration after you configure the preemption mode as forced for a backup interface pair:
Switch# show interface switchport backup detail
Switch Backup Interface Pairs:
Active Interface Backup Interface State -----------------------------------------------------------------------GigabitEthernet1/0/211 GigabitEthernet1/0/2 Active Up/Backup Standby Interface Pair : Gi1/0/1, Gi1/0/2 Preemption Mode : forced Preemption Delay : 50 seconds Bandwidth : 100000 Kbit (Gi1/0/1), 100000 Kbit (Gi1/0/2) Mac Address Move Update Vlan : auto

Configuring VLAN Load Balancing on Flex Links: Examples
In the following example, VLANs 1 to 50, 60, and 100 to 120 are configured on the switch:

Switch(config)# interface gigabitethernet 2/0/6 Switch(config-if)# switchport backup interface gigabitethernet 2/0/8 prefer vlan 60,100-120

When both interfaces are up, Gi2/0/8 forwards traffic for VLANs 60 and 100 to 120 and Gi2/0/6 forwards traffic for VLANs 1 to 50.

Switch# show interfaces switchport backup

Switch Backup Interface Pairs:

Active Interface

Backup Interface

State

------------------------------------------------------------------------

GigabitEthernet2/0/6 GigabitEthernet2/0/8 Active Up/Backup Standby

Vlans Preferred on Active Interface: 1-50 Vlans Preferred on Backup Interface: 60, 100-120

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 622

Layer 2/3

Configuring the MAC Address-Table Move Update: Examples

When a Flex Links interface goes down (LINK_DOWN), VLANs preferred on this interface are moved to the peer interface of the Flex Links pair. In this example, if interface Gi2/0/6 goes down, Gi2/0/8 carries all VLANs of the Flex Links pair.

Switch# show interfaces switchport backup

Switch Backup Interface Pairs:

Active Interface

Backup Interface

State

------------------------------------------------------------------------

GigabitEthernet2/0/6 GigabitEthernet2/0/8 Active Down/Backup Up

Vlans Preferred on Active Interface: 1-50 Vlans Preferred on Backup Interface: 60, 100-120

When a Flex Links interface comes up, VLANs preferred on this interface are blocked on the peer interface and moved to the forwarding state on the interface that has just come up. In this example, if interface Gi2/0/6 comes up, VLANs preferred on this interface are blocked on the peer interface Gi2/0/8 and forwarded on Gi2/0/6.

Switch# show interfaces switchport backup

Switch Backup Interface Pairs:

Active Interface

Backup Interface

State

------------------------------------------------------------------------

GigabitEthernet2/0/6 GigabitEthernet2/0/8 Active Up/Backup Standby

Vlans Preferred on Active Interface: 1-50 Vlans Preferred on Backup Interface: 60, 100-120

Switch# show interfaces switchport backup detail

Switch Backup Interface Pairs:

Active Interface

Backup Interface

State

------------------------------------------------------------------------

FastEthernet1/0/3

FastEthernet1/0/4

Active Down/Backup Up

Vlans Preferred on Active Interface: 1-2,5-4094 Vlans Preferred on Backup Interface: 3-4 Preemption Mode : off Bandwidth : 10000 Kbit (Fa1/0/3), 100000 Kbit (Fa1/0/4) Mac Address Move Update Vlan : auto

Configuring the MAC Address-Table Move Update: Examples
This example shows how to verify the configuration after you configure an access switch to send MAC address-table move updates:
Switch# show mac address-table move update
Switch-ID : 010b.4630.1780 Dst mac-address : 0180.c200.0010 Vlans/Macs supported : 1023/8320 Default/Current settings: Rcv Off/On, Xmt Off/On Max packets per min : Rcv 40, Xmt 60

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 623

Configuring Multicast Fast Convergence with Flex Links Failover: Examples

Layer 2/3

Rcv packet count : 5 Rcv conforming packet count : 5 Rcv invalid packet count : 0 Rcv packet count this min : 0 Rcv threshold exceed count : 0 Rcv last sequence# this min : 0 Rcv last interface : Po2 Rcv last src-mac-address : 000b.462d.c502 Rcv last switch-ID : 0403.fd6a.8700 Xmt packet count : 0 Xmt packet count this min : 0 Xmt threshold exceed count : 0 Xmt pak buf unavail cnt : 0 Xmt last interface : None

Configuring Multicast Fast Convergence with Flex Links Failover: Examples
These are configuration examples for learning the other Flex Links port as the mrouter port when Flex Links is configured on GigabitEthernet1/0/11 and GigabitEthernet1/0/12, and output for the show interfaces switchport backup command:

Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface GigabitEthernet1/0/11 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport mode trunk Switch(config-if)# switchport backup interface GigabitEthernet1/0/12 Switch(config-if)# exit Switch(config)# interface GigabitEthernet1/0/12 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport mode trunk Switch(config-if)# end Switch# show interfaces switchport backup detail Switch Backup Interface Pairs: Active Interface Backup Interface State GigabitEthernet1/0/11 GigabitEthernet1/0/12 Active Up/Backup Standby Preemption Mode : off Multicast Fast Convergence : Off Bandwidth : 100000 Kbit (Gi1/0/11), 100000 Kbit (Gi1/0/12) Mac Address Move Update Vlan : auto

This output shows a querier for VLANs 1 and 401, with their queries reaching the switch through GigabitEthernet1/0/11:

Switch# show ip igmp snooping querier

Vlan IP Address

IGMP Version

Port

-------------------------------------------------------------

1

1.1.1.1

v2

Gi1/0/11

401 41.41.41.1

v2

Gi1/0/11

This example is output for the show ip igmp snooping mrouter command for VLANs 1 and 401:

Switch# show ip igmp snooping mrouter
Vlan ports ---- -----

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 624

Layer 2/3

Configuring Multicast Fast Convergence with Flex Links Failover: Examples

1

Gi1/0/11(dynamic), Gi1/0/12(dynamic)

401 Gi1/0/11(dynamic), Gi1/0/12(dynamic)

Similarly, both Flex Links ports are part of learned groups. In this example, GigabitEthernet2/0/11 is a receiver/host in VLAN 1, which is interested in two multicast groups:

Switch# show ip igmp snooping groups
Vlan Group Type Version Port List ----------------------------------------------------------------------1 228.1.5.1 igmp v2 Gi1/0/11, Gi1/0/12, Gi2/0/11 1 228.1.5.2 igmp v2 Gi1/0/11, Gi1/0/12, Gi2/0/11

When a host responds to the general query, the switch forwards this report on all the mrouter ports. In this example, when a host sends a report for the group 228.1.5.1, it is forwarded only on GigabitEthernet1/0/11, because the backup port GigabitEthernet1/0/12 is blocked. When the active link, GigabitEthernet1/0/11, goes down, the backup port, GigabitEthernet1/0/12, begins forwarding.
As soon as this port starts forwarding, the switch sends proxy reports for the groups 228.1.5.1 and 228.1.5.2 on behalf of the host. The upstream router learns the groups and starts forwarding multicast data. This is the default behavior of Flex Links. This behavior changes when the user configures fast convergence using the switchport backup interface gigabitEthernet 1/0/12 multicast fast-convergence command. This example shows turning on this feature:

Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface gigabitEthernet 1/0/11 Switch(config-if)# switchport backup interface gigabitEthernet 1/0/12 multicast fast-convergence Switch(config-if)# exit Switch# show interfaces switchport backup detail

Switch Backup Interface Pairs:

Active

Interface

Backup Interface State

------------------------------------------------------------------------

GigabitEthernet1/0/11 GigabitEthernet1/0/12 Active Up/Backup Standby

Preemption Mode : off

Multicast Fast Convergence : On

Bandwidth : 100000 Kbit (Gi1/0/11), 100000 Kbit (Gi1/0/12)

Mac Address Move Update Vlan : auto

This output shows a querier for VLAN 1 and 401 with their queries reaching the switch through GigabitEthernet1/0/11:

Switch# show ip igmp snooping querier

Vlan IP Address

IGMP Version

Port

-------------------------------------------------------------

1

1.1.1.1

v2

Gi1/0/11

401 41.41.41.1

v2

Gi1/0/11

This is output for the show ip igmp snooping mrouter command for VLAN 1 and 401:

Switch# show ip igmp snooping mrouter Vlan ports

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 625

Additional References for Flex Links and MAC Address-Table Move Update

Layer 2/3

---- ----1 Gi1/0/11(dynamic), Gi1/0/12(dynamic) 401 Gi1/0/11(dynamic), Gi1/0/12(dynamic)
Similarly, both the Flex Links ports are a part of the learned groups. In this example, GigabitEthernet2/0/11 is a receiver/host in VLAN 1, which is interested in two multicast groups:
Switch# show ip igmp snooping groups
Vlan Group Type Version Port List ----------------------------------------------------------------------1 228.1.5.1 igmp v2 Gi1/0/11, Gi1/0/12, Gi2/0/11 1 228.1.5.2 igmp v2 Gi1/0/11, Gi1/0/12, Gi2/0/11
Whenever a host responds to the general query, the switch forwards this report on all the mrouter ports. When you turn on this feature through the command-line port, and when a report is forwarded by the switch on GigabitEthernet1/0/11, it is also leaked to the backup port GigabitEthernet1/0/12. The upstream router learns the groups and starts forwarding multicast data, which is dropped at the ingress because GigabitEthernet1/0/12 is blocked. When the active link, GigabitEthernet1/0/11, goes down, the backup port, GigabitEthernet1/0/12, begins forwarding. You do not need to send any proxy reports as the multicast data is already being forwarded by the upstream router. By leaking reports to the backup port, a redundant multicast path has been set up, and the time taken for the multicast traffic convergence is very minimal.

Additional References for Flex Links and MAC Address-Table Move Update

Related Documents

Related Topic Layer 2 command reference

Document Title Layer 2/3 Command Reference (Catalyst 3650 Switches)

switchport backup interface command Interface and Hardware Component Command Reference (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 626

Layer 2/3

Feature Information for Flex Links and MAC Address-Table Move Update

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for Flex Links and MAC Address-Table Move Update

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 627

Feature Information for Flex Links and MAC Address-Table Move Update

Layer 2/3

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 628

3 3 C H A P T E R
Configuring UniDirectional Link Detection
· Finding Feature Information, on page 629 · Restrictions for Configuring UDLD, on page 629 · Information About UDLD, on page 630 · How to Configure UDLD, on page 632 · Monitoring and Maintaining UDLD, on page 635 · Additional References for UDLD, on page 635 · Feature Information for UDLD, on page 636
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Configuring UDLD
The following are restrictions for configuring UniDirectional Link Detection (UDLD): · A UDLD-capable port cannot detect a unidirectional link if it is connected to a UDLD-incapable port of another switch. · When configuring the mode (normal or aggressive), make sure that the same mode is configured on both sides of the link.
Caution Loop guard works only on point-to-point links. We recommend that each end of the link has a directly connected device that is running STP.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 629

Information About UDLD

Layer 2/3

Information About UDLD
UniDirectional Link Detection (UDLD) is a Layer 2 protocol that enables devices connected through fiber-optic or twisted-pair Ethernet cables to monitor the physical configuration of the cables and detect when a unidirectional link exists. All connected devices must support UDLD for the protocol to successfully identify and disable unidirectional links. When UDLD detects a unidirectional link, it disables the affected port and alerts you. Unidirectional links can cause a variety of problems, including spanning-tree topology loops.

Modes of Operation
UDLD supports two modes of operation: normal (the default) and aggressive. In normal mode, UDLD can detect unidirectional links due to misconnected ports on fiber-optic connections. In aggressive mode, UDLD can also detect unidirectional links due to one-way traffic on fiber-optic and twisted-pair links and to misconnected ports on fiber-optic links.
In normal and aggressive modes, UDLD works with the Layer 1 mechanisms to learn the physical status of a link. At Layer 1, autonegotiation takes care of physical signaling and fault detection. UDLD performs tasks that autonegotiation cannot perform, such as detecting the identities of neighbors and shutting down misconnected ports. When you enable both autonegotiation and UDLD, the Layer 1 and Layer 2 detections work together to prevent physical and logical unidirectional connections and the malfunctioning of other protocols.
A unidirectional link occurs whenever traffic sent by a local device is received by its neighbor but traffic from the neighbor is not received by the local device.

Normal Mode

In normal mode, UDLD detects a unidirectional link when fiber strands in a fiber-optic port are misconnected and the Layer 1 mechanisms do not detect this misconnection. If the ports are connected correctly but the traffic is one way, UDLD does not detect the unidirectional link because the Layer 1 mechanism, which is supposed to detect this condition, does not do so. In this case, the logical link is considered undetermined, and UDLD does not disable the port.
When UDLD is in normal mode, if one of the fiber strands in a pair is disconnected, as long as autonegotiation is active, the link does not stay up because the Layer 1 mechanisms detects a physical problem with the link. In this case, UDLD does not take any action and the logical link is considered undetermined.
Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634

Aggressive Mode
In aggressive mode, UDLD detects a unidirectional link by using the previous detection methods. UDLD in aggressive mode can also detect a unidirectional link on a point-to-point link on which no failure between the two devices is allowed. It can also detect a unidirectional link when one of these problems exists:
· On fiber-optic or twisted-pair links, one of the ports cannot send or receive traffic.
· On fiber-optic or twisted-pair links, one of the ports is down while the other is up.
· One of the fiber strands in the cable is disconnected.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 630

Layer 2/3

Methods to Detect Unidirectional Links

In these cases, UDLD disables the affected port.
In a point-to-point link, UDLD hello packets can be considered as a heart beat whose presence guarantees the health of the link. Conversely, the loss of the heart beat means that the link must be shut down if it is not possible to reestablish a bidirectional link.
If both fiber strands in a cable are working normally from a Layer 1 perspective, UDLD in aggressive mode detects whether those fiber strands are connected correctly and whether traffic is flowing bidirectionally between the correct neighbors. This check cannot be performed by autonegotiation because autonegotiation operates at Layer 1.
Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634
Methods to Detect Unidirectional Links
UDLD operates by using two methods:
· Neighbor database maintenance
· Event-driven detection and echoing
Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634
Neighbor Database Maintenance
UDLD learns about other UDLD-capable neighbors by periodically sending a hello packet (also called an advertisement or probe) on every active port to keep each device informed about its neighbors.
When the switch receives a hello message, it caches the information until the age time (hold time or time-to-live) expires. If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the new one.
Whenever a port is disabled and UDLD is running, whenever UDLD is disabled on a port, or whenever the switch is reset, UDLD clears all existing cache entries for the ports affected by the configuration change. UDLD sends at least one message to inform the neighbors to flush the part of their caches affected by the status change. The message is intended to keep the caches synchronized.
Event-Driven Detection and Echoing
UDLD relies on echoing as its detection operation. Whenever a UDLD device learns about a new neighbor or receives a resynchronization request from an out-of-sync neighbor, it restarts the detection window on its side of the connection and sends echo messages in reply. Because this behavior is the same on all UDLD neighbors, the sender of the echoes expects to receive an echo in reply.
If the detection window ends and no valid reply message is received, the link might shut down, depending on the UDLD mode. When UDLD is in normal mode, the link might be considered undetermined and might not be shut down. When UDLD is in aggressive mode, the link is considered unidirectional, and the port is disabled.
Related Topics Enabling UDLD Globally (CLI), on page 632

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 631

UDLD Reset Options

Layer 2/3

Enabling UDLD on an Interface (CLI), on page 634
UDLD Reset Options
If an interface becomes disabled by UDLD, you can use one of the following options to reset UDLD: · The udld reset interface configuration command.
· The shutdown interface configuration command followed by the no shutdown interface configuration command restarts the disabled port.
· The no udld {aggressive | enable} global configuration command followed by the udld {aggressive | enable} global configuration command reenables the disabled ports.
· The no udld port interface configuration command followed by the udld port [aggressive] interface configuration command reenables the disabled fiber-optic port.
· The errdisable recovery cause udld global configuration command enables the timer to automatically recover from the UDLD error-disabled state, and the errdisable recovery interval interval global configuration command specifies the time to recover from the UDLD error-disabled state.
Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634

Default UDLD Configuration

Table 64: Default UDLD Configuration

Feature

Default Setting

UDLD global enable state

Globally disabled

UDLD per-port enable state for fiber-optic media Disabled on all Ethernet fiber-optic ports

UDLD per-port enable state for twisted-pair (copper) Disabled on all Ethernet 10/100 and 1000BASE-TX

media

ports

UDLD aggressive mode

Disabled

Related Topics Enabling UDLD Globally (CLI), on page 632 Enabling UDLD on an Interface (CLI), on page 634

How to Configure UDLD

Enabling UDLD Globally (CLI)
Follow these steps to enable UDLD in the aggressive or normal mode and to set the configurable message timer on all fiber-optic ports on the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 632

Layer 2/3

Enabling UDLD Globally (CLI)

SUMMARY STEPS

1. configure terminal 2. udld {aggressive | enable | message time message-timer-interval} 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

udld {aggressive | enable | message time message-timer-interval} Example:
Switch(config)# udld enable message time 10

Specifies the UDLD mode of operation:
· aggressive--Enables UDLD in aggressive mode on all fiber-optic ports.
· enable--Enables UDLD in normal mode on all fiber-optic ports on the switch. UDLD is disabled by default.
An individual interface configuration overrides the setting of the udld enable global configuration command.
· message time message-timer-interval--Configures the period of time between UDLD probe messages on ports that are in the advertisement phase and are detected to be bidirectional. The range is from 1 to 90 seconds; the default value is 15.
Note This command affects fiber-optic ports only. Use the udld interface configuration command to enable UDLD on other port types.

Step 3

end Example:
Switch(config)# end

Use the no form of this command, to disable UDLD. Returns to privileged EXEC mode.

Related Topics Monitoring and Maintaing UDLD Aggressive Mode, on page 630 Normal Mode, on page 630

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 633

Enabling UDLD on an Interface (CLI)

Layer 2/3

Methods to Detect Unidirectional Links, on page 631 Event-Driven Detection and Echoing, on page 631 UDLD Reset Options, on page 632 Default UDLD Configuration, on page 632

Enabling UDLD on an Interface (CLI)
Follow these steps either to enable UDLD in the aggressive or normal mode or to disable UDLD on a port.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. udld port [aggressive] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Specifies the port to be enabled for UDLD, and enters interface configuration mode.

Step 3

udld port [aggressive] Example:
Switch(config-if)# udld port aggressive

Step 4

end Example:
Switch(config-if)# end

UDLD is disabled by default. · udld port--Enables UDLD in normal mode on the specified port.
· udld port aggressive--(Optional) Enables UDLD in aggressive mode on the specified port.
Note Use the no udld port interface configuration command to disable UDLD on a specified fiber-optic port.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 634

Layer 2/3

Monitoring and Maintaining UDLD

Related Topics Monitoring and Maintaing UDLD Aggressive Mode, on page 630 Normal Mode, on page 630 Methods to Detect Unidirectional Links, on page 631 Event-Driven Detection and Echoing, on page 631 UDLD Reset Options, on page 632 Default UDLD Configuration, on page 632

Monitoring and Maintaining UDLD

Command show udld [interface-id | neighbors]

Purpose
Displays the UDLD status for the specified port or for all ports.

Additional References for UDLD

Related Documents Related Topic Layer 2 command reference

Document Title
Layer 2/3 Command Reference (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 635

Feature Information for UDLD

Layer 2/3

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for UDLD
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 636

V I I PA R T
Lightweight Access Point
· Configuring the Switch for Access Point Discovery, on page 639 · Configuring Data Encryption, on page 647 · Configuring Retransmission Interval and Retry Count, on page 651 · Configuring Adaptive Wireless Intrusion Prevention System, on page 657 · Configuring Authentication for Access Points, on page 663 · Converting Autonomous Access Points to Lightweight Mode, on page 673 · Using Cisco Workgroup Bridges, on page 685 · Configuring Probe Request Forwarding, on page 689 · Optimizing RFID Tracking, on page 691 · Configuring Country Codes, on page 695 · Configuring Link Latency, on page 701 · Configuring Power over Ethernet, on page 711

3 4 C H A P T E R
Configuring the Switch for Access Point Discovery
· Finding Feature Information, on page 639 · Prerequisites for Configuring the Switch for Access Point Discovery, on page 639 · Restrictions for Configuring the Switch for Access Point Discovery, on page 640 · Information About Configuring the Switch for Access Point Discovery, on page 640 · How to Configure Access Point Discovery, on page 642 · Configuration Examples for Configuring the Switch for Access Point Discovery, on page 645
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring the Switch for Access Point Discovery
· Ensure that the Control and Provisioning of Wireless Access Points (CAPWAP) UDP ports 5246 and 5247 (similar to the Lightweight Access Point Protocol (LWAPP) UDP ports 12222 and 12223) are enabled and are not blocked by an intermediate device that could prevent an access point from joining the switch.
· If access control lists (ACLs) are in the control path between the switch and its access points, you must open new protocol ports to prevent access points from being stranded.
· If an access point is in the UP state and its IP address changes, the access point tears down the existing CAPWAP tunnel and rejoins the switch.
· Access points must be discovered by a switch before they can become an active part of the network. The lightweight access points support the following switch discovery processes:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 639

Restrictions for Configuring the Switch for Access Point Discovery

Lightweight Access Point

· Layer 3 CAPWAP discovery--You can enable this feature on different subnets from the access point. This feature uses IP addresses and UDP packets rather the MAC addresses used by Layer 2 discovery.
· Locally stored switch IP address discovery--If the access point was previously associated to a switch, the IP addresses of the primary, secondary, and tertiary switchs are stored in the access point's nonvolatile memory. This process of storing switch IP addresses on an access point for later deployment is called priming the access point.
· DHCP server discovery--This feature uses DHCP option 43 to provide switch IP addresses to the access points. Cisco switches support a DHCP server option that is typically used for this capability.
· DNS discovery--The access point can discover switchs through your domain name server (DNS). You must configure your DNS to return switch IP addresses in response to CISCO-CAPWAP-CONTROLLER.localdomain, where localdomain is the access point domain name. When an access point receives an IP address and DNS information from a DHCP server, it contacts the DNS to resolve CISCO-CAPWAP-CONTROLLER.localdomain. When the DNS sends a list of switch IP addresses, the access point sends discovery requests to the switchs.
Restrictions for Configuring the Switch for Access Point Discovery
· Ensure that the switchs are configured with the correct date and time. If the date and time configured on the switch precedes the creation and installation date of certificates on the access points, the access point fails to join the switch.
· During the discovery process, access points that are supported by the Cisco switch, such as the 1140, 1260, 3500, 1040,1600, 2600, or 3600 query only for Cisco switchs.
Information About Configuring the Switch for Access Point Discovery
In a CAPWAP environment, a lightweight access point discovers a switch by using CAPWAP discovery mechanisms and then sends a CAPWAP join request to the switch. The switch sends a CAPWAP join response to the access point that allows the access point to join the switch. When the access point joins the switch, the switch manages its configuration, firmware, control transactions, and data transactions.
Access Point Communication Protocols
Cisco lightweight access points use the IETF standard CAPWAP to communicate with the switch and other lightweight access points on the network. CAPWAP, which is based on LWAPP, is a standard, interoperable protocol that enables a switch to manage a collection of wireless access points. CAPWAP is implemented in switch for these reasons:
· To provide an upgrade path from Cisco products that use LWAPP to next-generation Cisco products that use CAPWAP

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 640

Lightweight Access Point

Viewing Access Point Join Information

· To manage RFID readers and similar devices
· To enable switchs to interoperate with third-party access points in the future
Viewing Access Point Join Information
Join statistics for an access point that sends a CAPWAP discovery request to the switch at least once are maintained on the switch even if the access point is rebooted or disconnected. These statistics are removed only when the switch is rebooted or when you choose to clear the statistics.
Troubleshooting the Access Point Join Process
Access points can fail to join a switch for many reasons such as a RADIUS authorization is pending, self-signed certificates are not enabled on the switch, the access point and switch's regulatory domains do not match, and so on.
You can configure the access points to send all CAPWAP-related errors to a syslog server. You do not need to enable any debug commands on the switch because all of the CAPWAP error messages can be viewed from the syslog server itself.
The state of the access point is not maintained on the switch until it receives a CAPWAP join request from the access point, so it can be difficult to determine why the CAPWAP discovery request from a certain access point was rejected. In order to troubleshoot such joining issues without enabling CAPWAP debug commands on the switch, the switch collects information for all access points that send a discovery message to this switch and maintains information for any access points that have successfully joined this switch.
The switch collects all join-related information for each access point that sends a CAPWAP discovery request to the switch. Collection begins when the first discovery message is received from the access point and ends when the last configuration payload is sent from the switch to the access point.
When the switch is maintaining join-related information for the maximum number of access points, it does not collect information for any more access points.
You can also configure a DHCP server to return a syslog server IP address to the access point using option 7 on the server. The access point then starts sending all syslog messages to this IP address.
You can configure the syslog server IP address through the access point CLI, if the access point is not connected to the switch by entering the capwap ap log-server syslog_server_IP_address command.
When the access point joins a switch for the first time, the switch pushes the global syslog server IP address (the default is 255.255.255.255) to the access point. After that, the access point sends all syslog messages to this IP address, until it is overridden by one of the following scenarios:
· The access point is still connected to the same switch, and you changed the global syslog server IP address configuration on the switch by using the ap syslog host Syslog_Server_IP_Address command. In this case, the switch pushes the new global syslog server IP address to the access point.
· The access point is still connected to the same switch, and you configured a specific syslog server IP address for the access point on the switch by using the ap name Cisco_AP syslog host Syslog_Host_IP_Address command. In this case, the switch pushes the new specific syslog server IP address to the access point.
· The access point gets disconnected from the switch, and you configured the syslog server IP address from the access point CLI by using the capwap ap log-server syslog_server_IP_address command. This command works only if the access point is not connected to any switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 641

How to Configure Access Point Discovery

Lightweight Access Point

· The access point gets disconnected from the switch and joins another switch. In this case, the new switch pushes its global syslog server IP address to the access point.
Whenever a new syslog server IP address overrides the existing syslog server IP address, the old address is erased from persistent storage, and the new address is stored in its place. The access point also starts sending all syslog messages to the new IP address, if the access point can reach the syslog server IP address.

How to Configure Access Point Discovery

Configuring the Syslog Server for Access Points (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ap syslog host host_ip_address 4. end 5. show ap config global 6. show ap name Cisco_AP config general

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

ap syslog host host_ip_address
Example:
Switch(config)# ap syslog host 10.9.9.16

Purpose Enters privileged EXEC mode.
Enters global configuration mode.
Configures the global syslog server for all access points that join this switch. Note By default, the global syslog server IP address
for all access points is 255.255.255.255. Make sure that the access points can reach the subnet on which the syslog server resides before configuring the syslog server on the switch. If the access points cannot reach this subnet, the access points are unable to send out syslog messages.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 642

Lightweight Access Point

Monitoring Access Point Join Information (CLI)

Step 5 Step 6

Command or Action show ap config global Example:
Switch# show ap config global
show ap name Cisco_AP config general Example:
Switch# show ap name AP03 config general

Purpose Displays the global syslog server settings for all access points that join the switch.
Displays the syslog server settings for a specific access point.

Monitoring Access Point Join Information (CLI)

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. enable 2. show ap join stats summary 3. show ap mac-address mac_address join stats summary 4. show ap mac-address mac_address join stats detailed 5. clear ap join statistics

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

show ap join stats summary Example:
Switch# show ap join stats summary

Step 3

show ap mac-address mac_address join stats summary
Example:
Switch# show ap mac-address 000.2000.0400 join stats summary

Step 4

show ap mac-address mac_address join stats detailed
Example:
Switch# show ap mac-address 000.2000.0400 join stats detailed

Purpose Enters privileged EXEC mode.
Displays the MAC addresses of all the access points that are joined to the switch or that have tried to join.
Displays all the statistics for the AP including the last join error detail.
Displays all join-related statistics collected for a specific access point.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 643

Searching for Access Point Radios (GUI)

Lightweight Access Point

Step 5

Command or Action clear ap join statistics Example:
Switch# clear ap join statistics

Purpose
Clears the join statistics for all access points.
Note To clear the join statistics that correspond to specific access points, enter the clear ap mac-address mac_address join statistics command.

Related Topics Displaying the MAC Addresses of all Access Points: Example, on page 645 DHCP Option 43 for Lightweight Cisco Aironet Access Points Configuration Example, on page 646
Searching for Access Point Radios (GUI)

Step 1
Step 2 Step 3

Choose Monitor > Wireless > Access Points and click 802.11a/n/ac Statistics or 802.11b/g/n Statistics. The 802.11 Radio pages are displayed. These pages show all of the 802.11a/n/ac or 802.11b/g/n access point radios that are associated with the switch and their current settings. Note In a Cisco converged access environment, the 802.11a/n/ac and 802.11b/g/n radios should not be differentiated
based on their Base Radio MAC addresses, because they might have the same addresses. Instead, the radios should be differentiated based on their physical addresses.
From the Show drop-down list, choose Quick Filter. The filter options (text boxes) appear in each of the column header in the table.
Enter a keyword in the corresponding text boxes to specify the filter criteria based on which you want to search, and click the Filter icon.

Monitoring the Interface Details (GUI)

Step 1 Step 2 Step 3

Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed showing a list of access points that are associated with the switch. Click the access point name. The AP > Edit page is displayed. Click the Interface tab. The interface details are displayed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 644

Lightweight Access Point

Configuration Examples for Configuring the Switch for Access Point Discovery

Configuration Examples for Configuring the Switch for Access Point Discovery

Displaying the MAC Addresses of all Access Points: Example

This example shows how to display MAC addresses of all the access points that are joined to the switch:
Switch# show ap join stats summary Number of APs.......................................... 4

Base Mac

EthernetMac

AP Name IP Address Status

----------------- ----------------- ------- ------------- ----------

00:0b:85:57:bc:c0 00:0b:85:57:bc:c0 AP1130 10.10.163.217 Joined

00:1c:0f:81:db:80 00:1c:63:23:ac:a0 AP1140 10.10.163.216 Not joined

00:1c:0f:81:fc:20 00:1b:d5:9f:7d:b2 AP1

10.10.163.215 Joined

00:21:1b:ea:36:60 00:0c:d4:8a:6b:c1 AP2

10.10.163.214 Not joined

This example shows how to display the last join error details for a specific access point:

Switch# show ap mac-address 000.2000.0400 join stats summary Is the AP currently connected to controller................ Yes Time at which the AP joined this controller last time................................. Aug 21 12:50:36.061 Type of error that occurred last.................. AP got or has been disconnected Reason for error that occurred last........... The AP has been reset by the controller Time at which the last join error occurred......... Aug 21 12:50:34.374

This example shows how to display all join-related statistics collected for a specific access point:

Switch# show ap mac-address 000.2000.0400 join stats detailed Discovery phase statistics - Discovery requests received........................ 2 - Successful discovery responses sent................ 2 - Unsuccessful discovery request processing.......... 0 - Reason for last unsuccessful discovery attempt..... Not applicable - Time at last successful discovery attempt.......... Aug 21 12:50:23.335 - Time at last unsuccessful discovery attempt........ Not applicable

Join phase statistics

- Join requests received............................. 1

- Successful join responses sent..................... 1

- Unsuccessful join request processing............... 1

- Reason for last unsuccessful join attempt.....

RADIUS authorization

is pending

for the AP

- Time at last successful join attempt............... Aug 21 12:50:34.481

- Time at last unsuccessful join attempt............. Aug 21 12:50:34.374

Configuration phase statistics - Configuration requests received..................... 1 - Successful configuration responses sent............. 1 - Unsuccessful configuration request processing....... 0 - Reason for last unsuccessful configuration attempt.. Not applicable - Time at last successful configuration attempt....... Aug 21 12:50:34.374 - Time at last unsuccessful configuration attempt..... Not applicable

Last AP message decryption failure details

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 645

DHCP Option 43 for Lightweight Cisco Aironet Access Points Configuration Example

Lightweight Access Point

- Reason for last message decryption failure.......... Not applicable
Last AP disconnect details - Reason for last AP connection failure............... The AP has been reset by
the controller Last join error summary - Type of error that occurred last.................... AP got or has been
disconnected - Reason for error that occurred last................. The AP has been reset
by the controller - Time at which the last join error occurred.......... Aug 21 12:50:34.374
DHCP Option 43 for Lightweight Cisco Aironet Access Points Configuration Example
For more information about the AP join process, see DHCP OPTION 43 for Lightweight Cisco Aironet Access Points Configuration Example at http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a00808714fe.shtml.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 646

3 5 C H A P T E R
Configuring Data Encryption
· Finding Feature Information, on page 647 · Prerequisites for Configuring Data Encryption, on page 647 · Restrictions for Configuring Data Encryption, on page 647 · Information About Data Encryption, on page 648 · How to Configure Data Encryption, on page 648 · Configuration Examples for Configuring Data Encryption, on page 649
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring Data Encryption
· Cisco 1260, 3500, 3600, 801, 1140, 1310, and 1520 series access points support Datagram Transport Layer Security (DTLS) data encryption.
· You can use the switch to enable or disable DTLS data encryption for a specific access point or for all access points.
· Non-Russian customers who use the Cisco switch do not need a data DTLS license.
Restrictions for Configuring Data Encryption
· Encryption limits throughput at both the switch and the access point, and maximum throughput is desired for most enterprise networks.
· If your switch does not have a data DTLS license and if the access point associated with the switch has DTLS enabled, the data path will be unencrypted.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 647

Information About Data Encryption

Lightweight Access Point

· In images that do not have a DTLS license, the DTLS commands are not available.

Information About Data Encryption
The switch enables you to encrypt Control and Provisioning of Wireless Access Points (CAPWAP) control packets (and optionally, CAPWAP data packets) that are sent between the access point and the switch using DTLS. DTLS is a standards-track Internet Engineering Task Force (IETF) protocol based on TLS. CAPWAP control packets are management packets exchanged between a switch and an access point while CAPWAP data packets encapsulate forwarded wireless frames. CAPWAP control and data packets are sent over separate UDP ports: 5246 (control) and 5247 (data). If an access point does not support DTLS data encryption, DTLS is enabled only for the control plane, and a DTLS session for the data plane is not established.

How to Configure Data Encryption

Configuring Data Encryption (CLI)

SUMMARY STEPS

1. configure terminal 2. ap link-encryption 3. end 4. show ap link-encryption 5. show wireless dtls connections

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap link-encryption Example:
Switch(config)# ap link-encryption

Step 3 Step 4

end Example:
Switch(config)# end
show ap link-encryption Example:

Purpose Enters global configuration mode.
Enables data encryption for all access points or a specific access point by entering this command. The default value is disabled. Changing the data encryption mode requires the access points to rejoin the switch. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Displays the encryption state of all access points or a specific access point. This command also shows authentication errors, which track the number of integrity

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 648

Lightweight Access Point

Configuring Data Encryption (GUI)

Command or Action
Switch# show ap link-encryption

Step 5

show wireless dtls connections
Example:
Switch# show wireless dtls connections

Purpose check failures and replay errors. Relay errors help in tracking the number of times the access point receives the same packet.
Displays a summary of all active DTLS connections.
Note If you experience any problems with DTLS data encryption, enter the debug dtls ap {all | event | trace} command to debug all DTLS messages, events, or traces.

Related Topics Displaying Data Encryption States for all Access Points: Examples, on page 649
Configuring Data Encryption (GUI)

Step 1
Step 2
Step 3 Step 4
Step 5 Step 6

Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed. Click the name of the access point for which you want to enable data encryption. The AP > Edit page is displayed. Click the Advanced tab. Select or unselect the Data Encryption check box. Note Changing the data encryption mode requires the access points to reassociate with the switch.
Click Apply. Click Save Configuration.

Configuration Examples for Configuring Data Encryption

Displaying Data Encryption States for all Access Points: Examples

This example shows how to display the encryption state of all access points or a specific access point. This command also shows authentication errors, which track the number of integrity check failures and replay errors. Relay errors help in tracking the number of times the access point receives the same packet:

Switch# show ap link-encryption

Encryption Dnstream

AP Name

State

Count

------------------ ---------- --------

3602a

Enabled

0

Upstream Count
-------0

Last Update ------
Never

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 649

Displaying Data Encryption States for all Access Points: Examples

Lightweight Access Point

This example shows how to display a summary of all active DTLS connections:

Switch# show wireless dtls connections

AP Name

Local Port Peer IP

Peer Port Ciphersuite

--------------- ------------ ------------- ---------- --------------------

3602a

Capwap_Ctrl 10.10.21.213 46075

TLS_RSA_WITH_AES_128_CBC_SHA

3602a

Capwap_Data 10.10.21.213 46075

TLS_RSA_WITH_AES_128_CBC_SHA

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 650

3 6 C H A P T E R
Configuring Retransmission Interval and Retry Count
· Finding Feature Information, on page 651 · Prerequisites for Configuring the Access Point Retransmission Interval and Retry Count, on page 651 · Information About Retransmission Interval and Retry Count, on page 652 · How to Configure Access Point Retransmission Interval and Retry Count, on page 652 · Viewing CAPWAP Maximum Transmission Unit Information (CLI), on page 654 · Viewing CAPWAP Maximum Transmission Unit Information (GUI), on page 655 · Configuration Examples for Configuring Access Point Retransmission Interval and Retry Count, on page
655
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring the Access Point Retransmission Interval and Retry Count
· You can configure the retransmission intervals and retry count both at a global and a specific access point level. A global configuration applies these configuration parameters to all the access points. Alternatively, when you configure the retransmission level and retry count at a specific access point level, the values are applied to that particular access point. The access point specific configuration has a higher precedence than the global configuration.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 651

Information About Retransmission Interval and Retry Count

Lightweight Access Point

Information About Retransmission Interval and Retry Count
The switch and the access points exchange packets using the Control and Provisioning of Wireless Access Points (CAPWAP) reliable transport protocol. For each request, a response is defined. This response is used to acknowledge the receipt of the request message. Response messages are not explicitly acknowledged; therefore, if a response message is not received, the original request message is retransmitted after the retransmit interval. If the request is not acknowledged after a maximum number of retransmissions, the session is closed and the access points reassociate with another switch.

How to Configure Access Point Retransmission Interval and Retry Count

Configuring the Access Point Retransmission Interval and Retry Count (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ap capwap retransmit interval interval_time 4. ap capwap retransmit count count_value 5. end 6. ap name Cisco_AP capwap retransmit interval interval_time 7. ap name Cisco_AP capwap retransmit count count_value 8. show ap capwap retransmit

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Purpose Enters privileged EXEC mode.

Step 2

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 3

ap capwap retransmit interval interval_time Example:
Switch(config)# ap capwap retransmit interval 2

Configures the control packet retransmit interval for all access points globally.
Note The range for the interval parameter is from 2 to 5.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 652

Lightweight Access Point

Configuring the Access Point Retransmission Interval and Retry Count (GUI)

Step 4 Step 5 Step 6
Step 7 Step 8

Command or Action ap capwap retransmit count count_value Example:
Switch(config)# ap capwap retransmit count 3
end Example:
Switch(config)# end
ap name Cisco_AP capwap retransmit interval interval_time Example:
Switch# ap name AP02 capwap retransmit interval 2
ap name Cisco_AP capwap retransmit count count_value Example:
Switch# ap name AP02 capwap retransmit count 3
show ap capwap retransmit Example:
Switch# show ap capwap retransmit

Purpose Configures the control packet retry count for all access points globally. Note The range for the count is from 3 to 8.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Configures the control packet retransmit interval for the individual access point that you specify. Note The range for the interval is from 2 to 5. Note You must be in privileged EXEC mode to use
the ap name commands.
Configures the control packet retry count for the individual access point that you specify. Note The range for the retry count is from 3 to 8.
Displays the CAPWAP retransmit details.

Configuring the Access Point Retransmission Interval and Retry Count (GUI)
Procedure · Global configuration applicable to all APs: a) Choose Configuration > Wireless > Access Points > Global AP Configuration. The Global Configuration page is displayed. b) In the AP Retransmit Config Parameters area, enter the values for the following parameters: · AP Retransmit Count--Number of times you want the access point to retransmit the request to the switch. The valid range is between 3 and 8. · AP Retransmit Interval--Duration between the retransmission of requests. The valid range is between 2 and 5.
c) Click Apply. d) Click Save Configuration. · Configuration that is applicable to a specific AP: a) Choose Configuration > Wireless > Access Points > All APs.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 653

Viewing CAPWAP Maximum Transmission Unit Information (CLI)

Lightweight Access Point

The All APs page is displayed with a list of access points.
b) Click the access point name. The AP > Edit page is displayed.
c) Click the Advanced tab. d) In the AP Retransmit Config Parameters area, enter the values for the following AP Retransmit
Count and AP Retransmit Interval parameters: · AP Retransmit Count--Number of times you want the access point to retransmit the request to the switch. The valid range is between 3 and 8.
· AP Retransmit Interval--Duration between the retransmission of requests. The valid range is between 2 and 5.
e) Click Apply. f) Click Save Configuration.

Viewing CAPWAP Maximum Transmission Unit Information (CLI)

SUMMARY STEPS

1. enable 2. show ap name Cisco_AP config general

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Purpose Enters privileged EXEC mode.

Step 2

show ap name Cisco_AP config general
Example:
Switch# show ap name Maria-1250 config general | include MTU

Displays the maximum transmission unit (MTU) for the CAPWAP path on the switch. The MTU specifies the maximum size of any packet (in bytes) in a transmission.

Related Topics Viewing the CAPWAP Retransmission Details: Example, on page 655 Viewing Maximum Transmission Unit Information: Example, on page 655

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 654

Lightweight Access Point

Viewing CAPWAP Maximum Transmission Unit Information (GUI)

Viewing CAPWAP Maximum Transmission Unit Information (GUI)

Step 1 Step 2 Step 3

Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed. Click the AP name. The AP > Edit page is displayed. Click the Advanced tab. The CAPWAP MTU field shows the CAPWAP maximum retransmission unit information.

Configuration Examples for Configuring Access Point Retransmission Interval and Retry Count

Viewing the CAPWAP Retransmission Details: Example

Enter the following command:
Switch# show ap capwap retransmit Global control packet retransmit interval : 3 Global control packet retransmit count : 5

AP Name

Retransmit Interval

Retransmit Count

--------------------------------- -------------------------------

--------------------------------

3602a

5

3

Viewing Maximum Transmission Unit Information: Example
This example shows how to view the maximum transmission unit (MTU) for the CAPWAP path on the switch. The MTU specifies the maximum size of any packet (in bytes) in a transmission:
Switch# show ap name cisco-ap-name config general | include MTU CAPWAP Path MTU.................................. 1500

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 655

Viewing Maximum Transmission Unit Information: Example

Lightweight Access Point

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 656

3 7 C H A P T E R
Configuring Adaptive Wireless Intrusion Prevention System
· Finding Feature Information, on page 657 · Prerequisites for Configuring wIPS, on page 657 · How to Configure wIPS on Access Points, on page 657 · Monitoring wIPS Information, on page 659 · Configuration Examples for Configuring wIPS on Access Points, on page 660
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring wIPS
· The regular local mode access point has been extended with a subset of Wireless Intrusion Prevention System (wIPS) capabilities. This feature enables you to deploy your access points to provide protection without needing a separate overlay network.

How to Configure wIPS on Access Points

Configuring wIPS on an Access Point (CLI)

SUMMARY STEPS

1. ap name Cisco_AP mode local 2. ap name Cisco_AP dot11 5ghz shutdown

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 657

Configuring wIPS on an Access Point (CLI)

Lightweight Access Point

3. ap name Cisco_AP dot11 24ghz shutdown 4. ap name Cisco_AP mode monitor submode wips 5. ap name Cisco_AP monitor-mode wips-optimized 6. show ap dot11 24ghz monitor 7. ap name Cisco_AP no dot11 5ghz shutdown 8. ap name Cisco_AP no dot11 24ghz shutdown

DETAILED STEPS

Step 1

Command or Action ap name Cisco_AP mode local Example:
Switch# ap name AP01 mode local

Step 2

ap name Cisco_AP dot11 5ghz shutdown Example:

Purpose
Configures an access point for monitor mode.
A message appears that indicates that changing the AP's mode causes the access point to reboot. This message also displays a prompt that enables you to specify whether or not you want to continue with changing the AP mode. Enter y at the prompt to continue.
Disables the 802.11a radio on the access point.

Step 3

Switch# ap name AP01 dot11 5ghz shutdown
ap name Cisco_AP dot11 24ghz shutdown Example:

Disables the 802.11b radio on the access point.

Step 4

Switch# ap name AP02 dot11 24ghz shutdown

ap name Cisco_AP mode monitor submode wips
Example:
Switch# ap name AP01 mode monitor submode wips

Configures the wIPS submode on the access point.
Note To disable wIPS on the access point, enter the ap name Cisco_AP modemonitor submode none command.

Step 5

ap name Cisco_AP monitor-mode wips-optimized
Example:
Switch# ap name AP01 monitor-mode wips-optimized

Enables wIPS optimized channel scanning for the access point.
The access point scans each channel for 250 milliseconds. It derives the list of channels to be scanned from the monitor configuration. You can choose the following options:
· All--All channels supported by the access point's radio.
· Country--Only the channels supported by the access point's country of operation.
· DCA--Only the channel set used by the dynamic channel assignment (DCA) algorithm, which by default includes all of the nonoverlapping channels allowed in the access point's country of operation.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 658

Lightweight Access Point

Configuring wIPS on an Access Point (GUI)

Step 6

Command or Action show ap dot11 24ghz monitor Example:
Switch# show ap dot11 24ghz monitor

Step 7 Step 8

ap name Cisco_AP no dot11 5ghz shutdown Example:
Switch# ap name AP01 no dot11 5ghz shutdown
ap name Cisco_AP no dot11 24ghz shutdown Example:
Switch# ap name AP01 no dot11 24ghz shutdown

Purpose Displays the monitor configuration channel set. Note The 802.11b Monitor Channels value in the
output of the command indicates the monitor configuration channel set. Enables the 802.11a radio on the access point.
Enables the 802.11b radio on the access point.

Configuring wIPS on an Access Point (GUI)

Step 1
Step 2
Step 3
Step 4 Step 5 Step 6

Choose Configuration > Wireless > Access Points > All APs The All APs page is displayed.
Click the access point name. The AP > Edit page is displayed.
From the AP Mode drop-down list, choose one of the following options to configure the AP mode parameters: · Local · Monitor
From the AP Sub Mode drop-down list, choose WIPS. Click Apply. Click Save Configuration.

Monitoring wIPS Information

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. show ap name Cisco_AP config general

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 659

Configuration Examples for Configuring wIPS on Access Points

Lightweight Access Point

2. show ap monitor-mode summary 3. show wireless wps wips summary 4. show wireless wps wips statistics 5. clear wireless wips statistics

DETAILED STEPS

Step 1

Command or Action show ap name Cisco_AP config general Example:
Switch# show ap name AP01 config general

Step 2

show ap monitor-mode summary Example:
Switch# show ap monitor-mode summary

Step 3

show wireless wps wips summary Example:
Switch# show wireless wps wips summary

Step 4

show wireless wps wips statistics Example:
Switch# show wireless wps wips statistics

Step 5

clear wireless wips statistics Example:
Switch# clear wireless wips statistics

Purpose Displays information on the wIPS submode on the access point.
Displays the wIPS optimized channel scanning configuration on the access point.
Displays the wIPS configuration forwarded by NCS or Prime to the switch.
Displays the current state of wIPS operation on the switch.
Clears the wIPS statistics on the switch.

Related Topics Displaying the Monitor Configuration Channel Set: Example, on page 660 Displaying wIPS Information: Examples, on page 661

Configuration Examples for Configuring wIPS on Access Points

Displaying the Monitor Configuration Channel Set: Example
This example shows how to display the monitor configuration channel set:
Switch# show ap dot11 24ghz monitor Default 802.11b AP monitoring 802.11b Monitor Mode........................... enable 802.11b Monitor Channels....................... Country channels 802.11b AP Coverage Interval................... 180 seconds 802.11b AP Load Interval....................... 60 seconds 802.11b AP Noise Interval...................... 180 seconds 802.11b AP Signal Strength Interval............ 60 seconds

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 660

Lightweight Access Point

Displaying wIPS Information: Examples

Displaying wIPS Information: Examples

This example shows how to display information on the wIPS submode on the access point:

Switch# show ap name AP01 config general Cisco AP Identifier.............. 3 Cisco AP Name.................... AP1131:46f2.98ac ... AP Mode ......................... Monitor Public Safety ................... Disabled Disabled AP SubMode ...................... WIPS

This example shows how to display the wIPS optimized channel scanning configuration on the access point:

Switch# show ap monitor-mode summary

AP Name

Ethernet MAC Status Scanning

Channel

List

------------- -------------- -------- ---------

AP1131:4f2.9a 00:16:4:f2:9:a WIPS

1,6,NA,NA

This example shows how to display the wIPS configuration forwarded by WCS to the switch:

Switch# show wireless wps wips summary Policy Name.............. Default Policy Version........... 3

This example shows how to display the current state of wIPS operation on the switch:

Switch# show wireless wps wips statistics Policy Assignment Requests............ 1 Policy Assignment Responses........... 1 Policy Update Requests................ 0 Policy Update Responses............... 0 Policy Delete Requests................ 0 Policy Delete Responses............... 0 Alarm Updates......................... 13572 Device Updates........................ 8376 Device Update Requests................ 0 Device Update Responses............... 0 Forensic Updates...................... 1001 Invalid WIPS Payloads................. 0 Invalid Messages Received............. 0 CAPWAP Enqueue Failed................. 0 NMSP Enqueue Failed................... 0 NMSP Transmitted Packets.............. 22950 NMSP Transmit Packets Dropped......... 0 NMSP Largest Packet................... 1377

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 661

Displaying wIPS Information: Examples

Lightweight Access Point

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 662

3 8 C H A P T E R
Configuring Authentication for Access Points
· Finding Feature Information, on page 663 · Prerequisites for Configuring Authentication for Access Points, on page 663 · Restrictions for Configuring Authentication for Access Points, on page 664 · Information about Configuring Authentication for Access Points, on page 664 · How to Configure Authentication for Access Points, on page 664 · Configuration Examples for Configuring Authentication for Access Points, on page 672
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring Authentication for Access Points
· You can set a global username, password, and enable password for all access points that are currently joined to the switch and any that join in the future inherit as they join the switch. If desired, you can override the global credentials and assign a unique username, password, and enable password for a specific access point.
· After an access point joins the switch, the access point enables console port security, and you are prompted for your username and password whenever you log into the access point's console port. When you log in, you are in nonprivileged mode, and you must enter the enable password in order to use the privileged mode.
· The global credentials that you configure on the switch are retained across switch and access point reboots. They are overwritten only if the access point joins a new switch that is configured with a global username and password. If the new switch is not configured with global credentials, the access point retains the global username and password configured for the first switch.
· You must track the credentials used by the access points. Otherwise, you might not be able to log into an access point's console port. If you need to return the access points to the default Cisco/Cisco username
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 663

Restrictions for Configuring Authentication for Access Points

Lightweight Access Point

and password, you must clear the switch's configuration and the access point's configuration to return them to factory-default settings. To reset the default access point configuration, enter the ap name Cisco_AP mgmtuser username Cisco password Cisco command. Entering the command does not clear the static IP address of the access point. Once the access point rejoins a switch, it adopts the default Cisco/Cisco username and password.
· You can configure global authentication settings for all access points that are currently joined to the switch and any that join in the future. If desired, you can override the global authentication settings and assign unique authentication settings for a specific access point.
· This feature is supported on the following hardware:
· All Cisco switches that support authentication.
· Cisco Aironet 1140, 1260, 1310, 1520, 1600, 2600, 3500, and 3600 access points

Restrictions for Configuring Authentication for Access Points
· The switch name in the AP configuration is case sensitive. Therefore, make sure to configure the exact system name on the AP configuration. Failure to do this results in the AP fallback not working.

Information about Configuring Authentication for Access Points
Cisco IOS access points are shipped from the factory with Cisco as the default enable password. This password allows users to log into the nonprivileged mode and enter the show and debug commands that pose a security threat to your network. You must change the default enable password to prevent unauthorized access and to enable users to enter configuration commands from the access point's console port.
You can configure 802.1X authentication between a lightweight access point and a Cisco switch. The access point acts as an 802.1X supplicant and is authenticated by the switch where it uses EAP-FAST with anonymous PAC provisioning.

How to Configure Authentication for Access Points

Configuring Global Credentials for Access Points (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ap mgmtuser username user_name password 0 passsword secret 0 secret_value 4. end 5. ap name Cisco_AP mgmtuser username user_name password password secret secret 6. show ap summary 7. show ap name Cisco_AP config general

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 664

Lightweight Access Point

Configuring Global Credentials for Access Points (CLI)

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Purpose Enters privileged EXEC mode.

Step 2

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 3

ap mgmtuser username user_name password 0 passsword secret 0 secret_value
Example:
Switch(config)# ap mgmtuser apusr1 password appass 0 secret 0 appass1

Configures the global username and password and enables the password for all access points that are currently joined to the switch and any access points that join the switch in the future. In the command, the parameter 0 specifies that an unencrypted password will follow and 8 specifies that an AES encrypted password will follow.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Step 5

ap name Cisco_AP mgmtuser username user_name Overrides the global credentials for a specific access point

password password secret secret

and assigns a unique username and password and enables

Example:

password to this access point.

Switch(config)# ap name TSIM_AP-2 mgmtuser apusr1 password appass secret secret

The credentials that you enter in this command are retained across switch and access point reboots and if the access

point joins a new switch.

Note If you want to force this access point to use the switch's global credentials, enter the ap name Cisco_AP no mgmtuser command. The following message appears after you execute this command: "AP reverted to global username configuration."

Step 6

show ap summary Example:

Displays a summary of all connected Cisco APs.

Step 7

Switch# show ap summary
show ap name Cisco_AP config general Example:
Switch# show ap name AP02 config general

Displays the global credentials configuration for a specific access point.
Note If this access point is configured for global credentials, the AP User Mode text boxes shows "Automatic." If the global credentials have been overwritten for this access point, the AP User Mode text box shows "Customized."

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 665

Configuring Global Credentials for Access Points (GUI)

Lightweight Access Point

Configuring Global Credentials for Access Points (GUI)

Step 1 Step 2
Step 3 Step 4 Step 5

Choose Configuration > Wireless > Access Points > Global AP Configuration. The Global Configuration page is displayed.
In the Login Credentials area, enter the following parameters: · User Name · Password · Confirm Password · Secret Password · Confirm Secret Password
The password should contain characters from at least three of the following classes: lowercase letters, uppercase letters, digits, and special characters. No character in the password can be repeated more than three times consecutively. The password should not contain the management username or the reverse of the username. The password should not contain words like Cisco, oscic, admin, nimda or any variant obtained by changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for s.
Click Apply. The global username and password are applied to all the access points that are associated with the switches
Click Save Configuration. (Optional) You can override the global credentials for a specific access point and assign a unique username and password by following these steps: a) Choose Configuration > Wireless > Access Points > All APs.
The All APs page is displayed. b) Click the name of an access point.
The AP > Edit page is displayed. c) Click the Credentials tab. d) In the Login Credentials area, select the Over-ride Global Credentials check box. e) Enter the values for the following parameters:
· Username · Password · Enable Password
f) Click Apply. g) Click Save Configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 666

Lightweight Access Point

Configuring Authentication for Access Points (CLI)

Configuring Authentication for Access Points (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ap dot1x username user_name_value password 0 password_value 4. end 5. ap name Cisco_AP dot1x-user username username_value password password_value 6. configure terminal 7. no ap dot1x username user_name_value password 0 password_value 8. end 9. show ap summary 10. show ap name Cisco_AP config general

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Purpose Enters privileged EXEC mode.

Step 2

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 3

ap dot1x username user_name_value password 0 Configures the global authentication username and

password_value

password for all access points that are currently joined to

Example:

the switch and any access points that join the switch in the future. This command contains the following keywords

Switch(config)# ap dot1x username AP3 password 0 and arguments:
password

· username--Specifies an 802.1X username for all

access points.

· user-id--Username.

· password--Specifies an 802.1X password for all access points.

· 0--Specifies an unencrypted password.

· 8--Specifies an AES encrypted password.

· passwd--Password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 667

Configuring Authentication for Access Points (CLI)

Lightweight Access Point

Step 4 Step 5
Step 6 Step 7

Command or Action

Purpose
Note You must enter a strong password for the password parameter. Strong passwords are at least eight characters long, contain a combination of uppercase and lowercase letters, numbers, and symbols, and are not a word in any language.

end Example:
Switch(config)# end
ap name Cisco_AP dot1x-user username username_value password password_value Example:
Switch# ap name AP03 dot1x-user username apuser1 password appass

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Overrides the global authentication settings and assigns a unique username and password to a specific access point. This command contains the following keywords and arguments:
· username--Specifies to add a username. · user-id--Username. · password--Specifies to add a password. · 0--Specifies an unencrypted password. · 8--Specifies an AES encrypted password. · passwd--Password.

Note You must enter a strong password for the password parameter. See the note in Step 2 for the characteristics of strong passwords.

The authentication settings that you enter in this command are retained across switch and access point reboots and whenever the access point joins a new switch.

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

no ap dot1x username user_name_value password Disables 802.1X authentication for all access points or for

0 password_value

a specific access point.

Example:
Switch(config)# no ap dot1x username dot1xusr password 0 dot1xpass

The following message appears after you execute this command: "AP reverted to global username configuration."
Note You can disable 802.1X authentication for a specific access point only if global 802.1X authentication is not enabled. If global 802.1X authentication is enabled, you can disable 802.1X for all access points only.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 668

Lightweight Access Point

Configuring Authentication for Access Points (GUI)

Step 8 Step 9

Command or Action end Example:
Switch(config)# end
show ap summary Example:
Switch# show ap summary

Step 10

show ap name Cisco_AP config general Example:
Switch# show ap name AP02 config general

Purpose
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Displays the authentication settings for all access points that join the switch. Note If global authentication settings are not
configured, the Global AP Dot1x User Name text box shows "Not Configured."
Displays the authentication settings for a specific access point. Note If this access point is configured for global
authentication, the AP Dot1x User Mode text boxes shows "Automatic." If the global authentication settings have been overwritten for this access point, the AP Dot1x User Mode text box shows "Customized."

Related Topics Displaying the Authentication Settings for Access Points: Examples, on page 672
Configuring Authentication for Access Points (GUI)

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6

Choose Configuration > Wireless > Access Points > Global AP Configuration. The Global Configuration page is displayed.
In the 802.1x Supplicant Credentials area, select the Credentials Required check box. Enter the username and password details. Note You must enter a strong password in these text boxes. Strong passwords have the following characteristics:
· They are at least eight characters long · They contain a combination of uppercase and lowercase letters, numbers, and symbols · They are not a word in any language
Click Apply. Click Save Configuration. (Optional) You can override the global configuration and assign a unique username and password to a specific access point by following these steps: a) Choose Configuration > Wireless > Access Points > All APs.
The All APs page is displayed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 669

Configuring the Switch for Authentication (CLI)

Lightweight Access Point

Step 7
Step 8 Step 9 Step 10 Step 11 Step 12

Click the name of an access point. The AP > Edit is displayed.
Click the Credentials tab. In the 802.1x Supplicant Credentials area, select the Over-ride Global Credentials check box. Enter the username and password details. Click Apply. Click Save Configuration.

Configuring the Switch for Authentication (CLI)

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. enable 2. configure terminal 3. dot1x system-auth-control 4. aaa new-model 5. aaa authentication dot1x default group radius 6. radius-server host host_ip_adress acct-port port_number auth-port port_number key 0
unencryptied_server_key 7. interface TenGigabitEthernet1/0/1 8. switch mode access 9. dot1x pae authenticator 10. end

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

dot1x system-auth-control Example:
Switch(config)# dot1x system-auth-control

Purpose Enters privileged EXEC mode.
Enters global configuration mode.
Enables system authentication control.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 670

Lightweight Access Point

Configuring the Switch for Authentication (CLI)

Step 4 Step 5 Step 6
Step 7 Step 8 Step 9 Step 10

Command or Action aaa new-model Example:
Switch(config)# aaa new-model
aaa authentication dot1x default group radius Example:
Switch(config)# aaa authentication dot1x default group radius
radius-server host host_ip_adress acct-port port_number auth-port port_number key 0 unencryptied_server_key Example:
Switch(config)# radius-server host 10.1.1.1 acct-port 1813 auth-port 6225 key 0
encryptkey
interface TenGigabitEthernet1/0/1 Example:
Switch(config)# interface TenGigabitEthernet1/0/1
switch mode access Example:
Switch(config-if)# switch mode access
dot1x pae authenticator Example:
Switch(config-if)# dot1x pae authenticator
end Example:
Switch(config)# end

Purpose Enables new access control commands and functions.
Sets the default authentications lists for IEEE 802.1X by using all the radius hosts in a server group.
Sets a clear text encryption key for the RADIUS authentication server.
Sets the 10-Gigbit Ethernet interface. The command prompt changes from Controller(config)# to Controller(config-if)#. Sets the unconditional truncking mode access to the interface.
Sets the 802.1X interface PAE type as the authenticator.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Displaying the Authentication Settings for Access Points: Examples, on page 672

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 671

Configuration Examples for Configuring Authentication for Access Points

Lightweight Access Point

Configuration Examples for Configuring Authentication for Access Points
Displaying the Authentication Settings for Access Points: Examples
This example shows how to display the authentication settings for all access points that join the switch:
Switch# show ap summary Number of APs.................................... 1 Global AP User Name.............................. globalap Global AP Dot1x User Name........................ globalDot1x
This example shows how to display the authentication settings for a specific access point:
Switch# show ap name AP02 config dot11 24ghz general Cisco AP Identifier.............................. 0 Cisco AP Name.................................... TSIM_AP2 ... AP Dot1x User Mode............................... AUTOMATIC AP Dot1x User Name............................... globalDot1x

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 672

3 9 C H A P T E R
Converting Autonomous Access Points to Lightweight Mode
· Finding Feature Information, on page 673 · Prerequisites for Converting Autonomous Access Points to Lightweight Mode, on page 673 · Information About Autonomous Access Points Converted to Lightweight Mode, on page 674 · How to Convert a Lightweight Access Point Back to an Autonomous Access Point, on page 676 · Authorizing Access Points (CLI), on page 677 · Authorizing Access Points (GUI), on page 678 · Disabling the Reset Button on Converted Access Points (CLI), on page 679 · Monitoring the AP Crash Log Information, on page 680 · How to Configure a Static IP Address on an Access Point, on page 680 · Recovering the Access Point Using the TFTP Recovery Procedure, on page 683 · Configuration Examples for Converting Autonomous Access Points to Lightweight Mode, on page 683
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Converting Autonomous Access Points to Lightweight Mode
· Access points that are converted to lightweight mode do not support Wireless Domain Services (WDS). Converted access points communicate only with Cisco wireless LAN switchs and cannot communicate with WDS devices. However, the switch provides functionality that is equivalent to WDS when the access point associates to it.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 673

Information About Autonomous Access Points Converted to Lightweight Mode

Lightweight Access Point

· All Cisco lightweight access points support 16 Basic Service Set Identifiers (BSSIDs) per radio and a total of 16 wireless LANs per access point. When a converted access point associates to a switch, only wireless LANs with IDs 1 through 16 are pushed to the access point unless the access point is a member of an access point group.
· Access points that are converted to lightweight mode must get an IP address and discover the switch using DHCP, DNS, or IP subnet broadcast.
Information About Autonomous Access Points Converted to Lightweight Mode
You can convert autonomous Cisco Aironet access points to lightweight mode. When you upgrade the access points to lightweight mode, the access point communicates with the switch and receives a configuration and software image from the switch.
See the Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode document for instructions to upgrade an autonomous access point to lightweight mode:
http://www.cisco.com/en/US/docs/wireless/access_point/conversion/lwapp/upgrade/guide/lwapnote.html
Reverting from Lightweight Mode to Autonomous Mode
After you convert an autonomous access point to lightweight mode, you can convert the access point from a lightweight unit back to an autonomous unit by loading a Cisco IOS release that supports autonomous mode (Cisco IOS Release 12.3(7)JA or earlier releases). If the access point is associated with a switch, you can use the switch to load the Cisco IOS release. If the access point is not associated to a switch, you can load the Cisco IOS release using TFTP. In either method, the access point must be able to access a TFTP server that contains the Cisco IOS release to be loaded.
Using DHCP Option 43 and DHCP Option 60
Cisco Aironet access points use the type-length-value (TLV) format for DHCP option 43. You must program the DHCP servers to return the option based on the access point's DHCP Vendor Class Identifier (VCI) string (DHCP option 60).
For more information about DHCP VCI strings of access points, see http://www.cisco.com/en/US/tech/tk722/ tk809/technologies_configuration_example09186a00808714fe.shtml.
See the product documentation for your DHCP server for instructions on configuring DHCP option 43. The Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode document contains example steps for configuring option 43 on a DHCP server.
If the access point is ordered with the Service Provider Option - AIR-OPT60-DHCP selected, the VCI string for that access point will be different than those strings listed in the previous table. The VCI string has the following suffix: ServiceProvider. For example, a 1260 with this option returns this VCI string: Cisco AP c1260-ServiceProvider.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 674

Lightweight Access Point

How Converted Access Points Send Crash Information to the Switch

Note The switch IP address that you obtain from the DHCP server should be a unicast IP address. Do not configure the switch IP address as a multicast address when configuring DHCP option 43.
How Converted Access Points Send Crash Information to the Switch
When a converted access point unexpectedly reboots, the access point stores a crash file on its local flash memory at the time of the crash. After the unit reboots, it sends the reason for the reboot to the switch. If the unit rebooted because of a crash, the switch pulls up the crash file using existing CAPWAP messages and stores it in the switch flash memory. The crash information copy is removed from the access point flash memory when the switch pulls it from the access point.
Uploading Memory Core Dumps from Converted Access Points
By default, access points converted to lightweight mode do not send memory core dumps to the switch. This section provides instructions to upload access point core dumps using the switch GUI or CLI.
Displaying MAC Addresses for Converted Access Points
There are some differences in the way that controllers display the MAC addresses of converted access points on information pages in the controller GUI:
· On the AP Summary page, the controller lists the Ethernet MAC addresses of converted access points. · On the AP Detail page, the controller lists the BSS MAC addresses and Ethernet MAC addresses of
converted access points. · On the Radio Summary page, the switch lists converted access points by the radio MAC address.
Configuring a Static IP Address for a Lightweight Access Point
If you want to specify an IP address for an access point rather than having one assigned automatically by a DHCP server, you can use the controller GUI or CLI to configure a static IP address for the access point. Static IP addresses are generally used only for deployments with a limited number of users. An access point cannot discover the switch using domain name system (DNS) resolution if a static IP address is configured for the access point, unless you specify a DNS server and the domain to which the access point belongs. You can configure these parameters using either the switch CLI or the GUI.
Note If you configure an access point to use a static IP address that is not on the same subnet on which the access point's previous DHCP address was, the access point falls back to a DHCP address after the access point reboots. If the access point falls back to a DHCP address, enter the show ap config general Cisco_AP CLI command to show that the access point is using a fallback IP address. However, the GUI shows both the static IP address and the DHCP address, but it does not identify the DHCP address as a fallback address.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 675

How to Convert a Lightweight Access Point Back to an Autonomous Access Point

Lightweight Access Point

How to Convert a Lightweight Access Point Back to an Autonomous Access Point

Converting a Lightweight Access Point Back to an Autonomous Access Point (CLI)

SUMMARY STEPS

1. enable 2. ap name Cisco_AP tftp-downgrade tftp_server_ip_address tftp_server_image_filename

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

ap name Cisco_AP tftp-downgrade tftp_server_ip_address tftp_server_image_filename
Example:
Switch# ap name AP02 tftp-downgrade 10.0.0.1 tsrvname

Purpose Enters privileged EXEC mode.
Converts the lightweight access point back to autonomous mode. Note After entering this command, you must wait until
the access point reboots and then reconfigure the access point using the CLI or GUI.

Converting a Lightweight Access Point Back to an Autonomous Access Point (Using the Mode Button and a TFTP Server)

Step 1 Step 2
Step 3 Step 4 Step 5 Step 6
Step 7 Step 8

Configure the PC on which your TFTP server software runs with a static IP address in the range of 10.0.0.2 to 10.0.0.30. Make sure that the PC contains the access point image file (such as c1140-k9w7-tar.123-7.JA.tar for a 1140 series access point) in the TFTP server folder and that the TFTP server is activated. Rename the access point image file in the TFTP server folder to c1140-k9w7-tar.default for a 1140 series access point. Connect the PC to the access point using a Category 5 (CAT5) Ethernet cable. Disconnect power from the access point. Press and hold the MODE button while you reconnect power to the access point. Note The MODE button on the access point must be enabled.
Hold the MODE button until the status LED turns red (approximately 20 to 30 seconds), and release the MODE button. Wait until the access point reboots as indicated by all LEDs turning green followed by the Status LED blinking green.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 676

Lightweight Access Point

Authorizing Access Points (CLI)

Step 9 After the access point reboots, reconfigure the access point using the GUI or the CLI.

Authorizing Access Points (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ap auth-list ap-policy authorize-ap 4. username user_name mac aaa attribute list list_name 5. aaa new-model 6. aaa authorization credential-download auth_list local 7. aaa attribute list list 8. aaa session-id common 9. aaa local authentication default authorization default 10. show ap name Cisco_AP config general

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

ap auth-list ap-policy authorize-ap
Example:
Switch(config)# ap auth-list ap-policy authorize-ap

Step 4

username user_name mac aaa attribute list list_name
Example:
Switch(config)# username aaa.bbb.ccc mac aaa attribute list attrlist

Step 5

aaa new-model Example:
Switch(config)# aaa new-model

Purpose Enters privileged EXEC mode. Enters global configuration mode. Configures an access point authorization policy. Configures the MAC address of an access point locally.
Enables new access control commands and functions.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 677

Authorizing Access Points (GUI)

Lightweight Access Point

Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action
aaa authorization credential-download auth_list local
Example:
Switch(config)# aaa authorization credential-download auth_download local

Purpose Downloads EAP credentials from the local server.

aaa attribute list list Example:
Switch(config)# aaa attribute list alist

Configures AAA attribute list definitions.

aaa session-id common Example:
Switch(config)# aaa session-id common

Configures the AAA common session ID.

aaa local authentication default authorization default

Configures the local authentication method list.

Example:

Switch(config)# aaa local authentication default authorization default

show ap name Cisco_AP config general Example:

Displays the configuration information that corresponds to a specific access point.

Switch(config)# show ap name AP01 config general

Authorizing Access Points (GUI)

Step 1 Step 2
Step 3 Step 4

Choose Configuration > Security > AAA > AP Policy. The AP Policy page is displayed.
In the Policy Configuration area, enable or disable the following parameters: · Authorize LSC APs against Auth-List · AP with Self-Signed Certificate · Authorize MIC APs against AAA · AP with Manufacturing Installed Certificate
Click Apply. Click Save Configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 678

Lightweight Access Point

Disabling the Reset Button on Converted Access Points (CLI)

Disabling the Reset Button on Converted Access Points (CLI)
You can enable or disable the Reset button on access points that are converted to lightweight mode. The Reset button is labeled MODE on the outside of the access point.

Note The procedure to perform this task using the controller GUI is not currently available.

SUMMARY STEPS

1. enable 2. configure terminal 3. no ap reset-button 4. end 5. ap name Cisco_AP reset-button

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

no ap reset-button Example:
Switch(config)# no ap reset-button

Step 4 Step 5

end Example:
Switch(config)# end
ap name Cisco_AP reset-button Example:
Switch# ap name AP02 reset-button

Purpose Enters privileged EXEC mode.
Enters global configuration mode.
Disables the Reset buttons on all converted access points that are associated to the switch. Note To enable the Reset buttons on all converted
access points that are associated to the switch, enter the ap reset-button command. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Enables the Reset button on the converted access point that you specify.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 679

Monitoring the AP Crash Log Information

Lightweight Access Point

Monitoring the AP Crash Log Information

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. enable 2. show ap crash-file

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

show ap crash-file Example:
Switch# show ap crash-file

Purpose Enters privileged EXEC mode.
Verifies whether the crash file is downloaded to the switch.

How to Configure a Static IP Address on an Access Point

Configuring a Static IP Address on an Access Point (CLI)

SUMMARY STEPS

1. enable 2. ap name Cisco_AP static-ip ip-address static_ap_address netmask static_ip_netmask gateway
static_ip_gateway 3. enable 4. configure terminal 5. ap static-ip name-server nameserver_ip_address 6. ap static-ip domain static_ip_domain 7. end 8. show ap name Cisco_AP config general

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 680

Lightweight Access Point

Configuring a Static IP Address on an Access Point (CLI)

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Purpose Enters privileged EXEC mode.

Step 2

ap name Cisco_AP static-ip ip-address

Configures a static IP address on the access point. This

static_ap_address netmask static_ip_netmask gateway command contains the following keywords and arguments:

static_ip_gateway

· ip-address-- Specifies the Cisco access point static

Example:

IP address.

Switch# ap name AP03 static-ip ip-address 9.9.9.16 netmask 255.255.0.0 gateway 9.9.9.2

· ip-address-- Cisco access point static IP address.

· netmask--Specifies the Cisco access point static IP netmask.

· netmask-- Cisco access point static IP netmask.

· gateway--Specifies the Cisco access point gateway.

· gateway-- IP address of the Cisco access point gateway.

Step 3 Step 4 Step 5

enable Example:
Switch# enable
configure terminal Example:
Switch# configure terminal
ap static-ip name-server nameserver_ip_address Example:
Switch(config)# ap static-ip name-server 10.10.10.205

The access point reboots and rejoins the switch, and the static IP address that you specify is pushed to the access point. After the static IP address has been sent to the access point, you can configure the DNS server IP address and domain name. You must perform Steps 3 and 4 after the access points reboot. Enters privileged EXEC mode.
Enters global configuration mode.
Configures a DNS server so that a specific access point or all access points can discover the switch using DNS resolution. Note To undo the DNS server configuration, enter the
no ap static-ip name-server nameserver_ip_address command.

Step 6

ap static-ip domain static_ip_domain Example:

Configures the domain to which a specific access point or all access points belong.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 681

Configuring a Static IP Address on an Access Point (GUI)

Lightweight Access Point

Command or Action
Switch(config)# ap static-ip domain domain1

Step 7 Step 8

end Example:
Switch(config)# end
show ap name Cisco_AP config general Example:
Switch# show ap name AP03 config general

Purpose Note To undo the domain name configuration, enter
the no ap static-ip domain static_ip_domain command.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Displays the IP address configuration for the access point.

Configuring a Static IP Address on an Access Point (GUI)

Step 1 Step 2 Step 3 Step 4
Step 5 Step 6 Step 7 Step 8

Choose Configuration > Wireless > Access Points > All APs. The All APs page is displayed.
Click the name of the access point. The AP > Edit page is displayed.
In the General tab, in the IP Config area, select the Static IP check box if you want to assign a static IP address to the access point. Enter the following details:
· Static IP · Netmask · Gateway
Click Apply. The access point reboots and rejoins the switch, and the static IP address that you specified is sent to the access point.
After the static IP address has been sent to the access point, configure the DNS IP Address and Domain Name. Click Apply. Click Save Configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 682

Lightweight Access Point

Recovering the Access Point Using the TFTP Recovery Procedure

Recovering the Access Point Using the TFTP Recovery Procedure

Step 1 Step 2
Step 3

Download the required recovery image from Cisco.com (ap3g2-k9w8-tar.152-2.JA.tar) and install it in the root directory of your TFTP server.
Connect the TFTP server to the same subnet as the target access point and power-cycle the access point. The access point boots from the TFTP image and then joins the switch to download the oversized access point image and complete the upgrade procedure.
After the access point has been recovered, you can remove the TFTP server.

Configuration Examples for Converting Autonomous Access Points to Lightweight Mode
Displaying the IP Address Configuration for Access Points: Example
This example shows how to display the IP address configuration for the access point:
Switch# show ap name AP03 dot11 24ghz config general Cisco AP Identifier.............. 4 Cisco AP Name............................. AP6 IP Address Configuration.................. Static IP assigned IP Address................................ 10.10.10.118 IP NetMask................................ 255.255.255.0 Gateway IP Addr........................... 10.10.10.1 Domain.................................... Domain1 Name Server............................... 10.10.10.205 ...
Displaying Access Point Crash File Information: Example
This example shows how to display access point crash file information. Using this command, you can verify whether the file is downloaded to the switch:
Switch# show ap crash-file Local Core Files: lrad_AP1130.rdump0 (156)
The number in parentheses indicates the size of the file. The size should be greater than zero if a core dump file is available.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 683

Displaying Access Point Crash File Information: Example

Lightweight Access Point

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 684

4 0 C H A P T E R
Using Cisco Workgroup Bridges
· Finding Feature Information, on page 685 · Information About Cisco Workgroup Bridges and non-Cisco Workgroup bridges, on page 685 · Monitoring the Status of Workgroup Bridges, on page 686 · Debugging WGB Issues (CLI), on page 686 · Configuration Examples for Configuring Workgroup Bridges, on page 688
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Cisco Workgroup Bridges and non-Cisco Workgroup bridges
A WGB is a mode that can be configured on an autonomous Cisco IOS access point to provide wireless connectivity to a lightweight access point on behalf of clients that are connected by Ethernet to the WGB access point. A WGB connects a wired network over a single wireless segment by learning the MAC addresses of its wired clients on the Ethernet interface and reporting them to the lightweight access point using Internet Access Point Protocol (IAPP) messaging. The WGB provides wireless access connectivity to wired clients by establishing a single wireless connection to the lightweight access point. When a Cisco WGB is used, the WGB informs the access points of all the clients that it is associated with. The switch is aware of the clients that are associated with the access point. When non-Cisco WGBs are used, the switch has no information about the IP address of the clients on the wired segment behind the WGB. Without this information, the switch drops the following types of messages:
· ARP REQ from the distribution system for the WGB client. · ARP RPLY from the WGB client. · DHCP REQ from the WGB client.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 685

Monitoring the Status of Workgroup Bridges

Lightweight Access Point

· DHCP RPLY for the WGB client.
Monitoring the Status of Workgroup Bridges

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. enable 2. show wireless wgb summary 3. show wireless wgb mac-address wgb_mac_address detail

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Purpose Enters privileged EXEC mode.

Step 2

show wireless wgb summary Example:
Switch# show wireless wgb summary

Displays the WGBs on your network.

Step 3

show wireless wgb mac-address wgb_mac_address detail
Example:
Switch# show wireless wgb mac-address 00:0d:ed:dd:25:82 detail

Displays the details of any wired clients that are connected to a particular WGB.

Debugging WGB Issues (CLI)

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. enable 2. debug iapp all 3. debug iapp error 4. debug iapp packet

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 686

Lightweight Access Point

Debugging WGB Issues (CLI)

5. debug mobility handoff [switch switch_number] 6. debug dhcp 7. debug dot11 mobile 8. debug dot11 state

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

debug iapp all Example:

Purpose Enters privileged EXEC mode.
Enables debugging for IAPP messages.

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Switch# debug iapp all
debug iapp error Example:
Switch# debug iapp error
debug iapp packet Example:
Switch# debug iapp packet
debug mobility handoff [switch switch_number] Example:
Switch# debug mobility handoff
debug dhcp Example:
Switch# debug dhcp
debug dot11 mobile Example:
Switch# debug dot11 mobile
debug dot11 state Example:
Switch# debug dot11 state

Enables debugging for IAPP error events.
Enables debugging for IAPP packets.
Enables debugging for any roaming issues.
Debug an IP assignment issue when DHCP is used.
Enables dot11/mobile debugging. Debug an IP assignment issue when static IP is used. Enables dot11/state debugging. Debug an IP assignment issue when static IP is used.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 687

Configuration Examples for Configuring Workgroup Bridges

Lightweight Access Point

Configuration Examples for Configuring Workgroup Bridges

WGB Configuration: Example
This example shows how to configure a WGB access point using static WEP with a 40-bit WEP key:
Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# dot11 ssid WGB_with_static_WEP Switch(config-ssid)# authentication open Switch(config-ssid)# guest-mode Switch(config-ssid)# exit Switch(config)# interface dot11Radio 0 Switch(config)# station-role workgroup-bridge Switch(config-if)# encry mode wep 40 Switch(config-if)# encry key 1 size 40 0 1234567890 Switch(config-if)# ssid WGB_with_static_WEP Switch(config-if)# end

Verify that the WGB is associated to an access point by entering this command on the WGB: show dot11 association Information similar to the following appears:

Switch# show dot11 associations

802.11 Client Stations on Dot11Radio0:

SSID [FCVTESTING] :

MAC Address IP address

Device

000b.8581.6aee 10.11.12.1

WGB-client

ap#

Name map1

Parent -

State Assoc

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 688

4 1 C H A P T E R
Configuring Probe Request Forwarding
· Finding Feature Information, on page 689 · Information About Configuring Probe Request Forwarding, on page 689 · How to Configure Probe Request Forwarding (CLI), on page 689
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring Probe Request Forwarding
Probe requests are 802.11 management frames that are sent by clients to request information about the capabilities of Service Set Identifiers (SSIDs). By default, access points forward acknowledged probe requests to the switch for processing. Acknowledged probe requests are probe requests for SSIDs that are supported by the access point. If desired, you can configure access points to forward both acknowledged and unacknowledged probe requests to the switch. The switch can use the information from unacknowledged probe requests to improve the location accuracy.
How to Configure Probe Request Forwarding (CLI)

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. configure terminal 2. wireless probe filter 3. wireless probe filter num_probes interval

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 689

How to Configure Probe Request Forwarding (CLI)

Lightweight Access Point

4. end 5. show wireless probe

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wireless probe filter Example:
Switch(config)# wireless probe filter

Step 3

wireless probe filter num_probes interval Example:
Switch(config)# wireless probe filter 5 5

Step 4 Step 5

end Example:
Switch(config)# end
show wireless probe Example:
Switch# show wireless probe

Purpose Enters global configuration mode.
Enables or disables the filtering of probe requests forwarded from an access point to the switch. Note If you enable probe filtering, the default filter
setting, the access point forwards only acknowledged probe requests to the switch. If you disable probe filtering, the access point forwards both acknowledged and unacknowledged probe requests to the switch.
Limits the number of probe requests sent to the switch per client per access point radio in a given interval. You must specify the following arguments with this command:
· num_probes--Number of probe requests forwarded to the switch per client per access point radio in a given interval. The range is from 1 to 100.
· interval--Probe limit interval in milliseconds. The range is from 100 to 10000.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Displays the advanced probe request configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 690

4 2 C H A P T E R

Optimizing RFID Tracking

· Finding Feature Information, on page 691 · Optimizing RFID Tracking on Access Points, on page 691 · How to Optimize RFID Tracking on Access Points, on page 691 · Configuration Examples for Optimizing RFID Tracking, on page 693
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.

Optimizing RFID Tracking on Access Points
To optimize the monitoring and location calculation of RFID tags, you can enable tracking optimization on up to four channels within the 2.4-GHz band of an 802.11b/g access point radio. This feature allows you to scan only the channels on which tags are usually programmed to operate (such as channels 1, 6, and 11).

How to Optimize RFID Tracking on Access Points

Optimizing RFID Tracking on Access Points (CLI)

SUMMARY STEPS

1. ap name Cisco_AP mode monitor submode none 2. ap name Cisco_AP dot11 24ghz shutdown 3. ap name Cisco_AP monitor-mode tracking-opt 4. ap name Cisco_AP monitor-mode dot11b {fast-channel [first_channel second_channel
third_channel fourth_channel]}

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 691

Optimizing RFID Tracking on Access Points (CLI)

Lightweight Access Point

5. ap name Cisco_AP no dot11 24ghz shutdown 6. show ap monitor-mode summary

DETAILED STEPS

Step 1

Command or Action

Purpose

ap name Cisco_AP mode monitor submode none Specifies the monitor submode for the access point as none.

Example:
Switch# ap name 3602a mode monitor submode none

Note A warning message indicates that changing the access point's mode will cause the access point to reboot and prompts you to specify whether you want to continue by entering Y.

Step 2 Step 3

ap name Cisco_AP dot11 24ghz shutdown Example:
Switch# ap name AP01 dot11 24ghz shutdown
ap name Cisco_AP monitor-mode tracking-opt Example:
Switch# ap name TSIM_AP1 monitor-mode tracking-opt

After you enter Y, the access point reboots. Disables the access point radio.
Configures the access point to scan only the Dynamic Channel Assignment (DCA) channels supported by its country of operation. Note To disable tracking optimization for an access
point, enter the ap name Cisco_AP monitor-mode tracking-opt no-optimization command.

Step 4

ap name Cisco_AP monitor-mode dot11b {fast-channel [first_channel second_channel third_channel fourth_channel]}
Example:
Switch# ap name AP01 monitor-mode dot11b fast-channel 1 2 3 4

Chooses up to four specific 802.11b channels to be scanned by the access point.
Note In the United States, you can assign any value from 1 to 11 (inclusive) to the channel variable. Other countries support additional channels. You must assign at least one channel.

Step 5 Step 6

ap name Cisco_AP no dot11 24ghz shutdown Example:
Switch# ap name AP01 no dot11 24ghz shutdown
show ap monitor-mode summary Example:
Switch# show ap monitor-mode summary

Enables the access point radio. Displays all the access points in monitor mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 692

Lightweight Access Point

Configuration Examples for Optimizing RFID Tracking

Configuration Examples for Optimizing RFID Tracking

Displaying all the Access Points in Monitor Mode: Example

This example shows how to display all the access points in monitor mode:
Switch# show ap monitor-mode summary

AP Name

Ethernet MAC Status Scanning

Channel

List

------------- -------------- -------- ---------

AP1131:4f2.9a 00:16:4:f2:9:a Tracking 1,6,NA,NA

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 693

Displaying all the Access Points in Monitor Mode: Example

Lightweight Access Point

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 694

4 3 C H A P T E R
Configuring Country Codes
· Finding Feature Information, on page 695 · Prerequisites for Configuring Country Codes, on page 695 · Information About Configuring Country Codes, on page 696 · How to Configure Country Codes (CLI), on page 696 · Configuration Examples for Configuring Country Codes, on page 699
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring Country Codes
· Generally, you configure one country code per switch; you configure one code that matches the physical location of the switch and its access points. You can configure up to 20 country codes per switch. This multiple-country support enables you to manage access points in various countries from a single switch.
· When the multiple-country feature is used, all switchs that are going to join the same RF group must be configured with the same set of countries, configured in the same order.
· Access points are capable of using all the available legal frequencies. However, access points are assigned to the frequencies that are supported in their relevant domains.
· The country list configured on the RF group leader determines which channels the members would operate on. This list is independent of which countries have been configured on the RF group members.
· For switchs in the Japan regulatory domain, you must have had one or more Japan country codes (JP, J2, or J3) configured on your switch at the time you last booted your switch.
· For switchs in the Japan regulatory domain, you must have at least one access point with a -J regulatory domain joined to your switch.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 695

Information About Configuring Country Codes

Lightweight Access Point

Information About Configuring Country Codes
Controllers and access points are designed for use in many countries with varying regulatory requirements. The radios within the access points are assigned to a specific regulatory domain at the factory (such as -E for Europe), but the country code enables you to specify a particular country of operation (such as FR for France or ES for Spain). Configuring a country code ensures that each radio's broadcast frequency bands, interfaces, channels, and transmit power levels are compliant with country-specific regulations.
Information About Japanese Country Codes Country codes define the channels that can be used legally in each country. These country codes are available for Japan:
· JP--Allows only -J radios to join the controller · J2--Allows only -P radios to join the controller · J3--Uses the -U frequencies but allows -U, -P and -Q (other than 1550/1600/2600/3600) radios to join
the controller · J4--Allows 2.4G JPQU and 5G PQU to join the controller.
Note The 1550, 1600, 2600, and 3600 APs require J4.
See the Channels and Maximum Power Settings for Cisco Aironet Lightweight Access Points document for the list of channels and power levels supported by access points in the Japanese regulatory domains.
How to Configure Country Codes (CLI)

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. enable 2. show wireless country supported 3. configure terminal 4. ap dot11 24ghz shutdown 5. ap dot11 5ghz shutdown 6. ap country country_code 7. end 8. show wireless country channels 9. configure terminal 10. no ap dot11 5ghz shutdown

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 696

Lightweight Access Point

How to Configure Country Codes (CLI)

11. no ap dot11 24ghz shutdown 12. end 13. ap name Cisco_AP shutdown 14. configure terminal 15. ap country country_code 16. end 17. ap name Cisco_AP no shutdown

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

show wireless country supported Example:
Switch# show wireless country supported

Step 3

configure terminal Example:
Switch# configure terminal

Step 4

ap dot11 24ghz shutdown Example:
Switch(config)# ap dot11 5ghz shutdown

Step 5

ap dot11 5ghz shutdown Example:
Switch(config)# ap dot11 24ghz shutdown

Step 6

ap country country_code Example:
Switch(config)# ap country IN

Step 7 Step 8

end Example:
Switch(config)# end
show wireless country channels Example:
Switch# show wireless country channels

Purpose Enters privileged EXEC mode.
Displays a list of all available country codes.
Enters global configuration mode.
Disables the 802.11a network.
Disables the 802.11b/g network.
Assigns access points to a specific country. Note Make sure that the country code you choose is
compatible with the regulatory domain of at least one of the access point's radios. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Displays the list of available channels for the country codes configured on your switch. Note Perform Steps 9 through 17 only if you have
configured multiple country codes in Step 6.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 697

How to Configure Country Codes (CLI)

Lightweight Access Point

Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15

Command or Action configure terminal Example:
Switch# configure terminal
no ap dot11 5ghz shutdown Example:
Switch(config)# no ap dot11 5ghz shutdown
no ap dot11 24ghz shutdown Example:
Switch(config)# no ap dot11 24ghz shutdown
end Example:
Switch(config)# end
ap name Cisco_AP shutdown Example:
Switch# ap name AP02 shutdown
configure terminal Example:
Switch# configure terminal
ap country country_code Example:
Switch# ap country IN

Step 16 Step 17

end Example:
Switch(config)# end
ap name Cisco_AP no shutdown Example:
Switch# ap name AP02 no shutdown

Purpose Enters global configuration mode.
Enables the 802.11a network.
Enables the 802.11b/g network.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Disables the access point. Note Ensure that you disable only the access point
for which you are configuring country codes. Enters global configuration mode.
Assigns an access point to a specific country. Note Ensure that the country code that you choose is
compatible with the regulatory domain of at least one of the access point's radios. Note If you enabled the networks and disabled some access points and then enter the ap country country_code command, the specified country code is configured on only the disabled access points. All other access points are ignored. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Enables the access point.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 698

Lightweight Access Point

Configuration Examples for Configuring Country Codes

Configuration Examples for Configuring Country Codes
Displaying Channel List for Country Codes: Example
This example shows how to display the list of available channels for the country codes configured on your switch:
Switch# show wireless country channels
Configured Country........................: US - United States KEY: * = Channel is legal in this country and may be configured manually. A = Channel is the Auto-RF default in this country. . = Channel is not legal in this country. C = Channel has been configured for use by Auto-RF. x = Channel is available to be configured for use by Auto-RF. (-,-) = (indoor, outdoor) regulatory domain allowed by this country. -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+802.11bg : Channels : 1 1 1 1 1 :12345678901234 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+(-A ,-AB ) US : A * * * * A * * * * A . . . Auto-RF : . . . . . . . . . . . . . . -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+802.11a : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Channels : 3 3 3 4 4 4 4 4 5 5 6 6 0 0 0 1 1 2 2 2 3 3 4 4 5 5 6 6 :4680246826040482604826093715 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+(-A ,-AB ) US : . A . A . A . A A A A A * * * * * . . . * * * A A A A * Auto-RF : . . . . . . . . . . . . . . . . . . . . . . . . . . . . -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+4.9GHz 802.11a : Channels : 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 :12345678901234567890123456 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+US (-A ,-AB ): * * * * * * * * * * * * * * * * * * * A * * * * * A Auto-RF : . . . . . . . . . . . . . . . . . . . . . . . . . . -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 699

Displaying Channel List for Country Codes: Example

Lightweight Access Point

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 700

4 4 C H A P T E R
Configuring Link Latency
· Finding Feature Information, on page 701 · Prerequisites for Configuring Link Latency, on page 701 · Restrictions for Configuring Link Latency, on page 701 · Information About Configuring Link Latency, on page 702 · How to Configure Link Latency, on page 703 · How to Configure TCP MSS, on page 706 · Performing a Link Test (CLI), on page 707 · Configuration Examples for Configuring Link Latency, on page 708
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring Link Latency
· The switch displays the current round-trip time as well as a running minimum and maximum round-trip time. The minimum and maximum times continue to run as long as the switch is up or can be cleared and allowed to restart.
· You can configure link latency for a specific access point using the switch GUI or CLI or for all access points joined to the switch using the CLI.
Restrictions for Configuring Link Latency
· Link latency calculates the Control and Provisioning of Wireless Access Points (CAPWAP) response time between the access point and the switch. It does not measure network latency or ping responses.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 701

Information About Configuring Link Latency

Lightweight Access Point

Information About Configuring Link Latency
You can configure link latency on the switch to measure the link between an access point and the switch. You can use this feature with all access points that are joined to the switch where the link can be a slow or unreliable WAN connection.

TCP MSS

If the client's maximum segment size (MSS) in a Transmission Control Protocol (TCP) three-way handshake is greater than the maximum transmission unit can handle, the client might experience reduced throughput and the fragmentation of packets. To avoid this problem, you can specify the MSS for all access points that are joined to the switch or for a specific access point.
When you enable this feature, the access point selects the MSS for TCP packets to and from wireless clients in its data path. If the MSS of these packets is greater than the value that you configured or greater than the default value for the CAPWAP tunnel, the access point changes the MSS to the new configured value.

Link Tests

A link test is used to determine the quality of the radio link between two devices. Two types of link-test packets are transmitted during a link test: request and response. Any radio receiving a link-test request packet fills in the appropriate text boxes and echoes the packet back to the sender with the response type set.
The radio link quality in the client-to-access point direction can differ from that in the access point-to-client direction due to the asymmetrical distribution of the transmit power and receive sensitivity on both sides. Two types of link tests can be performed: a ping test and a CCX link test.
With the ping link test, the controller can test link quality only in the client-to-access point direction. The RF parameters of the ping reply packets received by the access point are polled by the controller to determine the client-to-access point link quality.
With the CCX link test, the switch can also test the link quality in the access point-to-client direction. The switch issues link-test requests to the client, and the client records the RF parameters (received signal strength indicator [RSSI], signal-to-noise ratio [SNR], and so on) of the received request packet in the response packet. Both the link-test requestor and responder roles are implemented on the access point and switch. Not only can the access point or switch initiate a link test to a CCX v4 or v5 client, but a CCX v4 or v5 client can initiate a link test to the access point or switch.
The switch shows the link-quality metrics for CCX link tests in both directions (out-- the access point to the client; in-- the client to the access point):
· Signal strength in the form of RSSI (minimum, maximum, and average)
· Signal quality in the form of SNR (minimum, maximum, and average)
· Total number of packets that are retried
· Maximum retry count for a single packet
· Number of lost packets
· Data rate of a successfully transmitted packet

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 702

Lightweight Access Point

How to Configure Link Latency

The controller shows this metric regardless of direction:
· Link test request/reply round-trip time (minimum, maximum, and average)
The controller software supports CCX versions 1 through 5. CCX support is enabled automatically for every WLAN on the controller and cannot be disabled. The controller stores the CCX version of the client in its client database and uses it to limit the features for this client. If a client does not support CCXv4 or v5, the controller performs a ping link test on the client. If a client supports CCXv4 or v5, the controller performs a CCX link test on the client. If a client times out during a CCX link test, the controller switches to the ping link test automatically.

How to Configure Link Latency

Configuring Link Latency (CLI)

SUMMARY STEPS

1. enable 2. configure terminal 3. ap link-latency 4. ap tcp-adjust-mss size size 5. show ap name Cisco_AP config general 6. ap name Cisco_AP link-latency [reset] 7. show ap name Cisco_AP config general

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch# enable

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

ap link-latency Example:
Switch(config)# ap link-latency

Purpose Enters privileged EXEC mode.
Enters global configuration mode.
Enables link latency for all access points that are currently associated with the switch. Note To disable link latency for all the access points
that are associated with the switch, use the no ap link-latency command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 703

Configuring Link Latency (CLI)

Lightweight Access Point

Command or Action

Purpose Note These commands enable or disable link latency
only for access points that are currently joined to the switch. You have to enable or disable link latency for the access points that join in the future.
Note To enable or disable link latency for specific access points that are associated with the switch, enter the following commands in Priveleged EXEC mode:
· ap name Cisco_AP link-latency--Enables link latency.
· ap name Cisco_AP no link-latency--Disables link latency.

Step 4 Step 5
Step 6

ap tcp-adjust-mss size size Example:
Switch(config)# ap tcp-adjust-mss size 537

Configures TCP MSS adjust size for all access points. The range is from 536 to 1363.

show ap name Cisco_AP config general Example:
Switch(config)# show ap name AP02 config general

Displays the general configuration details of the access point. These configuration details contain the link latency results that correspond to the access point that you specify in the command.

The output of this command contains the following link latency results:

· Current Delay--The current round-trip time (in milliseconds) of CAPWAP heartbeat packets from the access point to the switch and back.

· Maximum Delay--Since the time that link latency has been enabled or reset, the maximum round-trip time (in milliseconds) of CAPWAP heartbeat packets from the access point to the switch and back.

· Minimum Delay--Since the time that link latency has been enabled or reset, the minimum round-trip time (in milliseconds) of CAPWAP heartbeat packets from the access point to the switch and back.

ap name Cisco_AP link-latency [reset]
Example:
Switch(config)# ap name AP02 link-latency reset

Clears the current, minimum, and maximum link latency statistics on the switch for a specific access point.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 704

Lightweight Access Point

Configuring Link Latency (GUI)

Step 7

Command or Action

Purpose

show ap name Cisco_AP config general

Displays the general configuration details of the access

Example:

point. Use this command to see the result of the reset operation.

Switch(config)# show ap name AP02 config general

Configuring Link Latency (GUI)

Step 1 Step 2 Step 3 Step 4
Step 5 Step 6 Step 7 Step 8
Step 9

Choose Configuration > Wireless > Access Points > All APs. The All APs page appears with a list of access points.
Click the name of the access point. The AP > Edit page appears.
Click the Advanced tab. In the Link Latency area, select or unselect the Enable Link Latency check box. Note You can select the Enable Link Latency check box to enable link latency for this access point or unselect it
to prevent the access point from sending the round-trip time to the switch after every echo response is received. The default state is unselected.
Click Apply. When a message box appears that indicates that AP Parameters are modified successfully, click OK. When the All APs page is displayed, click the access point that you have modified earlier. The AP > Edit page appears.
Click the Advanced tab. In the Link Latency area, the following link latency and data latency results are displayed:
· Current(mSec)--The current round-trip time (in milliseconds) of CAPWAP heartbeat packets or data packets from the access point to the switch and back.
· Minimum(mSec)--Since the time that link latency has been enabled or reset, the minimum round-trip time (in milliseconds) of CAPWAP heartbeat packets or data packets from the access point to the switch and back.
· Maximum(mSec)--Since the time that link latency has been enabled or reset, the maximum round-trip time (in milliseconds) of CAPWAP heartbeat packets or data packets from the access point to the switch and back.
Click Reset Link Latency to clear the current, minimum, and maximum link latency and data latency statistics on the switch for this access point. Note After the page refreshes and the All APs page is displayed again, click the Advanced tab. The updated statistics
appear in the Minimum and Maximum text boxes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 705

How to Configure TCP MSS

Lightweight Access Point

How to Configure TCP MSS

Configuring TCP MSS (CLI)

SUMMARY STEPS

1. configure terminal 2. ap tcp-adjust-mss size size_value 3. reload 4. show ap tcp-adjust-mss

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap tcp-adjust-mss size size_value Example:
Switch(config)# ap tcp-adjust-mss size 537

Step 3 Step 4

reload Example:
Switch# reload
show ap tcp-adjust-mss Example:
Switch# show ap tcp-adjust-mss

Purpose Enters global configuration mode.
Enables the TCP MSS on the particular access point that you specify. Note To enable TCP MSS on all the access points that
are associated with the switch, enter the ap tcp-adjust-mss size size_value command, where the size parameter is from 536 to 1363 bytes. The default value varies for different clients.
Reboots the switch in order for your change to take effect.
Displays the current TCP MSS setting for all the access points that are associated with the switch. Note To display the TCP MSS settings that correspond
to a specific access point, enter the show ap name Cisco_AP tcp-adjust-mss command.

Configuring TCP MSS (GUI)

Step 1

Choose Configuration > Wireless > Access Points > Global AP Configuration. The Global Configuration page is displayed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 706

Lightweight Access Point

Performing a Link Test (CLI)

Step 2
Step 3 Step 4

In the TCP MSS area, select the Global TCP Adjust MSS check box and set the MSS for all access points that are associated with the switch. The valid range is from 536 to 1363 bytes. Click Apply. Click Save Configuration.

Performing a Link Test (CLI)

Note The procedure to perform this task using the switch GUI is not currently available.

SUMMARY STEPS

1. test wireless linktest mac_address 2. configure terminal 3. wireless linktest frame-size frame_size 4. wireless linktest number-of-frames number_of_frames 5. end

DETAILED STEPS

Step 1

Command or Action
test wireless linktest mac_address Example:
Switch# test wireless linktest 00:0d:88:c5:8a:d1

Purpose Runs a link test.

Step 2

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 3

wireless linktest frame-size frame_size
Example:
Switch(config)# wireless linktest frame-size 41

Configures the link test frame size for each packet.

Step 4

wireless linktest number-of-frames number_of_frames Configures the number of frames to send for the link test.
Example:
Switch(config)# wireless linktest number-of-frames 50

Step 5

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 707

Configuration Examples for Configuring Link Latency

Lightweight Access Point

Configuration Examples for Configuring Link Latency

Running a Link Test: Example
This example shows how to run a link test:
Switch# test wireless linktest 00:0d:88:c5:8a:d1
When CCX v4 or later releases is enabled on both the controller and the client being tested, information similar to the following appears:
CCX Link Test to 00:0d:88:c5:8a:d1. Link Test Packets Sent...................................... 20 Link Test Packets Received.................................. 10 Link Test Packets Lost (Total/AP to Client/Client to AP).... 10/5/5 Link Test Packets round trip time (min/max/average)......... 5ms/20ms/15ms RSSI at AP (min/max/average)................................ -60dBm/-50dBm/-55dBm RSSI at Client (min/max/average)............................ -50dBm/-40dBm/-45dBm SNR at AP (min/max/average)................................. 40dB/30dB/35dB SNR at Client (min/max/average)............................. 40dB/30dB/35dB Transmit Retries at AP (Total/Maximum)...................... 5/3 Transmit Retries at Client (Total/Maximum).................. 4/2 Transmit rate: 1M 2M 5.5M 6M 9M 11M 12M 18M 24M 36M 48M 54M 108M Packet Count: 0 0 0 0 0 0 0 0 0 2 0 18 0 Transmit rate: 1M 2M 5.5M 6M 9M 11M 12M 18M 24M 36M 48M 54M 108M Packet Count: 0 0 0 0 0 0 0 0 0 2 0 8 0
When CCX v4 or later releases is not enabled on either the controller or the client being tested, fewer details appear: Ping Link Test to 00:0d:88:c5:8a:d1. Link Test Packets Sent.......................... 20 Link Test Packets Received...................... 20 Local Signal Strength........................... -49dBm Local Signal to Noise Ratio..................... 39dB

Displaying Link Latency Information: Example

This example shows how to display general configuration details of the access point. These configuration details contain the link latency results that correspond to the access point that you specify in the command.
Switch# show ap name AP01 config general

Cisco AP Name Cisco AP Identifier Country Code Regulatory Domain Allowed by Country AP Country Code AP Regulatory Domain Switch Port Number MAC Address IP Address Configuration IP Address IP Netmask Gateway IP Address Fallback IP Address Being Used Domain Name Server CAPWAP Path MTU Telnet State

: AP01

: 55

: US - United States

: 802.11bg:-A

802.11a:-A

: US - United States

: Unconfigured

: Te1/0/1

: 0000.2000.03f0

: Static IP assigned

: 9.9.9.16

: 255.255.0.0

: 9.9.9.2

: 9.9.9.16

: Cisco

: 0.0.0.0

: 1485

: Enabled

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 708

Lightweight Access Point

Displaying TCP MSS Settings: Example

SSH State Cisco AP Location Cisco AP Group Name Primary Cisco Controller Name Primary Cisco Controller IP Address Secondary Cisco Controller Name Secondary Cisco Controller IP Address Tertiary Cisco Controller Name Tertiary Cisco Controller IP Address Administrative State Operation State AP Mode AP Submode Remote AP Debug Logging Trap Severity Level Software Version Boot Version Stats Reporting Period LED State PoE Pre-Standard Switch PoE Power Injector MAC Address Power Type/Mode Number of Slots AP Model AP Image IOS Version Reset Button AP Serial Number AP Certificate Type Management Frame Protection Validation AP User Mode AP User Name AP 802.1X User Mode AP 802.1X User Name Cisco AP System Logging Host AP Up Time econd AP CAPWAP Up Time Join Date and Time Join Taken Time seconds Join Priority Ethernet Port Duplex Ethernet Port Speed AP Link Latency Current Delay Maximum Delay Minimum Delay Last Updated (based on AP up time) Rogue Detection AP TCP MSS Adjust AP TCP MSS Size

: Disabled : default-location : default-group : CAPWAP Controller : 9.9.9.2 : : Not Configured : : Not Configured : Enabled : Registered : Local : Not Configured : Disabled : informational : 7.4.0.5 : 7.4.0.5 : 180 : Enabled : Disabled : Disabled : Power Injector/Normal Mode :2 : 3502E : C3500-K9W8-M : : : SIM1140K002 : Manufacture Installed : Disabled : Customized : Not Configured : Not Configured : Not Configured : 255.255.255.255 : 16 days 3 hours 14 minutes 1 s
: 33 minutes 15 seconds : 01/02/2013 22:41:47 : 16 days 2 hours 40 minutes 45
:1 : Auto : Auto : Enabled :0 :0 :0 : 0 seconds : Disabled : Disabled : 536

Displaying TCP MSS Settings: Example

This example shows how to display the current TCP MSS setting for all the access points that are associated with the switch:
Switch# show ap tcp-adjust-mss

AP Name

TCP State

MSS Size

------------------------------------------------------

AP01

Disabled

6146

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 709

Displaying TCP MSS Settings: Example
AP02 AP03 AP04 AP05

Disabled Disabled Disabled Disabled

536 6146 6146 6146

Lightweight Access Point

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 710

4 5 C H A P T E R

Configuring Power over Ethernet

· Finding Feature Information, on page 711 · Information About Configuring Power over Ethernet, on page 711 · How to Configure Power over Ethernet, on page 711 · Configuration Examples for Configuring Power over Ethernet, on page 714
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.

Information About Configuring Power over Ethernet
When an access point that has been converted to lightweight mode (such as an AP1262) access point is powered by a power injector that is connected to a Cisco pre-Intelligent Power Management (pre-IPM) switch, you must configure Power over Ethernet (PoE), which is also known as inline power.

How to Configure Power over Ethernet

Configuring Power over Ethernet (CLI)

SUMMARY STEPS

1. ap name Cisco_AP power injector installed 2. ap name Cisco_AP power injector override 3. ap name Cisco_AP power injector switch-mac-address switch_mac_address 4. show ap name Cisco_AP config general

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 711

Configuring Power over Ethernet (GUI)

Lightweight Access Point

DETAILED STEPS

Step 1

Command or Action ap name Cisco_AP power injector installed Example:
Switch# ap name AP02 power injector installed

Step 2

ap name Cisco_AP power injector override Example:
Switch# ap name AP02 power injector override

Step 3

ap name Cisco_AP power injector switch-mac-address switch_mac_address
Example:
Switch# ap name AP02 power injector switch-mac-address 10a.2d.5c.3d

Step 4

show ap name Cisco_AP config general Example:
Switch# show ap name AP02 config general

Purpose
Enables the PoE power injector state. The access point remembers that a power injector is connected to this particular switch port. If you relocate the access point, you must reenter this command after the presence of a new power injector is verified.
Note Enter this command if your network contains any older Cisco 6-W switches that could be accidentally overloaded if connected directly to a 12-W access point. Make sure that the Cisco Discovery Protocol (CDP) is enabled before entering this command. Otherwise, this command will fail.
Removes the safety checks and allows the access point to be connected to any switch port. You can use this command if your network does not contain any older Cisco 6-W switches that could be overloaded if connected directly to a 12-W access point. The access point assumes that a power injector is always connected. If you relocate the access point, it continues to assume that a power injector is present.
Sets the MAC address of the switch port that has a power injector.
Note Enter this command if you know the MAC address of the connected switch port and do not want to automatically detect it using the installed option.
Displays common information that includes the PoE settings for a specific access point.
Note The Power Type/Mode text box shows "degraded mode" if the access point is not operating at full power.

Configuring Power over Ethernet (GUI)

Step 1 Step 2 Step 3

Choose Configuration > Wireless > Access Points > All APs. The All APs page appears with a list of access points that are associated with the switch. Click the name of the access point. The AP > Edit page appears. Click the Advanced tab.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 712

Lightweight Access Point

Configuring Power over Ethernet (GUI)

Step 4 Step 5 Step 6
Step 7 Step 8

In the Power Over Ethernet Settings area, select the Pre-Standard 802.3af Switches check box.
Select this check box if the access point is being powered by a high-power 802.3af Cisco switch. This switch provides more than the traditional 6 Watts of power but does not support the intelligent power management (IPM) feature.
Note Unselect the Pre-standard 802.3af Switches check box if power is being provided by a power injector. This is the default value.
Select the Power Injector State check box.
Select this check box if the attached switch does not support IPM and a power injector is being used. If the attached switch supports IPM, you do not need to select this check box.
The Power Injector Selection drop-down list is displayed that contains parameters that enable you to protect your switch port from an accidental overload if the power injector is inadvertently bypassed.
From the Power Injector Selection drop-down list, choose an option to specify the desired level of protection.
You can choose any one of the following three options:
· Installed--Examines and remembers the MAC address of the currently connected switch port and assumes that a power injector is connected. Choose this option if your network contains older Cisco 6-Watt switches and you want to avoid possible overloads by forcing a double-check of any relocated access points.
If you want to configure the switch MAC address, enter the MAC address in the Injector Switch MAC Address text box. If you want the access point to find the switch MAC address, leave the Injector Switch MAC Address text box blank.
Note Each time that an access point is relocated, the MAC address of the new switch port fails to match the remembered MAC address, and the access point remains in low-power mode. You must then physically verify the existence of a power injector and reselect this option to cause the new MAC address to be remembered.
· Override--Allows the access point to operate in high-power mode without first verifying a matching MAC address. You can use this option if your network does not contain any older Cisco 6-W switches that could be overloaded if connected directly to a 12-W access point. The advantage of this option is that if you relocate the access point, it continues to operate in high-power mode without any further configuration. The disadvantage of this option is that if the access point is connected directly to a 6-W switch, an overload occurs.
Click Apply. Click Save Configuration.

What to do next Manually reset the access point in order for the change to take effect.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 713

Configuration Examples for Configuring Power over Ethernet

Lightweight Access Point

Configuration Examples for Configuring Power over Ethernet
Displaying Power over Ethernet Information: Example
This example shows how to display common information that includes the PoE settings for a specific access point:
Switch# show ap name AP01 config general
Cisco AP Identifier............... 1 Cisco AP Name..................... AP1 ... PoE Pre-Standard Switch........... Enabled PoE Power Injector MAC Addr....... Disabled Power Type/Mode................... PoE/Low Power (degraded mode) ...

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 714

PART VIII
Mobility
· Information About Mobility, on page 717 · Mobility Network Elements, on page 723 · Mobility Control Protocols, on page 727 · Configuring Mobility, on page 735

4 6 C H A P T E R
Information About Mobility
· Overview, on page 717 · Wired and Wireless Mobility, on page 718 · Features of Mobility, on page 718 · Sticky Anchoring for Low Latency Roaming, on page 719 · Bridge Domain ID and L2/L3 Roaming, on page 720 · Link Down Behavior, on page 720 · Platform Specific Scale Requirement for the Mobility Controller, on page 720
Overview
The switch delivers more services at access layer other than merely providing increased speeds and feeds. Wireless services is now integrated with the switch, which ensures that the access layer switch terminates the wireless users data plane, thereby delivering on the promise of Cisco's unified architecture. Unification implies that mobility services are provided to both wireless and wired stations. The switch provides seamless roaming, which requires transparency of the network configuration and deployment options to the client. From the end user's perspective, any mobility event must not change its IP address, its default router or DHCP server. This means that as stations roam, they must be able to
· Send an ARP to their default router, or · Transmit a DHCP request to the server that had previously assigned their address.
From the infrastructure's perspective, as mobility events occur, the station's traffic must follow its current point of attachment, which can either be a mobility agent (MA) or mobility controller (MC). This must be true regardless of whether the station has moved to a network that is configured for a different subnet. The period from which the station is not receiving traffic following its mobility event must be as short as possible, even below 40 ms whenever possible, which includes any authentication procedures that are required. From the infrastructure's perspective, the mobility management solution must have four main components, and all of these functions must be performed within the constraints of roaming:
· Initial Association--This function is used to identify the user's new point of attachment in the network. · Context Transfer--This function is used to transfer state information associated with the station. This
ensures that the station's static and real-time policies, including security and application ACLs, and services, remain the same across handoffs.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 717

Wired and Wireless Mobility

Mobility

· Handoff--This function is used to signal that the station's point of attachment has changed, and control of the station should be relinquished by the previous access switch.
· Data Plane--This function is typically tied to the handoff process, and ensures that the station's traffic continues to be delivered and received from the station without any noticeable performance degradation.
Wired and Wireless Mobility
One of the key features of the Converged access solution (applicable to both the Cisco Catalyst 3850 Switch and Cisco WLC 5700 Series Controller) is its ability to provide a device with an IP address and maintain its session persistence, across mobility events from ethernet connections to wireless and vice-versa. This feature allows users to remain on an ethernet network when possible, and make use of the freedom of mobility associated with wireless when necessary. This feature leverages support from both the client and the infrastructure and uses the two factor authentication-device and user. The device authentication credentials is cached in the mobility controller (MC). When a device transitions across link layers, the device credentials is validated, and if a match is found, the MC ensures that the same IP address is assigned to the new interface.
Features of Mobility
· Mobility Controller (MC)--The controller provides mobility management services for inter-peer group roaming events. The MC provides a central point of contact for management and policy based control protocols, such as RADIUS. This eliminates the need for the infrastructure servers to maintain a user's location as it transitions throughout the network. The MC sends the configuration to all the mobility agents under its sub-domain of their mobility configuration, peer group membership and list of members. A sub-domain is synonymous to the MC that forms it. Each sub-domain consists of an MC and zero or more access switches that have AP's associated to them.
· Mobility Agents (MA)-- A mobility agent is either an access switch that has a wireless module running on it or an MC with an internal MA running on it. A mobility agent is the wireless component that maintains client mobility state machine for a mobile client that is connected via an AP to the device that the MA is running on.
· Mobility Sub Domain-- It is an autonomous portion of the mobility domain network. A mobility sub-domain comprises of a single mobility controller and its associated mobility agents (MAs).
Note Even when more than one mobility controller is present, only one MC can be active at any given time.
A mobility sub-domain is the set of devices managed by the active mobility controller. A mobility sub-domain comprises of a set of mobility agents and associated access points.
· Mobility Group-- A collection of mobility controllers (MCs) across which fast roaming is supported. The concept of mobility group is the same as a collection of buildings in a campus across which frequent roaming is expected.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 718

Mobility

Sticky Anchoring for Low Latency Roaming

· Mobility Domain-- A collection of mobility sub-domains across which mobility is supported. The term mobility domain may be the same as a campus network.
· Mobility Oracle (MO)--The mobility oracle acts as the point of contact for mobility events that occur across mobility sub-domains. It also maintains a local database of each station in the entire mobility domain, their home and current sub-domain. A mobility domain includes one or more mobility oracle, though only one would be active at any given time.
· Mobility Tunnel Endpoint (MTE)-- The mobility tunnel endpoint (MTE) provides data plane services for mobile devices through the use of tunneling. This minimizes the impact of roaming events on the network by keeping the user's point of presence on the network a constant.
· Point of Attachment-- A station's point of attachment is where its data path is initially processed upon entry in the network. This could either be the access switch that is currently providing it service, or the wireless LAN controller.
· Point of Presence-- A station's point of presence is the place in the network where the station is being advertised. For instance, if an access switch is advertising reachability to the station via a routing protocol, the interface on which the route is being advertised is considered the station's point of presence.
· Switch Peer Group (SPG)-- A peer group is a statically created list of neighboring access switches between which fast mobility services is provided. A peer group limits the scope of interactions between switches during handoffs to only those that are geographically proximate.
· Station--A user's device that connects to and requests service from the network. The device may have a wired, wireless or both interfaces.
· Switch in the same SPG--A peer switch that is part of the peer group of the local switch.
· Switch outside the SPG--A peer access switch that is not part of the local switch's peer group.
· Foreign Mobility Controller-- The mobility controller providing mobility management service for the station in a foreign mobility sub-domain. The foreign mobility controller acts as a liaison between access switches in the foreign sub-domain and the mobility controller in the home domain.
· Foreign Mobility Sub-Domain-- The mobility sub-domain, controlled by a mobility controller, supporting a station which is anchored in another mobility sub-domain
· Foreign Switch-- The access switch in the foreign mobility sub-domain currently providing service to the station.
· Anchor Mobility Controller-- The mobility controller providing a single point of control and mobility management service for stations in their home mobility sub-domain.
· Anchor Mobility Sub-Domain-- The mobility sub-domain, controlled by a mobility controller, for a station where its IP address was assigned.
· Anchor Switch-- The switch in the home mobility sub-domain that last provided service to a station.
Sticky Anchoring for Low Latency Roaming
Sticky Anchoring ensures low roaming latency from the client's point of presence is maintained at the switch where the client initially joins the network. It is expensive to apply client policies at a switch for a roaming client. There can be considerable delay as it involves contacting the AAA server for downloadable ACLs which is not acceptable for restoring time sensitive client traffic.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 719

Bridge Domain ID and L2/L3 Roaming

Mobility

To manage this delay, when the client roams between APs connected to different switches , irrespective of whether it is an intra sub-domain roam or inter sub-domain roam, the client traffic is always tunneled to the switch where the client first associates. The client is anchored at its first point of attachment for its lifetime in the network.
This behavior is enabled by default. You can also disable this behavior to allow the client anchoring only for inter-subnet roams. This configuration is per WLAN config and is available under the WLAN config mode. The customer can configure different SSIDs for time sensitive and non time sensitive applications.
Bridge Domain ID and L2/L3 Roaming
Bridge domain ID provides the mobility nodes with information to decide on specific roam type, either as L2 or L3 roam. It also allows the network administrators to reuse the VLAN IDs across network distribution. When the VLAN IDs do not have the associated subnet configurations, they may require additional parameter to use in conjunction with VLAN ID. The network administrator ensures that the given VLAN under the same bridge domain ID are associated with the unique subnet. The mobility nodes will first check for the bridge domain ID for the given node and the VLAN ID associated with the client to identify the roam type. The bridge domain ID and the VLAN ID must be same to treat a roam as L2 roam.
The bridge domain ID is configured for each SPG when creating a SPG and later on the MC. The bridge domain ID could be same for more than one SPG and all the MAs under the SPG will share the same bridge domain ID. This information is pushed to the MAs as part of the configuration download when MA comes up initially. If the bridge domain ID is modified when the system is up, it will be pushed to all the MAs in the modified SPG and will take immediate effect for the future roams.

Note The MC can also have a bridge domain ID for it self, as the MC can also be part of a SPG.

Link Down Behavior
This section provides information about data synchronization between MA-MC and MC-MO when MC or MO faces downtime in absence of redundancy manager. When Keepalive is configured between MA-MC or MC-MO the clients database is synchronized between the MO and the MCs and the MC and its MAs respectively.

Platform Specific Scale Requirement for the Mobility Controller

The Mobility Controller (MC) role is supported on a number of different platforms like, the Cisco WLC 5700 Series, CUWN and Catalyst 3850 Switches. The scale requirements on these three platforms are summarized in the table below:

Scalability
Max number of MC in Mobility Domain

Catalyst 3850 as
MC
8

Catalyst 3650 as
MC
8

Cisco WLC 5700 as MC CUWN 5508 WiSM2 as

as MC

MC

72

72

72

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 720

Mobility

Platform Specific Scale Requirement for the Mobility Controller

Scalability
Max number of MC in Mobility Group Max number of MAs in Sub-domain (per MC) Max number of SPGs in Sub-domain (per MC) Max number of MAs in a SPG

Catalyst 3850 as
MC
8

Catalyst 3650 as
MC
8

Cisco WLC 5700 as MC 24

CUWN 5508 WiSM2 as

as MC

MC

24

24

16

16

350

350

350

8

8

24

24

24

16

16

64

64

64

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 721

Platform Specific Scale Requirement for the Mobility Controller

Mobility

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 722

4 7 C H A P T E R
Mobility Network Elements
· Mobility Agent, on page 723 · Mobility Controller, on page 724 · Mobility Oracle, on page 725 · Guest Controller, on page 725
Mobility Agent
A Mobility Controller resides on the switch. It is both, control path and data path entity and is responsible for:
· Handling the mobility events on the switch · Configuring the datapath elements on the switch for mobility, and · Communicating with the mobility controller As MA, the switch performs the datapath functions by terminating the CAPWAP tunnels that encapsulate 802.11 traffic sourced by wireless stations. This allows the switch to apply features to wired and wireless traffic in a uniform fashion. As far as switch is concerned, 802.11 is just another access medium. The MA performs the following functions: · Support the mobility protocol ­ The MA is responsible for responding in a timely manner, ensuring the
switch is capable of achieving its roaming budget. · Point of presence ­ If the wireless subnets are not available at the MC, the MA assumes the point of
presence if the wireless client VLAN is not available at the new point of attachment and tunnel the client traffic accordingly. · ARP Server ­ When the network is configured in a layer 2 mode, the MA is responsible for advertising reachability for the stations connected to it. If tunneling is employed, the ARP request is transmitted on behalf of the station through the tunnel, which the point of presence (anchor switch) would bridge onto its uplink interface. · Proxy IGMP ­ The MA on the switch is responsible for subscribing to multicast groups on behalf of a station after a roaming event has occurred. This information is passed as part of the context to the new switch. This ensures the multicast flows follow the user as it roams. · Routing ­ When the switch is connected to a layer 3 access network, the MA is responsible for injecting routes for the stations that are associated with it for which tunneling is not provided.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 723

Mobility Controller

Mobility

· 802.1X Authenticator ­ The authenticator function is included in the MA, and handles both wired and wireless stations.
· Secure PMK Sharing ­ When a station successfully authenticates to the network, the MA forwards the PMK to the MC. The MC is responsible for flooding the PMK to all the MAs under its sub-domain and to the peer MCs in the mobility group.
The MA also performs the following datapath functions:
· Mobility tunnel ­ If tunneling is used, the MA encapsulates and decapsulates packets from the mobility tunnel to the MC, and to other MA in the peer group, if the access switches are serving as points of presence. The MA supports the tunneling of client data traffic between the point of attachment and the point of attachment. The packet format used for other switches is CAPWAP with an 802.3 payload. The MA also supports reassembly and fragmentation for mobility tunnels.
· Encryption ­ The mobility control traffic between the mobility nodes is DTLS encrypted. The MA also encrypts the CAPWAP control and data (optional) at the point of attachment.
· CAPWAP ­ The switch supports the CAPWAP control and data planes. The switch forwarding logic is responsible for terminating the CAPWAP tunnels with 802.11 as well as 802.3 payloads. Since support for large frames (greater than 1500bytes) is not universally available, the switch supports CAPWAP fragmentation and reassembly.
Mobility Controller
The main function of mobility controller is to coordinate the client roaming beyond a switch peer group. The other features of the mobility controller are:
· Station Database--The Mobility Controller maintains a database of all the clients that are connected within the local mobility sub-domain.
· Mobility Protocol--The MC supports the mobility protocol which ensures the target roaming point responds in a timely manner and achieves the 150ms roaming budget
· Interface to Mobility Oracle--The Mobility Controller acts as a gateway between the switch and the Mobility Oracle. When the Mobility Controller does not find a match in its local database, it suggests a match for a wireless client entry (in its database) and forwards the request to the Mobility Oracle, which manages the Mobility Domain.
Note Mobility Oracle function can be enabled on an MC only if it is supported by the platform.
· ARP Server--When tunneling is employed for a station, its point of presence on the network is the Mobility Tunnel Endpoint (MTE). The Mobility Controller responds to any ARP requests received for the stations it is responsible for.
· Routing--When the Mobility Controller is connected to a layer three network, the Mobility Controller is responsible for injecting routes for the stations it supports into the network.
· Configures MTE--The Mobility Controller is the control point for the switch for all mobility management related requests. When a change in a station's point of attachment occurs, the Mobility Controller is responsible for configuring the forwarding policy on the MTE.
· NTP Server--The Mobility Controller acts as an NTP server to the switch and supports all the nodes to have their clocks synchronized with it.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 724

Mobility

Mobility Oracle

Mobility Oracle
The Mobility Oracle coordinates the client roams beyond the subdomain on a need basis and consists of the following features:
· Station Database--The Mobility Oracle maintains a database of all stations that are serviced within the mobility domain. This database is populated during the Mobility Oracle's interactions with all the Mobility Controllers, in all of the mobility sub-domains it supports.
· Interface to Mobility Controller--When the Mobility Oracle receives a request from a Mobility Controller, it performs a station lookup, and forwards, whenever needed, the request to the proper Mobility Controller.
· NTP Server--The Mobility Oracle acts as an NTP server to the Mobility Controllers and synchronizes all the switch clocks within the mobility domain.
Guest Controller
The guest access feature provides guest access to wireless clients. The guest tunnels use the same format as the mobility tunnels. Using the guest access feature, there is no need to configure guest VLANs on the access switch. Traffic from the wired and wireless clients terminates on Guest Controller. Since the guest VLAN is not present on the access switch, the traffic is tunneled to the MTE over the existing mobility tunnel, and then via a guest tunnel to the Guest Controller.
The advantage of this approach is that all guest traffic passes through the MTE before it is tunneled to the Guest Controller. The Guest Controller only needs to support tunnels between itself and all the MTEs.
The disadvantage is that the traffic from the guest client is tunneled twice - once to the MTE and then again to the Guest Controller.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 725

Guest Controller

Mobility

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 726

4 8 C H A P T E R
Mobility Control Protocols
· About Mobility Control Protocols, on page 727 · Initial Association and Roaming, on page 727 · Initial Association, on page 728 · Intra Switch Handoff, on page 729 · Intra Switch Peer Group Handoff, on page 729 · Inter Switch Peer Group Handoff, on page 730 · Inter Sub Domain Handoff, on page 731 · Inter Mobility Group Handoff, on page 733
About Mobility Control Protocols
The mobility control protocol is used regardless of whether tunneled or routed. The mobility control protocol is used for mobility events between the MO, MC and MA. The mobility architecture uses both,
· Distributed approach, using the direct communication with the switches in their respective SPG, as well as
· Centralized approach, using the MC and MO. The goal is to reduce the overhead on the centralized MC, while limiting the interactions between switches to help scale the overall system.
Initial Association and Roaming
The following scenarios are applicable to the mobility management protocol: · Initial Association · Intra Switch Roam · Intra Switch Peer Group Roam · Inter Switch Peer Group Roam · Inter Sub-Domain Roam · Inter Group Roam
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 727

Initial Association

Mobility

Initial Association
The illustration below explains the initial association process followed by theswitch:
Figure 47: Initial Association

1. When a station initially associates with a mobility agent, the MA performs a lookup to determine whether keying information for key caching is locally available in the MA. If no keying information is available, which is the case when the station first appears in the network, the switch prompts the device to authenticate itself to generate the Pairwise Master Key (PMK). The PMK is generated on the client and the RADIUS server side, and the RADIUS sever forwards the PMK to the authenticator, the MA.
2. The MA sends the PMK to the MC. 3. After receiving the PMK from the MA, the MC transmits the PMK to all the MAs in its sub-domain,
and to all the other MCs in its mobility group. 4. The mobility group is a single key domain. This ensures that 802.11r compliant stations recognize the
key domain, and attempts to utilize the fast transition procedures defined in 802.11r.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 728

Mobility

Intra Switch Handoff

Note The 802.11r protocol defines a key domain, which is a collection of access points that share keying information.
5. (Refer to step 2B in the illustration). Since the station is new to the mobility sub-domain, as indicated by the fact that the PMK is not in the MA local key cache, the MA transmits a mobile announce message to the MC.
6. The MC checks if the client exists in its database. As the client cannot be found, the MC in turn forwards it to the MO, if available.
7. (Refer to step 5 in the illustration). As the station is new to the network, the MO returns a negative response (NACK), which is forwarded by the MC to the switch. If the Mobility Oracle is not available then the MC is responsible for not responding to the Mobile Announce.
8. The MA on the switch informs the MC about the station's new point of attachment via the Handoff Complete message.
9. The MA then informs the other MAs in its switch peer group (SPG) about the station's new point of attachment via the Handoff Notification message. It is necessary to transmit this notification to the MAs in its SPG to allow local handoff without interacting with the MC. The Handoff Notification message sent to MAs in SPG need not carry all the information in Handoff Complete message sent to the MC.
10. (Refer to step 7B in the illustration). The MC updates its database and forwards the Handoff Complete message to the Mobility Oracle. This ensures that the Mobility Oracle's database is updated to record the station's current home mobility sub-domain.
To eliminate race conditions that could occur with devices moving quickly across switch, regardless of whether they are within a mobility sub-domain or not, the messages between MA and MC/MO are time synchronized. This would allow the MC and MO to properly process requests, if they are received out of order.
The Handoff Notification sent to MAs in the SPG are not acknowledged.
Intra Switch Handoff
Mobility events within an MA are completely transparent to the SPG and the MC. When a station moves across APs on the same MA and attempts to perform a fast handoff, the PMK is present on the MA. The MA will complete the fast handoff without invoking any additional signal.
Intra Switch Peer Group Handoff
The switch peer group (SPG) is a group of MAs between which users may roam, and expect fast roaming services. Allowing the MA to handoff directly within a SPG reduces the overhead on the MC as it requires fewer messages to be exchanged.
After the initial association is complete the station moves to another MA belonging to its SPG. In an intra switch peer group roam, the initial association, the stations PMK was forwarded to all MAs in the mobility sub-domain.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 729

Inter Switch Peer Group Handoff Figure 48: Intra Switch Peer Group Handoff

Mobility

The following process explains the intra switch peer group handoff: 1. In the initial association example, the Handoff Notification message is sent to all MAs in its SPG to know
the station's current point of attachment. 2. The new MA sends a unicast Mobile Announce message to the previous MA to which the client is
associated. 3. After the handoff completion, the new MA transmits a Handoff Complete message to the MC. 4. The new switch sends a Handoff Notification to all MA in its own SPG to inform them about the clients
new point of presence.
Inter Switch Peer Group Handoff
The Intra SPG roams do not cover all possible scenarios and there can be cases where it is possible for mobility events to occur between two MAs that are not in the same SPG. When a MA does not have any information about a station's current point of attachment, because of the Handoff Notification message getting lost in the network, or because of the the station roaming to an MA that is not in the new SPG, the MA consults the MC. The MC provides information about the clients point of presence within the mobility sub-domain. This eliminates the need to consult all other MCs within the mobility sub-domain.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 730

Mobility Figure 49: Inter Switch Peer Group Handoff

Inter Sub Domain Handoff

The image above illustrates an example of a mobility event that occurs across MAs that are not in the same SPG, but within the same mobility sub-domain.
Note The MA color matches the circle representing its SPG.
1. The new MA will have the PMK for the station, which was forwarded to each MA in the mobility sub-domain upon client initial authentication.
2. Since the MA had not been previously notified of the station's presence on a neighboring MA inside a different SPG transmits the mobile announce to the sub-domain's MC.
3. (Refer to step 2 in the illustration) On receiving the mobile announce message, the MC performs a lookup in its database, and forwards the request to the MA that was previously providing service to the station. This information is known to the MC through a previously received Handoff Complete message sent in a reliable fashion from the old MA.
4. (Refer to step 3 in the illustration) The old MA, shown in green above, transmits a Handoff message directly to the new MA.
5. The old MA needs to notify other MAs within its SPG of the fact that the station has left the group using a Station Left message. This ensures that if the station were to come back to one of the MA , they would be aware of the fact that the station is no longer being serviced by the old MA.
6. Once the handoff is complete, the new MA transmits the Handoff Complete message in a reliable fashion to the MC.
7. The new MA then transmits the Handoff Notification to the other MAs within its SPG.
Inter Sub Domain Handoff
A sub-domain is an ensemble formed by a mobility controller and the mobility agents it directly manages. An inter sub-domain mobility event implies communication between two mobility controllers. These 2 mobility controllers can be configured with the same mobility group value and recognize each other. They will appear in each other's mobility list, or they can be configured with different mobility group values, and still recognize each other.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 731

Inter Sub Domain Handoff

Mobility

When the roaming event occurs across sub-domains between MCs in the same mobility group, the 802.11r key domain advertised by the new APs are the same. Additionally, the client PMK is also transmitted to all MCs upon the client's initial authentication. The new MC does not need to force the client to reauthenticate, and the new MC also knows which previous MC was managing the wireless client mobility.
Figure 50: Inter Sub Domain Handoff

The following steps are involved in the inter sub domain handoff, when mobility controllers belong to the same mobility group: 1. When a clients PMK was sent by the initial MA to all the MCs in the mobility group, the new MA already
had already received the client PMK from its MC, and re-authentication is not required. 2. The new MA was not notified previously of the station's presence on a neighboring MA inside a different
SPG it transmits the mobile announce to the sub-domain's MC. 3. On receiving the mobile announce message, the MC forwards the mobile announce to the MO, which
performs a lookup in its database, and forwards the request to the MC that was previously providing service to the station. 4. The previous MC, in turn, forwards the request to the MA that was previously providing service to the station. 5. The old MA, shown in yellow color above, transmits a Handoff message directly to the new MA. 6. The old MA must notify the other MAs within its SPG of the fact that the station has left the SPG using a Station Left message. This ensures that if the station comes back to one of the MA , the MA is aware of the fact that the station is no longer serviced by the old MA. 7. Once the handoff is complete, the new MA transmits the Handoff Complete message in a reliable fashion to the new Mobility Controller. 8. The new MA then transmits the Handoff Notification to all other MAs. 9. The new MC then transmits the Handoff Complete to the old MC.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 732

Mobility

Inter Mobility Group Handoff

Inter Mobility Group Handoff
A mobility group is formed by MCs sharing the same mobility group name, and knowing each other.
Since the roaming event occurs across mobility groups, the 802.11r key domain advertised by the new APs differ. This forces the client to re-authenticate. They are propagated only within a mobility group, and roaming across mobility groups requires the stations to re-authenticate when they cross mobility group boundaries. When the authentication is complete, the PMK that is generated is pushed to the MAs and MCs within the same mobility group. The stations cache the PMK from the previous sub-domain because each PMK is associated to a given sub-domain (802.11y key domain). This ensures that you do not have to re-authenticate when the PMK roams back to the previous sub-domain within the pmk cache timeout interval. The remaining procedure follows the inter-sub-domain handoff steps, except that these steps relate to inter mobility group roaming.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 733

Inter Mobility Group Handoff

Mobility

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 734

4 9 C H A P T E R

Configuring Mobility

· Configuring Mobility Controller, on page 735 · Configuring Mobility Agent, on page 743
Configuring Mobility Controller

Configuring Converged Access Controllers

Creating Peer Groups, Peer Group Member, and Bridge Domain ID (CLI)

Before you begin
· On the mobility agent, you can only configure the IP address of the mobility controller. · On the mobility controller, you can define the peer group and the IP address of each peer group member.

SUMMARY STEPS

1. wireless mobility controller 2. wireless mobility controller peer-group SPG1 3. wireless mobility controller peer-group SPG1 member ip member-ip-addr public-ip public-ip-addr 4. wireless mobility controller peer-group SPG1 member ip member-ip-addr public-ip public-ip-addr 5. wireless mobility controller peer-group SPG2 6. wireless mobility controller peer-group SPG2 member ip member-ip-addr public-ip public-ip-addr 7. wireless mobility controller peer-group SPG1 bridge-domain-id id

DETAILED STEPS

Step 1

Command or Action wireless mobility controller Example:
Switch(config)# wireless mobility controller

Purpose
Enables the mobility controller functionality on the device. This command is applicable only to the switch. The controller is by default a mobility controller.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 735

Creating Peer Groups, Peer Group Member, and Bridge Domain ID (CLI)

Mobility

Step 2 Step 3
Step 4 Step 5 Step 6 Step 7

Command or Action
wireless mobility controller peer-group SPG1 Example:
Switch(config)# wireless mobility controller peer-group SPG1

Purpose Creates a peer group named SPG1.

wireless mobility controller peer-group SPG1 member ip member-ip-addr public-ip public-ip-addr
Example:
Switch(config)# wireless mobility controller peer-group
SPG1 member ip 10.10.20.2 public-ip 10.10.20.2

Adds a mobility agent to the peer group.
Note The 10.10.20.2 is the mobility agent's direct IP address. When NAT is used, use the optional public IP address to enter the mobility agent's NATed address. When NAT is not used, the public IP address is not used and the device displays the mobility agent's direct IP address.

wireless mobility controller peer-group SPG1 member Adds another member to the peer group SPG1. ip member-ip-addr public-ip public-ip-addr
Example:
Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.6 public-ip 10.10.20.6

wireless mobility controller peer-group SPG2
Example:
Switch(config)# wireless mobility controller peer-group SPG2

Creates another peer group SPG2.

wireless mobility controller peer-group SPG2 member Adds a member to peer group SPG2. ip member-ip-addr public-ip public-ip-addr
Example:
Switch(config)# wireless mobility controller peer-group SPG2 member ip 10.10.10.20 public-ip 10.10.10.20

wireless mobility controller peer-group SPG1 bridge-domain-id id
Example:
Switch(config)# wireless mobility controller peer-group SPG1 bridge-domain-id 54

(Optional) Adds a bridge domain to SPG1 used for defining the subnet-VLAN mapping with other SPGs.

Example This example shows how to create peer group and add members to it:
Switch(config)# wireless mobility controller Switch(config)# wireless mobility controller peer-group SPG1 Switch(config)# wireless mobility controller peer-group SPG1 Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.2 public-ip

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 736

Mobility

Creating Peer Groups, Peer Group Member, and Bridge Domain ID (GUI)

10.10.20.2 Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.6 public-ip
10.10.20.6 Switch(config)# wireless mobility controller peer-group SPG2 Switch(config)# wireless mobility controller peer-group SPG2 member ip 10.10.10.20 public-ip
10.10.10.20 Switch(config)# wireless mobility controller peer-group SPG1 bridge-domain-id 54
Creating Peer Groups, Peer Group Member, and Bridge Domain ID (GUI)
Before you begin · Ensure that the device is in mobility controller state.
· On the mobility agent, you can only configure the IP address of the mobility controller.
· On the mobility controller, you can define the peer group and the IP address of each peer group member.

Step 1
Step 2 Step 3
Step 4 Step 5

Choose Controller > Mobility Management > Switch Peer Group. The Mobility Switch Peer Groups page is displayed.
Click New. Enter the following details: a) Switch Peer Group Name b) Bridge Domain ID c) Multicast IP Address
Click Apply. Click Save Configuration.

Configuring Local Mobility Group (CLI)
Configuration for wireless mobility groups and mobility group members where the mobility group is a group of MCs.

Before you begin MCs can belong only to one mobility group, and can know MCs in several mobility groups.

SUMMARY STEPS

1. wireless mobility group name group-name 2. wireless mobility group member ip member-ip-addr public-ip public-ip-addr 3. wireless mobility group keepalive interval time-in-seconds 4. wireless mobility group keepalive count count

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 737

Configuring Local Mobility Group (GUI)

Mobility

DETAILED STEPS

Step 1

Command or Action
wireless mobility group name group-name Example:
Switch(config)# wireless mobility group name Mygroup

Purpose Creates a mobility group named Mygroup.

Step 2

wireless mobility group member ip member-ip-addr Adds a mobility controller to the Mygroup mobility group.

public-ip public-ip-addr

Note When NAT is used, use the optional public IP

Example:

address to enter the NATed IP address of the

Switch(config)# wireless mobility group member ip

mobility controller.

10.10.34.10 public-ip 10.10.34.28

Step 3

wireless mobility group keepalive interval time-in-seconds Configures the interval between two keepalives sent to a

Example:

mobility member.

Switch(config)# wireless mobility group keepalive interval 5

Step 4

wireless mobility group keepalive count count Example:

Configures the keep alive retries before a member status is termed DOWN.

Switch(config)# wireless mobility group keepalive count 3

Example
Switch(config)# wireless mobility group name Mygroup Switch(config)# wireless mobility group member ip 10.10.34.10 public-ip 10.10.34.28 Switch(config)# wireless mobility group keepalive interval 5 Switch(config)# wireless mobility group keepalive count 3
Configuring Local Mobility Group (GUI)
Before you begin Mobility controllers can belong to only one mobility group and can know mobility controllers in several mobility groups.

Step 1 Step 2

Choose Controller > Mobility Management > Mobility Global Config. The Mobility Controller Configuration page is displayed.
Enter the following details: a) Mobility Group Name b) Mobility Keepalive Interval c) Mobility Keepalive Count

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 738

Mobility

Adding a Peer Mobility Group (CLI)

Step 3 Step 4

d) Multicast IP Address if you want to enable multicast mode to send mobile announce messages to the mobility members. Note If you do not enable multicast IP address, the device uses unicast mode to send mobile announce messages.
Click Apply. Click Save Configuration.

Adding a Peer Mobility Group (CLI)

Before you begin MCs belong to only one group, and can know MCs in several groups.

SUMMARY STEPS

1. wireless mobility group member ip member-ip-addr public-ip public-ip-addr group group-name

DETAILED STEPS

Step 1

Command or Action

Purpose

wireless mobility group member ip member-ip-addr public-ip public-ip-addr group group-name

Adds the member as a peer MC in a different group than the Mygroup.

Example:
Switch(config)# wireless mobility group member ip 10.10.10.24 public-ip 10.10.10.25 group Group2

Adding a Peer Mobility Group (GUI)

Before you begin Mobility controllers belong to only one group, and can know several mobility groups.

Step 1 Step 2 Step 3
Step 4 Step 5

Choose Controller > Mobility Management > Mobility Peer.
The Mobility Peer page is displayed.
Click New. Enter the following details: a) Mobility Member IP b) Mobility Member Public IP c) Mobility Member Group Name d) Multicast IP Address
Click Apply. Click Save Configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 739

Configuring Optional Parameters for Roaming Behavior

Mobility

Configuring Optional Parameters for Roaming Behavior
Use this configuration to disable the sticky anchor. This command can also be used, if required, between all MA's and MC's where roaming is expected for the target SSID.

SUMMARY STEPS

1. wlan open21 2. no mobility anchor sticky

DETAILED STEPS

Step 1

Command or Action wlan open21 Example:

Purpose Configures a WLAN.

Step 2

Switch(config)# wlan open20
no mobility anchor sticky Example:

Disables the default sticky mobility anchor.

Switch(config-wlan)# no mobility anchor sticky

Example
Switch(config)# wlan open20 Switch(config-wlan)# no mobility anchor sticky

Pointing the Mobility Controller to a Mobility Oracle (CLI)

Before you begin You can configure a mobility oracle on a known mobility controller.

SUMMARY STEPS

1. wireless mobility group member ip member-ip-addr group group-name 2. wireless mobility oracle ip oracle-ip-addr

DETAILED STEPS

Step 1

Command or Action

Purpose

wireless mobility group member ip member-ip-addr group group-name

Creates and adds a MC to a mobility group.

Example:
Switch(config)# wireless mobility group member ip 10.10.10.10 group Group3

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 740

Mobility

Pointing the Mobility Controller to a Mobility Oracle (GUI)

Step 2

Command or Action
wireless mobility oracle ip oracle-ip-addr Example:
Switch(config)# wireless mobility oracle ip 10.10.10.10

Purpose Configures the mobility controller as mobility oracle.

Example
Switch(config)# wireless mobility group member ip 10.10.10.10 group Group3 Switch(config)# wireless mobility oracle ip 10.10.10.10
Pointing the Mobility Controller to a Mobility Oracle (GUI)
Before you begin You can configure a mobility oracle on a known mobility controller.

Step 1
Step 2
Step 3 Step 4

Choose Controller > Mobility Management > Mobility Global Config. The Mobility Controller Configuration page is displayed. Enter the Mobility Oracle IP Address. Note To make the mobility controller itself a mobility oracle, select the Mobility Oracle Enabled check box. Click Apply. Click Save Configuration.

Configuring Guest Controller
A guest controller is used when the client traffic is tunneled to a guest anchor controller in the demilitarized zone (DMZ). The guest client goes through a web authentication process. The web authentication process is optional, and the guest is allowed to pass traffic without authentication too.
Enable the WLAN on the mobility agent on which the guest client connects with the mobility anchor address of the guest controller.
On the guest controller WLAN, which can be Cisco 5500 Series WLC, Cisco WiSM2, or Cisco 5700 Series WLC, configure the IP address of the mobility anchor as its own IP address. This allows the traffic to be tunneled to the guest controller from the mobility agent.

SUMMARY STEPS

1. wlan wlan-id 2. mobility anchor guest-anchor-ip-addr 3. client vlan vlan-name 4. security open

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 741

Configuring Guest Anchor

Mobility

DETAILED STEPS

Step 1

Command or Action wlan wlan-id Example:
Switch(config)# wlan Mywlan1

Purpose Creates a WLAN for the client.

Step 2

mobility anchor guest-anchor-ip-addr Example:
Switch(config-wlan)# mobility anchor 10.10.10.2

Enables the guest anchors (GA) IP address on the MA.
Note To enable guest anchor on the mobility controller, you need not enter the IP address. Enter the mobility anchor command in the WLAN configuration mode to enable GA on the mobility controller.

Step 3

client vlan vlan-name Example:
Switch(config-wlan)# client vlan gc_ga_vlan1

Assigns a VLAN to the client's WLAN.

Step 4

security open Example:
Switch(config-wlan)# security open

Assigns a security type to the WLAN.

Example
Switch(config)# wlan Mywlan1 Switch(config-wlan)# mobility anchor 10.10.10.2 Switch(config-wlan)# client vlan gc_ga_vlan1 Switch(config-wlan)# security open

Configuring Guest Anchor

SUMMARY STEPS

1. wlan Mywlan1 2. mobility anchor <guest-anchors-own-ip-address> 3. client vlan<vlan-name> 4. security open

DETAILED STEPS

Step 1

Command or Action wlan Mywlan1 Example:
Switch(config)# wlan Mywlan1

Purpose Creates a wlan for the client.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 742

Mobility

Configuring Mobility Agent

Step 2 Step 3 Step 4

Command or Action

Purpose

mobility anchor <guest-anchors-own-ip-address>

Enables the guest anchors IP address on the guest anchor (GA). The GA assigns its own address on itself.

Example:
Switch(config-wlan)# mobility anchor 10.10.10.2

client vlan<vlan-name> Example:
Switch(config-wlan)# client vlan gc_ga_vlan1

Assigns a vlan to the clients wlan.

security open Example:
Switch(config-wlan)# security open

Assigns a security type to the wlan.

Example
Switch(config)# wlan Mywlan1 Switch(config-wlan)# mobility anchor 10.10.10.2 Switch(config-wlan)# client vlan gc_ga_vlan1 Switch(config-wlan)# security open

Configuring Mobility Agent

Configuring Mobility Agent by Pointing to Mobility Controller (CLI)

Before you begin
· By default, the switches are configured as mobility agents. · Your network must have at least one mobility controller and the network connectivity with the mobility
controller must be operational. · You cannot configure mobility from the mobility agent. On the mobility agent, you can configure only
the IP address of the mobility controller to download the SPG configuration. · On the mobility agent, you can either configure the mobility controller address to point to an external
mobility agent, or enable the mobility controller function.

SUMMARY STEPS

1. configure terminal 2. wireless management interface vlan 21

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 743

Configuring Mobility Agent by Pointing to Mobility Controller (GUI)

Mobility

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

wireless management interface vlan 21

Enables the wireless functionality on the device and

Example:

activates the mobility agent function. This ensures the APs have a place to terminate the CAPWAP tunnel.

Switch (config)# wireless management interface vlan

21

Example This example shows how to add a mobility agent into the mobility group by pointing it to a mobility controller:
Switch(config)# wireless management interface vlan 21

Configuring Mobility Agent by Pointing to Mobility Controller (GUI)
Before you begin
· By default, the switches are configured as mobility agents. · Your network must have at least one mobility controller and the network connectivity with the mobility
controller must be operational. · You cannot configure mobility from the mobility agent. On the mobility agent, you can configure only
the IP address of the mobility controller to download the SPG configuration. · On the mobility agent, you can either configure the mobility controller address to point to an external
mobility agent, or enable the mobility controller function.

Step 1
Step 2 Step 3 Step 4 Step 5 Step 6

Choose Configuration > Controller > Mobility Management > Mobility Global Config The Mobility Controller Configuration page is displayed.
From the Mobility Role drop-down list, choose Mobility Agent. In the Mobility Controller IP Address, enter the IP address of the mobility controller. Click Apply. Click Save Configuration. Reboot the device.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 744

Mobility

Configuring the Mobility Controller for the Mobility Agent (CLI)

Configuring the Mobility Controller for the Mobility Agent (CLI)

SUMMARY STEPS

1. wireless mobility controller 2. wireless mobility controller ip ip-addr

DETAILED STEPS

Step 1

Command or Action
wireless mobility controller
Example:
Switch (config)# wireless mobility controller Mobility role changed to Mobility Controller. Please save config and reboot the whole stack.

Purpose
Enables the mobility function on the switch.
Note After you enter this command, save the configuration and reboot the switch for the mobility controller function to take effect.

Step 2

wireless mobility controller ip ip-addr
Example:
Switch (config)# wireless mobility controller ip 10.10.21.3

Specifies the mobility controller to which the mobility agent relates.
Note If a mobility agent is configured and the mobility controller exists on a different device, configure the SPG on the mobility controller to ensure the mobility agent functions properly.

What to do next
After you add a mobility controller role to the mobility agent, you can configure optional parameters on the mobility agent.

Adding a Mobility Controller Role to the Mobility Agent

SUMMARY STEPS

1. wireless mobility controller ip 10.10.21.3

DETAILED STEPS

Step 1

Command or Action
wireless mobility controller ip 10.10.21.3 Example:
Switch(config)# wireless mobility controller ip 10.10.21.3

Purpose Converts the mobility agent to a mobility controller.

Example This example shows how to add the mobility controller role to a mobility agent:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 745

Configuring Optional Parameters on a Mobility Agent (CLI)

Mobility

Switch(config)# wireless mobility controller ip 10.10.21.3 Mobility role changed to Mobility Controller. Please save config and reboot the whole stack.

Configuring Optional Parameters on a Mobility Agent (CLI)
This section shows how to configure load-balancing on a switch. · By default, the load-balancing is enabled and it cannot be disabled.
· The switch supports a maximum of 2000 clients and the default threshold value is fifty percent of client max load.
· When the switch reaches its threshold, it redistributes the new clients load to other mobility agents in the same SPG, if their client load is lower.

SUMMARY STEPS

1. wireless mobility load-balance threshold threshold-value

DETAILED STEPS

Step 1

Command or Action

Purpose

wireless mobility load-balance threshold threshold-value Configures the threshold that triggers load-balancing.

Example:
Switch(config)# wireless mobility load-balance threshold 150

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 746

I X P A R T
Network Management
· Configuring Cisco IOS Configuration Engine, on page 749 · Configuring the Cisco Discovery Protocol, on page 769 · Configuring Simple Network Management Protocol, on page 779 · Configuring Service Level Agreements, on page 803 · Configuring SPAN and RSPAN, on page 823 · Configuring Wireshark, on page 861

5 0 C H A P T E R
Configuring Cisco IOS Configuration Engine
· Finding Feature Information, on page 749 · Prerequisites for Configuring the Configuration Engine, on page 749 · Restrictions for Configuring the Configuration Engine, on page 750 · Information About Configuring the Configuration Engine, on page 750 · How to Configure the Configuration Engine, on page 756 · Monitoring CNS Configurations, on page 766 · Additional References, on page 767 · Feature History and Information for the Configuration Engine, on page 767
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring the Configuration Engine
· Obtain the name of the configuration engine instance to which you are connecting. · Because the CNS uses both the event bus and the configuration server to provide configurations to
devices, you must define both ConfigID and Device ID for each configured switch. · All switches configured with the cns config partial global configuration command must access the event
bus. The DeviceID, as originated on the switch, must match the DeviceID of the corresponding switch definition in the Cisco Configuration Engine. You must know the hostname of the event bus to which you are connecting.
Related Topics Cisco Networking Services IDs and Device Hostnames, on page 752 DeviceID, on page 752
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 749

Restrictions for Configuring the Configuration Engine

Network Management

Restrictions for Configuring the Configuration Engine
· Within the scope of a single instance of the configuration server, no two configured switches can share the same value for ConfigID.
· Within the scope of a single instance of the event bus, no two configured switches can share the same value for DeviceID.
Related Topics Cisco Networking Services IDs and Device Hostnames, on page 752
Information About Configuring the Configuration Engine
Cisco Configuration Engine Software
The Cisco Configuration Engine is network management utility software that acts as a configuration service for automating the deployment and management of network devices and services. Each Cisco Configuration Engine manages a group of Cisco devices (switches and routers) and the services that they deliver, storing their configurations and delivering them as needed. The Cisco Configuration Engine automates initial configurations and configuration updates by generating device-specific configuration changes, sending them to the device, executing the configuration change, and logging the results. The Cisco Configuration Engine supports standalone and server modes and has these Cisco Networking Services (CNS) components:
· Configuration service: · Web server · File manager · Namespace mapping server
· Event service (event gateway) · Data service directory (data models and schema)
In standalone mode, the Cisco Configuration Engine supports an embedded directory service. In this mode, no external directory or other data store is required. In server mode, the Cisco Configuration Engine supports the use of a user-defined external directory.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 750

Network Management Figure 51: Cisco Configuration Engine Architectural Overview

Configuration Service

Configuration Service
The Configuration Service is the core component of the Cisco Configuration Engine. It consists of a Configuration Server that works with Cisco IOS CNS agents on the switch. The Configuration Service delivers device and service configurations to the switch for initial configuration and mass reconfiguration by logical groups. Switches receive their initial configuration from the Configuration Service when they start up on the network for the first time. The Configuration Service uses the CNS Event Service to send and receive configuration change events and to send success and failure notifications. The Configuration Server is a web server that uses configuration templates and the device-specific configuration information stored in the embedded (standalone mode) or remote (server mode) directory. Configuration templates are text files containing static configuration information in the form of CLI commands. In the templates, variables are specified by using Lightweight Directory Access Protocol (LDAP) URLs that reference the device-specific configuration information stored in a directory. The Cisco IOS agent can perform a syntax check on received configuration files and publish events to show the success or failure of the syntax check. The configuration agent can either apply configurations immediately or delay the application until receipt of a synchronization event from the configuration server.
Event Service
The Cisco Configuration Engine uses the Event Service for receipt and generation of configuration events. The Event Service consists of an event agent and an event gateway. The event agent is on the switch and facilitates the communication between the switch and the event gateway on the Cisco Configuration Engine. The Event Service is a highly capable publish-and-subscribe communication method. The Event Service uses subject-based addressing to send messages to their destinations. Subject-based addressing conventions define a simple, uniform namespace for messages and their destinations.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 751

NameSpace Mapper

Network Management

Related Topics Enabling the CNS Event Agent, on page 756

NameSpace Mapper
The Cisco Configuration Engine includes the NameSpace Mapper (NSM) that provides a lookup service for managing logical groups of devices based on application, device or group ID, and event.
Cisco IOS devices recognize only event subject-names that match those configured in Cisco IOS software; for example, cisco.cns.config.load. You can use the namespace mapping service to designate events by using any desired naming convention. When you have populated your data store with your subject names, NSM changes your event subject-name strings to those known by Cisco IOS.
For a subscriber, when given a unique device ID and event, the namespace mapping service returns a set of events to which to subscribe. Similarly, for a publisher, when given a unique group ID, device ID, and event, the mapping service returns a set of events on which to publish.

Cisco Networking Services IDs and Device Hostnames
The Cisco Configuration Engine assumes that a unique identifier is associated with each configured switch. This unique identifier can take on multiple synonyms, where each synonym is unique within a particular namespace. The event service uses namespace content for subject-based addressing of messages.
The Cisco Configuration Engine intersects two namespaces, one for the event bus and the other for the configuration server. Within the scope of the configuration server namespace, the term ConfigID is the unique identifier for a device. Within the scope of the event bus namespace, the term DeviceID is the CNS unique identifier for a device.
Related Topics Prerequisites for Configuring the Configuration Engine, on page 749 Restrictions for Configuring the Configuration Engine, on page 750

ConfigID

Each configured switch has a unique ConfigID, which serves as the key into the Cisco Configuration Engine directory for the corresponding set of switch CLI attributes. The ConfigID defined on the switch must match the ConfigID for the corresponding switch definition on the Cisco Configuration Engine.
The ConfigID is fixed at startup time and cannot be changed until the device restarts, even if the switch hostname is reconfigured.

DeviceID

Each configured switch participating on the event bus has a unique DeviceID, which is analogous to the switch source address so that the switch can be targeted as a specific destination on the bus.
The origin of the DeviceID is defined by the Cisco IOS hostname of the switch. However, the DeviceID variable and its usage reside within the event gateway adjacent to the switch.
The logical Cisco IOS termination point on the event bus is embedded in the event gateway, which in turn functions as a proxy on behalf of the switch. The event gateway represents the switch and its corresponding DeviceID to the event bus.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 752

Network Management

Hostname and DeviceID

The switch declares its hostname to the event gateway immediately after the successful connection to the event gateway. The event gateway couples the DeviceID value to the Cisco IOS hostname each time this connection is established. The event gateway retains this DeviceID value for the duration of its connection to the switch. Related Topics
Prerequisites for Configuring the Configuration Engine, on page 749
Hostname and DeviceID
The DeviceID is fixed at the time of the connection to the event gateway and does not change even when the switch hostname is reconfigured. When changing the switch hostname on the switch, the only way to refresh the DeviceID is to break the connection between the switch and the event gateway. For instructions on refreshing DeviceIDs, see "Related Topics." When the connection is reestablished, the switch sends its modified hostname to the event gateway. The event gateway redefines the DeviceID to the new value.
Caution When using the Cisco Configuration Engine user interface, you must first set the DeviceID field to the hostname value that the switch acquires after, not before, and you must reinitialize the configuration for your Cisco IOS CNS agent. Otherwise, subsequent partial configuration command operations may malfunction.
Related Topics Refreshing DeviceIDs, on page 763
Hostname, DeviceID, and ConfigID
In standalone mode, when a hostname value is set for a switch, the configuration server uses the hostname as the DeviceID when an event is sent on hostname. If the hostname has not been set, the event is sent on the cn=<value> of the device. In server mode, the hostname is not used. In this mode, the unique DeviceID attribute is always used for sending an event on the bus. If this attribute is not set, you cannot update the switch. These and other associated attributes (tag value pairs) are set when you run Setup on the Cisco Configuration Engine.
Cisco IOS CNS Agents
The CNS event agent feature allows the switch to publish and subscribe to events on the event bus and works with the Cisco IOS CNS agent. These agents, embedded in the switch Cisco IOS software, allow the switch to be connected and automatically configured.
Initial Configuration
When the switch first comes up, it attempts to get an IP address by broadcasting a Dynamic Host Configuration Protocol (DHCP) request on the network. Assuming there is no DHCP server on the subnet, the distribution switch acts as a DHCP relay agent and forwards the request to the DHCP server. Upon receiving the request, the DHCP server assigns an IP address to the new switch and includes the Trivial File Transfer Protocol (TFTP) server Internet Protocol (IP) address, the path to the bootstrap configuration file, and the default

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 753

Incremental (Partial) Configuration

Network Management

gateway IP address in a unicast reply to the DHCP relay agent. The DHCP relay agent forwards the reply to the switch.
The switch automatically configures the assigned IP address on interface VLAN 1 (the default) and downloads the bootstrap configuration file from the TFTP server. Upon successful download of the bootstrap configuration file, the switch loads the file in its running configuration.
The Cisco IOS CNS agents initiate communication with the Configuration Engine by using the appropriate ConfigID and EventID. The Configuration Engine maps the Config ID to a template and downloads the full configuration file to the switch.
The following figure shows a sample network configuration for retrieving the initial bootstrap configuration file by using DHCP-based autoconfiguration.
Figure 52: Initial Configuration

Related Topics Automated CNS Configuration, on page 755
Incremental (Partial) Configuration
After the network is running, new services can be added by using the Cisco IOS CNS agent. Incremental (partial) configurations can be sent to the switch. The actual configuration can be sent as an event payload by way of the event gateway (push operation) or as a signal event that triggers the switch to initiate a pull operation. The switch can check the syntax of the configuration before applying it. If the syntax is correct, the switch applies the incremental configuration and publishes an event that signals success to the configuration server. If the switch does not apply the incremental configuration, it publishes an event showing an error status. When the switch has applied the incremental configuration, it can write it to nonvolatile random-access memory (NVRAM) or wait until signaled to do so.
Synchronized Configuration
When the switch receives a configuration, it can defer application of the configuration upon receipt of a write-signal event. The write-signal event tells the switch not to save the updated configuration into its NVRAM. The switch uses the updated configuration as its running configuration. This ensures that the switch configuration is synchronized with other network activities before saving the configuration in NVRAM for use at the next reboot.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 754

Network Management

Automated CNS Configuration

Automated CNS Configuration
To enable automated CNS configuration of the switch, you must first complete the prerequisites listed in this topic. When you complete them, power on the switch. At the setup prompt, do nothing; the switch begins the initial configuration. When the full configuration file is loaded on your switch, you do not need to do anything else.
For more information on what happens during initial configuration, see "Related Topics."
Table 65: Prerequisites for Enabling Automatic Configuration

Device Access switch Distribution switch

Required Configuration Factory default (no configuration file)
· IP helper address · Enable DHCP relay agent2 · IP routing (if used as default gateway)

DHCP server

· IP address assignment · TFTP server IP address · Path to bootstrap configuration file on the TFTP server · Default gateway IP address

TFTP server

· A bootstrap configuration file that includes the CNS configuration commands that enable the switch to communicate with the Configuration Engine
· The switch configured to use either the switch MAC address or the serial number (instead of the default hostname) to generate the ConfigID and EventID
· The CNS event agent configured to push the configuration file to the switch

CNS Configuration Engine

One or more templates for each type of device, with the ConfigID of the device mapped to the template.

2 A DHCP Relay is needed only when the DHCP Server is on a different subnet from the client.
Related Topics Initial Configuration, on page 753

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 755

How to Configure the Configuration Engine

Network Management

How to Configure the Configuration Engine
Enabling the CNS Event Agent

Note You must enable the CNS event agent on the switch before you enable the CNS configuration agent. Beginning in privileged EXEC mode, follow these steps to enable the CNS event agent on the switch.

SUMMARY STEPS

1. configure terminal 2. cns event {hostname | ip-address} [port-number] [ [keepalive seconds retry-count] [failover-time
seconds ] [reconnect-time time] | backup] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

cns event {hostname | ip-address} [port-number] [

Enables the event agent, and enters the gateway parameters.

[keepalive seconds retry-count] [failover-time seconds ] [reconnect-time time] | backup]

· For {hostname | ip-address}, enter either the hostname or the IP address of the event gateway.

Example:

· (Optional) For port number, enter the port number for

Switch(config)# cns event 10.180.1.27 keepalive

the event gateway. The default port number is 11011.

120 10

· (Optional) For keepalive seconds, enter how often the

switch sends keepalive messages. For retry-count,

enter the number of unanswered keepalive messages

that the switch sends before the connection is

terminated. The default for each is 0.

· (Optional) For failover-time seconds, enter how long the switch waits for the primary gateway route after the route to the backup gateway is established.

· (Optional) For reconnect-time time, enter the maximum time interval that the switch waits before trying to reconnect to the event gateway.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 756

Network Management

Enabling the Cisco IOS CNS Agent

Command or Action

Step 3

end Example:
Switch(config)# end

Purpose · (Optional) Enter backup to show that this is the backup gateway. (If omitted, this is the primary gateway.)
Note Though visible in the command-line help string, the encrypt and the clock-timeout time keywords are not supported.
Returns to privileged EXEC mode.

Example
This example shows how to enable the CNS event agent, set the IP address gateway to 10.180.1.27, set 120 seconds as the keepalive interval, and set 10 as the retry count.
Switch(config)# cns event 10.180.1.27 keepalive 120 10

What to do next
To verify information about the event agent, use the show cns event connections command in privileged EXEC mode.
To disable the CNS event agent, use the no cns event { ip-address | hostname } global configuration command. Related Topics
Event Service, on page 751

Enabling the Cisco IOS CNS Agent
Beginning in privileged EXEC mode, follow these steps to enable the Cisco IOS CNS agent on the switch.

Before you begin You must enable the CNS event agent on the switch before you enable this agent.

SUMMARY STEPS

1. configure terminal 2. cns config initial {hostname | ip-address} [port-number] 3. cns config partial {hostname | ip-address} [port-number] 4. end 5. Start the Cisco IOS CNS agent on the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 757

Enabling an Initial Configuration for Cisco IOS CNS Agent

Network Management

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3 Step 4

cns config initial {hostname | ip-address} [port-number] Enables the Cisco IOS CNS agent, and enters the

Example:

configuration server parameters.

· For {hostname | ip-address}, enter either the hostname

Switch(config)# cns config initial 10.180.1.27 10

or the IP address of the configuration server.

· (Optional) For port number, enter the port number for the configuration server.

This command enables the Cisco IOS CNS agent and initiates an initial configuration on the switch.

cns config partial {hostname | ip-address} [port-number] Enables the Cisco IOS CNS agent, and enters the

Example:

configuration server parameters.

· For {hostname | ip-address}, enter either the hostname

Switch(config)# cns config partial 10.180.1.27 10

or the IP address of the configuration server.

· (Optional) For port number, enter the port number for the configuration server.

end Example:

Enables the Cisco IOS CNS agent and initiates a partial configuration on the switch.
Returns to privileged EXEC mode.

Switch(config)# end

Step 5 Start the Cisco IOS CNS agent on the switch.

What to do next You can now use the Cisco Configuration Engine to remotely send incremental configurations to the switch. Related Topics
Refreshing DeviceIDs, on page 763

Enabling an Initial Configuration for Cisco IOS CNS Agent
Beginning in privileged EXEC mode, follow these steps to enable the CNS configuration agent and initiate an initial configuration on the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 758

Network Management

Enabling an Initial Configuration for Cisco IOS CNS Agent

SUMMARY STEPS

1. configure terminal 2. cns template connect name 3. cli config-text 4. Repeat Steps 2 to 3 to configure another CNS connect template. 5. exit 6. cns connect name [retries number] [retry-interval seconds] [sleep seconds] [timeout seconds] 7. discover {controller controller-type | dlci [subinterface subinterface-number] | interface [interface-type]
| line line-type} 8. template name [... name] 9. Repeat Steps 7 to 8 to specify more interface parameters and CNS connect templates in the CNS connect
profile. 10. exit 11. hostname name 12. ip route network-number 13. cns id interface num {dns-reverse | ipaddress | mac-address} [event] [image] 14. cns id {hardware-serial | hostname | string string | udi} [event] [image] 15. cns config initial {hostname | ip-address} [port-number] [event] [no-persist] [page page] [source
ip-address] [syntax-check] 16. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

cns template connect name Example:

Enters CNS template connect configuration mode, and specifies the name of the CNS connect template.

Switch(config)# cns template connect template-dhcp

Step 3
Step 4 Step 5

cli config-text Example:

Enters a command line for the CNS connect template. Repeat this step for each command line in the template.

Switch(config-tmpl-conn)# cli ip address dhcp
Repeat Steps 2 to 3 to configure another CNS connect template. exit Example:

Returns to global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 759

Enabling an Initial Configuration for Cisco IOS CNS Agent

Network Management

Step 6
Step 7 Step 8 Step 9

Command or Action
Switch(config)# exit
cns connect name [retries number] [retry-interval seconds] [sleep seconds] [timeout seconds] Example:
Switch(config)# cns connect dhcp

Purpose
Enters CNS connect configuration mode, specifies the name of the CNS connect profile, and defines the profile parameters. The switch uses the CNS connect profile to connect to the Configuration Engine.
· Enter the name of the CNS connect profile.
· (Optional) For retries number, enter the number of connection retries. The range is 1 to 30. The default is 3.
· (Optional) For retry-interval seconds, enter the interval between successive connection attempts to the Configuration Engine. The range is 1 to 40 seconds. The default is 10 seconds.
· (Optional) For sleep seconds, enter the amount of time before which the first connection attempt occurs. The range is 0 to 250 seconds. The default is 0.
· (Optional) For timeout seconds, enter the amount of time after which the connection attempts end. The range is 10 to 2000 seconds. The default is 120.

discover {controller controller-type | dlci [subinterface Specifies the interface parameters in the CNS connect

subinterface-number] | interface [interface-type] | line profile.

line-type}

· For controller controller-type, enter the controller

Example:

type.

Switch(config-cns-conn)# discover interface gigabitethernet

· For dlci, enter the active data-link connection identifiers (DLCIs).
(Optional) For subinterface subinterface-number, specify the point-to-point subinterface number that is used to search for active DLCIs.

· For interface [interface-type], enter the type of interface.

· For line line-type, enter the line type.

template name [... name] Example:

Specifies the list of CNS connect templates in the CNS connect profile to be applied to the switch configuration. You can specify more than one template.

Switch(config-cns-conn)# template template-dhcp

Repeat Steps 7 to 8 to specify more interface parameters and CNS connect templates in the CNS connect profile.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 760

Network Management

Enabling an Initial Configuration for Cisco IOS CNS Agent

Step 10 Step 11 Step 12 Step 13
Step 14

Command or Action exit Example:
Switch(config-cns-conn)# exit
hostname name Example:
Switch(config)# hostname device1
ip route network-number Example:

Purpose Returns to global configuration mode.
Enters the hostname for the switch.
(Optional) Establishes a static route to the Configuration Engine whose IP address is network-number.

RemoteSwitch(config)# ip route 172.28.129.22 255.255.255.255 11.11.11.1

cns id interface num {dns-reverse | ipaddress | mac-address} [event] [image]
Example:

(Optional) Sets the unique EventID or ConfigID used by the Configuration Engine. If you enter this command, do not enter the cns id {hardware-serial | hostname | string string | udi} [event] [image] command.

RemoteSwitch(config)# cns id GigabitEthernet1/0/1 ipaddress

· For interface num, enter the type of interface. For example, ethernet, group-async, loopback, or virtual-template. This setting specifies from which interface the IP or MAC address should be retrieved to define the unique ID.

· For {dns-reverse | ipaddress | mac-address}, enter dns-reverse to retrieve the hostname and assign it as the unique ID, enter ipaddress to use the IP address, or enter mac-address to use the MAC address as the unique ID.

· (Optional) Enter event to set the ID to be the event-id value used to identify the switch.

· (Optional) Enter image to set the ID to be the image-id value used to identify the switch.

Note If both the event and image keywords are omitted, the image-id value is used to identify the switch.

cns id {hardware-serial | hostname | string string | udi} (Optional) Sets the unique EventID or ConfigID used by

[event] [image]

the Configuration Engine. If you enter this command, do

Example:

not enter the cns id interface num {dns-reverse | ipaddress | mac-address} [event] [image] command.

RemoteSwitch(config)# cns id hostname

· For { hardware-serial | hostname | string string | udi }, enter hardware-serial to set the switch serial number as the unique ID, enter hostname (the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 761

Enabling an Initial Configuration for Cisco IOS CNS Agent

Network Management

Step 15 Step 16

Command or Action

Purpose
default) to select the switch hostname as the unique ID, enter an arbitrary text string for string string as the unique ID, or enter udi to set the unique device identifier (UDI) as the unique ID.

cns config initial {hostname | ip-address} [port-number] Enables the Cisco IOS agent, and initiates an initial

[event] [no-persist] [page page] [source ip-address] configuration.

[syntax-check]

· For {hostname | ip-address}, enter the hostname or

Example:

the IP address of the configuration server.

RemoteSwitch(config)# cns config initial 10.1.1.1 no-persist

· (Optional) For port-number, enter the port number of the configuration server. The default port number is 80.

· (Optional) Enable event for configuration success, failure, or warning messages when the configuration is finished.

· (Optional) Enable no-persist to suppress the automatic writing to NVRAM of the configuration pulled as a result of entering the cns config initial global configuration command. If the no-persist keyword is not entered, using the cns config initial command causes the resultant configuration to be automatically written to NVRAM.

· (Optional) For page page, enter the web page of the initial configuration. The default is /Config/config/asp.

· (Optional) Enter source ip-address to use for source IP address.

· (Optional) Enable syntax-check to check the syntax when this parameter is entered.

Note Though visible in the command-line help string, the encrypt, status url, and inventory keywords are not supported.

end Example:

Returns to privileged EXEC mode.

RemoteSwitch(config)# end

Example
This example shows how to configure an initial configuration on a remote switch when the switch configuration is unknown (the CNS Zero Touch feature).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 762

Network Management

Refreshing DeviceIDs

Switch(config)# cns template connect template-dhcp Switch(config-tmpl-conn)# cli ip address dhcp Switch(config-tmpl-conn)# exit Switch(config)# cns template connect ip-route Switch(config-tmpl-conn)# cli ip route 0.0.0.0 0.0.0.0 ${next-hop} Switch(config-tmpl-conn)# exit Switch(config)# cns connect dhcp Switch(config-cns-conn)# discover interface gigabitethernet Switch(config-cns-conn)# template template-dhcp Switch(config-cns-conn)# template ip-route Switch(config-cns-conn)# exit Switch(config)# hostname RemoteSwitch RemoteSwitch(config)# cns config initial 10.1.1.1 no-persist
This example shows how to configure an initial configuration on a remote switch when the switch IP address is known. The Configuration Engine IP address is 172.28.129.22.
Switch(config)# cns template connect template-dhcp Switch(config-tmpl-conn)# cli ip address dhcp Switch(config-tmpl-conn)# exit Switch(config)# cns template connect ip-route Switch(config-tmpl-conn)# cli ip route 0.0.0.0 0.0.0.0 ${next-hop} Switch(config-tmpl-conn)# exit Switch(config)# cns connect dhcp Switch(config-cns-conn)# discover interface gigabitethernet Switch(config-cns-conn)# template template-dhcp Switch(config-cns-conn)# template ip-route Switch(config-cns-conn)# exit Switch(config)# hostname RemoteSwitch RemoteSwitch(config)# ip route 172.28.129.22 255.255.255.255 11.11.11.1 RemoteSwitch(config)# cns id ethernet 0 ipaddress RemoteSwitch(config)# cns config initial 172.28.129.22 no-persist

What to do next
To verify information about the configuration agent, use the show cns config connections command in privileged EXEC mode.
To disable the CNS Cisco IOS agent, use the no cns config initial { ip-address | hostname } global configuration command.

Refreshing DeviceIDs
Beginning in privileged EXEC mode, follow these steps to refresh a DeviceID when changing the hostname on the switch.

SUMMARY STEPS

1. show cns config connections 2. Make sure that the CNS event agent is properly connected to the event gateway. 3. show cns event connections 4. Record from the output of Step 3 the information for the currently connected connection listed below.
You will be using the IP address and port number in subsequent steps of these instructions. 5. configure terminal 6. no cns event ip-address port-number

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 763

Refreshing DeviceIDs

Network Management

7. cns event ip-address port-number 8. end 9. Make sure that you have reestablished the connection between the switch and the event connection by
examining the output from show cns event connections.

DETAILED STEPS

Step 1

Command or Action show cns config connections Example:

Purpose
Displays whether the CNS event agent is connecting to the gateway, connected, or active, and the gateway used by the event agent, its IP address and port number.

Switch# show cns config connections

Step 2

Make sure that the CNS event agent is properly connected Examine the output of show cns config connections for

to the event gateway.

the following:

· Connection is active.

· Connection is using the currently configured switch hostname. The DeviceID will be refreshed to correspond to the new hostname configuration using these instructions.

Step 3

show cns event connections Example:

Displays the event connection information for your switch.

Step 4 Step 5

Switch# show cns event connections

Record from the output of Step 3 the information for the currently connected connection listed below. You will be using the IP address and port number in subsequent steps of these instructions.

configure terminal

Enters global configuration mode.

Example:

Step 6 Step 7

Switch# configure terminal

no cns event ip-address port-number Example:
Switch(config)# no cns event 172.28.129.22 2012

Specifies the IP address and port number that you recorded in Step 4 in this command.
This command breaks the connection between the switch and the event gateway. It is necessary to first break, then reestablish, this connection to refresh the DeviceID.

cns event ip-address port-number Example:
Switch(config)# cns event 172.28.129.22 2012

Specifies the IP address and port number that you recorded in Step 4 in this command.
This command reestablishes the connection between the switch and the event gateway.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 764

Network Management

Enabling a Partial Configuration for Cisco IOS CNS Agent

Step 8

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Step 9

Make sure that you have reestablished the connection between the switch and the event connection by examining the output from show cns event connections.
Related Topics Enabling the Cisco IOS CNS Agent, on page 757 Hostname and DeviceID, on page 753

Enabling a Partial Configuration for Cisco IOS CNS Agent
Beginning in privileged EXEC mode, follow these steps to enable the Cisco IOS CNS agent and to initiate a partial configuration on the switch.

SUMMARY STEPS

1. configure terminal 2. cns config partial {ip-address | hostname} [port-number] [source ip-address] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

cns config partial {ip-address | hostname} [port-number] Enables the configuration agent, and initiates a partial

[source ip-address]

configuration.

Example:
Switch(config)# cns config partial 172.28.129.22 2013

· For {ip-address | hostname}, enter the IP address or the hostname of the configuration server.
· (Optional) For port-number, enter the port number of the configuration server. The default port number is 80.

· (Optional) Enter source ip-address to use for the source IP address.

Note Though visible in the command-line help string, the encrypt keyword is not supported.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 765

Monitoring CNS Configurations

Network Management

Step 3

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

What to do next
To verify information about the configuration agent, use either the show cns config stats or the show cns config outstanding command in privileged EXEC mode.
To disable the Cisco IOS agent, use the no cns config partial { ip-address | hostname } global configuration command. To cancel a partial configuration, use the cns config cancel global configuration command.

Monitoring CNS Configurations

Table 66: CNS show Commands
Command show cns config connections

Purpose Displays the status of the CNS Cisco IOS CNS agent connections.

Switch# show cns config connections

show cns config outstanding

Displays information about incremental (partial) CNS configurations that have started but are not yet completed.

Switch# show cns config outstanding

show cns config stats

Displays statistics about the Cisco IOS CNS agent.

Switch# show cns config stats
show cns event connections

Displays the status of the CNS event agent connections.

Switch# show cns event connections

show cns event gateway

Displays the event gateway information for your switch.

Switch# show cns event gateway
show cns event stats

Displays statistics about the CNS event agent.

Switch# show cns event stats
show cns event subject
Switch# show cns event subject

Displays a list of event agent subjects that are subscribed to by applications.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 766

Network Management

Additional References

Additional References

Related Documents

Related Topic

Document Title

Configuration Engine Setup Cisco Configuration Engine Installation and Setup Guide, 1.5 for Linux http://www.cisco.com/en/US/docs/net_mgmt/configuration_engine/1.5/installation_linux

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for the Configuration Engine

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 767

Feature History and Information for the Configuration Engine

Network Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 768

5 1 C H A P T E R
Configuring the Cisco Discovery Protocol
· Finding Feature Information, on page 769 · Information About CDP, on page 769 · How to Configure CDP, on page 770 · Monitoring and Maintaining CDP, on page 776 · Additional References, on page 777 · Feature History and Information for Cisco Discovery Protocol, on page 777
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About CDP
CDP Overview
CDP is a device discovery protocol that runs over Layer 2 (the data-link layer) on all Cisco-manufactured devices (routers, bridges, access servers, controllers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols. This feature enables applications to send SNMP queries to neighboring devices. CDP runs on all media that support Subnetwork Access Protocol (SNAP). Because CDP runs over the data-link layer only, two systems that support different network-layer protocols can learn about each other. Each CDP-configured device sends periodic messages to a multicast address, advertising at least one address at which it can receive SNMP messages. The advertisements also contain time-to-live, or holdtime information, which is the length of time a receiving device holds CDP information before discarding it. Each device also listens to the messages sent by other devices to learn about neighboring devices.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 769

CDP and Stacks

Network Management

On the switch, CDP enables Network Assistant to display a graphical view of the network. The switch uses CDP to find cluster candidates and maintain information about cluster members and other devices up to three cluster-enabled devices away from the command switch by default.

CDP and Stacks
A switch stack appears as a single switch in the network. Therefore, CDP discovers the switch stack, not the individual stack members. The switch stack sends CDP messages to neighboring network devices when there are changes to the switch stack membership, such as stack members being added or removed.

Default CDP Configuration
This table shows the default CDP configuration. Feature CDP global state CDP interface state CDP timer (packet update frequency) CDP holdtime (before discarding) CDP Version-2 advertisements

Default Setting Enabled Enabled 60 seconds 180 seconds Enabled

How to Configure CDP
Configuring CDP Characteristics
You can configure these CDP characteristics: · Frequency of CDP updates · Amount of time to hold the information before discarding it · Whether or not to send Version-2 advertisements

Note Steps 2 through 4 are all optional and can be performed in any order.

Beginning in privileged EXEC mode, follow these steps to configure these characteristics.

SUMMARY STEPS

1. configure terminal 2. cdp timer seconds 3. cdp holdtime seconds 4. cdp advertise-v2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 770

Network Management

Configuring CDP Characteristics

5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2 Step 3 Step 4 Step 5

cdp timer seconds Example:
Switch(config)# cdp timer 20
cdp holdtime seconds Example:
Switch(config)# cdp holdtime 60
cdp advertise-v2 Example:
Switch(config)# cdp advertise-v2
end Example:
Switch(config)# end

Purpose Enters the global configuration mode.
(Optional) Sets the transmission frequency of CDP updates in seconds. The range is 5 to 254; the default is 60 seconds.
(Optional) Specifies the amount of time a receiving device should hold the information sent by your device before discarding it. The range is 10 to 255 seconds; the default is 180 seconds. (Optional) Configures CDP to send Version-2 advertisements. This is the default state.
Returns to privileged EXEC mode.

Example The following example shows how to configure CDP characteristics:
Switch# configure terminal Switch(config)# cdp timer 50 Switch(config)# cdp holdtime 120 Switch(config)# cdp advertise-v2 Switch(config)# end
What to do next Use the no form of the CDP commands to return to the default settings. Related Topics
Monitoring and Maintaining CDP, on page 776

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 771

Disabling CDP

Network Management

Disabling CDP
CDP is enabled by default.

Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling CDP can interrupt cluster discovery and device connectivity.

Beginning in privileged EXEC mode, follow these steps to disable the CDP device discovery capability.

SUMMARY STEPS

1. configure terminal 2. no cdp run 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

no cdp run Example:
Switch(config)# no cdp run
end Example:
Switch(config)# end

Disables CDP. Returns to privileged EXEC mode.

What to do next You must reenable CDP to use it. Related Topics
Enabling CDP, on page 772
Enabling CDP
CDP is enabled by default.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 772

Network Management

Enabling CDP

Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling CDP can interrupt cluster discovery and device connectivity.

Beginning in privileged EXEC mode, follow these steps to enable CDP when it has been disabled.

Before you begin CDP must be disabled, or it cannot be enabled.

SUMMARY STEPS

1. configure terminal 2. cdp run 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

cdp run Example:
Switch(config)# cdp run
end Example:
Switch(config)# end

Enables CDP if it has been disabled. Returns to privileged EXEC mode.

Example The following example shows how to enable CDP if it has been disabled:
Switch# configure terminal Switch(config)# cdp run Switch(config)# end
What to do next Use the show run all command to show that CDP has been enabled. If you enter only show run, the enabling of CDP may not be displayed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 773

Disabling CDP on an Interface

Network Management

Related Topics Disabling CDP, on page 772
Disabling CDP on an Interface
CDP is enabled by default on all supported interfaces to send and to receive CDP information.

Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling CDP can interrupt cluster discovery and device connectivity.
Beginning in privileged EXEC mode, follow these steps to disable CDP on a port.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. no cdp enable 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3 Step 4

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/1
no cdp enable Example:
Switch(config-if)# no cdp enable
end Example:
Switch(config-if)# end

Specifies the interface on which you are disabling CDP, and enters interface configuration mode. Disables CDP on the interface specified in Step 2.
Returns to privileged EXEC mode.

Related Topics Enabling CDP on an Interface, on page 775

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 774

Network Management

Enabling CDP on an Interface

Enabling CDP on an Interface
CDP is enabled by default on all supported interfaces to send and to receive CDP information.

Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling CDP can interrupt cluster discovery and device connectivity.

Beginning in privileged EXEC mode, follow these steps to enable CDP on a port on which it has been disabled.

Before you begin CDP must be disabled on the port that you are trying to CDP enable on, or it cannot be enabled.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. cdp enable 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3 Step 4

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/1
cdp enable Example:
Switch(config-if)# cdp enable
end Example:
Switch(config-if)# end

Specifies the interface on which you are enabling CDP, and enters interface configuration mode. Enables CDP on a disabled interface.
Returns to privileged EXEC mode.

Example The following example shows how to enable CDP on a disabled port:
Switch# configure terminal Switch(config)# interface gigabitethernet1/0/1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 775

Monitoring and Maintaining CDP

Network Management

Switch(config-if)# cdp enable Switch(config-if)# end
Related Topics Disabling CDP on an Interface, on page 774

Monitoring and Maintaining CDP

Table 67: Commands for Displaying CDP Information

Command clear cdp counters

Description Resets the traffic counters to zero.

clear cdp table

Deletes the CDP table of information about neighbors.

show cdp

Displays global information, such as frequency of transmissions and the holdtime for packets being sent.

show cdp entry entry-name [version] [protocol] Displays information about a specific neighbor.
You can enter an asterisk (*) to display all CDP neighbors, or you can enter the name of the neighbor about which you want information.
You can also limit the display to information about the protocols enabled on the specified neighbor or information about the version of software running on the device.

show cdp interface [interface-id]

Displays information about interfaces where CDP is enabled.
You can limit the display to the interface about which you want information.

show cdp neighbors [interface-id] [detail]

Displays information about neighbors, including device type, interface type and number, holdtime settings, capabilities, platform, and port ID.
You can limit the display to neighbors of a specific interface or expand the display to provide more detailed information.

show cdp traffic

Displays CDP counters, including the number of packets sent and received and checksum errors.

Related Topics Configuring CDP Characteristics, on page 770

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 776

Network Management

Additional References

Additional References

Related Documents

Related Topic

Document Title

System Management Commands Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3850 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Cisco Discovery Protocol

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 777

Feature History and Information for Cisco Discovery Protocol

Network Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 778

5 2 C H A P T E R
Configuring Simple Network Management Protocol
· Finding Feature Information, on page 779 · Prerequisites for SNMP, on page 779 · Restrictions for SNMP, on page 781 · Information About SNMP, on page 781 · How to Configure SNMP, on page 786 · Monitoring SNMP Status, on page 800 · SNMP Examples, on page 800
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for SNMP
Supported SNMP Versions This software release supports the following SNMP versions:
· SNMPv1--The Simple Network Management Protocol, a Full Internet Standard, defined in RFC 1157. · SNMPv2C replaces the Party-based Administrative and Security Framework of SNMPv2Classic with
the community-string-based Administrative Framework of SNMPv2C while retaining the bulk retrieval and improved error handling of SNMPv2Classic. It has these features:
· SNMPv2--Version 2 of the Simple Network Management Protocol, a Draft Internet Standard, defined in RFCs 1902 through 1907.
· SNMPv2C--The community-string-based Administrative Framework for SNMPv2, an Experimental Internet Protocol defined in RFC 1901.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 779

Prerequisites for SNMP

Network Management

· SNMPv3--Version 3 of the SNMP is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by authenticating and encrypting packets over the network and includes these security features:
· Message integrity--Ensures that a packet was not tampered with in transit.
· Authentication--Determines that the message is from a valid source.
· Encryption--Mixes the contents of a package to prevent it from being read by an unauthorized source.

Note To select encryption, enter the priv keyword.

Both SNMPv1 and SNMPv2C use a community-based form of security. The community of managers able to access the agent's MIB is defined by an IP address access control list and password.
SNMPv2C includes a bulk retrieval function and more detailed error message reporting to management stations. The bulk retrieval function retrieves tables and large quantities of information, minimizing the number of round-trips required. The SNMPv2C improved error-handling includes expanded error codes that distinguish different kinds of error conditions; these conditions are reported through a single error code in SNMPv1. Error return codes in SNMPv2C report the error type.
SNMPv3 provides for both security models and security levels. A security model is an authentication strategy set up for a user and the group within which the user resides. A security level is the permitted level of security within a security model. A combination of the security level and the security model determine which security method is used when handling an SNMP packet. Available security models are SNMPv1, SNMPv2C, and SNMPv3.
The following table identifies characteristics and compares different combinations of security models and levels:
Table 68: SNMP Security Models and Levels

Model SNMPv1 SNMPv2C SNMPv3 SNMPv3

Level noAuthNoPriv

Authentication

Encryption

Community string No

noAuthNoPriv

Community string No

noAuthNoPriv

Username

No

authNoPriv

Message Digest 5 No (MD5) or Secure Hash Algorithm (SHA)

Result
Uses a community string match for authentication.
Uses a community string match for authentication.
Uses a username match for authentication.
Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 780

Network Management

Restrictions for SNMP

Model SNMPv3

Level authPriv

Authentication MD5 or SHA

Encryption

Result

Data Encryption Provides

Standard (DES) or authentication based

Advanced

on the HMAC-MD5

Encryption Standard or HMAC-SHA

(AES)

algorithms.

Allows specifying the User-based Security Model (USM) with these encryption algorithms:

· DES 56-bit encryption in addition to authentication based on the CBC-DES (DES-56) standard.
· 3DES 168-bit encryption

· AES 128-bit, 192-bit, or 256-bit encryption

You must configure the SNMP agent to use the SNMP version supported by the management station. Because an agent can communicate with multiple managers, you can configure the software to support communications using SNMPv1, SNMPv2C, or SNMPv3.

Restrictions for SNMP
Version Restrictions · SNMPv1 does not support informs.

Information About SNMP

SNMP Overview
SNMP is an application-layer protocol that provides a message format for communication between managers and agents. The SNMP system consists of an SNMP manager, an SNMP agent, and a management information base (MIB). The SNMP manager can be part of a network management system (NMS) such as Cisco Prime

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 781

SNMP Manager Functions

Network Management

Infrastructure. The agent and MIB reside on the switch. To configure SNMP on the switch, you define the relationship between the manager and the agent.
The SNMP agent contains MIB variables whose values the SNMP manager can request or change. A manager can get a value from an agent or store a value into the agent. The agent gathers data from the MIB, the repository for information about device parameters and network data. The agent can also respond to a manager's requests to get or set data.
An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP connection, loss of connection to a neighbor, or other significant events.
The active switch handles the SNMP requests and traps for the whole switch stack. The active switch transparently manages any requests or traps that are related to all stack members. When a new active switch is elected, the new active switch continues to handle SNMP requests and traps as configured on the previous active switch, assuming that IP connectivity to the SNMP management stations is still in place after the new active switch has taken control.

SNMP Manager Functions
The SNMP manager uses information in the MIB to perform the operations described in the following table:
Table 69: SNMP Operations

Operation

Description

get-request Retrieves a value from a specific variable. get-next-request Retrieves a value from a variable within a table.3 get-bulk-request4 Retrieves large blocks of data, such as multiple rows in a table, that would otherwise require
the transmission of many small blocks of data.

get-response Replies to a get-request, get-next-request, and set-request sent by an NMS.

set-request

Stores a value in a specific variable.

trap

An unsolicited message sent by an SNMP agent to an SNMP manager when some event

has occurred.

3 With this operation, an SNMP manager does not need to know the exact variable name. A sequential
search is performed to find the needed variable from within a table. 4 The get-bulk command only works with SNMPv2 or later.

SNMP Agent Functions
The SNMP agent responds to SNMP manager requests as follows:
· Get a MIB variable--The SNMP agent begins this function in response to a request from the NMS. The agent retrieves the value of the requested MIB variable and responds to the NMS with that value.
· Set a MIB variable--The SNMP agent begins this function in response to a message from the NMS. The SNMP agent changes the value of the MIB variable to the value requested by the NMS.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 782

Network Management

SNMP Community Strings

The SNMP agent also sends unsolicited trap messages to notify an NMS that a significant event has occurred on the agent. Examples of trap conditions include, but are not limited to, when a port or module goes up or down, when spanning-tree topology changes occur, and when authentication failures occur.
SNMP Community Strings
SNMP community strings authenticate access to MIB objects and function as embedded passwords. In order for the NMS to access the switch, the community string definitions on the NMS must match at least one of the three community string definitions on the switch.
A community string can have one of the following attributes:
· Read-only (RO)--Gives all objects in the MIB except the community strings read access to authorized management stations, but does not allow write access.
· Read-write (RW)--Gives all objects in the MIB read and write access to authorized management stations, but does not allow access to the community strings.
· When a cluster is created, the command switch manages the exchange of messages among member switches and the SNMP application. The Network Assistant software appends the member switch number (@esN, where N is the switch number) to the first configured RW and RO community strings on the command switch and propagates them to the member switches.
SNMP MIB Variables Access
An example of an NMS is the Cisco Prime Infrastructure network management software. Cisco Prime Infrastructure 2.0 software uses the switch MIB variables to set device variables and to poll devices on the network for specific information. The results of a poll can be displayed as a graph and analyzed to troubleshoot internetworking problems, increase network performance, verify the configuration of devices, monitor traffic loads, and more.
As shown in the figure, the SNMP agent gathers data from the MIB. The agent can send traps, or notification of certain events, to the SNMP manager, which receives and processes the traps. Traps alert the SNMP manager to a condition on the network such as improper user authentication, restarts, link status (up or down), MAC address tracking, and so forth. The SNMP agent also responds to MIB-related queries sent by the SNMP manager in get-request, get-next-request, and set-request format.
Figure 53: SNMP Network

SNMP Notifications
SNMP allows the switch to send notifications to SNMP managers when particular events occur. SNMP notifications can be sent as traps or inform requests. In command syntax, unless there is an option in the command to select either traps or informs, the keyword traps refers to either traps or informs, or both. Use the snmp-server host command to specify whether to send SNMP notifications as traps or informs.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 783

SNMP ifIndex MIB Object Values

Network Management

Note SNMPv1 does not support informs.
Traps are unreliable because the receiver does not send an acknowledgment when it receives a trap, and the sender cannot determine if the trap was received. When an SNMP manager receives an inform request, it acknowledges the message with an SNMP response protocol data unit (PDU). If the sender does not receive a response, the inform request can be sent again. Because they can be resent, informs are more likely than traps to reach their intended destination.
The characteristics that make informs more reliable than traps also consume more resources in the switch and in the network. Unlike a trap, which is discarded as soon as it is sent, an inform request is held in memory until a response is received or the request times out. Traps are sent only once, but an inform might be resent or retried several times. The retries increase traffic and contribute to a higher overhead on the network. Therefore, traps and informs require a trade-off between reliability and resources. If it is important that the SNMP manager receive every notification, use inform requests. If traffic on the network or memory in the switch is a concern and notification is not required, use traps.

SNMP ifIndex MIB Object Values
In an NMS, the IF-MIB generates and assigns an interface index (ifIndex) object value that is a unique number greater than zero to identify a physical or a logical interface. When the switch reboots or the switch software is upgraded, the switch uses this same value for the interface. For example, if the switch assigns a port 2 an ifIndex value of 10003, this value is the same after the switch reboots.
The switch uses one of the values in the following table to assign an ifIndex value to an interface:
Table 70: ifIndex Values

Interface Type SVI5 EtherChannel Loopback Tunnel Physical (such as Gigabit Ethernet or SFP6-module interfaces) Null
5 SVI = switch virtual interface 6 SFP = small form-factor pluggable

ifIndex Range 1­4999 5000­5012 5013­5077 5078­5142 10000­14500 14501

Default SNMP Configuration
Feature SNMP agent SNMP trap receiver SNMP traps

Default Setting Disabled7. None configured. None enabled except the trap for TCP connections (tty).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 784

Network Management

SNMP Configuration Guidelines

Feature

Default Setting

SNMP version

If no version keyword is present, the default is Version 1.

SNMPv3 authentication

If no keyword is entered, the default is the noauth (noAuthNoPriv) security level.

SNMP notification type

If no type is specified, all notifications are sent.

7 This is the default when the switch starts and the startup configuration does not have any snmp-server global configuration commands.

SNMP Configuration Guidelines
If the switch starts and the switch startup configuration has at least one snmp-server global configuration command, the SNMP agent is enabled.
An SNMP group is a table that maps SNMP users to SNMP views. An SNMP user is a member of an SNMP group. An SNMP host is the recipient of an SNMP trap operation. An SNMP engine ID is a name for the local or remote SNMP engine.
When configuring SNMP, follow these guidelines:
· When configuring an SNMP group, do not specify a notify view. The snmp-server host global configuration command auto-generates a notify view for the user and then adds it to the group associated with that user. Modifying the group's notify view affects all users associated with that group.
· To configure a remote user, specify the IP address or port number for the remote SNMP agent of the device where the user resides.
· Before you configure remote users for a particular agent, configure the SNMP engine ID, using the snmp-server engineID global configuration command with the remote option. The remote agent's SNMP engine ID and user password are used to compute the authentication and privacy digests. If you do not configure the remote engine ID first, the configuration command fails.
· When configuring SNMP informs, you need to configure the SNMP engine ID for the remote agent in the SNMP database before you can send proxy requests or informs to it.
· If a local user is not associated with a remote host, the switch does not send informs for the auth (authNoPriv) and the priv (authPriv) authentication levels.
· Changing the value of the SNMP engine ID has significant results. A user's password (entered on the command line) is converted to an MD5 or SHA security digest based on the password and the local engine ID. The command-line password is then destroyed, as required by RFC 2274. Because of this deletion, if the value of the engine ID changes, the security digests of SNMPv3 users become invalid, and you need to reconfigure SNMP users by using the snmp-server user username global configuration command. Similar restrictions require the reconfiguration of community strings when the engine ID changes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 785

How to Configure SNMP

Network Management

How to Configure SNMP

Disabling the SNMP Agent
The no snmp-server global configuration command disables all running versions (Version 1, Version 2C, and Version 3) of the SNMP agent on the device. You reenable all versions of the SNMP agent by the first snmp-server global configuration command that you enter. There is no Cisco IOS command specifically designated for enabling SNMP.
Beginning in privileged EXEC mode, follow these steps to disable the SNMP agent.

Before you begin
The SNMP Agent must be enabled before it can be disabled. The SNMP agent is enabled by the first snmp-server global configuration command entered on the device.

SUMMARY STEPS

1. configure terminal 2. no snmp-server 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

no snmp-server Example:
Switch(config)# no snmp-server
end Example:
Switch(config)# end

Disables the SNMP agent operation. Returns to privileged EXEC mode.

Configuring Community Strings
You use the SNMP community string to define the relationship between the SNMP manager and the agent. The community string acts like a password to permit access to the agent on the switch. Optionally, you can specify one or more of these characteristics associated with the string:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 786

Network Management

Configuring Community Strings

· An access list of IP addresses of the SNMP managers that are permitted to use the community string to gain access to the agent
· A MIB view, which defines the subset of all MIB objects accessible to the given community · Read and write or read-only permission for the MIB objects accessible to the community
Beginning in privileged EXEC mode, follow these steps to configure a community string on the switch.

SUMMARY STEPS

1. configure terminal 2. snmp-server community string [view view-name] [ro | rw] [access-list-number] 3. access-list access-list-number {deny | permit} source [source-wildcard] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

snmp-server community string [view view-name] [ro Configures the community string.

| rw] [access-list-number]

Note The @ symbol is used for delimiting the context

Example:

information. Avoid using the @ symbol as part

of the SNMP community string when

Switch(config)# snmp-server community comaccess ro

configuring this command.

4
· For string, specify a string that acts like a password

and permits access to the SNMP protocol. You can

configure one or more community strings of any

length.

· (Optional) For view-name, specify the view record accessible to the community.

· (Optional) Specify either read-only (ro) if you want authorized management stations to retrieve MIB objects, or specify read-write (rw) if you want authorized management stations to retrieve and modify MIB objects. By default, the community string permits read-only access to all objects.

· (Optional) For access-list-number, enter an IP standard access list numbered from 1 to 99 and 1300 to 1999.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 787

Configuring Community Strings

Network Management

Step 3 Step 4

Command or Action access-list access-list-number {deny | permit} source [source-wildcard] Example:
Switch(config)# access-list 4 deny any

Purpose
(Optional) If you specified an IP standard access list number in Step 2, then create the list, repeating the command as many times as necessary.
· For access-list-number, enter the access list number specified in Step 2.
· The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched.
· For source, enter the IP address of the SNMP managers that are permitted to use the community string to gain access to the agent.
· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

end Example:

Recall that the access list is always terminated by an implicit deny statement for everything.
Returns to privileged EXEC mode.

Switch(config)# end

This example shows how to assign the comaccess string to SNMP, to allow read-only access, and to specify that IP access list 4 can use the community string to gain access to the switch SNMP agent:
Switch(config)# snmp-server community comaccess ro 4
What to do next To disable access for an SNMP community, set the community string for that community to the null string (do not enter a value for the community string). To remove a specific community string, use the no snmp-server community string global configuration command. You can specify an identification name (engine ID) for the local or remote SNMP server engine on the switch. You can configure an SNMP server group that maps SNMP users to SNMP views, and you can add new users to the SNMP group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 788

Network Management

Configuring SNMP Groups and Users

Configuring SNMP Groups and Users
You can specify an identification name (engine ID) for the local or remote SNMP server engine on the switch. You can configure an SNMP server group that maps SNMP users to SNMP views, and you can add new users to the SNMP group.
Beginning in privileged EXEC mode, follow these steps to configure SNMP groups and users on the switch.

SUMMARY STEPS

1. configure terminal 2. snmp-server engineID {local engineid-string | remote ip-address [udp-port port-number]
engineid-string} 3. snmp-server group group-name {v1 | v2c | v3 {auth | noauth | priv}} [read readview] [write
writeview] [notify notifyview] [access access-list] 4. snmp-server user username group-name {remote host [ udp-port port]} {v1 [access access-list] |
v2c [access access-list] | v3 [encrypted] [access access-list] [auth {md5 | sha} auth-password] } [priv {des | 3des | aes {128 | 192 | 256}} priv-password] 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

snmp-server engineID {local engineid-string | remote Configures a name for either the local or remote copy of ip-address [udp-port port-number] engineid-string} SNMP.

Example:
Switch(config)# snmp-server engineID local 1234

· The engineid-string is a 24-character ID string with the name of the copy of SNMP. You need not specify the entire 24-character engine ID if it has trailing zeros. Specify only the portion of the engine ID up to the point where only zeros remain in the value. The Step Example configures an engine ID of 123400000000000000000000.

· If you select remote, specify the ip-address of the device that contains the remote copy of SNMP and the optional User Datagram Protocol (UDP) port on the remote device. The default is 162.

snmp-server group group-name {v1 | v2c | v3 {auth | Configures a new SNMP group on the remote device.

noauth | priv}} [read readview] [write writeview] [notify notifyview] [access access-list]

For group-name, specify the name of the group.

Example:

Specify one of the following security models:

· v1 is the least secure of the possible security models.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 789

Configuring SNMP Groups and Users

Network Management

Step 4

Command or Action

Purpose

Switch(config)# snmp-server group public v2c access lmnop

· v2c is the second least secure model. It allows transmission of informs and integers twice the normal width.

· v3, the most secure, requires you to select one of the following authentication levels:

auth--Enables the Message Digest 5 (MD5) and the Secure Hash Algorithm (SHA) packet authentication.
noauth--Enables the noAuthNoPriv security level. This is the default if no keyword is specified.

priv--Enables Data Encryption Standard (DES) packet encryption (also called privacy).

(Optional) Enter read readview with a string (not to exceed 64 characters) that is the name of the view in which you can only view the contents of the agent.
(Optional) Enter write writeview with a string (not to exceed 64 characters) that is the name of the view in which you enter data and configure the contents of the agent.
(Optional) Enter notify notifyview with a string (not to exceed 64 characters) that is the name of the view in which you specify a notify, inform, or trap.
(Optional) Enter access access-list with a string (not to exceed 64 characters) that is the name of the access list.

snmp-server user username group-name {remote host [ Adds a new user for an SNMP group.

udp-port port]} {v1 [access access-list] | v2c [access The username is the name of the user on the host that access-list] | v3 [encrypted] [access access-list] [auth connects to the agent. {md5 | sha} auth-password] } [priv {des | 3des | aes

{128 | 192 | 256}} priv-password]

The group-name is the name of the group to which the user

Example:

is associated.

Enter remote to specify a remote SNMP entity to which

Switch(config)# snmp-server user Pat public v2c the user belongs and the hostname or IP address of that

entity with the optional UDP port number. The default is

162.

Enter the SNMP version number (v1, v2c, or v3). If you enter v3, you have these additional options:

· encrypted specifies that the password appears in encrypted format. This keyword is available only when the v3 keyword is specified.

· auth is an authentication level setting session that can be either the HMAC-MD5-96 (md5) or the HMAC-SHA-96 (sha) authentication level and requires a password string auth-password (not to exceed 64 characters).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 790

Network Management

Configuring SNMP Notifications

Command or Action

Step 5

end Example:
Switch(config)# end

Purpose If you enter v3 you can also configure a private (priv) encryption algorithm and password string priv-password using the following keywords (not to exceed 64 characters):
· priv specifies the User-based Security Model (USM).
· des specifies the use of the 56-bit DES algorithm.
· 3des specifies the use of the 168-bit DES algorithm.
· aes specifies the use of the DES algorithm. You must select either 128-bit, 192-bit, or 256-bit encryption.
(Optional) Enter access access-list with a string (not to exceed 64 characters) that is the name of the access list.
Returns to privileged EXEC mode.

Configuring SNMP Notifications
A trap manager is a management station that receives and processes traps. Traps are system alerts that the switch generates when certain events occur. By default, no trap manager is defined, and no traps are sent. Switches running this Cisco IOS release can have an unlimited number of trap managers.

Note Many commands use the word traps in the command syntax. Unless there is an option in the command to select either traps or informs, the keyword traps refers to traps, informs, or both. Use the snmp-server host global configuration command to specify whether to send SNMP notifications as traps or informs.

You can use the snmp-server host global configuration command for a specific host to receive the notification types listed in the following table. You can enable any or all of these traps and configure a trap manager to receive them.
Table 71: Device Notification Types

Notification Type Keyword bridge cluster config copy-config cpu threshold entity

Description Generates STP bridge MIB traps. Generates a trap when the cluster configuration changes. Generates a trap for SNMP configuration changes. Generates a trap for SNMP copy configuration changes. Allow CPU-related traps. Generates a trap for SNMP entity changes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 791

Configuring SNMP Notifications

Network Management

Notification Type Keyword envmon
flash
fru-ctrl
hsrp ipmulticast mac-notification ospf
pim
port-security
snmp storm-control
stpx syslog tty vlan-membership vlancreate vlandelete

Description
Generates environmental monitor traps. You can enable any or all of these environmental traps: fan, shutdown, status, supply, temperature.
Generates SNMP FLASH notifications. In a switch stack, you can optionally enable notification for flash insertion or removal, which would cause a trap to be issued whenever a switch in the stack is removed or inserted (physical removal, power cycle, or reload).
Generates entity field-replaceable unit (FRU) control traps. In the switch stack, this trap refers to the insertion or removal of a switch in the stack.
Generates a trap for Hot Standby Router Protocol (HSRP) changes.
Generates a trap for IP multicast routing changes.
Generates a trap for MAC address notifications.
Generates a trap for Open Shortest Path First (OSPF) changes. You can enable any or all of these traps: Cisco specific, errors, link-state advertisement, rate limit, retransmit, and state changes.
Generates a trap for Protocol-Independent Multicast (PIM) changes. You can enable any or all of these traps: invalid PIM messages, neighbor changes, and rendezvous point (RP)-mapping changes.
Generates SNMP port security traps. You can also set a maximum trap rate per second. The range is from 0 to 1000; the default is 0, which means that there is no rate limit.
Note When you configure a trap by using the notification type port-security, configure the port security trap first, and then configure the port security trap rate:
1. snmp-server enable traps port-security
2. snmp-server enable traps port-security trap-rate rate
Generates a trap for SNMP-type notifications for authentication, cold start, warm start, link up or link down.
Generates a trap for SNMP storm-control. You can also set a maximum trap rate per minute. The range is from 0 to 1000; the default is 0 (no limit is imposed; a trap is sent at every occurrence).
Generates SNMP STP Extended MIB traps.
Generates SNMP syslog traps.
Generates a trap for TCP connections. This trap is enabled by default.
Generates a trap for SNMP VLAN membership changes.
Generates SNMP VLAN created traps.
Generates SNMP VLAN deleted traps.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 792

Network Management

Configuring SNMP Notifications

Notification Type Keyword vtp

Description Generates a trap for VLAN Trunking Protocol (VTP) changes.

Beginning in privileged EXEC mode, follow these steps to configure the switch to send traps or informs to a host.

SUMMARY STEPS

1. configure terminal 2. snmp-server engineID remote ip-address engineid-string 3. snmp-server user username group-name {remote host [ udp-port port]} {v1 [access access-list]
| v2c [access access-list] | v3 [encrypted] [access access-list] [auth {md5 | sha} auth-password] } 4. snmp-server group group-name {v1 | v2c | v3 {auth | noauth | priv}} [read readview] [write writeview] [notify notifyview] [access access-list] 5. snmp-server host host-addr [informs | traps] [version {1 | 2c | 3 {auth | noauth | priv}}] community-string [notification-type] 6. snmp-server enable traps notification-types 7. snmp-server trap-source interface-id 8. snmp-server queue-length length 9. snmp-server trap-timeout seconds 10. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3
Step 4

snmp-server engineID remote ip-address engineid-string Specifies the engine ID for the remote host.
Example:
Switch(config)# snmp-server engineID remote 192.180.1.27 00000063000100a1c0b4011b

snmp-server user username group-name {remote host Configures an SNMP user to be associated with the remote

[ udp-port port]} {v1 [access access-list] | v2c

host created in Step 2.

[access access-list] | v3 [encrypted] [access

Note You cannot configure a remote user for an

access-list] [auth {md5 | sha} auth-password] }

address without first configuring the engine ID

Example:

for the remote host. Otherwise, you receive an

Switch(config)# snmp-server user Pat public v2c

error message, and the command is not executed.

snmp-server group group-name {v1 | v2c | v3 {auth Configures an SNMP group. | noauth | priv}} [read readview] [write writeview] [notify notifyview] [access access-list]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 793

Configuring SNMP Notifications

Network Management

Step 5 Step 6 Step 7

Command or Action Example:
Switch(config)# snmp-server group public v2c access lmnop

Purpose

snmp-server host host-addr [informs | traps] [version Specifies the recipient of an SNMP trap operation.

{1 | 2c | 3 {auth | noauth | priv}}] community-string For host-addr, specify the name or Internet address of the

[notification-type]

host (the targeted recipient).

Example:

(Optional) Specify traps (the default) to send SNMP traps

Switch(config)# snmp-server host 203.0.113.1 comaccess snmp

to the host. Specify informs to send SNMP informs to the host.

(Optional) Specify the SNMP version (1, 2c, or 3). SNMPv1 does not support informs.

(Optional) For Version 3, select authentication level auth, noauth, or priv.

For community-string, when version 1 or version 2c is specified, enter the password-like community string sent with the notification operation. When version 3 is specified, enter the SNMPv3 username.

The @ symbol is used for delimiting the context information. Avoid using the @ symbol as part of the SNMP community string when configuring this command.

(Optional) For notification-type, use the keywords listed in the table above. If no type is specified, all notifications are sent.

snmp-server enable traps notification-types Example:
Switch(config)# snmp-server enable traps snmp

Enables the switch to send traps or informs and specifies the type of notifications to be sent. For a list of notification types, see the table above, or enter snmp-server enable traps ?
To enable multiple types of traps, you must enter a separate snmp-server enable traps command for each trap type.
Note When you configure a trap by using the notification type port-security, configure the port security trap first, and then configure the port security trap rate:
a. snmp-server enable traps port-security
b. snmp-server enable traps port-security trap-rate rate

snmp-server trap-source interface-id
Example:
Switch(config)# snmp-server trap-source GigabitEthernet1/0/1

(Optional) Specifies the source interface, which provides the IP address for the trap message. This command also sets the source IP address for informs.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 794

Network Management

Setting the Agent Contact and Location Information

Step 8 Step 9 Step 10

Command or Action snmp-server queue-length length Example:
Switch(config)# snmp-server queue-length 20
snmp-server trap-timeout seconds Example:
Switch(config)# snmp-server trap-timeout 60
end Example:
Switch(config)# end

Purpose (Optional) Establishes the message queue length for each trap host. The range is 1 to 1000; the default is 10.
(Optional) Defines how often to resend trap messages. The range is 1 to 1000; the default is 30 seconds.
Returns to privileged EXEC mode.

What to do next
The snmp-server host command specifies which hosts receive the notifications. The snmp-server enable trap command globally enables the method for the specified notification (for traps and informs). To enable a host to receive an inform, you must configure an snmp-server host informs command for the host and globally enable informs by using the snmp-server enable traps command.
To remove the specified host from receiving traps, use the no snmp-server host host global configuration command. The no snmp-server host command with no keywords disables traps, but not informs, to the host. To disable informs, use the no snmp-server host informs global configuration command. To disable a specific trap type, use the no snmp-server enable traps notification-types global configuration command.

Setting the Agent Contact and Location Information
Beginning in privileged EXEC mode, follow these steps to set the system contact and location of the SNMP agent so that these descriptions can be accessed through the configuration file.

SUMMARY STEPS

1. configure terminal 2. snmp-server contact text 3. snmp-server location text 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 795

Limiting TFTP Servers Used Through SNMP

Network Management

Step 2 Step 3 Step 4

Command or Action

Purpose

snmp-server contact text

Sets the system contact string.

Example:
Switch(config)# snmp-server contact Dial System Operator at beeper 21555

snmp-server location text
Example:
Switch(config)# snmp-server location Building 3/Room 222

Sets the system location string.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Limiting TFTP Servers Used Through SNMP
Beginning in privileged EXEC mode, follow these steps to limit the TFTP servers used for saving and loading configuration files through SNMP to the servers specified in an access list.

SUMMARY STEPS

1. configure terminal 2. snmp-server tftp-server-list access-list-number 3. access-list access-list-number {deny | permit} source [source-wildcard] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

snmp-server tftp-server-list access-list-number Example:
Switch(config)# snmp-server tftp-server-list 44

Limits the TFTP servers used for configuration file copies through SNMP to the servers in the access list.
For access-list-number, enter an IP standard access list numbered from 1 to 99 and 1300 to 1999.

access-list access-list-number {deny | permit} source [source-wildcard]
Example:
Switch(config)# access-list 44 permit 10.1.1.2

Creates a standard access list, repeating the command as many times as necessary.
For access-list-number, enter the access list number specified in Step 2.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 796

Network Management

Configuring Trap Flags for SNMP

Command or Action

Step 4

end Example:
Switch(config)# end

Purpose The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched.
For source, enter the IP address of the TFTP servers that can access the switch.
(Optional) For source-wildcard, enter the wildcard bits, in dotted decimal notation, to be applied to the source. Place ones in the bit positions that you want to ignore.
The access list is always terminated by an implicit deny statement for everything.
Returns to privileged EXEC mode.

Configuring Trap Flags for SNMP

SUMMARY STEPS

1. configure terminal 2. trapflags ap { interfaceup | register} 3. trapflags client {dot11 | excluded} 4. trapflags dot11-security {ids-sig-attack | wep-decrypt-error} 5. trapflags mesh 6. trapflags rogueap 7. trapflags rrm-params {channels | tx-power} 8. trapflags rrm-profile {coverage | interference | load | noise} 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

trapflags ap { interfaceup | register} Example:
Switch(config)# trapflags ap interfaceup

Enables sending AP-related traps. Use the no form of the command to disable the trap flags.
· interfaceup­ Enables trap when a Cisco AP interface (A or B) comes up.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 797

Configuring Trap Flags for SNMP

Network Management

Step 3 Step 4 Step 5 Step 6 Step 7
Step 8

Command or Action

Purpose
· register­ Enables trap when a Cisco AP registers with a Cisco switch.

trapflags client {dot11 | excluded} Example:
Switch(config)# trapflags client excluded

Enables sending client-related dot11 traps. Use the no form of the command to disable the trap flags.
· dot11­ Enables Dot11 traps for clients.
· excluded­ Enables excluded traps for clients.

trapflags dot11-security {ids-sig-attack | wep-decrypt-error} Example:
Switch(config)# trapflags dot11-security wep-decrypt-error
trapflags mesh Example:

Enables sending 802.11 security-related traps. Use the no form of the command to disable the trap flags.
· ids-sig-attack­ Enables IDS signature attack traps.
· wep-decrypt-error­ Enables traps for WEP decrypt error for clients.
Enables trap for the mesh. Use the no form of the command to disable the trap flags.

Switch(config)# trapflags mesh
trapflags rogueap Example:

Enables trap for rogue AP detection. Use the no form of the command to disable the trap flags.

Switch(config)# trapflags rogueap
trapflags rrm-params {channels | tx-power} Example:
Switch(config)# trapflags rrm-params tx-power

Enables sending RRM-parameter update-related traps. Use the no form of the command to disable the trap flags.
· channels­ Enables trap when RF Manager automatically changes a channel number for the Cisco AP interface.
· tx-power­ Enables the trap when RF Manager automatically changes Tx-Power level for the Cisco AP interface.

trapflags rrm-profile {coverage | interference | load | Enables sending RRM-profile-related traps. Use the no

noise}

form of the command to disable the trap flags.

Example:
Switch(config)# trapflags rrm-profile interference

· coverage­ Enables the trap when the coverage profile maintained by RF Manager fails.
· interference­ Enables the trap when the interference profile maintained by RF Manager fails.

· load­ Enables trap when the load profile maintained by RF Manager fails.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 798

Network Management

Enabling SNMP Wireless Trap Notification

Command or Action

Step 9

end Example:
Switch(config)# end

Purpose · noise­ Enables trap when the noise profile maintained by RF Manager fails.
Returns to privileged EXEC mode.

Enabling SNMP Wireless Trap Notification

SUMMARY STEPS

1. configure terminal 2. snmp-server enable traps wireless [AP | RRM | bsn80211SecurityTrap | bsnAPParamUpdate
| bsnAPProfile | bsnAccessPoint | bsnMobileStation | bsnRogue | client | mfp | rogue] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

snmp-server enable traps wireless [AP | RRM | Enables SNMP wireless trap notification.

bsn80211SecurityTrap | bsnAPParamUpdate | bsnAPProfile | bsnAccessPoint | bsnMobileStation

· AP­ Enables access point traps.

| bsnRogue | client | mfp | rogue]

· RRM­ Enables RRM traps.

Example:
Switch(config)# snmp-server enable traps wireless AP

· bsn80211SecurityTrap­ Enables the security-related trap.
· bsnAPParamUpdate­ Enables the trap for AP parameters that get updated.

· bsnAPProfile­ Enables BSN AP profile traps.

· bsnAccessPoint­ Enables BSN access point traps.

· bsnMobileStation­ Controls wireless client traps.

· bsnRogue­ Enables BSN rogue-related traps.

· client­ Enables client traps.

· mfp­ Enables MFP traps.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 799

Monitoring SNMP Status

Network Management

Command or Action

Step 3

end Example:
Switch(config)# end

Purpose · rogue­ Enables rogue-related traps.
Returns to privileged EXEC mode.

Monitoring SNMP Status

To display SNMP input and output statistics, including the number of illegal community string entries, errors, and requested variables, use the show snmp privileged EXEC command. You also can use the other privileged EXEC commands listed in the table to display SNMP information.
Table 72: Commands for Displaying SNMP Information

Command show snmp show snmp engineID
show snmp group
show snmp pending show snmp sessions show snmp user

Purpose
Displays SNMP statistics.
Displays information on the local SNMP engine and all remote engines that have been configured on the device.
Displays information on each SNMP group on the network.
Displays information on pending SNMP requests.
Displays information on the current SNMP sessions.
Displays information on each SNMP user name in the SNMP users table.
Note You must use this command to display SNMPv3 configuration information for auth | noauth | priv mode. This information is not displayed in the show running-config output.

SNMP Examples
This example shows how to enable all versions of SNMP. The configuration permits any SNMP manager to access all objects with read-only permissions using the community string public. This configuration does not cause the switch to send any traps.
Switch(config)# snmp-server community public

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 800

Network Management

SNMP Examples

This example shows how to permit any SNMP manager to access all objects with read-only permission using the community string public. The switch also sends VTP traps to the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2C. The community string public is sent with the traps.
Switch(config)# snmp-server community public Switch(config)# snmp-server enable traps vtp Switch(config)# snmp-server host 192.180.1.27 version 2c public Switch(config)# snmp-server host 192.180.1.111 version 1 public Switch(config)# snmp-server host 192.180.1.33 public
This example shows how to allow read-only access for all objects to members of access list 4 that use the comaccess community string. No other SNMP managers have access to any objects. SNMP Authentication Failure traps are sent by SNMPv2C to the host cisco.com using the community string public.
Switch(config)# snmp-server community comaccess ro 4 Switch(config)# snmp-server enable traps snmp authentication Switch(config)# snmp-server host cisco.com version 2c public
This example shows how to send Entity MIB traps to the host cisco.com. The community string is restricted. The first line enables the switch to send Entity MIB traps in addition to any traps previously enabled. The second line specifies the destination of these traps and overwrites any previous snmp-server host commands for the host cisco.com.
Switch(config)# snmp-server enable traps entity Switch(config)# snmp-server host cisco.com restricted entity
This example shows how to enable the switch to send all traps to the host myhost.cisco.com using the community string public:
Switch(config)# snmp-server enable traps Switch(config)# snmp-server host myhost.cisco.com public
This example shows how to associate a user with a remote host and to send auth (authNoPriv) authentication-level informs when the user enters global configuration mode:
Switch(config)# snmp-server engineID remote 192.180.1.27 00000063000100a1c0b4011b Switch(config)# snmp-server group authgroup v3 auth Switch(config)# snmp-server user authuser authgroup remote 192.180.1.27 v3 auth md5 mypassword Switch(config)# snmp-server user authuser authgroup v3 auth md5 mypassword Switch(config)# snmp-server host 192.180.1.27 informs version 3 auth authuser config Switch(config)# snmp-server enable traps Switch(config)# snmp-server inform retries 0

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 801

SNMP Examples

Network Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 802

5 3 C H A P T E R
Configuring Service Level Agreements
· Finding Feature Information, on page 803 · Restrictions on SLAs, on page 803 · Information About SLAs, on page 804 · Configuration Guidelines, on page 808 · How to Configure IP SLAs Operations, on page 809 · Monitoring IP SLA Operations, on page 820 · Monitoring IP SLA Operation Examples, on page 821 · Feature History and Information for Service Level Agreements, on page 822
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions on SLAs
This section lists the restrictions on SLAs. The following are restrictions on IP SLAs network performance measurement:
· The switch does not support VoIP service levels using the gatekeeper registration delay operations measurements.
· Only a Cisco IOS device can be a source for a destination IP SLAs responder. · You cannot configure the IP SLAs responder on non-Cisco devices and Cisco IOS IP SLAs can send
operational packets only to services native to those devices.
Related Topics Implementing IP SLA Network Performance Measurement, on page 810 Network Performance Measurement with Cisco IOS IP SLAs, on page 805 IP SLA Responder and IP SLA Control Protocol, on page 805
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 803

Information About SLAs

Network Management

Information About SLAs
Cisco IOS IP Service Level Agreements (SLAs)
Cisco IOS IP SLAs send data across the network to measure performance between multiple network locations or across multiple network paths. They simulate network data and IP services and collect network performance information in real time. Cisco IOS IP SLAs generate and analyze traffic either between Cisco IOS devices or from a Cisco IOS device to a remote IP device such as a network application server. Measurements provided by the various Cisco IOS IP SLA operations can be used for troubleshooting, for problem analysis, and for designing network topologies. Depending on the specific Cisco IOS IP SLA operations, various network performance statistics are monitored within the Cisco device and stored in both command-line interface (CLI) and Simple Network Management Protocol (SNMP) MIBs. IP SLA packets have configurable IP and application layer options such as source and destination IP address, User Datagram Protocol (UDP)/TCP port numbers, a type of service (ToS) byte (including Differentiated Services Code Point [DSCP] and IP Prefix bits), Virtual Private Network (VPN) routing/forwarding instance (VRF), and URL web address. Because Cisco IP SLAs are Layer 2 transport independent, you can configure end-to-end operations over disparate networks to best reflect the metrics that an end user is likely to experience. IP SLAs collect a unique subset of the following performance metrics:
· Delay (both round-trip and one-way) · Jitter (directional) · Packet loss (directional) · Packet sequencing (packet ordering) · Path (per hop) · Connectivity (directional) · Server or website download time
Because Cisco IOS IP SLAs is SNMP-accessible, it can also be used by performance-monitoring applications like Cisco Prime Internetwork Performance Monitor (IPM) and other third-party Cisco partner performance management products. Using IP SLAs can provide the following benefits:
· Service-level agreement monitoring, measurement, and verification. · Network performance monitoring
· Measurement of jitter, latency, or packet loss in the network. · Continuous, reliable, and predictable measurements.
· IP service network health assessment to verify that the existing QoS is sufficient for new IP services. · Edge-to-edge network availability monitoring for proactive verification and connectivity testing of
network resources (for example, shows the network availability of an NFS server used to store business critical data from a remote site).
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 804

Network Management

Network Performance Measurement with Cisco IOS IP SLAs

· Network operation troubleshooting by providing consistent, reliable measurement that immediately identifies problems and saves troubleshooting time.
· Multiprotocol Label Switching (MPLS) performance monitoring and network verification (if the switch supports MPLS).
Network Performance Measurement with Cisco IOS IP SLAs
You can use IP SLAs to monitor the performance between any area in the network--core, distribution, and edge--without deploying a physical probe. It uses generated traffic to measure network performance between two networking devices.
Figure 54: Cisco IOS IP SLAs Operation
The following figure shows how IP SLAs begin when the source device sends a generated packet to the destination device. After the destination device receives the packet, depending on the type of IP SLAs operation, it responds with time-stamp information for the source to make the calculation on performance metrics. An IP SLAs operation performs a network measurement from the source device to a destination in the network using a specific protocol such as

UDP. Related Topics
Implementing IP SLA Network Performance Measurement, on page 810 Restrictions on SLAs, on page 803
IP SLA Responder and IP SLA Control Protocol
The IP SLA responder is a component embedded in the destination Cisco device that allows the system to anticipate and respond to IP SLA request packets. The responder provides accurate measurements without the need for dedicated probes. The responder uses the Cisco IOS IP SLA Control Protocol to provide a mechanism through which it can be notified on which port it should listen and respond.
Note The IP SLA responder can be a Cisco IOS Layer 2, responder-configurable switch. The responder does not need to support full IP SLA functionality.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 805

Response Time Computation for IP SLAs

Network Management

The following figure shows where the Cisco IOS IP SLA responder fits in the IP network. The responder listens on a specific port for control protocol messages sent by an IP SLA operation. Upon receipt of the control message, it enables the specified UDP or TCP port for the specified duration. During this time, the responder accepts the requests and responds to them. It disables the port after it responds to the IP SLA packet, or when the specified time expires. MD5 authentication for control messages is available for added security.
You do not need to enable the responder on the destination device for all IP SLA operations. For example, a responder is not required for services that are already provided by the destination router (such as Telnet or HTTP).
Related Topics Restrictions on SLAs, on page 803
Response Time Computation for IP SLAs
Switches, controllers, and routers can take tens of milliseconds to process incoming packets due to other high priority processes. This delay affects the response times because the test-packet reply might be in a queue while waiting to be processed. In this situation, the response times would not accurately represent true network delays. IP SLAs minimize these processing delays on the source device as well as on the target device (if the responder is being used) to determine true round-trip times. IP SLA test packets use time stamping to minimize the processing delays.
When the IP SLA responder is enabled, it allows the target device to take time stamps when the packet arrives on the interface at interrupt level and again just as it is leaving, eliminating the processing time. This time stamping is made with a granularity of sub-milliseconds (ms).
Figure 55: Cisco IOS IP SLA Responder Time Stamping
The following figure demonstrates how the responder works. Four time stamps are taken to make the calculation for round-trip time. At the target router, with the responder functionality enabled, time stamp 2 (TS2) is subtracted from time stamp 3 (TS3) to produce the time spent processing the test packet as represented by delta. This delta value is then subtracted from the overall round-trip time. Notice that the same principle is applied by IP SLAs on the source router where the incoming time stamp 4 (TS4) is also taken at the interrupt

leveltoallowforgreateraccuracy. An additional benefit of the two time stamps at the target device is the ability to track one-way delay, jitter, and directional packet loss. Because much network behavior is asynchronous, it is critical to have these statistics. However, to capture one-way delay measurements, you must configure both the source router and target router with Network Time Protocol (NTP) so that the source and target are synchronized to the same clock source. One-way jitter measurements do not require clock synchronization.
IP SLAs Operation Scheduling
When you configure an IP SLAs operation, you must schedule the operation to begin capturing statistics and collecting error information. You can schedule an operation to start immediately or to start at a certain month, day, and hour. You can use the pending option to set the operation to start at a later time. The pending option is an internal state of the operation that is visible through SNMP. The pending state is also used when an
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 806

Network Management

IP SLA Operation Threshold Monitoring

operation is a reaction (threshold) operation waiting to be triggered. You can schedule a single IP SLAs operation or a group of operations at one time.
You can schedule several IP SLAs operations by using a single command through the Cisco IOS CLI or the CISCO RTTMON-MIB. Scheduling the operations to run at evenly distributed times allows you to control the amount of IP SLAs monitoring traffic. This distribution of IP SLA operations helps minimize the CPU utilization and thus improves network scalability.
For more details about the IP SLA multi-operations scheduling functionality, see the "IP SLAs--Multiple Operation Scheduling" chapter of the Cisco IOS IP SLAs Configuration Guide.

IP SLA Operation Threshold Monitoring
To support successful service level agreement monitoring, you must have mechanisms that notify you immediately of any possible violation. IP SLAs can send SNMP traps that are triggered by events such as the following:
· Connection loss
· Timeout
· Round-trip time threshold
· Average jitter threshold
· One-way packet loss
· One-way jitter
· One-way mean opinion score (MOS)
· One-way latency
An IP SLA threshold violation can also trigger another IP SLA operation for further analysis. For example, the frequency could be increased or an Internet Control Message Protocol (ICMP) path echo or ICMP path jitter operation could be initiated for troubleshooting.
ICMP Echo The ICMP echo operation measures the end-to-end response time between a Cisco device and any other device that uses IP. The response time is computed by measuring the time it takes to send an ICMP echo request message to a destination and receive an ICMP echo reply. Many customers use IP SLA ICMP-based operations, in-house ping testing, or ping-based dedicated probes to measure this response time. The IP SLA ICMP echo operation conforms to the same specifications as ICMP ping testing, and both methods result in the same response times. Related Topics
Analyzing IP Service Levels by Using the ICMP Echo Operation, on page 817

UDP Jitter

Jitter is a simple term that describes interpacket delay variance. When multiple packets are sent consecutively at an interval of 10 ms from source to destination, the destination should receive them 10 ms apart (if the network is behaving correctly). However, if there are delays in the network (such as queuing, arriving through alternate routes, and so on), the time interval between packet arrivals might be more or less than 10 ms. A

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 807

Configuration Guidelines

Network Management

positive jitter value indicates that the packets arrived more than 10 ms apart. A negative jitter value indicates that the packets arrived less than 10 ms apart. If the packets arrive 12 ms apart, the positive jitter is 2 ms; if the packets arrive 8 ms apart, the negative jitter is 2 ms. For delay-sensitive networks, positive jitter values are undesirable, and a jitter value of 0 is ideal.
In addition to monitoring jitter, the IP SLA UDP jitter operation can be used as a multipurpose data gathering operation. The packets generated by IP SLAs carry sequence information and time stamps from the source and operational target that include packet sending and receiving data. Based on this data, UDP jitter operations measure the following:
· Per-direction jitter (source to destination and destination to source)
· Per-direction packet-loss
· Per-direction delay (one-way delay)
· Round-trip delay (average round-trip time)
Because the paths for the sending and receiving of data can be different (asymmetric), you can use the per-direction data to more readily identify where congestion or other problems are occurring in the network.
The UDP jitter operation generates synthetic (simulated) UDP traffic and sends a number of UDP packets, each of a specified size, sent a specified number of milliseconds apart, from a source router to a target router, at a given frequency. By default, ten packet-frames, each with a payload size of 10 bytes are generated every 10 ms, and the operation is repeated every 60 seconds. You can configure each of these parameters to best simulate the IP service you want to provide.
To provide accurate one-way delay (latency) measurements, time synchronization (as provided by NTP) is required between the source and the target device. Time synchronization is not required for the one-way jitter and packet loss measurements. If the time is not synchronized between the source and target devices, one-way jitter and packet loss data is returned, but values of 0 are returned for the one-way delay measurements provided by the UDP jitter operation.
Related Topics Analyzing IP Service Levels by Using the UDP Jitter Operation, on page 814
Configuration Guidelines
For information on the IP SLA commands, see the Cisco IOS IP SLAs Command Reference, Release 12.4T command reference.
For detailed descriptions and configuration procedures, see the Cisco IOS IP SLAs Configuration Guide, Release 12.4TL.
Not all of the IP SLA commands or operations described in the referenced guide are supported on the switch. The switch supports IP service level analysis by using UDP jitter, UDP echo, HTTP, TCP connect, ICMP echo, ICMP path echo, ICMP path jitter, FTP, DNS, and DHCP, as well as multiple operation scheduling and proactive threshold monitoring. It does not support VoIP service levels using the gatekeeper registration delay operations measurements.
Before configuring any IP SLAs application, you can use the show ip sla application privileged EXEC command to verify that the operation type is supported on your software image. This is an example of the output from the command:
Switch# show ip sla application

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 808

Network Management

How to Configure IP SLAs Operations

IP Service Level Agreements Version: Round Trip Time MIB 2.2.0, Infrastructure Engine-III

Supported Operation Types: icmpEcho, path-echo, path-jitter, udpEcho, tcpConnect, http dns, udpJitter, dhcp, ftp, udpApp, wspApp

Supported Features: IPSLAs Event Publisher

IP SLAs low memory water mark: 33299323 Estimated system max number of entries: 24389

Estimated number of configurable operations: 24389

Number of Entries configured : 0

Number of active Entries

:0

Number of pending Entries

:0

Number of inactive Entries : 0

Time of last change in whole IP SLAs: *13:04:37.668 UTC Wed Dec 19 2012

How to Configure IP SLAs Operations
This section does not include configuration information for all available operations as the configuration information details are included in the Cisco IOS IP SLAs Configuration Guide. It does include several operations as examples, including configuring the responder, configuring a UDP jitter operation, which requires a responder, and configuring an ICMP echo operation, which does not require a responder. For details about configuring other operations, see the Cisco IOS IP SLAs Configuration Guide.

Configuring the IP SLA Responder
The IP SLA responder is available only on Cisco IOS software-based devices, including some Layer 2 switches that do not support full IP SLA functionality.
Beginning in privileged EXEC mode, follow these steps to configure the IP SLA responder on the target device (the operational target):

SUMMARY STEPS

1. configure terminal 2. ip sla responder {tcp-connect | udp-echo} ipaddress ip-address port port-number 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 809

Implementing IP SLA Network Performance Measurement

Network Management

Step 2

Command or Action

Purpose

ip sla responder {tcp-connect | udp-echo} ipaddress Configures the switch as an IP SLA responder.

ip-address port port-number

The keywords have these meanings:

Example:

· tcp-connect--Enables the responder for TCP connect

Switch(config)# ip sla responder udp-echo

operations.

172.29.139.134 5000

· udp-echo--Enables the responder for User Datagram

Protocol (UDP) echo or jitter operations.

· ipaddress ip-address--Enter the destination IP address.

· port port-number--Enter the destination port number.

Note The IP address and port number must match those configured on the source device for the IP SLA operation.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

UDP Jitter Example This example shows how to configure the device as a responder for the UDP jitter IP SLA operation in the next procedure:
Switch(config)# ip sla responder udp-echo 172.29.139.134 5000

Implementing IP SLA Network Performance Measurement
Beginning in privileged EXEC mode, follow these steps to implement IP SLA network performance measurement on your switch:

Before you begin
Use the show ip sla application privileged EXEC command to verify that the desired operation type is supported on your software image.

SUMMARY STEPS

1. configure terminal 2. ip sla operation-number

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 810

Network Management

Implementing IP SLA Network Performance Measurement

3. udp-jitter {destination-ip-address | destination-hostname} destination-port [source-ip {ip-address | hostname}] [source-port port-number] [control {enable | disable}] [num-packets number-of-packets] [interval interpacket-interval]
4. frequency seconds 5. threshold milliseconds 6. exit 7. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day
month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring] 8. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip sla operation-number Example:
Switch(config)# ip sla 10

Creates an IP SLA operation, and enters IP SLA configuration mode.

Step 3

udp-jitter {destination-ip-address | destination-hostname} Configures the IP SLA operation as the operation type of

destination-port [source-ip {ip-address | hostname}]

your choice (a UDP jitter operation is used in the example),

[source-port port-number] [control {enable | disable}] and enters its configuration mode (UDP jitter configuration

[num-packets number-of-packets] [interval

mode is used in the example).

interpacket-interval]

· destination-ip-address |

Example:

destination-hostname--Specifies the destination IP

address or hostname.

Switch(config-ip-sla)# udp-jitter 172.29.139.134 5000

· destination-port--Specifies the destination port number in the range from 1 to 65535.

· (Optional) source-ip {ip-address | hostname}--Specifies the source IP address or hostname. When a source IP address or hostname is not specified, IP SLA chooses the IP address nearest to the destination

· (Optional) source-port port-number--Specifies the source port number in the range from 1 to 65535. When a port number is not specified, IP SLA chooses an available port.

· (Optional) control--Enables or disables sending of IP SLA control messages to the IP SLA responder. By default, IP SLA control messages are sent to the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 811

Implementing IP SLA Network Performance Measurement

Network Management

Command or Action

Step 4

frequency seconds Example:
Switch(config-ip-sla-jitter)# frequency 45

Purpose destination device to establish a connection with the IP SLA responder
· (Optional) num-packets number-of-packets--Enters the number of packets to be generated. The range is 1 to 6000; the default is 10.
· (Optional) interval inter-packet-interval--Enters the interval between sending packets in milliseconds. The range is 1 to 6000; the default value is 20 ms.
(Optional) Configures options for the SLA operation. This example sets the rate at which a specified IP SLA operation repeats. The range is from 1 to 604800 seconds; the default is 60 seconds.

Step 5

threshold milliseconds Example:
Switch(config-ip-sla-jitter)# threshold 200

(Optional) Configures threshold conditions. This example sets the threshold of the specified IP SLA operation to 200. The range is from 0 to 60000 milliseconds.

Step 6

exit Example:
Switch(config-ip-sla-jitter)# exit

Exits the SLA operation configuration mode (UDP jitter configuration mode in this example), and returns to global configuration mode.

Step 7

ip sla schedule operation-number [life {forever | seconds}] Configures the scheduling parameters for an individual IP

[start-time {hh:mm [:ss] [month day | day month] | pending SLA operation.

| now | after hh:mm:ss] [ageout seconds] [recurring]

· operation-number--Enter the RTR entry number.

Example:

· (Optional) life--Sets the operation to run indefinitely

Switch(config)# ip sla schedule 10 start-time now life forever

(forever) or for a specific number of seconds. The range is from 0 to 2147483647. The default is 3600 seconds (1 hour).

· (Optional) start-time--Enters the time for the operation to begin collecting information:

To start at a specific time, enter the hour, minute, second (in 24-hour notation), and day of the month. If no month is entered, the default is the current month.

Enter pending to select no information collection until a start time is selected.

Enter now to start the operation immediately.

Enter after hh:mm:ss to show that the operation should start after the entered time has elapsed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 812

Network Management

Implementing IP SLA Network Performance Measurement

Command or Action

Step 8

end Example:
Switch(config)# end

Purpose · (Optional) ageout seconds--Enter the number of seconds to keep the operation in memory when it is not actively collecting information. The range is 0 to 2073600 seconds, the default is 0 seconds (never ages out).
· (Optional) recurring--Set the operation to automatically run every day.
Returns to privileged EXEC mode.

UDP Jitter Configuration
This example shows how to configure a UDP jitter IP SLA operation:
Switch(config)# ip sla 10 Switch(config-ip-sla)# udp-jitter 172.29.139.134 5000 Switch(config-ip-sla-jitter)# frequency 30 Switch(config-ip-sla-jitter)# exit Switch(config)# ip sla schedule 5 start-time now life forever Switch(config)# end Switch# show ip sla configuration 10 IP SLAs, Infrastructure Engine-II.
Entry number: 10 Owner: Tag: Type of operation to perform: udp-jitter Target address/Source address: 1.1.1.1/0.0.0.0 Target port/Source port: 2/0 Request size (ARR data portion): 32 Operation timeout (milliseconds): 5000 Packet Interval (milliseconds)/Number of packets: 20/10 Type Of Service parameters: 0x0 Verify data: No Vrf Name: Control Packets: enabled Schedule:
Operation frequency (seconds): 30 Next Scheduled Start Time: Pending trigger Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): 3600 Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): notInService Threshold (milliseconds): 5000 Distribution Statistics: Number of statistic hours kept: 2 Number of statistic distribution buckets kept: 1 Statistic distribution interval (milliseconds): 20

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 813

Analyzing IP Service Levels by Using the UDP Jitter Operation

Network Management

Enhanced History:

Related Topics Network Performance Measurement with Cisco IOS IP SLAs, on page 805 Restrictions on SLAs, on page 803

Analyzing IP Service Levels by Using the UDP Jitter Operation
Beginning in privileged EXEC mode, follow these steps to configure a UDP jitter operation on the source device:

Before you begin
You must enable the IP SLA responder on the target device (the operational target) to configure a UDP jitter operation on the source device.

SUMMARY STEPS

1. configure terminal 2. ip sla operation-number 3. udp-jitter {destination-ip-address | destination-hostname} destination-port [source-ip {ip-address |
hostname}] [source-port port-number] [control {enable | disable}] [num-packets number-of-packets] [interval interpacket-interval] 4. frequency seconds 5. exit 6. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring] 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip sla operation-number Example:
Switch(config)# ip sla 10

Creates an IP SLA operation, and enters IP SLA configuration mode.

Step 3

udp-jitter {destination-ip-address | destination-hostname} Configures the IP SLA operation as a UDP jitter operation,

destination-port [source-ip {ip-address | hostname}]

and enters UDP jitter configuration mode.

[source-port port-number] [control {enable | disable}]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 814

Network Management

Analyzing IP Service Levels by Using the UDP Jitter Operation

Step 4

Command or Action

Purpose

[num-packets number-of-packets] [interval interpacket-interval] Example:
Switch(config-ip-sla)# udp-jitter 172.29.139.134 5000

· destination-ip-address | destination-hostname--Specifies the destination IP address or hostname.
· destination-port--Specifies the destination port number in the range from 1 to 65535.
· (Optional) source-ip {ip-address | hostname}--Specifies the source IP address or hostname. When a source IP address or hostname is not specified, IP SLA chooses the IP address nearest to the destination.

· (Optional) source-port port-number--Specifies the source port number in the range from 1 to 65535. When a port number is not specified, IP SLA chooses an available port.

· (Optional) control--Enables or disables sending of IP SLA control messages to the IP SLA responder. By default, IP SLA control messages are sent to the destination device to establish a connection with the IP SLA responder.

· (Optional) num-packets number-of-packets--Enters the number of packets to be generated. The range is 1 to 6000; the default is 10.

· (Optional) interval inter-packet-interval--Enters the interval between sending packets in milliseconds. The range is 1 to 6000; the default value is 20 ms.

frequency seconds Example:
Switch(config-ip-sla-jitter)# frequency 45

(Optional) Sets the rate at which a specified IP SLA operation repeats. The range is from 1 to 604800 seconds; the default is 60 seconds.

Step 5

exit Example:
Switch(config-ip-sla-jitter)# exit

Exits UDP jitter configuration mode, and returns to global configuration mode.

Step 6

ip sla schedule operation-number [life {forever | seconds}] Configures the scheduling parameters for an individual IP

[start-time {hh:mm [:ss] [month day | day month] | pending SLA operation.

| now | after hh:mm:ss] [ageout seconds] [recurring]

· operation-number--Enter the RTR entry number.

Example:

· (Optional) life--Sets the operation to run indefinitely

Switch(config)# ip sla schedule 10 start-time now

(forever) or for a specific number of seconds. The

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 815

Analyzing IP Service Levels by Using the UDP Jitter Operation

Network Management

Command or Action
life forever

Step 7

end Example:
Switch(config)# end

Purpose range is from 0 to 2147483647. The default is 3600 seconds (1 hour).
· (Optional) start-time--Enters the time for the operation to begin collecting information:
To start at a specific time, enter the hour, minute, second (in 24-hour notation), and day of the month. If no month is entered, the default is the current month.
Enter pending to select no information collection until a start time is selected.
Enter now to start the operation immediately.
Enter after hh:mm:ss to show that the operation should start after the entered time has elapsed.
· (Optional) ageout seconds--Enter the number of seconds to keep the operation in memory when it is not actively collecting information. The range is 0 to 2073600 seconds, the default is 0 seconds (never ages out).
· (Optional) recurring--Set the operation to automatically run every day.
Returns to privileged EXEC mode.

Configuring a UDP Jitter IP SLA Operation
This example shows how to configure a UDP jitter IP SLA operation:
Switch(config)# ip sla 10 Switch(config-ip-sla)# udp-jitter 172.29.139.134 5000 Switch(config-ip-sla-jitter)# frequency 30 Switch(config-ip-sla-jitter)# exit Switch(config)# ip sla schedule 5 start-time now life forever Switch(config)# end Switch# show ip sla configuration 10 IP SLAs, Infrastructure Engine-II.
Entry number: 10 Owner: Tag: Type of operation to perform: udp-jitter Target address/Source address: 1.1.1.1/0.0.0.0 Target port/Source port: 2/0 Request size (ARR data portion): 32 Operation timeout (milliseconds): 5000

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 816

Network Management

Analyzing IP Service Levels by Using the ICMP Echo Operation

Packet Interval (milliseconds)/Number of packets: 20/10 Type Of Service parameters: 0x0 Verify data: No Vrf Name: Control Packets: enabled Schedule:
Operation frequency (seconds): 30 Next Scheduled Start Time: Pending trigger Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): 3600 Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): notInService Threshold (milliseconds): 5000 Distribution Statistics: Number of statistic hours kept: 2 Number of statistic distribution buckets kept: 1 Statistic distribution interval (milliseconds): 20 Enhanced History:

Related Topics UDP Jitter, on page 807

Analyzing IP Service Levels by Using the ICMP Echo Operation
Beginning in privileged EXEC mode, follow these steps to configure an ICMP echo operation on the source device:

Before you begin This operation does not require the IP SLA responder to be enabled.

SUMMARY STEPS

1. configure terminal 2. ip sla operation-number 3. icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-address | hostname} |
source-interface interface-id] 4. frequency seconds 5. exit 6. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day
month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring] 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 817

Analyzing IP Service Levels by Using the ICMP Echo Operation

Network Management

Command or Action
Switch# configure terminal

Purpose

Step 2

ip sla operation-number Example:
Switch(config)# ip sla 10

Creates an IP SLA operation and enters IP SLA configuration mode.

Step 3 Step 4

icmp-echo {destination-ip-address | destination-hostname} Configures the IP SLA operation as an ICMP Echo [source-ip {ip-address | hostname} | source-interface operation and enters ICMP echo configuration mode.

interface-id] Example:

· destination-ip-address | destination-hostname--Specifies the destination IP address or hostname.

Switch(config-ip-sla)# icmp-echo 172.29.139.134

· (Optional) source-ip {ip-address |

hostname}--Specifies the source IP address or hostname. When a source IP address or hostname is not specified, IP SLA chooses the IP address nearest to the destination.

· (Optional) source-interface interface-id--Specifies the source interface for the operation.

frequency seconds Example:
Switch(config-ip-sla-echo)# frequency 30

(Optional) Sets the rate at which a specified IP SLA operation repeats. The range is from 1 to 604800 seconds; the default is 60 seconds.

Step 5

exit Example:
Switch(config-ip-sla-echo)# exit

Exits UDP echo configuration mode, and returns to global configuration mode.

Step 6

ip sla schedule operation-number [life {forever | seconds}] Configures the scheduling parameters for an individual IP

[start-time {hh:mm [:ss] [month day | day month] | pending SLA operation.

| now | after hh:mm:ss] [ageout seconds] [recurring]

· operation-number--Enter the RTR entry number.

Example:

· (Optional) life--Sets the operation to run indefinitely

Switch(config)# ip sla schedule 5 start-time now life forever

(forever) or for a specific number of seconds. The range is from 0 to 2147483647. The default is 3600 seconds (1 hour)

· (Optional) start-time--Enter the time for the operation to begin collecting information:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 818

Network Management

Analyzing IP Service Levels by Using the ICMP Echo Operation

Command or Action

Step 7

end Example:
Switch(config)# end

Purpose To start at a specific time, enter the hour, minute, second (in 24-hour notation), and day of the month. If no month is entered, the default is the current month.
Enter pending to select no information collection until a start time is selected.
Enter now to start the operation immediately.
Enter after hh:mm:ss to indicate that the operation should start after the entered time has elapsed.
· (Optional) ageout seconds--Enter the number of seconds to keep the operation in memory when it is not actively collecting information. The range is 0 to 2073600 seconds; the default is 0 seconds (never ages out).
· (Optional) recurring--Sets the operation to automatically run every day.
Returns to privileged EXEC mode.

Configuring an ICMP Echo IP SLA Operation
This example shows how to configure an ICMP echo IP SLA operation:
Switch(config)# ip sla 12 Switch(config-ip-sla)# icmp-echo 172.29.139.134 Switch(config-ip-sla-echo)# frequency 30 Switch(config-ip-sla-echo)# exit Switch(config)# ip sla schedule 5 start-time now life forever Switch(config)# end Switch# show ip sla configuration 22 IP SLAs, Infrastructure Engine-II.
Entry number: 12 Owner: Tag: Type of operation to perform: echo Target address: 2.2.2.2 Source address: 0.0.0.0 Request size (ARR data portion): 28 Operation timeout (milliseconds): 5000 Type Of Service parameters: 0x0 Verify data: No Vrf Name: Schedule:
Operation frequency (seconds): 60 Next Scheduled Start Time: Pending trigger Group Scheduled : FALSE

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 819

Monitoring IP SLA Operations

Network Management

Randomly Scheduled : FALSE Life (seconds): 3600 Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): notInService Threshold (milliseconds): 5000 Distribution Statistics: Number of statistic hours kept: 2 Number of statistic distribution buckets kept: 1 Statistic distribution interval (milliseconds): 20 History Statistics: Number of history Lives kept: 0 Number of history Buckets kept: 15 History Filter Type: None Enhanced History:
Related Topics IP SLA Operation Threshold Monitoring, on page 807

Monitoring IP SLA Operations
The following table describes the commands used to display IP SLA operation configurations and results:
Table 73: Monitoring IP SLA Operations

show ip sla application

Displays global information about Cisco IOS IP SLAs.

show ip sla authentication

Displays IP SLA authentication information.

show ip sla configuration [entry-number]

Displays configuration values including all defaults for all IP SLA operations or a specific operation.

show ip sla enhanced-history {collection-statistics Displays enhanced history statistics for collected

| distribution statistics} [entry-number]

history buckets or distribution statistics for all IP SLA

operations or a specific operation.

show ip sla ethernet-monitor configuration [entry-number]

Displays IP SLA automatic Ethernet configuration.

show ip sla group schedule [schedule-entry-number] Displays IP SLA group scheduling configuration and details.

show ip sla history [entry-number | full | tabular] Displays history collected for all IP SLA operations.

show ip sla mpls-lsp-monitor {collection-statistics Displays MPLS label switched path (LSP) Health | configuration | ldp operational-state | scan-queue Monitor operations. | summary [entry-number] | neighbors}

show ip sla reaction-configuration [entry-number] Displays the configured proactive threshold monitoring settings for all IP SLA operations or a specific operation.

show ip sla reaction-trigger [entry-number]

Displays the reaction trigger information for all IP SLA operations or a specific operation.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 820

Network Management

Monitoring IP SLA Operation Examples

show ip sla responder

Displays information about the IP SLA responder.

show ip sla statistics [entry-number | aggregated | Displays current or aggregated operational status and

details]

statistics.

Monitoring IP SLA Operation Examples

The following example shows all IP SLAs by application:
Switch# show ip sla application

IP Service Level Agreements Version: Round Trip Time MIB 2.2.0, Infrastructure Engine-III

Supported Operation Types: icmpEcho, path-echo, path-jitter, udpEcho, tcpConnect, http dns, udpJitter, dhcp, ftp, udpApp, wspApp

Supported Features: IPSLAs Event Publisher

IP SLAs low memory water mark: 33299323 Estimated system max number of entries: 24389

Estimated number of configurable operations: 24389

Number of Entries configured : 0

Number of active Entries

:0

Number of pending Entries

:0

Number of inactive Entries : 0

Time of last change in whole IP SLAs: *13:04:37.668 UTC Wed Dec 19 2012

The following example shows all IP SLA distribution statistics:

Switch# show ip sla enhanced-history distribution-statistics

Point by point Enhanced History

Entry = Entry Number

Int

= Aggregation Interval

BucI

= Bucket Index

StartT = Aggregation Start Time

Pth

= Path index

Hop

= Hop in path index

Comps = Operations completed

OvrTh = Operations completed over thresholds

SumCmp = Sum of RTT (milliseconds)

SumCmp2L = Sum of RTT squared low 32 bits (milliseconds)

SumCmp2H = Sum of RTT squared high 32 bits (milliseconds)

TMax

= RTT maximum (milliseconds)

TMin

= RTT minimum (milliseconds)

Entry Int BucI StartT Max TMin

Pth Hop Comps OvrTh SumCmp

SumCmp2L SumCmp2H T

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 821

Feature History and Information for Service Level Agreements

Network Management

Feature History and Information for Service Level Agreements

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 822

5 4 C H A P T E R
Configuring SPAN and RSPAN
· Finding Feature Information, on page 823 · Prerequisites for SPAN and RSPAN, on page 823 · Restrictions for SPAN and RSPAN, on page 824 · Information About SPAN and RSPAN, on page 825 · How to Configure SPAN and RSPAN, on page 837 · Monitoring SPAN and RSPAN Operations, on page 855 · SPAN and RSPAN Configuration Examples, on page 855 · Additional References, on page 858 · Feature History and Information for SPAN and RSPAN, on page 859
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for SPAN and RSPAN
SPAN · You can limit SPAN traffic to specific VLANs by using the filter vlan keyword. If a trunk port is being monitored, only traffic on the VLANs specified with this keyword is monitored. By default, all VLANs are monitored on a trunk port.
RSPAN · We recommend that you configure an RSPAN VLAN before you configure an RSPAN source or a destination session.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 823

Restrictions for SPAN and RSPAN

Network Management

Restrictions for SPAN and RSPAN
SPAN The restrictions for SPAN are as follows:
· On each switch, you can configure 66 sessions. A maximum of 7 source sessions can be configured and the remaining sessions can be configured as RSPAN destinations sessions. A source session is either a local SPAN session or an RSPAN source session.
· For SPAN sources, you can monitor traffic for a single port or VLAN or a series or range of ports or VLANs for each session. You cannot mix source ports and source VLANs within a single SPAN session.
· The destination port cannot be a source port; a source port cannot be a destination port.
· You cannot have two SPAN sessions using the same destination port.
· When you configure a switch port as a SPAN destination port, it is no longer a normal switch port; only monitored traffic passes through the SPAN destination port.
· Entering SPAN configuration commands does not remove previously configured SPAN parameters. You must enter the no monitor session {session_number | all | local | remote} global configuration command to delete configured SPAN parameters.
· For local SPAN, outgoing packets through the SPAN destination port carry the original encapsulation headers--untagged, ISL, or IEEE 802.1Q--if the encapsulation replicate keywords are specified. If the keywords are not specified, the packets are sent in native form.
· You can configure a disabled port to be a source or destination port, but the SPAN function does not start until the destination port and at least one source port or source VLAN are enabled.
· You cannot mix source VLANs and filter VLANs within a single SPAN session.
Traffic monitoring in a SPAN session has the following restrictions: · Sources can be ports or VLANs, but you cannot mix source ports and source VLANs in the same session.
· Wireshark does not capture egress packets when egress span is active.
· You can run both a local SPAN and an RSPAN source session in the same switch or switch stack. The switch or switch stack supports a total of 66 source and RSPAN destination sessions.
· You can configure two separate SPAN or RSPAN source sessions with separate or overlapping sets of SPAN source ports and VLANs. Both switched and routed ports can be configured as SPAN sources and destinations.
· You can have multiple destination ports in a SPAN session, but no more than 64 destination ports per switch stack.
· SPAN sessions do not interfere with the normal operation of the switch. However, an oversubscribed SPAN destination, for example, a 10-Mb/s port monitoring a 100-Mb/s port, can result in dropped or lost packets.
· When SPAN or RSPAN is enabled, each packet being monitored is sent twice, once as normal traffic and once as a monitored packet. Monitoring a large number of ports or VLANs could potentially generate large amounts of network traffic.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 824

Network Management

Information About SPAN and RSPAN

· You can configure SPAN sessions on disabled ports; however, a SPAN session does not become active unless you enable the destination port and at least one source port or VLAN for that session.
· The switch does not support a combination of local SPAN and RSPAN in a single session. · An RSPAN source session cannot have a local destination port.
· An RSPAN destination session cannot have a local source port.
· An RSPAN destination session and an RSPAN source session that are using the same RSPAN VLAN cannot run on the same switch or switch stack.
RSPAN The restrictions for RSPAN are as follows:
· RSPAN does not support BPDU packet monitoring or other Layer 2 switch protocols.
· The RSPAN VLAN is configured only on trunk ports and not on access ports. To avoid unwanted traffic in RSPAN VLANs, make sure that the VLAN remote-span feature is supported in all the participating switches.
· RSPAN VLANs are included as sources for port-based RSPAN sessions when source trunk ports have active RSPAN VLANs. RSPAN VLANs can also be sources in SPAN sessions. However, since the switch does not monitor spanned traffic, it does not support egress spanning of packets on any RSPAN VLAN identified as the destination of an RSPAN source session on the switch.
· If you enable VTP and VTP pruning, RSPAN traffic is pruned in the trunks to prevent the unwanted flooding of RSPAN traffic across the network for VLAN IDs that are lower than 1005.
· To use RSPAN, the switch must be running the LAN Base image.
Information About SPAN and RSPAN
SPAN and RSPAN
You can analyze network traffic passing through ports or VLANs by using SPAN or RSPAN to send a copy of the traffic to another port on the switch or on another switch that has been connected to a network analyzer or other monitoring or security device. SPAN copies (or mirrors) traffic received or sent (or both) on source ports or source VLANs to a destination port for analysis. SPAN does not affect the switching of network traffic on the source ports or VLANs. You must dedicate the destination port for SPAN use. Except for traffic that is required for the SPAN or RSPAN session, destination ports do not receive or forward traffic. Only traffic that enters or leaves source ports or traffic that enters or leaves source VLANs can be monitored by using SPAN; traffic routed to a source VLAN cannot be monitored. For example, if incoming traffic is being monitored, traffic that gets routed from another VLAN to the source VLAN cannot be monitored; however, traffic that is received on the source VLAN and routed to another VLAN can be monitored. You can use the SPAN or RSPAN destination port to inject traffic from a network security device. For example, if you connect a Cisco Intrusion Detection System (IDS) sensor appliance to a destination port, the IDS device can send TCP reset packets to close down the TCP session of a suspected attacker.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 825

Local SPAN

Network Management

Local SPAN

Local SPAN supports a SPAN session entirely within one switch; all source ports or source VLANs and destination ports are in the same switch or switch stack. Local SPAN copies traffic from one or more source ports in any VLAN or from one or more VLANs to a destination port for analysis.
Figure 56: Example of Local SPAN Configuration on a Single Device
All traffic on port 5 (the source port) is mirrored to port 10 (the destination port). A network analyzer on port 10 receives all network traffic from port 5 without being physically attached to port

5.
Figure 57: Example of Local SPAN Configuration on a Device Stack
This is an example of a local SPAN in a switch stack, where the source and destination ports reside on different stack members.

Related Topics Creating a Local SPAN Session, on page 837
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 826

Network Management

Remote SPAN

Creating a Local SPAN Session and Configuring Incoming Traffic, on page 839 Example: Configuring Local SPAN, on page 855

Remote SPAN

RSPAN supports source ports, source VLANs, and destination ports on different switches (or different switch stacks), enabling remote monitoring of multiple switches across your network.
Figure 58: Example of RSPAN Configuration
The figure below shows source ports on Switch A and Switch B. The traffic for each RSPAN session is carried over a user-specified RSPAN VLAN that is dedicated for that RSPAN session in all participating switches. The RSPAN traffic from the source ports or VLANs is copied into the RSPAN VLAN and forwarded over trunk ports carrying the RSPAN VLAN to a destination session monitoring the RSPAN VLAN. Each RSPAN source switch must have either ports or VLANs as RSPAN sources. The destination is always a physical port,

as shown on Switch C in the figure. Related Topics
Creating an RSPAN Source Session, on page 844 Creating an RSPAN Destination Session, on page 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 848 Examples: Creating an RSPAN VLAN, on page 857
SPAN and RSPAN Concepts and Terminology
· SPAN Sessions
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 827

SPAN Sessions

Network Management

SPAN Sessions

· Monitored Traffic
· Source Ports
· Source VLANs
· VLAN Filtering
· Destination Port
· RSPAN VLAN
SPAN sessions (local or remote) allow you to monitor traffic on one or more ports, or one or more VLANs, and send the monitored traffic to one or more destination ports. A local SPAN session is an association of a destination port with source ports or source VLANs, all on a single network device. Local SPAN does not have separate source and destination sessions. Local SPAN sessions gather a set of ingress and egress packets specified by the user and form them into a stream of SPAN data, which is directed to the destination port. RSPAN consists of at least one RSPAN source session, an RSPAN VLAN, and at least one RSPAN destination session. You separately configure RSPAN source sessions and RSPAN destination sessions on different network devices. To configure an RSPAN source session on a device, you associate a set of source ports or source VLANs with an RSPAN VLAN. The output of this session is the stream of SPAN packets that are sent to the RSPAN VLAN. To configure an RSPAN destination session on another device, you associate the destination port with the RSPAN VLAN. The destination session collects all RSPAN VLAN traffic and sends it out the RSPAN destination port. An RSPAN source session is very similar to a local SPAN session, except for where the packet stream is directed. In an RSPAN source session, SPAN packets are relabeled with the RSPAN VLAN ID and directed over normal trunk ports to the destination switch. An RSPAN destination session takes all packets received on the RSPAN VLAN, strips off the VLAN tagging, and presents them on the destination port. The session presents a copy of all RSPAN VLAN packets (except Layer 2 control packets) to the user for analysis. A single RSPAN session with multiple source and destination ports can be in the same session but more than one source session with the source being the same remote vlan is not allowed. Traffic monitoring in a SPAN session has these restrictions:
· Sources can be ports or VLANs, but you cannot mix source ports and source VLANs in the same session.
· The switch supports up to two local SPAN or RSPAN source sessions. · You can run both a local SPAN and an RSPAN source session in the same switch or switch stack. The switch or switch stack supports a total of 64 source and RSPAN destination sessions.
· You can configure two separate SPAN or RSPAN source sessions with separate or overlapping sets of SPAN source ports and VLANs. Both switched and routed ports can be configured as SPAN sources and destinations.
· You can have multiple destination ports in a SPAN session, but no more than 64 destination ports per switch stack.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 828

Network Management

Monitored Traffic

· SPAN sessions do not interfere with the normal operation of the switch. However, an oversubscribed SPAN destination, for example, a 10-Mb/s port monitoring a 100-Mb/s port, can result in dropped or lost packets.
· When SPAN or RSPAN is enabled, each packet being monitored is sent twice, once as normal traffic and once as a monitored packet. Therefore monitoring a large number of ports or VLANs could potentially generate large amounts of network traffic.
· You can configure SPAN sessions on disabled ports; however, a SPAN session does not become active unless you enable the destination port and at least one source port or VLAN for that session.
· The switch does not support a combination of local SPAN and RSPAN in a single session.
· An RSPAN source session cannot have a local destination port.
· An RSPAN destination session cannot have a local source port.
· An RSPAN destination session and an RSPAN source session that are using the same RSPAN VLAN cannot run on the same switch or switch stack.

Monitored Traffic

Related Topics Creating a Local SPAN Session, on page 837 Creating a Local SPAN Session and Configuring Incoming Traffic, on page 839 Example: Configuring Local SPAN, on page 855
SPAN sessions can monitor these traffic types:
· Receive (Rx) SPAN--Receive (or ingress) SPAN monitors as much as possible all of the packets received by the source interface or VLAN before any modification or processing is performed by the switch. A copy of each packet received by the source is sent to the destination port for that SPAN session.
Packets that are modified because of routing or Quality of Service (QoS)--for example, modified Differentiated Services Code Point (DSCP)--are copied before modification.
Features that can cause a packet to be dropped during receive processing have no effect on ingress SPAN; the destination port receives a copy of the packet even if the actual incoming packet is dropped. These features include IP standard and extended input Access Control Lists (ACLs), ingress QoS policing, VLAN ACLs, and egress QoS policing.
· Transmit (Tx) SPAN--Transmit (or egress) SPAN monitors as much as possible all of the packets sent by the source interface after all modification and processing is performed by the switch. A copy of each packet sent by the source is sent to the destination port for that SPAN session. The copy is provided after the packet is modified.
Packets that are modified because of routing (for example, with modified time-to-live (TTL), MAC address, or QoS values) are duplicated (with the modifications) at the destination port.
Features that can cause a packet to be dropped during transmit processing also affect the duplicated copy for SPAN. These features include IP standard and extended output ACLs and egress QoS policing.
· Both--In a SPAN session, you can also monitor a port or VLAN for both received and sent packets. This is the default.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 829

Source Ports

Network Management

Source Ports

The default configuration for local SPAN session ports is to send all packets untagged. However, when you enter the encapsulation replicate keywords while configuring a destination port, these changes occur:
· Packets are sent on the destination port with the same encapsulation (untagged or IEEE 802.1Q) that they had on the source port.
· Packets of all types, including BPDU and Layer 2 protocol packets, are monitored.
Therefore, a local SPAN session with encapsulation replicate enabled can have a mixture of untagged and IEEE 802.1Q tagged packets appear on the destination port. Switch congestion can cause packets to be dropped at ingress source ports, egress source ports, or SPAN destination ports. In general, these characteristics are independent of one another. For example:
· A packet might be forwarded normally but dropped from monitoring due to an oversubscribed SPAN destination port.
· An ingress packet might be dropped from normal forwarding, but still appear on the SPAN destination port.
· An egress packet dropped because of switch congestion is also dropped from egress SPAN.
In some SPAN configurations, multiple copies of the same source packet are sent to the SPAN destination port. For example, a bidirectional (both Rx and Tx) SPAN session is configured for the Rx monitor on port A and Tx monitor on port B. If a packet enters the switch through port A and is switched to port B, both incoming and outgoing packets are sent to the destination port. Both packets are the same unless a Layer 3 rewrite occurs, in which case the packets are different because of the packet modification.
A source port (also called a monitored port) is a switched or routed port that you monitor for network traffic analysis. In a local SPAN session or RSPAN source session, you can monitor source ports or VLANs for traffic in one or both directions. The switch supports any number of source ports (up to the maximum number of available ports on the switch) and any number of source VLANs (up to the maximum number of VLANs supported). However, the switch supports a maximum of (local or RSPAN) with source ports or VLANs. You cannot mix ports and VLANs in a single session. A source port has these characteristics:
· It can be monitored in multiple SPAN sessions.
· Each source port can be configured with a direction (ingress, egress, or both) to monitor.
· It can be any port type (for example, EtherChannel, Gigabit Ethernet, and so forth).
· For EtherChannel sources, you can monitor traffic for the entire EtherChannel or individually on a physical port as it participates in the port channel.
· It can be an access port, trunk port, routed port, or voice VLAN port.
· It cannot be a destination port.
· Source ports can be in the same or different VLANs.
· You can monitor multiple source ports in a single session.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 830

Network Management

Source VLANs

Source VLANs VLAN Filtering Destination Port

VLAN-based SPAN (VSPAN) is the monitoring of the network traffic in one or more VLANs. The SPAN or RSPAN source interface in VSPAN is a VLAN ID, and traffic is monitored on all the ports for that VLAN. VSPAN has these characteristics:
· All active ports in the source VLAN are included as source ports and can be monitored in either or both directions.
· On a given port, only traffic on the monitored VLAN is sent to the destination port. · If a destination port belongs to a source VLAN, it is excluded from the source list and is not monitored. · If ports are added to or removed from the source VLANs, the traffic on the source VLAN received by
those ports is added to or removed from the sources being monitored. · You cannot use filter VLANs in the same session with VLAN sources. · You can monitor only Ethernet VLANs.
When you monitor a trunk port as a source port, by default, all VLANs active on the trunk are monitored. You can limit SPAN traffic monitoring on trunk source ports to specific VLANs by using VLAN filtering.
· VLAN filtering applies only to trunk ports or to voice VLAN ports. · VLAN filtering applies only to port-based sessions and is not allowed in sessions with VLAN sources. · When a VLAN filter list is specified, only those VLANs in the list are monitored on trunk ports or on
voice VLAN access ports. · SPAN traffic coming from other port types is not affected by VLAN filtering; that is, all VLANs are
allowed on other ports. · VLAN filtering affects only traffic forwarded to the destination SPAN port and does not affect the
switching of normal traffic.
Each local SPAN session or RSPAN destination session must have a destination port (also called a monitoring port) that receives a copy of traffic from the source ports or VLANs and sends the SPAN packets to the user, usually a network analyzer. A destination port has these characteristics:
· For a local SPAN session, the destination port must reside on the same switch or switch stack as the source port. For an RSPAN session, it is located on the switch containing the RSPAN destination session. There is no destination port on a switch or switch stack running only an RSPAN source session.
· When a port is configured as a SPAN destination port, the configuration overwrites the original port configuration. When the SPAN destination configuration is removed, the port reverts to its previous configuration. If a configuration change is made to the port while it is acting as a SPAN destination port, the change does not take effect until the SPAN destination configuration had been removed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 831

RSPAN VLAN

Network Management

RSPAN VLAN

Note When QoS is configured on the SPAN destination port, QoS takes effect immediately.
· If the port was in an EtherChannel group, it is removed from the group while it is a destination port. If it was a routed port, it is no longer a routed port.
· It can be any Ethernet physical port. · It cannot be a secure port. · It cannot be a source port. · It can be an EtherChannel group (ON mode only). · It cannot be a VLAN. · It can participate in only one SPAN session at a time (a destination port in one SPAN session cannot be
a destination port for a second SPAN session). · When it is active, incoming traffic is disabled. The port does not transmit any traffic except that required
for the SPAN session. Incoming traffic is never learned or forwarded on a destination port. · If ingress traffic forwarding is enabled for a network security device, the destination port forwards traffic
at Layer 2. · It does not participate in any of the Layer 2 protocols (STP, VTP, CDP, DTP, PagP). · A destination port that belongs to a source VLAN of any SPAN session is excluded from the source list
and is not monitored. · The maximum number of destination ports in a switch or switch stack is 64.
Local SPAN and RSPAN destination ports function differently with VLAN tagging and encapsulation: · For local SPAN, if the encapsulation replicate keywords are specified for the destination port, these packets appear with the original encapsulation (untagged, ISL, or IEEE 802.1Q). If these keywords are not specified, packets appear in the untagged format. Therefore, the output of a local SPAN session with encapsulation replicate enabled can contain a mixture of untagged, ISL, or IEEE 802.1Q-tagged packets. · For RSPAN, the original VLAN ID is lost because it is overwritten by the RSPAN VLAN identification. Therefore, all packets appear on the destination port as untagged.
The RSPAN VLAN carries SPAN traffic between RSPAN source and destination sessions. RSPAN VLAN has these special characteristics:
· All traffic in the RSPAN VLAN is always flooded. · No MAC address learning occurs on the RSPAN VLAN. · RSPAN VLAN traffic only flows on trunk ports. · RSPAN VLANs must be configured in VLAN configuration mode by using the remote-span VLAN
configuration mode command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 832

Network Management

SPAN and RSPAN Interaction with Other Features

· STP can run on RSPAN VLAN trunks but not on SPAN destination ports.
· An RSPAN VLAN cannot be a private-VLAN primary or secondary VLAN.
For VLANs 1 to 1005 that are visible to VLAN Trunking Protocol (VTP), the VLAN ID and its associated RSPAN characteristic are propagated by VTP. If you assign an RSPAN VLAN ID in the extended VLAN range (1006 to 4094), you must manually configure all intermediate switches.
It is normal to have multiple RSPAN VLANs in a network at the same time with each RSPAN VLAN defining a network-wide RSPAN session. That is, multiple RSPAN source sessions anywhere in the network can contribute packets to the RSPAN session. It is also possible to have multiple RSPAN destination sessions throughout the network, monitoring the same RSPAN VLAN and presenting traffic to the user. The RSPAN VLAN ID separates the sessions.
Related Topics Creating an RSPAN Source Session, on page 844 Creating an RSPAN Destination Session, on page 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 848 Examples: Creating an RSPAN VLAN, on page 857
SPAN and RSPAN Interaction with Other Features
SPAN interacts with these features:
· Routing--SPAN does not monitor routed traffic. VSPAN only monitors traffic that enters or exits the switch, not traffic that is routed between VLANs. For example, if a VLAN is being Rx-monitored and the switch routes traffic from another VLAN to the monitored VLAN, that traffic is not monitored and not received on the SPAN destination port.
· STP--A destination port does not participate in STP while its SPAN or RSPAN session is active. The destination port can participate in STP after the SPAN or RSPAN session is disabled. On a source port, SPAN does not affect the STP status. STP can be active on trunk ports carrying an RSPAN VLAN.
· CDP--A SPAN destination port does not participate in CDP while the SPAN session is active. After the SPAN session is disabled, the port again participates in CDP.
Due to limitation in the ASIC, CDP packets are not dropped in RSPAN configured VLAN.
· VTP--You can use VTP to prune an RSPAN VLAN between switches.
· VLAN and trunking--You can modify VLAN membership or trunk settings for source or destination ports at any time. However, changes in VLAN membership or trunk settings for a destination port do not take effect until you remove the SPAN destination configuration. Changes in VLAN membership or trunk settings for a source port immediately take effect, and the respective SPAN sessions automatically adjust accordingly.
· EtherChannel--You can configure an EtherChannel group as a source port or a SPAN destination port. When a group is configured as a SPAN source, the entire group is monitored.
If a physical port is added to a monitored EtherChannel group, the new port is added to the SPAN source port list. If a port is removed from a monitored EtherChannel group, it is automatically removed from the source port list.
A physical port that belongs to an EtherChannel group can be configured as a SPAN source port and still be a part of the EtherChannel. In this case, data from the physical port is monitored as it participates in the EtherChannel. However, if a physical port that belongs to an EtherChannel group is configured as a

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 833

SPAN and RSPAN and Device Stacks

Network Management

SPAN destination, it is removed from the group. After the port is removed from the SPAN session, it rejoins the EtherChannel group. Ports removed from an EtherChannel group remain members of the group, but they are in the inactive or suspended state.
If a physical port that belongs to an EtherChannel group is a destination port and the EtherChannel group is a source, the port is removed from the EtherChannel group and from the list of monitored ports.
· Multicast traffic can be monitored. For egress and ingress port monitoring, only a single unedited packet is sent to the SPAN destination port. It does not reflect the number of times the multicast packet is sent.
· A private-VLAN port cannot be a SPAN destination port.
· A secure port cannot be a SPAN destination port.
For SPAN sessions, do not enable port security on ports with monitored egress when ingress forwarding is enabled on the destination port. For RSPAN source sessions, do not enable port security on any ports with monitored egress.
· An IEEE 802.1x port can be a SPAN source port. You can enable IEEE 802.1x on a port that is a SPAN destination port; however, IEEE 802.1x is disabled until the port is removed as a SPAN destination.
For SPAN sessions, do not enable IEEE 802.1x on ports with monitored egress when ingress forwarding is enabled on the destination port. For RSPAN source sessions, do not enable IEEE 802.1x on any ports that are egress monitored.
SPAN and RSPAN and Device Stacks
Because the stack of switches represents one logical switch, local SPAN source ports and destination ports can be in different switches in the stack. Therefore, the addition or deletion of switches in the stack can affect a local SPAN session, as well as an RSPAN source or destination session. An active session can become inactive when a switch is removed from the stack or an inactive session can become active when a switch is added to the stack.
Flow-Based SPAN
You can control the type of network traffic to be monitored in SPAN or RSPAN sessions by using flow-based SPAN (FSPAN) or flow-based RSPAN (FRSPAN), which apply access control lists (ACLs) to the monitored traffic on the source ports. The FSPAN ACLs can be configured to filter IPv4, IPv6, and non-IP monitored traffic.
You apply an ACL to a SPAN session through the interface. It is applied to all the traffic that is monitored on all interfaces in the SPAN session.The packets that are permitted by this ACL are copied to the SPAN destination port. No other packets are copied to the SPAN destination port.
The original traffic continues to be forwarded, and any port, VLAN, and router ACLs attached are applied. The FSPAN ACL does not have any effect on the forwarding decisions. Similarly, the port, VLAN, and router ACLs do not have any effect on the traffic monitoring. If a security input ACL denies a packet and it is not forwarded, the packet is still copied to the SPAN destination ports if the FSPAN ACL permits it. But if the security output ACL denies a packet and it is not sent, it is not copied to the SPAN destination ports. However, if the security output ACL permits the packet to go out, it is only copied to the SPAN destination ports if the FSPAN ACL permits it. This is also true for an RSPAN session.
You can attach three types of FSPAN ACLs to the SPAN session:
· IPv4 FSPAN ACL-- Filters only IPv4 packets.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 834

Network Management

Default SPAN and RSPAN Configuration

· IPv6 FSPAN ACL-- Filters only IPv6 packets.
· MAC FSPAN ACL-- Filters only non-IP packets.
If a VLAN-based FSPAN session configured on a stack cannot fit in the hardware memory on one or more switches, it is treated as unloaded on those switches, and traffic meant for the FSPAN ACL and sourcing on that switch is not copied to the SPAN destination ports. The FSPAN ACL continues to be correctly applied, and traffic is copied to the SPAN destination ports on the switches where the FSPAN ACL fits in the hardware memory.
When an empty FSPAN ACL is attached, some hardware functions copy all traffic to the SPAN destination ports for that ACL. If sufficient hardware resources are not available, even an empty FSPAN ACL can be unloaded.
IPv4 and MAC FSPAN ACLs are supported on all feature sets. IPv6 FSPAN ACLs are supported only in the advanced IP Services feature set.
Related Topics Configuring an FSPAN Session, on page 850 Configuring an FRSPAN Session, on page 853

Default SPAN and RSPAN Configuration
Table 74: Default SPAN and RSPAN Configuration
Feature SPAN state (SPAN and RSPAN) Source port traffic to monitor Encapsulation type (destination port) Ingress forwarding (destination port) VLAN filtering
RSPAN VLANs

Default Setting Disabled. Both received and sent traffic (both). Native form (untagged packets). Disabled. On a trunk interface used as a source port, all VLANs are monitored. None configured.

Configuration Guidelines
SPAN Configuration Guidelines
· To remove a source or destination port or VLAN from the SPAN session, use the no monitor session session_number source {interface interface-id | vlan vlan-id} global configuration command or the no monitor session session_number destination interface interface-id global configuration command. For destination interfaces, the encapsulation options are ignored with the no form of the command.
· To monitor all VLANs on the trunk port, use the no monitor session session_number filter global configuration command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 835

RSPAN Configuration Guidelines

Network Management

Related Topics Creating a Local SPAN Session, on page 837 Creating a Local SPAN Session and Configuring Incoming Traffic, on page 839 Example: Configuring Local SPAN, on page 855
RSPAN Configuration Guidelines
· All the SPAN configuration guidelines apply to RSPAN.
· As RSPAN VLANs have special properties, you should reserve a few VLANs across your network for use as RSPAN VLANs; do not assign access ports to these VLANs.
· You can apply an output ACL to RSPAN traffic to selectively filter or monitor specific packets. Specify these ACLs on the RSPAN VLAN in the RSPAN source switches.
· For RSPAN configuration, you can distribute the source ports and the destination ports across multiple switches in your network.
· Access ports (including voice VLAN ports) on the RSPAN VLAN are put in the inactive state.
· You can configure any VLAN as an RSPAN VLAN as long as these conditions are met: · The same RSPAN VLAN is used for an RSPAN session in all the switches.
· All participating switches support RSPAN.
Related Topics Creating an RSPAN Source Session, on page 844 Creating an RSPAN Destination Session, on page 847 Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 848 Examples: Creating an RSPAN VLAN, on page 857
FSPAN and FRSPAN Configuration Guidelines
· When at least one FSPAN ACL is attached, FSPAN is enabled.
· When you attach at least one FSPAN ACL that is not empty to a SPAN session, and you have not attached one or more of the other FSPAN ACLs (for instance, you have attached an IPv4 ACL that is not empty, and have not attached IPv6 and MAC ACLs), FSPAN blocks the traffic that would have been filtered by the unattached ACLs. Therefore, this traffic is not monitored.
Related Topics Configuring an FSPAN Session, on page 850 Configuring an FRSPAN Session, on page 853

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 836

Network Management

How to Configure SPAN and RSPAN

How to Configure SPAN and RSPAN

Creating a Local SPAN Session
Beginning in privileged EXEC mode, follow these steps to create a SPAN session and specify the source (monitored) ports or VLANs and the destination (monitoring) ports.

SUMMARY STEPS

1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]} 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session all

· all--Removes all SPAN sessions. · local--Removes all local sessions.

· remote--Removes all remote SPAN sessions.

monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
Example:

Specifies the SPAN session and the source port (monitored port).
· For session_number, the range is 1 to 66.

Switch(config)# monitor session 1 source interface gigabitethernet1/0/1

· For interface-id, specifies the source port to monitor. Valid interfaces include physical interfaces and port-channel logical interfaces (port-channel port-channel-number). Valid port-channel numbers are 1 to 48.

· For vlan-id, specify the source VLAN to monitor. The range is 1 to 4094 (excluding the RSPAN VLAN).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 837

Creating a Local SPAN Session

Network Management

Command or Action

Purpose Note

A single session can include multiple sources (ports or VLANs) defined in a series of commands, but you cannot combine source ports and source VLANs in one session.

· (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen.
· (Optional) both | rx | tx--Specifies the direction of traffic to monitor. If you do not specify a traffic direction, the source interface sends both sent and received traffic.
· both--Monitors both received and sent traffic.
· rx--Monitors received traffic.
· tx--Monitors sent traffic.
Note You can use the monitor session session_number source command multiple times to configure multiple source ports.

Step 4

monitor session session_number destination {interface Specifies the SPAN session and the destination port

interface-id [, | -] [encapsulation replicate]}

(monitoring port).

Example:
Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2 encapsulation replicate

Note For local SPAN, you must use the same session number for the source and destination interfaces.
· For session_number, specify the session number entered in step 3.

· For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN.

· (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen.

(Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged).
Note You can use monitor session session_number destination command multiple times to configure multiple destination ports.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 838

Network Management

Creating a Local SPAN Session and Configuring Incoming Traffic

Step 5

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Related Topics Local SPAN, on page 826 SPAN Sessions, on page 828 SPAN Configuration Guidelines, on page 835

Creating a Local SPAN Session and Configuring Incoming Traffic
Beginning in privileged EXEC mode, follow these steps to create a SPAN session, to specify the source ports or VLANs and the destination ports, and to enable incoming traffic on the destination port for a network security device (such as a Cisco IDS Sensor Appliance).

SUMMARY STEPS

1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]
[ingress {dot1q vlan vlan-id | isl | untagged vlan vlan-id | vlan vlan-id}]} 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session all

· all--Removes all SPAN sessions. · local--Removes all local sessions.

· remote--Removes all remote SPAN sessions.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 839

Creating a Local SPAN Session and Configuring Incoming Traffic

Network Management

Step 3 Step 4

Command or Action
monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] Example:

Purpose
Specifies the SPAN session and the source port (monitored port).

Switch(config)# monitor session 2 source gigabitethernet1/0/1 rx

monitor session session_number destination {interface Specifies the SPAN session, the destination port, the packet

interface-id [, | -] [encapsulation replicate] [ingress {dot1q encapsulation, and the ingress VLAN and encapsulation.

vlan vlan-id | isl | untagged vlan vlan-id | vlan vlan-id}]} · For session_number, specify the session number

Example:

entered in Step 3.

Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation replicate ingress dot1q vlan 6

· For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN.

· (Optional) [, | -]--Specifies a series or range of interfaces. Enter a space before and after the comma or hyphen.

· (Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged).

· ingress enables forwarding of incoming traffic on the destination port and to specify the encapsulation type:
· dot1q vlan vlan-id--Accepts incoming packets with IEEE 802.1Q encapsulation with the specified VLAN as the default VLAN.

· isl--Forwards ingress packets with ISL encapsulation.

· untagged vlan vlan-id or vlan vlan-id--Accepts incoming packets with untagged encapsulation type with the specified VLAN as the default VLAN.

· dot1q vlan vlan-id--Accepts incoming packets with IEEE 802.1Q encapsulation with the specified VLAN as the default VLAN.
· isl--Forwards ingress packets with ISL encapsulation.
· untagged vlan vlan-id or vlan vlan-id--Accepts incoming packets with untagged encapsulation type with the specified VLAN as the default VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 840

Network Management

Specifying VLANs to Filter

Step 5

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Related Topics Local SPAN, on page 826 SPAN Sessions, on page 828 SPAN Configuration Guidelines, on page 835 Example: Configuring Local SPAN, on page 855

Specifying VLANs to Filter
Beginning in privileged EXEC mode, follow these steps to limit SPAN source traffic to specific VLANs.

SUMMARY STEPS

1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source interface interface-id 4. monitor session session_number filter vlan vlan-id [, | -] 5. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]} 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session all

· all--Removes all SPAN sessions. · local--Removes all local sessions.

· remote--Removes all remote SPAN sessions.

monitor session session_number source interface interface-id
Example:

Specifies the characteristics of the source port (monitored port) and SPAN session.
· For session_number, the range is 1 to 66.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 841

Configuring a VLAN as an RSPAN VLAN

Network Management

Step 4 Step 5 Step 6

Command or Action

Purpose

Switch(config)# monitor session 2 source interface gigabitethernet1/0/2 rx

· For interface-id, specify the source port to monitor. The interface specified must already be configured as a trunk port.

monitor session session_number filter vlan vlan-id [, | -] Limits the SPAN source traffic to specific VLANs.

Example:
Switch(config)# monitor session 2 filter vlan 1 5,9

· For session_number, enter the session number specified in Step 3.
· For vlan-id, the range is 1 to 4094.

· (Optional) Use a comma (,) to specify a series of VLANs, or use a hyphen (-) to specify a range of VLANs. Enter a space before and after the comma; enter a space before and after the hyphen.

monitor session session_number destination {interface Specifies the SPAN session and the destination port

interface-id [, | -] [encapsulation replicate]}

(monitoring port).

Example:
Switch(config)# monitor session 2 destination interface gigabitethernet1/0/1

· For session_number, specify the session number entered in Step 3.
· For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN.

· (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen.

· (Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged).

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Configuring a VLAN as an RSPAN VLAN
Beginning in privileged EXEC mode, follow these steps to create a new VLAN, then configure it to be the RSPAN VLAN for the RSPAN session.

SUMMARY STEPS

1. configure terminal 2. vlan vlan-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 842

Network Management

Configuring a VLAN as an RSPAN VLAN

3. remote-span 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

vlan vlan-id Example:
Switch(config)# vlan 100

Step 3 Step 4

remote-span Example:
Switch(config-vlan)# remote-span
end Example:
Switch(config-vlan)# end

Purpose Enters the global configuration mode.
Enters a VLAN ID to create a VLAN, or enters the VLAN ID of an existing VLAN, and enters VLAN configuration mode. The range is 2 to 1001 and 1006 to 4094. The RSPAN VLAN cannot be VLAN 1 (the default VLAN) or VLAN IDs 1002 through 1005 (reserved for Token Ring and FDDI VLANs). Configures the VLAN as an RSPAN VLAN.
Returns to privileged EXEC mode.

What to do next
You must create the RSPAN VLAN in all switches that will participate in RSPAN. If the RSPAN VLAN-ID is in the normal range (lower than 1005) and VTP is enabled in the network, you can create the RSPAN VLAN in one switch, and VTP propagates it to the other switches in the VTP domain. For extended-range VLANs (greater than 1005), you must configure RSPAN VLAN on both source and destination switches and any intermediate switches.
Use VTP pruning to get an efficient flow of RSPAN traffic, or manually delete the RSPAN VLAN from all trunks that do not need to carry the RSPAN traffic.
To remove the remote SPAN characteristic from a VLAN and convert it back to a normal VLAN, use the no remote-span VLAN configuration command.
To remove a source port or VLAN from the SPAN session, use the no monitor session session_number source {interface interface-id | vlan vlan-id} global configuration command. To remove the RSPAN VLAN from the session, use the no monitor session session_number destination remote vlan vlan-id.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 843

Creating an RSPAN Source Session

Network Management

Creating an RSPAN Source Session
Beginning in privileged EXEC mode, follow these steps to create and start an RSPAN source session and to specify the monitored source and the destination RSPAN VLAN.

SUMMARY STEPS

1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination remote vlan vlan-id 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session 1

· all--Removes all SPAN sessions. · local--Removes all local sessions.

· remote--Removes all remote SPAN sessions.

monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
Example:

Specifies the RSPAN session and the source port (monitored port).
· For session_number, the range is 1 to 66.

Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 tx

· Enter a source port or source VLAN for the RSPAN session:
· For interface-id, specifies the source port to monitor. Valid interfaces include physical interfaces and port-channel logical interfaces (port-channel port-channel-number). Valid port-channel numbers are 1 to 48.

· For vlan-id, specifies the source VLAN to monitor. The range is 1 to 4094 (excluding the RSPAN VLAN).

A single session can include multiple sources (ports or VLANs), defined in a series of commands, but you cannot combine source ports and source VLANs in one session.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 844

Network Management

Specifying VLANs to Filter

Command or Action

Purpose · (Optional) [, | -]--Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen.
· (Optional) both | rx | tx--Specifies the direction of traffic to monitor. If you do not specify a traffic direction, the source interface sends both sent and received traffic.
· both--Monitors both received and sent traffic.
· rx--Monitors received traffic.
· tx--Monitors sent traffic.

Step 4 Step 5

monitor session session_number destination remote vlan Specifies the RSPAN session, the destination RSPAN

vlan-id

VLAN, and the destination-port group.

Example:
Switch(config)# monitor session 1 destination remote vlan 100

· For session_number, enter the number defined in Step 3.
· For vlan-id, specify the source RSPAN VLAN to monitor.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Related Topics Remote SPAN, on page 827 RSPAN VLAN, on page 832 RSPAN Configuration Guidelines, on page 836

Specifying VLANs to Filter
Beginning in privileged EXEC mode, follow these steps to configure the RSPAN source session to limit RSPAN source traffic to specific VLANs.

SUMMARY STEPS

1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source interface interface-id 4. monitor session session_number filter vlan vlan-id [, | -] 5. monitor session session_number destination remote vlan vlan-id 6. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 845

Specifying VLANs to Filter

Network Management

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3 Step 4 Step 5 Step 6

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session 2

· all--Removes all SPAN sessions. · local--Removes all local sessions.

· remote--Removes all remote SPAN sessions.

monitor session session_number source interface interface-id
Example:

Specifies the characteristics of the source port (monitored port) and SPAN session.
· For session_number, the range is 1 to 66.

Switch(config)# monitor session 2 source interface gigabitethernet1/0/2 rx

· For interface-id, specify the source port to monitor. The interface specified must already be configured as a trunk port.

monitor session session_number filter vlan vlan-id [, | -] Limits the SPAN source traffic to specific VLANs.

Example:
Switch(config)# monitor session 2 filter vlan 1 5,9

· For session_number, enter the session number specified in step 3.
· For vlan-id, the range is 1 to 4094.

· (Optional) , | - Use a comma (,) to specify a series of VLANs or use a hyphen (-) to specify a range of VLANs. Enter a space before and after the comma; enter a space before and after the hyphen.

monitor session session_number destination remote vlan Specifies the RSPAN session and the destination remote

vlan-id

VLAN (RSPAN VLAN).

Example:
Switch(config)# monitor session 2 destination remote vlan 902

· For session_number, enter the session number specified in Step 3.
· For vlan-id, specify the RSPAN VLAN to carry the monitored traffic to the destination port.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 846

Network Management

Creating an RSPAN Destination Session

Creating an RSPAN Destination Session
You configure an RSPAN destination session on a different switch or switch stack; that is, not the switch or switch stack on which the source session was configured.
Beginning in privileged EXEC mode, follow these steps to define the RSPAN VLAN on that switch, to create an RSPAN destination session, and to specify the source RSPAN VLAN and the destination port.

SUMMARY STEPS

1. configure terminal 2. vlan vlan-id 3. remote-span 4. exit 5. no monitor session {session_number | all | local | remote} 6. monitor session session_number source remote vlan vlan-id 7. monitor session session_number destination interface interface-id 8. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2
Step 3 Step 4 Step 5

vlan vlan-id Example:
Switch(config)# vlan 901
remote-span Example:

Specifies the VLAN ID of the RSPAN VLAN created from the source switch, and enters VLAN configuration mode.
If both switches are participating in VTP and the RSPAN VLAN ID is from 2 to 1005, Steps 2 through 4 are not required because the RSPAN VLAN ID is propagated through the VTP network.
Identifies the VLAN as the RSPAN VLAN.

Switch(config-vlan)# remote-span
exit Example:

Returns to global configuration mode.

Switch(config-vlan)# exit

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session 1

· all--Removes all SPAN sessions.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 847

Creating an RSPAN Destination Session and Configuring Incoming Traffic

Network Management

Step 6 Step 7
Step 8

Command or Action

Purpose · local--Removes all local sessions. · remote--Removes all remote SPAN sessions.

monitor session session_number source remote vlan vlan-id
Example:

Specifies the RSPAN session and the source RSPAN VLAN.
· For session_number, the range is 1 to 66.

Switch(config)# monitor session 1 source remote vlan 901

· For vlan-id, specify the source RSPAN VLAN to monitor.

monitor session session_number destination interface interface-id Example:
Switch(config)# monitor session 1 destination interface gigabitethernet2/0/1

Specifies the RSPAN session and the destination interface.
· For session_number, enter the number defined in Step 6.
In an RSPAN destination session, you must use the same session number for the source RSPAN VLAN and the destination port.
· For interface-id, specify the destination interface. The destination interface must be a physical interface.
· Though visible in the command-line help string, encapsulation replicate is not supported for RSPAN. The original VLAN ID is overwritten by the RSPAN VLAN ID, and all packets appear on the destination port as untagged.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Related Topics Remote SPAN, on page 827 RSPAN VLAN, on page 832 RSPAN Configuration Guidelines, on page 836

Creating an RSPAN Destination Session and Configuring Incoming Traffic
Beginning in privileged EXEC mode, follow these steps to create an RSPAN destination session, to specify the source RSPAN VLAN and the destination port, and to enable incoming traffic on the destination port for a network security device (such as a Cisco IDS Sensor Appliance).

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 848

Network Management

Creating an RSPAN Destination Session and Configuring Incoming Traffic

2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source remote vlan vlan-id 4. monitor session session_number destination {interface interface-id [, | -] [ingress {dot1q vlan vlan-id
| isl | untagged vlan vlan-id | vlan vlan-id}]} 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3 Step 4

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session 2

· all--Removes all SPAN sessions. · local--Removes all local sessions.

· remote--Removes all remote SPAN sessions.

monitor session session_number source remote vlan vlan-id
Example:

Specifies the RSPAN session and the source RSPAN VLAN.
· For session_number, the range is 1 to 66.

Switch(config)# monitor session 2 source remote vlan 901

· For vlan-id, specify the source RSPAN VLAN to monitor.

monitor session session_number destination {interface interface-id [, | -] [ingress {dot1q vlan vlan-id | isl | untagged vlan vlan-id | vlan vlan-id}]}
Example:

Specifies the SPAN session, the destination port, the packet encapsulation, and the incoming VLAN and encapsulation.
· For session_number, enter the number defined in Step 4.

Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 ingress vlan 6

In an RSPAN destination session, you must use the same session number for the source RSPAN VLAN and the destination port.

· For interface-id, specify the destination interface. The destination interface must be a physical interface.

· Though visible in the command-line help string, encapsulation replicate is not supported for RSPAN. The original VLAN ID is overwritten by the RSPAN VLAN ID, and all packets appear on the destination port as untagged.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 849

Configuring an FSPAN Session

Network Management

Command or Action

Step 5

end Example:
Switch(config)# end

Purpose · (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen.
· Enter ingress with additional keywords to enable forwarding of incoming traffic on the destination port and to specify the encapsulation type:
· dot1q vlan vlan-id--Forwards incoming packets with IEEE 802.1Q encapsulation with the specified VLAN as the default VLAN.
· isl--Forwards ingress packets with ISL encapsulation.
· untagged vlan vlan-id or vlan vlan-id--Forwards incoming packets with untagged encapsulation type with the specified VLAN as the default VLAN.
Returns to privileged EXEC mode.

Related Topics Remote SPAN, on page 827 RSPAN VLAN, on page 832 RSPAN Configuration Guidelines, on page 836 Examples: Creating an RSPAN VLAN, on page 857

Configuring an FSPAN Session
Beginning in privileged EXEC mode, follow these steps to create a SPAN session, specify the source (monitored) ports or VLANs and the destination (monitoring) ports, and configure FSPAN for the session.

SUMMARY STEPS

1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]} 5. monitor session session_number filter {ip | ipv6 | mac} access-group {access-list-number | name} 6. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 850

Network Management

Configuring an FSPAN Session

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session 2

· all--Removes all SPAN sessions. · local--Removes all local sessions.

· remote--Removes all remote SPAN sessions.

Step 3

monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
Example:

Specifies the SPAN session and the source port (monitored port).
· For session_number, the range is 1 to 66.

Switch(config)# monitor session 2 source interface gigabitethernet1/0/1

· For interface-id, specifies the source port to monitor. Valid interfaces include physical interfaces and port-channel logical interfaces (port-channel port-channel-number). Valid port-channel numbers are 1 to 48.

· For vlan-id, specify the source VLAN to monitor. The range is 1 to 4094 (excluding the RSPAN VLAN).

Note A single session can include multiple sources (ports or VLANs) defined in a series of commands, but you cannot combine source ports and source VLANs in one session.

· (Optional) [, | -]--Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen.
· (Optional) [both | rx | tx]--Specifies the direction of traffic to monitor. If you do not specify a traffic direction, the SPAN monitors both sent and received traffic.
· both--Monitors both sent and received traffic. This is the default.
· rx--Monitors received traffic.
· tx--Monitors sent traffic.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 851

Configuring an FSPAN Session

Network Management

Command or Action

Purpose Note

You can use the monitor session session_number source command multiple times to configure multiple source ports.

Step 4

monitor session session_number destination {interface Specifies the SPAN session and the destination port

interface-id [, | -] [encapsulation replicate]}

(monitoring port).

Example:
Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation replicate

· For session_number, specify the session number entered in Step 3.
· For destination, specify the following parameters:
· For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN.

· (Optional) [, | -] Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen.

· (Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged).

Step 5 Step 6

Note For local SPAN, you must use the same session number for the source and destination interfaces.
You can use monitor session session_number destination command multiple times to configure multiple destination ports.

monitor session session_number filter {ip | ipv6 | mac} Specifies the SPAN session, the types of packets to filter,

access-group {access-list-number | name}

and the ACLs to use in an FSPAN session.

Example:
Switch(config)# monitor session 2 filter ipv6 access-group 4

· For session_number, specify the session number entered in Step 3.
· For access-list-number, specify the ACL number that you want to use to filter traffic.

· For name, specify the ACL name that you want to use to filter traffic.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 852

Network Management

Configuring an FRSPAN Session

Related Topics Flow-Based SPAN, on page 834 FSPAN and FRSPAN Configuration Guidelines, on page 836

Configuring an FRSPAN Session
Beginning in privileged EXEC mode, follow these steps to start an RSPAN source session, specify the monitored source and the destination RSPAN VLAN, and configure FRSPAN for the session.

SUMMARY STEPS

1. configure terminal 2. no monitor session {session_number | all | local | remote} 3. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx] 4. monitor session session_number destination remote vlan vlan-id 5. vlan vlan-id 6. remote-span 7. exit 8. monitor session session_number filter {ip | ipv6 | mac} access-group {access-list-number | name} 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal

no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.

Example:

· For session_number, the range is 1 to 66.

Switch(config)# no monitor session 2

· all--Removes all SPAN sessions. · local--Removes all local sessions.

· remote--Removes all remote SPAN sessions.

Step 3

monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
Example:

Specifies the SPAN session and the source port (monitored port).
· For session_number, the range is 1 to 66.

Switch(config)# monitor session 2 source interface gigabitethernet1/0/1

· For interface-id, specifies the source port to monitor. Valid interfaces include physical interfaces and port-channel logical interfaces (port-channel port-channel-number). Valid port-channel numbers are 1 to 48.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 853

Configuring an FRSPAN Session

Network Management

Command or Action

Purpose · For vlan-id, specify the source VLAN to monitor. The range is 1 to 4094 (excluding the RSPAN VLAN).
Note A single session can include multiple sources (ports or VLANs) defined in a series of commands, but you cannot combine source ports and source VLANs in one session.
· (Optional) [, | -]--Specifies a series or range of interfaces. Enter a space before and after the comma; enter a space before and after the hyphen.
· (Optional) [both | rx | tx]--Specifies the direction of traffic to monitor. If you do not specify a traffic direction, the SPAN monitors both sent and received traffic.
· both--Monitors both sent and received traffic. This is the default.
· rx--Monitors received traffic.
· tx--Monitors sent traffic.
Note You can use the monitor session session_number source command multiple times to configure multiple source ports.

Step 4
Step 5 Step 6 Step 7

monitor session session_number destination remote vlan Specifies the RSPAN session and the destination RSPAN

vlan-id

VLAN.

Example:
Switch(config)# monitor session 2 destination remote vlan 5

· For session_number, enter the number defined in Step 3.
· For vlan-id, specify the destination RSPAN VLAN to monitor.

vlan vlan-id Example:
Switch(config)# vlan 10
remote-span Example:
Switch(config-vlan)# remote-span
exit Example:

Enters the VLAN configuration mode. For vlan-id, specify the source RSPAN VLAN to monitor.
Specifies that the VLAN you specified in Step 5 is part of the RSPAN VLAN.
Returns to global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 854

Network Management

Monitoring SPAN and RSPAN Operations

Step 8 Step 9

Command or Action

Purpose

Switch(config-vlan)# exit

monitor session session_number filter {ip | ipv6 | mac} Specifies the RSPAN session, the types of packets to filter,

access-group {access-list-number | name}

and the ACLs to use in an FRSPAN session.

Example:
Switch(config)# monitor session 2 filter ip access-group 7

· For session_number, specify the session number entered in Step 3.
· For access-list-number, specify the ACL number that you want to use to filter traffic.

· For name, specify the ACL name that you want to use to filter traffic.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Related Topics Flow-Based SPAN, on page 834 FSPAN and FRSPAN Configuration Guidelines, on page 836

Monitoring SPAN and RSPAN Operations

The following table describes the command used to display SPAN and RSPAN operations configuration and results to monitor operations:
Table 75: Monitoring SPAN and RSPAN Operations

Command show monitor

Purpose
Displays the current SPAN, RSPAN, FSPAN, or FRSPAN configuration.

SPAN and RSPAN Configuration Examples
Example: Configuring Local SPAN
This example shows how to set up SPAN session 1 for monitoring source port traffic to a destination port. First, any existing SPAN configuration for session 1 is deleted, and then bidirectional traffic is mirrored from source Gigabit Ethernet port 1 to destination Gigabit Ethernet port 2, retaining the encapsulation method.
Switch(config)# no monitor session 1 Switch(config)# monitor session 1 source interface gigabitethernet1/0/1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 855

Example: Configuring Local SPAN

Network Management

Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2 encapsulation replicate Switch(config)# end
This example shows how to remove port 1 as a SPAN source for SPAN session 1:
Switch(config)# no monitor session 1 source interface gigabitethernet1/0/1 Switch(config)# end
This example shows how to disable received traffic monitoring on port 1, which was configured for bidirectional monitoring:
Switch(config)# no monitor session 1 source interface gigabitethernet1/0/1 rx
The monitoring of traffic received on port 1 is disabled, but traffic sent from this port continues to be monitored.
This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session 2 to monitor received traffic on all ports belonging to VLANs 1 through 3, and send it to destination Gigabit Ethernet port 2. The configuration is then modified to also monitor all traffic on all ports belonging to VLAN 10.
Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source vlan 1 - 3 rx Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 Switch(config)# monitor session 2 source vlan 10 Switch(config)# end
This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session 2 to monitor received traffic on Gigabit Ethernet source port 1, and send it to destination Gigabit Ethernet port 2 with the same egress encapsulation type as the source port, and to enable ingress forwarding with IEEE 802.1Q encapsulation and VLAN 6 as the default ingress VLAN:
Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source gigabitethernet1/0/1 rx Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation
replicate ingress dot1q vlan 6 Switch(config)# end
This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session 2 to monitor traffic received on Gigabit Ethernet trunk port 2, and send traffic for only VLANs 1 through 5 and VLAN 9 to destination Gigabit Ethernet port 1:
Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source interface gigabitethernet1/0/2 rx Switch(config)# monitor session 2 filter vlan 1 - 5 , 9 Switch(config)# monitor session 2 destination interface gigabitethernet1/0/1 Switch(config)# end
Related Topics Creating a Local SPAN Session and Configuring Incoming Traffic, on page 839 Local SPAN, on page 826 SPAN Sessions, on page 828 SPAN Configuration Guidelines, on page 835

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 856

Network Management

Examples: Creating an RSPAN VLAN

Examples: Creating an RSPAN VLAN
This example shows how to create the RSPAN VLAN 901:
Switch(config)# vlan 901 Switch(config-vlan)# remote span Switch(config-vlan)# end
This example shows how to remove any existing RSPAN configuration for session 1, configure RSPAN session 1 to monitor multiple source interfaces, and configure the destination as RSPAN VLAN 901:
Switch(config)# no monitor session 1 Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 tx Switch(config)# monitor session 1 source interface gigabitethernet1/0/2 rx Switch(config)# monitor session 1 source interface port-channel 2 Switch(config)# monitor session 1 destination remote vlan 901 Switch(config)# end
This example shows how to remove any existing configuration on RSPAN session 2, configure RSPAN session 2 to monitor traffic received on trunk port 2, and send traffic for only VLANs 1 through 5 and 9 to destination RSPAN VLAN 902:
Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source interface gigabitethernet1/0/2 rx Switch(config)# monitor session 2 filter vlan 1 - 5 , 9 Switch(config)# monitor session 2 destination remote vlan 902 Switch(config)# end
This example shows how to configure VLAN 901 as the source remote VLAN and port 1 as the destination interface:
Switch(config)# monitor session 1 source remote vlan 901 Switch(config)# monitor session 1 destination interface gigabitethernet2/0/1 Switch(config)# end
This example shows how to configure VLAN 901 as the source remote VLAN in RSPAN session 2, to configure Gigabit Ethernet source port 2 as the destination interface, and to enable forwarding of incoming traffic on the interface with VLAN 6 as the default receiving VLAN:
Switch(config)# monitor session 2 source remote vlan 901 Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 ingress vlan 6 Switch(config)# end
Related Topics Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 848 Remote SPAN, on page 827 RSPAN VLAN, on page 832 RSPAN Configuration Guidelines, on page 836

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 857

Additional References

Network Management

Additional References

Related Documents

Related Topic

Document Title

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title

MIBs
MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 858

Network Management

Feature History and Information for SPAN and RSPAN

Feature History and Information for SPAN and RSPAN

Release Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE

Modification
Switch Port Analyzer (SPAN): Allows monitoring of switch traffic on a port or VLAN using a sniffer/analyzer or RMON probe.
This feature was introduced.
Flow-based Switch Port Analyzer (SPAN): Provides a method to capture only required data between end hosts by using specified filters. The filters are defined in terms of access lists that limit IPv4, IPv6 or IPv4 + IPv6, or non-IP traffic (MAC) between specified source and destination addresses.
This feature was introduced.
SPAN destination port support on EtherChannels: Provides the ability to configure a SPAN destination port on an EtherChannel.
This feature was introduced.
Switch Port Analyzer (SPAN) distributed egress SPAN: Provides distributed egress SPAN functionality onto line cards in conjunction with ingress SPAN already been distributed to line cards. By distributing egress SPAN functionalities onto line cards, the performance of the system is improved.
This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 859

Feature History and Information for SPAN and RSPAN

Network Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 860

5 5 C H A P T E R
Configuring Wireshark
· Finding Feature Information, on page 861 · Prerequisites for Wireshark, on page 861 · Restrictions for Wireshark, on page 861 · Information About Wireshark, on page 863 · How to Configure Wireshark, on page 872 · Monitoring Wireshark, on page 882 · Configuration Examples for Wireshark, on page 882 · Additional References, on page 897 · Feature History and Information for WireShark, on page 898
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Wireshark
· Wireshark is supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, Catalyst 3850, Catalyst 3650, Wireless LAN Controller 5700 Series, Catalyst 4500X-16, and Catalyst 4500X-32.
Restrictions for Wireshark
· Starting in Cisco IOS Release XE 3.3.0(SE), global packet capture on Wireshark is not supported. · Capture filters are not supported. · The CLI for configuring Wireshark requires that the feature be executed only from EXEC mode. Actions
that usually occur in configuration submode (such as defining capture points), are handled at the EXEC
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 861

Restrictions for Wireshark

Network Management

mode instead. All key commands are not NVGEN'd and are not synchronized to the standby supervisor in NSF and SSO scenarios.
· Packets captured in the output direction of an interface might not reflect the changes made by switch rewrite (includes TTL, VLAN tag, CoS, checksum, MAC addresses, DSCP, precedent, UP, etc.).
· Limiting circular file storage by file size is not supported.
Wireless Packet Capture · The only form of wireless capture is a CAPWAP tunnel capture.
· When capturing CAPWAP tunnels, no other interface types can be used as attachment points on the same capture point.
· Capturing multiple CAPWAP tunnels is supported.
· Core filters are not applied and should be omitted when capturing a CAPWAP tunnel.
· To capture a CAPWAP data tunnel, each CAPWAP tunnel is mapped to a physical port and an appropriate ACL will be applied to filter the traffic.
· To capture a CAPWAP non-data tunnel, the switch is set to capture traffic on all ports and apply an appropriate ACL to filter the traffic.
Configuration Limitations · Multiple capture points can be defined, but only one can be active at a time. You need to stop one before you can start the other.
· Neither VRFs, management ports, nor private VLANs can be used as attachment points.
· Only one ACL of each type (IPv4, IPv6, MAC) is allowed in a Wireshark class map. There can be a maximum of three ACLs in a class map: one for IPv4, one for IPv6, and the other for MAC.
· Wireshark cannot capture packets on a destination SPAN port.
· Wireshark will stop capturing when one of the attachment points (interfaces) attached to a capture point stops working. For example, if the device that is associated with an attachment point is unplugged from the switch. To resume capturing, the capture must be restarted manually.
· CPU-injected packets are considered control plane packets. Therefore, these types of packets will not be captured on an interface egress capture.
· MAC ACL is only used for non-IP packets such as ARP. It will not be supported on a Layer 3 port or SVI.
· IPv6-based ACLs are not supported in VACL.
· Layer 2 and Layer 3 EtherChannels are not supported.
· ACL logging and Wireshark are incompatible. Once Wireshark is activated, it takes priority. All traffic, including that being captured by ACL logging on any ports, will be redirected to Wireshark. We recommended that you deactivate ACL logging before starting Wireshark. Otherwise, Wireshark traffic will be contaminated by ACL logging traffic.
· Wireshark does not capture packets dropped by floodblock.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 862

Network Management

Information About Wireshark

· If you capture both PACL and RACL on the same port, only one copy is sent to the CPU. If you capture a DTLS-encrypted CAPWAP interface, two copies are sent to Wireshark, one encrypted and the other decrypted. The same behavior will occur if we capture a Layer 2 interface carrying DTLS-encrypted CAPWAP traffic. The core filter is based on the outer CAPWAP header.
Information About Wireshark
Wireshark Overview
Wireshark is a packet analyzer program, formerly known as Ethereal, that supports multiple protocols and presents information in a text-based user interface.
The ability to capture and analyze traffic provides data on network activity. Prior to Cisco IOS Release XE 3.3.0(SE), only two features addressed this need: SPAN and debug platform packet. Both have limitations. SPAN is ideal for capturing packets, but can only deliver them by forwarding them to some specified local or remote destination; it provides no local display or analysis support. The debug platform packet command is specific to the Catalyst 4500 series and only works on packets that come from the software process-forwarding path. Also, the debug platform packet command has limited local display capabilities and no analysis support.
So the need exists for a traffic capture and analysis mechanism that is applicable to both hardware and software forwarded traffic and that provides strong packet capture, display, and analysis support, preferably using a well known interface.
Wireshark dumps packets to a file using a well known format called .pcap, and is applied or enabled on individual interfaces. You specify an interface in EXEC mode along with the filter and other parameters. The Wireshark application is applied only when you enter a start command, and is removed only when Wireshark stops capturing packets either automatically or manually.
Capture Points
A capture point is the central policy definition of the Wireshark feature. The capture point describes all of the characteristics associated with a given instance of Wireshark: which packets to capture, where to capture them from, what to do with the captured packets, and when to stop. Capture points can be modified after creation, and do not become active until explicitly activated with a start command. This process is termed activating the capture point or starting the capture point. Capture points are identified by name and can also be manually or automatically deactivated or stopped.
Multiple capture points can be defined, but only one can be active at a time. You need to stop one before you can start the other.
Attachment Points
An attachment point is a point in the logical packet process path associated with a capture point. An attachment point is an attribute of the capture point. Packets that impact an attachment point are tested against capture point filters; packets that match are copied and sent to the associated Wireshark instance of the capture point. A specific capture point can be associated with multiple attachment points, with limits on mixing attachment points of different types. Some restrictions apply when you specify attachment points of different types. Attachment points are directional (input or output or both) with the exception of the Layer 2 VLAN attachment point, which is always bidirectional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 863

Filters

Network Management

Filters

Filters are attributes of a capture point that identify and limit the subset of traffic traveling through the attachment point of a capture point, which is copied and passed to Wireshark. To be displayed by Wireshark, a packet must pass through an attachment point, as well as all of the filters associated with the capture point. A capture point has the following types of filters:
· Core system filter--The core system filter is applied by hardware, and its match criteria is limited by hardware. This filter determines whether hardware-forwarded traffic is copied to software for Wireshark purposes.
· Display filter--The display filter is applied by Wireshark. Packets that fail the display filter are not displayed.
Core System Filter You can specify core system filter match criteria by using the class map or ACL, or explicitly by using the CLI.

Note When specifying CAPWAP as an attachment point, the core system filter is not used.
In some installations, you need to obtain authorization to modify the switch configuration, which can lead to extended delays if the approval process is lengthy. This can limit the ability of network administrators to monitor and analyze traffic. To address this situation, Wireshark supports explicit specification of core system filter match criteria from the EXEC mode CLI. The disadvantage is that the match criteria that you can specify is a limited subset of what class map supports, such as MAC, IP source and destination addresses, ether-type, IP protocol, and TCP/UDP source and destination ports.
If you prefer to use configuration mode, you can define ACLs or have class maps refer capture points to them. Explicit and ACL-based match criteria are used internally to construct class maps and policy maps.
Note The ACL and class map configuration are part of the system and not aspects of the Wireshark feature.
Display Filter
With the display filter, you can direct Wireshark to further narrow the set of packets to display when decoding and displaying from a .pcap file.
Related Topics Additional References, on page 897

Actions

Wireshark can be invoked on live traffic or on a previously existing .pcap file. When invoked on live traffic, it can perform four types of actions on packets that pass its display filters:
· Captures to buffer in memory to decode and analyze and store
· Stores to a .pcap file
· Decodes and displays

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 864

Network Management

Storage of Captured Packets to Buffer in Memory

· Stores and displays
When invoked on a .pcap file only, only the decode and display action is applicable.
Storage of Captured Packets to Buffer in Memory
Packets can be stored in the capture buffer in memory for subsequent decode, analysis, or storage to a .pcap file. The capture buffer can be in linear or circular mode. In linear mode, new packets are discarded when the buffer is full. In circular mode, if the buffer is full, the oldest packets are discarded to accommodate the new packets. Although the buffer can also be cleared when needed, this mode is mainly used for debugging network traffic.
Note If you have more than one capture that is storing packets in a buffer, clear the buffer before starting a new capture to avoid memory loss.
Storage of Captured Packets to a .pcap File
Note When WireShark is used on switches in a stack, packet captures can be stored only on flash or USB flash devices connected to the active switch. For example, if flash1 is connected to the active switch, and flash2 is connected to the secondary switch, only flash1 can be used to store packet captures. Attempts to store packet captures on devices other than flash or USB flash devices connected to the active switch will probably result in errors.
Wireshark can store captured packets to a .pcap file. The capture file can be located on the following storage devices:
· Switch on-board flash storage (flash:) · USB drive (usbflash0:)
Note Attempts to store packet captures on unsupported devices or devices not connected to the active switch will probably result in errors.
When configuring a Wireshark capture point, you can associate a filename. When the capture point is activated, Wireshark creates a file with the specified name and writes packets to it. If the file already exists when the file is associated or the capture point is activated, Wireshark queries you as to whether the file can be overwritten. Only one capture point may be associated with a given filename. If the destination of the Wireshark writing process is full, Wireshark fails with partial data in the file. You must ensure that there is sufficient space in the file system before you start the capture session. With Cisco IOS Release IOS XE 3.3.0(SE), the file system full status is not detected for some storage devices.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 865

Packet Decoding and Display

Network Management

You can reduce the required storage space by retaining only a segment, instead of the entire packet. Typically, you do not require details beyond the first 64 or 128 bytes. The default behavior is to store the entire packet. To avoid possible packet drops when processing and writing to the file system, Wireshark can optionally use a memory buffer to temporarily hold packets as they arrive. Memory buffer size can be specified when the capture point is associated with a .pcap file.
Packet Decoding and Display
Wireshark can decode and display packets to the console. This functionality is possible for capture points applied to live traffic and for capture points applied to a previously existing .pcap file.
Note Decoding and displaying packets may be CPU intensive.
Wireshark can decode and display packet details for a wide variety of packet formats. The details are displayed by entering the monitor capture name start command with one of the following keyword options, which place you into a display and decode mode:
· brief--Displays one line per packet (the default). · detailed--Decodes and displays all the fields of all the packets whose protocols are supported. Detailed
modes require more CPU than the other two modes. · (hexadecimal) dump--Displays one line per packet as a hexadecimal dump of the packet data and the
printable characters of each packet.
When you enter the capture command with the decode and display option, the Wireshark output is returned to Cisco IOS and displayed on the console unchanged.
Live Traffic Display Wireshark receives copies of packets from the core system. Wireshark applies its display filters to discard uninteresting packets, and then decodes and displays the remaining packets.
.pcap File Display Wireshark can decode and display packets from a previously stored .pcap file and direct the display filter to selectively displayed packets.
Packet Storage and Display
Functionally, this mode is a combination of the previous two modes. Wireshark stores packets in the specified .pcap file and decodes and displays them to the console. Only the core filters are applicable here.
Wireshark Capture Point Activation and Deactivation
After a Wireshark capture point has been defined with its attachment points, filters, actions, and other options, it must be activated. Until the capture point is activated, it does not actually capture packets.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 866

Network Management

Wireshark Features

Before a capture point is activated, some functional checks are performed. A capture point cannot be activated if it has neither a core system filter nor attachment points defined. Attempting to activate a capture point that does not meet these requirements generates an error.*
Note *When performing a wireless capture with a CAPWAP tunneling interface, the core system filter is not required and cannot be used.
The display filters are specified as needed.
After Wireshark capture points are activated, they can be deactivated in multiple ways. A capture point that is storing only packets to a .pcap file can be halted manually or configured with time or packet limits, after which the capture point halts automatically.
When a Wireshark capture point is activated, a fixed rate policer is applied automatically in the hardware so that the CPU is not flooded with Wireshark-directed packets. The disadvantage of the rate policer is that you cannot capture contiguous packets beyond the established rate even if more resources are available.
Wireshark Features
This section describes how Wireshark features function in the switch environment:
· If port security and Wireshark are applied on an ingress capture, a packet that is dropped by port security will still be captured by Wireshark. If port security is applied on an ingress capture, and Wireshark is applied on an egress capture, a packet that is dropped by port security will not be captured by Wireshark.
· Packets dropped by Dynamic ARP Inspection (DAI) are not captured by Wireshark.
· If a port that is in STP blocked state is used as an attachment point and the core filter is matched, Wireshark will capture the packets that come into the port, even though the packets will be dropped by the switch.
· Classification-based security features--Packets that are dropped by input classification-based security features (such as ACLs and IPSG) are not caught by Wireshark capture points that are connected to attachment points at the same layer. In contrast, packets that are dropped by output classification-based security features are caught by Wireshark capture points that are connected to attachment points at the same layer. The logical model is that the Wireshark attachment point occurs after the security feature lookup on the input side, and symmetrically before the security feature lookup on the output side.
On ingress, a packet goes through a Layer 2 port, a VLAN, and a Layer 3 port/SVI. On egress, the packet goes through a Layer 3 port/SVI, a VLAN, and a Layer 2 port. If the attachment point is before the point where the packet is dropped, Wireshark will capture the packet. Otherwise, Wireshark will not capture the packet. For example, Wireshark capture policies connected to Layer 2 attachment points in the input direction capture packets dropped by Layer 3 classification-based security features. Symmetrically, Wireshark capture policies attached to Layer 3 attachment points in the output direction capture packets dropped by Layer 2 classification-based security features.
· Routed ports and switch virtual interfaces (SVIs)--Wireshark cannot capture the output of an SVI because the packets that go out of an SVI's output are generated by CPU. To capture these packets, include the control plane as an attachment point.
· VLANs--When a VLAN is used as a Wireshark attachment point, packets are captured in the input direction only.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 867

Wireshark Features

Network Management

· Redirection features--In the input direction, features traffic redirected by Layer 3 (such as PBR and WCCP) are logically later than Layer 3 Wireshark attachment points. Wireshark captures these packets even though they might later be redirected out another Layer 3 interface. Symmetrically, output features redirected by Layer 3 (such as egress WCCP) are logically prior to Layer 3 Wireshark attachment points, and Wireshark will not capture them.
· SPAN--Wireshark and SPAN sources are compatible. You can configure an interface as a SPAN source and as a Wireshark attachment point simultaneously. Configuring a SPAN destination port as a Wireshark attachment point is not supported.
· You can capture packets from a maximum of 1000 VLANs at a time, if no ACLs are applied. If ACLs are applied, the hardware will have less space for Wireshark to use. As a result, the maximum number of VLANs than can be used for packet capture at a time will be lower. Using more than 1000 VLANs tunnels at a time or extensive ACLs might have unpredictable results. For example, mobility may go down.
Note Capturing an excessive number of attachment points at the same time is strongly discouraged because it may cause excessive CPU utilization and unpredictable hardware behavior.
Wireless Packet Capture in Wireshark · Wireless traffic is encapsulated inside CAPWAP packets. However, capturing only a particular wireless client's traffic inside a CAPWAP tunnel is not supported when using the CAPWAP tunnel as an attachment point. To capture only a particular wireless client's traffic, use the client VLAN as an attachment point and formulate the core filter accordingly.
· Limited decoding of inner wireless traffic is supported. Decoding of inner wireless packets inside encrypted CAPWAP tunnels is not supported.
· No other interface type can be used with the CAPWAP tunneling interface on the same capture point. A CAPWAP tunneling interface and a Level 2 port cannot be attachment points on the same capture point.
· You cannot specify a core filter when capturing packets for Wireshark via the CAPWAP tunnel. However, you can use the Wireshark display filters for filtering wireless client traffic against a specific wireless client.
· You can capture packets from a maximum of 135 CAPWAP tunnels at a time if no ACLs are applied. If ACLs are applied, the hardware memory will have less space for Wireshark to use. As a result, the maximum number of CAPWAP tunnels than can be used for packet capture at a time will be lower. Using more than 135 CAPWAP tunnels at a time or unsing extensive ACLs might have unpredictable results. For example, mobility may go down.
Note Capturing an excessive number of attachment points at the same time is strongly discouraged because it may cause excessive CPU utilization and unpredictable hardware behavior.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 868

Network Management

Guidelines for Wireshark

Guidelines for Wireshark
· During Wireshark packet capture, hardware forwarding happens concurrently.
· Before starting a Wireshark capture process, ensure that CPU usage is moderate and that sufficient memory (at least 200 MB) is available.
· If you plan to store packets to a storage file, ensure that sufficient space is available before beginning a Wireshark capture process.
· The CPU usage during Wireshark capture depends on how many packets match the specified conditions and on the intended actions for the matched packets (store, decode and display, or both).
· Where possible, keep the capture to the minimum (limit by packets, duration) to avoid high CPU usage and other undesirable conditions.
· Because packet forwarding typically occurs in hardware, packets are not copied to the CPU for software processing. For Wireshark packet capture, packets are copied and delivered to the CPU, which causes an increase in CPU usage. To avoid high CPU usage, do the following: · Attach only relevant ports.
· Use a class map, and secondarily, an access list to express match conditions. If neither is viable, use an explicit, in-line filter.
· Adhere closely to the filter rules. Restrict the traffic type (such as, IPv4 only) with a restrictive, rather than relaxed ACL, which elicits unwanted traffic.
· Always limit packet capture to either a shorter duration or a smaller packet number. The parameters of the capture command enable you to specify the following: · Capture duration
· Number of packets captured
· File size
· Packet segment size
· Run a capture session without limits if you know that very little traffic matches the core filter.
· You might experience high CPU (or memory) usage if: · You leave a capture session enabled and unattended for a long period of time, resulting in unanticipated bursts of traffic.
· You launch a capture session with ring files or capture buffer and leave it unattended for a long time, resulting in performance or system health issues.
· During a capture session, watch for high CPU usage and memory consumption due to Wireshark that may impact switch performance or health. If these situations arise, stop the Wireshark session immediately.
· Avoid decoding and displaying packets from a .pcap file for a large file. Instead, transfer the .pcap file to a PC and run Wireshark on the PC.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 869

Guidelines for Wireshark

Network Management

· You can define up to eight Wireshark instances. An active show command that decodes and displays packets from a .pcap file or capture buffer counts as one instance. However, only one of the instances can be active.
· Whenever an ACL that is associated with a running capture is modified, you must restart the capture for the ACL modifications to take effect. If you do not restart the capture, it will continue to use the original ACL as if it had not been modified.
· To avoid packet loss, consider the following: · Use store-only (when you do not specify the display option) while capturing live packets rather than decode and display, which is an CPU-intensive operation (especially in detailed mode).
· If you have more than one capture that is storing packets in a buffer, clear the buffer before starting a new capture to avoid memory loss.
· If you use the default buffer size and see that you are losing packets, you can increase the buffer size to avoid losing packets.
· Writing to flash disk is a CPU-intensive operation, so if the capture rate is insufficient, you may want to use a buffer capture.
· The Wireshark capture session operates normally in streaming mode where packets are both captured and processed. However, when you specify a buffer size of at least 32 MB, the session automatically turns on lock-step mode in which a Wireshark capture session is split into two phases: capture and process. In the capture phase, the packets are stored in the temporary buffer. The duration parameter in lock-step mode serves as capture duration rather than session duration. When the buffer is full or the capture duration or packet limit has been attained, a session transitions to the process phase, wherein it stops accepting packets and starts processing packets in the buffer. You can also stop the capture manually. You will see a message in the output when the capture stops. With this second approach (lock-step mode), a higher capture throughput can be achieved.
Note If you are capturing packets to a buffer, there is no file storage defined. Hence, you must export your capture from the buffer to a static storage file. Use the monitor capture capture-name export file-location : file-name command.
· The streaming capture mode supports approximately 1000 pps; lock-step mode supports approximately 2 Mbps (measured with 256-byte packets). When the matching traffic rate exceeds this number, you may experience packet loss.
· If you want to decode and display live packets in the console window, ensure that the Wireshark session is bounded by a short capture duration.
Note Warning: A Wireshark session with either a longer duration limit or no capture duration (using a terminal with no auto-more support using the term len 0 command) may make the console or terminal unusable.
· When using Wireshark to capture live traffic that leads to high CPU, usage, consider applying a QoS policy temporarily to limit the actual traffic until the capture process concludes.
· All Wireshark-related commands are in EXEC mode; no configuration commands exist for Wireshark.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 870

Network Management

Default Wireshark Configuration

If you need to use access list or class-map in the Wireshark CLI, you must define an access list and class map with configuration commands.
· No specific order applies when defining a capture point; you can define capture point parameters in any order, provided that CLI allows this. The Wireshark CLI allows as many parameters as possible on a single line. This limits the number of commands required to define a capture point.
· All parameters except attachment points take a single value. Generally, you can replace the value with a new one by reentering the command. After user confirmation, the system accepts the new value and overrides the older one. A no form of the command is unnecessary to provide a new value, but it is necessary to remove a parameter.
· Wireshark allows you to specify one or more attachment points. To add more than one attachment point, reenter the command with the new attachment point. To remove an attachment point, use the no form of the command. You can specify an interface range as an attachment point. For example, enter monitor capture mycap interface GigabitEthernet1/0/1 in where interface GigabitEthernet1/0/1 is an attachment point.
If you also need to attach interface GigabitEthernet1/0/2, specify it in another line as follows:
monitor capture mycap interface GigabitEthernet1/0/2 in
· You can modify any of the parameters of a capture point while a session is active, but you must restart the session for the modifications to take effect.
· The action you want to perform determines which parameters are mandatory. The Wireshark CLI allows you to specify or modify any parameter prior to entering the start command. When you enter the start command, Wireshark will start only after determining that all mandatory parameters have been provided.
· If the capture file already exists, it provides a warning and receives confirmation before proceeding. This prevents you from mistakenly overwriting a file.
· The core filter can be an explicit filter, access list, or class map. Specifying a newer filter of these types replaces the existing one.

Note A core filter is required except when using a CAPWAP tunnel interface as a capture point attachment point.
· You can terminate a Wireshark session with an explicit stop command or by entering q in automore mode. The session could terminate itself automatically when a stop condition such as duration or packet capture limit is met.

Default Wireshark Configuration

The table below shows the default Wireshark configuration.

Feature Duration Packets Packet-length

Default Setting No limit No limit No limit (full packet)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 871

How to Configure Wireshark

Network Management

Feature File size Ring file storage Buffer storage mode

Default Setting No limit No Linear

How to Configure Wireshark
To configure Wireshark, perform these basic steps. 1. Define a capture point. 2. (Optional) Add or modify the capture point's parameters. 3. Activate or deactivate a capture point. 4. Delete the capture point when you are no longer using it.
Related Topics Defining a Capture Point, on page 872 Adding or Modifying Capture Point Parameters, on page 876 Deleting Capture Point Parameters, on page 878 Deleting a Capture Point, on page 879 Activating and Deactivating a Capture Point, on page 880 Clearing the Capture Point Buffer, on page 881
Defining a Capture Point
The example in this procedure defines a very simple capture point. If you choose, you can define a capture point and all of its parameters with one instance of the monitor capture command.

Note You must define an attachment point, direction of capture, and core filter to have a functional capture point. An exception to needing to define a core filter is when you are defining a wireless capture point using a CAPWAP tunneling interface. In this case, you do not define your core filter. It cannot be used.
In privileged EXEC mode, follow these steps to define a capture point.

SUMMARY STEPS

1. show capwap summary 2. monitor capture {capture-name}{interface interface-type interface-id | control-plane}{in |
out | both} 3. monitor capture {capture-name}[match {any | ipv4 any any | ipv6} any any}] 4. show monitor capture {capture-name}[ parameter]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 872

Network Management

Defining a Capture Point

DETAILED STEPS

Step 1

Command or Action show capwap summary Example:
Switch# show capwap summary

Purpose
Displays the CAPWAP tunnels available as attachment points for a wireless capture.
Note Use this command only if you are using a CAPWAP tunnel as an attachment point to perform a wireless capture. See the CAPWAP example in the examples section.

Step 2

monitor capture {capture-name}{interface

Defines the capture point, specifies the attachment point

interface-type interface-id | control-plane}{in | out with which the capture point is associated, and specifies the

| both}

direction of the capture.

Example:

The keywords have these meanings:

Switch# monitor capture mycap interface GigabitEthernet1/0/1 in

· capture-name--Specifies the name of the capture point to be defined (mycap is used in the example).

· (Optional) interface interface-type interface-id--Specifies the attachment point with which the capture point is associated (GigabitEthernet1/0/1 is used in the example).
Note Optionally, you can define multiple attachment points and all of the parameters for this capture point with this one command instance. These parameters are discussed in the instructions for modifying capture point parameters. Range support is also available both for adding and removing attachment points.

Use one of the following for interface-type:
· GigabitEthernet--Specifies the attachment point as GigabitEthernet.
· vlan--Specifies the attachment point as a VLAN.
Note Only ingress capture (in) is allowed when using this interface as an attachment point.

· capwap--Specifies the attachment point as a CAPWAP tunnel.
Note When using this interface as an attachment point, a core filter cannot be used.

· (Optional) control-plane--Specifies the control plane as an attachment point.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 873

Defining a Capture Point

Network Management

Step 3 Step 4

Command or Action

Purpose · in | out | both--Specifies the direction of capture.

monitor capture {capture-name}[match {any | ipv4 Defines the core system filter.

any any | ipv6} any any}]

Note When using the CAPWAP tunneling interface

Example:

as an attachment point, do not perform this step

Switch# monitor capture mycap interface

because a core filter cannot be used.

GigabitEthernet1/0/1 in match any

The keywords have these meanings:

· capture-name--Specifies the name of the capture point to be defined (mycap is used in the example).

· match--Specifies a filter. The first filter defined is the core filter.

Note A capture point cannot be activated if it has neither a core system filter nor attachment points defined. Attempting to activate a capture point that does not meet these requirements generates an error.

· ipv4--Specifies an IP version 4 filter. · ipv6--Specifies an IP version 6 filter.

show monitor capture {capture-name}[ parameter] Displays the capture point parameters that you defined in

Example:

Step 1 and confirms that you defined a capture point.

Switch# show monitor capture mycap parameter monitor capture mycap interface
GigabitEthernet1/0/1 in monitor capture mycap match any

Example To define a capture point with a CAPWAP attachment point:
Switch# show capwap summary

CAPWAP Tunnels General Statistics:

Number of Capwap Data Tunnels

=1

Number of Capwap Mobility Tunnels = 0

Number of Capwap Multicast Tunnels = 0

Name APName

Type PhyPortIf Mode

McastIf

------ -------------------------------- ---- --------- --------- -------

Ca0 AP442b.03a9.6715

data Gi3/0/6 unicast -

Name SrcIP

SrcPort DestIP

DstPort DtlsEn MTU Xact

------ --------------- ------- --------------- ------- ------ ----- ----

Ca0 10.10.14.32

5247 10.10.14.2

38514 No

1449 0

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 874

Network Management

Defining a Capture Point

Switch# monitor capture mycap interface capwap 0 both Switch# monitor capture mycap file location flash:mycap.pcap Switch# monitor capture mycap file buffer-size 1 Switch# monitor capture mycap start
*Aug 20 11:02:21.983: %BUFCAP-6-ENABLE: Capture Point mycap enabled.on
Switch# show monitor capture mycap parameter monitor capture mycap interface capwap 0 in monitor capture mycap interface capwap 0 out monitor capture mycap file location flash:mycap.pcap buffer-size 1
Switch# Switch# show monitor capture mycap
Status Information for Capture mycap Target Type: Interface: CAPWAP, Ingress:
0 Egress:
0 Status : Active
Filter Details: Capture all packets
Buffer Details: Buffer Type: LINEAR (default)
File Details: Associated file name: flash:mycap.pcap Size of buffer(in MB): 1
Limit Details: Number of Packets to capture: 0 (no limit) Packet Capture duration: 0 (no limit) Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling)
Switch# Switch# show monitor capture file flash:mycap.pcap
1 0.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 2 0.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 3 2.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 4 2.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 5 3.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 6 4.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 7 4.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 8 5.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 9 5.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 10 6.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 11 8.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 12 9.225986 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 13 9.225986 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 14 9.225986 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 15 9.231998 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 16 9.231998 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 875

Adding or Modifying Capture Point Parameters

Network Management

17 9.231998 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 18 9.236987 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 19 10.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 20 10.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 21 12.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 22 12.239993 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 23 12.244997 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 24 12.244997 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 25 12.250994 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 26 12.256990 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 27 12.262987 10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data 28 12.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........ 29 12.802012 10.10.14.3 -> 10.10.14.255 NBNS Name query NB WPAD.<00> 30 13.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request, SN=0, FN=0, Flags=........
What to do next
You can add additional attachment points, modify the parameters of your capture point, then activate it, or if you want to use your capture point just as it is, you can now activate it.

Note You cannot change a capture point's parameters using the methods presented in this topic.
Related Topics How to Configure Wireshark, on page 872 Adding or Modifying Capture Point Parameters, on page 876 Deleting Capture Point Parameters, on page 878 Deleting a Capture Point, on page 879 Activating and Deactivating a Capture Point, on page 880

Adding or Modifying Capture Point Parameters
Although listed in sequence, the steps to specify values for the parameters can be executed in any order. You can also specify them in one, two, or several lines. Except for attachment points, which can be multiple, you can replace any value with a more recent value by redefining the same option.
In privileged EXEC mode, follow these steps to modify a capture point's parameters.

Before you begin A capture point must be defined before you can use these instructions.

SUMMARY STEPS

1. monitor capture {capture-name} match {any | mac mac-match-string | ipv4 {any | host | protocol}{any | host} | ipv6 {any | host | protocol}{any | host}}
2. monitor capture {capture-name} limit {[duration seconds][packet-length size][packets num]}

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 876

Network Management

Adding or Modifying Capture Point Parameters

3. monitor capture {capture-name} file {location filename} 4. monitor capture {capture-name} file {buffer-size size} 5. show monitor capture {capture-name}[ parameter]

DETAILED STEPS

Step 1

Command or Action

Purpose

monitor capture {capture-name} match {any | mac Defines the core system filter (ipv4 any any), defined either

mac-match-string | ipv4 {any | host |

explicitly, through ACL or through a class map.

protocol}{any | host} | ipv6 {any | host | Note If you are defining a wireless capture point using

protocol}{any | host}}

a CAPWAP tunneling interface, this command

Example:

will have no effect, so it should not be used.

Switch# monitor capture mycap match ipv4 any any

Step 2

monitor capture {capture-name} limit {[duration seconds][packet-length size][packets num]}
Example:
Switch# monitor capture mycap limit duration 60 packet-len 400

Specifies the session limit in seconds (60), packets captured, or the packet segment length to be retained by Wireshark (400).

Step 3

monitor capture {capture-name} file {location filename}
Example:
Switch# monitor capture mycap file location flash:mycap.pcap

Specifies the file association, if the capture point intends to capture packets rather than only display them.

Step 4

monitor capture {capture-name} file {buffer-size Specifies the size of the memory buffer used by Wireshark

size}

to handle traffic bursts.

Example:

Switch# monitor capture mycap file buffer-size 100

Step 5

show monitor capture {capture-name}[ parameter] Displays the capture point parameters that you defined

Example:

previously.

Switch# show monitor capture mycap parameter monitor capture mycap interface
GigabitEthernet1/0/1 in monitor capture mycap match ipv4 any any monitor capture mycap limit duration 60
packet-len 400 monitor capture point mycap file location
bootdisk:mycap.pcap monitor capture mycap file buffer-size 100

Examples
Modifying Parameters Associating or Disassociating a Capture File

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 877

Deleting Capture Point Parameters

Network Management

Switch# monitor capture point mycap file location flash:mycap.pcap Switch# no monitor capture mycap file
Specifying a Memory Buffer Size for Packet Burst Handling
Switch# monitor capture mycap buffer size 100
Defining an Explicit Core System Filter to Match Both IPv4 and IPv6
Switch# monitor capture mycap match any

What to do next
if your capture point contains all of the parameters you want, activate it.
Related Topics How to Configure Wireshark, on page 872 Defining a Capture Point, on page 872 Deleting Capture Point Parameters, on page 878 Deleting a Capture Point, on page 879

Deleting Capture Point Parameters
Although listed in sequence, the steps to delete parameters can be executed in any order. You can also delete them in one, two, or several lines. Except for attachment points, which can be multiple, you can delete any parameter.
In privileged EXEC mode, follow these steps to delete a capture point's parameters.

Before you begin A capture point parameter must be defined before you can use these instructions to delete it.

SUMMARY STEPS

1. no monitor capture {capture-name} match 2. no monitor capture {capture-name} limit [duration][packet-length][packets] 3. no monitor capture {capture-name} file [location] [buffer-size] 4. show monitor capture {capture-name}[ parameter]

DETAILED STEPS

Step 1

Command or Action no monitor capture {capture-name} match Example:
Switch# no monitor capture mycap match

Step 2

no monitor capture {capture-name} limit [duration][packet-length][packets]
Example:

Purpose Deletes all filters defined on capture point (mycap).
Deletes the session time limit and the packet segment length to be retained by Wireshark. It leaves other specified limits in place. Deletes all limits on Wireshark.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 878

Network Management

Deleting a Capture Point

Step 3 Step 4

Command or Action
Switch# no monitor capture mycap limit duration packet-len Switch# no monitor capture mycap limit

Purpose

no monitor capture {capture-name} file [location] [buffer-size]
Example:
Switch# no monitor capture mycap file Switch# no monitor capture mycap file location

Deletes the file association. The capture point will no longer capture packets. It will only display them.
Deletes the file location association. The file location will no longer be associated with the capture point. However, other defined fille association will be unaffected by this action.

show monitor capture {capture-name}[ parameter]
Example:
Switch# show monitor capture mycap parameter monitor capture mycap interface
GigabitEthernet1/0/1 in

Displays the capture point parameters that remain defined after your parameter deletion operations. This command can be run at any point in the procedure to see what parameters are associated with a capture point.

What to do next
If your capture point contains all of the parameters you want, activate it.
Related Topics How to Configure Wireshark, on page 872 Defining a Capture Point, on page 872 Adding or Modifying Capture Point Parameters, on page 876

Deleting a Capture Point
In privileged EXEC mode, follow these steps to delete a capture point.

Before you begin A capture point must be defined before you can use these instructions to delete it.

SUMMARY STEPS

1. no monitor capture {capture-name} 2. show monitor capture {capture-name}[ parameter]

DETAILED STEPS

Step 1

Command or Action no monitor capture {capture-name} Example:
Switch# no monitor capture mycap

Purpose Deletes the specified capture point (mycap).

Step 2

show monitor capture {capture-name}[ parameter] Displays a message indicating that the specified capture

Example:

point does not exist because it has been deleted.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 879

Activating and Deactivating a Capture Point

Network Management

Command or Action
Switch# show monitor capture mycap parameter Capture mycap does not exist

Purpose

What to do next You can define a new capture point with the same name as the one you deleted. These instructions are usually performed when one wants to start over with defining a capture point. Related Topics
How to Configure Wireshark, on page 872 Defining a Capture Point, on page 872 Adding or Modifying Capture Point Parameters, on page 876
Activating and Deactivating a Capture Point
In privileged EXEC mode, follow these steps to activate or deactivate a capture point.
Before you begin A capture point cannot be activated unless an attachment point and a core system filter have been defined and the associated filename (if any) does not already exist. A capture point with no associated filename can only be activated to display. If no capture or display filters are specified, all of the packets captured by the core system filter are displayed. The default display mode is brief.

Note When using a CAPWAP tunneling interface as an attachment point, core filters are not used, so there is no requirement to define them in this case.

SUMMARY STEPS

1. monitor capture {capture-name} start[display [display-filter filter-string]][brief | detailed | dump]
2. monitor capture {capture-name} stop

DETAILED STEPS

Step 1

Command or Action
monitor capture {capture-name} start[display [display-filter filter-string]][brief | detailed | dump]
Example:
Switch# monitor capture mycap start display display-filter "stp"

Step 2

monitor capture {capture-name} stop Example:

Purpose Activates a capture point and filters the display, so only packets containing "stp" are displayed.
Deactivates a capture point.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 880

Network Management

Clearing the Capture Point Buffer

Command or Action
Switch# monitor capture name stop

Purpose

Related Topics How to Configure Wireshark, on page 872 Defining a Capture Point, on page 872

Clearing the Capture Point Buffer
In privileged EXEC mode, follow these steps to clear the buffer contents or save them to an external file for storage.

Note If you have more than one capture that is storing packets in a buffer, clear the buffer before starting a new capture to avoid memory loss.

SUMMARY STEPS

1. monitor capture {capture-name} [clear | export filename]

DETAILED STEPS

Step 1

Command or Action
monitor capture {capture-name} [clear | export filename] Example:
Switch# monitor capture mycap clear

Purpose Clears capture buffer contents or stores the packets to a file.

Examples: Capture Point Buffer Handling Exporting Capture to a File
Switch# monitor capture mycap export flash:mycap.pcap Storage configured as File for this capture
Clearing Capture Point Buffer
Switch# monitor capture mycap clear Capture configured with file options
Related Topics How to Configure Wireshark, on page 872

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 881

Monitoring Wireshark

Network Management

Monitoring Wireshark

The commands in this table are used to monitor Wireshark.

Command show monitor capture [capture-name ]

Purpose
Displays the capture point state so that you can see what capture points are defined, what their attributes are, and whether they are active. When capture point name is specified, it displays specific capture point's details.

show monitor capture [capture-name parameter]

Displays the capture point parameters.

show capwap summary

Displays all the CAPWAP tunnels on the switch. Use this command to determine which CAPWAP tunnels are available to use for a wireless capture.

Configuration Examples for Wireshark

Example: Displaying a Brief Output from a .pcap File

You can display the output from a .pcap file by entering:

Switch# show monitor capture file flash:mycap.pcap

1 0.000000 10.1.1.140 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

2 1.000000 10.1.1.141 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

3 2.000000 10.1.1.142 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

4 3.000000 10.1.1.143 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

5 4.000000 10.1.1.144 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

6 5.000000 10.1.1.145 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

7 6.000000 10.1.1.146 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

8 7.000000 10.1.1.147 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

9 8.000000 10.1.1.148 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

10 9.000000 10.1.1.149 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

11 10.000000 10.1.1.150 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

12 11.000000 10.1.1.151 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

13 12.000000 10.1.1.152 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 882

Network Management

Example: Displaying a Brief Output from a .pcap File

14 13.000000 10.1.1.153 -> 20.1.1.2 15 14.000000 10.1.1.154 -> 20.1.1.2 16 15.000000 10.1.1.155 -> 20.1.1.2 17 16.000000 10.1.1.156 -> 20.1.1.2 18 17.000000 10.1.1.157 -> 20.1.1.2 19 18.000000 10.1.1.158 -> 20.1.1.2 20 19.000000 10.1.1.159 -> 20.1.1.2 21 20.000000 10.1.1.160 -> 20.1.1.2 22 21.000000 10.1.1.161 -> 20.1.1.2 23 22.000000 10.1.1.162 -> 20.1.1.2 24 23.000000 10.1.1.163 -> 20.1.1.2 25 24.000000 10.1.1.164 -> 20.1.1.2 26 25.000000 10.1.1.165 -> 20.1.1.2 27 26.000000 10.1.1.166 -> 20.1.1.2 28 27.000000 10.1.1.167 -> 20.1.1.2 29 28.000000 10.1.1.168 -> 20.1.1.2 30 29.000000 10.1.1.169 -> 20.1.1.2 31 30.000000 10.1.1.170 -> 20.1.1.2 32 31.000000 10.1.1.171 -> 20.1.1.2 33 32.000000 10.1.1.172 -> 20.1.1.2 34 33.000000 10.1.1.173 -> 20.1.1.2 35 34.000000 10.1.1.174 -> 20.1.1.2 36 35.000000 10.1.1.175 -> 20.1.1.2 37 36.000000 10.1.1.176 -> 20.1.1.2 38 37.000000 10.1.1.177 -> 20.1.1.2 39 38.000000 10.1.1.178 -> 20.1.1.2 40 39.000000 10.1.1.179 -> 20.1.1.2 41 40.000000 10.1.1.180 -> 20.1.1.2 42 41.000000 10.1.1.181 -> 20.1.1.2 43 42.000000 10.1.1.182 -> 20.1.1.2 44 43.000000 10.1.1.183 -> 20.1.1.2 45 44.000000 10.1.1.184 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 883

Example: Displaying Detailed Output from a .pcap File

Network Management

46 45.000000 10.1.1.185 -> 20.1.1.2 47 46.000000 10.1.1.186 -> 20.1.1.2 48 47.000000 10.1.1.187 -> 20.1.1.2 49 48.000000 10.1.1.188 -> 20.1.1.2 50 49.000000 10.1.1.189 -> 20.1.1.2 51 50.000000 10.1.1.190 -> 20.1.1.2 52 51.000000 10.1.1.191 -> 20.1.1.2 53 52.000000 10.1.1.192 -> 20.1.1.2 54 53.000000 10.1.1.193 -> 20.1.1.2 55 54.000000 10.1.1.194 -> 20.1.1.2 56 55.000000 10.1.1.195 -> 20.1.1.2 57 56.000000 10.1.1.196 -> 20.1.1.2 58 57.000000 10.1.1.197 -> 20.1.1.2 59 58.000000 10.1.1.198 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002 UDP Source port: 20001 Destination port: 20002

Example: Displaying Detailed Output from a .pcap File
You can display the detailed .pcap file output by entering:
Switch# show monitor capture file flash:mycap.pcap detailed
Frame 1: 256 bytes on wire (2048 bits), 256 bytes captured (2048 bits) Arrival Time: Mar 21, 2012 14:35:09.111993000 PDT Epoch Time: 1332365709.111993000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 0.000000000 seconds] Frame Number: 1 Frame Length: 256 bytes (2048 bits) Capture Length: 256 bytes (2048 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ip:udp:data]
Ethernet II, Src: 00:00:00:00:03:01 (00:00:00:00:03:01), Dst: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f)
Destination: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) Address: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: 00:00:00:00:03:01 (00:00:00:00:03:01) Address: 00:00:00:00:03:01 (00:00:00:00:03:01) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800) Frame check sequence: 0x03b07f42 [incorrect, should be 0x08fcee78] Internet Protocol, Src: 10.1.1.140 (10.1.1.140), Dst: 20.1.1.2 (20.1.1.2) Version: 4

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 884

Network Management

Example: Displaying Detailed Output from a .pcap File

Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 238 Identification: 0x0000 (0) Flags: 0x00 0... .... = Reserved bit: Not set .0.. .... = Don't fragment: Not set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: UDP (17) Header checksum: 0x5970 [correct] [Good: True] [Bad: False] Source: 10.1.1.140 (10.1.1.140) Destination: 20.1.1.2 (20.1.1.2) User Datagram Protocol, Src Port: 20001 (20001), Dst Port: 20002 (20002) Source port: 20001 (20001) Destination port: 20002 (20002) Length: 218 Checksum: 0x6e2b [validation disabled] [Good Checksum: False] [Bad Checksum: False] Data (210 bytes)

0000 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................

0010 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................

0020 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f !"#$%&'()*+,-./

0030 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 0123456789:;<=>?

0040 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f @ABCDEFGHIJKLMNO

0050 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f PQRSTUVWXYZ[\]^_

0060 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f `abcdefghijklmno

0070 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f pqrstuvwxyz{|}~.

0080 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f ................

0090 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f ................

00a0 a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................

00b0 b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................

00c0 c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................

00d0 d0 d1

..

Data: 000102030405060708090a0b0c0d0e0f1011121314151617...

[Length: 210]

Frame 2: 256 bytes on wire (2048 bits), 256 bytes captured (2048 bits)

Arrival Time: Mar 21, 2012 14:35:10.111993000 PDT

Example: Displaying a Hexadecimal Dump Output from a .pcap File

You can display the hexadecimal dump output by entering:

Switch# show monitor capture file bootflash:mycap.pcap dump

1 0.000000 10.1.1.140 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

0000 0010 0020 0030 0040 0050 0060 0070 0080 0090 00a0 00b0

54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 00 ee 00 00 00 00 40 11 59 70 0a 01 01 8c 14 01 01 02 4e 21 4e 22 00 da 6e 2b 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95

Tu.:.?........E. ......@.Yp...... ..N!N"..n+...... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 885

Example: Displaying Detailed Output from a .pcap File

Network Management

00c0 00d0 00e0 00f0

96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 03 b0 7f 42

................ ................ ................ ...............B

2 1.000000 10.1.1.141 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

0000 0010 0020 0030 0040 0050 0060 0070 0080 0090 00a0 00b0 00c0 00d0 00e0 00f0

54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 00 ee 00 00 00 00 40 11 59 6f 0a 01 01 8d 14 01 01 02 4e 21 4e 22 00 da 6e 2a 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 95 2c c3 3f

Tu.:.?........E. ......@.Yo...... ..N!N"..n*...... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ ................ ................ ................ .............,.?

3 2.000000 10.1.1.142 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

0000 0010 0020 0030 0040 0050 0060 0070 0080 0090 00a0 00b0 00c0 00d0 00e0 00f0

54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 00 ee 00 00 00 00 40 11 59 6e 0a 01 01 8e 14 01 01 02 4e 21 4e 22 00 da 6e 29 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 6c f8 dc 14

Tu.:.?........E. ......@.Yn...... ..N!N"..n)...... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ ................ ................ ................ ............l...

4 3.000000 10.1.1.143 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

0000 54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 Tu.:.?........E.

0010 00 ee 00 00 00 00 40 11 59 6d 0a 01 01 8f 14 01 ......@.Ym......

0020 01 02 4e 21 4e 22 00 da 6e 28 00 01 02 03 04 05 ..N!N"..n(......

0030 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 ................

0040 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 .......... !"#$%

0050 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 &'()*+,-./012345

Example: Displaying Packets from a .pcap File with a Display Filter

You can display the .pcap file packets output by entering:

Switch# show monitor capture file bootflash:mycap.pcap display-filter "ip.src == 10.1.1.140"

dump

1 0.000000 10.1.1.140 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

0000 0010 0020 0030 0040 0050 0060

54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 00 ee 00 00 00 00 40 11 59 70 0a 01 01 8c 14 01 01 02 4e 21 4e 22 00 da 6e 2b 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45

Tu.:.?........E. ......@.Yp...... ..N!N"..n+...... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 886

Network Management

Example: Simple Capture and Display

0070 0080 0090 00a0 00b0 00c0 00d0 00e0 00f0

46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 03 b0 7f 42

FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ ................ ................ ................ ...............B

Example: Simple Capture and Display

This example shows how to monitor traffic in the Layer 3 interface Gigabit Ethernet 1/0/1:
Step 1: Define a capture point to match on the relevant traffic by entering:
Switch# monitor capture mycap interface GigabitEthernet1/0/1 in Switch# monitor capture mycap match ipv4 any any Switch# monitor capture mycap limit duration 60 packets 100 Switch# monitor capture mycap buffer size 100
To avoid high CPU utilization, a low packet count and duration as limits has been set.
Step 2: Confirm that the capture point has been correctly defined by entering:
Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in monitor capture mycap match ipv4 any any monitor capture mycap buffer size 100 monitor capture mycap limit packets 100 duration 60

Switch# show monitor capture mycap

Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: in Status : Inactive Filter Details: IPv4 Source IP: any Destination IP: any Protocol: any Buffer Details: Buffer Type: LINEAR (default) Buffer Size (in MB): 100 File Details: File not associated Limit Details: Number of Packets to capture: 100 Packet Capture duration: 60 Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling)

Step 3: Start the capture process and display the results.

Switch# monitor capture mycap start display

0.000000 10.1.1.30 -> 20.1.1.2

UDP Source port: 20001

1.000000 10.1.1.31 -> 20.1.1.2

UDP Source port: 20001

2.000000 10.1.1.32 -> 20.1.1.2

UDP Source port: 20001

3.000000 10.1.1.33 -> 20.1.1.2

UDP Source port: 20001

4.000000 10.1.1.34 -> 20.1.1.2

UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 887

Example: Simple Capture and Store

Network Management

5.000000 6.000000 7.000000 8.000000 9.000000

10.1.1.35 -> 20.1.1.2 10.1.1.36 -> 20.1.1.2 10.1.1.37 -> 20.1.1.2 10.1.1.38 -> 20.1.1.2 10.1.1.39 -> 20.1.1.2

Step 4: Delete the capture point by entering:

UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Switch# no monitor capture mycap

Example: Simple Capture and Store
This example shows how to capture packets to a filter:
Step 1: Define a capture point to match on the relevant traffic and associate it to a file by entering:
Switch# monitor capture mycap interface GigabitEthernet1/0/1 in Switch# monitor capture mycap match ipv4 any any Switch# monitor capture mycap limit duration 60 packets 100 Switch# monitor capture mycap file location flash:mycap.pcap
Step 2: Confirm that the capture point has been correctly defined by entering:
Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in monitor capture mycap match ipv4 any any monitor capture mycap file location flash:mycap.pcap monitor capture mycap limit packets 100 duration 60
Switch# show monitor capture mycap
Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: in Status : Inactive Filter Details: IPv4 Source IP: any Destination IP: any Protocol: any Buffer Details: Buffer Type: LINEAR (default) File Details: Associated file name: flash:mycap.pcap Limit Details: Number of Packets to capture: 100 Packet Capture duration: 60 Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling)
Step 3: Launch packet capture by entering:
Switch# monitor capture mycap start
Step 4: After sufficient time has passed, stop the capture by entering:
Switch# monitor capture mycap stop

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 888

Network Management

Example: Using Buffer Capture

Note Alternatively, you could allow the capture operation stop automatically after the time has elapsed or the packet count has been met.
The mycap.pcap file now contains the captured packets.

Step 5: Display the packets by entering:
Switch# show monitor capture file flash:mycap.pcap

0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000

10.1.1.30 -> 20.1.1.2 10.1.1.31 -> 20.1.1.2 10.1.1.32 -> 20.1.1.2 10.1.1.33 -> 20.1.1.2 10.1.1.34 -> 20.1.1.2 10.1.1.35 -> 20.1.1.2 10.1.1.36 -> 20.1.1.2 10.1.1.37 -> 20.1.1.2 10.1.1.38 -> 20.1.1.2 10.1.1.39 -> 20.1.1.2

Step 6: Delete the capture point by entering:

UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Switch# no monitor capture mycap

Example: Using Buffer Capture
This example shows how to use buffer capture:
Step 1: Launch a capture session with the buffer capture option by entering:
Switch# monitor capture mycap interface GigabitEthernet1/0/1 in Switch# monitor capture mycap match ipv4 any any Switch# monitor capture mycap buffer circular size 1 Switch# monitor capture mycap start
Step 2: Determine whether the capture is active by entering:
Switch# show monitor capture mycap
Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: in Status : Active Filter Details: IPv4 Source IP: any Destination IP: any Protocol: any Buffer Details: Buffer Type: CIRCULAR Buffer Size (in MB): 1 File Details: File not associated Limit Details: Number of Packets to capture: 0 (no limit) Packet Capture duration: 0 (no limit) Packet Size to capture: 0 (no limit)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 889

Example: Using Buffer Capture

Network Management

Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling)
Step 3: Display the packets in the buffer by entering:
Switch# show monitor capture mycap buffer brief

0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000 10.000000 11.000000 12.000000 13.000000 14.000000 15.000000 16.000000 17.000000 18.000000 19.000000 20.000000 21.000000

10.1.1.215 -> 20.1.1.2 10.1.1.216 -> 20.1.1.2 10.1.1.217 -> 20.1.1.2 10.1.1.218 -> 20.1.1.2 10.1.1.219 -> 20.1.1.2 10.1.1.220 -> 20.1.1.2 10.1.1.221 -> 20.1.1.2 10.1.1.222 -> 20.1.1.2 10.1.1.223 -> 20.1.1.2 10.1.1.224 -> 20.1.1.2 10.1.1.225 -> 20.1.1.2 10.1.1.226 -> 20.1.1.2 10.1.1.227 -> 20.1.1.2 10.1.1.228 -> 20.1.1.2 10.1.1.229 -> 20.1.1.2 10.1.1.230 -> 20.1.1.2 10.1.1.231 -> 20.1.1.2 10.1.1.232 -> 20.1.1.2 10.1.1.233 -> 20.1.1.2 10.1.1.234 -> 20.1.1.2 10.1.1.235 -> 20.1.1.2 10.1.1.236 -> 20.1.1.2

UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Notice that the packets have been buffered.

Step 4: Display the packets in other display modes.

Switch# show monitor capture mycap buffer detailed

Frame 1: 256 bytes on wire (2048 bits), 256 bytes captured (2048 bits) Arrival Time: Apr 15, 2012 15:50:02.398966000 PDT Epoch Time: 1334530202.398966000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 0.000000000 seconds] Frame Number: 1 Frame Length: 256 bytes (2048 bits) Capture Length: 256 bytes (2048 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ip:udp:data]
Ethernet II, Src: 00:00:00:00:03:01 (00:00:00:00:03:01), Dst: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f)
Destination: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) Address: 54:75:d0:3a:85:3f (54:75:d0:3a:85:3f) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: 00:00:00:00:03:01 (00:00:00:00:03:01) Address: 00:00:00:00:03:01 (00:00:00:00:03:01) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
... Switch# show monitor capture mycap buffer dump

0.000000 10.1.1.215 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

0000 54 75 d0 3a 85 3f 00 00 00 00 03 01 08 00 45 00 Tu.:.?........E. 0010 00 ee 00 00 00 00 40 11 59 25 0a 01 01 d7 14 01 ......@.Y%......

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 890

Network Management

Example: Using Buffer Capture

0020 0030 0040 0050 0060 0070 0080 0090 00a0 00b0 00c0 00d0 00e0 00f0

01 02 4e 21 4e 22 00 da 6d e0 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85 86 87 88 89 8a 8b 8c 8d 8e 8f 90 91 92 93 94 95 96 97 98 99 9a 9b 9c 9d 9e 9f a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 03 3e d0 33

Step 5a: Clear the buffer by entering:

Switch# monitor capture mycap clear

..N!N"..m....... ................ .......... !"#$% &'()*+,-./012345 6789:;<=>?@ABCDE FGHIJKLMNOPQRSTU VWXYZ[\]^_`abcde fghijklmnopqrstu vwxyz{|}~....... ................ ................ ................ ................ .............>.3

Step 5b: Wait for 10 seconds. Step 5c: Stop the traffic by entering:
Switch# monitor capture mycap stop

Step 6: Confirm that the same set of packets are displayed after this time gap by entering:
Switch# show monitor capture mycap buffer brief

0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000

10.1.1.2 -> 20.1.1.2 10.1.1.3 -> 20.1.1.2 10.1.1.4 -> 20.1.1.2 10.1.1.5 -> 20.1.1.2 10.1.1.6 -> 20.1.1.2 10.1.1.7 -> 20.1.1.2 10.1.1.8 -> 20.1.1.2 10.1.1.9 -> 20.1.1.2 10.1.1.10 -> 20.1.1.2 10.1.1.11 -> 20.1.1.2

UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Step 7: Wait for 10 seconds, then confirm that the same set of packets are displayed after this time gap by entering:

Switch# show monitor capture mycap buffer brief

0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000

10.1.1.2 -> 20.1.1.2 10.1.1.3 -> 20.1.1.2 10.1.1.4 -> 20.1.1.2 10.1.1.5 -> 20.1.1.2 10.1.1.6 -> 20.1.1.2 10.1.1.7 -> 20.1.1.2 10.1.1.8 -> 20.1.1.2 10.1.1.9 -> 20.1.1.2 10.1.1.10 -> 20.1.1.2 10.1.1.11 -> 20.1.1.2

Step 8: Repeat Step 7.

Step 9: Clear the buffer by entering:

Switch# monitor capture mycap clear

UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Step 10: Confirm that the buffer is now empty by entering:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 891

Example: Using Buffer Capture

Network Management

Switch# show monitor capture mycap buffer brief

Step 11: Wait about 10 seconds, then display the buffer contents by entering:
Switch# show monitor capture mycap buffer brief

Step 12: Restart the traffic, wait for 10 seconds, then display the buffer contents by entering:
Switch# monitor capture mycap start wait for 10 seconds... Switch# show monitor capture mycap buffer brief

0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000

10.1.1.2 -> 20.1.1.2 10.1.1.3 -> 20.1.1.2 10.1.1.4 -> 20.1.1.2 10.1.1.5 -> 20.1.1.2 10.1.1.6 -> 20.1.1.2 10.1.1.7 -> 20.1.1.2 10.1.1.8 -> 20.1.1.2 10.1.1.9 -> 20.1.1.2 10.1.1.10 -> 20.1.1.2 10.1.1.11 -> 20.1.1.2

UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Step 13: Store the buffer contents to the mycap1.pcap file in the internal flash: storage device by entering:

Switch# monitor capture mycap export flash:mycap1.pcap Exported Successfully

Step 14: Check that the file has been created and that it contains the packets by entering:
Switch# dir flash:mycap1.pcap Directory of flash:/mycap1.pcap

14758 -rw-

20152 Apr 15 2012 16:00:28 -07:00 mycap1.pcap

831541248 bytes total (831340544 bytes free)

Switch# show monitor capture file flash:mycap1.pcap brief

1 0.000000

10.1.1.2 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

2 1.000000

10.1.1.3 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

3 2.000000

10.1.1.4 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

4 3.000000

10.1.1.5 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

5 4.000000

10.1.1.6 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

6 5.000000

10.1.1.7 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

7 6.000000

10.1.1.8 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

8 7.000000

10.1.1.9 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

9 8.000000 10.1.1.10 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

10 9.000000 10.1.1.11 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

11 10.000000 10.1.1.12 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

12 11.000000 10.1.1.13 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

13 12.000000 10.1.1.14 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 892

Network Management

Example: Capture Sessions

14 13.000000 10.1.1.15 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

15 14.000000 10.1.1.16 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

16 15.000000 10.1.1.17 -> 20.1.1.2

UDP Source port: 20001 Destination port: 20002

Step 15: Stop the packet capture and display the buffer contents by entering:

Switch# monitor capture mycap stop Switch# show monitor capture mycap buffer brief

0.000000 1.000000 2.000000 3.000000 4.000000 5.000000 6.000000 7.000000 8.000000 9.000000 10.000000 11.000000

10.1.1.2 -> 20.1.1.2 10.1.1.3 -> 20.1.1.2 10.1.1.4 -> 20.1.1.2 10.1.1.5 -> 20.1.1.2 10.1.1.6 -> 20.1.1.2 10.1.1.7 -> 20.1.1.2 10.1.1.8 -> 20.1.1.2 10.1.1.9 -> 20.1.1.2 10.1.1.10 -> 20.1.1.2 10.1.1.11 -> 20.1.1.2 10.1.1.12 -> 20.1.1.2 10.1.1.13 -> 20.1.1.2

UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001 UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Step 16: Clear the buffer and then try to display packets from the buffer by entering:

Switch# monitor capture mycap clear Switch# show monitor capture mycap buffer brief

Step 17: Delete the capture point by entering:
Switch# no monitor capture mycap

Example: Capture Sessions
Switch# monitor capture mycap start display display-filter "stp" 0.000000 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 2.000992 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 2.981996 20:37:06:cf:08:b6 -> 20:37:06:cf:08:b6 LOOP Reply 4.000992 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 6.000000 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 7.998001 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136 9.998001 20:37:06:cf:08:b6 -> 01:80:c2:00:00:00 STP Conf. Root = 32768/100/20:37:06:ce:f0:80 Cost = 0 Port = 0x8136
Capture test is not active Failed to Initiate Wireshark Switch# show monitor capture mycap parameter
monitor capture mycap control-plane both monitor capture mycap match any monitor capture mycap file location flash:mycap1.1 buffer-size 90 monitor capture mycap limit duration 10
Switch# monitor capture mycap start display display-filter "udp.port == 20002" A file by the same capture file name already exists, overwrite?[confirm] [ENTER] after a minute or so... Capture mycap is not active Failed to Initiate Wireshark

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 893

Example: Capture and Store in Lock-step Mode

Network Management

*Oct 13 15:00:44.649: %BUFCAP-6-ENABLE: Capture Point mycap enabled. *Oct 13 15:00:46.657: %BUFCAP-6-DISABLE_ASYNC: Capture Point mycap disabled. Rea son : Wireshark Session Ended
Switch# monitor capture mycap start display display-filter "udp.port == 20002" dump A file by the same capture file name already exists, overwrite?[confirm] after a minute or so... Capture mycap is not active Failed to Initiate Wireshark *Oct 13 15:00:44.649: %BUFCAP-6-ENABLE: Capture Point mycap enabled. *Oct 13 15:00:46.657: %BUFCAP-6-DISABLE_ASYNC: Capture Point mycap disabled. Rea son : Wireshark Session Ended
Switch# no monitor capture mycap file Switch# monitor capture mycap start display display-filter "udp.port == 20002" dump
Please associate capture file/buffer Unable to activate Capture.
Switch# monitor capture mycap start display display-filter "udp.port == 20002" Please associate capture file/buffer
Unable to activate Capture.
Switch# monitor capture mycap start display detailed Please associate capture file/buffer
Unable to activate Capture.
Example: Capture and Store in Lock-step Mode
This example captures live traffic and stores the packets in lock-step mode.
Note The capture rate might be slow for the first 15 seconds. If possible and necessary, start the traffic 15 seconds after the capture session starts.
Step 1: Define a capture point to match on the relevant traffic and associate it to a file by entering:
Switch# monitor capture mycap interface GigabitEthernet1/0/1 in Switch# monitor capture mycap match ipv4 any any Switch# monitor capture mycap limit duration 60 packets 100 Switch# monitor capture mycap file location flash:mycap.pcap buffer-size 64
Step 2: Confirm that the capture point has been correctly defined by entering:
Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 in monitor capture mycap file location flash:mycap.pcap buffer-size 64 monitor capture mycap limit packets 100 duration 60
Switch# show monitor capture mycap
Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: in Status : Inactive Filter Details: Filter not attached Buffer Details: Buffer Type: LINEAR (default) File Details: Associated file name: flash:mycap.pcap Size of buffer(in MB): 64

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 894

Network Management

Example: Simple Capture and Store of Packets in Egress Direction

Limit Details: Number of Packets to capture: 100 Packet Capture duration: 60 Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling)
Step 3: Launch packet capture by entering:
Switch# monitor capture mycap start A file by the same capture file name already exists, overwrite?[confirm] Turning on lock-step mode

Switch# *Oct 14 09:35:32.661: %BUFCAP-6-ENABLE: Capture Point mycap enabled.

Step 4: Display the packets by entering:

Switch# show monitor capture file flash:mycap.pcap

0.000000 10.1.1.30 -> 20.1.1.2

UDP Source port: 20001

1.000000 10.1.1.31 -> 20.1.1.2

UDP Source port: 20001

2.000000 10.1.1.32 -> 20.1.1.2

UDP Source port: 20001

3.000000 10.1.1.33 -> 20.1.1.2

UDP Source port: 20001

4.000000 10.1.1.34 -> 20.1.1.2

UDP Source port: 20001

5.000000 10.1.1.35 -> 20.1.1.2

UDP Source port: 20001

6.000000 10.1.1.36 -> 20.1.1.2

UDP Source port: 20001

7.000000 10.1.1.37 -> 20.1.1.2

UDP Source port: 20001

8.000000 10.1.1.38 -> 20.1.1.2

UDP Source port: 20001

9.000000 10.1.1.39 -> 20.1.1.2

UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Step 5: Delete the capture point by entering:

Switch# no monitor capture mycap

Example: Simple Capture and Store of Packets in Egress Direction
This example shows how to capture packets to a filter:
Step 1: Define a capture point to match on the relevant traffic and associate it to a file by entering:
Switch# monitor capture mycap interface Gigabit 1/0/1 out match ipv4 any any Switch# monitor capture mycap limit duration 60 packets 100 Switch# monitor capture mycap file location flash:mycap.pcap buffer-size 90
Step 2: Confirm that the capture point has been correctly defined by entering:
Switch# show monitor capture mycap parameter monitor capture mycap interface GigabitEthernet1/0/1 out monitor capture mycap match ipv4 any any monitor capture mycap file location flash:mycap.pcap buffer-size 90 monitor capture mycap limit packets 100 duration 60
Switch# show monitor capture mycap
Status Information for Capture mycap Target Type: Interface: GigabitEthernet1/0/1, Direction: out Status : Inactive Filter Details: IPv4 Source IP: any Destination IP: any

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 895

Example: Simple Capture and Store of Packets in Egress Direction

Network Management

Protocol: any Buffer Details:
Buffer Type: LINEAR (default) File Details:
Associated file name: flash:mycap.pcap Size of buffer(in MB): 90 Limit Details: Number of Packets to capture: 100 Packet Capture duration: 60 Packet Size to capture: 0 (no limit) Packets per second: 0 (no limit) Packet sampling rate: 0 (no sampling)
Step 3: Launch packet capture by entering:
Switch# monitor capture mycap start A file by the same capture file name already exists, overwrite?[confirm] Turning on lock-step mode
Switch# *Oct 14 09:35:32.661: %BUFCAP-6-ENABLE: Capture Point mycap enabled.

Note Allow the capture operation stop automatically after the time has elapsed or the packet count has been met. When you see the following message in the output, will know that the capture operation has stopped:
*Oct 14 09:36:34.632: %BUFCAP-6-DISABLE_ASYNC: Capture Point mycap disabled. Rea son : Wireshark Session Ended
The mycap.pcap file now contains the captured packets.

Step 4: Display the packets by entering:

Switch# show monitor capture file flash:mycap.pcap

0.000000 10.1.1.30 -> 20.1.1.2

UDP Source port: 20001

1.000000 10.1.1.31 -> 20.1.1.2

UDP Source port: 20001

2.000000 10.1.1.32 -> 20.1.1.2

UDP Source port: 20001

3.000000 10.1.1.33 -> 20.1.1.2

UDP Source port: 20001

4.000000 10.1.1.34 -> 20.1.1.2

UDP Source port: 20001

5.000000 10.1.1.35 -> 20.1.1.2

UDP Source port: 20001

6.000000 10.1.1.36 -> 20.1.1.2

UDP Source port: 20001

7.000000 10.1.1.37 -> 20.1.1.2

UDP Source port: 20001

8.000000 10.1.1.38 -> 20.1.1.2

UDP Source port: 20001

9.000000 10.1.1.39 -> 20.1.1.2

UDP Source port: 20001

Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002 Destination port: 20002

Step 5: Delete the capture point by entering:

Switch# no monitor capture mycap

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 896

Network Management

Additional References

Additional References

Related Documents

Related Topic

Document Title

General Packet Filtering For general packet filtering, refer to:

Display Filter Reference

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Related Topics Filters, on page 864

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 897

Feature History and Information for WireShark

Network Management

Feature History and Information for WireShark

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 898

X P A R T
QoS
· Configuring QoS, on page 901 · Configuring Auto-QoS, on page 1013

5 6 C H A P T E R
Configuring QoS
· Finding Feature Information, on page 901 · Prerequisites for QoS, on page 901 · QoS Components, on page 902 · QoS Terminology, on page 902 · Information About QoS, on page 903 · Restrictions for QoS on Wired Targets, on page 936 · Restrictions for QoS on Wireless Targets, on page 939 · How to Configure QoS, on page 942 · Monitoring QoS, on page 994 · Configuration Examples for QoS, on page 996 · Where to Go Next, on page 1010 · Additional References for QoS, on page 1010 · Feature History and Information for QoS, on page 1011
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for QoS
Before configuring standard QoS, you must have a thorough understanding of these items: · Standard QoS concepts. · Wireless concepts and network topologies. · Classic Cisco IOS QoS. · Modular QoS CLI (MQC). · Understanding of QoS implementation.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 901

QoS QoS Components
· The types of applications used and the traffic patterns on your network. · Traffic characteristics and needs of your network. For example, is the traffic on your network bursty?
Do you need to reserve bandwidth for voice and video streams? · Bandwidth requirements and speed of the network. · Location of congestion points in the network. Related Topics
Restrictions for QoS on Wired Targets, on page 936 Restrictions for QoS on Wireless Targets, on page 939
QoS Components
QoS consists of the following key components: · Classification-- Classification is the process of distinguishing one type of traffic from another based upon ACLs, Differentiated Services Code Point (DSCP), Class of Service (CoS), and other factors. · Marking and mutation-- Marking is used on traffic to convey specific information to a downstream device in the network, or to carry information from one interface in a switch to another. When traffic is marked, QoS operations on that traffic can be applied. This can be accomplished directly using the set command or through a table map, which takes input values and translates them directly to values on output. · Shaping and policing-- Shaping is the process of imposing a maximum rate of traffic, while regulating the traffic rate in such a way that downstream devices are not subjected to congestion. Shaping in the most common form is used to limit the traffic sent from a physical or logical interface. Policing is used to impose a maximum rate on a traffic class. If the rate is exceeded, then a specific action is taken as soon as the event occurs. · Queuing -- Queueing is used to prevent traffic congestion. Traffic is sent to specific queues for servicing and scheduling based upon bandwidth allocation. Traffic is then scheduled or sent out through the port. · Bandwidth--Bandwidth allocation determines the available capacity for traffic that is subject to QoS policies. · Trust-- Trust enables traffic to pass through the switch, and the DSCP, precedence, or CoS values coming in from the end points are retained in the absence of any explicit policy configuration.
QoS Terminology
The following terms are used interchangeably in this QoS configuration guide: · Upstream (direction towards the switch) is the same as ingress. · Downstream (direction from the switch) is the same as egress.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 902

QoS Information About QoS
Note Upstream is wireless to wired. Downstream is wired to wireless. Wireless to wireless has no specific term.
Information About QoS
QoS Overview
By configuring the quality of service (QoS), you can provide preferential treatment to specific types of traffic at the expense of other traffic types. Without QoS, the switch offers best-effort service to each packet, regardless of the packet contents or size. The switch sends the packets without any assurance of reliability, delay bounds, or throughput. The following are specific features provided by QoS:
· Low latency · Bandwidth guarantee · Buffering capabilities and dropping disciplines · Traffic policing · Enables the changing of the attribute of the frame or packet header · Relative services Related Topics
Restrictions for QoS on Wired Targets, on page 936 Restrictions for QoS on Wireless Targets, on page 939
Modular QoS Command-Line Interface
With the switch, QoS features are enabled through the Modular QoS command-line interface (MQC). The MQC is a command-line interface (CLI) structure that allows you to create traffic policies and attach these policies to interfaces. A traffic policy contains a traffic class and one or more QoS features. A traffic class is used to classify traffic, while the QoS features in the traffic policy determine how to treat the classified traffic. One of the main goals of MQC is to provide a platform-independent interface for configuring QoS across Cisco platforms.
Wireless QoS Overview
Wireless QoS can be configured on the following wireless targets: · Wireless ports, including all physical ports to which an access point can be associated. · Radio · SSID (applicable on a per-radio, per-AP, and per-SSID) · Client
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 903

QoS QoS and IPv6 for Wireless

The following table displays how policies are supported for the wireless targets.
Table 76: Wireless Targets Policies Support

Wireless Target
Wireless port Radio
SSID Client

Policies on Wireless Targets Supported Yes Yes
Yes Yes

Policies Supported

Policies Supported

Downstream Direction Upstream Direction

Yes - user configurable No

Yes - but not configurable No by user

Yes - user configurable Yes - user configurable

Yes - user configurable Yes - user configurable

Note Additional polices that are user configured include multi-destination policers and VLANs.
Wireless QoS supports the following additional features: · Queuing support · Policing of wireless traffic · Shaping of wireless traffic · Rate limiting in both downstream and upstream direction · Approximate Fair Drop (AFD) · Mobility support for QoS · Compatibility with precious metal QoS policies available on Cisco Unified Wireless Controllers.
QoS and IPv6 for Wireless
From this release onwards, the switch supports QoS for both IPv4 and IPv6 traffic, and client policies can now have IPv4 and IPv6 filters.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 904

QoS Wired and Wireless Access Supported Features

Wired and Wireless Access Supported Features
The following table describes the supported features for both wired and wireless access.
Table 77: Supported QoS Features for Wired and Wireless Access

Feature Targets

Wired · Gigabit Ethernet · 10 Gigabit Ethernet · VLAN

Wireless · Wireless port (CAPWAP tunnel) · SSID · Client · Radio · CAPWAP multicast tunnel

Configuration Sequence

QoS policy installed using the service-policy command.

· When an access point joins the switch, the switch installs a policy on the port. The port policy has a child policy called port_child_policy.
· A policy is installed on the radio which has a shaper configured to the radio rate. The default radio policy (which cannot be modified) is attached to the radio.
· The default client policies take effect when a WMM client associates, and if admission control is enabled on the radio.
· User can modify the port_child_policy to add more classes.
· User can attach a user-defined policy at the SSID level.
· User can attach a user-defined policy at the client level.

Number of queues Up to 8 queues supported on a Only four queues supported. permitted at port level port.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 905

QoS Supported QoS Features on Wireless Targets

Feature
Classification mechanism

Wired
· DSCP · IP precedence · CoS · QoS-group · ACL membership
including: · IPv4 ACLs · IPv6 ACLS · MAC ACLs

Wireless · Port level · Ingress: QoS policies not supported on ingress in wireless ports. · Egress: Only DSCP based classification.
· SSID level · Ingress: DSCP, UP · Egress: DSCP,COS, QoS group
· Client level · Ingress: ACL, DSCP, UP · Egress: ACL, DSCP, and COS

Related Topics Port Policy Format, on page 907

Supported QoS Features on Wireless Targets
This table describes the various features available on wireless targets.
Table 78: QoS Features Available on Wireless Targets

Target Features

Port

· Port shaper

· Priority queuing

· Multicast policing

Traffic

Direction Where Policies Are Applicable

Non-Real Downstream Time (NRT), Real Time (RT)

Comments

Radio

· Shaping

SSID

· Shaping · Police · Table map · BRR

Non-Real Time

Downstream

Non-Real Time, Real Time

Upstream and downstream

Radio policies are not user configurable.
Queuing actions such as shaping and BRR are allowed only in the downstream direction.

Client

· Set · Police

Non-Real Time, Real time

Upstream and downstream

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 906

QoS Port Policies

Port Policies

Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Port Policies, on page 907 Port Policy Format, on page 907 Radio Policies, on page 909 Applying an SSID or Client Policy on a WLAN (CLI), on page 959 Configuring SSID Policies (GUI), on page 958 SSID Policies, on page 909 Configuring Client Policies (CLI) Configuring Client Policies (GUI), on page 949 Client Policies, on page 910
The switch supports port-based policies. The port policies includes port shaper and a child policy (port_child_policy).

Note Port child policies only apply to wireless ports and not to wired ports on the switch. A wireless port is defined as a port to which APs join. A default port child policy is applied on the switch to the wireless ports at start up.The port shaper rate is limited to 1G

Port shaper specifies the traffic policy applicable between the device and the AP. This is the sum of the radio rates supported on the access point.
The child policy determines the mapping between packets and queues defined by the port-child policy. The child policy can be configured to include voice, video, class-default, and non-client-nrt classes where voice and video are based on DSCP value (which is the outer CAPWAP header DSCP value). The definition of class-default is known to the system as any value other than voice and video DSCP.
The DSCP value is assigned when the packet reaches the port. Before the packet arrives at the port, the SSID policies are applied on the packet. Port child policy also includes multicast percentage for a given port traffic. By default, the port child policy allocates up to 10 percent of the available rate.
Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Restrictions for QoS on Wireless Targets, on page 939 Supported QoS Features on Wireless Targets, on page 906 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000

Port Policy Format

This section describes the behavior of the port policies on a switch. The ports on the switch do not distinguish between wired or wireless physical ports. Depending on the kind of device associated to the switch, the policies are applied. For example, when an access point is connected to a switch port, the switch detects it as a wireless device and applies the default hierarchical policy which is in the format of a parent-child policy. This policy is an hierarchical policy. The parent policy cannot be modified but the child policy (port-child policy) can be modified to suit the QoS configuration. The switch is pre configured with a default class map and a policy map.
Default class map:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 907

QoS Port Policy Format
Class Map match-any non-client-nrt-class Match non-client-nrt
The above port policy processes all network traffic to the Q3 queue. You can view the class map by executing the show class-map command. Default policy map:
Policy Map port_child_policy Class non-client-nrt-class bandwidth remaining ratio 10
Note The class map and policy map listed are system-defined policies and cannot be changed.
The following is the system-defined policy map available on the ports on which wireless devices are associated. The format consists of a parent policy and a service child policy (port_child_policy). To customize the policies to suite your network needs, you must configure the port child policy.
Policy-map policy_map_name Class class-default Shape average average_rate Service-policy port_child_policy
Note The parent policy is system generated and cannot be changed. You must configure the port_child_policy policy to suit the QoS requirements on your network.
Depending on the type of traffic in your network, you can configure the port child policy. For example, in a typical wireless network deployment, you can assign specific priorities to voice and video traffic. Here is an example:
Policy-map port_child_policy Class voice-policy-name (match dscp ef) Priority level 1 Police (multicast-policer-name-voice) Multicast Policer
Class video-policy-name (match dscp af41) Priority level 2 Police (multicast-policer-name-video) Multicast Policer
Class non-client-nrt-class traffic(match non-client-nrt) Bandwidth remaining ratio (brr-value-nrt-q2)
Class class-default (NRT Data) Bandwidth remaining ratio (brr-value-q3)
In the above port child policy: · voice-policy-name-- Refers to the name of the class that specifies rules for the traffic for voice packets. Here the DSCP value is mapped to a value of 46 (represented by the keyword ef). The voice traffic is assigned the highest priority of 1. · video-policy-name-- Refers to the name of the class that specifies rules for the traffic for video packets. The DSCP value is mapped to a value of 34 (represented by the keyword af41).
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 908

QoS Radio Policies

· multicast-policer-name-voice-- If you need to configure multicast voice traffic, you can configure policing for the voice class map.
· multicast-policer-name-video-- If you need to configure multicast video traffic, you can configure policing for the video class map.

In the above sample configuration, all voice and video traffic is directed to the Q0 and Q1 queues, respectively. These queues maintain a strict priority. The packets in Q0 and Q1 are processed in that order. The bandwidth remaining ratios brr-value-nrt-q2 and brr-value-q3 are directed to the Q2 and Q3 respectively specified by the class maps and class-default and non-client-nrt. The processing of packets on Q2 and Q3 are based on a weighted round-robin approach. For example, if the brr-value-nrtq2 has a value of 90 and brr-value-nrtq3 is 10, the packets in queue 2 and queue 3 are processed in the ratio of 9:1.
Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Restrictions for QoS on Wireless Targets, on page 939 Supported QoS Features on Wireless Targets, on page 906 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000 Wired and Wireless Access Supported Features, on page 905 Policy Maps, on page 919

Radio Policies

The radio policies are system defined and are not user configurable. Radio wireless targets are only applicable in the downstream direction. Radio policies are applicable on a per-radio, per-access point basis. The rate limit on the radios is the practical limit of the AP radio rate. This value is equivalent to the sum of the radios supported by the access point. The following radios are supported:
· 802.11 a/n
· 802.11 b/n
· 802.11 a/c

Related Topics Restrictions for QoS on Wireless Targets, on page 939 Supported QoS Features on Wireless Targets, on page 906

SSID Policies

You can create QoS policies on SSID BSSID (Basic Service Set Identification) in both the upstream and downstream directions. By default, there is no SSID policy. You can configure an SSID policy based on the SSID name. The policy is applicable on a per BSSID.
The types of policies you can create on SSID include marking by using table maps (table-maps), shape rate, and RT1 (Real Time 1) and RT2 (Real Time 2) policiers. If traffic is upstream, you usually configure a marking policy on the SSID. If traffic is downstream, you can configure marking and queuing.
There should be a one-to-one mapping between the policies configured on a port and an SSID. For example, if you configure class voice and class video on the port, you can have a similar policy on the SSID.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 909

QoS Client Policies
SSID priorities can be specified by configuring bandwidth remaining ratio. Queuing SSID policies are applied in the downstream direction. Related Topics
Applying an SSID or Client Policy on a WLAN (CLI), on page 959 Configuring SSID Policies (GUI), on page 958 Applying a QoS Policy on a WLAN (GUI), on page 993 Supported QoS Features on Wireless Targets, on page 906 Examples: SSID Policy Examples: Configuring Downstream SSID Policy, on page 1001
Client Policies
Client policies are applicable in the upstream and downstream direction. The wireless control module of the switch applies the default client policies when admission control is enabled for WMM clients. When admission control is disabled, there is no default client policy. You can configure policing and marking policies on clients.
Note A client policy can have both IPv4 and IPv6 filters. You can configure client policies in the following ways: · Using AAA--You can use a combination of AAA and TCLAS, and AAA and SIP snooping when configuring with AAA. · Using the Cisco IOS MQC CLI--You can use a combination of CLI and TCLAS and CLI and SIP snooping. · Using the default configuration
Note When applying client policies on a WLAN, you must disable the WLAN before modifying the client policy. SSID policies can be modified even if the WLAN is enabled.
Note If you configured AAA by configuring the unified wireless controller procedure, and using the MQC QoS commands, the policy configuration performed through the MQC QoS commands takes precedence. For client policies, the following filters are supported: · ACL · DSCP · COS · WLAN UP
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 910

QoS Hierarchical QoS
Related Topics Configuring Client Policies (CLI) Configuring Client Policies (GUI), on page 949 Applying a QoS Policy on a WLAN (GUI), on page 993 Supported QoS Features on Wireless Targets, on page 906 Examples: Client Policies, on page 1002
Hierarchical QoS
The switch supports hierarchical QoS (HQoS). HQoS allows you to perform: · Hierarchical classification-- Traffic classification is based upon other classes. · Hierarchical policing--The process of having the policing configuration at multiple levels in a hierarchical policy. · Hierarchical shaping--Shaping can also be configured at multiple levels in the hierarchy.
Note Hierarchical shaping is only supported for the port shaper, where for the parent you only have a configuration for the class default, and the only action for the class default is shaping.
Related Topics Examples: Hierarchical Classification, on page 998 Examples: Hierarchical Policy Configuration, on page 998
Hierarchical Wireless QoS
The switch supports hierarchical QoS for wireless targets. Hierarchical QoS policies are applicable on port, radio, SSID, and client. QoS policies configured on the device (including marking, shaping, policing) can be applied across the targets. If the network contains non-realtime traffic, the non-realtime traffic is subject to approximate fair drop. Hierarchy refers to the process of application of the various QoS policies on the packets arriving to the device.
Figure 59: Hierarchical QoS
This figure shows the various targets available on a wireless network, as well as a hierarchal wireless configuration. Wireless QoS is applied per-radio constraint, per-WLAN, and per-client constraint.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 911

QoS Wireless Packet Format

Wireless Packet Format
Figure 60: Wireless Packet Path in the Egress Direction during First Pass
This figure displays the wireless packet flow and encapsulation used in hierarchical wireless QoS. The incoming packet enters the switch. The switch encapsulates this incoming packet and adds the 802.11e and CAPWAP headers.

Hierarchical AFD

Approximate Fair Dropping (AFD) is a feature provided by the QoS infrastructure in Cisco IOS. For wireless targets, AFD can be configured on SSID (via shaping) and clients (via policing). AFD shaping rate is only applicable for downstream direction. Unicast real-time traffic is not subjected to AFD drops.

QoS Implementation
Typically, networks operate on a best-effort delivery basis, which means that all traffic has equal priority and an equal chance of being delivered in a timely manner. When congestion occurs, all traffic has an equal chance of being dropped.
When you configure the QoS feature, you can select specific network traffic, prioritize it according to its relative importance, and use congestion-management and congestion-avoidance techniques to provide

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 912

QoS Layer 2 Frame Prioritization Bits
preferential treatment. Implementing QoS in your network makes network performance more predictable and bandwidth utilization more effective. The QoS implementation is based on the Differentiated Services (Diff-Serv) architecture, a standard from the Internet Engineering Task Force (IETF). This architecture specifies that each packet is classified upon entry into the network. The classification is carried in the IP packet header, using 6 bits from the deprecated IP type of service (ToS) field to carry the classification (class) information. Classification can also be carried in the Layer 2 frame.
Figure 61: QoS Classification Layers in Frames and Packets
The special bits in the Layer 2 frame or a Layer 3 packet are shown in the following
figure: Related Topics
Restrictions for QoS on Wired Targets, on page 936 Restrictions for QoS on Wireless Targets, on page 939
Layer 2 Frame Prioritization Bits
Layer 2 Inter-Switch Link (ISL) frame headers have a 1-byte User field that carries an IEEE 802.1p class of service (CoS) value in the three least-significant bits. On ports configured as Layer 2 ISL trunks, all traffic is in ISL frames.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 913

QoS Layer 3 Packet Prioritization Bits
Layer 2 802.1Q frame headers have a 2-byte Tag Control Information field that carries the CoS value in the three most-significant bits, which are called the User Priority bits. On ports configured as Layer 2 802.1Q trunks, all traffic is in 802.1Q frames except for traffic in the native VLAN. Other frame types cannot carry Layer 2 CoS values. Layer 2 CoS values range from 0 for low priority to 7 for high priority.
Layer 3 Packet Prioritization Bits
Layer 3 IP packets can carry either an IP precedence value or a Differentiated Services Code Point (DSCP) value. QoS supports the use of either value because DSCP values are backward-compatible with IP precedence values. IP precedence values range from 0 to 7. DSCP values range from 0 to 63.
End-to-End QoS Solution Using Classification
All switches and routers that access the Internet rely on the class information to provide the same forwarding treatment to packets with the same class information and different treatment to packets with different class information. The class information in the packet can be assigned by end hosts or by switches or routers along the way, based on a configured policy, detailed examination of the packet, or both. Detailed examination of the packet is expected to occur closer to the edge of the network, so that the core switches and routers are not overloaded with this task. Switches and routers along the path can use the class information to limit the amount of resources allocated per traffic class. The behavior of an individual device when handling traffic in the Diff-Serv architecture is called per-hop behavior. If all devices along a path provide a consistent per-hop behavior, you can construct an end-to-end QoS solution. Implementing QoS in your network can be a simple task or complex task and depends on the QoS features offered by your internetworking devices, the traffic types and patterns in your network, and the granularity of control that you need over incoming and outgoing traffic.
Packet Classification
Packet classification is the process of identifying a packet as belonging to one of several classes in a defined policy, based on certain criteria. The Modular QoS CLI (MQC) is a policy-class based language. The policy class language is used to define the following:
· Class-map template with one or several match criteria
· Policy-map template with one or several classes associated to the policy map
The policy map template is then associated to one or several interfaces on the switch. Packet classification is the process of identifying a packet as belonging to one of the classes defined in the policy map. The process of classification will exit when the packet being processed matches a specific filter in a class. This is referred to as first-match exit. If a packet matches multiple classes in a policy, irrespective of the order of classes in the policy map, it would still exit the classification process after matching the first class. If a packet does not match any of the classes in the policy, it would be classified into the default class in the policy. Every policy map has a default class, which is a system-defined class to match packets that do not match any of the user-defined classes. Packet classification can be categorized into the following types:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 914

QoS Classification Based on Information That is Propagated with the Packet

· Classification based on information that is propagated with the packet · Classification based on information that is switch specific · Hierarchical classification

Classification Based on Information That is Propagated with the Packet Classification that is based on information that is part of the packet and propagated either end-to-end or between hops, typically includes the following: · Classification based on Layer 3 or 4 headers
· Classification based on Layer 2 information

Classification Based on Layer 3 or Layer 4 Header
This is the most common deployment scenario. Numerous fields in the Layer 3 and Layer 4 headers can be used for packet classification.
At the most granular level, this classification methodology can be used to match an entire flow. For this deployment type, an access control list (ACLs) can be used. ACLs can also be used to match based on various subsets of the flow (for example, source IP address only, or destination IP address only, or a combination of both).
Classification can also be done based on the precedence or DSCP values in the IP header. The IP precedence field is used to indicate the relative priority with which a particular packet needs to be handled. It is made up of three bits in the IP header's type of service (ToS) byte.
The following table shows the different IP precedence bit values and their names.
Note IP precedence is not supported for wireless QoS.

Table 79: IP Precedence Values and Names

IP Precedence Value 0 1 2 3 4 5 6 7

IP Precedence Bits 000 001 010 011 100 101 110 111

IP Precedence Names Routine Priority Immediate Flash Flash Override Critical Internetwork control Network control

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 915

QoS Classification Based on Layer 2 Header
Note All routing control traffic in the network uses IP precedence value 6 by default. IP precedence value 7 also is reserved for network control traffic. Therefore, the use of IP precedence values 6 and 7 is not recommended for user traffic. The DSCP field is made up of 6 bits in the IP header and is being standardized by the Internet Engineering Task Force (IETF) Differentiated Services Working Group. The original ToS byte contained the DSCP bits has been renamed the DSCP byte. The DSCP field is part of the IP header, similar to IP precedence. The DSCP field is a super set of the IP precedence field. Therefore, the DSCP field is used and is set in ways similar to what was described with respect to IP precedence.
Note The DSCP field definition is backward-compatible with the IP precedence values.
Classification Based on Layer 2 Header A variety of methods can be used to perform classification based on the Layer 2 header information. The most common methods include the following: · MAC address-based classification (only for access groups)--Classification is based upon the source MAC address (for policies in the input direction) and destination MAC address (for policies in the output direction). · Class-of-Service--Classification is based on the 3 bits in the Layer 2 header based on the IEEE 802.1p standard. This usually maps to the ToS byte in the IP header. · VLAN ID--Classification is based on the VLAN ID of the packet.
Note Some of these fields in the Layer 2 header can also be set using a policy.
Classification Based on Information that is Device Specific (QoS Groups) The switch also provides classification mechanisms that are available where classification is not based on information in the packet header or payload. At times you might be required to aggregate traffic coming from multiple input interfaces into a specific class in the output interface. For example, multiple customer edge routers might be going into the same access switch on different interfaces. The service provider might want to police all the aggregate voice traffic going into the core to a specific rate. However, the voice traffic coming in from the different customers could have a different ToS settings. QoS group-based classification is a feature that is useful in these scenarios. Policies configured on the input interfaces set the QoS group to a specific value, which can then be used to classify packets in the policy enabled on output interface. The QoS group is a field in the packet data structure internal to the switch. It is important to note that a QoS group is an internal label to the switch and is not part of the packet header.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 916

QoS Hierarchical Classification
Hierarchical Classification The switch permits you to perform a classification based on other classes. Typically, this action may be required when there is a need to combine the classification mechanisms (that is, filters) from two or more classes into a single class map.
QoS Wired Model
To implement QoS, the switch must perform the following tasks: · Traffic classification--Distinguishes packets or flows from one another. · Traffic marking and policing--Assigns a label to indicate the given quality of service as the packets move through the switch, and then make the packets comply with the configured resource usage limits. · Queuing and scheduling--Provides different treatment in all situations where resource contention exists. · Shaping--Ensures that traffic sent from the switch meets a specific traffic profile.
Ingress Port Activity
The following activities occur at the ingress port of the switch: · Classification--Classifying a distinct path for a packet by associating it with a QoS label. For example, the switch maps the CoS or DSCP in the packet to a QoS label to distinguish one type of traffic from another. The QoS label that is generated identifies all future QoS actions to be performed on this packet. · Policing--Policing determines whether a packet is in or out of profile by comparing the rate of the incoming traffic to the configured policer. The policer limits the bandwidth consumed by a flow of traffic. The result is passed to the marker. · Marking--Marking evaluates the policer and configuration information for the action to be taken when a packet is out of profile and determines what to do with the packet (pass through a packet without modification, mark down the QoS label in the packet, or drop the packet).
Note Applying polices on the wireless ingress port is not supported on the switch.
Egress Port Activity
The following activities occur at the egress port of the switch: · Policing--Policing determines whether a packet is in or out of profile by comparing the rate of the incoming traffic to the configured policer. The policer limits the bandwidth consumed by a flow of traffic. The result is passed to the marker. · Marking--Marking evaluates the policer and configuration information for the action to be taken when a packet is out of profile and determines what to do with the packet (pass through a packet without modification, mark down the QoS label in the packet, or drop the packet). · Queueing--Queueing evaluates the QoS packet label and the corresponding DSCP or CoS value before selecting which of the egress queues to use. Because congestion can occur when multiple ingress ports simultaneously send data to an egress port, Weighted Tail Drop (WTD) differentiates traffic classes and
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 917

QoS Classification

subjects the packets to different thresholds based on the QoS label. If the threshold is exceeded, the packet is dropped.
Classification
Classification is the process of distinguishing one kind of traffic from another by examining the fields in the packet. Classification is enabled only if QoS is enabled on the switch. By default, QoS is enabled on the switch. During classification, the switch performs a lookup and assigns a QoS label to the packet. The QoS label identifies all QoS actions to be performed on the packet and from which queue the packet is sent.
Access Control Lists
You can use IP standard, IP extended, or Layer 2 MAC ACLs to define a group of packets with the same characteristics (class). You can also classify IP traffic based on IPv6 ACLs. In the QoS context, the permit and deny actions in the access control entries (ACEs) have different meanings from security ACLs:
· If a match with a permit action is encountered (first-match principle), the specified QoS-related action is taken.
· If a match with a deny action is encountered, the ACL being processed is skipped, and the next ACL is processed.
· If no match with a permit action is encountered and all the ACEs have been examined, no QoS processing occurs on the packet, and the switch offers best-effort service to the packet.
· If multiple ACLs are configured on a port, the lookup stops after the packet matches the first ACL with a permit action, and QoS processing begins.

Class Maps

Note When creating an access list, note that by default the end of the access list contains an implicit deny statement for everything if it did not find a match before reaching the end.
After a traffic class has been defined with the ACL, you can attach a policy to it. A policy might contain multiple classes with actions specified for each one of them. A policy might include commands to classify the class as a particular aggregate (for example, assign a DSCP) or rate-limit the class. This policy is then attached to a particular port on which it becomes effective. You implement IP ACLs to classify IP traffic by using the access-list global configuration command; you implement Layer 2 MAC ACLs to classify non-IP traffic by using the mac access-list extended global configuration command.
A class map is a mechanism that you use to name a specific traffic flow (or class) and isolate it from all other traffic. The class map defines the criteria used to match against a specific traffic flow to further classify it. The criteria can include matching the access group defined by the ACL or matching a specific list of DSCP or IP precedence values. If you have more than one type of traffic that you want to classify, you can create

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 918

QoS Policy Maps

another class map and use a different name. After a packet is matched against the class-map criteria, you further classify it through the use of a policy map.
You create a class map by using the class-map global configuration command or the class policy-map configuration command. You should use the class-map command when the map is shared among many ports. When you enter the class-map command, the switch enters the class-map configuration mode. In this mode, you define the match criterion for the traffic by using the match class-map configuration command.
You can create a default class by using the class class-default policy-map configuration command. The default class is system-defined and cannot be configured. Unclassified traffic (traffic that does not meet the match criteria specified in the traffic classes) is treated as default traffic.
Related Topics Creating a Traffic Class (CLI), on page 942 Examples: Classification by Access Control Lists, on page 996

Policy Maps

A policy map specifies which traffic class to act on. Actions can include the following: · Setting a specific DSCP or IP precedence value in the traffic class · Setting a CoS value in the traffic class · Setting a QoS group · Setting a wireless LAN (WLAN) value in the traffic class · Specifying the traffic bandwidth limitations and the action to take when the traffic is out of profile

Before a policy map can be effective, you must attach it to a port.
You create and name a policy map using the policy-map global configuration command. When you enter this command, the switch enters the policy-map configuration mode. In this mode, you specify the actions to take on a specific traffic class by using the class or set policy-map configuration and policy-map class configuration commands.
The policy map can also be configured using the police and bandwidth policy-map class configuration commands, which define the policer, the bandwidth limitations of the traffic, and the action to take if the limits are exceeded. In addition, the policy-map can further be configured using the priority policy-map class configuration command, to schedule priority for the class or the queueing policy-map class configuration commands, queue-buffers and queue-limit.
To enable the policy map, you attach it to a port by using the service-policy interface configuration command.
Related Topics Creating a Traffic Policy (CLI), on page 944 Port Policy Format, on page 907

Policy Map on Physical Port
You can configure a nonhierarchical policy map on a physical port that specifies which traffic class to act on. Actions can include setting a specific DSCP or IP precedence value in the traffic class, specifying the traffic bandwidth limitations for each matched traffic class (policer), and taking action when the traffic is out of profile (marking).
A policy map also has these characteristics:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 919

QoS Policy Map on VLANs
· A policy map can contain multiple class statements, each with different match criteria and policers. · A policy map can contain a predefined default traffic class explicitly placed at the end of the map.
When you configure a default traffic class by using the class class-default policy-map configuration command, unclassified traffic (traffic that does not meet the match criteria specified in the traffic classes) is treated as the default traffic class (class-default). · A separate policy-map class can exist for each type of traffic received through a port.
Related Topics Attaching a Traffic Policy to an Interface (CLI), on page 956
Policy Map on VLANs The switch supports a VLAN QoS feature that allows the user to perform QoS treatment at the VLAN level (classification and QoS actions) using the incoming frame's VLAN information. In VLAN-based QoS, a service policy is applied to an SVI interface. All physical interfaces belonging to a VLAN policy map then need to be programmed to refer to the VLAN-based policy maps instead of the port-based policy map. Although the policy map is applied to the VLAN SVI, any policing (rate-limiting) action can only be performed on a per-port basis. You cannot configure the policer to take account of the sum of traffic from a number of physical ports. Each port needs to have a separate policer governing the traffic coming into that port. Related Topics Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI), on page 964 Examples: Policer VLAN Configuration, on page 1006
Wireless QoS Rate Limiting
QoS per Client Rate Limit--Wireless QoS policies can be configured to rate-limit client traffic using policiers. Ths includes both real-time and non real time traffic. The non real-time traffic is policed using AFD policiers. These policiers can only be one rate two color.
Note For client policy, the voice and video rate limits are applied at the same time.
QoS Downstream Rate Limit--Wireless Downstream rate limiting is done using policing at the SSID level. AFD cannot drop real-time traffic, it can only be policed in the traffic queues. Real-time policing and AFD shaping is performed at the SSID level. The radio has a default shaping policy. This shaping limit is the physical limit of the radio itself. You can check the policy maps on the radio by using the show policy-map interface wireless radio command.
Wireless QoS Multicast You can configure multicast policing rate at the port level. Related Topics Configuring QoS Policies for Multicast Traffic (CLI), on page 992 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 920

QoS Policing

Policing

After a packet is classified and has a DSCP-based, CoS-based, or QoS-group label assigned to it, the policing and marking process can begin.
Policing involves creating a policer that specifies the bandwidth limits for the traffic. Packets that exceed the limits are out of profile or nonconforming. Each policer decides on a packet-by-packet basis whether the packet is in or out of profile and specifies the actions on the packet. These actions, carried out by the marker, include passing through the packet without modification, dropping the packet, or modifying (marking down) the assigned DSCP or CoS value of the packet and allowing the packet to pass through.
To avoid out-of-order packets, both conform and nonconforming traffic typically exit the same queue.

Note All traffic, regardless of whether it is bridged or routed, is subjected to a policer, if one is configured. As a result, bridged packets might be dropped or might have their DSCP or CoS fields modified when they are policed and marked.
You can only configure policing on a physical port.
After you configure the policy map and policing actions, attach the policy to an ingress port or SVI by using the service-policy interface configuration command.
Related Topics Configuring Police (CLI), on page 979 Examples: Policing Action Configuration, on page 1006
Token-Bucket Algorithm
Policing uses a token-bucket algorithm. As each frame is received by the switch, a token is added to the bucket. The bucket has a hole in it and leaks at a rate that you specify as the average traffic rate in bits per second. Each time a token is added to the bucket, the switch verifies that there is enough room in the bucket. If there is not enough room, the packet is marked as nonconforming, and the specified policer action is taken (dropped or marked down).
How quickly the bucket fills is a function of the bucket depth (burst-byte), the rate at which the tokens are removed (rate-bps), and the duration of the burst above the average rate. The size of the bucket imposes an upper limit on the burst length and limits the number of frames that can be transmitted back-to-back. If the burst is short, the bucket does not overflow, and no action is taken against the traffic flow. However, if a burst is long and at a higher rate, the bucket overflows, and the policing actions are taken against the frames in that burst.
You configure the bucket depth (the maximum burst that is tolerated before the bucket overflows) by using the burst-byte option of the police policy-map class configuration command. You configure how fast (the average rate) that the tokens are removed from the bucket by using the rate option of the police policy-map class configuration command.
Related Topics Configuring Police (CLI), on page 979 Examples: Policing Action Configuration, on page 1006 Examples: Policing Units, on page 1007

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 921

QoS Marking

Marking

Marking is used to convey specific information to a downstream device in the network, or to carry information from one interface in a switch to another.
Marking can be used to set certain field/bits in the packet headers, or marking can also be used to set certain fields in the packet structure that is internal to the switch. Additionally, the marking feature can be used to define mapping between fields. The following marking methods are available for QoS:
· Packet header
· Device (switch) specific information
· Table maps

Packet Header Marking
Marking on fields in the packet header can be classified into two general categories:
· IPv4/v6 header bit marking
· Layer 2 header bit marking
The marking feature at the IP level is used to set the precedence or the DSCP in the IP header to a specific value to get a specific per-hop behavior at the downstream device (switch or router), or it can also be used to aggregate traffic from different input interfaces into a single class in the output interface. The functionality is currently supported on both the IPv4 and IPv6 headers.
Marking in the Layer 2 headers is typically used to influence dropping behavior in the downstream devices (switch or router). It works in tandem with the match on the Layer 2 headers. The bits in the Layer 2 header that can be set using a policy map are class of service.
Switch Specific Information Marking
This form of marking includes marking of fields in the packet data structure that are not part of the packets header, so that the marking can be used later in the data path. This is not propagated between the switches. Marking of QoS-group falls into this category. This form of marking is only supported in policies that are enabled on the input interfaces. The corresponding matching mechanism can be enabled on the output interfaces on the same switch and an appropriate QoS action can be applied.
Table Map Marking
Table map marking enables the mapping and conversion from one field to another using a conversion table. This conversion table is called a table map.
Depending upon the table map attached to an interface, CoS, DSCP, and UP values (UP specific to wireless packets) of the packet are rewritten. The switch allows configuring both ingress table map policies and egress table map policies.

Note The switch stack supports a total of 14 table maps. Only one table map is supported per wired port, per direction.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 922

QoS Table Map Marking

As an example, a table map can be used to map the Layer 2 CoS setting to a precedence value in Layer 3. This feature enables combining multiple set commands into a single table, which indicates the method to perform the mapping. This table can be referenced in multiple policies, or multiple times in the same policy.
The following table shows the currently supported forms of mapping:
Table 80: Packet-Marking Types Used for Establishing a To-From Relationship

The To Packet-Marking Type Precedence Precedence DSCP DSCP CoS CoS QoS Group QoS Group

The From Packet-Marking Type CoS QoS Group CoS QoS Group Precedence DSCP Precedence DSCP

A table map-based policy supports the following capabilities: · Mutation--You can have a table map that maps from one DSCP value set to another DSCP value set, and this can be attached to an egress port.
· Rewrite--Packets coming in are rewritten depending upon the configured table map.
· Mapping--Table map based policies can be used instead of set policies.

The following steps are required for table map marking: 1. Define the table map--Use the table-map global configuration command to map the values. The table
does not know of the policies or classes within which it will be used. The default command in the table map is used to indicate the value to be copied into the to field when there is no matching from field.
2. Define the policy map--You must define the policy map where the table map will be used.
3. Associate the policy to an interface.

Note A table map policy on an input port changes the trust setting of that port to the from type of qos-marking.
Related Topics Configuring Table Maps (CLI), on page 967 Examples: Table Map Marking Configuration, on page 1008

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 923

QoS Traffic Conditioning

Traffic Conditioning
To support QoS in a network, traffic entering the service provider network needs to be policed on the network boundary routers to ensure that the traffic rate stays within the service limit. Even if a few routers at the network boundary start sending more traffic than what the network core is provisioned to handle, the increased traffic load leads to network congestion. The degraded performance in the network makes it difficult to deliver QoS for all the network traffic.
Traffic policing functions (using the police feature) and shaping functions (using the traffic shaping feature) manage the traffic rate, but differ in how they treat traffic when tokens are exhausted. The concept of tokens comes from the token bucket scheme, a traffic metering function.

Note When running QoS tests on network traffic, you may see different results for the shaper and policing data. Network traffic data from shaping provides more accurate results.

This table compares the policing and shaping functions.
Table 81: Comparison Between Policing and Shaping Functions

Policing Function

Shaping Function

Sends conforming traffic up to the line rate and allows Smooths traffic and sends it out at a constant rate. bursts.

When tokens are exhausted, action is taken immediately.

When tokens are exhausted, it buffers packets and sends them out later, when tokens are available. A class with shaping has a queue associated with it which will be used to buffer the packets.

Policing has multiple units of configuration ­ in bits Shaping has only one unit of configuration - in bits per second, packets per second and cells per second. per second.

Policing has multiple possible actions associated with Shaping does not have the provision to mark packets an event, marking and dropping being example of that do not meet the profile. such actions.

Works for both input and output traffic.

Implemented for output traffic only.

Transmission Control Protocol (TCP) detects the line TCP can detect that it has a lower speed line and adapt at line speed but adapts to the configured rate when its retransmission timer accordingly. This results in a packet drop occurs by lowering its window size. less scope of retransmissions and is TCP-friendly.

Policing

The QoS policing feature is used to impose a maximum rate on a traffic class. The QoS policing feature can also be used with the priority feature to restrict priority traffic. If the rate is exceeded, then a specific action is taken as soon as the event occurs. The rate (committed information rate [CIR] and peak information rate [PIR] ) and the burst parameters (conformed burst size [ Bc ] and extended burst size [Be] ) are all configured in bytes per second.
The following policing forms or policers are supported for QoS:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 924

QoS Single-Rate Two-Color Policing
· Single-rate two-color policing · Dual-rate three-color policing
Note Single-rate three-color policing is not supported.
Single-Rate Two-Color Policing Single-rate two-color policer is the mode in which you configure only a CIR and a Bc. The Bc is an optional parameter, and if it is not specified it is computed by default. In this mode, when an incoming packet has enough tokens available, the packet is considered to be conforming. If at the time of packet arrival, enough tokens are not available within the bounds of Bc, the packet is considered to have exceeded the configured rate.
Note For information about the token-bucket algorithm, see Token-Bucket Algorithm, on page 921. Related Topics Configuring Police (CLI), on page 979 Examples: Single-Rate Two-Color Policing Configuration, on page 1007
Dual-Rate Three-Color Policing With the dual rate policer, the switch supports only color-blind mode. In this mode, you configure a committed information rate (CIR) and a peak information rate (PIR). As the name suggests, there are two token buckets in this case, one for the peak rate, and one for the conformed rate.
Note For information about the token-bucket algorithm, see Token-Bucket Algorithm, on page 921. In the color-blind mode, the incoming packet is first checked against the peak rate bucket. If there are not enough tokens available, the packet is said to violate the rate. If there are enough tokens available, then the tokens in the conformed rate buckets are checked to determine if there are enough tokens available. The tokens in the peak rate bucket are decremented by the size of the packet. If it does not have enough tokens available, the packet is said to have exceeded the configured rate. If there are enough tokens available, then the packet is said to conform, and the tokens in both the buckets are decremented by the size of the packet. The rate at which tokens are replenished depends on the packet arrival. Assume that a packet comes in at time T1 and the next one comes in at time T2. The time interval between T1 and T2 determines the number of tokens that need to be added to the token bucket. This is calculated as: Time interval between packets (T2-T1) * CIR)/8 bytes Related Topics Configuring Police (CLI), on page 979 Examples: Dual-Rate Three-Color Policing Configuration, on page 1008
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 925

QoS Shaping

Shaping

Shaping is the process of imposing a maximum rate of traffic, while regulating the traffic rate in such a way that the downstream switches and routers are not subjected to congestion. Shaping in the most common form is used to limit the traffic sent from a physical or logical interface.
Shaping has a buffer associated with it that ensures that packets which do not have enough tokens are buffered as opposed to being immediately dropped. The number of buffers available to the subset of traffic being shaped is limited and is computed based on a variety of factors. The number of buffers available can also be tuned using specific QoS commands. Packets are buffered as buffers are available, beyond which they are dropped.

Class-Based Traffic Shaping
The switch uses class-based traffic shaping. This shaping feature is enabled on a class in a policy that is associated to an interface. A class that has shaping configured is allocated a number of buffers to hold the packets that do not have tokens. The buffered packets are sent out from the class using FIFO. In the most common form of usage, class-based shaping is used to impose a maximum rate for an physical interface or logical interface as a whole. The following shaping forms are supported in a class:
· Average rate shaping
· Hierarchical shaping

Shaping is implemented using a token bucket. The values of CIR, Bc and Be determine the rate at which the packets are sent out and the rate at which the tokens are replenished.

Note For information about the token-bucket algorithm, see Token-Bucket Algorithm, on page 921.
Average Rate Shaping You use the shape average policy-map class command to configure average rate shaping. This command configures a maximum bandwidth for a particular class. The queue bandwidth is restricted to this value even though the port has more bandwidth available. The switch supports configuring shape average by either a percentage or by a target bit rate value. Related Topics Configuring Shaping (CLI), on page 989 Examples: Average Rate Shaping Configuration, on page 1004
Hierarchical Shaping Shaping can also be configured at multiple levels in a hierarchy. This is accomplished by creating a parent policy with shaping configured, and then attaching child policies with additional shaping configurations to the parent policy. There are two supported types of hierarchical shaping: · Port shaper
· User-configured shaping

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 926

QoS Queueing and Scheduling

The port shaper uses the class default and the only action permitted in the parent is shaping. The queueing action is in the child with the port shaper. With the user configured shaping, you cannot have queueing action in the child.
Related Topics Configuring Shaping (CLI), on page 989

Queueing and Scheduling
The switch uses both queueing and scheduling to help prevent traffic congestion. The switch supports the following queueing and scheduling features:
· Bandwidth · Weighted Tail Drop · Priority queues · Queue buffers

Bandwidth

The switch supports the following bandwidth configurations: · Bandwidth percent · Bandwidth remaining ratio

Related Topics Configuring Bandwidth (CLI), on page 977

Bandwidth Percent

You can use the bandwidth percent policy-map class command to allocate a minimum bandwidth to a particular class. The total sum cannot exceed 100 percent and in case the total sum is less than 100 percent, then the rest of the bandwidth is divided equally among all bandwidth queues.

Note A queue can oversubscribe bandwidth in case the other queues do not utilize the entire port bandwidth.
You cannot mix bandwidth types on a policy map. For example, you cannot configure bandwidth in a single policy map using both a bandwidth percent and in kilobits per second.
Bandwidth Remaining Ratio You use the bandwidth remaining ratio policy-map class command to create a ratio for sharing unused bandwidth in specified queues. Any unused bandwidth will be used by these specific queues in the ratio that is specified by the configuration. Use this command when the priority command is also used for certain queues in the policy. When you assign ratios, the queues will be assigned certain weights which are inline with these ratios.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 927

QoS Weighted Tail Drop
You can specify ratios using a range from 0 to 100. For example, you can configure a bandwidth remaining ration of 2 on one class, and another queue with a bandwidth remaining ratio of 4 on another class. The bandwidth remaining ratio of 4 will be scheduled twice as often as the bandwidth remaining ratio of 2. The total bandwidth ratio allocation for the policy can exceed 100. For example, you can configure a queue with a bandwidth remaining ratio of 50, and another queue with a bandwidth remaining ratio of 100.
Weighted Tail Drop
The switch egress queues use an enhanced version of the tail-drop congestion-avoidance mechanism called weighted tail drop (WTD). WTD is implemented on queues to manage the queue lengths and to provide drop precedences for different traffic classifications. As a frame is enqueued to a particular queue, WTD uses the frame's assigned QoS label to subject it to different thresholds. If the threshold is exceeded for that QoS label (the space available in the destination queue is less than the size of the frame), the switch drops the frame. Each queue has three configurable threshold values. The QoS label determines which of the three threshold values is subjected to the frame.
Figure 62: WTD and Queue Operation
The following figure shows an example of WTD operating on a queue whose size is 1000 frames. Three drop percentages are configured: 40 percent (400 frames), 60 percent (600 frames), and 100 percent (1000 frames). These percentages indicate that up to 400 frames can be queued at the 40-percent threshold, up to 600 frames at the 60-percent threshold, and up to 1000 frames at the 100-percent
threshold. In the example, CoS value 6 has a greater importance than the other CoS values, and is assigned to the 100-percent drop threshold (queue-full state). CoS values 4 is assigned to the 60-percent threshold, and CoS values 3 is assigned to the 40-percent threshold. All of these threshold values are assigned using the queue-limit cos command. Assuming the queue is already filled with 600 frames, and a new frame arrives. It contains CoS value 4 and is subjected to the 60-percent threshold. If this frame is added to the queue, the threshold will be exceeded, so the switch drops it. Related Topics
Configuring Queue Limits (CLI), on page 987 Examples: Queue-limit Configuration, on page 1004
Weighted Tail Drop Default Values The following are the Weighted Tail Drop (WTD) default values and the rules for configuring WTD threshold values. · If you configure less than three queue-limit percentages for WTD, then WTD default values are assigned to these thresholds.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 928

QoS Priority Queues

The following are the WTD threshold default values:
Table 82: WTD Threshold Default Values

Threshold 0 1 2

Default Value Percentage 80 90 400

· If 3 different WTD thresholds are configured, then the queues are programmed as configured. · If 2 WTD thresholds are configured, then the maximum value percentage will be 400. · If a WTD single threshold is configured as x, then the maximum value percentage will be 400.
· If the value of x is less than 90, then threshold1=90 and threshold 0= x. · If the value of x equals 90, then threshold1=90, threshold 0=80. · If the value x is greater than 90, then threshold1=x, threshold 0=80.

Priority Queues
Each port supports eight egress queues, of which two can be given a priority.
You use the priority level policy class-map command to configure the priority for two classes. One of the classes has to be configured with a priority queue level 1, and the other class has to be configured with a priority queue level 2. Packets on these two queues are subjected to less latency with respect to other queues.
Related Topics Configuring Priority (CLI), on page 982

Queue Buffer

Each 1-gigabit port on the switch is allocated 168 buffers for a wireless port and 300 buffers for a wired port. Each 10-gigabit port is allocated 1800 buffers. At boot time, when there is no policy map enabled on the wired port, there are two queues created by default. Wired ports can have a maximum of 8 queues configured using MQC-based policies. The following table shows which packets go into which one of the queues:
Table 83: DSCP, Precedence, and CoS - Queue Threshold Mapping Table

DSCP, Precedence or CoS Queue

Control Packets

0

Rest of Packets

1

Threshold 2 2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 929

QoS Queue Buffer Allocation
Note You can guarantee the availability of buffers, set drop thresholds, and configure the maximum memory allocation for a queue. You use the queue-buffers policy-map class command to configure the queue buffers. You use the queue-limit policy-map class command to configure the maximum thresholds.
There are two types of buffer allocations: hard buffers, which are explicitly reserved for the queue, and soft buffers, which are available for other ports when unused by a given port. For the wireless port default, Queue 0 will be given 40 percent of the buffers that are available for the interface as hard buffers, that is 67 buffers are allocated for Queue 0 in the context of 1-gigabit ports. The soft maximum for this queue is set to 268 (calculated as 67 * 400/100) for 1-gigabit ports, where 400 is the default maximum threshold that is configured for any queue. For the wired port default, Queue 0 will be given 40 percent of the buffers that are available for the interface as hard buffers, that is 120 buffers are allocated for Queue 0 in the context of 1-gigabit ports, and 720 buffers in the context of 10-gigabit ports. The soft maximum for this queue is set to 480 (calculated as 120 * 400/100) for 1-gigabit ports and 2880 for 10-gigabit ports, where 400 is the default maximum threshold that is configured for any queue. Queue 1 does not have any hard buffers allocated. The default soft buffer limit is set to 400 (which is the maximum threshold). The threshold would determine the maximum number of soft buffers that can be borrowed from the common pool.
Queue Buffer Allocation The buffer allocation to any queue can be tuned using the queue-buffers ratio policy-map class configuration command. Related Topics Configuring Queue Buffers (CLI), on page 984 Examples: Queue Buffers Configuration, on page 1005
Dynamic Threshold and Scaling Traditionally, reserved buffers are statically allocated for each queue. No matter whether the queue is active or not, its buffers are held up by the queue. In addition, as the number of queues increases, the portion of the reserved buffers allocated for each queue can become smaller and smaller. Eventually, a situation may occur where there are not enough reserved buffers to support a jumbo frame for all queues. The switch supports Dynamic Thresholding and Scaling (DTS), which is a feature that provides a fair and efficient allocation of buffer resources. When congestion occurs, this DTS mechanism provides an elastic buffer allocation for the incoming data based on the occupancy of the global/port resources. Conceptually, DTS scales down the queue buffer allocation gradually as the resources are used up to leave room for other queues, and vice versa. This flexible method allows the buffers to be more efficiently and fairly utilized. As mentioned in the previous sections, there are two limits configured on a queue--a hard limit and a soft limit. Hard limits are not part of DTS. These buffers are available only for that queue. The sum of the hard limits should be less than the globally set up hard maximum limit. The global hard limit configured for egress queuing is currently set to 5705. In the default scenario when there are no MQC policies configured, the 24 1-gigabit ports would take up 24 * 67 = 1608, and the 4 10-gigabit ports would take up 4 * 720 = 2880, for a total of 4488 buffers, allowing room for more hard buffers to be allocated based upon the configuration.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 930

QoS Queuing in Wireless
Soft limit buffers participate in the DTS process. Additionally, some of the soft buffer allocations can exceed the global soft limit allocation. The global soft limit allocation for egress queuing is currently set to 7607. The sum of the hard and soft limits add up to 13312, which in turn translates to 3.4 MB. Because the sum of the soft buffer allocations can exceed the global limit, it allows a specific queue to use a large number of buffers when the system is lightly loaded. The DTS process dynamically adjusts the per-queue allocation as the system becomes more heavily loaded.
Queuing in Wireless
Queuing in the wireless component is performed based on the port policy and is applicable only in the downstream direction. The wireless module supports the following four queues:
· Voice--This is a strict priority queue. Represented by Q0, this queue processes control traffic and multicast or unicast voice traffic. All control traffic (such as CAPWAP packets) is processed through the voice queue. The QoS module uses a different threshold within the voice queue to process control and voice packets to ensure that control packets get higher priority over other non-control packets.
· Video--This is a strict priority queue. Represented by Q1, this queue processes multicast or unicast video traffic.
· Data NRT--Represented by Q2, this queue processes all non-real-time unicast traffic. · Multicast NRT--Represented by Q3, this queue processes Multicast NRT traffic. Any traffic that does
not match the traffic in Q0, Q1, or Q2 is processed through Q3.
Note By default, the queues Q0 and Q1 are not enabled.
Note A weighted round-robin policy is applied for traffic in the queues Q2 and Q3. For upstream direction only one queue is available. Port and radio policies are applicable only in the downstream direction.
Note The wired ports support eight queues.
Trust Behavior
Trust Behavior for Wired and Wireless Ports
For wired or wireless ports that are connected to the switch (end points such as IP phones, laptops, cameras, telepresence units, or other devices), their DSCP, precedence, or CoS values coming in from these end points are trusted by the switch and therefore are retained in the absence of any explicit policy configuration. This trust behavior is applicable to both upstream and downstream QoS. The packets are enqueued to the appropriate queue per the default initial configuration. No priority queuing at the switch is done by default. This is true for unicast and multicast packets.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 931

QoS Port Security on a Trusted Boundary for Cisco IP Phones

In scenarios where the incoming packet type differs from the outgoing packet type, the trust behavior and the queuing behavior are explained in the following table. Note that the default trust mode for a port is DSCP based. The trust mode `falls back' to CoS if the incoming packet is a pure Layer 2 packet. You can also change the trust setting from DSCP to CoS. This setting change is accomplished by using an MQC policy that has a class default with a 'set cos cos table default default-cos' action, where default-cos is the name of the table map created (which only performs a default copy).
Table 84: Trust and Queueing Behavior

Incoming Packet Layer 3 Layer 2 Tagged
Layer 3

Outgoing Packet Layer 3 Layer 2 Tagged
Tagged

Trust Behavior

Queuing Behavior

Preserve DSCP/Precedence Based on DSCP

Not applicable

Based on CoS

Preserve DSCP and CoS

Based on DSCP (trust DSCP takes precedence)

Preserve DSCP, CoS is set to Based on DSCP 0

The Cisco IOS XE 3.2 Release supported different trust defaults for wired and wireless ports. The trust default for wired ports was the same as for this software release. For wireless ports, the default system behavior was non-trust, which meant that when the switch came up, all markings for the wireless ports were defaulted to zero and no traffic received priority treatment. For compatibility with an existing wired switch, all traffic went to the best-effort queue by default. The access point performed priority queuing by default. In the downstream direction, the access point maintained voice, video, best-effort, and background queues for queuing. The access selected the queuing strategy based on the 11e tag information. By default, the access point treated all wireless packets as best effort.
The default trust behavior in the case of wireless ports could be changed by using the qos wireless default untrust command.

Note If you upgrade from Cisco IOS XE 3.2 SE Release to a later release, the default behavior of the wireless traffic is still untrusted. In this situation, you can use the no qos wireless-default untrust command to enable trust behavior for wireless traffic. However, if you install Cisco IOS XE 3.3 SE or a later release on the switch, the default QoS behavior for wireless traffic is trust. Starting with Cisco IOS XE 3.3 SE Release and later, the packet markings are preserved in both egress and ingress directions for new installations (not upgrades) for wireless traffic.
Related Topics Configuring Trust Behavior for Wireless Traffic (CLI), on page 970 Example: Table Map Configuration to Retain CoS Markings, on page 1009
Port Security on a Trusted Boundary for Cisco IP Phones
In a typical network, you connect a Cisco IP Phone to a switch port and cascade devices that generate data packets from the back of the telephone. The Cisco IP Phone guarantees the voice quality through a shared data link by marking the CoS level of the voice packets as high priority (CoS = 5) and by marking the data packets as low priority (CoS = 0). Traffic sent from the telephone to the switch is typically marked with a tag

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 932

QoS Wireless QoS Mobility
that uses the 802.1Q header. The header contains the VLAN information and the class of service (CoS) 3-bit field, which is the priority of the packet. For most Cisco IP Phone configurations, the traffic sent from the telephone to the switch should be trusted to ensure that voice traffic is properly prioritized over other types of traffic in the network. By using the trust device interface configuration command, you configure the switch port to which the telephone is connected to trust the traffic received on that port.
Note The trust device device_type command available in interface configuration mode is a stand-alone command on the switch. When using this command in an AutoQoS configuration, if the connected peer device is not a corresponding device (defined as a device matching your trust policy), both CoS and DSCP values are set to "0" and any input policy will not take effect. If the connected peer device is a corresponding device, input policy will take effect.
With the trusted setting, you also can use the trusted boundary feature to prevent misuse of a high-priority queue if a user bypasses the telephone and connects the PC directly to the switch. Without trusted boundary, the CoS labels generated by the PC are trusted by the switch (because of the trusted CoS setting). By contrast, trusted boundary uses CDP to detect the presence of a Cisco IP Phone (such as the Cisco IP Phone 7910, 7935, 7940, and 7960) on a switch port. If the telephone is not detected, the trusted boundary feature disables the trusted setting on the switch port and prevents misuse of a high-priority queue. Note that the trusted boundary feature is not effective if the PC and Cisco IP Phone are connected to a hub that is connected to the switch.
Wireless QoS Mobility
Wireless QoS mobility enables you to configure QoS policies so that the network provides the same service anywhere in the network. A wireless client can roam from one location to another and as a result the client can get associated to different access points associated with a different switch. Wireless client roaming can be classified into two types:
· Intra-switch roaming · Inter-switch roaming
Note The client policies must be available on all of the switches in the mobility group. The same SSID and port policy must be applied to all switches in the mobility group so that the clients get consistent treatment.
Inter-Switch Roaming
When a client roams from one location to another, the client can get associated to access points either associated to the same switch (anchor switch) or a different switch (foreign switch). Inter-switch roaming refers to the scenario where the client gets associated to an access point that is not associated to the same device before the client roamed. The host device is now foreign to the device to which the client was initially anchored. In the case of inter-switch roaming, the client QoS policy is always executed on the foreign controller. When a client roams from anchor switch to foreign switch, the QoS policy is uninstalled on the anchor switch and installed on the foreign switch. In the mobility handoff message, the anchor device passes the name of the
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 933

QoS Intra-Switch Roaming
policy to the foreign switch. The foreign switch should have a policy with the same name configured for the QoS policy to be applied correctly. In the case of inter-switch roaming, all of the QoS policies are moved from the anchor device to the foreign device. While the QoS policies are in transition from the anchor device to the foreign device, the traffic on the foreign device is provided the default treatment. This is comparable to a new policy installation on the client target.
Note If the foreign device is not configured with the user-defined physical port policy, the default port policy is applicable to all traffic is routed through the NRT queue, except the control traffic which goes through RT1 queue. The network administrator must configure the same physical port policy on both the anchor and foreign devices symmetrically.
Intra-Switch Roaming
With intra-switch roaming, the client gets associated to an access point that is associated to the same switch before the client roamed, but this association to the device occurs through a different access point.
Note QoS policies remain intact in the case of intra-switch roaming.
Precious Metal Policies for Wireless QoS
Wireless QoS is backward compatible with the precious metal policies offered by the unified wireless controller platforms. The precious metal policies are system-defined policies that are available on the controller. The following policies are available:
· Platinum--Used for VoIP clients. · Gold--Used for video clients. · Silver-- Used for traffic that can be considered best-effort. · Bronze--Used for NRT traffic. These policies (also known as profiles) can be applied to a WLAN based on the traffic. We recommend the configuration using the Cisco IOS MQC configuration. The policies are available in the system based on the precious metal policy required. Based on the policies applied, the 802.1p, 802.11e (WMM), and DSCP fields in the packets are affected. These values are preconfigured and installed when the switch is booted.
Note Unlike the precious metal policies that were applicable in the Cisco Unified Wireless controllers, the attributes rt-average-rate, nrt-average-rate, and peak rates are not applicable for the precious metal policies configured on this switch platform.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 934

QoS Standard QoS Default Settings

Related Topics Configuring Precious Metal Policies (CLI), on page 991

Standard QoS Default Settings

Default Wired QoS Configuration
There are two queues configured by default on each wired interface on the switch. All control traffic traverses and is processed through queue 0. All other traffic traverses and is processed through queue 1.

DSCP Maps

Default CoS-to-DSCP Map You use the CoS-to-DSCP map to map CoS values in incoming packets to a DSCP value that QoS uses internally to represent the priority of the traffic. The following table shows the default CoS-to-DSCP map. If these values are not appropriate for your network, you need to modify them.
Table 85: Default CoS-to-DSCP Map

CoS Value 0 1 2 3 4 5 6 7

DSCP Value 0 8 16 24 32 40 48 56

Default IP-Precedence-to-DSCP Map You use the IP-precedence-to-DSCP map to map IP precedence values in incoming packets to a DSCP value that QoS uses internally to represent the priority of the traffic. The following table shows the default IP-precedence-to-DSCP map. If these values are not appropriate for your network, you need to modify them.
Table 86: Default IP-Precedence-to-DSCP Map

IP Precedence Value 0 1 2 3

DSCP Value 0 8 16 24

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 935

QoS Default DSCP-to-CoS Map

IP Precedence Value 4 5 6 7

DSCP Value 32 40 48 56

Default DSCP-to-CoS Map You use the DSCP-to-CoS map to generate a CoS value, which is used to select one of the four egress queues. The following table shows the default DSCP-to-CoS map. If these values are not appropriate for your network, you need to modify them.
Table 87: Default DSCP-to-CoS Map

DSCP Value 0­7 8­15 16­23 24­31 32­39 40­47 48­55 56­63

CoS Value 0 1 2 3 4 5 6 7

Default Wireless QoS Configuration
The ports on the switch do not distinguish between wired or wireless physical ports. Depending on the kind of device associated to the switch, the policies are applied. For example, when an access point is connected to a switch port, the switch detects it as a wireless device and applies the default hierarchical policy which is in the format of a parent-child policy. This policy is an hierarchical policy. The parent policy cannot be modified but the child policy (port-child policy) can be modified to suite the QoS configuration. The switch is preconfigured with a default class map and a policy map.

Restrictions for QoS on Wired Targets
A target is an entity where a policy is applied. You can apply a policy to either a wired or wireless target. A wired target can be either a port or VLAN. A wireless target can be either a port, radio, SSID, or client. Only port, SSID, and client policies are user configurable. Radio polices are not user configurable. Wireless QoS policies for port, radio, SSID, and client are applied in the downstream direction, and for upstream only SSID

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 936

QoS Restrictions for QoS on Wired Targets
and client targets are supported. Downstream indicates that traffic is flowing from the switch to the wireless client. Upstream indicates that traffic is flowing from wireless client to the switch. The following are restrictions for applying QoS features on the switch for the wired target:
· A maximum of 8 queuing classes are supported on the switch port for the wired target. · A maximum of 63 policers are supported per policy on the wired port for the wired target. · No more than two levels are supported in a QoS hierarchy. · In a hierarchical policy, overlapping actions between parent and child are not allowed, except when a
policy has the port shaper in the parent and queueing features in the child policy. · A QoS policy cannot be attached to any EtherChannel interface. · Policing in both the parent and child is not supported in a QoS hierarchy. · Marking in both the parent and child is not supported in a QoS hierarchy. · A mixture of queue limit and queue buffer in the same policy is not supported.
Note The queue-limit percent is not supported on the switch because the queue-buffer command handles this functionality. Queue limit is only supported with the DSCP and CoS extensions.
· With shaping, there is an IPG overhead of 20Bytes for every packet that is accounted internally in the hardware. Shaping accuracy will be effected by this, specially for packets of small size.
· The classification sequence for all wired queuing-based policies should be the same across all wired upstream ports (10-Gigabit Ethernet), and the same for all downstream wired ports (1-Gigabit Ethernet).
· Empty classes are not supported. · Class-maps with empty actions are not supported. If there are two policies with the same order of
class-maps and if there are class-maps with no action in one of the policies, there may be traffic drops. As a workaround, allocate minimal bandwidth for all the classes in PRIORITY_QUEUE. · A maximum of 256 classes are supported per policy on the wired port for the wired target. · The actions under a policer within a policy map have the following restrictions:
· The conform action must be transmit. · The exceed/violate action for markdown type can only be cos2cos, prec2prec, dscp2dscp. · The markdown types must be the same within a policy.
· A port-level input marking policy takes precedence over an SVI policy; however, if no port policy is configured, the SVI policy takes precedence. For a port policy to take precedence, define a port-level policy; so that the SVI policy is overwritten.
· Classification counters have the following specific restrictions: · Classification counters count packets instead of bytes. · Filter-based classification counters are not supported
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 937

QoS Restrictions for QoS on Wired Targets
· Only QoS configurations with marking or policing trigger the classification counter. · The classification counter is not port based. This means that the classification counter aggregates
all packets belonging to the same class of the same policy which attach to different interfaces. · As long as there is policing or marking action in the policy, the class-default will have classification
counters. · When there are multiple match statements in a class, then the classification counter only shows the
traffic counter for one of the match statements. · Table maps have the following specific restrictions:
· Only one table map for policing exceeding the markdown and one table map for policing violating the markdown per direction per target is supported.
· Table maps must be configured under the class-default; table maps are unsupported for a user-defined class.
· Hierarchical policies are required for the following: · Port-shapers · Aggregate policers · PV policy · Parent shaping and child marking/policing
· For ports with wired targets, these are the only supported hierarchical policies: · Police chaining in the same policy is unsupported, except for wireless client. · Hierarchical queueing is unsupported in the same policy (port shaper is the exception). · In a parent class, all filters must have the same type. The child filter type must match the parent filter type with the following exceptions: · If the parent class is configured to match IP, then the child class can be configured to match the ACL. · If the parent class is configured to match CoS, then the child class can be configured to match the ACL.
· The trust device device_type command available in interface configuration mode is a stand-alone command on the switch. When using this command in an AutoQoS configuration, if the connected peer device is not a corresponding device (defined as a device matching your trust policy), both CoS and DSCP values are set to "0" and any input policy will not take effect. If the connected peer device is a corresponding device, input policy will take effect.
The following are restrictions for applying QoS features on the VLAN to the wired target: · For a flat or nonhierarchical policy, only marking or a table map is supported.
The following are restrictions and considerations for applying QoS features on EtherChannel and channel member interfaces:
· QoS is not supported on an EtherChannel interface.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 938

QoS Restrictions for QoS on Wireless Targets
· QoS is supported on EtherChannel member interfaces in both ingress and egression directions. All EtherChannel members must have the same QoS policy applied. If the QoS policy is not the same, each individual policy on the different link acts independently.
· On attaching a service policy to channel members, the following warning message appears to remind the user to make sure the same policy is attached to all ports in the EtherChannel: ' Warning: add service policy will cause inconsistency with port xxx in ether channel xxx. '.
· Auto QoS is not supported on EtherChannel members.
Note On attaching a service policy to an EtherChannel, the following message appears on the console: ' Warning: add service policy will cause inconsistency with port xxx in ether channel xxx. '. This warning message should be expected. This warning message is a reminder to attach the same policy to other ports in the same EtherChannel. The same message will be seen during boot up. This message does not mean there is a discrepancy between the EtherChannel member ports.
Related Topics Restrictions for QoS on Wireless Targets, on page 939 Prerequisites for QoS, on page 901 QoS Overview, on page 903 QoS Implementation, on page 912
Restrictions for QoS on Wireless Targets
General Restrictions A target is an entity where a policy is applied. You can apply a policy to either a wired or wireless target. A wired target can be either a port or VLAN. A wireless target can be either a port, radio, SSID, or client. Only port, SSID, and client policies are user configurable. Radio polices are not user configurable. Wireless QoS policies for port, radio, SSID, and client are applied in the downstream direction, and for upstream only SSID and client targets are supported. Downstream indicates that traffic is flowing from the switch to the wireless client. Upstream indicates that traffic is flowing from wireless client to the switch.
· Only port, SSID, and client (using AAA and Cisco IOS command-line interface) policies are user-configurable. Radio policies are set by the wireless control module and are not user-configurable.
· Port and radio policies are applicable only in the downstream direction. · SSID and client support non-queuing policies in the upstream direction.
SSID and client targets can be configured with marking and policing policies. · One policy per target per direction is supported.
Wireless QoS Restrictions on Ports The following are restrictions for applying QoS features on a wireless port target:
· All wireless ports have similar parent policy with one class-default and one action shape under class-default. Shape rates are dependent on the 802.11a/b/g/ac bands.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 939

QoS Restrictions for QoS on Wireless Targets
· You can create a maximum of four classes in a child policy by modifying the port_chlid_policy. · If there are four classes in the port_child_policy at the port level, one must be a non-client-nrt class
and one must be class-default. · No two classes can have the same priority level. Only priority level 1 (for voice traffic and control traffic)
and 2 (for video) are supported. · Priority is not supported in the multicast NRT class (non-client-nrt class) and class-default. · If four classes are configured, two of them have to be priority classes. If only three classes are configured,
at least one of them should be a priority class. If three classes are configured and there is no non-client-nrt class, both priority levels must be present. · Only match DSCP is supported. · The port policy applied by the wireless control module cannot be removed using the CLI. · Both priority rate and police CIR (using MQC) in the same class is unsupported. · Queue limit (which is used to configure Weighted Tail Drop) is unsupported.
Wireless QoS Restrictions on SSID The following are restrictions for applying QoS features on SSID:
· One table map is supported at the ingress policy. · Table maps are supported for the parent class-default only. Up to two table maps are supported in the
egress direction and three table-maps can be configured when a QoS group is involved.
Note Table-maps are not supported at the client targets.
· If a wireless port has a default policy with only two queues (one for multicast-NRT, one for class-default), the policy at SSID level cannot have voice and video class in the egress direction.
· Policing without priority is not supported in the egress direction. · Priority configuration at the SSID level is used only to configure the RT1 and RT2 policers (AFD for
policer). Priority configuration does not include the shape rate. Therefore, priority is restricted for SSID policies without police. · The mapping in the DSCP2DSCP and COS2COS table should be based on the classification function for the voice and video classes in the port level policy. · No action is allowed under the class-default of a child policy. · For a flat policy (non hierarchical), in the ingress direction, the policy configuration must be a set (table map) or policing or both.
Wireless QoS Restrictions on Clients The following are restrictions for applying QoS policies on client targets:
· Queuing is not supported.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 940

QoS Restrictions for QoS on Wireless Targets
· Attaching, removing, or modifying client policies on a WLAN in the enabled state is not supported. You must shut down the WLAN to apply, remove, or modify a policy.
· Table-map configuration is not supported for client targets. · Policing and set configured together in class-default is blocked in both the upstream and downstream
direction:
policy-map foo class class-default police X set dscp Y
· Child policy is not supported under class-default if the parent policy contains other user-defined class maps in it.
· Hierarchical client polies are only supported in the egress direction. · For flat egress client policy, policing in class-default and marking action in other classes are not supported. · Restrictions for ACLs:
· All the filters in classes in a policy map for client policy must have the same attributes. Filters matching on protocol-specific attributes such as IPv4 or IPv6 addresses are considered as different attribute sets.
· For filters matching on ACLs, all ACEs (Access Control Entry) in the access list should have the same type and number of attributes. For example, the following is an invalid access list as they match on different attributes:
policy map foo class acl-101 (match on 3 tuple) police X class acl-102 (match on 5 tuple) police Y
· For filters matching on marking attributes, all filters in the policy-map must match on the same marking attribute. For example, If filter matches on DSCP, then all filters in the policy must match on DSCP.
· ACL matching on port ranges and subnet are only supported in ingress direction.
· If an ingress SSID policy is configured along with an ingress client policy matching ACLs with port ranges, the SSID policy takes precedence over the client policy. As a result, the client policy will not take effect.
Related Topics Applying a QoS Policy on a WLAN (GUI), on page 993 Port Policies, on page 907 Port Policy Format, on page 907 Radio Policies, on page 909 Restrictions for QoS on Wired Targets, on page 936 Prerequisites for QoS, on page 901 QoS Overview, on page 903 QoS Implementation, on page 912
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 941

QoS How to Configure QoS

How to Configure QoS

Configuring Class, Policy, and Table Maps

Creating a Traffic Class (CLI)
To create a traffic class containing match criteria, use the class-map command to specify the traffic class name, and then use the following match commands in class-map configuration mode, as needed.

Before you begin
All match commands specified in this configuration task are considered optional, but you must configure at least one match criterion for a class.

SUMMARY STEPS

1. configure terminal 2. class-map {class-map name | match-any} 3. match access-group {index number | name} 4. match class-map class-map name 5. match cos cos value 6. match dscp dscp value 7. match ip {dscp dscp value | precedence precedence value } 8. match non-client-nrt 9. match qos-group qos group value 10. match vlan vlan value 11. match wlan user-priority wlan value 12. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

class-map {class-map name | match-any} Example:
Switch(config)# class-map test_1000 Switch(config-cmap)#

Enters class map configuration mode.
· Creates a class map to be used for matching packets to the class whose name you specify.
· If you specify match-any, one of the match criteria must be met for traffic entering the traffic class to be classified as part of the traffic class. This is the default.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 942

QoS Creating a Traffic Class (CLI)

Step 3
Step 4 Step 5 Step 6 Step 7

Command or Action match access-group {index number | name} Example:
Switch(config-cmap)# match access-group 100 Switch(config-cmap)#

Purpose The following parameters are available for this command:
· access-group · class-map · cos · dscp · ip · non-client-nrt · precedence · qos-group · vlan · wlan user priority
(Optional) For this example, enter the access-group ID: · Access list index (value from 1 to 2799) · Named access list

match class-map class-map name Example:

(Optional) Matches to another class-map name.

Switch(config-cmap)# match class-map test_2000 Switch(config-cmap)#

match cos cos value Example:
Switch(config-cmap)# match cos 2 3 4 5 Switch(config-cmap)#

(Optional) Matches IEEE 802.1Q or ISL class of service (user) priority values.
· Enters up to 4 CoS values separated by spaces (0 to 7).

match dscp dscp value Example:
Switch(config-cmap)# match dscp af11 af12 Switch(config-cmap)#

(Optional) Matches the DSCP values in IPv4 and IPv6 packets.

match ip {dscp dscp value | precedence precedence value } Example:
Switch(config-cmap)# match ip dscp af11 af12

(Optional) Matches IP values including the following: · dscp--Matches IP DSCP (DiffServ codepoints). · precedence--Matches IP precedence (0 to 7).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 943

QoS Creating a Traffic Policy (CLI)

Step 8 Step 9 Step 10 Step 11

Command or Action
Switch(config-cmap)#

Purpose

match non-client-nrt Example:
Switch(config-cmap)# match non-client-nrt Switch(config-cmap)#

(Optional) Matches non-client NRT (Non-Real-Time).
Note This match is applicable only for policies on a wireless port. It carries all the multi-destination and AP (non-client) bound traffic.

match qos-group qos group value Example:
Switch(config-cmap)# match qos-group 10 Switch(config-cmap)#

(Optional) Matches QoS group value (from 0 to 31).

match vlan vlan value Example:
Switch(config-cmap)# match vlan 210 Switch(config-cmap)#

(Optional) Matches a VLAN ID (from 1 to 4095).

match wlan user-priority wlan value Example:

(Optional) Matches 802.11e specific values. Enter the user priority 802.11e user priority (0 to 7).

Switch(config-cmap)# match wlan user priority 7 Switch(config-cmap)#

Step 12

end Example:
Switch(config-cmap)# end

Saves the configuration changes.

What to do next Configure the policy map. Related Topics
Class Maps, on page 918 Examples: Classification by Access Control Lists, on page 996
Creating a Traffic Policy (CLI)
To create a traffic policy, use the policy-map global configuration command to specify the traffic policy name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 944

QoS Creating a Traffic Policy (CLI)

The traffic class is associated with the traffic policy when the class command is used. The class command must be entered after you enter the policy map configuration mode. After entering the class command, the switch is automatically in policy map class configuration mode, which is where the QoS policies for the traffic policy are defined. The following policy map class-actions are supported:
· admit--Admits the request for Call Admission Control (CAC). · bandwidth--Bandwidth configuration options. · exit--Exits from the QoS class action configuration mode. · no--Negates or sets default values for the command. · police--Policer configuration options. · priority--Strict scheduling priority configuration options for this class. · queue-buffers--Queue buffer configuration options. · queue-limit--Queue maximum threshold for Weighted Tail Drop (WTD) configuration options. · service-policy--Configures the QoS service policy. · set--Sets QoS values using the following options:
· CoS values · DSCP values · Precedence values · QoS group values · WLAN values
· shape--Traffic-shaping configuration options.

Before you begin You should have first created a class map.

SUMMARY STEPS

1. configure terminal 2. policy-map policy-map name 3. class {class-name | class-default} 4. admit 5. bandwidth {kb/s kb/s value | percent percentage | remaining {percent | ratio}} 6. exit 7. no 8. police {target_bit_rate | cir | rate} 9. priority {kb/s | level level value | percent percentage value} 10. queue-buffers ratio ratio limit 11. queue-limit {packets | cos | dscp | percent}

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 945

QoS Creating a Traffic Policy (CLI)

12. service-policy policy-map name 13. set {cos | dscp | ip | precedence | qos-group | wlan} 14. shape average {target _bit_rate | percent} 15. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

policy-map policy-map name Example:
Switch(config)# policy-map test_2000 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Step 3

class {class-name | class-default} Example:
Switch(config-pmap)# class test_1000 Switch(config-pmap-c)#

Specifies the name of the class whose policy you want to create or change.
You can also create a system default class for unclassified packets.

Step 4 Step 5
Step 6

admit Example:
Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-c)#

(Optional) Admits the request for Call Admission Control (CAC). For a more detailed example of this command and its usage, see Configuring Call Admission Control (CLI), on page 970.
Note This command only configures CAC for wireless QoS.

bandwidth {kb/s kb/s value | percent percentage | remaining {percent | ratio}} Example:
Switch(config-pmap-c)# bandwidth 50 Switch(config-pmap-c)#

(Optional) Sets the bandwidth using one of the following:
· kb/s--Kilobits per second, enter a value between 20000 and 10000000 for Kb/s.
· percent--Enter the percentage of the total bandwidth to be used for this policy map.
· remaining--Enter the percentage ratio of the remaining bandwidth.

exit Example:

For a more detailed example of this command and its usage, see Configuring Bandwidth (CLI), on page 977.
(Optional) Exits from QoS class action configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 946

QoS Creating a Traffic Policy (CLI)

Step 7 Step 8
Step 9
Step 10 Step 11

Command or Action
Switch(config-pmap-c)# exit Switch(config-pmap-c)#

Purpose

no Example:
Switch(config-pmap-c)# no Switch(config-pmap-c)#

(Optional) Negates the command.

police {target_bit_rate | cir | rate} Example:
Switch(config-pmap-c)# police 100000 Switch(config-pmap-c)#

(Optional) Configures the policer:
· target_bit_rate--Enter the bit rate per second, enter a value between 8000 and 10000000000.
· cir--Committed Information Rate
· rate--Specify police rate, PCR for hierarchical policies or SCR for single-level ATM 4.0 policer policies.

For a more detailed example of this command and its usage, see Configuring Police (CLI), on page 979.

priority {kb/s | level level value | percent percentage (Optional) Sets the strict scheduling priority for this class.

value}

Command options include:

Example:
Switch(config-pmap-c)# priority percent 50 Switch(config-pmap-c)#

· kb/s--Kilobits per second, enter a value between 1 and 2000000.
· level--Establishes a multi-level priority queue. Enter a value (1 or 2).

· percent--Enter a percent of the total bandwidth for this priority.

queue-buffers ratio ratio limit Example:
Switch(config-pmap-c)# queue-buffers ratio 10 Switch(config-pmap-c)#

For a more detailed example of this command and its usage, see Configuring Priority (CLI), on page 982.
(Optional) Configures the queue buffer for the class. Enter the queue buffers ratio limit (0 to 100).
For a more detailed example of this command and its usage, see Configuring Queue Buffers (CLI), on page 984.

queue-limit {packets | cos | dscp | percent}

(Optional) Specifies the queue maximum threshold for the

Example:

tail drop:

· packets--Packets by default, enter a value between

Switch(config-pmap-c)# queue-limit cos 7 percent

1 to 2000000.

50
· cos--Enter the parameters for each COS value.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 947

QoS Creating a Traffic Policy (CLI)

Step 12 Step 13
Step 14 Step 15

Command or Action
Switch(config-pmap-c)#
service-policy policy-map name Example:

Purpose · dscp--Enter the parameters for each DSCP value. · percent--Enter the percentage for the threshold.
For a more detailed example of this command and its usage, see Configuring Queue Limits (CLI), on page 987.
(Optional) Configures the QoS service policy.

Switch(config-pmap-c)# service-policy test_2000 Switch(config-pmap-c)#

set {cos | dscp | ip | precedence | qos-group | wlan} Example:
Switch(config-pmap-c)# set cos 7 Switch(config-pmap-c)#

(Optional) Sets the QoS values. Possible QoS configuration values include:
· cos--Sets the IEEE 802.1Q/ISL class of service/user priority.
· dscp--Sets DSCP in IP(v4) and IPv6 packets.
· ip--Sets IP specific values.
· precedence--Sets precedence in IP(v4) and IPv6 packet.
· qos-group--Sets the QoS Group.
· wlan--Sets the WLAN user-priority.

shape average {target _bit_rate | percent} Example:
Switch(config-pmap-c) #shape average percent 50 Switch(config-pmap-c) #

(Optional) Sets the traffic shaping. Command parameters include:
· target_bit_rate--Target bit rate.
· percent--Percentage of interface bandwidth for Committed Information Rate.

end Example:

For a more detailed example of this command and its usage, see Configuring Shaping (CLI), on page 989.
Saves the configuration changes.

Switch(config-pmap-c) #end Switch(config-pmap-c) #

What to do next Configure the interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 948

QoS Configuring Client Policies (GUI)

Related Topics Policy Maps, on page 919
Configuring Client Policies (GUI)

Step 1 Step 2 Step 3 Step 4 Step 5
Step 6 Step 7 Step 8
Step 9

Choose Configuration > Wireless. Expand the QoS node by clicking on the left pane and choose QOS-Policy. The QOS-Policy page is displayed.
Click Add New to create a new QoS Policy. The Create QoS Policy page is displayed.
Select Client from the Policy Type drop-down menu. Select the direction into which the policy needs to be applied from the Policy Direction drop-down menu. The available options are:
· Ingress · Egress
Specify a policy name in the Policy Name text box. Provide a description to the policy in the Description text box. (Optional) Configure the default voice or video configuration parameters by checking the Enable Voice or Enable Video checkbox. The following options are available:
· Trust--Specify the classification type behavior on this policy. The options available are: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · User Priority--This option is available when the Policy Direction is ingress. Enter the 802.11e user priority. The range is from 0 to 7. · COS--This option is available when the Policy Direction is egress. Matches IEEE 802.1Q class of service. The range is from 0 to 7.
· Mark--Specify the marking label for each packet. The following options are available: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · CoS--Matches IEEE 802.1Q class of service. The range is from 0 to 7. · User Priority--Enter the 802.11e user priority. The range is from 0 to 7.
· Police(kbps)--Specify the policing rate in kbps. Note The marking and policing options are optional.
Specify the Class-default parameters. The following options are available:
· Mark--Specify the marking label for each packet. The following options are available: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 949

QoS Configuring Class-Based Packet Marking (CLI)

Step 10 Step 11

· CoS--Matches IEEE 802.1Q class of service. The range is from 0 to 7. · User Priority--Enter the 802.11e user priority. The range is from 0 to 7.
· Police (kbps)--This option is available when the Policy Direction is egress. This option Specify the policing rate in kbps.
(Optional) To configure user defined classes, check the User Defined Classes checkbox. The following options are available:
· Trust--Specify the classification type behavior on this policy. · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · User Priority--This option is available when the Policy Direction is ingress. Enter the 802.11e user priority. The range is from 0 to 7. · COS--This option is available when the Policy Direction is egress. Matches IEEE 802.1Q class of service. The range is from 0 to 7.
· Mark--Specify the marking label for each packet. The following options are available: · DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · CoS--Matches IEEE 802.1Q class of service. The range is from 0 to 7. · User Priority--Enter the 802.11e user priority. The range is from 0 to 7.
· Police (kbps)--This option is available when the Policy Direction is egress. This option Specify the policing rate in kbps.
Click Add to add the policy.

Related Topics Client Policies, on page 910 Supported QoS Features on Wireless Targets, on page 906 Examples: Client Policies, on page 1002
Configuring Class-Based Packet Marking (CLI)
This procedure explains how to configure the following class-based packet marking features on your switch: · CoS value · DSCP value · IP value · Precedence value · QoS group value · WLAN value

Before you begin You should have created a class map and a policy map before beginning this procedure.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 950

QoS Configuring Class-Based Packet Marking (CLI)

SUMMARY STEPS

1. configure terminal 2. policy-map policy name 3. class class name 4. set cos {cos value | cos table table-map name | dscp table table-map name | precedence table table-map
name | qos-group table table-map name | wlan user-priority table table-map name} 5. set dscp {dscp value | default | dscp table table-map name | ef | precedence table table-map name |
qos-group table table-map name | wlan user-priority table table-map name} 6. set ip {dscp | precedence} 7. set precedence {precedence value | cos table table-map name | dscp table table-map name | precedence
table table-map name | qos-group table table-map name} 8. set qos-group {qos-group value | dscp table table-map name | precedence table table-map name} 9. set wlan user-priority {wlan user-priority value | cos table table-map name | dscp table table-map
name | qos-group table table-map name | wlan table table-map name} 10. end 11. show policy-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

policy-map policy name Example:
Switch(config)# policy-map policy1 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Step 3

class class name Example:
Switch(config-pmap)# class class1 Switch(config-pmap-c)#

Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change.
Command options for policy class map configuration mode include the following:
· admit--Admits the request for Call Admission Control (CAC).
· bandwidth--Bandwidth configuration options.
· exit--Exits from the QoS class action configuration mode.
· no--Negates or sets default values for the command.
· police--Policer configuration options.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 951

QoS Configuring Class-Based Packet Marking (CLI)

Step 4 Step 5

Command or Action

Purpose · priority--Strict scheduling priority configuration options for this class. · queue-buffers--Queue buffer configuration options. · queue-limit--Queue maximum threshold for Weighted Tail Drop (WTD) configuration options. · service-policy--Configures the QoS service policy. · set--Sets QoS values using the following options: · CoS values · DSCP values · Precedence values · QoS group values · WLAN values

· shape--Traffic-shaping configuration options.
Note This procedure describes the available configurations using set command options. The other command options (admit, bandwidth, etc.) are described in other sections of this guide. Although this task lists all of the possible set commands, only one set command is supported per class.

set cos {cos value | cos table table-map name | dscp table (Optional) Sets the specific IEEE 802.1Q Layer 2 CoS

table-map name | precedence table table-map name | value of an outgoing packet. Values are from 0 to7.

qos-group table table-map name | wlan user-priority table table-map name}

You can also set the following values using the set cos command:

Example:

· cos table--Sets the CoS value based on a table map.

Switch(config-pmap)# set cos 5 Switch(config-pmap)#

· dscp table--Sets the code point value based on a table map.

· precedence table--Sets the code point value based on a table map.

· qos-group table--Sets the CoS value from QoS group based on a table map.

· wlan user-priority table--Sets the CoS value from the WLAN user priority based on a table map.

set dscp {dscp value | default | dscp table table-map name (Optional) Sets the DSCP value. | ef | precedence table table-map name | qos-group table

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 952

QoS Configuring Class-Based Packet Marking (CLI)

Step 6

Command or Action table-map name | wlan user-priority table table-map name} Example:
Switch(config-pmap)# set dscp af11 Switch(config-pmap)#

Purpose In addition to setting specific DSCP values, you can also set the following using the set dscp command:
· default--Matches packets with default DSCP value (000000).
· dscp table--Sets the packet DSCP value from DSCP based on a table map.
· ef--Matches packets with EF DSCP value (101110).
· precedence table--Sets the packet DSCP value from precedence based on a table map.
· qos-group table--Sets the packet DSCP value from a QoS group based upon a table map.
· wlan user-priority table--Sets the packet DSCP value based upon a WLAN user-priority based upon a table map.

set ip {dscp | precedence} Example:
Switch(config-pmap)# set ip dscp c3 Switch(config-pmap)#

(Optional) Sets IP specific values. These values are either IP DSCP or IP precedence values.
You can set the following values using the set ip dscp command:
· dscp value--Sets a specific DSCP value.
· default--Matches packets with default DSCP value (000000).
· dscp table--Sets the packet DSCP value from DSCP based on a table map.
· ef--Matches packets with EF DSCP value (101110).
· precedence table--Sets the packet DSCP value from precedence based on a table map.
· qos-group table--Sets the packet DSCP value from a QoS group based upon a table map.
· wlan user-priority table--Sets the packet DSCP value based upon a WLAN user-priority based upon a table map.
You can set the following values using the set ip precedence command:
· precedence value--Sets the precedence value (from 0 to 7) .
· cos table--Sets the packet precedence value from Layer 2 CoS based on a table map.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 953

QoS Configuring Class-Based Packet Marking (CLI)

Step 7
Step 8 Step 9

Command or Action

Purpose · dscp table--Sets the packet precedence from DSCP value based on a table map.
· precedence table--Sets the precedence value from precedence based on a table map
· qos-group table--Sets the precedence value from a QoS group based upon a table map.

set precedence {precedence value | cos table table-map name | dscp table table-map name | precedence table table-map name | qos-group table table-map name}
Example:

(Optional) Sets precedence values in IPv4 and IPv6 packets.
You can set the following values using the set precedence command:

Switch(config-pmap)# set precedence 5 Switch(config-pmap)#

· precedence value--Sets the precedence value (from 0 to 7) .
· cos table--Sets the packet precedence value from Layer 2 CoS on a table map.

· dscp table--Sets the packet precedence from DSCP value on a table map.

· precedence table--Sets the precedence value from precedence based on a table map.

· qos-group table--Sets the precedence value from a QoS group based upon a table map.

set qos-group {qos-group value | dscp table table-map (Optional) Sets QoS group values. You can set the

name | precedence table table-map name}

following values using this command:

Example:

· qos-group value--A number from 1 to 31.

Switch(config-pmap)# set qos-group 10 Switch(config-pmap)#

· dscp table--Sets the code point value from DSCP based on a table map.
· precedence table--Sets the code point value from precedence based on a table map.

set wlan user-priority {wlan user-priority value | cos (Optional) Sets the WLAN user priority value. You can

table table-map name | dscp table table-map name | set the following values using this command:

qos-group table table-map name | wlan table table-map name}

· wlan user-priority value--A value between 0 to 7.

Example:

· cos table--Sets the WLAN user priority value from CoS based on a table map.

Switch(config-pmap)# set wlan user-priority 1 Switch(config-pmap)#

· dscp table--Sets the WLAN user priority value from DSCP based on a table map.

· qos-group table--Sets the WLAN user priority value from QoS group based on a table map.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 954

QoS Configuring Class Maps for Voice and Video (CLI)

Command or Action

Step 10 Step 11

end Example:
Switch(config-pmap)# end Switch#
show policy-map Example:
Switch# show policy-map

Purpose · wlan table--Sets the WLAN user priority value from the WLAN user priority based on a table map.
Saves configuration changes.
(Optional) Displays policy configuration information for all classes configured for all service policies.

What to do next Attach the traffic policy to an interface using the service-policy command.
Configuring Class Maps for Voice and Video (CLI)
To configure class maps for voice and video traffic, follow these steps:

SUMMARY STEPS

1. configure terminal 2. class-map class-map-name 3. match dscp dscp-value-for-voice 4. end 5. configure terminal 6. class-map class-map-name 7. match dscp dscp-value-for-video 8. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

class-map class-map-name Example:
Switch(config)# class-map voice

Purpose Enters global configuration mode.
Creates a class map.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 955

QoS Attaching a Traffic Policy to an Interface (CLI)

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Command or Action match dscp dscp-value-for-voice Example:
Switch(config-cmap)# match dscp 46
end Example:
Switch(config)# end
configure terminal Example:
Switch# configure terminal
class-map class-map-name Example:
Switch(config)# class-map video
match dscp dscp-value-for-video Example:
Switch(config-cmap)# match dscp 34
end Example:
Switch(config)# end

Purpose Matches the DSCP value in the IPv4 and IPv6 packets. Set this value to 46.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Enters global configuration mode.
Configures a class map.
Matches the DSCP value in the IPv4 and IPv6 packets. Set this value to 34.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Attaching a Traffic Policy to an Interface (CLI)
After the traffic class and traffic policy are created, you must use the service-policy interface configuration command to attach a traffic policy to an interface, and to specify the direction in which the policy should be applied (either on packets coming into the interface or packets leaving the interface).

Before you begin A traffic class and traffic policy must be created before attaching a traffic policy to an interface.

SUMMARY STEPS

1. configure terminal 2. interface type 3. service-policy {input policy-map | output policy-map } 4. end 5. show policy map

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 956

QoS Attaching a Traffic Policy to an Interface (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

interface type Example:
Switch(config)# interface GigabitEthernet1/0/1 Switch(config-if)#

Enters interface configuration mode and configures an interface. Command parameters for the interface configuration include:
· Auto Template-- Auto-template interface · Capwap--CAPWAP tunnel interface · GigabitEthernet--Gigabit Ethernet IEEE 802 · GroupVI--Group virtual interface · Internal Interface-- Internal interface · Loopback--Loopback interface · Null--Null interface · Port-channel--Ethernet Channel of interface · TenGigabitEthernet--10-Gigabit Ethernet · Tunnel--Tunnel interface · Vlan--Catalyst VLANs · Range--Interface range

service-policy {input policy-map | output policy-map } Example:
Switch(config-if)# service-policy output policy_map_01 Switch(config-if)#

Attaches a policy map to an input or output interface. This policy map is then used as the service policy for that interface.
In this example, the traffic policy evaluates all traffic leaving that interface.

Step 4

end Example:
Switch(config-if)# end Switch#

Saves configuration changes.

Step 5

show policy map Example:

(Optional) Displays statistics for the policy on the specified interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 957

QoS Configuring SSID Policies (GUI)

Command or Action
Switch# show policy map

Purpose

What to do next Proceed to attach any other traffic policy to an interface, and to specify the direction in which the policy should be applied. Related Topics
Policy Map on Physical Port, on page 919
Configuring SSID Policies (GUI)

Step 1 Step 2 Step 3 Step 4 Step 5
Step 6 Step 7 Step 8

Choose Configuration > Wireless. Expand the QoS node by clicking on the left pane and choose QOS-Policy. The Create QoS Policy page is displayed.
Click Add New to create a new QoS Policy. The QoS Policy page is displayed.
Select SSID from the Policy Type drop-down menu. Select the direction into which the policy needs to be applied from the Policy Direction drop-down list. The available options are:
· Ingress
· Egress
Note Voice and video configurations are available only in the egress direction.
Note When creating an egress SSID policy for voice and video classes, if the port_child_policy is already configured with voice and video classes having priority level, the existing port_child_policy is used. If a port_child_policy does not exist with voice and video classes, the switch will create voice and video classes with priority levels 1 and 2 under port_child_policy for voice and video traffic.
Specify a policy name in the Policy Name text box. Provide a description to the policy in the Description text box. Select the trust parameter from the Trust drop-down list. The following options are available:
· DSCP-- Assigns a label to indicate the given quality of service as DSCP. · COS--Matches IEEE 802.1Q class of service. This option is not available when the Policy Direction is engres. · User Priority--Enter the 802.11e user priority. This option is not available when the Policy Direction is engres. · None--This option is available when the Policy Direction is egress. This option is available only for egress
policies.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 958

QoS Applying an SSID or Client Policy on a WLAN (CLI)

Step 9

If you chose Egress policy above, the following options are available:
· Bandwidth--Specifies the bandwidth rate. The following options are available:
· Rate--Specifies the bandwidth in kbps. Enter a value in kbps in the Value field. · Remaining Ratio--Specifies the bandwidth in BRR (bandwidth remaining ratio). Enter the percentage in
the Percent field.
Note If you choose the Rate option for the Bandwidth parameter, this value must be greater than the sum of the policing values for voice and video traffic.
. · Enable Voice--Click on the Enable Voice checkbox to enable voice traffic on this policy. Specify the following
properties:
· Priority--Sets the priority for this policy for strict scheduling. The priority level is set to 1. · Police (kbps)--Specifies the police rate in Kilobits per second. · CAC--Enables or disables CAC. If CAC is enabled, you must specify the following options:
· User priorityThis option is available when the Policy Direction is ingress. Enter the 802.11e user priority. The range is from 0 to 7. By default, a value of 6 is assigned.
· Rate(kbps)
Note The CAC rate must be less than the police rate.

Step 10

· Enable Video--Check the Enable Video checkbox to enable video traffic on this policy. Specify the following properties:
· Priority--Sets the priority for this policy for strict scheduling. · Police (kbps)--Specifies the police rate in kilobits per second.
Click Apply.

Related Topics SSID Policies, on page 909 Supported QoS Features on Wireless Targets, on page 906 Examples: SSID Policy Examples: Configuring Downstream SSID Policy, on page 1001
Applying an SSID or Client Policy on a WLAN (CLI)

Before you begin You must have a service-policy map configured before applying it on an SSID.

SUMMARY STEPS

1. configure terminal 2. wlan profile-name 3. service-policy [ input | output ] policy-name 4. service-policy client [ input | output ] policy-name

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 959

QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI)

5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan profile-name Example:
Switch# wlan test4

Step 3

service-policy [ input | output ] policy-name
Example:
Switch(config-wlan)# service-policy input policy-map-ssid

Purpose Enters global configuration mode.
Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN.
Applies the policy. The following options are available: · input-- Assigns the policy map to WLAN ingress traffic. · output-- Assigns the policy map to WLAN egress traffic.

Step 4

service-policy client [ input | output ] policy-name Applies the policy. The following options are available:

Example:
Switch(config-wlan)# service-policy client input policy-map-client

· input-- Assigns the client policy for ingress direction on the WLAN.
· output-- Assigns the client policy for egress direction on the WLAN.

Step 5

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics SSID Policies, on page 909 Supported QoS Features on Wireless Targets, on page 906 Examples: SSID Policy Examples: Configuring Downstream SSID Policy, on page 1001
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI)
You can configure a nonhierarchical policy map on a physical port that specifies which traffic class to act on. Actions supported are remarking and policing.

Before you begin
You should have already decided upon the classification, policing, and marking of your network traffic by policy maps prior to beginning this procedure.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 960

QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI)

SUMMARY STEPS

1. configure terminal 2. class-map {class-map name | match-any } 3. match access-group { access list index | access list name } 4. policy-map policy-map-name 5. class {class-map-name | class-default} 6. set {cos | dscp | ip | precedence | qos-group | wlan user-priority} 7. police {target_bit_rate | cir | rate } 8. exit 9. exit 10. interface interface-id 11. service-policy input policy-map-name 12. end 13. show policy-map [policy-map-name [class class-map-name]] 14. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

class-map {class-map name | match-any } Example:
Switch(config)# class-map ipclass1 Switch(config-cmap)# exit Switch(config)#

Enters class map configuration mode.
· Creates a class map to be used for matching packets to the class whose name you specify.
· If you specify match-any, one of the match criteria must be met for traffic entering the traffic class to be classified as part of the traffic class. This is the default.

match access-group { access list index | access list name Specifies the classification criteria to match to the class

}

map. You can match on the following criteria:

Example:

· access-group--Matches to access group.

Switch(config-cmap)# match access-group 1000 Switch(config-cmap)# exit Switch(config)#

· class-map--Matches to another class map. · cos--Matches to a CoS value. · dscp--Matches to a DSCP value.

· ip--Matches to a specific IP value.

· non-client-nrt--Matches non-client NRT.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 961

QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI)

Step 4 Step 5 Step 6
Step 7

Command or Action
policy-map policy-map-name Example:
Switch(config)# policy-map flowit Switch(config-pmap)#

Purpose · precedence--Matches precedence in IPv4 and IPv6 packets. · qos-group--Matches to a QoS group. · vlan--Matches to a VLAN. · wlan--Matches to a wireless LAN.
Creates a policy map by entering the policy map name, and enters policy-map configuration mode. By default, no policy maps are defined.

class {class-map-name | class-default} Example:
Switch(config-pmap)# class ipclass1 Switch(config-pmap-c)#

Defines a traffic classification, and enter policy-map class configuration mode.
By default, no policy map class-maps are defined.
If a traffic class has already been defined by using the class-map global configuration command, specify its name for class-map-name in this command.
A class-default traffic class is predefined and can be added to any policy. It is always placed at the end of a policy map. With an implied match any included in the class-default class, all packets that have not already matched the other traffic classes will match class-default.

set {cos | dscp | ip | precedence | qos-group | wlan (Optional) Sets the QoS values. Possible QoS configuration

user-priority}

values include:

Example:
Switch(config-pmap-c)# set dscp 45 Switch(config-pmap-c)#

· cos--Sets the IEEE 802.1Q/ISL class of service/user priority.
· dscp--Sets DSCP in IP(v4) and IPv6 packets.

· ip--Sets IP specific values.

· precedence--Sets precedence in IP(v4) and IPv6 packet.

· qos-group--Sets QoS group.

· wlan user-priority--Sets WLAN user priority.

police {target_bit_rate | cir | rate } Example:

In this example, the set dscp command classifies the IP traffic by setting a new DSCP value in the packet.
(Optional) Configures the policer:
· target_bit_rate--Specifies the bit rate per second, enter a value between 8000 and 10000000000.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 962

QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps (CLI)

Command or Action
Switch(config-pmap-c)# police 100000 conform-action transmit exceed-action drop Switch(config-pmap-c)#

Step 8 Step 9 Step 10 Step 11 Step 12 Step 13

exit Example:
Switch(config-pmap-c)# exit
exit Example:
Switch(config-pmap)# exit
interface interface-id Example:
Switch(config)# interface gigabitethernet 2/0/1
service-policy input policy-map-name Example:
Switch(config-if)# service-policy input flowit
end Example:
Switch(config-if)# end
show policy-map [policy-map-name [class class-map-name]] Example:
Switch# show policy-map

Purpose · cir--Committed Information Rate. · rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies.
In this example, the police command adds a policer to the class where any traffic beyond the 100000 set target bit rate is dropped. Returns to policy map configuration mode.
Returns to global configuration mode.
Specifies the port to attach to the policy map, and enters interface configuration mode. Valid interfaces include physical ports.
Specifies the policy-map name, and applies it to an ingress port. Only one policy map per ingress port is supported.
Returns to privileged EXEC mode.
(Optional) Verifies your entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 963

QoS Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI)

Step 14

Command or Action copy running-config startup-config Example:
Switch# copy-running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

What to do next If applicable to your QoS configuration, configure classification, policing, and marking of traffic on SVIs by using policy maps.
Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI)

Before you begin
You should have already decided upon the classification, policing, and marking of your network traffic by using policy maps prior to beginning this procedure.

SUMMARY STEPS

1. configure terminal 2. class-map {class-map name | match-any } 3. match vlan vlan number 4. policy-map policy-map-name 5. description description 6. class {class-map-name | class-default} 7. set {cos | dscp | ip | precedence | qos-group | wlan user-priority} 8. police {target_bit_rate | cir | rate} 9. exit 10. exit 11. interface interface-id 12. service-policy input policy-map-name 13. end 14. show policy-map [policy-map-name [class class-map-name]] 15. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 964

QoS Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI)

Step 2 Step 3 Step 4 Step 5 Step 6
Step 7

Command or Action class-map {class-map name | match-any } Example:
Switch(config)# class-map class_vlan100
match vlan vlan number Example:
Switch(config-cmap)# match vlan 100 Switch(config-cmap)# exit Switch(config)#

Purpose
Enters class map configuration mode. · Creates a class map to be used for matching packets to the class whose name you specify.
· If you specify match-any, one of the match criteria must be met for traffic entering the traffic class to be classified as part of the traffic class. This is the default.
Specifies the VLAN to match to the class map.

policy-map policy-map-name Example:
Switch(config)# policy-map policy_vlan100 Switch(config-pmap)#

Creates a policy map by entering the policy map name, and enters policy-map configuration mode.
By default, no policy maps are defined.

description description Example:
Switch(config-pmap)# description vlan 100

(Optional) Enters a description of the policy map.

class {class-map-name | class-default} Example:
Switch(config-pmap)# class class_vlan100 Switch(config-pmap-c)#

Defines a traffic classification, and enters the policy-map class configuration mode.
By default, no policy map class-maps are defined.
If a traffic class has already been defined by using the class-map global configuration command, specify its name for class-map-name in this command.
A class-default traffic class is predefined and can be added to any policy. It is always placed at the end of a policy map. With an implied match any included in the class-default class, all packets that have not already matched the other traffic classes will match class-default.

set {cos | dscp | ip | precedence | qos-group | wlan (Optional) Sets the QoS values. Possible QoS configuration

user-priority}

values include:

Example:
Switch(config-pmap-c)# set dscp af23

· cos--Sets the IEEE 802.1Q/ISL class of service/user priority.
· dscp--Sets DSCP in IP(v4) and IPv6 packets.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 965

QoS Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI)

Command or Action
Switch(config-pmap-c)#

Step 8

police {target_bit_rate | cir | rate} Example:
Switch(config-pmap-c)# police 200000 conform-action transmit exceed-action drop Switch(config-pmap-c)#

Step 9 Step 10 Step 11 Step 12

exit Example:
Switch(config-pmap-c)# exit
exit Example:
Switch(config-pmap)# exit
interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/3
service-policy input policy-map-name Example:
Switch(config-if)# service-policy input policy_vlan100

Purpose · ip--Sets IP specific values. · precedence--Sets precedence in IP(v4) and IPv6 packet. · qos-group--Sets QoS group. · wlan user-priority--Sets WLAN user-priority.
In this example, the set dscp command classifies the IP traffic by matching the packets with a DSCP value of AF23 (010010). (Optional) Configures the policer:
· target_bit_rate--Specifies the bit rate per second. Enter a value between 8000 and 10000000000.
· cir--Committed Information Rate. · rate--Specifies the police rate, PCR for hierarchical
policies, or SCR for single-level ATM 4.0 policer policies. In this example, the police command adds a policer to the class where any traffic beyond the 200000 set target bit rate is dropped. Returns to policy map configuration mode.
Returns to global configuration mode.
Specifies the port to attach to the policy map, and enters interface configuration mode. Valid interfaces include physical ports.
Specifies the policy-map name, and applies it to an ingress port. Only one policy map per ingress port is supported.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 966

QoS Configuring Table Maps (CLI)

Step 13 Step 14 Step 15

Command or Action end Example:
Switch(config-if)# end
show policy-map [policy-map-name [class class-map-name]] Example:
Switch# show policy-map
copy running-config startup-config Example:
Switch# copy-running-config startup-config

Purpose Returns to privileged EXEC mode.
(Optional) Verifies your entries.
(Optional) Saves your entries in the configuration file.

Related Topics Policy Map on VLANs, on page 920 Examples: Policer VLAN Configuration, on page 1006
Configuring Table Maps (CLI)
Table maps are a form of marking, and also enable the mapping and conversion of one field to another using a table. For example, a table map can be used to map and convert a Layer 2 CoS setting to a precedence value in Layer 3.

Note A table map can be referenced in multiple policies or multiple times in the same policy.

SUMMARY STEPS

1. configure terminal 2. table-map name {default {default value | copy | ignore} | exit | map {from from value to to value }
| no} 3. map from value to value 4. exit 5. exit 6. show table-map 7. configure terminal 8. policy-map 9. class class-default 10. set cos dscp table table map name

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 967

QoS Configuring Table Maps (CLI)

11. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

table-map name {default {default value | copy | ignore} Creates a table map and enters the table map configuration

| exit | map {from from value to to value } | no}

mode. In table map configuration mode, you can perform

Example:

the following tasks:

· default--Configures the table map default value, or

Switch(config)# table-map table01

sets the default behavior for a value not found in the

Switch(config-tablemap)#

table map to copy or ignore.

· exit--Exits from the table map configuration mode.

· map--Maps a from to a to value in the table map.

· no--Negates or sets the default values of the command.

map from value to value
Example:
Switch(config-tablemap)# map from 0 to 2 Switch(config-tablemap)# map from 1 to 4 Switch(config-tablemap)# map from 24 to 3 Switch(config-tablemap)# map from 40 to 6 Switch(config-tablemap)# default 0 Switch(config-tablemap)#

In this step, packets with DSCP values 0 are marked to the CoS value 2, DSCP value 1 to the CoS value 4, DSCP value 24 to the CoS value 3, DSCP value 40 to the CoS value 6 and all others to the CoS value 0.
Note The mapping from CoS values to DSCP values in this example is configured by using the set policy map class configuration command as described in a later step in this procedure.

Step 4

exit Example:
Switch(config-tablemap)# exit Switch(config)#

Returns to global configuration mode.

Step 5

exit Example:
Switch(config) exit Switch#

Returns to privileged EXEC mode.

Step 6

show table-map Example:

Displays the table map configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 968

QoS Configuring Table Maps (CLI)

Step 7 Step 8 Step 9 Step 10 Step 11

Command or Action
Switch# show table-map Table Map table01
from 0 to 2 from 1 to 4 from 24 to 3 from 40 to 6 default 0

Purpose

configure terminal Example:
Switch# configure terminal Switch(config)#

Enters global configuration mode.

policy-map Example:
Switch(config)# policy-map table-policy Switch(config-pmap)#

Configures the policy map for the table map.

class class-default Example:
Switch(config-pmap)# class class-default Switch(config-pmap-c)#

Matches the class to the system default.

set cos dscp table table map name Example:

If this policy is applied on input port, that port will have trust DSCP enabled on that port and marking will take place depending upon the specified table map.

Switch(config-pmap-c)# set cos dscp table table01 Switch(config-pmap-c)#

end Example:
Switch(config-pmap-c)# end Switch#

Returns to privileged EXEC mode.

What to do next
Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command.
Related Topics Table Map Marking, on page 922

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 969

QoS Configuring Trust

Examples: Table Map Marking Configuration, on page 1008

Configuring Trust

Configuring Trust Behavior for Wireless Traffic (CLI)
The Cisco IOS XE 3.2 Release supported different trust defaults for wired and wireless ports. The trust default for wired ports was the same as for this software release. For wireless ports, the default system behavior was non-trust, which meant that when the switch came up, all markings for the wireless ports were defaulted to zero and no traffic received priority treatment. For compatibility with an existing wired switch, all traffic went to the best-effort queue by default. The access point performed priority queuing by default. In the downstream direction, the access point maintained voice, video, best-effort, and background queues for queuing. The access selected the queuing strategy based on the 11e tag information. By default, the access point treated all wireless packets as best effort.

SUMMARY STEPS

1. configure terminal 2. qos wireless-default-untrust 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

qos wireless-default-untrust Example:
Switch (config)# qos wireless-default-untrust

Step 3

end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Configures the behavior of the switch to untrust wireless traffic. To configure the switch to trust wireless traffic by default, use the no form of the command.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Trust Behavior for Wired and Wireless Ports, on page 931

Configuring QoS Features and Functionality

Configuring Call Admission Control (CLI)
This task explains how to configure class-based, unconditional packet marking features on your switch for Call Admission Control (CAC).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 970

QoS Configuring Call Admission Control (CLI)

SUMMARY STEPS

1. configure terminal 2. class-map class name 3. match dscp dscp value 4. exit 5. class-map class name 6. match dscp dscp value 7. exit 8. table-map name 9. default copy 10. exit 11. table-map name 12. default copy 13. exit 14. policy-map policy name 15. class class-map-name 16. priority level level_value 17. police [target_bit_rate | cir | rate ] 18. admit cac wmm-tspec 19. rate value 20. wlan-up value 21. exit 22. exit 23. class class name 24. priority level level_value 25. police [target_bit_rate | cir | rate ] 26. admit cac wmm-tspec 27. rate value 28. wlan-up value 29. exit 30. exit 31. policy-map policy name 32. class class-map-name 33. set dscp dscp table table_map_name 34. set wlan user-priority dscp table table_map_name 35. shape average {target bit rate | percent percentage} 36. queue-buffers {ratio ratio value} 37. service-policy policy_map_name 38. end 39. show policy-map

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 971

QoS Configuring Call Admission Control (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

class-map class name Example:
Switch(config)# class-map voice Switch(config-cmap)#

Step 3 Step 4 Step 5

match dscp dscp value Example:
Switch(config-cmap)# match dscp 46
exit Example:
Switch(config-cmap)# exit Switch(config)#
class-map class name Example:
Switch(config)# class-map video Switch(config-cmap)#

Step 6 Step 7

match dscp dscp value Example:
Switch(config-cmap)# match dscp 34
exit Example:
Switch(config-cmap)# exit

Purpose Enters the global configuration mode.
Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name. · class-default--System default class matching any
otherwise unclassified packets. (Optional) Matches the DSCP values in IPv4 and IPv6 packets.
Returns to global configuration mode.
Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name. · class-default--System default class matching any
otherwise unclassified packets. (Optional) Matches the DSCP values in IPv4 and IPv6 packets.
Returns to global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 972

QoS Configuring Call Admission Control (CLI)

Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14

Command or Action
Switch(config)#
table-map name Example:
Switch(config)# table-map dscp2dscp Switch(config-tablemap)#
default copy Example:
Switch(config-tablemap)# default copy
exit Example:
Switch(config-tablemap)# exit Switch(config)#
table-map name Example:
Switch(config)# table-map dscp2up Switch(config-tablemap)#
default copy Example:
Switch(config-tablemap)# default copy
exit Example:
Switch(config-tablemap)# exit Switch(config)#
policy-map policy name Example:
Switch(config)# policy-map ssid_child_cac Switch(config-pmap)#

Purpose
Creates a table map and enters the table map configuration mode.
Sets the default behavior for value not found in the table map to copy. Note This is the default option. You can also do a
mapping of values for DSCP to DSCP. Returns to global configuration mode.
Creates a new table map and enters the table map configuration mode.
Sets the default behavior for value not found in the table map to copy. Note This is the default option. You can also do a
mapping of values for DSCP to UP. Returns to global configuration mode.
Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 973

QoS Configuring Call Admission Control (CLI)

Step 15 Step 16 Step 17
Step 18 Step 19 Step 20 Step 21

Command or Action class class-map-name Example:
Switch(config-pmap)# class voice

Purpose
Defines an interface-level traffic classification, and enters policy-map configuration mode.

priority level level_value Example:
Switch(config-pmap-c)# priority level 1
police [target_bit_rate | cir | rate ] Example:
Switch(config-pmap-c)# police cir 10m
admit cac wmm-tspec Example:
Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-cac-wmm)#

The priority command assigns a strict scheduling priority for the class.
Note Priority level 1 is more important than priority level 2. Priority level 1 reserves bandwidth that is processed first for QoS, so its latency is very low. Both priority level 1 and 2 reserve bandwidth.
(Optional) Configures the policer:
· target_bit_rate--Specifies the bit rate per second. Enter a value between 8000 and 10000000000.
· cir--Committed Information Rate.
· rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies.
Configures call admission control for the policy map.
Note This command only configures CAC for wireless QoS.

rate value Example:
Switch(config-pmap-admit-cac-wmm)# rate 5000

Configures the target bit rate (Kilo Bits per second). Enter a value from 8 to 10000000.

wlan-up value Example:

Configures the WLAN UP value. Enter a value from 0 to 7.

Switch(config-pmap-admit-cac-wmm)# wlan-up 6 7

exit Example:
Switch(config-pmap-admit-cac-wmm)# exit

Returns to policy map class configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 974

QoS Configuring Call Admission Control (CLI)

Step 22 Step 23 Step 24 Step 25 Step 26 Step 27

Command or Action
Switch(config-pmap-c)#

Purpose

exit Example:
Switch(config-pmap-c)# exit Switch(config-pmap)#

Returns to policy map configuration mode.

class class name Example:
Switch(config-pmap)# class video Switch(config-pmap-c)#
priority level level_value Example:
Switch(config-pmap-c)# priority level 2
police [target_bit_rate | cir | rate ] Example:
Switch(config-pmap-c)# police cir 20m
admit cac wmm-tspec Example:
Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-admit-cac-wmm)#

Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name. · class-default--System default class matching any
otherwise unclassified packets.
The priority command assigns a strict scheduling priority for the class.
Note Priority level 1 is more important than priority level 2. Priority level 1 reserves bandwidth that is processed first for QoS, so its latency is very low. Both priority level 1 and 2 reserve bandwidth.
(Optional) Configures the policer:
· target_bit_rate--Specifies the bit rate per second. Enter a value between 8000 and 10000000000.
· cir--Committed Information Rate.
· rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies.
Configures call admission control for the policy map.
Note This command only configures CAC for wireless QoS.

rate value Example:
Switch(config-pmap-admit-cac-wmm)# rate 5000

Configures the target bit rate (Kilo Bits per second). Enter a value from 8 to 10000000.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 975

QoS Configuring Call Admission Control (CLI)

Step 28 Step 29 Step 30 Step 31 Step 32 Step 33 Step 34 Step 35

Command or Action wlan-up value Example:

Purpose
Configures the WLAN UP value. Enter a value from 0 to 7.

Switch(config-pmap-admit-cac-wmm)# wlan-up 4 5

exit Example:
Switch(config-pmap-cac-wmm)# exit Switch(config-pmap)#

Returns to policy map configuration mode.

exit Example:
Switch(config-pmap)# exit Switch(config)#

Returns to global configuration mode.

policy-map policy name Example:
Switch(config)# policy-map ssid_cac Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

class class-map-name Example:
Switch(config-pmap)# class default

Defines an interface-level traffic classification, and enters policy-map configuration mode.
In this example, the class map is set to default.

set dscp dscp table table_map_name Example:
Switch(config-pmap-c)# set dscp dscp table dscp2dscp

(Optional) Sets the QoS values. In this example, the set dscp dscp table command creates a table map and sets its values.

set wlan user-priority dscp table table_map_name Example:

(Optional) Sets the QoS values. In this example, the set wlan user-priority dscp table command sets the WLAN user priority.

Switch(config-pmap-c)# set wlan user-priority dscp table dscp2up

shape average {target bit rate | percent percentage} Example:

Configures the average shape rate. You can configure the average shape rate by target bit rates (bits per second) or

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 976

QoS Configuring Bandwidth (CLI)

Step 36
Step 37 Step 38 Step 39

Command or Action
Switch(config-pmap-c)# shape average 100000000

Purpose
by percentage of interface bandwidth for the Committed Information Rate (CIR).

queue-buffers {ratio ratio value} Example:
Switch(config-pmap-c)# queue-buffers ratio 0

Configures the relative buffer size for the queue.
Note The sum of all configured buffers in a policy must be less than or equal to 100 percent. Unallocated buffers are evenly distributed to all the remaining queues. Ensure sufficient buffers are allocated to all queues including the priority queues.
Note Protocol Data Units (PDUs) for network control protocols such as spanning-tree and LACP utilize the priority queue or queue 0 (when a priority queue is not configured). Ensure sufficient buffers are allocated to these queues for the protocols to function.

service-policy policy_map_name Example:

Specifies the policy map for the service policy.

Switch(config-pmap-c)# service-policy ssid_child_cac

end Example:
Switch(config-pmap)# end Switch#

Saves configuration changes.

show policy-map Example:
Switch# show policy-map

(Optional) Displays policy configuration information for all classes configured for all service policies.

What to do next Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. For additional information about CAC, refer to the System Management Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches).
Configuring Bandwidth (CLI)
This procedure explains how to configure bandwidth on your switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 977

QoS Configuring Bandwidth (CLI)

Before you begin You should have created a class map for bandwidth before beginning this procedure.

SUMMARY STEPS

1. configure terminal 2. policy-map policy name 3. class class name 4. bandwidth {Kb/s | percent percentage | remaining { ratio ratio }} 5. end 6. show policy-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

policy-map policy name Example:
Switch(config)# policy-map policy_bandwidth01 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Step 3 Step 4

class class name Example:
Switch(config-pmap)# class class_bandwidth01 Switch(config-pmap-c)#

Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name.
· class-default--System default class matching any otherwise unclassified packets.

bandwidth {Kb/s | percent percentage | remaining { ratio Configures the bandwidth for the policy map. The

ratio }}

parameters include:

Example:
Switch(config-pmap-c)# bandwidth 200000 Switch(config-pmap-c)#

· Kb/s--Configures a specific value in kilobits per second (from 20000 to 10000000).
· percent---Allocates minimum bandwidth to a particular class based on a percentage. The queue can oversubscribe bandwidth in case other queues do not utilize the entire port bandwidth. The total sum cannot exceed 100 percent, and in case it is less than 100 percent, the rest of the bandwidth is equally divided along all bandwidth queues.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 978

QoS Configuring Police (CLI)

Command or Action

Step 5

end Example:
Switch(config-pmap-c)# end Switch#

Step 6

show policy-map Example:
Switch# show policy-map

Purpose · remaining-- Allocates minimum bandwidth to a particular class. The queue can oversubscribe bandwidth in case other queues do not utilize entire port bandwidth. The total sum cannot exceed 100 percent. It is preferred to use this command when the priority command is used for certain queues in the policy. You can also assign ratios rather than percentages to each queue; the queues will be assigned certain weights which are inline with these ratios. Ratios can range from 0 to 100. Total bandwidth ratio allocation for the policy in this case can exceed 100.
Note You cannot mix bandwidth types on a policy map. For example, you cannot configure bandwidth in a single policy map using both a bandwidth percent and in kilobits per second.
Saves configuration changes.
(Optional) Displays policy configuration information for all classes configured for all service policies.

What to do next Configure any additional policy maps for QoS for your network. After creating the policy maps, attach the traffic policy or polices to an interface using the service-policy command. Related Topics
Bandwidth, on page 927
Configuring Police (CLI)
This procedure explains how to configure policing on your switch.

Before you begin You should have created a class map for policing before beginning this procedure.

SUMMARY STEPS

1. configure terminal 2. policy-map policy name

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 979

QoS Configuring Police (CLI)

3. class class name 4. police {target_bit_rate [burst bytes | bc | conform-action | pir ] | cir {target_bit_rate | percent percentage}
| rate {target_bit_rate | percent percentage} conform-action transmit exceed-action {drop [violate action] | set-cos-transmit | set-dscp-transmit | set-prec-transmit | transmit [violate action] }} 5. end 6. show policy-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

policy-map policy name Example:
Switch(config)# policy-map policy_police01 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Step 3 Step 4

class class name Example:
Switch(config-pmap)# class class_police01 Switch(config-pmap-c)#

Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name.
· class-default--System default class matching any otherwise unclassified packets.

police {target_bit_rate [burst bytes | bc | conform-action The following police subcommand options are available:

| pir ] | cir {target_bit_rate | percent percentage} | rate {target_bit_rate | percent percentage} conform-action transmit exceed-action {drop [violate action] |

· target_bit_rate--Bits per second (from 8000 to 10000000000).

set-cos-transmit | set-dscp-transmit | set-prec-transmit

· burst bytes--Enter a value from 1000 to

| transmit [violate action] }}

512000000.

Example:

· bc--Conform burst.

Switch(config-pmap-c)# police 8000 conform-action transmit exceed-action drop
Switch(config-pmap-c)#

· conform-action--Action taken when rate is less than conform burst.
· pir--Peak Information Rate.

· cir--Committed Information Rate.
· target_bit_rate--Target bit rate (8000 to10000000000).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 980

QoS Configuring Police (CLI)

Command or Action

Step 5

end Example:
Switch(config-pmap-c)# end Switch#

Step 6

show policy-map Example:
Switch# show policy-map

Purpose · percent--Percentage of interface bandwidth for CIR.
· rate--Specifies the police rate, PCR for hierarchical policies, or SCR for single-level ATM 4.0 policer policies. · target_bit_rate--Target Bit Rate (8000 to 10000000000). · percent--Percentage of interface bandwidth for rate.
The following police conform-action transmit exceed-action subcommand options are available:
· drop--Drops the packet. · set-cos-transmit--Sets the CoS value and sends it. · set-dscp-transmit--Sets the DSCP value and sends
it. · set-prec-transmit--Rewrites the packet precedence
and sends it. · transmit--Transmits the packet.
Note Policer-based markdown actions are only supported using table maps. Only one markdown table map is allowed for each marking field in the switch.
Saves configuration changes.
(Optional) Displays policy configuration information for all classes configured for all service policies.

What to do next
Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 981

QoS Configuring Priority (CLI)

Related Topics Single-Rate Two-Color Policing, on page 925 Examples: Single-Rate Two-Color Policing Configuration, on page 1007 Dual-Rate Three-Color Policing, on page 925 Examples: Dual-Rate Three-Color Policing Configuration, on page 1008 Policing, on page 921 Token-Bucket Algorithm, on page 921 Examples: Policing Action Configuration, on page 1006 Examples: Policing Units, on page 1007
Configuring Priority (CLI)
This procedure explains how to configure priority on your switch.
The switch supports giving priority to specified queues. There are two priority levels available (1 and 2).

Note Queues supporting voice and video should be assigned a priority level of 1.

Before you begin You should have created a class map for priority before beginning this procedure.

SUMMARY STEPS

1. configure terminal 2. policy-map policy name 3. class class name 4. priority [Kb/s [burst_in_bytes] | level level_value [Kb/s [burst_in_bytes] | percent percentage
[burst_in_bytes] ] | percent percentage [burst_in_bytes] ] 5. end 6. show policy-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

policy-map policy name Example:
Switch(config)# policy-map policy_priority01 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 982

QoS Configuring Priority (CLI)

Step 3 Step 4

Command or Action class class name Example:
Switch(config-pmap)# class class_priority01 Switch(config-pmap-c)#

Purpose
Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name.
· class-default--System default class matching any otherwise unclassified packets.

priority [Kb/s [burst_in_bytes] | level level_value [Kb/s (Optional) The priority command assigns a strict scheduling

[burst_in_bytes] | percent percentage [burst_in_bytes] ] | priority for the class.

percent percentage [burst_in_bytes] ]

The command options include:

Example:

· Kb/s--Specifies the kilobits per second (from 1 to

Switch(config-pmap-c)# priority level 1

2000000).

Switch(config-pmap-c)#

· burst_in_bytes--Specifies the burst in bytes (from

32 to 2000000).

· level level_value--Specifies the multilevel (1-2) priority queue.
· Kb/s--Specifies the kilobits per second (from 1 to 2000000).
· burst_in_bytes--Specifies the burst in bytes (from 32 to 2000000).

· percent--Percentage of the total bandwidth.
· burst_in_bytes--Specifies the burst in bytes (from 32 to 2000000).

· percent--Percentage of the total bandwidth.
· burst_in_bytes--Specifies the burst in bytes (32 to 2000000).

Step 5

end Example:
Switch(config-pmap-c)# end Switch#

Note Priority level 1 is more important than priority level 2. Priority level 1 reserves bandwidth that is processed first for QoS, so its latency is very low. Both priority level 1 and 2 reserve bandwidth.
Saves configuration changes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 983

QoS Configuring Queues and Shaping

Step 6

Command or Action show policy-map Example:
Switch# show policy-map

Purpose
(Optional) Displays policy configuration information for all classes configured for all service policies.

What to do next Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command. Related Topics
Priority Queues, on page 929
Configuring Queues and Shaping
Configuring Egress Queue Characteristics
Depending on the complexity of your network and your QoS solution, you may need to perform all of the procedures in this section. You need to make decisions about these characteristics:
· Which packets are mapped by DSCP, CoS, or QoS group value to each queue and threshold ID? · What drop percentage thresholds apply to the queues, and how much reserved and maximum memory
is needed for the traffic type? · How much of the fixed buffer space is allocated to the queues? · Does the bandwidth of the port need to be rate limited? · How often should the egress queues be serviced and which technique (shaped, shared, or both) should
be used?

Note You can only configure the egress queues on the switch.
Configuring Queue Buffers (CLI)
The switch allows you to allocate buffers to queues. If there is no allocation made to buffers, then they are divided equally for all queues. You can use the queue-buffer ratio to divide it in a particular ratio. Since by default DTS (Dynamic Threshold and Scaling) is active on all queues, these are soft buffers.
Note The queue-buffer ratio is supported on both wired and wireless ports, but the queue-buffer ratio cannot be configured with a queue-limit.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 984

QoS Configuring Queue Buffers (CLI)

Before you begin The following are prerequisites for this procedure:
· You should have created a class map for the queue buffer before beginning this procedure.
· You must have configured either bandwidth, shape, or priority on the policy map prior to configuring the queue buffers.

SUMMARY STEPS

1. configure terminal 2. policy-map policy name 3. class class name 4. bandwidth {Kb/s | percent percentage | remaining { ratio ratio value }} 5. queue-buffers {ratio ratio value} 6. end 7. show policy-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

policy-map policy name Example:
Switch(config)# policy-map policy_queuebuffer01 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Step 3 Step 4

class class name Example:
Switch(config-pmap)# class class_queuebuffer01 Switch(config-pmap-c)#

Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name.
· class-default--System default class matching any otherwise unclassified packets.

bandwidth {Kb/s | percent percentage | remaining { ratio Configures the bandwidth for the policy map. The command

ratio value }}

parameters include:

Example:
Switch(config-pmap-c)# bandwidth percent 80

· Kb/s--Use this command to configure a specific value. The range is 20000 to 10000000.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 985

QoS Configuring Queue Buffers (CLI)

Step 5 Step 6

Command or Action
Switch(config-pmap-c)#
queue-buffers {ratio ratio value} Example:
Switch(config-pmap-c)# queue-buffers ratio 10 Switch(config-pmap-c)#
end Example:
Switch(config-pmap-c)# end Switch#

Purpose
· percent--Allocates a minimum bandwidth to a particular class using a percentage. The queue can oversubscribe bandwidth in case other queues do not utilize the entire port bandwidth. The total sum cannot exceed 100 percent, and in case it is less than 100 percent, the rest of the bandwidth is equally divided along all bandwidth queues.
· remaining--Allocates a minimum bandwidth to a particular class. The queue can oversubscribe bandwidth in case other queues do not utilize entire port bandwidth. The total sum cannot exceed 100 percent. It is preferred to use this command when the priority command is used for certain queues in the policy. You can also assign ratios rather than a percentage to each queue; the queues will be assigned certain weights that are inline with these ratios. Ratios can range from 0 to 100. Total bandwidth ratio allocation for the policy in this case can exceed 100.
Note You cannot mix bandwidth types on a policy map.
Configures the relative buffer size for the queue.
Note The sum of all configured buffers in a policy must be less than or equal to 100 percent. Unallocated buffers are are evenly distributed to all the remaining queues. Ensure sufficient buffers are allocated to all queues including the priority queues.
Note Protocol Data Units(PDUs) for network control protocols such as spanning-tree and LACP utilize the priority queue or queue 0 (when a priority queue is not configured). Ensure sufficient buffers are allocated to these queues for the protocols to function.
Saves configuration changes.

Step 7

show policy-map Example:
Switch# show policy-map

(Optional) Displays policy configuration information for all classes configured for all service policies.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 986

QoS Configuring Queue Limits (CLI)

What to do next
Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command.
Related Topics Queue Buffer Allocation, on page 930 Examples: Queue Buffers Configuration, on page 1005
Configuring Queue Limits (CLI)
You use queue limits to configure Weighted Tail Drop (WTD). WTD ensures the configuration of more than one threshold per queue. Each class of service is dropped at a different threshold value to provide for QoS differentiation. With the switch, each queue has 3 explicit programmable threshold classes--0, 1, 2. Therefore, the enqueue/drop decision of each packet per queue is determined by the packet's threshold class assignment, which is determined by the DSCP, CoS, or QoS group field of the frame header.
WTD also uses a soft limit, and therefore you are allowed to configure the queue limit to up to 400 percent (maximum four times the reserved buffer from common pool). This soft limit prevents overrunning the common pool without impacting other features.

Note You can only configure queue limits on the switch egress queues on wired ports.

Before you begin The following are prerequisites for this procedure:
· You should have created a class map for the queue limits before beginning this procedure.
· You must have configured either bandwidth, shape, or priority on the policy map prior to configuring the queue limits.

SUMMARY STEPS

1. configure terminal 2. policy-map policy name 3. class class name 4. bandwidth {Kb/s | percent percentage | remaining { ratio ratio value }} 5. queue-limit {packets packets | cos {cos value { maximum threshold value | percent percentage } | values
{cos value | percent percentage } } | dscp {dscp value {maximum threshold value | percent percentage} | match packet {maximum threshold value | percent percentage} | default {maximum threshold value | percent percentage} | ef {maximum threshold value | percent percentage} | dscp values dscp value} | percent percentage }} 6. end 7. show policy-map

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 987

QoS Configuring Queue Limits (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

policy-map policy name Example:
Switch(config)# policy-map policy_queuelimit01 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Step 3 Step 4

class class name Example:
Switch(config-pmap)# class class_queuelimit01 Switch(config-pmap-c)#

Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name.
· class-default--System default class matching any otherwise unclassified packets.

bandwidth {Kb/s | percent percentage | remaining { ratio Configures the bandwidth for the policy map. The

ratio value }}

parameters include:

Example:
Switch(config-pmap-c)# bandwidth 500000 Switch(config-pmap-c)#

· Kb/s--Use this command to configure a specific value. The range is 20000 to 10000000.
· percent--Allocates a minimum bandwidth to a particular class. The queue can oversubscribe bandwidth in case other queues do not utilize the entire port bandwidth. The total sum cannot exceed 100 percent, and in case it is less than 100 percent, the rest of the bandwidth is equally divided along all bandwidth queues.

· remaining--Allocates a minimum bandwidth to a particular class. The queue can oversubscribe bandwidth in case other queues do not utilize entire port bandwidth. The total sum cannot exceed 100 percent. It is preferred to use this command when the priority command is used for certain queues in the policy. You can also assign ratios rather than a percentage to each queue; the queues will be assigned certain weights that are inline with these ratios. Ratios can range from 0 to 100. Total bandwidth ratio allocation for the policy in this case can exceed 100.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 988

QoS Configuring Shaping (CLI)

Step 5

Command or Action

Purpose
Note You cannot mix bandwidth types on a policy map.

queue-limit {packets packets | cos {cos value { maximum Sets the queue limit threshold percentage values.

threshold value | percent percentage } | values {cos value | percent percentage } } | dscp {dscp value {maximum threshold value | percent percentage} | match packet {maximum threshold value | percent percentage} | default {maximum threshold value | percent percentage} | ef {maximum threshold value | percent percentage} | dscp values dscp value} | percent percentage }}

With every queue, there are three thresholds (0,1,2), and there are default values for each of these thresholds. Use this command to change the default or any other queue limit threshold setting. For example, if DSCP 3, 4, and 5 packets are being sent into a specific queue in a configuration, then you can use this command to set the threshold percentages for these three DSCP values. For additional information

Example:

about queue limit threshold values, see Weighted Tail Drop,

on page 928.

Switch(config-pmap-c)# queue-limit dscp 3 percent Note 20
Switch(config-pmap-c)# queue-limit dscp 4 percent 30
Switch(config-pmap-c)# queue-limit dscp 5 percent 40

The switch does not support absolute queue-limit percentages. The switch only supports DSCP or CoS queue-limit percentages.

Step 6

end Example:
Switch(config-pmap-c)# end Switch#

Saves configuration changes.

Step 7

show policy-map Example:
Switch# show policy-map

(Optional) Displays policy configuration information for all classes configured for all service policies.

What to do next
Proceed to configure any additional policy maps for QoS for your network. After creating your policy maps, proceed to attach the traffic policy or polices to an interface using the service-policy command.
Related Topics Weighted Tail Drop, on page 928 Examples: Queue-limit Configuration, on page 1004
Configuring Shaping (CLI)
You use the shape command to configure shaping (maximum bandwidth) for a particular class. The queue's bandwidth is restricted to this value even though the port has additional bandwidth left. You can configure shaping as an average percent, as well as a shape average value in bits per second.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 989

QoS Configuring Shaping (CLI)

Before you begin You should have created a class map for shaping before beginning this procedure.

SUMMARY STEPS

1. configure terminal 2. policy-map policy name 3. class class name 4. shape average {target bit rate | percent percentage} 5. end 6. show policy-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

policy-map policy name Example:
Switch(config)# policy-map policy_shaping01 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.

Step 3 Step 4

class class name Example:
Switch(config-pmap)# class class_shaping01 Switch(config-pmap-c)#

Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Command options for policy class map configuration mode include the following:
· word--Class map name.
· class-default--System default class matching any otherwise unclassified packets.

shape average {target bit rate | percent percentage} Example:
Switch(config-pmap-c)# shape average percent 50 Switch(config-pmap-c)#

Configures the average shape rate. You can configure the average shape rate by target bit rates (bits per second) or by percentage of interface bandwidth for the Committed Information Rate (CIR).

Step 5

end Example:
Switch(config-pmap-c)# end

Saves configuration changes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 990

QoS Configuring Precious Metal Policies (CLI)

Command or Action
Switch#

Step 6

show policy-map Example:
Switch# show policy-map

Purpose
(Optional) Displays policy configuration information for all classes configured for all service policies.

What to do next
Configure any additional policy maps for QoS for your network. After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command.
Related Topics Average Rate Shaping, on page 926 Examples: Average Rate Shaping Configuration, on page 1004 Hierarchical Shaping, on page 926

Configuring Precious Metal Policies (CLI)
You can configure precious metal QoS policies on a per-WLAN basis.

SUMMARY STEPS

1. configure terminal 2. wlan wlan-name 3. service-policy output policy-name 4. end 5. show wlan {wlan-id | wlan-name}

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

wlan wlan-name Example:
Switchwlan test4

Enters the WLAN configuration submode.

Step 3

service-policy output policy-name

Configures the WLAN with the QoS policy. To configure

Example:

the WLAN with precious metal policies, you must enter one of the following keywords: platinum, gold, silver, or

bronze. The upstream policy is specified with the keyword Switch(config-wlan)# service-policy output platinum platinum-up as shown in the example.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 991

QoS Configuring QoS Policies for Multicast Traffic (CLI)

Step 4 Step 5

Command or Action Example:
Switch(config-wlan)# service-policy input platinum-up
end Example:
Switch(config)# end
show wlan {wlan-id | wlan-name} Example:
Switch# show wlan name qos-wlan

Purpose Note Upstream policies differ from downstream
policies. The upstream policies have a suffix of -up.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit the global configuration mode.

Verifies the configured QoS policy on the WLAN.

Switch# show wlan name qos-wlan ... ... ...

QoS Service Policy - Input

Policy Name

:

platinum-up

Policy State

:

Validated

QoS Service Policy - Output

Policy Name

:

platinum

Policy State

:

Validated

...

...

Related Topics Precious Metal Policies for Wireless QoS, on page 934

Configuring QoS Policies for Multicast Traffic (CLI)

Before you begin The following are the prerequisites for configuring a QoS policy for multicast traffic:
· You must have a multicast service policy configured. · You must enable multicast-multicast mode before applying the policy.

SUMMARY STEPS

1. configure terminal 2. ap capwap multicast service-policy output service-policy-name 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 992

QoS Applying a QoS Policy on a WLAN (GUI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap capwap multicast service-policy output service-policy-name

Applies the configured multicast policy.

Example:

Switch(config)#ap capwap multicast service-policy output service-policy-mcast

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Wireless QoS Multicast, on page 920 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000

Applying a QoS Policy on a WLAN (GUI)

Step 1 Step 2
Step 3 Step 4

Choose Configuration > Wireless. Expand the WLAN node by clicking on the left pane and choose WLANs. The WLANs page is displayed.

Select the WLAN for which you want to configure the QoS policies by clicking on the WLAN Profile. Click the QoS tab to configure the QoS policies on the WLAN. The following options are available:

Parameter
QoS SSID Policy
Downstream QoS Policy

Description
QoS downstream policy configuration. The Existing Policy column displays the current applied policy. To change the existing policy, select the policy from the drop-down list in the Assign Policy column.

Upstream QoS Policy QoS upstream policy configuration.
The Existing Policy column displays the current applied policy. To change the existing policy, select the policy from the drop-down list in the Assign Policy column.

QoS Client Policy

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 993

QoS Monitoring QoS

Parameter
Downstream QoS Policy

Description
QoS downstream policy configuration.
The Existing Policy column displays the current applied policy. To change the existing policy, select the policy from the drop-down list in the Assign Policy column.

Upstream QoS Policy QoS upstream policy configuration.
The Existing Policy column displays the current applied policy. To change the existing policy, select the policy from the drop-down list in the Assign Policy column.

WMM WMM Policy

WMM Policy. Values are the following: · Disabled--Disables this WMM policy.
· Allowed--Allows the clients to communicate with the WLAN.
· Required--Ensures that it is mandatory for the clients to have WMM features enabled on them to communicate with the WLAN.

Step 5 Click Apply.
Related Topics Port Policies, on page 907 Port Policy Format, on page 907 Restrictions for QoS on Wireless Targets, on page 939 Supported QoS Features on Wireless Targets, on page 906 Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic, on page 1000 SSID Policies, on page 909 Examples: SSID Policy Examples: Configuring Downstream SSID Policy, on page 1001 Client Policies, on page 910 Examples: Client Policies, on page 1002

Monitoring QoS
The following commands can be used to monitor QoS on the switch. Note Classification counters and statistics are not supported for any wireless targets.

Table 88: Monitoring QoS
Command show class-map [class_map_name]

Description
Displays a list of all class maps configured.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 994

QoS Monitoring QoS

Command show policy-map [policy_map_name]

Description
Displays a list of all policy maps configured. Command parameters include:
· policy map name
· interface
· session

show policy-map interface { Auto-template | Capwap |

Shows the runtime representation

GigabitEthernet | GroupVI | InternalInterface | Loopback | Null | and statistics of all the policies

Port-channel | TenGigabitEthernet | Tunnel | Vlan | Brief | class | configured on the switch. Command

input | output | wireless }

parameters include:

· Auto-template--Auto-Template interface

· Capwap--CAPWAP tunnel interface

· GigabitEthernet--Gigabit Ethernet IEEE.802.3z

· GroupVI--Group virtual interface

· InternalInterface--Internal interface

· Loopback--Loopback interface

· Null--Null interface

· Port-channel--Ethernet channel of interfaces

· TenGigabitEthernet--10-Gigabit Ethernet

· Tunnel--Tunnel interface

· Vlan--Catalyst VLANs

· Brief--Brief description of policy maps

· Class--Show statistics for individual class

· Input--Input policy

· Output--Output policy

· Wireless--wireless

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 995

QoS Configuration Examples for QoS

Command show policy-map interface wireless ap [access point] show policy-map interface wireless ssid [ssid] show policy-map interface wireless client [client] show policy-map session [ input | output | uid UUID ]

Description
Shows the runtime representation and statistics for all the wireless APs on the switch.
Shows the runtime representation and statistics for all the SSID targets on the switch.
Shows the runtime representation and statistics for all the client targets on the switch.
Shows the session QoS policy. Command parameters include:
· input--Input policy
· output--Output policy
· uid--Policy based on SSS unique identification.

show table-map

Displays all the table maps and their configurations.

show policy-map interface wireless ssid name ssid-name radio type Displays SSID policy configuration

{24ghz | 5ghz} ap name ap-name

on an access point.

Configuration Examples for QoS
Examples: Classification by Access Control Lists
This example shows how to classify packets for QoS by using access control lists (ACLs):
Switch# configure terminal Switch(config)# access-list 101 permit ip host 12.4.1.1 host 15.2.1.1 Switch(config)# class-map acl-101 Switch(config-cmap)# description match on access-list 101 Switch(config-cmap)# match access-group 101 Switch(config-cmap)#
After creating a class map by using an ACL, you then create a policy map for the class, and apply the policy map to an interface for QoS. Related Topics
Creating a Traffic Class (CLI), on page 942 Class Maps, on page 918

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 996

QoS Examples: Class of Service Layer 2 Classification
Examples: Class of Service Layer 2 Classification
This example shows how to classify packets for QoS using a class of service Layer 2 classification:
Switch# configure terminal Switch(config)# class-map cos Switch(config-cmap)# match cos ?
<0-7> Enter up to 4 class-of-service values separated by white-spaces Switch(config-cmap)# match cos 3 4 5 Switch(config-cmap)#
After creating a class map by using a CoS Layer 2 classification, you then create a policy map for the class, and apply the policy map to an interface for QoS.
Examples: Class of Service DSCP Classification
This example shows how to classify packets for QoS using a class of service DSCP classification:
Switch# configure terminal Switch(config)# class-map dscp Switch(config-cmap)# match dscp af21 af22 af23 Switch(config-cmap)#
After creating a class map by using a DSCP classification, you then create a policy map for the class, and apply the policy map to an interface for QoS.
Examples: VLAN ID Layer 2 Classification
This example shows how to classify for QoS using a VLAN ID Layer 2 classification:
Switch# configure terminal Switch(config)# class-map vlan-120 Switch(config-cmap)# match vlan ?
<1-4095> VLAN id Switch(config-cmap)# match vlan 120 Switch(config-cmap)#
After creating a class map by using a VLAN Layer 2 classification, you then create a policy map for the class, and apply the policy map to an interface for QoS.
Examples: Classification by DSCP or Precedence Values
This example shows how to classify packets by using DSCP or precedence values:
Switch# configure terminal Switch(config)# class-map prec2 Switch(config-cmap)# description matching precedence 2 packets Switch(config-cmap)# match ip precedence 2 Switch(config-cmap)# exit Switch(config)# class-map ef Switch(config-cmap)# description EF traffic
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 997

QoS Examples: Hierarchical Classification
Switch(config-cmap)# match ip dscp ef Switch(config-cmap)#
After creating a class map by using a DSCP or precedence values, you then create a policy map for the class, and apply the policy map to an interface for QoS.
Examples: Hierarchical Classification
The following is an example of a hierarchical classification, where a class named parent is created, which matches another class named child. The class named child matches based on the IP precedence being set to 2.
Switch# configure terminal Switch(config)# class-map child Switch(config-cmap)# match ip precedence 2 Switch(config-cmap)# exit Switch(config)# class-map parent Switch(config-cmap)# match class child Switch(config-cmap)#
After creating the parent class map, you then create a policy map for the class, and apply the policy map to an interface for QoS. Related Topics
Hierarchical QoS, on page 911
Examples: Hierarchical Policy Configuration
The following is an example of a configuration using hierarchical polices:
Switch# configure terminal Switch(config)# class-map c1 Switch(config-cmap)# match dscp 30 Switch(config-cmap)# exit
Switch(config)# class-map c2 Switch(config-cmap)# match precedence 4 Switch(config-cmap)# exit
Switch(config)# class-map c3 Switch(config-cmap)# exit
Switch(config)# policy-map child Switch(config-pmap)# class c1 Switch(config-pmap-c)# priority level 1 Switch(config-pmap-c)# police rate percent 20 conform-action transmit exceed action drop Switch(config-pmap-c-police)# exit Switch(config-pmap-c)# exit
Switch(config-pmap)# class c2 Switch(config-pmap-c)# bandwidth 20000 Switch(config-pmap-c)# exit Switch(config-pmap)# class class-default Switch(config-pmap-c)# bandwidth 20000 Switch(config-pmap-c)# exit
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 998

QoS Examples: Classification for Voice and Video
Switch(config-pmap)# exit
Switch(config)# policy-map parent Switch(config-pmap)# class class-default Switch(config-pmap-c)# shape average 1000000 Switch(config-pmap-c)# service-policy child Switch(config-pmap-c)# end
Related Topics Hierarchical QoS, on page 911
Examples: Classification for Voice and Video
This example describes how to classify packet streams for voice and video using switch specific information. In this example, voice and video are coming in from end-point A into GigabitEthernet1/0/1 on the switch and have precedence values of 5 and 6, respectively. Additionally, voice and video are also coming from end-point B into GigabitEthernet1/0/2 on the switch with DSCP values of EF and AF11, respectively. Assume that all the packets from the both the interfaces are sent on the uplink interface, and there is a requirement to police voice to 100 Mbps and video to 150 Mbps. To classify per the above requirements, a class to match voice packets coming in on GigabitEthernet1/0/1 is created, named voice-interface-1, which matches precedence 5. Similarly another class for voice is created, named voice-interface-2, which will match voice packets in GigabitEthernet1/0/2. These classes are associated to two separate policies named input-interface-1, which is attached to GigabitEthernet1/0/1, and input-interface-2, which is attached to GigabitEthernet1/0/2. The action for this class is to mark the qos-group to 10. To match packets with QoS-group 10 on the output interface, a class named voice is created which matches on QoS-group 10. This is then associated to another policy named output-interface, which is associated to the uplink interface. Video is handled in the same way, but matches on QoS-group 20. The following example shows how classify using the above switch specific information:
Switch(config)# Switch(config)# class-map voice-interface-1 Switch(config-cmap)# match ip precedence 5 Switch(config-cmap)# exit
Switch(config)# class-map video-interface-1 Switch(config-cmap)# match ip precedence 6 Switch(config-cmap)# exit
Switch(config)# class-map voice-interface-2 Switch(config-cmap)# match ip dscp ef Switch(config-cmap)# exit
Switch(config)# class-map video-interface-2 Switch(config-cmap)# match ip dscp af11 Switch(config-cmap)# exit
Switch(config)# policy-map input-interface-1 Switch(config-pmap)# class voice-interface-1 Switch(config-pmap-c)# set qos-group 10 Switch(config-pmap-c)# exit
Switch(config-pmap)# class video-interface-1 Switch(config-pmap-c)# set qos-group 20
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 999

QoS Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic
Switch(config-pmap-c)# policy-map input-interface-2 Switch(config-pmap)# class voice-interface-2 Switch(config-pmap-c)# set qos-group 10 Switch(config-pmap-c)# class video-interface-2 Switch(config-pmap-c)# set qos-group 20 Switch(config-pmap-c)# exit Switch(config-pmap)# exit
Switch(config)# class-map voice Switch(config-cmap)# match qos-group 10 Switch(config-cmap)# exit
Switch(config)# class-map video Switch(config-cmap)# match qos-group 20
Switch(config)# policy-map output-interface Switch(config-pmap)# class voice Switch(config-pmap-c)# police 256000 conform-action transmit exceed-action drop Switch(config-pmap-c-police)# exit Switch(config-pmap-c)# exit
Switch(config-pmap)# class video Switch(config-pmap-c)# police 1024000 conform-action transmit exceed-action drop Switch(config-pmap-c-police)# exit Switch(config-pmap-c)# exit
Examples: Wireless QoS Policy Classified by Voice, Video, and Multicast Traffic
The following example provides a template for creating a port child policy for managing quality of service for voice and video traffic.
Policy-map port_child_policy Class voice (match dscp ef) Priority level 1 Police Multicast Policer Class video (match dscp af41) Priority level 2 Police Multicast Policer Class mcast-data (match non-client-nrt) Bandwidth remaining ratio <> Class class-default (NRT Data) Bandwidth remaining ratio <>
Note Multicast Policer in the example above is not a keyword. It refers to the policing policy configured.
Two class maps with name voice and video are configured with DSCP assignments of 46 and 34. The voice traffic is assigned the priority of 1 and the video traffic is assigned the priority level 2 and is processed using Q0 and Q1. If your network receives multicast voice and video traffic, you can configure multicast policers. The non-client NRT data and NRT data are processed using the Q2 and Q3 queues. Related Topics
Applying a QoS Policy on a WLAN (GUI), on page 993 Port Policies, on page 907
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1000

QoS Examples: Configuring Downstream SSID Policy
Port Policy Format, on page 907 Configuring QoS Policies for Multicast Traffic (CLI), on page 992 Wireless QoS Multicast, on page 920
Examples: Configuring Downstream SSID Policy
To configure a downstream BSSID policy, you must first configure a port child policy with priority level queuing.
Configuring a User-Defined Port Child Policy The following is an example of configuring a user-defined port child policy:
policy-map port_child_policy class voice priority level 1 20000
class video priority level 2 10000
class non-client-nrt-class bandwidth remaining ratio 10
class class-default bandwidth remaining ratio 15
Configuring Downstream BSSID Policy The following configuration example displays how to configure a downstream BSSID policy:
policy-map bssid-policer queue-buffer ratio 0 class class-default shape average 30000000
set dscp dscp table dscp2dscp set wlan user-priority dscp table dscp2up service-policy ssid_child_qos
The SSID child QoS policy may be defined as below:
Policy Map ssid-child_qos Class voice priority level 1 police cir 5m admit cac wmm-tspec UP 6,7 / tells WCM allow `voice' TSPEC\SIP snoop for this ssid rate 4000 / must be police rate value is in kbps)
Class video priority level 2 police cir 60000
Related Topics Applying an SSID or Client Policy on a WLAN (CLI), on page 959 Configuring SSID Policies (GUI), on page 958
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1001

QoS Examples: Client Policies
Applying a QoS Policy on a WLAN (GUI), on page 993 SSID Policies, on page 909
Examples: Client Policies
The following example shows a default client policy in the downstream direction. Any incoming traffic contains the user-priority as 0:
Note The default client policy is enabled only on WMM clients that are ACM-enabled.
Policy-map client-def-down class class-default set wlan user-priority 0
The following example shows the default client policy in the upstream direction. Any traffic that is sent to the wired network from wireless network will result in the DSCP value being set to 0.
Note The default client policy is enabled only on WMM clients that are ACM-enabled.
Policy-map client-def-up class class-default set dscp 0
The following examples shows client policies that are generated automatically and applied to the WMM client when the client authenticates to a profile in AAA with a QoS-level attribute configured.
Policy Map platinum-WMM Class voice-plat
set wlan user-priority 6 Class video-plat set wlan user-priority 4 Class class-default
set wlan user-priority 0
Policy Map gold-WMM Class voice-gold
set wlan user-priority 4 Class video-gold set wlan user-priority 4 Class class-default
set wlan user-priority 0
The following is an example of non-WMM client precious metal policies:
Policy Map platinum set wlan user-priority 6
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1002

QoS Examples: Client Policies

Any traffic matching class voice1 the user priority is set to a pre-defined value. The class can be set to assign a DSCP or ACL.

Policy Map client1-down

Class voice1

//match dscp, cos

set wlan user-priority <>

Class voice2 //match acl

set wlan user-priority <>

Class voice3

set wlan user-priority <>

Class class-default

set wlan user-priority 0

The following is an example of a client policy based on AAA and TCLAS:

Policy Map client2-down[ AAA+ TCLAS pol example]

Class

voice\\match dscp

police <>

set <>

Class class-default

set <>

Class voice1|| voice2 [match acls]

police <>

class voice1

set <>

class voice2

set <>

The following is an example of a client policy for voice and video for traffic in the downstream direction:

Policy Map client3-down class voice \\match dscp, cos police X class video police Y class class-default police Z
The following is an example of a client policy for voice and video for traffic in the upstream direction using policing:

Policy Map client1-up

class voice

\\match dscp, up, cos

police X

class video

police Y

class class-default

police Z

The following is an example of a client policy for voice and video based on DSCP:

Policy Map client2-up

class voice

\\match dscp, up, cos

set dscp <>

class video

set dscp <>

class class-default

set dscp <>

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1003

QoS Examples: Average Rate Shaping Configuration
Related Topics Configuring Client Policies (CLI) Configuring Client Policies (GUI), on page 949 Applying a QoS Policy on a WLAN (GUI), on page 993 Client Policies, on page 910
Examples: Average Rate Shaping Configuration
The following example shows how to configure average rate shaping:
Switch# configure terminal Switch(config)# class-map prec1 Switch(config-cmap)# description matching precedence 1 packets Switch(config-cmap)# match ip precedence 1 Switch(config-cmap)# end
Switch# configure terminal Switch(config)# class-map prec2 Switch(config-cmap)# description matching precedence 2 packets Switch(config-cmap)# match ip precedence 2 Switch(config-cmap)# exit
Switch(config)# policy-map shaper Switch(config-pmap)# class prec1 Switch(config-pmap-c)# shape average 512000 Switch(config-pmap-c)# exit
Switch(config-pmap)# policy-map shaper Switch(config-pmap)# class prec2 Switch(config-pmap-c)# shape average 512000 Switch(config-pmap-c)# exit
Switch(config-pmap)# class class-default Switch(config-pmap-c)# shape average 1024000
After configuring the class maps, policy map, and shape averages for your configuration, proceed to then apply the policy map to the interface for QoS. Related Topics
Configuring Shaping (CLI), on page 989 Average Rate Shaping, on page 926
Examples: Queue-limit Configuration
The following example shows how to configure a queue-limit policy based upon DSCP values and percentages:
Switch# configure terminal Switch#(config)# policy-map port-queue Switch#(config-pmap)# class dscp-1-2-3 Switch#(config-pmap-c)# bandwidth percent 20 Switch#(config-pmap-c)# queue-limit dscp 1 percent 80 Switch#(config-pmap-c)# queue-limit dscp 2 percent 90 Switch#(config-pmap-c)# queue-limit dscp 3 percent 100 Switch#(config-pmap-c)# exit
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1004

QoS Examples: Queue Buffers Configuration
Switch#(config-pmap)# class dscp-4-5-6 Switch#(config-pmap-c)# bandwidth percent 20 Switch#(config-pmap-c)# queue-limit dscp 4 percent 20 Switch#(config-pmap-c)# queue-limit dscp 5 percent 30 Switch#(config-pmap-c)# queue-limit dscp 6 percent 20 Switch#(config-pmap-c)# exit
Switch#(config-pmap)# class dscp-7-8-9 Switch#(config-pmap-c)# bandwidth percent 20 Switch#(config-pmap-c)# queue-limit dscp 7 percent 20 Switch#(config-pmap-c)# queue-limit dscp 8 percent 30 Switch#(config-pmap-c)# queue-limit dscp 9 percent 20 Switch#(config-pmap-c)# exit
Switch#(config-pmap)# class dscp-10-11-12 Switch#(config-pmap-c)# bandwidth percent 20 Switch#(config-pmap-c)# queue-limit dscp 10 percent 20 Switch#(config-pmap-c)# queue-limit dscp 11 percent 30 Switch#(config-pmap-c)# queue-limit dscp 12 percent 20 Switch#(config-pmap-c)# exit
Switch#(config-pmap)# class dscp-13-14-15 Switch#(config-pmap-c)# bandwidth percent 10 Switch#(config-pmap-c)# queue-limit dscp 13 percent 20 Switch#(config-pmap-c)# queue-limit dscp 14 percent 30 Switch#(config-pmap-c)# queue-limit dscp 15 percent 20 Switch#(config-pmap-c)# end Switch#
After finishing with the above policy map queue-limit configuration, you can then proceed to apply the policy map to an interface for QoS. Related Topics
Configuring Queue Limits (CLI), on page 987 Weighted Tail Drop, on page 928
Examples: Queue Buffers Configuration
The following example shows how configure a queue buffer policy and then apply it to an interface for QoS:
Switch# configure terminal Switch(config)# policy-map policy1001 Switch(config-pmap)# class class1001 Switch(config-pmap-c)# bandwidth remaining ratio 10 Switch(config-pmap-c)# queue-buffer ratio ?
<0-100> Queue-buffers ratio limit Switch(config-pmap-c)# queue-buffer ratio 20 Switch(config-pmap-c)# end
Switch# configure terminal Switch(config)# interface gigabitEthernet2/0/3 Switch(config-if)# service-policy output policy1001 Switch(config-if)# end
Related Topics Configuring Queue Buffers (CLI), on page 984
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1005

QoS Examples: Policing Action Configuration
Queue Buffer Allocation, on page 930
Examples: Policing Action Configuration
The following example displays the various policing actions that can be associated to the policer. These actions are accomplished using the conforming, exceeding, or violating packet configurations. You have the flexibility to drop, mark and transmit, or transmit packets that have exceeded or violated a traffic profile. For example, a common deployment scenario is one where the enterprise customer polices traffic exiting the network towards the service provider and marks the conforming, exceeding and violating packets with different DSCP values. The service provider could then choose to drop the packets marked with the exceeded and violated DSCP values under cases of congestion, but may choose to transmit them when bandwidth is available.
Note The Layer 2 fields can be marked to include the CoS fields, and the Layer 3 fields can be marked to include the precedence and the DSCP fields.
One useful feature is the ability to associate multiple actions with an event. For example, you could set the precedence bit and the CoS for all conforming packets. A submode for an action configuration could then be provided by the policing feature. This is an example of a policing action configuration:
Switch# configure terminal Switch(config)# policy-map police Switch(config-pmap)# class class-default Switch(config-pmap-c)# police cir 1000000 pir 2000000 Switch(config-pmap-c-police)# conform-action transmit Switch(config-pmap-c-police)# exceed-action set-dscp-transmit dscp table exceed-markdown-table Switch(config-pmap-c-police)# violate-action set-dscp-transmit dscp table violate-markdown-table Switch(config-pmap-c-police)# end
In this example, the exceed-markdown-table and violate-mark-down-table are table maps.
Note Policer-based markdown actions are only supported using table maps. Only one markdown table map is allowed for each marking field in the switch.
Related Topics Configuring Police (CLI), on page 979 Policing, on page 921 Token-Bucket Algorithm, on page 921
Examples: Policer VLAN Configuration
The following example displays a VLAN policer configuration. At the end of this configuration, the VLAN policy map is applied to an interface for QoS.
Switch# configure terminal
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1006

QoS Examples: Policing Units
Switch(config)# class-map vlan100 Switch(config-cmap)# match vlan 100 Switch(config-cmap)# exit Switch(config)# policy-map vlan100 Switch(config-pmap)# policy-map class vlan100 Switch(config-pmap-c)# police 100000 bc conform-action transmit exceed-action drop Switch(config-pmap-c-police)# end Switch# configure terminal Switch(config)# interface gigabitEthernet1/0/5 Switch(config-if)# service-policy input vlan100
Related Topics Classifying, Policing, and Marking Traffic on SVIs by Using Policy Maps (CLI), on page 964 Policy Map on VLANs, on page 920
Examples: Policing Units
The following examples display the various units of policing that are supported for QoS. The policing unit is the basis on which the token bucket works . The following units of policing are supported:
· CIR and PIR are specified in bits per second. The burst parameters are specified in bytes. This is the default mode; it is the unit that is assumed when no units are specified. The CIR and PIR can also be configured in percent, in which case the burst parameters have to be configured in milliseconds.
· CIR and PIR are specified in packets per second. In this case, the burst parameters are configured in packets as well.
The following is an example of a policer configuration in bits per second:
Switch(config)# policy-map bps-policer Switch(config-pmap)# class class-default Switch(config-pmap-c) # police rate 256000 bps burst 1000 bytes conform-action transmit exceed-action drop
The following is an example of a policer configuration in packets per second. In this configuration, a dual-rate three-color policer is configured where the units of measurement is packet. The burst and peak burst are all specified in packets.
Switch(config)# policy-map pps-policer Switch(config-pmap)# class class-default Switch(config-pmap-c)# police rate 5000 pps burst 100 packets peak-rate 10000 pps peak-burst 200 packets conform-action transmit exceed-action drop violate-action drop
Related Topics Configuring Police (CLI), on page 979 Token-Bucket Algorithm, on page 921
Examples: Single-Rate Two-Color Policing Configuration
The following example shows how to configure a single-rate two-color policer:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1007

QoS Examples: Dual-Rate Three-Color Policing Configuration
Switch(config)# class-map match-any prec1 Switch(config-cmap)# match ip precedence 1 Switch(config-cmap)# exit Switch(config)# policy-map policer Switch(config-pmap)# class prec1 Switch(config-pmap-c)# police cir 256000 conform-action transmit exceed-action drop Switch(config-pmap-c-police)# exit Switch(config-pmap-c)#
Related Topics Configuring Police (CLI), on page 979 Single-Rate Two-Color Policing, on page 925
Examples: Dual-Rate Three-Color Policing Configuration
The following example shows how to configure a dual-rate three-color policer:
Switch# configure terminal Switch(config)# policy-Map dual-rate-3color-policer Switch(config-pmap)# class class-default Switch(config-pmap-c)# police cir 64000 bc 2000 pir 128000 be 2000 Switch(config-pmap-c-police)# conform-action transmit Switch(config-pmap-c-police)# exceed-action set-dscp-transmit dscp table exceed-markdown-table Switch(config-pmap-c-police)# violate-action set-dscp-transmit dscp table violate-markdown-table Switch(config-pmap-c-police)# exit Switch(config-pmap-c)#
In this example, the exceed-markdown-table and violate-mark-down-table are table maps.
Note Policer based markdown actions are only supported using table maps. Only one markdown table map is allowed for each marking field in the switch.
Related Topics Configuring Police (CLI), on page 979 Dual-Rate Three-Color Policing, on page 925
Examples: Table Map Marking Configuration
The following steps and examples show how to use table map marking for your QoS configuration: 1. Define the table map.
Define the table-map using the table-map command and indicate the mapping of the values. This table does not know of the policies or classes within which it will be used. The default command in the table map indicates the value to be copied into the `to' field when there is no matching `from' field. In the example, a table map named table-map1 is created. The mapping defined is to convert the value from 0 to 1 and from 2 to 3, while setting the default value to 4.
Switch(config)# table-map table-map1
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1008

QoS Example: Table Map Configuration to Retain CoS Markings
Switch(config-tablemap)# map from 0 to 1 Switch(config-tablemap)# map from 2 to 3 Switch(config-tablemap)# default 4 Switch(config-tablemap)# exit
2. Define the policy map where the table map will be used. In the example, the incoming CoS is mapped to the DSCP based on the mapping specified in the table table-map1. For this example, if the incoming packet has a DSCP of 0, the CoS in the packet is set 1. If no table map name is specified the command assumes a default behavior where the value is copied as is from the `from' field (DSCP in this case) to the `to' field (CoS in this case). Note however, that while the CoS is a 3-bit field, the DSCP is a 6-bit field, which implies that the CoS is copied to the first three bits in the DSCP.
Switch(config)# policy map policy1 Switch(config-pmap)# class class-default Switch(config-pmap-c)# set cos dscp table table-map1 Switch(config-pmap-c)# exit
3. Associate the policy to an interface.
Switch(config)# interface GigabitEthernet1/0/1 Switch(config-if)# service-policy output policy1 Switch(config-if)# exit
Related Topics Configuring Table Maps (CLI), on page 967 Table Map Marking, on page 922
Example: Table Map Configuration to Retain CoS Markings
The following example shows how to use table maps to retain CoS markings on an interface for your QoS configuration. The cos-trust-policy policy (configured in the example) is enabled in the ingress direction to retain the CoS marking coming into the interface. If the policy is not enabled, only the DSCP is trusted by default. If a pure Layer 2 packet arrives at the interface, then the CoS value will be rewritten to 0 when there is no such policy in the ingress port for CoS.
Switch# configure terminal Switch(config)# table-map cos2cos Switch(config-tablemap)# default copy Switch(config-tablemap)# exit
Switch(config)# policy map cos-trust-policy Switch(config-pmap)# class class-default Switch(config-pmap-c)# set cos cos table cos2cos Switch(config-pmap-c)# exit
Switch(config)# interface GigabitEthernet1/0/2 Switch(config-if)# service-policy input cos-trust-policy
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1009

QoS Where to Go Next

Switch(config-if)# exit
Related Topics Trust Behavior for Wired and Wireless Ports, on page 931

Where to Go Next
Review the auto-QoS documentation to see if you can use these automated capabilities for your QoS configuration.

Additional References for QoS

Related Documents

Related Topic

Document Title

For complete syntax and usage information QoS Command Reference (Catalyst 3650 Switches)

for the commands used in this chapter.

Cisco IOS Quality of Service Solutions Command Reference

Call Admission Control (CAC)

System Management Configuration Guide (Catalyst 3650 Switches)
System Management Command Reference (Catalyst 3650 Switches)

Multicast Shaping and Policing Rate Precious Metal Policies

IP Multicast Routing Configuration Guide (Catalyst 3650 Switches)
Cisco Wireless LAN Controller Configuration Guide.

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title --

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1010

QoS Feature History and Information for QoS

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for QoS

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1011

QoS Feature History and Information for QoS
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1012

5 7 C H A P T E R
Configuring Auto-QoS
· Finding Feature Information, on page 1013 · Prerequisites for Auto-QoS, on page 1013 · Restrictions for Auto-QoS, on page 1013 · Information About Configuring Auto-QoS, on page 1014 · How to Configure Auto-QoS, on page 1016 · Monitoring Auto-QoS, on page 1020 · Troubleshooting Auto-QoS, on page 1021 · Configuration Examples for Auto-QoS, on page 1021 · Where to Go Next for Auto-QoS, on page 1050 · Additional References for Auto-QoS, on page 1050 · Feature History and Information for Auto-QoS, on page 1051
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Auto-QoS
The prerequisites for auto-QoS are the same as the prerequisites for standard QoS.
Restrictions for Auto-QoS
The following are restrictions for auto-QoS: · Auto-qos is not supported on SVI interfaces. · The trust device device_type command available in interface configuration mode is a stand-alone command on the switch. When using this command, if the connected peer device is not a corresponding
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1013

QoS Information About Configuring Auto-QoS
device (defined as a device matching your trust policy), both CoS and DSCP values are set to "0" and any input policy will not take effect. If the connected peer device is a corresponding device, input policy will take effect. · You must exercise caution when copying a pre-3.2.2 software version to this switch. If you do copy a pre-3.2.2 software version to this switch, then you must follow the auto-QoS upgrade procedure described later in this chapter. · Do not configure the auto qos voip cisco-phone option for IP phones that support video. This option causes DSCP markings of video packets to get overwritten, because these packets do not have Expedited Forwarding priority, which results in these packets getting classified in the class-default class. · Auto-QoS does not generate configuration when it is pushed from the startup-configuration using the auto qos voip cisco-phone command to the running-configuration. This is expected behavior and this is to prevent overwriting of user-created customized QoS policies by the default configuration, if any, every time the command auto qos voip cisco-phone is pushed from the startup-config. You can use any of the following workarounds for this limitation:
· Configure the auto qos voip cisco-phone command manually on the switch interfaces. · For new switches, if you push auto-QoS commands through startup-config, the command should
include each of the following as part of the standard template 1. Interface-level:
· trust device cisco-phone · auto qos voip cisco-phone · service-policy input AutoQos-4.0-CiscoPhone-Input-Policy · service-policy output AutoQos-4.0-Output-Policy 2. Global-level: · Class-map · Policy-map · ACL(ACE)
· If the auto qos voip cisco-phone command is already configured on an interface but policies are not being generated, disable the command from all the interfaces and reconfigure the command on each interface manually.
Related Topics Upgrading Auto-QoS (CLI), on page 1018
Information About Configuring Auto-QoS
Auto-QoS Overview
You can use the auto-QoS feature to simplify the deployment of QoS features. Auto-QoS determines the network design and enables QoS configurations so that the switch can prioritize different traffic flows. The switch employs the MQC model. This means that instead of using certain global configurations, auto-QoS applied to any interface on a switch configures several global class maps and policy maps.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1014

QoS Auto-QoS Global Configuration Templates
Auto-QoS matches traffic and assigns each matched packet to qos-groups. This allows the output policy map to put specific qos-groups into specific queues, including into the priority queue. QoS is needed in both directions, both on inbound and outbound. When inbound, the switch port needs to trust the DSCP in the packet (done by default). When outbound, the switch port needs to give voice packets "front of line" priority. If voice is delayed too long by waiting behind other packets in the outbound queue, the end host drops the packet because it arrives outside of the receive window for that packet.
Auto-QoS Global Configuration Templates
In general, an auto-QoS command generates a series of class maps that either match on ACLs or on DSCP and/or CoS values to differentiate traffic into application classes. An input policy is also generated, which matches the generated classes and in some cases, polices the classes to a set bandwidth. Eight egress-queue class maps are generated. The actual egress output policy assigns a queue to each one of these eight egress-queue class maps. The auto-QoS commands only generate templates as needed. For example, the first time any new auto-QoS command is used, global configurations that define the eight queue egress service-policy are generated. From this point on, auto-QoS commands applied to other interfaces do not generate templates for egress queuing because all auto-QoS commands rely on the same eight queue models, which have already been generated from the first time a new auto-QoS command was used.
Auto-QoS Policy and Class Maps
After entering the appropriate auto-QoS command, the following actions occur: · Specific class maps are created. · Specific policy maps (input and output) are created. · Policy maps are attached to the specified interface. · Trust level for the interface is configured.
Related Topics Configuring Auto-QoS (CLI), on page 1016
Effects of Auto-QoS on Running Configuration
When auto-QoS is enabled, the auto qos interface configuration commands and the generated global configuration are added to the running configuration. The switch applies the auto-QoS-generated commands as if the commands were entered from the CLI. An existing user configuration can cause the application of the generated commands to fail or to be overridden by the generated commands. These actions may occur without warning. If all the generated commands are successfully applied, any user-entered configuration that was not overridden remains in the running configuration. Any user-entered configuration that was overridden can be retrieved by reloading the switch without saving the current configuration to memory. If the generated commands are not applied, the previous running configuration is restored.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1015

QoS How to Configure Auto-QoS

How to Configure Auto-QoS

Configuring Auto-QoS (CLI)
For optimum QoS performance, configure auto-QoS on all the devices in your network.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. Depending on your auto-QoS configuration, use one of the following commands:
· auto qos voip {cisco-phone | cisco-softphone | trust} · auto qos video {cts | ip-camera | media-player} · auto qos classify [police] · auto qos trust {cos | dscp}
4. end 5. show auto qos interface interface-id

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:
Switch(config)# interface gigabitethernet 3/0/1

Specifies the port that is connected to a VoIP port, video device, or the uplink port that is connected to another trusted switch or router in the network interior, and enters the interface configuration mode.

Step 3

Depending on your auto-QoS configuration, use one of the The following commands enable auto-QoS for VoIP:

following commands:

· auto qos voip cisco-phone--If the port is connected

· auto qos voip {cisco-phone | cisco-softphone | trust} to a Cisco IP Phone, the QoS labels of incoming

packets are only trusted (conditional trust through

CDP) when the telephone is detected.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1016

QoS Configuring Auto-QoS (CLI)

Command or Action · auto qos video {cts | ip-camera | media-player} · auto qos classify [police] · auto qos trust {cos | dscp}
Example:
Switch(config-if)# auto qos trust dscp

Purpose Note

Do not configure the auto qos voip cisco-phone option for IP phones that support video. This option causes DSCP markings of video packets to get overwritten, because these packets do not have Expedited Forwarding priority, which results in these packets getting classified in the class-default class.

· auto qos voip cisco-softphone--The port is connected to device running the Cisco SoftPhone feature. This command generates a QoS configuration for interfaces connected to PCs running the Cisco IP SoftPhone application and mark, as well as police traffic coming from such interfaces. Ports configured with this command are considered untrusted.
· auto qos voip trust--The uplink port is connected to a trusted switch or router, and the VoIP traffic classification in the ingress packet is trusted.

The following commands enable auto-QoS for the specified video device (system, camera, or media player):
· auto qos video cts--A port connected to a Cisco Telepresence system. QoS labels of incoming packets are only trusted (conditional trust through CDP) when a Cisco TelePresence is detected.
· auto qos video ip-camera--A port connected to a Cisco video surveillance camera. QoS labels of incoming packets are only trusted (conditional trust through CDP) when a Cisco camera is detected.
· auto qos video media-player--A port connected to a CDP-capable Cisco digital media player. QoS labels of incoming packets are only trusted (conditional trust through CDP) when a digital media player is detected.

The following command enables auto-QoS for classification:
· auto qos classify police-- This command generates a QoS configuration for untrusted interfaces. The configuration places a service-policy on the interface to classify traffic coming from untrusted desktops/devices and mark them accordingly. The service-policies generated do police.

The following commands enable auto-QoS for trusted interfaces:
· auto qos trust cos--Class of service.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1017

QoS Upgrading Auto-QoS (CLI)

Command or Action

Step 4

end Example:
Switch(config-if)# end

Step 5

show auto qos interface interface-id Example:
Switch# show auto qos interface gigabitethernet 3/0/1

Purpose · auto qos trust dscp--Differentiated Services Code Point.
Returns to privileged EXEC mode.
(Optional) Displays the auto-QoS command on the interface on which auto-QoS was enabled. Use the show running-config command to display the auto-QoS configuration and user modifications.

Related Topics Auto-QoS Policy and Class Maps, on page 1015

Upgrading Auto-QoS (CLI)
This procedure should only be followed after copying a pre-3.2.2 software version to this switch. If you do copy a pre-3.2.2 software version to this switch, then you must follow this auto-QoS upgrade procedure.

Before you begin
Prior to upgrading, you need to remove all auto-QoS configurations currently on the switch. This sample procedure describes that process.
After following this sample procedure, you must then reboot the switch with the new or upgraded software image and reconfigure auto-QoS.

SUMMARY STEPS

1. show auto qos 2. no auto qos 3. show running-config | i autoQos 4. no policy-map policy-map_name 5. show running-config | i AutoQoS 6. show auto qos 7. write memory

DETAILED STEPS

Step 1

show auto qos Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1018

QoS Upgrading Auto-QoS (CLI)

Step 2 Step 3 Step 4
Step 5

Switch# show auto qos GigabitEthernet2/0/3 auto qos voip cisco-phone GigabitEthernet2/0/27 auto qos voip cisco-softphone
In privileged EXEC mode, record all current auto QoS configurations by entering this command. no auto qos Example:
Switch(config-if)#no auto qos
In interface configuration mode, run the appropriate no auto qos command on each interface that has an auto QoS configuration. show running-config | i autoQos Example:
Switch# show running-config | i autoQos
Return to privileged EXEC mode, and record any remaining auto QoS maps class maps, policy maps, access lists, table maps, or other configurations by entering this command. no policy-map policy-map_name Example:
Switch)config# no policy-map pmap_101 Switch)config# no class-map cmap_101 Switch)config# no ip access-list extended AutoQos-101 Switch)config# no table-map 101 Switch)config# no table-map policed-dscp
In global configuration mode, remove the QoS class maps, policy maps, table maps, and any other auto QoS configurations by entering these commands:
· no policy-map policy-map-name · no class-map class-map-name · no ip access-list extended Auto-QoS-x · no table-map table-map-name · no table-map policed-dscp
show running-config | i AutoQoS Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1019

QoS Monitoring Auto-QoS

Step 6 Step 7

Switch# show running-config | i AutoQos
Return to privileged EXEC mode, run this command again to ensure that no auto-QoS configuration or remaining parts of the auto-QoS configuration exists show auto qos Example:
Switch# show auto qos
Run this command to ensure that no auto-QoS configuration or remaining parts of the configuration exists. write memory Example:
Switch# write memory
Write the changes to the auto QoS configuration to NV memory by entering the write memory command.

What to do next
Reboot the switch with the new or upgraded software image.
After rebooting with the new or upgraded software image, re-configure auto-QoS for the appropriate switch interfaces as determined by running the show auto qos command described in step 1.

Note There is only one table-map for exceed and another table-map for violate markdown per switch or stack. If the switch already has a table-map under the exceed action, then the auto-qos policy cannot be applied.
Related Topics Restrictions for Auto-QoS, on page 1013

Monitoring Auto-QoS
Table 89: Commands for Monitoring Auto-QoS
Command show auto qos [interface [interface-id]]

Description
Displays the initial auto-QoS configuration.
You can compare the show auto qos and the show running-config command output to identify the user-defined QoS settings.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1020

QoS Troubleshooting Auto-QoS

Command show running-config

Description
Displays information about the QoS configuration that might be affected by auto-QoS.
You can compare the show auto qos and the show running-config command output to identify the user-defined QoS settings.

Troubleshooting Auto-QoS
To troubleshoot auto-QoS, use the debug auto qos privileged EXEC command. For more information, see the debug auto qos command in the command reference for this release. To disable auto-QoS on a port, use the no form of the auto qos command interface configuration command, such as no auto qos voip. Only the auto-QoS-generated interface configuration commands for this port are removed. If this is the last port on which auto-QoS is enabled and you enter the no auto qos voip command, auto-QoS is considered disabled even though the auto-QoS-generated global configuration commands remain (to avoid disrupting traffic on other ports affected by the global configuration).
Configuration Examples for Auto-QoS
Example: auto qos trust cos
The following is an example of the auto qos trust cos command and the applied policies and class maps. The following policy maps are created and applied when running this command:
· AutoQos-4.0-Trust-Cos-Input-Policy · AutoQos-4.0-Output-Policy
The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface gigabitEthernet1/0/17 Switch(config-if)# auto qos trust cos

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1021

QoS Example: auto qos trust cos
Switch(config-if)# end Switch# show policy-map interface GigabitEthernet1/0/17
GigabitEthernet1/0/7
Service-policy input: AutoQos-4.0-Trust-Cos-Input-Policy
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set cos cos table AutoQos-4.0-Trust-Cos-Table
Service-policy output: AutoQos-4.0-Output-Policy
queue stats for all priority classes: Queueing priority level 1
(total drops) 0 (bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1022

QoS Example: auto qos trust cos
5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: class-default (match-any) 0 packets
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1023

QoS Example: auto qos trust dscp
Match: any 0 packets, 0 bytes 5 minute rate 0 bps
Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25
Example: auto qos trust dscp
The following is an example of the auto qos trust dscp command and the applied policies and class maps. The following policy maps are created and applied when running this command:
· AutoQos-4.0-Trust-Dscp-Input-Policy · AutoQos-4.0-Output-Policy
The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface GigabitEthernet1/0/18 Switch(config-if)# auto qos trust dscp Switch(config-if)# end Switch#show policy-map interface GigabitEthernet1/0/18
GigabitEthernet1/0/18 Service-policy input: AutoQos-4.0-Trust-Dscp-Input-Policy Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp dscp table AutoQos-4.0-Trust-Dscp-Table Service-policy output: AutoQos-4.0-Output-Policy
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1024

QoS Example: auto qos trust dscp
queue stats for all priority classes: Queueing priority level 1
(total drops) 0 (bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1025

QoS Example: auto qos video cts
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25
Example: auto qos video cts
The following is an example of the auto qos video cts command and the applied policies and class maps. The following policy maps are created and applied when running this command:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1026

QoS Example: auto qos video cts
· AutoQos-4.0-Trust-Cos-Input-Policy · AutoQos-4.0-Output-Policy
The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface gigabitEthernet1/0/12 Switch(config-if)# auto qos video cts Switch(config-if)# end Switch# show policy-map interface gigabitEthernet1/0/12
GigabitEthernet1/0/12
Service-policy input: AutoQos-4.0-Trust-Cos-Input-Policy
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set cos cos table AutoQos-4.0-Trust-Cos-Table
Service-policy output: AutoQos-4.0-Output-Policy
queue stats for all priority classes: Queueing priority level 1
(total drops) 0 (bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1027

QoS Example: auto qos video cts
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1028

QoS Example: auto qos video ip-camera
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25
Example: auto qos video ip-camera
The following is an example of the auto qos video ip-camera command and the applied policies and class maps. The following policy maps are created and applied when running this command:
· AutoQos-4.0-Trust-Dscp-Input-Policy · AutoQos-4.0-Output-Policy
The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any)
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1029

QoS Example: auto qos video ip-camera
· AutoQos-4.0-Output-Bulk-Data-Queue (match-any)
· AutoQos-4.0-Output-Scavenger-Queue (match-any)
· AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface GigabitEthernet1/0/9 Switch(config-if)# auto qos video ip-camera Switch(config-if)# end Switch# show policy-map interface GigabitEthernet1/0/9
GigabitEthernet1/0/9
Service-policy input: AutoQos-4.0-Trust-Dscp-Input-Policy
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp dscp table AutoQos-4.0-Trust-Dscp-Table
Service-policy output: AutoQos-4.0-Output-Policy
queue stats for all priority classes: Queueing priority level 1
(total drops) 0 (bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1030

QoS Example: auto qos video ip-camera
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1031

QoS Example: auto qos video media-player
5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10 Class-map: class-default (match-any) 0 packets Match: any
0 packets, 0 bytes 5 minute rate 0 bps Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25
Example: auto qos video media-player
The following is an example of the auto qos video media-player command and the applied policies and class maps. The following policy maps are created and applied when running this command:
· AutoQos-4.0-Trust-Dscp-Input-Policy · AutoQos-4.0-Output-Policy
The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface GigabitEthernet1/0/25 Switch(config-if)# auto qos video media-player Switch(config-if)# end Switch# show policy-map interface GigabitEthernet1/0/25
GigabitEthernet1/0/25
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1032

QoS Example: auto qos video media-player
Service-policy input: AutoQos-4.0-Trust-Dscp-Input-Policy
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp dscp table AutoQos-4.0-Trust-Dscp-Table
Service-policy output: AutoQos-4.0-Output-Policy
queue stats for all priority classes: Queueing priority level 1
(total drops) 0 (bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1033

QoS Example: auto qos video media-player
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1034

QoS Example: auto qos voip trust
(bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25
Example: auto qos voip trust
The following is an example of the auto qos voip trust command and the applied policies and class maps. The following policy maps are created and applied when running this command:
· AutoQos-4.0-Trust-Cos-Input-Policy · AutoQos-4.0-Output-Policy
The following class maps are created and applied when running this command: · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface gigabitEthernet1/0/31 Switch(config-if)# auto qos voip trust Switch(config-if)# end Switch# show policy-map interface GigabitEthernet1/0/31
GigabitEthernet1/0/31 Service-policy input: AutoQos-4.0-Trust-Cos-Input-Policy Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps QoS Set cos cos table AutoQos-4.0-Trust-Cos-Table Service-policy output: AutoQos-4.0-Output-Policy queue stats for all priority classes: Queueing priority level 1 (total drops) 0 (bytes output) 0 Class-map: AutoQos-4.0-Output-Priority-Queue (match-any)
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1035

QoS Example: auto qos voip trust
0 packets Match: dscp cs4 (32) cs5 (40) ef (46)
0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14)
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1036

QoS Example: auto qos voip cisco-phone
0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25
Example: auto qos voip cisco-phone
The following is an example of the auto qos voip cisco-phone command and the applied policies and class maps. The following policy maps are created and applied when running this command:
· AutoQos-4.0-CiscoPhone-Input-Policy
· AutoQos-4.0-Output-Policy
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1037

QoS Example: auto qos voip cisco-phone
The following class maps are created and applied when running this command: · AutoQos-4.0-Voip-Data-CiscoPhone-Class (match-any) · AutoQos-4.0-Voip-Signal-CiscoPhone-Class (match-any) · AutoQos-4.0-Default-Class (match-any) · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface gigabitEthernet1/0/5 Switch(config-if)# auto qos voip cisco-phone Switch(config-if)# end Switch# show policy-map interface gigabitEthernet1/0/5
GigabitEthernet1/0/5
Service-policy input: AutoQos-4.0-CiscoPhone-Input-Policy
Class-map: AutoQos-4.0-Voip-Data-CiscoPhone-Class (match-any) 0 packets Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp ef police: cir 128000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Voip-Signal-CiscoPhone-Class (match-any) 0 packets Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs3 police: cir 32000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1038

QoS Example: auto qos voip cisco-phone
conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Default-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Default 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp default
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps
Service-policy output: AutoQos-4.0-Output-Policy
queue stats for all priority classes: Queueing priority level 1
(total drops) 0 (bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1039

QoS Example: auto qos voip cisco-phone
5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: class-default (match-any) 0 packets
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1040

QoS
Match: any 0 packets, 0 bytes 5 minute rate 0 bps
Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25

Example: auto qos voip cisco-softphone

Example: auto qos voip cisco-softphone
The following is an example of the auto qos voip cisco-softphone command and the applied policies and class maps. The following policy maps are created and applied when running this command:
· AutoQos-4.0-CiscoSoftPhone-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · AutoQos-4.0-Voip-Data-Class (match-any) · AutoQos-4.0-Voip-Signal-Class (match-any) · AutoQos-4.0-Multimedia-Conf-Class (match-any) · AutoQos-4.0-Bulk-Data-Class (match-any) · AutoQos-4.0-Transaction-Class (match-any) · AutoQos-4.0-Scavanger-Class (match-any) · AutoQos-4.0-Signaling-Class (match-any) · AutoQos-4.0-Default-Class (match-any) · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface gigabitEthernet1/0/21
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1041

QoS Example: auto qos voip cisco-softphone
Switch(config-if)# auto qos voip cisco-softphone Switch(config-if)# end Switch# show policy-map interface gigabitEthernet1/0/21
GigabitEthernet1/0/21
Service-policy input: AutoQos-4.0-CiscoSoftPhone-Input-Policy
Class-map: AutoQos-4.0-Voip-Data-Class (match-any) 0 packets Match: dscp ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp ef police: cir 128000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Voip-Signal-Class (match-any) 0 packets Match: dscp cs3 (24) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs3 police: cir 32000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Multimedia-Conf-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-MultiEnhanced-Conf 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af41 police: cir 5000000 bps, bc 156250 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Bulk-Data-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Bulk-Data 0 packets, 0 bytes
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1042

QoS Example: auto qos voip cisco-softphone
5 minute rate 0 bps QoS Set
dscp af11 police:
cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions:
transmit exceeded 0 bytes; actions:
set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Transaction-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Transactional-Data 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af21 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Scavanger-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Scavanger 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs1 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Signaling-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Signaling 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs3 police: cir 32000 bps, bc 8000 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Default-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Default 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp default police:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1043

QoS Example: auto qos voip cisco-softphone
cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions:
transmit exceeded 0 bytes; actions:
set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps
Service-policy output: AutoQos-4.0-Output-Policy
queue stats for all priority classes: Queueing priority level 1
(total drops) 0 (bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90 queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1044

QoS Example: auto qos voip cisco-softphone
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1045

QoS auto qos classify police
Queueing (total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25
auto qos classify police
The following is an example of the auto qos classify police command and the applied policies and class maps. The following policy maps are created and applied when running this command:
· AutoQos-4.0-Classify-Police-Input-Policy · AutoQos-4.0-Output-Policy The following class maps are created and applied when running this command: · AutoQos-4.0-Multimedia-Conf-Class (match-any) · AutoQos-4.0-Bulk-Data-Class (match-any) · AutoQos-4.0-Transaction-Class (match-any) · AutoQos-4.0-Scavanger-Class (match-any) · AutoQos-4.0-Signaling-Class (match-any) · AutoQos-4.0-Default-Class (match-any) · class-default (match-any) · AutoQos-4.0-Output-Priority-Queue (match-any) · AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) · AutoQos-4.0-Output-Trans-Data-Queue (match-any) · AutoQos-4.0-Output-Bulk-Data-Queue (match-any) · AutoQos-4.0-Output-Scavenger-Queue (match-any) · AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
Switch(config)# interface gigabitEthernet1/0/6 Switch(config-if)# auto qos classify police Switch(config-if)# end Switch# show policy-map interface gigabitEthernet1/0/6
GigabitEthernet1/0/6 Service-policy input: AutoQos-4.0-Classify-Police-Input-Policy
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1046

QoS auto qos classify police
Class-map: AutoQos-4.0-Multimedia-Conf-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-MultiEnhanced-Conf 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af41 police: cir 5000000 bps, bc 156250 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Bulk-Data-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Bulk-Data 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af11 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Transaction-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Transactional-Data 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp af21 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Scavanger-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Scavanger 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp cs1 police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: drop conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Signaling-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Signaling 0 packets, 0 bytes
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1047

QoS auto qos classify police
5 minute rate 0 bps QoS Set
dscp cs3 police:
cir 32000 bps, bc 8000 bytes conformed 0 bytes; actions:
transmit exceeded 0 bytes; actions:
drop conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Default-Class (match-any) 0 packets Match: access-group name AutoQos-4.0-Acl-Default 0 packets, 0 bytes 5 minute rate 0 bps QoS Set dscp default police: cir 10000000 bps, bc 312500 bytes conformed 0 bytes; actions: transmit exceeded 0 bytes; actions: set-dscp-transmit dscp table policed-dscp conformed 0000 bps, exceed 0000 bps
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps
Service-policy output: AutoQos-4.0-Output-Policy
queue stats for all priority classes: Queueing priority level 1
(total drops) 0 (bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any) 0 packets Match: dscp cs4 (32) cs5 (40) ef (46) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 5 0 packets, 0 bytes 5 minute rate 0 bps Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any) 0 packets Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 3 0 packets, 0 bytes 5 minute rate 0 bps Queueing queue-limit dscp 16 percent 80 queue-limit dscp 24 percent 90
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1048

QoS auto qos classify police
queue-limit dscp 48 percent 100 queue-limit dscp 56 percent 100
(total drops) 0 (bytes output) 0 bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any) 0 packets Match: dscp af41 (34) af42 (36) af43 (38) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 4 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any) 0 packets Match: dscp af21 (18) af22 (20) af23 (22) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 2 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any) 0 packets Match: dscp af11 (10) af12 (12) af13 (14) 0 packets, 0 bytes 5 minute rate 0 bps Match: cos 1 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 4% queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any) 0 packets Match: dscp cs1 (8) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 1%
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1049

QoS Where to Go Next for Auto-QoS
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any) 0 packets Match: dscp af31 (26) af32 (28) af33 (30) 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 10% queue-buffers ratio 10
Class-map: class-default (match-any) 0 packets Match: any 0 packets, 0 bytes 5 minute rate 0 bps Queueing
(total drops) 0 (bytes output) 0 bandwidth remaining 25% queue-buffers ratio 25

Where to Go Next for Auto-QoS
Review the QoS documentation if you require any specific QoS changes to your auto-QoS configuration.

Additional References for Auto-QoS

Related Documents

Related Topic

Document Title

For complete syntax and usage information for the commands used in this chapter.

QoS Command Reference (Catalyst 3650 Switches)
Cisco IOS Quality of Service Solutions Command Reference

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1050

QoS Feature History and Information for Auto-QoS

Standards and RFCs Standard/RFC Title --

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Auto-QoS

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1051

QoS Feature History and Information for Auto-QoS
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1052

X I P A R T
Radio Resource Management
· Configuring Radio Resource Management, on page 1055

5 8 C H A P T E R
Configuring Radio Resource Management
· Finding Feature Information, on page 1055 · Prerequisites for Configuring Radio Resource Management, on page 1055 · Restrictions for Radio Resource Management, on page 1056 · Information About Radio Resource Management, on page 1056 · How to Configure RRM, on page 1063 · Monitoring RRM Parameters and RF Group Status, on page 1082 · Examples: RF Group Configuration, on page 1084 · Information About ED-RRM, on page 1084 · Additional References for Radio Resource Management, on page 1086 · Feature History and Information For Performing Radio Resource Management Configuration, on page
1087
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring Radio Resource Management
The switch should be configured as a mobility controller and not a mobility anchor to configure Radio Resource Management. It may require dynamic channel assignment functionality for the home APs to be supported. The new mobility architecture that involves mobility controller and mobility agent must be configured on the switch or controllers for RRM to work.
Note Refer Mobility Configuration Guide for configuring mobility controller and mobility agent.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1055

Restrictions for Radio Resource Management

Radio Resource Management

Restrictions for Radio Resource Management
If an AP tries to join the RF-group that already holds the maximum number of APs it can support, the device rejects the application and throws an error.
Information About Radio Resource Management
The Radio Resource Management (RRM) software embedded in the switch acts as a built-in RF engineer to consistently provide real-time RF management of your wireless network. RRM enables switches to continually monitor their associated lightweight access points for the following information:
· Traffic load--The total bandwidth used for transmitting and receiving traffic. It enables wireless LAN managers to track and plan network growth ahead of client demand.
· Interference--The amount of traffic coming from other 802.11 sources. · Noise--The amount of non-802.11 traffic that is interfering with the currently assigned channel. · Coverage--The Received Signal Strength (RSSI) and signal-to-noise ratio (SNR) for all connected
clients. · Other --The number of nearby access points.
RRM performs these functions: · Radio resource monitoring · Transmit power control · Dynamic channel assignment · Coverage hole detection and correction · RF grouping
Radio Resource Monitoring
RRM automatically detects and configures new switches and lightweight access points as they are added to the network. It then automatically adjusts associated and nearby lightweight access points to optimize coverage and capacity. Lightweight access points can scan all valid channels for the country of operation as well as for channels available in other locations. The access points in local mode go "off-channel" for a period not greater than 60 ms to monitor these channels for noise and interference. Packets collected during this time are analyzed to detect rogue access points, rogue clients, ad-hoc clients, and interfering access points.
Note In the presence of voice traffic or other critical traffic (in the last 100 ms), the access points can defer off-channel measurements. It also defers based on WLAN scan defer priority configurations.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1056

Radio Resource Management

Information About RF Groups

Each access point spends only 0.2 percent of its time off-channel. This activity is distributed across all access points so that adjacent access points are not scanning at the same time, which could adversely affect wireless LAN performance. RRM supports new mobility architecture for RF grouping that involves Mobility Controller (MC) and Mobility Agent (MA).
· Mobility Controller (MC)--The Cisco WLC 5700 Series Controllers, Cisco Catalyst 3850 Switch, or Cisco Unified Wireless Networking Solution controller can act as MC. The MC has MC functionality and MA functionality that is running internally into it.
· Mobility Agent (MA)--The Mobility Agent is the component that maintains client mobility state machine for a mobile client.
Information About RF Groups
An RF group is a logical collection of Cisco WLCs that coordinate to perform RRM in a globally optimized manner to perform network calculations on a per-radio basis. An RF group exists for each 802.11 network type. Clustering Cisco WLCs into a single RF group enable the RRM algorithms to scale beyond the capabilities of a single Cisco WLC. RF group is created based on following parameters:
· User-configured RF network name.
· Neighbor discovery performed at the radio level.
· Country list configured on MC.
RF grouping runs between MCs. Lightweight access points periodically send out neighbor messages over the air. Access points using the the same RF group name validate messages from each other. When access points on different Cisco WLCs hear validated neighbor messages at a signal strength of ­80 dBm or stronger, the Cisco WLCs dynamically form an RF neighborhood in auto mode. In static mode, the leader is manually selected and the members are added to the RF Group. To know more about RF Group modes, RF Group Leader.
Note RF groups and mobility groups are similar in that they both define clusters of Cisco WLCs, but they are different in terms of their use. An RF group facilitates scalable, system-wide dynamic RF management while a mobility group facilitates scalable, system-wide mobility and Cisco WLC redundancy.
RF Group Leader
Starting in the 7.0.116.0 release, the RF Group Leader can be configured in two ways as follows: · Auto Mode--In this mode, the members of an RF group elect an RF group leader to maintain a "master" power and channel scheme for the group. The RF grouping algorithm dynamically chooses the RF group leader and ensures that an RF group leader is always present. Group leader assignments can and do change (for instance, if the current RF group leader becomes inoperable or if RF group members experience major changes).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1057

RF Group Leader

Radio Resource Management

· Static Mode--In this mode, the user selects a Cisco WLC as an RF group leader manually. In this mode, the leader and the members are manually configured and are therefore fixed. If the members are unable to join the RF group, the reason is indicated. The leader tries to establish a connection with a member every 1 minute if the member has not joined in the previous attempt.
The RF group leader analyzes real-time radio data collected by the system, calculates the power and channel assignments, and sends them to each of the Cisco WLCs in the RF group. The RRM algorithms ensure system-wide stability and restrain channel and power scheme changes to the appropriate local RF neighborhoods.
In Cisco WLC software releases prior to 6.0, the dynamic channel assignment (DCA) search algorithm attempts to find a good channel plan for the radios associated to Cisco WLCs in the RF group, but it does not adopt a new channel plan unless it is considerably better than the current plan. The channel metric of the worst radio in both plans determines which plan is adopted. Using the worst-performing radio as the single criterion for adopting a new channel plan can result in pinning or cascading problems.
Pinning occurs when the algorithm could find a better channel plan for some of the radios in an RF group but is prevented from pursuing such a channel plan change because the worst radio in the network does not have any better channel options. The worst radio in the RF group could potentially prevent other radios in the group from seeking better channel plans. The larger the network, the more likely pinning becomes.
Cascading occurs when one radio's channel change results in successive channel changes to optimize the remaining radios in the RF neighborhood. Optimizing these radios could lead to their neighbors and their neighbors' neighbors having a suboptimal channel plan and triggering their channel optimization. This effect could propagate across multiple floors or even multiple buildings, if all the access point radios belong to the same RF group. This change results in considerable client confusion and network instability.
The main cause of both pinning and cascading is the way in which the search for a new channel plan is performed and that any potential channel plan changes are controlled by the RF circumstances of a single radio. In Cisco WLC software release 6.0, the DCA algorithm has been redesigned to prevent both pinning and cascading. The following changes have been implemented:
· Multiple local searches--The DCA search algorithm performs multiple local searches initiated by different radios within the same DCA run rather than performing a single global search driven by a single radio. This change addresses both pinning and cascading while maintaining the desired flexibility and adaptability of DCA and without jeopardizing stability.
· Multiple channel plan change initiators (CPCIs)--Previously, the single worst radio was the sole initiator of a channel plan change. Now each radio within the RF group is evaluated and prioritized as a potential initiator. Intelligent randomization of the resulting list ensures that every radio is eventually evaluated, which eliminates the potential for pinning.
· Limiting the propagation of channel plan changes (Localization)--For each CPCI radio, the DCA algorithm performs a local search for a better channel plan, but only the CPCI radio itself and its one-hop neighboring access points are actually allowed to change their current transmit channels. The impact of an access point triggering a channel plan change is felt only to within two RF hops from that access point, and the actual channel plan changes are confined to within a one-hop RF neighborhood. Because this limitation applies across all CPCI radios, cascading cannot occur.
· Non-RSSI-based cumulative cost metric--A cumulative cost metric measures how well an entire region, neighborhood, or network performs with respect to a given channel plan. The individual cost metrics of all access points in that area are considered in order to provide an overall understanding of the channel plan's quality. These metrics ensure that the improvement or deterioration of each single radio is factored into any channel plan change. The objective is to prevent channel plan changes in which a single radio improves but at the expense of multiple other radios experiencing a considerable performance decline.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1058

Radio Resource Management

RF Group Name

The RRM algorithms run at a specified updated interval, which is 600 seconds by default. Between update intervals, the RF group leader sends keepalive messages to each of the RF group members and collects real-time RF data.
Note Several monitoring intervals are also available. See the Configuring RRM section for details.
RF Group Name
A Cisco WLC is configured with an RF group name, which is sent to all access points joined to the Cisco WLC and used by the access points as the shared secret for generating the hashed MIC in the neighbor messages. To create an RF group, you configure all of the Cisco WLCs to be included in the group with the same RF group name. If there is any possibility that an access point joined to a Cisco WLC may hear RF transmissions from an access point on a different Cisco WLC, you should configure the Cisco WLCs with the same RF group name. If RF transmissions between access points can be heard, then system-wide RRM is recommended to avoid 802.11 interference and contention as much as possible.
Mobility Controller
An MC can either be a group leader or a group member. One of the MCs can act as a RF group leader based on RF grouping and RF group election with other MCs. The order of priority to elect the RF leader is based on the maximum number of APs the controller or switch can support. The highest priority being 1 and the least being 5. 1. WiSM 2 Controllers 2. Cisco WLC 5700 Series Controllers 3. WiSM 1 Controllers 4. Catalyst 3850 Series Switches 5. Catalyst 3650 Series Switches
When one of the MCs becomes the RRM group leader, the remaining MCs become RRM group members. RRM group members send their RF information to the Group Leader. The group leader determines a channel and Tx power plan for the network and passes the information back to the RF group members. The MCs push the power plan to MA for the radios that belong to MA. These channel and power plans are ultimately pushed down to individual radios.
Note MC has MA functionality within it.
Mobility Agent
The MA communicates with the MC. The MC includes MAC or IP address of the switch/controller while communicating with the MA. The MA provides the following information when polled by the MC:
· Interference or noise data.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1059

Information About Rogue Access Point Detection in RF Groups

Radio Resource Management

· Neighbor data.
· Radio capabilities (supported channels, power levels).
· Radio configuration (power, channel, channel width).
· Radar data.
The MC exchanges the following information with the switch/controller (MA). The message includes: · Configurations (channel/power/channel width) for individual radios.
· Polling requests for current configurations and RF measurements for individual radios
· Group Leader Update
In turn, the MA communicates the following messages with the MC: · RF measurements from radios (e.g. load, noise and neighbor information)
· RF capabilities and configurations of individual radios
The MA sets channel, power, and channel width on the radios when directed by the MC. The DFS, coverage hole detection/mitigation, static channel/power configurations are performed by the MA.
Information About Rogue Access Point Detection in RF Groups
After you have created an RF group of Cisco WLCs, you need to configure the access points connected to the Cisco WLCs to detect rogue access points. The access points will then select the beacon/probe-response frames in neighboring access point messages to see if they contain an authentication information element (IE) that matches that of the RF group. If the select is successful, the frames are authenticated. Otherwise, the authorized access point reports the neighboring access point as a rogue, records its BSSID in a rogue table, and sends the table to the Cisco WLC.
Transmit Power Control
The switch dynamically controls access point transmit power based on real-time wireless LAN conditions. The Transmit Power Control (TPC) algorithm both increases and decreases an access point's power in response to changes in the RF environment. In most instances, TPC seeks to lower an access point's power to reduce interference, but in the case of a sudden change in the RF coverage--for example, if an access point fails or becomes disabled--TPC can also increase power on surrounding access points. This feature is different from coverage hole detection, which is primarily concerned with clients. TPC provides enough RF power to achieve desired coverage levels while avoiding channel interference between access points.
Overriding the TPC Algorithm with Minimum and Maximum Transmit Power Settings
The TPC algorithm balances RF power in many diverse RF environments. However, it is possible that automatic power control will not be able to resolve some scenarios in which an adequate RF design was not possible to implement due to architectural restrictions or site restrictions--for example, when all access points must be mounted in a central hallway, placing the access points close together, but requiring coverage out to the edge of the building.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1060

Radio Resource Management

Dynamic Channel Assignment

In these scenarios, you can configure maximum and minimum transmit power limits to override TPC recommendations. The maximum and minimum TPC power settings apply to all access points through RF profiles in a RF network.
To set the Maximum Power Level Assignment and Minimum Power Level Assignment, enter the maximum and minimum transmit power used by RRM in the text boxes in the Tx Power Control page. The range for these parameters is -10 to 30 dBm. The minimum value cannot be greater than the maximum value; the maximum value cannot be less than the minimum value.
If you configure a maximum transmit power, RRM does not allow any access point attached to the switch to exceed this transmit power level (whether the power is set by RRM TPC or by coverage hole detection). For example, if you configure a maximum transmit power of 11 dBm, then no access point would transmit above 11 dBm, unless the access point is configured manually.
Dynamic Channel Assignment
Two adjacent access points on the same channel can cause either signal contention or signal collision. In a collision, data is not received by the access point. This functionality can become a problem, for example, when someone reading e-mail in a café affects the performance of the access point in a neighboring business. Even though these are completely separate networks, someone sending traffic to the café on channel 1 can disrupt communication in an enterprise using the same channel. Switches can dynamically allocate access point channel assignments to avoid conflict and to increase capacity and performance. Channels are "reused" to avoid wasting scarce RF resources. In other words, channel 1 is allocated to a different access point far from the café, which is more effective than not using channel 1 altogether.
The switch's Dynamic Channel Assignment (DCA) capabilities are also useful in minimizing adjacent channel interference between access points. For example, two overlapping channels in the 802.11b/g band, such as 1 and 2, cannot both simultaneously use 11/54 Mbps. By effectively reassigning channels, the switch keeps adjacent channels separated.
Note We recommend that you use only non-overlapping channels (1, 6, 11, and so on).
The switch examines a variety of real-time RF characteristics to efficiently handle channel assignments as follows:
· Access point received energy--The received signal strength measured between each access point and its nearby neighboring access points. Channels are optimized for the highest network capacity.
· Noise--Noise can limit signal quality at the client and access point. An increase in noise reduces the effective cell size and degrades user experience. By optimizing channels to avoid noise sources, the switch can optimize coverage while maintaining system capacity. If a channel is unusable due to excessive noise, that channel can be avoided.
· 802.11 Interference--Interference is any 802.11 traffic that is not part of your wireless LAN, including rogue access points and neighboring wireless networks. Lightweight access points constantly scan all channels looking for sources of interference. If the amount of 802.11 interference exceeds a predefined configurable threshold (the default is 10 percent), the access point sends an alert to the switch. Using the RRM algorithms, the switch may then dynamically rearrange channel assignments to increase system performance in the presence of the interference. Such an adjustment could result in adjacent lightweight access points being on the same channel, but this setup is preferable to having the access points remain on a channel that is unusable due to an interfering foreign access point.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1061

Coverage Hole Detection and Correction

Radio Resource Management

In addition, if other wireless networks are present, the switch shifts the usage of channels to complement the other networks. For example, if one network is on channel 6, an adjacent wireless LAN is assigned to channel 1 or 11. This arrangement increases the capacity of the network by limiting the sharing of frequencies. If a channel has virtually no capacity remaining, the switch may choose to avoid this channel. In very dense deployments in which all nonoverlapping channels are occupied, the switch does its best, but you must consider RF density when setting expectations.
· Load and utilization--When utilization monitoring is enabled, capacity calculations can consider that some access points are deployed in ways that carry more traffic than other access points (for example, a lobby versus an engineering area). The switch can then assign channels to improve the access point with the worst performance reported. The load is taken into account when changing the channel structure to minimize the impact on clients currently in the wireless LAN. This metric keeps track of every access point's transmitted and received packet counts to determine how busy the access points are. New clients avoid an overloaded access point and associate to a new access point. This parameter is disabled by default.
The switch combines this RF characteristic information with RRM algorithms to make system-wide decisions. Conflicting demands are resolved using soft-decision metrics that guarantee the best choice for minimizing network interference. The end result is optimal channel configuration in a three-dimensional space, where access points on the floor above and below play a major factor in an overall wireless LAN configuration.
Note Radios using 40-MHz channels in the 2.4-GHz band or or 80MHz channels are not supported by DCA.
The RRM startup mode is invoked in the following conditions:
· In a single-switch environment, the RRM startup mode is invoked after the switch is rebooted.
· In a multiple-switch environment, the RRM startup mode is invoked after an RF Group leader is elected.
You can trigger RRM startup mode from CLI.
RRM startup mode runs for 100 minutes (10 iterations at 10-minute intervals). The duration of the RRM startup mode is independent of the DCA interval, sensitivity, and network size. The startup mode consists of 10 DCA runs with high sensitivity (making channel changes easy and sensitive to the environment) to converge to a steady state channel plan. After the startup mode is finished, DCA continues to run at the specified interval and sensitivity.
Coverage Hole Detection and Correction
The RRM coverage hole detection algorithm can detect areas of radio coverage in a wireless LAN that are below the level needed for robust radio performance. This feature can alert you to the need for an additional (or relocated) lightweight access point.
If clients on a lightweight access point are detected at threshold levels (RSSI, failed client count, percentage of failed packets, and number of failed packets) lower than those specified in the RRM configuration, the access point sends a "coverage hole" alert to the switch. The alert indicates the existence of an area where clients are continually experiencing poor signal coverage, without having a viable access point to which to roam. The switch discriminates between coverage holes that can and cannot be corrected. For coverage holes that can be corrected, the switch mitigates the coverage hole by increasing the transmit power level for that specific access point. The switch does not mitigate coverage holes caused by clients that are unable to increase

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1062

Radio Resource Management

How to Configure RRM

their transmit power or are statically set to a power level because increasing their downstream transmit power might increase interference in the network.

How to Configure RRM

Configuring Advanced RRM CCX Parameters (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm ccx location-measurement interval 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz | 5ghz rrm ccx location-measurement Configures the interval for 802.11 CCX client location

interval

measurements. The range is from 10 to 32400 seconds.

Example:

Step 3

Switch(config)# ap dot11 24ghz rrm ccx location-measurement 15
end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Neighbor Discovery Type (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm ndp-type {protected | transparent} 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1063

Configuring RRM Profile Thresholds, Monitoring Channels, and Monitoring Intervals (GUI)

Radio Resource Management

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 24ghz | 5ghz rrm ndp-type {protected | transparent}
Example:

Step 3

Switch(config)#ap dot11 24ghz rrm ndp-type protected
Switch(config)#ap dot11 24ghz rrm ndp-type transparent
end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Configures the neighbor discovery type. By default, the mode is set to "transparent".
· protected--Sets the neighbor discover type to protected. Packets are encrypted.
· transparent--Sets the neighbor discover type to transparent. Packets are sent as is.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring RRM Profile Thresholds, Monitoring Channels, and Monitoring Intervals (GUI)

Step 1 Step 2
Step 3

Choose Configuration > Wireless > 802.11a/n/ac > RRM > General or Configuration > Wireless > 802.11b/g/n > RRM > General to open RRM General page.
Configure profile thresholds used for alarming as follows:
Note The profile thresholds have no bearing on the functionality of the RRM algorithms. Switches send an SNMP trap (or an alert) to the Cisco Prime Infrastructure or another trap receiver when individual APs values set for these threshold parameters are exceeded.
a) In the Interference text box, enter the percentage of interference (802.11 traffic from sources outside of your wireless network) on a single access point. The valid range is 0 to 100%, and the default value is 10%.
b) In the Clients text box, enter the number of clients on a single access point. The valid range is 1 to 75, and the default value is 12.
c) In the Noise text box, enter the level of noise (non-802.11 traffic) on a single access point. The valid range is ­127 to 0 dBm, and the default value is ­70 dBm.
d) In the Utilization text box, enter the percentage of RF bandwidth being used by a single access point. The valid range is 0 to 100%, and the default value is 80%.
e) In the Throughput text box, enter the level of Throughput being used by a single access point. The valid range is 1000 to 10000000, and the default value is 1000000.
From the Channel List drop-down list, choose one of the following options to specify the set of channels that the access point uses for RRM scanning:
· All Channels--RRM channel scanning occurs on all channels supported by the selected radio, which includes channels not allowed in the country of operation.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1064

Radio Resource Management

Configuring RF Groups

Step 4

· Country Channels--RRM channel scanning occurs only on the data channels in the country of operation. This is the default value.
· DCA Channels--RRM channel scanning occurs only on the channel set used by the DCA algorithm, which by default includes all of the non-overlapping channels allowed in the country of operation. However, you can specify the channel set to be used by DCA if desired. To do so, follow instructions in the Dynamic Channel Assignment.
Configure monitor intervals as follows:
a. In the Channel Scan Interval text box, enter (in seconds) the sum of the time between scans for each channel within a radio band. The entire scanning process takes 50 ms per channel, per radio and runs at the interval configured here. The time spent listening on each channel is determined by the non-configurable 50-ms scan time and the number of channels to be scanned. For example, in the U.S. all 11 802.11b/g channels are scanned for 50 ms each within the default 180-second interval. So every 16 seconds, 50 ms is spent listening on each scanned channel (180/11 = ~16 seconds). The Channel Scan Interval parameter determines the interval at which the scanning occurs. The valid range is 60 to 3600 seconds, and the default value for 802.11a/n/ac and 802.11b/g/n radios is 180 seconds.
b. In the Neighbor Packet Frequency text box, enter (in seconds) how frequently neighbor packets (messages) are sent, which eventually builds the neighbor list. The valid range is 60 to 3600 seconds, and the default value is 60 seconds.
Note If the access point radio does not receive a neighbor packet from an existing neighbor within 60 minutes, the Cisco WLC deletes that neighbor from the neighbor list.

Step 5 Step 6

Click Apply. Click Save Configuration.
Note Click Set to Factory Default if you want to return all of the Cisco WLC's RRM parameters to their factory-default values.

Configuring RF Groups
This section describes how to configure RF groups through either the GUI or the CLI.
Note The RF group name is generally set at deployment time through the Startup Wizard. However, you can change it as necessary.
Note When the multiple-country feature is being used, all Cisco WLCs intended to join the same RF group must be configured with the same set of countries, configured in the same order.
Note You can also configure RF groups using the Cisco Prime Infrastructure.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1065

Configuring the RF Group Mode (GUI)

Radio Resource Management

Configuring the RF Group Mode (GUI)

Step 1 Step 2

Choose Configuration > Wireless > 802.11a/n/ac > RRM > RF Grouping or or Configuration > Wireless > 802.11b/g/n > RRM > RF Grouping to open the RF Grouping page. From the Group Mode drop-down list, choose the mode that you want to configure for this Cisco WLC. You can configure RF grouping in the following modes:
· auto--Sets the RF group selection to automatic update mode. Note A configured static leader cannot become a member of another RF group until its mode is set to "auto".
· leader--Sets the RF group selection to static mode, and sets this Cisco WLC as the group leader. · off--Sets the RF group selection off. Every Cisco WLC optimizes its own access point parameters.
Note A Cisco WLC with a lower priority cannot assume the role of a group leader if a Cisco WLC with a higher priority is available. Here, priority is related to the processing power of the Cisco WLC.
Note We recommend that Cisco WLCs participate in automatic RF grouping. You can override RRM settings without disabling automatic RF group participation.

Step 3 Step 4

Click Apply to save the configuration and click Restart to restart the RRM RF Grouping algorithm. If you configured RF Grouping mode for this Cisco WLC as a static leader, you can add group members from the Group Members section as follows: a. In the switch Name text box, enter the Cisco WLC that you want to add as a member to this group.
b. In the IP Address text box, enter the IP address of the Cisco WLC.
c. Click Add to add the member to this group. Note If the member has not joined the static leader, the reason of the failure is shown in parentheses.

Step 5 Step 6

Click Apply. Click Save Configuration.

Configuring RF Group Selection Mode (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm group-mode{auto | leader | off} 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1066

Radio Resource Management

Configuring an RF Group Name (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz | 5ghz rrm group-mode{auto | leader | Configures RF group selection mode for 802.11 bands.

off}

· auto--Sets the 802.11 RF group selection to automatic

Example:

update mode.

· leader--Sets the 802.11 RF group selection to leader

Switch(config)#ap dot11 24ghz rrm group-mode leader

mode.

· off--Disables the 802.11 RF group selection.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring an RF Group Name (CLI)

SUMMARY STEPS

1. configure terminal 2. wireless rf-network name 3. end 4. show network profile profile_number

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wireless rf-network name Example:
Switch (config)# wireless rf-network test1

Step 3 Step 4

end Example:
Switch(config)# end
show network profile profile_number

Purpose Enters global configuration mode.
Creates an RF group. The group name should be ASCII String up to 19 characters and is case sensitive. Note Repeat this procedure for each controller that
you want to include in the RF group. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Displays the RF group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1067

Configuring an RF Group Name (GUI)

Radio Resource Management

Command or Action

Purpose
Note You can view the network profile number from 1 to 4294967295.

Configuring an RF Group Name (GUI)

Step 1 Step 2
Step 3 Step 4 Step 5

Choose Configuration > Controller > General to open the General page. Enter a name for the RF group in the RF Group Name text box. The name can contain up to 19 ASCII characters and is case sensitive. Click Apply to commit your changes. Click Save Configuration to save your changes. Repeat this procedure for each controller that you want to include in the RF group.

Configuring Members in a 802.11 Static RF Group (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm group-member group_name ip_addr 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz | 5ghz rrm group-member group_name Configures members in a 802.11 static RF group. The group

ip_addr

mode should be set as leader for the group member to be

Example:

active.

Step 3

Switch(config)#ap dot11 24ghz rrm group-member Grpmem01 10.1.1.1
end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1068

Radio Resource Management

Configuring Transmit Power Control

Configuring Transmit Power Control
Configuring the Tx-Power Control Threshold (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm tpc-threshold threshold_value 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz | 5ghz rrm tpc-threshold threshold_value Configures the Tx-power control threshold used by RRM

Example:

for auto power assignment. The range is from ­80 to ­50.

Step 3

Switch(config)#ap dot11 24ghz rrm tpc-threshold -60

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring the Tx-Power Level (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm txpower{trans_power_level | auto | max | min | once} 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz | 5ghz rrm txpower{trans_power_level | Configures the 802.11 tx-power level

auto | max | min | once} Example:

· trans_power_level--Sets the transmit power level. · auto--Enables auto-RF.

· max--Configures the maximum auto-RF tx-power.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1069

Configuring Transmit Power Control (GUI)

Radio Resource Management

Step 3

Command or Action
Switch(config)#ap dot11 24ghz rrm txpower auto
end Example:
Switch(config)# end

Purpose · min--Configures the minimum auto-RF tx-power. · once--Enables one-time auto-RF.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Transmit Power Control (GUI)

Step 1 Step 2
Step 3

Choose Configuration > Wireless > 802.11a/n/ac > RRM > TPC or Configuration > Wireless > 802.11b/g/n > RRM > TPC to open RRM Tx Power Control (TPC) page. Choose the Transmit Power Control.
Coverage Optimal Mode (TPCv1)-- Offers strong signal coverage and stability. In this mode, power can be kept low to gain extra capacity and reduce interference.
Choose one of the following options from the Power Level Assignment Method list to specify the Cisco WLC's dynamic power assignment mode:
· Automatic--Causes the Cisco WLC to periodically evaluate and, if necessary, update the transmit power for all joined access points. This is the default value.
· On Demand--Causes the Cisco WLC to periodically evaluate the transmit power for all joined access points. However, the Cisco WLC updates the power, if necessary, only when you click Apply after choosing On Demand.
Note The Cisco WLC does not evaluate and update the transmit power immediately when you click Apply after choosing On Demand. It waits for the next 600-second interval. This value is not configurable.
· Fixed--Prevents the Cisco WLC from evaluating and, if necessary, updating the transmit power for joined access points. The power level is set to the fixed value chosen from the drop-down list. The corresponding option for Fixed when you try to configure from CLI is once.
Note The transmit power level is assigned an integer value instead of a value in mW or dBm. The integer corresponds to a power level that varies depending on the regulatory domain, channel, and antennas in which the access points are deployed.
Note For optimal performance, we recommend that you use the Automatic setting.

Step 4 Step 5

Enter the maximum and minimum power level assignment values in the Maximum Power Level Assignment and Minimum Power Level Assignment text boxes.
The range for the Maximum Power Level Assignment is ­10 to 30 dBm.
The range for the Minimum Power Level Assignment is ­10 to 30 dBm.
In the Power Threshold text box, enter the cutoff signal level used by RRM when determining whether to reduce an access point's power. The default value for this parameter is ­70 dBm for TPCv1, but can be changed when access points are transmitting at higher (or lower) than desired power levels.
The range for this parameter is ­80 to ­50 dBm. Increasing this value (between ­65 and ­50 dBm) causes the access points to operate at a higher transmit power. Decreasing the value has the opposite effect.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1070

Radio Resource Management

Configuring 802.11 RRM Parameters

Step 6 Step 7

In applications with a dense population of access points, it may be useful to decrease the threshold to ­80 or ­75 dBm to reduce the number of BSSIDs (access points) and beacons seen by the wireless clients. Some wireless clients might have difficulty processing a large number of BSSIDs or a high beacon rate and might exhibit problematic behavior with the default threshold.
This page also shows the following nonconfigurable transmit power level parameter settings:
· Power Neighbor Count--The minimum number of neighbors an access point must have for the transmit power control algorithm to run.
· Power Assignment Leader--The MAC address of the RF group leader, which is responsible for power level assignment.
· Last Power Level Assignment--The last time RRM evaluated the current transmit power level assignments.
Click Apply. Click Save Configuration.

Configuring 802.11 RRM Parameters

Configuring Advanced 802.11 Channel Assignment Parameters (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event sensitivity {high | low | medium} 3. ap dot11 {24ghz | 5ghz} rrm channel dca {channel number | anchor-time | global {auto | once} |
interval | min-metric | sensitivity {high | low | medium}} 4. ap dot11 5ghz rrm channel dca chan-width {20 | 40 | 80} 5. ap dot11 {24ghz | 5ghz} rrm channel device 6. ap dot11 {24ghz | 5ghz} rrm channel foreign 7. ap dot11 {24ghz | 5ghz} rrm channel load 8. ap dot11 {24ghz | 5ghz} rrm channel noise 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 {24ghz | 5ghz} rrm channel cleanair-event sensitivity {high | low | medium}
Example:

Purpose Enters global configuration mode.
Configures CleanAir event-driven RRM parameters. · High­Specifies the most sensitivity to non-Wi-Fi interference as indicated by the air quality (AQ) value.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1071

Configuring Advanced 802.11 Channel Assignment Parameters (CLI)

Radio Resource Management

Step 3

Command or Action
Switch(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high

Purpose · Low­Specifies the least sensitivity to non-Wi-Fi interference as indicated by the AQ value.
· Medium­Specifies medium sensitivity to non-Wi-Fi interference as indicated by the AQ value.

ap dot11 {24ghz | 5ghz} rrm channel dca {channel number | anchor-time | global {auto | once} | interval | min-metric | sensitivity {high | low | medium}}
Example:

Configures Dynamic Channel Assignment (DCA) algorithm parameters for the 802.11 band.
· <1-14>­Enter a channel number to be added to the DCA list.

Switch(config)#ap dot11 24ghz rrm channel dca interval 2

· anchor-time­Configures the anchor time for the DCA. The range is between 0 and 23 hours.
· global­Configures the DCA mode for all 802.11 Cisco APs.

· auto­Enables auto-RF.

· once­Enables auto-RF only once.

· interval­Configures the DCA interval value. The values are 1, 2, 3, 4, 6, 8, 12 and 24 hours and the default value 0 denotes 10 minutes.
· min-metric­Configures the DCA minimum RSSI energy metric. The range is between -100 and -60.
· sensitivity­Configures the DCA sensitivity level to changes in the environment.
· high­Specifies the most sensitivity.
· low­Specifies the least sensitivity.
· medium­Specifies medium sensitivity.

Step 4 Step 5 Step 6

ap dot11 5ghz rrm channel dca chan-width {20 | 40 | 80} Configures the DCA channel width for all 802.11 radios in the 5-GHz band. Sets the channel width to 20 MHz, 40 MHz, or 80 MHz, ; 20 MHz is the default value.

ap dot11 {24ghz | 5ghz} rrm channel device Example:

Configures the persistent non-Wi-Fi device avoidance in the 802.11 channel assignment.

Switch(config)#ap dot11 24ghz rrm channel device

ap dot11 {24ghz | 5ghz} rrm channel foreign Example:

Configures the foreign AP 802.11 interference avoidance in the channel assignment.

Switch(config)#ap dot11 24ghz rrm channel foreign

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1072

Radio Resource Management

Configuring Dynamic Channel Assignment (GUI)

Step 7 Step 8 Step 9

Command or Action ap dot11 {24ghz | 5ghz} rrm channel load Example:

Purpose
Configures the Cisco AP 802.11 load avoidance in the channel assignment.

Switch(config)#ap dot11 24ghz rrm channel load
ap dot11 {24ghz | 5ghz} rrm channel noise Example:

Configures the 802.11 noise avoidance in the channel assignment.

Switch(config)#ap dot11 24ghz rrm channel noise

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Dynamic Channel Assignment (GUI)
You can specify the channels that the Dynamic Channel Assignment (DCA) algorithm considers when selecting the channels to be used for RRM scanning by using the Cisco WLC GUI.

Note This functionality is helpful when you know that the clients do not support certain channels because they are legacy devices or they have certain regulatory restrictions.

Step 1
Step 2 Step 3

Disable the 802.11a/n/ac or 802.11b/g/n network as follows: a) Choose Configuration > Wireless > 802.11a/n/ac > Network or Configuration > Wireless > 802.11b/g/n >
Network to open the Global Parameters page. b) Unselect the 802.11a/n/ac (or 802.11b/g/n) Network Status check box. c) Click Apply.
Choose Configuration > Wireless > 802.11a/n/ac > RRM > DCA or Configuration > Wireless > 802.11b/g/n > RRM > DCA to open the Dynamic Channel Assignment (DCA) page. Choose one of the following options from the Channel Assignment Method drop-down list to specify the Cisco WLC's DCA mode:
· Automatic--Causes the Cisco WLC to periodically evaluate and, if necessary, update the channel assignment for all joined access points. This is the default value.
· Freeze--Causes the Cisco WLC to evaluate and update the channel assignment for all joined access points, if necessary, only when you click Apply after selecting the Freeze option.
Note The Cisco WLC does not evaluate and update the channel assignment immediately when you click Apply after selecting the Freeze option. It waits for the next interval to elapse.
· OFF--Turns off DCA and sets all access point radios to the first channel of the band. If you choose this option, you must manually assign channels on all radios.
Note For optimal performance, we recommend that you use the Automatic setting.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1073

Configuring Dynamic Channel Assignment (GUI)

Radio Resource Management

Step 4 Step 5 Step 6
Step 7 Step 8
Step 9 Step 10

From the Interval drop-down list, choose one of the following options to specify how often the DCA algorithm is allowed to run: 10 minutes, 1 hour, 2 hours, 3 hours, 4 hours, 6 hours, 8 hours, 12 hours, or 24 hours. The default value is 10 minutes. From the AnchorTime drop-down list, choose a number to specify the time of day when the DCA algorithm is to start. The options are numbers between 0 and 23 (inclusive) representing the hour of the day from 12:00 a.m. to 11:00 p.m. From the DCA Channel Sensitivity drop-down list, choose one of the following options to specify how sensitive the DCA algorithm is to environmental changes such as signal, load, noise, and interference when determining whether to change channels:
· Low--The DCA algorithm is not particularly sensitive to environmental changes.
· Medium--The DCA algorithm is moderately sensitive to environmental changes.
· High--The DCA algorithm is highly sensitive to environmental changes.

The default value is Medium. The DCA sensitivity thresholds vary by radio band, as noted in the following table:
Table 90: DCA Sensitivity Thresholds

Option High Medium Low

2.4-GHz DCA Sensitivity Threshold 5 dB 10 dB 20 dB

5-GHz DCA Sensitivity Threshold 5 dB 15 dB 20 dB

This page also shows the following nonconfigurable channel parameter settings:
· Channel Assignment Leader--The MAC address of the RF group leader, which is responsible for channel assignment.

In the DCA Channel List area, the DCA Channels text box shows the channels that are currently selected. To choose a channel, select its check box in the Select column. To exclude a channel, unselect its check box. The ranges are as follows:
· 802.11a--36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 132, 136, 140, 149, 153, 157, 161, 165 (depending on countries).
· 802.11b/g--1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14 (depending on countries).
The defaults are as follows: · 802.11a--36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 132, 136, 140, 149, 153, 157, 161 · 802.11b/g--1, 6, 11

Click Apply. Reenable the 802.11 networks as follows: a. Choose Configuration > Wireless > 802.11a/n/ac > Network or Configuration > Wireless > 802.11b/g/n >
Network to open the Global Parameters page.
b. Select the 802.11a/n/ac (or 802.11b/g/n) Network Status check box.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1074

Radio Resource Management

Configuring 802.11 Coverage Hole Detection (CLI)

Step 11

c. Click Apply. Click Save Configuration.

Configuring 802.11 Coverage Hole Detection (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm coverage data{fail-percentage | packet-count | rssi-threshold} 3. ap dot11 24ghz | 5ghz rrm coverage exception global exception level 4. ap dot11 24ghz | 5ghz rrm coverage level global cli_min exception level 5. ap dot11 24ghz | 5ghz rrm coverage voice{fail-percentage | packet-count | rssi-threshold} 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz | 5ghz rrm coverage data{fail-percentage Configures the 802.11 coverage hole detection for data

| packet-count | rssi-threshold}

packets.

Example:
Switch(config)#ap dot11 24ghz rrm coverage data fail-percentage 60

· fail-percentage--Configures the 802.11 coverage failure-rate threshold for uplink data packets as a percentage that ranges from 1 to 100%.
· packet-count--Configures the 802.11 coverage minimum failure count threshold for uplink data packets that ranges from 1 to 255.

· rssi-threshold--Configures the 802.11 minimum receive coverage level for data packets that range from ­90 to ­60 dBm.

Step 3 Step 4

ap dot11 24ghz | 5ghz rrm coverage exception global exception level
Example:

Configures the 802.11 Cisco AP coverage exception level as a percentage that ranges from 0 to 100%.

Switch(config)#ap dot11 24ghz rrm coverage exception global 50

ap dot11 24ghz | 5ghz rrm coverage level global cli_min Configures the 802.11 Cisco AP client minimum exception

exception level

level that ranges from 1 to 75 clients.

Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1075

Configuring Coverage Hole Detection (GUI)

Radio Resource Management

Step 5 Step 6

Command or Action

Purpose

Switch(config)#ap dot11 24ghz rrm coverage level global 10

ap dot11 24ghz | 5ghz rrm coverage

Configures the 802.11 coverage hole detection for voice

voice{fail-percentage | packet-count | rssi-threshold} packets.

Example:
Switch(config)#ap dot11 24ghz rrm coverage voice packet-count 10

· fail-percentage--Configures the 802.11 coverage failure-rate threshold for uplink voice packets as a percentage that ranges from 1 to 100%.
· packet-count--Configures the 802.11 coverage minimum failure count threshold for uplink voice packets that ranges from 1 to 255.

· rssi-threshold--Configures the 802.11 minimum receive coverage level for voice packets that range from ­90 to ­60 dBm.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Coverage Hole Detection (GUI)

Step 1
Step 2 Step 3 Step 4 Step 5

Disable the 802.11 network as follows:
a) Choose Configuration > Wireless > 802.11a/n/ac or Configuration > Wireless > 802.11b/g/n to open the 802.11a/n/ac (or 802.11b/g/n) Global Parameters page.
b) Unselect the 802.11a/n/ac (or 802.11b/g/n) Network Status check box. c) Click Apply.
Choose Configuration > Wireless > 802.11a/n/ac > RRM > Coverage Thresholds or Configuration > Wireless > 802.11b/g/n > RRM > Coverage Thresholds to open coverage page.
Select the Enable Coverage Hole Detection check box to enable coverage hole detection, or unselect it to disable this feature. If you enable coverage hole detection, the Cisco WLC automatically determines, based on data received from the access points, if any access points have clients that are potentially located in areas with poor coverage. The default value is selected.
In the Data RSSI text box, enter the minimum Receive Signal Strength Indication (RSSI) value for data packets received by the access point. The value that you enter is used to identify coverage holes (or areas of poor coverage) within your network. If the access point receives a packet in the data queue with an RSSI value below the value that you enter here, a potential coverage hole has been detected. The valid range is ­90 to ­60 dBm, and the default value is ­80 dBm. The access point takes data RSSI measurements every 5 seconds and reports them to the Cisco WLC in 90-second intervals.
In the Voice RSSI text box, enter the minimum Receive Signal Strength Indication (RSSI) value for voice packets received by the access point. The value that you enter is used to identify coverage holes within your network. If the access point receives a packet in the voice queue with an RSSI value below the value that you enter here, a potential coverage hole has been detected. The valid range is ­90 to ­60 dBm, and the default value is ­80 dBm. The access point takes voice RSSI measurements every 5 seconds and reports them to the Cisco WLC in 90-second intervals.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1076

Radio Resource Management

Configuring 802.11 Event Logging (CLI)

Step 6 Step 7
Step 8 Step 9 Step 10

In the Min Failed Client Count per AP text box, enter the minimum number of clients on an access point with an RSSI value at or below the data or voice RSSI threshold. The valid range is 1 to 75, and the default value is 3. In the Coverage Exception Level per AP text box, enter the percentage of clients on an access point that are experiencing a low signal level but cannot roam to another access point. The valid range is 0 to 100%, and the default value is 25%.
Note If both the number and percentage of failed packets exceed the values configured for Failed Packet Count and Failed Packet Percentage (configurable through the Cisco WLC CLI) for a 5-second period, the client is considered to be in a pre-alarm condition. The Cisco WLC uses this information to distinguish between real and false coverage holes. False positives are generally due to the poor roaming logic implemented on most clients. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the Min Failed Client Count per AP and Coverage Exception Level per AP text boxes over two 90-second periods (a total of 180 seconds). The Cisco WLC determines if the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.
Click Apply. Reenable the 802.11 network as follows: a) Choose Configuration > Wireless > 802.11a/n/ac > Network or Configuration > Wireless > 802.11b/g/n >
Network to open the 802.11a (or 802.11b/g) Global Parameters page. b) Select the 802.11a/n/ac (or 802.11b/g/n) Network Status check box. c) Click Apply.
Click Save Configuration.

Configuring 802.11 Event Logging (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm logging{channel | coverage | foreign | load | noise | performance | txpower} 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz | 5ghz rrm logging{channel | coverage | Configures event-logging for various parameters.

foreign | load | noise | performance | txpower}

· channel--Configures the 802.11 channel change

Example:

logging mode.

Switch(config)#ap dot11 24ghz rrm logging channel Switch(config)#ap dot11 24ghz rrm logging coverage Switch(config)#ap dot11 24ghz rrm logging foreign

· coverage--Configures the 802.11 coverage profile logging mode.
· foreign--Configures the 802.11 foreign interference profile logging mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1077

Configuring 802.11 Statistics Monitoring (CLI)

Radio Resource Management

Step 3

Command or Action
Switch(config)#ap dot11 24ghz rrm logging load

Purpose
· load--Configures the 802.11 load profile logging mode.

Switch(config)#ap dot11 24ghz rrm logging noise
Switch(config)#ap dot11 24ghz rrm logging performance
Switch(config)#ap dot11 24ghz rrm logging txpower

· noise--Configures the 802.11 noise profile logging mode.
· performance--Configures the 802.11 performance profile logging mode.

· txpower--Configures the 802.11 transmit power change logging mode.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring 802.11 Statistics Monitoring (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm monitor channel-list{all | country | dca} 3. ap dot11 24ghz | 5ghz rrm monitor coverage interval 4. ap dot11 24ghz | 5ghz rrm monitor load interval 5. ap dot11 24ghz | 5ghz rrm monitor noise interval 6. ap dot11 24ghz | 5ghz rrm monitor signal interval 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 24ghz | 5ghz rrm monitor channel-list{all | country | dca}
Example:

Switch(config)#ap dot11 24ghz rrm monitor channel-list all

Purpose Enters global configuration mode.
Sets the 802.11 monitoring channel-list for parameters such as noise/interference/rogue.
· all-- Monitors all channels. · country-- Monitor channels used in configured
country code. · dca-- Monitor channels used by dynamic channel
assignment.

Step 3

ap dot11 24ghz | 5ghz rrm monitor coverage interval Example:

Configures the 802.11 coverage measurement interval in seconds that ranges from 60 to 3600.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1078

Radio Resource Management

Configuring the 802.11 Performance Profile (CLI)

Step 4

Command or Action

Purpose

Switch(config)#ap dot11 24ghz rrm monitor coverage 600

ap dot11 24ghz | 5ghz rrm monitor load interval Example:

Configures the 802.11 load measurement interval in seconds that ranges from 60 to 3600.

Switch(config)#ap dot11 24ghz rrm monitor load 180

Step 5 Step 6 Step 7

ap dot11 24ghz | 5ghz rrm monitor noise interval Example:

Configures the 802.11 noise measurement interval (channel scan interval) in seconds that ranges from 60 to 3600.

Switch(config)#ap dot11 24ghz rrm monitor noise 360

ap dot11 24ghz | 5ghz rrm monitor signal interval Example:

Configures the 802.11 signal measurement interval (neighbor packet frequency) in seconds that ranges from 60 to 3600.

Switch(config)#ap dot11 24ghz rrm monitor signal 480

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring the 802.11 Performance Profile (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz rrm profile clients cli_threshold_value 3. ap dot11 24ghz | 5ghz rrm profile foreign int_threshold_value 4. ap dot11 24ghz | 5ghz rrm profile noise for_noise_threshold_value 5. ap dot11 24ghz | 5ghz rrm profile throughput throughput_threshold_value 6. ap dot11 24ghz | 5ghz rrm profile utilization rf_util_threshold_value 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1079

Configuring Rogue Access Point Detection in RF Groups

Radio Resource Management

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7

Command or Action
ap dot11 24ghz | 5ghz rrm profile clients cli_threshold_value Example:

Purpose
Sets the threshold value for 802.11 Cisco AP clients that range between 1 and 75 clients.

Switch(config)#ap dot11 24ghz rrm profile clients 20

ap dot11 24ghz | 5ghz rrm profile foreign int_threshold_value
Example:

Sets the threshold value for 802.11 foreign interference that ranges between 0 and 100%.

Switch(config)#ap dot11 24ghz rrm profile foreign 50

ap dot11 24ghz | 5ghz rrm profile noise for_noise_threshold_value
Example:

Sets the threshold value for 802.11 foreign noise ranges between ­127 and 0 dBm.

Switch(config)#ap dot11 24ghz rrm profile noise -65

ap dot11 24ghz | 5ghz rrm profile throughput throughput_threshold_value
Example:

Sets the threshold value for 802.11 Cisco AP throughput that ranges between 1000 and 10000000 bytes per second.

Switch(config)#ap dot11 24ghz rrm profile throughput 10000
ap dot11 24ghz | 5ghz rrm profile utilization rf_util_threshold_value Example:

Sets the threshold value for 802.11 RF utilization that ranges between 0 to 100%.

Switch(config)#ap dot11 24ghz rrm profile utilization 75
end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Rogue Access Point Detection in RF Groups
Configuring Rogue Access Point Detection in RF Groups (CLI)
Before you begin Ensure that each Cisco WLC in the RF group has been configured with the same RF group name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1080

Radio Resource Management

Configuring Rogue Access Point Detection in RF Groups (CLI)

Note The name is used to verify the authentication IE in all beacon frames. If the Cisco WLCs have different names, false alarms will occur.

SUMMARY STEPS

1. ap name Cisco_AP mode {local | monitor} 2. end 3. configure terminal 4. wireless wps ap-authentication 5. wireless wps ap-authentication threshold value

DETAILED STEPS

Step 1

Command or Action ap name Cisco_AP mode {local | monitor} Example:
Switch# ap name ap1 mode local

Purpose
Configures a particular access point for local (normal) mode or monitor (listen-only) mode. Perform this step for every access point connected to the Cisco WLC.

Step 2

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Step 3

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 4

wireless wps ap-authentication

Enables rogue access point detection.

Example:

Switch (config)# wireless wps ap-authentication

Step 5

wireless wps ap-authentication threshold value
Example:
Switch (config)# wireless wps ap-authentication threshold 50

Specifies when a rogue access point alarm is generated. An alarm occurs when the threshold value (which specifies the number of access point frames with an invalid authentication IE) is met or exceeded within the detection period.
The valid threshold range is from 1 to 255, and the default threshold value is 1. To avoid false alarms, you may want to set the threshold to a higher value.

Note Enable rogue access point detection and threshold value on every Cisco WLC in the RF group.

Note If rogue access point detection is not enabled on every Cisco WLC in the RF group, the access points on the Cisco WLCs with this feature disabled are reported as rogues.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1081

Enabling Rogue Access Point Detection in RF Groups (GUI)

Radio Resource Management

Enabling Rogue Access Point Detection in RF Groups (GUI)

Step 1
Step 2 Step 3 Step 4 Step 5 Step 6 Step 7
Step 8 Step 9
Step 10 Step 11 Step 12

Make sure that each Cisco WLC in the RF group has been configured with the same RF group name. Note The name is used to verify the authentication IE in all beacon frames. If the Cisco WLCs have different
names, false alarms will occur.
Choose Configuration > Wireless > Access Points > All APs to open the All APs page. Click the name of an access point to open the All APs > Edit page. Choose either local or monitor from the AP Mode drop-down list and click Apply to commit your changes. Click Save Configuration to save your changes. Repeat Step 2 through Step 5 for every access point connected to the Cisco WLC. Choose Configuration > Security > Wireless Protection Policies > AP Authentication/MFP to open the AP Authentication Policy page. The name of the RF group to which this Cisco WLC belongs appears at the top of the page.
Choose AP Authentication from the Protection Type drop-down list to enable rogue access point detection. Enter a number in the Alarm Trigger Threshold edit box to specify when a rogue access point alarm is generated. An alarm occurs when the threshold value (which specifies the number of access point frames with an invalid authentication IE) is met or exceeded within the detection period. Note The valid threshold range is from1 to 255, and the default threshold value is 1. To avoid false alarms, you
may want to set the threshold to a higher value.
Click Apply to commit your changes. Click Save Configuration to save your changes. Repeat this procedure on every Cisco WLC in the RF group. Note If rogue access point detection is not enabled on every Cisco WLC in the RF group, the access points on the
Cisco WLCs with this feature disabled are reported as rogues.

Monitoring RRM Parameters and RF Group Status

Monitoring RRM Parameters

Table 91: Commands for monitoring Radio Resource Management

Commands show ap dot11 24ghz ccx

Description Displays the 802.11b CCX information for all Cisco APs.

show ap dot11 24ghz channel Displays the configuration and statistics of the 802.11b channel assignment.

show ap dot11 24ghz coverage Displays the configuration and statistics of the 802.11b coverage.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1082

Radio Resource Management

Monitoring RF Group Status (CLI)

Commands show ap dot11 24ghz group

Description Displays the configuration and statistics of the 802.11b grouping.

show ap dot11 24ghz l2roam Displays 802.11b l2roam information.

show ap dot11 24ghz logging Displays the configuration and statistics of the 802.11b event logging.

show ap dot11 24ghz monitor Displays the configuration and statistics of the 802.11b monitoring.

show ap dot11 24ghz profile Displays 802.11b profiling information for all Cisco APs.

show ap dot11 24ghz receiver Displays the configuration and statistics of the 802.11b receiver.

show ap dot11 24ghz summary Displays the configuration and statistics of the 802.11b Cisco APs.

show ap dot11 24ghz txpower Displays the configuration and statistics of the 802.11b transmit power control.

show ap dot11 5ghz ccx

Displays 802.11a CCX information for all Cisco APs.

show ap dot11 5ghz channel Displays the configuration and statistics of the 802.11a channel assignment.

show ap dot11 5ghz coverage Displays the configuration and statistics of the 802.11a coverage.

show ap dot11 5ghz group Displays the configuration and statistics of the 802.11a grouping.

show ap dot11 5ghz l2roam Displays 802.11a l2roam information.

show ap dot11 5ghz logging Displays the configuration and statistics of the 802.11a event logging.

show ap dot11 5ghz monitor Displays the configuration and statistics of the 802.11a monitoring.

show ap dot11 5ghz profile Displays 802.11a profiling information for all Cisco APs.

show ap dot11 5ghz receiver Displays the configuration and statistics of the 802.11a receiver.

show ap dot11 5ghz summary Displays the configuration and statistics of the 802.11a Cisco APs.

show ap dot11 5ghz txpower Displays the configuration and statistics of the 802.11a transmit power control.

Monitoring RF Group Status (CLI)
This section describes the new commands for RF group status. The following commands can be used to monitor RF group status on the switch.
Table 92: Monitoring Aggressive Load Balancing Command

Command

Purpose

show ap dot11 5ghz group Displays the Cisco WLC name which is the RF group leader for the 802.11a RF network.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1083

Monitoring RF Group Status (GUI)

Radio Resource Management

show ap dot11 24ghz group

Displays the Cisco WLC name which is the RF group leader for the 802.11b/g RF network.

Monitoring RF Group Status (GUI)

Step 1 Step 2

Choose Configuration > Wireless > 802.11a/n > or 802.11b/g/n > RRM > RF Grouping to open the RF Grouping Algorithm page.
This page shows the details of the RF group, displaying the configurable parameter Group mode, the Group role of this Cisco WLC, the Group Update Interval and the Cisco WLC name and IP address of the Group Leader to this Cisco WLC.
Note RF grouping mode can be set using the Group Mode drop-down list.
Tip Once a Cisco WLC has joined as a static member and you want to change the grouping mode, we recommend that you remove the member from the configured static-leader and also make sure that a member Cisco WLC has not been configured to be a member on multiple static leaders. This is to avoid repeated join attempts from one or more RF static leaders.
(Optional) Repeat this procedure for the network type that you did not select (802.11a/n or 802.11b/g/n).

Examples: RF Group Configuration
This example shows how to configure RF group name:
Switch# configure terminal Switch(config)# wireless rf-network test1 Switch(config)# ap dot11 24ghz shutdown Switch(config)# end Switch # show network profile 5
This example shows how to configure rogue access point detection in RF groups:
Switch# ap name ap1 mode local Switch# end Switch# configure terminal Switch(config)# wireless wps ap-authentication Switch(config)# wireless wps ap-authentication threshold 50 Switch(config)# end
Information About ED-RRM
Spontaneous interference is interference that appears suddenly on a network, perhaps jamming a channel or a range of channels completely. The Cisco CleanAir spectrum event-driven RRM feature allows you to set a threshold for air quality (AQ) that, if exceeded, triggers an immediate channel change for the affected access point. Most RF management systems can avoid interference, but this information takes time to propagate

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1084

Radio Resource Management

Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI)

through the system. Cisco CleanAir relies on AQ measurements to continuously evaluate the spectrum and can trigger a move within 30 seconds. For example, if an access point detects interference from a video camera, it can recover by changing channels within 30 seconds of the camera becoming active. Cisco CleanAir also identifies and locates the source of interference so that more permanent mitigation of the device can be performed at a later time.
Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI)

Step 1
Step 2 Step 3

Trigger spectrum event-driven radio resource management (RRM) to run when a Cisco CleanAir-enabled access point detects a significant level of interference by entering these commands:
ap dot11 {24ghz | 5ghz} rrm channel cleanair-event --Configures CleanAir driven RRM parameters for the 802.11 Cisco lightweight access points.
ap dot11 {24ghz | 5ghz} rrm channel cleanair-event sensitivity {low | medium | high | custom}--Configures CleanAir driven RRM sensitivity for the 802.11 Cisco lightweight access points. Default selection is Medium.
ap dot11 {24ghz | 5ghz} rrm channel cleanair-event rogue-contribution--Enables rogue contribution.
ap dot11 {24ghz | 5ghz} rrm channel cleanair-event rogue-contributionduty-cycle thresholdvalue--Configures threshold value for rogue contribution. The valid range is from 1 to 99, with 80 as the default.
Save your changes by entering this command:
write memory
See the CleanAir configuration for the 802.11a/n/ac or 802.11b/g/n network by entering this command:
show ap dot11 {24ghz | 5ghz} cleanair config
Information similar to the following appears:
AdditionalClean Air Settings: CleanAir Event-driven RRM State.............. : Enabled CleanAir Driven RRM Sensitivity.............. : LOW CleanAir Event-driven RRM Rogue Option....... : Enabled CleanAir Event-driven RRM Rogue Duty Cycle... : 80 CleanAir Persistent Devices state............ : Disabled CleanAir Persistent Device Propagation....... : Disabled

Configuring ED-RRM (GUI)

Step 1
Step 2 Step 3

Choose Configure > Radio Configurations > 2.4 GHZ or 5 GHZ > RRM > DCA to open the ED-RRM page. Note Before enabling ED-RRM, you have to disable Network Status from Configure > Radio Configurations >
2.4 GHZ or 5 GHZ > Network > General page, and then re-enable the network after configuring ED-RRM.
In the Event Driven RRM section, select the EDRRM check box to reveal ED-RRM parameters . From the Sensitivity Threshold drop-down, select the value. Options are: Low, Medium, or High. Default selection is Medium.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1085

Additional References for Radio Resource Management

Radio Resource Management

Step 4 Step 5
Step 6 Step 7

Select the Rogue Contribution check box to reveal Rogue Duty-Cycle parameters . Enter the Rogue Duty Cycle value in the text box. The valid range is from 1 to 99, with 80 as the default.
Click Apply. Click Save Configuration.

Additional References for Radio Resource Management

Related Documents

Related Topic

Document Title

RRM commands and their details RRM Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1086

Radio Resource Management

Feature History and Information For Performing Radio Resource Management Configuration

Feature History and Information For Performing Radio Resource Management Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1087

Feature History and Information For Performing Radio Resource Management Configuration

Radio Resource Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1088

X I I PA R T
Routing
· Configuring MSDP, on page 1091 · Configuring IP Unicast Routing, on page 1111

5 9 C H A P T E R
Configuring MSDP
· Finding Feature Information, on page 1091 · Information About Configuring MSDP, on page 1091 · How to Configure MSDP, on page 1093 · Monitoring and Maintaining MSDP, on page 1108 · Configuration Examples for Configuring MSDP, on page 1109
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring MSDP
This section describes how to configure the Multicast Source Discovery Protocol (MSDP on the switch. The MSDP connects multiple Protocol-Independent Multicast sparse-mode (PIM-SM) domains. MSDP is not fully supported in this software release because of a lack of support for Multicast Border Gateway Protocol (MBGP), which works closely with MSDP. However, it is possible to create default peers that MSDP can operate with if MBGP is not running. To use this feature, the active switch must be running the IP services feature set.
Understanding MSDP
MSDP allows multicast sources for a group to be known to all rendezvous points (RPs) in different domains. Each PIM-SM domain uses its own RPs and does not depend on RPs in other domains. An RP runs MSDP over the Transmission Control Protocol (TCP) to discover multicast sources in other domains. An RP in a PIM-SM domain has an MSDP peering relationship with MSDP-enabled devices in another domain. The peering relationship occurs over a TCP connection, primarily exchanging a list of sources sending to multicast groups. The TCP connections between RPs are achieved by the underlying routing system. The receiving RP uses the source lists to establish a source path.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1091

MSDP Operation

Routing

The purpose of this topology is to have domains discover multicast sources in other domains. If the multicast sources are of interest to a domain that has receivers, multicast data is delivered over the normal, source-tree building mechanism in PIM-SM. MSDP is also used to announce sources sending to a group. These announcements must originate at the domain's RP.
MSDP depends heavily on the Border Gateway Protocol (BGP) or MBGP for interdomain operation. We recommend that you run MSDP in RPs in your domain that are RPs for sources sending to global groups to be announced to the Internet.
MSDP Operation
When a source sends its first multicast packet, the first-hop router (designated router or RP) directly connected to the source sends a PIM register message to the RP. The RP uses the register message to register the active source and to forward the multicast packet down the shared tree in the local domain. With MSDP configured, the RP also forwards a source-active (SA) message to all MSDP peers. The SA message identifies the source, the group the source is sending to, and the address of the RP or the originator ID (the IP address of the interface used as the RP address), if configured.
Each MSDP peer receives and forwards the SA message away from the originating RP to achieve peer reverse-path flooding (RPF). The MSDP device examines the BGP or MBGP routing table to discover which peer is the next hop toward the originating RP of the SA message. Such a peer is called an RPF peer (reverse-path forwarding peer). The MSDP device forwards the message to all MSDP peers other than the RPF peer. For information on how to configure an MSDP peer when BGP and MBGP are not supported, see the Configuring a Default MSDP Peer, on page 1093.
If the MSDP peer receives the same SA message from a non-RPF peer toward the originating RP, it drops the message. Otherwise, it forwards the message to all its MSDP peers.
The RP for a domain receives the SA message from an MSDP peer. If the RP has any join requests for the group the SA message describes and if the (*,G) entry exists with a nonempty outgoing interface list, the domain is interested in the group, and the RP triggers an (S,G) join toward the source. After the (S,G) join reaches the source's DR, a branch of the source tree has been built from the source to the RP in the remote domain. Multicast traffic can now flow from the source across the source tree to the RP and then down the shared tree in the remote domain to the receiver.
MSDP Benefits
MSDP has these benefits:
· It breaks up the shared multicast distribution tree. You can make the shared tree local to your domain. Your local members join the local tree, and join messages for the shared tree never need to leave your domain.
· PIM sparse-mode domains can rely only on their own RPs, decreasing reliance on RPs in another domain. This increases security because you can prevent your sources from being known outside your domain.
· Domains with only receivers can receive data without globally advertising group membership.
· Global source multicast routing table state is not required, saving memory.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1092

Routing

How to Configure MSDP

How to Configure MSDP

Default MSDP Configuration
MSDP is not enabled, and no default MSDP peer exists.

Configuring a Default MSDP Peer
In this software release, because BGP and MBGP are not supported, you cannot configure an MSDP peer on the local switch by using the ip msdp peer global configuration command. Instead, you define a default MSDP peer (by using the ip msdp default-peer global configuration command) from which to accept all SA messages for the switch. The default MSDP peer must be a previously configured MSDP peer. Configure a default MSDP peer when the switch is not BGP- or MBGP-peering with an MSDP peer. If a single MSDP peer is configured, the switch always accepts all SA messages from that peer.
This figure shows a network in which default MSDP peers might be used. A customer who owns Switch B is connected to the Internet through two Internet service providers (ISPs), one owning Router A and the other owning Router C. They are not running BGP or MBGP between them. To learn about sources in the ISP's domain or in other domains, Switch B at the customer site identifies Router A as its default MSDP peer. Switch B advertises SA messages to both Router A and Router C but accepts SA messages only from Router A or only from Router C. If Router A is first in the configuration file, it is used if it is running. If Router A is not running, only then does Switch B accept SA messages from Router C. This is the default behavior without a prefix list.
If you specify a prefix list, the peer is a default peer only for the prefixes in the list. You can have multiple active default peers when you have a prefix list associated with each. When you do not have any prefix lists, you can configure multiple default peers, but only the first one is the active default peer as long as the router has connectivity to this peer and the peer is alive. If the first configured peer fails or the connectivity to this peer fails, the second configured peer becomes the active default, and so on.
The ISP probably uses a prefix list to define which prefixes it accepts from the customer's router.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Router# configure terminal

Step 2

ip msdp default-peer ip-address | name [prefix-list list] Example:
Router(config)# ip msdp default-peer 10.1.1.1 prefix-list site-a

Defines a default peer from which to accept all MSDP SA messages.
· For ip-address | name, enter the IP address or Domain Name System (DNS) server name of the MSDP default peer.

· (Optional) For prefix-list list, enter the list name that specifies the peer to be the default peer only for the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1093

Configuring a Default MSDP Peer

Routing

Step 3 Step 4

Command or Action

Purpose
listed prefixes. You can have multiple active default peers when you have a prefix list associated with each.
When you enter multiple ip msdp default-peer commands with the prefix-list keyword, you use all the default peers at the same time for different RP prefixes. This syntax is typically used in a service provider cloud that connects stub site clouds.
When you enter multiple ip msdp default-peer commands without the prefix-list keyword, a single active peer accepts all SA messages. If that peer fails, the next configured default peer accepts all SA messages. This syntax is typically used at a stub site.

ip prefix-list name [description string] | seq number {permit | deny} network length

(Optional) Creates a prefix list using the name specified in Step 2.

Example:
Router(config)# prefix-list site-a seq 3 permit 12 network length 128

· (Optional) For description string, enter a description of up to 80 characters to describe this prefix list.
· For seq number, enter the sequence number of the entry. The range is 1 to 4294967294.

· The deny keyword denies access to matching conditions.

· The permit keyword permits access to matching conditions.

· For network length, specify the network number and length (in bits) of the network mask that is permitted or denied.

ip msdp description {peer-name | peer-address} text Example:
Router(config)# ip msdp description peer-name site-b

(Optional) Configures a description for the specified peer to make it easier to identify in a configuration or in show command output.
By default, no description is associated with an MSDP peer.

Step 5

end Example:
Router(config)# end

Returns to privileged EXEC mode.

Step 6

show running-config Example:
Router# show running-config

Verifies your entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1094

Routing

Caching Source-Active State

Step 7

Command or Action copy running-config startup-config Example:
Router# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Caching Source-Active State
By default, the switch does not cache source/group pairs from received SA messages. When the switch forwards the MSDP SA information, it does not store it in memory. Therefore, if a member joins a group soon after a SA message is received by the local RP, that member needs to wait until the next SA message to hear about the source. This delay is known as join latency.
If you want to sacrifice some memory in exchange for reducing the latency of the source information, you can configure the switch to cache SA messages.
Beginning in privileged EXEC mode, follow these steps to enable the caching of source/group pairs. This procedure is optional.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

ip msdp cache-sa-state [list access-list-number] Example:
Switch(config)# ip msdp cache-sa-state 100

Enables the caching of source/group pairs (create an SA state). Those pairs that pass the access list are cached.
For list access-list-number, the range is 100 to 199.
Note An alternative to this command is the ip msdp sa-reques global configuration command, which causes the switch to send an SA request message to the MSDP peer when a new member for a group becomes active.

access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard Example:
Switch(config)# access-list 100 permit ip 171.69.0.0 0.0.255.255 224.2.0.0 0.0.255.255

Creates an IP extended access list, repeating the command as many times as necessary.
· For access-list-number, the range is 100 to 199. Enter the same number created in Step 2.
· The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched.

· For protocol, enter ip as the protocol name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1095

Controlling Source Information that Your Switch Originates

Routing

Command or Action

Step 4

end Example:
Switch(config)# end

Step 5

show running-config Example:
Switch# show running-config

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose · For source, enter the number of the network or host from which the packet is being sent. · For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. · For destination, enter the number of the network or host to which the packet is being sent. · For destination-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the destination. Place ones in the bit positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Controlling Source Information that Your Switch Originates
You can control the multicast source information that originates with your switch: · Sources you advertise (based on your sources) · Receivers of source information (based on knowing the requestor)
For more information, see the Redistributing Sources, on page 1096 and the Filtering Source-Active Request Messages, on page 1098.
Redistributing Sources
SA messages originate on RPs to which sources have registered. By default, any source that registers with an RP is advertised. The A flag is set in the RP when a source is registered, which means the source is advertised in an SA unless it is filtered.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1096

Routing

Redistributing Sources

Step 1

This task is optional.
Procedure Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2 Step 3

ip msdp redistribute [list access-list-name] [asn aspath-access-list-number] [route-map map] Example:
Switch(config)# ip msdp redistribute list 21

Configures which (S,G) entries from the multicast routing table are advertised in SA messages.
By default, only sources within the local domain are advertised.
· (Optional) list access-list-name-- Enters the name or number of an IP standard or extended access list. The range is 1 to 99 for standard access lists and 100 to 199 for extended lists. The access list controls which local sources are advertised and to which groups they send.
· (Optional) asn aspath-access-list-number--Enters the IP standard or extended access list number in the range 1 to 199. This access list number must also be configured in the ip as-path access-list command.
· (Optional) route-map map--Enters the IP standard or extended access list number in the range 1 to 199. This access list number must also be configured in the ip as-path access-list command.

The switch advertises (S,G) pairs according to the access list or autonomous system path access list.

Use one of the following:
· access-listaccess-list-number {deny | permit} source [source-wildcard]
· access-listaccess-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard

Creates an IP standard access list, repeating the command as many times as necessary.
or
Creates an IP extended access list, repeating the command as many times as necessary.
· access-list-number--Enters the same number created in Step 2. The range is 1 to 99 for standard access lists and 100 to 199 for extended lists.

Example:
Switch(config)# access list 21 permit 194.1.22.0

· deny--Denies access if the conditions are matched. The permit keyword permits access if the conditions are matched.

or

· protocol--Enters ip as the protocol name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1097

Filtering Source-Active Request Messages

Routing

Step 4

Command or Action

Purpose

Switch(config)# access list 21 permit ip 194.1.22.0 · source--Enters the number of the network or host

1.1.1.1 194.3.44.0 1.1.1.1

from which the packet is being sent.

· source-wildcard--Enters the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

· destination--Enters the number of the network or host to which the packet is being sent.

· destination-wildcard--Enters the wildcard bits in dotted decimal notation to be applied to the destination. Place ones in the bit positions that you want to ignore.

end Example:

Recall that the access list is always terminated by an implicit deny statement for everything.
Returns to privileged EXEC mode.

Switch(config)# end

Step 5

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Filtering Source-Active Request Messages
By default, only switches that are caching SA information can respond to SA requests. By default, such a switch honors all SA request messages from its MSDP peers and supplies the IP addresses of the active sources.
However, you can configure the switch to ignore all SA requests from an MSDP peer. You can also honor only those SA request messages from a peer for groups described by a standard access list. If the groups in the access list pass, SA request messages are accepted. All other such messages from the peer for other groups are ignored.
This task is optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1098

Routing

Filtering Source-Active Request Messages

Step 1

Procedure Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

Use one of the following:
· ip msdp filter-sa-request {ip-addressname}
· ip msdp filter-sa-request {ip-addressname} list access-list-number
Example:
Switch(config)# ip msdp filter sa-request 171.69.2.2

Filters all SA request messages from the specified MSDP peer.
or
Filters SA request messages from the specified MSDP peer for groups that pass the standard access list. The access list describes a multicast group address. The range for the access-list-number is 1 to 99.

Step 3 Step 4

access-list access-list-number {deny | permit} source [source-wildcard]

Creates an IP standard access list, repeating the command as many times as necessary.

Example:

· For access-list-number, the range is 1 to 99.

Switch(config)# access-list 1 permit 192.4.22.0 0.0.0.255

· The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched.

· For source, enter the number of the network or host from which the packet is being sent.

· (Optional) For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

end Example:

Recall that the access list is always terminated by an implicit deny statement for everything.
Returns to privileged EXEC mode.

Switch(config)# end

Step 5

show running-config Example:
Switch# show running-config

Verifies your entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1099

Controlling Source Information that Your Switch Forwards

Routing

Step 6

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Controlling Source Information that Your Switch Forwards
By default, the switch forwards all SA messages it receives to all its MSDP peers. However, you can prevent outgoing messages from being forwarded to a peer by using a filter or by setting a time-to-live (TTL) value.

Using a Filter

By creating a filter, you can perform one of these actions: · Filter all source/group pairs · Specify an IP extended access list to pass only certain source/group pairs · Filter based on match criteria in a route map

This task is optional.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

Use one of the following: · ip msdp sa-filter out
{ip-address name} · ip msdp sa-filter out
{ip-address name} list access-list-number · ip msdp sa-filter out
{ip-address name} route-map map-tag Example:
Switch(config)# ip msdp sa-filter out switch.cisco.com

· Filters all SA messages to the specified MSDP peer.
· Passes only those SA messages that pass the IP extended access list to the specified peer. The range for the extended access-list-number is 100 to 199.
If both the list and the route-map keywords are used, all conditions must be true to pass any (S,G) pair in outgoing SA messages.
· Passes only those SA messages that meet the match criteria in the route map map-tag to the specified MSDP peer.
If all match criteria are true, a permit from the route map passes routes through the filter. A deny filters routes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1100

Routing

Using a Filter

Command or Action or
Switch(config)# ip msdp sa-filter out list 100

Purpose

or
Switch(config)# ip msdp sa-filter out switch.cisco.com route-map 22

Step 3 Step 4

access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard Example:
Switch(config)# access list 100 permit ip 194.1.22.0 1.1.1.1 194.3.44.0 1.1.1.1

(Optional) Creates an IP extended access list, repeating the command as many times as necessary.
· For access-list-number, enter the number specified in Step 2.
· The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched.

· For protocol, enter ip as the protocol name.

· For source, enter the number of the network or host from which the packet is being sent.

· For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore.

· For destination, enter the number of the network or host to which the packet is being sent.

· For destination-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the destination. Place ones in the bit positions that you want to ignore.

end Example:

Recall that the access list is always terminated by an implicit deny statement for everything.
Returns to privileged EXEC mode.

Switch(config)# end

Step 5

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 6

copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1101

Using TTL to Limit the Multicast Data Sent in SA Messages

Routing

Command or Action
Switch# copy running-config startup-config

Purpose

Using TTL to Limit the Multicast Data Sent in SA Messages
You can use a TTL value to control what data is encapsulated in the first SA message for every source. Only multicast packets with an IP-header TTL greater than or equal to the ttl argument are sent to the specified MSDP peer. For example, you can limit internal traffic to a TTL of 8. If you want other groups to go to external locations, you must send those packets with a TTL greater than 8.
This task is optional.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
ip msdp ttl-threshold {ip-address | name} ttl Example:
Switch(config)# ip msdp ttl-threshold switch.cisco.com 0

Limits which multicast data is encapsulated in the first SA message to the specified MSDP peer.
· For ip-address | name, enter the IP address or name of the MSDP peer to which the TTL limitation applies.
· For ttl, enter the TTL value. The default is 0, which means all multicast data packets are forwarded to the peer until the TTL is exhausted. The range is 0 to 255.

Step 3

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Step 4

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1102

Routing

Controlling Source Information that Your Switch Receives

Controlling Source Information that Your Switch Receives
By default, the switch receives all SA messages that its MSDP RPF peers send to it. However, you can control the source information that you receive from MSDP peers by filtering incoming SA messages. In other words, you can configure the switch to not accept them. You can perform one of these actions:
· Filter all incoming SA messages from an MSDP peer · Specify an IP extended access list to pass certain source/group pairs · Filter based on match criteria in a route map
This task is optional.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
Use one of the following: · ip msdp sa-filter in
{ip-address name} · ip msdp sa-filter in
{ip-address name} list access-list-number · ip msdp sa-filter in
{ip-address name} route-map map-tag Example:
Switch(config)# ip msdp sa-filter in switch.cisco.com

· Filters all SA messages to the specified MSDP peer.
· Passes only those SA messages from the specified peer that pass the IP extended access list. The range for the extended access-list-number is 100 to 199.
If both the list and the route-map keywords are used, all conditions must be true to pass any (S,G) pair in outgoing SA messages.
· Passes only those SA messages from the specified MSDP peer that meet the match criteria in the route map map-tag.
If all match criteria are true, a permit from the route map passes routes through the filter. A deny filters routes.

or
Switch(config)# ip msdp sa-filter in list 100

or
Switch(config)# ip msdp sa-filter in switch.cisco.com route-map 22

Step 3

access-list access-list-number {deny | permit} protocol (Optional) Creates an IP extended access list, repeating the source source-wildcard destination destination-wildcard command as many times as necessary.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1103

Configuring an MSDP Mesh Group

Routing

Command or Action Example:
Switch(config)# access list 100 permit ip 194.1.22.0 1.1.1.1 194.3.44.0 1.1.1.1

Step 4

end Example:
Switch(config)# end

Step 5

show running-config Example:
Switch# show running-config

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose · access-list-number, enter the number specified in Step 2. · The deny keyword denies access if the conditions are matched. The permit keyword permits access if the conditions are matched. · For protocol, enter ip as the protocol name. · For source, enter the number of the network or host from which the packet is being sent. · For source-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the source. Place ones in the bit positions that you want to ignore. · For destination, enter the number of the network or host to which the packet is being sent. · For destination-wildcard, enter the wildcard bits in dotted decimal notation to be applied to the destination. Place ones in the bit positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny statement for everything. Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Configuring an MSDP Mesh Group
An MSDP mesh group is a group of MSDP speakers that have fully meshed MSDP connectivity among one another. Any SA messages received from a peer in a mesh group are not forwarded to other peers in the same mesh group. Thus, you reduce SA message flooding and simplify peer-RPF flooding. Use the ip msdp mesh-group global configuration command when there are multiple RPs within a domain. It is especially

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1104

Routing

Shutting Down an MSDP Peer

Step 1

used to send SA messages across a domain. You can configure multiple mesh groups (with different names) in a single switch.
This task is optional.

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

ip msdp mesh-group name {ip-address | name} Example:
Switch(config)# ip msdp mesh-group 2 switch.cisco.com

Step 3

end Example:
Switch(config)# end

Configures an MSDP mesh group, and specifies the MSDP peer belonging to that mesh group. By default, the MSDP peers do not belong to a mesh group.
· For name, enter the name of the mesh group. · For ip-address | name, enter the IP address or name of
the MSDP peer to be a member of the mesh group.
Repeat this procedure on each MSDP peer in the group.
Returns to privileged EXEC mode.

Step 4

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Shutting Down an MSDP Peer
If you want to configure many MSDP commands for the same peer and you do not want the peer to become active, you can shut down the peer, configure it, and later bring it up. When a peer is shut down, the TCP connection is terminated and is not restarted. You can also shut down an MSDP session without losing configuration information for the peer.
This task is optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1105

Including a Bordering PIM Dense-Mode Region in MSDP

Routing

Step 1

Procedure Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ip msdp shutdown {peer-name | peer address}

Shuts down the specified MSDP peer without losing

Example:

configuration information.

For peer-name | peer address, enter the IP address or name

Switch(config)# ip msdp shutdown switch.cisco.com of the MSDP peer to shut down.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Including a Bordering PIM Dense-Mode Region in MSDP
You can configure MSDP on a switch that borders a PIM sparse-mode region with a dense-mode region. By default, active sources in the dense-mode region do not participate in MSDP.

Note We do not recommend using the ip msdp border sa-address global configuration command. It is better to configure the border router in the sparse-mode domain to proxy-register sources in the dense-mode domain to the RP of the sparse-mode domain and have the sparse-mode domain use standard MSDP procedures to advertise these sources.
The ip msdp originator-id global configuration command also identifies an interface to be used as the RP address. If both the ip msdp border sa-address and the ip msdp originator-id global configuration commands are configured, the address derived from the ip msdp originator-id command specifies the RP address.
This task is optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1106

Routing

Configuring an Originating Address other than the RP Address

Step 1

Procedure Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2 Step 3

ip msdp border sa-address interface-id Example:
Switch(config)# ip msdp border sa-address 0/1
ip msdp redistribute [list access-list-name] [asn aspath-access-list-number] [route-map map] Example:
Switch(config)# ip msdp redistribute list 100

Configures the switch on the border between a dense-mode and sparse-mode region to send SA messages about active sources in the dense-mode region.
For interface-id, specifies the interface from which the IP address is derived and used as the RP address in SA messages.
The IP address of the interface is used as the Originator-ID, which is the RP field in the SA message.
Configures which (S,G) entries from the multicast routing table are advertised in SA messages.
For more information, see the Redistributing Sources, on page 1096.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 5

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring an Originating Address other than the RP Address
You can allow an MSDP speaker that originates an SA message to use the IP address of the interface as the RP address in the SA message by changing the Originator ID. You might change the Originator ID in one of these cases:
· If you configure a logical RP on multiple switches in an MSDP mesh group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1107

Monitoring and Maintaining MSDP

Routing

Step 1

· If you have a switch that borders a PIM sparse-mode domain and a dense-mode domain. If a switch borders a dense-mode domain for a site, and sparse-mode is being used externally, you might want dense-mode sources to be known to the outside world. Because this switch is not an RP, it would not have an RP address to use in an SA message. Therefore, this command provides the RP address by specifying the address of the interface.
If both the ip msdp border sa-address and the ip msdp originator-id global configuration commands are configured, the address derived from the ip msdp originator-id command specifies the address of the RP.
This task is optional.

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

ip msdp originator-id interface-id Example:
Switch(config)# ip msdp originator-id 0/1

Configures the RP address in SA messages to be the address of the originating device interface.
For interface-id, specify the interface on the local switch.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Monitoring and Maintaining MSDP
Commands that monitor MSDP SA messages, peers, state, and peer status:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1108

Routing

Configuration Examples for Configuring MSDP

Table 93: Commands for Monitoring and Maintaining MSDP

Command debug ip msdp [peer-address | name] [detail] [routes] debug ip msdp resets show ip msdp count [autonomous-system-number]
show ip msdp peer [peer-address | name] show ip msdp sa-cache [group-address | source-address | group-name | source-name] [autonomous-system-number] show ip msdp summary

Purpose Debugs an MSDP activity.
Debugs MSDP peer reset reasons. Displays the number of sources and groups originated in SA messages from each autonomous system. The ip msdp cache-sa-state command must be configured for this command to produce any output. Displays detailed information about an MSDP peer. Displays (S,G) state learned from MSDP peers.
Displays MSDP peer status and SA message counts.

Commands that clear MSDP connections, statistics, and SA cache entries:
Table 94: Commands for Clearing MSDP Connections, Statistics, or SA Cache Entries

Command

Purpose

clear ip msdp peer peer-address | name Clears the TCP connection to the specified MSDP peer, resetting all MSDP message counters.

clear ip msdp statistics [peer-address | Clears statistics counters for one or all the MSDP peers without

name]

resetting the sessions.

clear ip msdp sa-cache [group-address | Clears the SA cache entries for all entries, all sources for a

name]

specific group, or all entries for a specific source/group pair.

Configuration Examples for Configuring MSDP
Configuring a Default MSDP Peer: Example
This example shows a partial configuration of Router A and Router C in . Each of these ISPs have more than one customer (like the customer in ) who use default peering (no BGP or MBGP). In that case, they might have similar configurations. That is, they accept SAs only from a default peer if the SA is permitted by the corresponding prefix list. Router A
Router(config)# ip msdp default-peer 10.1.1.1 Router(config)# ip msdp default-peer 10.1.1.1 prefix-list site-a

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1109

Caching Source-Active State: Example

Routing

Router(config)# ip prefix-list site-b permit 10.0.0.0/1
Router C
Router(config)# ip msdp default-peer 10.1.1.1 prefix-list site-a Router(config)# ip prefix-list site-b permit 10.0.0.0/1
Caching Source-Active State: Example
This example shows how to enable the cache state for all sources in 171.69.0.0/16 sending to groups 224.2.0.0/16:
Switch(config)# ip msdp cache-sa-state 100 Switch(config)# access-list 100 permit ip 171.69.0.0 0.0.255.255 224.2.0.0 0.0.255.255
Controlling Source Information that Your Switch Originates: Example
This example shows how to configure the switch to filter SA request messages from the MSDP peer at 171.69.2.2. SA request messages from sources on network 192.4.22.0 pass access list 1 and are accepted; all others are ignored.
Switch(config)# ip msdp filter sa-request 171.69.2.2 list 1 Switch(config)# access-list 1 permit 192.4.22.0 0.0.0.255
Controlling Source Information that Your Switch Forwards: Example
This example shows how to allow only (S,G) pairs that pass access list 100 to be forwarded in an SA message to the peer named switch.cisco.com:
Switch(config)# ip msdp peer switch.cisco.com connect-source gigabitethernet1/0/1 Switch(config)# ip msdp sa-filter out switch.cisco.com list 100 Switch(config)# access-list 100 permit ip 171.69.0.0 0.0.255.255 224.20 0 0.0.255.255
Controlling Source Information that Your Switch Receives: Example
This example shows how to filter all SA messages from the peer named switch.cisco.com:
Switch(config)# ip msdp peer switch.cisco.com connect-source gigabitethernet1/0/1 Switch(config)# ip msdp sa-filter in switch.cisco.com

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1110

6 0 C H A P T E R
Configuring IP Unicast Routing
· Finding Feature Information, on page 1112 · Information About Configuring IP Unicast Routing, on page 1112 · Information About IP Routing, on page 1112 · How to Configure IP Routing, on page 1119 · How to Configure IP Addressing, on page 1120 · Monitoring and Maintaining IP Addressing, on page 1135 · How to Configure IP Unicast Routing, on page 1136 · Information About RIP, on page 1137 · How to Configure RIP, on page 1138 · Configuration Example for Summary Addresses and Split Horizon, on page 1144 · Information About OSPF, on page 1145 · How to Configure OSPF, on page 1148 · Monitoring OSPF, on page 1158 · Configuration Examples for OSPF, on page 1159 · Information About EIGRP, on page 1160 · How to Configure EIGRP, on page 1163 · Monitoring and Maintaining EIGRP, on page 1169 · Information About BGP, on page 1170 · How to Configure BGP, on page 1177 · Monitoring and Maintaining BGP, on page 1198 · Configuration Examples for BGP, on page 1199 · Information About ISO CLNS Routing, on page 1200 · How to Configure ISO CLNS Routing, on page 1203 · Monitoring and Maintaining ISO IGRP and IS-IS, on page 1212 · Configuration Examples for ISO CLNS Routing, on page 1213 · Information About Multi-VRF CE, on page 1214 · How to Configure Multi-VRF CE, on page 1217 · Configuration Examples for Multi-VRF CE, on page 1230 · Configuring Unicast Reverse Path Forwarding, on page 1234 · Protocol-Independent Features, on page 1234 · Monitoring and Maintaining the IP Network, on page 1256
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1111

Finding Feature Information

Routing

Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring IP Unicast Routing
This module describes how to configure IP Version 4 (IPv4) unicast routing on the switch.
Note On switches running the LAN base feature, static routing on VLANs is supported only with this release.
A switch stack operates and appears as a single router to the rest of the routers in the network. Basic routing functions, including static routing and the Routing Information Protocol (RIP), are available with both the IP base feature set and the IP services feature set. To use advanced routing features and other routing protocols, you must have the IP services feature set enabled on the standalone switch or on the active switch.
Note In addition to IPv4 traffic, you can also enable IP Version 6 (IPv6) unicast routing and configure interfaces to forward IPv6 traffic if the switch or switch stack is running the IP base or IP services feature set.
Information About IP Routing
In some network environments, VLANs are associated with individual networks or subnetworks. In an IP network, each subnetwork is mapped to an individual VLAN. Configuring VLANs helps control the size of the broadcast domain and keeps local traffic local. However, network devices in different VLANs cannot communicate with one another without a Layer 3 device (router) to route traffic between the VLAN, referred to as inter-VLAN routing. You configure one or more routers to route traffic to the appropriate destination VLAN.
Figure 63: Routing Topology Example
This figure shows a basic routing topology. Switch A is in VLAN 10, and Switch B is in VLAN 20. The router

has an interface in each VLAN.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1112

Routing

Types of Routing

When Host A in VLAN 10 needs to communicate with Host B in VLAN 10, it sends a packet addressed to that host. Switch A forwards the packet directly to Host B, without sending it to the router.
When Host A sends a packet to Host C in VLAN 20, Switch A forwards the packet to the router, which receives the traffic on the VLAN 10 interface. The router checks the routing table, finds the correct outgoing interface, and forwards the packet on the VLAN 20 interface to Switch B. Switch B receives the packet and forwards it to Host C.
Types of Routing
Routers and Layer 3 switches can route packets in these ways:
· By using default routing
· By using preprogrammed static routes for the traffic
· By dynamically calculating routes by using a routing protocol
Default routing refers to sending traffic with a destination unknown to the router to a default outlet or destination.
Static unicast routing forwards packets from predetermined ports through a single path into and out of a network. Static routing is secure and uses little bandwidth, but does not automatically respond to changes in the network, such as link failures, and therefore, might result in unreachable destinations. As networks grow, static routing becomes a labor-intensive liability.
Switches running the LAN base feature set support 16 user-configured static routes, in addition to any default routes used for the management interface. The LAN base image supports static routing only on SVIs.
Dynamic routing protocols are used by routers to dynamically calculate the best route for forwarding traffic. There are two types of dynamic routing protocols:
· Routers using distance-vector protocols maintain routing tables with distance values of networked resources, and periodically pass these tables to their neighbors. Distance-vector protocols use one or a series of metrics for calculating the best routes. These protocols are easy to configure and use.
· Routers using link-state protocols maintain a complex database of network topology, based on the exchange of link-state advertisements (LSAs) between routers. LSAs are triggered by an event in the network, which speeds up the convergence time or time required to respond to these changes. Link-state protocols respond quickly to topology changes, but require greater bandwidth and more resources than distance-vector protocols.
Distance-vector protocols supported by the switch are Routing Information Protocol (RIP), which uses a single distance metric (cost) to determine the best path and Border Gateway Protocol (BGP), which adds a path vector mechanism. The switch also supports the Open Shortest Path First (OSPF) link-state protocol and Enhanced IGRP (EIGRP), which adds some link-state routing features to traditional Interior Gateway Routing Protocol (IGRP) to improve efficiency.
Note On a switch or switch stack, the supported protocols are determined by the software running on the active switch. If the active switch is running the IP base feature set, only default routing, static routing and RIP are supported. If the active switch is running the IP base feature set, only default routing, static routing and RIP are supported. If the switch is running the LAN base feature set, you can configure 16 static routes on SVIs. All other routing protocols require the IP services feature set.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1113

IP Routing and Switch Stacks

Routing

IP Routing and Switch Stacks
A switch stack appears to the network as a single switch, regardless of which switch in the stack is connected to a routing peer. The active switch performs these functions:
· It initializes and configures the routing protocols.
· It sends routing protocol messages and updates to other routers.
· It processes routing protocol messages and updates received from peer routers.
· It generates, maintains, and distributes the distributed Cisco Express Forwarding (dCEF) database to all stack members. The routes are programmed on all switches in the stack bases on this database.
· The MAC address of the active switch is used as the router MAC address for the whole stack, and all outside devices use this address to send IP packets to the stack.
· All IP packets that require software forwarding or processing go through the CPU of the active switch.
Stack members perform these functions: · They act as routing standby switches, ready to take over in case they are elected as the new active switch if the active switch fails.
· They program the routes into hardware.
If a active switch fails, the stack detects that the active switch is down and elects one of the stack members to be the new active switch. During this period, except for a momentary interruption, the hardware continues to forward packets with no active protocols. However, even though the switch stack maintains the hardware identification after a failure, the routing protocols on the router neighbors might flap during the brief interruption before the active switch restarts. Routing protocols such as OSPF and EIGRP need to recognize neighbor transitions. The router uses two levels of nonstop forwarding (NSF) to detect a switchover, to continue forwarding network traffic, and to recover route information from peer devices:
· NSF-aware routers tolerate neighboring router failures. After the neighbor router restarts, an NSF-aware router supplies information about its state and route adjacencies on request.
· NSF-capable routers support NSF. When they detect a active switch change, they rebuild routing information from NSF-aware or NSF-capable neighbors and do not wait for a restart.
The switch stack supports NSF-capable routing for OSPF and EIGRP. Upon election, the new active switch performs these functions:
· It starts generating, receiving, and processing routing updates.
· It builds routing tables, generates the CEF database, and distributes it to stack members.
· It uses its MAC address as the router MAC address. To notify its network peers of the new MAC address, it periodically (every few seconds for 5 minutes) sends a gratuitous ARP reply with the new router MAC address.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1114

Routing

Classless Routing

Note If you configure the persistent MAC address feature on the stack and the active switch changes, the stack MAC address does not change for the configured time period. If the previous active switch rejoins the stack as a member switch during that time period, the stack MAC address remains the MAC address of the previous active switch.
· It attempts to determine the reachability of every proxy ARP entry by sending an ARP request to the proxy ARP IP address and receiving an ARP reply. For each reachable proxy ARP IP address, it generates a gratuitous ARP reply with the new router MAC address. This process is repeated for 5 minutes after a new active switch election.
Note When a active switch is running the IP services feature set, the stack can run all supported protocols, including Open Shortest Path First (OSPF), Enhanced IGRP (EIGRP), and Border Gateway Protocol (BGP). If the active switch fails and the new elected active switch is running the IP base or LAN base feature set, these protocols will no longer run in the stack.
Caution Partitioning of the switch stack into two or more stacks might lead to undesirable behavior in the network.
If the switch is reloaded, then all the ports on that switch go down and there is a loss of traffic for the interfaces involved in routing, despite NSF/SSO capability
Classless Routing
By default, classless routing behavior is enabled on the switch when it is configured to route. With classless routing, if a router receives packets for a subnet of a network with no default route, the router forwards the packet to the best supernet route. A supernet consists of contiguous blocks of Class C address spaces used to simulate a single, larger address space and is designed to relieve the pressure on the rapidly depleting Class B address space. In Figure 41-2, classless routing is enabled. When the host sends a packet to 120.20.4.1, instead of discarding the packet, the router forwards it to the best supernet route. If you disable classless routing and a router receives packets destined for a subnet of a network with no network default route, the router discards the packet.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1115

Address Resolution Figure 64: IP Classless Routing

Routing

In Figure 41-3, the router in network 128.20.0.0 is connected to subnets 128.20.1.0, 128.20.2.0, and 128.20.3.0. If the host sends a packet to 120.20.4.1, because there is no network default route, the router discards the packet.
Figure 65: No IP Classless Routing

Address Resolution
You can control interface-specific handling of IP by using address resolution. A device using IP can have both a local address or MAC address, which uniquely defines the device on its local segment or LAN, and a network address, which identifies the network to which the device belongs.
Note In a switch stack, network communication uses a single MAC address and the IP address of the stack.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1116

Routing

Proxy ARP

The local address or MAC address is known as a data link address because it is contained in the data link layer (Layer 2) section of the packet header and is read by data link (Layer 2) devices. To communicate with a device on Ethernet, the software must learn the MAC address of the device. The process of learning the MAC address from an IP address is called address resolution. The process of learning the IP address from the MAC address is called reverse address resolution.
The switch can use these forms of address resolution:
· Address Resolution Protocol (ARP) is used to associate IP address with MAC addresses. Taking an IP address as input, ARP learns the associated MAC address and then stores the IP address/MAC address association in an ARP cache for rapid retrieval. Then the IP datagram is encapsulated in a link-layer frame and sent over the network. Encapsulation of IP datagrams and ARP requests or replies on IEEE 802 networks other than Ethernet is specified by the Subnetwork Access Protocol (SNAP).
· Proxy ARP helps hosts with no routing tables learn the MAC addresses of hosts on other networks or subnets. If the switch (router) receives an ARP request for a host that is not on the same interface as the ARP request sender, and if the router has all of its routes to the host through other interfaces, it generates a proxy ARP packet giving its own local data link address. The host that sent the ARP request then sends its packets to the router, which forwards them to the intended host.
The switch also uses the Reverse Address Resolution Protocol (RARP), which functions the same as ARP does, except that the RARP packets request an IP address instead of a local MAC address. Using RARP requires a RARP server on the same network segment as the router interface. Use the ip rarp-server address interface configuration command to identify the server.
For more information on RARP, see the Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.4.

Proxy ARP

Proxy ARP, the most common method for learning about other routes, enables an Ethernet host with no routing information to communicate with hosts on other networks or subnets. The host assumes that all hosts are on the same local Ethernet and that they can use ARP to learn their MAC addresses. If a switch receives an ARP request for a host that is not on the same network as the sender, the switch evaluates whether it has the best route to that host. If it does, it sends an ARP reply packet with its own Ethernet MAC address, and the host that sent the request sends the packet to the switch, which forwards it to the intended host. Proxy ARP treats all networks as if they are local and performs ARP requests for every IP address.

ICMP Router Discovery Protocol
Router discovery allows the switch to dynamically learn about routes to other networks using ICMP router discovery protocol (IRDP). IRDP allows hosts to locate routers. When operating as a client, the switch generates router discovery packets. When operating as a host, the switch receives router discovery packets. The switch can also listen to Routing Information Protocol (RIP) routing updates and use this information to infer locations of routers. The switch does not actually store the routing tables sent by routing devices; it merely keeps track of which systems are sending the data. The advantage of using IRDP is that it allows each router to specify both a priority and the time after which a device is assumed to be down if no further packets are received.
Each device discovered becomes a candidate for the default router, and a new highest-priority router is selected when a higher priority router is discovered, when the current default router is declared down, or when a TCP connection is about to time out because of excessive retransmissions.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1117

UDP Broadcast Packets and Protocols

Routing

UDP Broadcast Packets and Protocols
User Datagram Protocol (UDP) is an IP host-to-host layer protocol, as is TCP. UDP provides a low-overhead, connectionless session between two end systems and does not provide for acknowledgment of received datagrams. Network hosts occasionally use UDP broadcasts to find address, configuration, and name information. If such a host is on a network segment that does not include a server, UDP broadcasts are normally not forwarded. You can remedy this situation by configuring an interface on a router to forward certain classes of broadcasts to a helper address. You can use more than one helper address per interface.
You can specify a UDP destination port to control which UDP services are forwarded. You can specify multiple UDP protocols. You can also specify the Network Disk (ND) protocol, which is used by older diskless Sun workstations and the network security protocol SDNS.
By default, both UDP and ND forwarding are enabled if a helper address has been defined for an interface. The description for the ip forward-protocol interface configuration command in the Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services, Release 12.4 lists the ports that are forwarded by default if you do not specify any UDP ports.
Broadcast Packet Handling
After configuring an IP interface address, you can enable routing and configure one or more routing protocols, or you can configure the way the switch responds to network broadcasts. A broadcast is a data packet destined for all hosts on a physical network. The switch supports two kinds of broadcasting:
· A directed broadcast packet is sent to a specific network or series of networks. A directed broadcast address includes the network or subnet fields.
· A flooded broadcast packet is sent to every network.
Note You can also limit broadcast, unicast, and multicast traffic on Layer 2 interfaces by using the storm-control interface configuration command to set traffic suppression levels.
Routers provide some protection from broadcast storms by limiting their extent to the local cable. Bridges (including intelligent bridges), because they are Layer 2 devices, forward broadcasts to all network segments, thus propagating broadcast storms. The best solution to the broadcast storm problem is to use a single broadcast address scheme on a network. In most modern IP implementations, you can set the address to be used as the broadcast address. Many implementations, including the one in the switch, support several addressing schemes for forwarding broadcast messages.
IP Broadcast Flooding
You can allow IP broadcasts to be flooded throughout your internetwork in a controlled fashion by using the database created by the bridging STP. Using this feature also prevents loops. To support this capability, bridging must be configured on each interface that is to participate in the flooding. If bridging is not configured on an interface, it still can receive broadcasts. However, the interface never forwards broadcasts it receives, and the router never uses that interface to send broadcasts received on a different interface.
Packets that are forwarded to a single network address using the IP helper-address mechanism can be flooded. Only one copy of the packet is sent on each network segment.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1118

Routing

How to Configure IP Routing

To be considered for flooding, packets must meet these criteria. (Note that these are the same conditions used to consider packet forwarding using IP helper addresses.)
· The packet must be a MAC-level broadcast.
· The packet must be an IP-level broadcast.
· The packet must be a TFTP, DNS, Time, NetBIOS, ND, or BOOTP packet, or a UDP specified by the ip forward-protocol udp global configuration command.
· The time-to-live (TTL) value of the packet must be at least two.
A flooded UDP datagram is given the destination address specified with the ip broadcast-address interface configuration command on the output interface. The destination address can be set to any address. Thus, the destination address might change as the datagram propagates through the network. The source address is never changed. The TTL value is decremented. When a flooded UDP datagram is sent out an interface (and the destination address possibly changed), the datagram is handed to the normal IP output routines and is, therefore, subject to access lists, if they are present on the output interface. In the switch, the majority of packets are forwarded in hardware; most packets do not go through the switch CPU. For those packets that do go to the CPU, you can speed up spanning tree-based UDP flooding by a factor of about four to five times by using turbo-flooding. This feature is supported over Ethernet interfaces configured for ARP encapsulation.
How to Configure IP Routing
By default, IP routing is disabled on the switch, and you must enable it before routing can take place. For detailed IP routing configuration information, see the Cisco IOS IP Configuration Guide, Release 12.4 In the following procedures, the specified interface must be one of these Layer 3 interfaces:
· A routed port: a physical port configured as a Layer 3 port by using the no switchport interface configuration command.
· A switch virtual interface (SVI): a VLAN interface created by using the interface vlan vlan_id global configuration command and by default a Layer 3 interface.
· An EtherChannel port channel in Layer 3 mode: a port-channel logical interface created by using the interface port-channel port-channel-number global configuration command and binding the Ethernet interface into the channel group. For more information, see the "Configuring Layer 3 EtherChannels" section on page 39-15.
Note The switch does not support tunnel interfaces for unicast routed traffic.
All Layer 3 interfaces on which routing will occur must have IP addresses assigned to them. See the "Assigning IP Addresses to Network Interfaces" section on page 41-7.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1119

How to Configure IP Addressing

Routing

Note A Layer 3 switch can have an IP address assigned to each routed port and SVI. The number of routed ports and SVIs that you can configure is limited to 128, exceeding the recommended number and volume of features being implemented might impact CPU utilization because of hardware limitations.
Configuring routing consists of several main procedures: · To support VLAN interfaces, create and configure VLANs on the switch or switch stack, and assign VLAN membership to Layer 2 interfaces. For more information, see Chapter 14, "Configuring VLANs." · Configure Layer 3 interfaces. · Enable IP routing on the switch. · Assign IP addresses to the Layer 3 interfaces. · Enable selected routing protocols on the switch. · Configure routing protocol parameters (optional).

How to Configure IP Addressing
A required task for configuring IP routing is to assign IP addresses to Layer 3 network interfaces to enable the interfaces and allow communication with the hosts on those interfaces that use IP. The following sections describe how to configure various IP addressing features. Assigning IP addresses to the interface is required; the other procedures are optional.

Default IP Addressing Configuration
Table 95: Default Addressing Configuration
Feature IP address ARP
IP broadcast address IP classless routing IP default gateway IP directed broadcast

Default Setting None defined. No permanent entries in the Address Resolution Protocol (ARP) cache. Encapsulation: Standard Ethernet-style ARP. Timeout: 14400 seconds (4 hours). 255.255.255.255 (all ones). Enabled. Disabled. Disabled (all IP directed broadcasts are dropped).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1120

Routing

Assigning IP Addresses to Network Interfaces

Feature IP domain IP forward-protocol
IP helper address IP host IRDP
IP proxy ARP IP routing IP subnet-zero

Default Setting
Domain list: No domain names defined. Domain lookup: Enabled. Domain name: Enabled.
If a helper address is defined or User Datagram Protocol (UDP) flooding is configured, UDP forwarding is enabled on default ports. Any-local-broadcast: Disabled. Spanning Tree Protocol (STP): Disabled. Turbo-flood: Disabled.
Disabled.
Disabled.
Disabled. Defaults when enabled:
· Broadcast IRDP advertisements. · Maximum interval between advertisements: 600
seconds. · Minimum interval between advertisements: 0.75
times max interval · Preference: 0.
Enabled.
Disabled.
Disabled.

Assigning IP Addresses to Network Interfaces
An IP address identifies a location to which IP packets can be sent. Some IP addresses are reserved for special uses and cannot be used for host, subnet, or network addresses. RFC 1166, "Internet Numbers," contains the official description of IP addresses.
An interface can have one primary IP address. A mask identifies the bits that denote the network number in an IP address. When you use the mask to subnet a network, the mask is referred to as a subnet mask. To receive an assigned network number, contact your Internet service provider.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1121

Assigning IP Addresses to Network Interfaces

Routing

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

no switchport Example:

Removes the interface from Layer 2 configuration mode (if it is a physical interface).

Switch(config-if)# no switchport
ip address ip-address subnet-mask Example:

Configures the IP address and IP subnet mask.

Switch(config-if)# ip address 10.1.5.1 255.255.255.0
no shutdown Example:

Enables the physical interface.

Switch(config-if)# no shutdown
end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show ip route Example:

Verifies your entries.

Switch# show ip route
show ip interface [interface-id] Example:

Verifies your entries.

Switch# show ip interface gigabitethernet 1/0/1

show running-config interface [interface-id] Example:

Verifies your entries.

Switch# show running-config interface gigabitethernet 1/0/1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1122

Routing

Using Subnet Zero

Step 10

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Using Subnet Zero
Subnetting with a subnet address of zero is strongly discouraged because of the problems that can arise if a network and a subnet have the same addresses. For example, if network 131.108.0.0 is subnetted as 255.255.255.0, subnet zero would be written as 131.108.0.0, which is the same as the network address.
You can use the all ones subnet (131.108.255.0) and even though it is discouraged, you can enable the use of subnet zero if you need the entire subnet space for your IP address.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
ip subnet-zero Example:

Enables the use of subnet zero for interface addresses and routing updates.

Step 3

Switch(config)# ip subnet-zero
end Example:

Returns to privileged EXEC mode.

Step 4

Switch(config)# end
show running-config Example:

Verifies your entry.

Step 5

Switch# show running-config
copy running-config startup-config Example:

(Optional) Saves your entry in the configuration file.

Switch# copy running-config startup-config

Enabling Classless Routing
To prevent the switch from forwarding packets destined for unrecognized subnets to the best supernet route possible, you can disable classless routing behavior.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1123

Configuring Address Resolution Methods

Routing

Step 1 Step 2 Step 3 Step 4 Step 5

Procedure Command or Action configure terminal Example:
Switch# configure terminal
no ip classless Example:
Switch(config)#no ip classless
end Example:
Switch(config)# end
show running-config Example:
Switch# show running-config
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enters global configuration mode. Disables classless routing behavior. Returns to privileged EXEC mode. Verifies your entry. (Optional) Saves your entry in the configuration file.

Configuring Address Resolution Methods
You can perform the following tasks to configure address resolution.
Defining a Static ARP Cache
ARP and other address resolution protocols provide dynamic mapping between IP addresses and MAC addresses. Because most hosts support dynamic address resolution, you usually do not need to specify static ARP cache entries. If you must define a static ARP cache entry, you can do so globally, which installs a permanent entry in the ARP cache that the switch uses to translate IP addresses into MAC addresses. Optionally, you can also specify that the switch respond to ARP requests as if it were the owner of the specified IP address. If you do not want the ARP entry to be permanent, you can specify a timeout period for the ARP entry.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1124

Routing

Defining a Static ARP Cache

Step 2
Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9

Command or Action

Purpose

arp ip-address hardware-address type Example:

Associates an IP address with a MAC (hardware) address in the ARP cache, and specifies encapsulation type as one of these:

Switch(config)# ip 10.1.5.1 c2f3.220a.12f4 arpa · arpa--ARP encapsulation for Ethernet interfaces

· snap--Subnetwork Address Protocol encapsulation for Token Ring and FDDI interfaces

· sap--HP's ARP type

arp ip-address hardware-address type [alias] Example:

(Optional) Specifies that the switch respond to ARP requests as if it were the owner of the specified IP address.

Switch(config)# ip 10.1.5.3 d7f3.220d.12f5 arpa alias

interface interface-id Example:

Enters interface configuration mode, and specifies the interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

arp timeout seconds Example:

(Optional) Sets the length of time an ARP cache entry will stay in the cache. The default is 14400 seconds (4 hours). The range is 0 to 2147483 seconds.

Switch(config-if)# arp 20000

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show interfaces [interface-id] Example:

Verifies the type of ARP and the timeout value used on all interfaces or a specific interface.

Switch# show interfaces gigabitethernet 1/0/1
show arp Example:

Views the contents of the ARP cache.

Switch# show arp
show ip arp Example:

Views the contents of the ARP cache.

Switch# show ip arp

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1125

Setting ARP Encapsulation

Routing

Step 10

Command or Action copy running-config startup-config Example:
Switch# copy running-config start-config

Purpose (Optional) Saves your entries in the configuration file.

Setting ARP Encapsulation
By default, Ethernet ARP encapsulation (represented by the arpa keyword) is enabled on an IP interface. You can change the encapsulation methods to SNAP if required by your network.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Step 3 Step 4

Switch(config)# interface gigabitethernet 1/0/2

arp {arpa | snap} Example:

Specifies the ARP encapsulation method: · arpa--Address Resolution Protocol

Switch(config-if)# arp arpa

· snap--Subnetwork Address Protocol

end Example:

Returns to privileged EXEC mode.

Step 5

Switch(config-if)# end
show interfaces [interface-id] Example:

Verifies ARP encapsulation configuration on all interfaces or the specified interface.

Step 6

Switch# show interfaces
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1126

Routing

Enabling Proxy ARP

Enabling Proxy ARP
By default, the switch uses proxy ARP to help hosts learn MAC addresses of hosts on other networks or subnets.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Step 3

Switch(config)# interface gigabitethernet 1/0/2

ip proxy-arp Example:

Enables proxy ARP on the interface.

Step 4

Switch(config-if)# ip proxy-arp
end Example:

Returns to privileged EXEC mode.

Step 5

Switch(config-if)# end
show ip interface [interface-id] Example:

Verifies the configuration on the interface or all interfaces.

Step 6

Switch# show ip interface gigabitethernet 1/0/2

copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Routing Assistance When IP Routing is Disabled
These mechanisms allow the switch to learn about routes to other networks when it does not have IP routing enabled:
· Proxy ARP · Default Gateway · ICMP Router Discovery Protocol (IRDP)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1127

Proxy ARP

Routing

Proxy ARP

Proxy ARP is enabled by default. To enable it after it has been disabled, see the "Enabling Proxy ARP" section. Proxy ARP works as long as other routers support it.

Default Gateway
Another method for locating routes is to define a default router or default gateway. All non-local packets are sent to this router, which either routes them appropriately or sends an IP Control Message Protocol (ICMP) redirect message back, defining which local router the host should use. The switch caches the redirect messages and forwards each packet as efficiently as possible. A limitation of this method is that there is no means of detecting when the default router has gone down or is unavailable.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
ip default-gateway ip-address Example:

Sets up a default gateway (router).

Step 3

Switch(config)# ip default gateway 10.1.5.1
end Example:

Returns to privileged EXEC mode.

Step 4

Switch(config)# end
show ip redirects Example:

Displays the address of the default gateway router to verify the setting.

Step 5

Switch# show ip redirects
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

ICMP Router Discovery Protocol (IRDP)
The only required task for IRDP routing on an interface is to enable IRDP processing on that interface. When enabled, the default parameters apply.
You can optionally change any of these parameters. If you change the maxadvertinterval value, the holdtime and minadvertinterval values also change, so it is important to first change the maxadvertinterval value, before manually changing either the holdtime or minadvertinterval values.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1128

Routing

ICMP Router Discovery Protocol (IRDP)

Step 1 Step 2 Step 3 Step 4
Step 5 Step 6 Step 7 Step 8

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

ip irdp Example:

Enables IRDP processing on the interface.

Switch(config-if)# ip irdp
ip irdp multicast Example:
Switch(config-if)# ip irdp multicast

(Optional) Sends IRDP advertisements to the multicast address (224.0.0.1) instead of IP broadcasts.
Note This command allows for compatibility with Sun Microsystems Solaris, which requires IRDP packets to be sent out as multicasts. Many implementations cannot receive these multicasts; ensure end-host ability before using this command.

ip irdp holdtime seconds Example:
Switch(config-if)# ip irdp holdtime 1000
ip irdp maxadvertinterval seconds Example:

(Optional) Sets the IRDP period for which advertisements are valid. The default is three times the maxadvertinterval value. It must be greater than maxadvertinterval and cannot be greater than 9000 seconds. If you change the maxadvertinterval value, this value also changes.
(Optional) Sets the IRDP maximum interval between advertisements. The default is 600 seconds.

Switch(config-if)# ip irdp maxadvertinterval 650

ip irdp minadvertinterval seconds

(Optional) Sets the IRDP minimum interval between

Example:

advertisements. The default is 0.75 times the maxadvertinterval. If you change the maxadvertinterval,

this value changes to the new default (0.75 of Switch(config-if)# ip irdp minadvertinterval 500 maxadvertinterval).

ip irdp preference number Example:
Switch(config-if)# ip irdp preference 2

(Optional) Sets a device IRDP preference level. The allowed range is ­231 to 231. The default is 0. A higher value increases the router preference level.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1129

Configuring Broadcast Packet Handling

Routing

Step 9 Step 10 Step 11 Step 12

Command or Action ip irdp address address [number] Example:

Purpose
(Optional) Specifies an IRDP address and preference to proxy-advertise.

Switch(config-if)# ip irdp address 10.1.10.10
end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show ip irdp Example:

Verifies settings by displaying IRDP values.

Switch# show ip irdp
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Configuring Broadcast Packet Handling
Perform the tasks in these sections to enable these schemes: · Enabling Directed Broadcast-to-Physical Broadcast Translation, page 41-19
· Forwarding UDP Broadcast Packets and Protocols, page 41-20
· Establishing an IP Broadcast Address, page 41-22
· Flooding IP Broadcasts, page 41-23
Enabling Directed Broadcast-to-Physical Broadcast Translation
By default, IP directed broadcasts are dropped; they are not forwarded. Dropping IP-directed broadcasts makes routers less susceptible to denial-of-service attacks. You can enable forwarding of IP-directed broadcasts on an interface where the broadcast becomes a physical (MAC-layer) broadcast. Only those protocols configured by using the ip forward-protocol global configuration command are forwarded. You can specify an access list to control which broadcasts are forwarded. When an access list is specified, only those IP packets permitted by the access list are eligible to be translated from directed broadcasts to physical broadcasts. For more information on access lists, see Chapter 36, "Configuring Network Security with ACLs."

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1130

Routing

Enabling Directed Broadcast-to-Physical Broadcast Translation

Step 1 Step 2 Step 3
Step 4 Step 5
Step 6 Step 7

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the interface to configure.

Switch(config)# interface gigabitethernet 1/0/2

ip directed-broadcast [access-list-number] Example:
Switch(config-if)# ip directed-broadcast 103

Enables directed broadcast-to-physical broadcast translation on the interface. You can include an access list to control which broadcasts are forwarded. When an access list, only IP packets permitted by the access list can be translated.
Note The ip directed-broadcast interface configuration command can be configured on a VPN routing/forwarding(VRF) interface and is VRF aware. Directed broadcast traffic is routed only within the VRF.

exit Example:

Returns to global configuration mode.

Switch(config-if)# exit
ip forward-protocol {udp [port] | nd | sdns} Example:
Switch(config)# ip forward-protocol nd

Specifies which protocols and ports the router forwards when forwarding broadcast packets.
· udp--Forward UPD datagrams. port: (Optional) Destination port that controls which UDP services are forwarded.
· nd--Forward ND datagrams.
· sdns--Forward SDNS datagrams

end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show ip interface [interface-id] Example:

Verifies the configuration on the interface or all interfaces

Switch# show ip interface

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1131

Forwarding UDP Broadcast Packets and Protocols

Routing

Step 8 Step 9

Command or Action show running-config Example:
Switch# show running-config
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies the configuration on the interface or all interfaces
(Optional) Saves your entries in the configuration file.

Forwarding UDP Broadcast Packets and Protocols
If you do not specify any UDP ports when you configure the forwarding of UDP broadcasts, you are configuring the router to act as a BOOTP forwarding agent. BOOTP packets carry DHCP information.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Step 3

Switch(config)# interface gigabitethernet 1/0/1

ip helper-address address Example:

Enables forwarding and specifies the destination address for forwarding UDP broadcast packets, including BOOTP.

Step 4

Switch(config-if)# ip helper address 10.1.10.1
exit Example:

Returns to global configuration mode.

Step 5

Switch(config-if)# exit
ip forward-protocol {udp [port] | nd | sdns} Example:

Specifies which protocols the router forwards when forwarding broadcast packets.

Step 6

Switch(config)# ip forward-protocol sdns
end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1132

Routing

Establishing an IP Broadcast Address

Step 7 Step 8 Step 9

Command or Action

Purpose

Switch(config)# end
show ip interface [interface-id] Example:

Verifies the configuration on the interface or all interfaces.

Switch# show ip interface gigabitethernet 1/0/1

show running-config Example:

Verifies the configuration on the interface or all interfaces.

Switch# show running-config
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Establishing an IP Broadcast Address
The most popular IP broadcast address (and the default) is an address consisting of all ones (255.255.255.255). However, the switch can be configured to generate any form of IP broadcast address.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the interface to configure.

Step 3

Switch(config)# interface gigabitethernet 1/0/1

ip broadcast-address ip-address Example:

Enters a broadcast address different from the default, for example 128.1.255.255.

Step 4

Switch(config-if)# ip broadcast-address 128.1.255.255
end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1133

Flooding IP Broadcasts

Routing

Step 5 Step 6

Command or Action show ip interface [interface-id] Example:
Switch# show ip interface
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies the broadcast address on the interface or all interfaces.
(Optional) Saves your entries in the configuration file.

Flooding IP Broadcasts

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
ip forward-protocol spanning-tree Example:

Uses the bridging spanning-tree database to flood UDP datagrams.

Switch(config)# ip forward-protocol spanning-tree

end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show running-config Example:

Verifies your entry.

Switch# show running-config
copy running-config startup-config Example:

(Optional) Saves your entry in the configuration file.

Switch# copy running-config startup-config
configure terminal Example:

Enters global configuration mode

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1134

Routing

Monitoring and Maintaining IP Addressing

Step 7 Step 8 Step 9 Step 10

Command or Action ip forward-protocol turbo-flood Example:

Purpose
Uses the spanning-tree database to speed up flooding of UDP datagrams.

Switch(config)# ip forward-protocol turbo-flood

end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show running-config Example:

Verifies your entry.

Switch# show running-config
copy running-config startup-config Example:

(Optional) Saves your entry in the configuration file.

Switch# copy running-config startup-config

Monitoring and Maintaining IP Addressing
When the contents of a particular cache, table, or database have become or are suspected to be invalid, you can remove all its contents by using the clear privileged EXEC commands. Table 41-2 lists the commands for clearing contents.
Table 96: Commands to Clear Caches, Tables, and Databases

clear arp-cache clear host {name | *}
clear ip route {network [mask] | *}

Clears the IP ARP cache and the fast-switching cache.
Removes one or all entries from the hostname and the address cache.
Removes one or more routes from the IP routing table.

You can display specific statistics, such as the contents of IP routing tables, caches, and databases; the reachability of nodes; and the routing path that packets are taking through the network. Table 41-3 lists the privileged EXEC commands for displaying IP statistics.
Table 97: Commands to Display Caches, Tables, and Databases

show arp show hosts

Displays the entries in the ARP table.
Displays the default domain name, style of lookup service, name server hosts, and the cached list of hostnames and addresses.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1135

How to Configure IP Unicast Routing

Routing

show ip aliases show ip arp show ip interface [interface-id] show ip irdp show ip masks address
show ip redirects show ip route [address [mask]] | [protocol] show ip route summary

Displays IP addresses mapped to TCP ports (aliases). Displays the IP ARP cache. Displays the IP status of interfaces. Displays IRDP values. Displays the masks used for network addresses and the number of subnets using each mask. Displays the address of a default gateway. Displays the current state of the routing table. Displays the current state of the routing table in summary form.

How to Configure IP Unicast Routing

Enabling IP Unicast Routing
By default, the switch is in Layer 2 switching mode and IP routing is disabled. To use the Layer 3 capabilities of the switch, you must enable IP routing.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
ip routing Example:

Enables IP routing.

Step 3

Switch(config)# ip routing
router ip_routing_protocol Example:
Switch(config)# router rip

Specifies an IP routing protocol. This step might include other commands, such as specifying the networks to route with the network (RIP) router configuration command. For information on specific protocols, see sections later in this chapter and to the Cisco IOS IP Configuration Guide, Release 12.4.
Note The IP base feature set supports only RIP as a routing protocol.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1136

Routing

Example of Enabling IP Routing

Step 4 Step 5 Step 6

Command or Action end Example:
Switch(config)# end
show running-config Example:
Switch# show running-config
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Example of Enabling IP Routing
This example shows how to enable IP routingusing RIP as the routing protocol :

Switch# configure terminal Enter configuration commands, one per line. Switch(config)# ip routing Switch(config)# router rip Switch(config-router)# network 10.0.0.0 Switch(config-router)# end

End with CNTL/Z.

What to Do Next
You can now set up parameters for the selected routing protocols as described in these sections: · RIP · OSPF, · EIGRP · BGP · Unicast Reverse Path Forwarding · Protocol-Independent Features (optional)

Information About RIP
The Routing Information Protocol (RIP) is an interior gateway protocol (IGP) created for use in small, homogeneous networks. It is a distance-vector routing protocol that uses broadcast User Datagram Protocol (UDP) data packets to exchange routing information. The protocol is documented in RFC 1058. You can find detailed information about RIP in IP Routing Fundamentals, published by Cisco Press.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1137

Summary Addresses and Split Horizon

Routing

Note RIP is supported in the IP Base.
Using RIP, the switch sends routing information updates (advertisements) every 30 seconds. If a router does not receive an update from another router for 180 seconds or more, it marks the routes served by that router as unusable. If there is still no update after 240 seconds, the router removes all routing table entries for the non-updating router.
RIP uses hop counts to rate the value of different routes. The hop count is the number of routers that can be traversed in a route. A directly connected network has a hop count of zero; a network with a hop count of 16 is unreachable. This small range (0 to 15) makes RIP unsuitable for large networks.
If the router has a default network path, RIP advertises a route that links the router to the pseudonetwork 0.0.0.0. The 0.0.0.0 network does not exist; it is treated by RIP as a network to implement the default routing feature. The switch advertises the default network if a default was learned by RIP or if the router has a gateway of last resort and RIP is configured with a default metric. RIP sends updates to the interfaces in specified networks. If an interface's network is not specified, it is not advertised in any RIP update.
Summary Addresses and Split Horizon
Routers connected to broadcast-type IP networks and using distance-vector routing protocols normally use the split-horizon mechanism to reduce the possibility of routing loops. Split horizon blocks information about routes from being advertised by a router on any interface from which that information originated. This feature usually optimizes communication among multiple routers, especially when links are broken.

How to Configure RIP

Default RIP Configuration
Table 98: Default RIP Configuration
Feature Auto summary Default-information originate Default metric IP RIP authentication key-chain
IP RIP triggered IP split horizon Neighbor Network

Default Setting Enabled. Disabled. Built-in; automatic metric translations. No authentication. Authentication mode: clear text. Disabled Varies with media. None defined. None specified.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1138

Routing

Configuring Basic RIP Parameters

Feature Offset list Output delay Timers basic
Validate-update-source Version

Default Setting Disabled. 0 milliseconds.
· Update: 30 seconds. · Invalid: 180 seconds. · Hold-down: 180 seconds. · Flush: 240 seconds.
Enabled. Receives RIP Version 1 and 2 packets; sends Version 1 packets.

Configuring Basic RIP Parameters
To configure RIP, you enable RIP routing for a network and optionally configure other parameters. On the switches, RIP configuration commands are ignored until you configure the network number.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
ip routing Example:

Enables IP routing. (Required only if IP routing is disabled.)

Step 3

Switch(config)# ip routing
router rip Example:

Enables a RIP routing process, and enter router configuration mode.

Step 4

Switch(config)# router rip
network network number Example:
Switch(config)# network 12

Associates a network with a RIP routing process. You can specify multiple network commands. RIP routing updates are sent and received through interfaces only on these networks.
Note You must configure a network number for the RIP commands to take effect.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1139

Configuring Basic RIP Parameters

Routing

Step 5 Step 6 Step 7
Step 8 Step 9 Step 10 Step 11

Command or Action neighbor ip-address Example:
Switch(config)# neighbor 10.2.5.1
offset-list [access-list number | name] {in | out} offset [type number] Example:
Switch(config)# offset-list 103 in 10
timers basic update invalid holddown flush Example:
Switch(config)# timers basic 45 360 400 300

Purpose
(Optional) Defines a neighboring router with which to exchange routing information. This step allows routing updates from RIP (normally a broadcast protocol) to reach nonbroadcast networks.
(Optional) Applies an offset list to routing metrics to increase incoming and outgoing metrics to routes learned through RIP. You can limit the offset list with an access list or an interface.
(Optional) Adjusts routing protocol timers. Valid ranges for all timers are 0 to 4294967295 seconds.
· update--The time between sending routing updates. The default is 30 seconds.
· invalid--The timer after which a route is declared invalid. The default is 180 seconds.
· holddown--The time before a route is removed from the routing table. The default is 180 seconds.
· flush--The amount of time for which routing updates are postponed. The default is 240 seconds.

version {1 | 2} Example:
Switch(config)# version 2
no auto summary Example:
Switch(config)# no auto summary
no validate-update-source Example:
Switch(config)# no validdate-update-source
output-delay delay Example:

(Optional) Configures the switch to receive and send only RIP Version 1 or RIP Version 2 packets. By default, the switch receives Version 1 and 2 but sends only Version 1. You can also use the interface commands ip rip {send | receive} version 1 | 2 | 1 2} to control what versions are used for sending and receiving on interfaces.
(Optional) Disables automatic summarization. By default, the switch summarizes subprefixes when crossing classful network boundaries. Disable summarization (RIP Version 2 only) to advertise subnet and host routing information to classful network boundaries.
(Optional) Disables validation of the source IP address of incoming RIP routing updates. By default, the switch validates the source IP address of incoming RIP routing updates and discards the update if the source address is not valid. Under normal circumstances, disabling this feature is not recommended. However, if you have a router that is off-network and you want to receive its updates, you can use this command.
(Optional) Adds interpacket delay for RIP updates sent. By default, packets in a multiple-packet RIP update have no delay added between packets. If you are sending packets

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1140

Routing

Configuring RIP Authentication

Step 12 Step 13 Step 14

Command or Action
Switch(config)# output-delay 8
end Example:
Switch(config)# end
show ip protocols Example:
Switch# show ip protocols
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose to a lower-speed device, you can add an interpacket delay in the range of 8 to 50 milliseconds. Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.

Configuring RIP Authentication
RIP Version 1 does not support authentication. If you are sending and receiving RIP Version 2 packets, you can enable RIP authentication on an interface. The key chain specifies the set of keys that can be used on the interface. If a key chain is not configured, no authentication is performed.
The switch supports two modes of authentication on interfaces for which RIP authentication is enabled: plain text and MD5. The default is plain text.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the interface to configure.

Step 3

Switch(config)# interface gigabitethernet 1/0/1

ip rip authentication key-chain name-of-chain Example:

Enables RIP authentication.

Switch(config-if)# ip rip authentication key-chain trees

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1141

Configuring Summary Addresses and Split Horizon

Routing

Step 4 Step 5 Step 6 Step 7

Command or Action ip rip authentication mode {text | md5} Example:

Purpose
Configures the interface to use plain text authentication (the default) or MD5 digest authentication.

Switch(config-if)# ip rip authentication mode md5

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show running-config interface [interface-id] Example:

Verifies your entries.

Switch# show running-config
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Configuring Summary Addresses and Split Horizon

Note In general, disabling split horizon is not recommended unless you are certain that your application requires it to properly advertise routes.
If you want to configure an interface running RIP to advertise a summarized local IP address pool on a network access server for dial-up clients, use the ip summary-address rip interface configuration command.

Note If split horizon is enabled, neither autosummary nor interface IP summary addresses are advertised.

Step 1 Step 2

Procedure Command or Action configure terminal Example:
Switch# configure terminal
interface interface-id Example:

Purpose Enters global configuration mode.
Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1142

Routing

Configuring Split Horizon

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Command or Action

Purpose

Switch(config)# interface gigabitethernet 1/0/1

ip address ip-address subnet-mask Example:

Configures the IP address and IP subnet.

Switch(config-if)# ip address 10.1.1.10 255.255.255.0
ip summary-address rip ip address ip-network mask Example:

Configures the IP address to be summarized and the IP network mask.

Switch(config-if)# ip summary-address rip ip address 10.1.1.30 255.255.255.0
no ip split horizon Example:

Disables split horizon on the interface.

Switch(config-if)# no ip split horizon
end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show ip interface interface-id Example:

Verifies your entries.

Switch# show ip interface gigabitethernet 1/0/1

copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Configuring Split Horizon
Routers connected to broadcast-type IP networks and using distance-vector routing protocols normally use the split-horizon mechanism to reduce the possibility of routing loops. Split horizon blocks information about routes from being advertised by a router on any interface from which that information originated. This feature can optimize communication among multiple routers, especially when links are broken.

Note In general, we do not recommend disabling split horizon unless you are certain that your application requires it to properly advertise routes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1143

Configuration Example for Summary Addresses and Split Horizon

Routing

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

ip address ip-address subnet-mask Example:

Configures the IP address and IP subnet.

Switch(config-if)# ip address 10.1.1.10 255.255.255.0
no ip split-horizon Example:

Disables split horizon on the interface.

Switch(config-if)# no ip split-horizon
end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show ip interface interface-id Example:

Verifies your entries.

Switch# show ip interface gigabitethernet 1/0/1

copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

ConfigurationExampleforSummaryAddressesandSplitHorizon
In this example, the major net is 10.0.0.0. The summary address 10.2.0.0 overrides the autosummary address of 10.0.0.0 so that 10.2.0.0 is advertised out interface Gigabit Ethernet port 2, and 10.0.0.0 is not advertised. In the example, if the interface is still in Layer 2 mode (the default), you must enter a no switchport interface configuration command before entering the ip address interface configuration command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1144

Routing

Information About OSPF

Note If split horizon is enabled, neither autosummary nor interface summary addresses (those configured with the ip summary-address rip router configuration command) are advertised.
Switch(config)# router rip Switch(config-router)# interface gigabitethernet1/0/2 Switch(config-if)# ip address 10.1.5.1 255.255.255.0 Switch(config-if)# ip summary-address rip 10.2.0.0 255.255.0.0 Switch(config-if)# no ip split-horizon Switch(config-if)# exit Switch(config)# router rip Switch(config-router)# network 10.0.0.0 Switch(config-router)# neighbor 2.2.2.2 peer-group mygroup Switch(config-router)# end
Information About OSPF
OSPF is an Interior Gateway Protocol (IGP) designed expressly for IP networks, supporting IP subnetting and tagging of externally derived routing information. OSPF also allows packet authentication and uses IP multicast when sending and receiving packets. The Cisco implementation supports RFC 1253, OSPF management information base (MIB).
Note OSPF is supported in IP Base.
The Cisco implementation conforms to the OSPF Version 2 specifications with these key features: · Definition of stub areas is supported. · Routes learned through any IP routing protocol can be redistributed into another IP routing protocol. At the intradomain level, this means that OSPF can import routes learned through EIGRP and RIP. OSPF routes can also be exported into RIP. · Plain text and MD5 authentication among neighboring routers within an area is supported. · Configurable routing interface parameters include interface output cost, retransmission interval, interface transmit delay, router priority, router dead and hello intervals, and authentication key. · Virtual links are supported. · Not-so-stubby-areas (NSSAs) per RFC 1587are supported.
OSPF typically requires coordination among many internal routers, area border routers (ABRs) connected to multiple areas, and autonomous system boundary routers (ASBRs). The minimum configuration would use all default parameter values, no authentication, and interfaces assigned to areas. If you customize your environment, you must ensure coordinated configuration of all routers.
OSPF Nonstop Forwarding
The switch or switch stack supports two levels of nonstop forwarding (NSF):
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1145

OSPF NSF Awareness

Routing

· OSPF NSF Awareness, on page 1146
· OSPF NSF Capability, on page 1146
OSPF NSF Awareness
The IP-services feature set supports OSPF NSF Awareness supported for IPv4. When the neighboring router is NSF-capable, the Layer 3 switch continues to forward packets from the neighboring router during the interval between the primary Route Processor (RP) in a router crashing and the backup RP taking over, or while the primary RP is manually reloaded for a non-disruptive software upgrade. This feature cannot be disabled.
OSPF NSF Capability
The IP services feature set supports the OSPFv2 NSF IETF format in addition to the OSPFv2 NSF Cisco format that is supported in earlier releases. For information about this feature, see NSF--OSPF (RFC 3623 OSPF Graceful Restart): http://www.cisco.com/en/US/docs/ios/ha/configuration/guide/ha-ospf_grrs.html#wp1055692. The IP-services feature set also supports OSPF NSF-capable routing for IPv4 for better convergence and lower traffic loss following a stack master change. When a stack master change occurs in an OSPF NSF-capable stack, the new stack master must do two things to resynchronize its link-state database with its OSFP neighbors:
· Release the available OSPF neighbors on the network without resetting the neighbor relationship.
· Reacquire the contents of the link-state database for the network.
After a stack master change, the new master sends an OSPF NSF signal to neighboring NSF-aware devices. A device recognizes this signal to mean that it should not reset the neighbor relationship with the stack. As the NSF-capable stack master receives signals from other routes on the network, it begins to rebuild its neighbor list. When the neighbor relationships are reestablished, the NSF-capable stack master resynchronizes its database with its NSF-aware neighbors, and routing information is exchanged between the OSPF neighbors. The new stack master uses this routing information to remove stale routes, to update the routing information database (RIB), and to update the forwarding information base (FIB) with the new information. The OSPF protocols then fully converge.
Note OSPF NSF requires that all neighbor networking devices be NSF-aware. If an NSF-capable router discovers non-NSF aware neighbors on a network segment, it disables NSF capabilities for that segment. Other network segments where all devices are NSF-aware or NSF-capable continue to provide NSF capabilities.
Use the nsf OSPF routing configuration command to enable OSPF NSF routing. Use the show ip ospf privileged EXEC command to verify that it is enabled. For more information, see Cisco Nonstop Forwarding: http://www.cisco.com/en/US/docs/ios/ha/configuration/guide/ha-nonstp_fwdg.html

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1146

Routing

OSPF Area Parameters

OSPF Area Parameters
You can optionally configure several OSPF area parameters. These parameters include authentication for password-based protection against unauthorized access to an area, stub areas, and not-so-stubby-areas (NSSAs). Stub areas are areas into which information on external routes is not sent. Instead, the area border router (ABR) generates a default external route into the stub area for destinations outside the autonomous system (AS). An NSSA does not flood all LSAs from the core into the area, but can import AS external routes within the area by redistribution.
Route summarization is the consolidation of advertised addresses into a single summary route to be advertised by other areas. If network numbers are contiguous, you can use the area range router configuration command to configure the ABR to advertise a summary route that covers all networks in the range.
Other OSPF Parameters
You can optionally configure other OSPF parameters in router configuration mode.
· Route summarization: When redistributing routes from other protocols as described in the "Using Route Maps to Redistribute Routing Information" section on page 41-124, each route is advertised individually in an external LSA. To help decrease the size of the OSPF link state database, you can use the summary-address router configuration command to advertise a single router for all the redistributed routes included in a specified network address and mask.
· Virtual links: In OSPF, all areas must be connected to a backbone area. You can establish a virtual link in case of a backbone-continuity break by configuring two Area Border Routers as endpoints of a virtual link. Configuration information includes the identity of the other virtual endpoint (the other ABR) and the nonbackbone link that the two routers have in common (the transit area). Virtual links cannot be configured through a stub area.
· Default route: When you specifically configure redistribution of routes into an OSPF routing domain, the route automatically becomes an autonomous system boundary router (ASBR). You can force the ASBR to generate a default route into the OSPF routing domain.
· Domain Name Server (DNS) names for use in all OSPF show privileged EXEC command displays makes it easier to identify a router than displaying it by router ID or neighbor ID.
· Default Metrics: OSPF calculates the OSPF metric for an interface according to the bandwidth of the interface. The metric is calculated as ref-bw divided by bandwidth, where ref is 10 by default, and bandwidth (bw) is specified by the bandwidth interface configuration command. For multiple links with high bandwidth, you can specify a larger number to differentiate the cost on those links.
· Administrative distance is a rating of the trustworthiness of a routing information source, an integer between 0 and 255, with a higher value meaning a lower trust rating. An administrative distance of 255 means the routing information source cannot be trusted at all and should be ignored. OSPF uses three different administrative distances: routes within an area (interarea), routes to another area (interarea), and routes from another routing domain learned through redistribution (external). You can change any of the distance values.
· Passive interfaces: Because interfaces between two devices on an Ethernet represent only one network segment, to prevent OSPF from sending hello packets for the sending interface, you must configure the sending device to be a passive interface. Both devices can identify each other through the hello packet for the receiving interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1147

LSA Group Pacing

Routing

· Route calculation timers: You can configure the delay time between when OSPF receives a topology change and when it starts the shortest path first (SPF) calculation and the hold time between two SPF calculations.
· Log neighbor changes: You can configure the router to send a syslog message when an OSPF neighbor state changes, providing a high-level view of changes in the router.

LSA Group Pacing
The OSPF LSA group pacing feature allows the router to group OSPF LSAs and pace the refreshing, check-summing, and aging functions for more efficient router use. This feature is enabled by default with a 4-minute default pacing interval, and you will not usually need to modify this parameter. The optimum group pacing interval is inversely proportional to the number of LSAs the router is refreshing, check-summing, and aging. For example, if you have approximately 10,000 LSAs in the database, decreasing the pacing interval would benefit you. If you have a very small database (40 to 100 LSAs), increasing the pacing interval to 10 to 20 minutes might benefit you slightly.
Loopback Interfaces
OSPF uses the highest IP address configured on the interfaces as its router ID. If this interface is down or removed, the OSPF process must recalculate a new router ID and resend all its routing information out its interfaces. If a loopback interface is configured with an IP address, OSPF uses this IP address as its router ID, even if other interfaces have higher IP addresses. Because loopback interfaces never fail, this provides greater stability. OSPF automatically prefers a loopback interface over other interfaces, and it chooses the highest IP address among all loopback interfaces.

How to Configure OSPF

Default OSPF Configuration
Table 99: Default OSPF Configuration
Feature Interface parameters

Default Setting
Cost: 1. Retransmit interval: 5 seconds. Transmit delay: 1 second. Priority: 1. Hello interval: 10 seconds. Dead interval: 4 times the hello interval. No authentication. No password specified. MD5 authentication disabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1148

Routing

Feature Area
Auto cost Default-information originate Default metric Distance OSPF
OSPF database filter IP OSPF name lookup Log adjacency changes Neighbor Neighbor database filter Network area Nonstop Forwarding (NSF) awareness
NSF capability
Router ID Summary address Timers LSA group pacing Timers shortest path first (spf)

Default OSPF Configuration
Default Setting Authentication type: 0 (no authentication). Default cost: 1. Range: Disabled. Stub: No stub area defined. NSSA: No NSSA area defined. 100 Mb/s. Disabled. When enabled, the default metric setting is 10, and the external route type default is Type 2. Built-in, automatic metric translation, as appropriate for each routing protocol. dist1 (all routes within an area): 110. dist2 (all routes from one area to another): 110. and dist3 (routes from other routing domains): 110. Disabled. All outgoing link-state advertisements (LSAs) are flooded to the interface. Disabled. Enabled. None specified. Disabled. All outgoing LSAs are flooded to the neighbor. Disabled. Enabled. Allows Layer 3 switches to continue forwarding packets from a neighboring NSF-capable router during hardware or software changes. Disabled. Note The switch stack supports OSPF
NSF-capable routing for IPv4.
No OSPF routing process defined. Disabled. 240 seconds. spf delay: 5 seconds.; spf-holdtime: 10 seconds.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1149

Configuring Basic OSPF Parameters

Routing

Feature Virtual link

Default Setting
No area ID or router ID defined. Hello interval: 10 seconds. Retransmit interval: 5 seconds. Transmit delay: 1 second. Dead interval: 40 seconds. Authentication key: no key predefined. Message-digest key (MD5): no key predefined.

Configuring Basic OSPF Parameters
To enable OSPF, create an OSPF routing process, specify the range of IP addresses to associate with the routing process, and assign area IDs to be associated with that range. For switches running the IP services image, you can configure either the Cisco OSPFv2 NSF format or the IETF OSPFv2 NSF format.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
router ospf process-id Example:
Switch(config)# router ospf 15

Enables OSPF routing, and enter router configuration mode. The process ID is an internally used identification parameter that is locally assigned and can be any positive integer. Each OSPF routing process has a unique value.
Note OSPF for Routed Access supports only one OSPFv2 and one OSPFv3 instance with a maximum number of 200 dynamically learned routes.

Step 3

nsf cisco [enforce global] Example:
Switch(config)# nsf cisco enforce global

(Optional) Enables Cisco NSF operations for OSPF. The enforce global keyword cancels NSF restart when non-NSF-aware neighboring networking devices are detected.
Note Enter the command in Step 3 or Step 4, and go to Step 5.

Step 4

nsf ietf [restart-interval seconds] Example:
Switch(config)# nsf ietf restart-interval 60

(Optional) Enables IETF NSF operations for OSPF. The restart-interval keyword specifies the length of the graceful restart interval, in seconds. The range is from 1 to 1800. The default is 120.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1150

Routing

Configuring OSPF Interfaces

Step 5 Step 6 Step 7 Step 8

Command or Action

Purpose
Note Enter the command in Step 3 or Step 4, and go to Step 5.

network address wildcard-mask area area-id

Define an interface on which OSPF runs and the area ID

Example:

for that interface. You can use the wildcard-mask to use a single command to define one or more multiple interfaces

to be associated with a specific OSPF area. The area ID can

Switch(config)# 20

network

10.1.1.1

255.240.0.0

area

be a decimal value or an IP address.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show ip protocols Example:

Verifies your entries.

Switch# show ip protocols
copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring OSPF Interfaces
You can use the ip ospf interface configuration commands to modify interface-specific OSPF parameters. You are not required to modify any of these parameters, but some interface parameters (hello interval, dead interval, and authentication key) must be consistent across all routers in an attached network. If you modify these parameters, be sure all routers in the network have compatible values.

Step 1 Step 2

Note The ip ospf interface configuration commands are all optional.

Procedure Command or Action configure terminal Example:
Switch# configure terminal
interface interface-id Example:

Purpose Enters global configuration mode.
Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1151

Configuring OSPF Interfaces

Routing

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11

Command or Action

Purpose

Switch(config)# interface gigabitethernet 1/0/1

ip ospf cost Example:

(Optional) Explicitly specifies the cost of sending a packet on the interface.

Switch(config-if)# ip ospf 8

ip ospf retransmit-interval seconds Example:

(Optional) Specifies the number of seconds between link state advertisement transmissions. The range is 1 to 65535 seconds. The default is 5 seconds.

Switch(config-if)# ip ospf transmit-interval 10

ip ospf transmit-delay seconds Example:

(Optional) Sets the estimated number of seconds to wait before sending a link state update packet. The range is 1 to 65535 seconds. The default is 1 second.

Switch(config-if)# ip ospf transmit-delay 2

ip ospf priority number Example:

(Optional) Sets priority to help find the OSPF designated router for a network. The range is from 0 to 255. The default is 1.

Switch(config-if)# ip ospf priority 5

ip ospf hello-interval seconds Example:
Switch(config-if)# ip ospf hello-interval 12

(Optional) Sets the number of seconds between hello packets sent on an OSPF interface. The value must be the same for all nodes on a network. The range is 1 to 65535 seconds. The default is 10 seconds.

ip ospf dead-interval seconds Example:
Switch(config-if)# ip ospf dead-interval 8

(Optional) Sets the number of seconds after the last device hello packet was seen before its neighbors declare the OSPF router to be down. The value must be the same for all nodes on a network. The range is 1 to 65535 seconds. The default is 4 times the hello interval.

ip ospf authentication-key key Example:
Switch(config-if)# ip ospf authentication-key password

(Optional) Assign a password to be used by neighboring OSPF routers. The password can be any string of keyboard-entered characters up to 8 bytes in length. All neighboring routers on the same network must have the same password to exchange OSPF information.

ip ospf message digest-key keyid md5 key

(Optional) Enables MDS authentication.

Example:

· keyid--An identifier from 1 to 255.

Switch(config-if)# ip ospf message digest-key 16 md5 your1pass

· key--An alphanumeric password of up to 16 bytes.

ip ospf database-filter all out Example:

(Optional) Block flooding of OSPF LSA packets to the interface. By default, OSPF floods new LSAs over all

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1152

Routing

Configuring OSPF Area Parameters

Step 12 Step 13 Step 14
Step 15

Command or Action
Switch(config-if)# ip ospf database-filter all out

Purpose
interfaces in the same area, except the interface on which the LSA arrives.

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show ip ospf interface [interface-name] Example:

Displays OSPF-related interface information.

Switch# show ip ospf interface
show ip ospf neighbor detail Example:
Switch# show ip ospf neighbor detail

Displays NSF awareness status of neighbor switch. The output matches one of these examples:
· Options is 0x52
LLS Options is 0x1 (LR)
When both of these lines appear, the neighbor switch is NSF aware.
· Options is 0x42--This means the neighbor switch is not NSF aware.

copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Configuring OSPF Area Parameters
Before you begin

Step 1

Note The OSPF area router configuration commands are all optional.

Procedure Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1153

Configuring OSPF Area Parameters

Routing

Step 2 Step 3 Step 4 Step 5 Step 6
Step 7 Step 8 Step 9

Command or Action router ospf process-id Example:

Purpose
Enables OSPF routing, and enter router configuration mode.

Switch(config)# router ospf 109
area area-id authentication Example:
Switch(config-router)# area 1 authentication
area area-id authentication message-digest Example:

(Optional) Allow password-based protection against unauthorized access to the identified area. The identifier can be either a decimal value or an IP address.
(Optional) Enables MD5 authentication on the area.

Switch(config-router)# area 1 authentication message-digest
area area-id stub [no-summary] Example:
Switch(config-router)# area 1 stub
area area-id nssa [no-redistribution] [default-information-originate] [no-summary] Example:
Switch(config-router)# area 1 nssa default-information-originate

(Optional) Define an area as a stub area. The no-summary keyword prevents an ABR from sending summary link advertisements into the stub area.
(Optional) Defines an area as a not-so-stubby-area. Every router within the same area must agree that the area is NSSA. Select one of these keywords:
· no-redistribution--Select when the router is an NSSA ABR and you want the redistribute command to import routes into normal areas, but not into the NSSA.
· default-information-originate--Select on an ABR to allow importing type 7 LSAs into the NSSA.
· no-redistribution--Select to not send summary LSAs into the NSSA.

area area-id range address mask Example:

(Optional) Specifies an address range for which a single route is advertised. Use this command only with area border routers.

Switch(config-router)# area 1 range 255.240.0.0

end Example:

Returns to privileged EXEC mode.

Switch(config-router)# end
show ip ospf [process-id] Example:

Displays information about the OSPF routing process in general or for a specific process ID to verify configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1154

Routing

Configuring Other OSPF Parameters

Step 10 Step 11

Command or Action
Switch# show ip ospf
show ip ospf [process-id [area-id]] database Example:
Switch# show ip osfp database
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Displays lists of information related to the OSPF database for a specific router.
(Optional) Saves your entries in the configuration file.

Configuring Other OSPF Parameters

Step 1 Step 2 Step 3 Step 4
Step 5

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router ospf process-id Example:

Enables OSPF routing, and enter router configuration mode.

Switch(config)# router ospf 10
summary-address address mask Example:
Switch(config)# summary-address 10.1.1.1 255.255.255.0
area area-id virtual-link router-id [hello-interval seconds] [retransmit-interval seconds] [trans] [[authentication-key key] | message-digest-key keyid md5 key]] Example:

(Optional) Specifies an address and IP subnet mask for redistributed routes so that only one summary route is advertised.
(Optional) Establishes a virtual link and set its parameters. See the "Configuring OSPF Interfaces" section on page 41-39 for parameter definitions and Table 41-5 on page 41-35 for virtual link defaults.

Switch(config)# area 2 virtual-link 192.168.255.1 hello-interval 5

default-information originate [always] [metric metric-value] [metric-type type-value] [route-map map-name]

(Optional) Forces the ASBR to generate a default route into the OSPF routing domain. Parameters are all optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1155

Configuring Other OSPF Parameters

Routing

Step 6 Step 7 Step 8 Step 9 Step 10
Step 11 Step 12

Command or Action Example:

Purpose

Switch(config)# default-information originate metric 100 metric-type 1
ip ospf name-lookup Example:

(Optional) Configures DNS name lookup. The default is disabled.

Switch(config)# ip ospf name-lookup

ip auto-cost reference-bandwidth ref-bw Example:

(Optional) Specifies an address range for which a single route will be advertised. Use this command only with area border routers.

Switch(config)# ip auto-cost reference-bandwidth 5

distance ospf {[inter-area dist1] [inter-area dist2] [external dist3]}
Example:

(Optional) Changes the OSPF distance values. The default distance for each type of route is 110. The range is 1 to 255.

Switch(config)# distance ospf inter-area 150
passive-interface type number Example:

(Optional) Suppresses the sending of hello packets through the specified interface.

Switch(config)# passive-interface gigabitethernet 1/0/6

timers throttle spf spf-delay spf-holdtime spf-wait

(Optional) Configures route calculation timers.

Example:
Switch(config)# timers throttle spf 200 100 100

· spf-delay--Delay between receiving a change to SPF calculation. The range is from 1 to 600000 miliseconds.

· spf-holdtime--Delay between first and second SPF calculation. The range is form 1 to 600000 in milliseconds.

· spf-wait--Maximum wait time in milliseconds for SPF calculations. The range is from 1 to 600000 in milliseconds.

ospf log-adj-changes Example:

(Optional) Sends syslog message when a neighbor state changes.

Switch(config)# ospf log-adj-changes
end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1156

Routing

Changing LSA Group Pacing

Step 13 Step 14

Command or Action
Switch(config)# end
show ip ospf [process-id [area-id]] database Example:
Switch# show ip ospf database
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Displays lists of information related to the OSPF database for a specific router. For some of the keyword options, see the "Monitoring OSPF" section on page 41-47.
(Optional) Saves your entries in the configuration file.

Changing LSA Group Pacing

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router ospf process-id Example:

Enables OSPF routing, and enter router configuration mode.

Switch(config)# router ospf 25
timers lsa-group-pacing seconds Example:

Changes the group pacing of LSAs.

Switch(config-router)# timers lsa-group-pacing 15

end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show running-config Example:

Verifies your entries.

Switch# show running-config
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1157

Configuring a Loopback Interface

Routing

Command or Action
Switch# copy running-config startup-config

Configuring a Loopback Interface

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Procedure Command or Action configure terminal Example:
Switch# configure terminal
interface loopback 0 Example:
Switch(config)# interface loopback 0
ip address address mask Example:
Switch(config-if)# ip address 10.1.1.5 255.255.240.0
end Example:
Switch(config-if)# end
show ip interface Example:
Switch# show ip interface
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Purpose Enters global configuration mode. Creates a loopback interface, and enter interface configuration mode. Assign an IP address to this interface.
Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file.

Monitoring OSPF
You can display specific statistics such as the contents of IP routing tables, caches, and databases.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1158

Routing

Configuration Examples for OSPF

Table 100: Show IP OSPF Statistics Commands

show ip ospf [process-id]

Displays general information about OSPF routing processes.

show ip ospf [process-id] database [router] [link-state-id]

Displays lists of information related to the OSPF database.

show ip ospf [process-id] database [router] [self-originate]

show ip ospf [process-id] database [router] [adv-router [ip-address]]

show ip ospf [process-id] database [network] [link-state-id]

show ip ospf [process-id] database [summary] [link-state-id]

show ip ospf [process-id] database [asbr-summary] [link-state-id]

show ip ospf [process-id] database [external] [link-state-id]

show ip ospf [process-id area-id] database [database-summary]

show ip ospf border-routes

Displays the internal OSPF routing ABR and ASBR table entries.

show ip ospf interface [interface-name]

Displays OSPF-related interface information.

show ip ospf neighbor [interface-name] [neighbor-id] Displays OSPF interface neighbor information. detail

show ip ospf virtual-links

Displays OSPF-related virtual links information.

Configuration Examples for OSPF
Example: Configuring Basic OSPF Parameters
This example shows how to configure an OSPF routing process and assign it a process number of 109:
Switch(config)# router ospf 109 Switch(config-router)# network 131.108.0.0 255.255.255.0 area 24

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1159

Information About EIGRP

Routing

Information About EIGRP
Enhanced IGRP (EIGRP) is a Cisco proprietary enhanced version of the IGRP. EIGRP uses the same distance vector algorithm and distance information as IGRP; however, the convergence properties and the operating efficiency of EIGRP are significantly improved. The convergence technology employs an algorithm referred to as the Diffusing Update Algorithm (DUAL), which guarantees loop-free operation at every instant throughout a route computation and allows all devices involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in recomputations. IP EIGRP provides increased network width. With RIP, the largest possible width of your network is 15 hops. Because the EIGRP metric is large enough to support thousands of hops, the only barrier to expanding the network is the transport-layer hop counter. EIGRP increments the transport control field only when an IP packet has traversed 15 routers and the next hop to the destination was learned through EIGRP. When a RIP route is used as the next hop to the destination, the transport control field is incremented as usual.
EIGRP Features
EIGRP offers these features: · Fast convergence.
· Incremental updates when the state of a destination changes, instead of sending the entire contents of the routing table, minimizing the bandwidth required for EIGRP packets.
· Less CPU usage because full update packets need not be processed each time they are received.
· Protocol-independent neighbor discovery mechanism to learn about neighboring routers.
· Variable-length subnet masks (VLSMs).
· Arbitrary route summarization.
· EIGRP scales to large networks.
EIGRP Components
EIGRP has these four basic components: · Neighbor discovery and recovery is the process that routers use to dynamically learn of other routers on their directly attached networks. Routers must also discover when their neighbors become unreachable or inoperative. Neighbor discovery and recovery is achieved with low overhead by periodically sending small hello packets. As long as hello packets are received, the Cisco IOS software can learn that a neighbor is alive and functioning. When this status is determined, the neighboring routers can exchange routing information.
· The reliable transport protocol is responsible for guaranteed, ordered delivery of EIGRP packets to all neighbors. It supports intermixed transmission of multicast and unicast packets. Some EIGRP packets must be sent reliably, and others need not be. For efficiency, reliability is provided only when necessary. For example, on a multiaccess network that has multicast capabilities (such as Ethernet), it is not necessary to send hellos reliably to all neighbors individually. Therefore, EIGRP sends a single multicast hello with an indication in the packet informing the receivers that the packet need not be acknowledged. Other
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1160

Routing

EIGRP Nonstop Forwarding

types of packets (such as updates) require acknowledgment, which is shown in the packet. The reliable transport has a provision to send multicast packets quickly when there are unacknowledged packets pending. Doing so helps ensure that convergence time remains low in the presence of varying speed links.
· The DUAL finite state machine embodies the decision process for all route computations. It tracks all routes advertised by all neighbors. DUAL uses the distance information (known as a metric) to select efficient, loop-free paths. DUAL selects routes to be inserted into a routing table based on feasible successors. A successor is a neighboring router used for packet forwarding that has a least-cost path to a destination that is guaranteed not to be part of a routing loop. When there are no feasible successors, but there are neighbors advertising the destination, a recomputation must occur. This is the process whereby a new successor is determined. The amount of time it takes to recompute the route affects the convergence time. Recomputation is processor-intensive; it is advantageous to avoid recomputation if it is not necessary. When a topology change occurs, DUAL tests for feasible successors. If there are feasible successors, it uses any it finds to avoid unnecessary recomputation.
· The protocol-dependent modules are responsible for network layer protocol-specific tasks. An example is the IP EIGRP module, which is responsible for sending and receiving EIGRP packets that are encapsulated in IP. It is also responsible for parsing EIGRP packets and informing DUAL of the new information received. EIGRP asks DUAL to make routing decisions, but the results are stored in the IP routing table. EIGRP is also responsible for redistributing routes learned by other IP routing protocols.
Note To enable EIGRP, the switch or stack master must be running the IP services feature set.
EIGRP Nonstop Forwarding
The switch stack supports two levels of EIGRP nonstop forwarding:
· EIGRP NSF Awareness
· EIGRP NSF Capability
EIGRP NSF Awareness
The IP-services feature set supports EIGRP NSF Awareness for IPv4. When the neighboring router is NSF-capable, the Layer 3 switch continues to forward packets from the neighboring router during the interval between the primary Route Processor (RP) in a router failing and the backup RP taking over, or while the primary RP is manually reloaded for a nondisruptive software upgrade.
This feature cannot be disabled. For more information on this feature, see the "EIGRP Nonstop Forwarding (NSF) Awareness" section of the Cisco IOS IP Routing Protocols Configuration Guide, Release 12.4.
EIGRP NSF Capability
The IP services feature set supports EIGRP Cisco NSF routing to speed up convergence and to eliminate traffic loss after a stack master change. For details about this NSF capability, see the "Configuring Nonstop Forwarding" chapter in the High Availability Configuration Guide, Cisco IOS XE Release 3S: http://www.cisco.com/en/US/docs/ios/ios_xe/ha/configuration/guide/ha-nonstp_fwdg_xe.html.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1161

EIGRP Stub Routing

Routing

The IP-services feature set also supports EIGRP NSF-capable routing for IPv4 for better convergence and lower traffic loss following a stack master change. When an EIGRP NSF-capable stack master restarts or a new stack master starts up and NSF restarts, the switch has no neighbors, and the topology table is empty. The switch must bring up the interfaces, reacquire neighbors, and rebuild the topology and routing tables without interrupting the traffic directed toward the switch stack. EIGRP peer routers maintain the routes learned from the new stack master and continue forwarding traffic through the NSF restart process.
To prevent an adjacency reset by the neighbors, the new stack master uses a new Restart (RS) bit in the EIGRP packet header to show the restart. When the neighbor receives this, it synchronizes the stack in its peer list and maintains the adjacency with the stack. The neighbor then sends its topology table to the stack master with the RS bit set to show that it is NSF-aware and is aiding the new stack master.
If at least one of the stack peer neighbors is NSF-aware, the stack master receives updates and rebuilds its database. Each NSF-aware neighbor sends an end of table (EOT) marker in the last update packet to mark the end of the table content. The stack master recognizes the convergence when it receives the EOT marker, and it then begins sending updates. When the stack master has received all EOT markers from its neighbors or when the NSF converge timer expires, EIGRP notifies the routing information database (RIB) of convergence and floods its topology table to all NSF-aware peers.
EIGRP Stub Routing
The EIGRP stub routing feature, available in all feature sets, reduces resource utilization by moving routed traffic closer to the end user.
Note The IP base feature set contains EIGRP stub routing capability, which only advertises connected or summary routes from the routing tables to other switches in the network. The switch uses EIGRP stub routing at the access layer to eliminate the need for other types of routing advertisements. For enhanced capability and complete EIGRP routing, the switch must be running the IP services feature set. On a switch running the IP base feature set, if you try to configure multi-VRF-CE and EIGRP stub routing at the same time, the configuration is not allowed. IPv6 EIGRP stub routing is not supported with the IP base feature set.
In a network using EIGRP stub routing, the only allowable route for IP traffic to the user is through a switch that is configured with EIGRP stub routing. The switch sends the routed traffic to interfaces that are configured as user interfaces or are connected to other devices.
When using EIGRP stub routing, you need to configure the distribution and remote routers to use EIGRP and to configure only the switch as a stub. Only specified routes are propagated from the switch. The switch responds to all queries for summaries, connected routes, and routing updates.
Any neighbor that receives a packet informing it of the stub status does not query the stub router for any routes, and a router that has a stub peer does not query that peer. The stub router depends on the distribution router to send the proper updates to all peers.
In Figure 41-4, switch B is configured as an EIGRP stub router. Switches A and C are connected to the rest of the WAN. Switch B advertises connected, static, redistribution, and summary routes to switch A and C. Switch B does not advertise any routes learned from switch A (and the reverse).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1162

Routing Figure 66: EIGRP Stub Router Configuration

How to Configure EIGRP

For more information about EIGRP stub routing, see "Configuring EIGRP Stub Routing" section of the Cisco IOS IP Configuration Guide, Volume 2 of 3: Routing Protocols, Release 12.4.
How to Configure EIGRP
To create an EIGRP routing process, you must enable EIGRP and associate networks. EIGRP sends updates to the interfaces in the specified networks. If you do not specify an interface network, it is not advertised in any EIGRP update.

Note If you have routers on your network that are configured for IGRP, and you want to change to EIGRP, you must designate transition routers that have both IGRP and EIGRP configured. In these cases, perform Steps 1 through 3 in the next section and also see the "Configuring Split Horizon" section. You must use the same AS number for routes to be automatically redistributed.

Default EIGRP Configuration
Table 101: Default EIGRP Configuration
Feature Auto summary Default-information

Default Setting
Disabled.
Exterior routes are accepted and default information is passed between EIGRP processes when doing redistribution.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1163

Default EIGRP Configuration
Feature Default metric
Distance EIGRP log-neighbor changes IP authentication key-chain IP authentication mode IP bandwidth-percent IP hello interval IP hold-time IP split-horizon IP summary address Metric weights Network Nonstop Forwarding (NSF) Awareness
NSF capability

Routing
Default Setting Only connected routes and interface static routes can be redistributed without a default metric. The metric includes:
· Bandwidth: 0 or greater kb/s. · Delay (tens of microseconds): 0 or any positive
number that is a multiple of 39.1 nanoseconds. · Reliability: any number between 0 and 255 (255
means 100 percent reliability). · Loading: effective bandwidth as a number
between 0 and 255 (255 is 100 percent loading). · MTU: maximum transmission unit size of the
route in bytes. 0 or any positive integer.
Internal distance: 90. External distance: 170. Disabled. No adjacency changes logged. No authentication provided. No authentication provided. 50 percent. For low-speed nonbroadcast multiaccess (NBMA) networks: 60 seconds; all other networks: 5 seconds. For low-speed NBMA networks: 180 seconds; all other networks: 15 seconds. Enabled. No summary aggregate addresses are predefined. tos: 0; k1 and k3: 1; k2, k4, and k5: 0 None specified. Enabled for IPv4 on switches running the IP services feature set. Allows Layer 3 switches to continue forwarding packets from a neighboring NSF-capable router during hardware or software changes. Disabled. Note The switch supports EIGRP NSF-capable
routing for IPv4.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1164

Routing

Configuring Basic EIGRP Parameters

Feature Offset-list Router EIGRP Set metric Traffic-share Variance

Configuring Basic EIGRP Parameters

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Procedure Command or Action configure terminal Example:
Switch# configure terminal
router eigrp autonomous-system Example:
Switch(config)# router eigrp 10
nsf Example:
Switch(config)# nsf
network network-number Example:
Switch(config)# network 192.168.0.0
eigrp log-neighbor-changes Example:
Switch(config)# eigrp log-neighbor-changes
metric weights tos k1 k2 k3 k4 k5 Example:
Switch(config)# metric weights 0 2 0 2 0 0

Default Setting Disabled. Disabled. No metric set in the route map. Distributed proportionately to the ratios of the metrics. 1 (equal-cost load-balancing).
Purpose Enters global configuration mode.
Enables an EIGRP routing process, and enter router configuration mode. The AS number identifies the routes to other EIGRP routers and is used to tag routing information. (Optional) Enables EIGRP NSF. Enter this command on the stack master and on all of its peers.
Associate networks with an EIGRP routing process. EIGRP sends updates to the interfaces in the specified networks.
(Optional) Enables logging of EIGRP neighbor changes to monitor routing system stability.
(Optional) Adjust the EIGRP metric. Although the defaults have been carefully set to provide excellent operation in most networks, you can adjust them. Setting metrics is complex and is not recommended without guidance from an experienced network designer.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1165

Configuring EIGRP Interfaces

Routing

Step 7 Step 8 Step 9
Step 10 Step 11 Step 12

Command or Action offset-list [access-list number | name] {in | out} offset [type number] Example:
Switch(config)# offset-list 21 out 10
auto-summary Example:

Purpose (Optional) Applies an offset list to routing metrics to increase incoming and outgoing metrics to routes learned through EIGRP. You can limit the offset list with an access list or an interface.
(Optional) Enables automatic summarization of subnet routes into network-level routes.

Switch(config)# auto-summary
ip summary-address eigrp autonomous-system-number (Optional) Configures a summary aggregate. address mask Example:

Switch(config)# ip summary-address eigrp 1 192.168.0.0 255.255.0.0
end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show ip protocols Example:
Switch# show ip protocols
copy running-config startup-config Example:

Verifies your entries. For NSF awareness, the output shows: *** IP Routing is NSF aware *** EIGRP NSF enabled
(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Configuring EIGRP Interfaces
Other optional EIGRP parameters can be configured on an interface basis.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1166

Routing

Configuring EIGRP Interfaces

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9

Command or Action interface interface-id Example:

Purpose
Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

ip bandwidth-percent eigrp percent Example:

(Optional) Configures the percentage of bandwidth that can be used by EIGRP on an interface. The default is 50 percent.

Switch(config-if)# ip bandwidth-percent eigrp 60

ip summary-address eigrp autonomous-system-number (Optional) Configures a summary aggregate address for a

address mask

specified interface (not usually necessary if auto-summary

Example:

is enabled).

Switch(config-if)# ip summary-address eigrp 109 192.161.0.0 255.255.0.0

ip hello-interval eigrp autonomous-system-number seconds
Example:

(Optional) Change the hello time interval for an EIGRP routing process. The range is 1 to 65535 seconds. The default is 60 seconds for low-speed NBMA networks and 5 seconds for all other networks.

Switch(config-if)# ip hello-interval eigrp 109 10

ip hold-time eigrp autonomous-system-number seconds Example:
Switch(config-if)# ip hold-time eigrp 109 40

(Optional) Change the hold time interval for an EIGRP routing process. The range is 1 to 65535 seconds. The default is 180 seconds for low-speed NBMA networks and 15 seconds for all other networks.
Do not adjust the hold time without consulting Cisco technical support.

no ip split-horizon eigrp autonomous-system-number Example:

(Optional) Disables split horizon to allow route information to be advertised by a router out any interface from which that information originated.

Switch(config-if)# no ip split-horizon eigrp 109

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show ip eigrp interface Example:

Displays which interfaces EIGRP is active on and information about EIGRP relating to those interfaces.

Switch# show ip eigrp interface

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1167

Configuring EIGRP Route Authentication

Routing

Step 10

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Configuring EIGRP Route Authentication
EIGRP route authentication provides MD5 authentication of routing updates from the EIGRP routing protocol to prevent the introduction of unauthorized or false routing messages from unapproved sources.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Step 3

Switch(config)# interface gigabitethernet 1/0/1
ip authentication mode eigrp autonomous-system md5 Enables MD5 authentication in IP EIGRP packets. Example:

Step 4

Switch(config-if)# ip authentication mode eigrp 104 md5

ip authentication key-chain eigrp autonomous-system key-chain
Example:

Enables authentication of IP EIGRP packets.

Step 5

Switch(config-if)# ip authentication key-chain eigrp 105 chain1

exit Example:

Returns to global configuration mode.

Step 6

Switch(config-if)# exit
key chain name-of-chain Example:

Identify a key chain and enter key-chain configuration mode. Match the name configured in Step 4.

Switch(config)# key chain chain1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1168

Routing

Monitoring and Maintaining EIGRP

Step 7 Step 8 Step 9
Step 10
Step 11 Step 12 Step 13

Command or Action key number Example:

Purpose In key-chain configuration mode, identify the key number.

Switch(config-keychain)# key 1
key-string text Example:

In key-chain key configuration mode, identify the key string.

Switch(config-keychain-key)# key-string key1

accept-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key

seconds}

can be received.

Example:
Switch(config-keychain-key)# accept-lifetime 13:30:00 Jan 25 2011 duration 7200

The start-time and end-time syntax can be either hh:mm:ss Month date year or hh:mm:ss date Month year. The default is forever with the default start-time and the earliest acceptable date as January 1, 1993. The default end-time and duration is infinite.

send-lifetime start-time {infinite | end-time | duration seconds} Example:
Switch(config-keychain-key)# send-lifetime 14:00:00 Jan 25 2011 duration 3600

(Optional) Specifies the time period during which the key can be sent.
The start-time and end-time syntax can be either hh:mm:ss Month date year or hh:mm:ss date Month year. The default is forever with the default start-time and the earliest acceptable date as January 1, 1993. The default end-time and duration is infinite.

end Example:

Returns to privileged EXEC mode.

Switch(config-keychain-key)# exit
show key chain Example:

Displays authentication key information.

Switch# show key chain
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Monitoring and Maintaining EIGRP
You can delete neighbors from the neighbor table. You can also display various EIGRP routing statistics. Table 41-8 lists the privileged EXEC commands for deleting neighbors and displaying statistics. For

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1169

Information About BGP

Routing

explanations of fields in the resulting display, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4.
Table 102: IP EIGRP Clear and Show Commands

clear ip eigrp neighbors [if-address | interface] Deletes neighbors from the neighbor table.

show ip eigrp interface [interface] [as number]

Displays information about interfaces configured for EIGRP.

show ip eigrp neighbors [type-number]

Displays EIGRP discovered neighbors.

show ip eigrp topology

Displays the EIGRP topology table for a given

[autonomous-system-number] | [[ip-address] mask]] process.

show ip eigrp traffic [autonomous-system-number] Displays the number of packets sent and received for all or a specified EIGRP process.

Information About BGP
The Border Gateway Protocol (BGP) is an exterior gateway protocol used to set up an interdomain routing system that guarantees the loop-free exchange of routing information between autonomous systems. Autonomous systems are made up of routers that operate under the same administration and that run Interior Gateway Protocols (IGPs), such as RIP or OSPF, within their boundaries and that interconnect by using an Exterior Gateway Protocol (EGP). BGP Version 4 is the standard EGP for interdomain routing in the Internet. The protocol is defined in RFCs 1163, 1267, and 1771. You can find detailed information about BGP in Internet Routing Architectures, published by Cisco Press, and in the "Configuring BGP" chapter in the Cisco IP and IP Routing Configuration Guide.
For details about BGP commands and keywords, see the "IP Routing Protocols" part of the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols .
BGP Network Topology
Routers that belong to the same autonomous system (AS) and that exchange BGP updates run internal BGP (IBGP), and routers that belong to different autonomous systems and that exchange BGP updates run external BGP (EBGP). Most configuration commands are the same for configuring EBGP and IBGP. The difference is that the routing updates are exchanged either between autonomous systems (EBGP) or within an AS (IBGP). Figure 41-5 shows a network that is running both EBGP and IBGP.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1170

Routing Figure 67: EBGP, IBGP, and Multiple Autonomous Systems

BGP Network Topology

Before exchanging information with an external AS, BGP ensures that networks within the AS can be reached by defining internal BGP peering among routers within the AS and by redistributing BGP routing information to IGPs that run within the AS, such as IGRP and OSPF.
Routers that run a BGP routing process are often referred to as BGP speakers. BGP uses the Transmission Control Protocol (TCP) as its transport protocol (specifically port 179). Two BGP speakers that have a TCP connection to each other for exchanging routing information are known as peers or neighbors. In Figure 41-5, Routers A and B are BGP peers, as are Routers B and C and Routers C and D. The routing information is a series of AS numbers that describe the full path to the destination network. BGP uses this information to construct a loop-free map of autonomous systems.
The network has these characteristics:
· Routers A and B are running EBGP, and Routers B and C are running IBGP. Note that the EBGP peers are directly connected and that the IBGP peers are not. As long as there is an IGP running that allows the two neighbors to reach one another, IBGP peers do not have to be directly connected.
· All BGP speakers within an AS must establish a peer relationship with each other. That is, the BGP speakers within an AS must be fully meshed logically. BGP4 provides two techniques that reduce the requirement for a logical full mesh: confederations and route reflectors.
· AS 200 is a transit AS for AS 100 and AS 300--that is, AS 200 is used to transfer packets between AS 100 and AS 300.
BGP peers initially exchange their full BGP routing tables and then send only incremental updates. BGP peers also exchange keepalive messages (to ensure that the connection is up) and notification messages (in response to errors or special conditions).
In BGP, each route consists of a network number, a list of autonomous systems that information has passed through (the autonomous system path), and a list of other path attributes. The primary function of a BGP system is to exchange network reachability information, including information about the list of AS paths, with other BGP systems. This information can be used to determine AS connectivity, to prune routing loops, and to enforce AS-level policy decisions.
A router or switch running Cisco IOS does not select or use an IBGP route unless it has a route available to the next-hop router and it has received synchronization from an IGP (unless IGP synchronization is disabled). When multiple routes are available, BGP bases its path selection on attribute values. See the "Configuring BGP Decision Attributes" section for information about BGP attributes.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1171

Nonstop Forwarding Awareness

Routing

BGP Version 4 supports classless interdomain routing (CIDR) so you can reduce the size of your routing tables by creating aggregate routes, resulting in supernets. CIDR eliminates the concept of network classes within BGP and supports the advertising of IP prefixes.
Nonstop Forwarding Awareness
The BGP NSF Awareness feature is supported for IPv4 in the IP services feature set. To enable this feature with BGP routing, you need to enable Graceful Restart. When the neighboring router is NSF-capable, and this feature is enabled, the Layer 3 switch continues to forward packets from the neighboring router during the interval between the primary Route Processor (RP) in a router failing and the backup RP taking over, or while the primary RP is manually reloaded for a nondisruptive software upgrade.
For more information, see the "BGP Nonstop Forwarding (NSF) Awareness" section of the Cisco IOS IP Routing Protocols Configuration Guide, Release 12.4.
Information About BGP Routing
To enable BGP routing, you establish a BGP routing process and define the local network. Because BGP must completely recognize the relationships with its neighbors, you must also specify a BGP neighbor.
BGP supports two kinds of neighbors: internal and external. Internal neighbors are in the same AS; external neighbors are in different autonomous systems. External neighbors are usually adjacent to each other and share a subnet, but internal neighbors can be anywhere in the same AS.
The switch supports the use of private AS numbers, usually assigned by service providers and given to systems whose routes are not advertised to external neighbors. The private AS numbers are from 64512 to 65535. You can configure external neighbors to remove private AS numbers from the AS path by using the neighbor remove-private-as router configuration command. Then when an update is passed to an external neighbor, if the AS path includes private AS numbers, these numbers are dropped.
If your AS will be passing traffic through it from another AS to a third AS, it is important to be consistent about the routes it advertises. If BGP advertised a route before all routers in the network had learned about the route through the IGP, the AS might receive traffic that some routers could not yet route. To prevent this from happening, BGP must wait until the IGP has propagated information across the AS so that BGP is synchronized with the IGP. Synchronization is enabled by default. If your AS does not pass traffic from one AS to another AS, or if all routers in your autonomous systems are running BGP, you can disable synchronization, which allows your network to carry fewer routes in the IGP and allows BGP to converge more quickly.
Routing Policy Changes
Routing policies for a peer include all the configurations that might affect inbound or outbound routing table updates. When you have defined two routers as BGP neighbors, they form a BGP connection and exchange routing information. If you later change a BGP filter, weight, distance, version, or timer, or make a similar configuration change, you must reset the BGP sessions so that the configuration changes take effect.
There are two types of reset, hard reset and soft reset. Cisco IOS Releases 12.1 and later support a soft reset without any prior configuration. To use a soft reset without preconfiguration, both BGP peers must support the soft route refresh capability, which is advertised in the OPEN message sent when the peers establish a TCP session. A soft reset allows the dynamic exchange of route refresh requests and routing information between BGP routers and the subsequent re-advertisement of the respective outbound routing table.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1172

Routing

BGP Decision Attributes

· When soft reset generates inbound updates from a neighbor, it is called dynamic inbound soft reset. · When soft reset sends a set of updates to a neighbor, it is called outbound soft reset.

A soft inbound reset causes the new inbound policy to take effect. A soft outbound reset causes the new local outbound policy to take effect without resetting the BGP session. As a new set of updates is sent during outbound policy reset, a new inbound policy can also take effect.
Table 41-10 lists the advantages and disadvantages hard reset and soft reset.
Table 103: Advantages and Disadvantages of Hard and Soft Resets

Type of Reset Hard reset
Outbound soft reset Dynamic inbound soft reset

Advantages

Disadvantages

No memory overhead

The prefixes in the BGP, IP, and FIB tables provided by the neighbor are lost. Not recommended.

No configuration, no storing of Does not reset inbound routing

routing table updates

table updates.

Does not clear the BGP session and Both BGP routers must support the

cache

route refresh capability (in Cisco

Does not require storing of routing IOS Release 12.1 and later).

table updates and has no memory

overhead

BGP Decision Attributes
When a BGP speaker receives updates from multiple autonomous systems that describe different paths to the same destination, it must choose the single best path for reaching that destination. When chosen, the selected path is entered into the BGP routing table and propagated to its neighbors. The decision is based on the value of attributes that the update contains and other BGP-configurable factors.
When a BGP peer learns two EBGP paths for a prefix from a neighboring AS, it chooses the best path and inserts that path in the IP routing table. If BGP multipath support is enabled and the EBGP paths are learned from the same neighboring autonomous systems, instead of a single best path, multiple paths are installed in the IP routing table. Then, during packet switching, per-packet or per-destination load-balancing is performed among the multiple paths. The maximum-paths router configuration command controls the number of paths allowed.
These factors summarize the order in which BGP evaluates the attributes for choosing the best path:
If the path specifies a next hop that is inaccessible, drop the update. The BGP next-hop attribute, automatically determined by the software, is the IP address of the next hop that is going to be used to reach a destination. For EBGP, this is usually the IP address of the neighbor specified by the neighbor remote-as router configuration command. You can disable next-hop processing by using route maps or the neighbor next-hop-self router configuration command.
1. Prefer the path with the largest weight (a Cisco proprietary parameter). The weight attribute is local to the router and not propagated in routing updates. By default, the weight attribute is 32768 for paths that the router originates and zero for other paths. Routes with the largest weight are preferred. You can use access lists, route maps, or the neighbor weight router configuration command to set weights.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1173

Route Maps

Routing

2. Prefer the route with the highest local preference. Local preference is part of the routing update and exchanged among routers in the same AS. The default value of the local preference attribute is 100. You can set local preference by using the bgp default local-preference router configuration command or by using a route map.
3. Prefer the route that was originated by BGP running on the local router.
4. Prefer the route with the shortest AS path.
5. Prefer the route with the lowest origin type. An interior route or IGP is lower than a route learned by EGP, and an EGP-learned route is lower than one of unknown origin or learned in another way.
6. Prefer the route with the lowest multi -exit discriminator (MED) metric attribute if the neighboring AS is the same for all routes considered. You can configure the MED by using route maps or by using the default-metric router configuration command. When an update is sent to an IBGP peer, the MED is included.
7. Prefer the external (EBGP) path over the internal (IBGP) path.
8. Prefer the route that can be reached through the closest IGP neighbor (the lowest IGP metric). This means that the router will prefer the shortest internal path within the AS to reach the destination (the shortest path to the BGP next-hop).
9. If the following conditions are all true, insert the route for this path into the IP routing table:
Both the best route and this route are external.
Both the best route and this route are from the same neighboring autonomous system.
maximum-paths is enabled.
10. If multipath is not enabled, prefer the route with the lowest IP address value for the BGP router ID. The router ID is usually the highest IP address on the router or the loopback (virtual) address, but might be implementation-specific.
Route Maps
Within BGP, route maps can be used to control and to modify routing information and to define the conditions by which routes are redistributed between routing domains. See the "Using Route Maps to Redistribute Routing Information" section on page 41-124 for more information about route maps. Each route map has a name that identifies the route map (map tag) and an optional sequence number.
BGP Filtering
You can filter BGP advertisements by using AS-path filters, such as the as-path access-list global configuration command and the neighbor filter-list router configuration command. You can also use access lists with the neighbor distribute-list router configuration command. Distribute-list filters are applied to network numbers. See the "Controlling Advertising and Processing in Routing Updates" section on page 41-135 for information about the distribute-list command.
You can use route maps on a per-neighbor basis to filter updates and to modify various attributes. A route map can be applied to either inbound or outbound updates. Only the routes that pass the route map are sent or accepted in updates. On both inbound and outbound updates, matching is supported based on AS path, community, and network numbers. Autonomous system path matching requires the match as-path access-list

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1174

Routing

Prefix List for BGP Filtering

route-map command, community based matching requires the match community-list route-map command, and network-based matching requires the ip access-list global configuration command.
Prefix List for BGP Filtering
You can use prefix lists as an alternative to access lists in many BGP route filtering commands, including the neighbor distribute-list router configuration command. The advantages of using prefix lists include performance improvements in loading and lookup of large lists, incremental update support, easier CLI configuration, and greater flexibility.
Filtering by a prefix list involves matching the prefixes of routes with those listed in the prefix list, as when matching access lists. When there is a match, the route is used. Whether a prefix is permitted or denied is based upon these rules:
· An empty prefix list permits all prefixes.
· An implicit deny is assumed if a given prefix does not match any entries in a prefix list.
· When multiple entries of a prefix list match a given prefix, the sequence number of a prefix list entry identifies the entry with the lowest sequence number.
By default, sequence numbers are generated automatically and incremented in units of five. If you disable the automatic generation of sequence numbers, you must specify the sequence number for each entry. You can specify sequence values in any increment. If you specify increments of one, you cannot insert additional entries into the list; if you choose very large increments, you might run out of values.
BGP Community Filtering
One way that BGP controls the distribution of routing information based on the value of the COMMUNITIES attribute. The attribute is a way to groups destinations into communities and to apply routing decisions based on the communities. This method simplifies configuration of a BGP speaker to control distribution of routing information.
A community is a group of destinations that share some common attribute. Each destination can belong to multiple communities. AS administrators can define to which communities a destination belongs. By default, all destinations belong to the general Internet community. The community is identified by the COMMUNITIES attribute, an optional, transitive, global attribute in the numerical range from 1 to 4294967200. These are some predefined, well-known communities:
· internet--Advertise this route to the Internet community. All routers belong to it.
· no-export--Do not advertise this route to EBGP peers.
· no-advertise--Do not advertise this route to any peer (internal or external).
· local-as--Do not advertise this route to peers outside the local autonomous system.
Based on the community, you can control which routing information to accept, prefer, or distribute to other neighbors. A BGP speaker can set, append, or modify the community of a route when learning, advertising, or redistributing routes. When routes are aggregated, the resulting aggregate has a COMMUNITIES attribute that contains all communities from all the initial routes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1175

BGP Neighbors and Peer Groups

Routing

You can use community lists to create groups of communities to use in a match clause of a route map. As with an access list, a series of community lists can be created. Statements are checked until a match is found. As soon as one statement is satisfied, the test is concluded.
To set the COMMUNITIES attribute and match clauses based on communities, see the match community-list and set community route-map configuration commands in the "Using Route Maps to Redistribute Routing Information" section.
BGP Neighbors and Peer Groups
Often many BGP neighbors are configured with the same update policies (that is, the same outbound route maps, distribute lists, filter lists, update source, and so on). Neighbors with the same update policies can be grouped into peer groups to simplify configuration and to make updating more efficient. When you have configured many peers, we recommend this approach.
To configure a BGP peer group, you create the peer group, assign options to the peer group, and add neighbors as peer group members. You configure the peer group by using the neighbor router configuration commands. By default, peer group members inherit all the configuration options of the peer group, including the remote-as (if configured), version, update-source, out-route-map, out-filter-list, out-dist-list, minimum-advertisement-interval, and next-hop-self. All peer group members also inherit changes made to the peer group. Members can also be configured to override the options that do not affect outbound updates.
Aggregate Routes
Classless interdomain routing (CIDR) enables you to create aggregate routes (or supernets) to minimize the size of routing tables. You can configure aggregate routes in BGP either by redistributing an aggregate route into BGP or by creating an aggregate entry in the BGP routing table. An aggregate address is added to the BGP table when there is at least one more specific entry in the BGP table.
Routing Domain Confederations
One way to reduce the IBGP mesh is to divide an autonomous system into multiple subautonomous systems and to group them into a single confederation that appears as a single autonomous system. Each autonomous system is fully meshed within itself and has a few connections to other autonomous systems in the same confederation. Even though the peers in different autonomous systems have EBGP sessions, they exchange routing information as if they were IBGP peers. Specifically, the next hop, MED, and local preference information is preserved. You can then use a single IGP for all of the autonomous systems.
BGP Route Reflectors
BGP requires that all of the IBGP speakers be fully meshed. When a router receives a route from an external neighbor, it must advertise it to all internal neighbors. To prevent a routing information loop, all IBPG speakers must be connected. The internal neighbors do not send routes learned from internal neighbors to other internal neighbors.
With route reflectors, all IBGP speakers need not be fully meshed because another method is used to pass learned routes to neighbors. When you configure an internal BGP peer to be a route reflector, it is responsible for passing IBGP learned routes to a set of IBGP neighbors. The internal peers of the route reflector are divided into two groups: client peers and nonclient peers (all the other routers in the autonomous system). A route reflector reflects routes between these two groups. The route reflector and its client peers form a cluster. The

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1176

Routing

Route Dampening

nonclient peers must be fully meshed with each other, but the client peers need not be fully meshed. The clients in the cluster do not communicate with IBGP speakers outside their cluster.
When the route reflector receives an advertised route, it takes one of these actions, depending on the neighbor:
· A route from an external BGP speaker is advertised to all clients and nonclient peers.
· A route from a nonclient peer is advertised to all clients.
· A route from a client is advertised to all clients and nonclient peers. Hence, the clients need not be fully meshed.
Usually a cluster of clients have a single route reflector, and the cluster is identified by the route reflector router ID. To increase redundancy and to avoid a single point of failure, a cluster might have more than one route reflector. In this case, all route reflectors in the cluster must be configured with the same 4-byte cluster ID so that a route reflector can recognize updates from route reflectors in the same cluster. All the route reflectors serving a cluster should be fully meshed and should have identical sets of client and nonclient peers.
Route Dampening
Route flap dampening is a BGP feature designed to minimize the propagation of flapping routes across an internetwork. A route is considered to be flapping when it is repeatedly available, then unavailable, then available, then unavailable, and so on. When route dampening is enabled, a numeric penalty value is assigned to a route when it flaps. When a route's accumulated penalties reach a configurable limit, BGP suppresses advertisements of the route, even if the route is running. The reuse limit is a configurable value that is compared with the penalty. If the penalty is less than the reuse limit, a suppressed route that is up is advertised again.
Dampening is not applied to routes that are learned by IBGP. This policy prevents the IBGP peers from having a higher penalty for routes external to the AS.
More BGP Information
For detailed descriptions of BGP configuration, see the "Configuring BGP" chapter in the "IP Routing Protocols" part of the Cisco IOS IP Configuration Guide, Release 12.4. For details about specific commands, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4.

How to Configure BGP

Default BGP Configuration
Table 41-9 shows the basic default BGP configuration. For the defaults for all characteristics, see the specific commands in the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4.
Table 104: Default BGP Configuration

Feature Aggregate address AS path access list

Default Setting Disabled: None defined. None defined.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1177

Default BGP Configuration

Routing

Feature Auto summary Best path

Default Setting
Disabled.
· The router considers as-path in choosing a route and does not compare similar routes from external BGP peers.
· Compare router ID: Disabled.

BGP community list

· Number: None defined. When you permit a value for the community number, the list defaults to an implicit deny for everything else that has not been permitted.
· Format: Cisco default format (32-bit number).

BGP confederation identifier/peers

· Identifier: None configured. · Peers: None identified.

BGP Fast external fallover BGP local preference
BGP network BGP route dampening

Enabled.
100. The range is 0 to 4294967295 with the higher value preferred.
None specified; no backdoor route advertised.
Disabled by default. When enabled: · Half-life is 15 minutes. · Re-use is 750 (10-second increments). · Suppress is 2000 (10-second increments). · Max-suppress-time is 4 times half-life; 60 minutes.

BGP router ID

The IP address of a loopback interface if one is configured or the highest IP address configured for a physical interface on the router.

Default information originate (protocol or network Disabled. redistribution)

Default metric

Built-in, automatic metric translations.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1178

Routing
Feature Distance
Distribute list Internal route redistribution IP prefix list Multi exit discriminator (MED)

Default BGP Configuration
Default Setting · External route administrative distance: 20 (acceptable values are from 1 to 255). · Internal route administrative distance: 200 (acceptable values are from 1 to 255). · Local route administrative distance: 200 (acceptable values are from 1 to 255).
· In (filter networks received in updates): Disabled. · Out (suppress networks from being advertised
in updates): Disabled.
Disabled. None defined.
· Always compare: Disabled. Does not compare MEDs for paths from neighbors in different autonomous systems.
· Best path compare: Disabled. · MED missing as worst path: Disabled. · Deterministic MED comparison is disabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1179

Default BGP Configuration
Feature Neighbor
NSF8 Awareness

Routing
Default Setting
· Advertisement interval: 30 seconds for external peers; 5 seconds for internal peers.
· Change logging: Enabled. · Conditional advertisement: Disabled. · Default originate: No default route is sent to the
neighbor. · Description: None. · Distribute list: None defined. · External BGP multihop: Only directly connected
neighbors are allowed. · Filter list: None used. · Maximum number of prefixes received: No limit. · Next hop (router as next hop for BGP neighbor):
Disabled. · Password: Disabled. · Peer group: None defined; no members assigned. · Prefix list: None specified. · Remote AS (add entry to neighbor BGP table):
No peers defined. · Private AS number removal: Disabled. · Route maps: None applied to a peer. · Send community attributes: None sent to
neighbors. · Shutdown or soft reconfiguration: Not enabled. · Timers: keepalive: 60 seconds; holdtime: 180
seconds. · Update source: Best local address. · Version: BGP Version 4. · Weight: Routes learned through BGP peer: 0;
routes sourced by the local router: 32768.
Disabled9. If enabled, allows Layer 3 switches to continue forwarding packets from a neighboring NSF-capable router during hardware or software changes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1180

Routing

Enabling BGP Routing

Feature

Default Setting

Route reflector

None configured.

Synchronization (BGP and IGP)

Disabled.

Table map update

Disabled.

Timers

Keepalive: 60 seconds; holdtime: 180 seconds.

8 Nonstop Forwarding 9 NSF Awareness can be enabled for IPv4 on switches with the IP services feature set by enabling Graceful
Restart.

Enabling BGP Routing

Before you begin

Step 1 Step 2 Step 3 Step 4

Note To enable BGP, the switch or stack master must be running the IP services feature set.

Procedure Command or Action configure terminal Example:
Switch# configure terminal
ip routing Example:
Switch(config)# ip routing
router bgp autonomous-system Example:
Switch(config)# router bgp 45000
network network-number [mask network-mask] [route-map route-map-name] Example:
Switch(config)# network 10.108.0.0

Purpose Enters global configuration mode.
Enables IP routing.
Enables a BGP routing process, assign it an AS number, and enter router configuration mode. The AS number can be from 1 to 65535, with 64512 to 65535 designated as private autonomous numbers. Configures a network as local to this AS, and enter it in the BGP table.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1181

Enabling BGP Routing

Routing

Step 5
Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12

Command or Action neighbor {ip-address | peer-group-name} remote-as number Example:
Switch(config)# neighbor 10.108.1.2 remote-as 65200
neighbor {ip-address | peer-group-name} remove-private-as Example:

Purpose
Adds an entry to the BGP neighbor table specifying that the neighbor identified by the IP address belongs to the specified AS.
For EBGP, neighbors are usually directly connected, and the IP address is the address of the interface at the other end of the connection.
For IBGP, the IP address can be the address of any of the router interfaces.
(Optional) Removes private AS numbers from the AS-path in outbound routing updates.

Switch(config)# neighbor 172.16.2.33 remove-private-as
synchronization Example:

(Optional) Enables synchronization between BGP and an IGP.

Switch(config)# synchronization
auto-summary Example:
Switch(config)# auto-summary
bgp graceful-restart Example:

(Optional) Enables automatic network summarization. When a subnet is redistributed from an IGP into BGP, only the network route is inserted into the BGP table.
(Optional) Enables NSF awareness on switch. By default, NSF awareness is disabled.

Switch(config)# bgp graceful-start
end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show ip bgp network network-number Example:

Verifies the configuration.

Switch# show ip bgp network 10.108.0.0
show ip bgp neighbor Example:
Switch# show ip bgp neighbor

Verifies that NSF awareness (Graceful Restart) is enabled on the neighbor.
If NSF awareness is enabled on the switch and the neighbor, this message appears:
Graceful Restart Capability: advertised and received

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1182

Routing

Managing Routing Policy Changes

Command or Action

Step 13

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose If NSF awareness is enabled on the switch, but not on the neighbor, this message appears: Graceful Restart Capability: advertised
(Optional) Saves your entries in the configuration file.

Managing Routing Policy Changes
To learn if a BGP peer supports the route refresh capability and to reset the BGP session:

Step 1 Step 2

Procedure Command or Action show ip bgp neighbors Example:
Switch# show ip bgp neighbors
clear ip bgp {* | address | peer-group-name} Example:
Switch# clear ip bgp *

Purpose
Displays whether a neighbor supports the route refresh capability. When supported, this message appears for the router: Received route refresh capability from peer.
Resets the routing table on the specified connection. · Enter an asterisk (*) to specify that all connections be reset.
· Enter an IP address to specify the connection to be reset.
· Enter a peer group name to reset the peer group.

Step 3

clear ip bgp {* | address | peer-group-name} soft out Example:
Switch# clear ip bgp * soft out

(Optional) Performs an outbound soft reset to reset the inbound routing table on the specified connection. Use this command if route refresh is supported.
· Enter an asterisk (*) to specify that all connections be reset.
· Enter an IP address to specify the connection to be reset.
· Enter a peer group name to reset the peer group.

Step 4

show ip bgp Example:

Verifies the reset by checking information about the routing table and about BGP neighbors.

Switch# show ip bgp

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1183

Configuring BGP Decision Attributes

Routing

Step 5

Command or Action show ip bgp neighbors Example:
Switch# show ip bgp neighbors

Purpose
Verifies the reset by checking information about the routing table and about BGP neighbors.

Configuring BGP Decision Attributes

Step 1 Step 2 Step 3

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router bgp autonomous-system Example:

Enables a BGP routing process, assign it an AS number, and enter router configuration mode.

Switch(config)# router bgp 4500
bgp best-path as-path ignore Example:

(Optional) Configures the router to ignore AS path length in selecting a route.

Switch(config-router)# bgp bestpath as-path ignore

Step 4 Step 5 Step 6

neighbor {ip-address | peer-group-name} next-hop-self (Optional) Disables next-hop processing on BGP updates

Example:

to a neighbor by entering a specific IP address to be used instead of the next-hop address.

Switch(config-router)# neighbor 10.108.1.1 next-hop-self

neighbor {ip-address | peer-group-name} weight weight (Optional) Assign a weight to a neighbor connection.

Example:

Acceptable values are from 0 to 65535; the largest weight is the preferred route. Routes learned through another BGP

peer have a default weight of 0; routes sourced by the local

Switch(config-router)# 50

neighbor

172.16.12.1

weight

router

have

a

default

weight

of

32768.

default-metric number Example:
Switch(config-router)# default-metric 300

(Optional) Sets a MED metric to set preferred paths to external neighbors. All routes without a MED will also be set to this value. The range is 1 to 4294967295. The lowest value is the most desirable.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1184

Routing

Configuring BGP Decision Attributes

Step 7 Step 8 Step 9 Step 10 Step 11 Step 12
Step 13 Step 14 Step 15

Command or Action bgp bestpath med missing-as-worst Example:

Purpose
(Optional) Configures the switch to consider a missing MED as having a value of infinity, making the path without a MED value the least desirable path.

Switch(config-router)# bgp bestpath med missing-as-worst

bgp always-compare med Example:
Switch(config-router)# bgp always-compare-med

(Optional) Configures the switch to compare MEDs for paths from neighbors in different autonomous systems. By default, MED comparison is only done among paths in the same AS.

bgp bestpath med confed Example:

(Optional) Configures the switch to consider the MED in choosing a path from among those advertised by different subautonomous systems within a confederation.

Switch(config-router)# bgp bestpath med confed

bgp deterministic med Example:

(Optional) Configures the switch to consider the MED variable when choosing among routes advertised by different peers in the same AS.

Switch(config-router)# bgp deterministic med

bgp default local-preference value Example:

(Optional) Change the default local preference value. The range is 0 to 4294967295; the default value is 100. The highest local preference value is preferred.

Switch(config-router)# bgp default local-preference 200

maximum-paths number Example:
Switch(config-router)# maximum-paths 8

(Optional) Configures the number of paths to be added to the IP routing table. The default is to only enter the best path in the routing table. The range is from 1 to 16. Having multiple paths allows load-balancing among the paths. (Although the switch software allows a maximum of 32 equal-cost routes, the switch hardware will never use more than 16 paths per route.)

end Example:

Returns to privileged EXEC mode.

Switch(config-router)# end
show ip bgp Example:

Verifies the reset by checking information about the routing table and about BGP neighbors.

Switch# show ip bgp
show ip bgp neighbors Example:

Verifies the reset by checking information about the routing table and about BGP neighbors.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1185

Configuring BGP Filtering with Route Maps

Routing

Step 16

Command or Action
Switch# show ip bgp neighbors
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Configuring BGP Filtering with Route Maps

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

route-map map-tag [permit | deny] [sequence-number] Creates a route map, and enter route-map configuration

Example:

mode.

Switch(config)# route-map set-peer-address permit 10

set ip next-hop ip-address [...ip-address] [peer-address] (Optional) Sets a route map to disable next-hop processing

Example:
Switch(config)# set ip next-hop 10.1.1.3

· In an inbound route map, set the next hop of matching routes to be the neighbor peering address, overriding third-party next hops.

· In an outbound route map of a BGP peer, set the next hop to the peering address of the local router, disabling the next-hop calculation.

end Example:
Switch(config)# end
show route-map [map-name] Example:
Switch# show route-map
copy running-config startup-config Example:

Returns to privileged EXEC mode.
Displays all route maps configured or only the one specified to verify configuration.
(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1186

Routing

Configuring BGP Filtering by Neighbor

Command or Action
Switch# copy running-config startup-config

Purpose

Configuring BGP Filtering by Neighbor

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6 Step 7

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router bgp autonomous-system Example:

Enables a BGP routing process, assign it an AS number, and enter router configuration mode.

Switch(config)# router bgp 109

neighbor {ip-address | peer-group name} distribute-list (Optional) Filters BGP routing updates to or from neighbors

{access-list-number | name} {in | out}

as specified in an access list.

Example:
Switch(config-router)# neighbor 172.16.4.1 distribute-list 39 in

Note You can also use the neighbor prefix-list router configuration command to filter updates, but you cannot use both commands to configure the same BGP peer.

neighbor {ip-address | peer-group name} route-map map-tag {in | out}
Example:

(Optional) Applies a route map to filter an incoming or outgoing route.

Switch(config-router)# neighbor 172.16.70.24 route-map internal-map in
end Example:

Returns to privileged EXEC mode.

Switch(config-router)# end
show ip bgp neighbors Example:

Verifies the configuration.

Switch# show ip bgp neighbors
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1187

Configuring BGP Filtering by Access Lists and Neighbors

Routing

Configuring BGP Filtering by Access Lists and Neighbors
Another method of filtering is to specify an access list filter on both incoming and outbound updates, based on the BGP autonomous system paths. Each filter is an access list based on regular expressions. (See the "Regular Expressions" appendix in the Cisco IOS Dial Technologies Command Reference, Release 12.4 for more information on forming regular expressions.) To use this method, define an autonomous system path access list, and apply it to updates to and from particular neighbors.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
ip as-path access-list access-list-number {permit | deny} Defines a BGP-related access list. as-regular-expressions Example:

Step 3

Switch(config)# ip as-path access-list 1 deny _65535_
router bgp autonomous-system Example:

Enters BGP router configuration mode.

Step 4

Switch(config)# router bgp 110
neighbor {ip-address | peer-group name} filter-list {access-list-number | name} {in | out | weight weight} Example:

Establishes a BGP filter based on an access list.

Step 5

Switch(config-router)# neighbor 172.16.1.1 filter-list 1 out
end Example:

Returns to privileged EXEC mode.

Step 6

Switch(config-router)# end
show ip bgp neighbors [paths regular-expression] Example:

Verifies the configuration.

Step 7

Switch# show ip bgp neighbors
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1188

Routing

Configuring Prefix Lists for BGP Filtering

Configuring Prefix Lists for BGP Filtering
You do not need to specify a sequence number when removing a configuration entry. Show commands include the sequence numbers in their output. Before using a prefix list in a command, you must set up the prefix list.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
ip prefix-list list-name [seq seq-value] deny | permit network/len [ge ge-value] [le le-value] Example:
Switch(config)# ip prefix-list BLUE permit 172.16.1.0/24

Creates a prefix list with an optional sequence number to deny or permit access for matching conditions. You must enter at least one permit or deny clause.
· network/len is the network number and length (in bits) of the network mask.
· (Optional) ge and le values specify the range of the prefix length to be matched.The specified ge-value and le-value must satisfy this condition: len < ge-value < le-value < 32

Step 3

ip prefix-list list-name seq seq-value deny | permit network/len [ge ge-value] [le le-value]
Example:

(Optional) Adds an entry to a prefix list, and assign a sequence number to the entry.

Step 4

Switch(config)# ip prefix-list BLUE seq 10 permit 172.24.1.0/24

end Example:

Returns to privileged EXEC mode.

Step 5

Switch(config)# end

show ip prefix list [detail | summary] name [network/len] Verifies the configuration by displaying information about

[seq seq-num] [longer] [first-match]

a prefix list or prefix list entries.

Example:

Step 6

Switch# show ip prefix list summary test
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1189

Configuring BGP Community Filtering

Routing

Configuring BGP Community Filtering
By default, no COMMUNITIES attribute is sent to a neighbor. You can specify that the COMMUNITIES attribute be sent to the neighbor at an IP address by using the neighbor send-community router configuration command.

SUMMARY STEPS

1. configure terminal 2. ip community-list community-list-number {permit | deny} community-number 3. router bgp autonomous-system 4. neighbor {ip-address | peer-group name} send-community 5. set comm-list list-num delete 6. exit 7. ip bgp-community new-format 8. end 9. show ip bgp community 10. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal

ip community-list community-list-number {permit | deny} Creates a community list, and assign it a number.

community-number Example:

· The community-list-number is an integer from 1 to 99 that identifies one or more permit or deny groups

of communities.

Switch(config)# ip community-list 1 permit 50000:10

· The community-number is the number configured by a set community route-map configuration command.

Step 3

router bgp autonomous-system Example:

Enters BGP router configuration mode.

Step 4

Switch(config)# router bgp 108
neighbor {ip-address | peer-group name} send-community Example:

Specifies that the COMMUNITIES attribute be sent to the neighbor at this IP address.

Switch(config-router)# neighbor 172.16.70.23 send-community

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1190

Routing

Configuring BGP Neighbors and Peer Groups

Step 5 Step 6 Step 7
Step 8 Step 9 Step 10

Command or Action

Purpose

set comm-list list-num delete Example:
Switch(config-router)# set comm-list 500 delete

(Optional) Removes communities from the community attribute of an inbound or outbound update that match a standard or extended community list specified by a route map.

exit Example:

Returns to global configuration mode.

Switch(config-router)# end
ip bgp-community new-format Example:
Switch(config)# ip bgp-community new format
end Example:

(Optional) Displays and parses BGP communities in the format AA:NN.
A BGP community is displayed in a two-part format 2 bytes long. The Cisco default community format is in the format NNAA. In the most recent RFC for BGP, a community takes the form AA:NN, where the first part is the AS number and the second part is a 2-byte number.
Returns to privileged EXEC mode.

Switch(config)# end
show ip bgp community Example:

Verifies the configuration.

Switch# show ip bgp community
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Configuring BGP Neighbors and Peer Groups
To assign configuration options to an individual neighbor, specify any of these router configuration commands by using the neighbor IP address. To assign the options to a peer group, specify any of the commands by using the peer group name. You can disable a BGP peer or peer group without removing all the configuration information by using the neighbor shutdown router configuration command.

Step 1 Step 2

Procedure Command or Action configure terminal router bgp autonomous-system

Purpose Enters global configuration mode. Enters BGP router configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1191

Configuring BGP Neighbors and Peer Groups

Routing

Step 3 Step 4 Step 5
Step 6 Step 7 Step 8 Step 9 Step 10
Step 11 Step 12 Step 13
Step 14 Step 15
Step 16 Step 17

Command or Action neighbor peer-group-name peer-group

Purpose Creates a BGP peer group.

neighbor ip-address peer-group peer-group-name

Makes a BGP neighbor a member of the peer group.

neighbor {ip-address | peer-group-name} remote-as number

Specifies a BGP neighbor. If a peer group is not configured with a remote-as number, use this command to create peer groups containing EBGP neighbors. The range is 1 to 65535.

neighbor {ip-address | peer-group-name} description text
neighbor {ip-address | peer-group-name} default-originate [route-map map-name]

(Optional) Associates a description with a neighbor.
(Optional) Allows a BGP speaker (the local router) to send the default route 0.0.0.0 to a neighbor for use as a default route.

neighbor {ip-address | peer-group-name} send-community

(Optional) Specifies that the COMMUNITIES attribute be sent to the neighbor at this IP address.

neighbor {ip-address | peer-group-name} update-source (Optional) Allows internal BGP sessions to use any

interface

operational interface for TCP connections.

neighbor {ip-address | peer-group-name} ebgp-multihop (Optional) Allows BGP sessions, even when the neighbor is not on a directly connected segment. The multihop session is not established if the only route to the multihop peer's address is the default route (0.0.0.0).

neighbor {ip-address | peer-group-name} local-as number (Optional) Specifies an AS number to use as the local AS. The range is 1 to 65535.

neighbor {ip-address | peer-group-name} advertisement-interval seconds

(Optional) Sets the minimum interval between sending BGP routing updates.

neighbor {ip-address | peer-group-name} maximum-prefix maximum [threshold]

(Optional) Controls how many prefixes can be received from a neighbor. The range is 1 to 4294967295. The threshold (optional) is the percentage of maximum at which a warning message is generated. The default is 75 percent.

neighbor {ip-address | peer-group-name} next-hop-self (Optional) Disables next-hop processing on the BGP updates to a neighbor.

neighbor {ip-address | peer-group-name} password string (Optional) Sets MD5 authentication on a TCP connection to a BGP peer. The same password must be configured on both BGP peers, or the connection between them is not made.

neighbor {ip-address | peer-group-name} route-map (Optional) Applies a route map to incoming or outgoing

map-name {in | out}

routes.

neighbor {ip-address | peer-group-name} send-community

(Optional) Specifies that the COMMUNITIES attribute be sent to the neighbor at this IP address.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1192

Routing

Configuring Aggregate Addresses in a Routing Table

Step 18
Step 19 Step 20 Step 21 Step 22 Step 23 Step 24 Step 25 Step 26

Command or Action

Purpose

neighbor {ip-address | peer-group-name} timers keepalive (Optional) Sets timers for the neighbor or peer group.

holdtime

· The keepalive interval is the time within which

keepalive messages are sent to peers. The range is 1

to 4294967295 seconds; the default is 60.

· The holdtime is the interval after which a peer is declared inactive after not receiving a keepalive message from it. The range is 1 to 4294967295 seconds; the default is 180.

neighbor {ip-address | peer-group-name} weight weight (Optional) Specifies a weight for all routes from a neighbor.

neighbor {ip-address | peer-group-name} distribute-list (Optional) Filter BGP routing updates to or from neighbors,

{access-list-number | name} {in | out}

as specified in an access list.

neighbor {ip-address | peer-group-name} filter-list access-list-number {in | out | weight weight}

(Optional) Establish a BGP filter.

neighbor {ip-address | peer-group-name} version value (Optional) Specifies the BGP version to use when communicating with a neighbor.

neighbor {ip-address | peer-group-name} soft-reconfiguration inbound

(Optional) Configures the software to start storing received updates.

end

Returns to privileged EXEC mode.

show ip bgp neighbors

Verifies the configuration.

copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring Aggregate Addresses in a Routing Table

Step 1 Step 2 Step 3

Procedure Command or Action configure terminal Example:
Switch# configure terminal
router bgp autonomous-system Example:
Switch(config)# router bgp 106
aggregate-address address mask Example:

Purpose Enters global configuration mode.
Enters BGP router configuration mode.
Creates an aggregate entry in the BGP routing table. The aggregate route is advertised as coming from the AS, and

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1193

Configuring Aggregate Addresses in a Routing Table

Routing

Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action

Purpose

the atomic aggregate attribute is set to indicate that Switch(config-router)# aggregate-address 10.0.0.0 information might be missing.
255.0.0.0

aggregate-address address mask as-set

(Optional) Generates AS set path information. This

Example:

command creates an aggregate entry following the same rules as the previous command, but the advertised path

will be an AS_SET consisting of all elements contained

Switch(config-router)# 255.0.0.0 as-set

aggregate-address

10.0.0.0

in

all

paths.

Do

not

use

this

keyword

when

aggregating

many paths because this route must be continually

withdrawn and updated.

aggregate-address address-mask summary-only Example:

(Optional) Advertises summary addresses only.

Switch(config-router)# aggregate-address 10.0.0.0 255.0.0.0 summary-only

aggregate-address address mask suppress-map map-name
Example:

(Optional) Suppresses selected, more specific routes.

Switch(config-router)# aggregate-address 10.0.0.0 255.0.0.0 suppress-map map1

aggregate-address address mask advertise-map map-name
Example:

(Optional) Generates an aggregate based on conditions specified by the route map.

Switch(config-router)# aggregate-address 10.0.0.0 255.0.0.0 advertise-map map2

aggregate-address address mask attribute-map map-name
Example:

(Optional) Generates an aggregate with attributes specified in the route map.

Switch(config-router)# aggregate-address 10.0.0.0 255.0.0.0 attribute-map map3

end Example:

Returns to privileged EXEC mode.

Switch(config-router)# end
show ip bgp neighbors [advertised-routes] Example:

Verifies the configuration.

Switch# show ip bgp neighbors

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1194

Routing

Configuring Routing Domain Confederations

Step 11

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Configuring Routing Domain Confederations
You must specify a confederation identifier that acts as the autonomous system number for the group of autonomous systems.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
router bgp autonomous-system Example:

Enters BGP router configuration mode.

Step 3

Switch(config)# router bgp 100
bgp confederation identifier autonomous-system Example:

Configures a BGP confederation identifier.

Switch(config)# bgp confederation identifier 50007

Step 4 Step 5 Step 6

bgp confederation peers autonomous-system [autonomous-system ...]
Example:

Specifies the autonomous systems that belong to the confederation and that will be treated as special EBGP peers.

Switch(config)# bgp confederation peers 51000 51001 51002

end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show ip bgp neighbor Example:

Verifies the configuration.

Switch# show ip bgp neighbor

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1195

Configuring BGP Route Reflectors

Routing

Step 7 Step 8

Command or Action show ip bgp network Example:
Switch# show ip bgp network
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies the configuration.
(Optional) Saves your entries in the configuration file.

Configuring BGP Route Reflectors

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router bgp autonomous-system Example:

Enters BGP router configuration mode.

Switch(config)# router bgp 101
neighbor {ip-address | peer-group-name} route-reflector-client Example:

Configures the local router as a BGP route reflector and the specified neighbor as a client.

Switch(config-router)# neighbor 172.16.70.24 route-reflector-client
bgp cluster-id cluster-id Example:

(Optional) Configures the cluster ID if the cluster has more than one route reflector.

Switch(config-router)# bgp cluster-id 10.0.1.2
no bgp client-to-client reflection Example:
Switch(config-router)# no bgp client-to-client reflection
end Example:

(Optional) Disables client-to-client route reflection. By default, the routes from a route reflector client are reflected to other clients. However, if the clients are fully meshed, the route reflector does not need to reflect routes to clients.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1196

Routing

Configuring Route Dampening

Step 7 Step 8

Command or Action
Switch(config-router)# end
show ip bgp Example:
Switch# show ip bgp
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Verifies the configuration. Displays the originator ID and the cluster-list attributes.
(Optional) Saves your entries in the configuration file.

Configuring Route Dampening

Step 1 Step 2 Step 3 Step 4
Step 5

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router bgp autonomous-system Example:

Enters BGP router configuration mode.

Switch(config)# router bgp 100
bgp dampening Example:

Enables BGP route dampening.

Switch(config-router)# bgp dampening
bgp dampening half-life reuse suppress max-suppress [route-map map] Example:

(Optional) Changes the default values of route dampening factors.

Switch(config-router)# bgp dampening 30 1500 10000 120

end Example:

Returns to privileged EXEC mode.

Switch(config-router)# end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1197

Monitoring and Maintaining BGP

Routing

Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action

Purpose

show ip bgp flap-statistics [{regexp regexp} | {filter-list (Optional) Monitors the flaps of all paths that are flapping.

list} | {address mask [longer-prefix]}]

The statistics are deleted when the route is not suppressed

Example:

and is stable.

Switch# show ip bgp flap-statistics
show ip bgp dampened-paths Example:

(Optional) Displays the dampened routes, including the time remaining before they are suppressed.

Switch# show pi bgp dampened-paths

clear ip bgp flap-statistics [{regexp regexp} | {filter-list (Optional) Clears BGP flap statistics to make it less likely

list} | {address mask [longer-prefix]}

that a route will be dampened.

Example:

Switch# clear ip bgp flap-statistics
clear ip bgp dampening Example:

(Optional) Clears route dampening information, and unsuppress the suppressed routes.

Switch# clear ip bgp dampening
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Monitoring and Maintaining BGP
You can remove all contents of a particular cache, table, or database. This might be necessary when the contents of the particular structure have become or are suspected to be invalid.
You can display specific statistics, such as the contents of BGP routing tables, caches, and databases. You can use the information to get resource utilization and solve network problems. You can also display information about node reachability and discover the routing path your device's packets are taking through the network.
Table 41-8 lists the privileged EXEC commands for clearing and displaying BGP. For explanations of the display fields, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4.
Table 105: IP BGP Clear and Show Commands

clear ip bgp address clear ip bgp * clear ip bgp peer-group tag

Resets a particular BGP connection. Resets all BGP connections. Removes all members of a BGP peer group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1198

Routing

Configuration Examples for BGP

show ip bgp prefix

Displays peer groups and peers not in peer groups to which the prefix has been advertised. Also display prefix attributes such as the next hop and the local prefix.

show ip bgp cidr-only

Displays all BGP routes that contain subnet and supernet network masks.

show ip bgp community [community-number] [exact] Displays routes that belong to the specified communities.

show ip bgp community-list community-list-number Displays routes that are permitted by the community

[exact-match]

list.

show ip bgp filter-list access-list-number

Displays routes that are matched by the specified AS path access list.

show ip bgp inconsistent-as

Displays the routes with inconsistent originating autonomous systems.

show ip bgp regexp regular-expression

Displays the routes that have an AS path that matches the specified regular expression entered on the command line.

show ip bgp

Displays the contents of the BGP routing table.

show ip bgp neighbors [address]

Displays detailed information on the BGP and TCP connections to individual neighbors.

show ip bgp neighbors [address] [advertised-routes Displays routes learned from a particular BGP

| dampened-routes | flap-statistics | paths

neighbor.

regular-expression | received-routes | routes]

show ip bgp paths

Displays all BGP paths in the database.

show ip bgp peer-group [tag] [summary]

Displays information about BGP peer groups.

show ip bgp summary

Displays the status of all BGP connections.

The bgp log-neighbor changes command is enabled by default. It allows to log messages that are generated when a BGP neighbor resets, comes up, or goes down.

Configuration Examples for BGP

Example: Configuring BGP on Routers
In Figure 41-5 Router A:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1199

Information About ISO CLNS Routing

Routing

Switch(config)# router bgp 100 Switch(config-router)# neighbor 129.213.1.1 remote-as 200
Router B:
Switch(config)# router bgp 200 Switch(config-router)# neighbor 129.213.1.2 remote-as 100 Switch(config-router)# neighbor 175.220.1.2 remote-as 200
Router C:
Switch(config)# router bgp 200 Switch(config-router)# neighbor 175.220.212.1 remote-as 200 Switch(config-router)# neighbor 192.208.10.1 remote-as 300
Router D:
Switch(config)# router bgp 300 Switch(config-router)# neighbor 192.208.10.2 remote-as 200
To verify that BGP peers are running, use the show ip bgp neighbors privileged EXEC command. This is the output of this command on Router A:
Switch# show ip bgp neighbors
BGP neighbor is 129.213.1.1, remote AS 200, external link BGP version 4, remote router ID 175.220.212.1 BGP state = established, table version = 3, up for 0:10:59 Last read 0:00:29, hold time is 180, keepalive interval is 60 seconds Minimum time between advertisement runs is 30 seconds Received 2828 messages, 0 notifications, 0 in queue Sent 2826 messages, 0 notifications, 0 in queue Connections established 11; dropped 10
Anything other than state = established means that the peers are not running. The remote router ID is the highest IP address on that router (or the highest loopback interface). Each time the table is updated with new information, the table version number increments. A table version number that continually increments means that a route is flapping, causing continual routing updates. For exterior protocols, a reference to an IP network from the network router configuration command controls only which networks are advertised. This is in contrast to Interior Gateway Protocols (IGPs), such as EIGRP, which also use the network command to specify where to send updates. For detailed descriptions of BGP configuration, see the "IP Routing Protocols" part of the Cisco IOS IP Configuration Guide, Release 12.4. For details about specific commands, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4.
Information About ISO CLNS Routing
Connectionless Routing
The International Organization for Standardization (ISO) Connectionless Network Service (CLNS) protocol is a standard for the network layer of the Open System Interconnection (OSI) model. Addresses in the ISO network architecture are referred to as network service access point (NSAP) addresses and network entity

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1200

Routing

IS-IS Dynamic Routing

titles (NETs). Each node in an OSI network has one or more NETs. In addition, each node has many NSAP addresses.
When you enable connectionless routing on the switch by using the clns routing global configuration command, the switch makes only forwarding decisions, with no routing-related functionality. For dynamic routing, you must also enable a routing protocol. The switch supports the Intermediate System-to-Intermediate System (IS-IS) dynamic routing protocol that is based on the OSI routing protocol for ISO CLNS networks.
When dynamically routing, you use IS-IS. This routing protocol supports the concept of areas. Within an area, all routers know how to reach all the system IDs. Between areas, routers know how to reach the proper area. IS-IS supports two levels of routing: station routing (within an area) and area routing (between areas).
The key difference between the ISO IGRP and IS-IS NSAP addressing schemes is in the definition of area addresses. Both use the system ID for Level 1 routing (routing within an area). However, they differ in the way addresses are specified for area routing. An ISO IGRP NSAP address includes three separate fields for routing: the domain, area, and system ID. An IS-IS address includes two fields: a single continuous area field (comprising the domain and area fields) and the system ID.
Note For more detailed information about ISO CLNS, see the Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS and XNS Configuration Guide, Release 12.4. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS and XNS Command Reference, Release 12.4, use the IOS command reference master index, or search online.
IS-IS Dynamic Routing
IS-IS is an ISO dynamic routing protocol (described in ISO 105890). Unlike other routing protocols, enabling IS-IS requires that you create an IS-IS routing process and assign it to a specific interface, rather than to a network. You can specify more than one IS-IS routing process per Layer 3 switch or router by using the multiarea IS-IS configuration syntax. You then configure the parameters for each instance of the IS-IS routing process.
Small IS-IS networks are built as a single area that includes all the routers in the network. As the network grows larger, it is usually reorganized into a backbone area made up of the connected set of all Level 2 routers from all areas, which is in turn connected to local areas. Within a local area, routers know how to reach all system IDs. Between areas, routers know how to reach the backbone, and the backbone routers know how to reach other areas.
Routers establish Level 1 adjacencies to perform routing within a local area (station routing). Routers establish Level 2 adjacencies to perform routing between Level 1 areas (area routing).
A single Cisco router can participate in routing in up to 29 areas and can perform Level 2 routing in the backbone. In general, each routing process corresponds to an area. By default, the first instance of the routing process configured performs both Level 1and Level 2 routing. You can configure additional router instances, which are automatically treated as Level 1 areas. You must configure the parameters for each instance of the IS-IS routing process individually.
For IS-IS multiarea routing, you can configure only one process to perform Level 2 routing, although you can define up to 29 Level 1 areas for each Cisco unit. If Level 2 routing is configured on any process, all additional processes are automatically configured as Level 1. You can configure this process to perform Level 1 routing at the same time. If Level 2 routing is not desired for a router instance, remove the Level 2 capability using the is-type global configuration command. Use the is-type command also to configure a different router instance as a Level 2 router.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1201

Nonstop Forwarding Awareness

Routing

Note For more detailed information about IS-IS, see the "IP Routing Protocols" chapter of the Cisco IOS IP Configuration Guide, Release 12.4. For complete syntax and usage information for the commands used in this section, see the Cisco IOS IP Command Reference, Release 12.4.
Nonstop Forwarding Awareness
The integrated IS-IS NSF Awareness feature is supported for IPv4G. The feature allows customer premises equipment (CPE) routers that are NSF-aware to help NSF-capable routers perform nonstop forwarding of packets. The local router is not necessarily performing NSF, but its awareness of NSF allows the integrity and accuracy of the routing database and link-state database on the neighboring NSF-capable router to be maintained during the switchover process. This feature is automatically enabled and requires no configuration. For more information on this feature, see the Integrated IS-IS Nonstop Forwarding (NSF) Awareness Feature Guide.
IS-IS Global Parameters
These are some optional IS-IS global parameters that you can configure: · You can force a default route into an IS-IS routing domain by configuring a default route controlled by a route map. You can also specify other filtering options configurable under a route map.
· You can configure the router to ignore IS-IS LSPs that are received with internal checksum errors or to purge corrupted LSPs, which causes the initiator of the LSP to regenerate it.
· You can assign passwords to areas and domains.
· You can create aggregate addresses that are represented in the routing table by a summary address (route-summarization). Routes learned from other routing protocols can also be summarized. The metric used to advertise the summary is the smallest metric of all the specific routes.
· You can set an overload bit.
· You can configure the LSP refresh interval and the maximum time that an LSP can remain in the router database without a refresh
· You can set the throttling timers for LSP generation, shortest path first computation, and partial route computation.
· You can configure the switch to generate a log message when an IS-IS adjacency changes state (up or down).
· If a link in the network has a maximum transmission unit (MTU) size of less than 1500 bytes, you can lower the LSP MTU so that routing will still occur.
· The partition avoidance router configuration command prevents an area from becoming partitioned when full connectivity is lost among a Level1-2 border router, adjacent Level 1 routers, and end hosts.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1202

Routing

IS-IS Interface Parameters

IS-IS Interface Parameters
You can optionally configure certain interface-specific IS-IS parameters, independently from other attached routers. However, if you change some values from the defaults, such as multipliers and time intervals, it makes sense to also change them on multiple routers and interfaces. Most of the interface parameters can be configured for level 1, level 2, or both.
These are some interface level parameters you can configure:
· The default metric on the interface, which is used as a value for the IS-IS metric and assigned when there is no quality of service (QoS) routing performed.
· The hello interval (length of time between hello packets sent on the interface) or the default hello packet multiplier used on the interface to determine the hold time sent in IS-IS hello packets. The hold time determines how long a neighbor waits for another hello packet before declaring the neighbor down. This determines how quickly a failed link or neighbor is detected so that routes can be recalculated. Change the hello-multiplier in circumstances where hello packets are lost frequently and IS-IS adjacencies are failing unnecessarily. You can raise the hello multiplier and lower the hello interval correspondingly to make the hello protocol more reliable without increasing the time required to detect a link failure.
· Other time intervals:
· Complete sequence number PDU (CSNP) interval. CSNPs are sent by the designated router to maintain database synchronization
· Retransmission interval. This is the time between retransmission of IS-IS LSPs for point-to-point links.
· IS-IS LSP retransmission throttle interval. This is the maximum rate (number of milliseconds between packets) at which IS-IS LSPs are re-sent on point-to-point links This interval is different from the retransmission interval, which is the time between successive retransmissions of the same LSP
· Designated router election priority, which allows you to reduce the number of adjacencies required on a multiaccess network, which in turn reduces the amount of routing protocol traffic and the size of the topology database.
· The interface circuit type, which is the type of adjacency desired for neighbors on the specified interface
· Password authentication for the interface

How to Configure ISO CLNS Routing

Default IS-IS Configuration
Table 106: Default IS-IS Configuration
Feature Ignore link-state PDU (LSP) errors

Default Setting Enabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1203

Default IS-IS Configuration

Routing

Feature IS-IS type
Default-information originate Log IS-IS adjacency state changes. LSP generation throttling timers
LSP maximum lifetime (without a refresh) LSP refresh interval Maximum LSP packet size NSF Awareness Partial route computation (PRC) throttling timers
Partition avoidance Password Set-overload-bit Shortest path first (SPF) throttling timers

Default Setting
Conventional IS-IS: the router acts as both a Level 1 (station) and a Level 2 (area) router. Multiarea IS-IS: the first instance of the IS-IS routing process is a Level 1-2 router. Remaining instances are Level 1 routers.
Disabled.
Disabled.
Maximum interval between two consecutive occurrences: 5 seconds. Initial LSP generation delay: 50 ms. Hold time between the first and second LSP generation: 5000 ms.
1200 seconds (20 minutes) before t.he LSP packet is deleted.
Send LSP refreshes every 900 seconds (15 minutes).
1497 bytes.
Enabled. Allows Layer 3 switches to continue forwarding packets from a neighboring NSF-capable router during hardware or software changes.
Maximum PRC wait interval: 5 seconds. Initial PRC calculation delay after a topology change: 2000 ms. Hold time between the first and second PRC calculation: 5000 ms.
Disabled.
No area or domain password is defined, and authentication is disabled.
Disabled. When enabled, if no arguments are entered, the overload bit is set immediately and remains set until you enter the no set-overload-bit command.
Maximum interval between consecutive SFPs: 10 seconds. Initial SFP calculation after a topology change: 5500 ms. Holdtime between the first and second SFP calculation: 5500 ms.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1204

Routing

Enabling IS-IS Routing

Feature Summary-address

Default Setting Disabled.

Enabling IS-IS Routing
To enable IS-IS, you specify a name and NET for each routing process. You then enable IS-IS routing on the interface and specify the area for each instance of the routing process.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
clns routing Example:

Enables ISO connectionless routing on the switch.

Step 3
Step 4 Step 5

Switch(config)# clns routing
router isis [area tag] Example:
Switch(config)# router isis tag1
net network-entity-title Example:
Switch(config-router)# net 47.0004.004d.0001.0001.0c11.1111.00
is-type {level-1 | level-1-2 | level-2-only} Example:
Switch(config-router)# is-type level-2-only

Enables the IS-IS routing for the specified routing process and enter IS-IS routing configuration mode.
(Optional) Use the area tag argument to identify the area to which the IS-IS router is assigned. You must enter a value if you are configuring multiple IS-IS areas.
The first IS-IS instance configured is Level 1-2 by default. Later instances are automatically Level 1. You can change the level of routing by using the is-type global configuration command.
Configures the NETs for the routing process. If you are configuring multiarea IS-IS, specify a NET for each routing process. You can specify a name for a NET and for an address.
(Optional) Configures the router to act as a Level 1 (station) router, a Level 2 (area) router for multi-area routing, or both (the default):
· level-1--act as a station router only
· level-1-2--act as both a station router and an area router
· level 2--act as an area router only

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1205

Enabling IS-IS Routing

Routing

Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13

Command or Action exit Example:

Purpose Returns to global configuration mode.

Switch(config-router)# end

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Specifies an interface to route IS-IS, and enter interface configuration mode. If the interface is not already configured as a Layer 3 interface, enter the no switchport command to put it into Layer 3 mode.

ip router isis [area tag] Example:

Configures an IS-IS routing process for ISO CLNS on the interface and attach an area designator to the routing process.

Switch(config-if)# ip router isis tag1

clns router isis [area tag] Example:

Enables ISO CLNS on the interface.

Switch(config-if)# clns router isis tag1
ip address ip-address-mask Example:
Switch(config-if)# ip address 10.0.0.5 255.255.255.0
end Example:

Define the IP address for the interface. An IP address is required on all interfaces in an area enabled for IS-IS if any one interface is configured for IS-IS routing.
Returns to privileged EXEC mode.

Switch(config-if)# end
show isis [area tag] database detail Example:

Verifies your entries.

Switch# show isis database detail
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1206

Routing

Configuring IS-IS Global Parameters

Configuring IS-IS Global Parameters

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
clns routing Example:

Enables ISO connectionless routing on the switch.

Switch(config)# clns routing
router isis Example:

Specifies the IS-IS routing protocol and enter router configuration mode.

Switch(config)# router isis

default-information originate [route-map map-name] Example:
Switch(config-router)# default-information originate route-map map1

(Optional) Forces a default route into the IS-IS routing domain.If you enter route-map map-name, the routing process generates the default route if the route map is satisfied.

ignore-lsp-errors Example:
Switch(config-router)# ignore-lsp-errors

(Optional) Configures the router to ignore LSPs with internal checksum errors, instead of purging the LSPs. This command is enabled by default (corrupted LSPs are dropped). To purge the corrupted LSPs, enter the no ignore-lsp-errors router configuration command.

area-password password Example:

(Optional Configures the area authentication password, which is inserted in Level 1 (station router level) LSPs.

Switch(config-router)# area-password 1password

domain-password password Example:

(Optional) Configures the routing domain authentication password, which is inserted in Level 2 (area router level) LSPs.

Switch(config-router)# domain-password 2password

summary-address address mask [level-1 | level-1-2 | level-2]
Example:

(Optional) Creates a summary of addresses for a given level.

Switch(config-router)# summary-address 10.1.0.0 255.255.0.0 level-2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1207

Configuring IS-IS Global Parameters

Routing

Step 9
Step 10 Step 11 Step 12 Step 13

Command or Action

Purpose

set-overload-bit [on-startup {seconds | wait-for-bgp}] (Optional) Sets an overload bit (a hippity bit) to allow other

Example:

routers to ignore the router in their shortest path first (SPF) calculations if the router is having problems.

Switch(config-router)# set-overload-bit on-startup wait-for-bgp

· (Optional) on-startup--sets the overload bit only on startup. If on-startup is not specified, the overload bit is set immediately and remains set until you enter the no set-overload-bit command. If on-startup is specified, you must enter a number of seconds or wait-for-bgp.

· seconds--When the on-startup keyword is configured, causes the overload bit to be set upon system startup and remain set for this number of seconds. The range is from 5 to 86400 seconds.

· wait-for-bgp--When the on-startup keyword is configured, causes the overload bit to be set upon system startup and remain set until BGP has converged. If BGP does not signal IS-IS that it is converged, IS-IS will turn off the overload bit after 10 minutes.

lsp-refresh-interval seconds Example:

(Optional) Sets an LSP refresh interval in seconds. The range is from 1 to 65535 seconds. The default is to send LSP refreshes every 900 seconds (15 minutes).

Switch(config-router)# lsp-refresh-interval 1080

max-lsp-lifetime seconds Example:
Switch(config-router)# max-lsp-lifetime 1000

(Optional) Sets the maximum time that LSP packets remain in the router database without being refreshed. The range is from 1 to 65535 seconds. The default is 1200 seconds (20 minutes). After the specified time interval, the LSP packet is deleted.

lsp-gen-interval [level-1 | level-2] lsp-max-wait [lsp-initial-wait lsp-second-wait] Example:
Switch(config-router)# lsp-gen-interval level-2 2 50 100

(Optional) Sets the IS-IS LSP generation throttling timers:
· lsp-max-wait--the maximum interval (in seconds) between two consecutive occurrences of an LSP being generated. The range is 1 to 120, the default is 5.
· lsp-initial-wait--the initial LSP generation delay (in milliseconds). The range is 1 to 10000; the default is 50.

· lsp-second-wait--the hold time between the first and second LSP generation (in milliseconds). The range is 1 to 10000; the default is 5000.

spf-interval [level-1 | level-2] spf-max-wait [spf-initial-wait spf-second-wait]
Example:

(Optional) Sets IS-IS shortest path first (SPF) throttling timers.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1208

Routing

Configuring IS-IS Global Parameters

Step 14
Step 15 Step 16 Step 17 Step 18

Command or Action

Purpose

Switch(config-router)# spf-interval level-2 5 10 20

· spf-max-wait--the maximum interval between consecutive SFPs (in seconds). The range is 1 to 120, the default is 10.

· spf-initial-wait--the initial SFP calculation after a topology change (in milliseconds). The range is 1 to 10000; the default is 5500.

· spf-second-wait--the holdtime between the first and second SFP calculation (in milliseconds). The range is 1 to 10000; the default is 5500.

prc-interval prc-max-wait [prc-initial-wait prc-second-wait] Example:
Switch(config-router)# prc-interval 5 10 20

(Optional) Sets IS-IS partial route computation (PRC) throttling timers.
· prc-max-wait--the maximum interval (in seconds) between two consecutive PRC calculations. The range is 1 to 120; the default is 5.
· prc-initial-wait--the initial PRC calculation delay (in milliseconds) after a topology change. The range is 1 to 10,000; the default is 2000.
· prc-second-wait--the hold time between the first and second PRC calculation (in milliseconds). The range is 1 to 10,000; the default is 5000.

log-adjacency-changes [all]

(Optional) Sets the router to log IS-IS adjacency state

Example:

changes. Enter all to include all changes generated by events that are not related to the Intermediate

System-to-Intermediate System Hellos, including End Switch(config-router)# log-adjacency-changes all System-to-Intermediate System PDUs and link state

packets (LSPs).

lsp-mtu size Example:
Switch(config-router)# lsp mtu 1560

(Optional) Specifies the maximum LSP packet size in bytes. The range is 128 to 4352; the default is 1497 bytes.
Note If any link in the network has a reduced MTU size, you must change the LSP MTU size on all routers in the network.

partition avoidance Example:
Switch(config-router)# partition avoidance
end Example:
Switch(config-router)# end

(Optional) Causes an IS-IS Level 1-2 border router to stop advertising the Level 1 area prefix into the Level 2 backbone when full connectivity is lost among the border router, all adjacent level 1 routers, and end hosts.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1209

Configuring IS-IS Interface Parameters

Routing

Step 19 Step 20

Command or Action show clns Example:
Switch# show clns
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies your entries.
(Optional) Saves your entries in the configuration file.

Configuring IS-IS Interface Parameters

Step 1 Step 2 Step 3 Step 4
Step 5

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

interface interface-id Example:
Switch(config)# interface gigabitethernet 1/0/1

Specifies the interface to be configured and enter interface configuration mode. If the interface is not already configured as a Layer 3 interface, enter the no switchport command to put it into Layer 3 mode.

isis metric default-metric [level-1 | level-2] Example:
Switch(config-if)# isis metric 15

(Optional) Configures the metric (or cost) for the specified interface. The range is from 0 to 63. The default is 10. If no level is entered, the default is to apply to both Level 1 and Level 2 routers.

isis hello-interval {seconds | minimal} [level-1 | level-2] (Optional) Specifies the length of time between hello

Example:

packets sent by the switch. By default, a value three times the hello interval seconds is advertised as the holdtime in

the hello packets sent. With smaller hello intervals, Switch(config-if)# isis hello-interval minimal topological changes are detected faster, but there is more

routing traffic.

· minimal--causes the system to compute the hello interval based on the hello multiplier so that the resulting hold time is 1 second.

· seconds--the range is from 1 to 65535. The default is 10 seconds.

isis hello-multiplier multiplier [level-1 | level-2] Example:

(Optional) Specifies the number of IS-IS hello packets a neighbor must miss before the router should declare the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1210

Routing

Configuring IS-IS Interface Parameters

Step 6 Step 7 Step 8 Step 9 Step 10
Step 11

Command or Action
Switch(config-if)# isis hello-multiplier 5

Purpose
adjacency as down. The range is from 3 to 1000. The default is 3. Using a smaller hello-multiplier causes fast convergence, but can result in more routing instability.

isis csnp-interval seconds [level-1 | level-2] Example:
Switch(config-if)# isis csnp-interval 15

(Optional) Configures the IS-IS complete sequence number PDU (CSNP) interval for the interface. The range is from 0 to 65535. The default is 10 seconds.

isis retransmit-interval seconds Example:
Switch(config-if)# isis retransmit-interval 7

(Optional) Configures the number of seconds between retransmission of IS-IS LSPs for point-to-point links. The value you specify should be an integer greater than the expected round-trip delay between any two routers on the network. The range is from 0 to 65535. The default is 5 seconds.

isis retransmit-throttle-interval milliseconds Example:
Switch(config-if)# isis retransmit-throttle-interval 4000

(Optional) Configures the IS-IS LSP retransmission throttle interval, which is the maximum rate (number of milliseconds between packets) at which IS-IS LSPs will be re-sent on point-to-point links. The range is from 0 to 65535. The default is determined by the isis lsp-interval command.

isis priority value [level-1 | level-2] Example:
Switch(config-if)# isis priority 50

(Optional) Configures the priority to use for designated router election. The range is from 0 to 127. The default is 64.

isis circuit-type {level-1 | level-1-2 | level-2-only} Example:
Switch(config-if)# isis circuit-type level-1-2

(Optional) Configures the type of adjacency desired for neighbors on the specified interface (specify the interface circuit type).
· level-1--a Level 1 adjacency is established if there is at least one area address common to both this node and its neighbors.
· level-1-2--a Level 1 and 2 adjacency is established if the neighbor is also configured as both Level 1 and Level 2 and there is at least one area in common. If there is no area in common, a Level 2 adjacency is established. This is the default.
· level 2--a Level 2 adjacency is established. If the neighbor router is a Level 1 router, no adjacency is established.

isis password password [level-1 | level-2] Example:
Switch(config-if)# isis password secret

(Optional) Configures the authentication password for an interface. By default, authentication is disabled. Specifying Level 1 or Level 2 enables the password only for Level 1 or Level 2 routing, respectively. If you do not specify a level, the default is Level 1 and Level 2.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1211

Monitoring and Maintaining ISO IGRP and IS-IS

Routing

Step 12 Step 13 Step 14

Command or Action end Example:

Purpose Returns to privileged EXEC mode.

Switch(config-if)# end
show clns interface interface-id Example:

Verifies your entries.

Switch# show clns interface gigabitethernet 1/0/1

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Monitoring and Maintaining ISO IGRP and IS-IS
You can remove all contents of a CLNS cache or remove information for a particular neighbor or route. You can display specific CLNS or IS-IS statistics, such as the contents of routing tables, caches, and databases. You can also display information about specific interfaces, filters, or neighbors.
Table 41-13 lists the privileged EXEC commands for clearing and displaying ISO CLNS and IS-IS routing. For explanations of the display fields, see the Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS and XNS Command Reference, Release 12.4, use the Cisco IOS command reference master index, or search online.
Table 107: ISO CLNS and IS-IS Clear and Show Commands

clear clns cache clear clns es-neighbors
clear clns is-neighbors
clear clns neighbors
clear clns route
show clns show clns cache show clns es-neighbors

Clears and reinitializes the CLNS routing cache.
Removes end system (ES) neighbor information from the adjacency database.
Removes intermediate system (IS) neighbor information from the adjacency database.
Removes CLNS neighbor information from the adjacency database.
Removes dynamically derived CLNS routing information.
Displays information about the CLNS network.
Displays the entries in the CLNS routing cache.
Displays ES neighbor entries, including the associated areas.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1212

Routing

Configuration Examples for ISO CLNS Routing

show clns filter-expr show clns filter-set show clns interface [interface-id]
show clns neighbor show clns protocol
show clns route
show clns traffic
show ip route isis show isis database show isis routes show isis spf-log
show isis topology show route-map
trace clns destination
which-route {nsap-address | clns-name}

Displays filter expressions.
Displays filter sets.
Displays the CLNS-specific or ES-IS information about each interface.
Displays information about IS-IS neighbors.
List the protocol-specific information for each IS-IS or ISO IGRP routing process in this router.
Displays all the destinations to which this router knows how to route CLNS packets.
Displays information about the CLNS packets this router has seen.
Displays the current state of the ISIS IP routing table.
Displays the IS-IS link-state database.
Displays the IS-IS Level 1 routing table.
Displays a history of the shortest path first (SPF) calculations for IS-IS.
Displays a list of all connected routers in all areas.
Displays all route maps configured or only the one specified.
Discover the paths taken to a specified destination by packets in the network.
Displays the routing table in which the specified CLNS destination is found.

Configuration Examples for ISO CLNS Routing
Example: Configuring IS-IS Routing
This example shows how to configure three routers to run conventional IS-IS as an IP routing protocol. In conventional IS-IS, all routers act as Level 1 and Level 2 routers (by default). Router A:
Switch(config)# clns routing Switch(config)# router isis Switch(config-router)# net 49.0001.0000.0000.000a.00 Switch(config-router)# exit Switch(config)# interface gigabitethernet1/0/1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1213

Information About Multi-VRF CE

Routing

Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config-router)# exit
Router B:
Switch(config)# clns routing Switch(config)# router isis Switch(config-router)# net 49.0001.0000.0000.000b.00 Switch(config-router)# exit Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config-router)# exit
Router C:
Switch(config)# clns routing Switch(config)# router isis Switch(config-router)# net 49.0001.0000.0000.000c.00 Switch(config-router)# exit Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip router isis Switch(config-if)# clns router isis Switch(config-router)# exit
Information About Multi-VRF CE
Virtual Private Networks (VPNs) provide a secure way for customers to share bandwidth over an ISP backbone network. A VPN is a collection of sites sharing a common routing table. A customer site is connected to the service-provider network by one or more interfaces, and the service provider associates each interface with a VPN routing table, called a VPN routing/forwarding (VRF) table.
The switch supports multiple VPN routing/forwarding (multi-VRF) instances in customer edge (CE) devices (multi-VRF CE) when the it is running the IP services or advanced IP services feature set. Multi-VRF CE allows a service provider to support two or more VPNs with overlapping IP addresses.
Note The switch does not use Multiprotocol Label Switching (MPLS) to support VPNs. For information about MPLS VRF, see the Cisco IOS Switching Services Configuration Guide, Release 12.4.
Understanding Multi-VRF CE
Multi-VRF CE is a feature that allows a service provider to support two or more VPNs, where IP addresses can be overlapped among the VPNs. Multi-VRF CE uses input interfaces to distinguish routes for different

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1214

Routing

Network Topology

VPNs and forms virtual packet-forwarding tables by associating one or more Layer 3 interfaces with each VRF. Interfaces in a VRF can be either physical, such as Ethernet ports, or logical, such as VLAN SVIs, but an interface cannot belong to more than one VRF at any time.
Note Multi-VRF CE interfaces must be Layer 3 interfaces.
Multi-VRF CE includes these devices:
· Customer edge (CE) devices provide customers access to the service-provider network over a data link to one or more provider edge routers. The CE device advertises the site's local routes to the router and learns the remote VPN routes from it. A switch can be a CE.
· Provider edge (PE) routers exchange routing information with CE devices by using static routing or a routing protocol such as BGP, RIPv2, OSPF, or EIGRP. The PE is only required to maintain VPN routes for those VPNs to which it is directly attached, eliminating the need for the PE to maintain all of the service-provider VPN routes. Each PE router maintains a VRF for each of its directly connected sites. Multiple interfaces on a PE router can be associated with a single VRF if all of these sites participate in the same VPN. Each VPN is mapped to a specified VRF. After learning local VPN routes from CEs, a PE router exchanges VPN routing information with other PE routers by using internal BGP (IBPG).
· Provider routers or core routers are any routers in the service provider network that do not attach to CE devices.
With multi-VRF CE, multiple customers can share one CE, and only one physical link is used between the CE and the PE. The shared CE maintains separate VRF tables for each customer and switches or routes packets for each customer based on its own routing table. Multi-VRF CE extends limited PE functionality to a CE device, giving it the ability to maintain separate VRF tables to extend the privacy and security of a VPN to the branch office.
Network Topology
Figure 41-6 shows a configuration using switches as multiple virtual CEs. This scenario is suited for customers who have low bandwidth requirements for their VPN service, for example, small companies. In this case, multi-VRF CE support is required in the switches. Because multi-VRF CE is a Layer 3 feature, each interface in a VRF must be a Layer 3 interface.
Figure 68: Switches Acting as Multiple Virtual CEs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1215

Packet-Forwarding Process

Routing

When the CE switch receives a command to add a Layer 3 interface to a VRF, it sets up the appropriate mapping between the VLAN ID and the policy label (PL) in multi-VRF-CE-related data structures and adds the VLAN ID and PL to the VLAN database.
When multi-VRF CE is configured, the Layer 3 forwarding table is conceptually partitioned into two sections:
· The multi-VRF CE routing section contains the routes from different VPNs.
· The global routing section contains routes to non-VPN networks, such as the Internet.
VLAN IDs from different VRFs are mapped into different policy labels, which are used to distinguish the VRFs during processing. For each new VPN route learned, the Layer 3 setup function retrieves the policy label by using the VLAN ID of the ingress port and inserts the policy label and new route to the multi-VRF CE routing section. If the packet is received from a routed port, the port internal VLAN ID number is used; if the packet is received from an SVI, the VLAN number is used.
Packet-Forwarding Process
This is the packet-forwarding process in a multi-VRF-CE-enabled network:
· When the switch receives a packet from a VPN, the switch looks up the routing table based on the input policy label number. When a route is found, the switch forwards the packet to the PE.
· When the ingress PE receives a packet from the CE, it performs a VRF lookup. When a route is found, the router adds a corresponding MPLS label to the packet and sends it to the MPLS network.
· When an egress PE receives a packet from the network, it strips the label and uses the label to identify the correct VPN routing table. Then it performs the normal route lookup. When a route is found, it forwards the packet to the correct adjacency.
· When a CE receives a packet from an egress PE, it uses the input policy label to look up the correct VPN routing table. If a route is found, it forwards the packet within the VPN.
Network Components
To configure VRF, you create a VRF table and specify the Layer 3 interface associated with the VRF. Then configure the routing protocols in the VPN and between the CE and the PE. BGP is the preferred routing protocol used to distribute VPN routing information across the provider's backbone. The multi-VRF CE network has three major components:
· VPN route target communities--lists of all other members of a VPN community. You need to configure VPN route targets for each VPN community member.
· Multiprotocol BGP peering of VPN community PE routers--propagates VRF reachability information to all members of a VPN community. You need to configure BGP peering in all PE routers within a VPN community.
· VPN forwarding--transports all traffic between all VPN community members across a VPN service-provider network.
VRF-Aware Services
IP services can be configured on global interfaces, and these services run within the global routing instance. IP services are enhanced to run on multiple routing instances; they are VRF-aware. Any configured VRF in the system can be specified for a VRF-aware service.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1216

Routing

How to Configure Multi-VRF CE

VRF-Aware services are implemented in platform-independent modules. VRF means multiple routing instances in Cisco IOS. Each platform has its own limit on the number of VRFs it supports.
VRF-aware services have the following characteristics:
· The user can ping a host in a user-specified VRF.
· ARP entries are learned in separate VRFs. The user can display Address Resolution Protocol (ARP) entries for specific VRFs.

How to Configure Multi-VRF CE
Default Multi-VRF CE Configuration
Table 108: Default VRF Configuration
Feature VRF Maps
VRF maximum routes
Forwarding table

Default Setting
Disabled. No VRFs are defined.
No import maps, export maps, or route maps are defined.
Fast Ethernet switches: 8000 Gigabit Ethernet switches: 12000.
The default for an interface is the global routing table.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1217

Multi-VRF CE Configuration Guidelines

Routing

Multi-VRF CE Configuration Guidelines
Note To use multi-VRF CE, you must have the IP services or advanced IP services feature set enabled on your switch. · A switch with multi-VRF CE is shared by multiple customers, and each customer has its own routing table. · Because customers use different VRF tables, the same IP addresses can be reused. Overlapped IP addresses are allowed in different VPNs. · Multi-VRF CE lets multiple customers share the same physical link between the PE and the CE. Trunk ports with multiple VLANs separate packets among customers. Each customer has its own VLAN. · Multi-VRF CE does not support all MPLS-VRF functionality. It does not support label exchange, LDP adjacency, or labeled packets. · For the PE router, there is no difference between using multi-VRF CE or using multiple CEs. In Figure 41-6, multiple virtual Layer 3 interfaces are connected to the multi-VRF CE device. · The switch supports configuring VRF by using physical ports, VLAN SVIs, or a combination of both. The SVIs can be connected through an access port or a trunk port. · A customer can use multiple VLANs as long as they do not overlap with those of other customers. A customer's VLANs are mapped to a specific routing table ID that is used to identify the appropriate routing tables stored on the switch. · The switch supports one global network and up to 26 VRFs. · Most routing protocols (BGP, OSPF, RIP, and static routing) can be used between the CE and the PE. However, we recommend using external BGP (EBGP) for these reasons: · BGP does not require multiple algorithms to communicate with multiple CEs. · BGP is designed for passing routing information between systems run by different administrations. · BGP makes it easy to pass attributes of the routes to the CE.
· Multi-VRF CE does not affect the packet switching rate. · VPN multicast is not supported. · You can enable VRF on a private VLAN, and the reverse. · You cannot enable VRF when policy-based routing (PBR) is enabled on an interface, and the reverse. · You cannot enable VRF when Web Cache Communication Protocol (WCCP) is enabled on an interface,
and the reverse.
Configuring VRFs
For complete syntax and usage information for the commands, see the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1218

Routing

Configuring VRFs

Step 1 Step 2 Step 3 Step 4 Step 5
Step 6 Step 7 Step 8 Step 9

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
ip routing Example:

Enables IP routing.

Switch(config)# ip routing
ip vrf vrf-name Example:

Names the VRF, and enter VRF configuration mode.

Switch(config)# ip vrf vpn1
rd route-distinguisher Example:
Switch(config-vrf)# rd 100:2
route-target {export | import | both} route-target-ext-community Example:
Switch(config-vrf)# route-target both 100:2
import map route-map Example:

Creates a VRF table by specifying a route distinguisher. Enter either an AS number and an arbitrary number (xxx:y) or an IP address and arbitrary number (A.B.C.D:y)
Creates a list of import, export, or import and export route target communities for the specified VRF. Enter either an AS system number and an arbitrary number (xxx:y) or an IP address and an arbitrary number (A.B.C.D:y). The route-target-ext-community should be the same as the route-distinguisher entered in Step 4.
(Optional) Associates a route map with the VRF.

Switch(config-vrf)# import map importmap1
interface interface-id Example:
Switch(config-vrf)# interface gigabitethernet 1/0/1
ip vrf forwarding vrf-name Example:

Specifies the Layer 3 interface to be associated with the VRF, and enter interface configuration mode. The interface can be a routed port or SVI.
Associates the VRF with the Layer 3 interface.

Switch(config-if)# ip vrf forwarding vpn1
end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1219

Configuring VRF-Aware Services

Routing

Step 10 Step 11

Command or Action
Switch(config-if)# end
show ip vrf [brief | detail | interfaces] [vrf-name] Example:
Switch# show ip vrf interfaces vpn1
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Verifies the configuration. Displays information about the configured VRFs.
(Optional) Saves your entries in the configuration file.

Configuring VRF-Aware Services
These services are VRF-Aware: · ARP · Ping · Simple Network Management Protocol (SNMP) · Unicast Reverse Path Forwarding (uRPF) · Syslog · Traceroute · FTP and TFTP

Note The switch does not support VRF-aware services for Unicast Reverse Path Forwar......ding (uRPF) or Network Time Protocol (NTP).

Configuring VRF-Aware Services for ARP
For complete syntax and usage information for the commands, see the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4.
show ip arp vrf vrf-name

Step 1

Procedure Command or Action Example:

Purpose

Switch# show ip arp vrf vpn1
Displays the ARP table in the specified VRF.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1220

Routing

Configuring VRF-Aware Services for Ping

Configuring VRF-Aware Services for Ping
For complete syntax and usage information for the commands, see the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4.

Step 1

Procedure Command or Action ping vrf vrf-name ip-host Example:

Purpose Displays the ARP table in the specified VRF.

Switch# ping vrf vpn1 ip-host

Configuring VRF-Aware Services for SNMP
For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
snmp-server trap authentication vrf Example:

Enables SNMP traps for packets on a VRF.

Step 3

Switch(config)# snmp-server trap authentication vrf

snmp-server engineID remote host vrf vpn-instance engine-id string
Example:

Configures a name for the remote SNMP engine on a switch.

Step 4

Switch(config)# snmp-server engineID remote 172.16.20.3 vrf vpn1 80000009030000B064EFE100

snmp-server host host vrf vpn-instance traps community Specifies the recipient of an SNMP trap operation and

Example:

specifies the VRF table to be used for sending SNMP traps.

Switch(config)# snmp-server host 172.16.20.3 vrf vpn1 traps comaccess

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1221

Configuring VRF-Aware Servcies for uRPF

Routing

Step 5 Step 6 Step 7

Command or Action

Purpose

snmp-server host host vrf vpn-instance informs community Specifies the recipient of an SNMP inform operation and

Example:

specifies the VRF table to be used for sending SNMP informs.

Switch(config)# snmp-server host 172.16.20.3 vrf vpn1 informs comaccess

snmp-server user user group remote host vrf vpn-instance Adds a user to an SNMP group for a remote host on a VRF

security model

for SNMP access.

Example:

Switch(config)# snmp-server user abcd remote 172.16.20.3 vrf vpn1 priv v2c 3des secure3des
end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Configuring VRF-Aware Servcies for uRPF
uRPF can be configured on an interface assigned to a VRF, and source lookup is done in the VRF table.
For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2 Step 3

Switch# configure terminal
interface interface-id Switch(config)# interface gigabitethernet 1/0/1
no switchport Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.
Removes the interface from Layer 2 configuration mode if it is a physical interface.

Step 4

Switch(config-if)# no switchport
ip vrf forwarding vrf-name Example:

Configures VRF on the interface.

Switch(config-if)# ip vrf forwarding vpn2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1222

Routing

Configuring VRF-Aware RADIUS

Step 5 Step 6 Step 7

Command or Action ip address ip-address Example:

Purpose Enters the IP address for the interface.

Switch(config-if)# ip address 10.1.5.1
ip verify unicast reverse-path Example:

Enables uRPF on the interface.

Switch(config-if)# ip verify unicast reverse-path

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Configuring VRF-Aware RADIUS
To configure VRF-Aware RADIUS, you must first enable AAA on a RADIUS server. The switch supports the ip vrf forwarding vrf-name server-group configuration and the ip radius source-interface global configuration commands, as described in the Per VRF AAA Feature Guide.
Configuring VRF-Aware Services for Syslog
For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
logging on Example:

Enables or temporarily disables logging of storage router event message.

Step 3

Switch(config)# logging on
logging host ip-address vrf vrf-name Example:

Specifies the host address of the syslog server where logging messages are to be sent.

Step 4

Switch(config)# logging host 10.10.1.0 vrf vpn1

logging buffered logging buffered size debugging Example:

Logs messages to an internal buffer.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1223

Configuring VRF-Aware Services for Traceroute

Routing

Step 5 Step 6 Step 7

Command or Action

Purpose

Switch(config)# logging buffered critical 6000 debugging
logging trap debugging Example:

Limits the logging messages sent to the syslog server.

Switch(config)# logging trap debugging
logging facility facility Example:

Sends system logging messages to a logging facility.

Switch(config)# logging facility user
end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Configuring VRF-Aware Services for Traceroute
For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4.

Step 1

Procedure Command or Action traceroute vrf vrf-name ipaddress Example:

Purpose
Specifies the name of a VPN VRF in which to find the destination address.

Switch(config)# traceroute vrf vpn2 10.10.1.1

Configuring VRF-Aware Services for FTP and TFTP
So that FTP and TFTP are VRF-aware, you must configure some FTP/TFTP CLIs. For example, if you want to use a VRF table that is attached to an interface, say E1/0, you need to configure the ip tftp source-interface E1/0 or the ip ftp source-interface E1/0 command to inform TFTP or FTP server to use a specific routing table. In this example, the VRF table is used to look up the destination IP address. These changes are backward-compatible and do not affect existing behavior. That is, you can use the source-interface CLI to send packets out a particular interface even if no VRF is configured on that interface.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1224

Routing

Configuring Multicast VRFs

Step 2 Step 3 Step 4 Step 5 Step 6

Command or Action

Purpose

Switch# configure terminal
ip ftp source-interface interface-type interface-number Specifies the source IP address for FTP connections. Example:

Switch(config)# ip ftp source-interface gigabitethernet 1/0/2
end Example:

Returns to privileged EXEC mode.

Switch(config)#end
configure terminal Example:

Enters global configuration mode.

Switch# configure terminal
ip tftp source-interface interface-type interface-number Specifies the source IP address for TFTP connections. Example:

Switch(config)# ip tftp source-interface gigabitethernet 1/0/2
end Example:

Returns to privileged EXEC mode.

Switch(config)#end

Configuring Multicast VRFs
For complete syntax and usage information for the commands, see the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.4.
For more information about configuring a multicast within a Multi-VRF CE, see the Cisco IOS IP Multicast Configuration Guide, Release 12.4.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1225

Configuring Multicast VRFs

Routing

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action ip routing Example:

Purpose Enables IP routing mode.

Switch(config)# ip routing
ip vrf vrf-name Example:

Names the VRF, and enter VRF configuration mode.

Switch(config)# ip vrf vpn1
rd route-distinguisher Example:
Switch(config-vrf)# rd 100:2
route-target {export | import | both} route-target-ext-community Example:
Switch(config-vrf)# route-target import 100:2
import map route-map Example:

Creates a VRF table by specifying a route distinguisher. Enter either an AS number and an arbitrary number (xxx:y) or an IP address and an arbitrary number (A.B.C.D:y)
Creates a list of import, export, or import and export route target communities for the specified VRF. Enter either an AS system number and an arbitrary number (xxx:y) or an IP address and an arbitrary number (A.B.C.D:y). The route-target-ext-community should be the same as the route-distinguisher entered in Step 4.
(Optional) Associates a route map with the VRF.

Switch(config-vrf)# import map importmap1
ip multicast-routing vrf vrf-name distributed Example:

(Optional) Enables global multicast routing for VRF table.

Switch(config-vrf)# ip multicast-routing vrf vpn1 distributed

interface interface-id Example:

Specifies the Layer 3 interface to be associated with the VRF, and enter interface configuration mode. The interface can be a routed port or an SVI.

Switch(config-vrf)# interface gigabitethernet 1/0/2

ip vrf forwarding vrf-name Example:

Associates the VRF with the Layer 3 interface.

Switch(config-if)# ip vrf forwarding vpn1
ip address ip-address mask Example:

Configures IP address for the Layer 3 interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1226

Routing

Configuring a VPN Routing Session

Step 11 Step 12 Step 13 Step 14

Command or Action
Switch(config-if)# ip address 10.1.5.1 255.255.255.0
ip pim sparse-dense mode Example:
Switch(config-if)# ip pim sparse-dense mode
end Example:
Switch(config-if)# end
show ip vrf [brief | detail | interfaces] [vrf-name] Example:
Switch# show ip vrf detail vpn1
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enables PIM on the VRF-associated Layer 3 interface.
Returns to privileged EXEC mode.
Verifies the configuration. Displays information about the configured VRFs. (Optional) Saves your entries in the configuration file.

Configuring a VPN Routing Session
Routing within the VPN can be configured with any supported routing protocol (RIP, OSPF, EIGRP, or BGP) or with static routing. The configuration shown here is for OSPF, but the process is the same for other protocols.

Note To configure an EIGRP routing process to run within a VRF instance, you must configure an autonomous-system number by entering the autonomous-system autonomous-system-number address-family configuration mode command.

Step 1 Step 2

Procedure Command or Action configure terminal Example:
Switch# configure terminal
router ospf process-id vrf vrf-name Example:
Switch(config)# router ospf 1 vrf vpn1

Purpose Enters global configuration mode.
Enables OSPF routing, specifies a VPN forwarding table, and enter router configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1227

Configuring BGP PE to CE Routing Sessions

Routing

Step 3 Step 4

Command or Action log-adjacency-changes Example:

Purpose
(Optional) Logs changes in the adjacency state. This is the default state.

Switch(config-router)# log-adjacency-changes
redistribute bgp autonomous-system-number subnets Example:

Sets the switch to redistribute information from the BGP network to the OSPF network.

Switch(config-router)# redistribute bgp 10 subnets

Step 5 Step 6 Step 7 Step 8

network network-number area area-id Example:
Switch(config-router)# network 1 area 2
end Example:
Switch(config-router)# end
show ip ospf process-id Example:
Switch# show ip ospf 1
copy running-config startup-config Example:
Switch# copy running-config startup-config

Defines a network address and mask on which OSPF runs and the area ID for that network address. Returns to privileged EXEC mode.
Verifies the configuration of the OSPF network.
(Optional) Saves your entries in the configuration file.

Configuring BGP PE to CE Routing Sessions

Step 1 Step 2

Procedure Command or Action configure terminal Example:
Switch# configure terminal
router bgp autonomous-system-number Example:
Switch(config)# router bgp 2

Purpose Enters global configuration mode.
Configures the BGP routing process with the AS number passed to other BGP routers, and enter router configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1228

Routing

Configuring BGP PE to CE Routing Sessions

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11

Command or Action network network-number mask network-mask Example:

Purpose Specifies a network and mask to announce using BGP.

Switch(config-router)# network 5 mask 255.255.255.0
redistribute ospf process-id match internal Example:

Sets the switch to redistribute OSPF internal routes.

Switch(config-router)# redistribute ospf 1 match internal

network network-number area area-id Example:

Defines a network address and mask on which OSPF runs and the area ID for that network address.

Switch(config-router)# network 5 area 2
address-family ipv4 vrf vrf-name Example:

Defines BGP parameters for PE to CE routing sessions, and enter VRF address-family mode.

Switch(config-router)# address-family ipv4 vrf vpn1

neighbor address remote-as as-number Example:

Defines a BGP session between PE and CE routers.

Switch(config-router)# neighbor 10.1.1.2 remote-as 2

neighbor address activate Example:

Activates the advertisement of the IPv4 address family.

Switch(config-router)# neighbor 10.2.1.1 activate

end Example:
Switch(config-router)# end
show ip bgp [ipv4] [neighbors] Example:
Switch# show ip bgp ipv4 neighbors
copy running-config startup-config Example:

Returns to privileged EXEC mode. Verifies BGP configuration. (Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1229

Monitoring Multi-VRF CE

Routing

Command or Action
Switch# copy running-config startup-config

Purpose

Monitoring Multi-VRF CE
Table 109: Commands for Displaying Multi-VRF CE Information

show ip protocols vrf vrf-name

Displays routing protocol information associated with a VRF.

show ip route vrf vrf-name [connected] [protocol Displays IP routing table information associated with [as-number]] [list] [mobile] [odr] [profile] [static] a VRF. [summary] [supernets-only]

show ip vrf [brief | detail | interfaces] [vrf-name] Displays information about the defined VRF instances.

For more information about the information in the displays, see the Cisco IOS Switching Services Command Reference, Release 12.4.

Configuration Examples for Multi-VRF CE

Multi-VRF CE Configuration Example
Figure 41-7 is a simplified example of the physical connections in a network similar to that in Figure 41-6. OSPF is the protocol used in VPN1, VPN2, and the global network. BGP is used in the CE to PE connections. The examples following the illustration show how to configure a switch as CE Switch A, and the VRF configuration for customer switches D and F. Commands for configuring CE Switch C and the other customer switches are not included but would be similar. The example also includes commands for configuring traffic to Switch A for a Catalyst 6000 or Catalyst 6500 switch acting as a PE router.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1230

Routing Figure 69: Multi-VRF CE Configuration Example

Multi-VRF CE Configuration Example

On Switch A, enable routing and configure VRF.
Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip routing Switch(config)# ip vrf v11 Switch(config-vrf)# rd 800:1 Switch(config-vrf)# route-target export 800:1 Switch(config-vrf)# route-target import 800:1 Switch(config-vrf)# exit Switch(config)# ip vrf v12 Switch(config-vrf)# rd 800:2 Switch(config-vrf)# route-target export 800:2 Switch(config-vrf)# route-target import 800:2 Switch(config-vrf)# exit
Configure the loopback and physical interfaces on Switch A. Gigabit Ethernet port 1 is a trunk connection to the PE. Gigabit Ethernet ports 8 and 11 connect to VPNs:
Switch(config)# interface loopback1 Switch(config-if)# ip vrf forwarding v11 Switch(config-if)# ip address 8.8.1.8 255.255.255.0 Switch(config-if)# exit
Switch(config)# interface loopback2 Switch(config-if)# ip vrf forwarding v12 Switch(config-if)# ip address 8.8.2.8 255.255.255.0 Switch(config-if)# exit
Switch(config)# interface gigabitethernet1/0/5 Switch(config-if)# switchport trunk encapsulation dot1q
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1231

Multi-VRF CE Configuration Example

Routing

Switch(config-if)# switchport mode trunk Switch(config-if)# no ip address Switch(config-if)# exit Switch(config)# interface gigabitethernet1/0/8 Switch(config-if)# switchport access vlan 208 Switch(config-if)# no ip address Switch(config-if)# exit Switch(config)# interface gigabitethernet1/0/11 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport mode trunk Switch(config-if)# no ip address Switch(config-if)# exit
Configure the VLANs used on Switch A. VLAN 10 is used by VRF 11 between the CE and the PE. VLAN 20 is used by VRF 12 between the CE and the PE. VLANs 118 and 208 are used for the VPNs that include Switch F and Switch D, respectively:
Switch(config)# interface vlan10 Switch(config-if)# ip vrf forwarding v11 Switch(config-if)# ip address 38.0.0.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface vlan20 Switch(config-if)# ip vrf forwarding v12 Switch(config-if)# ip address 83.0.0.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface vlan118 Switch(config-if)# ip vrf forwarding v12 Switch(config-if)# ip address 118.0.0.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface vlan208 Switch(config-if)# ip vrf forwarding v11 Switch(config-if)# ip address 208.0.0.8 255.255.255.0 Switch(config-if)# exit
Configure OSPF routing in VPN1 and VPN2.
Switch(config)# router ospf 1 vrf vl1 Switch(config-router)# redistribute bgp 800 subnets Switch(config-router)# network 208.0.0.0 0.0.0.255 area 0 Switch(config-router)# exit Switch(config)# router ospf 2 vrf vl2 Switch(config-router)# redistribute bgp 800 subnets Switch(config-router)# network 118.0.0.0 0.0.0.255 area 0 Switch(config-router)# exit
Configure BGP for CE to PE routing.
Switch(config)# router bgp 800 Switch(config-router)# address-family ipv4 vrf vl2 Switch(config-router-af)# redistribute ospf 2 match internal Switch(config-router-af)# neighbor 83.0.0.3 remote-as 100 Switch(config-router-af)# neighbor 83.0.0.3 activate Switch(config-router-af)# network 8.8.2.0 mask 255.255.255.0 Switch(config-router-af)# exit Switch(config-router)# address-family ipv4 vrf vl1 Switch(config-router-af)# redistribute ospf 1 match internal Switch(config-router-af)# neighbor 38.0.0.3 remote-as 100 Switch(config-router-af)# neighbor 38.0.0.3 activate Switch(config-router-af)# network 8.8.1.0 mask 255.255.255.0 Switch(config-router-af)# end
Switch D belongs to VPN 1. Configure the connection to Switch A by using these commands.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1232

Routing

Multi-VRF CE Configuration Example

Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip routing Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# no switchport Switch(config-if)# ip address 208.0.0.20 255.255.255.0 Switch(config-if)# exit
Switch(config)# router ospf 101 Switch(config-router)# network 208.0.0.0 0.0.0.255 area 0 Switch(config-router)# end
Switch F belongs to VPN 2. Configure the connection to Switch A by using these commands.
Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip routing Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport mode trunk Switch(config-if)# no ip address Switch(config-if)# exit
Switch(config)# interface vlan118 Switch(config-if)# ip address 118.0.0.11 255.255.255.0 Switch(config-if)# exit
Switch(config)# router ospf 101 Switch(config-router)# network 118.0.0.0 0.0.0.255 area 0 Switch(config-router)# end
When used on switch B (the PE router), these commands configure only the connections to the CE device, Switch A.
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# ip vrf v1 Router(config-vrf)# rd 100:1 Router(config-vrf)# route-target export 100:1 Router(config-vrf)# route-target import 100:1 Router(config-vrf)# exit
Router(config)# ip vrf v2 Router(config-vrf)# rd 100:2 Router(config-vrf)# route-target export 100:2 Router(config-vrf)# route-target import 100:2 Router(config-vrf)# exit Router(config)# ip cef Router(config)# interface Loopback1 Router(config-if)# ip vrf forwarding v1 Router(config-if)# ip address 3.3.1.3 255.255.255.0 Router(config-if)# exit
Router(config)# interface Loopback2 Router(config-if)# ip vrf forwarding v2 Router(config-if)# ip address 3.3.2.3 255.255.255.0 Router(config-if)# exit
Router(config)# interface gigabitethernet1/1/0.10 Router(config-if)# encapsulation dot1q 10 Router(config-if)# ip vrf forwarding v1 Router(config-if)# ip address 38.0.0.3 255.255.255.0
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1233

Configuring Unicast Reverse Path Forwarding

Routing

Router(config-if)# exit
Router(config)# interface gigabitethernet1/1/0.20 Router(config-if)# encapsulation dot1q 20 Router(config-if)# ip vrf forwarding v2 Router(config-if)# ip address 83.0.0.3 255.255.255.0 Router(config-if)# exit
Router(config)# router bgp 100 Router(config-router)# address-family ipv4 vrf v2 Router(config-router-af)# neighbor 83.0.0.8 remote-as 800 Router(config-router-af)# neighbor 83.0.0.8 activate Router(config-router-af)# network 3.3.2.0 mask 255.255.255.0 Router(config-router-af)# exit Router(config-router)# address-family ipv4 vrf vl Router(config-router-af)# neighbor 38.0.0.8 remote-as 800 Router(config-router-af)# neighbor 38.0.0.8 activate Router(config-router-af)# network 3.3.1.0 mask 255.255.255.0 Router(config-router-af)# end
Configuring Unicast Reverse Path Forwarding
The unicast reverse path forwarding (unicast RPF) feature helps to mitigate problems that are caused by the introduction of malformed or forged (spoofed) IP source addresses into a network by discarding IP packets that lack a verifiable IP source address. For example, a number of common types of denial-of-service (DoS) attacks, including Smurf and Tribal Flood Network (TFN), can take advantage of forged or rapidly changing source IP addresses to allow attackers to thwart efforts to locate or filter the attacks. For Internet service providers (ISPs) that provide public access, Unicast RPF deflects such attacks by forwarding only packets that have source addresses that are valid and consistent with the IP routing table. This action protects the network of the ISP, its customer, and the rest of the Internet.

Note

· Unicast RPF is supported only in IP services.

· Do not configure unicast RPF if the switch is in a mixed hardware stack combining more than one switch

type: Catalyst 3750-X, Catalyst 3750-E, and Catalyst 3750 switches.

For detailed IP unicast RPF configuration information, see the Other Security Features chapter in the Cisco IOS Security Configuration Guide, Release 12.4.

Protocol-Independent Features
This section describes IP routing protocol-independent features that are available on switches running the IP base or the IP services feature set; except that with the IP base feature set, protocol-related features are available only for RIP. For a complete description of the IP routing protocol-independent commands in this chapter, see the "IP Routing Protocol-Independent Commands" chapter of the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.4.
· Configuring Distributed Cisco Express Forwarding, page 41-118
· Configuring the Number of Equal-Cost Routing Paths, page 41-120
· Configuring Static Unicast Routes, page 41-121

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1234

Routing

Distributed Cisco Express Forwarding

· Specifying Default Routes and Networks, page 41-123
· Using Route Maps to Redistribute Routing Information, page 41-124
· Configuring Policy-Based Routing, page 41-130
· Filtering Routing Information, page 41-134
· Managing Authentication Keys, page 41-137
Distributed Cisco Express Forwarding
Information About Cisco Express Forwarding
Cisco Express Forwarding (CEF) is a Layer 3 IP switching technology used to optimize network performance. CEF implements an advanced IP look-up and forwarding algorithm to deliver maximum Layer 3 switching performance. CEF is less CPU-intensive than fast switching route caching, allowing more CPU processing power to be dedicated to packet forwarding. In a switch stack, the hardware uses distributed CEF (dCEF) in the stack. In dynamic networks, fast switching cache entries are frequently invalidated because of routing changes, which can cause traffic to be process switched using the routing table, instead of fast switched using the route cache. CEF and dCEF use the Forwarding Information Base (FIB) lookup table to perform destination-based switching of IP packets.
The two main components in CEF and dCEF are the distributed FIB and the distributed adjacency tables.
· The FIB is similar to a routing table or information base and maintains a mirror image of the forwarding information in the IP routing table. When routing or topology changes occur in the network, the IP routing table is updated, and those changes are reflected in the FIB. The FIB maintains next-hop address information based on the information in the IP routing table. Because the FIB contains all known routes that exist in the routing table, CEF eliminates route cache maintenance, is more efficient for switching traffic, and is not affected by traffic patterns.
· Nodes in the network are said to be adjacent if they can reach each other with a single hop across a link layer. CEF uses adjacency tables to prepend Layer 2 addressing information. The adjacency table maintains Layer 2 next-hop addresses for all FIB entries.
Because the switch or switch stack uses Application Specific Integrated Circuits (ASICs) to achieve Gigabit-speed line rate IP traffic, CEF or dCEF forwarding applies only to the software-forwarding path, that is, traffic that is forwarded by the CPU.
How to Configure Cisco Express Forwarding
CEF or distributed CEF is enabled globally by default. If for some reason it is disabled, you can re-enable it by using the ip cef or ip cef distributed global configuration command.
The default configuration is CEF or dCEF enabled on all Layer 3 interfaces. Entering the no ip route-cache cef interface configuration command disables CEF for traffic that is being forwarded by software. This command does not affect the hardware forwarding path. Disabling CEF and using the debug ip packet detail privileged EXEC command can be useful to debug software-forwarded traffic. To enable CEF on an interface for the software-forwarding path, use the ip route-cache cef interface configuration command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1235

How to Configure Cisco Express Forwarding

Routing

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Caution Although the no ip route-cache cef interface configuration command to disable CEF on an interface is visible in the CLI, we strongly recommend that you do not disable CEF or dCEF on interfaces except for debugging purposes.
To enable CEF or dCEF globally and on an interface for software-forwarded traffic if it has been disabled:

Procedure Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

ip cef Example:

Enables CEF operation on a non-stacking switch. Go to Step 4.

Switch(config)# ip cef
ip cef distributed Example:

Enables CEF operation on a active switch.

Switch(config)# ip cef distributed
interface interface-id Example:

Enters interface configuration mode, and specifies the Layer 3 interface to configure.

Switch(config)# interface gigabitethernet 1/0/1

ip route-cache cef Example:

Enables CEF on the interface for software-forwarded traffic.

Switch(config-if)# ip route-cache cef
end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end
show ip cef Example:

Displays the CEF status on all interfaces.

Switch# show ip cef
show cef linecard [detail] Example:

(Optional) Displays CEF-related interface information on a non-stacking switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1236

Routing

Number of Equal-Cost Routing Paths

Step 9 Step 10 Step 11 Step 12

Command or Action

Purpose

Switch# show cef linecard detail
show cef linecard [slot-number] [detail] Example:
Switch# show cef linecard 5 detail
show cef interface [interface-id] Example:

(Optional) Displays CEF-related interface information on a switch by stack member for all switches in the stack or for the specified switch.
(Optional) For slot-number, enter the stack member switch number.
Displays detailed CEF information for all interfaces or the specified interface.

Switch# show cef interface gigabitethernet 1/0/1

show adjacency Example:

Displays CEF adjacency table information.

Switch# show adjacency
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Number of Equal-Cost Routing Paths

Information About Equal-Cost Routing Paths
When a router has two or more routes to the same network with the same metrics, these routes can be thought of as having an equal cost. The term parallel path is another way to see occurrences of equal-cost routes in a routing table. If a router has two or more equal-cost paths to a network, it can use them concurrently. Parallel paths provide redundancy in case of a circuit failure and also enable a router to load balance packets over the available paths for more efficient use of available bandwidth. Equal-cost routes are supported across switches in a stack.
Even though the router automatically learns about and configures equal-cost routes, you can control the maximum number of parallel paths supported by an IP routing protocol in its routing table. Although the switch software allows a maximum of 32 equal-cost routes, the switch hardware will never use more than 16 paths per route.
How to Configure Equal-Cost Routing Paths

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1237

Static Unicast Routes

Routing

Step 2 Step 3 Step 4 Step 5 Step 6

Command or Action
Switch# configure terminal
router {bgp | rip | ospf | eigrp} Example:
Switch(config)# router eigrp
maximum-paths maximum Example:
Switch(config-router)# maximum-paths 2
end Example:
Switch(config-router)# end
show ip protocols Example:
Switch# show ip protocols
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enters router configuration mode.
Sets the maximum number of parallel paths for the protocol routing table. The range is from 1 to 16; the default is 4 for most IP routing protocols, but only 1 for BGP. Returns to privileged EXEC mode.
Verifies the setting in the Maximum path field.
(Optional) Saves your entries in the configuration file.

Static Unicast Routes

Information About Static Unicast Routes
Static unicast routes are user-defined routes that cause packets moving between a source and a destination to take a specified path. Static routes can be important if the router cannot build a route to a particular destination and are useful for specifying a gateway of last resort to which all unroutable packets are sent.
The switch retains static routes until you remove them. However, you can override static routes with dynamic routing information by assigning administrative distance values. Each dynamic routing protocol has a default administrative distance, as listed in Table 41-16. If you want a static route to be overridden by information from a dynamic routing protocol, set the administrative distance of the static route higher than that of the dynamic protocol.
Table 110: Dynamic Routing Protocol Default Administrative Distances

Route Source Connected interface Static route

Default Distance 0 1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1238

Routing

Configuring Static Unicast Routes

Route Source Enhanced IRGP summary route External BGP Internal Enhanced IGRP IGRP OSPF Internal BGP Unknown

Default Distance 5 20 90 100 110 200 225

Static routes that point to an interface are advertised through RIP, IGRP, and other dynamic routing protocols, whether or not static redistribute router configuration commands were specified for those routing protocols. These static routes are advertised because static routes that point to an interface are considered in the routing table to be connected and hence lose their static nature. However, if you define a static route to an interface that is not one of the networks defined in a network command, no dynamic routing protocols advertise the route unless a redistribute static command is specified for these protocols.
When an interface goes down, all static routes through that interface are removed from the IP routing table. When the software can no longer find a valid next hop for the address specified as the forwarding router's address in a static route, the static route is also removed from the IP routing table.

Configuring Static Unicast Routes
Static unicast routes are user-defined routes that cause packets moving between a source and a destination to take a specified path. Static routes can be important if the router cannot build a route to a particular destination and are useful for specifying a gateway of last resort to which all unroutable packets are sent.
Beginning in privileged EXEC mode, follow these steps to configure a static route:

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
ip route prefix mask {address | interface} [distance] Example:

Establish a static route.

Step 3

Switch(config)# ip route prefix mask gigabitethernet 1/0/4
end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1239

Default Routes and Networks

Routing

Step 4 Step 5

Command or Action
Switch(config)# end
show ip route Example:
Switch# show ip route
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Displays the current state of the routing table to verify the configuration.
(Optional) Saves your entries in the configuration file.

Default Routes and Networks

Information About Default Routes and Networks
A router might not be able to learn the routes to all other networks. To provide complete routing capability, you can use some routers as smart routers and give the remaining routers default routes to the smart router. (Smart routers have routing table information for the entire internetwork.) These default routes can be dynamically learned or can be configured in the individual routers. Most dynamic interior routing protocols include a mechanism for causing a smart router to generate dynamic default information that is then forwarded to other routers.
If a router has a directly connected interface to the specified default network, the dynamic routing protocols running on that device generate a default route. In RIP, it advertises the pseudonetwork 0.0.0.0.
A router that is generating the default for a network also might need a default of its own. One way a router can generate its own default is to specify a static route to the network 0.0.0.0 through the appropriate device.
When default information is passed through a dynamic routing protocol, no further configuration is required. The system periodically scans its routing table to choose the optimal default network as its default route. In IGRP networks, there might be several candidate networks for the system default. Cisco routers use administrative distance and metric information to set the default route or the gateway of last resort.
If dynamic default information is not being passed to the system, candidates for the default route are specified with the ip default-network global configuration command. If this network appears in the routing table from any source, it is flagged as a possible choice for the default route. If the router has no interface on the default network, but does have a path to it, the network is considered as a possible candidate, and the gateway to the best default path becomes the gateway of last resort.
How to Configure Default Routes and Networks

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1240

Routing

Route Maps to Redistribute Routing Information

Step 2 Step 3 Step 4 Step 5

Command or Action
Switch# configure terminal
ip default-network network number Example:
Switch(config)# ip default-network 1
end Example:
Switch(config)# end
show ip route Example:
Switch# show ip route
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Specifies a default network.
Returns to privileged EXEC mode.
Displays the selected default route in the gateway of last resort display. (Optional) Saves your entries in the configuration file.

Route Maps to Redistribute Routing Information
Information About Route Maps
The switch can run multiple routing protocols simultaneously, and it can redistribute information from one routing protocol to another. Redistributing information from one routing protocol to another applies to all supported IP-based routing protocols.
You can also conditionally control the redistribution of routes between routing domains by defining enhanced packet filters or route maps between the two domains. The match and set route-map configuration commands define the condition portion of a route map. The match command specifies that a criterion must be matched. The set command specifies an action to be taken if the routing update meets the conditions defined by the match command. Although redistribution is a protocol-independent feature, some of the match and set route-map configuration commands are specific to a particular protocol.
One or more match commands and one or more set commands follow a route-map command. If there are no match commands, everything matches. If there are no set commands, nothing is done, other than the match. Therefore, you need at least one match or set command.

Note A route map with no set route-map configuration commands is sent to the CPU, which causes high CPU utilization.
You can also identify route-map statements as permit or deny. If the statement is marked as a deny, the packets meeting the match criteria are sent back through the normal forwarding channels (destination-based

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1241

How to Configure a Route Map

Routing

routing). If the statement is marked as permit, set clauses are applied to packets meeting the match criteria. Packets that do not meet the match criteria are forwarded through the normal routing channel.
You can use the BGP route map continue clause to execute additional entries in a route map after an entry is executed with successful match and set clauses. You can use the continue clause to configure and organize more modular policy definitions so that specific policy configurations need not be repeated within the same route map. The switch supports the continue clause for outbound policies. For more information about using the route map continue clause, see the BGP Route-Map Continue Support for an Outbound Policy feature guide for Cisco IOS Release 12.4(4)T.
How to Configure a Route Map
Although each of Steps 3 through 14 in the following section is optional, you must enter at least one match route-map configuration command and one set route-map configuration command.

Step 1 Step 2
Step 3 Step 4

Note The keywords are the same as defined in the procedure to control the route distribution.

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

route-map map-tag [permit | deny] [sequence number] Example:
Switch(config)# route-map rip-to-ospf permit 4

Defines any route maps used to control redistribution and enter route-map configuration mode.
map-tag--A meaningful name for the route map. The redistribute router configuration command uses this name to reference this route map. Multiple route maps might share the same map tag name.

(Optional) If permit is specified and the match criteria are met for this route map, the route is redistributed as controlled by the set actions. If deny is specified, the route is not redistributed.

sequence number (Optional)-- Number that indicates the position a new route map is to have in the list of route maps already configured with the same name.

match as-path path-list-number Example:

Matches a BGP AS path access list.

Switch(config-route-map)#match as-path 10
match community-list community-list-number [exact] Matches a BGP community list. Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1242

Routing

How to Configure a Route Map

Step 5 Step 6 Step 7 Step 8 Step 9 Step 10
Step 11

Command or Action

Purpose

Switch(config-route-map)# match community-list 150

match ip address {access-list-number | access-list-name} Matches a standard access list by specifying the name or

[...access-list-number | ...access-list-name]

number. It can be an integer from 1 to 199.

Example:

Switch(config-route-map)# match ip address 5 80

match metric metric-value Example:

Matches the specified route metric. The metric-value can be an EIGRP metric with a specified value from 0 to 4294967295.

Switch(config-route-map)# match metric 2000

match ip next-hop {access-list-number | access-list-name} Matches a next-hop router address passed by one of the

[...access-list-number | ...access-list-name]

access lists specified (numbered from 1 to 199).

Example:

Switch(config-route-map)# match ip next-hop 8 45

match tag tag value [...tag-value] Example:

Matches the specified tag value in a list of one or more route tag values. Each can be an integer from 0 to 4294967295.

Switch(config-route-map)# match tag 3500

match interface type number [...type number] Example:

Matches the specified next hop route out one of the specified interfaces.

Switch(config-route-map)# match interface gigabitethernet 1/0/1
match ip route-source {access-list-number | access-list-name} [...access-list-number | ...access-list-name]
Example:

Matches the address specified by the specified advertised access lists.

Switch(config-route-map)# match ip route-source 10 30

match route-type {local | internal | external [type-1 | Matches the specified route-type:

type-2]}

· local--Locally generated BGP routes.

Example:

· internal--OSPF intra-area and interarea routes or

Switch(config-route-map)# match route-type local

EIGRP internal routes.

· external--OSPF external routes (Type 1 or Type 2) or EIGRP external routes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1243

How to Configure a Route Map

Routing

Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18

Command or Action

Purpose

set dampening halflife reuse suppress max-suppress-time Sets BGP route dampening factors.

Example:

Switch(config-route-map)# set dampening 30 1500 10000 120

set local-preference value Example:

Assigns a value to a local BGP path.

Switch(config-route-map)# set local-preference 100

set origin {igp | egp as | incomplete} Example:

Sets the BGP origin code.

Switch(config-route-map)#set origin igp
set as-path {tag | prepend as-path-string} Example:

Modifies the BGP autonomous system path.

Switch(config-route-map)# set as-path tag
set level {level-1 | level-2 | level-1-2 | stub-area | backbone} Example:

Sets the level for routes that are advertised into the specified area of the routing domain. The stub-area and backbone are OSPF NSSA and backbone areas.

Switch(config-route-map)# set level level-1-2

set metric metric value Example:

Sets the metric value to give the redistributed routes (for EIGRP only). The metric value is an integer from -294967295 to 294967295.

Switch(config-route-map)# set metric 100

set metric bandwidth delay reliability loading mtu

Sets the metric value to give the redistributed routes (for

Example:

EIGRP only):

· bandwidth--Metric value or IGRP bandwidth of the

Switch(config-route-map)# set metric 10000 10 255

route in kilobits per second in the range 0 to

1 1500

4294967295

· delay--Route delay in tens of microseconds in the range 0 to 4294967295.

· reliability--Likelihood of successful packet transmission expressed as a number between 0 and 255, where 255 means 100 percent reliability and 0 means no reliability.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1244

Routing

How to Control Route Distribution

Step 19 Step 20

Command or Action

Purpose
· loading--Effective bandwidth of the route expressed as a number from 0 to 255 (255 is 100 percent loading).
· mtu--Minimum maximum transmission unit (MTU) size of the route in bytes in the range 0 to 4294967295.

set metric-type {type-1 | type-2} Example:

Sets the OSPF external metric type for redistributed routes.

Switch(config-route-map)# set metric-type type-2

set metric-type internal Example:

Sets the multi-exit discriminator (MED) value on prefixes advertised to external BGP neighbor to match the IGP metric of the next hop.

Switch(config-route-map)# set metric-type internal

Step 21 Step 22 Step 23 Step 24

set weight number Example:
Switch(config-route-map)# set weight 100
end Example:
Switch(config-route-map)# end
show route-map Example:
Switch# show route-map
copy running-config startup-config Example:
Switch# copy running-config startup-config

Sets the BGP weight for the routing table. The value can be from 1 to 65535.
Returns to privileged EXEC mode.
Displays all route maps configured or only the one specified to verify configuration.
(Optional) Saves your entries in the configuration file.

How to Control Route Distribution
Although each of Steps 3 through 14 in the following section is optional, you must enter at least one match route-map configuration command and one set route-map configuration command.

Note The keywords are the same as defined in the procedure to configure the route map for redistritbution.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1245

How to Control Route Distribution

Routing

The metrics of one routing protocol do not necessarily translate into the metrics of another. For example, the RIP metric is a hop count, and the IGRP metric is a combination of five qualities. In these situations, an artificial metric is assigned to the redistributed route. Uncontrolled exchanging of routing information between different routing protocols can create routing loops and seriously degrade network operation.
If you have not defined a default redistribution metric that replaces metric conversion, some automatic metric translations occur between routing protocols:
· RIP can automatically redistribute static routes. It assigns static routes a metric of 1 (directly connected).
· Any protocol can redistribute other routing protocols if a default mode is in effect.

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router {bgp | rip | ospf | eigrp} Example:

Enters router configuration mode.

Switch(config)# router bgp

redistribute protocol [process-id] {level-1 | level-1-2 | level-2} [metric metric-value] [metric-type type-value] [match internal | external type-value] [tag tag-value] [route-map map-tag] [weight weight] [subnets]
Example:

Redistributes routes from one routing protocol to another routing protocol. If no route-maps are specified, all routes are redistributed. If the keyword route-map is specified with no map-tag, no routes are distributed.

Switch(config-router)# redistribute bgp 300 level-1-2 route-map bgp-to-ospf
default-metric number Example:

Cause the current routing protocol to use the same metric value for all redistributed routes (BGP, RIP and OSPF).

Switch(config-router)# default-metric 1024
default-metric bandwidth delay reliability loading mtu Example:

Cause the EIGRP routing protocol to use the same metric value for all non-EIGRP redistributed routes.

Switch(config-router)# default-metric 1000 100 250 100 1500

end Example:

Returns to privileged EXEC mode.

Switch(config-router)# end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1246

Routing

Policy-Based Routing

Step 7 Step 8

Command or Action show route-map Example:
Switch# show route-map
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Displays all route maps configured or only the one specified to verify configuration.
(Optional) Saves your entries in the configuration file.

Policy-Based Routing
Information About Policy-Based Routing
You can use policy-based routing (PBR) to configure a defined policy for traffic flows. By using PBR, you can have more control over routing by reducing the reliance on routes derived from routing protocols. PBR can specify and implement routing policies that allow or deny paths based on:
· Identity of a particular end system
· Application
· Protocol
You can use PBR to provide equal-access and source-sensitive routing, routing based on interactive versus batch traffic, or routing based on dedicated links. For example, you could transfer stock records to a corporate office on a high-bandwidth, high-cost link for a short time while transmitting routine application data such as e-mail over a low-bandwidth, low-cost link. With PBR, you classify traffic using access control lists (ACLs) and then make traffic go through a different path. PBR is applied to incoming packets. All packets received on an interface with PBR enabled are passed through route maps. Based on the criteria defined in the route maps, packets are forwarded (routed) to the appropriate next hop.
· Route map statement marked as permit is processed as follows: · A match command can match on length or multiple ACLs. A route map statement can contain multiple match commands. Logical or algorithm function is performed across all the match commands to reach a permit or deny decision. For example: match length A B match ip address acl1 acl2 match ip address acl3
A packet is permitted if it is permitted by match length A B or acl1 or acl2 or acl3 · If the decision reached is permit, then the action specified by the set command is applied on the packet .

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1247

How to Configure PBR

Routing

· If the decision reached is deny, then the PBR action (specified in the set command) is not applied. Instead the processing logic moves forward to look at the next route-map statement in the sequence (the statement with the next higher sequence number). If no next statement exists, PBR processing terminates, and the packet is routed using the default IP routing table.
· For PBR, route-map statements marked as deny are not supported. For more information about configuring route maps, see the "Using Route Maps to Redistribute Routing Information" section. You can use standard IP ACLs to specify match criteria for a source address or extended IP ACLs to specify match criteria based on an application, a protocol type, or an end station. The process proceeds through the route map until a match is found. If no match is found, normal destination-based routing occurs. There is an implicit deny at the end of the list of match statements. If match clauses are satisfied, you can use a set clause to specify the IP addresses identifying the next hop router in the path. For details about PBR commands and keywords, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols .
How to Configure PBR
· To use PBR, you must have the IP Base feature set enabled on the switch or stack master.
· Multicast traffice is not policy-routed. PBR applies only to unicast traffic.
· You can enable PBR on a routed port or an SVI.
· The switch supports PBR based on match length.
· You can apply a policy route map to an EtherChannel port channel in Layer 3 mode, but you cannot apply a policy route map to a physical interface that is a member of the EtherChannel. If you try to do so, the command is rejected. When a policy route map is applied to a physical interface, that interface cannot become a member of an EtherChannel.
· You can define a mazimum of 128 IP policy route maps on the switch or switch stack.
· You can define a maximum of 512 access control entries(ACEs) for PBR on the switch or switch stack.
· When configuring match criteria in a route map, follow these guidelines: · Do not match ACLs that permit packets destined for a local address.
· VRF and PBR are mutually exclusive on a switch interface. You cannot enable VRF when PBR is enabled on an interface. The reverse is also true, you cannot enable PBR when VRF is enabled on an interface.
· Web Cache Communication Protocol (WCCP) and PBR are mutually exclusive on a switch interface. You cannot enable WCCP when PBR is enabled on an interface. The reverse is also true, you cannot enable PBR when WCCP is enabled on an interface.
· The number of hardware entries used by PBR depends on the route map itself, the ACLs used, and the order of the ACLs and route-map entries.
· PBR based on TOS, DSCP and IP Precedence are not supported.
· Set interface, set default next-hop and set default interface are not supported.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1248

Routing

How to Configure PBR

· ip next-hop recursive and ip next-hop verify availability features are not available and the next-hop should be directly connected.
· Policy-maps with no set actions are supported. Matching packets are routed normally.
· Policy-maps with no match clauses are supported. Set actions are applied to all packets.
By default, PBR is disabled on the switch. To enable PBR, you must create a route map that specifies the match criteria and the resulting action. Then, you must enable PBR for that route map on an interface. All packets arriving on the specified interface matching the match clauses are subject to PBR.
Packets that are generated by the switch, or local packets, are not normally policy-routed. When you globally enable local PBR on the switch, all packets that originate on the switch are subject to local PBR. Local PBR is disabled by default.

SUMMARY STEPS

1. configure terminal 2. route-map map-tag [permit] [sequence number] 3. match ip address {access-list-number | access-list-name} [access-list-number |...access-list-name] 4. match length min max 5. set ip next-hop ip-address [...ip-address] 6. exit 7. interface interface-id 8. ip policy route-map map-tag 9. ip route-cache policy 10. exit 11. ip local policy route-map map-tag 12. end 13. show route-map [map-name] 14. show ip policy 15. show ip local policy

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

route-map map-tag [permit] [sequence number] Example:

Switch(config)# route-map pbr-map permit

Purpose Enters global configuration mode.
Defines route maps that are used to control where packets are output, and enters route-map configuration mode.
· map-tag -- A meaningful name for the route map. The ip policy route-map interface configuration command uses this name to reference the route map. Multiple route-map statements with the same map tag define a single route map.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1249

How to Configure PBR

Routing

Step 3
Step 4 Step 5 Step 6 Step 7 Step 8
Step 9 Step 10

Command or Action

Purpose
· (Optional) permit -- If permit is specified and the match criteria are met for this route map, the route is policy routed as defined by the set actions.
· (Optional) sequence number -- The sequence number shows the position of the route-map statement in the given route map.

match ip address {access-list-number | access-list-name} Matches the source and destination IP addresses that are

[access-list-number |...access-list-name]

permitted by one or more standard or extended access lists.

Example:

ACLs can match on more than one source and destination IP address.

Switch(config-route-map)# match ip address 110

140

If you do not specify a match command, the route map is

applicable to all packets.

match length min max Example:
Switch(config-route-map)# match length 64 1500

Matches the length of the packet.

set ip next-hop ip-address [...ip-address]

Specifies the action to be taken on the packets that match

Example:

the criteria. Sets next hop to which to route the packet (the next hop must be adjacent).

Switch(config-route-map)# set ip next-hop 10.1.6.2

exit Example:
Switch(config-route-map)# exit

Returns to global configuration mode.

interface interface-id Example:

Enters interface configuration mode, and specifies the interface to be configured.

Switch(config)# interface gigabitethernet 1/0/1

ip policy route-map map-tag Example:
Switch(config-if)# ip policy route-map pbr-map

Enables PBR on a Layer 3 interface, and identify the route map to use. You can configure only one route map on an interface. However, you can have multiple route map entries with different sequence numbers. These entries are evaluated in the order of sequence number until the first match. If there is no match, packets are routed as usual.

ip route-cache policy Example:
Switch(config-if)# ip route-cache policy

(Optional) Enables fast-switching PBR. You must enable PBR before enabling fast-switching PBR.

exit Example:
Switch(config-if)# exit

Returns to global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1250

Routing

Filtering Routing Information

Step 11 Step 12 Step 13 Step 14 Step 15

Command or Action ip local policy route-map map-tag Example:
Switch(config)# ip local policy route-map local-pbr
end Example:
Switch(config)# end
show route-map [map-name] Example:
Switch# show route-map
show ip policy Example:
Switch# show ip policy
show ip local policy Example:
Switch# show ip local policy

Purpose (Optional) Enables local PBR to perform policy-based routing on packets originating at the switch. This applies to packets generated by the switch, and not to incoming packets.
Returns to privileged EXEC mode.
(Optional) Displays all the route maps configured or only the one specified to verify configuration.
(Optional) Displays policy route maps attached to the interface.
(Optional) Displays whether or not local policy routing is enabled and, if so, the route map being used.

Filtering Routing Information
You can filter routing protocol information by performing the tasks described in this section.

Note When routes are redistributed between OSPF processes, no OSPF metrics are preserved.
Setting Passive Interfaces
To prevent other routers on a local network from dynamically learning about routes, you can use the passive-interface router configuration command to keep routing update messages from being sent through a router interface. When you use this command in the OSPF protocol, the interface address you specify as passive appears as a stub network in the OSPF domain. OSPF routing information is neither sent nor received through the specified router interface.
In networks with many interfaces, to avoid having to manually set them as passive, you can set all interfaces to be passive by default by using the passive-interface default router configuration command and manually setting interfaces where adjacencies are desired.
Use a network monitoring privileged EXEC command such as show ip ospf interface to verify the interfaces that you enabled as passive, or use the show ip interface privileged EXEC command to verify the interfaces that you enabled as active.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1251

Setting Passive Interfaces

Routing

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router {bgp | rip | ospf | eigrp} Example:

Enters router configuration mode.

Switch(config)# router ospf
passive-interface interface-id Example:

Suppresses sending routing updates through the specified Layer 3 interface.

Switch(config-router)# passive-interface gigabitethernet 1/0/1
passive-interface default Example:

(Optional) Sets all interfaces as passive by default.

Switch(config-router)# passive-interface default

no passive-interface interface type Example:

(Optional) Activates only those interfaces that need to have adjacencies sent.

Switch(config-router)# no passive-interface gigabitethernet1/0/3 gigabitethernet 1/0/5
network network-address Example:

(Optional) Specifies the list of networks for the routing process. The network-address is an IP address.

Switch(config-router)# network 10.1.1.1
end Example:

Returns to privileged EXEC mode.

Switch(config-router)# end
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1252

Routing

Controlling Advertising and Processing in Routing Updates

Controlling Advertising and Processing in Routing Updates
You can use the distribute-list router configuration command with access control lists to suppress routes from being advertised in routing updates and to prevent other routers from learning one or more routes. When used in OSPF, this feature applies to only external routes, and you cannot specify an interface name.
You can also use a distribute-list router configuration command to avoid processing certain routes listed in incoming updates. (This feature does not apply to OSPF.)

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
router {bgp | rip | eigrp} Example:

Enters router configuration mode.

Step 3

Switch(config)# router eigrp

distribute-list {access-list-number | access-list-name} out Permits or denies routes from being advertised in routing

[interface-name | routing process |

updates, depending upon the action listed in the access list.

autonomous-system-number]

Example:

Step 4

Switch(config-router)# distribute 120 out gigabitethernet 1/0/7
distribute-list {access-list-number | access-list-name} in Suppresses processing in routes listed in updates. [type-number] Example:

Step 5

Switch(config-router)# distribute-list 125 in
end Example:

Returns to privileged EXEC mode.

Step 6

Switch(config-router)# end
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Filtering Sources of Routing Information
Because some routing information might be more accurate than others, you can use filtering to prioritize information coming from different sources. An administrative distance is a rating of the trustworthiness of a

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1253

Filtering Sources of Routing Information

Routing

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6

routing information source, such as a router or group of routers. In a large network, some routing protocols can be more reliable than others. By specifying administrative distance values, you enable the router to intelligently discriminate between sources of routing information. The router always picks the route whose routing protocol has the lowest administrative distance. Table 41-16 on page 41-122 shows the default administrative distances for various routing information sources.
Because each network has its own requirements, there are no general guidelines for assigning administrative distances.

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
router {bgp | rip | ospf | eigrp} Example:

Enters router configuration mode.

Switch(config)# router bgp

distance weight {ip-address {ip-address mask}} [ip access Defines an administrative distance.

list]

weight--The administrative distance as an integer from 10

Example:

to 255. Used alone, weight specifies a default administrative

distance that is used when no other specification exists for

Switch(config-router)# distance 50 10.1.5.1

a routing information source. Routes with a distance of 255

are not installed in the routing table.

(Optional) ip access list--An IP standard or extended access list to be applied to incoming routing updates.

end Example:

Returns to privileged EXEC mode.

Switch(config-router)# end
show ip protocols Example:

Displays the default administrative distance for a specified routing process.

Switch# show ip protocols
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1254

Routing

Managing Authentication Keys

Managing Authentication Keys
Key management is a method of controlling authentication keys used by routing protocols. Not all protocols can use key management. Authentication keys are available for EIGRP and RIP Version 2.

Prerequisites

Before you manage authentication keys, you must enable authentication. See the appropriate protocol section to see how to enable authentication for that protocol. To manage authentication keys, define a key chain, identify the keys that belong to the key chain, and specify how long each key is valid. Each key has its own key identifier (specified with the key number key chain configuration command), which is stored locally. The combination of the key identifier and the interface associated with the message uniquely identifies the authentication algorithm and Message Digest 5 (MD5) authentication key in use.

How to Configure Authentication Keys
You can configure multiple keys with life times. Only one authentication packet is sent, regardless of how many valid keys exist. The software examines the key numbers in order from lowest to highest, and uses the first valid key it encounters. The lifetimes allow for overlap during key changes. Note that the router must know these lifetimes.

Step 1

Procedure Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
key chain name-of-chain Example:

Identifies a key chain, and enter key chain configuration mode.

Step 3

Switch(config)# key chain key10
key number Example:

Identifies the key number. The range is 0 to 2147483647.

Step 4 Step 5

Switch(config-keychain)# key 2000

key-string text Example:

Identifies the key string. The string can contain from 1 to 80 uppercase and lowercase alphanumeric characters, but the first character cannot be a number.

Switch(config-keychain)# Room 20, 10th floor

accept-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key

seconds}

can be received.

Example:

The start-time and end-time syntax can be either hh:mm:ss

Month date year or hh:mm:ss date Month year. The default

Switch(config-keychain)# accept-lifetime 12:30:00 is forever with the default start-time and the earliest

Jan 25 1009 infinite

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1255

Monitoring and Maintaining the IP Network

Routing

Step 6
Step 7 Step 8 Step 9

Command or Action

Purpose
acceptable date as January 1, 1993. The default end-time and duration is infinite.

send-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key

seconds}

can be sent.

Example:

The start-time and end-time syntax can be either hh:mm:ss

Month date year or hh:mm:ss date Month year. The default

Switch(config-keychain)# accept-lifetime 23:30:00 is forever with the default start-time and the earliest

Jan 25 1019 infinite

acceptable date as January 1, 1993. The default end-time

and duration is infinite.

end Example:

Returns to privileged EXEC mode.

Switch(config-keychain)# end
show key chain Example:

Displays authentication key information.

Switch# show key chain
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Monitoring and Maintaining the IP Network
You can remove all contents of a particular cache, table, or database. You can also display specific statistics.
Table 111: Commands to Clear IP Routes or Display Route Status

clear ip route {network [mask | *]} show ip protocols

Clears one or more routes from the IP routing table.
Displays the parameters and state of the active routing protocol process.

show ip route [address [mask] [longer-prefixes]] | Displays the current state of the routing table. [protocol [process-id]]

show ip route summary

Displays the current state of the routing table in summary form.

show ip route supernets-onl

Displays supernets.

show ip cache

Displays the routing table used to switch IP traffic.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1256

Routing
show route-map [map-name]

Monitoring and Maintaining the IP Network
Displays all route maps configured or only the one specified.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1257

Monitoring and Maintaining the IP Network

Routing

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1258

PART XIII
Security
· Preventing Unauthorized Access , on page 1261 · Controlling Switch Access with Passwords and Privilege Levels , on page 1263 · Configuring TACACS+ , on page 1279 · Configuring RADIUS , on page 1295 · Configuring Kerberos , on page 1327 · Configuring Local Authentication and Authorization , on page 1335 · Configuring Secure Shell (SSH) , on page 1339 · Configuring Secure Socket Layer HTTP , on page 1349 · Configuring IPv4 ACLs , on page 1361 · Configuring IPv6 ACLs, on page 1413 · Configuring DHCP , on page 1423 · Configuring IP Source Guard , on page 1445 · Configuring Dynamic ARP Inspection, on page 1455 · Configuring IEEE 802.1x Port-Based Authentication, on page 1471 · Configuring Web-Based Authentication , on page 1559 · Configuring Port-Based Traffic Control, on page 1583 · Configuring IPv6 First Hop Security, on page 1613 · Configuring Cisco TrustSec, on page 1639 · Configuring Wireless Guest Access , on page 1645 · Managing Rogue Devices, on page 1671 · Classifying Rogue Access Points, on page 1679 · Configuring wIPS, on page 1693 · Configuring Intrusion Detection System, on page 1703

6 1 C H A P T E R
Preventing Unauthorized Access
· Finding Feature Information, on page 1261 · Preventing Unauthorized Access, on page 1261
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Preventing Unauthorized Access
You can prevent unauthorized users from reconfiguring your switch and viewing configuration information. Typically, you want network administrators to have access to your switch while you restrict access to users who dial from outside the network through an asynchronous port, connect from outside the network through a serial port, or connect through a terminal or workstation from within the local network. To prevent unauthorized access into your switch, you should configure one or more of these security features:
· At a minimum, you should configure passwords and privileges at each switch port. These passwords are locally stored on the switch. When users attempt to access the switch through a port or line, they must enter the password specified for the port or line before they can access the switch.
· For an additional layer of security, you can also configure username and password pairs, which are locally stored on the switch. These pairs are assigned to lines or ports and authenticate each user before that user can access the switch. If you have defined privilege levels, you can also assign a specific privilege level (with associated rights and privileges) to each username and password pair.
· If you want to use username and password pairs, but you want to store them centrally on a server instead of locally, you can store them in a database on a security server. Multiple networking devices can then use the same database to obtain user authentication (and, if necessary, authorization) information.
· You can also enable the login enhancements feature, which logs both failed and unsuccessful login attempts. Login enhancements can also be configured to block future login attempts after a set number
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1261

Preventing Unauthorized Access

Security

of unsuccessful attempts are made. For more information, see the Cisco IOS Login Enhancements documentation.
Related Topics Configuring Username and Password Pairs, on page 1271 TACACS+ and Switch Access, on page 1281 Setting a Telnet Password for a Terminal Line, on page 1270

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1262

6 2 C H A P T E R
Controlling Switch Access with Passwords and Privilege Levels
· Finding Feature Information, on page 1263 · Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1263 · Information About Passwords and Privilege Levels, on page 1264 · How to Control Switch Access with Passwords and Privilege Levels, on page 1266 · Monitoring Switch Access, on page 1275 · Configuration Examples for Setting Passwords and Privilege Levels, on page 1275 · Additional References, on page 1276
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Controlling Switch Access with Passwords and Privileges
The following are the restrictions for controlling switch access with passwords and privileges: · Disabling password recovery will not work if you have set the switch to boot up manually by using the boot manual global configuration command. This command produces the boot loader prompt (switch:) after the switch is power cycled.
Related Topics Disabling Password Recovery, on page 1269 Password Recovery, on page 1264
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1263

Information About Passwords and Privilege Levels

Security

Information About Passwords and Privilege Levels

Default Password and Privilege Level Configuration
A simple way of providing terminal access control in your network is to use passwords and assign privilege levels. Password protection restricts access to a network or network device. Privilege levels define what commands users can enter after they have logged into a network device. This table shows the default password and privilege level configuration.
Table 112: Default Password and Privilege Levels

Feature

Default Setting

Enable password and privilege level No password is defined. The default is level 15 (privileged EXEC level). The password is not encrypted in the configuration file.

Enable secret password and privilege No password is defined. The default is level 15 (privileged EXEC

level

level). The password is encrypted before it is written to the

configuration file.

Line password

No password is defined.

Additional Password Security
To provide an additional layer of security, particularly for passwords that cross the network or that are stored on a Trivial File Transfer Protocol (TFTP) server, you can use either the enable password or enable secret global configuration commands. Both commands accomplish the same thing; that is, you can establish an encrypted password that users must enter to access privileged EXEC mode (the default) or any privilege level you specify.
We recommend that you use the enable secret command because it uses an improved encryption algorithm.
If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously.
If you enable password encryption, it applies to all passwords including username passwords, authentication key passwords, the privileged command password, and console and virtual terminal line passwords.
Related Topics Protecting Enable and Enable Secret Passwords with Encryption, on page 1267 Example: Protecting Enable and Enable Secret Passwords with Encryption, on page 1276
Password Recovery
By default, any end user with physical access to the switch can recover from a lost password by interrupting the boot process while the switch is powering on and then by entering a new password.
The password-recovery disable feature protects access to the switch password by disabling part of this functionality. When this feature is enabled, the end user can interrupt the boot process only by agreeing to set

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1264

Security

Terminal Line Telnet Configuration

the system back to the default configuration. With password recovery disabled, you can still interrupt the boot process and change the password, but the configuration file (config.text) and the VLAN database file (vlan.dat) are deleted.
If you disable password recovery, we recommend that you keep a backup copy of the configuration file on a secure server in case the end user interrupts the boot process and sets the system back to default values. Do not keep a backup copy of the configuration file on the switch. If the switch is operating in VTP transparent mode, we recommend that you also keep a backup copy of the VLAN database file on a secure server. When the switch is returned to the default system configuration, you can download the saved files to the switch by using the Xmodem protocol.
To re-enable password recovery, use the service password-recovery global configuration command.
Related Topics Disabling Password Recovery, on page 1269 Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1263
Terminal Line Telnet Configuration
When you power-up your switch for the first time, an automatic setup program runs to assign IP information and to create a default configuration for continued use. The setup program also prompts you to configure your switch for Telnet access through a password. If you did not configure this password during the setup program, you can configure it when you set a Telnet password for a terminal line. For more information on doing this, see Related Topics.
Related Topics Setting a Telnet Password for a Terminal Line, on page 1270 Example: Setting a Telnet Password for a Terminal Line, on page 1276
Username and Password Pairs
You can configure username and password pairs, which are locally stored on the switch. These pairs are assigned to lines or ports and authenticate each user before that user can access the switch. If you have defined privilege levels, you can also assign a specific privilege level (with associated rights and privileges) to each username and password pair.
Related Topics Configuring Username and Password Pairs, on page 1271
Privilege Levels
Cisco switches (and other devices) use privilege levels to provide password security for different levels of switch operation. By default, the Cisco IOS software operates in two modes (privilege levels) of password security: user EXEC (Level 1) and privileged EXEC (Level 15). You can configure up to 16 hierarchical levels of commands for each mode. By configuring multiple passwords, you can allow different sets of users to have access to specified commands.
Privilege Levels on Lines
Users can override the privilege level you set using the privilege level line configuration command by logging in to the line and enabling a different privilege level. They can lower the privilege level by using the disable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1265

How to Control Switch Access with Passwords and Privilege Levels

Security

command. If users know the password to a higher privilege level, they can use that password to enable the higher privilege level. You might specify a high level or privilege level for your console line to restrict line usage.
For example, if you want many users to have access to the clear line command, you can assign it level 2 security and distribute the level 2 password fairly widely. But if you want more restricted access to the configure command, you can assign it level 3 security and distribute that password to a more restricted group of users.
Command Privilege Levels
When you set a command to a privilege level, all commands whose syntax is a subset of that command are also set to that level. For example, if you set the show ip traffic command to level 15, the show commands and show ip commands are automatically set to privilege level 15 unless you set them individually to different levels.
Related Topics Setting the Privilege Level for a Command, on page 1272 Example: Setting the Privilege Level for a Command, on page 1276 Changing the Default Privilege Level for Lines, on page 1273 Logging into and Exiting a Privilege Level, on page 1274

How to Control Switch Access with Passwords and Privilege Levels

Setting or Changing a Static Enable Password
The enable password controls access to the privileged EXEC mode. Beginning in privileged EXEC mode, follow these steps to set or change a static enable password:

SUMMARY STEPS

1. configure terminal 2. enable password password 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

enable password password Example:

Defines a new password or changes an existing password for access to privileged EXEC mode.
By default, no password is defined.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1266

Security

Protecting Enable and Enable Secret Passwords with Encryption

Command or Action
Switch(config)# enable password secret321

Step 3

end Example:
Switch(config)# end

Purpose For password, specify a string from 1 to 25 alphanumeric characters. The string cannot start with a number, is case sensitive, and allows spaces but ignores leading spaces. It can contain the question mark (?) character if you precede the question mark with the key combination Crtl-v when you create the password; for example, to create the password abc?123, do this:
Enter abc.
Enter Crtl-v.
Enter ?123.
When the system prompts you to enter the enable password, you need not precede the question mark with the Ctrl-v; you can simply enter abc?123 at the password prompt.
Returns to privileged EXEC mode.

Related Topics Example: Setting or Changing a Static Enable Password, on page 1275

Protecting Enable and Enable Secret Passwords with Encryption
Beginning in privileged EXEC mode, follow these steps to establish an encrypted password that users must enter to access privileged EXEC mode (the default) or any privilege level you specify:

SUMMARY STEPS

1. configure terminal 2. Use one of the following:
· enable password [level level] {password encryption-type encrypted-password}
· enable secret [level level] {password encryption-type encrypted-password}
3. service password-encryption 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1267

Protecting Enable and Enable Secret Passwords with Encryption

Security

Command or Action
Switch# configure terminal

Purpose

Step 2

Use one of the following: · enable password [level level] {password encryption-type encrypted-password} · enable secret [level level] {password encryption-type encrypted-password}
Example:
Switch(config)# enable password example102
or
Switch(config)# enable secret level 1 password secret123sample

· Defines a new password or changes an existing password for access to privileged EXEC mode.
· Defines a secret password, which is saved using a nonreversible encryption method.
· (Optional) For level, the range is from 0 to 15. Level 1 is normal user EXEC mode privileges. The default level is 15 (privileged EXEC mode privileges).
· For password, specify a string from 1 to 25 alphanumeric characters. The string cannot start with a number, is case sensitive, and allows spaces but ignores leading spaces. By default, no password is defined.
· (Optional) For encryption-type, only type 5, a Cisco proprietary encryption algorithm, is available. If you specify an encryption type, you must provide an encrypted password--an encrypted password that you copy from another switch configuration.
Note If you specify an encryption type and then enter a clear text password, you can not re-enter privileged EXEC mode. You cannot recover a lost encrypted password by any method.

Step 3

service password-encryption Example:
Switch(config)# service password-encryption

(Optional) Encrypts the password when the password is defined or when the configuration is written.
Encryption prevents the password from being readable in the configuration file.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Related Topics Additional Password Security, on page 1264 Example: Protecting Enable and Enable Secret Passwords with Encryption, on page 1276

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1268

Security

Disabling Password Recovery

Disabling Password Recovery
Beginning in privileged EXEC mode, follow these steps to disable password recovery to protect the security of your switch:

Before you begin
If you disable password recovery, we recommend that you keep a backup copy of the configuration file on a secure server in case the end user interrupts the boot process and sets the system back to default values. Do not keep a backup copy of the configuration file on the switch. If the switch is operating in VTP transparent mode, we recommend that you also keep a backup copy of the VLAN database file on a secure server. When the switch is returned to the default system configuration, you can download the saved files to the switch by using the Xmodem protocol.

SUMMARY STEPS

1. configure terminal 2. no service password-recovery 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

no service password-recovery Example:
Switch(config)# no service password-recovery

Step 3

end Example:
Switch(config)# end

Disables password recovery.
This setting is saved in an area of the flash memory that is accessible by the boot loader and the Cisco IOS image, but it is not part of the file system and is not accessible by any user.
Returns to privileged EXEC mode.

What to do next
To re-enable password recovery, use the service password-recovery global configuration command.
Related Topics Password Recovery, on page 1264 Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1263

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1269

Setting a Telnet Password for a Terminal Line

Security

Setting a Telnet Password for a Terminal Line
Beginning in user EXEC mode, follow these steps to set a Telnet password for the connected terminal line:

Before you begin
Attach a PC or workstation with emulation software to the switch console port, or attach a PC to the Ethernet management port.
The default data characteristics of the console port are 9600, 8, 1, no parity. You might need to press the Return key several times to see the command-line prompt.

SUMMARY STEPS

1. enable 2. configure terminal 3. line vty 0 15 4. password password 5. end

DETAILED STEPS

Step 1

Command or Action enable Example:

Switch> enable

Purpose Note If a password is required for access to privileged
EXEC mode, you will be prompted for it.
Enters privileged EXEC mode.

Step 2

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 3

line vty 0 15 Example:
Switch(config)# line vty 0 15

Step 4

password password Example:
Switch(config-line)# password abcxyz543

Step 5

end Example:

Configures the number of Telnet sessions (lines), and enters line configuration mode.
There are 16 possible sessions on a command-capable switch. The 0 and 15 mean that you are configuring all 16 possible Telnet sessions.
Sets a Telnet password for the line or lines.
For password, specify a string from 1 to 25 alphanumeric characters. The string cannot start with a number, is case sensitive, and allows spaces but ignores leading spaces. By default, no password is defined.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1270

Security

Configuring Username and Password Pairs

Command or Action
Switch(config-line)# end

Purpose

Related Topics Preventing Unauthorized Access, on page 1261 Terminal Line Telnet Configuration, on page 1265 Example: Setting a Telnet Password for a Terminal Line, on page 1276

Configuring Username and Password Pairs
Beginning in privileged EXEC mode, follow these steps to configure username and password pairs:

SUMMARY STEPS

1. configure terminal 2. username name [privilege level] {password encryption-type password} 3. Use one of the following:
· line console 0 · line vty 0 15
4. login local 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

username name [privilege level] {password encryption-type password}

Sets the username, privilege level, and password for each user.

Example:
Switch(config)# username adamsample privilege 1 password secret456
Switch(config)# username 111111111111 mac attribute

· For name, specify the user ID as one word or the MAC address. Spaces and quotation marks are not allowed.
· You can configure a maximum of 12000 clients each, for both username and MAC filter.
· (Optional) For level, specify the privilege level the user has after gaining access. The range is 0 to 15. Level 15 gives privileged EXEC mode access. Level 1 gives user EXEC mode access.

· For encryption-type, enter 0 to specify that an unencrypted password will follow. Enter 7 to specify that a hidden password will follow.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1271

Setting the Privilege Level for a Command

Security

Command or Action

Step 3 Step 4

Use one of the following: · line console 0 · line vty 0 15
Example:
Switch(config)# line console 0
or
Switch(config)# line vty 15
login local Example:
Switch(config-line)# login local

Step 5

end Example:
Switch(config)# end

Purpose · For password, specify the password the user must enter to gain access to the switch. The password must be from 1 to 25 characters, can contain embedded spaces, and must be the last option specified in the username command.
Enters line configuration mode, and configures the console port (line 0) or the VTY lines (line 0 to 15).
Enables local password checking at login time. Authentication is based on the username specified in Step 2.
Returns to privileged EXEC mode.

Related Topics Preventing Unauthorized Access, on page 1261 Username and Password Pairs, on page 1265

Setting the Privilege Level for a Command
Beginning in privileged EXEC mode, follow these steps to set the privilege level for a command:

SUMMARY STEPS

1. configure terminal 2. privilege mode level level command 3. enable password level level password 4. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1272

Security

Changing the Default Privilege Level for Lines

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3 Step 4

privilege mode level level command

Sets the privilege level for a command.

Example:
Switch(config)# privilege exec level 14 configure

· For mode, enter configure for global configuration mode, exec for EXEC mode, interface for interface configuration mode, or line for line configuration mode.

· For level, the range is from 0 to 15. Level 1 is for normal user EXEC mode privileges. Level 15 is the level of access permitted by the enable password.

· For command, specify the command to which you want to restrict access.

enable password level level password Example:
Switch(config)# enable password level 14 SecretPswd14

Specifies the password to enable the privilege level.
· For level, the range is from 0 to 15. Level 1 is for normal user EXEC mode privileges.
· For password, specify a string from 1 to 25 alphanumeric characters. The string cannot start with a number, is case sensitive, and allows spaces but ignores leading spaces. By default, no password is defined.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Related Topics Privilege Levels, on page 1265 Example: Setting the Privilege Level for a Command, on page 1276
Changing the Default Privilege Level for Lines
Beginning in privileged EXEC mode, follow these steps to change the default privilege level for the specified line:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1273

Logging into and Exiting a Privilege Level

Security

SUMMARY STEPS

1. configure terminal 2. line vty line 3. privilege level level 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

line vty line Example:
Switch(config)# line vty 10

Step 3

privilege level level Example:
Switch(config)# privilege level 15

Step 4

end Example:
Switch(config)# end

Purpose Enters the global configuration mode.
Selects the virtual terminal line on which to restrict access.
Changes the default privilege level for the line. For level, the range is from 0 to 15. Level 1 is for normal user EXEC mode privileges. Level 15 is the level of access permitted by the enable password. Returns to privileged EXEC mode.

What to do next
Users can override the privilege level you set using the privilege level line configuration command by logging in to the line and enabling a different privilege level. They can lower the privilege level by using the disable command. If users know the password to a higher privilege level, they can use that password to enable the higher privilege level. You might specify a high level or privilege level for your console line to restrict line usage.
Related Topics Privilege Levels, on page 1265
Logging into and Exiting a Privilege Level
Beginning in user EXEC mode, follow these steps to log into a specified privilege level and exit a specified privilege level.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1274

Security

Monitoring Switch Access

SUMMARY STEPS

1. enable level 2. disable level

DETAILED STEPS

Step 1

Command or Action enable level Example:

Switch> enable 15

Step 2

disable level Example:
Switch# disable 1

Purpose Logs in to a specified privilege level. Following the example, Level 15 is privileged EXEC mode. For level, the range is 0 to 15.
Exits to a specified privilege level. Following the example, Level 1 is user EXEC mode. For level, the range is 0 to 15.

Related Topics Privilege Levels, on page 1265

Monitoring Switch Access
Table 113: Commands for Displaying DHCP Information
show privilege

Displays the privilege level configuration.

Configuration Examples for Setting Passwords and Privilege Levels
Example: Setting or Changing a Static Enable Password
This example shows how to change the enable password to l1u2c3k4y5. The password is not encrypted and provides access to level 15 (traditional privileged EXEC mode access):
Switch(config)# enable password l1u2c3k4y5
Related Topics Setting or Changing a Static Enable Password, on page 1266

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1275

Example: Protecting Enable and Enable Secret Passwords with Encryption

Security

Example: Protecting Enable and Enable Secret Passwords with Encryption
This example shows how to configure the encrypted password $1$FaD0$Xyti5Rkls3LoyxzS8 for privilege level 2:
Switch(config)# enable secret level 2 5 $1$FaD0$Xyti5Rkls3LoyxzS8
Related Topics Protecting Enable and Enable Secret Passwords with Encryption, on page 1267 Additional Password Security, on page 1264
Example: Setting a Telnet Password for a Terminal Line
This example shows how to set the Telnet password to let45me67in89:
Switch(config)# line vty 10 Switch(config-line)# password let45me67in89
Related Topics Setting a Telnet Password for a Terminal Line, on page 1270 Terminal Line Telnet Configuration, on page 1265
Example: Setting the Privilege Level for a Command
This example shows how to set the configure command to privilege level 14 and define SecretPswd14 as the password users must enter to use level 14 commands:
Switch(config)# privilege exec level 14 configure Switch(config)# enable password level 14 SecretPswd14
Related Topics Setting the Privilege Level for a Command, on page 1272 Privilege Levels, on page 1265

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1276

Security

Additional References

MIBs
MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1277

Additional References

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1278

6 3 C H A P T E R
Configuring TACACS+
· Finding Feature Information, on page 1279 · Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System
Plus (TACACS+), on page 1279 · Information About TACACS+, on page 1281 · How to Configure TACACS+, on page 1285 · Monitoring TACACS+, on page 1291 · Additional References, on page 1292 · Feature Information for TACACS+, on page 1293
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)
The following are the prerequisites for set up and configuration of switch access with Terminal Access Controller Access Control System Plus (TACACS+) (must be performed in the order presented): 1. Configure the switches with the TACACS+ server addresses. 2. Set an authentication key. 3. Configure the key from Step 2 on the TACACS+ servers. 4. Enable AAA. 5. Create a login authentication method list. 6. Apply the list to the terminal lines.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1279

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

Security

7. Create an authorization and accounting method list.
The following are the prerequisites for controlling switch access with TACACS+:
· You must have access to a configured TACACS+ server to configure TACACS+ features on your switch. Also, you must have access to TACACS+ services maintained in a database on a TACACS+ daemon typically running on a LINUX or Windows workstation.
· We recommend a redundant connection between a switch stack and the TACACS+ server. This is to help ensure that the TACACS+ server remains accessible in case one of the connected stack members is removed from the switch stack.
· You need a system running the TACACS+ daemon software to use TACACS+ on your switch.
· To use TACACS+, it must be enabled.
· Authorization must be enabled on the switch to be used.
· Users must first successfully complete TACACS+ authentication before proceeding to TACACS+ authorization.
· To use any of the AAA commands listed in this section or elsewhere, you must first enable AAA with the aaa new-model command.
· At a minimum, you must identify the host or hosts maintaining the TACACS+ daemon and define the method lists for TACACS+ authentication. You can optionally define method lists for TACACS+ authorization and accounting.
· The method list defines the types of authentication to be performed and the sequence in which they are performed; it must be applied to a specific port before any of the defined authentication methods are performed. The only exception is the default method list (which, by coincidence, is named default). The default method list is automatically applied to all ports except those that have a named method list explicitly defined. A defined method list overrides the default method list.
· Use TACACS+ for privileged EXEC access authorization if authentication was performed by using TACACS+.
· Use the local database if authentication was not performed by using TACACS+.
Related Topics TACACS+ Overview, on page 1281 TACACS+ Operation, on page 1283 How to Configure TACACS+, on page 1285 Method List Description, on page 1283 Configuring TACACS+ Login Authentication, on page 1286 TACACS+ Login Authentication, on page 1284 Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1289 TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1284

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1280

Security

Information About TACACS+

Information About TACACS+
TACACS+ and Switch Access
This section describes TACACS+. TACACS+ provides detailed accounting information and flexible administrative control over the authentication and authorization processes. It is facilitated through authentication, authorization, accounting (AAA) and can be enabled only through AAA commands. The switch supports TACACS+ for IPv6. Information is in the "TACACS+ Over an IPv6 Transport" section of the "Implementing ADSL for IPv6" chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2. For information about configuring this feature, see the "Configuring TACACS+ over IPv6" section of the "Implementing ADSL for IPv6" chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2.
Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Security Command Reference, Release 12.4 and the Cisco IOS IPv6 Command Reference.
Related Topics Preventing Unauthorized Access, on page 1261 Configuring the Switch for Local Authentication and Authorization, on page 1335 SSH Servers, Integrated Clients, and Supported Versions, on page 1341
TACACS+ Overview
TACACS+ is a security application that provides centralized validation of users attempting to gain access to your switch. TACACS+ provides for separate and modular authentication, authorization, and accounting facilities. TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each service--authentication, authorization, and accounting--independently. Each service can be tied into its own database to take advantage of other services available on that server or on the network, depending on the capabilities of the daemon. The goal of TACACS+ is to provide a method for managing multiple network access points from a single management service. Your switch can be a network access server along with other Cisco routers and access servers.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1281

TACACS+ Overview Figure 70: Typical TACACS+ Network Configuration

Security

TACACS+, administered through the AAA security services, can provide these services:
· Authentication--Provides complete control of authentication through login and password dialog, challenge and response, and messaging support.
The authentication facility can conduct a dialog with the user (for example, after a username and password are provided, to challenge a user with several questions, such as home address, mother's maiden name, service type, and social security number). The TACACS+ authentication service can also send messages to user screens. For example, a message could notify users that their passwords must be changed because of the company's password aging policy.
· Authorization--Provides fine-grained control over user capabilities for the duration of the user's session, including but not limited to setting autocommands, access control, session duration, or protocol support. You can also enforce restrictions on what commands a user can execute with the TACACS+ authorization feature.
· Accounting--Collects and sends information used for billing, auditing, and reporting to the TACACS+ daemon. Network managers can use the accounting facility to track user activity for a security audit or to provide information for user billing. Accounting records include user identities, start and stop times, executed commands (such as PPP), number of packets, and number of bytes.
The TACACS+ protocol provides authentication between the switch and the TACACS+ daemon, and it ensures confidentiality because all protocol exchanges between the switch and the TACACS+ daemon are encrypted. Related Topics
Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1282

Security

TACACS+ Operation

TACACS+ Operation
When a user attempts a simple ASCII login by authenticating to a switch using TACACS+, this process occurs:
1. When the connection is established, the switch contacts the TACACS+ daemon to obtain a username prompt to show to the user. The user enters a username, and the switch then contacts the TACACS+ daemon to obtain a password prompt. The switch displays the password prompt to the user, the user enters a password, and the password is then sent to the TACACS+ daemon.
TACACS+ allows a dialog between the daemon and the user until the daemon receives enough information to authenticate the user. The daemon prompts for a username and password combination, but can include other items, such as the user's mother's maiden name.
2. The switch eventually receives one of these responses from the TACACS+ daemon:
· ACCEPT--The user is authenticated and service can begin. If the switch is configured to require authorization, authorization begins at this time.
· REJECT--The user is not authenticated. The user can be denied access or is prompted to retry the login sequence, depending on the TACACS+ daemon.
· ERROR--An error occurred at some time during authentication with the daemon or in the network connection between the daemon and the switch. If an ERROR response is received, the switch typically tries to use an alternative method for authenticating the user.
· CONTINUE--The user is prompted for additional authentication information.
After authentication, the user undergoes an additional authorization phase if authorization has been enabled on the switch. Users must first successfully complete TACACS+ authentication before proceeding to TACACS+ authorization.
3. If TACACS+ authorization is required, the TACACS+ daemon is again contacted, and it returns an ACCEPT or REJECT authorization response. If an ACCEPT response is returned, the response contains data in the form of attributes that direct the EXEC or NETWORK session for that user and the services that the user can access:
· Telnet, Secure Shell (SSH), rlogin, or privileged EXEC services
· Connection parameters, including the host or client IP address, access list, and user timeouts
Related Topics Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279
Method List Description
A method list defines the sequence and methods to be used to authenticate, to authorize, or to keep accounts on a user. You can use method lists to designate one or more security protocols to be used, thus ensuring a backup system if the initial method fails. The software uses the first method listed to authenticate, to authorize, or to keep accounts on users; if that method does not respond, the software selects the next method in the list. This process continues until there is successful communication with a listed method or the method list is exhausted.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1283

TACACS+ Configuration Options

Security

Related Topics How to Configure TACACS+, on page 1285 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279
TACACS+ Configuration Options
You can configure the switch to use a single server or AAA server groups to group existing server hosts for authentication. You can group servers to select a subset of the configured server hosts and use them for a particular service. The server group is used with a global server-host list and contains the list of IP addresses of the selected server hosts.
Related Topics Identifying the TACACS+ Server Host and Setting the Authentication Key, on page 1285
TACACS+ Login Authentication
A method list describes the sequence and authentication methods to be queried to authenticate a user. You can designate one or more security protocols to be used for authentication, thus ensuring a backup system for authentication in case the initial method fails. The software uses the first method listed to authenticate users; if that method fails to respond, the software selects the next authentication method in the method list. This process continues until there is successful communication with a listed authentication method or until all defined methods are exhausted. If authentication fails at any point in this cycle--meaning that the security server or local username database responds by denying the user access--the authentication process stops, and no other authentication methods are attempted.
Related Topics Configuring TACACS+ Login Authentication, on page 1286 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279
TACACS+ Authorization for Privileged EXEC Access and Network Services
AAA authorization limits the services available to a user. When AAA authorization is enabled, the switch uses information retrieved from the user's profile, which is located either in the local user database or on the security server, to configure the user's session. The user is granted access to a requested service only if the information in the user profile allows it.
Related Topics Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1289 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279
TACACS+ Accounting
The AAA accounting feature tracks the services that users are accessing and the amount of network resources that they are consuming. When AAA accounting is enabled, the switch reports user activity to the TACACS+ security server in the form of accounting records. Each accounting record contains accounting attribute-value

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1284

Security

Default TACACS+ Configuration

(AV) pairs and is stored on the security server. This data can then be analyzed for network management, client billing, or auditing. Related Topics
Starting TACACS+ Accounting, on page 1290
Default TACACS+ Configuration
TACACS+ and AAA are disabled by default. To prevent a lapse in security, you cannot configure TACACS+ through a network management application. When enabled, TACACS+ can authenticate users accessing the switch through the CLI.

Note Although TACACS+ configuration is performed through the CLI, the TACACS+ server authenticates HTTP connections that have been configured with a privilege level of 15.

How to Configure TACACS+
This section describes how to configure your switch to support TACACS+.
Related Topics Method List Description, on page 1283 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279

Identifying the TACACS+ Server Host and Setting the Authentication Key
Beginning in privileged EXEC mode, follow these steps to identify the TACACS+ server host and set the authentication key:

SUMMARY STEPS

1. configure terminal 2. tacacs-server host hostname 3. aaa new-model 4. aaa group server tacacs+ group-name 5. server ip-address 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1285

Configuring TACACS+ Login Authentication

Security

Command or Action
Switch# configure terminal

Purpose

Step 2 Step 3

tacacs-server host hostname Example:
Switch(config)# tacacs-server host yourserver
aaa new-model Example:
Switch(config)# aaa new-model

Identifies the IP host or hosts maintaining a TACACS+ server. Enter this command multiple times to create a list of preferred hosts. The software searches for hosts in the order in which you specify them.
For hostname, specify the name or IP address of the host.
Enables AAA.

Step 4

aaa group server tacacs+ group-name Example:
Switch(config)# aaa group server tacacs+ your_server_group

(Optional) Defines the AAA server-group with a group name.
This command puts the switch in a server group subconfiguration mode.

Step 5

server ip-address Example:
Switch(config)# server 10.1.2.3

Step 6

end Example:
Switch(config)# end

(Optional) Associates a particular TACACS+ server with the defined server group. Repeat this step for each TACACS+ server in the AAA server group.
Each server in the group must be previously defined in Step 2.
Returns to privileged EXEC mode.

Related Topics TACACS+ Configuration Options, on page 1284
Configuring TACACS+ Login Authentication
Beginning in privileged EXEC mode, follow these steps to configure TACACS+ login authentication:
Before you begin To configure AAA authentication, you define a named list of authentication methods and then apply that list to various ports.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1286

Security

Configuring TACACS+ Login Authentication

Note To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip http authentication aaa global configuration command. Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods.
For more information about the ip http authentication command, see the Cisco IOS Security Command Reference, Release 12.4.

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. aaa authentication login {default | list-name} method1 [method2...] 4. line [console | tty | vty] line-number [ending-line-number] 5. login authentication {default | list-name} 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA.

Step 3

aaa authentication login {default | list-name} method1 [method2...] Example:
Switch(config)# aaa authentication login default tacacs+ local

Creates a login authentication method list.
· To create a default list that is used when a named list is not specified in the login authentication command, use the default keyword followed by the methods that are to be used in default situations. The default method list is automatically applied to all ports.

· For list-name, specify a character string to name the list you are creating.

· For method1..., specify the actual method the authentication algorithm tries. The additional methods of authentication are used only if the previous method returns an error, not if it fails.

Select one of these methods:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1287

Configuring TACACS+ Login Authentication

Security

Step 4

Command or Action

Purpose
· enable--Use the enable password for authentication. Before you can use this authentication method, you must define an enable password by using the enable password global configuration command.
· group tacacs+--Uses TACACS+ authentication. Before you can use this authentication method, you must configure the TACACS+ server. For more information, see the Identifying the TACACS+ Server Host and Setting the Authentication Key, on page 1285.
· line --Use the line password for authentication. Before you can use this authentication method, you must define a line password. Use the password password line configuration command.
· local--Use the local username database for authentication. You must enter username information in the database. Use the username password global configuration command.
· local-case--Use a case-sensitive local username database for authentication. You must enter username information in the database by using the username name password global configuration command.
· none--Do not use any authentication for login.

line [console | tty | vty] line-number [ending-line-number] Enters line configuration mode, and configures the lines to

Example:

which you want to apply the authentication list.

Switch(config)# line 2 4

Step 5 Step 6

login authentication {default | list-name}

Applies the authentication list to a line or set of lines.

Example:
Switch(config-line)# login authentication default

· If you specify default, use the default list created with the aaa authentication login command.
· For list-name, specify the list created with the aaa authentication login command.

end Example:
Switch(config-line)# end

Returns to privileged EXEC mode.

Related Topics TACACS+ Login Authentication, on page 1284

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1288

Security

Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
You can use the aaa authorization global configuration command with the tacacs+ keyword to set parameters that restrict a user's network access to privileged EXEC mode. The aaa authorization exec tacacs+ local command sets these authorization parameters:
· Use TACACS+ for privileged EXEC access authorization if authentication was performed by using TACACS+.
· Use the local database if authentication was not performed by using TACACS+.

Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been configured.

SUMMARY STEPS

1. configure terminal 2. aaa authorization network tacacs+ 3. aaa authorization exec tacacs+ 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

aaa authorization network tacacs+ Example:

Configures the switch for user TACACS+ authorization for all network-related service requests.

Switch(config)# aaa authorization network tacacs+

Step 3

aaa authorization exec tacacs+ Example:
Switch(config)# aaa authorization exec tacacs+

Configures the switch for user TACACS+ authorization if the user has privileged EXEC access.
The exec keyword might return user profile information (such as autocommand information).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1289

Starting TACACS+ Accounting

Security

Step 4

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Related Topics TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1284 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), on page 1279

Starting TACACS+ Accounting
Beginning in privileged EXEC mode, follow these steps to start TACACS+ Accounting:

SUMMARY STEPS

1. configure terminal 2. aaa accounting network start-stop tacacs+ 3. aaa accounting exec start-stop tacacs+ 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

aaa accounting network start-stop tacacs+ Example:

Enables TACACS+ accounting for all network-related service requests.

Switch(config)# aaa accounting network start-stop tacacs+

Step 3

aaa accounting exec start-stop tacacs+ Example:
Switch(config)# aaa accounting exec start-stop tacacs+

Enables TACACS+ accounting to send a start-record accounting notice at the beginning of a privileged EXEC process and a stop-record at the end.

Step 4

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1290

Security

Establishing a Session with a Router if the AAA Server is Unreachable

Command or Action
Switch(config)# end

Purpose

What to do next
To establish a session with a router if the AAA server is unreachable, use the aaa accounting system guarantee-first command. It guarantees system accounting as the first record, which is the default condition. In some situations, users might be prevented from starting a session on the console or terminal connection until after the system reloads, which can take more than 3 minutes.
To establish a console or Telnet session with the router if the AAA server is unreachable when the router reloads, use the no aaa accounting system guarantee-first command.
Related Topics TACACS+ Accounting, on page 1284
Establishing a Session with a Router if the AAA Server is Unreachable
To establishing a session with a router if the AAA server is unreachable, use the aaa accounting system guarantee-first command. It guarantees system accounting as the first record, which is the default condition. In some situations, users might be prevented from starting a session on the console or terminal connection until after the system reloads, which can take more than 3 minutes.
To establish a console or Telnet session with the router if the AAA server is unreachable when the router reloads, use the no aaa accounting system guarantee-first command.

Monitoring TACACS+
Table 114: Commands for Displaying TACACS+ Information
Command show tacacs

Purpose Displays TACACS+ server statistics.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1291

Additional References

Security

Additional References

Related Documents

Related Document Title Topic

Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity Control

http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html

policies

and

Identity

Service

templates

for Session

Aware

networking.

Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

RADIUS, TACACS+,

http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra

Secure

Shell,

802.1X

and AAA.

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1292

Security

Feature Information for TACACS+

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for TACACS+
Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1293

Feature Information for TACACS+

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1294

6 4 C H A P T E R
Configuring RADIUS
· Finding Feature Information, on page 1295 · Prerequisites for Controlling Switch Access with RADIUS, on page 1295 · Restrictions for Controlling Switch Access with RADIUS, on page 1296 · Information about RADIUS, on page 1296 · How to Configure RADIUS, on page 1308 · Monitoring CoA Functionality, on page 1322 · Configuration Examples for Controlling Switch Access with RADIUS, on page 1323 · Additional References, on page 1324 · Feature Information for RADIUS, on page 1325
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Controlling Switch Access with RADIUS
This section lists the prerequisites for controlling Catalyst switch access with RADIUS. General:
· RADIUS and AAA must be enabled to use any of the configuration commands in this chapter. · RADIUS is facilitated through AAA and can be enabled only through AAA commands. · At a minimum, you must identify the host or hosts that run the RADIUS server software and define the
method lists for RADIUS authentication. You can optionally define method lists for RADIUS authorization and accounting. · You should have access to and should configure a RADIUS server before configuring RADIUS features on your switch.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1295

Restrictions for Controlling Switch Access with RADIUS

Security

· The RADIUS host is normally a multiuser system running RADIUS server software from Cisco (Cisco Secure Access Control Server Version 3.0), Livingston, Merit, Microsoft, or another software provider. For more information, see the RADIUS server documentation.
· To use the Change-of-Authorization (CoA) interface, a session must already exist on the switch. CoA can be used to identify a session and enforce a disconnect request. The update affects only the specified session.
· A redundant connection between a switch stack and the RADIUS server is recommended. This is to help ensure that the RADIUS server remains accessible in case one of the connected stack members is removed from the switch stack.
For RADIUS operation: · Users must first successfully complete RADIUS authentication before proceeding to RADIUS authorization, if it is enabled.
Related Topics RADIUS and Switch Access, on page 1296 RADIUS Operation, on page 1298
Restrictions for Controlling Switch Access with RADIUS
This topic covers restrictions for controlling switch access with RADIUS. General:
· To prevent a lapse in security, you cannot configure RADIUS through a network management application.
RADIUS is not suitable in the following network security situations: · Multiprotocol access environments. RADIUS does not support AppleTalk Remote Access (ARA), NetBIOS Frame Control Protocol (NBFCP), NetWare Asynchronous Services Interface (NASI), or X.25 PAD connections. · Switch-to-switch or router-to-router situations. RADIUS does not provide two-way authentication. RADIUS can be used to authenticate from one device to a non-Cisco device if the non-Cisco device requires authentication. · Networks using a variety of services. RADIUS generally binds a user to one service model.
Related Topics RADIUS Overview, on page 1297
Information about RADIUS
RADIUS and Switch Access
This section describes how to enable and configure RADIUS. RADIUS provides detailed accounting information and flexible administrative control over the authentication and authorization processes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1296

Security

RADIUS Overview

The switch supports RADIUS for IPv6. Information is in the "RADIUS Over IPv6" section of the "Implementing ADSL for IPv6" chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2. For information about configuring this feature, see the "Configuring the NAS" section in the "Implementing ADSL for IPv6" chapter in the Cisco IOS XE IPv6 Configuration Guide, Release 2.
Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Security Command Reference, Release 12.4 and the Cisco IOS IPv6 Command Reference.
Related Topics Prerequisites for Controlling Switch Access with RADIUS, on page 1295 Configuring the Switch for Local Authentication and Authorization, on page 1335 SSH Servers, Integrated Clients, and Supported Versions, on page 1341
RADIUS Overview
RADIUS is a distributed client/server system that secures networks against unauthorized access. RADIUS clients run on supported Cisco routers and switches. Clients send authentication requests to a central RADIUS server, which contains all user authentication and network service access information.
Use RADIUS in these network environments that require access security:
· Networks with multiple-vendor access servers, each supporting RADIUS. For example, access servers from several vendors use a single RADIUS server-based security database. In an IP-based network with multiple vendors' access servers, dial-in users are authenticated through a RADIUS server that has been customized to work with the Kerberos security system.
· Turnkey network security environments in which applications support the RADIUS protocol, such as in an access environment that uses a smart card access control system. In one case, RADIUS has been used with Enigma's security cards to validates users and to grant access to network resources.
· Networks already using RADIUS. You can add a Cisco switch containing a RADIUS client to the network. This might be the first step when you make a transition to a TACACS+ server. See Figure 2: Transitioning from RADIUS to TACACS+ Services below.
· Network in which the user must only access a single service. Using RADIUS, you can control user access to a single host, to a single utility such as Telnet, or to the network through a protocol such as IEEE 802.1x. For more information about this protocol, see Chapter 11, "Configuring IEEE 802.1x Port-Based Authentication."
· Networks that require resource accounting. You can use RADIUS accounting independently of RADIUS authentication or authorization. The RADIUS accounting functions allow data to be sent at the start and end of services, showing the amount of resources (such as time, packets, bytes, and so forth) used during the session. An Internet service provider might use a freeware-based version of RADIUS access control and accounting software to meet special security and billing needs.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1297

RADIUS Operation Figure 71: Transitioning from RADIUS to TACACS+ Services

Security

Related Topics Restrictions for Controlling Switch Access with RADIUS, on page 1296
RADIUS Operation
When a user attempts to log in and authenticate to a switch that is access controlled by a RADIUS server, these events occur: 1. The user is prompted to enter a username and password. 2. The username and encrypted password are sent over the network to the RADIUS server. 3. The user receives one of the following responses from the RADIUS server:
· ACCEPT--The user is authenticated. · REJECT--The user is either not authenticated and is prompted to re-enter the username and password,
or access is denied. · CHALLENGE--A challenge requires additional data from the user. · CHALLENGE PASSWORD--A response requests the user to select a new password. The ACCEPT or REJECT response is bundled with additional data that is used for privileged EXEC or network authorization. The additional data included with the ACCEPT or REJECT packets includes these items: · Telnet, SSH, rlogin, or privileged EXEC services · Connection parameters, including the host or client IP address, access list, and user timeouts Related Topics Prerequisites for Controlling Switch Access with RADIUS, on page 1295
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1298

Security

RADIUS Change of Authorization

RADIUS Change of Authorization
This section provides an overview of the RADIUS interface including available primitives and how they are used during a Change of Authorization (CoA).
· Change-of-Authorization Requests
· CoA Request Response Code
· CoA Request Commands
· Session Reauthentication
· Stacking Guidelines for Session Termination
A standard RADIUS interface is typically used in a pulled model where the request originates from a network attached device and the response come from the queried servers. Catalyst switches support the RADIUS Change of Authorization (CoA) extensions defined in RFC 5176 that are typically used in a pushed model and allow for the dynamic reconfiguring of sessions from external authentication, authorization, and accounting (AAA) or policy servers. The switch supports these per-session CoA requests:
· Session reauthentication
· Session termination
· Session termination with port shutdown
· Session termination with port bounce
This feature is integrated with the Cisco Identity Services Engine, and the Cisco Secure Access Control Server (ACS) 5.1. The RADIUS interface is enabled by default on Catalyst switches. However, some basic configuration is required for the following attributes:
· Security and Password--refer to the "Preventing Unauthorized Access to Your Switch" section in this guide.
· Accounting--refer to the "Starting RADIUS Accounting" section in the Configuring Switch-Based Authentication chapter in this guide.
Change-of-Authorization Requests
Change of Authorization (CoA) requests, as described in RFC 5176, are used in a push model to allow for session identification, host reauthentication, and session termination. The model is comprised of one request (CoA-Request) and two possible response codes:
· CoA acknowledgment (ACK) [CoA-ACK]
· CoA non-acknowledgment (NAK) [CoA-NAK]
The request is initiated from a CoA client (typically a RADIUS or policy server) and directed to the switch that acts as a listener.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1299

RFC 5176 Compliance

Security

RFC 5176 Compliance The Disconnect Request message, which is also referred to as Packet of Disconnect (POD), is supported by the switch for session termination. This table shows the IETF attributes are supported for this feature.
Table 115: Supported IETF Attributes

Attribute Number 24 31 44 80 101

Attribute Name
State Calling-Station-ID Acct-Session-ID Message-Authenticator Error-Cause

This table shows the possible values for the Error-Cause attribute.
Table 116: Error-Cause Values

Value Explanation 201 Residual Session Context Removed 202 Invalid EAP Packet (Ignored) 401 Unsupported Attribute 402 Missing Attribute 403 NAS Identification Mismatch 404 Invalid Request 405 Unsupported Service 406 Unsupported Extension 407 Invalid Attribute Value 501 Administratively Prohibited 502 Request Not Routable (Proxy) 503 Session Context Not Found 504 Session Context Not Removable 505 Other Proxy Processing Error 506 Resources Unavailable

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1300

Security

Preconditions

Value Explanation 507 Request Initiated 508 Multiple Session Selection Unsupported

Preconditions

To use the CoA interface, a session must already exist on the switch. CoA can be used to identify a session and enforce a disconnect request. The update affects only the specified session.

CoA Request Response Code
The CoA Request response code can be used to convey a command to the switch. Related Topics
CoA Request Commands, on page 1302

Session Identification For disconnect and CoA requests targeted at a particular session, the switch locates the session based on one or more of the following attributes: · Calling-Station-Id (IETF attribute #31 which contains the host MAC address) · Audit-Session-Id (Cisco VSA) · Acct-Session-Id (IETF attribute #44)

Unless all session identification attributes included in the CoA message match the session, the switch returns a Disconnect-NAK or CoA-NAK with the "Invalid Attribute Value" error-code attribute.
If more than one session identification attribute is included in the message, all the attributes must match the session or the switch returns a Disconnect- negative acknowledgment (NAK) or CoA-NAK with the error code "Invalid Attribute Value."
The packet format for a CoA Request code as defined in RFC 5176 consists of the fields: Code, Identifier, Length, Authenticator, and Attributes in Type:Length:Value (TLV) format.

0

1

2

3

01234567890123456789012345678901

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

|

Code

| Identifier |

Length

|

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

|

|

|

Authenticator

|

|

|

|

|

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

| Attributes ...

+-+-+-+-+-+-+-+-+-+-+-+-+-

The attributes field is used to carry Cisco vendor-specific attributes (VSAs).
Related Topics CoA Disconnect-Request, on page 1303

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1301

CoA ACK Response Code

Security

CoA Request: Disable Host Port, on page 1303 CoA Request: Bounce-Port, on page 1304

CoA ACK Response Code
If the authorization state is changed successfully, a positive acknowledgment (ACK) is sent. The attributes returned within CoA ACK will vary based on the CoA Request and are discussed in individual CoA Commands.

CoA NAK Response Code
A negative acknowledgment (NAK) indicates a failure to change the authorization state and can include attributes that indicate the reason for the failure. Use show commands to verify a successful CoA.

CoA Request Commands

Table 117: CoA Commands Supported on the Switch

Command
10

Cisco VSA

Reauthenticate Cisco:Avpair="subscriber:command=reauthenticate" host
Terminate session This is a standard disconnect request that does not require a VSA.
Bounce host port Cisco:Avpair="subscriber:command=bounce-host-port"
Disable host port Cisco:Avpair="subscriber:command=disable-host-port"
10 All CoA commands must include the session identifier between the switch and the CoA client. Related Topics
CoA Request Response Code, on page 1301

Session Reauthentication
The AAA server typically generates a session reauthentication request when a host with an unknown identity or posture joins the network and is associated with a restricted access authorization profile (such as a guest VLAN). A reauthentication request allows the host to be placed in the appropriate authorization group when its credentials are known.
To initiate session authentication, the AAA server sends a standard CoA-Request message which contains a Cisco VSA in this form: Cisco:Avpair="subscriber:command=reauthenticate" and one or more session identification attributes.
The current session state determines the switch response to the message. If the session is currently authenticated by IEEE 802.1x, the switch responds by sending an EAPoL (Extensible Authentication Protocol over Lan) -RequestId message to the server.
If the session is currently authenticated by MAC authentication bypass (MAB), the switch sends an access-request to the server, passing the same identity attributes used for the initial successful authentication.
If session authentication is in progress when the switch receives the command, the switch terminates the process, and restarts the authentication sequence, starting with the method configured to be attempted first.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1302

Security

Session Reauthentication in a Switch Stack

If the session is not yet authorized, or is authorized via guest VLAN, or critical VLAN, or similar policies, the reauthentication message restarts the access control methods, beginning with the method configured to be attempted first. The current authorization of the session is maintained until the reauthentication leads to a different authorization result.
Session Reauthentication in a Switch Stack
When a switch stack receives a session reauthentication message:
· It checkpoints the need for a re-authentication before returning an acknowledgment (ACK).
· It initiates reauthentication for the appropriate session.
· If authentication completes with either success or failure, the signal that triggered the reauthentication is removed from the stack member.
· If the stack master fails before authentication completes, reauthentication is initiated after stack master switch-over based on the original command (which is subsequently removed).
· If the stack master fails before sending an ACK, the new stack master treats the re-transmitted command as a new command.
Session Termination
There are three types of CoA requests that can trigger session termination. A CoA Disconnect-Request terminates the session, without disabling the host port. This command causes re-initialization of the authenticator state machine for the specified host, but does not restrict that host's access to the network.
To restrict a host's access to the network, use a CoA Request with the Cisco:Avpair="subscriber:command=disable-host-port" VSA. This command is useful when a host is known to be causing problems on the network, and you need to immediately block network access for the host. When you want to restore network access on the port, re-enable it using a non-RADIUS mechanism.
When a device with no supplicant, such as a printer, needs to acquire a new IP address (for example, after a VLAN change), terminate the session on the host port with port-bounce (temporarily disable and then re-enable the port).
CoA Disconnect-Request
This command is a standard Disconnect-Request. Because this command is session-oriented, it must be accompanied by one or more of the session identification attributes. If the session cannot be located, the switch returns a Disconnect-NAK message with the "Session Context Not Found" error-code attribute. If the session is located, the switch terminates the session. After the session has been completely removed, the switch returns a Disconnect-ACK.
If the switch fails-over to a standby switch before returning a Disconnect-ACK to the client, the process is repeated on the new active switch when the request is re-sent from the client. If the session is not found following re-sending, a Disconnect-ACK is sent with the "Session Context Not Found" error-code attribute.
Related Topics Session Identification, on page 1301
CoA Request: Disable Host Port
This command is carried in a standard CoA-Request message that has this new VSA:
Cisco:Avpair="subscriber:command=disable-host-port"

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1303

CoA Request: Bounce-Port

Security

Because this command is session-oriented, it must be accompanied by one or more of the session identification attributes. If the session cannot be located, the switch returns a CoA-NAK message with the "Session Context Not Found" error-code attribute. If the session is located, the switch disables the hosting port and returns a CoA-ACK message. If the switch fails before returning a CoA-ACK to the client, the process is repeated on the new active switch when the request is re-sent from the client. If the switch fails after returning a CoA-ACK message to the client but before the operation has completed, the operation is restarted on the new active switch.
Note A Disconnect-Request failure following command re-sending could be the result of either a successful session termination before change-over (if the Disconnect-ACK was not sent) or a session termination by other means (for example, a link failure) that occurred after the original command was issued and before the standby switch became active.
Related Topics Session Identification, on page 1301
CoA Request: Bounce-Port This command is carried in a standard CoA-Request message that contains the following VSA: Cisco:Avpair="subscriber:command=bounce-host-port" Because this command is session-oriented, it must be accompanied by one or more of the session identification attributes. If the session cannot be located, the switch returns a CoA-NAK message with the "Session Context Not Found" error-code attribute. If the session is located, the switch disables the hosting port for a period of 10 seconds, re-enables it (port-bounce), and returns a CoA-ACK. If the switch fails before returning a CoA-ACK to the client, the process is repeated on the new active switch when the request is re-sent from the client. If the switch fails after returning a CoA-ACK message to the client but before the operation has completed, the operation is re-started on the new active switch. Related Topics Session Identification, on page 1301
Stacking Guidelines for Session Termination
No special handling is required for CoA Disconnect-Request messages in a switch stack.
Stacking Guidelines for CoA-Request Bounce-Port Because the bounce-port command is targeted at a session, not a port, if the session is not found, the command cannot be executed. When the Auth Manager command handler on the stack master receives a valid bounce-port command, it checkpoints the following information before returning a CoA-ACK message: · the need for a port-bounce
· the port-id (found in the local session context)
The switch initiates a port-bounce (disables the port for 10 seconds, then re-enables it). If the port-bounce is successful, the signal that triggered the port-bounce is removed from the standby stack master.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1304

Security

Stacking Guidelines for CoA-Request Disable-Port

If the stack master fails before the port-bounce completes, a port-bounce is initiated after stack master change-over based on the original command (which is subsequently removed). If the stack master fails before sending a CoA-ACK message, the new stack master treats the re-sent command as a new command.
Stacking Guidelines for CoA-Request Disable-Port Because the disable-port command is targeted at a session, not a port, if the session is not found, the command cannot be executed. When the Auth Manager command handler on the stack master receives a valid disable-port command, it verifies this information before returning a CoA-ACK message: · the need for a port-disable · the port-id (found in the local session context)
The switch attempts to disable the port. If the port-disable operation is successful, the signal that triggered the port-disable is removed from the standby stack master. If the stack master fails before the port-disable operation completes, the port is disabled after stack master change-over based on the original command (which is subsequently removed). If the stack master fails before sending a CoA-ACK message, the new stack master treats the re-sent command as a new command.
Default RADIUS Configuration
RADIUS and AAA are disabled by default. To prevent a lapse in security, you cannot configure RADIUS through a network management application. When enabled, RADIUS can authenticate users accessing the switch through the CLI.
RADIUS Server Host
Switch-to-RADIUS-server communication involves several components: · Hostname or IP address · Authentication destination port · Accounting destination port · Key string · Timeout period · Retransmission value
You identify RADIUS security servers by their hostname or IP address, hostname and specific UDP port numbers, or their IP address and specific UDP port numbers. The combination of the IP address and the UDP port number creates a unique identifier, allowing different ports to be individually defined as RADIUS hosts providing a specific AAA service. This unique identifier enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1305

RADIUS Login Authentication

Security

If two different host entries on the same RADIUS server are configured for the same service--for example, accounting--the second host entry configured acts as a fail-over backup to the first one. Using this example, if the first host entry fails to provide accounting services, the %RADIUS-4-RADIUS_DEAD message appears, and then the switch tries the second host entry configured on the same device for accounting services. (The RADIUS host entries are tried in the order that they are configured.)
A RADIUS server and the switch use a shared secret text string to encrypt passwords and exchange responses. To configure RADIUS to use the AAA security commands, you must specify the host running the RADIUS server daemon and a secret text (key) string that it shares with the switch.
The timeout, retransmission, and encryption key values can be configured globally for all RADIUS servers, on a per-server basis, or in some combination of global and per-server settings.
Related Topics Identifying the RADIUS Server Host, on page 1308 Defining AAA Server Groups, on page 1312 Configuring Settings for All RADIUS Servers, on page 1317 Configuring RADIUS Login Authentication, on page 1310
RADIUS Login Authentication
To configure AAA authentication, you define a named list of authentication methods and then apply that list to various ports. The method list defines the types of authentication to be performed and the sequence in which they are performed; it must be applied to a specific port before any of the defined authentication methods are performed. The only exception is the default method list. The default method list is automatically applied to all ports except those that have a named method list explicitly defined.
A method list describes the sequence and authentication methods to be queried to authenticate a user. You can designate one or more security protocols to be used for authentication, thus ensuring a backup system for authentication in case the initial method fails. The software uses the first method listed to authenticate users; if that method fails to respond, the software selects the next authentication method in the method list. This process continues until there is successful communication with a listed authentication method or until all defined methods are exhausted. If authentication fails at any point in this cycle--meaning that the security server or local username database responds by denying the user access--the authentication process stops, and no other authentication methods are attempted.
Related Topics Configuring RADIUS Login Authentication, on page 1310
AAA Server Groups
You can configure the switch to use AAA server groups to group existing server hosts for authentication. You select a subset of the configured server hosts and use them for a particular service. The server group is used with a global server-host list, which lists the IP addresses of the selected server hosts.
Server groups also can include multiple host entries for the same server if each entry has a unique identifier (the combination of the IP address and UDP port number), allowing different ports to be individually defined as RADIUS hosts providing a specific AAA service. If you configure two different host entries on the same RADIUS server for the same service, (for example, accounting), the second configured host entry acts as a fail-over backup to the first one.
Related Topics Defining AAA Server Groups, on page 1312

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1306

Security

AAA Authorization

AAA Authorization
AAA authorization limits the services available to a user. When AAA authorization is enabled, the switch uses information retrieved from the user's profile, which is in the local user database or on the security server, to configure the user's session. The user is granted access to a requested service only if the information in the user profile allows it. Related Topics
Configuring RADIUS Authorization for User Privileged Access and Network Services, on page 1314
RADIUS Accounting
The AAA accounting feature tracks the services that users are using and the amount of network resources that they are consuming. When you enable AAA accounting, the switch reports user activity to the RADIUS security server in the form of accounting records. Each accounting record contains accounting attribute-value (AV) pairs and is stored on the security server. You can then analyze the data for network management, client billing, or auditing. Related Topics
Starting RADIUS Accounting, on page 1315
Vendor-Specific RADIUS Attributes
The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the switch and the RADIUS server by using the vendor-specific attribute (attribute 26). Vendor-specific attributes (VSAs) allow vendors to support their own extended attributes not suitable for general use. The Cisco RADIUS implementation supports one vendor-specific option by using the format recommended in the specification. Cisco's vendor-ID is 9, and the supported option has vendor-type 1, which is named cisco-avpair. The value is a string with this format:
protocol : attribute sep value *
Protocol is a value of the Cisco protocol attribute for a particular type of authorization. Attribute and value are an appropriate attributevalue (AV) pair defined in the Cisco TACACS+ specification, and sep is = for mandatory attributes and is * for optional attributes. The full set of features available for TACACS+ authorization can then be used for RADIUS.
Other vendors have their own unique vendor-IDs, options, and associated VSAs. For more information about vendor-IDs and VSAs, see RFC 2138, "Remote Authentication Dial-In User Service (RADIUS)."
For a complete list of RADIUS attributes or more information about vendor-specific attribute 26, see the "RADIUS Attributes" appendix in the Cisco IOS Security Configuration Guide. Related Topics
Configuring the Switch to Use Vendor-Specific RADIUS Attributes, on page 1318
Vendor-Proprietary RADIUS Server Communication
Although an IETF draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the switch and the RADIUS server, some vendors have extended the RADIUS attribute set in a unique way. Cisco IOS software supports a subset of vendor-proprietary RADIUS attributes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1307

How to Configure RADIUS

Security

As mentioned earlier, to configure RADIUS (whether vendor-proprietary or IETF draft-compliant), you must specify the host running the RADIUS server daemon and the secret text string it shares with the switch. You specify the RADIUS host and secret text string by using the radius-server global configuration commands.
Related Topics Configuring the Switch for Vendor-Proprietary RADIUS Server Communication, on page 1319

How to Configure RADIUS

Identifying the RADIUS Server Host
To apply these settings globally to all RADIUS servers communicating with the switch, use the three unique global configuration commands: radius-server timeout, radius-server retransmit, and radius-server key. To apply these values on a specific RADIUS server, use the radius-server host global configuration command.
You can configure the switch to use AAA server groups to group existing server hosts for authentication. For more information, see Related Topics below.
You also need to configure some settings on the RADIUS server. These settings include the IP address of the switch and the key string to be shared by both the server and the switch. For more information, see the RADIUS server documentation.

Before you begin
If you configure both global and per-server functions (timeout, retransmission, and key commands) on the switch, the per-server timer, retransmission, and key value commands override global timer, retransmission, and key value commands. For information on configuring these settings on all RADIUS servers, see Related Topics below.

SUMMARY STEPS

1. configure terminal 2. radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number] [timeout
seconds] [retransmit retries] [key string] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

radius-server host {hostname | ip-address} [auth-port Specifies the IP address or hostname of the remote RADIUS

port-number] [acct-port port-number] [timeout seconds] server host.

[retransmit retries] [key string]

· (Optional) For auth-port port-number, specify the

Example:

UDP destination port for authentication requests.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1308

Security

Identifying the RADIUS Server Host

Step 3

Command or Action
Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1

Purpose
· (Optional) For acct-port port-number, specify the UDP destination port for accounting requests.
· (Optional) For timeout seconds, specify the time interval that the switch waits for the RADIUS server to reply before resending. The range is 1 to 1000. This setting overrides the radius-server timeout global configuration command setting. If no timeout is set with the radius-server host command, the setting of the radius-server timeout command is used.

· (Optional) For retransmit retries, specify the number of times a RADIUS request is resent to a server if that server is not responding or responding slowly. The range is 1 to 1000. If no retransmit value is set with the radius-server host command, the setting of the radius-server retransmit global configuration command is used.

· (Optional) For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server.

Note The key is a text string that must match the encryption key used on the RADIUS server. Always configure the key as the last item in the radius-server host command. Leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks are part of the key.

end Example:

To configure the switch to recognize more than one host entry associated with a single IP address, enter this command as many times as necessary, making sure that each UDP port number is different. The switch software searches for hosts in the order in which you specify them. Set the timeout, retransmit, and encryption key values to use with the specific RADIUS host.
Returns to privileged EXEC mode.

Switch(config)# end

Related Topics RADIUS Server Host, on page 1305 Defining AAA Server Groups, on page 1312 Configuring Settings for All RADIUS Servers, on page 1317

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1309

Configuring RADIUS Login Authentication

Security

Configuring RADIUS Login Authentication
Beginning in privileged EXEC mode, follow these steps to configure RADIUS login authentication:

Before you begin
To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip http authentication aaa global configuration command. Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods.
For more information about the ip http authentication command, see the Cisco IOS Security Command Reference, Release 12.4.

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. aaa authentication login {default | list-name} method1 [method2...] 4. line [console | tty | vty] line-number [ending-line-number] 5. login authentication {default | list-name} 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA.

Step 3

aaa authentication login {default | list-name} method1 [method2...] Example:
Switch(config)# aaa authentication login default local

Creates a login authentication method list.
· To create a default list that is used when a named list is not specified in the login authentication command, use the default keyword followed by the methods that are to be used in default situations. The default method list is automatically applied to all ports.

· For list-name, specify a character string to name the list you are creating.

· For method1..., specify the actual method the authentication algorithm tries. The additional methods of authentication are used only if the previous method returns an error, not if it fails.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1310

Security

Configuring RADIUS Login Authentication

Command or Action

Purpose Select one of these methods:
· enable--Use the enable password for authentication. Before you can use this authentication method, you must define an enable password by using the enable password global configuration command.
· group radius--Use RADIUS authentication. Before you can use this authentication method, you must configure the RADIUS server.
· line--Use the line password for authentication. Before you can use this authentication method, you must define a line password. Use the password password line configuration command.
· local--Use the local username database for authentication. You must enter username information in the database. Use the username name password global configuration command.
· local-case--Use a case-sensitive local username database for authentication. You must enter username information in the database by using the username password global configuration command.
· none--Do not use any authentication for login.

Step 4

line [console | tty | vty] line-number [ending-line-number] Enters line configuration mode, and configure the lines to

Example:

which you want to apply the authentication list.

Switch(config)# line 1 4

Step 5

login authentication {default | list-name} Example:
Switch(config)# login authentication default

Step 6

end Example:
Switch(config)# end

Applies the authentication list to a line or set of lines. · If you specify default, use the default list created with the aaa authentication login command. · For list-name, specify the list created with the aaa authentication login command.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1311

Defining AAA Server Groups

Security

Related Topics RADIUS Login Authentication, on page 1306 RADIUS Server Host, on page 1305

Defining AAA Server Groups
You use the server group server configuration command to associate a particular server with a defined group server. You can either identify the server by its IP address or identify multiple host instances or entries by using the optional auth-port and acct-port keywords.
Beginning in privileged EXEC mode, follow these steps to define AAA server groups:

SUMMARY STEPS

1. configure terminal 2. radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number] [timeout
seconds] [retransmit retries] [key string] 3. aaa new-model 4. aaa group server radius group-name 5. server ip-address 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

radius-server host {hostname | ip-address} [auth-port Specifies the IP address or hostname of the remote RADIUS

port-number] [acct-port port-number] [timeout seconds] server host.

[retransmit retries] [key string]

· (Optional) For auth-port port-number, specify the

Example:

UDP destination port for authentication requests.

Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1

· (Optional) For acct-port port-number, specify the UDP destination port for accounting requests.
· (Optional) For timeout seconds, specify the time interval that the switch waits for the RADIUS server to reply before resending. The range is 1 to 1000. This setting overrides the radius-server timeout global configuration command setting. If no timeout is set with the radius-server host command, the setting of the radius-server timeout command is used.

· (Optional) For retransmit retries, specify the number of times a RADIUS request is resent to a server if that server is not responding or responding slowly. The

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1312

Security

Defining AAA Server Groups

Command or Action

Step 3

aaa new-model Example:
Switch(config)# aaa new-model

Purpose
range is 1 to 1000. If no retransmit value is set with the radius-server host command, the setting of the radius-server retransmit global configuration command is used.
· (Optional) For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server.
Note The key is a text string that must match the encryption key used on the RADIUS server. Always configure the key as the last item in the radius-server host command. Leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks are part of the key.
To configure the switch to recognize more than one host entry associated with a single IP address, enter this command as many times as necessary, making sure that each UDP port number is different. The switch software searches for hosts in the order in which you specify them. Set the timeout, retransmit, and encryption key values to use with the specific RADIUS host.
Enables AAA.

Step 4

aaa group server radius group-name Example:
Switch(config)# aaa group server radius group1

Defines the AAA server-group with a group name.
This command puts the switch in a server group configuration mode.

Step 5

server ip-address Example:
Switch(config-sg-radius)# server 172.20.0.1 auth-port 1000 acct-port 1001

Step 6

end Example:
Switch(config)# end

Associates a particular RADIUS server with the defined server group. Repeat this step for each RADIUS server in the AAA server group. Each server in the group must be previously defined in Step 2.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1313

Configuring RADIUS Authorization for User Privileged Access and Network Services

Security

Using Two Different RADIUS Group Servers
In this example, the switch is configured to recognize two different RADIUS group servers (group1 and group2). Group1 has two different host entries on the same RADIUS server configured for the same services. The second host entry acts as a fail-over backup to the first entry.
Switch(config)# radius-server host 172.20.0.1 auth-port 1000 acct-port 1001 Switch(config)# radius-server host 172.10.0.1 auth-port 1645 acct-port 1646 Switch(config)# aaa new-model Switch(config)# aaa group server radius group1 Switch(config-sg-radius)# server 172.20.0.1 auth-port 1000 acct-port 1001 Switch(config-sg-radius)# exit Switch(config)# aaa group server radius group2 Switch(config-sg-radius)# server 172.20.0.1 auth-port 2000 acct-port 2001 Switch(config-sg-radius)# exit
Related Topics Identifying the RADIUS Server Host, on page 1308 RADIUS Server Host, on page 1305 AAA Server Groups, on page 1306
Configuring RADIUS Authorization for User Privileged Access and Network Services

Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been configured.
Beginning in privileged EXEC mode, follow these steps to configure RADIUS authorization for user priviledged access and network services:

SUMMARY STEPS

1. configure terminal 2. aaa authorization network radius 3. aaa authorization exec radius 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1314

Security

Starting RADIUS Accounting

Step 2

Command or Action aaa authorization network radius Example:

Purpose
Configures the switch for user RADIUS authorization for all network-related service requests.

Switch(config)# aaa authorization network radius

Step 3

aaa authorization exec radius Example:
Switch(config)# aaa authorization exec radius

Configures the switch for user RADIUS authorization if the user has privileged EXEC access.
The exec keyword might return user profile information (such as autocommand information).

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

What to do next You can use the aaa authorization global configuration command with the radius keyword to set parameters that restrict a user's network access to privileged EXEC mode. The aaa authorization exec radius local command sets these authorization parameters:
· Use RADIUS for privileged EXEC access authorization if authentication was performed by using RADIUS.
· Use the local database if authentication was not performed by using RADIUS.
Related Topics AAA Authorization, on page 1307

Starting RADIUS Accounting
Beginning in privileged EXEC mode, follow these steps to start RADIUS accounting:

SUMMARY STEPS

1. configure terminal 2. aaa accounting network start-stop radius 3. aaa accounting exec start-stop radius 4. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1315

Establishing a Session with a Router if the AAA Server is Unreachable

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

aaa accounting network start-stop radius Example:

Enables RADIUS accounting for all network-related service requests.

Switch(config)# aaa accounting network start-stop radius

Step 3

aaa accounting exec start-stop radius
Example:
Switch(config)# aaa accounting exec start-stop radius

Enables RADIUS accounting to send a start-record accounting notice at the beginning of a privileged EXEC process and a stop-record at the end.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

What to do next
To establishing a session with a router if the AAA server is unreachable, use the aaa accounting system guarantee-first command. This command guarantees system accounting as the first record, which is the default condition. In some situations, users might be prevented from starting a session on the console or terminal connection until after the system reloads, which can take more than 3 minutes.
To establish a console or Telnet session with the router if the AAA server is unreachable when the router reloads, use the no aaa accounting system guarantee-first command.
Related Topics RADIUS Accounting, on page 1307
Establishing a Session with a Router if the AAA Server is Unreachable
The aaa accounting system guarantee-first command guarantees system accounting as the first record, which is the default condition. In some situations, users might be prevented from starting a session on the console or terminal connection until after the system reloads, which can take more than 3 minutes.
To establish a console or Telnet session with the router if the AAA server is unreachable when the router reloads, use the no aaa accounting system guarantee-first command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1316

Security

Configuring Settings for All RADIUS Servers

Configuring Settings for All RADIUS Servers
Beginning in privileged EXEC mode, follow these steps to configure settings for all RADIUS servers:

SUMMARY STEPS

1. configure terminal 2. radius-server key string 3. radius-server retransmit retries 4. radius-server timeout seconds 5. radius-server deadtime minutes 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

radius-server key string

Specifies the shared secret text string used between the

Example:

switch and all RADIUS servers.

Note The key is a text string that must match the

Switch(config)# radius-server key your_server_key

encryption key used on the RADIUS server.

Leading spaces are ignored, but spaces within

and at the end of the key are used. If you use

spaces in your key, do not enclose the key in

quotation marks unless the quotation marks are

part of the key.

radius-server retransmit retries Example:
Switch(config)# radius-server retransmit 5

Specifies the number of times the switch sends each RADIUS request to the server before giving up. The default is 3; the range 1 to 1000.

Step 4

radius-server timeout seconds Example:
Switch(config)# radius-server timeout 3

Specifies the number of seconds a switch waits for a reply to a RADIUS request before resending the request. The default is 5 seconds; the range is 1 to 1000.

Step 5

radius-server deadtime minutes Example:
Switch(config)# radius-server deadtime 0

When a RADIUS server is not responding to authentication requests, this command specifies a time to stop the request on that server. This avoids the wait for the request to timeout before trying the next configured server. The default is 0; the range is 1 to 1440 minutes.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1317

Configuring the Switch to Use Vendor-Specific RADIUS Attributes

Security

Step 6

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Related Topics Identifying the RADIUS Server Host, on page 1308 RADIUS Server Host, on page 1305

Configuring the Switch to Use Vendor-Specific RADIUS Attributes
Beginning in privileged EXEC mode, follow these steps to configure the switch to use vendor-specific RADIUS attributes:

SUMMARY STEPS

1. configure terminal 2. radius-server vsa send [accounting | authentication] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

radius-server vsa send [accounting | authentication] Example:
Switch(config)# radius-server vsa send
end Example:

Enables the switch to recognize and use VSAs as defined by RADIUS IETF attribute 26.
· (Optional) Use the accounting keyword to limit the set of recognized vendor-specific attributes to only accounting attributes.
· (Optional) Use the authentication keyword to limit the set of recognized vendor-specific attributes to only authentication attributes.
If you enter this command without keywords, both accounting and authentication vendor-specific attributes are used.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1318

Security

Configuring the Switch for Vendor-Proprietary RADIUS Server Communication

Command or Action
Switch(config)# end

Purpose

Related Topics Vendor-Specific RADIUS Attributes, on page 1307

Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
Beginning in privileged EXEC mode, follow these steps to configure the switch to use vendor-proprietary RADIUS server communication:

SUMMARY STEPS

1. configure terminal 2. radius-server host {hostname | ip-address} non-standard 3. radius-server key string 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

radius-server host {hostname | ip-address} non-standard Specifies the IP address or hostname of the remote RADIUS

Example:

server host and identifies that it is using a vendor-proprietary implementation of RADIUS.

Switch(config)# radius-server host 172.20.30.15 nonstandard

Step 3

radius-server key string Example:
Switch(config)# radius-server key rad124

Specifies the shared secret text string used between the switch and the vendor-proprietary RADIUS server. The switch and the RADIUS server use this text string to encrypt passwords and exchange responses.
Note The key is a text string that must match the encryption key used on the RADIUS server. Leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks are part of the key.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1319

Configuring CoA on the Switch

Security

Step 4

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

What to do next
This feature allows access and authentication requests to be evenly across all RADIUS servers in a server group. For more information, see the "RADIUS Server Load Balancing" chapter of the Cisco IOS Security Configuration Guide, Release 12.4.
Related Topics Vendor-Proprietary RADIUS Server Communication, on page 1307

Configuring CoA on the Switch
Beginning in privileged EXEC mode, follow these steps to configure CoA on a switch. This procedure is required.

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. aaa server radius dynamic-author 4. client {ip-address | name} [vrf vrfname] [server-key string] 5. server-key [0 | 7] string 6. port port-number 7. auth-type {any | all | session-key} 8. ignore session-key 9. ignore server-key 10. authentication command bounce-port ignore 11. authentication command disable-port ignore 12. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

aaa new-model Example:

Enables AAA.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1320

Security

Configuring CoA on the Switch

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action
Switch(config)# aaa new-model

Purpose

aaa server radius dynamic-author Example:

Configures the switch as an authentication, authorization, and accounting (AAA) server to facilitate interaction with an external policy server.

Switch(config)# aaa server radius dynamic-author

client {ip-address | name} [vrf vrfname] [server-key string]
server-key [0 | 7] string Example:
Switch(config-sg-radius)# server-key your_server_key

Enters dynamic authorization local server configuration mode and specifies a RADIUS client from which a device will accept CoA and disconnect requests.
Configures the RADIUS key to be shared between a device and RADIUS clients.

port port-number Example:
Switch(config-sg-radius)# port 25

Specifies the port on which a device listens for RADIUS requests from configured RADIUS clients.

auth-type {any | all | session-key} Example:
Switch(config-sg-radius)# auth-type any

Specifies the type of authorization the switch uses for RADIUS clients.
The client must match all the configured attributes for authorization.

ignore session-key
ignore server-key Example:
Switch(config-sg-radius)# ignore server-key

(Optional) Configures the switch to ignore the session-key.
For more information about the ignore command, see the Cisco IOS Intelligent Services Gateway Command Reference on Cisco.com.
(Optional) Configures the switch to ignore the server-key.
For more information about the ignore command, see the Cisco IOS Intelligent Services Gateway Command Reference on Cisco.com.

authentication command bounce-port ignore

(Optional) Configures the switch to ignore a CoA request

Example:

to temporarily disable the port hosting a session. The purpose of temporarily disabling the port is to trigger a

DHCP renegotiation from the host when a VLAN change

Switch(config-sg-radius)# bounce-port ignore

authentication

command

occurs and there is no supplicant on the endpoint to detect

the change.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1321

Configuring RADIUS Server Load Balancing

Security

Step 11 Step 12

Command or Action

Purpose

authentication command disable-port ignore

(Optional) Configures the switch to ignore a nonstandard

Example:

command requesting that the port hosting a session be administratively shut down. Shutting down the port results

in termination of the session.
Switch(config-sg-radius)# authentication command

disable-port ignore

Use standard CLI or SNMP commands to re-enable the

port.

end Example:

Returns to privileged EXEC mode.

Switch(config-sg-radius)# end

Configuring RADIUS Server Load Balancing
This feature allows access and authentication requests to be evenly across all RADIUS servers in a server group. For more information, see the "RADIUS Server Load Balancing" chapter of the Cisco IOS Security Configuration Guide, Release 12.4.

Monitoring CoA Functionality

Table 118: Privileged EXEC show Commands

Command

Purpose

show aaa attributes protocol radius Displays AAA attributes of RADIUS commands.

Table 119: Global Troubleshooting Commands

Command

Purpose

debug radius

Displays information for troubleshooting RADIUS.

debug aaa coa

Displays information for troubleshooting CoA processing.

debug aaa pod

Displays information for troubleshooting POD packets.

debug aaa subsys

Displays information for troubleshooting POD packets.

debug cmdhd [detail | error | events] Displays information for troubleshooting command headers.

For detailed information about the fields in these displays, see the command reference for this release.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1322

Security

Configuration Examples for Controlling Switch Access with RADIUS

Configuration Examples for Controlling Switch Access with RADIUS
Examples: Identifying the RADIUS Server Host
This example shows how to configure one RADIUS server to be used for authentication and another to be used for accounting:
Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1 Switch(config)# radius-server host 172.20.36.50 acct-port 1618 key rad2
This example shows how to configure host1 as the RADIUS server and to use the default ports for both authentication and accounting:
Switch(config)# radius-server host host1
Examples: Configuring the Switch to Use Vendor-Specific RADIUS Attributes
For example, this AV pair activates Cisco's multiple named ip address pools feature during IP authorization (during PPP IPCP address assignment):
cisco-avpair= "ip:addr-pool=first"
This example shows how to provide a user logging in from a switch with immediate access to privileged EXEC commands:
cisco-avpair= "shell:priv-lvl=15"
This example shows how to specify an authorized VLAN in the RADIUS server database:
cisco-avpair= "tunnel-type(#64)=VLAN(13)" cisco-avpair= "tunnel-medium-type(#65)=802 media(6)" cisco-avpair= "tunnel-private-group-id(#81)=vlanid"
This example shows how to apply an input ACL in ASCII format to an interface for the duration of this connection:
cisco-avpair= "ip:inacl#1=deny ip 10.10.10.10 0.0.255.255 20.20.20.20 255.255.0.0" cisco-avpair= "ip:inacl#2=deny ip 10.10.10.10 0.0.255.255 any" cisco-avpair= "mac:inacl#3=deny any any decnet-iv"
This example shows how to apply an output ACL in ASCII format to an interface for the duration of this connection:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1323

Example: Configuring the Switch for Vendor-Proprietary RADIUS Server Communication

Security

cisco-avpair= "ip:outacl#2=deny ip 10.10.10.10 0.0.255.255 any"
Example: Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
This example shows how to specify a vendor-proprietary RADIUS host and to use a secret key of rad124 between the switch and the server:
Switch(config)# radius-server host 172.20.30.15 nonstandard Switch(config)# radius-server key rad124

Additional References

Related Documents

Related Document Title Topic

Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity Control

http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html

policies

and

Identity

Service

templates

for Session

Aware

networking.

Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

RADIUS, TACACS+,

http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra

Secure

Shell,

802.1X

and AAA.

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1324

Security

Feature Information for RADIUS

Standards and RFCs Standard/RFC Title

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for RADIUS
Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1325

Feature Information for RADIUS

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1326

6 5 C H A P T E R
Configuring Kerberos
· Finding Feature Information, on page 1327 · Prerequisites for Controlling Switch Access with Kerberos, on page 1327 · Restrictions for Controlling Switch Access with Kerberos, on page 1328 · Information about Kerberos, on page 1328 · How to Configure Kerberos, on page 1331 · Monitoring the Kerberos Configuration, on page 1331 · Additional References, on page 1332 · Feature Information for Kerberos, on page 1333
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Controlling Switch Access with Kerberos
The following are the prerequisites for controlling switch access with Kerberos. · So that remote users can authenticate to network services, you must configure the hosts and the KDC in the Kerberos realm to communicate and mutually authenticate users and network services. To do this, you must identify them to each other. You add entries for the hosts to the Kerberos database on the KDC and add KEYTAB files generated by the KDC to all hosts in the Kerberos realm. You also create entries for the users in the KDC database. · A Kerberos server can be a switch that is configured as a network security server and that can authenticate users by using the Kerberos protocol.
When you add or create entries for the hosts and users, follow these guidelines: · The Kerberos principal name must be in all lowercase characters. · The Kerberos instance name must be in all lowercase characters.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1327

Restrictions for Controlling Switch Access with Kerberos

Security

· The Kerberos realm name must be in all uppercase characters.
Restrictions for Controlling Switch Access with Kerberos
The following lists any restrictions for controlling switch access with Kerberos.
Information about Kerberos
This section provides Kerberos information.
Kerberos and Switch Access
This section describes how to enable and configure the Kerberos security system, which authenticates requests for network resources by using a trusted third party. For Kerberos configuration examples, see the "Kerberos Configuration Examples" section in the "Security Server Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.4.. For complete syntax and usage information for the commands used in this section, see the "Kerberos Commands" section in the "Security Server Protocols" chapter of the Cisco IOS Security Command Reference, Release 12.4.
Note In the Kerberos configuration examples and in the Cisco IOS Security Command Reference, Release 12.4, the trusted third party can be a switch that supports Kerberos, that is configured as a network security server, and that can authenticate users by using the Kerberos protocol.
Kerberos Overview
Kerberos is a secret-key network authentication protocol, which was developed at the Massachusetts Institute of Technology (MIT). It uses the Data Encryption Standard (DES) cryptographic algorithm for encryption and authentication and authenticates requests for network resources. Kerberos uses the concept of a trusted third party to perform secure verification of users and services. This trusted third party is called the key distribution center (KDC). Kerberos verifies that users are who they claim to be and the network services that they use are what the services claim to be. To do this, a KDC or trusted Kerberos server issues tickets to users. These tickets, which have a limited life span, are stored in user credential caches. The Kerberos server uses the tickets instead of user names and passwords to authenticate users and network services.
Note A Kerberos server can be a switch that is configured as a network security server and that can authenticate users by using the Kerberos protocol.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1328

Security

Kerberos Overview

The Kerberos credential scheme uses a process called single logon. This process authenticates a user once and then allows secure authentication (without encrypting another password) wherever that user credential is accepted.
This software release supports Kerberos 5, which allows organizations that are already using Kerberos 5 to use the same Kerberos authentication database on the KDC that they are already using on their other network hosts (such as UNIX servers and PCs).
In this software release, Kerberos supports these network services:
· Telnet
· rlogin
· rsh

This table lists the common Kerberos-related terms and definitions.
Table 120: Kerberos Terms

Term

Definition

Authentication A process by which a user or service identifies itself to another service. For example, a client can authenticate to a switch or a switch can authenticate to another switch.

Authorization Credential

A means by which the switch identifies what privileges the user has in a network or on the switch and what actions the user can perform.
A general term that refers to authentication tickets, such as TGTs11 and service credentials. Kerberos credentials verify the identity of a user or service. If a network service decides to trust the Kerberos server that issued a ticket, it can be used in place of re-entering a username and password. Credentials have a default life span of eight hours.

Instance

An authorization level label for Kerberos principals. Most Kerberos principals are of the form user@REALM (for example, smith@EXAMPLE.COM). A Kerberos principal with a Kerberos instance has the form user/instance@REALM (for example, smith/admin@EXAMPLE.COM). The Kerberos instance can be used to specify the authorization level for the user if authentication is successful. The server of each network service might implement and enforce the authorization mappings of Kerberos instances but is not required to do so.
Note The Kerberos principal and instance names must be in all lowercase characters.

Note The Kerberos realm name must be in all uppercase characters.

KDC12

Key distribution center that consists of a Kerberos server and database program that is running on a network host.

Kerberized

A term that describes applications and services that have been modified to support the Kerberos credential infrastructure.

Kerberos realm A domain consisting of users, hosts, and network services that are registered to a Kerberos server. The Kerberos server is trusted to verify the identity of a user or network service to another user or network service.
Note The Kerberos realm name must be in all uppercase characters.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1329

Kerberos Operation

Security

Term

Definition

Kerberos server A daemon that is running on a network host. Users and network services register their identity with the Kerberos server. Network services query the Kerberos server to authenticate to other network services.

KEYTAB13

A password that a network service shares with the KDC. In Kerberos 5 and later Kerberos
versions, the network service authenticates an encrypted service credential by using the
KEYTAB to decrypt it. In Kerberos versions earlier than Kerberos 5, KEYTAB is referred to as SRVTAB14.

Principal

Also known as a Kerberos identity, this is who you are or what a service is according to the Kerberos server.
Note The Kerberos principal name must be in all lowercase characters.

Service credential

A credential for a network service. When issued from the KDC, this credential is encrypted with the password shared by the network service and the KDC. The password is also shared with the user TGT.

SRVTAB

A password that a network service shares with the KDC. In Kerberos 5 or later Kerberos versions, SRVTAB is referred to as KEYTAB.

TGT

Ticket granting ticket that is a credential that the KDC issues to authenticated users. When

users receive a TGT, they can authenticate to network services within the Kerberos realm

represented by the KDC.

11 ticket granting ticket 12 key distribution center 13 key table 14 server table

Kerberos Operation
A Kerberos server can be a switch that is configured as a network security server and that can authenticate remote users by using the Kerberos protocol. Although you can customize Kerberos in a number of ways, remote users attempting to access network services must pass through three layers of security before they can access network services.
To authenticate to network services by using a switch as a Kerberos server, remote users must follow these steps:
1. Authenticating to a Boundary Switch, on page 1330
2. Obtaining a TGT from a KDC, on page 1331
3. Authenticating to Network Services, on page 1331

Authenticating to a Boundary Switch
This section describes the first layer of security through which a remote user must pass. The user must first authenticate to the boundary switch. This process then occurs:
1. The user opens an un-Kerberized Telnet connection to the boundary switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1330

Security

Obtaining a TGT from a KDC

2. The switch prompts the user for a username and password. 3. The switch requests a TGT from the KDC for this user. 4. The KDC sends an encrypted TGT that includes the user identity to the switch. 5. The switch attempts to decrypt the TGT by using the password that the user entered.
· If the decryption is successful, the user is authenticated to the switch. · If the decryption is not successful, the user repeats Step 2 either by re-entering the username and
password (noting if Caps Lock or Num Lock is on or off) or by entering a different username and password.
A remote user who initiates a un-Kerberized Telnet session and authenticates to a boundary switch is inside the firewall, but the user must still authenticate directly to the KDC before getting access to the network services. The user must authenticate to the KDC because the TGT that the KDC issues is stored on the switch and cannot be used for additional authentication until the user logs on to the switch.
Obtaining a TGT from a KDC
This section describes the second layer of security through which a remote user must pass. The user must now authenticate to a KDC and obtain a TGT from the KDC to access network services. For instructions about how to authenticate to a KDC, see the "Obtaining a TGT from a KDC" section in the "Security Server Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.4.
Authenticating to Network Services
This section describes the third layer of security through which a remote user must pass. The user with a TGT must now authenticate to the network services in a Kerberos realm. For instructions about how to authenticate to a network service, see the "Authenticating to Network Services" section in the "Security Server Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.4.
How to Configure Kerberos
To set up a Kerberos-authenticated server-client system, follow these steps: · Configure the KDC by using Kerberos commands. · Configure the switch to use the Kerberos protocol.
For instructions, see the "Kerberos Configuration Task List" section in the "Security Server Protocols" chapter of the Cisco IOS Security Configuration Guide, Release 12.4.
Monitoring the Kerberos Configuration
To display the Kerberos configuration, use the show running-config privileged EXEC command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1331

Additional References

Security

Additional References

Related Documents

Related Document Title Topic

Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity Control

http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html

policies

and

Identity

Service

templates

for Session

Aware

networking.

Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

RADIUS, TACACS+,

http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra

Secure

Shell,

802.1X

and AAA.

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1332

Security

Feature Information for Kerberos

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for Kerberos
Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1333

Feature Information for Kerberos

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1334

6 6 C H A P T E R
Configuring Local Authentication and Authorization
· Finding Feature Information, on page 1335 · How to Configure Local Authentication and Authorization, on page 1335 · Monitoring Local Authentication and Authorization, on page 1337 · Additional References, on page 1337 · Feature Information for Local Authentication and Authorization, on page 1338
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
How to Configure Local Authentication and Authorization
Configuring the Switch for Local Authentication and Authorization
You can configure AAA to operate without a server by setting the switch to implement AAA in local mode. The switch then handles authentication and authorization. No accounting is available in this configuration.
Note To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip http authentication aaa global configuration command. Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods. Beginning in privileged EXEC mode, follow these steps to configure AAA to operate without a server by setting the switch to implement AAA in local mode:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1335

Configuring the Switch for Local Authentication and Authorization

Security

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. aaa authentication login default local 4. aaa authorization exec local 5. aaa authorization network local 6. username name [privilege level] {password encryption-type password} 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA.

Step 3

aaa authentication login default local Example:

Sets the login authentication to use the local username database. The default keyword applies the local user database authentication to all ports.

Switch(config)# aaa authentication login default local

Step 4

aaa authorization exec local Example:
Switch(config)# aaa authorization exec local

Configures user AAA authorization, check the local database, and allow the user to run an EXEC shell.

Step 5

aaa authorization network local Example:

Configures user AAA authorization for all network-related service requests.

Switch(config)# aaa authorization network local

Step 6

username name [privilege level] {password encryption-type password}

Enters the local database, and establishes a username-based authentication system.

Example:

Repeat this command for each user.

· For name, specify the user ID as one word. Spaces and

Switch(config)# username your_user_name privilege

quotation marks are not allowed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1336

Security

Monitoring Local Authentication and Authorization

Command or Action
1 password 7 secret567

Step 7

end Example:
Switch(config)# end

Purpose · (Optional) For level, specify the privilege level the user has after gaining access. The range is 0 to 15. Level 15 gives privileged EXEC mode access. Level 0 gives user EXEC mode access.
· For encryption-type, enter 0 to specify that an unencrypted password follows. Enter 7 to specify that a hidden password follows.
· For password, specify the password the user must enter to gain access to the switch. The password must be from 1 to 25 characters, can contain embedded spaces, and must be the last option specified in the username command.
Returns to privileged EXEC mode.

Related Topics Setting Up the Switch to Run SSH, on page 1343 SSH Configuration Guidelines, on page 1341

Monitoring Local Authentication and Authorization
To display Local Authentication and Authorization configuration, use the show running-config privileged EXEC command.

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1337

Feature Information for Local Authentication and Authorization

Security

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for Local Authentication and Authorization

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1338

6 7 C H A P T E R
Configuring Secure Shell (SSH)
· Finding Feature Information, on page 1339 · Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP), on
page 1339 · Restrictions for Configuring the Switch for SSH, on page 1340 · Information about SSH, on page 1340 · How to Configure SSH, on page 1343 · Monitoring the SSH Configuration and Status, on page 1346 · Additional References, on page 1346 · Feature Information for SSH, on page 1347
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP)
The following are the prerequisites for configuring the switch for secure shell (SSH): · For SSH to work, the switch needs an RSA public/private key pair. This is the same with Secure Copy Protocol (SCP), which relies on SSH for its secure transport. · Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch. · Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman (RSA) key pair. · SCP relies on SSH for security.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1339

Restrictions for Configuring the Switch for SSH

Security

· SCP requires that authentication, authorization, and accounting (AAA) authorization be configured so the router can determine whether the user has the correct privilege level.
· A user must have appropriate authorization to use SCP. · A user who has appropriate authorization can use SCP to copy any file in the Cisco IOS File System
(IFS) to and from a switch by using the copy command. An authorized administrator can also do this from a workstation.
Related Topics Secure Copy Protocol Concepts, on page 1342
Restrictions for Configuring the Switch for SSH
The following are restrictions for configuring the switch for secure shell. · The switch supports Rivest, Shamir, and Adelman (RSA) authentication. · SSH supports only the execution-shell application. · The SSH server and the SSH client are supported only on DES (56-bit) and 3DES (168-bit) data encryption software. · The switch supports the Advanced Encryption Standard (AES) encryption algorithm with a 128-bit key, 192-bit key, or 256-bit key. However, symmetric cipher AES to encrypt the keys is not supported. · This software release does not support IP Security (IPSec). · When using SCP, you cannot enter the password into the copy command. You must enter the password when prompted.
Related Topics Secure Copy Protocol Concepts, on page 1342
Information about SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. SSH provides more security for remote connections than Telnet does by providing strong encryption when a device is authenticated. This software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2).
SSH and Switch Access
For SSH configuration examples, see the "SSH Configuration Examples" section in the "Configuring Secure Shell" section in the "Other Security Features" chapter of the Cisco IOS Security Configuration Guide, Cisco IOS Release 12.4. SSH functions the same in IPv6 as in IPv4. For IPv6, SSH supports IPv6 addresses and enables secure, encrypted connections with remote IPv6 nodes over an IPv6 transport.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1340

Security

SSH Servers, Integrated Clients, and Supported Versions

Note For complete syntax and usage information for the commands used in this section, see the command reference for this release and the "Secure Shell Commands" section of the "Other Security Features" chapter of the Cisco IOS Security Command Reference, Release 12.4 and the Cisco IOS IPv6 Command Reference.
SSH Servers, Integrated Clients, and Supported Versions
The SSH feature has an SSH server and an SSH integrated client, which are applications that run on the switch. You can use an SSH client to connect to a switch running the SSH server. The SSH server works with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works with the SSH server supported in this release and with non-Cisco SSH servers. The switch supports an SSHv1 or an SSHv2 server. The switch supports an SSHv1 client. SSH supports the Data Encryption Standard (DES) encryption algorithm, the Triple DES (3DES) encryption algorithm, and password-based user authentication. SSH also supports these user authentication methods:
· TACACS+ · RADIUS · Local authentication and authorization
Related Topics Configuring the Switch for Local Authentication and Authorization, on page 1335 TACACS+ and Switch Access, on page 1281 RADIUS and Switch Access, on page 1296
SSH Configuration Guidelines
Follow these guidelines when configuring the switch as an SSH server or SSH client: · An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server, and the reverse. · If the SSH server is running on a stack master and the stack master fails, the new stack master uses the RSA key pair generated by the previous stack master. · If you get CLI error messages after entering the crypto key generate rsa global configuration command, an RSA key pair has not been generated. Reconfigure the hostname and domain, and then enter the crypto key generate rsa command. For more information, see Related Topics below. · When generating the RSA key pair, the message No host name specified might appear. If it does, you must configure a hostname by using the hostname global configuration command. · When generating the RSA key pair, the message No domain specified might appear. If it does, you must configure an IP domain name by using the ip domain-name global configuration command. · When configuring the local authentication and authorization authentication method, make sure that AAA is disabled on the console.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1341

Secure Copy Protocol Overview

Security

Related Topics Setting Up the Switch to Run SSH, on page 1343 Configuring the Switch for Local Authentication and Authorization, on page 1335
Secure Copy Protocol Overview
The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch configurations or switch image files. SCP relies on Secure Shell (SSH), an application and a protocol that provides a secure replacement for the Berkeley r-tools. For SSH to work, the switch needs an RSA public/private key pair. This is the same with SCP, which relies on SSH for its secure transport. Because SSH also relies on AAA authentication, and SCP relies further on AAA authorization, correct configuration is necessary.
· Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch.
· Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman (RSA) key pair.
Note When using SCP, you cannot enter the password into the copy command. You must enter the password when prompted.
Secure Copy Protocol Concepts
The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch configurations or switch image files. SCP relies on Secure Shell (SSH), an application and a protocol that provides a secure replacement for the Berkeley r-tools. To configure the Secure Copy feature, you should understand the SCP concepts. The behavior of SCP is similar to that of remote copy (rcp), which comes from the Berkeley r-tools suite, except that SCP relies on SSH for security. SCP also requires that authentication, authorization, and accounting (AAA) authorization be configured so the router can determine whether the user has the correct privilege level. For information about how to configure and verify SCP, see the "Secure Copy Protocol" section in the Cisco IOS Security Configuration Guide: Securing User Services, Release 12.4. Related Topics
Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP), on page 1339 Restrictions for Configuring the Switch for SSH, on page 1340

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1342

Security

How to Configure SSH

How to Configure SSH

Setting Up the Switch to Run SSH
Beginning in privileged EXEC mode, follow these steps to set up your switch to run SSH:

Before you begin
Configure user authentication for local or remote access. This step is required. For more information, see Related Topics below.

SUMMARY STEPS

1. configure terminal 2. hostname hostname 3. ip domain-name domain_name 4. crypto key generate rsa 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

hostname hostname Example:
Switch(config)# hostname your_hostname

Configures a hostname and IP domain name for your switch.
Note Follow this procedure only if you are configuring the switch as an SSH server.

Step 3

ip domain-name domain_name Example:
Switch(config)# ip domain-name your_domain

Configures a host domain for your switch.

Step 4

crypto key generate rsa Example:
Switch(config)# crypto key generate rsa

Enables the SSH server for local and remote authentication on the switch and generates an RSA key pair. Generating an RSA key pair for the switch automatically enables SSH.
We recommend that a minimum modulus size of 1024 bits.
When you generate RSA keys, you are prompted to enter a modulus length. A longer modulus length might be more secure, but it takes longer to generate and to use.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1343

Configuring the SSH Server

Security

Command or Action

Step 5

end Example:
Switch(config)# end

Purpose Note Follow this procedure only if you are configuring
the switch as an SSH server.
Returns to privileged EXEC mode.

Related Topics SSH Configuration Guidelines, on page 1341 Configuring the Switch for Local Authentication and Authorization, on page 1335
Configuring the SSH Server
Beginning in privileged EXEC mode, follow these steps to configure the SSH server:

Note This procedure is only required if you are configuring the switch as an SSH server.

SUMMARY STEPS

1. configure terminal 2. ip ssh version [1 | 2] 3. ip ssh {timeout seconds | authentication-retries number} 4. Use one or both of the following:
· line vtyline_number[ending_line_number] · transport input ssh
5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip ssh version [1 | 2] Example:
Switch(config)# ip ssh version 1

(Optional) Configures the switch to run SSH Version 1 or SSH Version 2.
· 1--Configure the switch to run SSH Version 1.
· 2--Configure the switch to run SSH Version 2.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1344

Security

Configuring the SSH Server

Step 3 Step 4

Command or Action

Purpose
If you do not enter this command or do not specify a keyword, the SSH server selects the latest SSH version supported by the SSH client. For example, if the SSH client supports SSHv1 and SSHv2, the SSH server selects SSHv2.

ip ssh {timeout seconds | authentication-retries number} Configures the SSH control parameters:

Example:
Switch(config)# ip ssh timeout 90 authentication-retries 2

· Specify the time-out value in seconds; the default is 120 seconds. The range is 0 to 120 seconds. This parameter applies to the SSH negotiation phase. After the connection is established, the switch uses the default time-out values of the CLI-based sessions.

By default, up to five simultaneous, encrypted SSH connections for multiple CLI-based sessions over the network are available (session 0 to session 4). After the execution shell starts, the CLI-based session time-out value returns to the default of 10 minutes.

· Specify the number of times that a client can re-authenticate to the server. The default is 3; the range is 0 to 5.

Use one or both of the following: · line vtyline_number[ending_line_number] · transport input ssh
Example:
Switch(config)# line vty 1 10
or
Switch(config-line)# transport input ssh

Repeat this step when configuring both parameters.
(Optional) Configures the virtual terminal line settings.
· Enters line configuration mode to configure the virtual terminal line settings. For line_number and ending_line_number, specify a pair of lines. The range is 0 to 15.
· Specifies that the switch prevent non-SSH Telnet connections. This limits the router to only SSH connections.

Step 5

end Example:
Switch(config-line)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1345

Monitoring the SSH Configuration and Status

Security

Monitoring the SSH Configuration and Status
This table displays the SSH server configuration and status.
Table 121: Commands for Displaying the SSH Server Configuration and Status
Command Purpose show ip Shows the version and configuration information for the SSH server. ssh show ssh Shows the status of the SSH server.
For more information about these commands, see the "Secure Shell Commands" section in the "Other Security Features" chapter of the Cisco IOS Security Command Reference .

Additional References

Related Documents

Related Document Title Topic

Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity Control

http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html

policies

and

Identity

Service

templates

for Session

Aware

networking.

Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

RADIUS, TACACS+,

http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra

Secure

Shell,

802.1X

and AAA.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1346

Security

Feature Information for SSH

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for SSH
Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1347

Feature Information for SSH

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1348

6 8 C H A P T E R
Configuring Secure Socket Layer HTTP
· Finding Feature Information, on page 1349 · Information about Secure Sockets Layer (SSL) HTTP, on page 1349 · Secure HTTP Servers and Clients Overview, on page 1352 · How to Configure Secure HTTP Servers and Clients, on page 1352 · How to Configure Secure HTTP Servers and Clients, on page 1359 · Monitoring Secure HTTP Server and Client Status, on page 1359 · Additional References, on page 1359 · Feature Information for SSL HTTP, on page 1360
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information about Secure Sockets Layer (SSL) HTTP
This section describes how to configure Secure Sockets Layer (SSL) Version 3.0 support for the HTTP 1.1 server and client. SSL provides server authentication, encryption, and message integrity, as well as HTTP client authentication, to allow secure HTTP communications.
Note SSL evolved into Transport Layer Security (TLS) in 1999, but is still used in this particular context.
On a secure HTTP connection, data to and from an HTTP server is encrypted before being sent over the Internet. HTTP with SSL encryption provides a secure connection to allow such functions as configuring a switch from a Web browser. Cisco's implementation of the secure HTTP server and secure HTTP client uses an implementation of SSL Version 3.0 with application-layer encryption. HTTP over SSL is abbreviated as HTTPS; the URL of a secure connection begins with https:// instead of http://.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1349

Certificate Authority Trustpoints

Security

The primary role of the HTTP secure server (the switch) is to listen for HTTPS requests on a designated port (the default HTTPS port is 443) and pass the request to the HTTP 1.1 Web server. The HTTP 1.1 server processes requests and passes responses (pages) back to the HTTP secure server, which, in turn, responds to the original request.
The primary role of the HTTP secure client (the web browser) is to respond to Cisco IOS application requests for HTTPS User Agent services, perform HTTPS User Agent services for the application, and pass the response back to the application.
For configuration examples and complete syntax and usage information for the commands used in this section, see the "HTTPS - HTTP Server and Client with SSL 3.0" feature description for Cisco IOS Release 12.2(15)T.
Certificate Authority Trustpoints
Certificate authorities (CAs) manage certificate requests and issue certificates to participating network devices. These services provide centralized security key and certificate management for the participating devices. Specific CA servers are referred to as trustpoints.
When a connection attempt is made, the HTTPS server provides a secure connection by issuing a certified X.509v3 certificate, obtained from a specified CA trustpoint, to the client. The client (usually a Web browser), in turn, has a public key that allows it to authenticate the certificate.
For secure HTTP connections, we highly recommend that you configure a CA trustpoint. If a CA trustpoint is not configured for the device running the HTTPS server, the server certifies itself and generates the needed RSA key pair. Because a self-certified (self-signed) certificate does not provide adequate security, the connecting client generates a notification that the certificate is self-certified, and the user has the opportunity to accept or reject the connection. This option is useful for internal network topologies (such as testing).
If you do not configure a CA trustpoint, when you enable a secure HTTP connection, either a temporary or a persistent self-signed certificate for the secure HTTP server (or client) is automatically generated.
· If the switch is not configured with a hostname and a domain name, a temporary self-signed certificate is generated. If the switch reboots, any temporary self-signed certificate is lost, and a new temporary new self-signed certificate is assigned.
· If the switch has been configured with a host and domain name, a persistent self-signed certificate is generated. This certificate remains active if you reboot the switch or if you disable the secure HTTP server so that it will be there the next time you re-enable a secure HTTP connection.
Note The certificate authorities and trustpoints must be configured on each device individually. Copying them from other devices makes them invalid on the switch.
If a self-signed certificate has been generated, this information is included in the output of the show running-config privileged EXEC command. This is a partial sample output from that command displaying a self-signed certificate.
Switch# show running-config Building configuration...
<output truncated>
crypto pki trustpoint TP-self-signed-3080755072 enrollment selfsigned

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1350

Security

CipherSuites

subject-name cn=IOS-Self-Signed-Certificate-3080755072 revocation-check none rsakeypair TP-self-signed-3080755072 ! ! crypto ca certificate chain TP-self-signed-3080755072 certificate self-signed 01
3082029F 30820208 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 59312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 33303830 37353530 37323126 30240609 2A864886 F70D0109 02161743 45322D33 3535302D 31332E73 756D6D30 342D3335 3530301E 170D3933 30333031 30303030 35395A17 0D323030 31303130 30303030 305A3059 312F302D
<output truncated>
You can remove this self-signed certificate by disabling the secure HTTP server and entering the no crypto pki trustpoint TP-self-signed-30890755072 global configuration command. If you later re-enable a secure HTTP server, a new self-signed certificate is generated.
Note The values that follow TP self-signed depend on the serial number of the device.
You can use an optional command (ip http secure-client-auth) to allow the HTTPS server to request an X.509v3 certificate from the client. Authenticating the client provides more security than server authentication by itself.
For additional information on Certificate Authorities, see the "Configuring Certification Authority Interoperability" chapter in the Cisco IOS Security Configuration Guide, Release 12.4.
CipherSuites
A CipherSuite specifies the encryption algorithm and the digest algorithm to use on a SSL connection. When connecting to the HTTPS server, the client Web browser offers a list of supported CipherSuites, and the client and server negotiate the best encryption algorithm to use from those on the list that are supported by both. For example, Netscape Communicator 4.76 supports U.S. security with RSA Public Key Cryptography, MD2, MD5, RC2-CBC, RC4, DES-CBC, and DES-EDE3-CBC.
For the best possible encryption, you should use a client browser that supports 128-bit encryption, such as Microsoft Internet Explorer Version 5.5 (or later) or Netscape Communicator Version 4.76 (or later). The SSL_RSA_WITH_DES_CBC_SHA CipherSuite provides less security than the other CipherSuites, as it does not offer 128-bit encryption.
The more secure and more complex CipherSuites require slightly more processing time. This list defines the CipherSuites supported by the switch and ranks them from fastest to slowest in terms of router processing load (speed):
1. SSL_RSA_WITH_DES_CBC_SHA--RSA key exchange (RSA Public Key Cryptography) with DES-CBC for message encryption and SHA for message digest
2. SSL_RSA_WITH_RC4_128_MD5--RSA key exchange with RC4 128-bit encryption and MD5 for message digest
3. SSL_RSA_WITH_RC4_128_SHA--RSA key exchange with RC4 128-bit encryption and SHA for message digest

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1351

Default SSL Configuration

Security

4. SSL_RSA_WITH_3DES_EDE_CBC_SHA--RSA key exchange with 3DES and DES-EDE3-CBC for message encryption and SHA for message digest
RSA (in conjunction with the specified encryption and digest algorithm combinations) is used for both key generation and authentication on SSL connections. This usage is independent of whether or not a CA trustpoint is configured.
Default SSL Configuration
The standard HTTP server is enabled. SSL is enabled. No CA trustpoints are configured. No self-signed certificates are generated.
SSL Configuration Guidelines
When SSL is used in a switch cluster, the SSL session terminates at the cluster commander. Cluster member switches must run standard HTTP. Before you configure a CA trustpoint, you should ensure that the system clock is set. If the clock is not set, the certificate is rejected due to an incorrect date. In a switch stack, the SSL session terminates at the stack master.
Secure HTTP Servers and Clients Overview
On a secure HTTP connection, data to and from an HTTP server is encrypted before being sent over the Internet. HTTP with SSL encryption provides a secure connection to allow such functions as configuring a switch from a Web browser. Cisco's implementation of the secure HTTP server and secure HTTP client uses an implementation of SSL Version 3.0 with application-layer encryption. HTTP over SSL is abbreviated as HTTPS; the URL of a secure connection begins with https:// instead of http://. The primary role of the HTTP secure server (the switch) is to listen for HTTPS requests on a designated port (the default HTTPS port is 443) and pass the request to the HTTP 1.1 Web server. The HTTP 1.1 server processes requests and passes responses (pages) back to the HTTP secure server, which, in turn, responds to the original request. The primary role of the HTTP secure client (the web browser) is to respond to Cisco IOS application requests for HTTPS User Agent services, perform HTTPS User Agent services for the application, and pass the response back to the application.
How to Configure Secure HTTP Servers and Clients
Configuring a CA Trustpoint
For secure HTTP connections, we recommend that you configure an official CA trustpoint. A CA trustpoint is more secure than a self-signed certificate.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1352

Security

Configuring a CA Trustpoint

Beginning in privileged EXEC mode, follow these steps to configure a CA Trustpoint:

SUMMARY STEPS

1. configure terminal 2. hostname hostname 3. ip domain-name domain-name 4. crypto key generate rsa 5. crypto ca trustpoint name 6. enrollment url url 7. enrollment http-proxy host-name port-number 8. crl query url 9. primary name 10. exit 11. crypto ca authentication name 12. crypto ca enroll name 13. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

hostname hostname Example:
Switch(config)# hostname your_hostname

Specifies the hostname of the switch (required only if you have not previously configured a hostname). The hostname is required for security keys and certificates.

Step 3

ip domain-name domain-name Example:
Switch(config)# ip domain-name your_domain

Specifies the IP domain name of the switch (required only if you have not previously configured an IP domain name). The domain name is required for security keys and certificates.

Step 4

crypto key generate rsa Example:
Switch(config)# crypto key generate rsa

(Optional) Generates an RSA key pair. RSA key pairs are required before you can obtain a certificate for the switch. RSA key pairs are generated automatically. You can use this command to regenerate the keys, if needed.

Step 5

crypto ca trustpoint name Example:

Specifies a local configuration name for the CA trustpoint and enter CA trustpoint configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1353

Configuring a CA Trustpoint

Security

Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12

Command or Action
Switch(config)# crypto ca trustpoint your_trustpoint

Purpose

enrollment url url Example:
Switch(ca-trustpoint)# enrollment url http://your_server:80

Specifies the URL to which the switch should send certificate requests.

enrollment http-proxy host-name port-number Example:
Switch(ca-trustpoint)# enrollment http-proxy your_host 49

(Optional) Configures the switch to obtain certificates from the CA through an HTTP proxy server.
· For host-name , specify the proxy server used to get the CA.
· For port-number, specify the port number used to access the CA.

crl query url
Example:
Switch(ca-trustpoint)# crl query ldap://your_host:49

Configures the switch to request a certificate revocation list (CRL) to ensure that the certificate of the peer has not been revoked.

primary name Example:
Switch(ca-trustpoint)# primary your_trustpoint

(Optional) Specifies that the trustpoint should be used as the primary (default) trustpoint for CA requests.
· For name, specify the trustpoint that you just configured.

exit Example:
Switch(ca-trustpoint)# exit

Exits CA trustpoint configuration mode and return to global configuration mode.

crypto ca authentication name Example:
Switch(config)# crypto ca authentication your_trustpoint

Authenticates the CA by getting the public key of the CA. Use the same name used in Step 5.

crypto ca enroll name Example:

Obtains the certificate from the specified CA trustpoint. This command requests a signed certificate for each RSA key pair.

Switch(config)# crypto ca enroll your_trustpoint

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1354

Security

Configuring the Secure HTTP Server

Step 13

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Configuring the Secure HTTP Server
Beginning in privileged EXEC mode, follow these steps to configure a secure HTTP server:
Before you begin If you are using a certificate authority for certification, you should use the previous procedure to configure the CA trustpoint on the switch before enabling the HTTP server. If you have not configured a CA trustpoint, a self-signed certificate is generated the first time that you enable the secure HTTP server. After you have configured the server, you can configure options (path, access list to apply, maximum number of connections, or timeout policy) that apply to both standard and secure HTTP servers. To verify the secure HTTP connection by using a Web browser, enter https://URL, where the URL is the IP address or hostname of the server switch. If you configure a port other than the default port, you must also specify the port number after the URL. For example:
https://209.165.129:1026
or
https://host.domain.com:1026

SUMMARY STEPS

1. show ip http server status 2. configure terminal 3. ip http secure-server 4. ip http secure-port port-number 5. ip http secure-ciphersuite {[3des-ede-cbc-sha] [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]} 6. ip http secure-client-auth 7. ip http secure-trustpoint name 8. ip http path path-name 9. ip http access-class access-list-number 10. ip http max-connections value 11. ip http timeout-policy idle seconds life seconds requests value 12. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1355

Configuring the Secure HTTP Server

Security

DETAILED STEPS

Step 1

Command or Action show ip http server status Example:

Switch# show ip http server status

Step 2 Step 3 Step 4 Step 5 Step 6

configure terminal Example:
Switch# configure terminal
ip http secure-server Example:
Switch(config)# ip http secure-server
ip http secure-port port-number Example:
Switch(config)# ip http secure-port 443
ip http secure-ciphersuite {[3des-ede-cbc-sha] [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]} Example:
Switch(config)# ip http secure-ciphersuite rc4-128-md5
ip http secure-client-auth Example:
Switch(config)# ip http secure-client-auth

Purpose (Optional) Displays the status of the HTTP server to determine if the secure HTTP server feature is supported in the software. You should see one of these lines in the output:
HTTP secure server capability: Present
or
HTTP secure server capability: Not present
Enters global configuration mode.
Enables the HTTPS server if it has been disabled. The HTTPS server is enabled by default.
(Optional) Specifies the port number to be used for the HTTPS server. The default port number is 443. Valid options are 443 or any number in the range 1025 to 65535.
(Optional) Specifies the CipherSuites (encryption algorithms) to be used for encryption over the HTTPS connection. If you do not have a reason to specify a particularly CipherSuite, you should allow the server and client to negotiate a CipherSuite that they both support. This is the default.
(Optional) Configures the HTTP server to request an X.509v3 certificate from the client for authentication during the connection process. The default is for the client to request a certificate from the server, but the server does not attempt to authenticate the client.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1356

Security

Configuring the Secure HTTP Server

Step 7 Step 8 Step 9 Step 10 Step 11
Step 12

Command or Action ip http secure-trustpoint name Example:
Switch(config)# ip http secure-trustpoint your_trustpoint
ip http path path-name Example:
Switch(config)# ip http path /your_server:80

Purpose
Specifies the CA trustpoint to use to get an X.509v3 security certificate and to authenticate the client certificate connection.
Note Use of this command assumes you have already configured a CA trustpoint according to the previous procedure.
(Optional) Sets a base HTTP path for HTML files. The path specifies the location of the HTTP server files on the local system (usually located in system flash memory).

ip http access-class access-list-number Example:
Switch(config)# ip http access-class 2

(Optional) Specifies an access list to use to allow access to the HTTP server.

ip http max-connections value Example:
Switch(config)# ip http max-connections 4

(Optional) Sets the maximum number of concurrent connections that are allowed to the HTTP server. The range is 1 to 16; the default value is 5.

ip http timeout-policy idle seconds life seconds requests (Optional) Specifies how long a connection to the HTTP

value

server can remain open under the defined circumstances:

Example:
Switch(config)# ip http timeout-policy idle 120 life 240 requests 1

· idle--the maximum time period when no data is received or response data cannot be sent. The range is 1 to 600 seconds. The default is 180 seconds (3 minutes).

· life--the maximum time period from the time that the connection is established. The range is 1 to 86400 seconds (24 hours). The default is 180 seconds.

· requests--the maximum number of requests processed on a persistent connection. The maximum value is 86400. The default is 1.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1357

Configuring the Secure HTTP Client

Security

Configuring the Secure HTTP Client
Beginning in privileged EXEC mode, follow these steps to configure a secure HTTP client:

Before you begin
The standard HTTP client and secure HTTP client are always enabled. A certificate authority is required for secure HTTP client certification. This procedure assumes that you have previously configured a CA trustpoint on the switch. If a CA trustpoint is not configured and the remote HTTPS server requires client authentication, connections to the secure HTTP client fail.

SUMMARY STEPS

1. configure terminal 2. ip http client secure-trustpoint name 3. ip http client secure-ciphersuite {[3des-ede-cbc-sha] [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]} 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

ip http client secure-trustpoint name Example:
Switch(config)# ip http client secure-trustpoint your_trustpoint

(Optional) Specifies the CA trustpoint to be used if the remote HTTP server requests client authentication. Using this command assumes that you have already configured a CA trustpoint by using the previous procedure. The command is optional if client authentication is not needed or if a primary trustpoint has been configured.

ip http client secure-ciphersuite {[3des-ede-cbc-sha] (Optional) Specifies the CipherSuites (encryption

[rc4-128-md5] [rc4-128-sha] [des-cbc-sha]}

algorithms) to be used for encryption over the HTTPS

Example:

connection. If you do not have a reason to specify a particular CipherSuite, you should allow the server and

client to negotiate a CipherSuite that they both support. This

Switch(config)# rc4-128-md5

ip

http

client

secure-ciphersuite

is the default.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1358

Security

How to Configure Secure HTTP Servers and Clients

How to Configure Secure HTTP Servers and Clients
These sections contain this configuration information:

Monitoring Secure HTTP Server and Client Status

To monitor the SSL secure server and client status, use the privileged EXEC commands in the following table.
Table 122: Commands for Displaying the SSL Secure Server and Client Status

Command

Purpose

show ip http client secure status Shows the HTTP secure client configuration.

show ip http server secure status Shows the HTTP secure server configuration.

show running-config

Shows the generated self-signed certificate for secure HTTP connections.

Additional References

Related Documents

Related Document Title Topic

Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity Control

http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.htm

policies

and

Identity

Service

templates

for Session

Aware

networking.

Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switch

RADIUS, TACACS+,

http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-l

Secure

Shell,

802.1X

and AAA.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1359

Feature Information for SSL HTTP

Security

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for SSL HTTP
Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1360

6 9 C H A P T E R
Configuring IPv4 ACLs
· Finding Feature Information, on page 1361 · Prerequisites for Configuring Network Security with ACLs, on page 1361 · Restrictions for Configuring Network Security with ACLs, on page 1361 · Information about Network Security with ACLs, on page 1363 · How to Configure ACLs, on page 1376 · Monitoring IPv4 ACLs, on page 1396 · Configuration Examples for ACLs, on page 1397 · Additional References, on page 1412 · Feature Information for ACLs, on page 1412
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring Network Security with ACLs
This section lists the prerequisites for configuring network security with Access Control Lists (ACLs). · On switches running the LAN base feature set, VLAN maps are not supported.
Restrictions for Configuring Network Security with ACLs
General Network Security The following are restrictions for configuring network security with ACLs:
· You cannot apply named MAC extended ACLs to Layer 3 interfaces.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1361

Restrictions for Configuring Network Security with ACLs

Security

· Though visible in the command-line help strings, appletalk is not supported as a matching condition for the deny and permit MAC access-list configuration mode commands.
ACL Filtering The following are restrictions on ACL filtering:
· If IEEE 802.1Q tunneling is configured on an interface, any IEEE 802.1Q encapsulated IP packets received on the tunnel port can be filtered by MAC ACLs, but not by IP ACLs. This is because the switch does not recognize the protocol inside the IEEE 802.1Q header. This restriction applies to router ACLs, port ACLs, and VLAN maps.
IPv4 ACL Network Interfaces The following restrictions apply to IPv4 ACLs to network interfaces:
· When controlling access to an interface, you can use a named or numbered ACL. · If you apply an ACL to a Layer 2 interface that is a member of a VLAN, the Layer 2 (port) ACL takes
precedence over an input Layer 3 ACL applied to the VLAN interface or a VLAN map applied to the VLAN. · If you apply an ACL to a Layer 3 interface and routing is not enabled on the switch, the ACL only filters packets that are intended for the CPU, such as SNMP, Telnet, or web traffic. · You do not have to enable routing to apply ACLs to Layer 2 interfaces. · When private VLANs are configured, you can apply router ACLs only on the primary-VLAN SVIs. The ACL is applied to both primary and secondary VLAN Layer 3 traffic.
Note By default, the router sends Internet Control Message Protocol (ICMP) unreachable messages when a packet is denied by an access group on a Layer 3 interface. These access-group denied packets are not dropped in hardware but are bridged to the switch CPU so that it can generate the ICMP-unreachable message. They do not generate ICMP unreachable messages. ICMP unreachable messages can be disabled on router ACLs with the no ip unreachables interface command.
MAC ACLs on a Layer 2 Interface After you create a MAC ACL, you can apply it to a Layer 2 interface to filter non-IP traffic coming in that interface. When you apply the MAC ACL, consider these guidelines:
· If you apply an ACL to a Layer 2 interface that is a member of a VLAN, the Layer 2 (port) ACL takes precedence over an input Layer 3 ACL applied to the VLAN interface or a VLAN map applied to the VLAN. Incoming packets received on the Layer 2 port are always filtered by the port ACL.
· You can apply no more than one IP access list and one MAC access list to the same Layer 2 interface. The IP access list filters only IP packets, and the MAC access list filters non-IP packets.
· A Layer 2 interface can have only one MAC access list. If you apply a MAC access list to a Layer 2 interface that has a MAC ACL configured, the new ACL replaces the previously configured one.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1362

Security

Information about Network Security with ACLs

Note The mac access-group interface configuration command is only valid when applied to a physical Layer 2 interface. You cannot use the command on EtherChannel port channels.
Related Topics Applying an IPv4 ACL to an Interface, on page 1386 IPv4 ACL Interface Considerations, on page 1375 Creating Named MAC Extended ACLs, on page 1388 Applying a MAC ACL to a Layer 2 Interface, on page 1389
Information about Network Security with ACLs
This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists.
Cisco TrustSec and ACLs
Catalyst 3850 switches running the IP base or IP services feature set also support Cisco TrustSec Security Group Tag (SCT) Exchange Protocol (SXP). This feature supports security group access control lists (SGACLs), which define ACL policies for a group of devices instead of an IP address. The SXP control protocol allows tagging packets with SCTs without a hardware upgrade, and runs between access layer devices at the Cisco TrustSec domain edge and distribution layer devices within the Cisco TrustSec domain. Catalyst 3850 switches operate as access layer switches in the Cisco TrustSec network.
The sections on SXP define the capabilities supported on the Catalyst 3850 switches.
ACL Overview
Packet filtering can help limit network traffic and restrict network use by certain users or devices. ACLs filter traffic as it passes through a router or switch and permit or deny packets crossing specified interfaces or VLANs. An ACL is a sequential collection of permit and deny conditions that apply to packets. When a packet is received on an interface, the switch compares the fields in the packet against any applied ACLs to verify that the packet has the required permissions to be forwarded, based on the criteria specified in the access lists. One by one, it tests packets against the conditions in an access list. The first match decides whether the switch accepts or rejects the packets. Because the switch stops testing after the first match, the order of conditions in the list is critical. If no conditions match, the switch rejects the packet. If there are no restrictions, the switch forwards the packet; otherwise, the switch drops the packet. The switch can use ACLs on all packets it forwards, including packets bridged within a VLAN.
You configure access lists on a router or Layer 3 switch to provide basic security for your network. If you do not configure ACLs, all packets passing through the switch could be allowed onto all parts of the network. You can use ACLs to control which hosts can access different parts of a network or to decide which types of traffic are forwarded or blocked at router interfaces. For example, you can allow e-mail traffic to be forwarded but not Telnet traffic. ACLs can be configured to block inbound traffic, outbound traffic, or both.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1363

Access Control Entries

Security

Access Control Entries
An ACL contains an ordered list of access control entries (ACEs). Each ACE specifies permit or deny and a set of conditions the packet must satisfy in order to match the ACE. The meaning of permit or deny depends on the context in which the ACL is used.
ACL Supported Types
The switch supports IP ACLs and Ethernet (MAC) ACLs: · IP ACLs filter IPv4 traffic, including TCP, User Datagram Protocol (UDP), Internet Group Management Protocol (IGMP), and Internet Control Message Protocol (ICMP).
· Ethernet ACLs filter non-IP traffic.
This switch also supports quality of service (QoS) classification ACLs.
Supported ACLs
The switch supports three types of ACLs to filter traffic: · Port ACLs access-control traffic entering a Layer 2 interface. You can apply only one IP access list and one MAC access list to a Layer 2 interface.
· Router ACLs access-control routed traffic between VLANs and are applied to Layer 3 interfaces in a specific direction (inbound or outbound).
· VLAN ACLs or VLAN maps access-control all packets (bridged and routed). You can use VLAN maps to filter traffic between devices in the same VLAN. VLAN maps are configured to provide access control based on Layer 3 addresses for IPv4. Unsupported protocols are access-controlled through MAC addresses using Ethernet ACEs. After a VLAN map is applied to a VLAN, all packets (routed or bridged) entering the VLAN are checked against the VLAN map. Packets can either enter the VLAN through a switch port or through a routed port after being routed.
ACL Precedence
When Port ACLs, router ACLs, and VLAN maps are configured on the same switch, the filtering precedence, from greatest to least, is port ACL, router ACL, then VLAN map. The following examples describe simple use cases:
· When both an input port ACL and a VLAN map are applied, incoming packets received on ports with a port ACL applied are filtered by the port ACL. Other packets are filtered by the VLAN map
· When an input router ACL and input port ACL exist in a switch virtual interface (SVI), incoming packets received on ports to which a port ACL is applied are filtered by the port ACL. Incoming routed IP packets received on other ports are filtered by the router ACL. Other packets are not filtered.
· When an output router ACL and input port ACL exist in an SVI, incoming packets received on the ports to which a port ACL is applied are filtered by the port ACL. Outgoing routed IP packets are filtered by the router ACL. Other packets are not filtered.
· When a VLAN map, input router ACL, and input port ACL exist in an SVI, incoming packets received on the ports to which a port ACL is applied are only filtered by the port ACL. Incoming routed IP packets

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1364

Security

Port ACLs

Port ACLs

received on other ports are filtered by both the VLAN map and the router ACL. Other packets are filtered only by the VLAN map.
· When a VLAN map, output router ACL, and input port ACL exist in an SVI, incoming packets received on the ports to which a port ACL is applied are only filtered by the port ACL. Outgoing routed IP packets are filtered by both the VLAN map and the router ACL. Other packets are filtered only by the VLAN map.
Related Topics Restrictions for Configuring Network Security with ACLs, on page 1361
Port ACLs are ACLs that are applied to Layer 2 interfaces on a switch. Port ACLs are supported only on physical interfaces and not on EtherChannel interfaces. Port ACLs can be applied on outbound and inbound interfaces. The following access lists are supported:
· Standard IP access lists using source addresses
· Extended IP access lists using source and destination addresses and optional protocol type information
· MAC extended access lists using source and destination MAC addresses and optional protocol type information
The switch examines ACLs on an interface and permits or denies packet forwarding based on how the packet matches the entries in the ACL. In this way, ACLs control access to a network or to part of a network.
Figure 72: Using ACLs to Control Traffic in a Network
This is an example of using port ACLs to control access to a network when all workstations are in the same VLAN. ACLs applied at the Layer 2 input would allow Host A to access the Human Resources network, but prevent Host B from accessing the same network. Port ACLs can only be applied to Layer 2 interfaces in the

inbound direction.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1365

Router ACLs

Security

When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port. When you apply a port ACL to a port with voice VLAN, the ACL filters traffic on both data and voice VLANs.
With port ACLs, you can filter IP traffic by using IP access lists and non-IP traffic by using MAC addresses. You can filter both IP and non-IP traffic on the same Layer 2 interface by applying both an IP access list and a MAC access list to the interface.

Note You cannot apply more than one IP access list and one MAC access list to a Layer 2 interface. If an IP access list or MAC access list is already configured on a Layer 2 interface and you apply a new IP access list or MAC access list to the interface, the new ACL replaces the previously configured one.

Router ACLs VLAN Maps

You can apply router ACLs on switch virtual interfaces (SVIs), which are Layer 3 interfaces to VLANs; on physical Layer 3 interfaces; and on Layer 3 EtherChannel interfaces. You apply router ACLs on interfaces for specific directions (inbound or outbound). You can apply one router ACL in each direction on an interface. The switch supports these access lists for IPv4 traffic:
· Standard IP access lists use source addresses for matching operations.
· Extended IP access lists use source and destination addresses and optional protocol type information for matching operations.
As with port ACLs, the switch examines ACLs associated with features configured on a given interface. As packets enter the switch on an interface, ACLs associated with all inbound features configured on that interface are examined. After packets are routed and before they are forwarded to the next hop, all ACLs associated with outbound features configured on the egress interface are examined. ACLs permit or deny packet forwarding based on how the packet matches the entries in the ACL, and can be used to control access to a network or to part of a network.
Use VLAN ACLs or VLAN maps to access-control all traffic. You can apply VLAN maps to all packets that are routed into or out of a VLAN or are bridged within a VLAN in the switch or switch stack. Use VLAN maps for security packet filtering. VLAN maps are not defined by direction (input or output). You can configure VLAN maps to match Layer 3 addresses for IPv4 traffic. All non-IP protocols are access-controlled through MAC addresses and Ethertype using MAC VLAN maps. (IP traffic is not access controlled by MAC VLAN maps.) You can enforce VLAN maps only on packets going through the switch; you cannot enforce VLAN maps on traffic between hosts on a hub or on another switch connected to this switch. With VLAN maps, forwarding of packets is permitted or denied, based on the action specified in the map.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1366

Security

ACEs and Fragmented and Unfragmented Traffic
Figure 73: Using VLAN Maps to Control Traffic
This shows how a VLAN map is applied to prevent a specific type of traffic from Host A in VLAN 10 from being forwarded. You can apply only one VLAN map to a

VLAN.
ACEs and Fragmented and Unfragmented Traffic
IP packets can be fragmented as they cross the network. When this happens, only the fragment containing the beginning of the packet contains the Layer 4 information, such as TCP or UDP port numbers, ICMP type and code, and so on. All other fragments are missing this information. Some access control entries (ACEs) do not check Layer 4 information and therefore can be applied to all packet fragments. ACEs that do test Layer 4 information cannot be applied in the standard manner to most of the fragments in a fragmented IP packet. When the fragment contains no Layer 4 information and the ACE tests some Layer 4 information, the matching rules are modified:
· Permit ACEs that check the Layer 3 information in the fragment (including protocol type, such as TCP, UDP, and so on) are considered to match the fragment regardless of what the missing Layer 4 information might have been.
· Deny ACEs that check Layer 4 information never match a fragment unless the fragment contains Layer 4 information.
Example: ACEs and Fragmented and Unfragmented Traffic
Consider access list 102, configured with these commands, applied to three fragmented packets:
Switch(config)# access-list 102 permit tcp any host 10.1.1.1 eq smtp Switch(config)# access-list 102 deny tcp any host 10.1.1.2 eq telnet Switch(config)# access-list 102 permit tcp any host 10.1.1.2 Switch(config)# access-list 102 deny tcp any any
Note In the first and second ACEs in the examples, the eq keyword after the destination address means to test for the TCP-destination-port well-known numbers equaling Simple Mail Transfer Protocol (SMTP) and Telnet, respectively.
· Packet A is a TCP packet from host 10.2.2.2., port 65000, going to host 10.1.1.1 on the SMTP port. If this packet is fragmented, the first fragment matches the first ACE (a permit) as if it were a complete packet because all Layer 4 information is present. The remaining fragments also match the first ACE, even though they do not contain the SMTP port information, because the first ACE only checks Layer
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1367

ACLs and Switch Stacks

Security

3 information when applied to fragments. The information in this example is that the packet is TCP and that the destination is 10.1.1.1.
· Packet B is from host 10.2.2.2, port 65001, going to host 10.1.1.2 on the Telnet port. If this packet is fragmented, the first fragment matches the second ACE (a deny) because all Layer 3 and Layer 4 information is present. The remaining fragments in the packet do not match the second ACE because they are missing Layer 4 information. Instead, they match the third ACE (a permit). Because the first fragment was denied, host 10.1.1.2 cannot reassemble a complete packet, so packet B is effectively denied. However, the later fragments that are permitted will consume bandwidth on the network and resources of host 10.1.1.2 as it tries to reassemble the packet.
· Fragmented packet C is from host 10.2.2.2, port 65001, going to host 10.1.1.3, port ftp. If this packet is fragmented, the first fragment matches the fourth ACE (a deny). All other fragments also match the fourth ACE because that ACE does not check any Layer 4 information and because Layer 3 information in all fragments shows that they are being sent to host 10.1.1.3, and the earlier permit ACEs were checking different hosts.
ACLs and Switch Stacks
ACL support is the same for a switch stack as for a standalone switch. ACL configuration information is propagated to all switches in the stack. All switches in the stack, including the active switch, process the information and program their hardware.
Active Switch and ACL Functions
The active switch performs these ACL functions: · It processes the ACL configuration and propagates the information to all stack members.
· It distributes the ACL information to any switch that joins the stack.
· If packets must be forwarded by software for any reason (for example, not enough hardware resources), the active switch forwards the packets only after applying ACLs on the packets.
· It programs its hardware with the ACL information it processes.
Stack Member and ACL Functions
Stack members perform these ACL functions: · They receive the ACL information from the active switch and program their hardware.
· A stack member configured as a standby switch, performs the functions of the active switch in the event the active switch fails.
Active Switch Failure and ACLs
Both the active and standby switches have the ACL information. When the active switch fails, the standby takes over. The new active switch distributes the ACL information to all stack members.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1368

Security

Standard and Extended IPv4 ACLs

Standard and Extended IPv4 ACLs
This section describes IP ACLs.
An ACL is a sequential collection of permit and deny conditions. One by one, the switch tests packets against the conditions in an access list. The first match determines whether the switch accepts or rejects the packet. Because the switch stops testing after the first match, the order of the conditions is critical. If no conditions match, the switch denies the packet.
The software supports these types of ACLs or access lists for IPv4:
· Standard IP access lists use source addresses for matching operations.
· Extended IP access lists use source and destination addresses for matching operations and optional protocol-type information for finer granularity of control.

IPv4 ACL Switch Unsupported Features
Configuring IPv4 ACLs on the switch is the same as configuring IPv4 ACLs on other Cisco switches and routers. The switch does not support these Cisco IOS router ACL-related features:
· Non-IP protocol ACLs · IP accounting · Reflexive ACLs and dynamic ACLs are not supported. · ACL logging for port ACLs and VLAN maps

Access List Numbers
The number you use to denote your ACL shows the type of access list that you are creating. This lists the access-list number and corresponding access list type and shows whether or not they are supported in the switch. The switch supports IPv4 standard and extended access lists, numbers 1 to 199 and 1300 to 2699.
Table 123: Access List Numbers

Access List Number 1­99 100­199 200­299 300­399 400­499 500­599 600­699

Type IP standard access list IP extended access list Protocol type-code access list DECnet access list XNS standard access list XNS extended access list AppleTalk access list

Supported Yes Yes No No No No No

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1369

Numbered Standard IPv4 ACLs

Security

Access List Number 700­799 800­899 900­999 1000­1099 1100­1199
1200­1299 1300­1999
2000­2699

Type

Supported

48-bit MAC address access list No

IPX standard access list

No

IPX extended access list

No

IPX SAP access list

No

Extended 48-bit MAC address No access list

IPX summary address access list No

IP standard access list (expanded Yes range)

IP extended access list (expanded Yes range)

In addition to numbered standard and extended ACLs, you can also create standard and extended named IP ACLs by using the supported numbers. That is, the name of a standard IP ACL can be 1 to 99; the name of an extended IP ACL can be 100 to 199. The advantage of using named ACLs instead of numbered lists is that you can delete individual entries from a named list.

Numbered Standard IPv4 ACLs
When creating an ACL, remember that, by default, the end of the ACL contains an implicit deny statement for all packets that it did not find a match for before reaching the end. With standard access lists, if you omit the mask from an associated IP host address ACL specification, 0.0.0.0 is assumed to be the mask.
The switch always rewrites the order of standard access lists so that entries with host matches and entries with matches having a don't care mask of 0.0.0.0 are moved to the top of the list, above any entries with non-zero don't care masks. Therefore, in show command output and in the configuration file, the ACEs do not necessarily appear in the order in which they were entered.
After creating a numbered standard IPv4 ACL, you can apply it to terminal lines, to interfaces, or to VLANs.

Numbered Extended IPv4 ACLs
Although standard ACLs use only source addresses for matching, you can use extended ACL source and destination addresses for matching operations and optional protocol type information for finer granularity of control. When you are creating ACEs in numbered extended access lists, remember that after you create the ACL, any additions are placed at the end of the list. You cannot reorder the list or selectively add or remove ACEs from a numbered list.
The switch does not support dynamic or reflexive access lists. It also does not support filtering based on the type of service (ToS) minimize-monetary-cost bit.
Some protocols also have specific parameters and keywords that apply to that protocol.
You can define an extended TCP, UDP, ICMP, IGMP, or other IP ACL. The switch also supports these IP protocols:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1370

Security

Named IPv4 ACLs

Note ICMP echo-reply cannot be filtered. All other ICMP codes or types can be filtered.
These IP protocols are supported: · Authentication Header Protocol (ahp) · Encapsulation Security Payload (esp) · Enhanced Interior Gateway Routing Protocol (eigrp) · generic routing encapsulation (gre) · Internet Control Message Protocol (icmp) · Internet Group Management Protocol (igmp) · any Interior Protocol (ip) · IP in IP tunneling (ipinip) · KA9Q NOS-compatible IP over IP tunneling (nos) · Open Shortest Path First routing (ospf) · Payload Compression Protocol (pcp) · Protocol-Independent Multicast (pim) · Transmission Control Protocol (tcp) · User Datagram Protocol (udp)
Named IPv4 ACLs
You can identify IPv4 ACLs with an alphanumeric string (a name) rather than a number. You can use named ACLs to configure more IPv4 access lists in a router than if you were to use numbered access lists. If you identify your access list with a name rather than a number, the mode and command syntax are slightly different. However, not all commands that use IP access lists accept a named access list.
Note The name you give to a standard or extended ACL can also be a number in the supported range of access list numbers. That is, the name of a standard IP ACL can be 1 to 99. The advantage of using named ACLs instead of numbered lists is that you can delete individual entries from a named list.
Consider these guidelines and limitations before configuring named ACLs: · Not all commands that accept a numbered ACL accept a named ACL. ACLs for packet filters and route filters on interfaces can use a name. VLAN maps also accept a name. · A standard ACL and an extended ACL cannot have the same name. · Numbered ACLs are also available. · You can use standard or extended ACLs (named or numbered) in VLAN maps.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1371

ACL Logging

Security

· With IPv4 QoS ACLs, if you enter the class-map {match-all | match-any} class-map-name global configuration command, you can enter these match commands:
· match access-group acl-name

Note The ACL must be an extended named ACL.
· match input-interface interface-id-list · match ip dscp dscp-list · match ip precedence ip-precedence-list
You cannot enter the match access-group acl-index command.

ACL Logging

The switch software can provide logging messages about packets permitted or denied by a standard IP access list. That is, any packet that matches the ACL causes an informational logging message about the packet to be sent to the console. The level of messages logged to the console is controlled by the logging console commands controlling the syslog messages.

Note Because routing is done in hardware and logging is done in software, if a large number of packets match a permit or deny ACE containing a log keyword, the software might not be able to match the hardware processing rate, and not all packets will be logged.

The first packet that triggers the ACL causes a logging message right away, and subsequent packets are collected over 5-minute intervals before they appear or logged. The logging message includes the access list number, whether the packet was permitted or denied, the source IP address of the packet, and the number of packets from that source permitted or denied in the prior 5-minute interval.

Smart Logging

When smart logging is enabled on the switch and an ACL configured with smart logging is attached to a Layer 2 interface (port ACL), the contents of packets denied or permitted because of the ACL are also sent to a specified NetFlow collector.

Hardware and Software Treatment of IP ACLs
ACL processing is performed in hardware. If the hardware reaches its capacity to store ACL configurations, all packets on that interface are dropped.

Note If an ACL configuration cannot be implemented in hardware due to an out-of-resource condition on a switch or stack member, then only the traffic in that VLAN arriving on that switch is affected.
For router ACLs, other factors can cause packets to be sent to the CPU:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1372

Security

VLAN Map Configuration Guidelines

· Using the log keyword
· Generating ICMP unreachable messages
When traffic flows are both logged and forwarded, forwarding is done by hardware, but logging must be done by software. Because of the difference in packet handling capacity between hardware and software, if the sum of all flows being logged (both permitted flows and denied flows) is of great enough bandwidth, not all of the packets that are forwarded can be logged.
When you enter the show ip access-lists privileged EXEC command, the match count displayed does not account for packets that are access controlled in hardware. Use the show platform acl counters hardware privileged EXEC command to obtain some basic hardware ACL statistics for switched and routed packets.
Router ACLs function as follows:
· The hardware controls permit and deny actions of standard and extended ACLs (input and output) for security access control.
· If log has not been specified, the flows that match a deny statement in a security ACL are dropped by the hardware if ip unreachables is disabled. The flows matching a permit statement are switched in hardware.
· Adding the log keyword to an ACE in a router ACL causes a copy of the packet to be sent to the CPU for logging only. If the ACE is a permit statement, the packet is still switched and routed in hardware.
VLAN Map Configuration Guidelines
VLAN maps are the only way to control filtering within a VLAN. VLAN maps have no direction. To filter traffic in a specific direction by using a VLAN map, you need to include an ACL with specific source or destination addresses. If there is a match clause for that type of packet (IP or MAC) in the VLAN map, the default action is to drop the packet if the packet does not match any of the entries within the map. If there is no match clause for that type of packet, the default is to forward the packet.
The following are the VLAN map configuration guidelines:
· If there is no ACL configured to deny traffic on an interface and no VLAN map is configured, all traffic is permitted.
· Each VLAN map consists of a series of entries. The order of entries in an VLAN map is important. A packet that comes into the switch is tested against the first entry in the VLAN map. If it matches, the action specified for that part of the VLAN map is taken. If there is no match, the packet is tested against the next entry in the map.
· If the VLAN map has at least one match clause for the type of packet (IP or MAC) and the packet does not match any of these match clauses, the default is to drop the packet. If there is no match clause for that type of packet in the VLAN map, the default is to forward the packet.
· Logging is not supported for VLAN maps.
· When a switch has an IP access list or MAC access list applied to a Layer 2 interface, and you apply a VLAN map to a VLAN that the port belongs to, the port ACL takes precedence over the VLAN map.
· If a VLAN map configuration cannot be applied in hardware, all packets in that VLAN are dropped.
· You can configure VLAN maps on primary and secondary VLANs. However, we recommend that you configure the same VLAN maps on private-VLAN primary and secondary VLANs.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1373

VLAN Maps with Router ACLs

Security

· When a frame is Layer-2 forwarded within a private VLAN, the same VLAN map is applied at the ingress side and at the egress side. When a frame is routed from inside a private VLAN to an external port, the private-VLAN map is applied at the ingress side. · For frames going upstream from a host port to a promiscuous port, the VLAN map configured on the secondary VLAN is applied.
· For frames going downstream from a promiscuous port to a host port, the VLAN map configured on the primary VLAN is applied. To filter out specific IP traffic for a private VLAN, you should apply the VLAN map to both the primary and secondary VLANs.
VLAN Maps with Router ACLs
To access control both bridged and routed traffic, you can use VLAN maps only or a combination of router ACLs and VLAN maps. You can define router ACLs on both input and output routed VLAN interfaces, and you can define a VLAN map to access control the bridged traffic. If a packet flow matches a VLAN-map deny clause in the ACL, regardless of the router ACL configuration, the packet flow is denied.
Note When you use router ACLs with VLAN maps, packets that require logging on the router ACLs are not logged if they are denied by a VLAN map.
If the VLAN map has a match clause for the type of packet (IP or MAC) and the packet does not match the type, the default is to drop the packet. If there is no match clause in the VLAN map, and no action specified, the packet is forwarded if it does not match any VLAN map entry.
VLAN Maps and Router ACL Configuration Guidelines
These guidelines are for configurations where you need to have an router ACL and a VLAN map on the same VLAN. These guidelines do not apply to configurations where you are mapping router ACLs and VLAN maps on different VLANs. If you must configure a router ACL and a VLAN map on the same VLAN, use these guidelines for both router ACL and VLAN map configuration:
· You can configure only one VLAN map and one router ACL in each direction (input/output) on a VLAN interface.
· Whenever possible, try to write the ACL with all entries having a single action except for the final, default action of the other type. That is, write the ACL using one of these two forms: permit... permit... permit... deny ip any any or deny... deny... deny... permit ip any any
· To define multiple actions in an ACL (permit, deny), group each action type together to reduce the number of entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1374

Security

Time Ranges for ACLs

· Avoid including Layer 4 information in an ACL; adding this information complicates the merging process. The best merge results are obtained if the ACLs are filtered based on IP addresses (source and destination) and not on the full flow (source IP address, destination IP address, protocol, and protocol ports). It is also helpful to use don't care bits in the IP address, whenever possible.
If you need to specify the full-flow mode and the ACL contains both IP ACEs and TCP/UDP/ICMP ACEs with Layer 4 information, put the Layer 4 ACEs at the end of the list. This gives priority to the filtering of traffic based on IP addresses.
Time Ranges for ACLs
You can selectively apply extended ACLs based on the time of day and the week by using the time-range global configuration command. First, define a time-range name and set the times and the dates or the days of the week in the time range. Then enter the time-range name when applying an ACL to set restrictions to the access list. You can use the time range to define when the permit or deny statements in the ACL are in effect, for example, during a specified time period or on specified days of the week. The time-range keyword and argument are referenced in the named and numbered extended ACL task tables.
These are some benefits of using time ranges:
· You have more control over permitting or denying a user access to resources, such as an application (identified by an IP address/mask pair and a port number).
· You can control logging messages. ACL entries can be set to log traffic only at certain times of the day. Therefore, you can simply deny access without needing to analyze many logs generated during peak hours.
Time-based access lists trigger CPU activity because the new configuration of the access list must be merged with other features and the combined configuration loaded into the hardware memory. For this reason, you should be careful not to have several access lists configured to take affect in close succession (within a small number of minutes of each other.)
Note The time range relies on the switch system clock; therefore, you need a reliable clock source. We recommend that you use Network Time Protocol (NTP) to synchronize the switch clock.
Related Topics Configuring Time Ranges for ACLs, on page 1384
IPv4 ACL Interface Considerations
When you apply the ip access-group interface configuration command to a Layer 3 interface (an SVI, a Layer 3 EtherChannel, or a routed port), the interface must have been configured with an IP address. Layer 3 access groups filter packets that are routed or are received by Layer 3 processes on the CPU. They do not affect packets bridged within a VLAN.
For inbound ACLs, after receiving a packet, the switch checks the packet against the ACL. If the ACL permits the packet, the switch continues to process the packet. If the ACL rejects the packet, the switch discards the packet.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1375

How to Configure ACLs

Security

For outbound ACLs, after receiving and routing a packet to a controlled interface, the switch checks the packet against the ACL. If the ACL permits the packet, the switch sends the packet. If the ACL rejects the packet, the switch discards the packet.
By default, the input interface sends ICMP Unreachable messages whenever a packet is discarded, regardless of whether the packet was discarded because of an ACL on the input interface or because of an ACL on the output interface. ICMP Unreachables are normally limited to no more than one every one-half second per input interface, but this can be changed by using the ip icmp rate-limit unreachable global configuration command.
When you apply an undefined ACL to an interface, the switch acts as if the ACL has not been applied to the interface and permits all packets. Remember this behavior if you use undefined ACLs for network security.
Related Topics Applying an IPv4 ACL to an Interface, on page 1386 Restrictions for Configuring Network Security with ACLs, on page 1361

How to Configure ACLs

Configuring IPv4 ACLs
These are the steps to use IP ACLs on the switch:

SUMMARY STEPS

1. Create an ACL by specifying an access list number or name and the access conditions. 2. Apply the ACL to interfaces or terminal lines. You can also apply standard and extended IP ACLs to
VLAN maps.

DETAILED STEPS

Step 1 Step 2

Command or Action

Purpose

Create an ACL by specifying an access list number or name and the access conditions.

Apply the ACL to interfaces or terminal lines. You can also apply standard and extended IP ACLs to VLAN maps.

Creating a Numbered Standard ACL
Beginning in privileged EXEC mode, follow these steps to create a numbered standard ACL:

SUMMARY STEPS

1. configure terminal 2. access-list access-list-number {deny | permit} source source-wildcard [log] 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1376

Security

Creating a Numbered Standard ACL

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

access-list access-list-number {deny | permit} source source-wildcard [log] Example:
Switch(config)# access-list 2 deny your_host
end Example:
Switch(config)# end

Defines a standard IPv4 access list by using a source address and wildcard.
The access-list-number is a decimal number from 1 to 99 or 1300 to 1999.
Enter deny or permit to specify whether to deny or permit access if conditions are matched.
The source is the source address of the network or host from which the packet is being sent specified as:
· The 32-bit quantity in dotted-decimal format.
· The keyword any as an abbreviation for source and source-wildcard of 0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard.
· The keyword host as an abbreviation for source and source-wildcard of source 0.0.0.0.
(Optional) The source-wildcard applies wildcard bits to the source.
(Optional) Enter log to cause an informational logging message about the packet that matches the entry to be sent to the console.
(Optional) Enter smartlog to send copies of denied or permitted packets to a NetFlow collector.
Note Logging is supported only on ACLs attached to Layer 3 interfaces.
Returns to privileged EXEC mode.

Related Topics Configuring VLAN Maps, on page 1390

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1377

Creating a Numbered Extended ACL

Security

Creating a Numbered Extended ACL
Beginning in privileged EXEC mode, follow these steps to create a numbered extended ACL:

SUMMARY STEPS

1. configure terminal 2. access-list access-list-number {deny | permit} protocol source source-wildcard destination
destination-wildcard [precedence precedence] [tos tos] [fragments] [log [log-input] [time-range time-range-name] [dscp dscp] 3. access-list access-list-number {deny | permit} tcp source source-wildcard [operator port] destination destination-wildcard [operator port] [established] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] [flag] 4. access-list access-list-number {deny | permit} udp source source-wildcard [operator port] destination destination-wildcard [operator port] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] 5. access-list access-list-number {deny | permit} icmp source source-wildcard destination destination-wildcard [icmp-type | [[icmp-type icmp-code] | [icmp-message]] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] 6. access-list access-list-number {deny | permit} igmp source source-wildcard destination destination-wildcard [igmp-type] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp] 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [fragments] [log [log-input] [time-range time-range-name] [dscp dscp]
Example:
Switch(config)# access-list 101 permit ip host 10.1.1.2 any precedence 0 tos 0 log

Defines an extended IPv4 access list and the access conditions.
The access-list-number is a decimal number from 100 to 199 or 2000 to 2699.
Enter deny or permit to specify whether to deny or permit the packet if conditions are matched.
For protocol, enter the name or number of an P protocol: ahp, eigrp, esp, gre, icmp, igmp, igrp, ip, ipinip, nos, ospf, pcp, pim, tcp, or udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including ICMP, TCP, and UDP), use the keyword ip.
The source is the number of the network or host from which the packet is sent.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1378

Security

Creating a Numbered Extended ACL

Step 3

Command or Action

Purpose The source-wildcard applies wildcard bits to the source.
The destination is the network or host number to which the packet is sent.
The destination-wildcard applies wildcard bits to the destination.
Source, source-wildcard, destination, and destination-wildcard can be specified as:
· The 32-bit quantity in dotted-decimal format.
· The keyword any for 0.0.0.0 255.255.255.255 (any host).
· The keyword host for a single host 0.0.0.0.
The other keywords are optional and have these meanings:
· precedence--Enter to match packets with a precedence level specified as a number from 0 to 7 or by name: routine (0), priority (1), immediate (2), flash (3), flash-override (4), critical (5), internet (6), network (7).
· fragments--Enter to check non-initial fragments.
· tos--Enter to match by type of service level, specified by a number from 0 to 15 or a name: normal (0), max-reliability (2), max-throughput (4), min-delay (8).
· log--Enter to create an informational logging message to be sent to the console about the packet that matches the entry or log-input to include the input interface in the log entry.
· smartlog--Enter when smart logging is globally enabled to have a copy of the denied or permitted packet sent to a NetFlow collector.
· time-range--Specify the time-range name.
· dscp--Enter to match packets with the DSCP value specified by a number from 0 to 63, or use the question mark (?) to see a list of available values.
Note If you enter a dscp value, you cannot enter tos or precedence. You can enter both a tos and a precedence value with no dscp.

access-list access-list-number {deny | permit} tcp source Defines an extended TCP access list and the access

source-wildcard [operator port] destination

conditions.

destination-wildcard [operator port] [established]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1379

Creating a Numbered Extended ACL

Security

Step 4

Command or Action

Purpose

[precedence precedence] [tos tos] [fragments] [log

The parameters are the same as those described for an

[log-input] ] [time-range time-range-name] [dscp dscp] extended IPv4 ACL, with these exceptions:

[flag]

(Optional) Enter an operator and port to compare source

Example:

(if positioned after source source-wildcard) or destination

(if positioned after destination destination-wildcard) port.

Switch(config)# access-list 101 permit tcp any any Possible operators include eq (equal), gt (greater than), lt

eq 500

(less than), neq (not equal), and range (inclusive range).

Operators require a port number (range requires two port

numbers separated by a space).

Enter the port number as a decimal number (from 0 to 65535) or the name of a TCP port.

The other optional keywords have these meanings:

· established--Enter to match an established connection. This has the same function as matching on the ack or rst flag.

· flag--Enter one of these flags to match by the specified TCP header bits: ack (acknowledge), fin (finish), psh (push), rst (reset), syn (synchronize), or urg (urgent).

access-list access-list-number {deny | permit} udp source (Optional) Defines an extended UDP access list and the

source-wildcard [operator port] destination

access conditions.

destination-wildcard [operator port] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp]

The UDP parameters are the same as those described for TCP except that the [operator [port]] port number or name must be a UDP port number or name, and the flag and

Example:

established keywords are not valid for UDP.

Switch(config)# access-list 101 permit udp any any eq 100

Step 5

access-list access-list-number {deny | permit} icmp source Defines an extended ICMP access list and the access

source-wildcard destination destination-wildcard [icmp-type conditions.

| [[icmp-type icmp-code] | [icmp-message]] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp]

The ICMP parameters are the same as those described for most IP protocols in an extended IPv4 ACL, with the addition of the ICMP message type and code parameters.

Example:

These optional keywords have these meanings:

Switch(config)# access-list 101 permit icmp any any 200

· icmp-type--Enter to filter by ICMP message type, a number from 0 to 255.
· icmp-code--Enter to filter ICMP packets that are filtered by the ICMP message code type, a number from 0 to 255.

· icmp-message--Enter to filter ICMP packets by the ICMP message type name or the ICMP message type and code name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1380

Security

Creating Named Standard ACLs

Step 6

Command or Action

Purpose

access-list access-list-number {deny | permit} igmp source (Optional) Defines an extended IGMP access list and the

source-wildcard destination destination-wildcard

access conditions.

[igmp-type] [precedence precedence] [tos tos] [fragments] [log [log-input] ] [time-range time-range-name] [dscp dscp]

The IGMP parameters are the same as those described for most IP protocols in an extended IPv4 ACL, with this optional parameter.

Example:

igmp-type--To match IGMP message type, enter a number

from 0 to 15, or enter the message name: dvmrp,

Switch(config)# access-list 101 permit igmp any any 14

host-query, host-report, pim, or trace.

Step 7

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Extended IP ACL with the any Keyword
Extended IP ACL with the host Keyword To use an abbreviation for a source and source wildcard of 0.0.0.0 255.255.255.255 and an abbreviation for a destination and destination wildcard of 0.0.0.0 255.255.255.255 when defining an extended IP ACL, use the any keyword in place of source and destination address and wildcard:
Switch# configure terminal Switch(config)# access-list 101 permit ip any any precedence 0 tos 0 fragments log time-range workhours dscp 10 Switch(config)# end
To use an abbreviation for a source and a source wildcard of source 0.0.0.0 and an abbreviation for a destination and destination wildcard of destination 0.0.0.0 when defining an extended IP ACL, use the host keyword in place of the source and destination wildcard or mask.
Switch# configure terminal Switch(config)# access-list 101 permit ip host 10.1.1.2 any Switch(config)# end
Related Topics Configuring VLAN Maps, on page 1390
Creating Named Standard ACLs
Beginning in privileged EXEC mode, follow these steps to create a standard ACL using names:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1381

Creating Named Standard ACLs

Security

SUMMARY STEPS

1. configure terminal 2. ip access-list standard name 3. Use one of the following:
· deny {source [source-wildcard] | host source | any} [log] · permit {source [source-wildcard] | host source | any} [log]]
4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip access-list standard name Example:
Switch(config)# ip access-list standard 20

Defines a standard IPv4 access list using a name, and enter access-list configuration mode.
The name can be a number from 1 to 99.

Step 3

Use one of the following:

In access-list configuration mode, specify one or more

· deny {source [source-wildcard] | host source | any} [log]

conditions denied or permitted to decide if the packet is forwarded or dropped.

· permit {source [source-wildcard] | host source | any} [log]]

· host source--A source and source wildcard of source 0.0.0.0.

Example:
Switch(config-std-nacl)# deny 192.168.0.0 0.0.255.255 255.255.0.0 0.0.255.255

· any--A source and source wildcard of 0.0.0.0 255.255.255.255.

or

Switch(config-std-nacl)# permit 10.108.0.0 0.0.0.0 255.255.255.0 0.0.0.0

Step 4

end Example:
Switch(config-std-nacl)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1382

Security

Creating Extended Named ACLs

Creating Extended Named ACLs
Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:

SUMMARY STEPS

1. configure terminal 2. ip access-list extended name 3. {deny | permit} protocol {source [source-wildcard] | host source | any} {destination [destination-wildcard]
| host destination | any} [precedence precedence] [tos tos] [established] [log] [time-range time-range-name] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip access-list extended name Example:
Switch(config)# ip access-list extended 150

Defines an extended IPv4 access list using a name, and enter access-list configuration mode.
The name can be a number from 100 to 199.

Step 3 Step 4

{deny | permit} protocol {source [source-wildcard] | host In access-list configuration mode, specify the conditions

source | any} {destination [destination-wildcard] | host allowed or denied. Use the log keyword to get access list

destination | any} [precedence precedence] [tos tos]

logging messages, including violations.

[established] [log] [time-range time-range-name]

· host source--A source and source wildcard of source

Example:

0.0.0.0.

Switch(config-ext-nacl)# permit 0 any any

· host destintation--A destination and destination wildcard of destination 0.0.0.0.

· any--A source and source wildcard or destination and destination wildcard of 0.0.0.0 255.255.255.255.

end Example:

Returns to privileged EXEC mode.

Switch(config-ext-nacl)# end

When you are creating extended ACLs, remember that, by default, the end of the ACL contains an implicit deny statement for everything if it did not find a match before reaching the end. For standard ACLs, if you omit the mask from an associated IP host address access list specification, 0.0.0.0 is assumed to be the mask.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1383

Configuring Time Ranges for ACLs

Security

After you create an ACL, any additions are placed at the end of the list. You cannot selectively add ACL entries to a specific ACL. However, you can use no permit and no deny access-list configuration mode commands to remove entries from a named ACL. This example shows how you can delete individual ACEs from the named access list border-list:
Switch(config)# ip access-list extended border-list Switch(config-ext-nacl)# no permit ip host 10.1.1.3 any
Being able to selectively remove lines from a named ACL is one reason you might use named ACLs instead of numbered ACLs.
What to do next After creating a named ACL, you can apply it to interfaces or to VLANs .

Configuring Time Ranges for ACLs
Beginning in privileged EXEC mode, follow these steps to configure a time-range parameter for an ACL:

SUMMARY STEPS

1. configure terminal 2. time-range time-range-name 3. Use one of the following:
· absolute [start time date] [end time date] · periodic day-of-the-week hh:mm to [day-of-the-week] hh:mm · periodic {weekdays | weekend | daily} hh:mm to hh:mm
4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

time-range time-range-name Example:
Switch(config)# time-range workhours

Assigns a meaningful name (for example, workhours) to the time range to be created, and enter time-range configuration mode. The name cannot contain a space or quotation mark and must begin with a letter.

Step 3

Use one of the following: · absolute [start time date] [end time date]

Specifies when the function it will be applied to is operational.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1384

Security

Applying an IPv4 ACL to a Terminal Line

Command or Action

Purpose

· periodic day-of-the-week hh:mm to [day-of-the-week] hh:mm
· periodic {weekdays | weekend | daily} hh:mm to hh:mm
Example:

· You can use only one absolute statement in the time range. If you configure more than one absolute statement, only the one configured last is executed.
· You can enter multiple periodic statements. For example, you could configure different hours for weekdays and weekends.

Switch(config-time-range)# absolute start 00:00 1

Jan 2006 end 23:59 1 Jan 2006

See the example configurations.

or

Switch(config-time-range)# periodic weekdays 8:00 to 12:00

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

What to do next Repeat the steps if you have multiple items that you want in effect at different times. Related Topics
Time Ranges for ACLs, on page 1375

Applying an IPv4 ACL to a Terminal Line
You can use numbered ACLs to control access to one or more terminal lines. You cannot apply named ACLs to lines. You must set identical restrictions on all the virtual terminal lines because a user can attempt to connect to any of them.
Beginning in privileged EXEC mode, follow these steps to restrict incoming and outgoing connections between a virtual terminal line and the addresses in an ACL:

SUMMARY STEPS

1. configure terminal 2. line [console | vty] line-number 3. access-class access-list-number {in | out} 4. end 5. show running-config 6. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1385

Applying an IPv4 ACL to an Interface

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

line [console | vty] line-number Example:
Switch(config)# line console 0

Step 3

access-class access-list-number {in | out} Example:
Switch(config-line)# access-class 10 in

Step 4

end Example:
Switch(config-line)# end

Step 5

show running-config Example:
Switch# show running-config

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enters the global configuration mode.
Identifies a specific line to configure, and enter in-line configuration mode.
· console--Specifies the console terminal line. The console port is DCE.
· vty--Specifies a virtual terminal for remote console access.
The line-number is the first line number in a contiguous group that you want to configure when the line type is specified. The range is from 0 to 16. Restricts incoming and outgoing connections between a particular virtual terminal line (into a device) and the addresses in an access list.
Returns to privileged EXEC mode.
Displays the access list configuration.
(Optional) Saves your entries in the configuration file.

Applying an IPv4 ACL to an Interface
This section describes how to apply IPv4 ACLs to network interfaces. Beginning in privileged EXEC mode, follow these steps to control access to an interface:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1386

Security

Applying an IPv4 ACL to an Interface

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. ip access-group {access-list-number | name} {in | out} 4. end 5. show running-config 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/1

Identifies a specific interface for configuration, and enter interface configuration mode.
The interface can be a Layer 2 interface (port ACL), or a Layer 3 interface (router ACL).

Step 3

ip access-group {access-list-number | name} {in | out} Controls access to the specified interface. Example:
Switch(config-if)# ip access-group 2 in

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 5

show running-config Example:
Switch# show running-config

Displays the access list configuration.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1387

Creating Named MAC Extended ACLs

Security

Related Topics IPv4 ACL Interface Considerations, on page 1375 Restrictions for Configuring Network Security with ACLs, on page 1361

Creating Named MAC Extended ACLs
You can filter non-IPv4 traffic on a VLAN or on a Layer 2 interface by using MAC addresses and named MAC extended ACLs. The procedure is similar to that of configuring other extended named ACLs. Beginning in privileged EXEC mode, follow these steps to create a named MAC extended ACL:

SUMMARY STEPS

1. configure terminal 2. mac access-list extended name 3. {deny | permit} {any | host source MAC address | source MAC address mask} {any | host destination
MAC address | destination MAC address mask} [type mask | lsap lsap mask | aarp | amber | dec-spanning | decnet-iv | diagnostic | dsm | etype-6000 | etype-8042 | lat | lavc-sca | mop-console | mop-dump | msdos | mumps | netbios | vines-echo | vines-ip | xns-idp | 0-65535] [cos cos] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

mac access-list extended name Example:
Switch(config)# mac access-list extended mac1

Defines an extended MAC access list using a name.

Step 3

{deny | permit} {any | host source MAC address | source In extended MAC access-list configuration mode, specifies

MAC address mask} {any | host destination MAC address to permit or deny any source MAC address, a source MAC

| destination MAC address mask} [type mask | lsap lsap address with a mask, or a specific host source MAC address

mask | aarp | amber | dec-spanning | decnet-iv | diagnostic and any destination MAC address, destination MAC address

| dsm | etype-6000 | etype-8042 | lat | lavc-sca |

with a mask, or a specific destination MAC address.

mop-console | mop-dump | msdos | mumps | netbios | vines-echo | vines-ip | xns-idp | 0-65535] [cos cos]

(Optional) You can also enter these options:

Example:

· type mask--An arbitrary EtherType number of a packet with Ethernet II or SNAP encapsulation in decimal,

Switch(config-ext-macl)# deny any any decnet-iv

hexadecimal, or octal with optional mask of don't care bits applied to the EtherType before testing for a

match. or

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1388

Security

Applying a MAC ACL to a Layer 2 Interface

Command or Action
Switch(config-ext-macl)# permit any any

Step 4

end Example:
Switch(config-ext-macl)# end

Purpose · lsap lsap mask--An LSAP number of a packet with IEEE 802.2 encapsulation in decimal, hexadecimal, or octal with optional mask of don't care bits.
· aarp | amber | dec-spanning | decnet-iv | diagnostic | dsm | etype-6000 | etype-8042 | lat | lavc-sca | mop-console | mop-dump | msdos | mumps | netbios | vines-echo | vines-ip | xns-idp--A non-IP protocol.
· cos cos--An IEEE 802.1Q cost of service number from 0 to 7 used to set priority.
Returns to privileged EXEC mode.

Related Topics Restrictions for Configuring Network Security with ACLs, on page 1361 Configuring VLAN Maps, on page 1390

Applying a MAC ACL to a Layer 2 Interface
Beginning in privileged EXEC mode, follow these steps to apply a MAC access list to control access to a Layer 2 interface:

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. mac access-group {name} {in | out } 4. end 5. show mac access-group [interface interface-id] 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1389

Configuring VLAN Maps

Security

Step 2

Command or Action interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/2

Purpose
Identifies a specific interface, and enter interface configuration mode. The interface must be a physical Layer 2 interface (port ACL).

Step 3

mac access-group {name} {in | out } Example:
Switch(config-if)# mac access-group mac1 in

Controls access to the specified interface by using the MAC access list.
Port ACLs are supported in the outbound and inbound directions.

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 5

show mac access-group [interface interface-id] Example:
Switch# show mac access-group interface gigabitethernet1/0/2

Displays the MAC access list applied to the interface or all Layer 2 interfaces.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

After receiving a packet, the switch checks it against the inbound ACL. If the ACL permits it, the switch continues to process the packet. If the ACL rejects the packet, the switch discards it. When you apply an undefined ACL to an interface, the switch acts as if the ACL has not been applied and permits all packets. Remember this behavior if you use undefined ACLs for network security. Related Topics
Restrictions for Configuring Network Security with ACLs, on page 1361
Configuring VLAN Maps
To create a VLAN map and apply it to one or more VLANs, perform these steps:
Before you begin Create the standard or extended IPv4 ACLs or named MAC extended ACLs that you want to apply to the VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1390

Security

Configuring VLAN Maps

SUMMARY STEPS

1. vlan access-map name [number] 2. match {ip | mac} address {name | number} [name | number] 3. Enter one of the following commands to specify an IP packet or a non-IP packet (with only a known MAC
address) and to match the packet against one or more ACLs (standard or extended):
· action { forward}

Switch(config-access-map)# action forward

· action { drop}

Switch(config-access-map)# action drop

4. vlan filter mapname vlan-list list

DETAILED STEPS

Step 1

Command or Action vlan access-map name [number] Example:
Switch(config)# vlan access-map map_1 20

Purpose
Creates a VLAN map, and give it a name and (optionally) a number. The number is the sequence number of the entry within the map.
When you create VLAN maps with the same name, numbers are assigned sequentially in increments of 10. When modifying or deleting maps, you can enter the number of the map entry that you want to modify or delete.
VLAN maps do not use the specific permit or deny keywords. To deny a packet by using VLAN maps, create an ACL that would match the packet, and set the action to drop. A permit in the ACL counts as a match. A deny in the ACL means no match.
Entering this command changes to access-map configuration mode.

Step 2

match {ip | mac} address {name | number} [name | number] Example:
Switch(config-access-map)# match ip address ip2

Match the packet (using either the IP or MAC address) against one or more standard or extended access lists. Note that packets are only matched against access lists of the correct protocol type. IP packets are matched against standard or extended IP access lists. Non-IP packets are only matched against named MAC extended access lists.
Note If the VLAN map is configured with a match clause for a type of packet (IP or MAC) and the map action is drop, all packets that match the type are dropped. If the VLAN map has no match clause, and the configured action is drop, all IP and Layer 2 packets are dropped.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1391

Creating a VLAN Map

Security

Step 3

Command or Action

Purpose

Enter one of the following commands to specify an IP Sets the action for the map entry. packet or a non-IP packet (with only a known MAC address) and to match the packet against one or more ACLs (standard or extended):

· action { forward}

Switch(config-access-map)# action forward

· action { drop}

Switch(config-access-map)# action drop

Step 4

vlan filter mapname vlan-list list

Applies the VLAN map to one or more VLAN IDs.

Example:

The list can be a single VLAN ID (22), a consecutive list

(10-22), or a string of VLAN IDs (12, 22, 30). Spaces

Switch(config)# vlan filter map 1 vlan-list 20-22 around the comma and hyphen are optional.

Related Topics Creating a Numbered Standard ACL, on page 1376 Creating a Numbered Extended ACL, on page 1378 Creating Named MAC Extended ACLs, on page 1388 Creating a VLAN Map, on page 1392 Applying a VLAN Map to a VLAN, on page 1394

Creating a VLAN Map
Each VLAN map consists of an ordered series of entries. Beginning in privileged EXEC mode, follow these steps to create, add to, or delete a VLAN map entry:

SUMMARY STEPS

1. configure terminal 2. vlan access-map name [number] 3. match {ip | mac} address {name | number} [name | number] 4. action {drop | forward} 5. end 6. show running-config 7. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1392

Security

Creating a VLAN Map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2
Step 3 Step 4

vlan access-map name [number] Example:
Switch(config)# vlan access-map map_1 20

Creates a VLAN map, and give it a name and (optionally) a number. The number is the sequence number of the entry within the map.
When you create VLAN maps with the same name, numbers are assigned sequentially in increments of 10. When modifying or deleting maps, you can enter the number of the map entry that you want to modify or delete.
VLAN maps do not use the specific permit or deny keywords. To deny a packet by using VLAN maps, create an ACL that would match the packet, and set the action to drop. A permit in the ACL counts as a match. A deny in the ACL means no match.
Entering this command changes to access-map configuration mode.

match {ip | mac} address {name | number} [name | number] Example:
Switch(config-access-map)# match ip address ip2

Match the packet (using either the IP or MAC address) against one or more standard or extended access lists. Note that packets are only matched against access lists of the correct protocol type. IP packets are matched against standard or extended IP access lists. Non-IP packets are only matched against named MAC extended access lists.

action {drop | forward} Example:

(Optional) Sets the action for the map entry. The default is to forward.

Switch(config-access-map)# action forward

Step 5

end Example:
Switch(config-access-map)# end

Returns to global configuration mode.

Step 6

show running-config Example:
Switch# show running-config

Displays the access list configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1393

Applying a VLAN Map to a VLAN

Security

Step 7

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Related Topics Configuring VLAN Maps, on page 1390

Applying a VLAN Map to a VLAN
Beginning in privileged EXEC mode, follow these steps to apply a VLAN map to one or more VLANs:

SUMMARY STEPS

1. configure terminal 2. vlan filter mapname vlan-list list 3. end 4. show running-config 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

vlan filter mapname vlan-list list

Applies the VLAN map to one or more VLAN IDs.

Example:

The list can be a single VLAN ID (22), a consecutive list

(10-22), or a string of VLAN IDs (12, 22, 30). Spaces

Switch(config)# vlan filter map 1 vlan-list 20-22 around the comma and hyphen are optional.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

show running-config Example:
Switch# show running-config

Displays the access list configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1394

Security

Configuring VACL Logging

Step 5

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Related Topics Configuring VLAN Maps, on page 1390

Configuring VACL Logging
Beginning in privileged EXEC mode:

SUMMARY STEPS

1. configure terminal 2. vlan access-map name [number] 3. action drop log 4. exit 5. vlan access-log {maxflow max_number | threshold pkt_count} 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

vlan access-map name [number] Example:
Switch(config)# vlan access-map gandymede 10

Step 3

action drop log Example:

Creates a VLAN map. Give it a name and optionally a number. The number is the sequence number of the entry within the map.
The sequence number range is from 0 to 65535.
When you create VLAN maps with the same name, numbers are assigned sequentially in increments of 10. When modifying or deleting maps, you can enter the number of the map entry that you want to modify or delete.
Specifying the map name and optionally a number enters the access-map configuration mode.
Sets the VLAN access map to drop and log IP packets.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1395

Monitoring IPv4 ACLs

Security

Command or Action
Switch(config-access-map)# action drop log

Purpose

Step 4

exit Example:
Switch(config-access-map)# exit

Exits the VLAN access map configuration mode and return to the global configuration mode.

Step 5 Step 6

vlan access-log {maxflow max_number | threshold pkt_count} Example:
Switch(config)# vlan access-log threshold 4000

Configures the VACL logging parameters.
· maxflow max_number--Sets the log table size. The content of the log table can be deleted by setting the maxflow to 0. When the log table is full, the software drops logged packets from new flows.
The range is from 0 to 2048. The default is 500.
· threshold pkt_count--Sets the logging threshold. A logging message is generated if the threshold for a flow is reached before the 5-minute interval.
The threshold range is from 0 to 2147483647. The default threshold is 0, which means that a syslog message is generated every 5 minutes.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Monitoring IPv4 ACLs

You can monitor IPv4 ACLs by displaying the ACLs that are configured on the switch, and displaying the ACLs that have been applied to interfaces and VLANs.
When you use the ip access-group interface configuration command to apply ACLs to a Layer 2 or 3 interface, you can display the access groups on the interface. You can also display the MAC ACLs applied to a Layer 2 interface. You can use the privileged EXEC commands as described in this table to display this information.
Table 124: Commands for Displaying Access Lists and Access Groups

Command show access-lists [number | name]

Purpose
Displays the contents of one or all current IP and MAC address access lists or a specific access list (numbered or named).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1396

Security

Configuration Examples for ACLs

Command show ip access-lists [number | name] show ip interface interface-id
show running-config [interface interface-id]
show mac access-group [interface interface-id]

Purpose
Displays the contents of all current IP access lists or a specific IP access list (numbered or named).
Displays detailed configuration and status of an interface. If IP is enabled on the interface and ACLs have been applied by using the ip access-group interface configuration command, the access groups are included in the display.
Displays the contents of the configuration file for the switch or the specified interface, including all configured MAC and IP access lists and which access groups are applied to an interface.
Displays MAC access lists applied to all Layer 2 interfaces or the specified
Layer 2 interface.

You can also monitor VLAN maps by displaying information about VLAN access maps or VLAN filters. Use the privileged EXEC commands in this table to display VLAN map information.
Table 125: Commands for Displaying VLAN Map Information

Command show vlan access-map [mapname]

Purpose
Displays information about all VLAN access maps or the specified access map.

show vlan filter [access-map name | vlan vlan-id] Displays information about all VLAN filters or about a specified VLAN or VLAN access map.

Configuration Examples for ACLs
Examples: Using Time Ranges with ACLs
This example shows how to verify after you configure time ranges for workhours and to configure January 1, 2006, as a company holiday.
Switch# show time-range time-range entry: new_year_day_2003 (inactive)
absolute start 00:00 01 January 2006 end 23:59 01 January 2006 time-range entry: workhours (inactive)
periodic weekdays 8:00 to 12:00 periodic weekdays 13:00 to 17:00
To apply a time range, enter the time-range name in an extended ACL that can implement time ranges. This example shows how to create and verify extended access list 188 that denies TCP traffic from any source to any destination during the defined holiday times and permits all TCP traffic during work hours.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1397

Examples: Including Comments in ACLs

Security

Switch(config)# access-list 188 deny tcp any any time-range new_year_day_2006 Switch(config)# access-list 188 permit tcp any any time-range workhours Switch(config)# end Switch# show access-lists Extended IP access list 188
10 deny tcp any any time-range new_year_day_2006 (inactive) 20 permit tcp any any time-range workhours (inactive)
This example uses named ACLs to permit and deny the same traffic.
Switch(config)# ip access-list extended deny_access Switch(config-ext-nacl)# deny tcp any any time-range new_year_day_2006 Switch(config-ext-nacl)# exit Switch(config)# ip access-list extended may_access Switch(config-ext-nacl)# permit tcp any any time-range workhours Switch(config-ext-nacl)# end Switch# show ip access-lists Extended IP access list lpip_default
10 permit ip any any Extended IP access list deny_access
10 deny tcp any any time-range new_year_day_2006 (inactive) Extended IP access list may_access
10 permit tcp any any time-range workhours (inactive)
Examples: Including Comments in ACLs
You can use the remark keyword to include comments (remarks) about entries in any IP standard or extended ACL. The remarks make the ACL easier for you to understand and scan. Each remark line is limited to 100 characters.
The remark can go before or after a permit or deny statement. You should be consistent about where you put the remark so that it is clear which remark describes which permit or deny statement. For example, it would be confusing to have some remarks before the associated permit or deny statements and some remarks after the associated statements.
To include a comment for IP numbered standard or extended ACLs, use the access-list access-list number remark remark global configuration command. To remove the remark, use the no form of this command.
In this example, the workstation that belongs to Jones is allowed access, and the workstation that belongs to Smith is not allowed access:
Switch(config)# access-list 1 remark Permit only Jones workstation through Switch(config)# access-list 1 permit 171.69.2.88 Switch(config)# access-list 1 remark Do not allow Smith through Switch(config)# access-list 1 deny 171.69.3.13
For an entry in a named IP ACL, use the remark access-list configuration command. To remove the remark, use the no form of this command.
In this example, the Jones subnet is not allowed to use outbound Telnet:
Switch(config)# ip access-list extended telnetting Switch(config-ext-nacl)# remark Do not allow Jones subnet to telnet out Switch(config-ext-nacl)# deny tcp host 171.69.2.88 any eq telnet

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1398

Security

Examples: Troubleshooting ACLs

Examples: Troubleshooting ACLs
If this ACL manager message appears and [chars] is the access-list name,
ACLMGR-2-NOVMR: Cannot generate hardware representation of access list [chars]
The switch has insufficient resources to create a hardware representation of the ACL. The resources include hardware memory and label space but not CPU memory. A lack of available logical operation units or specialized hardware resources causes this problem. Logical operation units are needed for a TCP flag match or a test other than eq (ne, gt, lt, or range) on TCP, UDP, or SCTP port numbers. Use one of these workarounds:
· Modify the ACL configuration to use fewer resources. · Rename the ACL with a name or number that alphanumerically precedes the ACL names or numbers.
To determine the specialized hardware resources, enter the show platform layer4 acl map privileged EXEC command. If the switch does not have available resources, the output shows that index 0 to index 15 are not available. For more information about configuring ACLs with insufficient resources, see CSCsq63926 in the Bug Toolkit. For example, if you apply this ACL to an interface:
permit tcp source source-wildcard destination destination-wildcard range 5 60 permit tcp source source-wildcard destination destination-wildcard range 15 160 permit tcp source source-wildcard destination destination-wildcard range 115 1660 permit tcp source source-wildcard destination destination-wildcard
And if this message appears:
ACLMGR-2-NOVMR: Cannot generate hardware representation of access list [chars]
The flag-related operators are not available. To avoid this issue, · Move the fourth ACE before the first ACE by using ip access-list resequence global configuration command:
permit tcp source source-wildcard destination destination-wildcard permit tcp source source-wildcard destination destination-wildcard range 5 60 permit tcp source source-wildcard destination destination-wildcard range 15 160 permit tcp source source-wildcard destination destination-wildcard range 115 1660
or · Rename the ACL with a name or number that alphanumerically precedes the other ACLs (for example,
rename ACL 79 to ACL 1).
You can now apply the first ACE in the ACL to the interface. The switch allocates the ACE to available mapping bits in the Opselect index and then allocates flag-related operators to use the same bits in the hardware memory.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1399

IPv4 ACL Configuration Examples

Security

IPv4 ACL Configuration Examples
This section provides examples of configuring and applying IPv4 ACLs. For detailed information about compiling ACLs, see the Cisco IOS Security Configuration Guide, Release 12.4 and to the Configuring IP Services" section in the "IP Addressing and Services" chapter of the Cisco IOS IP Configuration Guide, Release 12.4.
ACLs in a Small Networked Office
Figure 74: Using Router ACLs to Control Traffic
This shows a small networked office environment with routed Port 2 connected to Server A, containing benefits and other information that all employees can access, and routed Port 1 connected to Server B, containing confidential payroll data. All users can access Server A, but Server B has restricted

access. Use router ACLs to do this in one of two ways:
· Create a standard ACL, and filter traffic coming to the server from Port 1. · Create an extended ACL, and filter traffic coming from the server into Port 1.
Examples: ACLs in a Small Networked Office
This example uses a standard ACL to filter traffic coming into Server B from a port, permitting traffic only from Accounting's source addresses 172.20.128.64 to 172.20.128.95. The ACL is applied to traffic coming out of routed Port 1 from the specified source address.
Switch(config)# access-list 6 permit 172.20.128.64 0.0.0.31 Switch(config)# end Switch# how access-lists Standard IP access list 6
10 permit 172.20.128.64, wildcard bits 0.0.0.31
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1400

Security

Example: Numbered ACLs

Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group 6 out
This example uses an extended ACL to filter traffic coming from Server B into a port, permitting traffic from any source address (in this case Server B) to only the Accounting destination addresses 172.20.128.64 to 172.20.128.95. The ACL is applied to traffic going into routed Port 1, permitting it to go only to the specified destination addresses. Note that with extended ACLs, you must enter the protocol (IP) before the source and destination information.
Switch(config)# access-list 106 permit ip any 172.20.128.64 0.0.0.31 Switch(config)# end Switch# show access-lists Extended IP access list 106
10 permit ip any 172.20.128.64 0.0.0.31 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group 106 in
Example: Numbered ACLs
In this example, network 36.0.0.0 is a Class A network whose second octet specifies a subnet; that is, its subnet mask is 255.255.0.0. The third and fourth octets of a network 36.0.0.0 address specify a particular host. Using access list 2, the switch accepts one address on subnet 48 and reject all others on that subnet. The last line of the list shows that the switch accepts addresses on all other network 36.0.0.0 subnets. The ACL is applied to packets entering a port.
Switch(config)# access-list 2 permit 36.48.0.3 Switch(config)# access-list 2 deny 36.48.0.0 0.0.255.255 Switch(config)# access-list 2 permit 36.0.0.0 0.255.255.255 Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ip access-group 2 in
Examples: Extended ACLs
In this example, the first line permits any incoming TCP connections with destination ports greater than 1023. The second line permits incoming TCP connections to the Simple Mail Transfer Protocol (SMTP) port of host 128.88.1.2. The third line permits incoming ICMP messages for error feedback.
Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 gt 1023 Switch(config)# access-list 102 permit tcp any host 128.88.1.2 eq 25 Switch(config)# access-list 102 permit icmp any any Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ip access-group 102 in
In this example, suppose that you have a network connected to the Internet, and you want any host on the network to be able to form TCP connections to any host on the Internet. However, you do not want IP hosts to be able to form TCP connections to hosts on your network, except to the mail (SMTP) port of a dedicated mail host.
SMTP uses TCP port 25 on one end of the connection and a random port number on the other end. The same port numbers are used throughout the life of the connection. Mail packets coming in from the Internet have a destination port of 25. Outbound packets have the port numbers reversed. Because the secure system of the network always accepts mail connections on port 25, the incoming and outgoing services are separately

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1401

Examples: Named ACLs

Security

controlled. The ACL must be configured as an input ACL on the outbound interface and an output ACL on the inbound interface.
Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 eq 23 Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 eq 25 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group 102 in
In this example, the network is a Class B network with the address 128.88.0.0, and the mail host address is 128.88.1.2. The established keyword is used only for the TCP to show an established connection. A match occurs if the TCP datagram has the ACK or RST bits set, which show that the packet belongs to an existing connection. Gigabit Ethernet interface 1 on stack member 1 is the interface that connects the router to the Internet.
Switch(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 established Switch(config)# access-list 102 permit tcp any host 128.88.1.2 eq 25 Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group 102 in
Examples: Named ACLs
This example creates a standard ACL named internet_filter and an extended ACL named marketing_group. The internet_filter ACL allows all traffic from the source address 1.2.3.4.
Switch(config)# ip access-list standard Internet_filter Switch(config-ext-nacl)# permit 1.2.3.4 Switch(config-ext-nacl)# exit
The marketing_group ACL allows any TCP Telnet traffic to the destination address and wildcard 171.69.0.0 0.0.255.255 and denies any other TCP traffic. It permits ICMP traffic, denies UDP traffic from any source to the destination address range 171.69.0.0 through 179.69.255.255 with a destination port less than 1024, denies any other IP traffic, and provides a log of the result.
Switch(config)# ip access-list extended marketing_group Switch(config-ext-nacl)# permit tcp any 171.69.0.0 0.0.255.255 eq telnet Switch(config-ext-nacl)# deny tcp any any Switch(config-ext-nacl)# permit icmp any any Switch(config-ext-nacl)# deny udp any 171.69.0.0 0.0.255.255 lt 1024 Switch(config-ext-nacl)# deny ip any any log Switch(config-ext-nacl)# exit
The Internet_filter ACL is applied to outgoing traffic and the marketing_group ACL is applied to incoming traffic on a Layer 3 port.
Switch(config)# interface gigabitethernet3/0/2 Switch(config-if)# no switchport Switch(config-if)# ip address 2.0.5.1 255.255.255.0 Switch(config-if)# ip access-group Internet_filter out Switch(config-if)# ip access-group marketing_group in

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1402

Security

Examples: Time Range Applied to an IP ACL

Examples: Time Range Applied to an IP ACL
This example denies HTTP traffic on IP on Monday through Friday between the hours of 8:00 a.m. and 6:00 p.m (18:00). The example allows UDP traffic only on Saturday and Sunday from noon to 8:00 p.m. (20:00).
Switch(config)# time-range no-http Switch(config)# periodic weekdays 8:00 to 18:00 ! Switch(config)# time-range udp-yes Switch(config)# periodic weekend 12:00 to 20:00 ! Switch(config)# ip access-list extended strict Switch(config-ext-nacl)# deny tcp any any eq www time-range no-http Switch(config-ext-nacl)# permit udp any any time-range udp-yes ! Switch(config-ext-nacl)# exit Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ip access-group strict in
Examples: Commented IP ACL Entries
In this example of a numbered ACL, the workstation that belongs to Jones is allowed access, and the workstation that belongs to Smith is not allowed access:
Switch(config)# access-list 1 remark Permit only Jones workstation through Switch(config)# access-list 1 permit 171.69.2.88 Switch(config)# access-list 1 remark Do not allow Smith workstation through Switch(config)# access-list 1 deny 171.69.3.13
In this example of a numbered ACL, the Winter and Smith workstations are not allowed to browse the web:
Switch(config)# access-list 100 remark Do not allow Winter to browse the web Switch(config)# access-list 100 deny host 171.69.3.85 any eq www Switch(config)# access-list 100 remark Do not allow Smith to browse the web Switch(config)# access-list 100 deny host 171.69.3.13 any eq www
In this example of a named ACL, the Jones subnet is not allowed access:
Switch(config)# ip access-list standard prevention Switch(config-std-nacl)# remark Do not allow Jones subnet through Switch(config-std-nacl)# deny 171.69.0.0 0.0.255.255
In this example of a named ACL, the Jones subnet is not allowed to use outbound Telnet:
Switch(config)# ip access-list extended telnetting Switch(config-ext-nacl)# remark Do not allow Jones subnet to telnet out Switch(config-ext-nacl)# deny tcp 171.69.0.0 0.0.255.255 any eq telnet
Examples: ACL Logging
Two variations of logging are supported on router ACLs. The log keyword sends an informational logging message to the console about the packet that matches the entry; the log-input keyword includes the input interface in the log entry.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1403

Examples: ACL Logging

Security

In this example, standard named access list stan1 denies traffic from 10.1.1.0 0.0.0.255, allows traffic from all other sources, and includes the log keyword.
Switch(config)# ip access-list standard stan1 Switch(config-std-nacl)# deny 10.1.1.0 0.0.0.255 log Switch(config-std-nacl)# permit any log Switch(config-std-nacl)# exit Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# ip access-group stan1 in Switch(config-if)# end Switch# show logging Syslog logging: enabled (0 messages dropped, 0 flushes, 0 overruns)
Console logging: level debugging, 37 messages logged Monitor logging: level debugging, 0 messages logged Buffer logging: level debugging, 37 messages logged File logging: disabled Trap logging: level debugging, 39 message lines logged
Log Buffer (4096 bytes):
00:00:48: NTP: authentication delay calculation problems
<output truncated>
00:09:34:%SEC-6-IPACCESSLOGS:list stan1 permitted 0.0.0.0 1 packet 00:09:59:%SEC-6-IPACCESSLOGS:list stan1 denied 10.1.1.15 1 packet 00:10:11:%SEC-6-IPACCESSLOGS:list stan1 permitted 0.0.0.0 1 packet
This example is a named extended access list ext1 that permits ICMP packets from any source to 10.1.1.0 0.0.0.255 and denies all UDP packets.
Switch(config)# ip access-list extended ext1 Switch(config-ext-nacl)# permit icmp any 10.1.1.0 0.0.0.255 log Switch(config-ext-nacl)# deny udp any any log Switch(config-std-nacl)# exit Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# ip access-group ext1 in
This is a an example of a log for an extended ACL:
01:24:23:%SEC-6-IPACCESSLOGDP:list ext1 permitted icmp 10.1.1.15 -> 10.1.1.61 (0/0), 1 packet 01:25:14:%SEC-6-IPACCESSLOGDP:list ext1 permitted icmp 10.1.1.15 -> 10.1.1.61 (0/0), 7 packets 01:26:12:%SEC-6-IPACCESSLOGP:list ext1 denied udp 0.0.0.0(0) -> 255.255.255.255(0), 1 packet 01:31:33:%SEC-6-IPACCESSLOGP:list ext1 denied udp 0.0.0.0(0) -> 255.255.255.255(0), 8 packets
Note that all logging entries for IP ACLs start with %SEC-6-IPACCESSLOG with minor variations in format depending on the kind of ACL and the access entry that has been matched.
This is an example of an output message when the log-input keyword is entered:
00:04:21:%SEC-6-IPACCESSLOGDP:list inputlog permitted icmp 10.1.1.10 (Vlan1 0001.42ef.a400) ->
10.1.1.61 (0/0), 1 packet

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1404

Security

Configuration Examples for ACLs and VLAN Maps

A log message for the same sort of packet using the log keyword does not include the input interface information:
00:05:47:%SEC-6-IPACCESSLOGDP:list inputlog permitted icmp 10.1.1.10 -> 10.1.1.61 (0/0), 1 packet
Configuration Examples for ACLs and VLAN Maps
Example: Creating an ACL and a VLAN Map to Deny a Packet
This example shows how to create an ACL and a VLAN map to deny a packet. In the first map, any packets that match the ip1 ACL (TCP packets) would be dropped. You first create the ip1 ACL to permit any TCP packet and no other packets. Because there is a match clause for IP packets in the VLAN map, the default action is to drop any IP packet that does not match any of the match clauses.
Switch(config)# ip access-list extended ip1 Switch(config-ext-nacl)# permit tcp any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map map_1 10 Switch(config-access-map)# match ip address ip1 Switch(config-access-map)# action drop
Example: Creating an ACL and a VLAN Map to Permit a Packet
This example shows how to create a VLAN map to permit a packet. ACL ip2 permits UDP packets and any packets that match the ip2 ACL are forwarded. In this map, any IP packets that did not match any of the previous ACLs (that is, packets that are not TCP packets or UDP packets) would get dropped.
Switch(config)# ip access-list extended ip2 Switch(config-ext-nacl)# permit udp any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map map_1 20 Switch(config-access-map)# match ip address ip2 Switch(config-access-map)# action forward
Example: Default Action of Dropping IP Packets and Forwarding MAC Packets
In this example, the VLAN map has a default action of drop for IP packets and a default action of forward for MAC packets. Used with standard ACL 101 and extended named access lists igmp-match and tcp-match, the map will have the following results:
· Forward all UDP packets
· Drop all IGMP packets
· Forward all TCP packets
· Drop all other IP packets
· Forward all non-IP packets
Switch(config)# access-list 101 permit udp any any Switch(config)# ip access-list extended igmp-match

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1405

Example: Default Action of Dropping MAC Packets and Forwarding IP Packets

Security

Switch(config-ext-nacl)# permit igmp any any Switch(config)# action forward Switch(config-ext-nacl)# permit tcp any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map drop-ip-default 10 Switch(config-access-map)# match ip address 101 Switch(config-access-map)# action forward Switch(config-access-map)# exit Switch(config)# vlan access-map drop-ip-default 20 Switch(config-access-map)# match ip address igmp-match Switch(config-access-map)# action drop Switch(config-access-map)# exit Switch(config)# vlan access-map drop-ip-default 30 Switch(config-access-map)# match ip address tcp-match Switch(config-access-map)# action forward
Example: Default Action of Dropping MAC Packets and Forwarding IP Packets
In this example, the VLAN map has a default action of drop for MAC packets and a default action of forward for IP packets. Used with MAC extended access lists good-hosts and good-protocols, the map will have the following results:
· Forward MAC packets from hosts 0000.0c00.0111 and 0000.0c00.0211
· Forward MAC packets with decnet-iv or vines-ip protocols
· Drop all other non-IP packets
· Forward all IP packets
Switch(config)# mac access-list extended good-hosts Switch(config-ext-macl)# permit host 000.0c00.0111 any Switch(config-ext-macl)# permit host 000.0c00.0211 any Switch(config-ext-nacl)# exit Switch(config)# action forward Switch(config-ext-macl)# mac access-list extended good-protocols Switch(config-ext-macl)# permit any any vines-ip Switch(config-ext-nacl)# exit Switch(config)# vlan access-map drop-mac-default 10 Switch(config-access-map)# match mac address good-hosts Switch(config-access-map)# action forward Switch(config-access-map)# exit Switch(config)# vlan access-map drop-mac-default 20 Switch(config-access-map)# match mac address good-protocols Switch(config-access-map)# action forward
Example: Default Action of Dropping All Packets
In this example, the VLAN map has a default action of drop for all packets (IP and non-IP). Used with access lists tcp-match and good-hosts from Examples 2 and 3, the map will have the following results:
· Forward all TCP packets
· Forward MAC packets from hosts 0000.0c00.0111 and 0000.0c00.0211
· Drop all other IP packets
· Drop all other MAC packets

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1406

Security

Configuration Examples for Using VLAN Maps in Your Network

Switch(config)# vlan access-map drop-all-default 10 Switch(config-access-map)# match ip address tcp-match Switch(config-access-map)# action forward Switch(config-access-map)# exit Switch(config)# vlan access-map drop-all-default 20 Switch(config-access-map)# match mac address good-hosts Switch(config-access-map)# action forward
Configuration Examples for Using VLAN Maps in Your Network
Example: Wiring Closet Configuration
Figure 75: Wiring Closet Configuration
In a wiring closet configuration, routing might not be enabled on the switch. In this configuration, the switch can still support a VLAN map and a QoS classification ACL. Assume that Host X and Host Y are in different VLANs and are connected to wiring closet switches A and C. Traffic from Host X to Host Y is eventually being routed by Switch B, a Layer 3 switch with routing enabled. Traffic from Host X to Host Y can be access-controlled at the traffic entry point,

Switch A. If you do not want HTTP traffic switched from Host X to Host Y, you can configure a VLAN map on Switch A to drop all HTTP traffic from Host X (IP address 10.1.1.32) to Host Y (IP address 10.1.1.34) at Switch A and not bridge it to Switch B. First, define the IP access list http that permits (matches) any TCP traffic on the HTTP port.
Switch(config)# ip access-list extended http Switch(config-ext-nacl)# permit tcp host 10.1.1.32 host 10.1.1.34 eq www Switch(config-ext-nacl)# exit
Next, create VLAN access map map2 so that traffic that matches the http access list is dropped and all other IP traffic is forwarded.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1407

Example: Restricting Access to a Server on Another VLAN

Security

Switch(config)# vlan access-map map2 10 Switch(config-access-map)# match ip address http Switch(config-access-map)# action drop Switch(config-access-map)# exit Switch(config)# ip access-list extended match_all Switch(config-ext-nacl)# permit ip any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map map2 20 Switch(config-access-map)# match ip address match_all Switch(config-access-map)# action forward
Then, apply VLAN access map map2 to VLAN 1.
Switch(config)# vlan filter map2 vlan 1
Example: Restricting Access to a Server on Another VLAN
Figure 76: Restricting Access to a Server on Another VLAN
You can restrict access to a server on another VLAN. For example, server 10.1.1.100 in VLAN 10 needs to have access denied to these hosts:
· Hosts in subnet 10.1.2.0/8 in VLAN 20 should not have access.
· Hosts 10.1.1.4 and 10.1.1.8 in VLAN 10 should not have access.

Example: Denying Access to a Server on Another VLAN
This example shows how to deny access to a server on another VLAN by creating the VLAN map SERVER 1 that denies access to hosts in subnet 10.1.2.0.8, host 10.1.1.4, and host 10.1.1.8 and permits other IP traffic. The final step is to apply the map SERVER1 to VLAN 10. Define the IP ACL that will match the correct packets.
Switch(config)# ip access-list extended SERVER1_ACL Switch(config-ext-nacl))# permit ip 10.1.2.0 0.0.0.255 host 10.1.1.100 Switch(config-ext-nacl))# permit ip host 10.1.1.4 host 10.1.1.100 Switch(config-ext-nacl))# permit ip host 10.1.1.8 host 10.1.1.100
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1408

Security

Configuration Examples of Router ACLs and VLAN Maps Applied to VLANs

Switch(config-ext-nacl))# exit
Define a VLAN map using this ACL that will drop IP packets that match SERVER1_ACL and forward IP packets that do not match the ACL.
Switch(config)# vlan access-map SERVER1_MAP Switch(config-access-map)# match ip address SERVER1_ACL Switch(config-access-map)# action drop Switch(config)# vlan access-map SERVER1_MAP 20 Switch(config-access-map)# action forward Switch(config-access-map)# exit
Apply the VLAN map to VLAN 10.
Switch(config)# vlan filter SERVER1_MAP vlan-list 10
Configuration Examples of Router ACLs and VLAN Maps Applied to VLANs
This section gives examples of applying router ACLs and VLAN maps to a VLAN for switched, bridged, routed, and multicast packets. Although the following illustrations show packets being forwarded to their destination, each time the packet's path crosses a line indicating a VLAN map or an ACL, it is also possible that the packet might be dropped, rather than forwarded.
Example: ACLs and Switched Packets
Figure 77: Applying ACLs on Switched Packets
This example shows how an ACL is applied on packets that are switched within a VLAN. Packets switched within the VLAN without being routed or forwarded by fallback bridging are only subject to the VLAN map of the input VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1409

Example: ACLs and Bridged Packets

Security

Example: ACLs and Bridged Packets
Figure 78: Applying ACLs on Bridged Packets
This example shows how an ACL is applied on fallback-bridged packets. For bridged packets, only Layer 2 ACLs are applied to the input VLAN. Only non-IP, non-ARP packets can be fallback-bridged.

Example: ACLs and Routed Packets
Figure 79: Applying ACLs on Routed Packets
This example shows how ACLs are applied on routed packets. The ACLs are applied in this order: 1. VLAN map for input VLAN 2. Input router ACL 3. Output router ACL 4. VLAN map for output VLAN

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1410

Security

Example: ACLs and Multicast Packets

Example: ACLs and Multicast Packets
Figure 80: Applying ACLs on Multicast Packets
This example shows how ACLs are applied on packets that are replicated for IP multicasting. A multicast packet being routed has two different kinds of filters applied: one for destinations that are other ports in the input VLAN and another for each of the destinations that are in other VLANs to which the packet has been routed. The packet might be routed to more than one output VLAN, in which case a different router output ACL and VLAN map would apply for each destination VLAN. The final result is that the packet might be permitted in some of the output VLANs and not in others. A copy of the packet is forwarded to those destinations where it is permitted. However, if the input VLAN map drops the packet, no destination receives a copy of the packet.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1411

Additional References

Security

Additional References

Related Documents

Related Topic

Document Title

IPv4 Access Control List topics Securing the Data Plane Configuration Guide Library, Cisco IOS XE Release 3SE (Cata

http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secda

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for ACLs
Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1412

7 0 C H A P T E R
Configuring IPv6 ACLs
· Finding Feature Information, on page 1413 · Information about IPv6 ACLs, on page 1413 · Restrictions for IPv6 ACLs, on page 1414 · Default Configuration for IPv6 ACLs , on page 1415 · How to Configure IPv6 ACLs, on page 1415 · How to Attach an IPv6 ACL to an Interface, on page 1419 · Monitoring IPv6 ACLs, on page 1420 · Additional References, on page 1421
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information about IPv6 ACLs
You can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them to interfaces similarly to the way that you create and apply IP Version 4 (IPv4) named ACLs. You can also create and apply input router ACLs to filter Layer 3 management traffic when the switch is running the IP base and LAN base feature sets. A switch supports two types of IPv6 ACLs:
· IPv6 router ACLs are supported on outbound or inbound traffic on Layer 3 interfaces, which can be routed ports, switch virtual interfaces (SVIs), or Layer 3 EtherChannels. IPv6 router ACLs apply only to IPv6 packets that are routed.
· IPv6 port ACLs are supported on inbound and outbound Layer 2 interfaces. IPv6 port ACLs are applied to all IPv6 packets entering the interface.
The switch does not support VLAN ACLs (VLAN maps) for IPv6 traffic.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1413

Switch Stacks and IPv6 ACLs

Security

You can apply both IPv4 and IPv6 ACLs to an interface. As with IPv4 ACLs, IPv6 port ACLs take precedence over router ACLs.
Switch Stacks and IPv6 ACLs
The active switch supports IPv6 ACLs in hardware and distributes the IPv6 ACLs to the stack members. If a standby switch takes over as the active switch, it distributes the ACL configuration to all stack members. The member switches sync up the configuration distributed by the new active switch and flush out entries that are not required. When an ACL is modified, attached to, or detached from an interface, the active switch distributes the change to all stack members.
Interactions with Other Features and Switches
· If an IPv6 router ACL is configured to deny a packet, the packet is not routed. A copy of the packet is sent to the Internet Control Message Protocol (ICMP) queue to generate an ICMP unreachable message for the frame.
· If a bridged frame is to be dropped due to a port ACL, the frame is not bridged.
· You can create both IPv4 and IPv6 ACLs on a switch or switch stack, and you can apply both IPv4 and IPv6 ACLs to the same interface. Each ACL must have a unique name; an error message appears if you try to use a name that is already configured. You use different commands to create IPv4 and IPv6 ACLs and to attach IPv4 or IPv6 ACLs to the same Layer 2 or Layer 3 interface. If you use the wrong command to attach an ACL (for example, an IPv4 command to attach an IPv6 ACL), you receive an error message.
· You cannot use MAC ACLs to filter IPv6 frames. MAC ACLs can only filter non-IP frames.
· If the hardware memory is full, packets are dropped on the interface and an unload error message is logged.
Restrictions for IPv6 ACLs
With IPv4, you can configure standard and extended numbered IP ACLs, named IP ACLs, and MAC ACLs. IPv6 supports only named ACLs. The switch supports most Cisco IOS-supported IPv6 ACLs with some exceptions:
· The switch does not support matching on these keywords: flowlabel, routing header, and undetermined-transport.
· The switch does not support reflexive ACLs (the reflect keyword).
· This release supports only port ACLs and router ACLs for IPv6; it does not support VLAN ACLs (VLAN maps).
· The switch does not apply MAC-based ACLs on IPv6 frames.
· You cannot apply IPv6 port ACLs to Layer 2 EtherChannels.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1414

Security

Default Configuration for IPv6 ACLs

· When configuring an ACL, there is no restriction on keywords entered in the ACL, regardless of whether or not they are supported on the platform. When you apply the ACL to an interface that requires hardware forwarding (physical ports or SVIs), the switch checks to determine whether or not the ACL can be supported on the interface. If not, attaching the ACL is rejected.
· If an ACL is applied to an interface and you attempt to add an access control entry (ACE) with an unsupported keyword, the switch does not allow the ACE to be added to the ACL that is currently attached to the interface.
IPv6 ACLs on the switch have these characteristics: · Fragmented frames (the fragments keyword as in IPv4) are supported
· The same statistics supported in IPv4 are supported for IPv6 ACLs.
· If the switch runs out of hardware space, the packets associated with the ACL are dropped on the interface.
· Logging is supported for router ACLs, but not for port ACLs.
· The switch supports IPv6 address-matching for a full range of prefix-lengths.

Default Configuration for IPv6 ACLs
The default IPv6 ACL configuration is as follows:
Switch# show access-lists preauth_ipv6_acl IPv6 access list preauth_ipv6_acl (per-user) permit udp any any eq domain sequence 10 permit tcp any any eq domain sequence 20 permit icmp any any nd-ns sequence 30 permit icmp any any nd-na sequence 40 permit icmp any any router-solicitation sequence 50 permit icmp any any router-advertisement sequence 60 permit icmp any any redirect sequence 70 permit udp any eq 547 any eq 546 sequence 80 permit udp any eq 546 any eq 547 sequence 90 deny ipv6 any any sequence 100

How to Configure IPv6 ACLs
To filter IPv6 traffic, you perform these steps: 1. Create an IPv6 ACL, and enter IPv6 access list configuration mode. 2. Configure the IPv6 ACL to block (deny) or pass (permit) traffic. 3. Apply the IPv6 ACL to an interface. For router ACLs, you must also configure an IPv6 address on the
Layer 3 interface to which the ACL is applied.

SUMMARY STEPS

1. configure terminal 2. [no]{ipv6 access-list list-name| client permit-control-packets| log-update threshold| role-based
list-name}

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1415

How to Configure IPv6 ACLs

Security

3. [no]{deny | permit} protocol {source-ipv6-prefix/|prefix-length|any threshold| host source-ipv6-address} [ operator [ port-number ]] { destination-ipv6-prefix/ prefix-length | any | host destination-ipv6-address} [operator [port-number]][dscp value] [fragments] [log] [log-input] [routing] [sequence value] [time-range name]
4. {deny | permit} tcp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator [port-number]] {destination-ipv6- prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [ack] [dscp value] [established] [fin] [log] [log-input] [neq {port | protocol}] [psh] [range {port | protocol}] [rst] [routing] [sequence value] [syn] [time-range name] [urg]
5. {deny | permit} udp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator [port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [dscp value] [log] [log-input] [neq {port | protocol}] [range {port | protocol}] [routing] [sequence value] [time-range name]]
6. {deny | permit} icmp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator [port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [icmp-type [icmp-code] | icmp-message] [dscp value] [log] [log-input] [routing] [sequence value] [time-range name]
7. end 8. show ipv6 access-list 9. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

[no]{ipv6 access-list list-name| client

Defines an IPv6 ACL name, and enters IPv6 access list

permit-control-packets| log-update threshold| role-based configuration mode.

list-name}

Example:

Switch(config)# ipv6 access-list example_acl_list

Step 3

[no]{deny | permit} protocol

Enter deny or permit to specify whether to deny or permit

{source-ipv6-prefix/|prefix-length|any threshold| host the packet if conditions are matched. These are the

source-ipv6-address} [ operator [ port-number ]] {

conditions:

destination-ipv6-prefix/ prefix-length | any | host destination-ipv6-address} [operator [port-number]][dscp value] [fragments] [log] [log-input] [routing] [sequence value] [time-range name]

· For protocol, enter the name or number of an Internet protocol: ahp, esp, icmp, ipv6, pcp, stcp, tcp, or udp, or an integer in the range 0 to 255 representing an IPv6 protocol number.

· The source-ipv6-prefix/prefix-length or destination-ipv6-prefix/ prefix-length is the source or destination IPv6 network or class of networks for which to set deny or permit conditions, specified in hexadecimal and using 16-bit values between colons (see RFC 2373).

· Enter any as an abbreviation for the IPv6 prefix ::/0.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1416

Security

How to Configure IPv6 ACLs

Step 4

Command or Action

Purpose
· For host source-ipv6-address or destination-ipv6-address, enter the source or destination IPv6 host address for which to set deny or permit conditions, specified in hexadecimal using 16-bit values between colons.
· (Optional) For operator, specify an operand that compares the source or destination ports of the specified protocol. Operands are lt (less than), gt (greater than), eq (equal), neq (not equal), and range.
If the operator follows the source-ipv6-prefix/prefix-length argument, it must match the source port. If the operator follows the destination-ipv6- prefix/prefix-length argument, it must match the destination port.
· (Optional) The port-number is a decimal number from 0 to 65535 or the name of a TCP or UDP port. You can use TCP port names only when filtering TCP. You can use UDP port names only when filtering UDP.
· (Optional) Enter dscp value to match a differentiated services code point value against the traffic class value in the Traffic Class field of each IPv6 packet header. The acceptable range is from 0 to 63.
· (Optional) Enter fragments to check noninitial fragments. This keyword is visible only if the protocol is ipv6.
· (Optional) Enter log to cause an logging message to be sent to the console about the packet that matches the entry. Enter log-input to include the input interface in the log entry. Logging is supported only for router ACLs.
· (Optional) Enter routing to specify that IPv6 packets be routed.
· (Optional) Enter sequence value to specify the sequence number for the access list statement. The acceptable range is from 1 to 4,294,967,295.
· (Optional) Enter time-range name to specify the time range that applies to the deny or permit statement.

{deny | permit} tcp {source-ipv6-prefix/prefix-length | any (Optional) Define a TCP access list and the access

| host source-ipv6-address} [operator [port-number]] conditions.

{destination-ipv6- prefix/prefix-length | any | host

Enter tcp for Transmission Control Protocol. The

destination-ipv6-address} [operator [port-number]] [ack] [dscp value] [established] [fin] [log] [log-input] [neq

parameters are the same as those described in Step 3a, with these additional optional parameters:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1417

How to Configure IPv6 ACLs

Security

Step 5 Step 6
Step 7

Command or Action

Purpose

{port | protocol}] [psh] [range {port | protocol}] [rst] [routing] [sequence value] [syn] [time-range name] [urg]

· ack--Acknowledgment bit set.
· established--An established connection. A match occurs if the TCP datagram has the ACK or RST bits set.

· fin--Finished bit set; no more data from sender.

· neq {port | protocol}--Matches only packets that are not on a given port number.

· psh--Push function bit set.

· range {port | protocol}--Matches only packets in the port number range.

· rst--Reset bit set.

· syn--Synchronize bit set.

· urg--Urgent pointer bit set.

{deny | permit} udp {source-ipv6-prefix/prefix-length | (Optional) Define a UDP access list and the access

any | host source-ipv6-address} [operator [port-number]] conditions.

{destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [dscp value] [log] [log-input] [neq {port | protocol}] [range

Enter udp for the User Datagram Protocol. The UDP parameters are the same as those described for TCP, except that the [operator [port]] port number or name must be a

{port | protocol}] [routing] [sequence value] [time-range UDP port number or name, and the established parameter

name]]

is not valid for UDP.

{deny | permit} icmp {source-ipv6-prefix/prefix-length | (Optional) Define an ICMP access list and the access

any | host source-ipv6-address} [operator [port-number]] conditions.

{destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator [port-number]] [icmp-type [icmp-code] | icmp-message] [dscp value] [log]

Enter icmp for Internet Control Message Protocol. The ICMP parameters are the same as those described for most IP protocols in Step 1, with the addition of the ICMP

[log-input] [routing] [sequence value] [time-range name] message type and code parameters. These optional keywords

have these meanings:

· icmp-type--Enter to filter by ICMP message type, a number from 0 to 255.

· icmp-code--Enter to filter ICMP packets that are filtered by the ICMP message code type, a number from 0 to 255.

· icmp-message--Enter to filter ICMP packets by the ICMP message type name or the ICMP message type and code name. To see a list of ICMP message type names and code names, use the ? key or see command reference for this release.

end

Return to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1418

Security

How to Attach an IPv6 ACL to an Interface

Step 8 Step 9

Command or Action show ipv6 access-list copy running-config startup-config

Purpose Verify the access list configuration. (Optional) Save your entries in the configuration file.

Example
Use the no {deny | permit} IPv6 access-list configuration commands with keywords to remove the deny or permit conditions from the specified access list.
This example configures the IPv6 access list named CISCO. The first deny entry in the list denies all packets that have a destination TCP port number greater than 5000. The second deny entry denies packets that have a source UDP port number less than 5000. The second deny also logs all matches to the console. The first permit entry in the list permits all ICMP packets. The second permit entry in the list permits all other traffic. The second permit entry is necessary because an implicit deny -all condition is at the end of each IPv6 access list.
Switch(config)# ipv6 access-list CISCO Switch(config-ipv6-acl)# deny tcp any any gt 5000 Switch config-ipv6-acl)# deny ::/0 lt 5000 ::/0 log Switch(config-ipv6-acl)# permit icmp any any Switch(config-ipv6-acl)# permit any any
What to do next
Attach the IPv6 ACL to an Interface

How to Attach an IPv6 ACL to an Interface
You can apply an ACL to outbound or inbound traffic on Layer 3 interfaces, or to inbound traffic on Layer 2 interfaces. You can also apply ACLs only to inbound management traffic on Layer 3 interfaces. Beginning in privileged EXEC mode, follow these steps to control access to an interface:

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. no switchport 4. ipv6 address pv6-address 5. ipv6 traffic-filter access-list-name {in | out} 6. end 7. show running-config 8. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1419

Monitoring IPv6 ACLs

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2 interface interface-id

Step 3 no switchport

Step 4 ipv6 address pv6-address

Step 5 ipv6 traffic-filter access-list-name {in | out}

Step 6 Step 7 Step 8

end show running-config copy running-config startup-config

Purpose Enters the global configuration mode.
Identify a Layer 2 interface (for port ACLs) or Layer 3 interface (for router ACLs) on which to apply an access list, and enter interface configuration mode. If applying a router ACL, this changes the interface from Layer 2 mode (the default) to Layer 3 mode. Configure an IPv6 address on a Layer 3 interface (for router ACLs). Apply the access list to incoming or outgoing traffic on the interface. Return to privileged EXEC mode. Verify the access list configuration. (Optional) Save your entries in the configuration file.

Example
Use the no ipv6 traffic-filter access-list-name interface configuration command to remove an access list from an interface.
This example shows how to apply the access list Cisco to outbound traffic on a Layer 3 interface:
Switch(config)# interface gigabitethernet 1/0/3 Switch(config-if)# no switchport Switch(config-if)# ipv6 address 2001::/64 eui-64 Switch(config-if)# ipv6 traffic-filter CISCO out

Monitoring IPv6 ACLs

You can display information about all configured access lists, all IPv6 access lists, or a specific access list by using one or more of the privileged EXEC commands shown in the table below:

Command show access-lists show ipv6 access-list [access-list-name]

Purpose
Displays all access lists configured on the switch.
Displays all configured IPv6 access lists or the access list specified by name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1420

Security

Additional References

This is an example of the output from the show access-lists privileged EXEC command. The output shows all access lists that are configured on the switch or switch stack.
Switch # show access-lists Extended IP access list hello
10 permit ip any any IPv6 access list ipv6
permit ipv6 any any sequence 10
This is an example of the output from the show ipv6 access-list privileged EXEC command. The output shows only IPv6 access lists configured on the switch or switch stack
Switch# show ipv6 access-list IPv6 access list inbound
permit tcp any any eq bgp (8 matches) sequence 10 permit tcp any any eq telnet (15 matches) sequence 20 permit udp any any sequence 30
IPv6 access list outbound deny udp any any sequence 10 deny tcp any any eq telnet sequence 20

Additional References

Related Documents

Related Topic

Document Title

IPv6

IPv6 Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

security configuration

http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/config_library/xe-3se/3850/ipv6-xe-3se-3850-library

topics

IPv6 command reference

IPv6 Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/command/ipv6-xe-3se-3850-cr-book.html

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1421

Additional References

Security

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1422

7 1 C H A P T E R
Configuring DHCP
· Finding Feature Information, on page 1423 · Information About DHCP, on page 1423 · How to Configure DHCP Features, on page 1430 · Configuring DHCP Server Port-Based Address Allocation, on page 1439
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About DHCP
DHCP Server
The DHCP server assigns IP addresses from specified address pools on a switch or router to DHCP clients and manages them. If the DHCP server cannot give the DHCP client the requested configuration parameters from its database, it forwards the request to one or more secondary DHCP servers defined by the network administrator. The switch can act as a DHCP server.
DHCP Relay Agent
A DHCP relay agent is a Layer 3 device that forwards DHCP packets between clients and servers. Relay agents forward requests and replies between clients and servers when they are not on the same physical subnet. Relay agent forwarding is different from the normal Layer 2 forwarding, in which IP datagrams are switched transparently between networks. Relay agents receive DHCP messages and generate new DHCP messages to send on output interfaces.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1423

DHCP Snooping

Security

DHCP Snooping
DHCP snooping is a DHCP security feature that provides network security by filtering untrusted DHCP messages and by building and maintaining a DHCP snooping binding database, also referred to as a DHCP snooping binding table.
DHCP snooping acts like a firewall between untrusted hosts and DHCP servers. You use DHCP snooping to differentiate between untrusted interfaces connected to the end user and trusted interfaces connected to the DHCP server or another switch.
Note For DHCP snooping to function properly, all DHCP servers must be connected to the switch through trusted interfaces.
An untrusted DHCP message is a message that is received through an untrusted interface. By default, the switch considers all interfaces untrusted. So, the switch must be configured to trust some interfaces to use DHCP Snooping. When you use DHCP snooping in a service-provider environment, an untrusted message is sent from a device that is not in the service-provider network, such as a customer's switch. Messages from unknown devices are untrusted because they can be sources of traffic attacks.
The DHCP snooping binding database has the MAC address, the IP address, the lease time, the binding type, the VLAN number, and the interface information that corresponds to the local untrusted interfaces of a switch. It does not have information regarding hosts interconnected with a trusted interface.
In a service-provider network, an example of an interface you might configure as trusted is one connected to a port on a device in the same network. An example of an untrusted interface is one that is connected to an untrusted interface in the network or to an interface on a device that is not in the network.
When a switch receives a packet on an untrusted interface and the interface belongs to a VLAN in which DHCP snooping is enabled, the switch compares the source MAC address and the DHCP client hardware address. If the addresses match (the default), the switch forwards the packet. If the addresses do not match, the switch drops the packet.
The switch drops a DHCP packet when one of these situations occurs:
· A packet from a DHCP server, such as a DHCPOFFER, DHCPACK, DHCPNAK, or DHCPLEASEQUERY packet, is received from outside the network or firewall.
· A packet is received on an untrusted interface, and the source MAC address and the DHCP client hardware address do not match.
· The switch receives a DHCPRELEASE or DHCPDECLINE broadcast message that has a MAC address in the DHCP snooping binding database, but the interface information in the binding database does not match the interface on which the message was received.
· A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is not 0.0.0.0, or the relay agent forwards a packet that includes option-82 information to an untrusted port.
If the switch is an aggregation switch supporting DHCP snooping and is connected to an edge switch that is inserting DHCP option-82 information, the switch drops packets with option-82 information when packets are received on an untrusted interface. If DHCP snooping is enabled and packets are received on a trusted port, the aggregation switch does not learn the DHCP snooping bindings for connected devices and cannot build a complete DHCP snooping binding database.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1424

Security

Option-82 Data Insertion

When an aggregation switch can be connected to an edge switch through an untrusted interface and you enter the ip dhcp snooping information option allow-untrusted global configuration command, the aggregation switch accepts packets with option-82 information from the edge switch. The aggregation switch learns the bindings for hosts connected through an untrusted switch interface. The DHCP security features, such as dynamic ARP inspection or IP source guard, can still be enabled on the aggregation switch while the switch receives packets with option-82 information on untrusted input interfaces to which hosts are connected. The port on the edge switch that connects to the aggregation switch must be configured as a trusted interface.
Related Topics Prerequisites for Configuring DHCP Snooping and Option 82, on page 1434
Option-82 Data Insertion
In residential, metropolitan Ethernet-access environments, DHCP can centrally manage the IP address assignments for a large number of subscribers. When the DHCP option-82 feature is enabled on the switch, a subscriber device is identified by the switch port through which it connects to the network (in addition to its MAC address). Multiple hosts on the subscriber LAN can be connected to the same port on the access switch and are uniquely identified.
Note The DHCP option-82 feature is supported only when DHCP snooping is globally enabled on the VLANs to which subscriber devices using option-82 are assigned.
The following illustration shows a metropolitan Ethernet network in which a centralized DHCP server assigns IP addresses to subscribers connected to the switch at the access layer. Because the DHCP clients and their associated DHCP server do not reside on the same IP network or subnet, a DHCP relay agent (the Catalyst switch) is configured with a helper address to enable broadcast forwarding and to transfer DHCP messages between the clients and the server.
Figure 81: DHCP Relay Agent in a Metropolitan Ethernet Network

When you enable the DHCP snooping information option 82 on the switch, the following sequence of events occurs:
· The host (DHCP client) generates a DHCP request and broadcasts it on the network.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1425

Option-82 Data Insertion

Security

· When the switch receives the DHCP request, it adds the option-82 information in the packet. By default, the remote-ID suboption is the switch MAC address, and the circuit-ID suboption is the port identifier, vlan-mod-port, from which the packet is received.You can configure the remote ID and circuit ID.
· If the IP address of the relay agent is configured, the switch adds this IP address in the DHCP packet.
· The switch forwards the DHCP request that includes the option-82 field to the DHCP server.
· The DHCP server receives the packet. If the server is option-82-capable, it can use the remote ID, the circuit ID, or both to assign IP addresses and implement policies, such as restricting the number of IP addresses that can be assigned to a single remote ID or circuit ID. Then the DHCP server echoes the option-82 field in the DHCP reply.
· The DHCP server unicasts the reply to the switch if the request was relayed to the server by the switch. The switch verifies that it originally inserted the option-82 data by inspecting the remote ID and possibly the circuit ID fields. The switch removes the option-82 field and forwards the packet to the switch port that connects to the DHCP client that sent the DHCP request.
· In the default suboption configuration, when the described sequence of events occurs, the values in these fields do not change (see the illustration,Suboption Packet Formats):
· Circuit-ID suboption fields · Suboption type
· Length of the suboption type
· Circuit-ID type
· Length of the circuit-ID type
· Remote-ID suboption fields · Suboption type
· Length of the suboption type
· Remote-ID type
· Length of the remote-ID type
In the port field of the circuit ID suboption, the port numbers start at 3. For example, on a switch with 24 10/100/1000 ports and four small form-factor pluggable (SFP) module slots, port 3 is the Gigabit Ethernet 1/0/1 port, port 4 is the Gigabit Ethernet 1/0/2 port, and so forth. Port 27 is the SFP module slot Gigabit Ethernet1/0/25, and so forth. The illustration, Suboption Packet Formats. shows the packet formats for the remote-ID suboption and the circuit-ID suboption when the default suboption configuration is used. For the circuit-ID suboption, the module number corresponds to the switch number in the stack. The switch uses the packet formats when you globally enable DHCP snooping and enter the ip dhcp snooping information option global configuration command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1426

Security Figure 82: Suboption Packet Formats

Option-82 Data Insertion

The illustration, User-Configured Suboption Packet Formats, shows the packet formats for user-configured remote-ID and circuit-ID suboptions The switch uses these packet formats when DHCP snooping is globally enabled and when the ip dhcp snooping information option format remote-id global configuration command and theip dhcp snooping vlan information option format-type circuit-id string interface configuration command are entered. The values for these fields in the packets change from the default values when you configure the remote-ID and circuit-ID suboptions:
· Circuit-ID suboption fields · The circuit-ID type is 1. · The length values are variable, depending on the length of the string that you configure.
· Remote-ID suboption fields · The remote-ID type is 1. · The length values are variable, depending on the length of the string that you configure.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1427

Cisco IOS DHCP Server Database Figure 83: User-Configured Suboption Packet Formats

Security

Cisco IOS DHCP Server Database
During the DHCP-based autoconfiguration process, the designated DHCP server uses the Cisco IOS DHCP server database. It has IP addresses, address bindings, and configuration parameters, such as the boot file. An address binding is a mapping between an IP address and a MAC address of a host in the Cisco IOS DHCP server database. You can manually assign the client IP address, or the DHCP server can allocate an IP address from a DHCP address pool. For more information about manual and automatic address bindings, see the "Configuring DHCP" chapter of the Cisco IOS IP Configuration Guide, Release 12.4. For procedures to enable and configure the Cisco IOS DHCP server database, see the "DHCP Configuration Task List" section in the "Configuring DHCP" chapter of the Cisco IOS IP Configuration Guide, Release 12.4.
DHCP Snooping Binding Database
When DHCP snooping is enabled, the switch uses the DHCP snooping binding database to store information about untrusted interfaces. The database can have up to 64,000 bindings. Each database entry (binding) has an IP address, an associated MAC address, the lease time (in hexadecimal format), the interface to which the binding applies, and the VLAN to which the interface belongs. The database agent stores the bindings in a file at a configured location. At the end of each entry is a checksum that accounts for all the bytes from the start of the file through all the bytes associated with the entry. Each entry is 72 bytes, followed by a space and then the checksum value. To keep the bindings when the switch reloads, you must use the DHCP snooping database agent. If the agent is disabled, dynamic ARP inspection or IP source guard is enabled, and the DHCP snooping binding database has dynamic bindings, the switch loses its connectivity. If the agent is disabled and only DHCP snooping is enabled, the switch does not lose its connectivity, but DHCP snooping might not prevent DHCP spoofing attacks.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1428

Security

DHCP Snooping and Switch Stacks

When reloading, the switch reads the binding file to build the DHCP snooping binding database. The switch updates the file when the database changes.
When a switch learns of new bindings or when it loses bindings, the switch immediately updates the entries in the database. The switch also updates the entries in the binding file. The frequency at which the file is updated is based on a configurable delay, and the updates are batched. If the file is not updated in a specified time (set by the write-delay and abort-timeout values), the update stops.
This is the format of the file with bindings:
<initial-checksum> TYPE DHCP-SNOOPING VERSION 1 BEGIN <entry-1> <checksum-1> <entry-2> <checksum-1-2> ... ... <entry-n> <checksum-1-2-..-n> END
Each entry in the file is tagged with a checksum value that the switch uses to verify the entries when it reads the file. The initial-checksum entry on the first line distinguishes entries associated with the latest file update from entries associated with a previous file update.
This is an example of a binding file:
2bb4c2a1 TYPE DHCP-SNOOPING VERSION 1 BEGIN 192.1.168.1 3 0003.47d8.c91f 2BB6488E Gi1/0/4 21ae5fbb 192.1.168.3 3 0003.44d6.c52f 2BB648EB Gi1/0/4 1bdb223f 192.1.168.2 3 0003.47d9.c8f1 2BB648AB Gi1/0/4 584a38f0 END
When the switch starts and the calculated checksum value equals the stored checksum value, the switch reads entries from the binding file and adds the bindings to its DHCP snooping binding database. The switch ignores an entry when one of these situations occurs:
· The switch reads the entry and the calculated checksum value does not equal the stored checksum value. The entry and the ones following it are ignored.
· An entry has an expired lease time (the switch might not remove a binding entry when the lease time expires).
· The interface in the entry no longer exists on the system.
· The interface is a routed interface or a DHCP snooping-trusted interface.
DHCP Snooping and Switch Stacks
DHCP snooping is managed on the stack master. When a new switch joins the stack, the switch receives the DHCP snooping configuration from the stack master. When a member leaves the stack, all DHCP snooping address bindings associated with the switch age out.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1429

How to Configure DHCP Features

Security

All snooping statistics are generated on the stack master. If a new stack master is elected, the statistics counters reset.
When a stack merge occurs, all DHCP snooping bindings in the stack master are lost if it is no longer the stack master. With a stack partition, the existing stack master is unchanged, and the bindings belonging to the partitioned switches age out. The new master of the partitioned stack begins processing the new incoming DHCP packets.

How to Configure DHCP Features

Default DHCP Snooping Configuration

Table 126: Default DHCP Configuration

Feature

Default Setting

DHCP server DHCP relay agent

Enabled in Cisco IOS software, requires configuration15
Enabled16

DHCP packet forwarding address

None configured

Checking the relay agent information

Enabled (invalid messages are dropped)

DHCP relay agent forwarding policy

Replace the existing relay agent information

DHCP snooping enabled globally

Disabled

DHCP snooping information option

Enabled

DHCP snooping option to accept packets on untrusted Disabled input interfaces17

DHCP snooping limit rate

None configured

DHCP snooping trust

Untrusted

DHCP snooping VLAN

Disabled

DHCP snooping MAC address verification

Enabled

Cisco IOS DHCP server binding database

Enabled in Cisco IOS software, requires configuration.
Note The switch gets network addresses and configuration parameters only from a device configured as a DHCP server.

DHCP snooping binding database agent

Enabled in Cisco IOS software, requires configuration. This feature is operational only when a destination is configured.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1430

Security

DHCP Snooping Configuration Guidelines

15 The switch responds to DHCP requests only if it is configured as a DHCP server. 16 The switch relays DHCP packets only if the IP address of the DHCP server is configured on the SVI
of the DHCP client. 17 Use this feature when the switch is an aggregation switch that receives packets with option-82 information
from an edge switch.
DHCP Snooping Configuration Guidelines
· If a switch port is connected to a DHCP server, configure a port as trusted by entering the ip dhcp snooping trust interface configuration command.
· If a switch port is connected to a DHCP client, configure a port as untrusted by entering the no ip dhcp snooping trust interface configuration command.
· You can display DHCP snooping statistics by entering the show ip dhcp snooping statistics user EXEC command, and you can clear the snooping statistics counters by entering the clear ip dhcp snooping statistics privileged EXEC command.

Configuring the DHCP Server
The switch can act as a DHCP server. For procedures to configure the switch as a DHCP server, see the "Configuring DHCP" section of the "IP addressing and Services" section of the Cisco IOS IP Configuration Guide, Release 12.4.

DHCP Server and Switch Stacks
The DHCP binding database is managed on the stack master. When a new stack master is assigned, the new master downloads the saved binding database from the TFTP server. If the stack master fails, all unsaved bindings are lost. The IP addresses associated with the lost bindings are released. You should configure an automatic backup by using the ip dhcp database url [timeout seconds | write-delay seconds] global configuration command.
When a stack merge occurs, the stack master that becomes a stack member loses all of the DHCP lease bindings. With a stack partition, the new master in the partition acts as a new DHCP server without any of the existing DHCP lease bindings.

Configuring the DHCP Relay Agent
Beginning in privileged EXEC mode, follow these steps to enable the DHCP relay agent on the switch:

SUMMARY STEPS

1. configure terminal 2. service dhcp 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1431

Specifying the Packet Forwarding Address

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2 Step 3

service dhcp Example:
Switch(config)# service dhcp
end Example:
Switch(config)# end

Purpose Enters the global configuration mode.
Enables the DHCP server and relay agent on your switch. By default, this feature is enabled.
Returns to privileged EXEC mode.

What to do next See the "Configuring DHCP" section of the "IP Addressing and Services" section of the Cisco IOS IP Configuration Guide, Release 12.4 for these procedures:
· Checking (validating) the relay agent information
· Configuring the relay agent forwarding policy

Specifying the Packet Forwarding Address
If the DHCP server and the DHCP clients are on different networks or subnets, you must configure the switch with the ip helper-address address interface configuration command. The general rule is to configure the command on the Layer 3 interface closest to the client. The address used in the ip helper-address command can be a specific DHCP server IP address, or it can be the network address if other DHCP servers are on the destination network segment. Using the network address enables any DHCP server to respond to requests.
Beginning in privileged EXEC mode, follow these steps to specify the packet forwarding address:

SUMMARY STEPS

1. configure terminal 2. interface vlan vlan-id 3. ip address ip-address subnet-mask 4. ip helper-address address 5. end 6. interface range port-range or interface interface-id 7. switchport mode access 8. switchport access vlan vlan-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1432

Security

Specifying the Packet Forwarding Address

9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3 Step 4
Step 5 Step 6 Step 7 Step 8

interface vlan vlan-id Example:

Creates a switch virtual interface by entering a VLAN ID, and enter interface configuration mode.

Switch(config)# interface vlan 1
ip address ip-address subnet-mask Example:

Configures the interface with an IP address and an IP subnet.

Switch(config-if)# ip address 192.108.1.27 255.255.255.0

ip helper-address address Example:
Switch(config-if)# ip helper-address 172.16.1.2

Specifies the DHCP packet forwarding address.
The helper address can be a specific DHCP server address, or it can be the network address if other DHCP servers are on the destination network segment. Using the network address enables other servers to respond to DHCP requests.
If you have multiple servers, you can configure one helper address for each server.

end Example:

Returns to global configuration mode.

Switch(config-if)# end
interface range port-range or interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/2
switchport mode access Example:

Configures multiple physical ports that are connected to the DHCP clients, and enter interface range configuration mode. or Configures a single physical port that is connected to the DHCP client, and enter interface configuration mode.
Defines the VLAN membership mode for the port.

Switch(config-if)# switchport mode access
switchport access vlan vlan-id Example:

Assigns the ports to the same VLAN as configured in Step 2.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1433

Prerequisites for Configuring DHCP Snooping and Option 82

Security

Step 9

Command or Action
Switch(config-if)# switchport access vlan 1
end Example:
Switch(config-if)# end

Purpose Returns to privileged EXEC mode.

Prerequisites for Configuring DHCP Snooping and Option 82
The prerequisites for DHCP Snooping and Option 82 are as follows:
· Before configuring the DHCP snooping information option on your switch, be sure to configure the device that is acting as the DHCP server. You must specify the IP addresses that the DHCP server can assign or exclude, or you must configure DHCP options for these devices.
· For DHCP snooping to function properly, all DHCP servers must be connected to the switch through trusted interfaces.
· Before configuring the DHCP relay agent on your switch, make sure to configure the device that is acting as the DHCP server. You must specify the IP addresses that the DHCP server can assign or exclude, configure DHCP options for devices, or set up the DHCP database agent.
· The following prerequisites apply to DHCP snooping binding database configuration:
· Because both NVRAM and the flash memory have limited storage capacity, we recommend that you store the binding file on a TFTP server.
· For network-based URLs (such as TFTP and FTP), you must create an empty file at the configured URL before the switch can write bindings to the binding file at that URL. See the documentation for your TFTP server to determine whether you must first create an empty file on the server; some TFTP servers cannot be configured this way.
· To ensure that the lease time in the database is accurate, we recommend that you enable and configure Network Time Protocol (NTP).
· If NTP is configured, the switch writes binding changes to the binding file only when the switch system clock is synchronized with NTP.
· If you want the switch to respond to DHCP requests, it must be configured as a DHCP server.
· If you want the switch to relay DHCP packets, the IP address of the DHCP server must be configured on the switch virtual interface (SVI) of the DHCP client.
· To use the DHCP snooping option of accepting packets on untrusted inputs, the switch must be an aggregation switch that receives packets with option-82 information from an edge switch.
· *****************
· The following two list items should be checked for technical accuracy by a subject matter expert:
· You must configure the switch to use the Cisco IOS DHCP server binding database to use it for DHCP snooping.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1434

Security

Enabling DHCP Snooping and Option 82

· You must configure a destination on the DHCP snooping binding database to use the switch for DHCP snooping.
· For DHCP snooping to function properly, all DHCP servers must be connected to the switch through trusted interfaces. In a service-provider network, a trusted interface is connected to a port on a device in the same network.
· You must globally enable DHCP snooping on the switch.
· Before globally enabling DHCP snooping on the switch, make sure that the devices acting as the DHCP server and the DHCP relay agent are configured and enabled.
· When you configure DHCP snooping smart logging, the contents of packets dropped by DHCP are sent to a NetFlow collector. If you configure this feature, make sure that smart logging is globally enabled.

Note Do not enable Dynamic Host Configuration Protocol (DHCP) snooping on RSPAN VLANs. If DHCP snooping is enabled on RSPAN VLANs, DHCP packets might not reach the RSPAN destination port.

Related Topics DHCP Snooping, on page 1424

Enabling DHCP Snooping and Option 82
Beginning in privileged EXEC mode, follow these steps to enable DHCP snooping on the switch:

SUMMARY STEPS

1. configure terminal 2. ip dhcp snooping 3. ip dhcp snooping vlan vlan-range [smartlog] 4. ip dhcp snooping information option 5. ip dhcp snooping information option format remote-id [string ASCII-string | hostname] 6. ip dhcp snooping information option allow-untrusted 7. interface interface-id 8. ip dhcp snooping vlan vlan information option format-type circuit-id [override] string ASCII-string 9. ip dhcp snooping trust 10. ip dhcp snooping limit rate rate 11. exit 12. ip dhcp snooping verify mac-address 13. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1435

Enabling DHCP Snooping and Option 82

Security

Step 2 Step 3
Step 4 Step 5
Step 6

Command or Action
Switch# configure terminal

Purpose

ip dhcp snooping Example:

Enables DHCP snooping globally.

Switch(config)# ip dhcp snooping
ip dhcp snooping vlan vlan-range [smartlog] Example:
Switch(config)# ip dhcp snooping vlan 10

Enables DHCP snooping on a VLAN or range of VLANs. The range is 1 to 4094.
· You can enter a single VLAN ID identified by VLAN ID number, a series of VLAN IDs separated by commas, a range of VLAN IDs separated by hyphens, or a range of VLAN IDs separated by entering the starting and ending VLAN IDs separated by a space.
· (Optional) Enter smartlog to configure the switch to send the contents of dropped packets to a NetFlow collector.

ip dhcp snooping information option Example:

Enables the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages to the DHCP server. This is the default setting.

Switch(config)# ip dhcp snooping information option

ip dhcp snooping information option format remote-id (Optional) Configures the remote-ID suboption.

[string ASCII-string | hostname]

You can configure the remote ID as:

Example:

· String of up to 63 ASCII characters (no spaces)

Switch(config)# ip dhcp snooping information option format remote-id string acsiistring2

· Configured hostname for the switch
Note If the hostname is longer than 63 characters, it is truncated to 63 characters in the remote-ID configuration.

The default remote ID is the switch MAC address.

ip dhcp snooping information option allow-untrusted Example:
Switch(config)# ip dhcp snooping information option allow-untrusted

(Optional) If the switch is an aggregation switch connected to an edge switch, this command enables the switch to accept incoming DHCP snooping packets with option-82 information from the edge switch.
The default setting is disabled.

Note Enter this command only on aggregation switches that are connected to trusted devices.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1436

Security

Enabling DHCP Snooping and Option 82

Step 7 Step 8
Step 9 Step 10
Step 11 Step 12 Step 13

Command or Action interface interface-id Example:

Purpose
Specifies the interface to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

ip dhcp snooping vlan vlan information option

(Optional) Configures the circuit-ID suboption for the

format-type circuit-id [override] string ASCII-string specified interface.

Example:

Specify the VLAN and port identifier, using a VLAN ID

in the range of 1 to 4094. The default circuit ID is the port

Switch(config-if)# ip dhcp snooping vlan 1

identifier, in the format vlan-mod-port.

information option format-type curcuit-id override

string ovrride2

You can configure the circuit ID to be a string of 3 to 63

ASCII characters (no spaces).

(Optional) Use the override keyword when you do not want the circuit-ID suboption inserted in TLV format to define subscriber information.

ip dhcp snooping trust Example:
Switch(config-if)# ip dhcp snooping trust

(Optional) Configures the interface as trusted or untrusted. Use the no keyword to configure an interface to receive messages from an untrusted client. The default setting is untrusted.

ip dhcp snooping limit rate rate Example:
Switch(config-if)# ip dhcp snooping limit rate 100

(Optional) Configures the number of DHCP packets per second that an interface can receive. The range is 1 to 2048. By default, no rate limit is configured.
Note We recommend an untrusted rate limit of not more than 100 packets per second. If you configure rate limiting for trusted interfaces, you might need to increase the rate limit if the port is a trunk port assigned to more than one VLAN with DHCP snooping.

exit Example:

Returns to global configuration mode.

Switch(config-if)# exit
ip dhcp snooping verify mac-address Example:
Switch(config)# ip dhcp snooping verify mac-address
end Example:

(Optional) Configures the switch to verify that the source MAC address in a DHCP packet received on untrusted ports matches the client hardware address in the packet. The default is to verify that the source MAC address matches the client hardware address in the packet.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1437

Enabling the Cisco IOS DHCP Server Database

Security

Command or Action
Switch(config)# end

Purpose

Enabling DHCP Snooping on Private VLANs
You can enable DHCP snooping on private VLANs. If DHCP snooping is enabled, the configuration is propagated to both a primary VLAN and its associated secondary VLANs. If DHCP snooping is enabled on the primary VLAN, it is also configured on the secondary VLANs.
If DHCP snooping is already configured on the primary VLAN and you configure DHCP snooping with different settings on a secondary VLAN, the configuration for the secondary VLAN does not take effect. You must configure DHCP snooping on the primary VLAN. If DHCP snooping is not configured on the primary VLAN, this message appears when you are configuring DHCP snooping on the secondary VLAN, such as VLAN 200:
2w5d:%DHCP_SNOOPING-4-DHCP_SNOOPING_PVLAN_WARNING:DHCP Snooping configuration may not take effect on secondary vlan 200. DHCP Snooping configuration on secondary vlan is derived
from its primary vlan.
The show ip dhcp snooping privileged EXEC command output shows all VLANs, including primary and secondary private VLANs, on which DHCP snooping is enabled.

Enabling the Cisco IOS DHCP Server Database
For procedures to enable and configure the Cisco IOS DHCP server database, see the "DHCP Configuration Task List" section in the "Configuring DHCP" chapter of the Cisco IOS IP Configuration Guide, Release 12.4

Monitoring DHCP Snooping Information
Table 127: Commands for Displaying DHCP Information

show ip dhcp snooping show ip dhcp snooping binding
show ip dhcp snooping database show ip dhcp snooping statistics show ip source binding

Displays the DHCP snooping configuration for a switch
Displays only the dynamically configured bindings in the DHCP snooping binding database, also referred to as a binding table.
Displays the DHCP snooping binding database status and statistics.
Displays the DHCP snooping statistics in summary or detail form.
Display the dynamically and statically configured bindings.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1438

Security

Configuring DHCP Server Port-Based Address Allocation

Note If DHCP snooping is enabled and an interface changes to the down state, the switch does not delete the statically configured bindings.
Configuring DHCP Server Port-Based Address Allocation
Information About Configuring DHCP Server Port-Based Address Allocation
DHCP server port-based address allocation is a feature that enables DHCP to maintain the same IP address on an Ethernet switch port regardless of the attached device client identifier or client hardware address. When Ethernet switches are deployed in the network, they offer connectivity to the directly connected devices. In some environments, such as on a factory floor, if a device fails, the replacement device must be working immediately in the existing network. With the current DHCP implementation, there is no guarantee that DHCP would offer the same IP address to the replacement device. Control, monitoring, and other software expect a stable IP address associated with each device. If a device is replaced, the address assignment should remain stable even though the DHCP client has changed. When configured, the DHCP server port-based address allocation feature ensures that the same IP address is always offered to the same connected port even as the client identifier or client hardware address changes in the DHCP messages received on that port. The DHCP protocol recognizes DHCP clients by the client identifier option in the DHCP packet. Clients that do not include the client identifier option are identified by the client hardware address. When you configure this feature, the port name of the interface overrides the client identifier or hardware address and the actual point of connection, the switch port, becomes the client identifier. In all cases, by connecting the Ethernet cable to the same port, the same IP address is allocated through DHCP to the attached device. The DHCP server port-based address allocation feature is only supported on a Cisco IOS DHCP server and not a third-party server.
Default Port-Based Address Allocation Configuration
By default, DHCP server port-based address allocation is disabled.
Port-Based Address Allocation Configuration Guidelines
· By default, DHCP server port-based address allocation is disabled. · To restrict assignments from the DHCP pool to preconfigured reservations (unreserved addresses are
not offered to the client and other clients are not served by the pool), you can enter the reserved-only DHCP pool configuration command.
Enabling the DHCP Snooping Binding Database Agent
Beginning in privileged EXEC mode, follow these steps to enable and configure the DHCP snooping binding database agent on the switch:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1439

Enabling the DHCP Snooping Binding Database Agent

Security

SUMMARY STEPS

1. configure terminal 2. ip dhcp snooping database {flash[number]:/filename | ftp://user:password@host/filename |
http://[[username:password]@]{hostname | host-ip}[/directory] /image-name.tar | rcp://user@host/filename}| tftp://host/filename 3. ip dhcp snooping database timeout seconds 4. ip dhcp snooping database write-delay seconds 5. end 6. ip dhcp snooping binding mac-address vlan vlan-id ip-address interface interface-id expiry seconds

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2
Step 3 Step 4 Step 5

ip dhcp snooping database {flash[number]:/filename | ftp://user:password@host/filename | http://[[username:password]@]{hostname | host-ip}[/directory] /image-name.tar | rcp://user@host/filename}| tftp://host/filename
Example:
Switch(config)# ip dhcp snooping database tftp://10.90.90.90/snooping-rp2

Specifies the URL for the database agent or the binding file by using one of these forms:
· flash[number]:/filename (Optional) Use the number parameter to specify the stack member number of the stack master. The range for number is 1 to 9.
· ftp://user:password@host/filename
· http://[[username:password]@]{hostname | host-ip}[/directory] /image-name.tar
· rcp://user@host/filename
· tftp://host/filename

ip dhcp snooping database timeout seconds

Specifies (in seconds) how long to wait for the database

Example:

transfer process to finish before stopping the process.

The default is 300 seconds. The range is 0 to 86400. Use 0

Switch(config)# ip dhcp snooping database timeout to define an infinite duration, which means to continue

300

trying the transfer indefinitely.

ip dhcp snooping database write-delay seconds Example:
Switch(config)# ip dhcp snooping database write-delay 15

Specifies the duration for which the transfer should be delayed after the binding database changes. The range is from 15 to 86400 seconds. The default is 300 seconds (5 minutes).

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1440

Security

Enabling DHCP Server Port-Based Address Allocation

Command or Action
Switch(config)# end

Purpose

Step 6

ip dhcp snooping binding mac-address vlan vlan-id ip-address interface interface-id expiry seconds Example:
Switch# ip dhcp snooping binding 0001.1234.1234 vlan 1 172.20.50.5 interface gi1/1 expiry 1000

(Optional) Adds binding entries to the DHCP snooping binding database. The vlan-id range is from 1 to 4904. The seconds range is from 1 to 4294967295.
Enter this command for each entry that you add.
Use this command when you are testing or debugging the switch.

Enabling DHCP Server Port-Based Address Allocation
Beginning in privileged EXEC mode, follow these steps to globally enable port-based address allocation and to automatically generate a subscriber identifier on an interface.

SUMMARY STEPS

1. configure terminal 2. ip dhcp use subscriber-id client-id 3. ip dhcp subscriber-id interface-name 4. interface interface-id 5. ip dhcp server use subscriber-id client-id 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

ip dhcp use subscriber-id client-id Example:

Configures the DHCP server to globally use the subscriber identifier as the client identifier on all incoming DHCP messages.

Switch(config)# ip dhcp use subscriber-id client-id

ip dhcp subscriber-id interface-name Example:
Switch(config)# ip dhcp subscriber-id interface-name

Automatically generates a subscriber identifier based on the short name of the interface.
A subscriber identifier configured on a specific interface takes precedence over this command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1441

Monitoring DHCP Server Port-Based Address Allocation

Security

Step 4 Step 5 Step 6

Command or Action interface interface-id Example:

Purpose
Specifies the interface to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

ip dhcp server use subscriber-id client-id Example:

Configures the DHCP server to use the subscriber identifier as the client identifier on all incoming DHCP messages on the interface.

Switch(config-if)# ip dhcp server use subscriber-id client-id

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Monitoring DHCP Server Port-Based Address Allocation

Table 128: Commands for Displaying DHCP Port-Based Address Allocation Information

Command show interface interface id
show ip dhcp pool show ip dhcp binding

Purpose Displays the status and configuration of a specific interface.
Displays the DHCP address pools.
Displays address bindings on the Cisco IOS DHCP server.

Additional References

Related Documents

Related Topic

Document Title

DHCP

IP Addressing: DHCP Configuration Guide, Cisco IOS XE Release 3S

Configuration Information

http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_dhcp/configuration/xe-3s/dhcp-xe-3s-book.html

and

Procedures

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1442

Security

Feature Information for DHCP Snooping and Option 82

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for DHCP Snooping and Option 82

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1443

Feature Information for DHCP Snooping and Option 82

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1444

7 2 C H A P T E R
Configuring IP Source Guard
IP Source Guard (IPSG) is a security feature that restricts IP traffic on nonrouted, Layer 2 interfaces by filtering traffic based on the DHCP snooping binding database and on manually configured IP source bindings. This chapter contains the following topics:
· Finding Feature Information, on page 1445 · Information About IP Source Guard, on page 1445 · How to Configure IP Source Guard, on page 1447 · Monitoring IP Source Guard, on page 1453 · Additional References, on page 1454
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About IP Source Guard
IP Source Guard
You can use IP source guard to prevent traffic attacks if a host tries to use the IP address of its neighbor and you can enable IP source guard when DHCP snooping is enabled on an untrusted interface. After IPSG is enabled on an interface, the switch blocks all IP traffic received on the interface except for DHCP packets allowed by DHCP snooping. The switch uses a source IP lookup table in hardware to bind IP addresses to ports. For IP and MAC filtering, a combination of source IP and source MAC lookups are used. IP traffic with a source IP address is the binding table is allowed, all other traffic is denied.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1445

IP Source Guard for Static Hosts

Security

The IP source binding table has bindings that are learned by DHCP snooping or are manually configured (static IP source bindings). An entry in this table has an IP address, its associated MAC address, and its associated VLAN number. The switch uses the IP source binding table only when IP source guard is enabled.
IPSG is supported only on Layer 2 ports, including access and trunk ports. You can configure IPSG with source IP address filtering or with source IP and MAC address filtering.
IP Source Guard for Static Hosts
Note Do not use IPSG (IP source guard) for static hosts on uplink ports or trunk ports.
IPSG for static hosts extends the IPSG capability to non-DHCP and static environments. The previous IPSG used the entries created by DHCP snooping to validate the hosts connected to a switch. Any traffic received from a host without a valid DHCP binding entry is dropped. This security feature restricts IP traffic on nonrouted Layer 2 interfaces. It filters traffic based on the DHCP snooping binding database and on manually configured IP source bindings. The previous version of IPSG required a DHCP environment for IPSG to work.
IPSG for static hosts allows IPSG to work without DHCP. IPSG for static hosts relies on IP device tracking-table entries to install port ACLs. The switch creates static entries based on ARP requests or other IP packets to maintain the list of valid hosts for a given port. You can also specify the number of hosts allowed to send traffic to a given port. This is equivalent to port security at Layer 3.
IPSG for static hosts also supports dynamic hosts. If a dynamic host receives a DHCP-assigned IP address that is available in the IP DHCP snooping table, the same entry is learned by the IP device tracking table. In a stacked environment, when the master failover occurs, the IP source guard entries for static hosts attached to member ports are retained. When you enter the show ip device tracking all EXEC command, the IP device tracking table displays the entries as ACTIVE.
Note Some IP hosts with multiple network interfaces can inject some invalid packets into a network interface. The invalid packets contain the IP or MAC address for another network interface of the host as the source address. The invalid packets can cause IPSG for static hosts to connect to the host, to learn the invalid IP or MAC address bindings, and to reject the valid bindings. Consult the vender of the corresponding operating system and the network interface to prevent the host from injecting invalid packets.
IPSG for static hosts initially learns IP or MAC bindings dynamically through an ACL-based snooping mechanism. IP or MAC bindings are learned from static hosts by ARP and IP packets. They are stored in the device tracking database. When the number of IP addresses that have been dynamically learned or statically configured on a given port reaches a maximum, the hardware drops any packet with a new IP address. To resolve hosts that have moved or gone away for any reason, IPSG for static hosts leverages IP device tracking to age out dynamically learned IP address bindings. This feature can be used with DHCP snooping. Multiple bindings are established on a port that is connected to both DHCP and static hosts. For example, bindings are stored in both the device tracking database as well as in the DHCP snooping binding database.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1446

Security

IP Source Guard Configuration Guidelines

IP Source Guard Configuration Guidelines
· You can configure static IP bindings only on nonrouted ports. If you enter the ip source binding mac-address vlan vlan-id ip-address interface interface-id global configuration command on a routed interface, this error message appears:
Static IP source binding can only be configured on switch port.
· When IP source guard with source IP filtering is enabled on an interface, DHCP snooping must be enabled on the access VLAN for that interface.
· If you are enabling IP source guard on a trunk interface with multiple VLANs and DHCP snooping is enabled on all the VLANs, the source IP address filter is applied on all the VLANs.

Note If IP source guard is enabled and you enable or disable DHCP snooping on a VLAN on the trunk interface, the switch might not properly filter traffic.
· You can enable this feature when 802.1x port-based authentication is enabled.
· When you configure IP source guard smart logging, packets with a source address other than the specified address or an address learned by DHCP are denied, and the packet contents are sent to a NetFlow collector. If you configure this feature, make sure that smart logging is globally enabled.
· In a switch stack, if IP source guard is configured on a stack member interface and you remove the the configuration of that switch by entering the no switch stack-member-number provision global configuration command, the interface static bindings are removed from the binding table, but they are not removed from the running configuration. If you again provision the switch by entering the switch stack-member-number provision command, the binding is restored.
To remove the binding from the running configuration, you must disable IP source guard before entering the no switch provision command. The configuration is also removed if the switch reloads while the interface is removed from the binding table.

How to Configure IP Source Guard

Enabling IP Source Guard

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. ip verify source [mac-check ] 4. Use one of the following:
· ip verify source[smartlog] · ip verify source port-security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1447

Enabling IP Source Guard

Security

5. exit 6. ip source binding mac-address vlan vlan-id ip-address interface interface-id 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the interface to be configured, and enters interface configuration mode.

Switch(config)# interface gigabitethernet 1/0/1

Step 3

ip verify source [mac-check ] Example:
Switch(config-if)# ip verify source

Enables IP source guard with source IP address filtering.
(Optional) mac-check--Enables IP Source Guard with source IP address and MAC address filtering.

Step 4 Step 5

Use one of the following:

Enables IP source guard with source IP address filtering.

· ip verify source[smartlog] · ip verify source port-security
Example:

· (Optional) Enter smartlog to configure the switch to send the contents of dropped packets to a NetFlow collector.

Switch(config-if)# ip verify source

Enables IP source guard with source IP and MAC address

filtering.

or

When you enable both IP source guard and port security

Switch(config-if)# ip verify source port-security by using the ip verify source port-security interface

configuration command, there are two caveats:

· The DHCP server must support option 82, or the client is not assigned an IP address.

· The MAC address in the DHCP packet is not learned as a secure address. The MAC address of the DHCP client is learned as a secure address only when the switch receives non-DHCP data traffic.

exit Example:

Returns to global configuration mode.

Switch(config-if)# exit

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1448

Security

Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port

Step 6

Command or Action
ip source binding mac-address vlan vlan-id ip-address interface interface-id Example:

Purpose Adds a static IP source binding. Enter this command for each static binding.

Switch(config)# ip source binding 0100.0230.0002 vlan 11 10.0.0.4 interface gigabitethernet1/0/1

Step 7

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Enabling IP source guard with source IP and MAC filtering on VLANs 10 and 11
Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface gigabitethernet 1/0/1 Switch(config-if)# ip verify source Switch(config-if)# exit Switch(config)# ip source binding 0100.0022.0010 vlan 10 10.0.0.2 interface gigabitethernet
1/0/1 Switch(config)# ip source binding 0100.0230.0002 vlan 11 10.0.0.4 interface gigabitethernet
1/0/1 Switch(config)# end

Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port
You must configure the ip device tracking maximum limit-number interface configuration command globally for IPSG for static hosts to work. If you only configure this command on a port without enabling IP device tracking globally or by setting an IP device tracking maximum on that interface, IPSG with static hosts rejects all the IP traffic from that interface. This requirement also applies to IPSG with static hosts on a private VLAN host port.

SUMMARY STEPS

1. configure terminal 2. ip device tracking 3. interface interface-id 4. switchport mode access 5. switchport access vlan vlan-id 6. ip verify source[tracking] [mac-check ] 7. ip device tracking maximum number 8. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1449

Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

ip device tracking Example:
Switch(config)# ip device tracking

Turns on the IP host table, and globally enables IP device tracking.

Step 3

interface interface-id Example:

Enters interface configuration mode.

Switch(config)# interface gigabitethernet 1/0/1

Step 4

switchport mode access Example:
Switch(config-if)# switchport mode access

Configures a port as access.

Step 5

switchport access vlan vlan-id Example:
Switch(config-if)# switchport access vlan 10

Configures the VLAN for this port.

Step 6 Step 7

ip verify source[tracking] [mac-check ] Example:
Switch(config-if)# ip verify source tracking mac-check
ip device tracking maximum number Example:
Switch(config-if)# ip device tracking maximum 8

Enables IP source guard with source IP address filtering.
(Optional) tracking--Enables IP source guard for static hosts.
(Optional) mac-check--Enables MAC address filtering.
The command ip verify source tracking mac-checkenables IP source guard for static hosts with MAC address filtering.
Establishes a maximum limit for the number of static IPs that the IP device tracking table allows on the port. The range is 1to 10. The maximum number is 10.
Note You must configure the ip device tracking maximum limit-number interface configuration command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1450

Security

Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port

Step 8

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Eight Examples This example shows how to stop IPSG with static hosts on an interface.

Switch(config-if)# no ip verify source Switch(config-if)# no ip device tracking max

This example shows how to enable IPSG with static hosts on a port.

Switch(config)# ip device tracking Switch(config-if)# ip device tracking maximum 10 Switch(config-if)# ip verify source tracking

This example shows how to enable IPSG for static hosts with IP filters on a Layer 2 access port and to verify the valid IP bindings on the interface Gi1/0/3:

Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip device tracking Switch(config)# interface gigabitethernet1/0/3 Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan 10 Switch(config-if)# ip device tracking maximum 5 Switch(config-if)# ip verify source tracking Switch(config-if)# end

Switch# show ip verify source

Interface Filter-type Filter-mode

--------- ----------- -----------

Gi1/0/3

ip trk

active

Gi1/0/3

ip trk

active

Gi1/0/3

ip trk

active

IP-address ---------------
40.1.1.24 40.1.1.20 40.1.1.21

Mac-address -----------------

Vlan ----
10 10 10

This example shows how to enable IPSG for static hosts with IP-MAC filters on a Layer 2 access port, to verify the valid IP-MAC bindings on the interface Gi1/0/3, and to verify that the number of bindings on this interface has reached the maximum:

Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# ip device tracking Switch(config)# interface gigabitethernet1/0/3 Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan 1 Switch(config-if)# ip device tracking maximum 5

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1451

Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port

Security

Switch(config-if)# ip verify source tracking Switch(config-if)# end

Switch# show ip verify source

Interface Filter-type Filter-mode

--------- ----------- -----------

Gi1/0/3

ip trk

active

IP-address ---------------
deny-all

Mac-address -----------------

Vlan ----
1

This example displays all IP or MAC binding entries for all interfaces. The CLI displays all active as well as inactive entries. When a host is learned on a interface, the new entry is marked as active. When the same host is disconnected from that interface and connected to a different interface, a new IP or MAC binding entry displays as active as soon as the host is detected. The old entry for this host on the previous interface is marked as INACTIVE.

Switch# show ip device tracking all IP Device Tracking for wireless clients = Enabled Global IP Device Tracking for wired clients = Enabled Global IP Device Tracking Probe Count = 3 Global IP Device Tracking Probe Interval = 30 -----------------------------------------------------------------------------------------------

IP Address

MAC Address Vlan Interface

Probe-Timeout

STATE

-----------------------------------------------------------------------------------------------

200.1.1.8

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.9

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.10

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.1

0001.0600.0000 9 GigabitEthernet1/0/2

ACTIVE

200.1.1.1

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.2

0001.0600.0000 9 GigabitEthernet1/0/2

ACTIVE

200.1.1.2

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.3

0001.0600.0000 9 GigabitEthernet1/0/2

ACTIVE

200.1.1.3

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.4

0001.0600.0000 9 GigabitEthernet1/0/2

ACTIVE

200.1.1.4

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.5

0001.0600.0000 9 GigabitEthernet1/0/2

ACTIVE

200.1.1.5

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.6

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.7

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

This example displays all active IP or MAC binding entries for all interfaces:

Switch# show ip device tracking all active IP Device Tracking for wireless clients = Enabled Global IP Device Tracking for wired clients = Enabled Global IP Device Tracking Probe Count = 3 Global IP Device Tracking Probe Interval = 30 -----------------------------------------------------------------------------------------------

IP Address

MAC Address Vlan Interface

Probe-Timeout

STATE

-----------------------------------------------------------------------------------------------

200.1.1.1

0001.0600.0000 9 GigabitEthernet1/0/1

ACTIVE

200.1.1.2

0001.0600.0000 9 GigabitEthernet1/0/1

ACTIVE

200.1.1.3

0001.0600.0000 9 GigabitEthernet1/0/1

ACTIVE

200.1.1.4

0001.0600.0000 9 GigabitEthernet1/0/1

ACTIVE

200.1.1.5

0001.0600.0000 9 GigabitEthernet1/0/1

ACTIVE

This example displays all inactive IP or MAC binding entries for all interfaces. The host was first learned on GigabitEthernet 1/0/1 and then moved to GigabitEthernet 0/2. the IP or MAC binding entries learned on GigabitEthernet1/ 0/1 are marked as inactive.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1452

Security

Monitoring IP Source Guard

Switch# show ip device tracking all inactive IP Device Tracking for wireless clients = Enabled Global IP Device Tracking for wired clients= Enabled Global IP Device Tracking Probe Count = 3 Global IP Device Tracking Probe Interval = 30 -----------------------------------------------------------------------------------------------

IP Address

MAC Address Vlan Interface

Probe-Timeout

STATE

-----------------------------------------------------------------------------------------------

200.1.1.8

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.9

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.10

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.1

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.2

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.3

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.4

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.5

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.6

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

200.1.1.7

0001.0600.0000 8 GigabitEthernet1/0/1

INACTIVE

This example displays the count of all IP device tracking host entries for all interfaces:

Switch# show ip device tracking all count

Total IP Device Tracking Host entries: 5

---------------------------------------------------------------------

Interface

Maximum Limit

Number of Entries

---------------------------------------------------------------------

Gi1/0/3

5

Monitoring IP Source Guard

Table 129: Privileged EXEC show Commands

Command

Purpose

show ip verify source [ interface interface-id ]

Displays the IP source guard configuration on the switch or on a specific interface.

show ip device tracking { all | interface interface-id Displays information about the entries in the IP device

| ip ip-address | mac imac-address}

tracking table.

Table 130: Interface Configuration Commands

Command

Purpose

ip verify source tracking Verifies the data source.

For detailed information about the fields in these displays, see the command reference for this release.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1453

Additional References

Security

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1454

7 3 C H A P T E R
Configuring Dynamic ARP Inspection
· Finding Feature Information, on page 1455 · Restrictions for Dynamic ARP Inspection, on page 1455 · Understanding Dynamic ARP Inspection, on page 1457 · Default Dynamic ARP Inspection Configuration, on page 1460 · Relative Priority of ARP ACLs and DHCP Snooping Entries, on page 1461 · Configuring ARP ACLs for Non-DHCP Environments , on page 1461 · Configuring Dynamic ARP Inspection in DHCP Environments, on page 1463 · How to Limit the Rate of Incoming ARP Packets, on page 1466 · How to Perform Validation Checks, on page 1467 · Monitoring DAI, on page 1469 · Verifying the DAI Configuration, on page 1469 · Additional References, on page 1470
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Dynamic ARP Inspection
This section lists the restrictions and guidelines for configuring Dynamic ARP Inspection on the switch. · Dynamic ARP inspection is an ingress security feature; it does not perform any egress checking. · Dynamic ARP inspection is not effective for hosts connected to switches that do not support dynamic ARP inspection or that do not have this feature enabled. Because man-in-the-middle attacks are limited to a single Layer 2 broadcast domain, separate the domain with dynamic ARP inspection checks from the one with no checking. This action secures the ARP caches of hosts in the domain enabled for dynamic ARP inspection.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1455

Restrictions for Dynamic ARP Inspection

Security

· Dynamic ARP inspection depends on the entries in the DHCP snooping binding database to verify IP-to-MAC address bindings in incoming ARP requests and ARP responses. Make sure to enable DHCP snooping to permit ARP packets that have dynamically assigned IP addresses.
When DHCP snooping is disabled or in non-DHCP environments, use ARP ACLs to permit or to deny packets.
· Dynamic ARP inspection is supported on access ports, trunk ports, and EtherChannel ports.
Note Do not enable Dynamic ARP inspection on RSPAN VLANs. If Dynamic ARP inspection is enabled on RSPAN VLANs, Dynamic ARP inspection packets might not reach the RSPAN destination port.
· A physical port can join an EtherChannel port channel only when the trust state of the physical port and the channel port match. Otherwise, the physical port remains suspended in the port channel. A port channel inherits its trust state from the first physical port that joins the channel. Consequently, the trust state of the first physical port need not match the trust state of the channel.
Conversely, when you change the trust state on the port channel, the switch configures a new trust state on all the physical ports that comprise the channel.
· The rate limit is calculated separately on each switch in a switch stack. For a cross-stack EtherChannel, this means that the actual rate limit might be higher than the configured value. For example, if you set the rate limit to 30 pps on an EtherChannel that has one port on switch 1 and one port on switch 2, each port can receive packets at 29 pps without causing the EtherChannel to become error-disabled.
· The operating rate for the port channel is cumulative across all the physical ports within the channel. For example, if you configure the port channel with an ARP rate-limit of 400 pps, all the interfaces combined on the channel receive an aggregate 400 pps. The rate of incoming ARP packets on EtherChannel ports is equal to the sum of the incoming rate of packets from all the channel members. Configure the rate limit for EtherChannel ports only after examining the rate of incoming ARP packets on the channel-port members.
The rate of incoming packets on a physical port is checked against the port-channel configuration rather than the physical-ports configuration. The rate-limit configuration on a port channel is independent of the configuration on its physical ports.
If the EtherChannel receives more ARP packets than the configured rate, the channel (including all physical ports) is placed in the error-disabled state.
· Make sure to limit the rate of ARP packets on incoming trunk ports. Configure trunk ports with higher rates to reflect their aggregation and to handle packets across multiple dynamic ARP inspection-enabled VLANs. You also can use the ip arp inspection limit none interface configuration command to make the rate unlimited. A high rate-limit on one VLAN can cause a denial-of-service attack to other VLANs when the software places the port in the error-disabled state.
· When you enable dynamic ARP inspection on the switch, policers that were configured to police ARP traffic are no longer effective. The result is that all ARP traffic is sent to the CPU.
· When you configure dynamic ARP inspection smart logging, the contents of all packets in the log buffer (by default, all dropped packets) are sent to a NetFlow collector. If you configure this feature, make sure that smart logging is globally enabled. For more information about smart logging, see the "Configuring Smart Logging" section on page xxx.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1456

Security

Understanding Dynamic ARP Inspection

Understanding Dynamic ARP Inspection
ARP provides IP communication within a Layer 2 broadcast domain by mapping an IP address to a MAC address. For example, Host B wants to send information to Host A but does not have the MAC address of Host A in its ARP cache. Host B generates a broadcast message for all hosts within the broadcast domain to obtain the MAC address associated with the IP address of Host A. All hosts within the broadcast domain receive the ARP request, and Host A responds with its MAC address. However,because ARP allows a gratuitous reply from a host even if an ARP request was not received, an ARP spoofing attack and the poisoning of ARP caches can occur. After the attack, all traffic from the device under attack flows through the attacker's computer and then to the router, switch, or host.
A malicious user can attack hosts, switches, and routers connected to your Layer 2 network by poisoning the ARP caches of systems connected to the subnet and by intercepting traffic intended for other hosts on the subnet. Figure 26-1 shows an example of ARP cache poisoning.
Figure 84: ARP Cache Poisoning

Hosts A, B, and C are connected to the switch on interfaces A, B and C, all of which are on the same subnet. Their IP and MAC addresses are shown in parentheses; for example, Host A uses IP address IA and MAC address MA. When Host A needs to communicate to Host B at the IP layer, it broadcasts an ARP request for the MAC address associated with IP address IB. When the switch and Host B receive the ARP request, they populate their ARP caches with an ARP binding for a host with the IP address IA and a MAC address MA; for example, IP address IA is bound to MAC address MA. When Host B responds, the switch and Host A populate their ARP caches with a binding for a host with the IP address IB and the MAC address MB. Host C can poison the ARP caches of the switch, Host A, and Host B by broadcasting forged ARP responses with bindings for a host with an IP address of IA (or IB) and a MAC address of MC. Hosts with poisoned ARP caches use the MAC address MC as the destination MAC address for traffic intended for IA or IB. This means that Host C intercepts that traffic. Because Host C knows the true MAC addresses associated with IA and IB, it can forward the intercepted traffic to those hosts by using the correct MAC address as the destination. Host C has inserted itself into the traffic stream from Host A to Host B, the classic man-in-the middleattack. Dynamic ARP inspection is a security feature that validates ARP packets in a network. It intercepts, logs,and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from certain man-in-the-middle attacks. Dynamic ARP inspection ensures that only valid ARP requests and responses are relayed. The switch performs these activities:
· Intercepts all ARP requests and responses on untrusted ports · Verifies that each of these intercepted packets has a valid IP-to-MAC address binding before updating
the local ARP cache or before forwarding the packet to the appropriate destination · Drops invalid ARP packets
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1457

Interface Trust States and Network Security

Security

Dynamic ARP inspection determines the validity of an ARP packet based on valid IP-to-MAC address bindings stored in a trusted database, the DHCP snooping binding database. This database is built by DHCP snooping if DHCP snooping is enabled on the VLANs and on the switch. If the ARP packet is received on a trusted interface, the switch forwards the packet without any checks. On untrusted interfaces, the switch forwards the packet only if it is valid.
You enable dynamic ARP inspection on a per-VLAN basis by using the ip arp inspection vlan vlan-range global configuration command.
In non-DHCP environments, dynamic ARP inspection can validate ARP packets against user-configured ARP access control lists (ACLs) for hosts with statically configured IP addresses. You define an ARP ACL by using the arp access-list acl-name global configuration command.
You can configure dynamic ARP inspection to drop ARP packets when the IP addresses in the packets are invalid or when the MAC addresses in the body of the ARP packets do not match the addresses specified in the Ethernet header. Use the ip arp inspection validate {[src-mac] [dst-mac] [ip]} global configuration command.
Interface Trust States and Network Security
Dynamic ARP inspection associates a trust state with each interface on the switch. Packets arriving on trusted interfaces bypass all dynamic ARP inspection validation checks, and those arriving on untrusted interfaces undergo the dynamic ARP inspection validation process.
In a typical network configuration, you configure all switch ports connected to host ports as untrusted and configure all switch ports connected to switches as trusted. With this configuration, all ARP packets entering the network from a given switch bypass the security check. No other validation is needed at any other place in the VLAN or in the network. You configure the trust setting by using theip arp inspection trust interface configuration command.
Caution Use the trust state configuration carefully. Configuring interfaces as untrusted when they should betrusted can result in a loss of connectivity.
In the following figure, assume that both Switch A and Switch B are running dynamic ARP inspection on the VLAN that includes Host 1 and Host 2. If Host 1 and Host 2 acquire their IP addresses from the DHCP server connected to Switch A, only Switch A binds the IP-to-MAC address of Host 1. Therefore, if the interface between Switch A and Switch B is untrusted, the ARP packets from Host 1 are dropped by Switch B. Connectivity between Host 1 and Host 2 is lost.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1458

Security

Figure 85: ARP Packet Validation on a VLAN Enabled for Dynamic ARP Inspection

Rate Limiting of ARP Packets

Configuring interfaces to be trusted when they are actually untrusted leaves a security hole in the network. If Switch A is not running dynamic ARP inspection, Host 1 can easily poison the ARP cache of Switch B (and Host 2, if the link between the switches is configured as trusted). This condition can occur even though Switch B is running dynamic ARP inspection. Dynamic ARP inspection ensures that hosts (on untrusted interfaces) connected to a switch running dynamic ARP inspection do not poison the ARP caches of other hosts in the network. However, dynamic ARP inspection does not prevent hosts in other portions of the network from poisoning the caches of the hosts that are connected to a switch running dynamic ARP inspection. In cases in which some switches in a VLAN run dynamic ARP inspection and other switches do not, configure the interfaces connecting such switches as untrusted. However, to validate the bindings of packets from nondynamic ARP inspection switches, configure the switch running dynamic ARP inspection with ARP ACLs. When you cannot determine such bindings, at Layer 3, isolate switches running dynamic ARP inspection from switches not running dynamic ARP inspection switches.
Note Depending on the setup of the DHCP server and the network, it might not be possible to validate a given ARP packet on all switches in the VLAN.
Rate Limiting of ARP Packets
The switch CPU performs dynamic ARP inspection validation checks; therefore, the number of incoming ARP packets is rate-limited to prevent a denial-of-service attack. By default, the rate for untrusted interfaces is 15 packets per second (pps). Trusted interfaces are not rate-limited. You can change this setting by using theip arp inspection limitinterface configuration command. When the rate of incoming ARP packets exceeds the configured limit, the switch places the port in the error-disabled state. The port remains in that state until you intervene. You can use the errdisable recovery global configuration command to enable error disable recovery so that ports automatically emerge from this state after a specified timeout period.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1459

Relative Priority of ARP ACLs and DHCP Snooping Entries

Security

Note The rate limit for an EtherChannel is applied separately to each switch in a stack. For example, if a limit of 20 pps is configured on the EtherChannel, each switch with ports in the EtherChannel can carry up to 20 pps. If any switch exceeds the limit, the entire EtherChannel is placed into the error-disabled state.

Relative Priority of ARP ACLs and DHCP Snooping Entries
Dynamic ARP inspection uses the DHCP snooping binding database for the list of valid IP-to-MAC address bindings.
ARP ACLs take precedence over entries in the DHCP snooping binding database. The switch uses ACLs only if you configure them by using the ip arp inspection filter vlan global configuration command. The switch first compares ARP packets to user-configured ARP ACLs. If the ARP ACL denies the ARP packet, the switch also denies the packet even if a valid binding exists in the database populated by DHCP snooping.
Logging of Dropped Packets
When the switch drops a packet, it places an entry in the log buffer and then generates system messages on a rate-controlled basis. After the message is generated, the switch clears the entry from the log buffer. Each log entry contains flow information, such as the receiving VLAN, the port number, the source and destination IP addresses, and the source and destination MAC addresses.
You use the ip arp inspection log-buffer global configuration command to configure the number of entries in the buffer and the number of entries needed in the specified interval to generate system messages. You specify the type of packets that are logged by using the ip arp inspection vlan logging global configuration command.

Default Dynamic ARP Inspection Configuration

Feature Dynamic ARP inspection Interface trust state Feature
Dynamic ARP inspection Interface trust state

Default Settings Disabled on all VLANs. All interfaces are untrusted. The rate is 15 pps on untrusted interfaces, assuming that the network is a switched network with a host connecting to as many as 15 new hosts per second. The rate is unlimited on all trusted interfaces. The burst interval is 1 second.
No ARP ACLs are defined. No checks are performed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1460

Security

Relative Priority of ARP ACLs and DHCP Snooping Entries

Feature Rate limit of incoming ARP packets
ARP ACLs for non-DHCP environments

Default Settings When dynamic ARP inspection is enabled, all denied or dropped ARP packets are logged. The number of entries in the log is 32. The number of system messages is limited to 5 per second. The logging-rate interval is 1 second.
All denied or dropped ARP packets are logged.

Relative Priority of ARP ACLs and DHCP Snooping Entries
Dynamic ARP inspection uses the DHCP snooping binding database for the list of valid IP-to-MAC address bindings.
ARP ACLs take precedence over entries in the DHCP snooping binding database. The switch uses ACLs only if you configure them by using the ip arp inspection filter vlan global configuration command. The switch first compares ARP packets to user-configured ARP ACLs. If the ARP ACL denies the ARP packet, the switch also denies the packet even if a valid binding exists in the database populated by DHCP snooping.

Configuring ARP ACLs for Non-DHCP Environments
This procedure shows how to configure dynamic ARP inspection when Switch B shown in Figure 2 does not support dynamic ARP inspection or DHCP snooping.
If you configure port 1 on Switch A as trusted, a security hole is created because both Switch A and Host 1 could be attacked by either Switch B or Host 2. To prevent this possibility, you must configure port 1 on Switch A as untrusted. To permit ARP packets from Host 2, you must set up an ARP ACL and apply it to VLAN 1. If the IP address of Host 2 is not static (it is impossible to apply the ACL configuration on Switch A) you must separate Switch A from Switch B at Layer 3 and use a router to route packets between them.
Beginning in privileged EXEC mode, follow these steps to configure an ARP ACL on Switch A. This procedure is required in non-DHCP environments.

SUMMARY STEPS

1. Configureterminal 2. arp access-list acl-name 3. permit ip host sender-ip mac host sender-mac 4. exit 5. ip arp inspection filter arp-acl-name vlan vlan-range [static] 6. ip arp inspection smartlog 7. interface interface-id 8. no ip arp inspection trust 9. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1461

Configuring ARP ACLs for Non-DHCP Environments

Security

10. show arp access-list acl-name show ip arp inspection vlan vlan-range show ip arp inspection interfaces
11. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action Configureterminal

Step 2

arp access-list acl-name

Purpose
Enter global configuration mode.
Define an ARP ACL, and enter ARP access-list configuration mode. By default, no ARP access lists are defined.
Note At the end of the ARP access list, there is an implicitdeny ip any mac any command.

Step 3

permit ip host sender-ip mac host sender-mac

Permit ARP packets from the specified host (Host 2). · Forsender-ip, enter the IP address of Host 2. · For sender-mac, enter the MAC address of Host 2.

Step 4 Step 5
Step 6

exit

Return to global configuration mode.

ip arp inspection filter arp-acl-name vlan vlan-range Apply the ARP ACL to the VLAN. By default, no defined

[static]

ARP ACLs are applied to any VLAN.

· For arp-acl-name, specify the name of the ACL created in Step 2.

· For vlan-range, specify the VLAN that the switches and hosts are in. You can specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094.

· (Optional) Specify static to treat implicit denies in the ARP ACL as explicit denies and to drop packets that do not match any previous clauses in the ACL. DHCP bindings are not used.

If you do not specify this keyword, it means that there is no explicit deny in the ACL that denies the packet, and DHCP bindings determine whether a packet is permitted or denied if the packet does not match any clauses in the ACL.

ip arp inspection smartlog

ARP packets containing only IP-to-MAC address bindings are compared against the ACL. Packets are permitted only if the access list permits them.
Specify that whatever packets are currently being logged are also smart-logged. By default, all dropped packets are logged.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1462

Security

Configuring Dynamic ARP Inspection in DHCP Environments

Step 7 Step 8
Step 9 Step 10 Step 11

Command or Action interface interface-id

Purpose
Specify the Switch A interface that is connected to Switch B, and enter interface configuration mode.

no ip arp inspection trust

Configure the Switch A interface that is connected to Switch B as untrusted.
By default, all interfaces are untrusted.
For untrusted interfaces, the switch intercepts all ARP requests and responses. It verifies that the intercepted packets have valid IP-to-MAC address bindings before updating the local cache and before forwarding the packet to the appropriate destination. The switch drops invalid packets and logs them in the log buffer according to the logging configuration specified with the ip arp inspection vlan logging global configuration command.

end

Return to privileged EXEC mode.

show arp access-list acl-name show ip arp inspection vlan vlan-range show ip arp inspection interfaces
copy running-config startup-config

Verify your entries. (Optional) Save your entries in the configuration file.

Example To remove the ARP ACL, use the no arp access-list global configuration command. To remove the ARP ACL attached to a VLAN, use the no ip arp inspection filter arp-acl-name vlan vlan-range global configuration command. This example shows how to configure an ARP ACL called host2 on Switch A, to permit ARP packets from Host 2 (IP address 1.1.1.1 and MAC address 0001.0001.0001), to apply the ACL to VLAN 1, and to configure port 1 on Switch A as untrusted:
Switch(config)#arp access-list host2 Switch(config-arp-acl)#permit ip host 1.1.1.1 mac host 1.1.1 Switch(config-arp-acl)# exit
Switch(config)# ip arp inspection filter host2 vlan 1 Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# no ip arp inspection trust
Configuring Dynamic ARP Inspection in DHCP Environments
Before you begin This procedure shows how to configure dynamic ARP inspection when two switches support this feature. Host 1 is connected to Switch A, and Host 2 is connected to Switch B. Both switches are running dynamic ARP inspection on VLAN 1 where the hosts are located. A DHCP server is connected to Switch A. Both hosts

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1463

Configuring Dynamic ARP Inspection in DHCP Environments

Security

acquire their IP addresses from the same DHCP server. Therefore, Switch A has the bindings for Host 1 and Host 2, and Switch B has the binding for Host 2.

Note Dynamic ARP inspection depends on the entries in the DHCP snooping binding database to verify IP-to-MAC address bindings in incoming ARP requests and ARP responses. Make sure to enable DHCP snooping to permit ARP packets that have dynamically assigned IP addresses.
Beginning in privileged EXEC mode, follow these steps to configure dynamic ARP inspection. You must perform this procedure on both switches. This procedure is required.

SUMMARY STEPS

1. show cdp neighbors 2. configure terminal 3. ip arp inspection vlan vlan-range 4. ip arp inspection smartlog 5. Interfaceinterface-id 6. ip arp inspection trust 7. end 8. show ip arp inspection interfaces 9. show ip arp inspection vlan vlan-range 10. show ip dhcp snooping binding 11. show ip arp inspection statistics vlan vlan-range 12. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action show cdp neighbors

Step 2

configure terminal Example:

Purpose Verify the connection between the switches. Enters the global configuration mode.

Switch# configure terminal

Step 3

ip arp inspection vlan vlan-range Example:

Step 4

ip arp inspection smartlog Example:

Enable dynamic ARP inspection on a per-VLAN basis. By default, dynamic ARP inspection is disabled on all VLANs. For vlan-range, specify a single VLAN identified by VLAN ID number, a range of VLANs separated by a hyphen, or a series of VLANs separated by a comma. The range is 1 to 4094. Specify the same VLAN ID for both switches.
(Optional). Specify that whatever packets are currently being logged are also smart-logged. By default, all dropped packets are logged.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1464

Security

Configuring Dynamic ARP Inspection in DHCP Environments

Step 5 Step 6

Command or Action Interfaceinterface-id Example: ip arp inspection trust Example:

Step 7 Step 8 Step 9

end Example: show ip arp inspection interfaces Example: show ip arp inspection vlan vlan-range

Step 10 Step 11 Step 12

show ip dhcp snooping binding Example: show ip arp inspection statistics vlan vlan-range Example: copy running-config startup-config Example:

Purpose Specify the interface connected to the other switch, and enter interface configuration mode.
Configure the connection between the switches as trusted. By default, all interfaces are untrusted. The switch does not check ARP packets that it receives from the other switch on the trusted interface. It simply forwards the packets. For untrusted interfaces, the switch intercepts all ARP requests and responses. It verifies that the intercepted packets have valid IP-to-MAC address bindings before updating the local cache and before forwarding the packet to the appropriate destination. The switch drops invalid packets and logs them in the log buffer according to the logging configuration specified with the ip arp inspection vlan logging global configuration command.
Return to privileged EXEC mode.
Verify the dynamic ARP inspection configuration on interfaces.
Verify the dynamic ARP inspection configuration on VLAN.
Verify the DHCP bindings.
Check the dynamic ARP inspection statistics on VLAN.
(Optional) Save your entries in the configuration file.

Example
To disable dynamic ARP inspection, use the no ip arp inspection vlan vlan-range global configuration command. To return the interfaces to an untrusted state, use the no ip arp inspection trust interface configuration command.
This example shows how to configure dynamic ARP inspection on Switch A in VLAN 1. You would perform a similar procedure on Switch B:
Switch(config)# ip arp inspection vlan 1
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)#ip arp inspection trust

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1465

How to Limit the Rate of Incoming ARP Packets

Security

How to Limit the Rate of Incoming ARP Packets
The switch CPU performs dynamic ARP inspection validation checks; therefore, the number of incoming ARP packets is rate-limited to prevent a denial- of-service attack.
When the rate of incoming ARP packets exceeds the configured limit, the switch places the port in the error-disabled state. The port remains in that state until you enable error-disabled recovery so that ports automatically emerge from this state after a specified timeout period.

Note Unless you configure a rate limit on an interface, changing the trust state of the interface also changes its rate limit to the default value for that trust state. After you configure the rate limit, the interface retains the rate limit even when its trust state is changed. If you enter the no ip arp inspection limit interface configuration command, the interface reverts to its default rate limit.
For configuration guidelines for rate limiting trunk ports and EtherChannel ports, see the section, "Dynamic ARP Inspection Configuration Guidelines."
To return to the default rate-limit configuration, use the no ip arp inspection limit interface configuration command. To disable error recovery for dynamic ARP inspection, use the no errdisable recovery cause arp-inspection global configuration command.
Beginning in privileged EXEC mode, follow these steps to limit the rate of incoming ARP packets. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. ip arp inspection limit {rate pps [burst interval seconds] | none} 4. exit 5. errdisable detect cause arp-inspection and errdisable recovery causearp-inspection errdisable
recovery interval interval 6. exit 7. show ip arp inspection interfaces show errdisable recovery 8. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal

Purpose Enter global configuration mode.

Step 2 interface interface-id

Specify the interface to be rate-limited, and enter interface configuration mode.

Step 3

ip arp inspection limit {rate pps [burst interval seconds] Limit the rate of incoming ARP requests and responses on

| none}

the interface.

Limit the rate of incoming ARP requests and responses on the interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1466

Security

How to Perform Validation Checks

Step 4 Step 5
Step 6 Step 7 Step 8

Command or Action

Purpose The default rate is 15 pps on untrusted interfaces and unlimited on trusted interfaces. The burst interval is 1 second.
The keywords have these meanings:
· For rate pps, specify an upper limit for the number of incoming packets processed per second. The range is 0 to 2048 pps.
· (Optional) For burst interval seconds, specify the consecutive interval in seconds, over which the interface is monitored for a high rate of ARP packets. The range is 1 to 15.
· For rate none, specify no upper limit for the rate of incoming ARP packets that can be processed.

exit

Return to global configuration mode.

errdisable detect cause arp-inspection and errdisable recovery causearp-inspection errdisable recovery interval interval

(Optional) Enable error recovery from the dynamic ARP inspection error-disabled state, and configure the dynamic ARP inspection recover mechanism variables.
By default, recovery is disabled, and the recovery interval is 300 seconds.
For interval interval, specify the time in seconds to recover from the error-disabled state. The range is 30 to 86400.

exit

Return to privileged EXEC mode.

show ip arp inspection interfaces show errdisable recovery
copy running-config startup-config

Verify your settings. (Optional) Save your entries in the configuration file.

How to Perform Validation Checks
Dynamic ARP inspection intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. You can configure the switch to perform additional checks on the destination MAC address, the sender and target IP addresses, and the source MAC address. Beginning in privileged EXEC mode, follow these steps to perform specific checks on incoming ARP packets.
This procedure is optional.
To disable checking, use theno ip arp inspection validate [src-mac] [dst-mac] [ip] global configuration command. To display statistics for forwarded, dropped, and MAC and IP validation failure packets, use the show ip arp inspection statistics privileged EXEC command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1467

How to Perform Validation Checks

Security

SUMMARY STEPS

1. configure terminal 2. ip arp inspection validate {[src-mac] [dst-mac] [ip]} 3. exit 4. show ip arp inspection vlan vlan-range 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal

Step 2 ip arp inspection validate {[src-mac] [dst-mac] [ip]}

Step 3 Step 4 Step 5

exit show ip arp inspection vlan vlan-range copy running-config startup-config

Purpose
Enter global configuration mode.
Perform a specific check on incoming ARP packets. By default, no checks are performed.
The keywords have these meanings:
· For src-mac, check the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. When enabled, packets with different MAC addresses are classified as invalid and are dropped.
· For dst-mac, check the destination MAC address in the Ethernet header against the target MAC address in ARP body. This check is performed for ARP responses. When enabled, packets with different MAC addresses are classified as invalid and are dropped.
· For ip, check the ARP body for invalid and unexpected IP addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP multicast addresses. Sender IP addresses are checked in all ARP requests and responses, and target IP addresses are checked only in ARP responses.
You must specify at least one of the keywords. Each command overrides the configuration of the previous command; that is, if a command enables src and dst mac validations, and a second command enables IP validation only, the src and dst mac validations are disabled as a result of the second command.
Return to privileged EXEC mode.
Verify your settings.
(Optional) Save your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1468

Security

Monitoring DAI

Monitoring DAI

To monitor DAI, use the following commands:

Command

Description

clear ip arp inspection statistics

Clears dynamic ARP inspection statistics.

show ip arp inspection statistics [vlan vlan-range] Displays statistics for forwarded, dropped, MAC validation failure, IP validation failure, ACL permitted and denied, and DHCP permitted and denied packets for the specified VLAN. If no VLANs are specified or if a range is specified, displays information only for VLANs with dynamic ARP inspection enabled (active).

clear ip arp inspection log show ip arp inspection log

Clears the dynamic ARP inspection log buffer.
Displays the configuration and contents of the dynamic ARP inspection log buffer.

For the show ip arp inspection statistics command, the switch increments the number of forwarded packets for each ARP request and response packet on a trusted dynamic ARP inspection port. The switch increments the number of ACL or DHCP permitted packets for each packet that is denied by source MAC, destination MAC, or IP validation checks, and the switch increments the appropriate.

Verifying the DAI Configuration

To display and verify the DAI configuration, use the following commands:

Command show arp access-list [acl-name]

Description Displays detailed information about ARP ACLs.

show ip arp inspection interfaces [interface-id]

Displays the trust state and the rate limit of ARP packets for the specified interface or all interfaces.

show ip arp inspection vlan vlan-range

Displays the configuration and the operating state of dynamic ARP inspection for the specified VLAN. If no VLANs are specified or if a range is specified, displays information only for VLANs with dynamic ARP inspection enabled (active).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1469

Additional References

Security

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1470

7 4 C H A P T E R
Configuring IEEE 802.1x Port-Based Authentication
This chapter describes how to configure IEEE 802.1x port-based authentication. IEEE 802.1x authentication prevents unauthorized devices (clients) from gaining access to the network. Unless otherwise noted, the term switch refers to a standalone switch or a switch stack.
· Finding Feature Information, on page 1471 · Information About 802.1x Port-Based Authentication, on page 1471 · How to Configure 802.1x Port-Based Authentication, on page 1502 · Monitoring 802.1x Statistics and Status, on page 1555 · Additional References, on page 1556 · Feature Information for 802.1x Port-Based Authentication, on page 1557
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About 802.1x Port-Based Authentication
The 802.1x standard defines a client-server-based access control and authentication protocol that prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they are properly authenticated. The authentication server authenticates each client connected to a switch port before making available any services offered by the switch or the LAN. Until the client is authenticated, 802.1x access control allows only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the port.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1471

Port-Based Authentication Process

Security

Note For complete syntax and usage information for the commands used in this chapter, see the "RADIUS Commands" section in the Cisco IOS Security Command Reference, Release 12.4 and the command reference for this release.
Port-Based Authentication Process
When 802.1x port-based authentication is enabled and the client supports 802.1x-compliant client software, these events occur:
· If the client identity is valid and the 802.1x authentication succeeds, the switch grants the client access to the network.
· If 802.1x authentication times out while waiting for an EAPOL message exchange and MAC authentication bypass is enabled, the switch can use the client MAC address for authorization. If the client MAC address is valid and the authorization succeeds, the switch grants the client access to the network. If the client MAC address is invalid and the authorization fails, the switch assigns the client to a guest VLAN that provides limited services if a guest VLAN is configured.
· If the switch gets an invalid identity from an 802.1x-capable client and a restricted VLAN is specified, the switch can assign the client to a restricted VLAN that provides limited services.
· If the RADIUS authentication server is unavailable (down) and inaccessible authentication bypass is enabled, the switch grants the client access to the network by putting the port in the critical-authentication state in the RADIUS-configured or the user-specified access VLAN.
Note Inaccessible authentication bypass is also referred to as critical authentication or the AAA fail policy.
If Multi Domain Authentication (MDA) is enabled on a port, this flow can be used with some exceptions that are applicable to voice authorization.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1472

Security
Figure 86: Authentication Flowchart
This figure shows the authentication

Port-Based Authentication Process

process. The switch re-authenticates a client when one of these situations occurs:
· Periodic re-authentication is enabled, and the re-authentication timer expires. You can configure the re-authentication timer to use a switch-specific value or to be based on values from the RADIUS server. After 802.1x authentication using a RADIUS server is configured, the switch uses timers based on the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS attribute (Attribute [29]). The Session-Timeout RADIUS attribute (Attribute[27]) specifies the time after which re-authentication occurs. The Termination-Action RADIUS attribute (Attribute [29]) specifies the action to take during re-authentication. The actions are Initialize and ReAuthenticate. When the Initialize action is set (the attribute value is DEFAULT), the 802.1x session ends, and connectivity is lost during re-authentication. When the ReAuthenticate action is set (the attribute value is RADIUS-Request), the session is not affected during re-authentication.
· You manually re-authenticate the client by entering the dot1x re-authenticate interface interface-id privileged EXEC command.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1473

Port-Based Authentication Initiation and Message Exchange

Security

Port-Based Authentication Initiation and Message Exchange
During 802.1x authentication, the switch or the client can initiate authentication. If you enable authentication on a port by using the authentication port-control auto interface configuration command, the switch initiates authentication when the link state changes from down to up or periodically as long as the port remains up and unauthenticated. The switch sends an EAP-request/identity frame to the client to request its identity. Upon receipt of the frame, the client responds with an EAP-response/identity frame.
However, if during bootup, the client does not receive an EAP-request/identity frame from the switch, the client can initiate authentication by sending an EAPOL-start frame, which prompts the switch to request the client's identity.
Note If 802.1x authentication is not enabled or supported on the network access device, any EAPOL frames from the client are dropped. If the client does not receive an EAP-request/identity frame after three attempts to start authentication, the client sends frames as if the port is in the authorized state. A port in the authorized state effectively means that the client has been successfully authenticated.
When the client supplies its identity, the switch begins its role as the intermediary, passing EAP frames between the client and the authentication server until authentication succeeds or fails. If the authentication succeeds, the switch port becomes authorized. If the authentication fails, authentication can be retried, the port might be assigned to a VLAN that provides limited services, or network access is not granted.
The specific exchange of EAP frames depends on the authentication method being used.
Figure 87: Message Exchange
This figure shows a message exchange initiated by the client when the client uses the One-Time-Password (OTP) authentication method with a RADIUS

server. If 802.1x authentication times out while waiting for an EAPOL message exchange and MAC authentication bypass is enabled, the switch can authorize the client when the switch detects an Ethernet packet from the
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1474

Security

Authentication Manager for Port-Based Authentication
client. The switch uses the MAC address of the client as its identity and includes this information in the RADIUS-access/request frame that is sent to the RADIUS server. After the server sends the switch the RADIUS-access/accept frame (authorization is successful), the port becomes authorized. If authorization fails and a guest VLAN is specified, the switch assigns the port to the guest VLAN. If the switch detects an EAPOL packet while waiting for an Ethernet packet, the switch stops the MAC authentication bypass process and starts 802.1x authentication.
Figure 88: Message Exchange During MAC Authentication Bypass
This figure shows the message exchange during MAC authentication

bypass.

Authentication Manager for Port-Based Authentication
In Cisco IOS Release 12.2(46)SE and earlier, you could not use the same authorization methods, including CLI commands and messages, on this switch and also on other network devices, such as a Catalyst 6000. You had to use separate authentication configurations. Cisco IOS Release 12.2(50)SE and later supports the same authorization methods on all Catalyst switches in a network.
Cisco IOS Release 12.2(55)SE supports filtering verbose system messages from the authentication manager.

Port-Based Authentication Methods

Table 131: 802.1x Features

Authentication method
802.1x

Mode

Single host

Multiple host

MDA

Multiple Authentication

VLAN assignment VLAN assignment VLAN assignment VLAN assignment

Per-user ACL

Per-user ACL

Per-user ACL

Filter-ID attribute

Filter-Id attribute Filter-Id attribute

Downloadable ACL

Downloadable ACL Downloadable ACL

Redirect URL

Redirect URL

Redirect URL

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1475

Per-User ACLs and Filter-Ids

Security

Authentication method

Mode Single host

Multiple host

MDA

Multiple Authentication

MAC authentication VLAN assignment VLAN assignment VLAN assignment VLAN assignment

bypass

Per-user ACL

Per-user ACL

Per-user ACL

Filter-ID attribute

Filter-Id attribute Filter-Id attribute

Downloadable ACL

Downloadable ACL Downloadable ACL

Redirect URL

Redirect URL

Redirect URL

Standalone web authentication

Proxy ACL, Filter-Id attribute, downloadable ACL

NAC Layer 2 IP validation

Filter-Id attribute Filter-Id attribute Filter-Id attribute Filter-Id attribute

Downloadable ACL Downloadable ACL Downloadable ACL Downloadable ACL

Redirect URL

Redirect URL

Redirect URL

Redirect URL

Web authentication Proxy ACL as fallback method Filter-Id attribute

Proxy ACL Filter-Id attribute

Proxy ACL Filter-Id attribute

Proxy ACL Filter-Id attribute

Downloadable ACL Downloadable ACL Downloadable ACL Downloadable ACL

18 Supported in Cisco IOS Release 12.2(50)SE and later. 19 For clients that do not support 802.1x authentication.

Per-User ACLs and Filter-Ids
ACLs configured on the switch are compatible with other devices running Cisco IOS releases. You can only set any as the source in the ACL.

Note For any ACL configured for multiple-host mode, the source portion of statement must be any. (For example, permit icmp any host 10.10.1.1.)
Port-Based Authentication Manager CLI Commands
The authentication-manager interface-configuration commands control all the authentication methods, such as 802.1x, MAC authentication bypass, and web authentication. The authentication manager commands determine the priority and order of authentication methods applied to a connected host.
The authentication manager commands control generic authentication features, such as host-mode, violation mode, and the authentication timer. Generic authentication commands include the authentication host-mode, authentication violation, and authentication timer interface configuration commands.
802.1x-specific commands begin with the dot1x keyword. For example, the authentication port-control auto interface configuration command enables authentication on an interface. However, the dot1x

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1476

Security

Port-Based Authentication Manager CLI Commands

system-authentication control global configuration command only globally enables or disables 802.1x authentication.

Note If 802.1x authentication is globally disabled, other authentication methods are still enabled on that port, such as web authentication.
The authentication manager commands provide the same functionality as earlier 802.1x commands.
Beginning with Cisco IOS Release 12.2(55)SE, you can filter out verbose system messages generated by the authentication manager. The filtered content typically relates to authentication success. You can also filter verbose messages for 802.1x authentication and MAB authentication. There is a separate command for each authentication method:
· The no authentication logging verbose global configuration command filters verbose messages from the authentication manager.
· The no dot1x logging verbose global configuration command filters 802.1x authentication verbose messages.
· The no mab logging verbose global configuration command filters MAC authentication bypass (MAB) verbose messages

Table 132: Authentication Manager Commands and Earlier 802.1x Commands

The authentication manager commands in Cisco IOS Release 12.2(50)SE or later

The equivalent 802.1x commands Description in Cisco IOS Release 12.2(46)SE and earlier

authentication control-direction dot1x control-direction {both |

{both | in}

in}

Enable 802.1x authentication with the wake-on-LAN (WoL) feature, and configure the port control as unidirectional or bidirectional.

authentication event

dot1x auth-fail vlan
dot1x critical (interface configuration)
dot1x guest-vlan6

Enable the restricted VLAN on a port.
Enable the inaccessible-authentication-bypass feature.
Specify an active VLAN as an 802.1x guest VLAN.

authentication fallback fallback-profile

dot1x fallback fallback-profile

Configure a port to use web authentication as a fallback method for clients that do not support 802.1x authentication.

authentication host-mode [multi-auth | multi-domain | multi-host | single-host]

dot1x host-mode {single-host | multi-host | multi-domain}

Allow a single host (client) or multiple hosts on an 802.1x-authorized port.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1477

Ports in Authorized and Unauthorized States

Security

The authentication manager commands in Cisco IOS Release 12.2(50)SE or later

The equivalent 802.1x commands Description in Cisco IOS Release 12.2(46)SE and earlier

authentication order

mab

Provides the flexibility to define the order of authentication methods to be used.

authentication periodic

dot1x reauthentication

Enable periodic re-authentication of the client.

authentication port-control {auto dot1x port-control {auto |

| force-authorized | force-un force-authorized |

authorized}

force-unauthorized}

Enable manual control of the authorization state of the port.

authentication timer

dot1x timeout

Set the 802.1x timers.

authentication violation {protect dot1x violation-mode {shutdown Configure the violation modes that

| restrict | shutdown}

| restrict | protect}

occur when a new device connects

to a port or when a new device

connects to a port after the

maximum number of devices are

connected to that port.

show authentication

show dot1x

Display 802.1x statistics, administrative status, and operational status for the switch or for the specified port. authentication manager: compatibility with earlier 802.1x CLI commands

Ports in Authorized and Unauthorized States
During 802.1x authentication, depending on the switch port state, the switch can grant a client access to the network. The port starts in the unauthorized state. While in this state, the port that is not configured as a voice VLAN port disallows all ingress and egress traffic except for 802.1x authentication, CDP, and STP packets. When a client is successfully authenticated, the port changes to the authorized state, allowing all traffic for the client to flow normally. If the port is configured as a voice VLAN port, the port allows VoIP traffic and 802.1x protocol packets before the client is successfully authenticated.
If a client that does not support 802.1x authentication connects to an unauthorized 802.1x port, the switch requests the client's identity. In this situation, the client does not respond to the request, the port remains in the unauthorized state, and the client is not granted access to the network.
In contrast, when an 802.1x-enabled client connects to a port that is not running the 802.1x standard, the client initiates the authentication process by sending the EAPOL-start frame. When no response is received, the client sends the request for a fixed number of times. Because no response is received, the client begins sending frames as if the port is in the authorized state.
You control the port authorization state by using the authentication port-control interface configuration command and these keywords:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1478

Security

Port-Based Authentication and Switch Stacks

· force-authorized--disables 802.1x authentication and causes the port to change to the authorized state without any authentication exchange required. The port sends and receives normal traffic without 802.1x-based authentication of the client. This is the default setting.
· force-unauthorized--causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the port.
· auto--enables 802.1x authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port changes from down to up or when an EAPOL-start frame is received. The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server. Each client attempting to access the network is uniquely identified by the switch by using the client MAC address.
Note In Session Aware Networking mode, the authentication port-control command is access-session port-control.
If the client is successfully authenticated (receives an Accept frame from the authentication server), the port state changes to authorized, and all frames from the authenticated client are allowed through the port. If the authentication fails, the port remains in the unauthorized state, but authentication can be retried. If the authentication server cannot be reached, the switch can resend the request. If no response is received from the server after the specified number of attempts, authentication fails, and network access is not granted.
When a client logs off, it sends an EAPOL-logoff message, causing the switch port to change to the unauthorized state.
If the link state of a port changes from up to down, or if an EAPOL-logoff frame is received, the port returns to the unauthorized state.
Port-Based Authentication and Switch Stacks
If a switch is added to or removed from a switch stack, 802.1x authentication is not affected as long as the IP connectivity between the RADIUS server and the stack remains intact. This statement also applies if the stack master is removed from the switch stack. Note that if the stack master fails, a stack member becomes the new stack master by using the election process, and the 802.1x authentication process continues as usual.
If IP connectivity to the RADIUS server is interrupted because the switch that was connected to the server is removed or fails, these events occur:
· Ports that are already authenticated and that do not have periodic re-authentication enabled remain in the authenticated state. Communication with the RADIUS server is not required.
· Ports that are already authenticated and that have periodic re-authentication enabled (with the authentication periodic global configuration command) fail the authentication process when the re-authentication occurs. Ports return to the unauthenticated state during the re-authentication process. Communication with the RADIUS server is required.
For an ongoing authentication, the authentication fails immediately because there is no server connectivity.
If the switch that failed comes up and rejoins the switch stack, the authentications might or might not fail depending on the boot-up time and whether the connectivity to the RADIUS server is re-established by the time the authentication is attempted.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1479

802.1x Host Mode

Security

To avoid loss of connectivity to the RADIUS server, you should ensure that there is a redundant connection to it. For example, you can have a redundant connection to the stack master and another to a stack member, and if the stack master fails, the switch stack still has connectivity to the RADIUS server.
802.1x Host Mode
You can configure an 802.1x port for single-host or for multiple-hosts mode. In single-host mode, only one client can be connected to the 802.1x-enabled switch port. The switch detects the client by sending an EAPOL frame when the port link state changes to the up state. If a client leaves or is replaced with another client, the switch changes the port link state to down, and the port returns to the unauthorized state.
In multiple-hosts mode, you can attach multiple hosts to a single 802.1x-enabled port. In this mode, only one of the attached clients must be authorized for all clients to be granted network access. If the port becomes unauthorized (re-authentication fails or an EAPOL-logoff message is received), the switch denies network access to all of the attached clients. In this topology, the wireless access point is responsible for authenticating the clients attached to it, and it also acts as a client to the switch.
Figure 89: Multiple Host Mode Example
This figure shows 802.1x port-based authentication in a wireless

LAN.
802.1x Multiple Authentication Mode
Multiple-authentication (multiauth) mode allows multiple authenticated clients on the data VLAN and voice VLAN. Each host is individually authenticated. There is no limit to the number of data or voice device that can be authenticated on a multiauthport. If a hub or access point is connected to an 802.1x-enabled port, each connected client must be authenticated. For non-802.1x devices, you can use MAC authentication bypass or web authentication as the per-host authentication fallback method to authenticate different hosts with different methods on a single port.
Note When a port is in multiple-authentication mode, the authentication-failed VLAN features do not activate. You can assign a RADIUS-server-supplied VLAN in multi-auth mode, under the following conditions: · The host is the first host authorized on the port, and the RADIUS server supplies VLAN information · Subsequent hosts are authorized with a VLAN that matches the operational VLAN. · A host is authorized on the port with no VLAN assignment, and subsequent hosts either have no VLAN assignment, or their VLAN information matches the operational VLAN.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1480

Security

Multi-auth Per User VLAN assignment

· The first host authorized on the port has a group VLAN assignment, and subsequent hosts either have no VLAN assignment, or their group VLAN matches the group VLAN on the port. Subsequent hosts must use the same VLAN from the VLAN group as the first host. If a VLAN list is used, all hosts are subject to the conditions specified in the VLAN list.
· After a VLAN is assigned to a host on the port, subsequent hosts must have matching VLAN information or be denied access to the port.
· You cannot configure a guest VLAN or an auth-fail VLAN in multi-auth mode.
· The behavior of the critical-auth VLAN is not changed for multi-auth mode. When a host tries to authenticate and the server is not reachable, all authorized hosts are reinitialized in the configured VLAN.
Multi-auth Per User VLAN assignment
The Multi-auth Per User VLAN assignment feature allows you to create multiple operational access VLANs based on VLANs assigned to the clients on the port that has a single configured access VLAN. The port configured as an access port where the traffic for all the VLANs associated with data domain is not dot1q tagged, and these VLANs are treated as native VLANs. The number of hosts per multi-auth port is 8, however there can be more hosts.
Note The Multi-auth Per User VLAN assignment feature is not supported for Voice domain. All clients in Voice domain on a port must use the same VLAN.
The following scenarios are associated with the multi-auth Per User VLAN assignments: Scenario one When a hub is connected to an access port, and the port is configured with an access VLAN (V0). The host (H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to V1. This behaviour is similar on a single-host or multi-domain-auth port. When a second host (H2) is connected and gets assigned to VLAN ( V2), the port will have two operational VLANs (V1 and V2). If H1 and H2 sends untagged ingress traffic, H1 traffic is mapped to VLAN (V1) and H2 traffic to VLAN (V2), all egress traffic going out of the port on VLAN (V1) and VLAN (V2) are untagged. If both the hosts, H1 and H2 are logged out or the sessions are removed due to some reason then VLAN (V1) and VLAN (V2) are removed from the port, and the configured VLAN (V0) is restored on the port. Scenario two When a hub is connected to an access port, and the port is configured with an access VLAN (V0). The host (H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to V1. When a second host (H2) is connected and gets authorized without explicit vlan policy, H2 is expected to use the configured VLAN (V0) that is restored on the port. A ll egress traffic going out of two operational VLANs, VLAN (V0) and VLAN (V1) are untagged. If host (H2 ) is logged out or the session is removed due to some reason then the configured VLAN (V0) is removed from the port, and VLAN (V1) becomes the only operational VLAN on the port. Scenario three

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1481

Limitation in Multi-auth Per User VLAN assignment

Security

When a hub is connected to an access port in open mode, and the port is configured with an access VLAN (V0) .
The host (H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to V1. When a second host (H2) is connected and remains unauthorized, it still has access to operational VLAN (V1) due to open mode.
If host H1 is logged out or the session is removed due to some reason, VLAN (V1) is removed from the port and host (H2) gets assigned to VLAN (V0).

Note The combination of Open mode and VLAN assignment has an adverse affect on host (H2) because it has an IP address in the subnet that corresponds to VLAN (V1).
Limitation in Multi-auth Per User VLAN assignment
In the Multi-auth Per User VLAN assignment feature, egress traffic from multiple vlans are untagged on a port where the hosts receive traffic that is not meant for them. This can be a problem with broadcast and multicast traffic.
· IPv4 ARPs: Hosts receive ARP packets from other subnets. This is a problem if two subnets in different Virtual Routing and Forwarding (VRF) tables with overlapping IP address range are active on the port. The host ARP cache may get invalid entries.
· IPv6 control packets: In IPv6 deployments, Router Advertisements (RA) are processed by hosts that are not supposed to receive them. When a host from one VLAN receives RA from a different VLAN, the host assign incorrect IPv6 address to itself. Such a host is unable to get access to the network.
The workaround is to enable the IPv6 first hop security so that the broadcast ICMPv6 packets are converted to unicast and sent out from multi-auth enabled ports.. The packet is replicated for each client in multi-auth port belonging to the VLAN and the destination MAC is set to an individual client. Ports having one VLAN, ICMPv6 packets broadcast normally.
· IP multicast: Multicast traffic destined to a multicast group gets replicated for different VLANs if the hosts on those VLANs join the multicast group. When two hosts in different VLANs join a multicast group (on the same mutli-auth port), two copies of each multicast packet are sent out from that port.

MAC Move

When a MAC address is authenticated on one switch port, that address is not allowed on another authentication manager-enabled port of the switch. If the switch detects that same MAC address on another authentication manager-enabled port, the address is not allowed.
There are situations where a MAC address might need to move from one port to another on the same switch. For example, when there is another device (for example a hub or an IP phone) between an authenticated host and a switch port, you might want to disconnect the host from the device and connect it directly to another port on the same switch.
You can globally enable MAC move so the device is reauthenticated on the new port. When a host moves to a second port, the session on the first port is deleted, and the host is reauthenticated on the new port.
MAC move is supported on all host modes. (The authenticated host can move to any port on the switch, no matter which host mode is enabled on the that port.)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1482

Security

MAC Replace

When a MAC address moves from one port to another, the switch terminates the authenticated session on the original port and initiates a new authentication sequence on the new port. The MAC move feature applies to both voice and data hosts.
Note In open authentication mode, a MAC address is immediately moved from the original port to the new port, with no requirement for authorization on the new port.
MAC Replace
Beginning with Cisco IOS Release 12.2(55)SE, the MAC replace feature can be configured to address the violation that occurs when a host attempts to connect to a port where another host was previously authenticated.
Note This feature does not apply to ports in multi-auth mode, because violations are not triggered in that mode. It does not apply to ports in multiple host mode, because in that mode, only the first host requires authentication.
If you configure the authentication violation interface configuration command with the replace keyword, the authentication process on a port in multi-domain mode is:
· A new MAC address is received on a port with an existing authenticated MAC address. · The authentication manager replaces the MAC address of the current data host on the port with the new
MAC address. · The authentication manager initiates the authentication process for the new MAC address. · If the authentication manager determines that the new host is a voice host, the original voice host is
removed.
If a port is in open authentication mode, any new MAC address is immediately added to the MAC address table.
802.1x Accounting
The 802.1x standard defines how users are authorized and authenticated for network access but does not keep track of network usage. 802.1x accounting is disabled by default. You can enable 802.1x accounting to monitor this activity on 802.1x-enabled ports:
· User successfully authenticates. · User logs off. · Link-down occurs. · Re-authentication successfully occurs. · Re-authentication fails.
The switch does not log 802.1x accounting information. Instead, it sends this information to the RADIUS server, which must be configured to log accounting messages.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1483

802.1x Accounting Attribute-Value Pairs

Security

802.1x Accounting Attribute-Value Pairs
The information sent to the RADIUS server is represented in the form of Attribute-Value (AV) pairs. These AV pairs provide data for different applications. (For example, a billing application might require information that is in the Acct-Input-Octets or the Acct-Output-Octets attributes of a RADIUS packet.) AV pairs are automatically sent by a switch that is configured for 802.1x accounting. Three types of RADIUS accounting packets are sent by a switch:
· START­sent when a new user session starts
· INTERIM­sent during an existing session for updates
· STOP­sent when a session terminates

You can view the AV pairs that are being sent by the switch by entering the debug radius accounting privileged EXEC command. For more information about this command, see the Cisco IOS Debug Command Reference, Release 12.4.
This table lists the AV pairs and when they are sent are sent by the switch.
Table 133: Accounting AV Pairs

Attribute Number Attribute[1] Attribute[4] Attribute[5] Attribute[8] Attribute[25] Attribute[30] Attribute[31] Attribute[40] Attribute[41] Attribute[42] Attribute[43] Attribute[44] Attribute[45] Attribute[46] Attribute[49] Attribute[61]

AV Pair Name

START

User-Name

Always

NAS-IP-Address Always

NAS-Port

Always

Framed-IP-Address Never

Class

Always

Called-Station-ID Always

Calling-Station-ID Always

Acct-Status-Type Always

Acct-Delay-Time Always

Acct-Input-Octets Never

Acct-Output-Octets Never

Acct-Session-ID Always

Acct-Authentic Always

Acct-Session-Time Never

Acct-Terminate-Cause Never

NAS-Port-Type Always

INTERIM Always Always Always Sometimes20 Always Always Always Always Always Always Always Always Always Always Never Always

STOP Always Always Always Sometimes Always Always Always Always Always Always Always Always Always Always Always Always

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1484

Security

802.1x Readiness Check

20 The Framed-IP-Address AV pair is sent only if a valid Dynamic Host Control Protocol (DHCP) binding exists for the host in the DHCP snooping bindings table.
802.1x Readiness Check
The 802.1x readiness check monitors 802.1x activity on all the switch ports and displays information about the devices connected to the ports that support 802.1x. You can use this feature to determine if the devices connected to the switch ports are 802.1x-capable. You use an alternate authentication such as MAC authentication bypass or web authentication for the devices that do not support 802.1x functionality.
This feature only works if the supplicant on the client supports a query with the NOTIFY EAP notification packet. The client must respond within the 802.1x timeout value.
The 802.1x readiness check is allowed on all ports that can be configured for 802.1x. The readiness check is not available on a port that is configured as dot1x force-unauthorized.
Follow these guidelines to enable the readiness check on the switch:
· The readiness check is typically used before 802.1x is enabled on the switch.
· If you use the dot1x test eapol-capable privileged EXEC command without specifying an interface, all the ports on the switch stack are tested.
· When you configure the dot1x test eapol-capable command on an 802.1x-enabled port, and the link comes up, the port queries the connected client about its 802.1x capability. When the client responds with a notification packet, it is 802.1x-capable. A syslog message is generated if the client responds within the timeout period. If the client does not respond to the query, the client is not 802.1x-capable. No syslog message is generated.
· The readiness check can be sent on a port that handles multiple hosts (for example, a PC that is connected to an IP phone). A syslog message is generated for each of the clients that respond to the readiness check within the timer period.
Related Topics Configuring 802.1x Readiness Check, on page 1506
Switch-to-RADIUS-Server Communication
RADIUS security servers are identified by their hostname or IP address, hostname and specific UDP port numbers, or IP address and specific UDP port numbers. The combination of the IP address and UDP port number creates a unique identifier, which enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address. If two different host entries on the same RADIUS server are configured for the same service--for example, authentication--the second host entry configured acts as the fail-over backup to the first one. The RADIUS host entries are tried in the order that they were configured. Related Topics
Configuring the Switch-to-RADIUS-Server Communication, on page 1513
802.1x Authentication with VLAN Assignment
The switch supports 802.1x authentication with VLAN assignment. After successful 802.1x authentication of a port, the RADIUS server sends the VLAN assignment to configure the switch port. The RADIUS server

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1485

802.1x Authentication with VLAN Assignment

Security

database maintains the username-to-VLAN mappings, assigning the VLAN based on the username of the client connected to the switch port. You can use this feature to limit network access for certain users.
Voice device authentication is supported with multidomain host mode. When a voice device is authorized and the RADIUS server returned an authorized VLAN, the voice VLAN on the port is configured to send and receive packets on the assigned voice VLAN. Voice VLAN assignment behaves the same as data VLAN assignment on multidomain authentication (MDA)-enabled ports.
When configured on the switch and the RADIUS server, 802.1x authentication with VLAN assignment has these characteristics:
· If no VLAN is supplied by the RADIUS server or if 802.1x authentication is disabled, the port is configured in its access VLAN after successful authentication. Recall that an access VLAN is a VLAN assigned to an access port. All packets sent from or received on this port belong to this VLAN.
· If 802.1x authentication is enabled but the VLAN information from the RADIUS server is not valid, authorization fails and configured VLAN remains in use. This prevents ports from appearing unexpectedly in an inappropriate VLAN because of a configuration error.
Configuration errors could include specifying a VLAN for a routed port, a malformed VLAN ID, a nonexistent or internal (routed port) VLAN ID, an RSPAN VLAN, a shut down or suspended VLAN. In the case of a multidomain host port, configuration errors can also be due to an attempted assignment of a data VLAN that matches the configured or assigned voice VLAN ID (or the reverse).
· If 802.1x authentication is enabled and all information from the RADIUS server is valid, the authorized device is placed in the specified VLAN after authentication.
· If the multiple-hosts mode is enabled on an 802.1x port, all hosts are placed in the same VLAN (specified by the RADIUS server) as the first authenticated host.
· Enabling port security does not impact the RADIUS server-assigned VLAN behavior.
· If 802.1x authentication is disabled on the port, it is returned to the configured access VLAN and configured voice VLAN.
When the port is in the force authorized, force unauthorized, unauthorized, or shutdown state, it is put into the configured access VLAN.
If an 802.1x port is authenticated and put in the RADIUS server-assigned VLAN, any change to the port access VLAN configuration does not take effect. In the case of a multidomain host, the same applies to voice devices when the port is fully authorized with these exceptions:
· If the VLAN configuration change of one device results in matching the other device configured or assigned VLAN, authorization of all devices on the port is terminated and multidomain host mode is disabled until a valid configuration is restored where data and voice device configured VLANs no longer match.
· If a voice device is authorized and is using a downloaded voice VLAN, the removal of the voice VLAN configuration, or modifying the configuration value to dot1p or untagged results in voice device un-authorization and the disablement of multi-domain host mode.
The 802.1x authentication with VLAN assignment feature is not supported on trunk ports, dynamic ports, or with dynamic-access port assignment through a VLAN Membership Policy Server (VMPS).
To configure VLAN assignment you need to perform these tasks:
· Enable AAA authorization by using the network keyword to allow interface configuration from the RADIUS server.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1486

Security

802.1x Authentication with Per-User ACLs

· Enable 802.1x authentication. (The VLAN assignment feature is automatically enabled when you configure 802.1x authentication on an access port).
· Assign vendor-specific tunnel attributes in the RADIUS server. The RADIUS server must return these attributes to the switch:
· [64] Tunnel-Type = VLAN
· [65] Tunnel-Medium-Type = 802
· [81] Tunnel-Private-Group-ID = VLAN name or VLAN ID
Attribute [64] must contain the value VLAN (type 13). Attribute [65] must contain the value 802 (type 6). Attribute [81] specifies the VLAN name or VLAN ID assigned to the IEEE 802.1x-authenticated user.
802.1x Authentication with Per-User ACLs
You can enable per-user access control lists (ACLs) to provide different levels of network access and service to an 802.1x-authenticated user. When the RADIUS server authenticates a user connected to an 802.1x port, it retrieves the ACL attributes based on the user identity and sends them to the switch. The switch applies the attributes to the 802.1x port for the duration of the user session. The switch removes the per-user ACL configuration when the session is over, if authentication fails, or if a link-down condition occurs. The switch does not save RADIUS-specified ACLs in the running configuration. When the port is unauthorized, the switch removes the ACL from the port.
You can configure router ACLs and input port ACLs on the same switch. However, a port ACL takes precedence over a router ACL. If you apply input port ACL to an interface that belongs to a VLAN, the port ACL takes precedence over an input router ACL applied to the VLAN interface. Incoming packets received on the port to which a port ACL is applied are filtered by the port ACL. Incoming routed packets received on other ports are filtered by the router ACL. Outgoing routed packets are filtered by the router ACL. To avoid configuration conflicts, you should carefully plan the user profiles stored on the RADIUS server.
RADIUS supports per-user attributes, including vendor-specific attributes. These vendor-specific attributes (VSAs) are in octet-string format and are passed to the switch during the authentication process. The VSAs used for per-user ACLs are inacl#<n> for the ingress direction and outacl#<n> for the egress direction. MAC ACLs are supported only in the ingress direction. The switch supports VSAs only in the ingress direction. It does not support port ACLs in the egress direction on Layer 2 ports.
Use only the extended ACL syntax style to define the per-user configuration stored on the RADIUS server. When the definitions are passed from the RADIUS server, they are created by using the extended naming convention. However, if you use the Filter-Id attribute, it can point to a standard ACL.
You can use the Filter-Id attribute to specify an inbound or outbound ACL that is already configured on the switch. The attribute contains the ACL number followed by .in for ingress filtering or .out for egress filtering. If the RADIUS server does not allow the .in or .out syntax, the access list is applied to the outbound ACL by default. Because of limited support of Cisco IOS access lists on the switch, the Filter-Id attribute is supported only for IP ACLs numbered 1 to 199 and 1300 to 2699 (IP standard and IP extended ACLs).
Only one 802.1x-authenticated user is supported on a port. If the multiple-hosts mode is enabled on the port, the per-user ACL attribute is disabled for the associated port.
The maximum size of the per-user ACL is 4000 ASCII characters but is limited by the maximum size of RADIUS-server per-user ACLs.
To configure per-user ACLs:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1487

802.1x Authentication with Downloadable ACLs and Redirect URLs

Security

· Enable AAA authentication. · Enable AAA authorization by using the network keyword to allow interface configuration from the
RADIUS server. · Enable 802.1x authentication. · Configure the user profile and VSAs on the RADIUS server. · Configure the 802.1x port for single-host mode.
Note Per-user ACLs are supported only in single-host mode.
802.1x Authentication with Downloadable ACLs and Redirect URLs
You can download ACLs and redirect URLs from a RADIUS server to the switch during 802.1x authentication or MAC authentication bypass of the host. You can also download ACLs during web authentication.
Note A downloadable ACL is also referred to as a dACL. If more than one host is authenticated and the host is in single-host, MDA, or multiple-authentication mode, the switch changes the source address of the ACL to the host IP address. You can apply the ACLs and redirect URLs to all the devices connected to the 802.1x-enabled port. If no ACLs are downloaded during 802.1x authentication, the switch applies the static default ACL on the port to the host. On a voice VLAN port configured in multi-auth or MDA mode, the switch applies the ACL only to the phone as part of the authorization policies. Beginning with Cisco IOS Release 12.2(55)SE, if there is no static ACL on a port, a dynamic auth-default ACL is created, and policies are enforced before dACLs are downloaded and applied.
Note The auth-default-ACL does not appear in the running configuration. The auth-default ACL is created when at least one host with an authorization policy is detected on the port. The auth-default ACL is removed from the port when the last authenticated session ends. You can configure the auth-default ACL by using the ip access-list extended auth-default-acl global configuration command.
Note The auth-default-ACL does not support Cisco Discovery Protocol (CDP) bypass in the single host mode. You must configure a static ACL on the interface to support CDP bypass. The 802.1x and MAB authentication methods support two authentication modes, open and closed. If there is no static ACL on a port in closed authentication mode: · An auth-default-ACL is created.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1488

Security

Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL

· The auth-default-ACL allows only DHCP traffic until policies are enforced. · When the first host authenticates, the authorization policy is applied without IP address insertion. · When a second host is detected, the policies for the first host are refreshed, and policies for the first and
subsequent sessions are enforced with IP address insertion.
If there is no static ACL on a port in open authentication mode: · An auth-default-ACL-OPEN is created and allows all traffic. · Policies are enforced with IP address insertion to prevent security breaches. · Web authentication is subject to the auth-default-ACL-OPEN.
To control access for hosts with no authorization policy, you can configure a directive. The supported values for the directive are open and default. When you configure the open directive, all traffic is allowed. The default directive subjects traffic to the access provided by the port. You can configure the directive either in the user profile on the AAA server or on the switch. To configure the directive on the AAA server, use the authz-directive =<open/default> global command. To configure the directive on the switch, use the epm access-control open global configuration command.
Note The default value of the directive is default.
If a host falls back to web authentication on a port without a configured ACL: · If the port is in open authentication mode, the auth-default-ACL-OPEN is created. · If the port is in closed authentication mode, the auth-default-ACL is created.
The access control entries (ACEs) in the fallback ACL are converted to per-user entries. If the configured fallback profile does not include a fallback ACL, the host is subject to the auth-default-ACL associated with the port.
Note If you use a custom logo with web authentication and it is stored on an external server, the port ACL must allow access to the external server before authentication. You must either configure a static port ACL or change the auth-default-ACL to provide appropriate access to the external server.
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL
The switch uses these cisco-av-pair VSAs: · url-redirect is the HTTP or HTTPS URL. · url-redirect-acl is the switch ACL name or number.
The switch uses the CiscoSecure-defined-ACL attribute value pair to intercept an HTTP or HTTPS request from the end point. The switch then forwards the client web browser to the specified redirect address. The url-redirect AV pair on the Cisco Secure ACS contains the URL to which the web browser is redirected. The url-redirect-acl attribute value pair contains the name or number of an ACL that specifies the HTTP or HTTPS traffic to redirect.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1489

Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs

Security

Note

· Traffic that matches a permit ACE in the ACL is redirected.

· Define the URL redirect ACL and the default port ACL on the switch.

If a redirect URL is configured for a client on the authentication server, a default port ACL on the connected client switch port must also be configured
Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs
You can set the CiscoSecure-Defined-ACL Attribute-Value (AV) pair on the Cisco Secure ACS with the RADIUS cisco-av-pair vendor-specific attributes (VSAs). This pair specifies the names of the downloadable ACLs on the Cisco Secure ACS with the #ACL#-IP-name-number attribute.
· The name is the ACL name.
· The number is the version number (for example, 3f783768).
If a downloadable ACL is configured for a client on the authentication server, a default port ACL on the connected client switch port must also be configured.
If the default ACL is configured on the switch and the Cisco Secure ACS sends a host-access-policy to the switch, it applies the policy to traffic from the host connected to a switch port. If the policy does not apply, the switch applies the default ACL. If the Cisco Secure ACS sends the switch a downloadable ACL, this ACL takes precedence over the default ACL that is configured on the switch port. However, if the switch receives an host access policy from the Cisco Secure ACS but the default ACL is not configured, the authorization failure is declared.

VLAN ID-based MAC Authentication
You can use VLAN ID-based MAC authentication if you wish to authenticate hosts based on a static VLAN ID instead of a downloadable VLAN. When you have a static VLAN policy configured on your switch, VLAN information is sent to an IAS (Microsoft) RADIUS server along with the MAC address of each host for authentication. The VLAN ID configured on the connected port is used for MAC authentication. By using VLAN ID-based MAC authentication with an IAS server, you can have a fixed number of VLANs in the network.
The feature also limits the number of VLANs monitored and handled by STP. The network can be managed as a fixed VLAN.

Note This feature is not supported on Cisco ACS Server. (The ACS server ignores the sent VLAN-IDs for new hosts and only authenticates based on the MAC address.)
802.1x Authentication with Guest VLAN
You can configure a guest VLAN for each 802.1x port on the switch to provide limited services to clients, such as downloading the 802.1x client. These clients might be upgrading their system for 802.1x authentication, and some hosts, such as Windows 98 systems, might not be IEEE 802.1x-capable.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1490

Security

802.1x Authentication with Restricted VLAN

When you enable a guest VLAN on an 802.1x port, the switch assigns clients to a guest VLAN when the switch does not receive a response to its EAP request/identity frame or when EAPOL packets are not sent by the client.
The switch maintains the EAPOL packet history. If an EAPOL packet is detected on the interface during the lifetime of the link, the switch determines that the device connected to that interface is an IEEE 802.1x-capable supplicant, and the interface does not change to the guest VLAN state. EAPOL history is cleared if the interface link status goes down. If no EAPOL packet is detected on the interface, the interface changes to the guest VLAN state.
If the switch is trying to authorize an 802.1x-capable voice device and the AAA server is unavailable, the authorization attempt fails, but the detection of the EAPOL packet is saved in the EAPOL history. When the AAA server becomes available, the switch authorizes the voice device. However, the switch no longer allows other devices access to the guest VLAN. To prevent this situation, use one of these command sequences:
· Enter the authentication event no-response action authorize vlan vlan-id interface configuration command to allow access to the guest VLAN.
· Enter the shutdown interface configuration command followed by the no shutdown interface configuration command to restart the port.
Use a restricted VLAN to allow clients that failed authentication access to the network by entering the dot1x auth-fail vlan vlan-id interface configuration command.
If devices send EAPOL packets to the switch during the lifetime of the link, the switch no longer allows clients that fail authentication access to the guest VLAN.
Note If an EAPOL packet is detected after the interface has changed to the guest VLAN, the interface reverts to an unauthorized state, and 802.1x authentication restarts.
When the switch port is moved to the guest VLAN, the number of allowed 802.1x-incapable hosts is determined by the configured host-mode. If an 802.1x-capable client joins the same port on which the guest VLAN is configured, the port is put into the unauthorized state in the user-configured access VLAN, and authentication is restarted.
Guest VLANs are supported on 802.1x ports in single host, multiple host, multi-auth and multi-domain modes.
You can configure any active VLAN except an RSPAN VLAN, a private VLAN, or a voice VLAN as an 802.1x guest VLAN. The guest VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported only on access ports.
The switch supports MAC authentication bypass. When MAC authentication bypass is enabled on an 802.1x port, the switch can authorize clients based on the client MAC address when IEEE 802.1x authentication times out while waiting for an EAPOL message exchange. After detecting a client on an 802.1x port, the switch waits for an Ethernet packet from the client. The switch sends the authentication server a RADIUS-access/request frame with a username and password based on the MAC address. If authorization succeeds, the switch grants the client access to the network. If authorization fails, the switch assigns the port to the guest VLAN if one is specified.
802.1x Authentication with Restricted VLAN
You can configure a restricted VLAN (also referred to as an authentication failed VLAN) for each IEEE 802.1x port on a switch stack or a switch to provide limited services to clients that cannot access the guest VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1491

802.1x Authentication with Inaccessible Authentication Bypass

Security

These clients are 802.1x-compliant and cannot access another VLAN because they fail the authentication process. A restricted VLAN allows users without valid credentials in an authentication server (typically, visitors to an enterprise) to access a limited set of services. The administrator can control the services available to the restricted VLAN.
Note You can configure a VLAN to be both the guest VLAN and the restricted VLAN if you want to provide the same services to both types of users.
Without this feature, the client attempts and fails authentication indefinitely, and the switch port remains in the spanning-tree blocking state. With this feature, you can configure the switch port to be in the restricted VLAN after a specified number of authentication attempts (the default value is 3 attempts).
The authenticator counts the failed authentication attempts for the client. When this count exceeds the configured maximum number of authentication attempts, the port moves to the restricted VLAN. The failed attempt count increments when the RADIUS server replies with either an EAP failure or an empty response without an EAP packet. When the port moves into the restricted VLAN, the failed attempt counter resets.
Users who fail authentication remain in the restricted VLAN until the next re-authentication attempt. A port in the restricted VLAN tries to re-authenticate at configured intervals (the default is 60 seconds). If re-authentication fails, the port remains in the restricted VLAN. If re-authentication is successful, the port moves either to the configured VLAN or to a VLAN sent by the RADIUS server. You can disable re-authentication. If you do this, the only way to restart the authentication process is for the port to receive a link down or EAP logoff event. We recommend that you keep re-authentication enabled if a client might connect through a hub. When a client disconnects from the hub, the port might not receive the link down or EAP logoff event.
After a port moves to the restricted VLAN, a simulated EAP success message is sent to the client. This prevents clients from indefinitely attempting authentication. Some clients (for example, devices running Windows XP) cannot implement DHCP without EAP success.
Restricted VLANs are supported on 802.1x ports in all host modes and on Layer 2 ports.
You can configure any active VLAN except an RSPAN VLAN, a primary private VLAN, or a voice VLAN as an 802.1x restricted VLAN. The restricted VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported only on access ports.
Other security port features such as dynamic ARP Inspection, DHCP snooping, and IP source guard can be configured independently on a restricted VLAN.
802.1x Authentication with Inaccessible Authentication Bypass
Use the inaccessible authentication bypass feature, also referred to as critical authentication or the AAA fail policy, when the switch cannot reach the configured RADIUS servers and new hosts cannot be authenticated. You can configure the switch to connect those hosts to critical ports.
When a new host tries to connect to the critical port, that host is moved to a user-specified access VLAN, the critical VLAN. The administrator gives limited authentication to the hosts.
When the switch tries to authenticate a host connected to a critical port, the switch checks the status of the configured RADIUS server. If a server is available, the switch can authenticate the host. However, if all the RADIUS servers are unavailable, the switch grants network access to the host and puts the port in the critical-authentication state, which is a special case of the authentication state.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1492

Security

Inaccessible Authentication Bypass Support on Multiple-Authentication Ports

Inaccessible Authentication Bypass Support on Multiple-Authentication Ports
When a port is configured on any host mode and the AAA server is unavailable, the port is then configured to multi-host mode and moved to the critical VLAN. To support this inaccessible bypass on multiple-authentication (multiauth) ports, use the authentication event server dead action reinitialize vlan vlan-id command. When a new host tries to connect to the critical port, that port is reinitialized and all the connected hosts are moved to the user-specified access VLAN.
This command is supported on all host modes.
Inaccessible Authentication Bypass Authentication Results
The behavior of the inaccessible authentication bypass feature depends on the authorization state of the port:
· If the port is unauthorized when a host connected to a critical port tries to authenticate and all servers are unavailable, the switch puts the port in the critical-authentication state in the RADIUS-configured or user-specified access VLAN.
· If the port is already authorized and reauthentication occurs, the switch puts the critical port in the critical-authentication state in the current VLAN, which might be the one previously assigned by the RADIUS server.
· If the RADIUS server becomes unavailable during an authentication exchange, the current exchange times out, and the switch puts the critical port in the critical-authentication state during the next authentication attempt.
You can configure the critical port to reinitialize hosts and move them out of the critical VLAN when the RADIUS server is again available. When this is configured, all critical ports in the critical-authentication state are automatically re-authenticated.
Inaccessible Authentication Bypass Feature Interactions
Inaccessible authentication bypass interacts with these features:
· Guest VLAN--Inaccessible authentication bypass is compatible with guest VLAN. When a guest VLAN is enabled on 8021.x port, the features interact as follows:
· If at least one RADIUS server is available, the switch assigns a client to a guest VLAN when the switch does not receive a response to its EAP request/identity frame or when EAPOL packets are not sent by the client.
· If all the RADIUS servers are not available and the client is connected to a critical port, the switch authenticates the client and puts the critical port in the critical-authentication state in the RADIUS-configured or user-specified access VLAN.
· If all the RADIUS servers are not available and the client is not connected to a critical port, the switch might not assign clients to the guest VLAN if one is configured.
· If all the RADIUS servers are not available and if a client is connected to a critical port and was previously assigned to a guest VLAN, the switch keeps the port in the guest VLAN.
· Restricted VLAN--If the port is already authorized in a restricted VLAN and the RADIUS servers are unavailable, the switch puts the critical port in the critical-authentication state in the restricted VLAN.
· 802.1x accounting--Accounting is not affected if the RADIUS servers are unavailable.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1493

802.1x Critical Voice VLAN

Security

· Private VLAN--You can configure inaccessible authentication bypass on a private VLAN host port. The access VLAN must be a secondary private VLAN.
· Voice VLAN--Inaccessible authentication bypass is compatible with voice VLAN, but the RADIUS-configured or user-specified access VLAN and the voice VLAN must be different.
· Remote Switched Port Analyzer (RSPAN)--Do not configure an RSPAN VLAN as the RADIUS-configured or user-specified access VLAN for inaccessible authentication bypass.
In a switch stack, the stack master checks the status of the RADIUS servers by sending keepalive packets. When the status of a RADIUS server changes, the stack master sends the information to the stack members. The stack members can then check the status of RADIUS servers when re-authenticating critical ports.
If the new stack master is elected, the link between the switch stack and RADIUS server might change, and the new stack immediately sends keepalive packets to update the status of the RADIUS servers. If the server status changes from dead to alive, the switch re-authenticates all switch ports in the critical-authentication state.
When a member is added to the stack, the stack master sends the member the server status.
802.1x Critical Voice VLAN
When an IP phone connected to a port is authenticated by the access control server (ACS), the phone is put into the voice domain. If the ACS is not reachable, the switch cannot determine if the device is a voice device. If the server is unavailable, the phone cannot access the voice network and therefore cannot operate.
For data traffic, you can configure inaccessible authentication bypass, or critical authentication, to allow traffic to pass through on the native VLAN when the server is not available. If the RADIUS authentication server is unavailable (down) and inaccessible authentication bypass is enabled, the switch grants the client access to the network and puts the port in the critical-authentication state in the RADIUS-configured or the user-specified access VLAN. When the switch cannot reach the configured RADIUS servers and new hosts cannot be authenticated, the switch connects those hosts to critical ports. A new host trying to connect to the critical port is moved to a user-specified access VLAN, the critical VLAN, and granted limited authentication.
You can enter the authentication event server dead action authorize voice interface configuration command to configure the critical voice VLAN feature. When the ACS does not respond, the port goes into critical authentication mode. When traffic coming from the host is tagged with the voice VLAN, the connected device (the phone) is put in the configured voice VLAN for the port. The IP phones learn the voice VLAN identification through CDP (Cisco devices) or through LLDP or DHCP.
You can configure the voice VLAN for a port by entering the switchport voice vlan vlan-id interface configuration command.
This feature is supported in multidomain and multi-auth host modes. Although you can enter the command when the switch in single-host or multi-host mode, the command has no effect unless the device changes to multidomain or multi-auth host mode.
802.1x User Distribution
You can configure 802.1x user distribution to load-balance users with the same group name across multiple different VLANs.
The VLANs are either supplied by the RADIUS server or configured through the switch CLI under a VLAN group name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1494

Security

802.1x User Distribution Configuration Guidelines

· Configure the RADIUS server to send more than one VLAN name for a user. The multiple VLAN names can be sent as part of the response to the user. The 802.1x user distribution tracks all the users in a particular VLAN and achieves load balancing by moving the authorized user to the least populated VLAN.
· Configure the RADIUS server to send a VLAN group name for a user. The VLAN group name can be sent as part of the response to the user. You can search for the selected VLAN group name among the VLAN group names that you configured by using the switch CLI. If the VLAN group name is found, the corresponding VLANs under this VLAN group name are searched to find the least populated VLAN. Load balancing is achieved by moving the corresponding authorized user to that VLAN.
Note The RADIUS server can send the VLAN information in any combination of VLAN-IDs, VLAN names, or VLAN groups.
802.1x User Distribution Configuration Guidelines
· Confirm that at least one VLAN is mapped to the VLAN group. · You can map more than one VLAN to a VLAN group. · You can modify the VLAN group by adding or deleting a VLAN. · When you clear an existing VLAN from the VLAN group name, none of the authenticated ports in the
VLAN are cleared, but the mappings are removed from the existing VLAN group. · If you clear the last VLAN from the VLAN group name, the VLAN group is cleared. · You can clear a VLAN group even when the active VLANs are mapped to the group. When you clear a
VLAN group, none of the ports or users that are in the authenticated state in any VLAN within the group are cleared, but the VLAN mappings to the VLAN group are cleared.
IEEE 802.1x Authentication with Voice VLAN Ports
A voice VLAN port is a special access port associated with two VLAN identifiers: · VVID to carry voice traffic to and from the IP phone. The VVID is used to configure the IP phone connected to the port. · PVID to carry the data traffic to and from the workstation connected to the switch through the IP phone. The PVID is the native VLAN of the port.
The IP phone uses the VVID for its voice traffic, regardless of the authorization state of the port. This allows the phone to work independently of IEEE 802.1x authentication. In single-host mode, only the IP phone is allowed on the voice VLAN. In multiple-hosts mode, additional clients can send traffic on the voice VLAN after a supplicant is authenticated on the PVID. When multiple-hosts mode is enabled, the supplicant authentication affects both the PVID and the VVID.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1495

IEEE 802.1x Authentication with Port Security

Security

Note If an IP phone and PC are connected to a switchport, and the port is configured in single- or multi-host mode, we do not recommend configuring that port in standalone MAC authentication bypass mode. We recommend only using MAC authentication bypass as a fallback method to 802.1x authentication with the timeout period set to the default of five seconds.
A voice VLAN port becomes active when there is a link, and the device MAC address appears after the first CDP message from the IP phone. Cisco IP phones do not relay CDP messages from other devices. As a result, if several IP phones are connected in series, the switch recognizes only the one directly connected to it. When IEEE 802.1x authentication is enabled on a voice VLAN port, the switch drops packets from unrecognized IP phones more than one hop away. When IEEE 802.1x authentication is enabled on a switch port, you can configure an access port VLAN that is also a voice VLAN.
Note If you enable IEEE 802.1x authentication on an access port on which a voice VLAN is configured and to which a Cisco IP Phone is connected, the Cisco IP phone loses connectivity to the switch for up to 30 seconds.
IEEE 802.1x Authentication with Port Security
In general, Cisco does not recommend enabling port security when IEEE 802.1x is enabled. Since IEEE 802.1x enforces a single MAC address per port (or per VLAN when MDA is configured for IP telephony), port security is redundant and in some cases may interfere with expected IEEE 802.1x operations.
IEEE 802.1x Authentication with Wake-on-LAN
The IEEE 802.1x authentication with wake-on-LAN (WoL) feature allows dormant PCs to be powered when the switch receives a specific Ethernet frame, known as the magic packet. You can use this feature in environments where administrators need to connect to systems that have been powered down. When a host that uses WoL is attached through an IEEE 802.1x port and the host powers off, the IEEE 802.1x port becomes unauthorized. The port can only receive and send EAPOL packets, and WoL magic packets cannot reach the host. When the PC is powered off, it is not authorized, and the switch port is not opened. When the switch uses IEEE 802.1x authentication with WoL, the switch forwards traffic to unauthorized IEEE 802.1x ports, including magic packets. While the port is unauthorized, the switch continues to block ingress traffic other than EAPOL packets. The host can receive packets but cannot send packets to other devices in the network.
Note If PortFast is not enabled on the port, the port is forced to the bidirectional state.
When you configure a port as unidirectional by using the authentication control-direction in interface configuration command, the port changes to the spanning-tree forwarding state. The port can send packets to the host but cannot receive packets from the host.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1496

Security

IEEE 802.1x Authentication with MAC Authentication Bypass

When you configure a port as bidirectional by using the authentication control-direction both interface configuration command, the port is access-controlled in both directions. The port does not receive packets from or send packets to the host.
IEEE 802.1x Authentication with MAC Authentication Bypass
You can configure the switch to authorize clients based on the client MAC address by using the MAC authentication bypass feature. For example, you can enable this feature on IEEE 802.1x ports connected to devices such as printers.
If IEEE 802.1x authentication times out while waiting for an EAPOL response from the client, the switch tries to authorize the client by using MAC authentication bypass.
When the MAC authentication bypass feature is enabled on an IEEE 802.1x port, the switch uses the MAC address as the client identity. The authentication server has a database of client MAC addresses that are allowed network access. After detecting a client on an IEEE 802.1x port, the switch waits for an Ethernet packet from the client. The switch sends the authentication server a RADIUS-access/request frame with a username and password based on the MAC address. If authorization succeeds, the switch grants the client access to the network. If authorization fails, the switch assigns the port to the guest VLAN if one is configured.
If the switch already authorized a port by using MAC authentication bypass and detects an IEEE 802.1x supplicant, the switch does not unauthorize the client connected to the port. When re-authentication occurs, the switch uses the authentication or re-authentication methods configured on the port, if the previous session ended because the Termination-Action RADIUS attribute value is DEFAULT.
Clients that were authorized with MAC authentication bypass can be re-authenticated. The re-authentication process is the same as that for clients that were authenticated with IEEE 802.1x. During re-authentication, the port remains in the previously assigned VLAN. If re-authentication is successful, the switch keeps the port in the same VLAN. If re-authentication fails, the switch assigns the port to the guest VLAN, if one is configured.
If re-authentication is based on the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS attribute (Attribute [29]) and if the Termination-Action RADIUS attribute (Attribute [29]) action is Initialize (the attribute value is DEFAULT), the MAC authentication bypass session ends, and connectivity is lost during re-authentication. If MAC authentication bypass is enabled and the IEEE 802.1x authentication times out, the switch uses the MAC authentication bypass feature to initiate re-authorization. For more information about these AV pairs, see RFC 3580, "IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines."
MAC authentication bypass interacts with the features:
· IEEE 802.1x authentication--MAC authentication bypass and IEEE 802.1x authentication are configured independently on the port.
· Guest VLAN--If a client has an invalid MAC address identity, the switch assigns the client to a guest VLAN if one is configured.
· Restricted VLAN--This feature is not supported when the client connected to an IEEE 802.lx port is authenticated with MAC authentication bypass.
· Port security
· Voice VLAN
· VLAN Membership Policy Server (VMPS)--IEEE802.1x and VMPS are mutually exclusive.
· Private VLAN--You can assign a client to a private VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1497

Network Admission Control Layer 2 IEEE 802.1x Validation

Security

· Network admission control (NAC) Layer 2 IP validation--This feature takes effect after an IEEE 802.1x port is authenticated with MAC authentication bypass, including hosts in the exception list.
· Network Edge Access Topology (NEAT)--MAB and NEAT are mutually exclusive. You cannot enable MAB when NEAT is enabled on an interface, and you cannot enable NEAT when MAB is enabled on an interface.
Network Admission Control Layer 2 IEEE 802.1x Validation
The switch supports the Network Admission Control (NAC) Layer 2 IEEE 802.1x validation, which checks the antivirus condition or posture of endpoint systems or clients before granting the devices network access. With NAC Layer 2 IEEE 802.1x validation, you can do these tasks:
· Download the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS attribute (Attribute[29]) from the authentication server.
· Set the number of seconds between re-authentication attempts as the value of the Session-Timeout RADIUS attribute (Attribute[27]) and get an access policy against the client from the RADIUS server.
· Set the action to be taken when the switch tries to re-authenticate the client by using the Termination-Action RADIUS attribute (Attribute[29]). If the value is the DEFAULT or is not set, the session ends. If the value is RADIUS-Request, the re-authentication process starts.
· View the NAC posture token, which shows the posture of the client, by using the show authentication privileged EXEC command.
· Configure secondary private VLANs as guest VLANs.
Configuring NAC Layer 2 IEEE 802.1x validation is similar to configuring IEEE 802.1x port-based authentication except that you must configure a posture token on the RADIUS server.
Flexible Authentication Ordering
You can use flexible authentication ordering to configure the order of methods that a port uses to authenticate a new host. MAC authentication bypass and 802.1x can be the primary or secondary authentication methods, and web authentication can be the fallback method if either or both of those authentication attempts fail. Related Topics
Configuring Flexible Authentication Ordering, on page 1550
Open1x Authentication
Open1x authentication allows a device access to a port before that device is authenticated. When open authentication is configured, a new host can pass traffic according to the access control list (ACL) defined on the port. After the host is authenticated, the policies configured on the RADIUS server are applied to that host. You can configure open authentication with these scenarios:
· Single-host mode with open authentication­Only one user is allowed network access before and after authentication.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1498

Security

Multidomain Authentication

· MDA mode with open authentication­Only one user in the voice domain and one user in the data domain are allowed.
· Multiple-hosts mode with open authentication­Any host can access the network. · Multiple-authentication mode with open authentication­Similar to MDA, except multiple hosts can be
authenticated.
Note If open authentication is configured, it takes precedence over other authentication controls. This means that if you use the authentication open interface configuration command, the port will grant access to the host irrespective of the authentication port-control interface configuration command. In Session Aware Networking mode, to enable open authentication, use no access-session closed. To disable open authentication, use access-session closed.
Related Topics Configuring Open1x, on page 1551
Multidomain Authentication
The switch supports multidomain authentication (MDA), which allows both a data device and voice device, such as an IP phone (Cisco or non-Cisco), to authenticate on the same switch port. The port is divided into a data domain and a voice domain. MDA does not enforce the order of device authentication. However, for best results, we recommend that a voice device is authenticated before a data device on an MDA-enabled port. Follow these guidelines for configuring MDA:
· You must configure a switch port for MDA. · You must configure the voice VLAN for the IP phone when the host mode is set to multidomain. · Voice VLAN assignment on an MDA-enabled port is supported.
Note You can assign a dynamic VLAN to a voice device on an MDA-enabled switch port, but the voice device fails authorization if a static voice VLAN configured on the switchport is the same as the dynamic VLAN assigned for the voice device in the RADIUS server.
· To authorize a voice device, the AAA server must be configured to send a Cisco Attribute-Value (AV) pair attribute with a value of device-traffic-class=voice. Without this value, the switch treats the voice device as a data device.
· The guest VLAN and restricted VLAN features only apply to the data devices on an MDA-enabled port. The switch treats a voice device that fails authorization as a data device.
· If more than one device attempts authorization on either the voice or the data domain of a port, it is error disabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1499

802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT)

Security

· Until a device is authorized, the port drops its traffic. Non-Cisco IP phones or voice devices are allowed into both the data and voice VLANs. The data VLAN allows the voice device to contact a DHCP server to obtain an IP address and acquire the voice VLAN information. After the voice device starts sending on the voice VLAN, its access to the data VLAN is blocked.
· A voice device MAC address that is binding on the data VLAN is not counted towards the port security MAC address limit.
· You can use dynamic VLAN assignment from a RADIUS server only for data devices.
· MDA can use MAC authentication bypass as a fallback mechanism to allow the switch port to connect to devices that do not support IEEE 802.1x authentication.
· When a data or a voice device is detected on a port, its MAC address is blocked until authorization succeeds. If the authorization fails, the MAC address remains blocked for 5 minutes.
· If more than five devices are detected on the data VLAN or more than one voice device is detected on the voice VLAN while a port is unauthorized, the port is error disabled.
· When a port host mode is changed from single- or multihost to multidomain mode, an authorized data device remains authorized on the port. However, a Cisco IP phone that has been allowed on the port voice VLAN is automatically removed and must be reauthenticated on that port.
· Active fallback mechanisms such as guest VLAN and restricted VLAN remain configured after a port changes from single- or multihost mode to multidomain mode.
· Switching a port host mode from multidomain to single- or multihost mode removes all authorized devices from the port.
· If a data domain is authorized first and placed in the guest VLAN, non-IEEE 802.1x-capable voice devices need to tag their packets on the voice VLAN to trigger authentication.
· We do not recommend per-user ACLs with an MDA-enabled port. An authorized device with a per-user ACL policy might impact traffic on both the voice and data VLANs of the port. If used, only one device on the port should enforce per-user ACLs.
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT)
The Network Edge Access Topology (NEAT) feature extends identity to areas outside the wiring closet (such as conference rooms). This allows any type of device to authenticate on the port.
· 802.1x switch supplicant: You can configure a switch to act as a supplicant to another switch by using the 802.1x supplicant feature. This configuration is helpful in a scenario, where, for example, a switch is outside a wiring closet and is connected to an upstream switch through a trunk port. A switch configured with the 802.1x switch supplicant feature authenticates with the upstream switch for secure connectivity. Once the supplicant switch authenticates successfully the port mode changes from access to trunk.
· If the access VLAN is configured on the authenticator switch, it becomes the native VLAN for the trunk port after successful authentication.
You can enable MDA or multiauth mode on the authenticator switch interface that connects to one more supplicant switches. Multihost mode is not supported on the authenticator switch interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1500

Security

Voice Aware 802.1x Security
Use the dot1x supplicant force-multicast global configuration command on the supplicant switch for Network Edge Access Topology (NEAT) to work in all host modes.
· Host Authorization: Ensures that only traffic from authorized hosts (connecting to the switch with supplicant) is allowed on the network. The switches use Client Information Signalling Protocol (CISP) to send the MAC addresses connecting to the supplicant switch to the authenticator switch.
· Auto enablement: Automatically enables trunk configuration on the authenticator switch, allowing user traffic from multiple VLANs coming from supplicant switches. Configure the cisco-av-pair as device-traffic-class=switch at the ACS. (You can configure this under the group or the user settings.)
Figure 90: Authenticator and Supplicant Switch using CISP

1

Workstations (clients) 2

Supplicant switch (outside

wiring closet)

3

Authenticator switch 4

Access control server

(ACS)

5

Trunk port

Voice Aware 802.1x Security
You use the voice aware 802.1x security feature to configure the switch to disable only the VLAN on which a security violation occurs, whether it is a data or voice VLAN. In previous releases, when an attempt to authenticate the data client caused a security violation, the entire port shut down, resulting in a complete loss of connectivity.
You can use this feature in IP phone deployments where a PC is connected to the IP phone. A security violation found on the data VLAN results in the shutdown of only the data VLAN. The traffic on the voice VLAN flows through the switch without interruption.
Related Topics Configuring Voice Aware 802.1x Security, on page 1507
Common Session ID
Authentication manager uses a single session ID (referred to as a common session ID) for a client no matter which authentication method is used. This ID is used for all reporting purposes, such as the show commands and MIBs. The session ID appears with all per-session syslog messages.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1501

How to Configure 802.1x Port-Based Authentication

Security

The session ID includes: · The IP address of the Network Access Device (NAD) · A monotonically increasing unique 32 bit integer · The session start time stamp (a 32 bit integer)
This example shows how the session ID appears in the output of the show authentication command. The session ID in this example is 160000050000000B288508E5:

Switch# show authentication sessions

Interface MAC Address

Method Domain

Fa4/0/4 0000.0000.0203 mab

DATA

Status

Session ID

Authz Success 160000050000000B288508E5

This is an example of how the session ID appears in the syslog output. The session ID in this example is also160000050000000B288508E5:

1w0d: %AUTHMGR-5-START: Starting 'mab' for client (0000.0000.0203) on Interface Fa4/0/4 AuditSessionID 160000050000000B288508E5 1w0d: %MAB-5-SUCCESS: Authentication successful for client (0000.0000.0203) on Interface Fa4/0/4 AuditSessionID 160000050000000B288508E5 1w0d: %AUTHMGR-7-RESULT: Authentication result 'success' from 'mab' for client (0000.0000.0203) on Interface Fa4/0/4 AuditSessionID 160000050000000B288508E5

The session ID is used by the NAD, the AAA server, and other report-analyzing applications to identify the client. The ID appears automatically. No configuration is required.

How to Configure 802.1x Port-Based Authentication

Default 802.1x Authentication Configuration

Table 134: Default 802.1x Authentication Configuration

Feature Switch 802.1x enable state Per-port 802.1x enable state
AAA RADIUS server
· IP address · UDP authentication port · Key

Default Setting Disabled. Disabled (force-authorized). The port sends and receives normal traffic without 802.1x-based authentication of the client. Disabled.
· None specified. · 1812. · None specified.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1502

Security

Default 802.1x Authentication Configuration

Feature

Default Setting

Host mode

Single-host mode.

Control direction

Bidirectional control.

Periodic re-authentication

Disabled.

Number of seconds between re-authentication attempts 3600 seconds.

Re-authentication number

2 times (number of times that the switch restarts the authentication process before the port changes to the unauthorized state).

Quiet period

60 seconds (number of seconds that the switch remains in the quiet state following a failed authentication exchange with the client).

Retransmission time

30 seconds (number of seconds that the switch should wait for a response to an EAP request/identity frame from the client before resending the request).

Maximum retransmission number

2 times (number of times that the switch will send an EAP-request/identity frame before restarting the authentication process).

Client timeout period

30 seconds (when relaying a request from the authentication server to the client, the amount of time the switch waits for a response before resending the request to the client.)

Authentication server timeout period

30 seconds (when relaying a response from the client to the authentication server, the amount of time the switch waits for a reply before resending the response to the server.)
You can change this timeout period by using the dot1x timeout server-timeout interface configuration command.

Guest VLAN

None specified.

Inaccessible authentication bypass

Disabled.

Restricted VLAN

None specified.

Authenticator (switch) mode

None specified.

MAC authentication bypass

Disabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1503

802.1x Authentication Configuration Guidelines

Security

802.1x Authentication Configuration Guidelines
802.1x Authentication
These are the 802.1x authentication configuration guidelines:
· When 802.1x authentication is enabled, ports are authenticated before any other Layer 2 or Layer 3 features are enabled.
· If the VLAN to which an 802.1x-enabled port is assigned changes, this change is transparent and does not affect the switch. For example, this change occurs if a port is assigned to a RADIUS server-assigned VLAN and is then assigned to a different VLAN after re-authentication.
If the VLAN to which an 802.1x port is assigned to shut down, disabled, or removed, the port becomes unauthorized. For example, the port is unauthorized after the access VLAN to which a port is assigned shuts down or is removed.
· The 802.1x protocol is supported on Layer 2 static-access ports, voice VLAN ports, and Layer 3 routed ports, but it is not supported on these port types:
· Trunk port--If you try to enable 802.1x authentication on a trunk port, an error message appears, and 802.1x authentication is not enabled. If you try to change the mode of an 802.1x-enabled port to trunk, an error message appears, and the port mode is not changed.
· Dynamic ports--A port in dynamic mode can negotiate with its neighbor to become a trunk port. If you try to enable 802.1x authentication on a dynamic port, an error message appears, and 802.1x authentication is not enabled. If you try to change the mode of an 802.1x-enabled port to dynamic, an error message appears, and the port mode is not changed.
· Dynamic-access ports--If you try to enable 802.1x authentication on a dynamic-access (VLAN Query Protocol [VQP]) port, an error message appears, and 802.1x authentication is not enabled. If you try to change an 802.1x-enabled port to dynamic VLAN assignment, an error message appears, and the VLAN configuration is not changed.
· EtherChannel port--Do not configure a port that is an active or a not-yet-active member of an EtherChannel as an 802.1x port. If you try to enable 802.1x authentication on an EtherChannel port, an error message appears, and 802.1x authentication is not enabled.
· Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) destination ports--You can enable 802.1x authentication on a port that is a SPAN or RSPAN destination port. However, 802.1x authentication is disabled until the port is removed as a SPAN or RSPAN destination port. You can enable 802.1x authentication on a SPAN or RSPAN source port.
· Before globally enabling 802.1x authentication on a switch by entering the dot1x system-auth-control global configuration command, remove the EtherChannel configuration from the interfaces on which 802.1x authentication and EtherChannel are configured.
· If you are using a device running the Cisco Access Control Server (ACS) application for IEEE 802.1x authentication with EAP-Transparent LAN Services (TLS) and EAP-MD5, make sure that the device is running ACS Version 3.2.1 or later.
· When IP phones are connected to an 802.1x-enabled switch port that is in single host mode, the switch grants the phones network access without authenticating them. We recommend that you use multidomain authentication (MDA) on the port to authenticate both a data device and a voice device, such as an IP phone.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1504

Security

VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass

Note Only Catalyst 3750, 3560, and 2960 switches support CDP bypass. The Catalyst 3750-X, 3560-X, 3750-E, and 3560-E switches do not support CDP bypass.
· Cisco IOS Release 12.2(55)SE and later supports filtering of system messages related to 802.1x authentication.
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
These are the configuration guidelines for VLAN assignment, guest VLAN, restricted VLAN, and inaccessible authentication bypass:
· When 802.1x authentication is enabled on a port, you cannot configure a port VLAN that is equal to a voice VLAN.
· The 802.1x authentication with VLAN assignment feature is not supported on trunk ports, dynamic ports, or with dynamic-access port assignment through a VMPS.
· You can configure 802.1x authentication on a private-VLAN port, but do not configure IEEE 802.1x authentication with port security, a voice VLAN, a guest VLAN, a restricted VLAN, or a per-user ACL on private-VLAN ports.
· You can configure any VLAN except an RSPAN VLAN or a voice VLAN as an 802.1x guest VLAN. The guest VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported only on access ports.
· After you configure a guest VLAN for an 802.1x port to which a DHCP client is connected, you might need to get a host IP address from a DHCP server. You can change the settings for restarting the 802.1x authentication process on the switch before the DHCP process on the client times out and tries to get a host IP address from the DHCP server. Decrease the settings for the 802.1x authentication process (authentication timer inactivity and authentication timer reauthentication interface configuration commands). The amount to decrease the settings depends on the connected 802.1x client type.
· When configuring the inaccessible authentication bypass feature, follow these guidelines: · The feature is supported on 802.1x port in single-host mode and multihosts mode.
· If the client is running Windows XP and the port to which the client is connected is in the critical-authentication state, Windows XP might report that the interface is not authenticated.
· If the Windows XP client is configured for DHCP and has an IP address from the DHCP server, receiving an EAP-Success message on a critical port might not re-initiate the DHCP configuration process.
· You can configure the inaccessible authentication bypass feature and the restricted VLAN on an 802.1x port. If the switch tries to re-authenticate a critical port in a restricted VLAN and all the RADIUS servers are unavailable, switch changes the port state to the critical authentication state and remains in the restricted VLAN.
· You can configure any VLAN except an RSPAN VLAN or a voice VLAN as an 802.1x restricted VLAN. The restricted VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported only on access ports.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1505

MAC Authentication Bypass

Security

MAC Authentication Bypass
These are the MAC authentication bypass configuration guidelines: · Unless otherwise stated, the MAC authentication bypass guidelines are the same as the 802.1x authentication guidelines.
· If you disable MAC authentication bypass from a port after the port has been authorized with its MAC address, the port state is not affected.
· If the port is in the unauthorized state and the client MAC address is not the authentication-server database, the port remains in the unauthorized state. However, if the client MAC address is added to the database, the switch can use MAC authentication bypass to re-authorize the port.
· If the port is in the authorized state, the port remains in this state until re-authorization occurs.
Maximum Number of Allowed Devices Per Port
This is the maximum number of devices allowed on an 802.1x-enabled port: · In single-host mode, only one device is allowed on the access VLAN. If the port is also configured with a voice VLAN, an unlimited number of Cisco IP phones can send and receive traffic through the voice VLAN.
· In multidomain authentication (MDA) mode, one device is allowed for the access VLAN, and one IP phone is allowed for the voice VLAN.
· In multihost mode, only one 802.1x supplicant is allowed on the port, but an unlimited number of non-802.1x hosts are allowed on the access VLAN. An unlimited number of devices are allowed on the voice VLAN.

Configuring 802.1x Readiness Check
Beginning in privileged EXEC mode, follow these steps to enable the 802.1x readiness check on the switch:

SUMMARY STEPS

1. dot1x test eapol-capable [interface interface-id] 2. configure terminal 3. dot1x test timeout timeout 4. end

DETAILED STEPS

Step 1

Command or Action dot1x test eapol-capable [interface interface-id] Example:

Switch# dot1x test eapol-capable interface gigabitethernet1/0/13

Purpose
Enables the 802.1x readiness check on the switch.
(Optional) For interface-id specify the port on which to check for IEEE 802.1x readiness.
Note If you omit the optional interface keyword, all interfaces on the switch are tested.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1506

Security

Configuring Voice Aware 802.1x Security

Step 2

Command or Action configure terminal Example:
Switch# configure terminal

Step 3

dot1x test timeout timeout Example:
Switch(config)# dot1x test timeout 300

Step 4

end Example:
Switch(config)# end

Purpose (Optional) Enters global configuration mode.
(Optional) Configures the timeout used to wait for EAPOL response. The range is from 1 to 65535 seconds. The default is 10 seconds.
Returns to privileged EXEC mode.

Related Topics 802.1x Readiness Check, on page 1485
Configuring Voice Aware 802.1x Security
Follow these guidelines to configure voice aware 802.1x voice security on the switch: · You enable voice aware 802.1x security by entering the errdisable detect cause security-violation shutdown vlan global configuration command. You disable voice aware 802.1x security by entering the no version of this command. This command applies to all 802.1x-configured ports in the switch.

Note If you do not include the shutdown vlan keywords, the entire port is shut down when it enters the error-disabled state.

· If you use the errdisable recovery cause security-violation global configuration command to configure error-disabled recovery, the port is automatically re-enabled. If error-disabled recovery is not configured for the port, you re-enable it by using the shutdown and no shutdown interface configuration commands.
· You can re-enable individual VLANs by using the clear errdisable interface interface-id vlan [vlan-list] privileged EXEC command. If you do not specify a range, all VLANs on the port are enabled.
Beginning in privileged EXEC mode, follow these steps to enable voice aware 802.1x security:

SUMMARY STEPS

1. configure terminal 2. errdisable detect cause security-violation shutdown vlan 3. errdisable recovery cause security-violation 4. clear errdisable interface interface-id vlan [vlan-list]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1507

Configuring Voice Aware 802.1x Security

Security

5. Enter the following: · shutdown · no shutdown
6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2 Step 3

errdisable detect cause security-violation shutdown vlan Shuts down any VLAN on which a security violation error

Example:

occurs.

Note If the shutdown vlan keywords are not included,

Switch(config)# errdisable detect cause

the entire port enters the error-disabled state and

security-violation shutdown vlan

shuts down.

errdisable recovery cause security-violation Example:
Switch(config)# errdisable recovery cause security-violation

(Optional) Enables automatic per-VLAN error recovery.

Step 4 Step 5

clear errdisable interface interface-id vlan [vlan-list] Example:
Switch(config)# clear errdisable interface GigabitEthernet4/0/2 vlan

(Optional) Reenables individual VLANs that have been error disabled.
· For interface-id, specify the port on which to reenable individual VLANs.
· (Optional) For vlan-list, specify a list of VLANs to be re-enabled. If vlan-list is not specified, all VLANs are re-enabled.

Enter the following: · shutdown · no shutdown
Example:
Switch(config-if)# shutdown Switch(config-if)# no shutdown

(Optional) Re-enables an error-disabled VLAN, and clear all error-disable indications.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1508

Security

Configuring 802.1x Violation Modes

Step 6

Command or Action end Example:
Switch(config-if)# end

Purpose Returns to privileged EXEC mode.

Related Topics Voice Aware 802.1x Security, on page 1501

Configuring 802.1x Violation Modes
You can configure an 802.1x port so that it shuts down, generates a syslog error, or discards packets from a new device when:
· a device connects to an 802.1x-enabled port · the maximum number of allowed about devices have been authenticated on the port
Beginning in privileged EXEC mode, follow these steps to configure the security violation actions on the switch:

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. aaa authentication dot1x {default} method1 4. interface interface-id 5. switchport mode access 6. authentication violation {shutdown | restrict | protect | replace} 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA.

Step 3 aaa authentication dot1x {default} method1

Creates an 802.1x authentication method list.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1509

Configuring 802.1x Authentication

Security

Step 4

Command or Action

Purpose

Example:
Switch(config)# aaa authentication dot1x default group radius

To create a default list that is used when a named list is not specified in the authentication command, use the default keyword followed by the method that is to be used in default situations. The default method list is automatically applied to all ports.

For method1, enter the group radius keywords to use the list of all RADIUS servers for authentication.

Note Though other keywords are visible in the command-line help string, only the group radius keywords are supported.

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/4

Specifies the port connected to the client that is to be enabled for IEEE 802.1x authentication, and enter interface configuration mode.

Step 5

switchport mode access Example:
Switch(config-if)# switchport mode access

Sets the port to access mode.

Step 6 Step 7

authentication violation {shutdown | restrict | protect | Configures the violation mode. The keywords have these

replace}

meanings:

Example:

· shutdown­Error disable the port.

Switch(config-if)# authentication violation restrict

· restrict­Generate a syslog error.
· protect­Drop packets from any new device that sends traffic to the port.

· replace­Removes the current session and authenticates with the new host.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Configuring 802.1x Authentication
To allow per-user ACLs or VLAN assignment, you must enable AAA authorization to configure the switch for all network-related service requests. This is the 802.1x AAA process:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1510

Security

Configuring 802.1x Port-Based Authentication

Before you begin
To configure 802.1x port-based authentication, you must enable authentication, authorization, and accounting (AAA) and specify the authentication method list. A method list describes the sequence and authentication method to be queried to authenticate a user.

SUMMARY STEPS

1. A user connects to a port on the switch. 2. Authentication is performed. 3. VLAN assignment is enabled, as appropriate, based on the RADIUS server configuration. 4. The switch sends a start message to an accounting server. 5. Re-authentication is performed, as necessary. 6. The switch sends an interim accounting update to the accounting server that is based on the result of
re-authentication. 7. The user disconnects from the port. 8. The switch sends a stop message to the accounting server.

DETAILED STEPS

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6
Step 7 Step 8

Command or Action

Purpose

A user connects to a port on the switch.

Authentication is performed.

VLAN assignment is enabled, as appropriate, based on the RADIUS server configuration.

The switch sends a start message to an accounting server.

Re-authentication is performed, as necessary.

The switch sends an interim accounting update to the accounting server that is based on the result of re-authentication.

The user disconnects from the port.

The switch sends a stop message to the accounting server.

Configuring 802.1x Port-Based Authentication
Beginning in privileged EXEC mode, follow these steps to configure 802.1x port-based authentication:

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. aaa authentication dot1x {default} method1 4. dot1x system-auth-control 5. aaa authorization network {default} group radius 6. radius-server host ip-address

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1511

Configuring 802.1x Port-Based Authentication

Security

7. radius-server key string 8. interface interface-id 9. switchport mode access 10. authentication port-control auto 11. dot1x pae authenticator 12. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA.

Step 3 Step 4

aaa authentication dot1x {default} method1

Creates an 802.1x authentication method list.

Example:

To create a default list that is used when a named list is

not specified in the authentication command, use the

Switch(config)# aaa authentication dot1x default default keyword followed by the method that is to be used

group radius

in default situations. The default method list is

automatically applied to all ports.

For method1, enter the group radius keywords to use the list of all RADIUS servers for authentication.

Note Though other keywords are visible in the command-line help string, only the group radius keywords are supported.

dot1x system-auth-control Example:

Enables 802.1x authentication globally on the switch.

Switch(config)# dot1x system-auth-control

Step 5

aaa authorization network {default} group radius Example:

(Optional) Configures the switch to use user-RADIUS authorization for all network-related service requests, such as per-user ACLs or VLAN assignment.

Switch(config)# aaa authorization network default Note group radius

For per-user ACLs, single-host mode must be configured. This setting is the default.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1512

Security

Configuring the Switch-to-RADIUS-Server Communication

Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12

Command or Action radius-server host ip-address Example:

Purpose (Optional) Specifies the IP address of the RADIUS server.

Switch(config)# radius-server host 124.2.2.12

radius-server key string Example:
Switch(config)# radius-server key abc1234

(Optional) Specifies the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server.

interface interface-id Example:

Specifies the port connected to the client that is to be enabled for IEEE 802.1x authentication, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2

switchport mode access Example:
Switch(config-if)# switchport mode access

(Optional) Sets the port to access mode only if you configured the RADIUS server in Step 6 and Step 7.

authentication port-control auto Example:

Enables 802.1x authentication on the port.

Switch(config-if)# authentication port-control auto

dot1x pae authenticator Example:
Switch(config-if)# dot1x pae authenticator

Sets the interface Port Access Entity to act only as an authenticator and ignore messages meant for a supplicant.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Configuring the Switch-to-RADIUS-Server Communication
You can globally configure the timeout, retransmission, and encryption key values for all RADIUS servers by using the radius-server host global configuration command. If you want to configure these options on a

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1513

Configuring the Switch-to-RADIUS-Server Communication

Security

per-server basis, use the radius-server timeout, the radius-server retransmit, and the radius-server key global configuration commands.
You also need to configure some settings on the RADIUS server. These settings include the IP address of the switch and the key string to be shared by both the server and the switch. For more information, see the RADIUS server documentation.
Beginning in privileged EXEC mode, follow these steps to configure the RADIUS server parameters on the switch. This procedure is required.

Before you begin
You must enable authentication, authorization, and accounting (AAA) and specify the authentication method list. A method list describes the sequence and authentication method to be queried to authenticate a user.

SUMMARY STEPS

1. configure terminal 2. radius-server host {hostname | ip-address} auth-port port-number key string 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

radius-server host {hostname | ip-address} auth-port port-number key string Example:
Switch(config)# radius-server host 125.5.5.43 auth-port 1812 key string

Configures the RADIUS server parameters.
For hostname | ip-address, specify the hostname or IP address of the remote RADIUS server.
For auth-port port-number, specify the UDP destination port for authentication requests. The default is 1812. The range is 0 to 65536.
For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server.
Note Always configure the key as the last item in the radius-server host command syntax because leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks are part of the key. This key must match the encryption used on the RADIUS daemon.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1514

Security

Configuring the Host Mode

Command or Action

Step 3

end Example:
Switch(config)# end

Purpose If you want to use multiple RADIUS servers, re-enter this command.
Returns to privileged EXEC mode.

Related Topics Switch-to-RADIUS-Server Communication, on page 1485

Configuring the Host Mode
Beginning in privileged EXEC mode, follow these steps to allow multiple hosts (clients) on an IEEE 802.1x-authorized port that has the authentication port-control interface configuration command set to auto. Use the multi-domain keyword to configure and enable multidomain authentication (MDA), which allows both a host and a voice device, such as an IP phone (Cisco or non-Cisco), on the same switch port. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. authentication host-mode [multi-auth | multi-domain | multi-host | single-host] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to which multiple hosts are indirectly attached, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

Step 3

authentication host-mode [multi-auth | multi-domain | Allows multiple hosts (clients) on an 802.1x-authorized

multi-host | single-host]

port.

Example:

The keywords have these meanings:

Switch(config-if)# authentication host-mode

· multi-auth­Allow one client on the voice VLAN and multiple authenticated clients on the data VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1515

Configuring Periodic Re-Authentication

Security

Command or Action
multi-host

Step 4

end Example:
Switch(config-if)# end

Purpose Note

The multi-auth keyword is only available with the authentication host-mode command.

· multi-host­Allow multiple hosts on an 802.1x-authorized port after a single host has been authenticated.
· multi-domain­Allow both a host and a voice device, such as an IP phone (Cisco or non-Cisco), to be authenticated on an IEEE 802.1x-authorized port.
Note You must configure the voice VLAN for the IP phone when the host mode is set to multi-domain.

Make sure that the authentication port-control interface configuration command is set to auto for the specified interface.
Returns to privileged EXEC mode.

Configuring Periodic Re-Authentication
You can enable periodic 802.1x client re-authentication and specify how often it occurs. If you do not specify a time period before enabling re-authentication, the number of seconds between attempts is 3600.
Beginning in privileged EXEC mode, follow these steps to enable periodic re-authentication of the client and to configure the number of seconds between re-authentication attempts. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. authentication periodic 4. authentication timer {{[inactivity | reauthenticate | restart]} {value}} 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1516

Security

Changing the Quiet Period

Command or Action
Switch# configure terminal

Purpose

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

Step 3 Step 4
Step 5

authentication periodic Example:
Switch(config-if)# authentication periodic
authentication timer {{[inactivity | reauthenticate | restart]} {value}} Example:
Switch(config-if)# authentication timer reauthenticate 180
end Example:
Switch(config-if)# end

Enables periodic re-authentication of the client, which is disabled by default.
Note The default value is 3600 seconds. To change the value of the reauthentication timer or to have the switch use a RADIUS-provided session timeout, enter the authentication timer reauthenticate command.
Sets the number of seconds between re-authentication attempts.
The authentication timer keywords have these meanings:
· inactivity--Interval in seconds after which if there is no activity from the client then it is unauthorized
· reauthenticate--Time in seconds after which an automatic re-authentication attempt is initiated
· restart value--Interval in seconds after which an attempt is made to authenticate an unauthorized port
This command affects the behavior of the switch only if periodic re-authentication is enabled.
Returns to privileged EXEC mode.

Changing the Quiet Period
When the switch cannot authenticate the client, the switch remains idle for a set period of time and then tries again. The authentication timer inactivity interface configuration command controls the idle period. A failed authentication of the client might occur because the client provided an invalid password. You can provide a faster response time to the user by entering a number smaller than the default.
Beginning in privileged EXEC mode, follow these steps to change the quiet period. This procedure is optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1517

Changing the Quiet Period

Security

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. authentication timer inactivity seconds 4. end 5. show authentication sessions interface interface-id 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

Step 3

authentication timer inactivity seconds Example:

Sets the number of seconds that the switch remains in the quiet state following a failed authentication exchange with the client.

Switch(config-if)# authentication timer inactivity The range is 1 to 65535 seconds; the default is 60.
30

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 5

show authentication sessions interface interface-id Example:

Verifies your entries.

Switch# show authentication sessions interface gigabitethernet2/0/1

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1518

Security

Changing the Switch-to-Client Retransmission Time

Changing the Switch-to-Client Retransmission Time
The client responds to the EAP-request/identity frame from the switch with an EAP-response/identity frame. If the switch does not receive this response, it waits a set period of time (known as the retransmission time) and then resends the frame.

Note You should change the default value of this command only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers.

Beginning in privileged EXEC mode, follow these steps to change the amount of time that the switch waits for client notification. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. authentication timer reauthenticate seconds 4. end 5. show authentication sessions interface interface-id 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

Step 3

authentication timer reauthenticate seconds Example:
Switch(config-if)# authentication timer reauthenticate 60

Sets the number of seconds that the switch waits for a response to an EAP-request/identity frame from the client before resending the request.
The range is 1 to 65535 seconds; the default is 5.

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1519

Setting the Switch-to-Client Frame-Retransmission Number

Security

Step 5

Command or Action show authentication sessions interface interface-id Example:

Purpose Verifies your entries.

Switch# show authentication sessions interface gigabitethernet2/0/1

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Setting the Switch-to-Client Frame-Retransmission Number
In addition to changing the switch-to-client retransmission time, you can change the number of times that the switch sends an EAP-request/identity frame (assuming no response is received) to the client before restarting the authentication process.

Note You should change the default value of this command only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers.
Beginning in privileged EXEC mode, follow these steps to set the switch-to-client frame-retransmission number. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. dot1x max-reauth-req count 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1520

Security

Setting the Re-Authentication Number

Command or Action

Purpose

Switch(config)# interface gigabitethernet2/0/1

Step 3

dot1x max-reauth-req count Example:
Switch(config-if)# dot1x max-reauth-req 5

Sets the number of times that the switch sends an EAP-request/identity frame to the client before restarting the authentication process. The range is 1 to 10; the default is 2.

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Setting the Re-Authentication Number
You can also change the number of times that the switch restarts the authentication process before the port changes to the unauthorized state.

Note You should change the default value of this command only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers.
Beginning in privileged EXEC mode, follow these steps to set the re-authentication number. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode access 4. dot1x max-req count 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1521

Enabling MAC Move

Security

Command or Action
Switch# interface gigabitethernet2/0/1

Step 3

switchport mode access Example:
Switch(config-if)# switchport mode access

Step 4

dot1x max-req count Example:
Switch(config-if)# dot1x max-req 4

Step 5

end Example:
Switch(config-if)# end

Purpose
Sets the port to access mode only if you previously configured the RADIUS server.
Sets the number of times that the switch restarts the authentication process before the port changes to the unauthorized state. The range is 0 to 10; the default is 2.
Returns to privileged EXEC mode.

Enabling MAC Move
MAC move allows an authenticated host to move from one port on the switch to another. Beginning in privileged EXEC mode, follow these steps to globally enable MAC move on the switch. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. authentication mac-move permit 3. end 4. show running-config 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

authentication mac-move permit Example:

Enables MAC move on the switch. Default is deny.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1522

Security

Enabling MAC Replace

Step 3

Command or Action
Switch(config)# authentication mac-move permit
end Example:

Purpose In Session Aware Networking mode, the default CLI is access-session mac-move deny. To enable Mac Move in Session Aware Networking, use the no access-session mac-move global configuration command.
Returns to privileged EXEC mode.

Switch(config)# end

Step 4

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Enabling MAC Replace
MAC replace allows a host to replace an authenticated host on a port. Beginning in privileged EXEC mode, follow these steps to enable MAC replace on an interface. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. authentication violation {protect | replace | restrict | shutdown} 4. end 5. show running-config 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1523

Configuring 802.1x Accounting

Security

Step 2

Command or Action interface interface-id Example:

Purpose
Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/2

Step 3 Step 4

authentication violation {protect | replace | restrict | Use the replace keyword to enable MAC replace on the

shutdown}

interface. The port removes the current session and initiates

Example:

authentication with the new host.

The other keywords have these effects:

Switch(config-if)# authentication violation replace · protect: the port drops packets with unexpected MAC

addresses without generating a system message.

· restrict: violating packets are dropped by the CPU and a system message is generated.

· shutdown: the port is error disabled when it receives an unexpected MAC address.

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Step 5

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring 802.1x Accounting
Enabling AAA system accounting with 802.1x accounting allows system reload events to be sent to the accounting RADIUS server for logging. The server can then infer that all active 802.1x sessions are closed. Because RADIUS uses the unreliable UDP transport protocol, accounting messages might be lost due to poor network conditions. If the switch does not receive the accounting response message from the RADIUS server after a configurable number of retransmissions of an accounting request, this system message appears:
Accounting message %s for session %s failed to receive Accounting Response.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1524

Security

Configuring 802.1x Accounting

When the stop message is not sent successfully, this message appears:
00:09:55: %RADIUS-4-RADIUS_DEAD: RADIUS server 172.20.246.201:1645,1646 is not responding.

Note You must configure the RADIUS server to perform accounting tasks, such as logging start, stop, and interim-update messages and time stamps. To turn on these functions, enable logging of "Update/Watchdog packets from this AAA client" in your RADIUS server Network Configuration tab. Next, enable "CVS RADIUS Accounting" in your RADIUS server System Configuration tab.
Beginning in privileged EXEC mode, follow these steps to configure 802.1x accounting after AAA is enabled on your switch. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. aaa accounting dot1x default start-stop group radius 4. aaa accounting system default start-stop group radius 5. end 6. show running-config 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/3

Step 3

aaa accounting dot1x default start-stop group radius Enables 802.1x accounting using the list of all RADIUS

Example:

servers.

Switch(config-if)# aaa accounting dot1x default start-stop group radius

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1525

Configuring a Guest VLAN

Security

Step 4

Command or Action

Purpose

aaa accounting system default start-stop group radius (Optional) Enables system accounting (using the list of all

Example:

RADIUS servers) and generates system accounting reload event messages when the switch reloads.

Switch(config-if)# aaa accounting system default start-stop group radius

Step 5

end Example:
Switch(config-if)# end

Returns to privileged EXEc mode.

Step 6

show running-config Example:
Switch# show running-config

Verifies your entries.

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring a Guest VLAN
When you configure a guest VLAN, clients that are not 802.1x-capable are put into the guest VLAN when the server does not receive a response to its EAP request/identity frame. Clients that are 802.1x-capable but that fail authentication are not granted network access. The switch supports guest VLANs in single-host or multiple-hosts mode.
Beginning in privileged EXEC mode, follow these steps to configure a guest VLAN. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. Use one of the following:
· switchport mode access · switchport mode private-vlan host
4. authentication event no-response action authorize vlan vlan-id 5. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1526

Security

Configuring a Restricted VLAN

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/2

Step 3

Use one of the following: · switchport mode access · switchport mode private-vlan host
Example:
Switch(config-if)# switchport mode private-vlan host

· Sets the port to access mode.
· Configures the Layer 2 port as a private-VLAN host port.

Step 4

authentication event no-response action authorize vlan Specifies an active VLAN as an 802.1x guest VLAN. The

vlan-id

range is 1 to 4094.

Example:

You can configure any active VLAN except an internal

VLAN (routed port), an RSPAN VLAN or a voice VLAN

Switch(config-if)# authentication event no-response as an 802.1x guest VLAN.

action authorize vlan 2

Step 5

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Configuring a Restricted VLAN
When you configure a restricted VLAN on a switch stack or a switch, clients that are IEEE 802.1x-compliant are moved into the restricted VLAN when the authentication server does not receive a valid username and password. The switch supports restricted VLANs only in single-host mode.
Beginning in privileged EXEC mode, follow these steps to configure a restricted VLAN. This procedure is optional.

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1527

Configuring a Restricted VLAN

Security

2. interface interface-id 3. Use one of the following:
· switchport mode access · switchport mode private-vlan host
4. authentication port-control auto 5. authentication event fail action authorize vlan vlan-id 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/2

Step 3

Use one of the following: · switchport mode access · switchport mode private-vlan host
Example:
Switch(config-if)# switchport mode access

· Sets the port to access mode.
· Configures the Layer 2 port as a private-VLAN host port.

Step 4

authentication port-control auto Example:

Enables 802.1x authentication on the port.

Switch(config-if)# authentication port-control auto

Step 5 Step 6

authentication event fail action authorize vlan vlan-id Specifies an active VLAN as an 802.1x restricted VLAN.

Example:

The range is 1 to 4094.

You can configure any active VLAN except an internal

Switch(config-if)# authentication event fail action VLAN (routed port), an RSPAN VLAN or a voice VLAN

authorize vlan 2

as an 802.1x restricted VLAN.

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1528

Security

Configuring Number of Authentication Attempts on a Restricted VLAN

Command or Action
Switch(config-if)# end

Purpose

Configuring Number of Authentication Attempts on a Restricted VLAN
You can configure the maximum number of authentication attempts allowed before a user is assigned to the restricted VLAN by using the authentication event retry retry count interface configuration command. The range of allowable authentication attempts is 1 to 3. The default is 3 attempts.
Beginning in privileged EXEC mode, follow these steps to configure the maximum number of allowed authentication attempts. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. Use one of the following:
· switchport mode access · switchport mode private-vlan host
4. authentication port-control auto 5. authentication event fail action authorize vlan vlan-id 6. authentication event retry retry count 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/3

Step 3

Use one of the following: · switchport mode access · switchport mode private-vlan host
Example: or

· Sets the port to access mode.
· Configures the Layer 2 port as a private-VLAN host port.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1529

Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN

Security

Command or Action
Switch(config-if)# switchport mode access

Purpose

Step 4

authentication port-control auto Example:

Enables 802.1x authentication on the port.

Switch(config-if)# authentication port-control auto

Step 5 Step 6

authentication event fail action authorize vlan vlan-id Specifies an active VLAN as an 802.1x restricted VLAN.

Example:

The range is 1 to 4094.

You can configure any active VLAN except an internal

Switch(config-if)# authentication event fail action VLAN (routed port), an RSPAN VLAN or a voice VLAN

authorize vlan 8

as an 802.1x restricted VLAN.

authentication event retry retry count Example:

Specifies a number of authentication attempts to allow before a port moves to the restricted VLAN. The range is 1 to 3, and the default is 3.

Switch(config-if)# authentication event retry 2

Step 7

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN
Beginning in privileged EXEC mode, follow these steps to configure critical voice VLAN on a port and enable the inaccessible authentication bypass feature.

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. radius-server dead-criteria{time seconds } [tries number] 4. radius-serverdeadtimeminutes 5. radius-server host ip-address address[acct-port udp-port][auth-port udp-port] [testusername
name[idle-time time] [ignore-acct-port][ignore auth-port]] [key string] 6. dot1x critical {eapol | recovery delay milliseconds} 7. interface interface-id 8. authentication event server dead action {authorize | reinitialize} vlan vlan-id] 9. switchport voice vlan vlan-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1530

Security

Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN

10. authentication event server dead action authorize voice 11. show authentication interface interface-id 12. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA.

Step 3 Step 4

radius-server dead-criteria{time seconds } [tries number]

Sets the conditions that determine when a RADIUS server is considered un-available or down (dead).

Example:
Switch(config)# radius-server dead-criteria time 20 tries 10

· time-- 1 to 120 seconds. The switch dynamically determines a default seconds value between 10 and 60.
· number--1 to 100 tries. The switch dynamically determines a default triesnumber between 10 and 100.

radius-serverdeadtimeminutes Example:
Switch(config)# radius-server deadtime 60

(Optional) Sets the number of minutes during which a RADIUS server is not sent requests. The range is from 0 to 1440 minutes (24 hours). The default is 0 minutes.

Step 5

radius-server host ip-address address[acct-port udp-port][auth-port udp-port] [testusername name[idle-time time] [ignore-acct-port][ignore auth-port]] [key string]
Example:

(Optional) Configure the RADIUS server parameters by using these keywords:
· acct-portudp-port--Specify the UDP port for the RADIUS accounting server. The range for the UDP port number is from 0 to 65536. The default is 1646.

Switch(config)# radius-server host 1.1.1.2 acct-port 1550 auth-port 1560 test username user1 idle-time 30 key abc1234

· auth-portudp-port--Specify the UDP port for the RADIUS authentication server. The range for the UDP port number is from 0 to 65536. The default is 1645.

Note You should configure the UDP port for the RADIUS accounting server and the UDP port for the RADIUS authentication server to nondefault values.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1531

Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN

Security

Step 6

Command or Action

Purpose
· test usernamename--Enable automated testing of the RADIUS server status, and specify the username to be used.
· idle-time time--Set the interval of time in minutes after which the switch sends test packets to the server. The range is from 1 to 35791 minutes. The default is 60 minutes (1 hour).
· ignore-acct-port--Disable testing on the RADIUS-server accounting port.
· ignore-auth-port--Disable testing on the RADIUS-server authentication port.
· For keystring, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server.
Note Always configure the key as the last item in the radius-server host command syntax because leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks are part of the key. This key must match the encryption used on the RADIUS daemon.

dot1x critical {eapol | recovery delay milliseconds} Example:
Switch(config)# dot1x critical eapol (config)# dot1x critical recovery delay 2000

You can also configure the authentication and encryption key by using theradius-server key {0string | 7string | string} global configuration command.
(Optional) Configure the parameters for inaccessible authentication bypass:
· eapol--Specify that the switch sends an EAPOL-Success message when the switch successfully authenticates the critical port.
· recovery delaymilliseconds--Set the recovery delay period during which the switch waits to re-initialize a critical port when a RADIUS server that was unavailable becomes available. The range is from 1 to 10000 milliseconds. The default is 1000 milliseconds (a port can be re-initialized every second).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1532

Security

Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN

Step 7 Step 8
Step 9 Step 10 Step 11 Step 12

Command or Action interface interface-id Example:

Purpose
Specify the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet 1/0/1

authentication event server dead action {authorize | reinitialize} vlan vlan-id] Example:
Switch(config-if)# authentication event server dead action reinitialicze vlan 20

Use these keywords to move hosts on the port if the RADIUS server is unreachable:
· authorize--Move any new hosts trying to authenticate to the user-specified critical VLAN.
· reinitialize--Move all authorized hosts on the port to the user-specified critical VLAN.

switchport voice vlan vlan-id Example:
Switch(config-if)# switchport voice vlan

Specifies the voice VLAN for the port. The voice VLAN cannot be the same as the critical data VLAN configured in Step 6.

authentication event server dead action authorize voice Configures critical voice VLAN to move data traffic on

Example:

the port to the voice VLAN if the RADIUS server is unreachable.

Switch(config-if)# authentication event server dead action authorize voice

show authentication interface interface-id Example:
Switch(config-if)# do show authentication interface gigabit 1/0/1

(Optional) Verify your entries.

copy running-config startup-config Example:
Switch(config-if)# do copy running-config startup-config

(Optional) Verify your entries.

Example
To return to the RADIUS server default settings, use the no radius-server dead-criteria, the no radius-server deadtime, and the no radius-server host global configuration commands. To disable inaccessible authentication bypass, use the no authentication event server dead action interface configuration command. To disable critical voice VLAN, use the no authentication event server dead action authorize voice interface configuration command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1533

Example of Configuring Inaccessible Authentication Bypass

Security

Example of Configuring Inaccessible Authentication Bypass
This example shows how to configure the inaccessible authentication bypass feature:
Switch(config)# radius-server dead-criteria time 30 tries 20 Switch(config)# radius-server deadtime 60 Switch(config)# radius-server host 1.1.1.2 acct-port 1550 auth-port 1560 test username user1
idle-time 30 key abc1234 Switch(config)# dot1x critical eapol Switch(config)# dot1x critical recovery delay 2000 Switch(config)# interface gigabitethernet 1/0/1 Switch(config-if)# dot1x critical Switch(config-if)# dot1x critical recovery action reinitialize Switch(config-if)# dot1x critical vlan 20 Switch(config-if)# end

Configuring 802.1x Authentication with WoL
Beginning in privileged EXEC mode, follow these steps to enable 802.1x authentication with WoL. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. authentication control-direction {both | in} 4. end 5. show authentication sessions interface interface-id 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/3

Step 3

authentication control-direction {both | in} Example:

Enables 802.1x authentication with WoL on the port, and use these keywords to configure the port as bidirectional or unidirectional.

Switch(config-if)# authentication control-direction

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1534

Security

Configuring MAC Authentication Bypass

Command or Action
both

Step 4

end Example:
Switch(config-if)# end

Purpose · both--Sets the port as bidirectional. The port cannot receive packets from or send packets to the host. By default, the port is bidirectional.
· in--Sets the port as unidirectional. The port can send packets to the host but cannot receive packets from the host.
Returns to privileged EXEC mode.

Step 5

show authentication sessions interface interface-id Example:

Verifies your entries.

Switch# show authentication sessions interface gigabitethernet2/0/3

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring MAC Authentication Bypass
Beginning in privileged EXEC mode, follow these steps to enable MAC authentication bypass. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. authentication port-control auto 4. mab [eap] 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1535

Formatting a MAC Authentication Bypass Username and Password

Security

Command or Action
Switch# configure terminal

Purpose

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

Step 3

authentication port-control auto Example:

Enables 802.1x authentication on the port.

Switch(config-if)# authentication port-control auto

Step 4

mab [eap] Example:
Switch(config-if)# mab

Enables MAC authentication bypass.
(Optional) Use the eap keyword to configure the switch to use EAP for authorization.

Step 5

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Formatting a MAC Authentication Bypass Username and Password
Use the optional mab request format command to format the MAB username and password in a style accepted by the authentication server. The username and password are usually the MAC address of the client. Some authentication server configurations require the password to be different from the username.
Beginning in privileged EXEC mode, follow these steps to format MAC authentication bypass username and passwords.

SUMMARY STEPS

1. configure terminal 2. mab request format attribute 1 groupsize {1 | 2 | 4 |12} [separator {- | : | .} {lowercase | uppercase}] 3. mab request format attribute2 {0 | 7} text 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1536

Security

Configuring 802.1x User Distribution

Command or Action
Switch# configure terminal

Purpose

Step 2 Step 3 Step 4

mab request format attribute 1 groupsize {1 | 2 | 4 |12} Specifies the format of the MAC address in the User-Name

[separator {- | : | .} {lowercase | uppercase}]

attribute of MAB-generated Access-Request packets.

Example:
Switch(config)# mab request format attribute 1 groupsize 12

1--Sets the username format of the 12 hex digits of the MAC address.
group size--The number of hex nibbles to concatenate before insertion of a separator. A valid groupsize must be either 1, 2, 4, or 12.

separator--The character that separates the hex nibbles according to group size. A valid separator must be either a hyphen, colon, or period. No separator is used for a group size of 12.

{lowercase | uppercase}--Specifies if nonnumeric hex nibbles should be in lowercase or uppercase.

mab request format attribute2 {0 | 7} text Example:

2--Specifies a custom (nondefault) value for the User-Password attribute in MAB-generated Access-Request packets.

Switch(config)# mab request format attribute 2 7 0--Specifies a cleartext password to follow.

A02f44E18B12

7--Specifies an encrypted password to follow.

text--Specifies the password to be used in the User-Password attribute.

Note When you send configuration information in e-mail, remove type 7 password information. The show tech-support command removes this information from its output by default.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Configuring 802.1x User Distribution
Beginning in privileged EXEC mode, follow these steps to configure a VLAN group and to map a VLAN to it:

SUMMARY STEPS

1. configure terminal 2. vlan group vlan-group-name vlan-list vlan-list

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1537

Example of Configuring VLAN Groups

Security

3. end 4. no vlan group vlan-group-name vlan-list vlan-list

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

vlan group vlan-group-name vlan-list vlan-list Example:

Configures a VLAN group, and maps a single VLAN or a range of VLANs to it.

Switch(config)# vlan group eng-dept vlan-list 10

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

no vlan group vlan-group-name vlan-list vlan-list Example:

Clears the VLAN group configuration or elements of the VLAN group configuration.

Switch(config)# no vlan group eng-dept vlan-list 10

Example of Configuring VLAN Groups
This example shows how to configure the VLAN groups, to map the VLANs to the groups, to and verify the VLAN group configurations and mapping to the specified VLANs:

Switch(config)# vlan group eng-dept vlan-list 10

Switch(config)# show vlan group group-name eng-dept

Group Name

Vlans Mapped

-------------

--------------

eng-dept

10

Switch(config)# show dot1x vlan-group all

Group Name

Vlans Mapped

-------------

--------------

eng-dept

10

hr-dept

20

This example shows how to add a VLAN to an existing VLAN group and to verify that the VLAN was added:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1538

Security

Configuring NAC Layer 2 802.1x Validation

Switch(config)# vlan group eng-dept vlan-list 30

Switch(config)# show vlan group eng-dept

Group Name

Vlans Mapped

-------------

--------------

eng-dept

10,30

This example shows how to remove a VLAN from a VLAN group:

Switch# no vlan group eng-dept vlan-list 10
This example shows that when all the VLANs are cleared from a VLAN group, the VLAN group is cleared:

Switch(config)# no vlan group eng-dept vlan-list 30 Vlan 30 is successfully cleared from vlan group eng-dept. Switch(config)# show vlan group group-name eng-dept
This example shows how to clear all the VLAN groups:

Switch(config)# no vlan group end-dept vlan-list all Switch(config)# show vlan-group all
For more information about these commands, see the Cisco IOS Security Command Reference.

Configuring NAC Layer 2 802.1x Validation
You can configure NAC Layer 2 802.1x validation, which is also referred to as 802.1x authentication with a RADIUS server.
Beginning in privileged EXEC mode, follow these steps to configure NAC Layer 2 802.1x validation. The procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode access 4. authentication event no-response action authorize vlan vlan-id 5. authentication periodic 6. authentication timer reauthenticate 7. end 8. show authentication sessions interface interface-id 9. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1539

Configuring NAC Layer 2 802.1x Validation

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/3

Step 3

switchport mode access Example:
Switch(config-if)# switchport mode access

Sets the port to access mode only if you configured the RADIUS server.

Step 4

authentication event no-response action authorize vlan Specifies an active VLAN as an 802.1x guest VLAN. The

vlan-id

range is 1 to 4094.

Example:

You can configure any active VLAN except an internal

VLAN (routed port), an RSPAN VLAN, or a voice VLAN

Switch(config-if)# authentication event no-response as an 802.1x guest VLAN.

action authorize vlan 8

Step 5

authentication periodic Example:
Switch(config-if)# authentication periodic

Enables periodic re-authentication of the client, which is disabled by default.

Step 6

authentication timer reauthenticate Example:
Switch(config-if)# authentication timer reauthenticate

Sets re-authentication attempt for the client (set to one hour).
This command affects the behavior of the switch only if periodic re-authentication is enabled.

Step 7

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 8

show authentication sessions interface interface-id Example:

Verifies your entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1540

Security

Configuring an Authenticator Switch with NEAT

Command or Action

Purpose

Switch# show authentication sessions interface gigabitethernet2/0/3

Step 9

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring an Authenticator Switch with NEAT
Configuring this feature requires that one switch outside a wiring closet is configured as a supplicant and is connected to an authenticator switch.

Note The cisco-av-pairs must be configured as device-traffic-class=switch on the ACS, which sets the interface as a trunk after the supplicant is successfully authenticated.
Beginning in privileged EXEC mode, follow these steps to configure a switch as an authenticator:

SUMMARY STEPS

1. configure terminal 2. cisp enable 3. interface interface-id 4. switchport mode access 5. authentication port-control auto 6. dot1x pae authenticator 7. spanning-tree portfast 8. end 9. show running-config interface interface-id 10. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

cisp enable Example:

Enables CISP.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1541

Configuring an Authenticator Switch with NEAT

Security

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action
Switch(config)# cisp enable

Purpose

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

switchport mode access Example:
Switch(config-if)# switchport mode access

Sets the port mode to access.

authentication port-control auto Example:

Sets the port-authentication mode to auto.

Switch(config-if)# authentication port-control auto

dot1x pae authenticator Example:
Switch(config-if)# dot1x pae authenticator

Configures the interface as a port access entity (PAE) authenticator.

spanning-tree portfast Example:

Enables Port Fast on an access port connected to a single workstation or server..

Switch(config-if)# spanning-tree portfast trunk

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

show running-config interface interface-id Example:
Switch# show running-config interface gigabitethernet2/0/1

Verifies your configuration.

copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1542

Security

Configuring a Supplicant Switch with NEAT

Command or Action
Switch# copy running-config startup-config

Purpose

Configuring a Supplicant Switch with NEAT
Beginning in privileged EXEC mode, follow these steps to configure a switch as a supplicant:

SUMMARY STEPS

1. configure terminal 2. cisp enable 3. dot1x credentials profile 4. username suppswitch 5. password password 6. dot1x supplicant force-multicast 7. interface interface-id 8. switchport trunk encapsulation dot1q 9. switchport mode trunk 10. dot1x pae supplicant 11. dot1x credentials profile-name 12. end 13. show running-config interface interface-id 14. copy running-config startup-config 15. Configuring NEAT with Auto Smartports Macros

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

cisp enable Example:
Switch(config)# cisp enable

Enables CISP.

Step 3

dot1x credentials profile Example:
Switch(config)# dot1x credentials test

Creates 802.1x credentials profile. This must be attached to the port that is configured as supplicant.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1543

Configuring a Supplicant Switch with NEAT

Security

Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11

Command or Action username suppswitch Example:
Switch(config)# username suppswitch

Purpose Creates a username.

password password Example:
Switch(config)# password myswitch

Creates a password for the new username.

dot1x supplicant force-multicast

Forces the switch to send only multicast EAPOL packets

Example:

when it receives either unicast or multicast packets.

This also allows NEAT to work on the supplicant switch

Switch(config)# dot1x supplicant force-multicast in all host modes.

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

switchport trunk encapsulation dot1q Example:

Sets the port to trunk mode.

Switch(config-if)# switchport trunk encapsulation dot1q

switchport mode trunk Example:
Switch(config-if)# switchport mode trunk

Configures the interface as a VLAN trunk port.

dot1x pae supplicant Example:
Switch(config-if)# dot1x pae supplicant

Configures the interface as a port access entity (PAE) supplicant.

dot1x credentials profile-name Example:
Switch(config-if)# dot1x credentials test

Attaches the 802.1x credentials profile to the interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1544

Security

Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs

Step 12 Step 13 Step 14 Step 15

Command or Action end Example:
Switch(config-if)# end
show running-config interface interface-id Example:
Switch# show running-config interface gigabitethernet1/0/1
copy running-config startup-config Example:
Switch# copy running-config startup-config
Configuring NEAT with Auto Smartports Macros

Purpose Returns to privileged EXEC mode.
Verifies your configuration.
(Optional) Saves your entries in the configuration file.
You can also use an Auto Smartports user-defined macro instead of the switch VSA to configure the authenticator switch. For more information, see the Auto Smartports Configuration Guide for this release.

Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs
In addition to configuring 802.1x authentication on the switch, you need to configure the ACS. For more information, see the Configuration Guide for Cisco Secure ACS 4.2: http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/configuration/guide/acs_config.pdf

Note You must configure a downloadable ACL on the ACS before downloading it to the switch.
After authentication on the port, you can use the show ip access-list privileged EXEC command to display the downloaded ACLs on the port.
Configuring Downloadable ACLs
The policies take effect after client authentication and the client IP address addition to the IP device tracking table. The switch then applies the downloadable ACL to the port. Beginning in privileged EXEC mode:

SUMMARY STEPS

1. configure terminal 2. ip device tracking 3. aaa new-model

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1545

Configuring Downloadable ACLs

Security

4. aaa authorization network default local group radius 5. radius-server vsa send authentication 6. interface interface-id 7. ip access-group acl-id in 8. show running-config interface interface-id 9. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

ip device tracking Example:
Switch(config)# ip device tracking

Sets the ip device tracking table.

Step 3

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA.

Step 4

aaa authorization network default local group radius Sets the authorization method to local. To remove the

Example:

authorization method, use the no aaa authorization network default local group radius command.

Switch(config)# aaa authorization network default local group radius

Step 5

radius-server vsa send authentication Example:
Switch(config)# radius-server vsa send authentication

Configures the radius vsa send authentication.

Step 6

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/4

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1546

Security

Configuring a Downloadable Policy

Step 7

Command or Action

Purpose

ip access-group acl-id in

Configures the default ACL on the port in the input

Example:

direction. Note The acl-id is an access list name or number.

Switch(config-if)# ip access-group default_acl in

Step 8

show running-config interface interface-id Example:

Verifies your configuration.

Switch(config-if)# show running-config interface gigabitethernet2/0/4

Step 9

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring a Downloadable Policy
Beginning in privileged EXEC mode:

SUMMARY STEPS

1. configure terminal 2. access-list access-list-number { deny | permit } { hostname | any | host } log 3. interface interface-id 4. ip access-group acl-id in 5. exit 6. aaa new-model 7. aaa authorization network default group radius 8. ip device tracking 9. ip device tracking probe [count | interval | use-svi] 10. radius-server vsa send authentication 11. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1547

Configuring a Downloadable Policy

Security

Step 2
Step 3 Step 4 Step 5 Step 6

Command or Action
access-list access-list-number { deny | permit } { hostname | any | host } log Example:
Switch(config)# access-list 1 deny any log

Purpose
Defines the default port ACL.
The access-list-number is a decimal number from 1 to 99 or 1300 to 1999.
Enter deny or permit to specify whether to deny or permit access if conditions are matched.
The source is the source address of the network or host that sends a packet, such as this:
· hostname: The 32-bit quantity in dotted-decimal format.
· any: The keyword any as an abbreviation for source and source-wildcard value of 0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard value.
· host: The keyword host as an abbreviation for source and source-wildcard of source 0.0.0.0.

interface interface-id Example:

(Optional) Applies the source-wildcard wildcard bits to the source.
(Optional) Enters log to cause an informational logging message about the packet that matches the entry to be sent to the console.
Enters interface configuration mode.

Switch(config)# interface gigabitethernet2/0/2

ip access-group acl-id in Example:

Configures the default ACL on the port in the input direction.
Note The acl-id is an access list name or number.

Switch(config-if)# ip access-group default_acl in

exit Example:
Switch(config-if)# exit

Returns to global configuration mode.

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1548

Security

Configuring VLAN ID-based MAC Authentication

Step 7 Step 8 Step 9
Step 10 Step 11

Command or Action

Purpose

aaa authorization network default group radius Example:

Sets the authorization method to local. To remove the authorization method, use the no aaa authorization network default group radius command.

Switch(config)# aaa authorization network default group radius

ip device tracking Example:
Switch(config)# ip device tracking

Enables the IP device tracking table.
To disable the IP device tracking table, use the no ip device tracking global configuration commands.

ip device tracking probe [count | interval | use-svi] Example:
Switch(config)# ip device tracking probe count

(Optional) Configures the IP device tracking table:
· count count--Sets the number of times that the switch sends the ARP probe. The range is from 1 to 5. The default is 3.

· interval interval--Sets the number of seconds that the switch waits for a response before resending the ARP probe. The range is from 30 to 300 seconds. The default is 30 seconds.

· use-svi--Uses the switch virtual interface (SVI) IP address as source of ARP probes.

radius-server vsa send authentication Example:
Switch(config)# radius-server vsa send authentication

Configures the network access server to recognize and use vendor-specific attributes.
Note The downloadable ACL must be operational.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Configuring VLAN ID-based MAC Authentication
Beginning in privileged EXEC mode, follow these steps:

SUMMARY STEPS

1. configure terminal 2. mab request format attribute 32 vlan access-vlan 3. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1549

Configuring Flexible Authentication Ordering

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

mab request format attribute 32 vlan access-vlan Example:

Enables VLAN ID-based MAC authentication.

Switch(config)# mab request format attribute 32 vlan access-vlan

Step 3

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Configuring Flexible Authentication Ordering
The examples used in the instructions below changes the order of Flexible Authentication Ordering so that MAB is attempted before IEEE 802.1X authentication (dot1x). MAB is configured as the first authentication method, so MAB will have priority over all other authentication methods.

Note Before changing the default order and priority of these authentication methods, however, you should understand the potential consequences of those changes. See http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/application_note_c27-573287_ps6638_Products_White_Paper.html for details.
Beginning in privileged EXEC mode, follow these steps:

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode access 4. authentication order [ dot1x | mab ] | {webauth} 5. authentication priority [ dot1x | mab ] | {webauth} 6. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1550

Security

Configuring Open1x

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet 1/0/1

Step 3

switchport mode access Example:
Switch(config-if)# switchport mode access

Sets the port to access mode only if you previously configured the RADIUS server.

Step 4

authentication order [ dot1x | mab ] | {webauth} Example:

(Optional) Sets the order of authentication methods used on a port.

Switch(config-if)# authentication order mab dot1x

Step 5

authentication priority [ dot1x | mab ] | {webauth} Example:

(Optional) Adds an authentication method to the port-priority list.

Switch(config-if)# authentication priority mab dot1x

Step 6

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Related Topics Flexible Authentication Ordering, on page 1498
Configuring Open1x
Beginning in privileged EXEC mode, follow these steps to enable manual control of the port authorization state:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1551

Configuring Open1x

Security

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode access 4. authentication control-direction {both | in} 5. authentication fallback name 6. authentication host-mode [multi-auth | multi-domain | multi-host | single-host] 7. authentication open 8. authentication order [ dot1x | mab ] | {webauth} 9. authentication periodic 10. authentication port-control {auto | force-authorized | force-un authorized} 11. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet 1/0/1

Step 3

switchport mode access Example:
Switch(config-if)# switchport mode access

Sets the port to access mode only if you configured the RADIUS server.

Step 4

authentication control-direction {both | in} Example:
Switch(config-if)# authentication control-direction both

(Optional) Configures the port control as unidirectional or bidirectional.

Step 5

authentication fallback name Example:
Switch(config-if)# authentication fallback profile1

(Optional) Configures a port to use web authentication as a fallback method for clients that do not support 802.1x authentication.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1552

Security

Disabling 802.1x Authentication on the Port

Step 6 Step 7 Step 8 Step 9 Step 10 Step 11

Command or Action

Purpose

authentication host-mode [multi-auth | multi-domain (Optional) Sets the authorization manager mode on a port. | multi-host | single-host]

Example:

Switch(config-if)# authentication host-mode multi-auth

authentication open Example:
Switch(config-if)# authentication open

(Optional) Enables or disable open access on a port.

authentication order [ dot1x | mab ] | {webauth} Example:

(Optional) Sets the order of authentication methods used on a port.

Switch(config-if)# authentication order dot1x webauth

authentication periodic Example:
Switch(config-if)# authentication periodic

(Optional) Enables or disable reauthentication on a port.

authentication port-control {auto | force-authorized | (Optional) Enables manual control of the port authorization

force-un authorized}

state.

Example:

Switch(config-if)# authentication port-control auto

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Related Topics Open1x Authentication, on page 1498
Disabling 802.1x Authentication on the Port
You can disable 802.1x authentication on the port by using the no dot1x pae interface configuration command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1553

Resetting the 802.1x Authentication Configuration to the Default Values

Security

Beginning in privileged EXEC mode, follow these steps to disable 802.1x authentication on the port. This procedure is optional.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode access 4. no dot1x pae authenticator 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the port to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

Step 3

switchport mode access Example:
Switch(config-if)# switchport mode access

(Optional) Sets the port to access mode only if you configured the RADIUS server.

Step 4

no dot1x pae authenticator Example:
Switch(config-if)# no dot1x pae authenticator

Disables 802.1x authentication on the port.

Step 5

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Resetting the 802.1x Authentication Configuration to the Default Values
Beginning in privileged EXEC mode, follow these steps to reset the 802.1x authentication configuration to the default values. This procedure is optional.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1554

Security

Monitoring 802.1x Statistics and Status

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. dot1x default 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

interface interface-id Example:

Enters interface configuration mode, and specify the port to be configured.

Switch(config)# interface gigabitethernet1/0/2

Step 3

dot1x default Example:
Switch(config-if)# dot1x default

Resets the 802.1x parameters to the default values.

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Monitoring 802.1x Statistics and Status

Table 135: Privileged EXEC show Commands
Command show dot1x all statistics show dot1x interface interface-id statistics show dot1x all [count | details | statistics | summary] show dot1x interface interface-id

Purpose
Displays 802.1x statistics for all ports
Displays 802.1x statistics for a specific port
Displays the 802.1x administrative and operational status for a switch
Displays the 802.1x administrative and operational status for a specific port

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1555

Additional References

Security

Table 136: Global Configuration Commands

Command
no dot1x logging verbose

Purpose
Filters verbose 802.1x authentication messages (beginning with Cisco IOS Release 12.2(55)SE)

For detailed information about the fields in these displays, see the command reference for this release.

Additional References

Related Documents

Related Document Title Topic

Configuring Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity Control

http://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-xe-3se-3850-book.html

policies

and

Identity

Service

templates

for Session

Aware

networking.

Configuring Securing User Services Configuration Guide Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

RADIUS, TACACS+,

http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/xe-3se/3850/secuser-xe-3se-3850-libra

Secure

Shell,

802.1X

and AAA.

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1556

Security

Feature Information for 802.1x Port-Based Authentication

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for 802.1x Port-Based Authentication

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1557

Feature Information for 802.1x Port-Based Authentication

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1558

7 5 C H A P T E R
Configuring Web-Based Authentication
This chapter describes how to configure web-based authentication on the switch. It contains these sections: · Finding Feature Information, on page 1559 · Information About Web-Based Authentication, on page 1559 · How to Configure Web-Based Authentication, on page 1567 · Monitoring Web-Based Authentication Status, on page 1581 · Feature Information for Web-Based Authentication, on page 1581
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Web-Based Authentication
Use the web-based authentication feature, known as web authentication proxy, to authenticate end users on host systems that do not run the IEEE 802.1x supplicant.
Note You can configure web-based authentication on Layer 2 and Layer 3 interfaces.
When you initiate an HTTP session, web-based authentication intercepts ingress HTTP packets from the host and sends an HTML login page to the users. The users enter their credentials, which the web-based authentication feature sends to the authentication, authorization, and accounting (AAA) server for authentication. If authentication succeeds, web-based authentication sends a Login-Successful HTML page to the host and applies the access policies returned by the AAA server. If authentication fails, web-based authentication forwards a Login-Fail HTML page to the user, prompting the user to retry the login. If the user exceeds the maximum number of attempts, web-based authentication forwards a Login-Expired HTML page to the host, and the user is placed on a watch list for a waiting period.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1559

Device Roles

Security

These sections describe the role of web-based authentication as part of AAA:
Device Roles
With web-based authentication, the devices in the network have these specific roles: · Client--The device (workstation) that requests access to the LAN and the services and responds to requests from the switch. The workstation must be running an HTML browser with Java Script enabled.
· Authentication server--Authenticates the client. The authentication server validates the identity of the client and notifies the switch that the client is authorized to access the LAN and the switch services or that the client is denied.
· Switch--Controls the physical access to the network based on the authentication status of the client. The switch acts as an intermediary (proxy) between the client and the authentication server, requesting identity information from the client, verifying that information with the authentication server, and relaying a response to the client.
Figure 91: Web-Based Authentication Device Roles
This figure shows the roles of these devices in a

network.
Host Detection
The switch maintains an IP device tracking table to store information about detected hosts.
Note By default, the IP device tracking feature is disabled on a switch. You must enable the IP device tracking feature to use web-based authentication. For Layer 2 interfaces, web-based authentication detects IP hosts by using these mechanisms: · ARP based trigger--ARP redirect ACL allows web-based authentication to detect hosts with a static IP address or a dynamic IP address. · Dynamic ARP inspection · DHCP snooping--Web-based authentication is notified when the switch creates a DHCP-binding entry for the host.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1560

Security

Session Creation

Session Creation
When web-based authentication detects a new host, it creates a session as follows: · Reviews the exception list. If the host IP is included in the exception list, the policy from the exception list entry is applied, and the session is established. · Reviews for authorization bypass If the host IP is not on the exception list, web-based authentication sends a nonresponsive-host (NRH) request to the server. If the server response is access accepted, authorization is bypassed for this host. The session is established. · Sets up the HTTP intercept ACL If the server response to the NRH request is access rejected, the HTTP intercept ACL is activated, and the session waits for HTTP traffic from the host.
Authentication Process
When you enable web-based authentication, these events occur: · The user initiates an HTTP session. · The HTTP traffic is intercepted, and authorization is initiated. The switch sends the login page to the user. The user enters a username and password, and the switch sends the entries to the authentication server. · If the authentication succeeds, the switch downloads and activates the user's access policy from the authentication server. The login success page is sent to the user. · If the authentication fails, the switch sends the login fail page. The user retries the login. If the maximum number of attempts fails, the switch sends the login expired page, and the host is placed in a watch list. After the watch list times out, the user can retry the authentication process. · If the authentication server does not respond to the switch, and if an AAA fail policy is configured, the switch applies the failure access policy to the host. The login success page is sent to the user. · The switch reauthenticates a client when the host does not respond to an ARP probe on a Layer 2 interface, or when the host does not send any traffic within the idle timeout on a Layer 3 interface. · The feature applies the downloaded timeout or the locally configured session timeout. · If the terminate action is RADIUS, the feature sends a nonresponsive host (NRH) request to the server. The terminate action is included in the response from the server. · If the terminate action is default, the session is dismantled, and the applied policy is removed.
Local Web Authentication Banner
With Web Authentication, you can create a default and customized web-browser banners that appears when you log in to a switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1561

Local Web Authentication Banner

Security

The banner appears on both the login page and the authentication-result pop-up pages. The default banner messages are as follows:
· Authentication Successful · Authentication Failed · Authentication Expired
The Local Web Authentication Banner can be configured in legacy and new-style (Session-aware) CLIs as follows:
· Legacy mode--Use the ip admission auth-proxy-banner http global configuration command. · New-style mode--Use the parameter-map type webauth global bannerglobal configuration command.
The default banner Cisco Systems and Switch host-name Authentication appear on the Login Page. Cisco Systems appears on the authentication result pop-up page.
Figure 92: Authentication Successful Banner

The banner can be customized as follows: · Add a message, such as switch, router, or company name to the banner: · Legacy mode--Use the ip admission auth-proxy-banner http banner-textglobal configuration command. · New-style mode--Use the parameter-map type webauth global bannerglobal configuration command · Add a logo or text file to the banner : · Legacy mode--Use the ip admission auth-proxy-banner http file-path global configuration command.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1562

Security

Local Web Authentication Banner
· New-style mode--Use the parameter-map type webauth global banner global configuration command
Figure 93: Customized Web Banner

If you do not enable a banner, only the username and password dialog boxes appear in the web authentication login screen, and no banner appears when you log into the switch.
Figure 94: Login Screen With No Banner

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1563

Web Authentication Customizable Web Pages

Security

For more information, see the Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) and the Web Authentication Enhancements - Customizing Authentication Proxy Web Pages.

Web Authentication Customizable Web Pages
During the web-based authentication process, the switch internal HTTP server hosts four HTML pages to deliver to an authenticating client. The server uses these pages to notify you of these four-authentication process states:
· Login--Your credentials are requested.
· Success--The login was successful.
· Fail--The login failed.
· Expire--The login session has expired because of excessive login failures.

Guidelines

· You can substitute your own HTML pages for the default internal HTML pages.
· You can use a logo or specify text in the login, success, failure, and expire web pages.
· On the banner page, you can specify text in the login page.
· The pages are in HTML.
· You must include an HTML redirect command in the success page to access a specific URL.
· The URL string must be a valid URL (for example, http://www.cisco.com). An incomplete URL might cause page not found or similar errors on a web browser.
· If you configure web pages for HTTP authentication, they must include the appropriate HTML commands (for example, to set the page time out, to set a hidden password, or to confirm that the same page is not submitted twice).
· The CLI command to redirect users to a specific URL is not available when the configured login form is enabled. The administrator should ensure that the redirection is configured in the web page.
· If the CLI command redirecting users to specific URL after authentication occurs is entered and then the command configuring web pages is entered, the CLI command redirecting users to a specific URL does not take effect.
· Configured web pages can be copied to the switch boot flash or flash.
· On stackable switches, configured pages can be accessed from the flash on the stack master or members.
· The login page can be on one flash, and the success and failure pages can be another flash (for example, the flash on the stack master or a member).
· You must configure all four pages.
· The banner page has no effect if it is configured with the web page.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1564

Security

Authentication Proxy Web Page Guidelines
· All of the logo files (image, flash, audio, video, and so on) that are stored in the system directory (for example, flash, disk0, or disk) and that must be displayed on the login page must use web_auth_<filename> as the file name.
· The configured authentication proxy feature supports both HTTP and SSL. You can substitute your HTML pages for the default internal HTML pages. You can also specify a URL to which users are redirected after authentication occurs, which replaces the internal Success page.
Figure 95: Customizeable Authentication Page

Authentication Proxy Web Page Guidelines
When configuring customized authentication proxy web pages, follow these guidelines: · To enable the custom web pages feature, specify all four custom HTML files. If you specify fewer than four files, the internal default HTML pages are used. · The four custom HTML files must be present on the flash memory of the switch. The maximum size of each HTML file is 8 KB. · Any images on the custom pages must be on an accessible HTTP server. Configure an intercept ACL within the admission rule. · Any external link from a custom page requires configuration of an intercept ACL within the admission rule. · To access a valid DNS server, any name resolution required for external links or images requires configuration of an intercept ACL within the admission rule. · If the custom web pages feature is enabled, a configured auth-proxy-banner is not used. · If the custom web pages feature is enabled, the redirection URL for successful login feature is not available.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1565

Redirection URL for Successful Login Guidelines

Security

· To remove the specification of a custom file, use the no form of the command.
Because the custom login page is a public web form, consider these guidelines for the page: · The login form must accept user entries for the username and password and must show them as uname and pwd.
· The custom login page should follow best practices for a web form, such as page timeout, hidden password, and prevention of redundant submissions.
Related Topics Customizing the Authentication Proxy Web Pages, on page 1576
Redirection URL for Successful Login Guidelines
When configuring a redirection URL for successful login, consider these guidelines: · If the custom authentication proxy web pages feature is enabled, the redirection URL feature is disabled and is not available in the CLI. You can perform redirection in the custom-login success page.
· If the redirection URL feature is enabled, a configured auth-proxy-banner is not used.
· To remove the specification of a redirection URL, use the no form of the command.
· If the redirection URL is required after the web-based authentication client is successfully authenticated, then the URL string must start with a valid URL (for example, http://) followed by the URL information. If only the URL is given without http://, then the redirection URL on successful authentication might cause page not found or similar errors on a web browser.
Related Topics Specifying a Redirection URL for Successful Login, on page 1578

Web-based Authentication Interactions with Other Features

Port Security LAN Port IP

You can configure web-based authentication and port security on the same port. Web-based authentication authenticates the port, and port security manages network access for all MAC addresses, including that of the client. You can then limit the number or group of clients that can access the network through the port. For more information about enabling port security, see the .
You can configure LAN port IP (LPIP) and Layer 2 web-based authentication on the same port. The host is authenticated by using web-based authentication first, followed by LPIP posture validation. The LPIP host policy overrides the web-based authentication host policy. If the web-based authentication idle timer expires, the NAC policy is removed. The host is authenticated, and posture is validated again.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1566

Security

Gateway IP

Gateway IP

You cannot configure Gateway IP (GWIP) on a Layer 3 VLAN interface if web-based authentication is configured on any of the switch ports in the VLAN.
You can configure web-based authentication on the same Layer 3 interface as Gateway IP. The host policies for both features are applied in software. The GWIP policy overrides the web-based authentication host policy.

ACLs

If you configure a VLAN ACL or a Cisco IOS ACL on an interface, the ACL is applied to the host traffic only after the web-based authentication host policy is applied.
For Layer 2 web-based authentication, it is more secure, though not required, to configure a port ACL (PACL) as the default access policy for ingress traffic from hosts connected to the port. After authentication, the web-based authentication host policy overrides the PACL. The Policy ACL is applied to the session even if there is no ACL configured on the port.
You cannot configure a MAC ACL and web-based authentication on the same interface.
You cannot configure web-based authentication on a port whose access VLAN is configured for VACL capture.

Context-Based Access Control
Web-based authentication cannot be configured on a Layer 2 port if context-based access control (CBAC) is configured on the Layer 3 VLAN interface of the port VLAN.

EtherChannel

You can configure web-based authentication on a Layer 2 EtherChannel interface. The web-based authentication configuration applies to all member channels.

How to Configure Web-Based Authentication

Default Web-Based Authentication Configuration
The following table shows the default web-based authentication configuration.
Table 137: Default Web-based Authentication Configuration

Feature AAA RADIUS server
· IP address · UDP authentication port · Key

Default Setting Disabled
· None specified · 1645 · None specified

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1567

Web-Based Authentication Configuration Guidelines and Restrictions

Security

Feature Default value of inactivity timeout Inactivity timeout

Default Setting 3600 seconds Enabled

Web-Based Authentication Configuration Guidelines and Restrictions
· Web-based authentication is an ingress-only feature.
· You can configure web-based authentication only on access ports. Web-based authentication is not supported on trunk ports, EtherChannel member ports, or dynamic trunk ports.
· You cannot authenticate hosts on Layer 2 interfaces with static ARP cache assignment. These hosts are not detected by the web-based authentication feature because they do not send ARP messages.
· By default, the IP device tracking feature is disabled on a switch. You must enable the IP device tracking feature to use web-based authentication.
· You must configure at least one IP address to run the switch HTTP server. You must also configure routes to reach each host IP address. The HTTP server sends the HTTP login page to the host.
· Hosts that are more than one hop away might experience traffic disruption if an STP topology change results in the host traffic arriving on a different port. This occurs because the ARP and DHCP updates might not be sent after a Layer 2 (STP) topology change.
· Web-based authentication does not support VLAN assignment as a downloadable-host policy.
· Web-based authentication supports IPv6 in Session-aware policy mode. IPv6 Web-authentication requires at least one IPv6 address configured on the switch and IPv6 Snooping configured on the switchport.
· Web-based authentication and Network Edge Access Topology (NEAT) are mutually exclusive. You cannot use web-based authentication when NEAT is enabled on an interface, and you cannot use NEAT when web-based authentication is running on an interface.
· Web-based authentication NRH (Non-Responsive Host) is not supported for voice devices.
· Only the Password Authentication Protocol (PAP) is supported for web-based RADIUS authentication on controllers. The Challenge Handshake Authentication Protocol (CHAP) is not supported for web-based RADIUS authentication on controllers.
· Identify the following RADIUS security server settings that will be used while configuring switch-to-RADIUS-server communication: · Host name
· Host IP address
· Host name and specific UDP port numbers
· IP address and specific UDP port numbers
The combination of the IP address and UDP port number creates a unique identifier, that enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address. If two different host entries on the same RADIUS server are configured for the same service (for example, authentication) the second

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1568

Security

Web-Based Authentication Configuration Task List

host entry that is configured functions as the failover backup to the first one. The RADIUS host entries are chosen in the order that they were configured.
· When you configure the RADIUS server parameters:
· Specify the key string on a separate command line.
· For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server.
· When you specify the key string, use spaces within and at the end of the key. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks are part of the key. This key must match the encryption used on the RADIUS daemon.
· You can globally configure the timeout, retransmission, and encryption key values for all RADIUS servers by using with the radius-server host global configuration command. If you want to configure these options on a per-server basis, use the radius-server timeout, radius-server transmit, and the radius-server key global configuration commands. For more information, see the Cisco IOS Security Configuration Guide, Release 12.4 and the Cisco IOS Security Command Reference, Release 12.4.
Note You need to configure some settings on the RADIUS server, including: the switch IP address, the key string to be shared by both the server and the switch, and the downloadable ACL (DACL). For more information, see the RADIUS server documentation.

Web-Based Authentication Configuration Task List

Configuring the Authentication Rule and Interfaces
Examples in this section are legacy-style configurations. For new-style configurations, see the Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) This example shows how to verify the configuration:

Switch# show ip admission status

IP admission status:

Enabled interfaces

0

Total sessions

0

Init sessions

0

Max init sessions allowed

100

Limit reached

0

Hi watermark

0

TCP half-open connections

0

Hi watermark

0

TCP new connections

0

Hi watermark

0

TCP half-open + new

0

Hi watermark

0

HTTPD1 Contexts

0

Hi watermark

0

Parameter Map: Global Custom Pages Custom pages not configured Banner Banner not configured

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1569

Configuring the Authentication Rule and Interfaces

Security

Beginning in privileged EXEC mode, follow these steps to configure the authentication rule and interfaces:

SUMMARY STEPS

1. configure terminal 2. ip admission name name proxy http 3. interface type slot/port 4. ip access-group name 5. ip admission name 6. exit 7. ip device tracking 8. end 9. show ip admission status 10. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

ip admission name name proxy http Example:

Configures an authentication rule for web-based authorization.

Switch(config)# ip admission name webauth1 proxy http

Step 3 Step 4

interface type slot/port Example:
Switch(config)# interface gigabitEthernet1/0/1

Enters interface configuration mode and specifies the ingress Layer 2 or Layer 3 interface to be enabled for web-based authentication.
type can be fastethernet, gigabit ethernet, or tengigabitethernet.

ip access-group name Example:

Applies the default ACL.

Switch(config-if)# ip access-group webauthag

Step 5

ip admission name Example:
Switch(config-if)# ip admission webauth1

Configures web-based authentication on the specified interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1570

Security

Configuring AAA Authentication

Step 6 Step 7 Step 8 Step 9 Step 10

Command or Action exit Example:
Switch(config-if)# exit
ip device tracking Example:
Switch(config)# ip device tracking
end Example:
Switch(config)# end
show ip admission status Example:
Switch# show ip admission status
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Returns to configuration mode. Enables the IP device tracking table. Returns to privileged EXEC mode. Displays the configuration. (Optional) Saves your entries in the configuration file.

Configuring AAA Authentication
Beginning in privileged EXEC mode, follow these steps to configure AAA authentication:

SUMMARY STEPS

1. configure terminal 2. aaa new-model 3. aaa authentication login default group {tacacs+ | radius} 4. aaa authorization auth-proxy default group {tacacs+ | radius} 5. tacacs-server host {hostname | ip_address} 6. tacacs-server key {key-data} 7. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1571

Configuring AAA Authentication

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

aaa new-model Example:
Switch(config)# aaa new-model

Enables AAA functionality.

Step 3

aaa authentication login default group {tacacs+ | radius} Defines the list of authentication methods at login. Example:
Switch(config)# aaa authentication login default group tacacs+

Step 4

aaa authorization auth-proxy default group {tacacs+ | Creates an authorization method list for web-based

radius}

authorization.

Example:

Switch(config)# aaa authorization auth-proxy default group tacacs+

Step 5

tacacs-server host {hostname | ip_address} Example:
Switch(config)# tacacs-server host 10.1.1.1

Specifies an AAA server.

Step 6

tacacs-server key {key-data} Example:
Switch(config)# tacacs-server key

Configures the authorization and encryption key used between the switch and the TACACS server.

Step 7

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1572

Security

Configuring Switch-to-RADIUS-Server Communication

Configuring Switch-to-RADIUS-Server Communication
Beginning in privileged EXEC mode, follow these steps to configure the RADIUS server parameters:

Before you begin Identify the following RADIUS security server settings that will be used in theses instructions:
· Host name
· Host IP address
· Host name and specific UDP port numbers
· IP address and specific UDP port numbers
The combination of the IP address and UDP port number creates a unique identifier, that enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address. If two different host entries on the same RADIUS server are configured for the same service (for example, authentication) the second host entry that is configured functions as the failover backup to the first one. The RADIUS host entries are chosen in the order that they were configured.

SUMMARY STEPS

1. configure terminal 2. ip radius source-interface vlan vlan interface number 3. radius-server host {hostname | ip-address} test username username 4. radius-server key string 5. radius-server dead-criteria tries num-tries 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip radius source-interface vlan vlan interface number Example:

Specifies that the RADIUS packets have the IP address of the indicated interface.

Switch(config)# ip radius source-interface vlan 80

Step 3

radius-server host {hostname | ip-address} test username Specifies the host name or IP address of the remote

username

RADIUS server.

Example:

The test username username option enables automated

testing of the RADIUS server connection. The specified

Switch(config)# radius-server host 172.l20.39.46 username does not need to be a valid user name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1573

Configuring Switch-to-RADIUS-Server Communication

Security

Command or Action
test username user1

Step 4

radius-server key string Example:
Switch(config)# radius-server key rad123

Purpose The key option specifies an authentication and encryption key to use between the switch and the RADIUS server.
To use multiple RADIUS servers, reenter this command for each server.
Configures the authorization and encryption key used between the switch and the RADIUS daemon running on the RADIUS server.

Step 5

radius-server dead-criteria tries num-tries Example:

Specifies the number of unanswered sent messages to a RADIUS server before considering the server to be inactive. The range of num-tries is 1 to 100.

Switch(config)# radius-server dead-criteria tries When you configure the RADIUS server parameters:
30
· Specify the key string on a separate command line.

· For key string, specify the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server.

· When you specify the key string, use spaces within and at the end of the key. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks are part of the key. This key must match the encryption used on the RADIUS daemon.

· You can globally configure the timeout, retransmission, and encryption key values for all RADIUS servers by using with the radius-server host global configuration command. If you want to configure these options on a per-server basis, use the radius-server timeout, radius-server transmit, and the radius-server key global configuration commands. For more information, see the Cisco IOS Security Configuration Guide, Release 12.4 and the Cisco IOS Security Command Reference, Release 12.4.

Note You need to configure some settings on the RADIUS server, including: the switch IP address, the key string to be shared by both the server and the switch, and the downloadable ACL (DACL). For more information, see the RADIUS server documentation.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1574

Security

Configuring the HTTP Server

Step 6

Command or Action end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Configuring the HTTP Server
To use web-based authentication, you must enable the HTTP server within the switch. You can enable the server for either HTTP or HTTPS. Beginning in privileged EXEC mode, follow these steps to enable the server for either HTTP or HTTPS:

SUMMARY STEPS

1. configure terminal 2. ip http server 3. ip http secure-server 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip http server Example:
Switch(config)# ip http server

Enables the HTTP server. The web-based authentication feature uses the HTTP server to communicate with the hosts for user authentication.

Step 3

ip http secure-server Example:
Switch(config)# ip http secure-server

Step 4

end Example:

Enables HTTPS.
You can configure custom authentication proxy web pages or specify a redirection URL for successful login.
Note To ensure secure authentication when you enter the ip http secure-server command, the login page is always in HTTPS (secure HTTP) even if the user sends an HTTP request.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1575

Customizing the Authentication Proxy Web Pages

Security

Command or Action
Switch(config)# end

Purpose

Customizing the Authentication Proxy Web Pages
You can configure web authentication to display four substitute HTML pages to the user in place of the switch default HTML pages during web-based authentication.
For the equivalent Session Aware Networking configuration example for this feature, see the section "Configuring a Parameter Map for Web-Based Authentication" in the chapter, "Configuring Identity Control Policies." of the book, "Session Aware Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)."
Beginning in privileged EXEC mode, follow these steps to specify the use of your custom authentication proxy web pages:

Before you begin Store your custom HTML files on the switch flash memory.

SUMMARY STEPS

1. configure terminal 2. ip admission proxy http login page file device:login-filename 3. ip admission proxy http success page file device:success-filename 4. ip admission proxy http failure page file device:fail-filename 5. ip admission proxy http login expired page file device:expired-filename 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip admission proxy http login page file device:login-filename
Example:

Specifies the location in the switch memory file system of the custom HTML file to use in place of the default login page. The device: is flash memory.

Switch(config)# ip admission proxy http login page file disk1:login.htm

Step 3

ip admission proxy http success page file device:success-filename
Example:

Specifies the location of the custom HTML file to use in place of the default login success page.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1576

Security

Customizing the Authentication Proxy Web Pages

Command or Action

Purpose

Switch(config)# ip admission proxy http success page file disk1:success.htm

Step 4

ip admission proxy http failure page file device:fail-filename
Example:

Specifies the location of the custom HTML file to use in place of the default login failure page.

Switch(config)# ip admission proxy http fail page file disk1:fail.htm

Step 5

ip admission proxy http login expired page file device:expired-filename Example:
Switch(config)# ip admission proxy http login expired page file disk1:expired.htm

Specifies the location of the custom HTML file to use in place of the default login expired page.

Step 6

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Verifying Custom Authentication Proxy Web Pages This example shows how to verify the configuration of a custom authentication proxy web page:

Switch# show ip admission status

IP admission status:

Enabled interfaces

0

Total sessions

0

Init sessions

0

Max init sessions allowed

100

Limit reached

0

Hi watermark

0

TCP half-open connections

0

Hi watermark

0

TCP new connections

0

Hi watermark

0

TCP half-open + new

0

Hi watermark

0

HTTPD1 Contexts

0

Hi watermark

0

Parameter Map: Global Custom Pages Custom pages not configured Banner Banner not configured

Related Topics Authentication Proxy Web Page Guidelines, on page 1565

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1577

Specifying a Redirection URL for Successful Login

Security

Specifying a Redirection URL for Successful Login
Beginning in privileged EXEC mode, follow these steps to specify a URL to which the user is redirected after authentication, effectively replacing the internal Success HTML page:

SUMMARY STEPS

1. configure terminal 2. ip admission proxy http success redirect url-string 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip admission proxy http success redirect url-string Example:

Specifies a URL for redirection of the user in place of the default login success page.

Switch(config)# ip admission proxy http success redirect www.example.com

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Verifying Redirection URL for Successful Login

Switch# show ip admission status

Enabled interfaces

0

Total sessions

0

Init sessions

0

Max init sessions allowed

100

Limit reached

0

Hi watermark

0

TCP half-open connections

0

Hi watermark

0

TCP new connections

0

Hi watermark

0

TCP half-open + new

0

Hi watermark

0

HTTPD1 Contexts

0

Hi watermark

0

Parameter Map: Global Custom Pages Custom pages not configured Banner Banner not configured

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1578

Security

Configuring the Web-Based Authentication Parameters

Related Topics Redirection URL for Successful Login Guidelines, on page 1566

Configuring the Web-Based Authentication Parameters
Beginning in privileged EXEC mode, follow these steps to configure the maximum number of failed login attempts before the client is placed in a watch list for a waiting period:

SUMMARY STEPS

1. configure terminal 2. ip admission max-login-attempts number 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

ip admission max-login-attempts number Example:

Set sthe maximum number of failed login attempts. The range is 1 to 2147483647 attempts. The default is 5.

Switch(config)# ip admission max-login-attempts 10

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Configuring a Web Authentication Local Banner
Beginning in privileged EXEC mode, follow these steps to configure a local banner on a switch that has web authentication configured.

SUMMARY STEPS

1. configure terminal 2. ip admission auth-proxy-banner http [banner-text | file-path] 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1579

Removing Web-Based Authentication Cache Entries

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

ip admission auth-proxy-banner http [banner-text | Enables the local banner.

file-path]

(Optional) Create a custom banner by entering C banner-text

Example:

C (where C is a delimiting character), or file-path that

indicates a file (for example, a logo or text file) that appears

Switch(config)# ip admission auth-proxy-banner http in the banner.

C My Switch C

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Removing Web-Based Authentication Cache Entries
Beginning in privileged EXEC mode, follow these steps to remove web-based authentication cache entries:

SUMMARY STEPS

1. clear ip auth-proxy cache {* | host ip address} 2. clear ip admission cache {* | host ip address}

DETAILED STEPS

Step 1

Command or Action clear ip auth-proxy cache {* | host ip address} Example:

Switch# clear ip auth-proxy cache 192.168.4.5

Purpose
Delete authentication proxy entries. Use an asterisk to delete all cache entries. Enter a specific IP address to delete the entry for a single host.

Step 2

clear ip admission cache {* | host ip address} Example:
Switch# clear ip admission cache 192.168.4.5

Delete authentication proxy entries. Use an asterisk to delete all cache entries. Enter a specific IP address to delete the entry for a single host.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1580

Security

Monitoring Web-Based Authentication Status

Monitoring Web-Based Authentication Status

Use the commands in this topic to display the web-based authentication settings for all interfaces or for specific ports.
Table 138: Privileged EXEC show Commands

Command

Purpose

show authentication sessions method Displays the web-based authentication settings for all interfaces for

webauth

fastethernet, gigabitethernet, or tengigabitethernet

show authentication sessions interface Displays the web-based authentication settings for the specified

type slot/port[details]

interface for fastethernet, gigabitethernet, or tengigabitethernet.

In Session Aware Networking mode, use the show access-session interface command.

Feature Information for Web-Based Authentication

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1581

Feature Information for Web-Based Authentication

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1582

7 6 C H A P T E R
Configuring Port-Based Traffic Control
· Overview of Port-Based Traffic Control , on page 1584 · Finding Feature Information, on page 1584 · Information About Storm Control, on page 1584 · How to Configure Storm Control, on page 1586 · Finding Feature Information, on page 1588 · Information About Protected Ports, on page 1588 · How to Configure Protected Ports, on page 1589 · Monitoring Protected Ports, on page 1590 · Where to Go Next, on page 1590 · Additional References, on page 1591 · Feature Information, on page 1591 · Finding Feature Information, on page 1591 · Information About Port Blocking, on page 1592 · How to Configure Port Blocking, on page 1592 · Monitoring Port Blocking, on page 1594 · Where to Go Next, on page 1594 · Additional References, on page 1594 · Feature Information, on page 1595 · Prerequisites for Port Security, on page 1595 · Restrictions for Port Security, on page 1595 · Information About Port Security, on page 1595 · How to Configure Port Security, on page 1600 · Configuration Examples for Port Security, on page 1606 · Additional References, on page 1607 · Finding Feature Information, on page 1608 · Information About Protocol Storm Protection, on page 1608 · How to Configure Protocol Storm Protection, on page 1609 · Monitoring Protocol Storm Protection, on page 1610 · Additional References, on page 1610
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1583

Overview of Port-Based Traffic Control

Security

Overview of Port-Based Traffic Control
Port-based traffic control is a set of Layer 2 features on the Cisco Catalyst switches used to filter or block packets at the port level in response to specific traffic conditions. The following port-based traffic control features are supported in the Cisco IOS Release for which this guide is written:
· Storm Control · Protected Ports · Private Virtual Local Area Network (PVLAN) · Port Blocking · Port Security · Protocol Storm Protection
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Storm Control
Storm Control
Storm control prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast storm on one of the physical interfaces. A LAN storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance. Errors in the protocol-stack implementation, mistakes in network configurations, or users issuing a denial-of-service attack can cause a storm. Storm control (or traffic suppression) monitors packets passing from an interface to the switching bus and determines if the packet is unicast, multicast, or broadcast. The switch counts the number of packets of a specified type received within the 1-second time interval and compares the measurement with a predefined suppression-level threshold.
How Traffic Activity is Measured
Storm control uses one of these methods to measure traffic activity: · Bandwidth as a percentage of the total available bandwidth of the port that can be used by the broadcast, multicast, or unicast traffic · Traffic rate in packets per second at which broadcast, multicast, or unicast packets are received
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1584

Security

Traffic Patterns

· Traffic rate in bits per second at which broadcast, multicast, or unicast packets are received · Traffic rate in packets per second and for small frames. This feature is enabled globally. The threshold
for small frames is configured for each interface.
With each method, the port blocks traffic when the rising threshold is reached. The port remains blocked until the traffic rate drops below the falling threshold (if one is specified) and then resumes normal forwarding. If the falling suppression level is not specified, the switch blocks all traffic until the traffic rate drops below the rising suppression level. In general, the higher the level, the less effective the protection against broadcast storms.
Note When the storm control threshold for multicast traffic is reached, all multicast traffic except control traffic, such as bridge protocol data unit (BDPU) and Cisco Discovery Protocol (CDP) frames, are blocked. However, the switch does not differentiate between routing updates, such as OSPF, and regular multicast data traffic, so both types of traffic are blocked.
Traffic Patterns
Figure 96: Broadcast Storm Control Example
This example shows broadcast traffic patterns on an interface over a given period of time.

Broadcast traffic being forwarded exceeded the configured threshold between time intervals T1 and T2 and between T4 and T5. When the amount of specified traffic exceeds the threshold, all traffic of that kind is dropped for the next time period. Therefore, broadcast traffic is blocked during the intervals following T2 and T5. At the next time interval (for example, T3), if broadcast traffic does not exceed the threshold, it is again forwarded. The combination of the storm-control suppression level and the 1-second time interval controls the way the storm control algorithm works. A higher threshold allows more packets to pass through. A threshold value of 100 percent means that no limit is placed on the traffic. A value of 0.0 means that all broadcast, multicast, or unicast traffic on that port is blocked.
Note Because packets do not arrive at uniform intervals, the 1-second time interval during which traffic activity is measured can affect the behavior of storm control.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1585

How to Configure Storm Control

Security

You use the storm-control interface configuration commands to set the threshold value for each traffic type.

How to Configure Storm Control

Configuring Storm Control and Threshold Levels
You configure storm control on a port and enter the threshold level that you want to be used for a particular type of traffic.
However, because of hardware limitations and the way in which packets of different sizes are counted, threshold percentages are approximations. Depending on the sizes of the packets making up the incoming traffic, the actual enforced threshold might differ from the configured level by several percentage points.

Before you begin
Storm control is supported on physical interfaces. You can also configure storm control on an EtherChannel. When storm control is configured on an EtherChannel, the storm control settings propagate to the EtherChannel physical interfaces.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. storm-control {broadcast | multicast | unicast} level {level [level-low] | bps bps [bps-low] | pps pps
[pps-low]} 4. storm-control action {shutdown | trap} 5. end 6. show storm-control [interface-id] [broadcast | multicast | unicast] 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal
interface interface-id Example:

Specifies the interface to be configured, and enter interface configuration mode.

Step 3

Switch(config)# interface gigabitethernet1/0/1

storm-control {broadcast | multicast | unicast} level Configures broadcast, multicast, or unicast storm control. {level [level-low] | bps bps [bps-low] | pps pps [pps-low]} By default, storm control is disabled.

Example:

The keywords have these meanings:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1586

Security

Configuring Storm Control and Threshold Levels

Step 4

Command or Action

Purpose

Switch(config-if)# storm-control unicast level 87 65

· For level, specifies the rising threshold level for broadcast, multicast, or unicast traffic as a percentage (up to two decimal places) of the bandwidth. The port blocks traffic when the rising threshold is reached. The range is 0.00 to 100.00.

· (Optional) For level-low, specifies the falling threshold level as a percentage (up to two decimal places) of the bandwidth. This value must be less than or equal to the rising suppression value. The port forwards traffic when traffic drops below this level. If you do not configure a falling suppression level, it is set to the rising suppression level. The range is 0.00 to 100.00.

If you set the threshold to the maximum value (100 percent), no limit is placed on the traffic. If you set the threshold to 0.0, all broadcast, multicast, and unicast traffic on that port is blocked.

· For bps bps, specifies the rising threshold level for broadcast, multicast, or unicast traffic in bits per second (up to one decimal place). The port blocks traffic when the rising threshold is reached. The range is 0.0 to 10000000000.0.

· (Optional) For bps-low, specifies the falling threshold level in bits per second (up to one decimal place). It can be less than or equal to the rising threshold level. The port forwards traffic when traffic drops below this level. The range is 0.0 to 10000000000.0.

· For pps pps, specifies the rising threshold level for broadcast, multicast, or unicast traffic in packets per second (up to one decimal place). The port blocks traffic when the rising threshold is reached. The range is 0.0 to 10000000000.0.

· (Optional) For pps-low, specifies the falling threshold level in packets per second (up to one decimal place). It can be less than or equal to the rising threshold level. The port forwards traffic when traffic drops below this level. The range is 0.0 to 10000000000.0.

storm-control action {shutdown | trap} Example:
Switch(config-if)# storm-control action trap

For BPS and PPS settings, you can use metric suffixes such as k, m, and g for large number thresholds.
Specifies the action to be taken when a storm is detected. The default is to filter out the traffic and not to send traps.
· Select the shutdown keyword to error-disable the port during a storm.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1587

Finding Feature Information

Security

Step 5 Step 6 Step 7

Command or Action

Purpose
· Select the trap keyword to generate an SNMP trap when a storm is detected.

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

show storm-control [interface-id] [broadcast | multicast Verifies the storm control suppression levels set on the

| unicast]

interface for the specified traffic type. If you do not enter

Example:

a traffic type, broadcast storm control settings are displayed.

Switch# show storm-control gigabitethernet1/0/1 unicast

copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Protected Ports
Protected Ports
Some applications require that no traffic be forwarded at Layer 2 between ports on the same switch so that one neighbor does not see the traffic generated by another neighbor. In such an environment, the use of protected ports ensures that there is no exchange of unicast, broadcast, or multicast traffic between these ports on the switch. Protected ports have these features:
· A protected port does not forward any traffic (unicast, multicast, or broadcast) to any other port that is also a protected port. Data traffic cannot be forwarded between protected ports at Layer 2; only control traffic, such as PIM packets, is forwarded because these packets are processed by the CPU and forwarded in software. All data traffic passing between protected ports must be forwarded through a Layer 3 device.
· Forwarding behavior between a protected port and a nonprotected port proceeds as usual.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1588

Security

Default Protected Port Configuration

Because a switch stack represents a single logical switch, Layer 2 traffic is not forwarded between any protected ports in the switch stack, whether they are on the same or different switches in the stack.
Default Protected Port Configuration
The default is to have no protected ports defined.
Protected Ports Guidelines
You can configure protected ports on a physical interface (for example, Gigabit Ethernet port 1) or an EtherChannel group (for example, port-channel 5). When you enable protected ports for a port channel, it is enabled for all ports in the port-channel group. Do not configure a private-VLAN port as a protected port. Do not configure a protected port as a private-VLAN port. A private-VLAN isolated port does not forward traffic to other isolated ports or community ports.

How to Configure Protected Ports

Configuring a Protected Port

Before you begin Protected ports are not pre-defined. This is the task to configure one.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport protected 4. end 5. show interfaces interface-id switchport 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the interface to be configured, and enter interface configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1589

Monitoring Protected Ports

Security

Command or Action

Purpose

Switch(config)# interface gigabitethernet1/0/1

Step 3

switchport protected Example:
Switch(config-if)# switchport protected

Configures the interface to be a protected port.

Step 4

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 5

show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet1/0/1 switchport

Verifies your entries.

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Monitoring Protected Ports
Table 139: Commands for Displaying Protected Port Settings
Command show interfaces [interface-id] switchport

Purpose
Displays the administrative and operational status of all switching (nonrouting) ports or the specified port, including port blocking and port protection settings.

Where to Go Next
·

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1590

Security

Additional References

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information
Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1591

Information About Port Blocking

Security

Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Port Blocking
Port Blocking
By default, the switch floods packets with unknown destination MAC addresses out of all ports. If unknown unicast and multicast traffic is forwarded to a protected port, there could be security issues. To prevent unknown unicast or multicast traffic from being forwarded from one port to another, you can block a port (protected or nonprotected) from flooding unknown unicast or multicast packets to other ports.

Note With multicast traffic, the port blocking feature blocks only pure Layer 2 packets. Multicast packets that contain IPv4 or IPv6 information in the header are not blocked.

How to Configure Port Blocking

Blocking Flooded Traffic on an Interface

Before you begin
The interface can be a physical interface or an EtherChannel group. When you block multicast or unicast traffic for a port channel, it is blocked on all ports in the port-channel group.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport block multicast 4. switchport block unicast 5. end 6. show interfaces interface-id switchport 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1592

Security

Blocking Flooded Traffic on an Interface

Command or Action
Switch# configure terminal

Purpose

Step 2

interface interface-id Example:

Specifies the interface to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3

switchport block multicast Example:
Switch(config-if)# switchport block multicast

Blocks unknown multicast forwarding out of the port.
Note Only pure Layer 2 multicast traffic is blocked. Multicast packets that contain IPv4 or IPv6 information in the header are not blocked.

Step 4

switchport block unicast Example:
Switch(config-if)# switchport block unicast

Blocks unknown unicast forwarding out of the port.

Step 5

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 6

show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet1/0/1 switchport

Verifies your entries.

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1593

Monitoring Port Blocking

Security

Monitoring Port Blocking
Table 140: Commands for Displaying Port Blocking Settings
Command show interfaces [interface-id] switchport

Purpose
Displays the administrative and operational status of all switching (nonrouting) ports or the specified port, including port blocking and port protection settings.

Where to Go Next
·

Additional References

Related Documents

Related Topic

Document Title

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title

MIBs
MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1594

Security

Feature Information

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information
Release Cisco IOS XE 3.3SE
Prerequisites for Port Security

Feature Information This feature was introduced.

Note If you try to set the maximum value to a number less than the number of secure addresses already configured on an interface, the command is rejected.
Restrictions for Port Security
The maximum number of secure MAC addresses that you can configure on a switch or switch stack is set by the maximum number of available MAC addresses allowed in the system. This number is determined by the active Switch Database Management (SDM) template. This number is the total of available MAC addresses, including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces.
Information About Port Security
Port Security
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1595

Types of Secure MAC Addresses

Security

of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.
If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged. Related Topics
Enabling and Configuring Port Security, on page 1600 Configuration Examples for Port Security, on page 1606
Types of Secure MAC Addresses
The switch supports these types of secure MAC addresses:
· Static secure MAC addresses--These are manually configured by using the switchport port-security mac-address mac-address interface configuration command, stored in the address table, and added to the switch running configuration.
· Dynamic secure MAC addresses--These are dynamically configured, stored only in the address table, and removed when the switch restarts.
· Sticky secure MAC addresses--These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, when the switch restarts, the interface does not need to dynamically reconfigure them.
Sticky Secure MAC Addresses
You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. The interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. All sticky secure MAC addresses are added to the running configuration.
The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the sticky secure addresses, they are lost.
If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration.
Security Violations
It is a security violation when one of these situations occurs:
· The maximum number of secure MAC addresses have been added to the address table, and a station whose MAC address is not in the address table attempts to access the interface.
· An address learned or configured on one secure interface is seen on another secure interface in the same VLAN.
· Running diagnostic tests with port security enabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1596

Security

Security Violations

You can configure the interface for one of three violation modes, based on the action to be taken if a violation occurs:
· protect--when the number of secure MAC addresses reaches the maximum limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred.

Note We do not recommend configuring the protect violation mode on a trunk port. The protect mode disables learning when any VLAN reaches its maximum limit, even if the port has not reached its maximum limit.

· restrict--when the number of secure MAC addresses reaches the maximum limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the number of maximum allowable addresses. In this mode, you are notified that a security violation has occurred. An SNMP trap is sent, a syslog message is logged, and the violation counter increments.
· shutdown--a port security violation causes the interface to become error-disabled and to shut down immediately, and the port LED turns off. When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command, or you can manually re-enable it by entering the shutdown and no shut down interface configuration commands. This is the default mode.
· shutdown vlan--Use to set the security violation mode per-VLAN. In this mode, the VLAN is error disabled instead of the entire port when a violation occurs

This table shows the violation mode and the actions taken when you configure an interface for port security.
Table 141: Security Violation Mode Actions

Violation Mode

Traffic is forwarded
21

Sends SNMP Sends syslog Displays error Violation

trap

message

message

counter

22

increments

Shuts down port

protect

No

restrict

No

shutdown No

shutdown No vlan

No

No

No

Yes

Yes

No

No

No

No

No

Yes

No

No

No

Yes

No

Yes

Yes

Yes

No

23

21 Packets with unknown source addresses are dropped until you remove a sufficient number of secure
MAC addresses. 22 The switch returns an error message if you manually configure an address that would cause a security
violation. 23 Shuts down only the VLAN on which the violation occurred.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1597

Port Security Aging

Security

Port Security Aging
You can use port security aging to set the aging time for all secure addresses on a port. Two types of aging are supported per port:
· Absolute--The secure addresses on the port are deleted after the specified aging time.
· Inactivity--The secure addresses on the port are deleted only if the secure addresses are inactive for the specified aging time.
Related Topics Enabling and Configuring Port Security Aging, on page 1605

Port Security and Switch Stacks
When a switch joins a stack, the new switch will get the configured secure addresses. All dynamic secure addresses are downloaded by the new stack member from the other stack members.
When a switch (either the active switch or a stack member) leaves the stack, the remaining stack members are notified, and the secure MAC addresses configured or learned by that switch are deleted from the secure MAC address table.

Default Port Security Configuration

Table 142: Default Port Security Configuration

Feature

Default Setting

Port security

Disabled on a port.

Sticky address learning

Disabled.

Maximum number of secure MAC addresses per port 1.

Violation mode

Shutdown. The port shuts down when the maximum number of secure MAC addresses is exceeded.

Port security aging

Disabled. Aging time is 0. Static aging is disabled. Type is absolute.

Port Security Configuration Guidelines
· Port security can only be configured on static access ports or trunk ports. A secure port cannot be a dynamic access port.
· A secure port cannot be a destination port for Switched Port Analyzer (SPAN).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1598

Security

Port Security Configuration Guidelines

·
Note Voice VLAN is only supported on access ports and not on trunk ports, even though the configuration is allowed.

· A secure port cannot be a private-VLAN port.
· When you enable port security on an interface that is also configured with a voice VLAN, set the maximum allowed secure addresses on the port to two. When the port is connected to a Cisco IP phone, the IP phone requires one MAC address. The Cisco IP phone address is learned on the voice VLAN, but is not learned on the access VLAN. If you connect a single PC to the Cisco IP phone, no additional MAC addresses are required. If you connect more than one PC to the Cisco IP phone, you must configure enough secure addresses to allow one for each PC and one for the phone.
· When a trunk port configured with port security and assigned to an access VLAN for data traffic and to a voice VLAN for voice traffic, entering the switchport voice and switchport priority extend interface configuration commands has no effect.
When a connected device uses the same MAC address to request an IP address for the access VLAN and then an IP address for the voice VLAN, only the access VLAN is assigned an IP address.
· When you enter a maximum secure address value for an interface, and the new value is greater than the previous value, the new value overwrites the previously configured value. If the new value is less than the previous value and the number of configured secure addresses on the interface exceeds the new value, the command is rejected.
· The switch does not support port security aging of sticky secure MAC addresses.

This table summarizes port security compatibility with other port-based features.
Table 143: Port Security Compatibility with Other Switch Features

Type of Port or Feature on Port DTP 24 port 25 Trunk port Dynamic-access port 26 Routed port SPAN source port SPAN destination port EtherChannel Tunneling port Protected port IEEE 802.1x port Voice VLAN port 27

Compatible with Port Security No Yes No No Yes No Yes Yes Yes Yes Yes

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1599

Overview of Port-Based Traffic Control

Security

Type of Port or Feature on Port

Compatible with Port Security

IP source guard

Yes

Dynamic Address Resolution Protocol (ARP)

Yes

inspection

Flex Links

Yes

24 DTP=Dynamic Trunking Protocol 25 A port configured with the switchport mode dynamic interface configuration command. 26 A VLAN Query Protocol (VQP) port configured with the switchport access vlan dynamic interface
configuration command. 27 You must set the maximum allowed secure addresses on the port to two plus the maximum number of
secure addresses allowed on the access VLAN.

Overview of Port-Based Traffic Control
Port-based traffic control is a set of Layer 2 features on the Cisco Catalyst switches used to filter or block packets at the port level in response to specific traffic conditions. The following port-based traffic control features are supported in the Cisco IOS Release for which this guide is written:
· Storm Control · Protected Ports · Private Virtual Local Area Network (PVLAN) · Port Blocking · Port Security · Protocol Storm Protection

How to Configure Port Security

Enabling and Configuring Port Security

Before you begin
This task restricts input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port:

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode {access | trunk} 4. switchport voice vlan vlan-id 5. switchport port-security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1600

Security

Enabling and Configuring Port Security

6. switchport port-security [maximum value [vlan {vlan-list | {access | voice}}]] 7. switchport port-security violation {protect | restrict | shutdown | shutdown vlan} 8. switchport port-security [mac-address mac-address [vlan {vlan-id | {access | voice}}] 9. switchport port-security mac-address sticky 10. switchport port-security mac-address sticky [mac-address | vlan {vlan-id | {access | voice}}] 11. end 12. show port-security 13. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the interface to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3

switchport mode {access | trunk} Example:
Switch(config-if)# switchport mode access

Sets the interface switchport mode as access or trunk; an interface in the default mode (dynamic auto) cannot be configured as a secure port.

Step 4

switchport voice vlan vlan-id Example:
Switch(config-if)# switchport voice vlan 22

Enables voice VLAN on a port. vlan-id--Specifies the VLAN to be used for voice traffic.

Step 5

switchport port-security Example:
Switch(config-if)# switchport port-security

Enable port security on the interface.

Step 6

switchport port-security [maximum value [vlan {vlan-list | {access | voice}}]] Example:
Switch(config-if)# switchport port-security maximum 20

(Optional) Sets the maximum number of secure MAC addresses for the interface. The maximum number of secure MAC addresses that you can configure on a switch or switch stack is set by the maximum number of available MAC addresses allowed in the system. This number is set by the active Switch Database Management (SDM) template. This number is the total of available MAC

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1601

Enabling and Configuring Port Security

Security

Step 7

Command or Action

Purpose addresses, including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces.
(Optional) vlan--sets a per-VLAN maximum value
Enter one of these options after you enter the vlan keyword:
· vlan-list--On a trunk port, you can set a per-VLAN maximum value on a range of VLANs separated by a hyphen or a series of VLANs separated by commas. For nonspecified VLANs, the per-VLAN maximum value is used.
· access--On an access port, specifies the VLAN as an access VLAN.
· voice--On an access port, specifies the VLAN as a voice VLAN.
Note The voice keyword is available only if a voice VLAN is configured on a port and if that port is not the access VLAN. If an interface is configured for voice VLAN, configure a maximum of two secure MAC addresses.

switchport port-security violation {protect | restrict | (Optional) Sets the violation mode, the action to be taken

shutdown | shutdown vlan}

when a security violation is detected, as one of these:

Example:
Switch(config-if)# switchport port-security violation restrict

· protect--When the number of port secure MAC addresses reaches the maximum limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses to drop below the maximum value or increase the number of maximum allowable addresses. You are not notified that a security violation has occurred.

Note We do not recommend configuring the protect mode on a trunk port. The protect mode disables learning when any VLAN reaches its maximum limit, even if the port has not reached its maximum limit.

· restrict--When the number of secure MAC addresses reaches the limit allowed on the port, packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses or increase the number of maximum allowable addresses. An SNMP trap is sent, a syslog message is logged, and the violation counter increments.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1602

Security

Enabling and Configuring Port Security

Step 8

Command or Action

Purpose
· shutdown--The interface is error-disabled when a violation occurs, and the port LED turns off. An SNMP trap is sent, a syslog message is logged, and the violation counter increments.
· shutdown vlan--Use to set the security violation mode per VLAN. In this mode, the VLAN is error disabled instead of the entire port when a violation occurs.
Note When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command. You can manually re-enable it by entering the shutdown and no shutdown interface configuration commands or by using the clear errdisable interface vlan privileged EXEC command.

switchport port-security [mac-address mac-address [vlan {vlan-id | {access | voice}}] Example:
Switch(config-if)# switchport port-security mac-address 00:A0:C7:12:C9:25 vlan 3 voice

(Optional) Enters a secure MAC address for the interface. You can use this command to enter the maximum number of secure MAC addresses. If you configure fewer secure MAC addresses than the maximum, the remaining MAC addresses are dynamically learned.
Note If you enable sticky learning after you enter this command, the secure addresses that were dynamically learned are converted to sticky secure MAC addresses and are added to the running configuration.
(Optional) vlan--sets a per-VLAN maximum value.
Enter one of these options after you enter the vlan keyword:
· vlan-id--On a trunk port, you can specify the VLAN ID and the MAC address. If you do not specify a VLAN ID, the native VLAN is used.
· access--On an access port, specifies the VLAN as an access VLAN.
· voice--On an access port, specifies the VLAN as a voice VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1603

Enabling and Configuring Port Security

Security

Step 9 Step 10
Step 11 Step 12

Command or Action

Purpose
Note The voice keyword is available only if a voice VLAN is configured on a port and if that port is not the access VLAN. If an interface is configured for voice VLAN, configure a maximum of two secure MAC addresses.

switchport port-security mac-address sticky Example:

(Optional) Enables sticky learning on the interface.

Switch(config-if)# switchport port-security mac-address sticky

switchport port-security mac-address sticky [mac-address | vlan {vlan-id | {access | voice}}] Example:
Switch(config-if)# switchport port-security mac-address sticky 00:A0:C7:12:C9:25 vlan voice

(Optional) Enters a sticky secure MAC address, repeating the command as many times as necessary. If you configure fewer secure MAC addresses than the maximum, the remaining MAC addresses are dynamically learned, are converted to sticky secure MAC addresses, and are added to the running configuration.
Note If you do not enable sticky learning before this command is entered, an error message appears, and you cannot enter a sticky secure MAC address.

(Optional) vlan--sets a per-VLAN maximum value.
Enter one of these options after you enter the vlan keyword:
· vlan-id--On a trunk port, you can specify the VLAN ID and the MAC address. If you do not specify a VLAN ID, the native VLAN is used.
· access--On an access port, specifies the VLAN as an access VLAN.
· voice--On an access port, specifies the VLAN as a voice VLAN.

Note The voice keyword is available only if a voice VLAN is configured on a port and if that port is not the access VLAN.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

show port-security Example:

Verifies your entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1604

Security

Enabling and Configuring Port Security Aging

Step 13

Command or Action
Switch# show port-security
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Related Topics Port Security, on page 1595 Configuration Examples for Port Security, on page 1606

Enabling and Configuring Port Security Aging
Use this feature to remove and add devices on a secure port without manually deleting the existing secure MAC addresses and to still limit the number of secure addresses on a port. You can enable or disable the aging of secure addresses on a per-port basis.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport port-security aging {static | time time | type {absolute | inactivity}} 4. end 5. show port-security [interface interface-id] [address] 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the interface to be configured, and enter interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3

switchport port-security aging {static | time time | type Enables or disable static aging for the secure port, or set the

{absolute | inactivity}}

aging time or type.

Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1605

Configuration Examples for Port Security

Security

Step 4 Step 5 Step 6

Command or Action

Purpose

Note Switch(config-if)# switchport port-security aging
time 120

The switch does not support port security aging of sticky secure addresses.

Enter static to enable aging for statically configured secure addresses on this port.

For time, specifies the aging time for this port. The valid range is from 0 to 1440 minutes.

For type, select one of these keywords:

· absolute--Sets the aging type as absolute aging. All the secure addresses on this port age out exactly after the time (minutes) specified lapses and are removed from the secure address list.

· inactivity--Sets the aging type as inactivity aging. The secure addresses on this port age out only if there is no data traffic from the secure source addresses for the specified time period.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end
show port-security [interface interface-id] [address] Example:

Verifies your entries.

Switch# show port-security interface gigabitethernet1/0/1
copy running-config startup-config Example:

(Optional) Saves your entries in the configuration file.

Switch# copy running-config startup-config

Related Topics Port Security Aging, on page 1598

Configuration Examples for Port Security
This example shows how to enable port security on a port and to set the maximum number of secure addresses to 50. The violation mode is the default, no static secure MAC addresses are configured, and sticky learning is enabled.
Switch(config)# interface gigabitethernet1/0/1 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1606

Security

Additional References

Switch(config-if)# switchport port-security maximum 50 Switch(config-if)# switchport port-security mac-address sticky
This example shows how to configure a static secure MAC address on VLAN 3 on a port:
Switch(config)# interface gigabitethernet1/0/2 Switch(config-if)# switchport mode trunk Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address 0000.0200.0004 vlan 3
This example shows how to enable sticky port security on a port, to manually configure MAC addresses for data VLAN and voice VLAN, and to set the total maximum number of secure addresses to 20 (10 for data VLAN and 10 for voice VLAN).
Switch(config)# interface tengigabitethernet1/0/1 Switch(config-if)# switchport access vlan 21 Switch(config-if)# switchport mode access Switch(config-if)# switchport voice vlan 22 Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 20 Switch(config-if)# switchport port-security violation restrict Switch(config-if)# switchport port-security mac-address sticky Switch(config-if)# switchport port-security mac-address sticky 0000.0000.0002 Switch(config-if)# switchport port-security mac-address 0000.0000.0003 Switch(config-if)# switchport port-security mac-address sticky 0000.0000.0001 vlan voice Switch(config-if)# switchport port-security mac-address 0000.0000.0004 vlan voice Switch(config-if)# switchport port-security maximum 10 vlan access Switch(config-if)# switchport port-security maximum 10 vlan voice
Related Topics Port Security, on page 1595 Enabling and Configuring Port Security, on page 1600

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1607

Finding Feature Information

Security

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Protocol Storm Protection
Protocol Storm Protection
When a switch is flooded with Address Resolution Protocol (ARP) or control packets, high CPU utilization can cause the CPU to overload. These issues can occur:
· Routing protocol can flap because the protocol control packets are not received, and neighboring adjacencies are dropped.
· Spanning Tree Protocol (STP) reconverges because the STP bridge protocol data unit (BPDU) cannot be sent or received.
· CLI is slow or unresponsive.
Using protocol storm protection, you can control the rate at which control packets are sent to the switch by specifying the upper threshold for the packet flow rate. The supported protocols are ARP, ARP snooping, Dynamic Host Configuration Protocol (DHCP) v4, DHCP snooping, Internet Group Management Protocol (IGMP), and IGMP snooping. When the packet rate exceeds the defined threshold, the switch drops all traffic arriving on the specified virtual port for 30 seconds. The packet rate is measured again, and protocol storm protection is again applied if necessary.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1608

Security

Default Protocol Storm Protection Configuration

For further protection, you can manually error disable the virtual port, blocking all incoming traffic on the virtual port. You can manually enable the virtual port or set a time interval for automatic re-enabling of the virtual port.

Note Excess packets are dropped on no more than two virtual ports. Virtual port error disabling is not supported for EtherChannel and Flexlink interfaces

Default Protocol Storm Protection Configuration
Protocol storm protection is disabled by default. When it is enabled, auto-recovery of the virtual port is disabled by default.
How to Configure Protocol Storm Protection

Enabling Protocol Storm Protection

SUMMARY STEPS

1. configure terminal 2. psp {arp | dhcp | igmp} pps value 3. errdisable detect cause psp 4. errdisable recovery interval time 5. end 6. show psp config {arp | dhcp | igmp}

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

psp {arp | dhcp | igmp} pps value Example:
Switch(config)# psp dhcp pps 35

Step 3

errdisable detect cause psp Example:

Purpose Enters global configuration mode.
Configures protocol storm protection for ARP, IGMP, or DHCP. For value, specifies the threshold value for the number of packets per second. If the traffic exceeds this value, protocol storm protection is enforced. The range is from 5 to 50 packets per second. (Optional) Enables error-disable detection for protocol storm protection. If this feature is enabled, the virtual port is error

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1609

Monitoring Protocol Storm Protection

Security

Command or Action
Switch(config)# errdisable detect cause psp

Step 4

errdisable recovery interval time Example:
Switch

Step 5

end Example:
Switch(config)# end

Step 6

show psp config {arp | dhcp | igmp} Example:
Switch# show psp config dhcp

Purpose disabled. If this feature is disabled, the port drops excess packets without error disabling the port. (Optional) Configures an auto-recovery time (in seconds) for error-disabled virtual ports. When a virtual port is error-disabled, the switch auto-recovers after this time. The range is from 30 to 86400 seconds.
Returns to privileged EXEC mode.
Verifies your entries.

Monitoring Protocol Storm Protection

Command show psp config {arp | dhcp | igmp}

Purpose Verify your entries.

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1610

Security

Additional References

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1611

Additional References

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1612

7 7 C H A P T E R
Configuring IPv6 First Hop Security
· Finding Feature Information, on page 1613 · Prerequisites for First Hop Security in IPv6, on page 1613 · Restrictions for First Hop Security in IPv6, on page 1613 · Information about First Hop Security in IPv6, on page 1614 · How to Configure an IPv6 Snooping Policy, on page 1616 · How to Configure the IPv6 Binding Table Content , on page 1621 · How to Configure an IPv6 Neighbor Discovery Inspection Policy, on page 1622 · How to Configure an IPv6 Router Advertisement Guard Policy, on page 1627 · How to Configure an IPv6 DHCP Guard Policy , on page 1632 · Additional References, on page 1637
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for First Hop Security in IPv6
· You have configured the necessary IPv6 enabled SDM template. · You should be familiar with the IPv6 neighbor discovery feature. For information, see the "Implementing
IPv6 Addressing and Basic Connectivity" chapter of the Cisco IOS IPv6 Configuration Library on Cisco.com.
Restrictions for First Hop Security in IPv6
· The following restrictions apply when applying FHS policies to EtherChannel interfaces (Port Channels): · A physical port with an FHS policy attached cannot join an EtherChannel group.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1613

Information about First Hop Security in IPv6

Security

· An FHS policy cannot be attached to an physical port when it is a member of an EtherChannel group.
· By default, a snooping policy has a security-level of guard. When such a snooping policy is configured on an access switch, external IPv6 Router Advertisement (RA) or Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server packets are blocked, even though the uplink port facing the router or DHCP server/relay is configured as a trusted port. To allow IPv6 RA or DHCPv6 server messages, do the following:
· Apply an IPv6 RA-guard policy (for RA) or IPv6 DHCP-guard policy (for DHCP server messages ) on the uplink port.
· Configure a snooping policy with a lower security-level, for example glean or inspect. However; configuring a lower security level is not recommended with such a snooping policy, because benefits of First Hop security features are not effective.
Information about First Hop Security in IPv6
First Hop Security in IPv6 (FHS IPv6) is a set of IPv6 security features, the policies of which can be attached to a physical interface, or a VLAN. An IPv6 software policy database service stores and accesses these policies. When a policy is configured or modified, the attributes of the policy are stored or updated in the software policy database, then applied as was specified. The following IPv6 policies are currently supported:
· IPv6 Snooping Policy--IPv6 Snooping Policy acts as a container policy that enables most of the features available with FHS in IPv6.
· IPv6 FHS Binding Table Content--A database table of IPv6 neighbors connected to the switch is created from information sources such as Neighbor Discovery (ND) protocol snooping. This database, or binding, table is used by various IPv6 guard features (such as IPv6 ND Inspection) to validate the link-layer address (LLA), the IPv4 or IPv6 address, and prefix binding of the neighbors to prevent spoofing and redirect attacks.
· IPv6 Neighbor Discovery Inspection--IPv6 ND inspection learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables. IPv6 ND inspection analyzes neighbor discovery messages in order to build a trusted binding table database and IPv6 neighbor discovery messages that do not conform are dropped. An ND message is considered trustworthy if its IPv6-to-Media Access Control (MAC) mapping is verifiable.
This feature mitigates some of the inherent vulnerabilities of the ND mechanism, such as attacks on DAD, address resolution, router discovery, and the neighbor cache.
· IPv6 Router Advertisement Guard--The IPv6 Router Advertisement (RA) guard feature enables the network administrator to block or reject unwanted or rogue RA guard messages that arrive at the network switch platform. RAs are used by routers to announce themselves on the link. The RA Guard feature analyzes the RAs and filters out bogus RAs sent by unauthorized routers. In host mode, all router advertisement and router redirect messages are disallowed on the port. The RA guard feature compares configuration information on the Layer 2 device with the information found in the received RA frame. Once the Layer 2 device has validated the content of the RA frame and router redirect frame against the configuration, it forwards the RA to its unicast or multicast destination. If the RA frame content is not validated, the RA is dropped.
· IPv6 DHCP Guard--The IPv6 DHCP Guard feature blocks reply and advertisement messages that come from unauthorized DHCPv6 servers and relay agents. IPv6 DHCP guard can prevent forged messages

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1614

Security

Information about First Hop Security in IPv6
from being entered in the binding table and block DHCPv6 server messages when they are received on ports that are not explicitly configured as facing a DHCPv6 server or DHCP relay. To use this feature, configure a policy and attach it to an interface or a VLAN. To debug DHCP guard packets, use the debug ipv6 snooping dhcp-guard privileged EXEC command. · IPv6 Source Guard--Like IPv4 Source Guard, IPv6 Source Guard validates the source address or prefix to prevent source address spoofing. A source guard programs the hardware to allow or deny traffic based on source or destination addresses. It deals exclusively with data packet traffic. The IPv6 source guard feature provides the ability to store entries in the hardware TCAM table to prevent a host from sending packets with an invalid IPv6 source address. To debug source-guard packets, use the debug ipv6 snooping source-guard privileged EXEC command.
Note The IPv6 source guard and prefix guard features are supported only in the ingress direction; it is not supported in the egress direction.
The following restrictions apply: · An FHS policy cannot be attached to an physical port when it is a member of an EtherChannel group. · When IPv6 source guard is enabled on a switch port, NDP or DHCP snooping must be enabled on the interface to which the switch port belongs. Otherwise, all data traffic from this port will be blocked. · An IPv6 source guard policy cannot be attached to a VLAN. It is supported only at the interface level. · When you configure IPv4 and IPv6 source guard together on an interface, it is recommended to use ip verify source mac-check instead of ip verify source . IPv4 connectivity on a given port might break due to two different filtering rules set -- one for IPv4 (IP-filter) and the other for IPv6 (IP-MAC filter). · You cannot use IPv6 Source Guard and Prefix Guard together. When you attach the policy to an interface, it should be "validate address" or "validate prefix" but not both. · PVLAN and Source/Prefix Guard cannot be applied together.
· IPv6 Source Guard and Prefix Guard is supported on EtherChannels
For more information on IPv6 Source Guard, see the IPv6 Source Guard chapter of the Cisco IOS IPv6 Configuration Guide Library on Cisco.com. · IPv6 Prefix Guard--The IPv6 prefix guard feature works within the IPv6 source guard feature, to enable the device to deny traffic originated from non-topologically correct addresses. IPv6 prefix guard is often used when IPv6 prefixes are delegated to devices (for example, home gateways) using DHCP prefix delegation. The feature discovers ranges of addresses assigned to the link and blocks any traffic sourced with an address outside this range. For more information on IPv6 Prefix Guard, see the IPv6 Prefix Guard chapter of the Cisco IOS IPv6 Configuration Guide Library on Cisco.com.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1615

How to Configure an IPv6 Snooping Policy

Security

· IPv6 Destination Guard--The IPv6 destination guard feature works with IPv6 neighbor discovery to ensure that the device performs address resolution only for those addresses that are known to be active on the link. It relies on the address glean functionality to populate all destinations active on the link into the binding table and then blocks resolutions before they happen when the destination is not found in the binding table.

Note IPv6 Destination Guard is recommended to apply on Layer 2 VLAN with an SVI configured
For more information about IPv6 Destination Guard, see the IPv6 Destination Guard chapter of the Cisco IOS IPv6 Configuration Guide Library on Cisco.com.

How to Configure an IPv6 Snooping Policy
Beginning in privileged EXEC mode, follow these steps to configure IPv6 Snooping Policy :

SUMMARY STEPS

1. configure terminal 2. ipv6 snooping policypolicy-name 3. {[default ] | [device-role {node | switch}] | [limit address-count value] | [no] | [protocol {dhcp | ndp}
] | [security-level {glean | guard | inspect} ] | [tracking {disable [stale-lifetime [seconds | infinite] | enable [reachable-lifetime [seconds | infinite] } ] | [trusted-port ] } 4. end 5. show ipv6 snooping policy policy-name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

ipv6 snooping policypolicy-name Example:

Creates a snooping policy and enters IPv6 Snooping Policy Configuration mode.

Switch(config)# ipv6 snooping policy example_policy

Step 3

{[default ] | [device-role {node | switch}] | [limit

Enables data address gleaning, validates messages against

address-count value] | [no] | [protocol {dhcp | ndp} ] | various criteria, specifies the security level for messages.

[security-level {glean | guard | inspect} ] | [tracking {disable [stale-lifetime [seconds | infinite] | enable

· (Optional) default--Sets all to default options.

[reachable-lifetime [seconds | infinite] } ] | [trusted-port · (Optional) device-role{node] | switch}--Specifies

]}

the role of the device attached to the port. Default is

Example:

node.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1616

Security

How to Configure an IPv6 Snooping Policy

Step 4 Step 5

Command or Action Switch(config-ipv6-snooping)# security-level inspect

Purpose
· (Optional) limit address-count value--Limits the number of addresses allowed per target.

Example: Switch(config-ipv6-snooping)# trusted-port

· (Optional) no--Negates a command or sets it to defaults.

· (Optional) protocol{dhcp | ndp}--Specifies which protocol should be redirected to the snooping feature for analysis. The default, is dhcp and ndp. To change the default, use the no protocol command.

· (Optional) security-level{glean|guard|inspect}--Specifies the level of security enforced by the feature. Default is guard.
glean--Gleans addresses from messages and populates the binding table without any verification. guard--Gleans addresses and inspects messages. In addition, it rejects RA and DHCP server messages. This is the default option. inspect--Gleans addresses, validates messages for consistency and conformance, and enforces address ownership.

· (Optional) tracking {disable | enable}--Overrides the default tracking behavior and specifies a tracking option.

· (Optional) trusted-port--Sets up a trusted port. It disables the guard on applicable targets. Bindings learned through a trusted port have preference over bindings learned through any other port. A trusted port is given preference in case of a collision while making an entry in the table.

end Example:
Switch(config-ipv6-snooping)# exit

Exits configuration modes to Privileged EXEC mode.

show ipv6 snooping policy policy-name Example:
Switch#show ipv6 snooping policy example_policy

Displays the snooping policy configuration.

What to do next Attach an IPv6 Snooping policy to interfaces or VLANs.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1617

How to Attach an IPv6 Snooping Policy to an Interface

Security

How to Attach an IPv6 Snooping Policy to an Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Snooping policy on an interface or VLAN:

SUMMARY STEPS

1. configure terminal 2. interface Interface_type stack/module/port 3. switchport 4. ipv6 snooping [attach-policy policy_name [ vlan {vlan_id | add vlan_ids | exceptvlan_ids | none |
remove vlan_ids}] | vlan {vlan_id | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 5. do show running-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

interface Interface_type stack/module/port Example:

Specifies an interface type and identifier; enters the interface configuration mode.

Switch(config)# interface gigabitethernet 1/1/4

Step 3 Step 4

switchport Example:
Switch(config-if)# switchport

Enters the Switchport mode.
Note To configure Layer 2 parameters, if the interface is in Layer 3 mode, you must enter the switchport interface configuration command without any parameters to put the interface into Layer 2 mode. This shuts down the interface and then re-enables it, which might generate messages on the device to which the interface is connected. When you put an interface that is in Layer 3 mode into Layer 2 mode, the previous configuration information related to the affected interface might be lost, and the interface is returned to its default configuration. The command prompt displays as (config-if)# in Switchport configuration mode.

ipv6 snooping [attach-policy policy_name [ vlan {vlan_id Attaches a custom ipv6 snooping policy to the interface or

| add vlan_ids | exceptvlan_ids | none | remove vlan_ids}] the specified VLANs on the interface. To attach the default

| vlan {vlan_id | add vlan_ids | exceptvlan_ids | none | policy to the interface, use the ipv6 snooping command

remove vlan_ids | all} ]

without the attach-policy keyword. To attach the default

Example:

policy to VLANs on the interface, use the ipv6 snooping vlan command. The default policy is, security-level guard,

device-role node, protocol ndp and dhcp.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1618

Security

How to Attach an IPv6 Snooping Policy to a Layer 2 EtherChannel Interface

Command or Action
Switch(config-if)# ipv6 snooping
or
Switch(config-if)# ipv6 snooping attach-policy example_policy
or Switch(config-if)# ipv6 snooping vlan 111,112
or
Switch(config-if)# ipv6 snooping attach-policy example_policy vlan 111,112

Purpose

Step 5

do show running-config Example:
Switch#(config-if)# do show running-config

Verifies that the policy is attached to the specified interface without exiting the interface configuration mode.

How to Attach an IPv6 Snooping Policy to a Layer 2 EtherChannel Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Snooping policy on an EtherChannel interface or VLAN:

Step 1 Step 2

Procedure
Command or Action configure terminal Example:
Switch# configure terminal
interface range Interface_name Example:
Switch(config)# interface range Po11

Purpose Enters the global configuration mode.

Specify the port-channel interface name assigned when the EtherChannel was created. Enters the interface range configuration mode.

Tip

Enter the do show interfaces summary

command for quick reference to interface names

and types.

Step 3

ipv6 snooping [attach-policy policy_name [ vlan {vlan_ids Attaches the IPv6 Snooping policy to the interface or the | add vlan_ids | except vlan_ids | none | remove vlan_ids specified VLANs on that interface. The default policy is | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | attached if the attach-policy option is not used. none | remove vlan_ids | all} ]
Example:
Switch(config-if-range)# ipv6 snooping attach-policy example_policy
or

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1619

How to Attach an IPv6 Snooping Policy to VLANs Globally

Security

Command or Action
Switch(config-if-range)# ipv6 snooping attach-policy example_policy vlan 222,223,224

Purpose

or

Switch(config-if-range)#ipv6 snooping vlan 222, 223,224

Step 4

do show running-config interfaceportchannel_interface_name

Confirms that the policy is attached to the specified interface without exiting the configuration mode.

Example:

Switch#(config-if-range)# do show running-config int po11

How to Attach an IPv6 Snooping Policy to VLANs Globally
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Snooping Policy to VLANs across multiple interfaces:

SUMMARY STEPS

1. configure terminal 2. vlan configuration vlan_list 3. ipv6 snooping [attach-policy policy_name] 4. do show running-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

vlan configuration vlan_list Example:
Switch(config)# vlan configuration 333

Step 3

ipv6 snooping [attach-policy policy_name]
Example:
Switch(config-vlan-config)#ipv6 snooping attach-policy example_policy

Purpose Enters the global configuration mode.
Specifies the VLANs to which the IPv6 Snooping policy will be attached ; enters the VLAN interface configuration mode.
Attaches the IPv6 Snooping policy to the specified VLANs across all switch and stack interfaces. The default policy is attached if the attach-policy option is not used. The default policy is, security-level guard, device-role node, protocol ndp and dhcp.

Step 4

do show running-config Example:

Verifies that the policy is attached to the specified VLANs without exiting the interface configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1620

Security

How to Configure the IPv6 Binding Table Content

Command or Action
Switch#(config-if)# do show running-config

Purpose

How to Configure the IPv6 Binding Table Content
Beginning in privileged EXEC mode, follow these steps to configure IPv6 Binding Table Content :

SUMMARY STEPS

1. configure terminal 2. [no] ipv6 neighbor binding [vlan vlan-id {ipv6-address interface interface_type stack/module/port
hw_address [reachable-lifetimevalue [seconds | default | infinite] | [tracking{ [default | disable] [ reachable-lifetimevalue [seconds | default | infinite] | [enable [reachable-lifetimevalue [seconds | default | infinite] | [retry-interval {seconds| default [reachable-lifetimevalue [seconds | default | infinite] } ] 3. [no] ipv6 neighbor binding max-entries number [mac-limit number | port-limit number [mac-limit number] | vlan-limit number [ [mac-limit number] | [port-limit number [mac-limitnumber] ] ] ] 4. ipv6 neighbor binding logging 5. exit 6. show ipv6 neighbor binding

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

[no] ipv6 neighbor binding [vlan vlan-id {ipv6-address interface interface_type stack/module/port hw_address [reachable-lifetimevalue [seconds | default | infinite] | [tracking{ [default | disable] [ reachable-lifetimevalue [seconds | default | infinite] | [enable [reachable-lifetimevalue [seconds | default | infinite] | [retry-interval {seconds| default [reachable-lifetimevalue [seconds | default | infinite] } ]
Example:
Switch(config)# ipv6 neighbor binding

Step 3

[no] ipv6 neighbor binding max-entries number

Specifies the maximum number of entries that are allowed

[mac-limit number | port-limit number [mac-limit number] to be inserted in the binding table cache.

| vlan-limit number [ [mac-limit number] | [port-limit

number [mac-limitnumber] ] ] ]

Example:

Switch(config)# ipv6 neighbor binding max-entries 30000

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1621

How to Configure an IPv6 Neighbor Discovery Inspection Policy

Security

Step 4 Step 5 Step 6

Command or Action ipv6 neighbor binding logging Example:
Switch(config)# ipv6 neighbor binding logging
exit Example:
Switch(config)# exit
show ipv6 neighbor binding Example:
Switch# show ipv6 neighbor binding

Purpose Enables the logging of binding table main events.
Exits global configuration mode, and places the router in privileged EXEC mode.
Displays contents of a binding table.

How to Configure an IPv6 Neighbor Discovery Inspection Policy
Beginning in privileged EXEC mode, follow these steps to configure an IPv6 ND Inspection Policy:

SUMMARY STEPS

1. configure terminal 2. [no]ipv6 nd inspection policy policy-name 3. device-role {host | monitor | router | switch} 4. drop-unsecure 5. limit address-count value 6. sec-level minimum value 7. tracking {enable [reachable-lifetime {value | infinite}] | disable [stale-lifetime {value | infinite}]} 8. trusted-port 9. validate source-mac 10. no {device-role | drop-unsecure | limit address-count | sec-level minimum | tracking | trusted-port
| validate source-mac} 11. default {device-role | drop-unsecure | limit address-count | sec-level minimum | tracking |
trusted-port | validate source-mac} 12. do show ipv6 nd inspection policy policy_name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

[no]ipv6 nd inspection policy policy-name Example:

Purpose Enters the global configuration mode.
Specifies the ND inspection policy name and enters ND Inspection Policy configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1622

Security

How to Configure an IPv6 Neighbor Discovery Inspection Policy

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10
Step 11

Command or Action
Switch(config)# ipv6 nd inspection policy example_policy

Purpose

device-role {host | monitor | router | switch} Example:

Specifies the role of the device attached to the port. The default is host.

Switch(config-nd-inspection)# device-role switch

drop-unsecure Example:
Switch(config-nd-inspection)# drop-unsecure

Drops messages with no or invalid options or an invalid signature.

limit address-count value

Enter 1­10,000.

Example:

Switch(config-nd-inspection)# limit address-count 1000

sec-level minimum value

Specifies the minimum security level parameter value

Example:

when Cryptographically Generated Address (CGA) options are used.

Switch(config-nd-inspection)# limit address-count

1000

tracking {enable [reachable-lifetime {value | infinite}] Overrides the default tracking policy on a port. | disable [stale-lifetime {value | infinite}]}
Example:
Switch(config-nd-inspection)# tracking disable stale-lifetime infinite

trusted-port Example:
Switch(config-nd-inspection)# trusted-port

Configures a port to become a trusted port.

validate source-mac Example:
Switch(config-nd-inspection)# validate source-mac

no {device-role | drop-unsecure | limit address-count | Remove the current configuration of a parameter with the sec-level minimum | tracking | trusted-port | validate no form of the command. source-mac}
Example:
Switch(config-nd-inspection)# no validate source-mac

default {device-role | drop-unsecure | limit address-count | sec-level minimum | tracking | trusted-port | validate source-mac}
Example:

Restores configuration to the default values.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1623

How to Attach an IPv6 Neighbor Discovery Inspection Policy to an Interface

Security

Step 12

Command or Action
Switch(config-nd-inspection)# default limit address-count
do show ipv6 nd inspection policy policy_name Example:
Switch(config-nd-inspection)# do show ipv6 nd inspection policy example_policy

Purpose
Verifies the ND Inspection Configuration without exiting ND inspection configuration mode.

How to Attach an IPv6 Neighbor Discovery Inspection Policy to an Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 ND Inspection policy to an interface or VLANs on an interface :

SUMMARY STEPS

1. configure terminal 2. interface Interface_type stack/module/port 3. ipv6 nd inspection [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none
| remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

interface Interface_type stack/module/port Example:

Specifies an interface type and identifier; enters the interface configuration mode.

Switch(config)# interface gigabitethernet 1/1/4

Step 3

ipv6 nd inspection [attach-policy policy_name [ vlan Attaches the Neighbor Discovery Inspection policy to the

{vlan_ids | add vlan_ids | except vlan_ids | none | remove interface or the specified VLANs on that interface. The

vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids |

default policy is attached if the attach-policy option is not

exceptvlan_ids | none | remove vlan_ids | all} ]

used.

Example:

Switch(config-if)# ipv6 nd inspection attach-policy example_policy

or

Switch(config-if)# ipv6 nd inspection attach-policy example_policy vlan 222,223,224

or

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1624

Security

How to Attach an IPv6 Neighbor Discovery Inspection Policy to a Layer 2 EtherChannel Interface

Command or Action

Purpose

Switch(config-if)# ipv6 nd inspection vlan 222, 223,224

Step 4

do show running-config Example:
Switch#(config-if)# do show running-config

Verifies that the policy is attached to the specified interface without exiting the interface configuration mode.

How to Attach an IPv6 Neighbor Discovery Inspection Policy to a Layer 2 EtherChannel Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Neighbor Discovery Inspection policy on an EtherChannel interface or VLAN:

SUMMARY STEPS

1. configure terminal 2. interface range Interface_name 3. ipv6 nd inspection [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none
| remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config interfaceportchannel_interface_name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

interface range Interface_name Example:
Switch(config)# interface range Po11

Purpose Enters the global configuration mode.

Specify the port-channel interface name assigned when the EtherChannel was created. Enters the interface range configuration mode.

Tip

Enter the do show interfaces summary

command for quick reference to interface names

and types.

Step 3

ipv6 nd inspection [attach-policy policy_name [ vlan Attaches the ND Inspection policy to the interface or the

{vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is

vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids |

attached if the attach-policy option is not used.

exceptvlan_ids | none | remove vlan_ids | all} ]

Example:

Switch(config-if-range)# ipv6 nd inspection attach-policy example_policy

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1625

How to Attach an IPv6 Neighbor Discovery Inspection Policy to VLANs Globally

Security

Command or Action

Purpose

or
Switch(config-if-range)# ipv6 nd inspection attach-policy example_policy vlan 222,223,224
or
Switch(config-if-range)#ipv6 nd inspection vlan 222, 223,224

Step 4

do show running-config interfaceportchannel_interface_name

Confirms that the policy is attached to the specified interface without exiting the configuration mode.

Example:

Switch#(config-if-range)# do show running-config int po11

How to Attach an IPv6 Neighbor Discovery Inspection Policy to VLANs Globally
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 ND Inspection policy to VLANs across multiple interfaces:

SUMMARY STEPS

1. configure terminal 2. vlan configuration vlan_list 3. ipv6 nd inspection [attach-policy policy_name] 4. do show running-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

vlan configuration vlan_list Example:
Switch(config)# vlan configuration 334

Step 3

ipv6 nd inspection [attach-policy policy_name]
Example:
Switch(config-vlan-config)#ipv6 nd inspection attach-policy example_policy

Purpose Enters the global configuration mode.
Specifies the VLANs to which the IPv6 Snooping policy will be attached ; enters the VLAN interface configuration mode.
Attaches the IPv6 Neighbor Discovery policy to the specified VLANs across all switch and stack interfaces. The default policy is attached if the attach-policy option is not used.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1626

Security

How to Configure an IPv6 Router Advertisement Guard Policy

Command or Action

Step 4

do show running-config Example:
Switch#(config-if)# do show running-config

Purpose The default policy is, device-role host, no drop-unsecure, limit address-count disabled, sec-level minimum is disabled, tracking is disabled, no trusted-port, no validate source-mac.
Confirms that the policy is attached to the specified VLANs without exiting the configuration mode.

How to Configure an IPv6 Router Advertisement Guard Policy
Beginning in privileged EXEC mode, follow these steps to configure an IPv6 Router Advertisement policy :

SUMMARY STEPS

1. configure terminal 2. [no]ipv6 nd raguard policy policy-name 3. [no]device-role {host | monitor | router | switch} 4. [no]hop-limit {maximum | minimum} value 5. [no]managed-config-flag {off | on} 6. [no]match {ipv6 access-list list | ra prefix-list list} 7. [no]other-config-flag {on | off} 8. [no]router-preference maximum {high | medium | low} 9. [no]trusted-port 10. default {device-role | hop-limit {maximum | minimum} | managed-config-flag | match {ipv6
access-list | ra prefix-list } | other-config-flag | router-preference maximum| trusted-port} 11. do show ipv6 nd raguard policy policy_name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

[no]ipv6 nd raguard policy policy-name
Example:
Switch(config)# ipv6 nd raguard policy example_policy

Step 3

[no]device-role {host | monitor | router | switch} Example:
Switch(config-nd-raguard)# device-role switch

Purpose Enters the global configuration mode.
Specifies the RA Guard policy name and enters RA Guard Policy configuration mode.
Specifies the role of the device attached to the port. The default is host.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1627

How to Configure an IPv6 Router Advertisement Guard Policy

Security

Step 4
Step 5 Step 6 Step 7 Step 8

Command or Action

Purpose

[no]hop-limit {maximum | minimum} value Example:
Switch(config-nd-raguard)# hop-limit maximum 33

(1­255) Range for Maximum and Minimum Hop Limit values.
Enables filtering of Router Advertisement messages by the Hop Limit value. A rogue RA message may have a low Hop Limit value (equivalent to the IPv4 Time to Live) that when accepted by the host, prevents the host from generating traffic to destinations beyond the rogue RA message generator. An RA message with an unspecified Hop Limit value is blocked.

If not configured, this filter is disabled. Configure minimum to block RA messages with Hop Limit values lower than the value you specify. Configure maximumto block RA messages with Hop Limit values greater than the value you specify.

[no]managed-config-flag {off | on}

Enables filtering of Router Advertisement messages by

Example:

the Managed Address Configuration, or "M" flag field. A rouge RA message with an M field of 1 can cause a host

Switch(config-nd-raguard)# managed-config-flag on to use a rogue DHCPv6 server. If not configured, this filter

is disabled.

On--Accepts and forwards RA messages with an M value of 1, blocks those with 0.

Off--Accepts and forwards RA messages with an M value of 0, blocks those with 1.

[no]match {ipv6 access-list list | ra prefix-list list}

Matches a specified prefix list or access list.

Example:

Switch(config-nd-raguard)# match ipv6 access-list example_list

[no]other-config-flag {on | off} Example:
Switch(config-nd-raguard)# other-config-flag on

Enables filtering of Router Advertisement messages by the Other Configuration, or "O" flag field. A rouge RA message with an O field of 1 can cause a host to use a rogue DHCPv6 server. If not configured, this filter is disabled.

On--Accepts and forwards RA messages with an O value of 1, blocks those with 0.

Off--Accepts and forwards RA messages with an O value of 0, blocks those with 1.

[no]router-preference maximum {high | medium | low} Enables filtering of Router Advertisement messages by

Example:
Switch(config-nd-raguard)# router-preference maximum high

the Router Preference flag. If not configured, this filter is disabled.
· high--Accepts RA messages with the Router

Preference set to high, medium, or low.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1628

Security

How to Attach an IPv6 Router Advertisement Guard Policy to an Interface

Step 9 Step 10
Step 11

Command or Action

Purpose · medium--Blocks RA messages with the Router Preference set to high.
· low--Blocks RA messages with the Router Preference set to medium and high.

[no]trusted-port Example:
Switch(config-nd-raguard)# trusted-port

When configured as a trusted port, all attached devices are trusted, and no further message verification is performed.

default {device-role | hop-limit {maximum | minimum} Restores a command to its default value. | managed-config-flag | match {ipv6 access-list | ra prefix-list } | other-config-flag | router-preference maximum| trusted-port}
Example:
Switch(config-nd-raguard)# default hop-limit

do show ipv6 nd raguard policy policy_name Example:

(Optional)--Displays the ND Guard Policy configuration without exiting the RA Guard policy configuration mode.

Switch(config-nd-raguard)# do show ipv6 nd raguard policy example_policy

How to Attach an IPv6 Router Advertisement Guard Policy to an Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Router Advertisement policy to an interface or to VLANs on the interface :

SUMMARY STEPS

1. configure terminal 2. interface Interface_type stack/module/port 3. ipv6 nd raguard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none |
remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

interface Interface_type stack/module/port Example:

Purpose Enters the global configuration mode.
Specifies an interface type and identifier; enters the interface configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1629

How to Attach an IPv6 Router Advertisement Guard Policy to a Layer 2 EtherChannel Interface

Security

Command or Action

Purpose

Switch(config)# interface gigabitethernet 1/1/4

Step 3

ipv6 nd raguard [attach-policy policy_name [ vlan

Attaches the Neighbor Discovery Inspection policy to the

{vlan_ids | add vlan_ids | except vlan_ids | none | remove interface or the specified VLANs on that interface. The

vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids |

default policy is attached if the attach-policy option is not

exceptvlan_ids | none | remove vlan_ids | all} ]

used.

Example:

Switch(config-if)# ipv6 nd raguard attach-policy example_policy

or

Switch(config-if)# ipv6 nd raguard attach-policy example_policy vlan 222,223,224

or

Switch(config-if)# ipv6 nd raguard vlan 222, 223,224

Step 4

do show running-config Example:
Switch#(config-if)# do show running-config

Confirms that the policy is attached to the specified interface without exiting the configuration mode.

How to Attach an IPv6 Router Advertisement Guard Policy to a Layer 2 EtherChannel Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Router Advertisement Guard Policy on an EtherChannel interface or VLAN:

SUMMARY STEPS

1. configure terminal 2. interface range Interface_name 3. ipv6 nd raguard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none |
remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config interfaceportchannel_interface_name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1630

Security

How to Attach an IPv6 Router Advertisement Guard Policy to VLANs Globally

Step 2 Step 3

Command or Action interface range Interface_name Example:
Switch(config)# interface range Po11

Purpose

Specify the port-channel interface name assigned when the EtherChannel was created. Enters the interface range configuration mode.

Tip

Enter the do show interfaces summary

command for quick reference to interface names

and types.

ipv6 nd raguard [attach-policy policy_name [ vlan

Attaches the RA Guard policy to the interface or the

{vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is

vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids |

attached if the attach-policy option is not used.

exceptvlan_ids | none | remove vlan_ids | all} ]

Example:

Switch(config-if-range)# ipv6 nd raguard attach-policy example_policy

or

Switch(config-if-range)# ipv6 nd raguard attach-policy example_policy vlan 222,223,224

or

Switch(config-if-range)#ipv6 nd raguard vlan 222, 223,224

Step 4

do show running-config interfaceportchannel_interface_name

Confirms that the policy is attached to the specified interface without exiting the configuration mode.

Example:

Switch#(config-if-range)# do show running-config int po11

How to Attach an IPv6 Router Advertisement Guard Policy to VLANs Globally
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Router Advertisement policy to VLANs regardless of interface:

SUMMARY STEPS

1. configure terminal 2. vlan configuration vlan_list 3. ipv6 dhcp guard [attach-policy policy_name] 4. do show running-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1631

How to Configure an IPv6 DHCP Guard Policy

Security

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

vlan configuration vlan_list Example:
Switch(config)# vlan configuration 335

Step 3

ipv6 dhcp guard [attach-policy policy_name]
Example:
Switch(config-vlan-config)#ipv6 nd raguard attach-policy example_policy

Step 4

do show running-config Example:
Switch#(config-if)# do show running-config

Purpose Enters global configuration mode.
Specifies the VLANs to which the IPv6 RA Guard policy will be attached ; enters the VLAN interface configuration mode.
Attaches the IPv6 RA Guard policy to the specified VLANs across all switch and stack interfaces. The default policy is attached if the attach-policy option is not used.
Confirms that the policy is attached to the specified VLANs without exiting the configuration mode.

How to Configure an IPv6 DHCP Guard Policy
Beginning in privileged EXEC mode, follow these steps to configure an IPv6 DHCP (DHCPv6) Guard policy:

SUMMARY STEPS

1. configure terminal 2. [no]ipv6 dhcp guard policy policy-name 3. [no]device-role {client | server} 4. [no] match server access-list ipv6-access-list-name 5. [no] match reply prefix-list ipv6-prefix-list-name 6. [no]preference{ max limit | min limit } 7. [no] trusted-port 8. default {device-role | trusted-port} 9. do show ipv6 dhcp guard policy policy_name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1632

Security

How to Configure an IPv6 DHCP Guard Policy

Step 2 Step 3 Step 4
Step 5 Step 6

Command or Action [no]ipv6 dhcp guard policy policy-name Example:
Switch(config)# ipv6 dhcp guard policy example_policy
[no]device-role {client | server} Example:
Switch(config-dhcp-guard)# device-role server

Purpose Specifies the DHCPv6 Guard policy name and enters DHCPv6 Guard Policy configuration mode.
(Optional) Filters out DHCPv6 replies and DHCPv6 advertisements on the port that are not from a device of the specified role. Default is client.
· client--Default value, specifies that the attached device is a client. Server messages are dropped on this port.
· server--Specifies that the attached device is a DHCPv6 server. Server messages are allowed on this port.

[no] match server access-list ipv6-access-list-name
Example:
;;Assume a preconfigured IPv6 Access List as follows: Switch(config)# ipv6 access-list my_acls Switch(config-ipv6-acl)# permit host FE80::A8BB:CCFF:FE01:F700 any

(Optional). Enables verification that the advertised DHCPv6 server or relay address is from an authorized server access list (The destination address in the access list is 'any'). If not configured, this check will be bypassed. An empty access list is treated as a permit all.

;;configure DCHPv6 Guard to match approved access list.
Switch(config-dhcp-guard)# match server access-list my_acls

[no] match reply prefix-list ipv6-prefix-list-name

(Optional) Enables verification of the advertised prefixes

Example:

in DHCPv6 reply messages from the configured authorized prefix list. If not configured, this check will be bypassed.

;;Assume a preconfigured IPv6 prefix list as

An empty prefix list is treated as a permit.

follows:

Switch(config)# ipv6 prefix-list my_prefix permit

2001:0DB8::/64 le 128

;; Configure DCHPv6 Guard to match prefix Switch(config-dhcp-guard)# match reply prefix-list
my_prefix

[no]preference{ max limit | min limit }
Example:
Switch(config-dhcp-guard)# preference max 250 Switch(config-dhcp-guard)#preference min 150

Configure max and min when device-role is serverto filter DCHPv6 server advertisements by the server preference value. The defaults permit all advertisements.
max limit--(0 to 255) (Optional) Enables verification that the advertised preference (in preference option) is less than the specified limit. Default is 255. If not specified, this check will be bypassed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1633

How to Attach an IPv6 DHCP Guard Policy to an Interface or a VLAN on an Interface

Security

Step 7 Step 8 Step 9

Command or Action
[no] trusted-port Example:
Switch(config-dhcp-guard)# trusted-port

Purpose min limit--(0 to 255) (Optional) Enables verification that the advertised preference (in preference option) is greater than the specified limit. Default is 0. If not specified, this check will be bypassed.
(Optional) trusted-port--Sets the port to a trusted mode. No further policing takes place on the port.
Note If you configure a trusted port then the device-role option is not available.

default {device-role | trusted-port} Example:
Switch(config-dhcp-guard)# default device-role

(Optional) default--Sets a command to its defaults.

do show ipv6 dhcp guard policy policy_name

(Optional) Displays the configuration of the IPv6 DHCP

Example:

guard policy without leaving the configuration submode. Omitting the policy_name variable displays all DHCPv6

Switch(config-dhcp-guard)# do show ipv6 dhcp guard policies.
policy example_policy

Example of DHCPv6 Guard Configuration
enable configure terminal ipv6 access-list acl1
permit host FE80::A8BB:CCFF:FE01:F700 any ipv6 prefix-list abc permit 2001:0DB8::/64 le 128 ipv6 dhcp guard policy pol1
device-role server match server access-list acl1 match reply prefix-list abc preference min 0 preference max 255 trusted-port interface GigabitEthernet 0/2/0 switchport ipv6 dhcp guard attach-policy pol1 vlan add 1 vlan 1
ipv6 dhcp guard attach-policy pol1 show ipv6 dhcp guard policy pol1

How to Attach an IPv6 DHCP Guard Policy to an Interface or a VLAN on an Interface
Beginning in privileged EXEC mode, follow these steps to configure IPv6 Binding Table Content :

SUMMARY STEPS

1. configure terminal 2. interface Interface_type stack/module/port

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1634

Security

How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface

3. ipv6 dhcp guard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none | remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ]
4. do show running-config interface Interface_type stack/module/port

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

interface Interface_type stack/module/port Example:

Specifies an interface type and identifier; enters the interface configuration mode.

Switch(config)# interface gigabitethernet 1/1/4

Step 3

ipv6 dhcp guard [attach-policy policy_name [ vlan

Attaches the DHCP Guard policy to the interface or the

{vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is

vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids |

attached if the attach-policy option is not used.

exceptvlan_ids | none | remove vlan_ids | all} ]

Example:

Switch(config-if)# ipv6 dhcp guard attach-policy example_policy

or

Switch(config-if)# ipv6 dhcp guard attach-policy example_policy vlan 222,223,224

or

Switch(config-if)# ipv6 dhcp guard vlan 222, 223,224

Step 4

do show running-config interface Interface_type stack/module/port
Example:
Switch#(config-if)# do show running-config gig 1/1/4

Confirms that the policy is attached to the specified interface without exiting the configuration mode.

How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 DHCP Guard policy on an EtherChannel interface or VLAN:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1635

How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface

Security

SUMMARY STEPS

1. configure terminal 2. interface range Interface_name 3. ipv6 dhcp guard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none
| remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ] 4. do show running-config interfaceportchannel_interface_name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

interface range Interface_name Example:
Switch(config)# interface range Po11

Purpose Enters the global configuration mode.

Specify the port-channel interface name assigned when the EtherChannel was created. Enters the interface range configuration mode.

Tip

Enter the do show interfaces summary

command for quick reference to interface names

and types.

Step 3

ipv6 dhcp guard [attach-policy policy_name [ vlan

Attaches the DHCP Guard policy to the interface or the

{vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is

vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids |

attached if the attach-policy option is not used.

exceptvlan_ids | none | remove vlan_ids | all} ]

Example:

Switch(config-if-range)# ipv6 dhcp guard attach-policy example_policy

or

Switch(config-if-range)# ipv6 dhcp guard attach-policy example_policy vlan 222,223,224

or

Switch(config-if-range)#ipv6 dhcp guard vlan 222, 223,224

Step 4

do show running-config interfaceportchannel_interface_name

Confirms that the policy is attached to the specified interface without exiting the configuration mode.

Example:

Switch#(config-if-range)# do show running-config int po11

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1636

Security

How to Attach an IPv6 DHCP Guard Policy to VLANs Globally

How to Attach an IPv6 DHCP Guard Policy to VLANs Globally
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 DHCP Guard policy to VLANs across multiple interfaces:

SUMMARY STEPS

1. configure terminal 2. vlan configuration vlan_list 3. ipv6 dhcp guard [attach-policy policy_name] 4. do show running-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

vlan configuration vlan_list Example:
Switch(config)# vlan configuration 334

Step 3

ipv6 dhcp guard [attach-policy policy_name]
Example:
Switch(config-vlan-config)#ipv6 dhcp guard attach-policy example_policy

Step 4

do show running-config Example:
Switch#(config-if)# do show running-config

Purpose Enters the global configuration mode.
Specifies the VLANs to which the IPv6 Snooping policy will be attached ; enters the VLAN interface configuration mode.
Attaches the IPv6 Neighbor Discovery policy to the specified VLANs across all switch and stack interfaces. The default policy is attached if the attach-policy option is not used. The default policy is, device-role client, no trusted-port.
Confirms that the policy is attached to the specified VLANs without exiting the configuration mode.

Additional References

Related Documents

Related Topic

Document Title

IPv6

IPv6 Configuration Library, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

network management

http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/config_library/xe-3se/3850/ipv6-xe-3se-3850-library

and

security

topics

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1637

Additional References

Security

Related Topic

Document Title

IPv6

IPv6 Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Command Reference

http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/command/ipv6-xe-3se-3850-cr-book.html

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1638

7 8 C H A P T E R
Configuring Cisco TrustSec
· Configuring Cisco TrustSec, on page 1639 · Finding Feature Information, on page 1639 · Information About Cisco TrustSec, on page 1640 · Restrictions for Cisco TrustSec, on page 1641 · Feature Information for Cisco TrustSec, on page 1642 · Additional References, on page 1642
Configuring Cisco TrustSec
Cisco TrustSec provides security improvements to Cisco network devices based on the capability to strongly identify users, hosts, and network devices within a network. TrustSec provides topology-independent and scalable access controls by uniquely classifying data traffic for a particular role. TrustSec ensures data confidentiality and integrity by establishing trust among authenticated peers and encrypting links with those peers. The key component of Cisco TrustSec is the Cisco Identity Services Engine (ISE). Cisco ISE can provision switches with TrustSec Identities and Security Group ACLs (SGACLs), though these may be configured manually on the switch.
Finding Feature Information
For switch configurations verified within the TrustSec solution, see the Cisco TrustSec How-to guides at the following URL: http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/landing_DesignZone_TrustSec.html For general TrustSec configuration summaries, specific platform considerations, and cts command reference information related to Cisco Catalyst switches, see the Cisco TrustSec Switch Configuration Guide at the following URL: http://www.cisco.com/en/US/docs/switches/lan/trustsec/configuration/guide/trustsec.html Release notes for Cisco TrustSec General Availability releases are at the following URL: http://www.cisco.com/en/US/docs/switches/lan/trustsec/release/notes/rn_cts_crossplat.html Additional information about the Cisco TrustSec solution, including overviews, datasheets, features by platform matrix, and case studies, is available at the following URL:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1639

Information About Cisco TrustSec

Security

http://www.cisco.com/en/US/netsol/ns1051/index.html

Information About Cisco TrustSec

The table below lists the TrustSec features to be eventually implemented on TrustSec-enabled Cisco switches. Successive general availability releases of TrustSec will expand the number of switches supported and the number of TrustSec features supported per switch.

Cisco TrustSec Feature 802.1AE Tagging (MACsec)

Description
Protocol for IEEE 802.1AE-based wire-rate hop-to-hop Layer 2 encryption.
Between MACsec-capable devices, packets are encrypted on egress from the transmitting device, decrypted on ingress to the receiving device, and in the clear within the devices.
This feature is only available between TrustSec hardware-capable devices.

Endpoint Admission Control (EAC)

EAC is an authentication process for an endpoint user or a device connecting to the TrustSec domain. Usually EAC takes place at the access level switch. Successful authentication and authorization in the EAC process results in Security Group Tag assignment for the user or device. Currently EAC can be 802.1X, MAC Authentication Bypass (MAB), and Web Authentication Proxy (WebAuth).

Network Device Admission Control (NDAC)

NDAC is an authentication process where each network device in the TrustSec domain can verify the credentials and trustworthiness of its peer device. NDAC utilizes an authentication framework based on IEEE 802.1X port-based authentication and uses EAP-FAST as its EAP method. Successful authentication and authorization in NDAC process results in Security Association Protocol negotiation for IEEE 802.1AE encryption.

Security Group Access Control List (SGACL)

A Security Group Access Control List (SGACL) associates a Security Group Tag with a policy. The policy is enforced upon SGT-tagged traffic egressing the TrustSec domain.

Security Association Protocol (SAP)

After NDAC authentication, the Security Association Protocol (SAP) automatically negotiates keys and the cipher suite for subsequent MACSec link encryption between TrustSec peers. SAP is defined in IEEE 802.11i.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1640

Security

Restrictions for Cisco TrustSec

Cisco TrustSec Feature Security Group Tag (SGT)
SGT Exchange Protocol (SXP)

Description
An SGT is a 16-bit single label indicating the security classification of a source in the TrustSec domain. It is appended to an Ethernet frame or an IP packet.
Security Group Tag Exchange Protocol (SXP). With SXP, devices that are not TrustSec-hardware-capable can receive SGT attributes for authenticated users and devices from the Cisco Identity Services Engine (ISE) or the Cisco Secure Access Control System (ACS). The devices can then forward a sourceIP-to-SGT binding to a TrustSec-hardware-capable device will tag the source traffic for SGACL enforcement.

Restrictions for Cisco TrustSec
The following guidelines and limitations apply to configuring Cisco TrustSec SGT and SGACL:
· You cannot statically map an IP-subnet to an SGT. You can only map IP addresses to an SGT. When you configure IP address-to-SGT mappings, the IP address prefix must be 32.
· If a port is configured in Multi-Auth mode, all hosts connecting on that port must be assigned the same SGT. When a host tries to authenticate, its assigned SGT must be the same as the SGT assigned to a previously authenticated host. If a host tries to authenticate and its SGT is different from the SGT of a previously authenticated host, the VLAN port (VP) to which these hosts belong is error-disabled.
· Cisco TrustSec enforcement is supported only on up to eight VLANs on a VLAN-trunk link. If there are more than eight VLANs configured on a VLAN-trunk link and Cisco TrustSec enforcement is enabled on those VLANs, the switch ports on those VLAN-trunk links will be error-disabled.
· The switch can assign SGT and apply corresponding SGACL to end-hosts based on SXP listening only if the end-hosts are Layer2 adjacent to the switch.
· Port-to-SGT mapping can be configured only on Cisco TrustSec links (that is, switch-to-switch links). Port-to-SGT mapping cannot be configured on host-to-switch links.
· When port-to-SGT mapping is configured on a port, an SGT is assigned to all ingress traffic on that port. There is no SGACL enforcement for egress traffic on the port.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1641

Feature Information for Cisco TrustSec

Security

Feature Information for Cisco TrustSec

Table 144: Feature Information for Cisco TrustSec

Feature Name

Release

· NDAC

Cisco IOS XE 3.3SE

· SXPv1, SXPv2

· SGT

· SGACL Layer2

Enforcement

· Interface to SGT and

VLAN to SGT mapping.

· Subnet to SGT mapping

· Layer 3 Port Mapping

(PM)

· Layer 3 Identity Port

Mapping (IPM)

· Security Group Name

Download

· SXP Loop Detection

· Policy-based CoA

SXPv1 and SXPv2

Cisco IOS XE 15.0(2)EX

SXPv1 and SXPv2

Cisco IOS XE 15.0(2)EX1

Additional References
Related Documents Related Topic Various TrustSec Featurette configurations and examples

Feature Information These features were introduced on the Catalyst 3850 and 3650 switches and the Cisco 5700 Series Wireless LAN Controllers.
SXP is introduced on the Catalyst 2960-X switch. SXP is introduced on the Catalyst 2960-XR switch.
Document Title Cisco TrustSec Configuration Guide, Cisco IOS Release 15SY hptw/: wwc.sicoc.ome/nU/ Sd/ocsoi/s-xmoi/lss/ec_usr_cstc/onfgiuraoitn1/5-sys/ec-cst-15-sy-bookh.mt l Cisco TrustSec Configuration Guide, Cisco IOS XE Release 3S hptw/: wwc.sicoc.ome/nU/ Sd/ocsoi/s-xmoi/ls/ec_usr_cstc/onfgiuraoitnx/e-3sc/st-sg-thandnilg-mi p-fwdh.mt l

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1642

Security

Additional References

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs

MIB

MIBs Link

CISCO-TRUSTSEC-POLICY-MIB To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:

http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1643

Additional References

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1644

7 9 C H A P T E R
Configuring Wireless Guest Access
· Finding Feature Information, on page 1645 · Prerequisites for Guest Access, on page 1645 · Restrictions for Guess Access, on page 1646 · Information about Wireless Guest Access, on page 1646 · Fast Secure Roaming, on page 1646 · How to Configure Guest Access, on page 1647 · Configuration Examples for Guest Access, on page 1662 · Additional References for Guest Access, on page 1668 · Feature History and Information for Guest Access, on page 1669
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Guest Access
· All mobility peers should be configured for hierarchical mobility architecture. · For Guest Controller Mobility Anchor configuration on WLAN is must on Mobility Agent and Guest
Controller. · Guest Access can be a 3 box solution or 2 box solution. The mobility tunnel link status should be up
between: · Mobility Agent, Mobility Controller and Guest Controller.
or · Mobility Agent/Mobility Controller and Guest Controller
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1645

Restrictions for Guess Access

Security

Restrictions for Guess Access
Guest Controller functionality is not supported on the Catalyst 3850 switch whereas Catalyst 3850 can act as mobility agent.
Information about Wireless Guest Access
Ideally, the implementation of a wireless guest network uses as much of an enterprise's existing wireless and wired infrastructure as possible to avoid the cost and complexity of building a physical overlay network. Assuming this is the case, the following additional elements and functions are needed:
· A dedicated guest WLAN/SSID--Implemented throughout the campus wireless network wherever guest access is required. A guest WLAN is identified by a WLAN with mobility anchor (Guest Controller) configured.
· Guest traffic segregation--Requires implementing Layer 2 or Layer 3 techniques across the campus network to restrict where guests are allowed to go.
· Access control--Involves using imbedded access control functionality within the campus network or implementing an external platform to control guest access to the Internet from the enterprise network.
· Guest user credential management--A process by which a sponsor or lobby administrator can create temporary credentials in behalf of a guest. This function might be resident within an access control platform or it might be a component of AAA or some other management system.
Fast Secure Roaming
Fast secure roaming can be achieved by caching the Pairwise Master Key (PMK) information for Cisco Centralized Key Management (CCKM), 802.11r and 802.11i clients. Cisco Centralized Key Management (CCKM) helps to improve roaming. Only the client can initiate the roaming process, which depends on factors such as:
· Overlap between APs · Distance between APs · Channel, signal strength, and load on the AP · Data rates and output power
Whenever a fast-roaming client 802.11i, [CCKM]) roams to a new device, after fast-roaming the clients go through mobility "handoff" procedure. And new AAA attributes learned through mobility "handoff" procedure get re-applied.
Full L2 authentication must be avoided during roaming if the client uses the 802.11i WPA2, CCKM, 802.11r to achieve the full requirements of fast secure roaming. The PMK cache (802.11i, CCKM, and 802.11r) is used to authenticate and derive the keys for roaming clients to avoid full L2 authentication. This requires all Mobility Anchors (MA) and Mobility Controllers (MC) in the mobility group to have the same PMK cache values.
The session timeout defines when a PMK cache will expire. A PMK cache can also be deleted when a client fails to re-authenticate or when it is manually deleted them from the CLI. The deletion on the original controller or switch shall be propagated to other controllers or switches in the same mobility group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1646

Security

How to Configure Guest Access

How to Configure Guest Access

Creating a Lobby Administrator Account

SUMMARY STEPS

1. configure terminal 2. user-name user-name 3. type lobby-admin 4. password 0 password 5. end 6. show running-config | section user-name (or) show running-config | section configured lobby admin
username

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

user-name user-name Example:
Switch (config)# user-name lobby

Creates a user account.

Step 3

type lobby-admin Example:
Switch (config-user-name)# type lobby-admin

Specifies the account type as lobby admin.

Step 4

password 0 password Example:
Switch(config-user-name)# password 0 lobby

Creates a password for the lobby administrator account.

Step 5

end Example:
Switch (config-user-name)# end

Returns to privileged EXEC mode.

Step 6

show running-config | section user-name (or) show

Displays the configuration details.

running-config | section configured lobby admin username

Example:

Switch # show running-config | section lobby

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1647

Configuring Guest User Accounts

Security

Example

Configuring Guest User Accounts

SUMMARY STEPS

1. configure terminal 2. user-name user-name 3. password unencrypted/hidden-password password 4. type network-user description description guest-user lifetime year 0-1 month 0-11 day 0-30 hour
0-23 minute 0-59 second 0-59 5. end 6. show aaa local netuser all 7. show running-config | sectionuser-name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

user-name user-name Example:
Switch (config)# user-name guest

Creates a username for the lobby ambassador account.

Step 3

password unencrypted/hidden-password password Example:
Switch (config-user-name)# password 0 guest

Specifies the password for the user.

Step 4

type network-user description description guest-user Specifies the type of user. lifetime year 0-1 month 0-11 day 0-30 hour 0-23 minute 0-59 second 0-59
Example:
Switch (config-user-name)# type network-user description guest guest-user lifetime year 1 month 10 day 3 hour 1 minute 5 second 30

Step 5

end Example:
Switch (config-user-name)# end

Returns to privileged EXEC mode.

Step 6

show aaa local netuser all Example:

Displays the configuration details. After the lifetime, the user-name with guest type will be deleted and the client

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1648

Security

Configuring Mobility Agent (MA)

Command or Action
Switch # show aaa local netuser all

Step 7

show running-config | sectionuser-name Example:
Switch # show running-config | section guest

Purpose associated with the guest user-name will be de-authenticated.
Displays the configuration details.

Example

Configuring Mobility Agent (MA)

SUMMARY STEPS

1. configure terminal 2. wireless mobility controller ipmc-ipaddress public-ip mc-publicipaddress 3. wlan wlan-name wlan-id ssid 4. client vlan idvlan-group name/vlan-id 5. no security wpa 6. mobility anchor ipaddress 7. aaa-override 8. no shutdown 9. end 10. show wireless mobility summary 11. show wlan name wlan-name/id

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

wireless mobility controller ipmc-ipaddress public-ip mc-publicipaddress
Example:
Switch (config) # wireless mobility controller ip27.0.0.1 public-ip 27.0.0.1

Configures the Mobility Controller to which the MA will be associated.

Step 3

wlan wlan-name wlan-id ssid Example:
Switch (config) # wlan mywlan 34 mywlan-ssid

· For wlan-name enter, enter the profile name. The range is 1- 32 characters.
· For wlan-id, enter the WLAN ID. The range is 1-512.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1649

Configuring Mobility Controller

Security

Step 4 Step 5 Step 6 Step 7
Step 8 Step 9 Step 10 Step 11

Command or Action

Purpose
· For ssid, enter the Service Set IDentifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID.

client vlan idvlan-group name/vlan-id Example:
Switch (config-wlan) # client vlan VLAN0136

Configures the VLAN id or group of the WLAN.

no security wpa Example:
Switch (config-wlan) # no security wpa

The security configuration must be the same for the WLAN created on the GC. This example is for open authentication. For other security types such as open and webauth, appropriate command should be provided.

mobility anchor ipaddress

Configures the Guest Controller as mobility anchor.

Example:

Switch (config-wlan) # mobility anchor 9.3.32.2

aaa-override Example:
Switch (config-wlan) # aaa-override

(Optional) Enables AAA override. AAA override is required for non open authentication in case AAA attributes are to be prioritized. It is required only in case guest user need to be deauthenticated after lifetime or have to give aaa-override attribute to the user.

no shutdown Example:
Switch(config-wlan) # no shutdown

Enables the WLAN.

end Example:
Switch (config) # end

Returns to privileged EXEC mode.

show wireless mobility summary Example:
Switch # show wireless mobility summary

Verifies the mobility controller IP address and mobility tunnel status.

show wlan name wlan-name/id Example:
Switch # show wlan name mywlan

Displays the configuration of mobility anchor.

Example
Configuring Mobility Controller
Mobility Controller mode should be enabled using the wireless mobility controller command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1650

Security

Configuring Mobility Controller

SUMMARY STEPS

1. configure terminal 2. wireless mobility group member ip ip-address public-ip ip-address group group-name 3. wireless mobility controller peer-group peer-group-name 4. wireless mobility controller peer-group peer-group-name member ip ipaddress public-ip ipaddress 5. end 6. show wireless mobility summary

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

wireless mobility group member ip ip-address public-ip Adds all peers within the MC group. The ip-address should

ip-address group group-name

be the guest controller's IP address.

Example:

Switch (config) # wireless mobility group member ip 27.0.0.1 public-ip 23.0.0.1 group test

Step 3

wireless mobility controller peer-group peer-group-name Creates the switch peer group.
Example:
Switch (config) # wireless mobility controller peer-group pg

Step 4

wireless mobility controller peer-group peer-group-name Adds the MA to the switch peer group. member ip ipaddress public-ip ipaddress
Example:
Switch (config) # wireless mobility controller peer-group pg member ip 9.7.136.10 public-ip 9.7.136.10

Step 5

end Example:
Switch (config) # end

Returns to privileged EXEC mode.

Step 6

show wireless mobility summary Example:
Switch # show wireless mobility summary

Displays the configuration details.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1651

Obtaining a Web Authentication Certificate

Security

Example

Obtaining a Web Authentication Certificate

SUMMARY STEPS

1. configure terminal 2. crypto pki import trustpoint name pkcs12 tftp: passphrase 3. end 4. show crypto pki trustpoints cert

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

crypto pki import trustpoint name pkcs12 tftp: passphrase Imports certificate.
Example:
Switch (config)# crypto pki import cert pkcs12 tftp://9.1.0.100/ldapserver-cert.p12 cisco

Step 3

end Example:
Switch (config)# end

Returns to privileged EXEC mode.

Step 4

show crypto pki trustpoints cert Example:
Switch # show crypto pki trustpoints cert

Displays the configuration details.

Example

Displaying a Web Authentication Certificate

SUMMARY STEPS

1. show crypto ca certificate verb

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1652

Security

Choosing the Default Web Authentication Login Page

DETAILED STEPS

Step 1

Command or Action show crypto ca certificate verb Example:
Switch # show crypto ca certificate verb

Purpose Displays the current web authentication certificate details.

Example

Choosing the Default Web Authentication Login Page
AAA override flag should be enabled on the WLAN for web authentication using local or remote AAA server.

SUMMARY STEPS

1. configure terminal 2. parameter-map type webauth parameter-map name 3. wlan wlan-name 4. shutdown 5. security web-auth 6. security web-auth authentication-list authentication list name 7. security web-auth parameter-map parameter-map name 8. no shutdown 9. end 10. show running-config | section wlan-name 11. show running-config | section parameter-map type webauth parameter-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

parameter-map type webauth parameter-map name Configures the web-auth parameter-map. Example:
Switch (config) # parameter-map type webauth test

Step 3

wlan wlan-name Example:
Switch (config) # wlan wlan10

For the wlan-name, enter the profile name. The range is 1- 32 characters.

Step 4

shutdown Example:

Disables WLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1653

Choosing a Customized Web Authentication Login Page from an External Web Server

Security

Step 5 Step 6
Step 7 Step 8 Step 9 Step 10 Step 11

Command or Action
Switch (config) # shutdown

Purpose

security web-auth Example:
Controller (config-wlan) # security web-auth

Enables web-auth on WLAN.

security web-auth authentication-list authentication list Allows you to map the authentication list name with the

name

web-auth WLAN.

Example:

Controller (config-wlan) # security web-auth authentication-list test

security web-auth parameter-map parameter-map name Allows you to map the parameter-map name with the

Example:

web-auth WLAN.

Switch (config) # security web-auth parameter-map test

no shutdown Example:
Switch (config) # no shutdown

Enables the WLAN.

end Example:
Switch (config) # end

Returns to privileged EXEC mode.

show running-config | section wlan-name Example:
Switch# show running-config | section mywlan

Displays the configuration details.

show running-config | section parameter-map type webauth parameter-map
Example:
Switch# show running-config | section parameter-map type webauth test

Displays the configuration details.

Example
Choosing a Customized Web Authentication Login Page from an External Web Server
AAA override flag should be enabled on the WLAN for web authentication using local or remote AAA server.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1654

Security

Choosing a Customized Web Authentication Login Page from an External Web Server

SUMMARY STEPS

1. configure terminal 2. parameter-map type webauth global 3. virtual-ip {ipv4 | ipv6} ip-address 4. parameter-map type webauth parameter-map name 5. type {authbypass | consent | webauth | webconsent} 6. redirect [for-login|on-success|on-failure] URL 7. redirect portal {ipv4 | ipv6} ip-address 8. end 9. show running-config | section parameter-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

parameter-map type webauth global

Configures a global webauth type parameter.

Example:

Switch (config) # parameter-map type webauth global

Step 3

virtual-ip {ipv4 | ipv6} ip-address

Configures the virtual IP address.

Example:

Switch (config-params-parameter-map) # virtual-ip ipv4 1.1.1.1

Step 4

parameter-map type webauth parameter-map name
Example:
Switch (config-params-parameter-map) # parameter-map type webauth test

Configures the webauth type parameter.

Step 5

type {authbypass | consent | webauth | webconsent} Example:

Configures webauth subtypes such as consent, passthru, webauth, or webconsent.

Switch (config-params-parameter-map) # type webauth

Step 6

redirect [for-login|on-success|on-failure] URL Example:

Configures the redirect URL for the log in page, success page, and failure page.

Switch (config-params-parameter-map) # redirect for-login http://9.1.0.100/login.html

Step 7

redirect portal {ipv4 | ipv6} ip-address
Example:
Switch (config-params-parameter-map) # redirect portal ipv4 23.0.0.1

Configures the external portal IPv4 address.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1655

Assigning Login, Login Failure, and Logout Pages per WLAN

Security

Step 8 Step 9

Command or Action end Example:
Switch (config-params-parameter-map) # end
show running-config | section parameter-map Example:
Switch # show running-config | section parameter-map

Purpose Returns to privileged EXEC mode.
Displays the configuration details.

Example

Assigning Login, Login Failure, and Logout Pages per WLAN

SUMMARY STEPS

1. configure terminal 2. parameter-map type webauth parameter-map-name 3. custom-page login device html-filename 4. custom-page login expired html-filename 5. custom-page failure device html-filename 6. custom-page success device html-filename 7. end 8. show running-config | section parameter-map type webauth parameter-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

parameter-map type webauth parameter-map-name Configures the webauth type parameter. Example:
Switch (config) # parameter-map type webauth test

Step 3

custom-page login device html-filename Example:

Allows you to specify the filename for web authentication customized login page.

Switch (config-params-parameter-map)# custom-page login device device flash:login.html

Step 4

custom-page login expired html-filename Example:

Allows you to specify the filename for web authentication customized login expiry page.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1656

Security

Configuring AAA-Override

Step 5 Step 6 Step 7 Step 8

Command or Action

Purpose

Switch (config-params-parameter-map)# custom-page login expired device flash:loginexpired.html

custom-page failure device html-filename Example:

Allows you to specify the filename for web authentication customized login failure page.

Switch (config-params-parameter-map)# custom-page failure device device flash:loginfail.html

custom-page success device html-filename Example:

Allows you to specify the filename for web authentication customized login success page.

Switch (config-params-parameter-map)# custom-page success device device flash:loginsuccess.html

end Example:
Switch (config-params-parameter-map)# end

Returns to privileged EXEC mode.

show running-config | section parameter-map type webauth parameter-map

Displays the configuration details.

Example:

Switch (config) # show running-config | section parameter-map type webauth test

Example

Configuring AAA-Override

SUMMARY STEPS

1. configure terminal 2. wlan wlan-name 3. aaa-override 4. end 5. show running-config | section wlan-name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1657

Configuring Client Load Balancing

Security

Step 2 Step 3 Step 4 Step 5

Command or Action wlan wlan-name Example:
Switch (config) # wlan ramban
aaa-override Example:
Switch (config-wlan) # aaa-override
end Example:
Switch (config-wlan) # end
show running-config | section wlan-name Example:
Switch # show running-config | section ramban

Purpose For wlan-name, enter the profile name. The range is 1- 32 characters. Enables AAA override on the WLAN.
Returns to privileged EXEC mode.
Displays the configuration details.

Example

Configuring Client Load Balancing

SUMMARY STEPS

1. configure terminal 2. wlan wlan-name 3. shutdown 4. mobility anchor ip-address1 5. mobility anchor ip-address2 6. no shutdown wlan 7. end 8. show running-config | section wlan-name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Step 2

wlan wlan-name Example:
Switch (config)# wlan ramban

Purpose Enters global configuration mode.
For wlan-name, enter the profile name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1658

Security

Configuring Preauthentication ACL

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8

Command or Action shutdown Example:
Switch (config-wlan)# shutdown

Purpose Disables WLAN.

mobility anchor ip-address1

Configures a guest controller as mobility anchor.

Example:

Switch (config-wlan) # mobility anchor 9.7.136.15

mobility anchor ip-address2

Configures a guest controller as mobility anchor.

Example:

Switch (config-wlan) # mobility anchor 9.7.136.16

no shutdown wlan Example:
Switch (config-wlan) # no shutdown wlan

Enables the WLAN.

end Example:
Switch (config-wlan) # end

Returns to privileged EXEC mode.

show running-config | section wlan-name Example:
Switch # show running-config | section ramban

Displays the configuration details.

Example

Configuring Preauthentication ACL

SUMMARY STEPS

1. configure terminal 2. wlan wlan-name 3. shutdown 4. ip access-group web preauthrule 5. no shutdown 6. end 7. show wlan name wlan-name

DETAILED STEPS

Step 1

Command or Action configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1659

Configuring IOS ACL Definition

Security

Step 2 Step 3 Step 4 Step 5 Step 6 Step 7

Command or Action Example:
Switch# configure terminal
wlan wlan-name Example:
Switch (config)# wlan ramban
shutdown Example:
Switch (config-wlan)# shutdown
ip access-group web preauthrule Example:
Switch (config-wlan)# ip access-group web preauthrule
no shutdown Example:
Switch (config)# no shutdown
end Example:
Switch (config-wlan)# end
show wlan name wlan-name Example:
Switch# show wlan name ramban

Purpose For wlan-name, enter the profile name. Disables the WLAN. Configures ACL that has to be applied before authentication. Enables the WLAN. Returns to privileged EXEC mode. Displays the configuration details.

Example

Configuring IOS ACL Definition

SUMMARY STEPS

1. configure terminal 2. ip access-list extended access-list number 3. permit udp any eq port number any 4. end 5. show access-lists ACL number

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1660

Security

Configuring Webpassthrough

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Purpose Enters global configuration mode.

Step 2

ip access-list extended access-list number Example:
Switch (config) # ip access-list extended 102

Configures extended IP access-list.

Step 3

permit udp any eq port number any

Configures destination host.

Example:

Switch (config-ext-nacl) # permit udp any eq 8080 any

Step 4

end Example:
Switch (config-wlan) # end

Returns to privileged EXEC mode.

Step 5

show access-lists ACL number Example:
Switch # show access-lists 102

Displays the configuration details.

Example

Configuring Webpassthrough

SUMMARY STEPS

1. configure terminal 2. parameter-map type webauth parameter-map name 3. type consent 4. end 5. show running-config | section parameter-map type webauth parameter-map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch # configure terminal

Step 2 parameter-map type webauth parameter-map name

Purpose Enters global configuration mode.
Configures the webauth type parameter.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1661

Configuration Examples for Guest Access

Security

Step 3 Step 4 Step 5

Command or Action Example:
Switch (config) # parameter-map type webauth webparalocal

Purpose

type consent

Configures webauth type as consent.

Example:

Switch (config-params-parameter-map) # type consent

end Example:
Switch (config-params-parameter-map) # end

Returns to privileged EXEC mode.

show running-config | section parameter-map type webauth parameter-map

Displays the configuration details.

Example:

Switch (config) # show running-config | section parameter-map type webauth test

Example

Configuration Examples for Guest Access
Example: Creating a Lobby Ambassador Account
This example shows how to configure a lobby ambassador account.
Switch# configure terminal Switch(config)# user-name lobby Switch(config)# type lobby-admin Switch(config)# password 0 lobby Switch(config)# end Switch# show running-config | section lobby
user-name lobby creation-time 1351118727 password 0 lobby type lobby-admin
Example: Obtaining Web Authentication Certificate
This example shows how to obtain web authentication certificate.
Switch# configure terminal Switch(config)# crypto pki import cert pkcs12 tftp://9.1.0.100/ldapserver-cert.p12 cisco Switch(config)# end Switch# show crypto pki trustpoints cert

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1662

Security

Example: Obtaining Web Authentication Certificate
Trustpoint cert: Subject Name: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Serial Number (hex): 00 Certificate configured.
Switch# show crypto pki certificates cert Certificate
Status: Available Certificate Serial Number (hex): 04 Certificate Usage: General Purpose Issuer:
e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Subject: Name: ldapserver e=rkannajr@cisco.com cn=ldapserver ou=WNBU o=Cisco st=California c=US Validity Date: start date: 07:35:23 UTC Jan 31 2012 end date: 07:35:23 UTC Jan 28 2022 Associated Trustpoints: cert ldap12 Storage: nvram:rkannajrcisc#4.cer
CA Certificate Status: Available Certificate Serial Number (hex): 00 Certificate Usage: General Purpose Issuer: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Subject: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Validity Date: start date: 07:27:56 UTC Jan 31 2012 end date: 07:27:56 UTC Jan 28 2022 Associated Trustpoints: cert ldap12 ldap Storage: nvram:rkannajrcisc#0CA.cer

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1663

Example: Displaying a Web Authentication Certificate

Security

Example: Displaying a Web Authentication Certificate
This example shows how to display a web authentication certificate.
Switch# show crypto ca certificate verb Certificate Status: Available Version: 3 Certificate Serial Number (hex): 2A9636AC00000000858B Certificate Usage: General Purpose Issuer:
cn=Cisco Manufacturing CA o=Cisco Systems Subject: Name: WS-C3780-6DS-S-2037064C0E80 Serial Number: PID:WS-C3780-6DS-S SN:FOC1534X12Q cn=WS-C3780-6DS-S-2037064C0E80 serialNumber=PID:WS-C3780-6DS-S SN:FOC1534X12Q CRL Distribution Points: http://www.cisco.com/security/pki/crl/cmca.crl Validity Date: start date: 15:43:22 UTC Aug 21 2011 end date: 15:53:22 UTC Aug 21 2021 Subject Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Signature Algorithm: SHA1 with RSA Encryption Fingerprint MD5: A310B856 A41565F1 1D9410B5 7284CB21 Fingerprint SHA1: 04F180F6 CA1A67AF 9D7F561A 2BB397A1 0F5EB3C9 X509v3 extensions: X509v3 Key Usage: F0000000
Digital Signature Non Repudiation Key Encipherment Data Encipherment X509v3 Subject Key ID: B9EEB123 5A3764B4 5E9C54A7 46E6EECA 02D283F7 X509v3 Authority Key ID: D0C52226 AB4F4660 ECAE0591 C7DC5AD1 B047F76C Authority Info Access: Associated Trustpoints: CISCO_IDEVID_SUDI Key Label: CISCO_IDEVID_SUDI

Example: Configuring Guest User Accounts
This example shows how to configure a guest user account.

Switch# configure terminal

Switch(config)# user-name guest

Switch(config-user-name)# password 0 guest

Switch(config-user-name)# type network-user description guest guest-user lifetime year 1

month 10 day 3 hour 1 minute 5 second 30

Switch(config-user-name)# end

Switch# show aaa local netuser all

User-Name

: guest

Type

: guest

Password

: guest

Is_passwd_encrypted : No

Descriptio

: guest

Attribute-List

: Not-Configured

First-Login-Time : Not-Logged-In

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1664

Security

Example: Configuring Mobility Controller

Num-Login Lifetime Start-Time

:0 : 1 years 10 months 3 days 1 hours 5 mins 30 secs : 20:47:37 chennai Dec 21 2012

Example: Configuring Mobility Controller
This example shows how to configure a mobility controller.

Switch# configure terminal Switch(config)# wireless mobility group member ip 27.0.0.1 public-ip 23.0.0.1 group test Switch(config)# wireless mobility controller peer-group pg Switch(config)# wireless mobility controller peer-group pg member ip 9.7.136.10 public-ip 9.7.136.10 Switch(config)# end Switch# show wireless mobility summary

Mobility Controller Summary:

Mobility Role Mobility Protocol Port Mobility Group Name Mobility Oracle DTLS Mode Mobility Domain ID for 802.11r Mobility Keepalive Interval Mobility Keepalive Count Mobility Control Message DSCP Value Mobility Domain Member Count

: Mobility Controller : 16666 : default : Enabled : Enabled : 0xac34 : 10 :3 :7 :3

Link Status is Control Link Status : Data Link Status

Controllers configured in the Mobility Domain:

IP

Public IP

Group Name

Multicast IP

Link Status

-------------------------------------------------------------------------------

9.9.9.2

-

default

0.0.0.0

UP : UP

12.12.11.11

12.13.12.12

rasagna-grp

DOWN : DOWN

27.0.0.1

23.0.0.1

test

DOWN : DOWN

Switch Peer Group Name Switch Peer Group Member Count Bridge Domain ID Multicast IP Address

: spg1 :0 :0 : 0.0.0.0

Switch Peer Group Name Switch Peer Group Member Count Bridge Domain ID Multicast IP Address

: pg :1 :0 : 0.0.0.0

IP

Public IP

Link Status

--------------------------------------------------

9.7.136.10

9.7.136.10

DOWN : DOWN

Example: Choosing the Default Web Authentication Login Page
This example shows how to choose a default web authentication login page.

Switch# configure terminal Switch(config)# parameter-map type webauth test

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1665

Example: Choosing a Customized Web Authentication Login Page from an External Web Server

Security

This operation will permanently convert all relevant authentication commands to their CPL control-policy equivalents. As this conversion is irreversible and will disable the conversion CLI 'authentication display [legacy|new-style]', you are strongly advised to back up your current configuration before proceeding. Do you wish to continue? [yes]: yes Switch(config)# wlan wlan50 Switch(config-wlan)# shutdown Switch(config-wlan)# security web-auth authentication-list test Switch(config-wlan)# security web-auth parameter-map test Switch(config-wlan)# no shutdown Switch(config-wlan)# end Switch# show running-config | section wlan50 wlan wlan50 50 wlan50
security wpa akm cckm security wpa wpa1 security wpa wpa1 ciphers aes security wpa wpa1 ciphers tkip security web-auth authentication-list test security web-auth parameter-map test session-timeout 1800 no shutdown
Switch# show running-config | section parameter-map type webauth test parameter-map type webauth test
type webauth
Example: Choosing a Customized Web Authentication Login Page from an External Web Server
This example shows how to choose a customized web authentication login page from an external web server.
Switch# configure terminal Switch(config)# parameter-map type webauth global Switch(config-params-parameter-map)# virtual-ip ipv4 1.1.1.1 Switch(config-params-parameter-map)# parameter-map type webauth test Switch(config-params-parameter-map)# type webauth Switch(config-params-parameter-map)# redirect for-login http://9.1.0.100/login.html Switch(config-params-parameter-map)# redirect portal ipv4 23.0.0.1 Switch(config-params-parameter-map)# end Switch# show running-config | section parameter-map parameter-map type webauth global virtual-ip ipv4 1.1.1.1 parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 23.0.0.1 security web-auth parameter-map rasagna-auth-map security web-auth parameter-map test
Example: Assigning Login, Login Failure, and Logout Pages per WLAN
This example shows how to assign login, login failure and logout pages per WLAN.
Switch# configure terminal Switch(config)# parameter-map type webauth test Switch(config-params-parameter-map)# custom-page login device flash:loginsantosh.html Switch(config-params-parameter-map)# custom-page login expired device flash:loginexpire.html

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1666

Security

Example: Configuring AAA-Override

Switch(config-params-parameter-map)# custom-page failure device flash:loginfail.html Switch(config-params-parameter-map)# custom-page success device flash:loginsucess.html Switch(config-params-parameter-map)# end Switch# show running-config | section parameter-map type webauth test
parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 23.0.0.1 custom-page login device flash:loginsantosh.html custom-page success device flash:loginsucess.html custom-page failure device flash:loginfail.html custom-page login expired device flash:loginexpire.html
Example: Configuring AAA-Override
This example shows how to configure aaa-override.
Switch# configure terminal Switch(config)# wlan fff Switch(config-wlan)# aaa-override Switch(config-wlan)# end Switch# show running-config | section fff
wlan fff 44 fff aaa-override shutdown
Example: Configuring Client Load Balancing
This example shows how to configure client load balancing.
Switch# configure terminal Switch(config)# wlan fff Switch(config-wlan)# shutdown Switch(config-wlan)# mobility anchor 9.7.136.15 Switch(config-wlan)# mobility anchor 9.7.136.16 Switch(config-wlan)# no shutdown wlan Switch(config-wlan)# end Switch# show running-config | section fff wlan fff 44 fff
aaa-override shutdown
Example: Configuring Preauthentication ACL
This example shows how to configure preauthentication ACL.
Switch# configure terminal Switch(config)# wlan fff Switch(config-wlan)# shutdown Switch(config-wlan)# ip access-group web preauthrule Switch(config-wlan)# no shutdown Switch(config-wlan)# end Switch# show wlan name fff

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1667

Example: Configuring IOS ACL Definition

Security

Example: Configuring IOS ACL Definition
This example shows how to configure IOS ACL definition.
Switch# configure terminal Switch(config)# ip access-list extended 102 Switch(config-ext-nacl)# permit udp any eq 8080 any Switch(config-ext-nacl)# end Switch# show access-lists 102
Extended IP access list 102 10 permit udp any eq 8080 any
Example: Configuring Webpassthrough
This example shows how to configure webpassthrough.
Switch# configure terminal Switch(config)# parameter-map type webauth webparalocal Switch(config-params-parameter-map)# type consent Switch(config-params-parameter-map)# end Switch# show running-config | section parameter-map type webauth test
parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 23.0.0.1

Additional References for Guest Access

Related Documents

Related Topic Mobility CLI commands

Document Title
Mobility Command Reference, Cisco IOS XE 3SE (Cisco WLC 5700 Series)

Mobility configuration

Mobility Configuration Guide, Cisco IOS XE 3SE (Cisco WLC 5700 Series)

Security CLI commands

Security Command Reference, Cisco IOS Release 3SE (Cisco WLC 5700 Series)

Configuring web-based authentication on the Security Configuration Guide, Cisco IOS Release 3SE (Cisco

Catalyst 5700 Series Wireless Controller

WLC 5700 Series)

Wired guest access configuration and commands

Identity Based Networking Services

Standards and RFCs

Standard/RFC Title

None

-

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1668

Security

Feature History and Information for Guest Access

MIBs
MIB MIBs Link None To locate and download MIBs for selected platforms, Cisco software releases, and feature sets, use
Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Guest Access

Releases
Cisco IOS XE Release 3.2SE

Feature Information
This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1669

Feature History and Information for Guest Access

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1670

8 0 C H A P T E R
Managing Rogue Devices
· Finding Feature Information, on page 1671 · Information About Rogue Devices, on page 1671 · How to Configure Rogue Detection, on page 1674 · Monitoring Rogue Detection, on page 1676 · Examples: Rogue Detection Configuration, on page 1677 · Additional References for Rogue Detection, on page 1677 · Feature History and Information For Performing Rogue Detection Configuration, on page 1678
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Rogue Devices
Rogue access points can disrupt wireless LAN operations by hijacking legitimate clients and using plain-text or other denial-of-service or man-in-the-middle attacks. That is, a hacker can use a rogue access point to capture sensitive information, such as usernames and passwords. The hacker can then transmit a series of Clear to Send (CTS) frames. This action mimics an access point, informing a particular client to transmit, and instructing all the other clients to wait, which results in legitimate clients being unable to access network resources. Wireless LAN service providers have a strong interest in banning rogue access points from the air space. Because rogue access points are inexpensive and readily available, employees sometimes plug unauthorized rogue access points into existing LANs and build ad hoc wireless networks without their IT department's knowledge or consent. These rogue access points can be a serious breach of network security because they can be plugged into a network port behind the corporate firewall. Because employees generally do not enable any security settings on the rogue access point, it is easy for unauthorized users to use the access point to intercept network traffic and hijack client sessions. Even more alarming, wireless users frequently publish unsecure access point locations, increasing the odds of having enterprise security breached. The following are some guidelines to manage rogue devices:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1671

Information About Rogue Devices

Security

· The containment frames are sent immediately after the authorization and associations are detected. The enhanced containment algorithm provides more effective containment of ad hoc clients.
· · The are designed to serve associated clients. These access points spend relatively less time performing
off-channel scanning: about 50 milliseconds on each channel. If you want to perform high rogue detection, a monitor mode access point must be used. Alternatively, you can reduce the scan intervals from 180 seconds to a lesser value, for example, 120 or 60 seconds, ensuring that the radio goes off-channel more frequently, which improves the chances of rogue detection. However, the access point will still spend about 50 milliseconds on each channel.
· Rogue detection is disabled by default for OfficeExtend access points because these access points, which are deployed in a home environment, are likely to detect a large number of rogue devices.
· Client card implementations might mitigate the effectiveness of ad hoc containment.
· It is possible to classify and report rogue access points through the use of rogue states and user-defined classification rules that enable rogues to automatically move between states.
· Each controller limits the number of rogue containments to three per radio (or six per radio for access points in the monitor mode).
· Rogue Location Discovery Protocol (RLDP) detects rogue access points that are configured for open authentication.
· RLDP detects rogue access points that use a broadcast Basic Service Set Identifier (BSSID), that is, the access point broadcasts its Service Set Identifier in beacons.
· RLDP detects only those rogue access points that are on the same network. If an access list in the network prevents the sending of RLDP traffic from the rogue access point to the controller, RLDP does not work.
· RLDP does not work on 5-GHz dynamic frequency selection (DFS) channels. However, RLDP works when the managed access point is in the monitor mode on a DFS channel.
· If RLDP is enabled on mesh APs, and the APs perform RLDP tasks, the mesh APs are dissociated from the controller. The workaround is to disable RLDP on mesh APs.
· If RLDP is enabled on nonmonitor APs, client connectivity outages occur when RLDP is in process.
· If the rogue is manually contained, the rogue entry is retained even after the rogue expires.
· If the rogue is contained by any other means, such as auto, rule, and AwIPS preventions, the rogue entry is deleted when it expires.
· The controller will request to AAA server for rogue client validation only once. As a result, if rogue client validation fails on the first attempt then the rogue client will not be detected as a threat any more. To avoid this, add the valid client entries in the authentication server before enabling Validate Rogue Clients Against AAA.
· In the 7.4 and earlier releases, if a rogue that was already classified by a rule was not reclassified. In the 7.5 release, this behavior is enhanced to allow reclassification of rogues based on the priority of the rogue rule. The priority is determined by using the rogue report that is received by the controller.
· The rogue detector AP fails to co-relate and contain the wired rogue AP on a 5Mhz channel because the MAC address of the rogue AP for WLAN, LAN, 11a radio and 11bg radio are configured with a difference of +/-1 of the rogue BSSID. In the 8.0 release, this behavior is enhanced by increasing the range of MAC address, that the rogue detector AP co-relates the wired ARP MAC and rogue BSSID, by +/-3.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1672

Security

Information About Rogue Devices
Detecting Rogue Devices The controller continuously monitors all the nearby access points and automatically discovers and collects information on rogue access points and clients. When the controller discovers a rogue access point, it uses the Rogue Location Discovery Protocol (RLDP) and the rogue detector mode access point is connected to determine if the rogue is attached to your network. Controller initiates RLDP on rogue devices that have open authenticated and configured. If RLDP uses Flexconnect or local mode access points, then clients are disconnected for that moment. After the RLDP cycle, the clients are reconnected to the access points. As and when rogue access points are seen (auto-configuration), the RLDP process is initiated. You can configure the controller to use RLDP on all the access points or only on the access points configured for the monitor (listen-only) mode. The latter option facilitates automated rogue access point detection in a crowded radio frequency (RF) space, allowing monitoring without creating unnecessary interference and without affecting the regular data access point functionality. If you configure the controller to use RLDP on all the access points, the controller always chooses the monitor access point for RLDP operation if a monitor access point and a local (data) access point are both nearby. If RLDP determines that the rogue is on your network, you can choose to contain the detected rogue either manually or automatically. RLDP detects on wire presence of the rogue access points that are configured with open authentication only once, which is the default retry configuration. Retries can be configured using the config rogue ap rldp retries command. You can initiate or trigger RLDP from controller in three ways: 1. Enter the RLDP initiation command manually from the controller CLI. The equivalent GUI option for
initiating RLDP is not supported. config rogue ap rldp initiate mac-address
2. Schedule RLDP from the controller CLI. The equivalent GUI option for scheduling RLDP is not supported. config rogue ap rldp schedule
3. Auto RLDP. You can configure auto RLDP on controller either from controller CLI or GUI but keep in mind the following guidelines: · The auto RLDP option can be configured only when the rogue detection security level is set to custom. · Either auto RLDP or schedule of RLDP can be enabled at a time.
A rogue access point is moved to a contained state either automatically or manually. The controller selects the best available access point for containment and pushes the information to the access point. The access point stores the list of containments per radio. For auto containment, you can configure the controller to use only the monitor mode access point. The containment operation occurs in the following two ways:
· The container access point goes through the list of containments periodically and sends unicast containment frames. For rogue access point containment, the frames are sent only if a rogue client is associated.
· Whenever a contained rogue activity is detected, containment frames are transmitted.
Individual rogue containment involves sending a sequence of unicast disassociation and deauthentication frames.
Cisco Prime Infrastructure Interaction and Rogue Detection Cisco Prime Infrastructure supports rule-based classification and uses the classification rules configured on the controller. The controller sends traps to Cisco Prime Infrastructure after the following events:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1673

How to Configure Rogue Detection

Security

· If an unknown access point moves to the Friendly state for the first time, the controller sends a trap to Cisco Prime Infrastructure only if the rogue state is Alert. It does not send a trap if the rogue state is Internal or External.
· If a rogue entry is removed after the timeout expires, the controller sends a trap to Cisco Prime Infrastructure for rogue access points categorized as Malicious (Alert, Threat) or Unclassified (Alert). The controller does not remove rogue entries with the following rogue states: Contained, Contained Pending, Internal, and External.

How to Configure Rogue Detection

Configuring Rogue Detection (CLI)

SUMMARY STEPS

1. configure terminal 2. wireless wps rogue detection min-rssi rssi in dBm 3. wireless wps rogue detection min-transient-time time in seconds 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wireless wps rogue detection min-rssi rssi in dBm
Example:
Switch(config)# wireless wps rogue detection min-rssi 100

Purpose Enters global configuration mode.
Specify the minimum RSSI value that rogues should have for APs to detect and for rogue entry to be created in the switch. Valid range for the rssi in dBm parameter is ­128 dBm to -70 dBm, and the default value is -128 dBm. Note This feature is applicable to all the AP modes.
There can be many rogues with very weak RSSI values that do not provide any valuable information in rogue analysis. Therefore, you can use this option to filter rogues by specifying the minimum RSSI value at which APs should detect rogues.

Step 3

wireless wps rogue detection min-transient-time time in seconds
Example:
Switch(config)# wireless wps rogue detection min-transient-time

Specify the time interval at which rogues have to be consistently scanned for by APs after the first time the rogues are scanned.
Valid range for the time in sec parameter is 120 seconds to 1800 seconds, and the default value is 0.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1674

Security

Configuring Rogue Detection (GUI)

Command or Action

Step 4

end Example:
Switch(config)# end

Configuring Rogue Detection (GUI)

Purpose Note This feature is applicable to APs that are in
monitor mode only.
Using the transient interval values, you can control the time interval at which APs should scan for rogues. APs can also filter the rogues based on their transient interval values.
This feature has the following advantages:
· Rogue reports from APs to the controller are shorter
· Transient rogue entries are avoided in the controller
· Unnecessary memory allocation for transient rogues are avoided
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Step 1 Step 2 Step 3 Step 4
Step 5

Make sure that rogue detection is enabled on the corresponding access points. Rogue detection is enabled by default for all access points joined to the controller (except for OfficeExtend access points). However, you can enable or disable rogue detection for individual access point by choosing Configuration > Wireless > Access Policies > All APs to open Edit AP page, selecting or unselecting the Rogue Detector check box in the General area of the Edit AP page. Choose Configuration > Security > Wireless Protection Policies > Rogue Policies.
The Rogue Policies page is displayed.
Choose one of the following options from the Rogue Location Discovery Protocol drop-down list:
· Disable--Disables RLDP on all the access points. This is the default value. · All APs--Enables RLDP on all the access points. · Monitor Mode APs--Enables RLDP only on the access points in the monitor mode.
In the Expiration Timeout for Rogue AP and Rogue Client Entries text box, enter the number of seconds after which the rogue access point and client entries expire and are removed from the list. The valid range is 240 to 3600 seconds, and the default value is 1200 seconds.
Note If a rogue access point or client entry times out, it is removed from the controller only if its rogue state is Alert or Threat for any classification type.
To use the AAA server or local database to validate if rogue clients are valid clients, select the Validate Rogue Clients Against AAA check box. By default, the check box is unselected.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1675

Monitoring Rogue Detection

Security

Step 6 Step 7 Step 8
Step 9 Step 10

If necessary, select the Detect and Report Adhoc Networks check box to enable adhoc rogue detection and reporting. By default, the check box is selected.
In the Rogue Detection Report Interval text box, enter the time interval, in seconds, at which APs should send the rogue detection report to the controller. The valid range is 10 seconds to 300 seconds, and the default value is 10 seconds.
If you want the controller to automatically contain certain rogue devices, enable the following parameters. By default, these parameters are in disabled state.

Caution

When you select any of the Auto Contain parameters and click Apply, the following message is displayed: "Using this feature may have legal consequences. Do you want to continue?" The 2.4-GHz and 5-GHz frequencies in the Industrial, Scientific, and Medical (ISM) band are open to the public and can be used without a license. As such, containing devices on another party's network could have legal consequences.

· Auto Containment Level--Set the auto containment level. By default, the auto containment level is set to 1.
· Auto Containment only for Monitor mode APs--Configure the monitor mode access points for auto-containment. · Rogue on Wire--Configure the auto containment of rogues that are detected on the wired network. · Using Our SSID--Configure the auto containment of rogues that are advertising your network's SSID. If you
leave this parameter unselected, the controller only generates an alarm when such a rogue is detected. · Valid Client on Rogue AP--Configure the auto containment of a rogue access point to which trusted clients are
associated. If you leave this parameter unselected, the controller only generates an alarm when such a rogue is detected. · Adhoc Rogue AP--Configure the auto containment of adhoc networks detected by the controller. If you leave this parameter unselected, the controller only generates an alarm when such a network is detected.
Click Apply. Click Save Configuration.

Monitoring Rogue Detection

This section describes the new command for rogue detection. The following command can be used to monitor rogue detection on the switch.
Table 145: Monitoring Rogue Detection Command

Command show wireless wps rogue ap summary
show wireless wps rogue client detailed client-mac

Purpose
Displays a list of all rogue access points detected by the switch.
Displays detailed information for a specific rogue client.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1676

Security

Examples: Rogue Detection Configuration

Examples: Rogue Detection Configuration

This example shows how to configure the minimum RSSI that a detected rogue AP needs to be at, to have an entry created at the switch:
Switch# configure terminal Switch(config)# wireless wps rogue detection min-rssi -100 Switch(config)# end Switch# show wireless wps rogue client detailed/show wireless wps rogue ap summary
This example shows how to configure the classification interval:
Switch# configure terminal Switch(config)# wireless wps rogue detection min-transient-time 500 Switch(config)# end Switch# show wireless wps rogue client detailed/show wireless wps rogue ap summary

Additional References for Rogue Detection

Related Documents

Related Topic
Security commands

Document Title
Security Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1677

Feature History and Information For Performing Rogue Detection Configuration

Security

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For Performing Rogue Detection Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1678

8 1 C H A P T E R
Classifying Rogue Access Points
· Finding Feature Information, on page 1679 · Information About Classifying Rogue Access Points, on page 1679 · Restrictions for Classifying Rogue Access Points, on page 1682 · How to Classify Rogue Access Points, on page 1683 · Viewing and Classifying Rogue Devices (GUI) , on page 1688 · Examples: Classifying Rogue Access Points, on page 1690 · Additional References for Classifying Rogue Access Points, on page 1690 · Feature History and Information For Classifying Rogue Access Points, on page 1691
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Classifying Rogue Access Points
The controller software enables you to create rules that can organize and display rogue access points as Friendly, Malicious, or Unclassified. By default, none of the classification rules are enabled. Therefore, all unknown access points are categorized as Unclassified. When you create a rule, configure conditions for it, and enable the rule, the unclassified access points are reclassified. Whenever you change a rule, it is applied to all access points (friendly, malicious, and unclassified) in the Alert state only.
Note Rule-based rogue classification does not apply to ad hoc rogues and rogue clients.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1679

Information About Classifying Rogue Access Points

Security

Note You can configure up to 64 rogue classification rules per controller.
When the controller receives a rogue report from one of its managed access points, it responds as follows:
1. The controller verifies that the unknown access point is in the friendly MAC address list. If it is, the controller classifies the access point as Friendly.
2. If the unknown access point is not in the friendly MAC address list, the controller starts applying rogue classification rules.
3. If the rogue is already classified as Malicious, Alert or Friendly, Internal or External, the controller does not reclassify it automatically. If the rogue is classified differently, the controller reclassifies it automatically only if the rogue is in the Alert state.
4. The controller applies the first rule based on priority. If the rogue access point matches the criteria specified by the rule, the controller classifies the rogue according to the classification type configured for the rule.
5. If the rogue access point does not match any of the configured rules, the controller classifies the rogue as Unclassified.
6. The controller repeats the previous steps for all rogue access points.
7. If RLDP determines that the rogue access point is on the network, the controller marks the rogue state as Threat and classifies it as Malicious automatically, even if no rules are configured. You can then manually contain the rogue (unless you have configured RLDP to automatically contain the rogue), which would change the rogue state to Contained. If the rogue access point is not on the network, the controller marks the rogue state as Alert, and you can manually contain the rogue.
8. If desired, you can manually move the access point to a different classification type and rogue state.

Table 146: Classification Mapping

Rule-Based

Rogue States

Classification Type

Friendly

· Internal--If the unknown access point is inside the network and poses no threat to WLAN security, you would manually configure it as Friendly, Internal. An example is the access points in your lab network.
· External--If the unknown access point is outside the network and poses no threat to WLAN security, you would manually configure it as Friendly, External. An example is an access point that belongs to a neighboring coffee shop.
· Alert--The unknown access point is moved to Alert if it is not in the neighbor list or in the user-configured friendly MAC list.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1680

Security

Information About Classifying Rogue Access Points

Rule-Based

Rogue States

Classification Type

Malicious

· Alert--The unknown access point is moved to Alert if it is not in the neighbor list or in the user-configured friendly MAC list.
· Threat--The unknown access point is found to be on the network and poses a threat to WLAN security.
· Contained--The unknown access point is contained.
· Contained Pending--The unknown access point is marked Contained, but the action is delayed due to unavailable resources.

Unclassified

· Pending--On first detection, the unknown access point is put in the Pending state for 3 minutes. During this time, the managed access points determine if the unknown access point is a neighbor access point.
· Alert--The unknown access point is moved to Alert if it is not in the neighbor list or in the user-configured friendly MAC list.
· Contained--The unknown access point is contained.
· Contained Pending--The unknown access point is marked Contained, but the action is delayed due to unavailable resources.

The classification and state of the rogue access points are configured as follows: · From Known to Friendly, Internal · From Acknowledged to Friendly, External · From Contained to Malicious, Contained

As mentioned previously, the controller can automatically change the classification type and rogue state of an unknown access point based on user-defined rules, or you can manually move the unknown access point to a different classification type and rogue state.
Table 147: Allowable Classification Type and Rogue State Transitions

From

To

Friendly (Internal, External, Alert)

Malicious (Alert)

Friendly (Internal, External, Alert)

Unclassified (Alert)

Friendly (Alert)

Friendly (Internal, External)

Malicious (Alert, Threat)

Friendly (Internal, External)

Malicious (Contained, Contained Pending) Malicious (Alert)

Unclassified (Alert, Threat)

Friendly (Internal, External)

Unclassified (Contained, Contained Pending)

Unclassified (Alert)

Unclassified (Alert)

Malicious (Alert)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1681

Restrictions for Classifying Rogue Access Points

Security

If the rogue state is Contained, you have to uncontain the rogue access point before you can change the classification type. If you want to move a rogue access point from Malicious to Unclassified, you must delete the access point and allow the controller to reclassify it.

Restrictions for Classifying Rogue Access Points

The following rules apply to this feature:
· Classifying Custom type rogues is tied to rogue rules. Therefore, it is not possible to manually classify a rogue as Custom. Custom class change can occur only using rogue rules.
· There are traps that are sent for containment by rule and for every 30 minutes for rogue classification change. For custom classification, the first trap does not contain the severity score because the trap has existed before the custom classification. The severity score is obtained from the subsequent trap that is generated after 30 minutes if the rogue is classified.
· Rogue rules are applied on every incoming new rogue report in the controller in the order of their priority.
· Once a rogue satisfies a higher priority rule and classified, it does not move down the priority list for the same report.
· Previously classified rogue gets re-classified on every new rogue report with the following restrictions:
· Rogues which are classified as friendly by rule and whose state is set to ALERT, go through re-classification on receiving the new rogue report.
· If a rogue is classified as friendly by the administrator manually, then the state is INTERNAL and it does not get re-classified on successive rogue reports.
· If rogue is classified as malicious, irrespective of the state it does not get re-classified on subsequent rogue reports.

· Transition of the rogue's state from friendly to malicious is possible by multiple rogue rules if some attribute is missing in new rogue report.

· Transition of the rogue's state from malicious to any other classification is not possible by any rogue rule.

· When service set identifiers (SSIDs) are defined as part of a rogue rule, and details of the rogue rule are displayed using the show wireless wps rogue rule detailed command, the output differs in Cisco IOS XE Release 3.6E and prior releases and Cisco IOS XE Denali 16.1.1 and later releases.
The following is sample output from the show wireless wps rogue rule detailed command in Cisco IOS XE Release 3.6E and prior releases:
Switch# show wireless wps rogue rule detailed test

Priority Rule Name State Type Match Operation Hit Count Total Conditions Condition :
type SSID Count

:1 : wpstest : Disabled : Pending : Any :0 :1
: Ssid : 2 ! SSID count differs.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1682

Security

How to Classify Rogue Access Points

SSID 1 SSID 2

: ssid1 : ssid2

The following is sample output from the show wireless wps rogue rule detailed command in Cisco IOS XE Denali 16.1.1 and later releases:
Switch# show wireless wps rogue rule detailed test

Priority Rule Name State Type Match Operation Hit Count Total Conditions Condition :
type SSID Count SSID SSID

:1 : wpstest : Disabled : Pending : Any :0 :1
: Ssid : 2 ! SSID count differs. : ssid1 : ssid2

How to Classify Rogue Access Points

Configuring Rogue Classification Rules (CLI)

SUMMARY STEPS

1. configure terminal 2. wireless wps rogue rule rule-name priority priority 3. classify {friendly | malicious} 4. condition {client-count | duration | encryption | infrastructure | rssi | ssid} 5. match {all | any} 6. default 7. exit 8. shutdown 9. end 10. configure terminal 11. wireless wps rogue rule shutdown 12. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1683

Configuring Rogue Classification Rules (CLI)

Security

Step 2 Step 3 Step 4

Command or Action wireless wps rogue rule rule-name priority priority Example:
Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)#

Purpose
Creates or enables a rule. While creating a rule, you must enter priority for the rule.
Note After creating the rule, if you are editing the rule, you can change the priority only for the rogue rules that are disabled. You cannot change priority for the rogue rules that are enabled. While editing, changing the priority for a rogue rule is optional.

classify {friendly | malicious} Example:
Switch(config)# wireless wps rogue rule rule_3 priority 3
Switch(config-rule)# classify friendly

Classifies a rule.

condition {client-count | duration | encryption | infrastructure | rssi | ssid}
Example:
Switch(config)# wireless wps rogue rule rule_3 priority 3
Switch(config-rule)# condition client-count 5

Specifies to add the following conditions to a rule that the rogue access point must meet.
· client-count--Requires that a minimum number of clients be associated to the rogue access point. For example, if the number of clients associated to the rogue access point is greater than or equal to the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum number of clients to be associated to the rogue access point for the condition_value parameter. The valid range is 1 to 10 (inclusive), and the default value is 0.

· duration--Requires that the rogue access point be detected for a minimum period of time. If you choose this option, enter a value for the minimum detection period for the condition_value parameter. The valid range is 0 to 3600 seconds (inclusive), and the default value is 0 seconds.

· encryption--Requires that the advertised WLAN does not have encryption enabled.

· infrastructure--Requires the SSID to be known to the controller.

· rssi--Requires that the rogue access point have a minimum RSSI value. For example, if the rogue access point has an RSSI that is greater than the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum RSSI value for the condition_value parameter. The valid range is ­95 to ­50 dBm (inclusive), and the default value is 0 dBm.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1684

Security

Configuring Rogue Classification Rules (CLI)

Step 5 Step 6 Step 7
Step 8 Step 9 Step 10 Step 11 Step 12

Command or Action

Purpose
· ssid--Requires that the rogue access point have a specific SSID. You should add SSIDs that are not managed by the controller. If you choose this option, enter the SSID for the condition_value parameter. The SSID is added to the user-configured SSID list.

match {all | any} Example:
Switch(config)# wireless wps rogue rule rule_3 priority 3
Switch(config-rule)# match all

Specifies whether a detected rogue access point must meet all or any of the conditions specified by the rule in order for the rule to be matched and the rogue access point to adopt the classification type of the rule.

default Example:
Switch(config)# wireless wps rogue rule rule_3 priority 3
Switch(config-rule)# default

Specifies to set a command to its default.

exit Example:
Switch(config)# wireless wps rogue rule rule_3 priority 3 Switch(config-rule)# exit Switch(config)#

Specifies to exit the sub-mode.

shutdown Example:
Switch(config)# wireless wps rogue rule rule_3 priority 3
Switch(config-rule)# shutdown

Specifies to disable a particular rogue rule. For example, the rule rule_3 is disabled.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

wireless wps rogue rule shutdown

Specifies to disable all the rogue rules.

Example:

Switch(config)# wireless wps rogue rule shutdown

end Example:

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1685

Configuring Rogue Classification Rules (GUI)

Security

Command or Action
Switch(config)# end

Purpose

Configuring Rogue Classification Rules (GUI)

Step 1 Step 2
Step 3

Choose Security > Wireless Protection Policies > Rogue Policies > Rogue Rules to open the Rogue Rules page. Any rules that have already been created are listed in priority order. The name, type, and status of each rule is provided. Note If you ever want to delete a rule, hover your mouse cursor over the blue drop-down arrow for that rule and
click Remove.
Create a new rule as follows: a) Click Add Rule. An Add Rule section appears at the top of the page. b) In the Rule Name text box, enter a name for the new rule. Ensure that the name does not contain any spaces. c) From the Rule Type drop-down list, choose from the following options to classify rogue access points matching this
rule as friendly or malicious: · Friendly
· Malicious
d) Click Add to add this rule to the list of existing rules, or click Cancel to discard this new rule. Edit a rule as follows: a) Click the name of the rule that you want to edit. The Rogue Rule > Edit page appears. b) From the Type drop-down list, choose from the following options to classify rogue access points matching this rule:
· Friendly
· Malicious
c) From the Match Operation text box, choose one of the following: All--If this rule is enabled, a detected rogue access point must meet all of the conditions specified by the rule in order for the rule to be matched and the rogue to adopt the classification type of the rule. Any--If this rule is enabled, a detected rogue access point must meet any of the conditions specified by the rule in order for the rule to be matched and the rogue to adopt the classification type of the rule. This is the default value.
d) To enable this rule, select the Enable Rule check box. The default value is unselected. e) To disable this particular rule, unselect the Enable Rule check box.
Note You cannot disable all the rogue rule in one shot from GUI but you can disable all the rogue rules from CLI using the wireless wps rogue rule shutdown command.
f) From the Add Condition drop-down list, choose one or more of the following conditions that the rogue access point must meet and click Add Condition. · SSID--Requires that the rogue access point have a specific user-configured SSID. If you choose this option, enter the SSID in the User Configured SSID text box, and click Add SSID. The user-configured SSIDs are added and listed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1686

Security

Configuring Rogue Classification Rules (GUI)

Step 4

Note To delete an SSID, highlight the SSID and click Remove. The SSID applied on a WLAN cannot be applied for the rogue rule.
· RSSI--Requires that the rogue access point have a minimum Received Signal Strength Indication (RSSI) value. For example, if the rogue access point has an RSSI that is greater than the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum RSSI value in the Minimum RSSI text box. The valid range is ­95 to ­50 dBm (inclusive), and the default value is 0 dBm.
· Duration--Requires that the rogue access point be detected for a minimum period of time. If you choose this option, enter a value for the minimum detection period in the Time Duration text box. The valid range is 0 to 3600 seconds (inclusive), and the default value is 0 seconds.
· Client Count--Requires that a minimum number of clients be associated to the rogue access point. For example, if the number of clients associated to the rogue access point is greater than or equal to the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum number of clients to be associated to the rogue access point in the Minimum Number of Rogue Clients text box. The valid range is 1 to 10 (inclusive), and the default value is 0.
· No Encryption--Requires that the rogue access point's advertised WLAN does not have encryption enabled. If a rogue access point has encryption disabled, it is likely that more clients will try to associate to it. No further configuration is required for this option.
Note Cisco Prime Infrastructure refers to this option as "Open Authentication."
· Managed SSID--Requires that the rogue access point's managed SSID (the SSID configured for the WLAN) be known to the controller. No further configuration is required for this option.
Note The SSID and Managed SSID conditions cannot be used with the All operation because these two SSID lists are mutually exclusive. If you define a rule with Match All and have these two conditions configured, the rogue access points are never classified as friendly or malicious because one of the conditions can never be met.
You can add up to six conditions per rule. When you add a condition, it appears under the Conditions section.
Note If you ever want to delete a condition from this rule, click Remove near the condition.
· User configured SSID--Requires that the rogue access point have a substring of the specific user-configured SSID. The controller searches the substring in the same occurrence pattern and returns a match if the substring is found in the whole string of an SSID.
g) Click Apply.
If you want to change the priority in which rogue classification rules are applied, follow these steps:
a. Click Change Priority to access the Rogue Rules > Priority page.
The rogue rules are listed in priority order in the Change Rules Priority text box.
b. Click on a specific rule for which you want to change the priority, and click Up to raise its priority in the list or Down to lower its priority in the list.
Note You can change priority only for the disabled rule. You cannot change priority only for the enabled rule.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1687

Viewing and Classifying Rogue Devices (GUI)
c. Click Apply.

Security

Viewing and Classifying Rogue Devices (GUI)

Step 1 Step 2 Step 3
Step 4 Step 5

Choose Monitor > Rogues. Choose the following options to view the different types of rogue access points detected by the controller:
· Friendly APs
· Malicious APs
· Unclassified APs
The respective rogue APs pages provide the following information: the MAC address of the rogue access point, the number of radios that detected the rogue access point, the number of clients connected to the rogue access point, the current status of the rogue access point, and last heard.
Get more details about a rogue access point by clicking the MAC address of the access point. The Rogue AP Detail page appears. This page provides the following information: the MAC address of the rogue device, the type of rogue device (such as an access point), whether the rogue device is on the wired network, the dates and times when the rogue device was first and last reported, and the current status of the device. The Class Type text box shows the current classification for this rogue access point:
· Friendly--An unknown access point that matches the user-defined friendly rules or an existing known and acknowledged rogue access point. Friendly access points cannot be contained.
· Malicious--An unknown access point that matches the user-defined malicious rules or is moved manually by the user from the Friendly or Unclassified classification type. Note Once an access point is classified as Malicious, you cannot apply rules to it in the future, and it cannot be moved to another classification type. If you want to move a malicious access point to the Unclassified classification type, you must delete the access point and allow the controller to reclassify it.
· Unclassified--An unknown access point that does not match the user-defined friendly or malicious rules. An unclassified access point can be contained. It can also be moved to the Friendly or Malicious classification type automatically in accordance with user-defined rules or manually by the user.
If you want to change the classification of this device, choose a different classification from the Class Type drop-down list. Note A rogue access point cannot be moved to another class if its current state is Contain.
From the Update Status drop-down list, choose one of the following options to specify how the controller should respond to this rogue access point:
· Internal--The controller trusts this rogue access point. This option is available if the Class Type is set to Friendly.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1688

Security

Viewing and Classifying Rogue Devices (GUI)

Step 6 Step 7 Step 8 Step 9
Step 10
Step 11 Step 12 Step 13 Step 14

· External--The controller acknowledges the presence of this rogue access point. This option is available if the Class Type is set to Friendly.
· Contain--The controller contains the offending device so that its signals no longer interfere with authorized clients. This option is available if the Class Type is set to Malicious or Unclassified.
· Alert--The controller forwards an immediate alert to the system administrator for further action. This option is available if the Class Type is set to Malicious or Unclassified.
The bottom of the page provides information on both the access points that detected this rogue access point and any clients that are associated to it. To see more details for any of the clients, click Edit to open the Rogue Client Detail page.
Click Apply. Click Save Configuration. See any adhoc rogues detected by the controller by choosing Adhoc Rogues. The Adhoc Rogues page appears.
This page shows the following information: the MAC address, BSSID, and SSID of the adhoc rogue, the number of radios that detected the adhoc rogue, and the current status of the adhoc rogue.
Obtain more details about an adhoc rogue by clicking the MAC address of the rogue. The Adhoc Rogue Detail page appears.
This page provides the following information: the MAC address and BSSID of the adhoc rogue, the dates and times when the rogue was first and last reported, and the current status of the rogue.
From the Update Status drop-down list, choose one of the following options to specify how the controller should respond to this adhoc rogue:
· Contain--The controller contains the offending device so that its signals no longer interfere with authorized clients.
· Alert--The controller forwards an immediate alert to the system administrator for further action.
· Internal--The controller trusts this rogue access point.
· External--The controller acknowledges the presence of this rogue access point.
From the Maximum Number of APs to Contain the Rogue drop-down list, choose one of the following options to specify the maximum number of access points used to contain this adhoc rogue: 1, 2, 3, or 4. The bottom of the page provides information on the access points that detected this adhoc rogue.
Click Apply. Click Save Configuration. View any access points that have been configured to be ignored by choosing Rogue AP Ignore-List. The Rogue AP Ignore-List page appears.
This page shows the MAC addresses of any access points that are configured to be ignored. The rogue-ignore list contains a list of any autonomous access points that have been manually added to Cisco Prime Infrastructure maps by the users. The controller regards these autonomous access points as rogues even though the Prime Infrastructure is managing them. The rogue-ignore list allows the controller to ignore these access points. The list is updated as follows:
· When the controller receives a rogue report, it checks to see if the unknown access point is in the rogue-ignore access point list.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1689

Examples: Classifying Rogue Access Points

Security

· If the unknown access point is in the rogue-ignore list, the controller ignores this access point and continues to process other rogue access points.
· If the unknown access point is not in the rogue-ignore list, the controller sends a trap to the Prime Infrastructure. If the Prime Infrastructure finds this access point in its autonomous access point list, the Prime Infrastructure sends a command to the controller to add this access point to the rogue-ignore list. This access point is then ignored in future rogue reports.
· If a user removes an autonomous access point from the Prime Infrastructure, the Prime Infrastructure sends a command to the controller to remove this access point from the rogue-ignore list.

Examples: Classifying Rogue Access Points
This example shows how to create rule that can organize and display rogue access points as Friendly:
Switch# configure terminal Switch(config)# wireless wps rogue rule ap1 priority 1 Switch(config-rule)# classify friendly Switch(config-rule)# end
This example shows how to apply condition that the rogue access point must meet:
Switch# configure terminal Switch(config)# wireless wps rogue rule ap1 priority 1 Switch(config-rule)# condition client-count 5 Switch(config-rule)# condition duration 1000 Switch(config-rule)# end

Additional References for Classifying Rogue Access Points

Related Documents

Related Topic

Document Title

Security commands Security Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1690

Security

Feature History and Information For Classifying Rogue Access Points

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For Classifying Rogue Access Points

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1691

Feature History and Information For Classifying Rogue Access Points

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1692

8 2 C H A P T E R
Configuring wIPS
· Finding Feature Information, on page 1693 · Information About wIPS, on page 1693 · How to Configure wIPS on an Access Point, on page 1700 · Monitoring wIPS Information, on page 1701 · Examples: wIPS Configuration, on page 1701 · Additional References for Configuring wIPS, on page 1702 · Feature History for Performing wIPS Configuration, on page 1702
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About wIPS
The Cisco Adaptive wireless Intrusion Prevention System (wIPS) is an advanced approach to wireless threat detection and performance management. It combines network traffic analysis, network device and topology information, signature-based techniques, and anomaly detection to deliver highly accurate and complete wireless threat prevention. With a fully infrastructure-integrated solution, you can continually monitor wireless traffic on both the wired and wireless networks and use that network intelligence to analyze attacks from many sources to more accurately pinpoint and proactively prevent attacks rather than waiting until damage or exposure has occurred. The Cisco Adaptive wIPS is enabled by the Cisco 3300 Series Mobility Services Engine (MSE), which centralizes the processing of intelligence collected by the continuous monitoring of Cisco Aironet access points. With Cisco Adaptive wIPS functionalities and Cisco Prime Infrastructure integration into the MSE, the wIPS service can configure, monitor, and report wIPS policies and alarms.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1693

Information About wIPS

Security

Note If your wIPS deployment consists of a controller, access point, and MSE, you must set all the three entities to the UTC time zone.
The Cisco Adaptive wIPS is not configured on the controller. Instead, the Prime Infrastructure forwards the profile configuration to the wIPS service, which forwards the profile to the controller. The profile is stored in flash memory on the controller and sent to access points when they join the controller. When an access point disassociates and joins another controller, it receives the wIPS profile from the new controller.
Local mode access points with a subset of wIPS capabilities is referred to as Enhanced Local Mode access point or ELM AP. You can configure an access point to work in wIPS mode if the access point is in any of the following modes:
· Monitor
· Local
The regular local mode access point is extended with a subset of Wireless Intrusion Prevention System (wIPS) capabilities. This feature enables you to deploy your access points to provide protection without needing a separate overlay network.
wIPS ELM has limited capability of detecting off-channel alarms. The access point periodically goes off-channel, and monitors the non-serving channels for a short duration, and triggers alarms if any attack is detected on the channel. But the off-channel alarm detection is best effort and it takes longer time to detect attacks and trigger alarms, which might cause the ELM AP intermittently detect an alarm and clear it because it is not visible. Access points in any of the above modes can periodically send alarms based on the policy profile to the wIPS service through the controller. The wIPS service stores and processes the alarms and generates SNMP traps. The Prime Infrastructure configures its IP address as a trap destination to receive SNMP traps from the MSE.
This table lists all the SNMP trap controls and their respective traps. When a trap control is enabled, all the traps of the trap control are also enabled.
Note The controller uses only SNMPv2 for SNMP trap transmission.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1694

Security

Information About wIPS

Table 148: SNMP Trap Controls and their respective Traps

Tab Name General

Trap Control Link (Port) Up/Down Spanning Tree

Config Save

AP Client Traps

AP Register
Ap Interface Up/Down 802.11 Association 802.11 Disassociation 802.11 Deauthentication 802.11 Failed Authentication 802.11 Failed Association Exclusion NAC Alert

Trap
linkUp, linkDown
newRoot, topologyChange, stpInstanceNewRootTrap, stpInstanceTopologyChangeTrap
bsnDot11EssCreated, bsnDot11EssDeleted, bsnConfigSaved, ciscoLwappScheduledResetNotif, ciscoLwappClearResetNotif, ciscoLwappResetFailedNotif, ciscoLwappSysInvalidXmlConfig
bsnAPDisassociated, bsnAPAssociated
bsnAPIfUp, bsnAPIfDown
bsnDot11StationAssociate
bsnDot11StationDisassociate
bsnDot11StationDeauthenticate
bsnDot11StationAuthenticateFail
bsnDot11StationAssociateFail
bsnDot11StationBlacklisted
cldcClientWlanProfileName, cldcClientIPAddress, cldcApMacAddress, cldcClientQuarantineVLAN, cldcClientAccessVLAN

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1695

Information About wIPS
Tab Name Security Traps
Auto RF Profile Traps Auto RF Update Traps

Security

Trap Control

Trap

User Authentication

bsnTooManyUnsuccessLoginAttempts, cLWAGuestUserLoggedIn, cLWAGuestUserLoggedOut

RADIUS Servers Not Responding bsnRADIUSServerNotResponding, ciscoLwappAAARadiusReqTimedOut

WEP Decrypt Error

bsnWepKeyDecryptError

Rogue AP

bsnAdhocRogueAutoContained, bsnRogueApAutoContained, bsnTrustedApHasInvalidEncryption, bsnMaxRogueCountExceeded, bsnMaxRogueCountClear, bsnApMaxRogueCountExceeded, bsnApMaxRogueCountClear, bsnTrustedApHasInvalidRadioPolicy, bsnTrustedApHasInvalidSsid, bsnTrustedApIsMissing

SNMP Authentication

agentSnmpAuthenticationTrapFlag

Multiple Users

multipleUsersTrap

Load Profile

bsnAPLoadProfileFailed

Noise Profile

bsnAPNoiseProfileFailed

Interference Profile

bsnAPInterferenceProfileFailed

Coverage Profile

bsnAPCoverageProfileFailed

Channel Update

bsnAPCurrentChannelChanged

Tx Power Update

bsnAPCurrentTxPowerChanged

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1696

Security

Information About wIPS

Tab Name Mesh Traps

Trap Control Child Excluded Parent Parent Change Authfailure Mesh Child Moved Excessive Parent Change Excessive Children Poor SNR
Console Login Excessive Association Default Bridge Group Name

Trap ciscoLwappMeshChildExcludedParent ciscoLwappMeshParentChange ciscoLwappMeshAuthorizationFailure ciscoLwappMeshChildMoved ciscoLwappMeshExcessiveParentChange ciscoLwappMeshExcessiveChildren ciscoLwappMeshAbateSNR, ciscoLwappMeshOnsetSNR ciscoLwappMeshConsoleLogin ciscoLwappMeshExcessiveAssociation ciscoLwappMeshDefaultBridgeGroupName

The following are the trap description for the traps mentioned in the SNMP Trap Controls and their respective Traps table:
· General Traps
· SNMP Authentication--The SNMPv2 entity has received a protocol message that is not properly authenticated.

Note When a user who is configured in SNMP V3 mode tries to access the controller with an incorrect password, the authentication fails and a failure message is displayed. However, no trap logs are generated for the authentication failure.
· Link (Port) Up/Down--Link changes status from up or down. · Link (Port) Up/Down--Link changes status from up or down. · Multiple Users--Two users log on with the same ID. · Rogue AP--Whenever a rogue access point is detected, this trap is sent with its MAC address; when
a rogue access point that was detected earlier no longer exists, this trap is sent. · Config Save--Notification sent when the controller configuration is modified.
· Cisco AP Traps
· AP Register--Notification sent when an access point associates or disassociates with the controller. · AP Interface Up/Down--Notification sent when an access point interface (802.11X) status goes up
or down.
· Client Related Traps
· 802.11 Association--Associate notification that is sent when the client sends an association frame. · 802.11 Disassociation--Disassociate notification that is sent when the client sends a disassociation
frame.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1697

Information About wIPS

Security

· 802.11 Deauthentication--Deauthenticate notification that is sent when the client sends a deauthentication frame.
· 802.11 Failed Authentication--Authenticate failure notification that is sent when the client sends an authentication frame with a status code other than successful.
· 802.11 Failed Association--Associate failure notification that is sent when the client sends an association frame with a status code other than successful.
· Exclusion--Associate failure notification that is sent when a client is Exclusion Listed (blacklisted). · Authentication--Authentication notification that is sent when a client is successfully authenticated.
· Max Clients Limit Reached--Notification that is sent when the maximum number of clients, defined in the Threshold field, have associated with the controller.
· NAC Alert--Alert that is sent when a client joins an SNMP NAC-enabled WLAN.
This notification is generated when a client on NAC-enabled SSIDs complete Layer2 authentication to inform about the client's presence to the NAC appliance. cldcClientWlanProfileName represents the profile name of the WLAN that the 802.11 wireless client is connected to. cldcClientIPAddress represents the unique IP address of the client. cldcApMacAddress represents the MAC address of the AP to which the client is associated. cldcClientQuarantineVLAN represents the quarantine VLAN for the client. cldcClientAccessVLAN represents the access VLAN for the client.
· Association with Stats--Associate notification that is sent with data statistics when a client associates with the controller or roams. The data statistics include transmitted and received bytes and packets.
· Disassociation with Stats--Disassociate notification that is sent with data statistics when a client disassociates from the controller. The data statistics include transmitted and received bytes and packets, SSID, and session ID.
Note When you downgrade to Release 7.4 from a higher release, if a trap that was not supported in Release 7.4 (for example, NAC Alert trap) is enabled before the downgrade, all traps are disabled. After the downgrade, you must enable all the traps that were enabled before the downgrade. We recommend that you disable the new traps before the downgrade so that all the other traps are not disabled.
· Security Traps
· User Auth Failure--This trap is to inform that a client RADIUS Authentication failure has occurred. · RADIUS Server No Response--This trap is to indicate that no RADIUS server(s) are responding
to authentication requests sent by the RADIUS client. · WEP Decrypt Error--Notification sent when the controller detects a WEP decrypting error. · Rouge AP--Whenever a rogue access point is detected, this trap is sent with its MAC address; when
a rogue access point that was detected earlier no longer exists, this trap is sent. · SNMP Authentication--The SNMPv2 entity has received a protocol message that is not properly
authenticated.
Note When a user who is configured in SNMP V3 mode tries to access the controller with an incorrect password, the authentication fails and a failure message is displayed. However, no trap logs are generated for the authentication failure.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1698

Security

Information About wIPS
· Multiple Users--Two users log on with the same ID.
· SNMP Authentication
· Load Profile--Notification sent when the Load Profile state changes between PASS and FAIL. · Noise Profile--Notification sent when the Noise Profile state changes between PASS and FAIL. · Interference Profile--Notification sent when the Interference Profile state changes between PASS
and FAIL. · Coverage Profile--Notification sent when the Coverage Profile state changes between PASS and
FAIL.
· Auto RF Profile Traps
· Load Profile--Notification sent when the Load Profile state changes between PASS and FAIL. · Noise Profile--Notification sent when the Noise Profile state changes between PASS and FAIL. · Interference Profile--Notification sent when the Interference Profile state changes between PASS
and FAIL. · Coverage Profile--Notification sent when the Coverage Profile state changes between PASS and
FAIL.
· Auto RF Update Traps
· Channel Update--Notification sent when the access point dynamic channel algorithm is updated. · Tx Power Update--Notification sent when the access point dynamic transmit power algorithm is
updated.
· Mesh Traps
· Child Excluded Parent--Notification send when a defined number of failed association to the controller occurs through a parent mesh node.
· Notification sent when a child mesh node exceeds the threshold limit of the number of discovery response timeouts. The child mesh node does not try to associate an excluded parent mesh node for the interval defined. The child mesh node remembers the excluded parent MAC address when it joins the network, it informs the controller.
· Parent Change--Notification is sent by the agent when a child mesh node changes its parent. The child mesh node remembers its previous parent and it informs the controller about the change of its parent when it rejoins the network.
· Child Moved--Notification sent when a parent mesh node loses connection with its child mesh node.
· Excessive Parent Change--Notification sent when the child mesh node changes its parent frequently. Each mesh node keeps a count of the number of parent changes in a fixed time. If it exceeds the defined threshold then child mesh node informs the controller.
· Excessive Children--Notification sent when the child count exceeds for a RAP and MAP. · Poor SNR--Notification sent when the child mesh node detects a lower SNR on a backhaul link.
For the other trap, a notification is sent to clear a notification when the child mesh node detects an SNR on a backhaul link that is higher then the object defined by 'clMeshSNRThresholdAbate'. · Console Login--Notification is sent by the agent when login on MAP console is successful or failure after three attempts. · Default Bridge Group Name--Notification sent when MAP mesh node joins parent using 'default' bridge group name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1699

How to Configure wIPS on an Access Point

Security

Note The remaining traps do not have trap controls. These traps are not generated too frequently and do not require any trap control. Any other trap that is generated by the controller cannot be turned off.

Note In all of the above cases, the controller functions solely as a forwarding device.

Note To download the MIBs, click here.

How to Configure wIPS on an Access Point

Configuring wIPS on an Access Point (CLI)

SUMMARY STEPS

1. ap name name mode submode wips 2. end 3. show wireless wps wips summary 4. show wireless wps wips statistics

DETAILED STEPS

Step 1

Command or Action ap name name mode submode wips Example:
Switch# ap name ap1 mode local wips

Step 2

end Example:
Switch(config)# end

Step 3

show wireless wps wips summary Example:
Switch# show wireless wps wips summary

Step 4

show wireless wps wips statistics Example:
Switch# show wireless wps wips statistics

Purpose Configure an access point for local or monitor mode and then set the submode to wIPS.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
View the wIPS configuration on the access point.
View the current state of wIPS configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1700

Security

Configuring wIPS on an Access Point (GUI)

Configuring wIPS on an Access Point (GUI)

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6

Choose Configuration > Wireless > Access Points > All APs. The All APs page appears with a list of all access points that are associated with the switch.
Click the name of the access point for which you want to configure wIPS. The AP > Edit page appears.
In the General area, set the AP Mode parameter. To configure an access point for wIPS, you must choose one of the following modes from the AP Mode drop-down list:
· Local · Monitor
Set the AP Sub Mode to wIPS by choosing wIPS from the AP Sub Mode drop-down list. Click Apply. Click Save.

Monitoring wIPS Information

This section describes the new command for wIPS. The following command can be used to monitor wIPS configured on the access point.
Table 149: Monitoring wIPS Command

Command

Purpose

show wireless wps wips summary Displays the wIPS configuration on the access point.

show wireless wps wips statistics Displays the current state of wIPS configuration.

Examples: wIPS Configuration
This example shows how to configure wIPS on AP1:
Switch# ap name ap1 mode local submode wips Switch# end Switch# show wireless wps wips summary

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1701

Additional References for Configuring wIPS

Security

Additional References for Configuring wIPS

Related Documents

Related Topic

Document Title

System management commands Security Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History for Performing wIPS Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1702

8 3 C H A P T E R
Configuring Intrusion Detection System
· Finding Feature Information, on page 1703 · Information About Intrusion Detection System, on page 1703 · How to Configure Intrusion Detection System, on page 1704 · Monitoring Intrusion Detection System, on page 1705
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the <TBD> Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Intrusion Detection System
The Cisco Intrusion Detection System/Intrusion Prevention System (CIDS/CIPS) instructs switches to block certain clients from accessing the wireless network when attacks involving these clients are detected at Layer 3 through Layer 7. This system offers significant network protection by helping to detect, classify, and stop threats including worms, spyware/adware, network viruses, and application abuse. Two methods are available to detect potential attacks:
· IDS sensors · IDS signatures
IDS sensors can be configured to detect various types of IP-level attacks in the network. When the sensors identify an attack, they can alert the switch to shun the offending client. When a new IDS sensor is added, the IDS sensor should be registered with the switch so that the switch can query the sensor to get the list of shunned clients. When an IDS sensor detects a suspicious client, it alerts the switch to shun this client. The shun entry is distributed to all switches within the same mobility group. If the client to be shunned is currently joined to a switch in this mobility group, the anchor switch adds this client to the dynamic exclusion list, and the foreign
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1703

How to Configure Intrusion Detection System

Security

switch removes the client. The next time that the client tries to connect to a switch, the anchor switch rejects the handoff and informs the foreign switch that the client is being excluded.

How to Configure Intrusion Detection System

Configuring IDS Sensors

SUMMARY STEPS

1. configure terminal 2. wireless wps cids-sensor index [ip-address ip-addr username
password_type password] 3. wireless wps cids-sensor index 4. [default exit fingerprint interval no port shutdown] 5. end

username

password

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wireless wps cids-sensor index [ip-address ip-addr username username password password_type password]
Example:
Switch(config)# wireless wps cids-sensor 2 231.1.1.1 admin pwd123

Purpose Enters global configuration mode.
Configures the IDS sensors that holds and internal index number. The index parameter determines the sequence in which the controller consults the IDS sensors. The controller supports up to five IDS sensors.
· ip-address­ [optional] Provide the IP address for the IDS.
· username­ [optional] Configures the username for the IDS.
· password­ [optional] Configures the password for the respective username.

Step 3

wireless wps cids-sensor index Example:

Enters the IDS configuration submode.

Step 4

Switch(config)# wireless wps cids-sensor 1
[default exit fingerprint interval no port shutdown] Example:
Switch(config-cids-index)# default

Configures various IDS parameters. · default­ [optional] Sets a command to its default. · exit­ [optional] Exits the submode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1704

Security

Monitoring Intrusion Detection System

Command or Action

Step 5

end Example:
Switch(config)# end

Purpose · fingerprint­ [optional] Configures the sensor's TLS fingerprint.
· interval­ [optional] Configures the sensor's query interval. The range is between 10-3600 seconds.
· no­ [optional] Negates a command or set its defaults.
· port­ [optional] Configures the sensor's port number.
· shutdown­ [optional] Shuts down the intrusion detection sensor.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Monitoring Intrusion Detection System

Table 150: Commands for Monitoring Wireless Multicast

Commands

Description

show wireless wps cids-sensor index

Displays the IDS configuration of the IDS sensor with the mentioned index value.

show wireless wps cids-sensor summary Displays the list of all the configured IDS with their respective values like index, ip-address, port number, interval value, status and last query.

show wireless wps shun-list

Displays the list of the IDS shun list.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1705

Monitoring Intrusion Detection System

Security

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1706

X I V PA R T
Stack Manager and High Availability
· Managing Switch Stacks, on page 1709 · Configuring Cisco NSF with SSO , on page 1739 · Configuring Wireless High Availability, on page 1755

8 4 C H A P T E R
Managing Switch Stacks
· Finding Feature Information, on page 1709 · Prerequisites for Switch Stacks, on page 1709 · Restrictions for Switch Stacks, on page 1709 · Information About Switch Stacks, on page 1710 · How to Configure a Switch Stack, on page 1721 · Troubleshooting the Switch Stack, on page 1727 · Monitoring the Switch Stack, on page 1729 · Configuration Examples for Switch Stacks, on page 1730 · Additional References for Switch Stacks, on page 1737 · Feature History and Information for Switch Stacks, on page 1738
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Switch Stacks
All the switches in the switch stack need to be running the same license level as the active switch. For information about license levels, see the System Management Configuration Guide (Catalyst 3650 Switches). All switches in the switch stack need to be running compatible software versions. A StackWise adapter must be installed in the stacking port to enable stacking. For switch stack hardware considerations, see the Catalyst 3650 Switch Hardware Installation Guide.
Restrictions for Switch Stacks
The following are restrictions for your switch stack configuration:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1709

Information About Switch Stacks

Stack Manager and High Availability

· Switch stacks running the LAN Base license level do not support Layer 3 features. · A switch stack can have up to nine stacking-capable switches connected through their StackWise-160
ports. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.
Related Topics Supported Features in a Switch Stack, on page 1710

Information About Switch Stacks

Switch Stack Overview
A switch stack can have up to nine stacking-capable switches connected through their StackWise-160 ports. The stack members work together as a unified system. Layer 2 and Layer 3 protocols present the entire switch stack as a single entity to the network.
A switch stack always has one active switch and one standby switch. If the active switch becomes unavailable, the standby switch assumes the role of the active switch, and continues to the keep the stack operational.
The active switch controls the operation of the switch stack, and is the single point of stack-wide management. From the active switch, you configure:
· System-level (global) features that apply to all stack members
· Interface-level features for each stack member

The active switch contains the saved and running configuration files for the switch stack. The configuration files include the system-level settings for the switch stack and the interface-level settings for each stack member. Each stack member has a current copy of these files for back-up purposes.

Supported Features in a Switch Stack
The system-level features supported on the active switch are supported on the entire switch stack. Related Topics
Restrictions for Switch Stacks, on page 1709

Encryption Features

If the active switch is running the cryptographic universal software image (supports encryption), the encryption features are available on the switch stack.

StackWise-160

The stack members use the StackWise-160 technology to work together as a unified system. Layer 2 and Layer 3 protocols support the entire switch stack as a single entity in the network.

Note Switch stacks running the LAN Base image do not support Layer 3 features.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1710

Stack Manager and High Availability

Switch Stack Membership

StackWise-160 has a stack bandwidth of 160 Gbps, and uses stateful switchover (SSO) to provide resiliency within the stack. The stack behaves as a single switching unit that is managed by an active switch elected by the member switches. The active switch automatically elects a standby switch within the stack. The active switch creates and updates all the switching, routing and wireless information and constantly synchronizes that information with the standby switch. Access points continue to remain connected during an active-to-standby switchover unless the access point is directly connected to the active switch. In this case the access point will lose power and reboot. A working stack can accept new members or delete old ones without service interruption.
Switch Stack Membership
A standalone switch is a switch stack with one stack member that also operates as the active switch. You can connect one standalone switch to another to create a switch stack containing two stack members, with one of them as the active switch. You can connect standalone switches to an existing switch stack to increase the stack membership.
Changes to Switch Stack Membership
If you replace a stack member with an identical model, the new switch functions with exactly the same configuration as the replaced switch, assuming that the new switch (referred to as the provisioned switch) is using the same member number as the replaced switch.
The operation of the switch stack continues uninterrupted during membership changes unless you remove the active switch or you add powered-on standalone switches or switch stacks.
· Adding powered-on switches (merging) causes all switches to reload and elect a new active switch from among themselves. The newly elected active switch retains its role and configuration. All other switches retain their stack member numbers and use the stack configuration of the newly elected active switch.
· Removing powered-on stack members causes the switch stack to divide (partition) into two or more switch stacks, each with the same configuration. This can cause:
· An IP address conflict in your network. If you want the switch stacks to remain separate, change the IP address or addresses of the newly created switch stacks.
· A MAC address conflict between two members in the stack. You can use the stack-mac update force command to resolve the conflict.
If a newly created switch stack does not have an active switch or standby switch, the switch stack will reload and elect a new active switch.
Note Make sure that you power off the switches that you add to or remove from the switch stack.
After adding or removing stack members, make sure that the switch stack is operating at full bandwidth (160 Gbps). Press the Mode button on a stack member until the Stack mode LED is on. The last two right port LEDs on all switches in the stack should be green. Depending on the switch model, the last two right ports are 10-Gigabit Ethernet ports or small form-factor pluggable (SFP) module ports (10/100/1000 ports). If one or both of these LEDs are not green on any of the switches, the stack is not operating at full bandwidth.
If you remove powered-on members but do not want to partition the stack:
· Power off the switches in the newly created switch stacks.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1711

Stack Member Numbers

Stack Manager and High Availability

· Reconnect them to the original switch stack through their stack ports.
· Power on the switches.
For cabling and power considerations that affect switch stacks, see the Catalyst 3650 Switch Hardware Installation Guide .
Related Topics Assigning a Stack Member Number, on page 1722 Switch Stack Configuration Scenarios, on page 1730
Stack Member Numbers
The stack member number (1 to 9) identifies each member in the switch stack. The member number also determines the interface-level configuration that a stack member uses. You can display the stack member number by using the show switch EXEC command.
A new, out-of-the-box switch (one that has not joined a switch stack or has not been manually assigned a stack member number) ships with a default stack member number of 1. When it joins a switch stack, its default stack member number changes to the lowest available member number in the stack.
Stack members in the same switch stack cannot have the same stack member number. Every stack member, including a standalone switch, retains its member number until you manually change the number or unless the number is already being used by another member in the stack.
· If you manually change the stack member number by using the switch current-stack-member-number renumber new-stack-member-number command, the new number goes into effect after that stack member resets (or after you use the reload slot stack-member-number privileged EXEC command) and only if that number is not already assigned to any other members in the stack. Another way to change the stack member number is by changing the SWITCH_NUMBER environment variable.
If the number is being used by another member in the stack, the switch selects the lowest available number in the stack.
If you manually change the number of a stack member and no interface-level configuration is associated with that new member number, that stack member resets to its default configuration.
You cannot use the switch current-stack-member-number renumber new-stack-member-number command on a provisioned switch. If you do, the command is rejected.
· If you move a stack member to a different switch stack, the stack member retains its number only if the number is not being used by another member in the stack. If it is being used, the switch selects the lowest available number in the stack.
· If you merge switch stacks, the switches that join the switch stack of a new active switch select the lowest available numbers in the stack.
As described in the hardware installation guide, you can use the switch port LEDs in Stack mode to visually determine the stack member number of each stack member.
Related Topics Assigning a Stack Member Number, on page 1722 Switch Stack Configuration Scenarios, on page 1730

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1712

Stack Manager and High Availability

Stack Member Priority Values

Stack Member Priority Values
A higher priority value for a stack member increases the probability of it being elected active switch and retaining its stack member number. The priority value can be 1 to 15. The default priority value is 1. You can display the stack member priority value by using the show switch EXEC command.
Note We recommend assigning the highest priority value to the switch that you prefer to be the active switch. This ensures that the switch is reelected as the active switch if a reelection occurs.
To change the priority value for a stack member, use the switch stack-member-number priority new priority-value command. The new priority value takes effect immediately but does not affect the current active switch. The new priority value helps determine which stack member is elected as the new active switch when the current active switch or the switch stack resets. Related Topics
Setting the Stack Member Priority Value, on page 1723
Switch Stack Bridge ID and MAC Address
A switch stack is identified in the network by its bridge ID and, if it is operating as a Layer 3 device, its router MAC address. The bridge ID and router MAC address are determined by the MAC address of the active switch. If the active switch changes, the MAC address of the new active switch determines the new bridge ID and router MAC address. If the entire switch stack reloads, the switch stack uses the MAC address of the active switch.
Persistent MAC Address on the Switch Stack
You can use the persistent MAC address feature to set a time delay before the stack MAC address changes. During this time period, if the previous active switch rejoins the stack, the stack continues to use its MAC address as the stack MAC address, even if the switch is now a stack member and not an active switch. If the previous active switch does not rejoin the stack during this period, the switch stack takes the MAC address of the new active switch as the stack MAC address. By default, the stack MAC address will be the MAC address of the first active switch, even if a new active switch takes over. You can also configure stack MAC persistency so that the stack MAC address never changes to the new active switch MAC address. Related Topics
Enabling the Persistent MAC Address Feature, on page 1721 Enabling the Persistent MAC Address Feature: Example, on page 1731
Active and Standby Switch Election and Reelection
All stack members are eligible to be the active switch or the standby switch. If the active switch becomes unavailable, the standby switch becomes the active switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1713

Switch Stack Configuration Files

Stack Manager and High Availability

An active switch retains its role unless one of these events occurs: · The switch stack is reset. · The active switch is removed from the switch stack. · The active switch is reset or powered off. · The active switch fails. · The switch stack membership is increased by adding powered-on standalone switches or switch stacks.
The active switch is elected or reelected based on one of these factors and in the order listed: 1. The switch that is currently the active switch. 2. The switch with the highest stack member priority value.
Note We recommend assigning the highest priority value to the switch that you prefer to be the active switch. This ensures that the switch is reelected as active switch if a reelection occurs.
3. The switch with the shortest start-up time. 4. The switch with the lowest MAC address.
Note The factors for electing or reelecting a new standby switch are same as those for the active switch election or reelection, and are applied to all participating switches except the active switch.
After election, the new active switch becomes available after a few seconds. In the meantime, the switch stack uses the forwarding tables in memory to minimize network disruption. The physical interfaces on the other available stack members are not affected during a new active switch election and reset. When the previous active switch becomes available, it does not resume its role as the active switch. If you power on or reset an entire switch stack, some stack members might not participate in the active switch election. Stack members that are powered on within the same 2-minute timeframe participate in the active switch election and have a chance to become the active switch. Stack members that are powered on after the 120-second timeframe do not participate in this initial election and become stack members. For powering considerations that affect active-switch elections, see the switch hardware installation guide. As described in the hardware installation guide, you can use the ACTV LED on the switch to see if the switch is the active switch.
Switch Stack Configuration Files
The active switch has the saved and running configuration file for the switch stack. The standby switch automatically receives the synchronized running configuration file. Stack members receive synchronized copies when the running configuration file is saved into the startup configuration file. If the active switch becomes unavailable, the standby switch takes over with the current running configuration. The configuration files record these settings:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1714

Stack Manager and High Availability

Offline Configuration to Provision a Stack Member

· System-level (global) configuration settings such as IP, STP, VLAN, and SNMP settings that apply to all stack members
· Stack member interface-specific configuration settings that are specific for each stack member
Note The interface-specific settings of the active switch are saved if the active switch is replaced without saving the running configuration to the startup configuration.
A new, out-of-box switch joining a switch stack uses the system-level settings of that switch stack. If a switch is moved to a different switch stack before it is powered on, that switch loses its saved configuration file and uses the system-level configuration of the new switch stack. If the switch is powered on as a standalone switch before it joins the new switch stack, the stack will reload. When the stack reloads, the new switch may become the active switch, retain its configuration and overwrite the configuration files of the other stack members.
The interface-specific configuration of each stack member is associated with the stack member number. Stack members retain their numbers unless they are manually changed or they are already used by another member in the same switch stack. If the stack member number changes, the new number goes into effect after that stack member resets.
· If an interface-specific configuration does not exist for that member number, the stack member uses its default interface-specific configuration.
· If an interface-specific configuration exists for that member number, the stack member uses the interface-specific configuration associated with that member number.
If you replace a failed member with an identical model, the replacement member automatically uses the same interface-specific configuration as the failed switch. You do not need to reconfigure the interface settings. The replacement switch (referred to as the provisioned switch) must have the same stack member number as the failed switch.
You back up and restore the stack configuration in the same way as you would for a standalone switch configuration.
Related Topics Assigning a Stack Member Number, on page 1722 Switch Stack Configuration Scenarios, on page 1730
Offline Configuration to Provision a Stack Member
You can use the offline configuration feature to provision (to supply a configuration to) a new switch before it joins the switch stack. You can configure the stack member number, the switch type, and the interfaces associated with a switch that is not currently part of the stack. The configuration that you create on the switch stack is called the provisioned configuration. The switch that is added to the switch stack and that receives this configuration is called the provisioned switch.
You manually create the provisioned configuration through the switch stack-member-number provision type global configuration command. You must change the stack-member-number on the provisioned switch before you add it to the stack, and it must match the stack member number that you created for the new switch on the switch stack. The switch type in the provisioned configuration must match the switch type of the newly added switch. The provisioned configuration is automatically created when a switch is added to a switch stack and when no provisioned configuration exists.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1715

Effects of Adding a Provisioned Switch to a Switch Stack

Stack Manager and High Availability

When you configure the interfaces associated with a provisioned switch, the switch stack accepts the configuration, and the information appears in the running configuration. However, as the switch is not active, any configuration on the interface is not operational and the interface associated with the provisioned switch does not appear in the display of the specific feature. For example, VLAN configuration information associated with a provisioned switch does not appear in the show vlan user EXEC command output on the switch stack.
The switch stack retains the provisioned configuration in the running configuration whether or not the provisioned switch is part of the stack. You can save the provisioned configuration to the startup configuration file by entering the copy running-config startup-config privileged EXEC command. The startup configuration file ensures that the switch stack can reload and can use the saved information whether or not the provisioned switch is part of the switch stack.
Related Topics Removing Provisioned Switch Information, on page 1725 Provisioning a New Member for a Switch Stack: Example, on page 1732

Effects of Adding a Provisioned Switch to a Switch Stack
When you add a provisioned switch to the switch stack, the stack applies either the provisioned configuration or the default configuration. This table lists the events that occur when the switch stack compares the provisioned configuration with the provisioned switch.
Table 151: Results of Comparing the Provisioned Configuration with the Provisioned Switch

Scenario

Result

The stack member numbers 1. If the stack member number of the The switch stack applies the and the switch types match. provisioned switch matches the provisioned configuration to the
stack member number in the provisioned switch and adds it to the provisioned configuration on the stack. stack, and
2. If the switch type of the provisioned switch matches the switch type in the provisioned configuration on the stack.

The stack member numbers 1. If the stack member number of the The switch stack applies the default

match but the switch types

provisioned switch matches the configuration to the provisioned switch

do not match.

stack member number in the and adds it to the stack.

provisioned configuration on the stack, but

The provisioned configuration is changed to reflect the new information.

2. The switch type of the provisioned

switch does not match the switch

type in the provisioned

configuration on the stack.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1716

Stack Manager and High Availability

Effects of Replacing a Provisioned Switch in a Switch Stack

Scenario The stack member number is not found in the provisioned configuration.
The stack member number of the provisioned switch is not found in the provisioned configuration.

Result
The switch stack applies the default configuration to the provisioned switch and adds it to the stack.
The provisioned configuration is changed to reflect the new information.
The switch stack applies the default configuration to the provisioned switch and adds it to the stack.

If you add a provisioned switch that is a different type than specified in the provisioned configuration to a powered-down switch stack and then apply power, the switch stack rejects the (now incorrect) switch stack-member-number provision type global configuration command in the startup configuration file. However, during stack initialization, the nondefault interface configuration information in the startup configuration file for the provisioned interfaces (potentially of the wrong type) is executed. Depending on the differences between the actual switch type and the previously provisioned switch type, some commands are rejected, and some commands are accepted.

Note If the switch stack does not contain a provisioned configuration for a new switch, the switch joins the stack with the default interface configuration. The switch stack then adds to its running configuration with a switch stack-member-number provision type global configuration command that matches the new switch.

Effects of Replacing a Provisioned Switch in a Switch Stack
When a provisioned switch in a switch stack fails, it is removed from the stack, and is replaced with another switch, the stack applies either the provisioned configuration or the default configuration to it. The events that occur when the switch stack compares the provisioned configuration with the provisioned switch are the same as those when you add a provisioned switch to a stack.
Effects of Removing a Provisioned Switch from a Switch Stack
If you remove a provisioned switch from the switch stack, the configuration associated with the removed stack member remains in the running configuration as provisioned information. To completely remove the configuration, use the no switch stack-member-number provision global configuration command.

Upgrading a Switch Running Incompatible Software
The auto-upgrade and auto-advise features enable a switch with software packages that are incompatible with the switch stack to be upgraded to a compatible software version so that it can join the switch stack.

Auto-Upgrade

The purpose of the auto-upgrade feature is to allow a switch to be upgraded to a compatible software image, so that the switch can join the switch stack.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1717

Auto-Advise

Stack Manager and High Availability

When a new switch attempts to join a switch stack, each stack member performs compatibility checks with itself and the new switch. Each stack member sends the results of the compatibility checks to the active switch, which uses the results to determine whether the switch can join the switch stack. If the software on the new switch is incompatible with the switch stack, the new switch enters version-mismatch (VM) mode.
If the auto-upgrade feature is enabled on the existing switch stack, the active switch automatically upgrades the new switch with the same software image running on a compatible stack member. Auto-upgrade starts a few minutes after the mismatched software is detected before starting.
Auto-upgrade is disabled by default.
Auto-upgrade includes an auto-copy process and an auto-extract process.
· Auto-copy automatically copies the software image running on any stack member to the new switch to automatically upgrade it. Auto-copy occurs if auto-upgrade is enabled, if there is enough flash memory in the new switch, and if the software image running on the switch stack is suitable for the new switch.

Auto-Advise

Note A switch in VM mode might not run all released software. For example, new switch hardware is not recognized in earlier versions of software.
· Automatic extraction (auto-extract) occurs when the auto-upgrade process cannot find the appropriate software in the stack to copy to the new switch. In that case, the auto-extract process searches all switches in the stack for the bin file needed to upgrade the switch stack or the new switch. The bin file can be in any flash file system in the switch stack or in the new switch. If a bin file suitable for the new switch is found on a stack member, the process extracts the file and automatically upgrades the new switch.
The auto-upgrade feature is not available in bundle mode. The switch stack must be running in installed mode. If the switch stack is in bundle mode, use the software expand privileged EXEC command to change to installed mode.
You can enable auto-upgrade by using the software auto-upgrade enable global configuration command on the new switch. You can check the status of auto-upgrade by using the show running-config privileged EXEC command and by checking the Auto upgrade line in the display.
You can configure auto-upgrade to upgrade the new switch with a specific software bundle by using the software auto-upgrade source url global configuration command. If the software bundle is invalid, the new switch is upgraded with the same software image running on a compatible stack member.
When the auto-upgrade process is complete, the new switch reloads and joins the stack as a fully functioning member. If you have both stack cables connected during the reload, network downtime does not occur because the switch stack operates on two rings.
For more information about upgrading a switch running incompatible software see the Cisco IOS File System, Configuration Files, and Bundle Files Appendix, Cisco IOS XE Release 3SE (Catalyst 3650 Switches).
The auto-advise feature is triggered when:
· The auto-upgrade feature is disabled.
· The new switch is in bundle mode and the stack is in installed mode. Auto-advise displays syslog messages about using the software auto-upgrade privileged EXEC command to change the new switch to installed mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1718

Stack Manager and High Availability

Examples of Auto-Advise Messages

· The stack is in bundle mode. Auto-advise displays syslog messages about booting the new switch in bundle mode so that it can join the stack.
· An auto-upgrade attempt fails because the new switch is running incompatible software. After the switch stack performs compatibility checks with the new switch, auto-advise displays syslog messages about whether the new switch can be auto-upgraded.
Auto-advise cannot be disabled. It does not give suggestions when the switch stack software and the software of the switch in version-mismatch (VM) mode do not contain the same license level.
Examples of Auto-Advise Messages
Auto-Upgrade Is Disabled and Incompatible Switch Attempting to Join: Example
This sample auto-advise output shows the system messages displayed when the auto-upgrade feature is disabled and an incompatible switch 1 tries to join the switch stack:
*Oct 18 08:36:19.379: %INSTALLER-6-AUTO_ADVISE_SW_INITIATED: 2 installer: Auto advise initiated for switch 1 *Oct 18 08:36:19.380: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: Searching stack for software
to upgrade switch 1 *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: Switch 1 with incompatible
software has been *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: added to the stack. The software running on *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: all stack members was scanned and it has been *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: determined that the 'software
auto-upgrade' *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: command can be used to install compatible *Oct 18 08:36:19.382: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: software on switch 1.
Auto-Upgrade is Disabled and New Switch is in Bundle Mode: Example
This sample auto-advise output shows the system messages displayed when auto-upgrade is disabled and a switch running in bundle mode tries to join the stack that is running in installed mode:
*Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW_INITIATED: 2 installer: Auto advise initiated for switch 1 *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: Switch 1 running bundled software has been added *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: to the stack that is running
installed software. *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: The 'software auto-upgrade'
command can be used to *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: convert switch 1 to the installed running mode by *Oct 18 11:09:47.005: %INSTALLER-6-AUTO_ADVISE_SW: 2 installer: installing its running software.
SDM Template Mismatch in Switch Stacks
All stack members use the Switch Database Management (SDM) template configured on the active switch. When a new switch is added to a stack, the SDM configuration that is stored on the active switch overrides the template configured on an individual switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1719

Switch Stack Management Connectivity

Stack Manager and High Availability

You can use the show switch privileged EXEC command to see if any stack members are in SDM-mismatch mode. Version-mismatch (VM) mode has priority over SDM-mismatch mode. If a VM-mode condition and an SDM-mismatch mode exist, the switch stack first attempts to resolve the VM-mode condition.
Switch Stack Management Connectivity
You manage the switch stack and the stack member interfaces through the active switch. You can use the CLI, SNMP, and supported network management applications such as CiscoWorks. You cannot manage stack members on an individual switch basis.
Note Use SNMP to manage network features across the stack that are defined by supported MIBs. The switch does not support MIBs to manage stacking-specific features such as stack membership and election.
Connectivity to Specific Stack Members
If you want to configure a specific stack member port, you must include the stack member number in the CLI command interface notation. To debug the standby switch, you can access it from the active switch using the session standby ios privileged EXEC command. To debug a specific stack member, use the session switch stack-member-number privileged EXEC command from the active switch to access the diagnostic shell of the stack member. Only the show and debug commands are available in a CLI session to a specific stack member. Related Topics
Accessing the Diagnostic Console of a Stack Member, on page 1727
Connectivity to the Switch Stack Through an IP Address
The switch stack is managed through a single IP address. The IP address is a system-level setting and is not specific to the active switch or to any other stack member. You can still manage the stack through the same IP address even if you remove the active switch or any other stack member from the stack, provided there is IP connectivity.
Note Stack members retain their IP addresses when you remove them from a switch stack. To avoid a conflict by having two devices with the same IP address in your network, change the IP addresses of any switches that you remove from the switch stack.
Connectivity to the Switch Stack Through Console Ports or Ethernet Management Ports
You can connect to the active switch by using one of these methods: · You can connect a terminal or a PC to the active switch through the console port of one or more stack members. · You can connect a PC to the active switch through the Ethernet management ports of one or more stack members.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1720

Stack Manager and High Availability

How to Configure a Switch Stack

Be careful when using multiple CLI sessions to the active switch. Commands that you enter in one session are not displayed in the other sessions. Therefore, it is possible that you might not be able to identify the session from which you entered a command.
We recommend using only one CLI session when managing the switch stack.

How to Configure a Switch Stack

Default Switch Stack Configuration
The following table shows the default switch stack configuration settings:
Table 152: Default Switch Stack Configuration

Feature Stack MAC address timer Stack member number Stack member priority value Offline configuration Persistent MAC address

Default Setting Disabled. 1 1 The switch stack is not provisioned. Disabled.

Enabling the Persistent MAC Address Feature
This procedure is optional.

Note When you enter the command to configure this feature, a warning message appears with the consequences of your configuration. You should use this feature cautiously. Using the old active switch MAC address elsewhere in the same domain could result in lost traffic.

SUMMARY STEPS

1. configure terminal 2. stack-mac persistent timer [0 | time-value] 3. end 4. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1721

Assigning a Stack Member Number

Stack Manager and High Availability

Command or Action
Switch# configure terminal

Step 2

stack-mac persistent timer [0 | time-value] Example:
Switch(config)# stack-mac persistent timer 7

Step 3

end Example:
Switch(config)# end

Step 4

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose
Enables a time delay after an active-switch change before the stack MAC address changes to that of the new active switch. If the previous active switch rejoins the stack during this period, the stack uses that MAC address as the stack MAC address.
· Enter the command with no value or with a value of 0 to continue using the MAC address of the current active switch indefinitely.
· Enter a time-value from 1 to 60 minutes to configure the time period before the stack MAC address changes to the new active switch. The stack MAC address of the previous active switch is used until the configured time period expires.
Returns to privileged EXEC mode.
(Optional) Saves your entries in the configuration file.

Related Topics Persistent MAC Address on the Switch Stack, on page 1713 Enabling the Persistent MAC Address Feature: Example, on page 1731

Assigning a Stack Member Number
This optional task is available only from the active switch.

SUMMARY STEPS

1. switch current-stack-member-number renumber new-stack-member-number 2. reload slot stack-member-number

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1722

Stack Manager and High Availability

Setting the Stack Member Priority Value

DETAILED STEPS

Step 1

Command or Action
switch current-stack-member-number renumber new-stack-member-number Example:
Switch(config)# switch 3 renumber 4

Step 2

reload slot stack-member-number Example:
Switch# reload slot 4

Purpose
Specifies the current stack member number and the new stack member number for the stack member. The range is 1 to 9.
You can display the current stack member number by using the show switch user EXEC command.
Resets the stack member.

Related Topics Changes to Switch Stack Membership, on page 1711 Stack Member Numbers, on page 1712 Switch Stack Configuration Files, on page 1714 Switch Stack Configuration Scenarios, on page 1730

Setting the Stack Member Priority Value
This optional task is available only from the active switch. Follow these steps to assign a priority value to a stack member:

SUMMARY STEPS

1. enable 2. switch stack-member-number priority new-priority-number 3. show switch stack-member-number 4. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:
Switch enable

Purpose
Enables privileged EXEC mode. Enter your password if prompted.

Step 2

switch stack-member-number priority new-priority-number Specifies the stack member number and the new priority

Example:

for the stack member. The stack member number range is 1 to 9. The priority value range is 1 to 15.

Switch# switch 3 priority 2

You can display the current priority value by using the show

switch user EXEC command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1723

Provisioning a New Member for a Switch Stack

Stack Manager and High Availability

Command or Action

Step 3

show switch stack-member-number Example:
Switch# show switch

Step 4

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose The new priority value takes effect immediately but does not affect the current active switch. The new priority value helps determine which stack member is elected as the new active switch when the current active switch or switch stack resets. Verify the stack member priority value.
(Optional) Saves your entries in the configuration file.

Related Topics Stack Member Priority Values, on page 1713

Provisioning a New Member for a Switch Stack
This optional task is available only from the active switch.

SUMMARY STEPS

1. show switch 2. configure terminal 3. switch stack-member-number provision type 4. end 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action show switch Example:
Switch# show switch

Purpose Displays summary information about the switch stack.

Step 2

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 3

switch stack-member-number provision type Example:

Specifies the stack member number for the preconfigured switch. By default, no switches are provisioned.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1724

Stack Manager and High Availability

Removing Provisioned Switch Information

Command or Action
Switch(config)# switch 3 provision WS-xxxx

Step 4

end Example:
Switch(config)# end

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose For stack-member-number, the range is 1 to 9. Specify a stack member number that is not already used in the switch stack. See Step 1. For type, enter the model number of a supported switch that is listed in the command-line help strings. Returns to privileged EXEC mode.
(Optional) Saves your entries in the configuration file.

Removing Provisioned Switch Information
Before you begin, you must remove the provisioned switch from the stack. This optional task is available only from the active switch.

SUMMARY STEPS

1. configure terminal 2. no switch stack-member-number provision 3. end 4. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

no switch stack-member-number provision Example:
Switch(config)# no switch 3 provision

Removes the provisioning information for the specified member.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1725

Displaying Incompatible Switches in the Switch Stack

Stack Manager and High Availability

Step 4

Command or Action copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose (Optional) Saves your entries in the configuration file.

Example If you are removing a provisioned switch in a stack with this configuration:
· The stack has four members
· Stack member 1 is the active switch
· Stack member 3 is a provisioned switch
and want to remove the provisioned information and to avoid receiving an error message, you can remove power from stack member 3, disconnect the StackWise-160 cables between the stack member 3 and switches to which it is connected, reconnect the cables between the remaining stack members, and enter the no switch stack-member-number provision global configuration command.
Related Topics Offline Configuration to Provision a Stack Member , on page 1715 Provisioning a New Member for a Switch Stack: Example, on page 1732

Displaying Incompatible Switches in the Switch Stack

SUMMARY STEPS

1. show switch

DETAILED STEPS

Step 1

Command or Action show switch Example:
Switch# show switch

Purpose
Displays any incompatible switches in the switch stack (indicated by a 'Current State' of 'V-Mismatch'). The V-Mismatch state identifies the switches with incompatible software. The output displays Lic-Mismatch for switches that are not running the same license level as the active switch.
For information about managing license levels, see the System Management Configuration Guide (Catalyst 3650 Switches).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1726

Stack Manager and High Availability

Upgrading an Incompatible Switch in the Switch Stack

Upgrading an Incompatible Switch in the Switch Stack

SUMMARY STEPS

1. software auto-upgrade 2. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action software auto-upgrade Example:
Switch# software auto-upgrade

Purpose
Upgrades incompatible switches in the switch stack, or changes switches in bundle mode to installed mode.

Step 2

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Troubleshooting the Switch Stack

Accessing the Diagnostic Console of a Stack Member

Before you begin This optional task is available only from the active switch.

SUMMARY STEPS

1. session switch stack-member-number 2. exit

DETAILED STEPS

Step 1

Command or Action session switch stack-member-number Example:
Switch# session switch 2

Purpose
Accesses the diagnostic shell of the stack member from the active switch.

Step 2

exit Example:
Switch(diag)> exit

Returns to the CLI session on the active switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1727

Temporarily Disabling a Stack Port

Stack Manager and High Availability

Related Topics Connectivity to Specific Stack Members, on page 1720
Temporarily Disabling a Stack Port
If a stack port is flapping and causing instability in the stack ring, to disable the port, enter the switch stack-member-number stack port port-number disable privileged EXEC command. To reenable the port, enter the switch stack-member-number stack port port-number enable command.

Note Be careful when using the switch stack-member-number stack port port-number disable command. When you disable the stack port, the stack operates at half bandwidth.
A stack is in the full-ring state when all members are connected through the stack ports and are in the ready state. The stack is in the partial-ring state when the following occurs:
· All members are connected through their stack ports but some are not in the ready state. · Some members are not connected through the stack ports.

SUMMARY STEPS

1. switch stack-member-number stack port port-number disable 2. switch stack-member-number stack port port-number enable

DETAILED STEPS

Step 1

Command or Action
switch stack-member-number stack port port-number disable Example:
Switch# switch 2 stack port 1 disable

Purpose Disables the specified stack port.

Step 2

switch stack-member-number stack port port-number enable
Example:
Switch# switch 2 stack port 1 enable

Reenables the stack port.

When you disable a stack port and the stack is in the full-ring state, you can disable only one stack port. This message appears:
Enabling/disabling a stack port may cause undesired stack changes. Continue?[confirm]
When you disable a stack port and the stack is in the partial-ring state, you cannot disable the port. This message appears:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1728

Stack Manager and High Availability

Reenabling a Stack Port While Another Member Starts

Disabling stack port not allowed with current stack configuration.
Reenabling a Stack Port While Another Member Starts
Stack Port 1 on Switch 1 is connected to Port 2 on Switch 4. If Port 1 is flapping, you can disable Port 1 with the switch 1 stack port 1 disable privileged EXEC command. While Port 1 on Switch 1 is disabled and Switch 1 is still powered on, follow these steps to reenable a stack port:

Step 1 Step 2 Step 3 Step 4 Step 5
Step 6

Disconnect the stack cable between Port 1 on Switch 1 and Port 2 on Switch 4. Remove Switch 4 from the stack. Add a switch to replace Switch 4 and assign it switch-number 4. Reconnect the cable between Port 1 on Switch 1 and Port 2 on Switch 4 (the replacement switch). Reenable the link between the switches. Enter the switch 1 stack port 1 enable privileged EXEC command to enable Port 1 on Switch 1. Power on Switch 4.

Caution Powering on Switch 4 before enabling the Port 1 on Switch 1 might cause one of the switches to reload.
If Switch 4 is powered on first, you might need to enter the switch 1 stack port 1 enable and the switch 4 stack port 2 enable privileged EXEC commands to bring up the link.

Monitoring the Switch Stack

Table 153: Commands for Displaying Stack Information

Command

Description

show switch

Displays summary information about the stack, including the status of provisioned switches and switches in version-mismatch mode.

show switch stack-member-number Displays information about a specific member.

show switch detail

Displays detailed information about the stack.

show switch neighbors

Displays the stack neighbors.

show switch stack-ports [summary]

Displays port information for the stack.

show redundancy

Displays the redundant system and the current processor information. The redundant system information includes the system uptime, standby failures, switchover reason, hardware, configured and operating redundancy mode. The current processor information displayed includes the active location, the software state, the uptime in the current state and so on.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1729

Configuration Examples for Switch Stacks

Stack Manager and High Availability

Command show redundancy state

Description Displays all the redundancy states of the active and standby switches.

Configuration Examples for Switch Stacks

Switch Stack Configuration Scenarios
Most of these switch stack configuration scenarios assume that at least two switches are connected through their StackWise-160 ports.
Table 154: Configuration Scenarios

Scenario

Result

Active switch election Connect two powered-on switch stacks specifically determined through the StackWise-160 ports. by existing active switches

Only one of the two active switches becomes the new active switch.

Active switch election 1. Connect two switches through their The stack member with the higher

specifically determined StackWise-160 ports.

priority value is elected active switch.

by the stack member priority value

2. Use the switch stack-member-number priority new-priority-number global

configuration command to set one stack

member with a higher member priority

value.

3. Restart both stack members at the same time.

Active switch election Assuming that both stack members have the The stack member with the saved

specifically determined same priority value:

configuration file is elected active

by the configuration file 1. Make sure that one stack member has a switch.

default configuration and that the other

stack member has a saved (nondefault)

configuration file.

2. Restart both stack members at the same time.

Active switch election Assuming that both stack members have the The stack member with the lower specifically determined same priority value, configuration file, and MAC address is elected active by the MAC address feature set, restart both stack members at the switch.
same time.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1730

Stack Manager and High Availability

Enabling the Persistent MAC Address Feature: Example

Scenario

Result

Stack member number conflict

Assuming that one stack member has a higher The stack member with the higher

priority value than the other stack member: priority value retains its stack

1.

Ensure that both stack members have the same stack member number. If necessary, use the switch

member number. The other stack member has a new stack member number.

current-stack-member-number

renumber new-stack-member-number

global configuration command.

2. Restart both stack members at the same time.

Add a stack member

1. Power off the new switch.

The active switch is retained. The

new switch is added to the switch 2. Through their StackWise-160 ports, stack.
connect the new switch to a powered-on

switch stack.

3. Power on the new switch.

Active switch failure
Add more than nine stack members

Remove (or power off) the active switch.
1. Through their StackWise-160 ports, connect ten switches.
2. Power on all switches.

One of the remaining stack members becomes the new stack master. All other stack members in the stack remain as stack members and do not reboot.
Two switches become active switches. One active switch has nine stack members. The other active switch remains as a standalone switch.
Use the Mode button and port LEDs on the switches to identify which switches are active switches and which switches belong to each active switch.

Related Topics Assigning a Stack Member Number, on page 1722 Changes to Switch Stack Membership, on page 1711 Stack Member Numbers, on page 1712 Switch Stack Configuration Files, on page 1714

Enabling the Persistent MAC Address Feature: Example
This example shows how to configure the persistent MAC address feature for a 7-minute time delay and to verify the configuration:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1731

Provisioning a New Member for a Switch Stack: Example

Stack Manager and High Availability

Switch(config)# stack-mac persistent timer 7

WARNING: The stack continues to use the base MAC of the old Master

WARNING: as the stack MAC after a master switchover until the MAC

WARNING: persistency timer expires. During this time the Network

WARNING: Administrators must make sure that the old stack-mac does

WARNING: not appear elsewhere in this network domain. If it does,

WARNING: user traffic may be blackholed.

Switch(config)# end

Switch# show switch

Switch/Stack Mac Address : 0016.4727.a900

Mac persistency wait time: 7 mins

H/W Current

Switch# Role Mac Address

Priority Version State

----------------------------------------------------------

*1

Active 0016.4727.a900

1

P2B

Ready

Related Topics Enabling the Persistent MAC Address Feature, on page 1721 Persistent MAC Address on the Switch Stack, on page 1713
Provisioning a New Member for a Switch Stack: Example
This example shows how to provision a switch with a stack member number of 2 for the switch stack. The show running-config command output shows the interfaces associated with the provisioned switch:
Switch(config)# switch 2 provision switch_PID Switch(config)# end Switch# show running-config | include switch 2 ! interface GigabitEthernet2/0/1 ! interface GigabitEthernet2/0/2 ! interface GigabitEthernet2/0/3 <output truncated>

Related Topics Removing Provisioned Switch Information, on page 1725 Offline Configuration to Provision a Stack Member , on page 1715

show switch stack-ports summary Command Output: Example

Only Port 1 on stack member 2 is disabled.

Switch# show switch stack-ports summary

Switch#/ Stack Neighbor Cable Link

Port#

Port

Length OK

Status

-------- ------ -------- -------- ----

1/1

OK

3

50 cm

Yes

1/2

Down

None 3 m

Yes

2/1

Down

None 3 m

Yes

2/2

OK

3

50 cm

Yes

3/1

OK

2

50 cm

Yes

3/2

OK

1

50 cm

Yes

Link Active
-----Yes No No Yes Yes Yes

Sync OK
---Yes Yes Yes Yes Yes Yes

# Changes To LinkOK ---------
1 1 1 1 1 1

In Loopback
-------No No No No No No

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1732

Stack Manager and High Availability

show switch stack-ports summary Command Output: Example

Table 155: show switch stack-ports summary Command Output

Field Switch#/Port# Stack Port Status

Description
Member number and its stack port number.
Status of the stack port. · Absent--No cable is detected on the stack port. · Down--A cable is detected, but either no connected neighbor is up, or the stack port is disabled. · OK--A cable is detected, and the connected neighbor is up.

Neighbor Cable Length
Link OK

Switch number of the active member at the other end of the stack cable.
Valid lengths are 50 cm, 1 m, or 3 m. If the switch cannot detect the cable length, the value is no cable. The cable might not be connected, or the link might be unreliable.
Whether the stack cable is connected and functional. There may or may not be a neighbor connected on the other end. The link partner is a stack port on a neighbor switch.
· No--There is no stack cable connected to this port or the stack cable is not functional.
· Yes--There is a functional stack cable connected to this port.

Link Active

Whether a neighbor is connected on the other end of the stack cable.
· No--No neighbor is detected on the other end. The port cannot send traffic over this link.
· Yes--A neighbor is detected on the other end. The port can send traffic over this link.

Sync OK

Whether the link partner sends valid protocol messages to the stack port. · No--The link partner does not send valid protocol messages to the stack port. · Yes--The link partner sends valid protocol messages to the port.

# Changes to LinkOK The relative stability of the link. If a large number of changes occur in a short period of time, link flapping can occur.

In Loopback

Whether a stack cable is attached to a stack port on the member. · No--At least one stack port on the member has an attached stack cable. · Yes--None of the stack ports on the member has an attached stack cable.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1733

Software Loopback: Examples

Stack Manager and High Availability

Software Loopback: Examples

In a stack with three members, stack cables connect all the members:

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link

Status

Length OK

-------- ------ -------- -------- ----

1/1

OK

3

50 cm

Yes

1/2

OK

2

3m

Yes

2/1

OK

1

3m

Yes

2/2

OK

3

50 cm

Yes

3/1

OK

2

50 cm

Yes

3/2

OK

1

50 cm

Yes

Link Active ------
Yes Yes Yes Yes Yes Yes

Sync OK ---Yes Yes Yes Yes Yes Yes

#Changes To LinkOK ---------
1 1 1 1 1 1

In Loopback --------
No No No No No No

If you disconnect the stack cable from Port 1 on Switch 1, these messages appear:
01:09:55: %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 2 Switch 3 has changed to state DOWN 01:09:56: %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 1 Switch 1 has changed to state DOWN

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link

Status

Length OK

Link Active

Sync OK

#Changes To LinkOK

In Loopback

-------1/1 1/2 2/1 2/2 3/1 3/2

-----Absent OK OK OK OK Down

-------None 2 1 3 2 None

-------No cable 3m 3m 50 cm 50 cm 50 cm

---No Yes Yes Yes Yes No

-----No Yes Yes Yes Yes No

---No Yes Yes Yes Yes No

--------1 1 1 1 1 1

-------No No No No No No

If you disconnect the stack cable from Port 2 on Switch 1, the stack splits.

Switch 2 and Switch 3 are now in a two-member stack connected through stack cables:

Switch# show sw stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Status

Length

-------- ------ -------- --------

2/1

Down

None 3 m

2/2

OK

3

50 cm

3/1

OK

2

50 cm

3/2

Down

None 50 cm

Link OK ---No Yes Yes No

Link Active ------
No Yes Yes No

Sync OK ---No Yes Yes No

#Changes To LinkOK ---------
1 1 1 1

In Loopback --------
No No No No

Switch 1 is a standalone switch:

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link

Status

Length OK

-------- ------ -------- -------- ----

1/1

Absent None No cable No

1/2

Absent None No cable No

Link Active ------
No No

Sync OK ---No No

#Changes To LinkOK ---------
1 1

In Loopback --------
Yes Yes

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1734

Stack Manager and High Availability

Software Loopback with Connected Stack Cables: Examples

Software Loopback with Connected Stack Cables: Examples

· On Port 1 on Switch 1, the port status is Down, and a cable is connected.

On Port 2 on Switch 1, the port status is Absent, and no cable is connected.

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link Link Sync #Changes In

Status

Length OK Active OK To LinkOK Loopback

-------- ------ -------- -------- ---- ------ ---- --------- --------

1/1

Down

None 50 Cm

No

No

No

1

No

1/2

Absent None No cable No

No

No

1

No

· In a physical loopback, a cable connects both stack ports on a switch. You can use this configuration to test · Cables on a switch that is running properly
· Stack ports with a cable that works properly

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link

Status

Length OK

-------- ------ -------- -------- ----

2/1

OK

2

50 cm

Yes

2/2

OK

2

50 cm

Yes

Link Active ------
Yes Yes

Sync OK ---Yes Yes

#Changes To LinkOK ---------
1 1

In Loopback --------
No No

The port status shows that · Switch 2 is a standalone switch. · The ports can send and receive traffic.

Software Loopback with no Connected Stack Cable: Example

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link

Status

Length OK

-------- ------ -------- -------- ----

1/1

Absent None No cable No

1/2

Absent None No cable No

Link Active ------
No No

Sync OK ----
No No

#Changes To LinkOK ---------
1 1

In Loopback --------
Yes Yes

Finding a Disconnected Stack Cable: Example

Stack cables connect all stack members. Port 2 on Switch 1 connects to Port 1 on Switch 2.

This is the port status for the members:

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link

Status

Length OK

Link Active

Sync OK

#Changes To LinkOK

In Loopback

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1735

Fixing a Bad Connection Between Stack Ports: Example

Stack Manager and High Availability

-------1/1 1/2 2/1 2/2

-----OK OK OK OK

-------2 2 1 1

-------50 cm 50 cm 50 cm 50 cm

---Yes Yes Yes Yes

-----Yes Yes Yes Yes

---Yes Yes Yes Yes

--------0 0 0 0

-------No No No No

If you disconnect the cable from Port 2 on Switch 1, these messages appear:
%STACKMGR-4-STACK_LINK_CHANGE: Stack Port 1 Switch 2 has changed to state DOWN %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 2 Switch 1 has changed to state DOWN

This is now the port status:

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link

Status

Length OK

-------- ------ -------- -------- ----

1/1

OK

2

50 cm

Yes

1/2

Absent None No cable No

2/1

Down

None 50 cm

No

2/2

OK

1

50 cm

Yes

Link Active ------
Yes No No
Yes

Sync OK ---Yes
No No Yes

#Changes To LinkOK ---------
1 2 2 1

In Loopback --------
No No No No

Only one end of the cable connects to a stack port, Port 1 on Switch 2. · The Stack Port Status value for Port 2 on Switch 1 is Absent, and the value for Port 1 on Switch 2 is Down. · The Cable Length value is No cable.
Diagnosing the problem: · Verify the cable connection for Port 2 on Switch 1. · Port 2 on Switch 1 has a port or cable problem if · The In Loopback value is Yes.
or · The Link OK, Link Active, or Sync OK value is No.

Fixing a Bad Connection Between Stack Ports: Example

Stack cables connect all members. Port 2 on Switch 1 connects to Port 1 on Switch 2.

This is the port status:

Switch# show switch stack-ports summary

Switch#

Sw#/Port# Port Neighbor Cable

Link

Status

Length OK

-------- ------ -------- -------- ----

1/1

OK

2

50 cm

Yes

Link Active ------
Yes

Sync OK ---Yes

#Changes To LinkOK ---------
1

In Loopback --------
No

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1736

Stack Manager and High Availability

Additional References for Switch Stacks

1/2

Down

None 50 cm

No

No

No

2

No

2/1

Down

None 50 cm

No

No

No

2

No

2/2

OK

1

50 cm

Yes Yes Yes

1

No

Diagnosing the problem: · The Stack Port Status value is Down. · Link OK, Link Active, and Sync OK values are No. · The Cable Length value is 50 cm. The switch detects and correctly identifies the cable.
The connection between Port 2 on Switch 1 and Port 1 on Switch 2 is unreliable on at least one of the connector pins.

Additional References for Switch Stacks

Related Documents

Related Topic

Document Title

Cabling and powering on a switch stack. Catalyst 3650 Switch Hardware Installation Guide

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and , use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1737

Feature History and Information for Switch Stacks

Stack Manager and High Availability

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Switch Stacks

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1738

8 5 C H A P T E R
Configuring Cisco NSF with SSO
· Finding Feature Information, on page 1739 · Prerequisites for NSF with SSO, on page 1739 · Restrictions for NSF with SSO, on page 1740 · Information About NSF with SSO, on page 1740 · How to Configure Cisco NSF with SSO , on page 1745 · Additional References for NSF with SSO, on page 1752 · Feature History and Information for NSF with SSO, on page 1753
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for NSF with SSO
The following are prerequisites and considerations for configuring NSF with SSO. · Use of the routing protocols requires the IP Services license level. EIGRP-stub and OSPF for routed access are supported on IP Base license level. · BGP support in NSF requires that neighbor networking devices be NSF-aware; that is, the devices must have the graceful restart capability and advertise that capability in their OPEN message during session establishment. If an NSF-capable router discovers that a particular BGP neighbor does not have graceful restart capability, it does not establish an NSF-capable session with that neighbor. All other neighbors that have graceful restart capability continue to have NSF-capable sessions with this NSF-capable networking device. · OSPF support in NSF requires that all neighbor networking devices be NSF-aware. If an NSF-capable router discovers that it has non-NSF -aware neighbors on a particular network segment, it disables NSF capabilities for that segment. Other network segments composed entirely of NSF-capable or NSF-aware routers continue to provide NSF capabilities.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1739

Restrictions for NSF with SSO

Stack Manager and High Availability

Restrictions for NSF with SSO
The following are restrictions for configuring NSF with SSO: · NSF capability is supported for IPv4 routing protocols only. NSF capability is not supported for IPv6 routing protocols. · NSF does not support IP Multicast Routing, as it is not SSO-aware. · NSF is not supported if the IOS-XE software is running in the LAN Base mode. · For NSF operation, you must have SSO configured on the device. · NSF with SSO supports IP Version 4 traffic and protocols only; NSF with SSO does not support IPv6 traffic. · All Layer 3 neighboring devices must be NSF Helper or NSF-capable to support graceful restart capability. · For IETF, all neighboring devices must be running an NSF-aware software image.
Information About NSF with SSO
Overview of NSF with SSO
The switch supports fault resistance by allowing a standby switch to take over if the active switch becomes unavailable. Cisco nonstop forwarding (NSF) works with stateful switchover (SSO) to minimize the amount of time a network is unavailable. NSF provides these benefits:
· Improved network availability--NSF continues forwarding network traffic and application state information so that user session information is maintained after a switchover.
· Overall network stability--Network stability may be improved with the reduction in the number of route flaps, which were created when routers in the network failed and lost their routing tables.
· Neighboring routers do not detect a link flap--Because the interfaces remain up during a switchover, neighboring routers do not detect a link flap (the link does not go down and come back up).
· Prevents routing flaps--Because SSO continues forwarding network traffic during a switchover, routing flaps are avoided.
· Maintains user sessions established prior to the switchover.
SSO Operation
When a standby switch runs in SSO mode, the standby switch starts up in a fully-initialized state and synchronizes with the persistent configuration and the running configuration of the active switch. It subsequently maintains the state on the protocols listed below, and all changes in hardware and software states for features that support stateful switchover are kept in synchronization. Consequently, it offers minimum interruption to Layer 2 sessions in a redundant active switch configuration.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1740

Stack Manager and High Availability

SSO Operation

If the active switch fails, the standby switch becomes the active switch. This new active switch uses existing Layer 2 switching information to continue forwarding traffic. Layer 3 forwarding will be delayed until the routing tables have been repopulated in the newly active switch.
Note SSO is not supported if the IOS-XE software is running the LAN Base license level.
The state of these features is preserved between both the active and standby switches:
· 802.3 · 802.3u · 802.3x (Flow Control) · 802.3ab (GE) · 802.3z (Gigabit Ethernet including CWDM) · 802.3ad (LACP) · 802.1p (Layer 2 QoS) · 802.1q · 802.1X (Authentication) · 802.1D (Spanning Tree Protocol) · 802.3af (Inline power) · PAgP · VTP · Dynamic ARP Inspection · DHCP snooping · IP source guard · IGMP snooping (versions 1 and 2) · DTP (802.1q and ISL) · MST · PVST+ · Rapid-PVST · PortFast/UplinkFast/BackboneFast · BPDU guard and filtering · Voice VLAN · Port security · Unicast MAC filtering · ACL (VACLS, PACLS, RACLS) · QOS (DBL) · Multicast storm control/broadcast storm control
SSO is compatible with the following list of features. However, the protocol database for these features is not synchronized between the standby and active switches:
· 802.1Q tunneling with Layer 2 Protocol Tunneling (L2PT) · Baby giants · Jumbo frame support · CDP · Flood blocking · UDLD

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1741

NSF Operation

Stack Manager and High Availability

· SPAN/RSPAN · NetFlow All Layer 3 protocols on a switch are learned on the standby switch if SSO is enabled.
NSF Operation
Cisco IOS Nonstop Forwarding (NSF) always runs with stateful switchover (SSO) and provides redundancy for Layer 3 traffic. NSF is supported by the BGP, OSPF, and EIGRP routing protocols and is supported by Cisco Express Forwarding (CEF) for forwarding. The routing protocols have been enhanced with NSF-capability and awareness, which means that routers running these protocols can detect a switchover and take the necessary actions to continue forwarding network traffic and to recover route information from the peer devices. Each protocol depends on CEF to continue forwarding packets during switchover while the routing protocols rebuild the Routing Information Base (RIB) tables. After the routing protocols have converged, CEF updates the FIB table and removes stale route entries. CEF then updates the hardware with the new FIB information. If the active switch is configured for BGP (with the graceful-restart command), OSPF, or EIGRP routing protocols, routing updates are automatically sent during the active switch election. The switch supports NSF-awareness and NSF-capability for the BGP, OSPF, and EIGRP protocols in IP Services license level and NSF-awareness for the EIGRP-stub in IP Base license level. NSF has two primary components:
· NSF-awareness A networking device is NSF-aware if it is running NSF-compatible software. If neighboring router devices detect that an NSF router can still forward packets when an active switch election happens, this capability is referred to as NSF-awareness. Cisco IOS enhancements to the Layer 3 routing protocols (BGP, OSPF, and EIGRP) are designed to prevent route-flapping so that the CEF routing table does not time out or the NSF router does not drop routes. An NSF-aware router helps to send routing protocol information to the neighboring NSF router. NSF-awareness is enabled by default for EIGRP-stub, EIGRP, and OSPF protocols. NSF-awareness is disabled by default for BGP.
· NSF-capability A device is NSF-capable if it has been configured to support NSF; it rebuilds routing information from NSF-aware or NSF-capable neighbors. NSF works with SSO to minimize the amount of time that a Layer 3 network is unavailable following an active switch election by continuing to forward IP packets. Reconvergence of Layer 3 routing protocols (BGP, OSPFv2, and EIGRP) is transparent to the user and happens automatically in the background. The routing protocols recover routing information from neighbor devices and rebuild the Cisco Express Forwarding (CEF) table.
Note NSF does not support IPv6 and is IPv4 Unicast only.
Cisco Express Forwarding
A key element of Cisco IOS Nonstop Forwarding (NSF) is packet forwarding. In a Cisco networking device, packet forwarding is provided by Cisco Express Forwarding (CEF). CEF maintains the FIB and uses the FIB

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1742

Stack Manager and High Availability

BGP Operation

information that was current at the time of the switchover to continue forwarding packets during a switchover. This feature reduces traffic interruption during the switchover.
During normal NSF operation, CEF on the active supervisor switch synchronizes its current FIB and adjacency databases with the FIB and adjacency databases on the standby switch. Upon switchover, the standby switch initially has FIB and adjacency databases that are mirror images of those that were current on the active switch. CEF keeps the forwarding engine on the standby switch current with changes that are sent to it by CEF on the active switch. The forwarding engine can continue forwarding after a switchover as soon as the interfaces and a data path are available.
As the routing protocols start to repopulate the RIB on a prefix-by-prefix basis, the updates cause prefix-by-prefix updates to CEF, which it uses to update the FIB and adjacency databases. Existing and new entries receive the new version ("epoch") number, indicating that they have been refreshed. The forwarding information is updated on the forwarding engine during convergence. The switch signals when the RIB has converged. The software removes all FIB and adjacency entries that have an epoch older than the current switchover epoch. The FIB now represents the newest routing protocol forwarding information.
BGP Operation
When an NSF-capable router begins a BGP session with a BGP peer, it sends an OPEN message to the peer. Included in the message is a statement that the NSF-capable device has "graceful" restart capability. Graceful restart is the mechanism by which BGP routing peers avoid a routing flap following a switchover. If the BGP peer has received this capability, it is aware that the device sending the message is NSF-capable. Both the NSF-capable router and its BGP peers need to exchange the graceful restart capability in their OPEN messages at the time of session establishment. If both the peers do not exchange the graceful restart capability, the session will not be capable of a graceful restart.
If the BGP session is lost during the active switch switchover, the NSF-aware BGP peer marks all the routes associated with the NSF-capable router as stale; however, it continues to use these routes to make forwarding decisions for a set period of time. This functionality prevents packets from being lost while the newly active switch is waiting for convergence of the routing information with the BGP peers.
After an active switch switchover occurs, the NSF-capable router reestablishes the session with the BGP peer. In establishing the new session, it sends a new graceful restart message that identifies the NSF-capable router as having restarted.
At this point, the routing information is exchanged between the two BGP peers. After this exchange is complete, the NSF-capable device uses the routing information to update the RIB and the FIB with the new forwarding information. The NSF-aware device uses the network information to remove stale routes from its BGP table; the BGP protocol then is fully converged.
If a BGP peer does not support the graceful restart capability, it ignores the graceful restart capability in an OPEN message but establishes a BGP session with the NSF-capable device. This function allows interoperability with non-NSF-aware BGP peers (and without NSF functionality), but the BGP session with non-NSF-aware BGP peers is not capable of a graceful restart.
Note BGP support in NSF requires that neighbor networking devices be NSF-aware; that is, the devices must have the graceful restart capability and advertise that capability in their OPEN message during session establishment. If an NSF-capable router discovers that a particular BGP neighbor does not have graceful restart capability, it does not establish an NSF-capable session with that neighbor. All other neighbors that have graceful restart capability continue to have NSF-capable sessions with this NSF-capable networking device.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1743

OSPF Operation

Stack Manager and High Availability

OSPF Operation
When an OSPF NSF-capable router performs an active switch switchover, it must perform the following tasks in order to resynchronize its link state database with its OSPF neighbors:
· Relearn the available OSPF neighbors on the network without causing a reset of the neighbor relationship · Reacquire the contents of the link state database for the network
As quickly as possible after an active switch switchover, the NSF-capable router sends an OSPF NSF signal to neighboring NSF-aware devices. Neighbor networking devices recognize this signal as an indicator that the neighbor relationship with this router should not be reset. As the NSF-capable router receives signals from other routers on the network, it can begin to rebuild its neighbor list.
After neighbor relationships are reestablished, the NSF-capable router begins to resynchronize its database with all of its NSF-aware neighbors. At this point, the routing information is exchanged between the OSPF neighbors. Once this exchange is complete, the NSF-capable device uses the routing information to remove stale routes, update the RIB, and update the FIB with the new forwarding information. The OSPF protocols are then fully converged.
Note OSPF support in NSF requires that all neighbor networking devices be NSF-aware. If an NSF-capable router discovers that it has non-NSF -aware neighbors on a particular network segment, it disables NSF capabilities for that segment. Other network segments composed entirely of NSF-capable or NSF-aware routers continue to provide NSF capabilities.
EIGRP Operation
When an EIGRP NSF-capable router initially re-boots after an NSF restart, it has no neighbor and its topology table is empty. The router is notified by the standby (now active) switch when it needs to bring up the interfaces, reacquire neighbors, and rebuild the topology and routing tables. The restarting router and its peers must accomplish these tasks without interrupting the data traffic directed toward the restarting router. EIGRP peer routers maintain the routes learned from the restarting router and continue forwarding traffic through the NSF restart process.
To prevent an adjacency reset by the neighbors, the restarting router uses a new Restart (RS) bit in the EIGRP packet header to indicate a restart. The RS bit is set in the hello packets and in the initial INIT update packets during the NSF restart period. The RS bit in the hello packets allows the neighbors to be quickly notified of the NSF restart. Without seeing the RS bit, the neighbor can only detect an adjacency reset by receiving an INIT update or by the expiration of the hello hold timer. Without the RS bit, a neighbor does not know if the adjacency reset should be handled using NSF or the normal startup method.
When the neighbor receives the restart indication, either by receiving the hello packet or the INIT packet, it recognizes the restarting peer in its peer list and maintains the adjacency with the restarting router. The neighbor then sends it topology table to the restarting router with the RS bit set in the first update packet indicating that it is NSF-aware and is helping out the restarting router. The neighbor does not set the RS bit in their hello packets, unless it is also a NSF restarting neighbor.
Note A router may be NSF-aware but may not be helping the NSF restarting neighbor because booting from a cold start.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1744

Stack Manager and High Availability

How to Configure Cisco NSF with SSO

If at least one of the peer routers is NSF-aware, the restarting router would then receive updates and rebuild its database. The restarting router must then find out if it had converged so that it can notify the routing information base (RIB). Each NSF-aware router is required to send an end of table (EOT) marker in the last update packet to indicate the end of the table content. The restarting router knows it has converged when it receives the EOT marker. The restarting router can then begin sending updates.
An NSF-aware peer would know when the restarting router had converged when it receives an EOT indication from the restarting router. The peer then scans its topology table to search for the routes with the restarted neighbor as the source. The peer compares the route timestamp with the restart event timestamp to determine if the route is still available. The peer then goes active to find alternate paths for the routes that are no longer available through the restarted router.
When the restarting router has received all EOT indications from its neighbors or when the NSF converge timer expires, EIGRP notifies the RIB of convergence. EIGRP waits for the RIB convergence signal and then floods its topology table to all awaiting NSF-aware peers.

How to Configure Cisco NSF with SSO

Configuring SSO
You must configure SSO in order to use NSF with any supported protocol.

SUMMARY STEPS

1. redundancy 2. mode sso 3. end 4. show running-config 5. show redundancy states

DETAILED STEPS

Step 1

Command or Action redundancy Example:
Switch(config)# redundancy

Step 2

mode sso Example:
Switch(config-red)# mode sso

Step 3

end Example:
Switch(config-red)# end

Step 4

show running-config Example:

Purpose Enters redundancy configuration mode.
Configures SSO. When this command is entered, the standby switch is reloaded and begins to work in SSO mode. Returns to EXEC mode.
Verifies that SSO is enabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1745

Configuring SSO Example

Stack Manager and High Availability

Step 5

Command or Action
Switch# show running-config
show redundancy states Example:
Switch# show redundancy states

Purpose Displays the operating redundancy mode.

Configuring SSO Example
This example shows how to configure the system for SSO and display the redundancy state:
Switch(config)# redundancy Switch(config)# mode sso Switch(config)# end Switch# show redundancy states my state = 13 -ACTIVE peer state = 8 -STANDBY HOT Mode = Duplex Unit = Primary Unit ID = 5 Redundancy Mode (Operational) = sso Redundancy Mode (Configured) = sso Split Mode = Disabled Manual Swact = Enabled Communications = Up client count = 29 client_notification_TMR = 30000 milliseconds keep_alive TMR = 9000 milliseconds keep_alive count = 1 keep_alive threshold = 18 RF debug mask = 0x0

Configuring CEF NSF
The CEF NSF feature operates by default while the networking device is running in SSO mode. No configuration is necessary.
Verifying CEF NSF
To verify CEF NSF, use the show cef state privileged EXEX command.
Switch# show cef state CEF Status: RP instance common CEF enabled IPv4 CEF Status: CEF enabled/running dCEF enabled/running CEF switching enabled/running universal per-destination load sharing algorithm, id DEA83012 IPv6 CEF Status: CEF disabled/not running dCEF disabled/not running universal per-destination load sharing algorithm, id DEA83012

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1746

Stack Manager and High Availability

Configuring BGP for NSF

RRP state: I am standby RRP: no RF Peer Presence: yes RF PeerComm reached: yes RF Progression blocked: never Redundancy mode: rpr(1) CEF NSF sync: disabled/not running CEF ISSU Status: FIBHWIDB broker No slots are ISSU capable. FIBIDB broker No slots are ISSU capable. FIBHWIDB Subblock broker No slots are ISSU capable. FIBIDB Subblock broker No slots are ISSU capable. Adjacency update No slots are ISSU capable. IPv4 table broker No slots are ISSU capable. CEF push No slots are ISSU capable.

Configuring BGP for NSF
You must configure BGP graceful restart on all peer devices participating in BGP NSF.

SUMMARY STEPS

1. configure terminal 2. router bgp as-number 3. bgp graceful-restart

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch(config)# configure terminal

Step 2

router bgp as-number Example:
Switch(config)# router bgp 300

Step 3

bgp graceful-restart Example:
Switch(config)# bgp graceful-restart

Purpose Enters global configuration mode.
Enables a BGP routing process, which places the switch in switch configuration mode.
Enables the BGP graceful restart capability, starting BGP NSF. If you enter this command after the BGP session has been established, you must restart the session for the capability to be exchanged with the BGP neighbor. Use this command on the restarting switch and all of its peers.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1747

Verifying BGP NSF

Stack Manager and High Availability

Verifying BGP NSF
To verify BGP NSF, you must check that BGP graceful restart is configured on the SSO-enabled networking device and on the neighbor devices. To verify, follow these steps:

Step 1
Step 2 Step 3

Verify that "bgp graceful-restart" appears in the BGP configuration of the SSO-enabled switch by entering the show running-config command:
Example:
Switch# show running-config . . . router bgp 120 . . . bgp graceful-restart neighbor 192.0.2.0 remote-as 300 . . .
Repeat Step 1 on each of the BGP neighbors.
On the SSO device and the neighbor device, verify that the graceful restart function is shown as both advertised and received, and confirm the address families that have the graceful restart capability. If no address families are listed, BGP NSF does not occur either:
Example:
Switch# show ip bgp neighbors BGP neighbor is 192.0.2.3, remote AS 1, internal link BGP version 4, remote router ID 192.0.2.4 BGP state = Established, up for 00:02:38 Last read 00:00:38, last write 00:00:35, hold time is 180, keepalive interval is 60 seconds Neighbor capabilities: Route refresh: advertised and received(new) Address family IPv4 Unicast: advertised and received Message statistics: InQ depth is 0 OutQ depth is 0 Sent Rcvd Opens: 1 1 Notifications: 0 0 Updates: 0 0 Keepalives: 4 4 Route Refresh: 0 0 Total: 5 5 Default minimum time between advertisement runs is 0 seconds ............................................................ (Remaining output deleted)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1748

Stack Manager and High Availability

Configuring OSPF NSF

Configuring OSPF NSF
All peer devices participating in OSPF NSF must be made OSPF NSF-aware, which happens automatically when you install an NSF software image on the device.

SUMMARY STEPS

1. configure terminal 2. router ospf processID 3. nsf

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch(config)# configure terminal

Step 2

router ospf processID Example:
Switch(config)# router ospf processID

Step 3

nsf Example:
Switch(config)# nsf

Purpose Enters global configuration mode.
Enables an OSPF routing process, which places the switch in router configuration mode.
Enables NSF operations for OSPF.

Verifying OSPF NSF

Step 1

Verify that `nsf' appears in the OSPF configuration of the SSO-enabled device by entering the show running-config command:
Example:
Switch(config)#show running-config route ospf 120 log-adjacency-changes nsf network 192.0.2.0 192.0.2.255 area 0 network 192.0.2.1 192.0.2.255 area 1 network 192.0.2.2 192.0.2.255 area 2 . . .

Step 2

Enter the show ip ospf command to verify that NSF is enabled on the device:
Example:
Switch show ip ospf Routing Process "ospf 1" with ID 192.0.2.1 Start time: 00:02:07.532, Time elapsed: 00:39:05.052

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1749

Configuring EIGRP NSF

Stack Manager and High Availability

Supports only single TOS(TOS0) routes Supports opaque LSA Supports Link-local Signaling (LLS) transit capable is 0 External flood list length 0 IETF Non-Stop Forwarding enabled restart-interval limit: 120 sec IETF NSF helper support enabled Cisco NSF helper support enabled Reference bandwidth unit is 100 mbps Area BACKBONE(0) Number of interfaces in this area is 3 (1 loopback) Area has no authentication SPF algorithm last executed 00:08:53.760 ago SPF algorithm executed 2 times Area ranges are Number of LSA 3. Checksum Sum 0x025BE0 Number of opaque link LSA 0. Checksum Sum 0x000000 Number of DCbitless LSA 0 Number of indication LSA 0 Number of DoNotAge LSA 0 Flood list length 0

Configuring EIGRP NSF

SUMMARY STEPS

1. configure terminal 2. router eigrp as-number 3. nsf

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch configure terminal

Step 2

router eigrp as-number Example:
Switch(config)# router eigrp as-number

Step 3

nsf Example:
Switch(config-router)# nsf

Purpose Enters global configuration mode.
Enables an EIGRP routing process, which places the switch in router configuration mode.
Enables EIGRP NSF. Use this command on the "restarting" switch and all of its peers.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1750

Stack Manager and High Availability

Verifying EIGRP NSF

Verifying EIGRP NSF

Step 1

Verify that "nsf" appears in the EIGRP configuration of the SSO-enabled device by entering the show running-config command:
Example:
Switch show running-config .. . router eigrp 100 auto-summary nsf .. .

Step 2

Enter the show ip protocols command to verify that NSF is enabled on the device:
Example:
Switch show ip protocols *** IP Routing is NSF aware *** Routing Protocol is "ospf 1" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Router ID 192.0.2.3 Number of areas in this router is 1. 1 normal 0 stub 0 nssa Maximum path: 1 Routing for Networks: Routing on Interfaces Configured Explicitly (Area 0): Loopback0 GigabitEthernet5/3 TenGigabitEthernet3/1 Routing Information Sources: Gateway Distance Last Update 192.0.2.1 110 00:01:02 Distance: (default is 110) Routing Protocol is "bgp 601" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set IGP synchronization is disabled Automatic route summarization is disabled Neighbor(s): Address FiltIn FiltOut DistIn DistOut Weight RouteMap 192.0.2.0 Maximum path: 1 Routing Information Sources: Gateway Distance Last Update 192.0.2.0 20 00:01:03 Distance: external 20 internal 200 local 200

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1751

Additional References for NSF with SSO

Stack Manager and High Availability

Additional References for NSF with SSO

Related Documents
Related Topic Document Title IP Routing: BGP IP Routing: BGP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650
Switches)
IP Routing: EIGRP IP Routing: EIGRP Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
IP Routing: OSPF IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and , use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1752

Stack Manager and High Availability

Feature History and Information for NSF with SSO

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for NSF with SSO

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1753

Feature History and Information for NSF with SSO

Stack Manager and High Availability

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1754

8 6 C H A P T E R
Configuring Wireless High Availability
· Finding Feature Information, on page 1755 · Information about High Availability, on page 1755 · Information about Access Point Stateful Switch Over , on page 1755 · Initiating Graceful Switchover, on page 1756 · Configuring EtherChannels, on page 1756 · Configuring LACP, on page 1756 · Troubleshooting High Availability, on page 1758
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information about High Availability
The high availability feature is enabled by default when the switches are connected using the stack cable and the Cisco StackWise-160 technology is enabled. You cannot disable it; however, you can initiate a manual graceful-switchover using the command line interface to use the high availability feature enabled in the switch.
Information about Access Point Stateful Switch Over
An Access Point Stateful Switch Over (AP SSO) implies that all the access point sessions are switched over state-fully and the user session information is maintained during a switchover, and access points continue to operate in network with no loss of sessions, providing improved network availability. The active switch in the stack is equipped to perform all network functions, including IP functions and routing information exchange. The switch supports 1000 access points and 12000 clients. However, all the clients are de-authenticated and need to be re-associated with the new active switch except for the locally switched clients in FlexConnect mode when a switchover occurs.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1755

Initiating Graceful Switchover

Stack Manager and High Availability

Once a redundancy pair is formed while in a stack, high availability is enabled, which includes that access points continue to remain connected during an active-to-standby switchover.

Note You can not disable AP SSO while in a switch stack once the switches form a redundant pair.

Initiating Graceful Switchover
To perform a manual switchover and to use the high availability feature enabled in the switch, execute the redundancy force-switchover command. This command initiates a graceful switchover from the active to the standby switch.
Switch# redundancy force-switchover System configuration has been modified. Save ? [yes/no] : yes Building configuration ... Preparing for switchover ... Compressed configuration from 14977 bytes to 6592 bytes[OK]This will reload the active unit
and force switchover to standby[confirm] : y

Configuring EtherChannels
The LAG, or an EtherChannel, bundles all the existing ports in both the standby and active units into a single logical port to provide an aggregate bandwidth of 60 Gbps. The creation of an EtherChannel enables protection against failures. The EtherChannels or LAGs created are used for link redundancy to ensure high availability of access points.

Step 1 Step 2
Step 3 Step 4
Step 5

Connect two switches that are in powered down state using the stack cable. Power up and perform a boot on both switches simultaneously or power and boot one switch. The switches boot up successfully, and form a high availability pair.
Configure EtherChannel or LAG on the units. Use the show etherchannel summary command to view the status of the configured EtherChannel. On successful configuration, all the specified ports will be bundled in a single channel and listed in the command output of show etherchannel summary.
Execute the show ap uptime command to verify the connected access points.

Configuring LACP

SUMMARY STEPS

1. configure terminal 2. interface port-channel number

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1756

Stack Manager and High Availability

Configuring LACP

3. lacp max-bundle number 4. lacp port-priority number 5. switchport backup interface po2 6. end 7. show etherchannel summary 8. show interfaces switchport backup

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

interface port-channel number Example:
Switch(config)# interface Port-channel Po2

Enters port-channel interface configuration mode.

Step 3

lacp max-bundle number Example:
Switch(config-if)# lacp max-bundle 6

Defines the maximum number of active bundled LACP ports allowed in a port channel. The value ranges from 1 to 8.

Step 4

lacp port-priority number Example:
Switch(config-if)# lacp port-priority 4

Specifies port priority to be configured on the port using LACP. The value ranges from 0 to 65535.

Step 5

switchport backup interface po2

Specifies an interface as the backup interface.

Example:

Switch(config-if)# switchport backup interface Po2

Step 6 Step 7

end show etherchannel summary Example:
Switch# show etherchannel summary

Exits the interface and configuration mode. Displays a summary of EtherChannel properties.

Step 8

show interfaces switchport backup Example:
Switch# show interfaces switchport backup

Displays summary of backup EtherChannel properties.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1757

Troubleshooting High Availability

Stack Manager and High Availability

Troubleshooting High Availability

Access the Standby Console
You can only access the console of the active switch in a stack. To access the standby switch, use the following commands.

Before you begin Use this functionality only under supervision of Cisco Support.

SUMMARY STEPS

1. configure terminal 2. service internal 3. redundancy 4. main-cpu 5. standby console enable 6. exit

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

service internal Example:
Switch(config)# service internal

Step 3

redundancy Example:
Switch(config)# redundancy

Step 4

main-cpu Example:
Switch(config)# main-cpu

Step 5

standby console enable Example:
Switch(config)# standby console enable

Step 6

exit Example:

Purpose Enters global configuration mode. Enables Cisco IOS debug commands. Enters redundancy configuration mode. Enters the redundancy main configuration submode. Enables the standby console. Exits the configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1758

Stack Manager and High Availability

Before a Switchover

Command or Action
Switch(config)# exit

Purpose

Before a Switchover
A switchover happens when the active switch fails; however, while performing a manual switchover, you can execute these commands to initiate a successful switchover:

SUMMARY STEPS

1. show redundancy states 2. show switch detail 3. show platform ses states 4. show ap summary 5. show capwap detail 6. show dtls database-brief 7. show power inline

DETAILED STEPS

Step 1

Command or Action show redundancy states Example:
Switch# show redundancy states

Step 2

show switch detail Example:
Switch# show switch detail

Step 3

show platform ses states Example:
Switch# show platform ses states

Step 4

show ap summary Example:
Switch# show ap summary

Step 5

show capwap detail Example:
Switch# show capwap detail

Step 6

show dtls database-brief Example:
Switch# show dtls database-brief

Step 7 show power inline

Purpose Displays the high availability role of the active and standby switches.
Display physical property of the stack. Verify if the physical states of the stacks are "Ready" or "Port".
Displays the sequences of the stack manager.
Displays all the access points in the active and standby switches.
Displays the details of the CAPWAP tunnel in the active and standby switches.
Displays DTLS details in the active and standby switches.
Displays the power on Ethernet power state.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1759

After a Switchover

Stack Manager and High Availability

Command or Action Example:
Switch# show power inline

Purpose
Note When a failover occurs, the standby controller must be in a standby-hot state and the redundant port in a terminal state in SSO for successful switchover to occur.

After a Switchover
This section defines the steps that you must perform to ensure that successful switchover from the active to standby switch is performed. On successful switchover of the standby switch as active, all access points connected to the active need to re-join the standby (then active) switch.

SUMMARY STEPS

1. show ap uptime 2. show wireless summary 3. show wcdb database all 4. show power inline

DETAILED STEPS

Step 1

Command or Action show ap uptime Example:
Switch# show ap uptime

Step 2

show wireless summary Example:
Switch# show wireless summary

Step 3

show wcdb database all Example:
Switch# show wcdb database all

Step 4

show power inline Example:
Switch# show power inline

Purpose Verify if the uptime of the access point after the switchover is large enough. Display the clients connected in the active switch.
Display if the client has reached the uptime.
Display the power over Ethernet power state.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1760

Stack Manager and High Availability

Monitoring the Switch Stack

Monitoring the Switch Stack

Table 156: Commands for Displaying Stack Information

Command

Description

show switch

Displays summary information about the stack, including the status of provisioned switches and switches in version-mismatch mode.

show switch stack-member-number Displays information about a specific member.

show switch detail

Displays detailed information about the stack.

show switch neighbors

Displays the stack neighbors.

show switch stack-ports [summary]

Displays port information for the stack.

show redundancy

Displays the redundant system and the current processor information. The redundant system information includes the system uptime, standby failures, switchover reason, hardware, configured and operating redundancy mode. The current processor information displayed includes the active location, the software state, the uptime in the current state and so on.

show redundancy state

Displays all the redundancy states of the active and standby switches.

LACP Configuration: Example
This example shows how to configure LACP and to verify creation of the LACP bundle and the status:
Switch(config)# ! interface TenGigabitEthernet1/0/1
switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet1/0/2 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet1/0/3 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet1/0/4 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet1/0/5 switchport mode trunk

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1761

LACP Configuration: Example

Stack Manager and High Availability

channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet1/0/6 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet2/0/1 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet2/0/2 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet2/0/3 switchport mode trunk channel-group 1 mode active lacp port-priority 10 ip dhcp snooping trust ! interface TenGigabitEthernet2/0/4 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet2/0/5 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface TenGigabitEthernet2/0/6 switchport mode trunk channel-group 1 mode active ip dhcp snooping trust ! interface Vlan1 no ip address ip igmp version 1 shutdown !

Switch# show etherchannel summary

Flags: D - down

P - bundled in port-channel

I - stand-alone s - suspended

H - Hot-standby (LACP only)

R - Layer3

S - Layer2

U - in use

f - failed to allocate aggregator

M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port

Number of channel-groups in use: 1

Number of aggregators:

1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1762

Stack Manager and High Availability

Flex Link Configuration: Example

Group Port-channel Protocol Ports

------+-------------+-----------+-----------------------------------------------

1

Po1(SU)

LACP

Te1/0/1(P) Te1/0/2(P) Te1/0/3(P)

Te1/0/4(H) Te1/0/5(H) Te1/0/6(H)

Te2/0/1(P) Te2/0/2(P) Te2/0/3(P)

Te2/0/4(H) Te2/0/5(H) Te2/0/6(H)

This example shows the switch backup interface pairs:
Switch# show interfaces switchport backup

Switch Backup Interface Pairs:

Active Interface

Backup Interface

State

------------------------------------------------------------------------

Port-channel1

Port-channel2

Active Standby/Backup Up

This example shows the summary of the EtherChannel configured in the switch:
Switch# show ethernet summary

Flags:

D - down

P - bundled in port-channel

I - stand-alone s - suspended

H - Hot-standby (LACP only)

R - Layer3

S - Layer2

U - in use

f - failed to allocate aggregator

M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port

Number of channel-groups in use: 2

Number of aggregators:

2

Group Port-channel Protocol Ports

------+-------------+-----------+-----------------------------------------------

1

Po1(SU)

LACP

Te1/0/1(P) Te1/0/2(P) Te1/0/3(P)

Te1/0/4(P) Te1/0/5(P) Te1/0/6(P)

2

Po2(SU)

LACP

Te2/0/1(P) Te2/0/2(P) Te2/0/3(P)

Te2/0/4(P) Te2/0/5(P) Te2/0/6(P)

Flex Link Configuration: Example
This example shows how to configure flex link and to verify creation and the status of the created link:
Switch(config)# ! interface Port-channel1
description Ports 1-6 connected to NW-55-SW switchport mode trunk switchport backup interface Po2 switchport backup interface Po2 preemption mode forced switchport backup interface Po2 preemption delay 1 ip dhcp snooping trust ! interface Port-channel2 description Ports 7-12connected to NW-55-SW switchport mode trunk ip dhcp snooping trust ! interface GigabitEthernet0/0

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1763

Flex Link Configuration: Example
vrf forwarding Mgmt-vrf no ip address negotiation auto ! interface TenGigabitEthernet1/0/1 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/2 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/3 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/4 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/5 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet1/0/6 switchport mode trunk channel-group 1 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/1 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/2 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/3 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/4 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/5 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust ! interface TenGigabitEthernet2/0/6 switchport mode trunk channel-group 2 mode on ip dhcp snooping trust !

Stack Manager and High Availability

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1764

Stack Manager and High Availability

Viewing Redundancy Switchover History (GUI)

interface Vlan1 no ip address

Switch# show etherchannel summary

Flags: D - down

P - bundled in port-channel

I - stand-alone s - suspended

H - Hot-standby (LACP only)

R - Layer3

S - Layer2

U - in use

f - failed to allocate aggregator

M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port

Number of channel-groups in use: 2

Number of aggregators:

2

Group Port-channel Protocol Ports

------+-------------+-----------+-----------------------------------------------

1

Po1(SU)

-

Te1/0/1(P) Te1/0/2(P) Te1/0/3(P)

Te1/0/4(P) Te1/0/5(P) Te1/0/6(P)

2

Po2(SU)

-

Te2/0/1(P) Te2/0/2(P) Te2/0/3(D)

Te2/0/4(P) Te2/0/5(P) Te2/0/6(P)

Viewing Redundancy Switchover History (GUI)

Step 1 Step 2

Click Monitor > Controller > Redundancy > States. The Redundancy States page is displayed. The values for the following parameters are displayed in the page:

Parameter

Description

Index

Displays the index number of the of the redundant unit.

Previous Active

Displays the Switches that was active before.

Current Active

Displays the Switches that is currently active.

Switch Over Time Displays the system time when the switchover occurs.

Switch Over Reason Displays the cause of the switchover.

Click Apply.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1765

Viewing Switchover States (GUI)

Stack Manager and High Availability

Viewing Switchover States (GUI)

Step 1 Step 2

Click Monitor > Controller > Redundancy > States. The Redundancy States page is displayed. The values for the following parameters are displayed in the page:

Parameter My State

Description
Shows the state of the active CPU Switch module. Values are as follows:
· Active · Standby HOT · Disable

Peer State

Displays the state of the peer (or standby) CPU Switch module. Values are as follows:
· Standby HOT · Disable

Mode

Displays the current state of the redundancy peer. Values are as follows:
· Simplex-- Single CPU switch module · Duplex-- Two CPU switch modules

Unit ID
Redundancy Mode (Operational)
Redundancy Mode (Configured)
Redundancy State

Displays the unit ID of the CPU switch module. Displays the current operational redundancy mode supported on the unit.
Displays the current configured redundancy mode supported on the unit.
Displays the current functioning redundancy state of the unit. Values are as follows: · SSP · Not Redundant

Manual SWACT

Displays whether manual switchovers have been enabled without the force option.

Communications

Displays whether communications are up or down between the two CPU Switch modules.

Client Count

Displays the number of redundancy subsystems that are registered as RF clients.

Client Notification TMR

Displays, in milliseconds, the time that an internal RF timer has for notifying RF client subsystems.

Keep Alive TMR

Displays, in milliseconds, the time interval the RF manager has for sending keep-alive messages to its peer on the standby CPU switch module.

Keep Alive Count

Displays the number of keep-alive messages sent without receiving a response from the standby CPU Switch module.

Keep Alive Threshold Displays the threshold for declaring that interprocessor communications are down when keep-alive messages have been enabled (which is the default).

RF Debug Mask

Displays an internal mask used by the RF to keep track of which debug modes are on.

Click Apply.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1766

Stack Manager and High Availability

Viewing Switchover States (GUI)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1767

Viewing Switchover States (GUI)

Stack Manager and High Availability

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1768

X V P A R T
System Management
· Administering the System, on page 1771 · Performing Switch Setup Configuration, on page 1795 · Configuring Right-To-Use Licenses, on page 1831 · Configuring Administrator Usernames and Passwords, on page 1847 · Configuring 802.11 parameters and Band Selection, on page 1853 · Configuring Aggressive Load Balancing, on page 1873 · Configuring Client Roaming, on page 1879 · Configuring Application Visibility and Control, on page 1893 · Configuring Voice and Video Parameters, on page 1923 · Configuring RFID Tag Tracking, on page 1945 · Configuring Location Settings, on page 1949 · Monitoring Flow Control, on page 1959 · Configuring SDM Templates, on page 1963 · Configuring System Message Logs, on page 1969 · Configuring Online Diagnostics, on page 1985 · Managing Configuration Files, on page 1995 · Configuration Replace and Configuration Rollback, on page 2033 · Working with the Flash File System, on page 2049 · Working with Cisco IOS XE Software Bundles, on page 2061 · Troubleshooting the Software Configuration, on page 2073

8 7 C H A P T E R
Administering the System
· Finding Feature Information, on page 1771 · Information About Administering the Switch, on page 1771 · How to Administer the Switch, on page 1777 · Monitoring and Maintaining Administration of the Switch, on page 1790 · Configuration Examples for Switch Administration, on page 1791 · Additional References for Switch Administration, on page 1793 · Feature History and Information for Switch Administration, on page 1794
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Administering the Switch
System Time and Date Management
You can manage the system time and date on your switch using automatic configuration methods (RTC and NTP), or manual configuration methods.
System Clock
The basis of the time service is the system clock. This clock runs from the moment the system starts up and keeps track of the date and time. The system clock can then be set from these sources:
· NTP · Manual configuration
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1771

Network Time Protocol

System Management

The system clock can provide time to these services:
· User show commands
· Logging and debugging messages
The system clock keeps track of time internally based on Coordinated Universal Time (UTC), also known as Greenwich Mean Time (GMT). You can configure information about the local time zone and summer time (daylight saving time) so that the time appears correctly for the local time zone.
The system clock keeps track of whether the time is authoritative or not (that is, whether it has been set by a time source considered to be authoritative). If it is not authoritative, the time is available only for display purposes and is not redistributed.

Network Time Protocol
The NTP is designed to time-synchronize a network of devices. NTP runs over User Datagram Protocol (UDP), which runs over IP. NTP is documented in RFC 1305.
An NTP network usually gets its time from an authoritative time source, such as a radio clock or an atomic clock attached to a time server. NTP then distributes this time across the network. NTP is extremely efficient; no more than one packet per minute is necessary to synchronize two devices to within a millisecond of one another.

NTP Stratum

NTP uses the concept of a stratum to describe how many NTP hops away a device is from an authoritative time source. A stratum 1 time server has a radio or atomic clock directly attached, a stratum 2 time server receives its time through NTP from a stratum 1 time server, and so on. A device running NTP automatically chooses as its time source the device with the lowest stratum number with which it communicates through NTP. This strategy effectively builds a self-organizing tree of NTP speakers.
NTP avoids synchronizing to a device whose time might not be accurate by never synchronizing to a device that is not synchronized. NTP also compares the time reported by several devices and does not synchronize to a device whose time is significantly different than the others, even if its stratum is lower.

NTP Associations
The communications between devices running NTP (known as associations) are usually statically configured; each device is given the IP address of all devices with which it should form associations. Accurate timekeeping is possible by exchanging NTP messages between each pair of devices with an association. However, in a LAN environment, NTP can be configured to use IP broadcast messages instead. This alternative reduces configuration complexity because each device can simply be configured to send or receive broadcast messages. However, in that case, information flow is one-way only.

NTP Security

The time kept on a device is a critical resource; you should use the security features of NTP to avoid the accidental or malicious setting of an incorrect time. Two mechanisms are available: an access list-based restriction scheme and an encrypted authentication mechanism.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1772

System Management

NTP Implementation

NTP Implementation
Implementation of NTP does not support stratum 1 service; it is not possible to connect to a radio or atomic clock. We recommend that the time service for your network be derived from the public NTP servers available on the IP Internet.
Figure 97: Typical NTP Network Configuration
The following figure shows a typical network example using NTP. Switch A is the NTP master, with the Switch B, C, and D configured in NTP server mode, in server association with Switch A. Switch E is configured as an NTP peer to the upstream and downstream switches, Switch B and Switch F,

respectively.
If the network is isolated from the Internet, NTP allows a device to act as if it is synchronized through NTP, when in fact it has learned the time by using other means. Other devices then synchronize to that device through NTP.
When multiple sources of time are available, NTP is always considered to be more authoritative. NTP time overrides the time set by any other method.
Several manufacturers include NTP software for their host systems, and a publicly available version for systems running UNIX and its various derivatives is also available. This software allows host systems to be time-synchronized as well.

NTP Version 4

NTP version 4 is implemented on the switch. NTPv4 is an extension of NTP version 3. NTPv4 supports both IPv4 and IPv6 and is backward-compatible with NTPv3.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1773

System Name and Prompt

System Management

NTPv4 provides these capabilities:
· Support for IPv6.
· Improved security compared to NTPv3. The NTPv4 protocol provides a security framework based on public key cryptography and standard X509 certificates.
· Automatic calculation of the time-distribution hierarchy for a network. Using specific multicast groups, NTPv4 automatically configures the hierarchy of the servers to achieve the best time accuracy for the lowest bandwidth cost. This feature leverages site-local IPv6 multicast addresses.

System Name and Prompt
You configure the system name on the switch to identify it. By default, the system name and prompt are Switch. If you have not configured a system prompt, the first 20 characters of the system name are used as the system prompt. A greater-than symbol [>] is appended. The prompt is updated whenever the system name changes.
Stack System Name and Prompt
If you are accessing a stack member through the active switch, you must use the session stack-member-number privileged EXEC command. The stack member number range is . When you use this command, the stack member number is appended to the system prompt. For example, Switch-2# is the prompt in privileged EXEC mode for stack member 2, and the system prompt for the switch stack is Switch.
Default System Name and Prompt Configuration
The default switch system name and prompt is Switch.

DNS

The DNS protocol controls the Domain Name System (DNS), a distributed database with which you can map hostnames to IP addresses. When you configure DNS on your switch, you can substitute the hostname for the IP address with all IP commands, such as ping, telnet, connect, and related Telnet support operations.
IP defines a hierarchical naming scheme that allows a device to be identified by its location or domain. Domain names are pieced together with periods (.) as the delimiting characters. For example, Cisco Systems is a commercial organization that IP identifies by a com domain name, so its domain name is cisco.com. A specific device in this domain, for example, the File Transfer Protocol (FTP) system is identified as ftp.cisco.com.
To keep track of domain names, IP has defined the concept of a domain name server, which holds a cache (or database) of names mapped to IP addresses. To map domain names to IP addresses, you must first identify the hostnames, specify the name server that is present on your network, and enable the DNS.

Default DNS Settings

Table 157: Default DNS Settings

Feature DNS enable state

Default Setting Enabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1774

System Management

Login Banners

Feature DNS default domain name DNS servers

Default Setting None configured. No name server addresses are configured.

Login Banners
You can configure a message-of-the-day (MOTD) and a login banner. The MOTD banner is displayed on all connected terminals at login and is useful for sending messages that affect all network users (such as impending system shutdowns).
The login banner is also displayed on all connected terminals. It appears after the MOTD banner and before the login prompts.
The MOTD and login banners are not configured.
Default Banner Configuration
The MOTD and login banners are not configured.
MAC Address Table
The MAC address table contains address information that the switch uses to forward traffic between ports. All MAC addresses in the address table are associated with one or more ports. The address table includes these types of addresses:
· Dynamic address--A source MAC address that the switch learns and then ages when it is not in use.
· Static address--A manually entered unicast address that does not age and that is not lost when the switch resets.
The address table lists the destination MAC address, the associated VLAN ID, and port number associated with the address and the type (static or dynamic).
MAC Address Table Creation
With multiple MAC addresses supported on all ports, you can connect any port on the switch to other network devices. The switch provides dynamic addressing by learning the source address of packets it receives on each port and adding the address and its associated port number to the address table. As devices are added or removed from the network, the switch updates the address table, adding new dynamic addresses and aging out those that are not in use.
The aging interval is globally configured. However, the switch maintains an address table for each VLAN, and STP can accelerate the aging interval on a per-VLAN basis.
The switch sends packets between any combination of ports, based on the destination address of the received packet. Using the MAC address table, the switch forwards the packet only to the port associated with the destination address. If the destination address is on the port that sent the packet, the packet is filtered and not forwarded. The switch always uses the store-and-forward method: complete packets are stored and checked for errors before transmission.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1775

MAC Addresses and VLANs

System Management

MAC Addresses and VLANs
All addresses are associated with a VLAN. An address can exist in more than one VLAN and have different destinations in each. Unicast addresses, for example, could be forwarded to port 1 in VLAN 1 and ports 9, 10, and 1 in VLAN 5.
Each VLAN maintains its own logical address table. A known address in one VLAN is unknown in another until it is learned or statically associated with a port in the other VLAN.

MAC Addresses and Switch Stacks
The MAC address tables on all stack members are synchronized. At any given time, each stack member has the same copy of the address tables for each VLAN. When an address ages out, the address is removed from the address tables on all stack members. When a switch joins a switch stack, that switch receives the addresses for each VLAN learned on the other stack members. When a stack member leaves the switch stack, the remaining stack members age out or remove all addresses learned by the former stack member.

Default MAC Address Table Settings
The following table shows the default settings for the MAC address table.
Table 158: Default Settings for the MAC Address

Feature Aging time Dynamic addresses Static addresses

Default Setting 300 seconds Automatically learned None configured

ARP Table Management
To communicate with a device (over Ethernet, for example), the software first must learn the 48-bit MAC address or the local data link address of that device. The process of learning the local data link address from an IP address is called address resolution.
The Address Resolution Protocol (ARP) associates a host IP address with the corresponding media or MAC addresses and the VLAN ID. Using an IP address, ARP finds the associated MAC address. When a MAC address is found, the IP-MAC address association is stored in an ARP cache for rapid retrieval. Then the IP datagram is encapsulated in a link-layer frame and sent over the network. Encapsulation of IP datagrams and ARP requests and replies on IEEE 802 networks other than Ethernet is specified by the Subnetwork Access Protocol (SNAP). By default, standard Ethernet-style ARP encapsulation (represented by the arpa keyword) is enabled on the IP interface.
ARP entries added manually to the table do not age and must be manually removed.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1776

System Management

How to Administer the Switch

How to Administer the Switch
Configuring the Time and Date Manually
System time remains accurate through restarts and reboot, however, you can manually configure the time and date after the system is restarted. We recommend that you use manual configuration only when necessary. If you have an outside source to which the switch can synchronize, you do not need to manually set the system clock.

Note You must reconfigure this setting if you have manually configured the system clock before the active switch fails and a different stack member assumes the role of active switch.

Setting the System Clock
If you have an outside source on the network that provides time services, such as an NTP server, you do not need to manually set the system clock.

SUMMARY STEPS

1. Use one of the following:
· clock set hh:mm:ss day month year · clock set hh:mm:ss month day year

DETAILED STEPS

Step 1

Command or Action Use one of the following:
· clock set hh:mm:ss day month year · clock set hh:mm:ss month day year Example:

Switch# clock set 13:32:00 23 March 2013

Purpose Sets the system clock using one of these formats:
· hh:mm:ss--Specifies the time in hours (24-hour format), minutes, and seconds. The time specified is relative to the configured time zone.
· day--Specifies the day by date in the month.
· month--Specifies the month by name.
· year--Specifies the year (no abbreviation).

Configuring the Time Zone

SUMMARY STEPS

1. configure terminal 2. clock timezone zone hours-offset [minutes-offset] 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1777

Configuring Summer Time (Daylight Saving Time)

System Management

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

clock timezone zone hours-offset [minutes-offset] Example:
Switch(config)# clock timezone AST -3 30

Step 3

end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Sets the time zone. Internal time is kept in Coordinated Universal Time (UTC), so this command is used only for display purposes and when the time is manually set.
· zone--Enters the name of the time zone to be displayed when standard time is in effect. The default is UTC.
· hours-offset--Enters the hours offset from UTC. · (Optional) minutes-offset--Enters the minutes offset
from UTC. This available where the local time zone is a percentage of an hour different from UTC.
Returns to privileged EXEC mode.

Configuring Summer Time (Daylight Saving Time)
To configure summer time (daylight saving time) in areas where it starts and ends on a particular day of the week each year, perform this task:

SUMMARY STEPS

1. configure terminal 2. clock summer-time zone date date month year hh:mm date month year hh:mm [offset]] 3. clock summer-time zone recurring [week day month hh:mm week day month hh:mm [offset]] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1778

System Management

Configuring a System Name

Step 2

Command or Action
clock summer-time zone date date month year hh:mm date month year hh:mm [offset]] Example:

Purpose
Configures summer time to start and end on specified days every year.

Switch(config)# clock summer-time PDT date 10 March 2013 2:00 3 November 2013 2:00

Step 3 Step 4

clock summer-time zone recurring [week day month hh:mm week day month hh:mm [offset]] Example:
Switch(config)# clock summer-time PDT recurring 10 March 2013 2:00 3 November 2013 2:00

Configures summer time to start and end on the specified days every year. All times are relative to the local time zone. The start time is relative to standard time.
The end time is relative to summer time. Summer time is disabled by default. If you specify clock summer-time zone recurring without parameters, the summer time rules default to the United States rules.

If the starting month is after the ending month, the system assumes that you are in the southern hemisphere.

· zone--Specifies the name of the time zone (for example, PDT) to be displayed when summer time is in effect.

· (Optional) week-- Specifies the week of the month (1 to 4, first, or last).

· (Optional) day--Specifies the day of the week (Sunday, Monday...).

· (Optional) month--Specifies the month (January, February...).

· (Optional) hh:mm--Specifies the time (24-hour format) in hours and minutes.

· (Optional) offset--Specifies the number of minutes to add during summer time. The default is 60.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Configuring a System Name

SUMMARY STEPS

1. configure terminal 2. hostname name

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1779

Setting Up DNS

System Management

3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

hostname name Example:
Switch(config)# hostname remote-users

Step 3

end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Configures a system name. When you set the system name, it is also used as the system prompt. The default setting is Switch. The name must follow the rules for ARPANET hostnames. They must start with a letter, end with a letter or digit, and have as interior characters only letters, digits, and hyphens. Names can be up to 63 characters. Returns to privileged EXEC mode.

Setting Up DNS
If you use the switch IP address as its hostname, the IP address is used and no DNS query occurs. If you configure a hostname that contains no periods (.), a period followed by the default domain name is appended to the hostname before the DNS query is made to map the name to an IP address. The default domain name is the value set by the ip domain-name global configuration command. If there is a period (.) in the hostname, the Cisco IOS software looks up the IP address without appending any default domain name to the hostname.

SUMMARY STEPS

1. configure terminal 2. ip domain-name name 3. ip name-server server-address1 [server-address2 ... server-address6] 4. ip domain-lookup [nsap | source-interface interface] 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1780

System Management

Configuring a Message-of-the-Day Login Banner

Command or Action
Switch# configure terminal

Purpose

Step 2 Step 3 Step 4 Step 5

ip domain-name name Example:
Switch(config)# ip domain-name Cisco.com
ip name-server server-address1 [server-address2 ... server-address6] Example:
Switch(config)# ip name-server 192.168.1.100 192.168.1.200 192.168.1.300

Defines a default domain name that the software uses to complete unqualified hostnames (names without a dotted-decimal domain name).
Do not include the initial period that separates an unqualified name from the domain name.
At boot time, no domain name is configured; however, if the switch configuration comes from a BOOTP or Dynamic Host Configuration Protocol (DHCP) server, then the default domain name might be set by the BOOTP or DHCP server (if the servers were configured with this information).
Specifies the address of one or more name servers to use for name and address resolution.
You can specify up to six name servers. Separate each server address with a space. The first server specified is the primary server. The switch sends DNS queries to the primary server first. If that query fails, the backup servers are queried.

ip domain-lookup [nsap | source-interface interface] Example:
Switch(config)# ip domain-lookup
end Example:

(Optional) Enables DNS-based hostname-to-address translation on your switch. This feature is enabled by default.
If your network devices require connectivity with devices in networks for which you do not control name assignment, you can dynamically assign device names that uniquely identify your devices by using the global Internet naming scheme (DNS).
Returns to privileged EXEC mode.

Switch(config)# end

Configuring a Message-of-the-Day Login Banner
You can create a single or multiline message banner that appears on the screen when someone logs in to the switch

SUMMARY STEPS

1. configure terminal 2. banner motd c message c

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1781

Configuring a Login Banner

System Management

3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

banner motd c message c
Example:
Switch(config)# banner motd # This is a secure site. Only authorized users are allowed. For access, contact technical support. #

Step 3

end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Specifies the message of the day. c--Enters the delimiting character of your choice, for example, a pound sign (#), and press the Return key. The delimiting character signifies the beginning and end of the banner text. Characters after the ending delimiter are discarded. message--Enters a banner message up to 255 characters. You cannot use the delimiting character in the message.
Returns to privileged EXEC mode.

Configuring a Login Banner
You can configure a login banner to be displayed on all connected terminals. This banner appears after the MOTD banner and before the login prompt.

SUMMARY STEPS

1. configure terminal 2. banner login c message c 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 banner login c message c

Specifies the login message.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1782

System Management

Managing the MAC Address Table

Command or Action Example:
Switch(config)# banner login $ Access for authorized users only. Please enter your username and password. $

Step 3

end Example:
Switch(config)# end

Purpose c-- Enters the delimiting character of your choice, for example, a pound sign (#), and press the Return key. The delimiting character signifies the beginning and end of the banner text. Characters after the ending delimiter are discarded.
message--Enters a login message up to 255 characters. You cannot use the delimiting character in the message.
Returns to privileged EXEC mode.

Managing the MAC Address Table
Changing the Address Aging Time

SUMMARY STEPS

1. configure terminal 2. mac address-table aging-time [0 | 10-1000000] [routed-mac | vlan vlan-id] 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

mac address-table aging-time [0 | 10-1000000] [routed-mac | vlan vlan-id] Example:
Switch(config)# mac address-table aging-time 500 vlan 2

Step 3

end Example:
Switch(config)# end

Sets the length of time that a dynamic entry remains in the MAC address table after the entry is used or updated.
The range is 10 to 1000000 seconds. The default is 300. You can also enter 0, which disables aging. Static address entries are never aged or removed from the table.
vlan-id--Valid IDs are 1 to 4094.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1783

Configuring MAC Address Change Notification Traps

System Management

Configuring MAC Address Change Notification Traps

SUMMARY STEPS

1. configure terminal 2. snmp-server host host-addr community-string notification-type { informs | traps } {version {1 | 2c |
3}} {vrf vrf instance name} 3. snmp-server enable traps mac-notification change 4. mac address-table notification change 5. mac address-table notification change [interval value] [history-size value] 6. interface interface-id 7. snmp trap mac-notification change {added | removed} 8. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

snmp-server host host-addr community-string

Specifies the recipient of the trap message.

notification-type { informs | traps } {version {1 | 2c | 3}} {vrf vrf instance name}

· host-addr--Specifies the name or address of the NMS.

Example:

· traps (the default)--Sends SNMP traps to the host.

Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification

· informs--Sends SNMP informs to the host.
· version--Specifies the SNMP version to support. Version 1, the default, is not available with informs.

· community-string--Specifies the string to send with the notification operation. Though you can set this string by using the snmp-server host command, we recommend that you define this string by using the snmp-server community command before using the snmp-server host command.

· notification-type--Uses the mac-notification keyword.

· vrf vrf instance name--Specifies the VPN routing/forwarding instance for this host.

snmp-server enable traps mac-notification change Example:

Enables the switch to send MAC address change notification traps to the NMS.

Switch(config)# snmp-server enable traps mac-notification change

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1784

System Management

Configuring MAC Address Move Notification Traps

Step 4

Command or Action mac address-table notification change Example:
Switch(config)# mac address-table notification change

Purpose Enables the MAC address change notification feature.

Step 5 Step 6

mac address-table notification change [interval value] [history-size value]
Example:
Switch(config)# mac address-table notification change interval 123 Switch(config)#mac address-table notification change history-size 100

Enters the trap interval time and the history table size.
· (Optional) interval value--Specifies the notification trap interval in seconds between each set of traps that are generated to the NMS. The range is 0 to 2147483647 seconds; the default is 1 second.
· (Optional) history-size value--Specifies the maximum number of entries in the MAC notification history table. The range is 0 to 500; the default is 1.

interface interface-id Example:
Switch(config)# interface gigabitethernet1/0/2

Enters interface configuration mode, and specifies the Layer 2 interface on which to enable the SNMP MAC address notification trap.

Step 7 Step 8

snmp trap mac-notification change {added | removed} Enables the MAC address change notification trap on the

Example:

interface.

· Enables the trap when a MAC address is added on

Switch(config-if)# snmp trap

this interface.

mac-notification change added

· Enables the trap when a MAC address is removed

from this interface.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Configuring MAC Address Move Notification Traps
When you configure MAC-move notification, an SNMP notification is generated and sent to the network management system whenever a MAC address moves from one port to another within the same VLAN.
Beginning in privileged EXEC mode, follow these steps to configure the switch to send MAC address-move notification traps to an NMS host:

SUMMARY STEPS

1. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1785

Configuring MAC Address Move Notification Traps

System Management

2. snmp-server host host-addr {traps | informs} {version {1 | 2c | 3}} community-string notification-type 3. snmp-server enable traps mac-notification move 4. mac address-table notification mac-move 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

snmp-server host host-addr {traps | informs} {version {1 | 2c | 3}} community-string notification-type
Example:

Specifies the recipient of the trap message. · host-addr--Specifies the name or address of the NMS. · traps (the default)--Sends SNMP traps to the host.

Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification

· informs--Sends SNMP informs to the host.
· version--Specifies the SNMP version to support. Version 1, the default, is not available with informs.

· community-string--Specifies the string to send with the notification operation. Though you can set this string by using the snmp-server host command, we recommend that you define this string by using the snmp-server community command before using the snmp-server host command.

· notification-type--Uses the mac-notification keyword.

snmp-server enable traps mac-notification move Example:

Enables the switch to send MAC address move notification traps to the NMS.

Switch(config)# snmp-server enable traps mac-notification move

Step 4

mac address-table notification mac-move Example:
Switch(config)# mac address-table notification mac-move

Enables the MAC address move notification feature.

Step 5

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1786

System Management

Configuring MAC Threshold Notification Traps

Command or Action
Switch(config)# end

Purpose

Configuring MAC Threshold Notification Traps
When you configure MAC threshold notification, an SNMP notification is generated and sent to the network management system when a MAC address table threshold limit is reached or exceeded.

SUMMARY STEPS

1. configure terminal 2. snmp-server host host-addr {traps | informs} {version {1 | 2c | 3}} community-string notification-type 3. snmp-server enable traps mac-notification threshold 4. mac address-table notification threshold 5. mac address-table notification threshold [limit percentage] | [interval time] 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

snmp-server host host-addr {traps | informs} {version {1 | 2c | 3}} community-string notification-type
Example:

Specifies the recipient of the trap message. · host-addr--Specifies the name or address of the NMS. · traps (the default)--Sends SNMP traps to the host.

Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification

· informs--Sends SNMP informs to the host.
· version--Specifies the SNMP version to support. Version 1, the default, is not available with informs.

· community-string--Specifies the string to send with the notification operation. You can set this string by using the snmp-server host command, but we recommend that you define this string by using the snmp-server community command before using the snmp-server host command.

· notification-type--Uses the mac-notification keyword.

snmp-server enable traps mac-notification threshold Enables MAC threshold notification traps to the NMS. Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1787

Adding and Removing Static Address Entries

System Management

Command or Action
Switch(config)# snmp-server enable traps mac-notification threshold

Step 4

mac address-table notification threshold Example:
Switch(config)# mac address-table notification threshold

Step 5

mac address-table notification threshold [limit percentage] | [interval time]
Example:
Switch(config)# mac address-table notification threshold interval 123 Switch(config)# mac address-table notification threshold limit 78

Step 6

end Example:
Switch(config)# end

Purpose
Enables the MAC address threshold notification feature.
Enters the threshold value for the MAC address threshold usage monitoring.
· (Optional) limit percentage--Specifies the percentage of the MAC address table use; valid values are from 1 to 100 percent. The default is 50 percent.
· (Optional) interval time--Specifies the time between notifications; valid values are greater than or equal to 120 seconds. The default is 120 seconds.
Returns to privileged EXEC mode.

Adding and Removing Static Address Entries

SUMMARY STEPS

1. configure terminal 2. mac address-table static mac-addr vlan vlan-id interface interface-id 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

mac address-table static mac-addr vlan vlan-id interface Adds a static address to the MAC address table.

interface-id

· mac-addr--Specifies the destination MAC unicast

Example:

address to add to the address table. Packets with this

destination address received in the specified VLAN

Switch(config)# mac address-table

are forwarded to the specified interface.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1788

System Management

Configuring Unicast MAC Address Filtering

Command or Action
static c2f3.220a.12f4 vlan 4 interface gigabitethernet 1/0/1

Step 3

end Example:
Switch(config)# end

Purpose
· vlan-id--Specifies the VLAN for which the packet with the specified MAC address is received. Valid VLAN IDs are 1 to 4094.
· interface-id--Specifies the interface to which the received packet is forwarded. Valid interfaces include physical ports or port channels. For static multicast addresses, you can enter multiple interface IDs. For static unicast addresses, you can enter only one interface at a time, but you can enter the command multiple times with the same MAC address and VLAN ID.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Unicast MAC Address Filtering

SUMMARY STEPS

1. configure terminal 2. mac address-table static mac-addr vlan vlan-id drop 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

mac address-table static mac-addr vlan vlan-id drop Example:
Switch(config)# mac address-table static c2f3.220a.12f4 vlan 4 drop

Enables unicast MAC address filtering and configure the switch to drop a packet with the specified source or destination unicast static address.
· mac-addr--Specifies a source or destination unicast MAC address (48-bit). Packets with this MAC address are dropped.
· vlan-id--Specifies the VLAN for which the packet with the specified MAC address is received. Valid VLAN IDs are 1 to 4094.

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1789

Monitoring and Maintaining Administration of the Switch

System Management

Command or Action
Switch(config)# end

Purpose

Monitoring and Maintaining Administration of the Switch

Command clear mac address-table dynamic

Purpose Removes all dynamic entries.

clear mac address-table dynamic address mac-address

Removes a specific MAC address.

clear mac address-table dynamic interface interface-id

Removes all addresses on the specified physical port or port channel.

clear mac address-table dynamic vlan vlan-id Removes all addresses on a specified VLAN.

show clock [detail]

Displays the time and date configuration.

show ip igmp snooping groups

Displays the Layer 2 multicast entries for all VLANs or the specified VLAN.

show mac address-table address mac-address

Displays MAC address table information for the specified MAC address.

show mac address-table aging-time

Displays the aging time in all VLANs or the specified VLAN.

show mac address-table count

Displays the number of addresses present in all VLANs or the specified VLAN.

show mac address-table dynamic

Displays only dynamic MAC address table entries.

show mac address-table interface interface-name Displays the MAC address table information for the specified interface.

show mac address-table move update

Displays the MAC address table move update information.

show mac address-table multicast

Displays a list of multicast MAC addresses.

show mac address-table notification {change | mac-move | threshold}

Displays the MAC notification parameters and history table.

show mac address-table secure

Displays the secure MAC addresses.

show mac address-table static

Displays only static MAC address table entries.

show mac address-table vlan vlan-id

Displays the MAC address table information for the specified VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1790

System Management

Configuration Examples for Switch Administration

Configuration Examples for Switch Administration
Example: Setting the System Clock
This example shows how to manually set the system clock:
Switch# clock set 13:32:00 23 July 2013
Examples: Configuring Summer Time
This example (for daylight savings time) shows how to specify that summer time starts on March 10 at 02:00 and ends on November 3 at 02:00:
Switch(config)# clock summer-time PDT recurring PST date 10 March 2013 2:00 3 November 2013 2:00
This example shows how to set summer time start and end dates:
Switch(config)#clock summer-time PST date 20 March 2013 2:00 20 November 2013 2:00
Example: Configuring a MOTD Banner
This example shows how to configure a MOTD banner by using the pound sign (#) symbol as the beginning and ending delimiter:
Switch(config)# banner motd # This is a secure site. Only authorized users are allowed. For access, contact technical support. # Switch(config)#
This example shows the banner that appears from the previous configuration:
Unix> telnet 192.0.2.15 Trying 192.0.2.15... Connected to 192.0.2.15. Escape character is '^]'. This is a secure site. Only authorized users are allowed. For access, contact technical support.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1791

Example: Configuring a Login Banner

System Management

User Access Verification Password:
Example: Configuring a Login Banner
This example shows how to configure a login banner by using the dollar sign ($) symbol as the beginning and ending delimiter:
Switch(config)# banner login $ Access for authorized users only. Please enter your username and password. $ Switch(config)#
Example: Configuring MAC Address Change Notification Traps
This example shows how to specify 172.20.10.10 as the NMS, enable MAC address notification traps to the NMS, enable the MAC address-change notification feature, set the interval time to 123 seconds, set the history-size to 100 entries, and enable traps whenever a MAC address is added on the specified port:
Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification Switch(config)# snmp-server enable traps mac-notification change Switch(config)# mac address-table notification change Switch(config)# mac address-table notification change interval 123 Switch(config)# mac address-table notification change history-size 100 Switch(config)# interface gigabitethernet1/2/1 Switch(config-if)# snmp trap mac-notification change added
Example: Configuring MAC Threshold Notification Traps
This example shows how to specify 172.20.10.10 as the NMS, enable the MAC address threshold notification feature, set the interval time to 123 seconds, and set the limit to 78 per cent:
Switch(config)# snmp-server host 172.20.10.10 traps private mac-notification Switch(config)# snmp-server enable traps mac-notification threshold Switch(config)# mac address-table notification threshold Switch(config)# mac address-table notification threshold interval 123 Switch(config)# mac address-table notification threshold limit 78
Example: Adding the Static Address to the MAC Address Table
This example shows how to add the static address c2f3.220a.12f4 to the MAC address table. When a packet is received in VLAN 4 with this MAC address as its destination address, the packet is forwarded to the specified port:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1792

System Management

Example: Configuring Unicast MAC Address Filtering

Switch(config)# mac address-table static c2f3.220a.12f4 vlan 4 interface gigabitethernet1/1/1
Example: Configuring Unicast MAC Address Filtering
This example shows how to enable unicast MAC address filtering and how to configure drop packets that have a source or destination address of c2f3.220a.12f4. When a packet is received in VLAN 4 with this MAC address as its source or destination, the packet is dropped:
Switch(config)# mac address-table static c2f3.220a.12f4 vlan 4 drop

Additional References for Switch Administration

Related Documents Related Topic System management commands Network management configuration
Layer 2 configuration VLAN configuration Platform-independent command references
Platform-independent configuration information

Document Title
System Management Command Reference (Catalyst 3650 Switches)
Network Management Configuration Guide (Catalyst 3650 Switches)
Layer 2/3 Configuration Guide (Catalyst 3650 Switches)
VLAN Configuration Guide (Catalyst 3650 Switches)
Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
IP Addressing Configuration Guide Library, Cisco IOS XE Release 3S (Catalyst 3650 Switches)

Standards and RFCs

Standard/RFC Title

None

--

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1793

Feature History and Information for Switch Administration

System Management

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Switch Administration

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1794

8 8 C H A P T E R
Performing Switch Setup Configuration
· Finding Feature Information, on page 1795 · Information About Performing Switch Setup Configuration, on page 1795 · How to Perform Switch Setup Configuration, on page 1807 · Monitoring Switch Setup Configuration, on page 1823 · Configuration Examples for Performing Switch Setup, on page 1827 · Additional References For Performing Switch Setup, on page 1828 · Feature History and Information For Performing Switch Setup Configuration, on page 1829
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Performing Switch Setup Configuration
Review the sections in this module before performing your initial switch configuration tasks that include IP address assignments and DHCP autoconfiguration.
Switch Boot Process
To start your switch, you need to follow the procedures in the hardware installation guide for installing and powering on the switch and setting up the initial switch configuration (IP address, subnet mask, default gateway, secret and Telnet passwords, and so forth). The normal boot process involves the operation of the boot loader software and includes these activities:
· Locates the bootable (base) package in the bundle or installed package set. · Performs low-level CPU initialization. It initializes the CPU registers, which control where physical
memory is mapped, its quantity, its speed, and so forth. · Performs power-on self-test (POST) for the CPU subsystem and tests the system DRAM.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1795

Software Installer Features

System Management

· Initializes the file systems on the system board. · Loads a default operating system software image into memory and boots up the switch.
The boot loader provides access to the file systems before the operating system is loaded. Normally, the boot loader is used only to load, decompress, and start the operating system. After the boot loader gives the operating system control of the CPU, the boot loader is not active until the next system reset or power-on. The boot loader also provides trap-door access into the system if the operating system has problems serious enough that it cannot be used. The trap-door mechanism provides enough access to the system so that if it is necessary, you can reinstall the operating system software image by using the emergency-install command and restart the operating system. Before you can assign switch information, make sure you have connected a PC or terminal to the console port or a PC to the Ethernet management port, and make sure you have configured the PC or terminal-emulation software baud rate and character format to match these of the switch console port:
· Baud rate default is 9600. · Data bits default is 8.
Note If the data bits option is set to 8, set the parity option to none.
· Stop bits default is 2 (minor). · Parity settings default is none.
Software Installer Features
The following software installer features are supported on your switch: · Software bundle installation on a standalone switch, a switch stack, or a subset of switches in a stack. The default is installation on all the switches if a switch stack is configured. · In a stack of switches, Cisco recommends all switches in install mode. · Software rollback to a previously installed package set. · Emergency installation in the event that no valid installed packages reside on the boot flash. · Auto-upgrade of a switch that joins the switch stack with incompatible software. · Installation using packages on one switch as the source for installing packages on another switch in the switch stack.
Note Software installation and rollback must be performed while running only in installed mode. You can use the software expand EXEC command to convert bundle boot mode to install mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1796

System Management

Software Boot Modes

Software Boot Modes
Your switch supports two modes to boot the software packages: · Installed mode · Bundle mode
Related Topics Examples: Displaying Software Bootup in Install Mode, on page 1823 Example: Emergency Installation, on page 1825
Installed Boot Mode
You can boot your switch in installed mode by booting the software package provisioning file that resides in flash:
switch: boot flash:packages.conf
The provisioning file contains a list of software packages to boot, mount, and run. The ISO file system in each installed package is mounted to the root file system directly from flash.
Note The packages and provisioning file used to boot in installed mode must reside in flash. Booting in installed mode from usbflash0: or tftp: is not supported.
Related Topics Examples: Displaying Software Bootup in Install Mode, on page 1823 Example: Emergency Installation, on page 1825
Bundle Boot Mode
You can boot your switch in bundle boot mode by booting the bundle (.bin) file:
switch: boot flash:cat3850-universalk9.SSA.03.08.83.EMD.150-8.83.EMD.bin
The provisioning file contained in a bundle is used to decide which packages to boot, mount, and run. Packages are extracted from the bundle and copied to RAM. The ISO file system in each package is mounted to the root file system. Unlike install boot mode, additional memory that is equivalent to the size of the bundle is used when booting in bundle mode. Unlike install boot mode, bundle boot mode is available from several locations:
· flash: · usbflash0: · tftp:
Note Auto install and smart install functionality is not supported in bundle boot mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1797

Boot Mode for a Switch Stack

System Management

Note The AP image pre-download feature is not supported in bundle boot mode. For more information about the pre-download feature see the Cisco WLC 5700 Series Preloading an Image to Access Points chapter.
Related Topics Examples: Displaying Software Bootup in Install Mode, on page 1823 Example: Emergency Installation, on page 1825
Boot Mode for a Switch Stack
All the switches in a stack must be running in installed mode or bundle boot mode. A mixed mode stack is not supported. If a new switch tries to join the stack in a different boot mode then the active switch, the new switch is given a V-mismatch state.
If a mixed mode switch stack is booted at the same time, then all the switches except for the active switch is given a V-mismatch state. If the boot mode does not support auto-upgrade, then the switch stack members must be re-booted in the same boot mode as the active switch.
If the stack is running in installed mode, the auto-upgrade feature can be used to automatically upgrade the new switch that is attempting to join the switch stack.
The auto-upgrade feature changes the boot mode of the new switch to installed mode. If the stack is running in bundle boot mode, the auto-upgrade feature is not available. You will be required to use the bundle mode to boot the new switch so that it can join the switch stack.
This is an example of the state of a switch that attempts to join the switch stack when the boot mode is not compatible with the active switch:

Switch# show switch

Switch/Stack Mac Address : 6400.f125.1100 - Local Mac Address

Mac persistency wait time: Indefinite

H/W Current

Switch# Role Mac Address Priority Version State

------------------------------------------------------------

1

Member 6400 f125.1a00 1

0

V-Mismatch

*2

Active 6400.f125.1100 1

V01

Ready

Switch

Switches Information Assignment
You can assign IP information through the switch setup program, through a DHCP server, or manually.
Use the switch setup program if you want to be prompted for specific IP information. With this program, you can also configure a hostname and an enable secret password.
It gives you the option of assigning a Telnet password (to provide security during remote management) and configuring your switch as a command or member switch of a cluster or as a standalone switch.
The switch stack is managed through a single IP address. The IP address is a system-level setting and is not specific to the stack master or to any other stack member. You can still manage the stack through the same

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1798

System Management

Default Switch Information

IP address even if you remove the stack master or any other stack member from the stack, provided there is IP connectivity.

Note Stack members retain their IP address when you remove them from a switch stack. To avoid a conflict by having two devices with the same IP address in your network, change the IP address of the switch that you removed from the switch stack.
Use a DHCP server for centralized control and automatic assignment of IP information after the server is configured.

Note If you are using DHCP, do not respond to any of the questions in the setup program until the switch receives the dynamically assigned IP address and reads the configuration file.
If you are an experienced user familiar with the switch configuration steps, manually configure the switch. Otherwise, use the setup program described in the Boot Process section.

Default Switch Information

Table 159: Default Switch Information

Feature

Default Setting

IP address and subnet mask No IP address or subnet mask are defined.

Default gateway

No default gateway is defined.

Enable secret password No password is defined.

Hostname

The factory-assigned default hostname is Switch.

Telnet password

No password is defined.

DHCP-Based Autoconfiguration Overview
DHCP provides configuration information to Internet hosts and internetworking devices. This protocol consists of two components: one for delivering configuration parameters from a DHCP server to a device and an operation for allocating network addresses to devices. DHCP is built on a client-server model, in which designated DHCP servers allocate network addresses and deliver configuration parameters to dynamically configured devices. The switch can act as both a DHCP client and a DHCP server.
During DHCP-based autoconfiguration, your switch (DHCP client) is automatically configured at startup with IP address information and a configuration file.
With DHCP-based autoconfiguration, no DHCP client-side configuration is needed on your switch. However, you need to configure the DHCP server for various lease options associated with IP addresses.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1799

DHCP Client Request Process

System Management

If you want to use DHCP client autoconfiguration, you need to configure a Trivial File Transfer Protocol (TFTP) server to fetch the configuration file. The DHCP client then applies the new configuration file to its running configuration.
Note If the new configuration is downloaded to a switch that already has a configuration, the downloaded configuration is appended to the configuration file stored on the switch. (Any existing configuration is not overwritten by the downloaded one.)
Note We recommend a redundant connection between a switch stack and the DHCP, DNS, and TFTP servers. This is to help ensure that these servers remain accessible in case one of the connected stack members is removed from the switch stack.
The DHCP server for your switch can be on the same LAN or on a different LAN than the switch. If the DHCP server is running on a different LAN, you should configure a DHCP relay device between your switch and the DHCP server. A relay device forwards broadcast traffic between two directly connected LANs. A router does not forward broadcast packets, but it forwards packets based on the destination IP address in the received packet. DHCP-based autoconfiguration replaces the BOOTP client functionality on your switch.
DHCP Client Request Process
When you boot up your switch, the DHCP client is invoked and requests configuration information from a DHCP server when the configuration file is not present on the switch. If the configuration file is present and the configuration includes the ip address dhcp interface configuration command on specific routed interfaces, the DHCP client is invoked and requests the IP address information for those interfaces. This is the sequence of messages that are exchanged between the DHCP client and the DHCP server.
Figure 98: DHCP Client and Server Message Exchange
The client, Switch A, broadcasts a DHCPDISCOVER message to locate a DHCP server. The DHCP server offers configuration parameters (such as an IP address, subnet mask, gateway IP address, DNS IP address, a lease for the IP address, and so forth) to the client in a DHCPOFFER unicast message. In a DHCPREQUEST broadcast message, the client returns a formal request for the offered configuration information to the DHCP server. The formal request is broadcast so that all other DHCP servers that received the DHCPDISCOVER broadcast message from the client can reclaim the IP addresses that they offered to the client. The DHCP server confirms that the IP address has been allocated to the client by returning a DHCPACK unicast message to the client. With this message, the client and server are bound, and the client uses configuration information received from the server. The amount of information the switch receives depends on how you configure the DHCP server. If the configuration parameters sent to the client in the DHCPOFFER unicast message are invalid (a configuration error exists), the client returns a DHCPDECLINE broadcast message to the DHCP server. The DHCP server sends the client a DHCPNAK denial broadcast message, which means that the offered configuration parameters have not been assigned, that an error has occurred during the negotiation of the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1800

System Management

DHCP-based Autoconfiguration and Image Update

parameters, or that the client has been slow in responding to the DHCPOFFER message (the DHCP server assigned the parameters to another client).
A DHCP client might receive offers from multiple DHCP or BOOTP servers and can accept any of the offers; however, the client usually accepts the first offer it receives. The offer from the DHCP server is not a guarantee that the IP address is allocated to the client; however, the server usually reserves the address until the client has had a chance to formally request the address. If the switch accepts replies from a BOOTP server and configures itself, the switch broadcasts, instead of unicasts, TFTP requests to obtain the switch configuration file.
The DHCP hostname option allows a group of switches to obtain hostnames and a standard configuration from the central management DHCP server. A client (switch) includes in its DCHPDISCOVER message an option 12 field used to request a hostname and other configuration parameters from the DHCP server. The configuration files on all clients are identical except for their DHCP-obtained hostnames.
If a client has a default hostname (the hostname name global configuration command is not configured or the no hostname global configuration command is entered to remove the hostname), the DHCP hostname option is not included in the packet when you enter the ip address dhcp interface configuration command. In this case, if the client receives the DCHP hostname option from the DHCP interaction while acquiring an IP address for an interface, the client accepts the DHCP hostname option and sets the flag to show that the system now has a hostname configured.
DHCP-based Autoconfiguration and Image Update
You can use the DHCP image upgrade features to configure a DHCP server to download both a new image and a new configuration file to one or more switches in a network. Simultaneous image and configuration upgrade for all switches in the network helps ensure that each new switch added to a network are synchronous with the network.
There are two types of DHCP image upgrades: DHCP autoconfiguration and DHCP auto-image update.
Restrictions for DHCP-based Autoconfiguration
· The DHCP-based autoconfiguration with a saved configuration process stops if there is not at least one Layer 3 interface in an up state without an assigned IP address in the network.
· Unless you configure a timeout, the DHCP-based autoconfiguration with a saved configuration feature tries indefinitely to download an IP address.
· The auto-install process stops if a configuration file cannot be downloaded or if the configuration file is corrupted.
· The configuration file that is downloaded from TFTP is merged with the existing configuration in the running configuration but is not saved in the NVRAM unless you enter the write memory or copy running-configuration startup-configuration privileged EXEC command. If the downloaded configuration is saved to the startup configuration, the feature is not triggered during subsequent system restarts.
DHCP Autoconfiguration
DHCP autoconfiguration downloads a configuration file to one or more switches in your network from a DHCP server. The downloaded configuration file becomes the running configuration of the switch. It does not over write the bootup configuration saved in the flash, until you reload the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1801

DHCP Auto-Image Update

System Management

DHCP Auto-Image Update
You can use DHCP auto-image upgrade with DHCP autoconfiguration to download both a configuration and a new image to one or more switches in your network. The switch (or switches) downloading the new configuration and the new image can be blank (or only have a default factory configuration loaded). To enable a DHCP auto-image update on the switch, the TFTP server where the image and configuration files are located must be configured with the correct option 67 (the configuration filename), option 66 (the DHCP server hostname) option 150 (the TFTP server address), and option 125 (description of the Cisco IOS image file) settings. After you install the switch in your network, the auto-image update feature starts. The downloaded configuration file is saved in the running configuration of the switch, and the new image is downloaded and installed on the switch. When you reboot the switch, the configuration is stored in the saved configuration on the switch.
DHCP Server Configuration Guidelines
Follow these guidelines if you are configuring a device as a DHCP server: · You should configure the DHCP server with reserved leases that are bound to each switch by the switch hardware address.
· If you want the switch to receive IP address information, you must configure the DHCP server with these lease options: · IP address of the client (required)
· Subnet mask of the client (required)
· DNS server IP address (optional)
· Router IP address (default gateway address to be used by the switch) (required)
· If you want the switch to receive the configuration file from a TFTP server, you must configure the DHCP server with these lease options: · TFTP server name (required)
· Boot filename (the name of the configuration file that the client needs) (recommended)
· Hostname (optional)
· Depending on the settings of the DHCP server, the switch can receive IP address information, the configuration file, or both.
· If you do not configure the DHCP server with the lease options described previously, it replies to client requests with only those parameters that are configured. If the IP address and the subnet mask are not in the reply, the switch is not configured. If the router IP address or the TFTP server name are not found, the switch might send broadcast, instead of unicast, TFTP requests. Unavailability of other lease options does not affect autoconfiguration.
· The switch can act as a DHCP server. By default, the Cisco IOS DHCP server and relay agent features are enabled on your switch but are not configured.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1802

System Management

Purpose of the TFTP Server

Purpose of the TFTP Server
Based on the DHCP server configuration, the switch attempts to download one or more configuration files from the TFTP server. If you configured the DHCP server to respond to the switch with all the options required for IP connectivity to the TFTP server, and if you configured the DHCP server with a TFTP server name, address, and configuration filename, the switch attempts to download the specified configuration file from the specified TFTP server.
If you did not specify the configuration filename, the TFTP server, or if the configuration file could not be downloaded, the switch attempts to download a configuration file by using various combinations of filenames and TFTP server addresses. The files include the specified configuration filename (if any) and these files: network-config, cisconet.cfg, hostname.config, or hostname.cfg, where hostname is the switch's current hostname. The TFTP server addresses used include the specified TFTP server address (if any) and the broadcast address (255.255.255.255).
For the switch to successfully download a configuration file, the TFTP server must contain one or more configuration files in its base directory. The files can include these files:
· The configuration file named in the DHCP reply (the actual switch configuration file).
· The network-confg or the cisconet.cfg file (known as the default configuration files).
· The router-confg or the ciscortr.cfg file (These files contain commands common to all switches. Normally, if the DHCP and TFTP servers are properly configured, these files are not accessed.)
If you specify the TFTP server name in the DHCP server-lease database, you must also configure the TFTP server name-to-IP-address mapping in the DNS-server database.
If the TFTP server to be used is on a different LAN from the switch, or if it is to be accessed by the switch through the broadcast address (which occurs if the DHCP server response does not contain all the required information described previously), a relay must be configured to forward the TFTP packets to the TFTP server. The preferred solution is to configure the DHCP server with all the required information.
Purpose of the DNS Server
The DHCP server uses the DNS server to resolve the TFTP server name to an IP address. You must configure the TFTP server name-to-IP address map on the DNS server. The TFTP server contains the configuration files for the switch.
You can configure the IP addresses of the DNS servers in the lease database of the DHCP server from where the DHCP replies will retrieve them. You can enter up to two DNS server IP addresses in the lease database.
The DNS server can be on the same LAN or on a different LAN from the switch. If it is on a different LAN, the switch must be able to access it through a router.
How to Obtain Configuration Files
Depending on the availability of the IP address and the configuration filename in the DHCP reserved lease, the switch obtains its configuration information in these ways:
· The IP address and the configuration filename is reserved for the switch and provided in the DHCP reply (one-file read method).
The switch receives its IP address, subnet mask, TFTP server address, and the configuration filename from the DHCP server. The switch sends a unicast message to the TFTP server to retrieve the named configuration file from the base directory of the server and upon receipt, it completes its boot up process.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1803

How to Control Environment Variables

System Management

· The IP address and the configuration filename is reserved for the switch, but the TFTP server address is not provided in the DHCP reply (one-file read method).
The switch receives its IP address, subnet mask, and the configuration filename from the DHCP server. The switch sends a broadcast message to a TFTP server to retrieve the named configuration file from the base directory of the server, and upon receipt, it completes its boot-up process.
· Only the IP address is reserved for the switch and provided in the DHCP reply. The configuration filename is not provided (two-file read method).
The switch receives its IP address, subnet mask, and the TFTP server address from the DHCP server. The switch sends a unicast message to the TFTP server to retrieve the network-confg or cisconet.cfg default configuration file. (If the network-confg file cannot be read, the switch reads the cisconet.cfg file.)
The default configuration file contains the hostnames-to-IP-address mapping for the switch. The switch fills its host table with the information in the file and obtains its hostname. If the hostname is not found in the file, the switch uses the hostname in the DHCP reply. If the hostname is not specified in the DHCP reply, the switch uses the default as its hostname.
After obtaining its hostname from the default configuration file or the DHCP reply, the switch reads the configuration file that has the same name as its hostname (hostname-confg or hostname.cfg, depending on whether network-confg or cisconet.cfg was read earlier) from the TFTP server. If the cisconet.cfg file is read, the filename of the host is truncated to eight characters.
If the switch cannot read the network-confg, cisconet.cfg, or the hostname file, it reads the router-confg file. If the switch cannot read the router-confg file, it reads the ciscortr.cfg file.
Note The switch broadcasts TFTP server requests if the TFTP server is not obtained from the DHCP replies, if all attempts to read the configuration file through unicast transmissions fail, or if the TFTP server name cannot be resolved to an IP address.
How to Control Environment Variables
With a normally operating switch, you enter the boot loader mode only through the console connection configured for 9600 bps. Unplug the switch power cord, and press the Mode button while reconnecting the power cord. You can release the Mode button after all the amber system LEDs turn on and remain solid. The boot loader switch prompt then appears.
The switch boot loader software provides support for nonvolatile environment variables, which can be used to control how the boot loader, or any other software running on the system, operates. Boot loader environment variables are similar to environment variables that can be set on UNIX or DOS systems.
Environment variables that have values are stored in flash memory outside of the flash file system.
Each line in these files contains an environment variable name and an equal sign followed by the value of the variable. A variable has no value if it is not present; it has a value if it is listed even if the value is a null string. A variable that is set to a null string (for example, " ") is a variable with a value. Many environment variables are predefined and have default values.
You can change the settings of the environment variables by accessing the boot loader or by using Cisco IOS commands. Under normal circumstances, it is not necessary to alter the setting of the environment variables.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1804

System Management

Common Environment Variables

Common Environment Variables
This table describes the function of the most common environment variables.
Table 160: Common Environment Variables

Variable BOOT

Boot Loader Command

Cisco IOS Global Configuration Command

set BOOT filesystem :/ file-url boot system {filesystem : /file-url ... |

...

switch {number | all}}

A semicolon-separated list of executable files to try to load and execute when automatically booting.

Specifies the Cisco IOS image to load during the next boot cycle and the stack members on which the image is loaded. This command changes the setting of the BOOT environment variable.

The package provisioning file, also referred to as the packages.conf file, is used by the system to determine which software packages to activate during boot up.
· When booting in installed mode, the package provisioning file specified in the boot command is used to determine which packages to activate. For example boot flash:packages.conf.

· When booting in bundle mode, the package provisioning file contained in the booted bundle is used to activate the packages included in the bundle. For example, boot flash:image.bin.

MANUAL_BOOT

set MANUAL_BOOT yes boot manual

Decides whether the switch Enables manually booting the switch

automatically or manually during the next boot cycle and changes

boots.

the setting of the MANUAL_BOOT

Valid values are 1, yes, 0, and environment variable.

no. If it is set to no or 0, the The next time you reboot the system,

boot loader attempts to

the switch is in boot loader mode. To

automatically boot up the boot up the system, use the boot flash:

system. If it is set to anything filesystem :/ file-url boot loader

else, you must manually boot command, and specify the name of the

up the switch from the boot bootable image.

loader mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1805

Environment Variables for TFTP

System Management

Variable CONFIG_FILE
SWITCH_NUMBER SWITCH_PRIORITY BAUD ENABLE_BREAK

Boot Loader Command

Cisco IOS Global Configuration Command

set CONFIG_FILE flash:/ boot config-file flash:/ file-url

file-url

Specifies the filename that Cisco IOS

Changes the filename that uses to read and write a nonvolatile

Cisco IOS uses to read and copy of the system configuration. This

write a nonvolatile copy of the command changes the CONFIG_FILE

system configuration.

environment variable.

set SWITCH_NUMBER stack-member-number

switch current-stack-member-number renumber new-stack-member-number

Changes the member number Changes the member number of a stack

of a stack member.

member.

set SWITCH_PRIORITY switch stack-member-number priority

stack-member-number

priority-number

Changes the priority value of Changes the priority value of a stack

a stack member.

member.

set BAUD baud-rate

line console 0 speed speed-value Configures the baud rate.

set ENABLE_BREAK yes/no boot enable-break switch yes/no
Enables a break to the auto-boot cycle. You have 5 seconds to enter the break command.

Environment Variables for TFTP

When the switch is connected to a PC through the Ethernet management port, you can download or upload a configuration file to the boot loader by using TFTP. Make sure the environment variables in this table are configured.
Table 161: Environment Variables for TFTP

Variable MAC_ADDR

Description Specifies the MAC address of the switch. Note We recommend that you do not modify this variable.

However, if you modify this variable after the boot loader is up or the value is different from the saved value, enter this command before using TFTP.

IP_ADDR

Specifies the IP address and the subnet mask for the associated IP subnet of the switch.

DEFAULT_ROUTER Specifies the IP address and subnet mask of the default gateway.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1806

System Management

Scheduled Reload of the Software Image

Scheduled Reload of the Software Image
You can schedule a reload of the software image to occur on the switch at a later time (for example, late at night or during the weekend when the switch is used less), or you can synchronize a reload network-wide (for example, to perform a software upgrade on all switches in the network).

Note A scheduled reload must take place within approximately 24 days.
You have these reload options:
· Reload of the software to take affect in the specified minutes or hours and minutes. The reload must take place within approximately 24 hours. You can specify the reason for the reload in a string up to 255 characters in length.
· Reload of the software to take place at the specified time (using a 24-hour clock). If you specify the month and day, the reload is scheduled to take place at the specified time and date. If you do not specify the month and day, the reload takes place at the specified time on the current day (if the specified time is later than the current time) or on the next day (if the specified time is earlier than the current time). Specifying 00:00 schedules the reload for midnight.
The reload command halts the system. If the system is not set to manually boot up, it reboots itself.
If your switch is configured for manual booting, do not reload it from a virtual terminal. This restriction prevents the switch from entering the boot loader mode and then taking it from the remote user's control.
If you modify your configuration file, the switch prompts you to save the configuration before reloading. During the save operation, the system requests whether you want to proceed with the save if the CONFIG_FILE environment variable points to a startup configuration file that no longer exists. If you proceed in this situation, the system enters setup mode upon reload.
To cancel a previously scheduled reload, use the reload cancel privileged EXEC command.

How to Perform Switch Setup Configuration
Using DHCP to download a new image and a new configuration to a switch requires that you configure at least two switches. One switch acts as a DHCP and TFTP server and the second switch (client) is configured to download either a new configuration file or a new configuration file and a new image file.

Configuring DHCP Autoconfiguration (Only Configuration File)
This task describes how to configure DHCP autoconfiguration of the TFTP and DHCP settings on an existing switch in the network so that it can support the autoconfiguration of a new switch.

SUMMARY STEPS

1. configure terminal 2. ip dhcp pool poolname 3. boot filename 4. network network-number mask prefix-length

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1807

Configuring DHCP Autoconfiguration (Only Configuration File)

System Management

5. default-router address 6. option 150 address 7. exit 8. tftp-server flash:filename.text 9. interface interface-id 10. no switchport 11. ip address address mask 12. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ip dhcp pool poolname Example:
Switch(config)# ip dhcp pool pool

Creates a name for the DHCP server address pool, and enters DHCP pool configuration mode.

Step 3

boot filename Example:
Switch(dhcp-config)# boot config-boot.text

Specifies the name of the configuration file that is used as a boot image.

Step 4 Step 5

network network-number mask prefix-length Example:
Switch(dhcp-config)# network 10.10.10.0 255.255.255.0

Specifies the subnet network number and mask of the DHCP address pool.
Note The prefix length specifies the number of bits that comprise the address prefix. The prefix is an alternative way of specifying the network mask of the client. The prefix length must be preceded by a forward slash (/).

default-router address Example:

Specifies the IP address of the default router for a DHCP client.

Switch(dhcp-config)# default-router 10.10.10.1

Step 6

option 150 address Example:

Specifies the IP address of the TFTP server.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1808

System Management

Configuring DHCP Auto-Image Update (Configuration File and Image)

Step 7 Step 8

Command or Action
Switch(dhcp-config)# option 150 10.10.10.1

Purpose

exit Example:
Switch(dhcp-config)# exit

Returns to global configuration mode.

tftp-server flash:filename.text Example:

Specifies the configuration file on the TFTP server.

Switch(config)# tftp-server flash:config-boot.text

Step 9 Step 10 Step 11 Step 12

interface interface-id Example:

Specifies the address of the client that will receive the configuration file.

Switch(config)# interface gigabitethernet1/0/4

no switchport Example:
Switch(config-if)# no switchport

Puts the interface into Layer 3 mode.

ip address address mask Example:
Switch(config-if)# ip address 10.10.10.1 255.255.255.0

Specifies the IP address and mask for the interface.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Related Topics Example: Configuring a Switch as a DHCP Server, on page 1827
Configuring DHCP Auto-Image Update (Configuration File and Image)
This task describes DHCP autoconfiguration to configure TFTP and DHCP settings on an existing switch to support the installation of a new switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1809

Configuring DHCP Auto-Image Update (Configuration File and Image)

System Management

Before you begin
You must first create a text file (for example, autoinstall_dhcp) that will be uploaded to the switch. In the text file, put the name of the image that you want to download.

SUMMARY STEPS

1. configure terminal 2. ip dhcp pool poolname 3. boot filename 4. network network-number mask prefix-length 5. default-router address 6. option 150 address 7. option 125 hex 8. copy tftp flash filename.txt 9. copy tftp flash imagename.bin 10. exit 11. tftp-server flash: config.text 12. tftp-server flash: imagename.bin 13. tftp-server flash: filename.txt 14. interface interface-id 15. no switchport 16. ip address address mask 17. end 18. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

ip dhcp pool poolname Example:
Switch(config)# ip dhcp pool pool1

Creates a name for the DHCP server address pool and enter DHCP pool configuration mode.

Step 3

boot filename Example:
Switch(dhcp-config)# boot config-boot.text

Specifies the name of the file that is used as a boot image.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1810

System Management

Configuring DHCP Auto-Image Update (Configuration File and Image)

Step 4
Step 5 Step 6 Step 7

Command or Action network network-number mask prefix-length Example:
Switch(dhcp-config)# network 10.10.10.0 255.255.255.0

Purpose
Specifies the subnet network number and mask of the DHCP address pool.
Note The prefix length specifies the number of bits that comprise the address prefix. The prefix is an alternative way of specifying the network mask of the client. The prefix length must be preceded by a forward slash (/).

default-router address Example:

Specifies the IP address of the default router for a DHCP client.

Switch(dhcp-config)# default-router 10.10.10.1

option 150 address Example:
Switch(dhcp-config)# option 150 10.10.10.1

Specifies the IP address of the TFTP server.

option 125 hex Example:

Specifies the path to the text file that describes the path to the image file.

Switch(dhcp-config)# option 125 hex 0000.0009.0a05.08661.7574.6f69.6e73.7461.6c6c.5f64.686370

Step 8 Step 9 Step 10 Step 11

copy tftp flash filename.txt Example:
Switch(config)# copy tftp flash image.bin
copy tftp flash imagename.bin Example:
Switch(config)# copy tftp flash image.bin
exit Example:
Switch(dhcp-config)# exit
tftp-server flash: config.text Example:

Uploads the text file to the switch.
Uploads the tar file for the new image to the switch.
Returns to global configuration mode.
Specifies the Cisco IOS configuration file on the TFTP server.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1811

Configuring DHCP Auto-Image Update (Configuration File and Image)

System Management

Command or Action

Purpose

Switch(config)# tftp-server flash:config-boot.text

Step 12 Step 13

tftp-server flash: imagename.bin Example:
Switch(config)# tftp-server flash:image.bin

Specifies the image name on the TFTP server.

tftp-server flash: filename.txt Example:

Specifies the text file that contains the name of the image file to download

Switch(config)# tftp-server flash:boot-config.text

Step 14 Step 15 Step 16 Step 17 Step 18

interface interface-id Example:

Specifies the address of the client that will receive the configuration file.

Switch(config)# interface gigabitEthernet1/0/4

no switchport Example:
Switch(config-if)# no switchport

Puts the interface into Layer 3 mode.

ip address address mask Example:
Switch(config-if)# ip address 10.10.10.1 255.255.255.0

Specifies the IP address and mask for the interface.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

copy running-config startup-config Example:
Switch(config-if)# end

(Optional) Saves your entries in the configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1812

System Management

Configuring the Client to Download Files from DHCP Server

Related Topics Example: Configuring DHCP Auto-Image Update, on page 1827
Configuring the Client to Download Files from DHCP Server

Note You should only configure and enable the Layer 3 interface. Do not assign an IP address or DHCP-based autoconfiguration with a saved configuration.

SUMMARY STEPS

1. configure terminal 2. boot host dhcp 3. boot host retry timeout timeout-value 4. banner config-save ^C warning-message ^C 5. end 6. show boot

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

boot host dhcp Example:
Switch(conf)# boot host dhcp

Enables autoconfiguration with a saved configuration.

Step 3 Step 4

boot host retry timeout timeout-value Example:
Switch(conf)# boot host retry timeout 300

(Optional) Sets the amount of time the system tries to download a configuration file.
Note If you do not set a timeout, the system will try indefinitely to obtain an IP address from the DHCP server.

banner config-save ^C warning-message ^C Example:

(Optional) Creates warning messages to be displayed when you try to save the configuration file to NVRAM.

Switch(conf)# banner config-save ^C Caution Saving Configuration File to NVRAM May Cause You to No longer Automatically
Download Configuration Files at Reboot^C

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1813

Manually Assigning IP Information to Multiple SVIs

System Management

Step 5

Command or Action end Example:
Switch(config-if)# end

Step 6

show boot Example:
Switch# show boot

Purpose Returns to privileged EXEC mode.
Verifies the configuration.

Related Topics Example: Configuring a Switch to Download Configurations from a DHCP Server, on page 1827
Manually Assigning IP Information to Multiple SVIs
This task describes how to manually assign IP information to multiple switched virtual interfaces (SVIs):

Note If the switch is running the IP services feature set, you can also manually assign IP information to a port if you first put the port into Layer 3 mode by using the no switchport interface configuration command.

SUMMARY STEPS

1. configure terminal 2. interface vlan vlan-id 3. ip address ip-address subnet-mask 4. exit 5. ip default-gateway ip-address 6. end 7. show interfaces vlan vlan-id 8. show ip redirects

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1814

System Management

Manually Assigning IP Information to Multiple SVIs

Step 2

Command or Action interface vlan vlan-id Example:
Switch(config)# interface vlan 99

Purpose
Enters interface configuration mode, and enters the VLAN to which the IP information is assigned. The range is 1 to 4094.

Step 3

ip address ip-address subnet-mask Example:
Switch(config-vlan)# ip address 10.10.10.2 255.255.255.0

Enters the IP address and subnet mask.

Step 4

exit Example:
Switch(config-vlan)# exit

Returns to global configuration mode.

Step 5 Step 6

ip default-gateway ip-address Example:
Switch(config)# ip default-gateway 10.10.10.1
end Example:
Switch(config)# end

Enters the IP address of the next-hop router interface that is directly connected to the switch where a default gateway is being configured. The default gateway receives IP packets with unresolved destination IP addresses from the switch.
Once the default gateway is configured, the switch has connectivity to the remote networks with which a host needs to communicate.
Note When your switch is configured to route with IP, it does not need to have a default gateway set.
Note The switch capwap relays on default-gateway configuration to support routed access point join the switch.
Returns to privileged EXEC mode.

Step 7

show interfaces vlan vlan-id Example:
Switch# show interfaces vlan 99

Verifies the configured IP address.

Step 8

show ip redirects Example:

Verifies the configured default gateway.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1815

Modifying the Switch Startup Configuration

System Management

Command or Action
Switch# show ip redirects

Purpose

Modifying the Switch Startup Configuration

Specifying the Filename to Read and Write the System Configuration
By default, the Cisco IOS software uses the config.text file to read and write a nonvolatile copy of the system configuration. However, you can specify a different filename, which will be loaded during the next boot cycle.

Before you begin Use a standalone switch for this task.

SUMMARY STEPS

1. configure terminal 2. boot flash:/file-url 3. end 4. show boot 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

boot flash:/file-url Example:
Switch(config)# boot flash:config.text

Step 3

end Example:
Switch(config)# end

Specifies the configuration file to load during the next boot cycle. file-url--The path (directory) and the configuration filename. Filenames and directory names are case-sensitive.
Returns to privileged EXEC mode.

Step 4

show boot Example:

Verifies your entries.
The boot global configuration command changes the setting of the CONFIG_FILE environment variable.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1816

System Management

Manually Booting the Switch

Command or Action
Switch# show boot

Purpose

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Manually Booting the Switch
By default, the switch automatically boots up; however, you can configure it to manually boot up.

Before you begin Use a standalone switch for this task.

SUMMARY STEPS

1. configure terminal 2. boot manual 3. end 4. show boot 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

boot manual Example:
Switch(config)# boot manual

Enables the switch to manually boot up during the next boot cycle.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

show boot Example:

Verifies your entries.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1817

Booting the Switch in Installed Mode

System Management

Command or Action
Switch# show boot

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose The boot manual global command changes the setting of the MANUAL_BOOT environment variable.
The next time you reboot the system, the switch is in boot loader mode, shown by the switch: prompt. To boot up the system, use the boot boot loader command in installed boot mode or bundle boot mode.
· switch: boot flash:packages.conf
· switch: boot
flash:cat3850-universalk9.SSA.03.08.83.EMD.150-8.83.EMD.bin
Filenames and directory names are case-sensitive.
(Optional) Saves your entries in the configuration file.

Booting the Switch in Installed Mode

SUMMARY STEPS

1. cp source_file_path destination_file_path 2. software expand file source_file_path 3. reload 4. boot flash:packages.conf 5. show version

DETAILED STEPS

Step 1

Command or Action

Purpose

cp source_file_path destination_file_path Example:

(Optional) Copies the bin file (image.bin) from the FTP or TFTP server to flash or USB flash.

Switch# copy tftp://10.0.0.6/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash:

Step 2

software expand file source_file_path

Expands the bin file stored in flash, FTP, TFTP, HTTP, or

Example:

HTTPS server on the booted switch.

Expanding the bin file from the TFTP server:

Note Ensure that the packages.conf file is available in the expanded list.

Switch# software expand file

tftp://10.0.0.2/cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin

to flash:

Preparing expand operation ...

[1]: Downloading file

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1818

System Management

Booting the Switch in Installed Mode

Command or Action

Purpose

tftp://10.0.0.2/cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin to active switch 1
[1]: Finished downloading file tftp://10.0.0.2/cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37. EXP.bin to active switch 1 [1]: Copying software from active switch 1 to switch 2 [1]: Finished copying software to switch 2 [1 2]: Expanding bundle cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin [1 2]: Copying package files [1 2]: Package files copied [1 2]: Finished expanding bundle cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin

Step 3
Step 4 Step 5

18 -rw- 74387812 Dec 7 2012 05:55:43

+00:00 cat3k_caa-base.SSA.03.09.37.EXP.pkg

19 -rw-

2738868 Dec 7 2012 05:55:44

+00:00 cat3k_caa-drivers.SSA.03.09.37.EXP.pkg

20 -rw- 32465772 Dec 7 2012 05:55:44

+00:00 cat3k_caa-infra.SSA.03.09.37.EXP.pkg

21 -rw- 30389036 Dec 7 2012 05:55:44

+00:00

cat3k_caa-iosd-universalk9.SSA.150-9.37.EXP.pkg

22 -rw- 18342624 Dec 7 2012 05:55:44

+00:00 cat3k_caa-platform.SSA.03.09.37.EXP.pkg

23 -rw- 63374028 Dec 7 2012 05:55:44

+00:00 cat3k_caa-wcm.SSA.10.0.10.14.pkg

17 -rw-

1239 Dec 7 2012 05:56:29

+00:00 packages.conf

reload Example:
Switch: reload

Reloads the switch.
Note You can boot the switch manually or automatically using the packages.conf file. If you are booting manually, you can proceed to Step 4. Otherwise, the switch boots up automatically.

boot flash:packages.conf Example:
switch: boot flash:packages.conf

show version Example:
switch# show version

Switch Ports Model

SW Image

Mode

------ ----- -----

----------

----

16

WS-C3850-6DS-S

ct3850-ipservicesk9 INSTALL

SW Version ---------03.09.26.EXP

Boots the switch with the packages.conf file. Verifies that the switch is in the INSTALL mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1819

Booting the Switch in Bundle Mode

System Management

Booting the Switch in Bundle Mode
There are several methods by which you can boot the switch--either by copying the bin file from the TFTP server and then boot the switch, or by booting the switch straight from flash or USB flash using the commands boot flash:<image.bin> or boot usbflash0:<image.bin> .
The following procedure explains how to boot the switch from th TFTP server in the bundle mode.

SUMMARY STEPS

1. cp source_file_path destination_file_path 2. switch:BOOT=<source path of .bin file> 3. boot 4. show version

DETAILED STEPS

Step 1

Command or Action

Purpose

cp source_file_path destination_file_path Example:

(Optional) Copies the bin file (image.bin) from the FTP or TFTP server to flash or USB flash.

Switch# copy tftp://10.0.0.6/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash:

Step 2

switch:BOOT=<source path of .bin file>

Sets the boot parameters.

Example:

Switch: switch:BOOT=tftp://10.0.0.2/cat3k_caa-universalk9.SSA.03.09.37.EXP.150-9.37.EXP.bin

Step 3

boot Example:
switch: boot

Boots the switch.

Step 4

show version

Example:

switch# show version

Switch Ports Model

SW Image

Mode

------ ----- -----

----------

----

16

WS-C3850-6DS-S

ct3850-ipservicesk9 BUNDLE

SW Version ---------03.09.40.EXP

Verifies that the switch is in the BUNDLE mode.

Booting a Specific Software Image On a Switch Stack

SUMMARY STEPS

1. configure terminal 2. boot system switch {number | all} flash:image_file| tftp: image_file | usbflash0: image_file 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1820

System Management

Configuring a Scheduled Software Image Reload

4. show boot system 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2 Step 3

boot system switch {number | all} flash:image_file| tftp: (Optional) For switches in a stack, specifies the switch

image_file | usbflash0: image_file

members on which the system image is loaded during the

Example:

next boot cycle:

· Use number to specify a stack member. (Specify only

Switch(config)# boot system switch 2

one stack member.)

flash:cat3850-universalk9.SSA.03.08.83.EMD.150-8.83.EMD.bin
· Use all to specify all stack members.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Step 4

show boot system Example:
Switch# show boot system

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

Verifies your entries.
The boot system global command changes the setting of the BOOT environment variable.
During the next boot cycle, the switch attempts to automatically boot up the system using information in the BOOT environment variable.
(Optional) Saves your entries in the configuration file.

Configuring a Scheduled Software Image Reload
This task describes how to configure your switch to reload the software image at a later time.

SUMMARY STEPS

1. configure terminal 2. copy running-config startup-config 3. reload in [hh:]mm [text]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1821

Configuring a Scheduled Software Image Reload

System Management

4. reload at hh: mm [month day | day month] [text] 5. reload cancel 6. show reload

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2 Step 3

copy running-config startup-config Example:
copy running-config startup-config
reload in [hh:]mm [text] Example:
Switch(config)# reload in 12
System configuration has been modified. Save? [yes/no]: y

Saves your switch configuration information to the startup configuration before you use the reload command.
Schedules a reload of the software to take affect in the specified minutes or hours and minutes. The reload must take place within approximately 24 days. You can specify the reason for the reload in a string up to 255 characters in length.

Step 4

reload at hh: mm [month day | day month] [text] Example:
Switch(config)# reload at 14:00

Step 5 Step 6

reload cancel Example:
Switch(config)# reload cancel
show reload Example:
show reload

Specifies the time in hours and minutes for the reload to occur. Note Use the at keyword only if the switch system
clock has been set (through Network Time Protocol (NTP), the hardware calendar, or manually). The time is relative to the configured time zone on the switch. To schedule reloads across several switches to occur simultaneously, the time on each switch must be synchronized with NTP.
Cancels a previously scheduled reload.
Displays information about a previously scheduled reload or identifies if a reload has been scheduled on the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1822

System Management

Monitoring Switch Setup Configuration

Monitoring Switch Setup Configuration
Example: Verifying the Switch Running Configuration
Switch# show running-config Building configuration...
Current configuration: 1363 bytes ! version 12.4 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Stack1 ! enable secret 5 $1$ej9.$DMUvAUnZOAmvmgqBEzIxE0 ! . <output truncated> . interface gigabitethernet6/0/2 mvr type source
<output truncated>
...! interface VLAN1
ip address 172.20.137.50 255.255.255.0 no ip directed-broadcast ! ip default-gateway 172.20.137.1 ! ! snmp-server community private RW snmp-server community public RO snmp-server community private@es0 RW snmp-server community public@es0 RO snmp-server chassis-id 0x12 ! end
Examples: Displaying Software Bootup in Install Mode
This example displays software bootup in install mode:
switch: boot flash:packages.conf
Getting rest of image Reading full image into memory....done Reading full base package into memory...: done = 74596432 Nova Bundle Image -------------------------------------Kernel Address : 0x6042f354 Kernel Size : 0x318412/3245074 Initramfs Address : 0x60747768
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1823

Examples: Displaying Software Bootup in Install Mode

System Management

Initramfs Size : 0xdc08e8/14420200 Compression Format: .mzip
Bootable image at @ ram:0x6042f354 Bootable image segment 0 address range [0x81100000, 0x81b80000] is in range [0x80180000, 0x90000000]. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@boot_system:
377 Loading Linux kernel with entry point 0x811060f0 ... Bootloader: Done loading app on core_mask: 0xf
### Launching Linux Kernel (flags = 0x5)
All packages are Digitally Signed Starting System Services Nov 7 09:57:05 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-DISC_START: Switch 2 is starting stack discovery ####################################################################################################################### Nov 7 09:59:07 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-DISC_DONE: Switch 2 has finished stack discovery Nov 7 09:59:07 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-SWITCH_ADDED: Switch 2 has
been added to the stack Nov 7 09:59:14 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-ACTIVE_ELECTED: Switch 2 has been elected ACTIVE
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706
Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M),
Version 03.09.12.EMD EARLY DEPLOYMENT ENGINEERING NOVA_WEEKLY BUILD, synced to DSGS_PI2_POSTPC_FLO_DSBU7_NG3K_1105 Copyright (c) 1986-2012 by Cisco Systems, Inc. Compiled Sun 04-Nov-12 22:53 by gereddy License level to iosd is ipservices
This example display software bootup in bundle mode:
switch: boot flash:cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin
Reading full image into memory..................................................................done Nova Bundle Image -------------------------------------Kernel Address : 0x6042ff38 Kernel Size : 0x318412/3245074 Initramfs Address : 0x6074834c Initramfs Size : 0xdc08e8/14420200 Compression Format: .mzip

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1824

System Management

Example: Emergency Installation

Bootable image at @ ram:0x6042ff38 Bootable image segment 0 address range [0x81100000, 0x81b80000] is in range [0x80180000, 0x90000000]. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ File "flash:cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin" uncompressed and installed, entry point: 0x811060f0 Loading Linux kernel with entry point 0x811060f0 ... Bootloader: Done loading app on core_mask: 0xf
### Launching Linux Kernel (flags = 0x5)
All packages are Digitally Signed Starting System Services Nov 7 09:45:49 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-DISC_START: Switch 2 is starting stack discovery ####################################################################################################################### Nov 7 09:47:50 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-DISC_DONE: Switch 2 has finished stack discovery Nov 7 09:47:50 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-SWITCH_ADDED: Switch 2 has
been added to the stack Nov 7 09:47:58 %IOSXE-1-PLATFORM: process stack-mgr: %STACKMGR-1-ACTIVE_ELECTED: Switch 2 has been elected ACTIVE
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706
Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.09.12.EMD
EARLY DEPLOYMENT ENGINEERING NOVA_WEEKLY BUILD, synced to DSGS_PI2_POSTPC_FLO_DSBU7_NG3K_1105 Copyright (c) 1986-2012 by Cisco Systems, Inc. Compiled Sun 04-Nov-12 22:53 by gereddy License level to iosd is ipservices
Related Topics Software Boot Modes, on page 1797 Installed Boot Mode, on page 1797 Bundle Boot Mode, on page 1797
Example: Emergency Installation
This sample output is an example when the emergency-install boot command is initiated:
switch: emergency-install tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin
The bootflash will be erased during install operation, continue (y/n)?y

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1825

Example: Emergency Installation

System Management

Starting emergency recovery (tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin)... Reading full image into memory......................done Nova Bundle Image -------------------------------------Kernel Address : 0x6042e5cc Kernel Size : 0x318261/3244641 Initramfs Address : 0x60746830 Initramfs Size : 0xdb0fb9/14356409 Compression Format: .mzip
Bootable image at @ ram:0x6042e5cc Bootable image segment 0 address range [0x81100000, 0x81b80000] is in range [0x80180000, 0x90000000]. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ File "sda9:c3850-recovery.bin" uncompressed and installed, entry point: 0x811060f0 Loading Linux kernel with entry point 0x811060f0 ... Bootloader: Done loading app on core_mask: 0xf
### Launching Linux Kernel (flags = 0x5)
Initiating Emergency Installation of bundle tftp://172.19.211.47/cstohs/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin
Downloading bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin... Validating bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin... Installing bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin... Verifying bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.09.12.EMD.150-9.12.EMD.bin... Package cat3k_caa-base.SSA.03.09.12.EMD.pkg is Digitally Signed Package cat3k_caa-drivers.SSA.03.09.12.EMD.pkg is Digitally Signed Package cat3k_caa-infra.SSA.03.09.12.EMD.pkg is Digitally Signed Package cat3k_caa-iosd-universalk9.SSA.150-9.12.EMD.pkg is Digitally Signed Package cat3k_caa-platform.SSA.03.09.12.EMD.pkg is Digitally Signed Package cat3k_caa-wcm.SSA.03.09.12.EMD.pkg is Digitally Signed Preparing flash... Syncing device... Emergency Install successful... Rebooting Restarting system.
Booting...(use DDR clock 667 MHz)Initializing and Testing RAM +++@@@@####...++@@++@@++@@++@
Related Topics Software Boot Modes, on page 1797 Installed Boot Mode, on page 1797 Bundle Boot Mode, on page 1797

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1826

System Management

Configuration Examples for Performing Switch Setup

Configuration Examples for Performing Switch Setup

Example: Configuring a Switch as a DHCP Server

Switch# configure terminal Switch(config)# ip dhcp pool pool1 Switch(dhcp-config)# network 10.10.10.0 255.255.255.0 Switch(dhcp-config)# boot config-boot.text Switch(dhcp-config)# default-router 10.10.10.1 Switch(dhcp-config)# option 150 10.10.10.1 Switch(dhcp-config)# exit Switch(config)# tftp-server flash:config-boot.text Switch(config)# interface gigabitethernet1/0/4 Switch(config-if)# no switchport Switch(config-if)# ip address 10.10.10.1 255.255.255.0 Switch(config-if)# end
Related Topics Configuring DHCP Autoconfiguration (Only Configuration File), on page 1807

Example: Configuring DHCP Auto-Image Update

Related Topics Configuring DHCP Auto-Image Update (Configuration File and Image), on page 1809

Example: Configuring a Switch to Download Configurations from a DHCP Server
This example uses a Layer 3 SVI interface on VLAN 99 to enable DHCP-based autoconfiguration with a saved configuration:

Switch# configure terminal

Switch(config)# boot host dhcp

Switch(config)# boot host retry timeout 300

Switch(config)# banner config-save ^C Caution - Saving Configuration File to NVRAM May Cause

You to No longer Automatically Download Configuration Files at Reboot^C

Switch(config)# vlan 99

Switch(config-vlan)# interface vlan 99

Switch(config-if)# no shutdown

Switch(config-if)# end

Switch# show boot

BOOT path-list:

Config file:

flash:/config.text

Private Config file: flash:/private-config.text

Enable Break:

no

Manual Boot:

no

HELPER path-list:

NVRAM/Config file

buffer size: 32768

Timeout for Config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1827

Examples: Scheduling Software Image Reload

System Management

Download: Config Download
via DHCP: Switch#

300 seconds enabled (next boot: enabled)

Related Topics Configuring the Client to Download Files from DHCP Server, on page 1813

Examples: Scheduling Software Image Reload
This example shows how to reload the software on the switch on the current day at 7:30 p.m:

Switch# reload at 19:30 Reload scheduled for 19:30:00 UTC Wed Jun 5 2013 (in 2 hours and 25 minutes) Proceed with reload? [confirm]
This example shows how to reload the software on the switch at a future time:

Switch# reload at 02:00 jun 20 Reload scheduled for 02:00:00 UTC Thu Jun 20 2013 (in 344 hours and 53 minutes) Proceed with reload? [confirm]

Additional References For Performing Switch Setup

Related Documents Related Topic Switch setup commands Boot loader commands Pre-download feature
IOS XE DHCP configuration
Hardware installation
Platform-independent command references

Document Title
System Management Command Reference (Catalyst 3650 Switches)
System Management Configuration Guide (Cisco WLC 5700 Series)
IP Addressing Configuration Guide Library, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
Catalyst 3650 Switch Hardware Installation Guide
Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1828

System Management

Feature History and Information For Performing Switch Setup Configuration

Related Topic Platform-independent configuration information

Document Title
Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
IP Addressing Configuration Guide Library, Cisco IOS XE Release 3S (Catalyst 3650 Switches)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For Performing Switch Setup Configuration

Command History

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1829

Feature History and Information For Performing Switch Setup Configuration

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1830

8 9 C H A P T E R
Configuring Right-To-Use Licenses
· Finding Feature Information, on page 1831 · Restrictions for Configuring RTU Licenses, on page 1831 · Information About Configuring RTU Licenses, on page 1832 · How to Configure RTU Licenses, on page 1835 · Monitoring and Maintaining RTU Licenses, on page 1840 · Configuration Examples for RTU Licensing, on page 1840 · Additional References for RTU Licensing, on page 1844 · Feature History and Information for RTU Licensing, on page 1845
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Configuring RTU Licenses
The following are the restrictions for configuring and using RTU licenses. · AP count licenses can be ordered and pre-activated on your switch. · Imaged based licenses can be upgraded. AP count licenses can be deactivated and moved between switches and controllers. · To activate a permanent license, you must reboot your switch after configuring the new image level. The AP-count license does not require a reboot to activate. · An expired image based evaluation license can not be reactivated after reboot. · Stack members of a switch stack must run the same license level. · Licenses on mixed switch stacks are not supported.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1831

Information About Configuring RTU Licenses

System Management

· Your switch is pre-installed with the image that you ordered. If an image was not pre-ordered, then the switch is booted with a LAN base image by default.
· Adder AP-count licenses are installed in the factory.
Related Topics Activating an Imaged Based License, on page 1835 Examples: Activating RTU Image Based Licenses, on page 1840
Information About Configuring RTU Licenses
Right-To-Use Licensing
Right-to-use (RTU) licensing allows you to order and activate a specific license type and level, and then to manage license usage on your switch. The types of licenses available to order are:
· Permanent licenses--Purchased with a specific feature set with no expiration date. · Evaluation licenses--Pre-installed on the switch and is valid for only a 90 day in-use period.
To activate a permanent or evaluation license, you are required to accept the End-User License Agreement (EULA). For the evaluation license, you are notified to purchase a permanent license or deactivate the license before the 90 day period expires. A permanent license can be moved from one device to another. To activate a license, you must reboot your switch. An evaluation license is a manufacturing image on your switch and is not transferable to another switch. This type of license cannot be reactivated after reboot. Related Topics
Activating an Imaged Based License, on page 1835 Examples: Activating RTU Image Based Licenses, on page 1840
Right-To-Use Image Based Licenses
Right-to-use imaged licenses support a set of features based on a specific image-based license: · LAN Base--Layer 2 features. · IP Base--Layer 2 and Layer 3 features. · IP Services--Layer 2, Layer 3, and IPv6 features. (Applicable only to switches and not controllers.)
The default image based license is LAN Base.
Right-To-Use License States
After you configure a specific license type and level, you can manage your licenses by monitoring the license state.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1832

System Management

License Activation for Switch Stacks

Table 162: RTU License States

License State Active, In Use Active, Not In Use
Not Activated

Description EULA was accepted and the license is in use after device reboot.
EULA was accepted and the switch is ready to use when the license is enabled.
EULA was not accepted.

Guidelines to follow when monitoring your image based license state: · A purchased permanent license is set to Active, In Use state only after a switch reboot.
· If more than one license was purchased, a reboot will activate the license with the highest feature set. For instance, the IP Services license is activated and not the LAN Base license.
· Remaining licenses purchased after switch reboot, stay in Active, Not In Use state.

Note For the AP count license, to change the state to Active, In Use, you must first make sure that the evaluation AP count license is deactivated.
License Activation for Switch Stacks
Right-to-use licensing is supported on switch stacks. A switch is a set of up to nine stacking-capable switches connected through their StackWise-160 ports. You can connect only one switch type in a stack. One switch in the stack is identified as the active switch and the remaining switches are standby switches. The active switch is the switch that is activated with an RTU license and from its active console, the license level for the standby switches in the stack can be activated at the same time. A new switch is allowed to join the switch stack if its license level matches. If there is a mismatch, then the active switch can reconfigure the license level and reboot it to allow it to join the stack.
Mobility Controller Mode
AP-count licenses are used only when the switch is in Mobility Controller mode. The MC is the gatekeeper for tracking the AP-count licenses and allows an access point to join or not. Management of AP-count licenses is performed by the switch in mobility controller mode configurable through the CLI. Related Topics
Changing Mobility Mode, on page 1838
Right-To-Use AP-Count Licensing
Right-to-use licensing (RTU) allows you to order and activate a specific license type, and then to manage license usage on your switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1833

Right-to-Use AP-Count Evaluation Licenses

System Management

You can order your switch with support for a specific number of adder access point count licenses, but the total number of licenses ordered should not exceed 25. You can also order your adder access point count licenses after receiving the switch.
For example, if you have ordered 25 new adder licenses, you can add only those ordered adder licenses to the switch. The licenses can be added in increments of 1, but the total number of licenses added for the switch should not exceed 25 .
You can configure your switch to manage the access point count licenses and view the number of access points currently in use from the CLI.
The following are two different types of access point licenses:
1. Permanent licenses for the access points
· Adder access point count license--You can purchase the adder license to increase the switch capacity at a later time. You can transfer the adder access point count license from one switch to another.
2. Evaluation licenses for the access points
· You can activate these licenses to evaluate more access points before purchasing the licenses.
· The maximum number of access points that can be evaluated is 25 .
· The evaluation period for using the access point licenses is 90 days.
· You can activate and deactivate the evaluation licenses from the CLI.
Related Topics Activating an AP-Count License, on page 1836 Obtaining an Upgrade or Capacity Adder License, on page 1837 Rehosting a License, on page 1838
Right-to-Use AP-Count Evaluation Licenses
If you are considering upgrading to a license with a higher access point count, you can try an evaluation license before upgrading to a permanent version of the license. For example, if you are using a permanent license with a 10 access-point count and want to try an evaluation license with a 15-access-point count, you can try out the evaluation license for 90 days.
When an evaluation license is activated, the permanent AP-count licenses are ignored. The maximum supported licenses of 25 access points are available for 90 days.
To prevent disruptions in operation, the switch does not change licenses when an evaluation license expires. A warning expiry message is displayed daily starting five days prior to the expiry date. After 90 days, the evaluation license expires with a warning message. You must disable the evaluation license and then purchase the permanent license.
When the switch reboots after the evaluation license expiry, the license defaults to a permanent license. Related Topics
Activating an AP-Count License, on page 1836 Obtaining an Upgrade or Capacity Adder License, on page 1837 Rehosting a License, on page 1838

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1834

System Management

Right-To-Use Adder AP-Count Rehosting Licenses

Right-To-Use Adder AP-Count Rehosting Licenses
Revoking a license from one device and installing it on another is called rehosting. You might want to rehost a license to change the purpose of a device.
To rehost a license, you must deactivate the adder ap-count license from one device and activate the same license on another device.
Evaluation licenses cannot be rehosted.

How to Configure RTU Licenses

Activating an Imaged Based License

SUMMARY STEPS

1. license right-to-use activate{ipbase |ipservices | lanbase} {all | evaluation all } [slot slot-number] [ acceptEULA]
2. reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ] 3. show license right-to-use usage [ slot slot-number ]

DETAILED STEPS

Step 1

Command or Action

Purpose

license right-to-use activate{ipbase |ipservices | lanbase} {all | evaluation all } [slot slot-number] [ acceptEULA]

Activates a type of image based license. Activation can happen on all switches and also include the EULA acceptance.

Example:

Note

Switch# license right-to-use activate ipservices all acceptEULA

If you do not accept EULA, the modified configuration will not take effect after reload. The default license (or a license that was not deactivated) becomes active after reload.

Step 2

reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ]
Example:
Switch# reload slot 1 Proceed with reload? [confirm] y

Reloads a specific stack member to complete the activation process for the RTU adder AP-count license.
Note The reminder to accept a EULA is displayed after reload if it was not accepted earlier.

Step 3

show license right-to-use usage [ slot slot-number ] Example:

Displays detailed usage information.

Switch# show license right-to-use usage

Slot# License Name

Type

usage-duration(y:m:d) In-Use EULA

-----------------------------------------------------------------------

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1835

Activating an AP-Count License

System Management

Command or Action

1

ipservices

yes yes

1

ipbase

no no

1

ipbase

no no

1

lanbase

no yes

1

apcount

no no

1

apcount

no no

1

apcount

no no

permanent 0 :10 :0

permanent 0 :0 :0

evaluation 0 :0 :0

permanent 0 :0 :7

evaluation 0 :0 :0

base

0 :0 :0

adder

0 :0 :0

Switch#

Purpose

Related Topics Restrictions for Configuring RTU Licenses, on page 1831 Right-To-Use Licensing, on page 1832 Monitoring and Maintaining RTU Licenses, on page 1840 Examples: Activating RTU Image Based Licenses, on page 1840

Activating an AP-Count License

SUMMARY STEPS

1. license right-to-use activate{apcount ap-number slot slot-num} | evaluation} [ acceptEULA] 2. show license right-to-use usage [ slot slot-number ]

DETAILED STEPS

Step 1

Command or Action

Purpose

license right-to-use activate{apcount ap-number slot Activates one or more adder AP-count licenses and

slot-num} | evaluation} [ acceptEULA]

immediately accepts the EULA.

Example:
Switch# license right to use activate apcount 5 slot 1 acceptEULA

Step 2

show license right-to-use usage [ slot slot-number ] Example:

Displays detailed usage information.

Switch# show license right-to-use usage

Slot# License Name

Type

usage-duration(y:m:d) In-Use EULA

-----------------------------------------------------------------------

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1836

System Management

Obtaining an Upgrade or Capacity Adder License

Command or Action

1

ipservices

yes yes

1

ipservices

no

no

1

ipbase

no

no

1

ipbase

no

no

1

lanbase

no

no

1

apcount

no

no

1

apcount

no

yes

1

apcount

yes yes

permanent 0 :3 :29

evaluation 0 :0 :0

permanent 0 :0 :0

evaluation 0 :0 :0

permanent 0 :0 :0

evaluation 0 :3 :11

base

0 :0 :0

adder

0 :0 :17

Switch#

Purpose

Related Topics Monitoring and Maintaining RTU Licenses, on page 1840 Right-To-Use AP-Count Licensing, on page 1833 Right-to-Use AP-Count Evaluation Licenses, on page 1834

Obtaining an Upgrade or Capacity Adder License
You can use the capacity adder licenses to increase the number of access points supported by the switch.

SUMMARY STEPS

1. license right-to-use {activate | deactivate} apcount {ap-number | evaluation } slot slot-num [ acceptEULA]

DETAILED STEPS

Step 1

Command or Action

Purpose

license right-to-use {activate | deactivate} apcount Activates one or more adder AP-count licenses and {ap-number | evaluation } slot slot-num [ acceptEULA] immediately accepts the EULA.

Example:
Switch# license right to use activate apcount 5 slot 2 acceptEULA

Related Topics Right-to-Use AP-Count Evaluation Licenses, on page 1834 Right-To-Use AP-Count Licensing, on page 1833

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1837

Rehosting a License

System Management

Rehosting a License
To rehost a license, you have to deactivate the license from one switch and then activate the same license on another switch.

SUMMARY STEPS

1. license right-to-use deactivate apcount ap-number slot slot-num [ acceptEULA] 2. license right-to-use activate apcount ap-number slot slot-num [ acceptEULA]

DETAILED STEPS

Step 1

Command or Action

Purpose

license right-to-use deactivate apcount ap-number slot Deactivates the license on one switch. slot-num [ acceptEULA]

Example:
Switch# license right to use deactivate apcount 1 slot 1 acceptEULA

Step 2

license right-to-use activate apcount ap-number slot slot-num [ acceptEULA]
Example:
Switch# license right to use activate apcount 2 slot 2 acceptEULA

Activates the license on another switch.

Related Topics Right-To-Use AP-Count Licensing, on page 1833 Right-to-Use AP-Count Evaluation Licenses, on page 1834

Changing Mobility Mode

SUMMARY STEPS

1. wireless mobility controller 2. write memory 3. reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ] 4. no wireless mobility controller 5. write memory 6. reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ]

DETAILED STEPS

Step 1

Command or Action wireless mobility controller Example:

Purpose
Changes a switch in Mobility Agent mode to Mobility Controller mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1838

System Management

Changing Mobility Mode

Command or Action
Switch(config)# wireless mobility controller % Mobility role changed to Mobility Controller. Please save config and reboot the whole stack.

Purpose

Step 2

write memory
Example:
Switch# write memory
Building configuration... Compressed configuration from 13870 bytes to 5390
bytes[OK] Switch#

Step 3

reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ]
Example:
Switch# reload slot 3 Proceed with reload? [confirm] y

Step 4

no wireless mobility controller
Example:
Switch(config)# no wireless mobility controller % Mobility role changed to Mobility Agent. Please save config and reboot the whole stack. Switch(config)#

Changes a switch in Mobility Controller mode to Mobility Agent mode.

Step 5

write memory
Example:
Switch# write memory
Building configuration... Compressed configuration from 13870 bytes to 5390
bytes[OK] Switch#

Step 6

reload [ LINE | at | cancel | in | slot stack-member-number | standby-cpu ]
Example:
Switch# reload slot 3 Proceed with reload? [confirm] y

Related Topics Mobility Controller Mode, on page 1833

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1839

Monitoring and Maintaining RTU Licenses

System Management

Monitoring and Maintaining RTU Licenses

Command show license right-to-use default

Purpose Displays the default license information.

show license right-to-use detail

Displays detailed information of all the licenses in the switch stack.

show license right-to-use eula {adder | evaluation Displays the end user license agreement. | permanent}

show license right-to-use mismatch

Displays the license information that does not match.

show license right-to-use slot slot-number

Displays the license information for a specific slot in a switch stack.

show license right-to-use summary

Displays a summary of the license information on the entire switch stack.

show license right-to-use usage [ slot slot-number Displays detailed information about usage for all

]

licenses in the switch stack.

show switch

Displays detailed information of every member in a switch stack including the state of the license.

Related Topics Activating an Imaged Based License, on page 1835 Examples: Activating RTU Image Based Licenses, on page 1840 Activating an AP-Count License, on page 1836

Configuration Examples for RTU Licensing

Examples: Activating RTU Image Based Licenses
This example shows how to activate an IP Services image license and accept the EULA for a specific slot:
Switch# license right-to-use activate ipservices slot 1 acceptEULA % switch-1:stack-mgr:Reboot the switch to invoke the highest activated License level
This example shows how to activate a license for evaluation:
Switch# license right-to-use activate ipservices evaluation acceptEULA % switch-1:stack-mgr:Reboot the switch to invoke the highest activated License level
Related Topics Activating an Imaged Based License, on page 1835

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1840

System Management

Examples: Displaying RTU Licensing Information

Restrictions for Configuring RTU Licenses, on page 1831 Right-To-Use Licensing, on page 1832 Monitoring and Maintaining RTU Licenses, on page 1840

Examples: Displaying RTU Licensing Information

This example shows the consolidated RTU licensing information from the active switch on a switch stack. All of the members in the stack have the same license level. When the evaluation AP-count license is activated, the adder AP-count licenses are ignored. The maximum number of AP-count licenses are available when evaluation is enabled.

Switch# show license right-to-use summary

License Name Type

Count Period left

-------------------------------------------------------

ipservices

permanent

10

Lifetime

apcount

evaluation

15

90

-------------------------------------------------------

License Level In Use: ipservices License Level on Reboot: ipbase Evaluation AP-Count: Enabled Total AP Count Licenses: 25 AP Count Licenses In-use: 10 AP Count Licenses Remaining: 15

This example shows a summary of permanent and adder licenses. The evaluation AP-count license is disabled displaying the total number of activated adder AP-count licenses in the switch stack. AP-count licenses in-use mean that they are connected.
Switch# show license right-to-use summary

License Name Type

Count

Period left

-------------------------------------------------------------

ipservices

permanent

N/A

Lifetime

apcount

base

0

apcount

adder

25

Lifetime

-------------------------------------------------------------

License Level In Use: ipservices License Level on Reboot: ipservices eval Evaluation AP-Count: Disabled Total AP Count Licenses: 25 AP Count Licenses In-use: 10 AP Count Licenses Remaining: 15

This example shows the RTU default licenses. Default licenses are pre-installed and cannot be removed or transferred. If no license is activated the switch uses the default license, after a reboot.
Switch# show license right-to-use default

Slot# License Name Type

Count

----------------------------------------------------

1

ipservices

permanent

N/A

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1841

Example: Displaying RTU License Details

System Management

1

apcount

base

0

1

apcount

adder

10

Slot# License Name Type

Count

----------------------------------------------------

2

ipservices

permanent

N/A

2

apcount

base

0

2

apcount

adder

10

Slot# License Name Type

Count

----------------------------------------------------

3

ipservices

permanent

N/A

3

apcount

base

0

3

apcount

adder

10

Example: Displaying RTU License Details

This example shows all the detailed information for the RTU licenses on slot 1:

Switch# show license right-to-use detail slot 1

Index 1: Index 2: Index 3: Index 4: Index 5: Index 6: Index 7:

License Name: ipservices Period left: Lifetime License Type: permanent License State: Active, In use License Count: Non-Counted License Location: Slot 1
License Name: ipservices Period left: 90 License Type: evaluation License State: Not Activated License Count: Non-Counted License Location: Slot 1
License Name: ipbase Period left: Lifetime License Type: permanent License State: Active, Not In use License Count: Non-Counted License Location: Slot 1
License Name: ipbase Period left: 90 License Type: evaluation License State: Not Activated License Count: Non-Counted License Location: Slot 1 License Location: Standby Switch 1
License Name: lanbase Period left: Lifetime License Type: permanent License State: Not Activated License Count: Non-Counted License Location: Slot 1
License Name: apcount Period left: 90 License Type: evaluation License State: Active, In use License Count: 50 License Location: Slot 1
License Name: apcount

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1842

System Management

Example: Displaying RTU License Mismatch

Index 8:

Period left: Lifetime License Type: base License State: Active, Not In use License Count: 0 License Location: Slot 1 License Name: apcount Period left: Lifetime License Type: adder License State: Active, Not In use License Count: 10 License Location: Slot 1

Example: Displaying RTU License Mismatch

This example shows the license information of the switches in a stack and a mismatch state of a member switch. The member must match the active.

Switch# show switch

Switch/Stack Mac Address : 6400.f125.0c80

H/W Current

Switch# Role

Mac Address

Priority Version State

-------------------------------------------------------------------------------

1

Standby

6400.f125.1b00

1

0

Ready

*2

Active

6400.f125.0c80

1

V01

Ready

3

Member

6400.f125.1780

1

0

Lic-Mismatch

Note To resolve the license mismatch, first check the RTU license summary:
Switch# show switch right-to-use summary
Then change the license level of the mismatched switched so that it is the same license level of the active switch. This example shows that the IP Base license was activated for the member switch to match the active switch.
Switch# license right-to-use activate ipbase slot 1 acceptEULA

Example: Displaying RTU Licensing Usage

This example shows the detailed licensing usage on your switch stack. The IP Services license in Slot 1 is permanent and usage is one day. An AP-count license in Slot 2 is ready for evaluation. EULA was accepted and state shows in use, but after reboot the evaluation license will be deactivated.

Switch# show license right-to-use usage

Slot# License Name

Type

usage-duration(y:m:d) In-Use EULA

---------------------------------------------------------------------------------------------

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1843

Additional References for RTU Licensing

System Management

1

ipservices

permanent

0 :0 :1

1

ipservices

evaluation

0 :0 :0

1

ipbase

permanent

0 :0 :0

1

ipbase

evaluation

0 :0 :0

1

lanbase

permanent

0 :0 :0

1

apcount

evaluation

0 :0 :0

1

apcount

base

0 :0 :0

1

apcount

adder

0 :0 :0

yes

yes

no

no

no

yes

no

no

no

no

yes

yes

no

yes

no

yes

Slot# License Name

Type

usage-duration(y:m:d) In-Use EULA

----------------------------------------------------------------------------------------------

2

ipservices

permanent

0 :0 :1

2

ipservices

evaluation

0 :0 :0

2

ipbase

permanent

0 :0 :0

2

ipbase

evaluation

0 :0 :0

2

lanbase

permanent

0 :0 :0

2

apcount

evaluation

0 :0 :0

2

apcount

base

0 :0 :0

2

apcount

adder

0 :0 :0

yes

no

no

yes

no

yes

no

no

no

no

yes

yes

no

yes

no

no

Slot# License Name

Type

usage-duration(y:m:d) In-Use EULA

-----------------------------------------------------------------------------------------------

3

ipservices

permanent

0 :0 :1

3

ipservices

evaluation

0 :0 :0

3

ipbase

permanent

0 :0 :0

3

ipbase

evaluation

0 :0 :0

3

lanbase

permanent

0 :0 :0

3

apcount

evaluation

0 :0 :0

3

apcount

base

0 :0 :0

3

apcount

adder

0 :0 :0

yes

yes

no

no

no

no

no

no

no

no

yes

yes

no

yes

no

no

Additional References for RTU Licensing
Related Documents Related Topic RTU commands
RTU AP image preload feature

Standards and RFCs

Standard/RFC Title

None

--

Document Title
System Management Command Reference (Catalyst 3650 Switches)
System Management Configuration Guide (Cisco WLC 5700 Series)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1844

System Management

Feature History and Information for RTU Licensing

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for RTU Licensing

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1845

Feature History and Information for RTU Licensing

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1846

9 0 C H A P T E R
Configuring Administrator Usernames and Passwords
· Finding Feature Information, on page 1847 · Information About Configuring Administrator Usernames and Passwords, on page 1847 · Configuring Administrator Usernames and Passwords, on page 1848 · Examples: Administrator Usernames and Passwords Configuration, on page 1850 · Additional References for Administrator Usernames and Passwords, on page 1850 · Feature History and Information For Performing Administrator Usernames and Passwords Configuration,
on page 1851
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring Administrator Usernames and Passwords
You can configure administrator usernames and passwords to prevent unauthorized users from reconfiguring the switch and viewing configuration information. This section provides instructions for initial configuration and for password recovery. You can also set administrator usernames and passwords to manage and configure one or more access points that are associated with the switch. Strong Passwords You can set strong administrator passwords such as encrypted passwords with ASCII keys for the administrator user for managing access points. Use the following guidelines while creating strong passwords:
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1847

Configuring Administrator Usernames and Passwords

System Management

· There should be at least three of the following categories--lowercase letters, uppercase letters, digits, and special characters.
· The new password should not be the same as that of the associated username and the username should not be reversed.
· The characters in the password should not be repeated more than three times consecutively.
· The password should not be cisco, ocsic, admin, nimda, or any variant obtained by changing the capitalization of letters therein, or by substituting "1" "|" or "!" for i, and/or substituting "0" for "o", and/or substituting "$" for "s".
· The maximum number of characters accepted for the username and password is 32.
Encrypted Passwords
You can set three types of keys for the password:
· Randomly generated key--This key is generated randomly and it is the most secure option. To export the configuration file from one system to another, the key should also be exported.
· Static key--The simplest option is to use a fixed (static) encryption key. By using a fixed key, no key management is required, but if the key is somehow discovered, the data can be decrypted by anyone with the knowledge of that key. This is not a secure option and it is called obfuscation in the CLI.
· User defined key--You can define the key by yourself. To export the configuration file from one system to another, both systems should have the same key configured.

Configuring Administrator Usernames and Passwords

SUMMARY STEPS

1. configure terminal 2. wireless security strong-password 3. username admin-username password {0 unencrypted_password | 7 hidden_password | unencrypted_text} 4. username admin-username secret {0 unencrypted_secret_text | 4 SHA256 encrypted_secret_text | 5
MD5 encrypted_secret_text | LINE} 5. ap mgmtuser username username password {0 unencrypted password | 8 AES encrypted password
}secret {0 unencrypted password | 8 AES encrypted password } 6. ap dot1x username username password {0 unencrypted password | 8 AES encrypted password } 7. end 8. ap name apname mgmtuser username usernamepassword password secret secret _text 9. ap name apname dot1x-user username password password

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1848

System Management

Configuring Administrator Usernames and Passwords

Step 2 Step 3 Step 4 Step 5
Step 6 Step 7 Step 8

Command or Action

Purpose

wireless security strong-password

Enables strong password policy for the administrator user.

Example:

Switch(config)# wireless security strong-password

username admin-username password {0 unencrypted_password | 7 hidden_password | unencrypted_text}
Example:
Switch(config)# username adminuser1 password 0 QZsek239@

Specifies a username and password for an administrator.
The administrator can configure the switch and view the configured information.

username admin-username secret {0

Specifies the secret for the administrator.

unencrypted_secret_text | 4 SHA256 encrypted_secret_text

| 5 MD5 encrypted_secret_text | LINE}

Example:

Switch(config)# username adminuser1 secret 0 QZsek239@

ap mgmtuser username username password {0

Specifies administrator username and password for

unencrypted password | 8 AES encrypted password }secret managing all of the access points configured to the switch.

{0 unencrypted password | 8 AES encrypted password } You can also include the secret text to perform privileged

Example:

access point management.

Switch(config)# ap mgmtuser username cisco password Note 0 Qwci12@ secret 0 Qwci14@!

If your password is not strong enough to fulfill the strong password policy, then the password is rejected with a valid error message. For example, the following password is rejected because it is not a strong password.

Switch# ap mgmtuser username cisco password 0 abcd secret 0 1234

ap dot1x username username password {0 unencrypted Specifies the 802.1X username and password for managing

password | 8 AES encrypted password }

all of the access points configured to the switch.

Example:

Switch(config)# ap dot1x username cisco password 0 Qwci12@

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

ap name apname mgmtuser username usernamepassword password secret secret _text
Example:

Configures the administrator username, password, and secret text for managing a specific access point that is configured to the switch.

Switch# ap name APf0f7.55c7.7b23 mgmtuser username cisco password Qne35! secret Nzep592$

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1849

Examples: Administrator Usernames and Passwords Configuration

System Management

Step 9

Command or Action
ap name apname dot1x-user username password password
Example:
Switch# ap name APf0f7.55c7.7b23 dot1x-user username cisco password Qne35!

Purpose
Configures the 802.1X username and password for a specific access point.

Example
Examples: Administrator Usernames and Passwords Configuration
This example shows how to configure administrator usernames and passwords with the strong password policy in configuration mode:
Switch# configure terminal Switch(config)# wireless security strong-password Switch(config)# username adminuser1 password 0 QZsek239@ Switch(config)# ap mgmtuser username cisco password 0 Qwci12@ secret 0 Qwci14@! Switch(config)# ap dot1x username cisco password 0 Qwci12@ Switch# end
This example shows how to configure administrator usernames and passwords for an access point in global EXEC mode:
Switch# wireless security strong-password Switch# ap name APf0f7.55c7.7b23 mgmtuser username cisco password Qwci12@ secret Qwci14@ Switch# ap name APf0f7.55c7.7b23 dot1x-user username cisco password Qwci12@ Switch# end

Additional References for Administrator Usernames and Passwords

Related Documents

Related Topic

Document Title

System management commands System Management Command Reference Guide (Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1850

System Management

Feature History and Information For Performing Administrator Usernames and Passwords Configuration

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For Performing Administrator Usernames and Passwords Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1851

Feature History and Information For Performing Administrator Usernames and Passwords Configuration

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1852

9 1 C H A P T E R
Configuring 802.11 parameters and Band Selection
· Finding Feature Information, on page 1853 · Restrictions on Band Selection, 802.11 Bands, and Parameters, on page 1853 · Information About Configuring Band Selection, 802.11 Bands, and Parameters, on page 1854 · How to Configure 802.11 Bands and Parameters, on page 1855 · Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters, on page 1865 · Configuration Examples for Band Selection, 802.11 Bands, and Parameters, on page 1869 · Additional References for 802.11 Parameters and Band Selection, on page 1871 · Feature History and Information For Performing 802.11 parameters and Band Selection Configuration,
on page 1872
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions on Band Selection, 802.11 Bands, and Parameters
· Band-selection enabled WLANs do not support time-sensitive applications like voice and video because of roaming delays.
· Band selection can be used only with Cisco Aironet 1040, 1140, 1250, 1260, 3500, and the 3600 series access points.
· Band selection operates only on access points that are connected to a controller. A FlexConnect access point without a controller connection does not perform band selection after a reboot.
· The band-selection algorithm directs dual-band clients only from the 2.4-GHz radio to the 5-GHz radio of the same access point, and it only runs on an access point when both the 2.4-GHz and 5-GHz radios are up and running.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1853

Information About Configuring Band Selection, 802.11 Bands, and Parameters

System Management

· You can enable both band selection and aggressive load balancing on the controller. They run independently and do not impact one another.
· It is not possible to enable or disable band selection and client load balancing globally through the controller GUI or CLI. You can, however, enable or disable band selection and client load balancing for a particular WLAN. Band selection and client load balancing are enabled globally by default.
Information About Configuring Band Selection, 802.11 Bands, and Parameters
Band Selection
Band selection enables client radios that are capable of dual-band (2.4- and 5-GHz) operation to move to a less congested 5-GHz access point. The 2.4-GHz band is often congested. Clients on this band typically experience interference from Bluetooth devices, microwave ovens, and cordless phones as well as co-channel interference from other access points because of the 802.11b/g limit of three nonoverlapping channels. To prevent these sources of interference and improve overall network performance, you can configure band selection on the switch. Band selection is enabled globally by default. Band selection works by regulating probe responses to clients. It makes 5-GHz channels more attractive to clients by delaying probe responses to clients on 2.4-GHz channels.
802.11 Bands
You can configure the 802.11b/g/n (2.4-GHz) and 802.11a/n (5-GHz) bands for the controller to comply with the regulatory requirements in your country. By default, both 802.11b/g/n and 802.11a/n are enabled. When a controller is configured to allow only 802.11g traffic, 802.11b client devices are able to successfully connect to an access point but cannot pass traffic. When you configure the controller for 802.11g traffic only, you must mark 11g rates as mandatory.
802.11n Parameter
This section provides instructions for managing 802.11n devices such as the Cisco Aironet 1140 and 3600 Series Access Points on your network. The 802.11n devices support the 2.4- and 5-GHz bands and offer high-throughput data rates. The 802.11n high-throughput rates are available on all 802.11n access points for WLANs using WMM with no Layer 2 encryption or with WPA2/AES encryption enabled.
Note Some Cisco 802.11n APs may intermittently emit incorrect beacon frames, which can trigger false wIPS alarms. We recommend that you ignore these alarms. The issue is observed in the following Cisco 802.11n APs: 1140, 1250, 2600, 3500, and 3600.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1854

System Management

802.11h Parameter

802.11h Parameter
802.11h informs client devices about channel changes and can limit the transmit power of those client devices.

How to Configure 802.11 Bands and Parameters

Configuring Band Selection (CLI)

SUMMARY STEPS

1. configure terminal 2. wireless client band-select cycle-count cycle_count 3. wireless client band-select cycle-threshold milliseconds 4. wireless client band-select expire suppression seconds 5. wireless client band-select expire dual-band seconds 6. wireless client band-select client-rssi client_rssi 7. end 8. wlan wlan_profile_name wlan_ID SSID_network_name band-select 9. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

wireless client band-select cycle-count cycle_count
Example:
Switch(config)# wireless client band-select cycle-count 3

Sets the probe cycle count for band select.
You can enter a value between 1 and 10 for the cycle_count parameter.

Step 3

wireless client band-select cycle-threshold milliseconds Sets the time threshold for a new scanning cycle period.

Example:
Switch(config)# wireless client band-select cycle-threshold 5000

You can enter a value for threshold between 1 and 1000 for the milliseconds parameter.

Step 4

wireless client band-select expire suppression seconds Sets the suppression expire to the band select.

Example:

You can enter a value for suppression between 10 to 200

Switch(config)# wireless client band-select expire for the seconds parameter.

suppression 100

Step 5

wireless client band-select expire dual-band seconds Example:

Sets the dual band expire.
You can enter a value for dual band between 10 and 300 for the seconds parameter.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1855

Configuring the 802.11 Bands (CLI)

System Management

Step 6 Step 7 Step 8
Step 9

Command or Action

Purpose

Switch(config)# wireless client band-select expire dual-band 100

wireless client band-select client-rssi client_rssi
Example:
Switch(config)# wireless client band-select client-rssi 40

Sets the client RSSI threshold.
You can enter a value for minimum dBm of a client RSSI to respond to a probe between 20 and 90 for the client_rssi parameter.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

wlan wlan_profile_name wlan_ID SSID_network_name band-select Example:
Switch(config)# wlan wlan1 25 ssid12
Switch(config-wlan)# band-select

Configures band selection on specific WLANs.
You can enter a value between 1 and 512 for the wlan_ID parameter.
You can enter the up to 32 alphanumeric characters for SSID_network_name parameter.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring the 802.11 Bands (CLI)
You can configure 802.11 bands and parameters.

SUMMARY STEPS

1. configure terminal 2. ap dot11 5ghz shutdown 3. ap dot11 24ghz shutdown 4. ap dot11 {5ghz | 24ghz} beaconperiod time_unit 5. ap dot11 {5ghz | 24ghz} fragmentation threshold 6. ap dot11 {5ghz | 24ghz} dtpc 7. wireless client association limit number interval milliseconds 8. ap dot11 {5ghz | 24ghz} rate rate {disable | mandatory | supported} 9. no ap dot11 5ghz shutdown 10. no ap dot11 24ghz shutdown 11. ap dot11 24ghz dot11g 12. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1856

System Management

Configuring the 802.11 Bands (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 5ghz shutdown Example:
Switch(config)# ap dot11 5ghz shutdown

Purpose Enters global configuration mode.
Disables the 802.11a band. Note You must disable the 802.11a band before
configuring the 802.11a network parameters.

Step 3

ap dot11 24ghz shutdown Example:
Switch(config)# ap dot11 24ghz shutdown

Disables the 802.11b band.
Note You must disable the 802.11b band before configuring the 802.11b network parameters.

Step 4 Step 5 Step 6

ap dot11 {5ghz | 24ghz} beaconperiod time_unit Example:
Switch(config)# ap dot11 5ghz beaconperiod 500

Specifies the rate at which the SSID is broadcast by the access point.
The beacon interval is measured in time units (TUs). One TU is 1024 microseconds. You can configure the access point to send a beacon every 20 to 1000 milliseconds.

ap dot11 {5ghz | 24ghz} fragmentation threshold

Specifies the size at which packets are fragmented.

Example:
Switch(config)# ap dot11 5ghz fragmentation 300

The threshold is a value between 256 and 2346 bytes (inclusive). Specify a low number for areas where communication is poor or where there is a great deal of radio interference.

ap dot11 {5ghz | 24ghz} dtpc Example:
Switch(config)# ap dot11 5ghz dtpc Switch(config)# no ap dot11 24ghz dtpc

Enables access points to advertise their channels and transmit the power levels in beacons, and probe responses.
The default value is enabled. Client devices using dynamic transmit power control (DTPC) receive the channel and power level information from the access points and adjust their settings automatically. For example, a client device used primarily in Japan could rely on DTPC to adjust its channel and power settings automatically when it travels to Italy and joins a network there.
Note On access points that run Cisco IOS software, this feature is called world mode.

Step 7

The no form of the command disables the 802.11a or 802.11b DTPC setting.

wireless client association limit number interval milliseconds

Specifies the maximum allowed clients that can be configured.

Example:

You can configure a maximum number of association

Switch(config)# wireless client association limit request on a single access point slot at a given interval.

50 interval 1000

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1857

Configuring the 802.11 Bands (CLI)

System Management

Step 8
Step 9 Step 10 Step 11 Step 12

Command or Action

Purpose The range of association limit that you can configure is from one through 100.
The association request limit interval is measured between 100 to 10000 milliseconds.

ap dot11 {5ghz | 24ghz} rate rate {disable | mandatory Specifies the rate at which data can be transmitted between

| supported}

the controller and the client.

Example:
Switch(config)# ap dot11 5ghz rate 36 mandatory

· disabled--Defines that the clients specify the data rates used for communication.
· mandatory--Defines that the clients support this data rate in order to associate to an access point on the controller.

· supported--Any associated clients that support this data rate may communicate with the access point using that rate. However, the clients are not required to be able to use this rate in order to associate.

· rate--Specifies the rate at which data is transmitted. For the 802.11a and 802.11b bands, the data is transmitted at the rate of 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 Mbps.

no ap dot11 5ghz shutdown Example:
Switch(config)# no ap dot11 5ghz shutdown
no ap dot11 24ghz shutdown Example:
Switch(config)# no ap dot11 24ghz shutdown
ap dot11 24ghz dot11g Example:
Switch(config)# ap dot11 24ghz dot11g
end Example:
Switch(config)# end

Enables the 802.11a band. Note The default value is enabled.
Enables the 802.11b band. Note The default value is enabled.
Enables or disables 802.11g network support. The default value is enabled. You can use this command only if the 802.11b band is enabled. If you disable this feature, the 802.11b band is enabled without 802.11g support. Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1858

System Management

Configuring the 802.11 Bands (GUI)

Configuring the 802.11 Bands (GUI)

Step 1 Step 2 Step 3 Step 4
Step 5 Step 6
Step 7 Step 8

Choose Configuration > Wireless > 802.11a/n/ac > Network or Configuration > Wireless > 802.11b/g/n > Network to open the Global Parameters page. Select the 802.11a/n/ac (or 802.11b/g) Network Status check box to enable the 802.11a or 802.11b/g band. To disable the band, unselect the check box. The default value is enabled. You can enable both the 802.11a and 802.11b/g bands. If you enabled the 802.11b/g band in Step 2, select the 802.11g Support check box if you want to enable 802.11g network support. The default value is enabled. If you disable this feature, the 802.11b band is enabled without 802.11g support. Specify the period at which the SSID is broadcast by the access point by entering a value between 20 and 1000 milliseconds (inclusive) in the Beacon Period text box. The default value is 100 milliseconds.
Note The beacon period in controllers is listed in terms of milliseconds. The beacon period can also be measured in time units, where one time unit equals 1024 microseconds or 102.4 milliseconds. If a beacon interval is listed as 100 milliseconds in a controller, it is only a rounded off value for 102.4 milliseconds. Due to hardware limitation in certain radios, even though the beacon interval is, say 100 time units, it is adjusted to 102 time units, which roughly equals 104.448 milliseconds. When the beacon period is to be represented in terms of time units, the value is adjusted to the nearest multiple of 17.
Specify the size at which packets are fragmented by entering a value between 256 and 2346 bytes (inclusive) in the Fragmentation Threshold text box. Enter a low number for areas where communication is poor or where there is a great deal of radio interference. Make access points advertise their channel and transmit power level in beacons and probe responses for CCX clients. Select the DTPC Support check box. Otherwise, unselect this check box. The default value is enabled.
Client devices using dynamic transmit power control (DTPC) receive the channel and power level information from the access points and adjust their settings automatically. For example, a client device used primarily in Japan could rely on DTPC to adjust its channel and power settings automatically when it travels to Italy and joins a network there.
Note On access points that run Cisco IOS software, this feature is called world mode.
Note DTPC and 801.11h power constraint cannot be enabled simultaneously.
Specify the maximum allowed clients by entering a value between 1 to 200 in the Maximum Allowed Client text box. The default value is 200. Use the Data Rates options to specify the rates at which data can be transmitted between the access point and the client. These data rates are available:
· 802.11a--6, 9, 12, 18, 24, 36, 48, and 54 Mbps
· 802.11b/g--1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 Mbps
For each data rate, choose one of these options:
· Mandatory--Clients must support this data rate in order to associate to an access point on the controller.
· Supported--Any associated clients that support this data rate may communicate with the access point using that rate. However, the clients are not required to be able to use this rate in order to associate.
· Disabled--The clients specify the data rates used for communication.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1859

Configuring 802.11n Parameters (CLI)

System Management

Step 9 Step 10

Click Apply. Click Save Configuration.

Configuring 802.11n Parameters (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 {5ghz | 24ghz} dot11n 3. ap dot11 {5ghz | 24ghz} dot11n mcs tx rtu 4. wlanwlan_profile_name wlan_ID SSID_network_name wmm require 5. ap dot11 {5ghz | 24ghz} shutdown 6. {ap | no ap} dot11 {5ghz | 24 ghz} dot11n a-mpdu tx priority {all | 0-7} 7. no ap dot11 {5ghz | 24ghz} shutdown 8. ap dot11 {5ghz | 24ghz} dot11n guard-interval {any | long} 9. ap dot11 {5ghz | 24ghz} dot11n rifs rx 10. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 {5ghz | 24ghz} dot11n Example:
Switch(config)# ap dot11 5ghz dot11n

Enables 802.11n support on the network.
The no form of the command disables the 802.11n support on the network.

Step 3

ap dot11 {5ghz | 24ghz} dot11n mcs tx rtu Example:
Switch(config)# ap dot11 5ghz dot11n mcs tx 20

Specifies the modulation and coding scheme (MCS) rates at which data can be transmitted between the access point and the client. You can set a value from 0 through 23 for the mcs tx parameter.
The no form of the command disables the MCS rates that is configured.

Step 4

wlanwlan_profile_name wlan_ID SSID_network_name wmm require Example:
Switch(config)# wlan wlan1 25 ssid12
Switch(config-wlan)# wmm require

Enables WMM on the WLAN and uses the 802.11n data rates that you configured.
The require parameter requires client devices to use WMM. Devices that do not support WMM cannot join the WLAN.

Step 5

ap dot11 {5ghz | 24ghz} shutdown Example:

Disables the network.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1860

System Management

Configuring 802.11n Parameters (CLI)

Step 6

Command or Action
Switch(config)# ap dot11 5ghz shutdown

Purpose

{ap | no ap} dot11 {5ghz | 24 ghz} dot11n a-mpdu tx priority {all | 0-7}
Example:
Switch(config)# ap dot11 5ghz dot11n a-mpdu tx priority all

Specifies the aggregation method used for 802.11n packets.
Aggregation is the process of grouping packet data frames together rather than transmitting them separately. Two aggregation methods are available: Aggregated MAC Protocol Data Unit (A-MPDU) and Aggregated MAC Service Data Unit (A-MSDU). Both A-MPDU and A-MSDU are performed in the software.
You can specify the aggregation method for various types of traffic from the access point to the clients.
The following table defines the priority levels (0-7) assigned per traffic type.

Table 163: Traffic Type Priority Levels

User Priority 0 1 2 3 4 5 6 7

Traffic Type
Best effort Background Spare Excellent effort Controlled load Video, less than 100-ms latency and jitter Voice, less than 100-ms latency and jitter Network control

You can configure each priority level independently, or you can use the all parameter to configure all of the priority levels at once. You can configure priority levels so that the traffic uses either A-MPDU transmission or A-MSDU transmission.
· When you use the ap command along with the other options, the traffic associated with that priority level uses A-MPDU transmission.
· When you use the no ap command along with the other options, the traffic associated with that priority level uses A-MSDU transmission.
Configure the priority levels to match the aggregation method used by the clients. By default, A-MPDU is enabled for priority level 0, 4 and 5 and the rest are

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1861

Configuring the 802.11n Parameters (GUI)

System Management

Step 7 Step 8
Step 9 Step 10

Command or Action

Purpose
disabled. By default, A-MPDU is enabled for all priorities except 6 and 7.

no ap dot11 {5ghz | 24ghz} shutdown Example:
Switch(config)# no ap dot11 5ghz shutdown

Reenables the network.

ap dot11 {5ghz | 24ghz} dot11n guard-interval {any | long}
Example:
Switch(config)# ap dot11 5ghz dot11n guard-interval long

Configures the guard interval for the network.

ap dot11 {5ghz | 24ghz} dot11n rifs rx Example:
Switch(config)# ap dot11 5ghz dot11n rifs rx

Configures the Reduced Interframe Space (RIFS) for the network.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring the 802.11n Parameters (GUI)

Step 1
Step 2 Step 3

Choose Configuration > Wireless > 802.11a/n/ac or 802.11b/g/n > High Throughput (802.11n) to open the 802.11n/ac (5 GHz or 2.4 GHz) Throughput page. Select the Enable 11n check box to enable 802.11n support on the network. The default value is enabled. Select the check boxes of the desired rates to specify the modulation and coding scheme (MCS) rates at which data can be transmitted between the access point and the client. These data rates, which are calculated for a 20-MHz channel width using a short guard interval, are available:
· 0 (7 Mbps)
· 1 (14 Mbps)
· 2 (21 Mbps)
· 3 (29 Mbps)
· 4 (43 Mbps)
· 5 (58 Mbps)
· 6 (65 Mbps)
· 7 (72 Mbps)
· 8 (14 Mbps)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1862

System Management

Configuring the 802.11n Parameters (GUI)

Step 4 Step 5
Step 6

· 9 (29 Mbps) · 10 (43 Mbps) · 11 (58 Mbps) · 12 (87 Mbps) · 13 (116 Mbps) · 14 (130 Mbps) · 15 (144 Mbps) · 16 (22 Mbps) · 17 (43 Mbps) · 18 (65 Mbps) · 19 (87 Mbps) · 20 (130 Mbps) · 21 (173 Mbps) · 22 (195 Mbps) · 23 (217 Mbps) · Any associated clients that support the selected rates may communicate with the access point using those rates.
However, the clients are not required to be able to use this rate in order to associate. The MCS settings determine the number of spatial streams, the modulation, the coding rate, and the data rate values that are used.
Click Apply. Use the 802.11n data rates that you configured by enabling WMM on the WLAN as follows: a) Choose WLANs to open the WLANs page. b) Click the ID number of the WLAN for which you want to configure WMM mode. c) When the WLANs > Edit page appears, choose the QoS tab to open the WLANs > Edit (Qos) page. d) From the WMM Policy drop-down list, choose Required or Allowed to require or allow client devices to use WMM.
Devices that do not support WMM cannot join the WLAN. If you choose Allowed, devices that cannot support WMM can join the WLAN but will not benefit from the 802.11n rates. e) Click Apply. Click Save Configuration. Note To determine if an access point supports 802.11n, look at the 11n Supported text box on either the 802.11a/n
(or 802.11b/g/n) Cisco APs > Configure page or the 802.11a/n (or 802.11b/g/n) AP Interfaces > Details page.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1863

Configuring 802.11h Parameters (CLI)

System Management

Configuring 802.11h Parameters (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 5ghz shutdown 3. {ap | no ap} dot11 5ghz channelswitch mode switch_mode 4. ap dot11 5ghz power-constraint value 5. no ap dot11 5ghz shutdown 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 5ghz shutdown Example:
Switch(config)# ap dot11 5ghz shutdown

Disables the 802.11a network.

Step 3

{ap | no ap} dot11 5ghz channelswitch mode switch_mode Enables or disables the access point to announce when it is

Example:

switching to a new channel.

Switch(config)# ap dot11 5ghz channelswitch mode You can enter a 0 or 1 for the channelswitch parameter to

0

specify whether transmissions are restricted until the actual

channel switch (0) or are not restricted (1). The default value

is disabled.

Step 4

ap dot11 5ghz power-constraint value

Configures the 802.11h power constraint value in a range

Example:

from zero through 255.

Switch(config)# ap dot11 5ghz power-constraint 200 The default value for the value parameter is 3 dB.

Step 5

no ap dot11 5ghz shutdown Example:
Switch(config)# no ap dot11 5ghz shutdown

Reenables the 802.11a network.

Step 6

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring the 802.11h Parameters (GUI)

Step 1 Disable the 802.11 band as follows:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1864

System Management

Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters

Step 2 Step 3 Step 4 Step 5 Step 6
Step 7

a) Choose Configuration > Wireless > 802.11a/n/ac > Network to open the 802.11a/n/ac Global Parameters page. b) Unselect the 802.11a Network Status check box. c) Click Apply.
Choose Configuration > Wireless > 802.11a/n/ac > DFS (802.11h) to open the 802.11h Global Parameters page. In the Power Constraint area, enter the local power constraint. The valid range is between 0 dBm and 30 dBm. In the Channel Switch Announcement area, enter the channel switch announcement mode. You can enter a value of either 1 or 0. Click Apply. Reenable the 802.11a band as follows: a) Choose Wireless > 802.11a/n/ac > Network to open the 802.11a/n/ac Global Parameters page. b) Select the 802.11a Network Status check box. c) Click Apply.
Click Save Configuration.

Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters

Monitoring Configuration Settings Using Band Selection and 802.11 Bands Commands
This section describes the new commands for band selection and 802.11 bands. The following commands can be used to monitor band selection, and 802.11 bands and parameters the switch.
Table 164: Monitoring Configuration Settings Using Band Selection and 802.11 Bands Commands

Command

Purpose

show ap dot11 5ghz network Displays 802.11a bands network parameters, 802.11a operational rates, 802.11n MCS settings, and 802.11n status information.

show ap dot11 24ghz network Displays 802.11b bands network parameters, 802.11b/g operational rates, 802.11n MCS settings, and 802.11n status information.

show wireless dot11h

Displays 802.11h configuration parameters.

show wireless band-select Displays band select configuration settings.

Example: Viewing the Configuration Settings for 5-GHz Band

Switch# show ap dot11 5ghz network 802.11a Network : Enabled

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1865

Example: Viewing the Configuration Settings for 5-GHz Band
11nSupport : Enabled 802.11a Low Band : Enabled 802.11a Mid Band : Enabled 802.11a High Band : Enabled
802.11a Operational Rates 802.11a 6M : Mandatory 802.11a 9M : Supported 802.11a 12M : Mandatory 802.11a 18M : Supported 802.11a 24M : Mandatory 802.11a 36M : Supported 802.11a 48M : Supported 802.11a 54M : Supported
802.11n MCS Settings: MCS 0 : Supported MCS 1 : Supported MCS 2 : Supported MCS 3 : Supported MCS 4 : Supported MCS 5 : Supported MCS 6 : Supported MCS 7 : Supported MCS 8 : Supported MCS 9 : Supported MCS 10 : Supported MCS 11 : Supported MCS 12 : Supported MCS 13 : Supported MCS 14 : Supported MCS 15 : Supported MCS 16 : Supported MCS 17 : Supported MCS 18 : Supported MCS 19 : Supported MCS 20 : Supported MCS 21 : Supported MCS 22 : Supported MCS 23 : Supported
802.11n Status: A-MPDU Tx: Priority 0 : Enabled Priority 1 : Disabled Priority 2 : Disabled Priority 3 : Disabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled A-MSDU Tx: Priority 0 : Enabled Priority 1 : Enabled Priority 2 : Enabled Priority 3 : Enabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled
Guard Interval : Any Rifs Rx : Enabled
Beacon Interval : 100 CF Pollable mandatory : Disabled CF Poll Request Mandatory : Disabled CFP Period : 4
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1866

System Management

System Management

Example: Viewing the Configuration Settings for 24-GHz Band

CFP Maximum Duration : 60 Default Channel : 36 Default Tx Power Level : 1 DTPC Status : Enabled Fragmentation Threshold : 2346 Pico-Cell Status : Disabled Pico-Cell-V2 Status : Disabled TI Threshold : 0 Legacy Tx Beamforming setting : Disabled Traffic Stream Metrics Status : Disabled Expedited BW Request Status : Disabled EDCA profile type check : default-wmm Call Admision Control (CAC) configuration Voice AC
Voice AC - Admission control (ACM) : Disabled Voice Stream-Size : 84000 Voice Max-Streams : 2 Voice Max RF Bandwidth : 75 Voice Reserved Roaming Bandwidth : 6 Voice Load-Based CAC mode : Enabled Voice tspec inactivity timeout : Enabled CAC SIP-Voice configuration SIP based CAC : Disabled SIP Codec Type : CODEC_TYPE_G711 SIP call bandwidth : 64 SIP call bandwith sample-size : 20 Video AC Video AC - Admission control (ACM) : Disabled Video max RF bandwidth : Infinite Video reserved roaming bandwidth : 0
Example: Viewing the Configuration Settings for 24-GHz Band
Switch# show ap dot11 24ghz network 802.11b Network : Enabled 11gSupport : Enabled 11nSupport : Enabled
802.11b/g Operational Rates 802.11b 1M : Mandatory 802.11b 2M : Mandatory 802.11b 5.5M : Mandatory 802.11g 6M : Supported 802.11g 9M : Supported 802.11b 11M : Mandatory 802.11g 12M : Supported 802.11g 18M : Supported 802.11g 24M : Supported 802.11g 36M : Supported 802.11g 48M : Supported 802.11g 54M : Supported 802.11n MCS Settings: MCS 0 : Supported MCS 1 : Supported MCS 2 : Supported MCS 3 : Supported MCS 4 : Supported MCS 5 : Supported MCS 6 : Supported MCS 7 : Supported MCS 8 : Supported MCS 9 : Supported

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1867

Example: Viewing the Configuration Settings for 24-GHz Band
MCS 10 : Supported MCS 11 : Supported MCS 12 : Supported MCS 13 : Supported MCS 14 : Supported MCS 15 : Supported MCS 16 : Supported MCS 17 : Supported MCS 18 : Supported MCS 19 : Supported MCS 20 : Supported MCS 21 : Supported MCS 22 : Supported MCS 23 : Supported 802.11n Status: A-MPDU Tx:
Priority 0 : Enabled Priority 1 : Disabled Priority 2 : Disabled Priority 3 : Disabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled A-MSDU Tx: Priority 0 : Enabled Priority 1 : Enabled Priority 2 : Enabled Priority 3 : Enabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled Guard Interval : Any Rifs Rx : Enabled Beacon Interval : 100 CF Pollable Mandatory : Disabled CF Poll Request Mandatory : Disabled CFP Period : 4 CFP Maximum Duration : 60 Default Channel : 11 Default Tx Power Level : 1 DTPC Status : true Call Admission Limit : 105 G711 CU Quantum : 15 ED Threshold : -50 Fragmentation Threshold : 2346 PBCC Mandatory : Disabled Pico-Cell Status : Disabled Pico-Cell-V2 Status : Disabled RTS Threshold : 2347 Short Preamble Mandatory : Enabled Short Retry Limit : 7 Legacy Tx Beamforming setting : Disabled Traffic Stream Metrics Status : Disabled Expedited BW Request Status : Disabled EDCA profile type : default-wmm Call Admision Control (CAC) configuration Voice AC Voice AC - Admission control (ACM) : Disabled Voice Stream-Size : 84000 Voice Max-Streams : 2 Voice Max RF Bandwidth : 75 Voice Reserved Roaming Bandwidth : 6
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1868

System Management

System Management

Example: Viewing the status of 802.11h Parameters

Voice Load-Based CAC mode : Enabled Voice tspec inactivity timeout : Enabled CAC SIP-Voice configuration SIP based CAC : Disabled SIP Codec Type : CODEC_TYPE_G711 SIP call bandwidth : 64 SIP call bandwith sample-size : 20 Video AC Video AC - Admission control (ACM) : Disabled Video max RF bandwidth : Infinite Video reserved roaming bandwidth : 0
Example: Viewing the status of 802.11h Parameters

Switch# show wireless dot11h Power Constraint: 0 Channel Switch: 0 Channel Switch Mode: 0
Example: Verifying the Band Selection Settings

Switch# show wireless band-select

Band Select Probe Response : per WLAN enabling

Cycle Count

:2

Cycle Threshold (millisec) : 200

Age Out Suppression (sec) : 20

Age Out Dual Band (sec)

: 60

Client RSSI (dBm)

: 80

Configuration Examples for Band Selection, 802.11 Bands, and Parameters

Examples: Band Selection Configuration
This example shows how to set the probe cycle count and time threshold for a new scanning cycle period for band select:
Switch# configure terminal Switch(config)# wireless client band-select cycle-count 3 Switch(config)# wireless client band-select cycle-threshold 5000 Switch(config)# end
This example shows how to set the suppression expire to the band select:
Switch# configure terminal Switch(config)# wireless client band-select expire suppression 100 Switch(config)# end
This example shows how to set the dual band expire for the band select:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1869

Examples: 802.11 Bands Configuration

System Management

Switch# configure terminal Switch(config)# wireless client band-select expire dual-band 100 Switch(config)# end
This example shows how to set the client RSSI threshold for the band select:
Switch# configure terminal Switch(config)# wireless client band-select client-rssi 40 Switch(config)# end
This example shows how to configure band selection on specific WLANs:
Switch# configure terminal Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# band-select Switch(config)# end
Examples: 802.11 Bands Configuration
This example shows how to configure 802.11 bands using beacon interval, fragmentation, and dynamic transmit power control:
Switch# configure terminal Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 24ghz shutdown Switch(config)# ap dot11 5ghz beaconperiod 500 Switch(config)# ap dot11 5ghz fragmentation 300 Switch(config)# ap dot11 5ghz dtpc Switch(config)# wireless client association limit 50 interval 1000 Switch(config)# ap dot11 5ghz rate 36 mandatory Switch(config)# no ap dot11 5ghz shutdown Switch(config)# no ap dot11 24ghz shutdown Switch(config)# ap dot11 24ghz dot11g Switch(config)#end
Examples: 802.11n Configuration
This example shows how to configure 802.11n parameters for 5-GHz band using aggregation method:
Switch# configure terminal Switch(config)# ap dot11 5ghz dot11n Switch(config)# ap dot11 5ghz dot11n mcs tx 20 Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# wmm require\ Switch(config-wlan)# exit Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz dot11n a-mpdu tx priority all Switch(config)# no ap dot11 5ghz shutdown Switch(config)#exit
This example shows how to configure the guard interval for 5-GHz band:
Switch# configure terminal Switch(config)# ap dot11 5ghz dot11n
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1870

System Management

Examples: 802.11h Configuration

Switch(config)# ap dot11 5ghz dot11n mcs tx 20 Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# wmm require\ Switch(config-wlan)# exit Switch(config)# no ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz dot11n guard-interval long Switch(config)#end
This example shows how to configure the RIFS for 5-GHz band:
Switch# configure terminal Switch(config)# ap dot11 5ghz dot11n Switch(config)# ap dot11 5ghz dot11n mcs tx 20 Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# wmm require\ Switch(config-wlan)# exit Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz dot11n rifs rx Switch(config)#end
Examples: 802.11h Configuration
This example shows how to configure the access point to announce when it is switching to a new channel using restriction transmission:
Switch# configure terminal Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz channelswitch mode 0 Switch(config)# no ap dot11 5ghz shutdown Switch(config)#end
This example shows how to configure the 802.11h power constraint for 5-GHz band:
Switch# configure terminal Switch(config)# ap dot11 5ghz shutdown Switch(config)# ap dot11 5ghz power-constraint 200 Switch(config)# no ap dot11 5ghz shutdown Switch(config)#end

AdditionalReferencesfor802.11ParametersandBandSelection

Related Documents

Related Topic

Document Title

System management commands System Management Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1871

Feature History and Information For Performing 802.11 parameters and Band Selection Configuration

System Management

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For Performing 802.11 parameters and Band Selection Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1872

9 2 C H A P T E R
Configuring Aggressive Load Balancing
· Finding Feature Information, on page 1873 · Restrictions for Aggressive Load Balancing, on page 1873 · Information for Configuring Aggressive Load Balancing Parameters, on page 1874 · How to Configure Aggressive Load Balancing, on page 1875 · Monitoring Aggressive Load Balancing, on page 1876 · Examples: Aggressive Load Balancing Configuration, on page 1876 · Additional References for Aggressive Load Balancing, on page 1877 · Feature History and Information For Performing Aggressive Load Balancing Configuration , on page
1878
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Aggressive Load Balancing
· You can configure aggressive load balancing only from the command-line interface. · Aggressive load balancing is disabled by default, you must enable it manually. · You can enable load balancing either separately or together with the band select configurations. · When the band select is enabled on the dual-band clients, the load balancing parameter selects only the
lowest load radio from 5-GHz radios. For the 2.4-GHz clients, there is no probe information of the client on 5 GHz and therefore the load balancing algorithm can only be selected between radio on 2.4 GHz. · You can operate load balancing of clients between access points on the same switch but not for the clients between access points on the different switch.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1873

Information for Configuring Aggressive Load Balancing Parameters

System Management

· The load balancing uses an existing association denial mechanism based on the number of client on the radio and the band select is implemented by the distributed probe response suppression on the access point only.
Information for Configuring Aggressive Load Balancing Parameters
Aggressive Load Balancing
Enabling aggressive load balancing on the controller allows lightweight access points to load balance wireless clients across access points. You can enable aggressive load balancing using the controller. When a wireless client attempts to associate to a lightweight access point, association response packets are sent to the client with an 802.11 response packet including status code 17. The code 17 indicates that the AP is busy. The AP responds with an association response bearing 'success' if the AP threshold is not met, and with code 17 (AP busy) if the AP utilization threshold is reached or exceeded and another less busy AP heard the client request. For example, if the number of clients on AP1 is more than the number of clients on AP2 plus the load-balancing window, then AP1 is considered to be busier than AP2. When a client attempts to associate to AP1, it receives an 802.11 response packet with status code 17, indicating that the access point is busy, and the client attempts to associate to a different access point. You can configure the controller to deny client associations up to 10 times (if a client attempted to associate 11 times, it would be allowed to associate on the 11th try). You can also enable or disable load balancing on a particular WLAN, which is useful if you want to disable load balancing for a select group of clients (such as time-sensitive voice clients). The maximum number of client associations that the access points can support is dependent upon the following factors:
· The maximum number of client associations differs for lightweight and autonomous Cisco IOS access points.
· There may be a limit per radio and an overall limit per AP. · AP hardware (the 16-MB APs have a lower limit than the 32-MB and higher APs)
The Client Association Limits for Lightweight Access Points are as follows: · For 16-MB APs, the limit is 128 clients per AP. This limit is applicable to 1100 and 1200 series APs. · For 32-MB and higher APs, there is no per-AP limit.
The maximum Client Association Limits per-radio for all of the Cisco IOS APs is 200 associations.
Note With 32-MB and higher lightweight Cisco IOS APs, with two radios, up to 200 + 200 = 400 associations are supported.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1874

System Management

How to Configure Aggressive Load Balancing

The maximum Client Association Limits per Autonomous Cisco IOS access point is around 80 to 127 clients per AP. This number varies depending on the following factors:
· AP model (whether it is 16 MB or 32 MB or higher)
· Cisco IOS software release
· Hardware configuration (two radios use more memory than one)
· Enabled features (WDS functionality in particular)
The per-radio limit is about 200 associations. One association will likely hit the per-AP limit first. Unlike Cisco Unified Wireless Network, autonomous Cisco IOS supports per-SSID/per-AP association limits. This limit is configured using the max-associations CLI, under dot11 SSID. The maximum number is 255 associations (which is also the default number).

How to Configure Aggressive Load Balancing

Configuring Aggressive Load Balancing

SUMMARY STEPS

1. configure terminal 2. wireless load-balancing window client-count 3. wireless load-balancing denial denial-count 4. end 5. wlan wlan_profile_name wlan_ID SSID_network_name load-balance 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

wireless load-balancing window client-count

Sets the client window for aggressive load balancing. You

Example:

can enter a value between 0 and 20 for the client_count parameter.

Switch(config)# wireless load-balancing window 1

Step 3

wireless load-balancing denial denial-count
Example:
Switch(config)# wireless load-balancing denial-count 1

Sets the denial count for load balancing. You can enter a value between 0 and 10 for the denial_count parameter.

Step 4

end Example:

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1875

Monitoring Aggressive Load Balancing

System Management

Step 5 Step 6

Command or Action
Switch(config)# end

Purpose

wlan wlan_profile_name wlan_ID SSID_network_name load-balance Example:
Switch(config)# wlan wlan1 25 ssid12
Switch(config-wlan)# load-balance

Enables or disables aggressive load balancing on specific WLANs.
You can enter a value between 1 and 512 for the wlan_ID parameter.
You can enter the up to 32 alphanumeric characters for SSID_network_name parameter.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Monitoring Aggressive Load Balancing

This section describes the new command for aggressive load balancing. The following command can be used to monitor aggressive load balancing on the switch.
Table 165: Monitoring Aggressive Load Balancing Command

Command
show wireless load-balancing

Purpose Displays the status of the load-balancing feature.

Examples: Aggressive Load Balancing Configuration
This example shows how to configure the load balancing denial count:
Switch# configure terminal Switch(config)# wireless load-balancing denial-count 1 Switch(config)# end Switch# show wireless load-balancing
This example shows how to configure the client window for aggressive load balancing:
Switch# configure terminal Switch(config)# wireless load-balancing window 1 Switch(config)# end Switch# show wireless load-balancing
This example shows how to configure load balancing on specific WLAN:
Switch# configure terminal Switch(config)# wlan wlan1 25 ssid12 Switch(config-wlan)# load-balance

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1876

System Management

Additional References for Aggressive Load Balancing

Switch(config)# end Switch# show wireless load-balancing

Additional References for Aggressive Load Balancing

Related Documents

Related Topic

Document Title

System management commands System Management Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1877

Feature History and Information For Performing Aggressive Load Balancing Configuration

System Management

Feature History and Information For Performing Aggressive Load Balancing Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1878

9 3 C H A P T E R
Configuring Client Roaming
· Finding Feature Information, on page 1879 · Restrictions for Configuring Client Roaming, on page 1879 · Information About Client Roaming, on page 1879 · How to Configure Layer 2 or Layer 3 Roaming, on page 1882 · Monitoring Client Roaming Parameters, on page 1889 · Monitoring Mobility Configurations, on page 1889 · Additional References for Configuring Client Roaming, on page 1890 · Feature History and Information For Performing Client Roaming Configuration , on page 1891
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Configuring Client Roaming
The following are the restrictions that you should be aware while configuring client roaming: · Cisco Compatible Extensions (CCX) support is enabled automatically for every WLAN on the switch and cannot be disabled. The switch stores the CCX version of the client in its client database and uses it to generate and respond to CCX frames appropriately. Clients must support CCXv4 or v5 (or CCXv2 for access point assisted roaming) to utilize these roaming enhancements. · Client roaming between 600 Series Access points is not supported.
Information About Client Roaming
The controllers deliver high-end wireless services to the clients roaming across wireless network. Now, the wireless services are integrated with the switches, thus delivering a value-added Cisco unified new mobility
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1879

Information About Client Roaming

System Management

architecture. This unified architecture enables client-roaming services to both wireless and wired clients with seamless, fast- roaming services.
The new mobility architecture supports fast client roaming services using logical categorization of network into Mobility Domains (MDs), Mobility Groups (MGs), Mobility Subdomains (MSDs), and Switch Peer Groups (SPGs) using systems such as Mobility Oracle (MO), Mobility Controller (MC), and Mobility Agent (MA).
· A Mobility Domain is the entire domain across which client roaming is supported. It is a collection of mobility groups. For example, a campus network can be considered as a mobility domain.
· A Mobility Group is a collection of mobility subdomains across which fast roaming is supported. The mobility group can be one or more buildings within a campus across which frequent roaming is supported.
· A Mobility Subdomain is an autonomous portion of the mobility domain network. Each mobility subdomain contains one mobility controller (MC) and a collection of SPGs. A subdomain is equivalent to an 802.11r key domain.
· A Switch Peer Group is a collection of mobility agents.
· The Mobility Oracle acts as the point of contact for mobility events that occur across mobility subdomains. The mobility oracle also maintains a local database of each client in the entire mobility domain, their home and current subdomain. There is only one MO for an entire mobility domain. The Cisco WLC 5700 Series Controllers or Cisco Unified Wireless Networking Solution controller can act as MO.
· The Mobility Controller provides mobility management services for inter-SPG roaming events. The MC sends the configuration like SPG name and SPG peer member list to all of the mobility agents under its subdomain. The Cisco WLC 5700 Series Controllers, Cisco Catalyst 3850 Switch, or Cisco Unified Wireless Networking Solution controller can act as MC. The MC has MC functionality and MA functionality that is running internally into it.
· The Mobility Agent is the component that maintains client mobility state machine for a mobile client. All APs are connected to the mobility agent.
The New mobility architecture supports seamless roaming in the following scenarios:
· Intra-switch roaming--The client roaming between APs managed by same mobility agent.
· Intra-SPG roaming--The client roaming between mobility agents in the same SPG.
· Inter-SPG, Intra-subdomain roaming--The client roaming between mobility agents in different SPGs within the same subdomain.
· Inter-subdomain roaming--The client roaming between mobility agents across a subdomain.
Fast Roaming
New mobility architecture supports fast roaming when clients roam within a mobility group by eliminating the need for full authentication. Security polices should be same across the switches for fast roaming.
Local, anchor, foreign MAs and MCs
When a client joins an MA initially and its point of attachment has not changed, that MA is referred as local or associated MA. The MC to which this MA is associated is referred as local or associated MC.
When a client roams between two MAs, the MA to which the client was previously associated is the anchor MA (point of attachment) and the MA to which the client is currently associated is the foreign or associated

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1880

System Management

Inter-Subnet Roaming

MA (point of presence). The MCs to which these MAs are associated are referred as anchor, foreign, or associated MCs, respectively.
Inter-Subnet Roaming
Multiple-controller deployments support client roaming across access points managed by controllers in the same mobility group on different subnets. This roaming is transparent to the client because the session is sustained and a tunnel between the controllers allows the client to continue using the same DHCP-assigned or client-assigned IP address as long as the session remains active. The tunnel is torn down, and the client must reauthenticate when the client sends a DHCP Discover with a 0.0.0.0 client IP address or a 169.254.*.* client auto-IP address or when the operator-set user timeout is exceeded.
Voice-over-IP Telephone Roaming
802.11 voice-over-IP (VoIP) telephones actively seek out associations with the strongest RF signal to ensure the best quality of service (QoS) and the maximum throughput. The minimum VoIP telephone requirement of 20-millisecond or shorter latency time for the roaming handover is easily met by the Cisco Unified Wireless Network (Cisco UWN) solution, which has an average handover latency of 5 or fewer milliseconds when open authentication is used. This short latency period is controlled by controllers rather than allowing independent access points to negotiate roaming handovers.
The Cisco UWN solution supports 802.11 VoIP telephone roaming across lightweight access points managed by controllers on different subnets, as long as the controllers are in the same mobility group. This roaming is transparent to the VoIP telephone because the session is sustained and a tunnel between controllers allows the VoIP telephone to continue using the same DHCP-assigned IP address as long as the session remains active. The tunnel is torn down, and the VoIP client must reauthenticate when the VoIP telephone sends a DHCP Discover with a 0.0.0.0 VoIP telephone IP address or a 169.254.*.* VoIP telephone auto-IP address or when the operator-set user timeout is exceeded.
CCX Layer 2 Client Roaming
The controller supports five CCX Layer 2 client roaming enhancements:
· Access point assisted roaming--This feature helps clients save scanning time. When a CCXv2 client associates to an access point, it sends an information packet to the new access point listing the characteristics of its previous access point. Roaming time decreases when the client recognizes and uses an access point list built by compiling all previous access points to which each client was associated and sent (unicast) to the client immediately after association. The access point list contains the channels, BSSIDs of neighbor access points that support the client's current SSID(s), and time elapsed since disassociation.
· Enhanced neighbor list--This feature focuses on improving a CCXv4 client's roam experience and network edge performance, especially when servicing voice applications. The access point provides its associated client information about its neighbors using a neighbor-list update unicast message.
· Enhanced neighbor list request (E2E)--The End-2-End specification is a Cisco and Intel joint program that defines new protocols and interfaces to improve the overall voice and roaming experience. It applies only to Intel clients in a CCX environment. Specifically, it enables Intel clients to request a neighbor list at will. When this occurs, the access point forwards the request to the controller. The controller receives the request and replies with the current CCX roaming sublist of neighbors for the access point to which the client is associated.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1881

How to Configure Layer 2 or Layer 3 Roaming

System Management

Note To see whether a particular client supports E2E, choose Wireless > Clients on the controller GUI, click the Detail link for the desired client, and look at the E2E Version text box in the Client Properties area.
· Roam reason report--This feature enables CCXv4 clients to report the reason why they roamed to a new access point. It also allows network administrators to build and monitor a roam history.
· Directed roam request--This feature enables the controller to send directed roam requests to the client in situations when the controller can better service the client on an access point different from the one to which it is associated. In this case, the controller sends the client a list of the best access points that it can join. The client can either honor or ignore the directed roam request. Non-CCX clients and clients running CCXv3 or below must not take any action. No configuration is required for this feature.

How to Configure Layer 2 or Layer 3 Roaming

Configuring Layer 2 or Layer 3 Roaming
Before you begin To configure the mobility agent for Layer 2 or Layer 3 roaming, the following requisites should be considered:
· SSID and security polices should be same across MAs for Layer 2 and Layer 3 roaming. · Client VLAN ID should be same for Layer 2 roaming and different for Layer 3 roaming. · Bridge domain ID and client VLAN IDs should be same for Layer 2 roaming. Either one or both of the
bridge domain ID and client VLAN ID should be different for Layer 3 roaming.

SUMMARY STEPS

1. configure terminal 2. wlan wlan_profile_name wlan_ID SSID_network_name 3. no mobility anchor sticky 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

wlan wlan_profile_name wlan_ID SSID_network_name Example:
Switch(config)#wlan wlan1

Enters WLAN configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1882

System Management

Configuring CCX Client Roaming Parameters (CLI)

Step 3 Step 4

Command or Action no mobility anchor sticky Example:
Switch(config-wlan)#no mobility anchor sticky
end Example:
Switch(config)# end

Purpose (Optional) Disables Layer 2 anchoring.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring CCX Client Roaming Parameters (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 {5ghz | 24ghz} l2roam rf-params {default | custom min-rssi roam-hyst scan-thresh trans-time} 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 {5ghz | 24ghz} l2roam rf-params {default | custom min-rssi roam-hyst scan-thresh trans-time}
Example:

Configures CCX Layer 2 client roaming parameters.
To choose the default RF parameters, enter the default option.

Switch#ap dot11 5ghz l2roam rf-params custom -80 To fine-tune the RF parameters that affect client roaming, enter the custom option and then enter any one of the following options:

· Minimum RSSI--Indicates minimum Received Signal Strength Indicator (RSSI) required for the client to associate to an access point.

If the client's average received signal power dips below this threshold, reliable communication is usually impossible. Therefore, clients must already have found and roamed to another access point with a stronger signal before the minimum RSSI value is reached.

You can configure the minimum RSSI range from ­80 through ­90 dBm and the default is ­85 dBm.

· Hysteresis--Indicates how much greater the signal strength of a neighboring access point must be for the client to roam to it.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1883

Configuring CCX Client Roaming Parameters (CLI)
Command or Action

Step 3

end Example:
Switch(config)# end

System Management
Purpose This parameter is intended to reduce the amount of roaming between access points if the client is physically located on or near the border between two access points.
You can configure the hysteresis range from 3 through 20 dB and the default is 3 dB.
· Scan Threshold--Indicates a minimum RSSI that is allowed before the client should roam to a better access point.
When the RSSI drops below the specified value, the client must be able to roam to a better access point within the specified transition time. This parameter also provides a power-save method to minimize the time that the client spends in active or passive scanning. For example, the client can scan slowly when the RSSI is above the threshold and scan more rapidly when the RSSI is below the threshold.
You can configure the RSSI range from ­70 through ­77 dBm and the default value is ­72 dBm.
· Transition Time--Indicates the maximum time allowed for the client to detect a suitable neighboring access point to roam to and to complete the roam, whenever the RSSI from the client's associated access point is below the scan threshold.
The Scan Threshold and Transition Time parameters guarantee a minimum level of client roaming performance. Together with the highest expected client speed and roaming hysteresis, these parameters make it possible to design a wireless LAN network that supports roaming simply by ensuring a certain minimum overlap distance between access points.
You can configure the time period in the range from 1 through 10 seconds and the default time is 5 seconds.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1884

System Management

Configuring Mobility Oracle

Example

Configuring Mobility Oracle

SUMMARY STEPS

1. configure terminal 2. wireless mobility oracle 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wireless mobility oracle Example:
Switch(config)# wireless mobility oracle

Step 3

end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Enables mobility oracle on the controller.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example

Configuring Mobility Controller

SUMMARY STEPS

1. configure terminal 2. wireless mobility controller 3. wireless mobility controller peer-group switch-peer-group-name 4. wireless mobility controller peer-group switch-peer-group-name member ip ip-address {public-ip
public-ip-address} 5. wireless mobility controller peer-group switch-peer-group-name multicast 6. wireless mobility controller peer-group switch-peer-group-name multicast ip
peer-group-multicast-ip-addr 7. wireless mobility controller peer-groupswitch-peer-group-name bridge-domain-id id 8. wireless mobility group member ip ip-address [public-ip public-ip-address] [group group-name] 9. wireless mobility dscp value

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1885

Configuring Mobility Controller

System Management

10. wireless mobility group keepalive {count | interval} 11. wireless mobility group name name 12. wireless mobility oracle ipmo-ip-address 13. wireless management interface interface-name 14. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wireless mobility controller Example:
Switch(config)# wireless mobility controller

Step 3

wireless mobility controller peer-group switch-peer-group-name
Example:
Switch(config)# wireless mobility controller peer-group SPG1

Purpose Enters global configuration mode.
Enables wireless mobility controller.
Configures a switch peer group name. You can enter up to 31 case-sensitive ASCII printable characters for the group name. Spaces are not allowed in mobility group. Note The No form of the command deletes the switch
peer group.

Step 4

wireless mobility controller peer-group

Adds a mobility group member to a switch peer group.

switch-peer-group-name member ip ip-address {public-ip public-ip-address}

Note

The No form of the command deletes the member from the switch peer group.

Example:

Switch(config)# wireless mobility controller peer-group SPG1 member ip 10.0.0.1

Step 5 Step 6

wireless mobility controller peer-group switch-peer-group-name multicast
Example:
Switch(config)# wireless mobility controller peer-group SPG1 multicast
wireless mobility controller peer-group switch-peer-group-name multicast ip peer-group-multicast-ip-addr
Example:
Switch(config)# wireless mobility controller peer-group SPG1 multicast ip 10.0.0.4

Configures the multicast mode within a switch peer group.
Configures the multicast IP address for a switch peer group. Note The No form of the command deletes the
multicast IP for the switch peer group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1886

System Management

Configuring Mobility Controller

Step 7
Step 8
Step 9 Step 10 Step 11 Step 12 Step 13 Step 14

Command or Action

Purpose

wireless mobility controller peer-groupswitch-peer-group-name bridge-domain-id id
Example:
Switch(config)# wireless mobility controller peer-group SPG bridge-domain-id 10.0.0.5

Configures the bridge domain ID for a switch peer group. The default is zero.
Note The No form of command sets the bridge domain ID to the default value.

wireless mobility group member ip ip-address [public-ip Adds a mobility group member.

public-ip-address] [group group-name]

Note The No form of the command removes the

Example:

member from the group. The default group

name is the group name of MC.

Switch(config)# wireless mobility group member ip 10.0.0.1

wireless mobility dscp value Example:
Switch(config)# wireless mobility dscp 46

Sets the DSCP value for mobility control packet.
You can configure the DSCP value in a range from 0 through 63. The default value is 46.

wireless mobility group keepalive {count | interval} Configures the wireless mobility group keepalive count

Example:

which is the number of keepalive retries before a member status is termed DOWN and keepalive interval which is

Switch(config)# wireless mobility group keepalive interval between two keepalives.
count

wireless mobility group name name
Example:
Switch(config)# wireless mobility group name group1

Specifies the case sensitive wireless mobility group name which can be ASCII printable string up to 31 characters.

wireless mobility oracle ipmo-ip-address
Example:
Switch(config)# wireless mobility oracle ip 10.0.0.5

Configures the mobility oracle IP address.

wireless management interface interface-name
Example:
Switch(config)# wireless management interface Vlan21

Configures the wireless management interface.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1887

Configuring Mobility Agent

System Management

Example

Configuring Mobility Agent

SUMMARY STEPS

1. configure terminal 2. wireless mobility controller ip ip-address 3. wireless mobility load-balance 4. wireless mobility load-balance threshold threshold -value 5. wireless management interface interface-name 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

wireless mobility controller ip ip-address
Example:
Switch(config)# wireless mobility controller ip 10.10.10.20

Sets the IP address of the mobility controller.

Step 3

wireless mobility load-balance Example:
Switch(config)# wireless mobility load-balance

Configures wireless mobility load balancing.

Step 4

wireless mobility load-balance threshold threshold -value Configures the number of clients that can be local or

Example:

anchored on the MA. You can configure the threshold value in a range from 100 to 2000. The default value is 1000.

Switch(config)# wireless mobility load-balance

threshold 100

Step 5

wireless management interface interface-name
Example:
Switch(config)# wireless management interface Vlan21

Configures wireless management interface for the mobility agent.

Step 6

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1888

System Management

Monitoring Client Roaming Parameters

Monitoring Client Roaming Parameters

This section describes the new commands for the client parameters. The following commands can be used to monitor the client roaming parameters on the switch.
Table 166: Monitoring Client Roaming Parameters Commands

Command

Purpose

show ap dot11 {5ghz | 24ghz} l2roam rf-param

Displays the current RF parameters configured for client roaming for the 802.11a or 802.11b/g network.

show ap dot11 {5ghz | 24ghz} l2roam statistics Displays the CCX Layer 2 client roaming statistics for the 802.11a or 802.11b/g network.

show ap dot11 {5ghz | 24ghz} l2roam mac-address mac-address statistics

Displays the CCX Layer 2 client roaming statistics for a particular access point.

Monitoring Mobility Configurations

This section describes the new commands for monitoring mobility configurations. The following command can be used to monitor mobility configurations on the Mobility Oracle, Mobility Controller, and Mobility Agent.
Table 167: Monitoring Mobility Configuration Commands on the Mobility Controller and Mobility Agent

Command

Purpose

show wireless mobility summary

Displays the summary information for the Mobility Controller and Mobility Agent.

show wireless mobility statistics

Displays mobility statistics.

show wireless mobility dtls connections Displays established DTLS connections.

Table 168: Monitoring Mobility Configuration Commands on the Mobility Oracle

Command

Purpose

show wireless mobility oracle summary Displays the status of the Mobility Controllers known to the Mobility Oracle.

show wireless mobility oracle client summary

Displays the information of a list of clients in the Mobility Oracle database.

show wireless mobility oracle client detail Displays the detailed information of a particular client in the

client -mac-address

Mobility Oracle database.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1889

Additional References for Configuring Client Roaming

System Management

show wireless mobility oracle mc-ip

Displays the information of a list of clients in the Mobility Oracle database that are anchored or associated to a specified Mobility Controller.

Table 169: Monitoring Mobility Configuration Commands on the Mobility Controller

Command

Purpose

show wireless mobility controller client summary Displays a list of clients in the subdomain.

show wireless mobility controller client mac-address detail
show wireless mobility agent ma-ip client summary

Displays detailed information for a client in a subdomain.
Displays a list of clients anchored or associated to a specified Mobility Agent.

show wireless mobility ap-list

Displays the list of Cisco APs known to the mobility group.

Table 170: Monitoring Mobility Configuration Commands on the Mobility Agent

Command

Purpose

show wireless mobility load-balance summary Displays the summary of mobility load-balance properties.

Additional References for Configuring Client Roaming

Related Documents Related Topic Mobility configuration
Mobility-related commands

Document Title
Mobility Configuration Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)
Mobility Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1890

System Management

Feature History and Information For Performing Client Roaming Configuration

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For Performing Client Roaming Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1891

Feature History and Information For Performing Client Roaming Configuration

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1892

9 4 C H A P T E R
Configuring Application Visibility and Control
· Finding Feature Information, on page 1893 · Information About Application Visibility and Control, on page 1893 · Supported AVC Class Map and Policy Map Formats, on page 1894 · Prerequisites for Application Visibility and Control, on page 1896 · Guidelines for Inter-Switch Roaming with Application Visibility and Control, on page 1896 · Restrictions for Application Visibility and Control, on page 1897 · How to Configure Application Visibility and Control, on page 1897 · Monitoring Application Visibility and Control, on page 1914 · Examples: Application Visibility and Control, on page 1917 · Additional References for Application Visibility and Control, on page 1920 · Feature History and Information For Application Visibility and Control, on page 1921
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Application Visibility and Control
Application Visibility and Control (AVC) classifies applications using deep packet inspection techniques with the Network-Based Application Recognition engine, and provides application-level visibility and control (QoS) in wireless networks. After the applications are recognized, the AVC feature enables you to either drop, mark, or police the data traffic. AVC is configured by defining a class map in a QoS client policy to match a protocol. Using AVC, we can detect more than 1000 applications. AVC enables you to perform real-time analysis and create policies to reduce network congestion, costly network link usage, and infrastructure upgrades.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1893

Supported AVC Class Map and Policy Map Formats

System Management

Note You can view list of 30 applications in Top Applications in Monitor Summary section of the UI.
Traffic flows are analyzed and recognized using the NBAR2 engine at the access point. Refer to 8.0 protocol pack for the NBAR2-supported protocols or applications. The specific flow is marked with the recognized protocol or application, such as WebEx. This per-flow information can be used for application visibility using Flexible NetFlow (FNF). For more information on FNF, see the Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3E (Cisco WLC 5700 Series). The same application name can also be used for control of traffic using QoS. For more information on QoS, see the QoS Configuration Guide, Cisco IOS XE Release 3E (Cisco WLC 5700 Series).
AVC QoS actions are applied with AVC filters in both upstream and downstream directions. The QoS actions supported for upstream flow are drop, mark, and police, and for downstream flow are mark and police. AVC QoS is applicable only when the application is classified correctly and matched with the class map filter in the policy map. For example, if the policy has a filter based on an application name, and the traffic has also been classified to the same application name, then the action specified for this match in the policy will be applied. For all QoS actions, refer Supported AVC Class Map and Policy Map Formats, on page 1894.

Supported AVC Class Map and Policy Map Formats

Supported AVC Class Map Format

Class Map Format match protocol protocol name

Class Map Example
class-map match-any webex-class match protocol webex-media

Direction Both upstream and downstream

match protocol attribute category class-map match-any IM

category-name

match protocol attribute category instant-messaging

Both upstream and downstream

match protocol attribute

class-map match-any

Both upstream and downstream

sub-category sub-category-name realtimeconferencing
match protocol attribute

sub-category

voice-video-chat-collaboration

match protocol attribute application-group application-group-name
Combination filters

class-map match-any skype

Both upstream and downstream

match protocol attribute

application-group skype-group

class-map match-any webex-class match protocol webex match dscp 45 match wlan user-priority 6

Upstream only

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1894

System Management

Supported AVC Class Map and Policy Map Formats

Supported AVC Policy Format

Policy Format

QoS Action

Upstream client policy based on match protocol filter Mark, police, and drop

Downstream client policy based on match protocol Mark and police filter

The following table describes the detailed AVC policy format with an example:

AVC Policy Format Basic set

AVC Policy Example

Direction

policy-map webex-policy

Upstream and downstream

class webex-class

set dscp ef //or set up,cos

Basic police

policy-map webex-policy class webex-class police 5000000

Upstream and downstream

Basic set and police

policy-map webex-policy class webex-class set dscp ef //or set up,cos
police 5000000

Upstream and downstream

Multiple set and police including policy-map webex-policy

Upstream and downstream

default

class webex-class set dscp af31 //or set up,cos

police 4000000 class class-webex-category set dscp ef //or set up,cos police 6000000 class class-default set dscp <>

Hierarchical police

policy-map webex-policy class webex-class police 5000000 service-policy
client-in-police-only

Upstream and downstream

policy-map client-in-police-only
class webex-class police 100000 class class-webex-category set dscp ef //or set up,cos police 6000000 police 200000

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1895

Prerequisites for Application Visibility and Control

System Management

AVC Policy Format Hierarchical set and police
Drop action

AVC Policy Example
policy-map webex-policy class class-default police 1500000 service policy
client-up-child policy-map webex-policy class webex-class police 100000 set dscp ef class class-webex-category police 200000 set dscp af31

Direction

Any of the above examples apply Upstream only to this format with this additional example:
policy-map webex-policy class webex-class drop class netflix set dscp ef //or set up,cos police 6000000 class class-default set dscp <>

Prerequisites for Application Visibility and Control
· The access points should be AVC capable. · For the control part of AVC (QoS) to work, the application visibility feature with FNF has to be configured.
Guidelines for Inter-Switch Roaming with Application Visibility and Control
Follow these guidelines to prevent clients from getting excluded due to malformed QoS policies: · When a new QoS policy is added to the switch, a QoS policy with the same name should be added to other switch within the same roam or mobility domain.
· When a switch is loaded with a software image of a later release, the new policy formats are supported. If you have upgraded the software image from an earlier release to a later release, you should save the configuration separately. When an earlier release image is loaded, some QoS policies might show as not supported, and you should restore those QoS policies to supported policy formats.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1896

System Management

Restrictions for Application Visibility and Control

Restrictions for Application Visibility and Control

How to Configure Application Visibility and Control

Configuring Application Visibility and Control (CLI)
To configure Application Visibility, follow these general steps:
1. Create a flow record by specifying keys and non-key fields to the flow. 2. Create an optional flow exporter by specifying the flow record as an option. 3. Create a flow monitor based on the flow record and flow exporter. 4. Configure WLAN to apply flow monitor in IPv4 input or output direction.
To configure Application Control, follow these general steps:
1. Create an AVC QoS policy. 2. Attach AVC QoS policy to the client in one of three ways: configuring WLAN, using ACS or ISE, or
adding local policies.
Creating a Flow Record
By default, wireless avc basic (flow record) is available. When you click Apply from the GUI, then the record is mapped to the flow monitor.
Default flow record cannot be edited or deleted. If you require a new flow record, you need to create one and map it to the flow monitor from CLI.

SUMMARY STEPS

1. configure terminal 2. flow record flow_record_name 3. description string 4. match ipv4 protocol 5. match ipv4 source address 6. match ipv4 destination address 7. match transport source-port 8. match transport destination-port 9. match flow direction 10. match application name 11. match wireless ssid 12. collect counter bytes long 13. collect counter packets long 14. collect wireless ap mac address 15. collect wireless client mac address 16. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1897

Creating a Flow Record

System Management

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

flow record flow_record_name
Example:
Switch(config)# flow record record1 Switch (config-flow-record)#

Enters flow record configuration mode.

Step 3

description string Example:

(Optional) Describes the flow record as a maximum 63-character string.

Switch(config-flow-record)# description IPv4flow

Step 4

match ipv4 protocol

Specifies a match to the IPv4 protocol.

Example:

Switch (config-flow-record)# match ipv4 protocol

Step 5

match ipv4 source address
Example:
Switch (config-flow-record)# match ipv4 source address

Specifies a match to the IPv4 source address-based field.

Step 6

match ipv4 destination address
Example:
Switch (config-flow-record)# match ipv4 destination address

Specifies a match to the IPv4 destination address-based field.

Step 7

match transport source-port
Example:
Switch (config-flow-record)# match transport source-port

Specifies a match to the transport layer source-port field.

Step 8

match transport destination-port
Example:
Switch (config-flow-record)# match transport destination-port

Specifies a match to the transport layer destination-port field.

Step 9

match flow direction Example:

Specifies a match to the direction the flow was monitored in.

Switch (config-flow-record)# match flow direction

Step 10

match application name Example:

Specifies a match to the application name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1898

System Management

Creating a Flow Exporter (Optional)

Step 11 Step 12 Step 13 Step 14 Step 15 Step 16

Command or Action
Switch (config-flow-record)# match application name

Purpose
Note This action is mandatory for AVC support, as this allows the flow to be matched against the application.

match wireless ssid Example:

Specifies a match to the SSID name identifying the wireless network.

Switch (config-flow-record)# match wireless ssid

collect counter bytes long

Specifies to collect counter fields total bytes.

Example:

Switch (config-flow-record)# collect counter bytes long

collect counter packets long

Specifies to collect counter fields total packets.

Example:

Switch (config-flow-record)# collect counter bytes long

collect wireless ap mac address Example:

Specifies to collect the BSSID with MAC addresses of the access points that the wireless client is associated with.

Switch (config-flow-record)# collect wireless ap mac address

collect wireless client mac address
Example:
Switch (config-flow-record)# collect wireless client mac address

Specifies to collect MAC address of the client on the wireless network.
Note The collect wireless client mac address is mandatory configuration for wireless AVC.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Creating a Flow Exporter (Optional)
You can create a flow export to define the export parameters for a flow. This is an optional procedure for configuring flow parameters.

SUMMARY STEPS

1. configure terminal 2. flow exporter flow_exporter_name 3. description string 4. destination {hostname | ip-address} 5. transport udp port-value 6. option application-table timeout seconds (optional) 7. option usermac-table timeout seconds (optional)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1899

Creating a Flow Exporter (Optional)

System Management

8. end 9. show flow exporter 10. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

flow exporter flow_exporter_name
Example:
Switch(config)# flow exporter record1 Switch (config-flow-exporter)#

Enters flow exporter configuration mode.

Step 3

description string Example:

Describes the flow record as a maximum 63-character string.

Switch(config-flow-exporter)# description IPv4flow

Step 4 Step 5 Step 6 Step 7 Step 8 Step 9

destination {hostname | ip-address}
Example:
Switch (config-flow-exporter) # destination 10.99.1.4

Specifies the hostname or IPv4 address of the system to which the exporter sends data.

transport udp port-value

Configures a port value for the UDP protocol.

Example:

Switch (config-flow-exporter) # transport udp 2

option application-table timeout seconds (optional)
Example:
Switch (config-flow-exporter)# option application-table timeout 500

(Optional) Specifies application table timeout option. The valid range is from 1 to 86400 seconds.

option usermac-table timeout seconds (optional)
Example:
Switch (config-flow-exporter)# option usermac-table timeout 1000

(Optional) Specifies wireless usermac-to-username table option. The valid range is from 1 to 86400 seconds.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

show flow exporter Example:
Switch # show flow exporter

Verifies your configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1900

System Management

Creating a Flow Monitor

Step 10

Command or Action end Example:
Switch(config)# end

Purpose
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Creating a Flow Monitor
You can create a flow monitor and associate it with a flow record and a flow exporter.

SUMMARY STEPS

1. configure terminal 2. flow monitor monitor-name 3. description description 4. record record-name 5. exporter exporter-name 6. cache timeout {active | inactive} (Optional) 7. end 8. show flow monitor

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

flow monitor monitor-name Example:
Switch (config)# flow monitor flow-monitor-1

Creates a flow monitor and enters flow monitor configuration mode.

Step 3

description description
Example:
Switch (config-flow-monitor)# description flow-monitor-1

Creates a description for the flow monitor.

Step 4

record record-name

Specifies the name of a recorder that was created previously.

Example:

Switch (config-flow-monitor)# record flow-record-1

Step 5

exporter exporter-name
Example:
Switch (config-flow-monitor)# exporter flow-exporter-1

Specifies the name of an exporter that was created previously.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1901

Creating AVC QoS Policy

System Management

Step 6
Step 7 Step 8

Command or Action

Purpose

cache timeout {active | inactive} (Optional)

Specifies to configure flow cache parameters. You can

Example:

configure for a time period of 1 to 604800 seconds (optional).

Switch (config-flow-monitor)# cache timeout active

1800

Note

To achieve optimal result for the AVC flow

Switch (config-flow-monitor)# cache timeout inactive 200

monitor, we recommend you to configure the inactive cache timeout value to be greater than 90 seconds.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

show flow monitor Example:
Switch # show flow monitor

Verifies your configuration.

Creating AVC QoS Policy
To create AVC QoS policy, perform these general steps: 1. Create a class map with match protocol filters. 2. Create a policy map. 3. Apply a policy map to the client in one of the following ways:
a. Apply a policy map over WLAN either from the CLI or GUI. b. Apply a policy map through the AAA server (ACS server or ISE) from the CLI.
For more information, refer to the Cisco Identity Services Engine User Guide and Cisco Secure Access Control System User Guide. c. Apply local policies either from the CLI or GUI.

Creating a Class Map
You need to create a class map before configuring any match protocol filter. The QoS actions such as marking, policing, and dropping can be applied to the traffic. The AVC match protocol filters are applied only for the wireless clients. Refer 8.0 protocol pack for the protocols supported.

SUMMARY STEPS

1. configure terminal 2. class-map class-map-name 3. match protocol {application-name | attribute category category-name | attribute sub-category
sub-category-name | attribute application-group application-group-name} 4. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1902

System Management

Creating a Policy Map

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

class-map class-map-name Example:
Switch(config)# class-map webex-class

Creates a class map.

Step 3

match protocol {application-name | attribute category Specifies match to the application name, category name,

category-name | attribute sub-category

subcategory name, or application group.

sub-category-name | attribute application-group

application-group-name}

Example:

Switch(config)# class-map webex-class Switch(config-cmap)# match protocol webex-media

Switch(config)# class-map class-webex-category Switch(config-cmap)# match protocol attribute category webex-media

Switch# class-map class-webex-sub-category Switch(config-cmap)# match protocol attribute sub-category webex-media

Step 4

Switch# class-map class-webex-application-group Switch(config-cmap)# match protocol attribute application-group webex-media

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Creating a Policy Map

SUMMARY STEPS

1. configure terminal 2. policy-map policy-map-name 3. class [class-map-name | class-default] 4. police rate-bps burst-byte [exceed-action {drop | policed-dscp-transmit}] 5. set {dscp new-dscp | cos cos-value} 6. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1903

Creating a Policy Map

System Management

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

policy-map policy-map-name Example:

Switch(config)# policy-map webex-policy Switch(config-pmap)#

Purpose Enters global configuration mode.
Creates a policy map by entering the policy map name, and enters policy-map configuration mode. By default, no policy maps are defined. The default behavior of a policy map is to set the DSCP to 0 if the packet is an IP packet and to set the CoS to 0 if the packet is tagged. No policing is performed. Note To delete an existing policy map, use the no
policy-map policy-map-name global configuration command.

Step 3

class [class-map-name | class-default] Example:
Switch(config-pmap)# class-map webex-class Switch(config-pmap-c)#

Defines a traffic classification, and enters policy-map class configuration mode.
By default, no policy map and class maps are defined.
If a traffic class has already been defined by using the class-map global configuration command, specify its name for class-map-name in this command.
A class-default traffic class is predefined and can be added to any policy. It is always placed at the end of a policy map. With an implied match any is included in the class-default class, all packets that have not already matched the other traffic classes will match class-default.
Note To delete an existing class map, use the no class class-map-name policy-map configuration command.

Step 4

police rate-bps burst-byte [exceed-action {drop | policed-dscp-transmit}] Example:
Switch(config-pmap-c)# police 100000 80000 drop

Defines a policer for the classified traffic.
By default, no policer is defined.
· For rate-bps, specify an average traffic rate in bits per second (b/s). The range is 8000 to 10000000000.
· For burst-byte, specify the normal burst size in bytes. The range is 8000 to 1000000.

· (Optional) Specifies the action to take when the rates are exceeded. Use the exceed-action drop keywords to drop the packet. Use the exceed-action policed-dscp-transmit keywords to mark down the DSCP value (by using the policed-DSCP map) and to send the packet.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1904

System Management

Configuring Local Policies (CLI)

Step 5

Command or Action set {dscp new-dscp | cos cos-value} Example:
Switch(config-pmap-c)# set dscp 45

Step 6

end Example:
Switch(config)# end

Purpose Classifies IP traffic by setting a new value in the packet.
· For dscp new-dscp, enter a new DSCP value to be assigned to the classified traffic. The range is 0 to 63.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

What to do next After creating your policy maps, attach the traffic policy or polices to an interface using the service-policy command.
Configuring Local Policies (CLI)
Configuring Local Policies (CLI) To configure local policies, complete these procedures: 1. Create a service template. 2. Create an interface template. 3. Create a parameter map. 4. Create a policy map. 5. Apply a local policy on a WLAN.
Creating a Service Template (CLI)

SUMMARY STEPS

1. configure terminal 2. service-template service-template-name 3. access-group acl_list 4. vlan vlan_id 5. absolute-timer seconds 6. service-policy qos {input | output} 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1905

Creating a Parameter Map (CLI)

System Management

Step 2 Step 3 Step 4 Step 5

Command or Action service-template service-template-name Example:

Purpose Enters service template configuration mode.

Switch(config)# service-template cisco-phone-template Switch(config-service-template)#
access-group acl_list Example:

Specifies the access list to be applied.

Switch(config-service-template)# access-group foo-acl
vlan vlan_id Example:

Specifies VLAN ID. You can specify a value from 1 to 4094.

Switch(config-service-template)# vlan 100
absolute-timer seconds Example:

Specifies session timeout value for service template. You can specify a value from 1 to 65535.

Switch(config-service-template)# absolute-timer 20

Step 6 Step 7

service-policy qos {input | output} Example:

Configures QoS policies for the client.

Switch(config-service-template)# service-policy qos input foo-qos

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Creating a Parameter Map (CLI) Parameter map is preferred to use than class map.

SUMMARY STEPS

1. configure terminal 2. parameter-map type subscriber attribute-to-service parameter-map-name 3. map-index map { device-type | mac-address | oui | user-role | username} {eq | not-eq | regex
filter-name } 4. interface-template interface-template-name 5. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1906

System Management

Creating a Policy Map (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

parameter-map type subscriber attribute-to-service parameter-map-name
Example:

Purpose Enters global configuration mode.
Specifies the parameter map type and name.

Step 3

Switch(config)# parameter-map type subscriber attribute-to-service Aironet-Policy-para
map-index map { device-type | mac-address | oui | Specifies parameter map attribute filter criteria. user-role | username} {eq | not-eq | regex filter-name }
Example:

Step 4

Switch(config-parameter-map-filter)# 10 map device-type eq "WindowsXP-Workstation"
interface-template interface-template-name Example:

Enters service template configuration mode.

Step 5

Switch(config-parameter-map-filter-submode)# interface-template cisco-phone-template Switch(config-parameter-map-filter-submode)#
end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Creating a Policy Map (CLI)

SUMMARY STEPS

1. configure terminal 2. policy-map type control subscriber policy-map-name 3. event identity-update {match-all | match-first} 4. class_number class {class_map_name | always } {do-all | do-until-failure | do-until-success} 5. action-index map attribute-to-service table parameter-map-name 6. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1907

Applying a Local Policy for a Device on a WLAN (CLI)

System Management

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

policy-map type control subscriber policy-map-name Example:

Purpose Enters global configuration mode.
Specifies the policy map type.

Step 3

Switch(config)# policy-map type control subscriber Aironet-Policy

event identity-update {match-all | match-first} Example:

Specifies match criteria to the policy map.

Step 4 Step 5

Switch(config-policy-map)# event identity-update match-all

class_number class {class_map_name | always } {do-all | do-until-failure | do-until-success} Example:
Switch(config-class-control-policymap)# 1 class local_policy1_class do-until-success

Configures the local profiling policy class map number and specifies how to perform the action. The class map configuration mode includes the following command options:
· always--Executes without doing any matching but return success.
· do-all--Executes all the actions. · do-until-failure--Execute all the actions until any
match failure is encountered. This is the default value. · do-until-success--Execute all the actions until any
match success happens.

action-index map attribute-to-service table parameter-map-name
Example:

Specifies parameter map table to be used.

Step 6

Switch(config-policy-map)# 10 map attribute-to-service table Aironet-Policy-para
end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Applying a Local Policy for a Device on a WLAN (CLI)
Before you begin If the service policy contains any device type-based rules in the parameter map, ensure that the device classifier is already enabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1908

System Management

Applying a Local Policy for a Device on a WLAN (CLI)

Note You should use the device classification command to classify the device for it to be displayed correctly on the show command output.

SUMMARY STEPS

1. configure terminal 2. wlan wlan-name 3. service-policy type control subscriber policymapname 4. profiling local http (optional) 5. profiling radius http (optional) 6. no shutdown 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan wlan-name Example:

Purpose Enters global configuration mode.
Enters WLAN configuration mode.

Step 3 Step 4 Step 5 Step 6 Step 7

Switch(config)# wlan wlan1

service-policy type control subscriber policymapname Applies local policy to WLAN.
Example:
Switch(config-wlan)# service-policy type control subscriber Aironet-Policy

profiling local http (optional) Example:
Switch(config-wlan)# profiling local http

Enables only profiling of devices based on HTTP protocol (optional).

profiling radius http (optional) Example:
Switch(config-wlan)# profiling radius http

Enables profiling of devices on ISE (optional).

no shutdown Example:
Switch(config-wlan)# no shutdown

Specifies not to shut down the WLAN.

end Example:

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1909

Configuring Local Policies (GUI)

System Management

Command or Action
Switch(config)# end

Purpose

Configuring Local Policies (GUI)
Configuring Local Policies (GUI) To configure local policies, complete these procedures: 1. Create a service template. 2. Create a policy map. 3. Apply a local policy that you have created to a WLAN.
Creating a Service Template (GUI)

Step 1 Step 2
Step 3
Step 4

Choose Configuration > Security > Local Policies > Service Template to open the Service Template page. Create a new template as follows: a) Click New to open the Service Template > New page. b) In the Service Template name text box, enter the new service template name. c) In the VLAN ID text box, enter the VLAN identifier that has to be associated with the policy. The value ranges from
1 to 4094. d) In the Session timeout text box, enter the maximum amount of time, in seconds, after which a client is forced to
reauthenticate. The value ranges from 1 to 65535 seconds. e) From the Access control list drop-down list, choose the access control list to be mapped to the policy. f) From the Ingress QoS drop-down list, choose the ingress QoS policy to be applied. g) From the Egress QoS drop-down list, choose the egress QoS policy to be applied. h) Click Apply to save the configuration.
Edit a service template as follows: a) From the Service Template page, click the service template to open the Service Template > Edit page. b) In the VLAN ID text box, enter the VLAN identifier that has to be associated with the policy. The value ranges from
1 to 4094. c) In the Session timeout text box, enter the maximum amount of time, in seconds, after which a client is forced to
reauthenticate. The value ranges from 1 to 65535 seconds. d) From the Access control list drop-down list, choose the access control list to be mapped to the policy. e) From the Ingress QoS drop-down list, choose the ingress QoS policy to be applied. f) From the Egress QoS drop-down list, choose the egress QoS policy to be applied. g) Click Apply to save the configuration.
Remove a service template as follows: a) From the Service Template page, select the service template. b) Click Remove. c) Click Apply to save the configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1910

System Management

Creating a Policy Map (GUI)

Creating a Policy Map (GUI)

Step 1 Step 2
Step 3
Step 4

Choose Configuration > Security > Local Policies > Policy Map to open the Policy Map page.
Create a new policy map as follows:
a) Click New to open the Policy Map > New page. b) In the Policy Map name text box, enter the new policy map name. c) Click Add to open the Match Criteria area. d) From the Device Type drop-down list, choose the device type. The match criteria for the device type can be eq, not-eq,
or regex with respect to the device type you are choosing. e) From the User Role drop-down list, select the match criteria as eq, not-eq, or regex and enter the user type or user
group of the user, for example, student, teacher, and so on. f) From the Service Template drop-down list, choose the service template to be mapped to the policy. g) Click Add. The match criteria is added to the Match Criteria Lists. h) In the Match Criteria Lists area, click Add to add the match criteria to the policy. i) Click Apply to save the configuration.
Edit a policy map as follows:
a) In the Policy Map page, select the policy map that you want to edit, and click Edit to open the Policy Map > Edit page.
b) In the Match Criteria area, choose the device type from the Device Type drop-down list. The match criteria for the device type can be eq, not-eq, or regex with respect to the device type you are choosing.
c) In the Match Criteria area, choose the user role from the User Role drop-down list. Select the match criteria as eq, not-eq, or regex and enter the user type or user group of the user
d) From the Service Template drop-down list, choose the service template to be mapped to the policy. e) Click Ok to save the configuration or Cancel to discard the configuration. f) Click Add to add more match criteria based on device type, user role, and service template to the policy. g) In the Match Criteria Lists area, select the match criteria and click Move to to move the match criteria with respect
to a value entered in the row text box. h) Select the match criteria and click Move up to move the match criteria up in the list. i) Select the match criteria and click Move down to move the match criteria down in the list. j) Select the match criteria and click Remove to remove the match criteria from the policy map list. k) Click Apply to save the configuration.
Remove a policy map as follows:
a) From the Policy Map page, select the policy map. b) Click Remove. c) Click Apply to save the configuration.

Applying Local Policies to WLAN (GUI)

Step 1 Step 2 Step 3 Step 4 Step 5

Choose Configuration > Wireless > WLAN to open the WLANs page. Click the corresponding WLAN profile. The WLANs > Edit page is displayed. Click the Policy-Mapping tab. Check the Device Classification check box to enable classification based on device type. From the Local Subscriber Policy drop-down list, choose the policy that has to be applied for the WLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1911

Configuring WLAN to Apply Flow Monitor in IPV4 Input/Output Direction

System Management

Step 6 Step 7 Step 8

Select Local HTTP Profiling to enable profiling on devices based on HTTP (optional). Select Radius HTTP Profiling to enable profiling on devices based on RADIUS (optional). Click Apply to save the configuration.

Configuring WLAN to Apply Flow Monitor in IPV4 Input/Output Direction

SUMMARY STEPS

1. configure terminal 2. wlan wlan-id 3. ip flow monitor monitor-name {input | output} 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan wlan-id Example:

Step 3

Switch (config) # wlan 1
ip flow monitor monitor-name {input | output} Example:

Step 4

Switch (config-wlan) # ip flow monitor flow-monitor-1 input
end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Enters WLAN configuration submode. For wlan-id, enter the WLAN ID. The range is 1 to 64.
Associates a flow monitor to the WLAN for input or output packets.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Application Visibility and Control (GUI)
Configuring Application Visibility (GUI)
You can apply the default flow record (wireless avc basic) to the default flow monitor (wireless-avc-basic). If you are using the flow record and flow monitor you have created, then the record name and monitor name should be same. This is specific only for configuring AVC from GUI and not for the CLI configuration. You can use the flow monitor you have created either for upstream or downstream, or both, but ensure that you use the same record name while mapping with the flow monitor.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1912

System Management

Configuring Application Visibility and Control (GUI)

Step 1 Step 2
Step 3 Step 4

Choose Configuration > Wireless > WLAN.
The WLAN page appears.
Click on the corresponding WLAN ID to open the WLAN > Edit page and click AVC.
The Application Visibility page appears.
a) Select the Application Visibility Enabled check box to enable AVC on a WLAN. b) In the Upstream Profile text box, enter the name of the AVC profile. c) In the Downstream Profile text box, enter the name of the AVC profile.
To enable AVC, you need to enter the profile names for the upstream and downstream profiles. The profile names are the flow monitor names. By default, the flow monitor names (wireless-avc-basic) appear in the Upstream Profile and Downstream Profile text boxes. For the default flow monitor, the default flow record (wireless avc basic) will be taken. The default flow record is generated by the system and is available.
You can change the profile names for the upstream and downstream profiles but ensure that the same flow records are available for the flow monitors.
The upstream and downstream profiles can have different profile names but there should be flow records available for the flow monitors.
Click Apply to apply AVC on the WLAN. To disable AVC on a specific WLAN, perform the following steps:
· Choose Configuration > Wireless > WLAN to open the WLAN page. · Click on the corresponding WLAN ID to open the WLAN > Edit page. · Click AVC to open the Application Visibility page. · Uncheck the Application Visibility Enabled check box. · Click Apply to disable AVC on the specific WLAN.

Configuring Application Visibility and Control (GUI)

Step 1 Step 2
Step 3
Step 4 Step 5

Choose Configuration > Wireless. Expand the QoS node by clicking the left pane and choosing QOS-Policy. The QOS-Policy page is displayed.
Click Add New to create a new QoS Policy. The Create QoS Policy page is displayed.
Select Client from the Policy Type drop-down list. Select the direction into which the policy needs to be applied from the Policy Direction drop-down list. The available options are:
· Ingress · Egress

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1913

Monitoring Application Visibility and Control

System Management

Step 6 Step 7 Step 8
Step 9 Step 10 Step 11 Step 12

In the Policy Name text box, specify a policy name. In the Description text box, provide a description to the policy. Check the Enable Application Recognition check box to configure the AVC class map for a client policy.
Note For an egress client policy, when you enable Application Recognition, the Voice, Video, and User Defined check boxes are disabled.
The following options are available:
· Trust--Specify a classification type for this policy.
· Protocol--Allows you to choose the protocols and configure the marking and policing of the packets. · Category--Allows you to choose the category of the application, for example, browsing. · Subcategory--Allows you to choose the subcategory of the application, for example, file-sharing. · Application-Group--Allows you to choose the application group, for example, ftp-group.
· Protocol Choice--Choose the protocols, category, subcategory, or application group from the Available Protocols list into the Assigned Protocols to apply the marking and policing of the packets.
· Mark--Specify the marking label for each packet. The following options are available:
· DSCP--Assigns a label to indicate the given quality of service. The range is from 0 to 63. · CoS--Matches IEEE 802.1Q class of service. The range is from 0 to 7. · None--Does not mark the packets.
· Police (kbps)--Specify the policing rate in kbps. This option is available when the Policy Direction is egress. · Drop--Specify to drop the ingress packets that correspond to the chosen protocols.
Note You can add a maximum of five AVC classes for each client policy.
Click Add to create an AVC class map. The new class map is listed in a tabular format. Click Apply to create an AVC QoS policy. Click the QoS policy link in the QOS-Policy page to edit the QoS policy. The QOS-Policy > Edit page is displayed. Make changes and click Apply to commit your changes. Remove an AVC class map from the QoS policy by navigating to the corresponding AVC class map row in the AVC class map table and clicking Remove. Click Apply to commit your changes.

Monitoring Application Visibility and Control

Monitoring Application Visibility and Control (CLI)
This section describes the new commands for application visibility. The following commands can be used to monitor application visibility on the switch and access points.
Table 171: Monitoring Application Visibility Commands on the switch

Command

Purpose

show avc client client-mac top n application Displays information about top "N" applications for the [aggregate | upstream | downstream] given client MAC.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1914

System Management

Monitoring Application Visibility and Control (CLI)

show avc wlan ssid top n application [aggregate | upstream | downstream]

Displays information about top "N" applications for the given SSID.

avc top user[enable | disable]

Enables or disables the information about top "N" application.

show avc wlan wlan-id application app name Displays to know network usage information on a per user topN [aggregate | upstream | downstream] basis within an application.
Note On Catalyst 4500E Supervisor Engine 8-E, in the information about top N users that is displayed, the client's MAC address and username are not displayed. This issue occurs only within 90 seconds after the client is disconnected.

show wlan id wlan-id

Displays information whether AVC is enabled or disabled on a particular WLAN.

show flow monitor flow_monitor_name cache Displays information about flow monitors.

show wireless client mac-address mac-address Displays information about policy mapped to the wireless

service-policy { input | output }

clients.

show ip nbar

Displays the statistics gathered by the NBAR Protocol

protocol-discovery[interfaceinterface-type Discovery feature.

interface-number] [stats{byte-count | bit-rate | packet-count | max-bit-rate}] [protocolprotocol-name | top-nnumber]

· (Optional) Enter keywords and arguments to fine-tune the statistics displayed. For more information on each of the keywords, refer to the show ip nbar

protocol-discoverycommand in Cisco IOS Quality of

Service Solutions Command Reference.

Note When you configure NBAR, you must enable Protocol Discovery on the interface.

show policy-map target show policy-map show policy-map policy-name show policy-map interfaceinterface-type interface-number

Displays information about policy map.

Table 172: Clearing Application Visibility Statistics Commands

Command

Purpose

clear avc client mac stats

Clears the statistics per client.

clear avc wlan wlan-name stats Clears the statistics per WLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1915

Monitoring Application Visibility and Control (GUI)

System Management

Monitoring Application Visibility and Control (GUI)
You can view AVC information on a WLAN in a single shot using a AVC on WLAN pie chart on the Home page of the switch. The pie chart displays the AVC data (Aggregate - Application Cumulative usage %) of the first WLAN. In addition, the top 5 WLANs based on clients are displayed first. Click on any one of the WLANs to view the corresponding pie chart information. If AVC is not enabled on the first WLAN, then the Home page does not display the AVC pie chart.

Step 1 Step 2

Choose Monitor > Controller > AVC > WLANs. The WLANs page appears.
Click the corresponding WLAN profile. The Application Statistics page appears. From the Top Applications drop-down list, choose the number of top applications you want to view and click Apply. The valid range is between 5 to 30, in multiples of 5. a) On the Aggregate, Upstream, and Downstream tabs, you can view the application cumulative and last 90 seconds
statistics and usage percent with the following fields: · Application name · Packet count · Byte count · Average packet size · usage (%)

Step 3 Step 4

Choose Monitor > Clients > Client Details > Clients. The Clients page appears.
Click Client MAC Address and then click AVC Statistics tab. The Application Visibility page appears. a) On the Aggregate, Upstream, and Downstream tabs, you can view the application cumulative and last 90 seconds
statistics and usage percent with the following fields: · Application name · Packet count · Byte count · Average packet size · usage (%)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1916

System Management

Monitoring SSID and Client Policies Statistics (GUI)

Monitoring SSID and Client Policies Statistics (GUI)

Statistics are supported only for ingress policies with a maximum of five classes on wireless targets. For very large policies, statistics for ingress policies are not visible at the switch. The frequency of the statistics depends on the number of clients associated with the access point.

Type of Statistics SSID Policies

Method

Details

Choose Monitor > Controller > The QoS page is displayed with a

Statistics > QoS.

list of SSID policies, Radio Type,

and AP.

Choose an SSID policy, radio, and access point from the drop-down lists and click Apply to view the statistics of the chosen SSID policy.

You can view details such as match criteria, confirmed bytes, conformed rate, and exceeded rate.

Client Policies

Choose Monitor > Clients > Client Details .

The Clients page is displayed with a list of client MAC addresses, AP, and other details.
Click the MAC address of a client and click the QoS Statistics tab.
You can view details such as match criteria, confirmed bytes, conformed rate, and exceeded rate.

Examples: Application Visibility and Control
Examples: Application Visibility Configuration
This example shows how to create a flow record, create a flow monitor, apply the flow record to the flow monitor, and apply the flow monitor on a WLAN:
Switch# configure terminal Switch(config)# flow record fr_v4 Switch(config-flow-record)# match ipv4 protocol Switch(config-flow-record)# match ipv4 source address Switch(config-flow-record)# match ipv4 destination address Switch(config-flow-record)# match transport destination-port Switch(config-flow-record)# match flow direction Switch(config-flow-record)# match application name Switch(config-flow-record)# match wireless ssid Switch(config-flow-record)# collect counter bytes long Switch(config-flow-record)# collect counter packets long Switch(config-flow-record)# collect wireless ap mac address Switch(config-flow-record)# collect wireless client mac address

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1917

Examples: Application Visibility and Control QoS Configuration

System Management

Switch(config)#end
Switch# configure terminal Switch# flow monitor fm_v4 Switch(config-flow-monitor)# record fr_v4 Switch(config-flow-monitor)# cache timeout active 1800 Switch(config)#end
Switch(config)#wlan wlan1 Switch(config-wlan)#ip flow monitor fm_v4 input Switch(config-wlan)#ip flow mon fm-v4 output Switch(config)#end
Examples: Application Visibility and Control QoS Configuration
This example shows how to create class maps with apply match protocol filters for application name, category, and subcategory:
Switch# configure terminal Switch(config)# class-map cat-browsing Switch(config-cmap)# match protocol attribute category browsing Switch(config-cmap)#end
Switch# configure terminal Switch(config)# class-map cat-fileshare Switch(config-cmap)# match protocol attribute category file-sharing Switch(config-cmap)#end
Switch# configure terminal Switch(config)# class-map match-any subcat-terminal Switch(config-cmap)# match protocol attribute sub-category terminal Switch(config-cmap)#end
Switch# configure terminal Switch(config)# class-map match-any webex-meeting Switch(config-cmap)# match protocol webex-meeting Switch(config-cmap)#end
This example shows how to create policy maps and define existing class maps for upstream QoS:
Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class cat-browsing Switch(config-pmap-c)# police 150000 Switch(config-pmap-c)# set dscp 12 Switch(config-pmap-c)#end
Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class cat-fileshare Switch(config-pmap-c)# police 1000000 Switch(config-pmap-c)# set dscp 20 Switch(config-pmap-c)#end
Switch# configure terminal Switch(config)# policy-map test-avc-up

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1918

System Management

Examples: Application Visibility and Control QoS Configuration

Switch(config-pmap)# class subcat-terminal Switch(config-pmap-c)# police 120000 Switch(config-pmap-c)# set dscp 15 Switch(config-pmap-c)#end
Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class webex-meeting Switch(config-pmap-c)# police 50000000 Switch(config-pmap-c)# set dscp 21 Switch(config-pmap-c)#end
This example shows how to create policy maps and define existing class maps for downstream QoS:
Switch# configure terminal Switch(config)# policy-map test-avc-down Switch(config-pmap)# class cat-browsing Switch(config-pmap-c)# police 200000 Switch(config-pmap-c)# set dscp 10 Switch(config-pmap-c)#end
Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class cat-fileshare Switch(config-pmap-c)# police 300000 Switch(config-pmap-c)# set wlan user-priority 2 Switch(config-pmap-c)# set dscp 20 Switch(config-pmap-c)#end
Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class subcat-terminal Switch(config-pmap-c)# police 100000 Switch(config-pmap-c)# set dscp 25 Switch(config-pmap-c)#end
Switch# configure terminal Switch(config)# policy-map test-avc-up Switch(config-pmap)# class webex-meeting Switch(config-pmap-c)# police 60000000 Switch(config-pmap-c)# set dscp 41 Switch(config-pmap-c)#end
This example shows how to apply defined QoS policy on a WLAN:
Switch# configure terminal Switch(config)#wlan alpha Switch(config-wlan)#shut Switch(config-wlan)#end Switch(config-wlan)#service-policy client input test-avc-up Switch(config-wlan)#service-policy client output test-avc-down Switch(config-wlan)#no shut Switch(config-wlan)#end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1919

Example: Configuring QoS Attribute for Local Profiling Policy

System Management

Example: Configuring QoS Attribute for Local Profiling Policy
The following example shows how to configure QoS attribute for a local profiling policy:
Switch(config)# class-map type control subscriber match-all local_policy1_class Switch(config-filter-control-classmap)# match device-type android Switch(config)# service-template local_policy1_template Switch(config-service-template)# vlan 40 Switch(config-service-template)# service-policy qos output local_policy1 Switch(config)# policy-map type control subscriber local_policy1 Switch(config-event-control-policymap)# event identity-update match-all Switch(config-class-control-policymap)# 1 class local_policy1_class do-until-success Switch(config-action-control-policymap)# 1 activate service-template local_policy1_template Switch(config)# wlan open_auth 9 Switch(config-wlan)# client vlan VLAN40 Switch(config-wlan)# service-policy type control subscriber local_policy1

Additional References for Application Visibility and Control

Related Documents

Related Topic

Document Title

System management commands System Management Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Flexible NetFlow configuration Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Flexible NetFlow commands Flexible NetFlow Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

QoS configuration

QoS Configuration Guide, Cisco IOS XE Release 3E (Cisco WLC 5700 Series)

QoS commands

QoS Command Reference, Cisco IOS XE Release 3E (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1920

System Management

Feature History and Information For Application Visibility and Control

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For Application Visibility and Control

Release Cisco IOS XE 3.3SE Cisco IOS XE 3E

Feature Information This feature was introduced. AVC control with QoS was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1921

Feature History and Information For Application Visibility and Control

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1922

9 5 C H A P T E R
Configuring Voice and Video Parameters
· Finding Feature Information, on page 1923 · Prerequisites for Voice and Video Parameters, on page 1923 · Restrictions for Voice and Video Parameters, on page 1923 · Information About Configuring Voice and Video Parameters, on page 1924 · How to Configure Voice and Video Parameters, on page 1928 · Monitoring Voice and Video Parameters, on page 1939 · Additional References for Voice and Video Parameters, on page 1942 · Feature History and Information For Performing Voice and Video Parameters Configuration, on page
1943
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Voice and Video Parameters
You can confirm the following points before configuring voice and video parameters: · Ensure that the switch has access points connected to it. · Configure SSID.
Restrictions for Voice and Video Parameters
The following are the restrictions that you should keep in mind while configuring voice and video parameters: · SIP CAC can be used for the 9971 Cisco phones that support TSPEC-based admission control. You can also use the phones that support Status code 17.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1923

Information About Configuring Voice and Video Parameters

System Management

· SIP snooping is supported for providing voice priority to the non-TSPEC SIP phones. · TSPEC for video CAC is not supported.
Information About Configuring Voice and Video Parameters
Three parameters on the switch affect voice and/or video quality: · Call Admission Control · Expedited bandwidth requests · Unscheduled automatic power save delivery
Call Admission Control (CAC) and UAPSD are supported on Cisco Compatible Extensions (CCX) v4 and v5; however, these parameters are also supported even without CCX but on any device implementing WMM (that supports 802.1e). Expedited bandwidth requests are supported only on CCXv5. Traffic stream metrics (TSM) can be used to monitor and report issues with voice quality.
Call Admission Control
Call Admission Control (CAC) enables an access point to maintain controlled quality of service (QoS) when the wireless LAN is experiencing congestion. The WMM protocol deployed in CCXv4 maintains QoS under differing network loads. Two types of Over The Air (OTA) CAC are available: static-based CAC and load-based CAC. The switch supports the following QoS policies:
· User-defined policies: You can define your own QoS policies. You can have more control over these policies than the existing metal policies.
· System-defined precious metal policies: To support backward compatibility. · Platinum: Used for VoIP clients. · Gold: Used for video clients. · Silver: Used for best effort traffic. · Bronze: Used for NRT traffic.
Static-Based CAC
Voice over WLAN applications supporting WMM and TSPEC can specify how much bandwidth or shared medium time is required to initiate a call. Bandwidth-based, or static, CAC enables the access point to determine whether it is capable of accommodating a particular call. The access point rejects the call if necessary in order to maintain the maximum allowed number of calls with acceptable quality. The QoS setting for a WLAN determines the level of bandwidth-based CAC support. To use bandwidth-based CAC with voice applications, the WLAN must be configured for Platinum QoS. With bandwidth-based CAC, the access point bandwidth availability is determined based on the amount of bandwidth currently used by

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1924

System Management

Load-Based CAC

the access point clients, to which the bandwidth requested by the Voice over WLAN applications is added. If this total exceeds a configured bandwidth threshold, the new call is rejected.
Note You must enable admission control (ACM) for CCXv4 clients that have WMM enabled. Otherwise, bandwidth-based CAC does not operate properly for these CCXv4 clients.
Load-Based CAC
Load-based CAC incorporates a measurement scheme that takes into account the bandwidth consumed by all traffic types (including that from clients), cochannel access point loads, and coallocated channel interference, for voice and video applications. Load-based CAC also covers the additional bandwidth consumption resulting from PHY and channel impairment. In load-based CAC, the access point continuously measures and updates the utilization of the RF channel (that is, the mean time of bandwidth that has been exhausted), channel interference, and the additional calls that the access point can admit. The access point admits a new call only if the channel has enough unused bandwidth to support that call. By doing so, load-based CAC prevents oversubscription of the channel and maintains QoS under all conditions of WLAN loading and interference.
Note If you disable load-based CAC, the access points start using bandwidth-based CAC.
IOSd Call Admission Control
IOSd Call Admission Control (CAC) controls bandwidth availability from switch to access point. You can configure class-based, unconditional packet marking features on your switch for CAC. CAC is a concept that applies to voice and video traffic only--not data traffic. If an influx of data traffic oversubscribes a particular link in the network, queueing, buffering, and packet drop decisions resolve the congestion. The extra traffic is simply delayed until the interface becomes available to send the traffic, or, if traffic is dropped, the protocol or the end user initiates a timeout and requests a retransmission of the information. Network congestion cannot be resolved in this manner when real-time traffic, sensitive to both latency and packet loss, is present, without jeopardizing the quality of service (QoS) expected by the users of that traffic. For real-time delay-sensitive traffic such as voice, it is better to deny network access under congestion conditions than to allow traffic onto the network to be dropped and delayed, causing intermittent impaired QoS and resulting in customer dissatisfaction. CAC is therefore a deterministic and informed decision that is made before a voice call is established and is based on whether the required network resources are available to provide suitable QoS for the new call. Based on the admit CAC CLI configuration in addition to the existing CAC algorithm, switch allows either voice or video with TSPEC or SIP snooping. The admit cac CLI is mandatory for the voice call to pass through. If the BSSID policer is configured for the voice or video traffic, then additional checks are performed on the packets.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1925

Expedited Bandwidth Requests

System Management

Expedited Bandwidth Requests
The expedited bandwidth request feature enables CCXv5 clients to indicate the urgency of a WMM traffic specifications (TSPEC) request (for example, an e911 call) to the WLAN. When the controller receives this request, it attempts to facilitate the urgency of the call in any way possible without potentially altering the quality of other TSPEC calls that are in progress.
You can apply expedited bandwidth requests to both bandwidth-based and load-based CAC. Expedited bandwidth requests are disabled by default. When this feature is disabled, the controller ignores all expedited requests and processes TSPEC requests as normal TSPEC requests.
The following table lists examples of TSPEC request handling for normal TSPEC requests and expedited bandwidth requests.
Table 173: TSPEC Request Handling Examples

CAC Mode

Reserved bandwidth Usage for voice calls

Normal TSPEC Request

TSPEC with Expedited Bandwidth Request

Bandwidth-based 75% (default

CAC

setting)

Less than 75%

Admitted

Between 75% and Rejected 90% (reserved bandwidth for voice calls exhausted)

Admitted Admitted

More than 90% Rejected

Rejected

Load-based CAC

Less than 75%

Admitted

Admitted

Between 75% and Rejected 85% (reserved bandwidth for voice calls exhausted)

Admitted

More than 85% Rejected

Rejected

28 For bandwidth-based CAC, the voice call bandwidth usage is per access point radio and does not take
into account cochannel access points. For load-based CAC, the voice call bandwidth usage is measured
for the entire channel. 29 Bandwidth-based CAC (consumed voice and video bandwidth) or load-based CAC (channel utilization
[Pb]).

Note Admission control for TSPEC G711-20ms and G711-40 ms codec types are supported.

U-APSD

Unscheduled automatic power save delivery (U-APSD) is a QoS facility defined in IEEE 802.11e that extends the battery life of mobile clients. In addition to extending battery life, this feature reduces the latency of traffic flow delivered over the wireless media. Because U-APSD does not require the client to poll each individual

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1926

System Management

Traffic Stream Metrics

packet buffered at the access point, it allows delivery of multiple downlink packets by sending a single uplink trigger packet. U-APSD is enabled automatically when WMM is enabled.

Traffic Stream Metrics

In a voice-over-wireless LAN (VoWLAN) deployment, traffic stream metrics (TSM) can be used to monitor voice-related metrics on the client-access point air interface. It reports both packet latency and packet loss. You can isolate poor voice quality issues by studying these reports.
The metrics consist of a collection of uplink (client side) and downlink (access point side) statistics between an access point and a client device that supports CCX v4 or later releases. If the client is not CCX v4 or CCXv5 compliant, only downlink statistics are captured. The client and access point measure these metrics. The access point also collects the measurements every 5 seconds, prepares 90-second reports, and then sends the reports to the controller. The controller organizes the uplink measurements on a client basis and the downlink measurements on an access point basis and maintains an hour's worth of historical data. To store this data, the controller requires 32 MB of additional memory for uplink metrics and 4.8 MB for downlink metrics.
TSM can be configured through either the GUI or the CLI on a per radio-band basis (for example, all 802.11a radios). The controller saves the configuration in flash memory so that it persists across reboots. After an access point receives the configuration from the controller, it enables TSM on the specified radio band.
This table shows the upper limit for TSM entries in different controller series.

TSM Entries

5700

MAX AP TSM entries

100

MAX Client TSM entries

250

MAX TSM entries

100*250=25000

Note Once the upper limit is reached, additional TSM entries cannot be stored and sent to WCS or NCS. If client TSM entries are full and AP TSM entries are available, then only the AP entries are stored, and viceversa. This leads to partial output. TSM cleanup occurs every one hour. Entries are removed only for those APs and clients that are not in the system.
Information About Configuring Voice Prioritization Using Preferred Call Numbers
You can configure a switch to provide support for SIP calls from VoWLAN clients that do not support TSPEC-based calls. This feature is known as SIP CAC support. If bandwidth is available in the configured voice pool, the SIP call uses the normal flow and the switch allocates the bandwidth to those calls.
You can also prioritize up to six preferred call numbers. When a call comes to one of the configured preferred numbers, the switch does not check the configured maximum voice bandwidth. The switch allocates the bandwidth needed for the call, even if it exceeds the maximum bandwidth for voice configured for voice CAC. The preferred call will be rejected if bandwidth allocation exceeds 85% of the radio bandwidth. The bandwidth allocation is 85 percent of the entire bandwidth pool, not just from the maximum configured voice pool. The bandwidth allocation is the same even for roaming calls.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1927

Information About EDCA Parameters

System Management

You must configure the following parameters before configuring voice prioritization: · Set WLAN QoS to allow voice calls to pass through. · Enable ACM for the radio. · Enable SIP call snooping on the WLAN.

Information About EDCA Parameters
Enhanced distributed channel access (EDCA) parameters are designed to provide preferential wireless channel access for voice, video, and other quality-of-service (QoS) traffic.

How to Configure Voice and Video Parameters

Configuring Voice Parameters (CLI)

Before you begin Ensure that you have configured SIP-based CAC. You should have created a class map for CAC before beginning this procedure.

SUMMARY STEPS

1. show wlan summary 2. show wlan wlan_id 3. configure terminal 4. policy-map policy-map name 5. class {class-name | class-default} 6. admit cac wmm-tspec 7. service-policy policy-map name 8. end 9. wlan wlan_profile_name wlan_ID SSID_network_name wlan shutdown 10. wlan wlan_profile_name wlan_ID SSID_network_name 11. wlan wlan_name call-snoop 12. wlan wlan_name service-policy input input_policy_name 13. wlan wlan_name service-policy output ouput_policy_name 14. wlan wlan_name service-policy input ingress_policy_name 15. wlan wlan_name service-policy output egress_policy_name 16. ap dot11 {5ghz | 24ghz} shutdown 17. ap dot11 {5ghz | 24ghz} cac voice sip 18. ap dot11 {5ghz | 24ghz} cac voice acm 19. ap dot11 {5ghz | 24ghz} cac voice max-bandwidth bandwidth 20. ap dot11 {5ghz | 24ghz} cac voice roam-bandwidth bandwidth 21. no wlan shutdown

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1928

System Management

Configuring Voice Parameters (CLI)

22. no ap dot11 {5ghz | 24ghz} shutdown 23. end

DETAILED STEPS

Step 1

Command or Action show wlan summary Example:
Switch# show wlan summary

Purpose Specifies all of the WLANs configured on the switch.

Step 2

show wlan wlan_id Example:
Switch# show wlan 25

Specifies the WLAN that you plan to modify. For voice over WLAN, ensure that the WLAN is configured for WMM and the QoS level is set to Platinum.

Step 3

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

Step 4

policy-map policy-map name Example:
Switch(config)# policy-map test_2000 Switch(config-pmap)#

Enters policy map configuration mode.
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy.
In WLAN, you need to configure service-policy for these commands to take effect.

Step 5

class {class-name | class-default} Example:
Switch(config-pmap)# class test_1000 Switch(config-pmap-c)#

Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change.
Specifies the name of the class whose policy you want to create or change.
You can also create a system default class for unclassified packets.

Step 6

admit cac wmm-tspec Example:
Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-c)#

(Optional) Admits the request for Call Admission Control (CAC) for policy map.

Step 7

service-policy policy-map name

Configures the QoS service policy.

Example:

Switch(config-pmap-c)# service-policy test_2000

Switch(config-pmap-c)#

Step 8

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1929

Configuring Voice Parameters (CLI)

System Management

Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16

Command or Action

Purpose

wlan wlan_profile_name wlan_ID SSID_network_name Disables all WLANs with WMM enabled prior to changing

wlan shutdown

the video parameters.

Example:
Switch(config)# wlan wlan1

Switch(config-wlan)# wlan shutdown

wlan wlan_profile_name wlan_ID SSID_network_name Disables all WLANs with WMM enabled prior to changing

Example:

the voice parameters.

Switch(config)# wlan wlan1

Switch(config-wlan)# wlan shutdown

wlan wlan_name call-snoop Example:
Switch(config)# wlan wlan1 call-snoop

Enables the call-snooping on a particular WLAN.

wlan wlan_name service-policy input input_policy_name Configures input SSID policy on a particular WLAN to

Example:

voice.

Switch(config)# wlan wlan1

Switch(config-wlan)# service-policy input platinum-up

wlan wlan_name service-policy output ouput_policy_name
Example:
Switch(config)# wlan wlan1
Switch(config-wlan)# service-policy output platinum

Configures output SSID policy on a particular WLAN to voice.

wlan wlan_name service-policy input ingress_policy_name

Configures ingress SSID policy on a particular WLAN as user-defined policy.

Example:

Switch(config)# wlan wlan1

Switch(config-wlan)# service-policy input policy1

wlan wlan_name service-policy output egress_policy_name

Configures egress SSID policy on a particular WLAN as user-defined policy.

Example:

Switch(config)# wlan wlan1

Switch(config-wlan)# service-policy output policy2

ap dot11 {5ghz | 24ghz} shutdown Example:

Disables the radio network.
Switch(config)# ap dot11 5ghz shutdown

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1930

System Management

Configuring Video Parameters (CLI)

Step 17 Step 18 Step 19
Step 20 Step 21 Step 22 Step 23

Command or Action ap dot11 {5ghz | 24ghz} cac voice sip Example:
Switch(config)# ap dot11 5ghz cac voice sip
ap dot11 {5ghz | 24ghz} cac voice acm Example:
Switch(config)# ap dot11 5ghz cac voice acm
ap dot11 {5ghz | 24ghz} cac voice max-bandwidth bandwidth Example:
Switch(config)# ap dot11 5ghz cac voice max-bandwidth 85
ap dot11 {5ghz | 24ghz} cac voice roam-bandwidth bandwidth Example:
Switch(config)# ap dot11 5ghz cac voice roam-bandwidth 10
no wlan shutdown Example:
Switch(config-wlan)# no wlan shutdown
no ap dot11 {5ghz | 24ghz} shutdown Example:
Switch(config)# no ap dot11 5ghz shutdown
end Example:
Switch(config)# end

Purpose Enables or disables SIP IOSd CAC for the 802.11a or 802.11b/g network.
Enables or disables bandwidth-based voice CAC for the 802.11a or 802.11b/g network.
Sets the percentage of maximum bandwidth allocated to clients for voice applications on the 802.11a or 802.11b/g network. The bandwidth range is 5 to 85%, and the default value is 75%. Once the client reaches the value specified, the access point rejects new videos on this network. Sets the percentage of maximum allocated bandwidth reserved for roaming voice clients. The bandwidth range is 0 to 25%, and the default value is 6%. The switch reserves this much bandwidth from the maximum allocated bandwidth for roaming voice clients. Reenables all WLANs with WMM enabled.
Reenables the radio network.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example

Configuring Video Parameters (CLI)

SUMMARY STEPS

1. show wlan summary 2. show wlan wlan_id 3. configure terminal 4. policy-map policy-map name

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1931

Configuring Video Parameters (CLI)

System Management

5. class {class-name | class-default} 6. admit cac wmm-tspec 7. service-policy policy-map name 8. end 9. wlanwlan_profile_name 10. ap dot11 {5ghz | 24ghz} shutdown 11. ap dot11 {5ghz | 24ghz} cac video acm 12. ap dot11 {5ghz | 24ghz} cac video load-based 13. ap dot11 {5ghz | 24ghz} cac video max-bandwidth bandwidth 14. ap dot11 {5ghz | 24ghz} cac video roam-bandwidth bandwidth 15. no wlan shutdown wlan_id 16. no ap dot11 {5ghz | 24ghz} shutdown 17. end

DETAILED STEPS

Step 1

Command or Action show wlan summary Example:
Switch# show wlan summary

Step 2

show wlan wlan_id Example:
Switch# show wlan 25

Step 3

configure terminal Example:
Switch# configure terminal

Step 4

policy-map policy-map name Example:
Switch(config)# policy-map test_2000 Switch(config-pmap)#

Step 5

class {class-name | class-default} Example:
Switch(config-pmap)# class test_1000 Switch(config-pmap-c)#

Step 6

admit cac wmm-tspec Example:

Purpose Specifies all of the WLANs configured on the switch.
Specifies the WLAN that you plan to modify.
Enters global configuration mode.
Enters policy map configuration mode. Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy. In WLAN, you need to configure service-policy for these commands to take effect. Enters policy class map configuration mode. Specifies the name of the class whose policy you want to create or change. Specifies the name of the class whose policy you want to create or change. You can also create a system default class for unclassified packets. (Optional) Admits the request for Call Admission Control (CAC) for policy map.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1932

System Management

Configuring Video Parameters (CLI)

Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13
Step 14 Step 15

Command or Action
Switch(config-pmap-c)# admit cac wmm-tspec Switch(config-pmap-c)#

Purpose

service-policy policy-map name

Configures the QoS service policy.

Example:

Switch(config-pmap-c)# service-policy test_2000

Switch(config-pmap-c)#

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

wlanwlan_profile_name Example:
Switch(config)# wlan wlan1 Switch(config-wlan)# wlan shutdown

Disables all WLANs with WMM enabled prior to changing the video parameters.

ap dot11 {5ghz | 24ghz} shutdown Example:
Switch(config)# ap dot11 5ghz shutdown

Disables the radio network.

ap dot11 {5ghz | 24ghz} cac video acm Example:
Switch(config)# ap dot11 5ghz cac video acm

Enables or disables bandwidth-based video CAC for the 802.11a or 802.11b/g network.

ap dot11 {5ghz | 24ghz} cac video load-based

Configures the load-based CAC method.

Example:

If you do not enter this command, then the default static

Switch(config)# ap dot11 5ghz cac video load-based CAC is applied.

ap dot11 {5ghz | 24ghz} cac video max-bandwidth bandwidth
Example:
Switch(config)# ap dot11 5ghz cac video max-bandwidth 20

Sets the percentage of maximum bandwidth allocated to clients for video applications on the 802.11a or 802.11b/g network.
The bandwidth range is 5 to 85%, and the default value is 75%. The default value is 0, which means no bandwidth request control. The sum of the voice bandwidth and video bandwidth should not exceed 85% or configured maximum media bandwidth.

ap dot11 {5ghz | 24ghz} cac video roam-bandwidth bandwidth
Example:
Switch(config)# ap dot11 5ghz cac video roam-bandwidth 9

Sets the percentage of maximum allocated bandwidth reserved for roaming clients for video.
The bandwidth range is 0 to 25%, and the default value is 0%.

no wlan shutdown wlan_id

Reenables all WLANs with WMM enabled.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1933

Configuring SIP-Based CAC (CLI)

System Management

Step 16 Step 17

Command or Action Example:
Switch(config-wlan)# no wlan shutdown 25
no ap dot11 {5ghz | 24ghz} shutdown Example:
Switch(config)# no ap dot11 5ghz shutdown
end Example:
Switch(config)# end

Purpose
Reenables the radio network.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example

Configuring SIP-Based CAC (CLI)
SIP CAC controls the total number of SIP calls that can be made.

SUMMARY STEPS

1. configure terminal 2. wlan wlan-name 3. call-snoop 4. service-policy [client] input policy-map name 5. service-policy [client] output policy-map name 6. end 7. show wlan {wlan-id | wlan-name} 8. configure terminal 9. ap dot11 {5ghz | 24ghz} cac {voice | video} acm 10. ap dot11 {5ghz | 24ghz} cac voice sip 11. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan wlan-name Example:
Switch(config)# wlan qos-wlan Switch(config-wlan)#

Purpose Enters global configuration mode.
Enters WLAN configuration submode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1934

System Management

Configuring SIP-Based CAC (CLI)

Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11

Command or Action call-snoop Example:
Switch(config-wlan)# call-snoop
service-policy [client] input policy-map name Example:
Switch(config-wlan)# service-policy input platinum-up
service-policy [client] output policy-map name Example:
Switch(config-wlan)# service-policy output platinum
end Example:
Switch(config)# end
show wlan {wlan-id | wlan-name} Example:
Switch# show wlan qos-wlan
configure terminal Example:
Switch# configure terminal
ap dot11 {5ghz | 24ghz} cac {voice | video} acm Example:
Switch(config)# ap dot11 5ghz cac voice acm
ap dot11 {5ghz | 24ghz} cac voice sip Example:
Switch(config)# ap dot11 5ghz cac voice sip
end Example:
Switch(config)# end

Purpose Enables the call-snooping feature for a particular WLAN.
Assigns a policy map to WLAN input traffic. Ensure that you provide QoS policy to voice for input traffic.
Assigns policy map to WLAN output traffic. Ensure that you provide QoS policy to voice for output traffic.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Verifies the configured QoS policy on the WLAN.
Enters global configuration mode.
Enables the ACM static on the radio. When enabling SIP snooping, use the static CAC, not the load-based CAC. Configures SIP-based CAC.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1935

Configuring a Preferred Call Number (CLI)

System Management

Example

Configuring a Preferred Call Number (CLI)
Before you begin You must set the following parameters before configuring a preferred call number.
· Set WLAN QoS to voice. · Enable ACM for the radio. · Enable SIP call snooping on the WLAN. · Enable SIP-based CAC.

SUMMARY STEPS

1. configure terminal 2. wlan wlan-name qos platinum 3. ap dot11 {5ghz | 24ghz} cac {voice | video} acm 4. wlan wlan-name 5. wireless sip preferred-call-no call_index call_number 6. no wireless sip preferred-call-no call_index 7. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan wlan-name qos platinum Example:
Switch(config)# wlan wlan1 Switch(config-wlan)# qos platinum

Step 3

ap dot11 {5ghz | 24ghz} cac {voice | video} acm Example:
Switch(config)# ap dot11 5ghz cac voice acm

Step 4

wlan wlan-name Example:
Switch(config)# wlan wlan1 Switch(config-wlan)# call-snoop

Purpose Enters global configuration mode.
Sets QoS to voice on a particular WLAN.
Enables the static ACM on the radio. When enabling SIP snooping, use the static CAC, not the load-based CAC. Enables the call-snooping feature for a particular WLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1936

System Management

Configuring EDCA Parameters (CLI)

Step 5 Step 6 Step 7

Command or Action

Purpose

wireless sip preferred-call-no call_index call_number Adds a new preferred call.

Example:
Switch(config)# wireless sip preferred-call-no 1 555333

no wireless sip preferred-call-no call_index

Removes a preferred call.

Example:

Switch(config)# no wireless sip preferred-call-no 1

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example

Configuring EDCA Parameters (CLI)

SUMMARY STEPS

1. configure terminal 2. ap dot11 {5ghz | 24ghz } shutdown 3. ap dot11 {5ghz | 24ghz} edca-parameters {custom-voice | optimized-video-voice | optimized-voice |
svp-voice | wmm-default} 4. show ap dot11 {5ghz | 24ghz} network 5. no ap dot11 {5ghz | 24ghz} shutdown 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap dot11 {5ghz | 24ghz } shutdown Example:
Switch(config)# ap dot11 5ghz shutdown

Purpose Enters global configuration mode.
Disables the radio network.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1937

Configuring EDCA Parameters (CLI)

System Management

Step 3
Step 4 Step 5 Step 6

Command or Action

Purpose

ap dot11 {5ghz | 24ghz} edca-parameters {custom-voice Enables a specific EDCA parameters for the 802.11a or

| optimized-video-voice | optimized-voice | svp-voice | 802.11b/g network.

wmm-default}

· custom-voice--Enables custom voice parameters for

Example:

the 802.11a or 802.11b/g network.

Switch(config)# ap dot11 5ghz edca-parameters optimized-voice

· optimized-video-voice--Enables EDCA voice- and video-optimized parameters for the 802.11a or 802.11b/g network.

Choose this option when both voice and video services are deployed on your network.

· optimized-voice--Enables non-SpectraLink voice-optimized profile parameters for the 802.11a or 802.11b/g network.

Choose this option when voice services other than SpectraLink are deployed on your network.

· svp-voice--Enables SpectraLink voice priority parameters for the 802.11a or 802.11b/g network.

Choose this option if SpectraLink phones are deployed on your network to improve the quality of calls.

· wmm-default--Enables the Wi-Fi Multimedia (WMM) default parameters for the 802.11a or 802.11b/g network.

This is the default value. Choose this option when voice or video services are not deployed on your network.

show ap dot11 {5ghz | 24ghz} network Example:
Switch(config)# show ap dot11 5ghz network
no ap dot11 {5ghz | 24ghz} shutdown Example:
Switch(config)# no ap dot11 5ghz shutdown
end Example:
Switch(config)# end

Displays the current status of MAC optimization for voice.
Reenables the radio network.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1938

System Management

Configuring EDCA Parameters (GUI)

Example

Configuring EDCA Parameters (GUI)

Step 1 Step 2

Choose Configuration > Wireless > 802.11a/n/ac > EDCA Parameters or Configuration > Wireless > 802.11b/g/n > EDCA Parameters to open EDCA Parameters page. Choose one of the following options from the EDCA Profile drop-down list:
· wmm-default--Enables the Wi-Fi Multimedia (WMM) default parameters. This is the default value. Choose this option when voice or video services are not deployed on your network.
· svp-voice--Enables SpectraLink voice priority parameters. Choose this option if SpectraLink phones are deployed on your network to improve the quality of calls.
· optimized-voice--Enables EDCA voice-optimized profile parameters. Choose this option when voice services other than SpectraLink are deployed on your network.
· optimized-video-voice--Enables EDCA voice- and video-optimized profile parameters. Choose this option when both voice and video services are deployed on your network.
· custom-voice--Enables custom voice EDCA parameters for 802.11a. The EDCA parameters under this option also match the 6.0 WMM EDCA parameters when this profile is applied.
Note If you deploy video services, admission control (ACM) must be disabled.

Step 3
Step 4 Step 5 Step 6

If you want to enable MAC optimization for voice, select the Enable Low Latency MAC check box. Otherwise, leave this check box unselected, which is the default value. This feature enhances voice performance by controlling packet retransmits and appropriately aging out voice packets on lightweight access points, which improves the number of voice calls serviced per access point.
Note We do not recommend you to enable low latency MAC. You should enable low latency MAC only if the WLAN allows WMM clients. If WMM is enabled, then low latency MAC can be used with any of the EDCA profiles.
Click Apply to commit your changes. To reenable the radio network, choose Network under 802.11a/n or 802.11b/g/n, select the 802.11a/n/ac (or 802.11b/g/n) Network Status check box, and click Apply. Click Save Configuration.

Monitoring Voice and Video Parameters
This section describes the new commands for the voice and video parameters. The following commands can be used to monitor voice and video parameters.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1939

Monitoring Voice and Video Parameters

System Management

Table 174: Monitoring Voice Parameters Commands

Command

Purpose

show ap dot11 {5ghz | 24ghz} network Displays the radio-based statistics for voice.

show ap name ap_name dot11 24ghz Displays the TSM voice metrics and current status of MAC

tsm all

optimization for voice.

show ap name apname cac voice

Displays the information about CAC for a particular access point.

show client detail client_mac

Displays the U-APSD status for a particular client.

show policy-map interface wireless client
show access-list

Displays the video client policy details. Displays the video client dynamic access-list from the switch.

show wireless client voice diag status Displays information about whether voice diagnostics are enabled or disabled. If enabled, this also displays information about the clients in the watch list and the time remaining for the diagnostics of the voice call.
Note To work on voice diagnostics CLIs, you need to enter the following command: debug voice-diagnostic mac-addr client_mac_01 client_mac_02

show wireless client voice diag tspec Displays the TSPEC information sent from the clients that are enabled for voice diagnostics.

show wireless client voice diag qos-map

Displays information about the QoS/DSCP mapping and packet statistics in each of the four queues: VO, VI, BE, BK. The different DSCP values are also displayed.

show wireless client voice diag rssi Display the client's RSSI values in the last 5 seconds when voice diagnostics is enabled.

show client voice-diag roam-history

Displays information about the last three roaming calls. The output contains the timestamp, access point associated with roaming, roaming reason, and if there is a roaming failure, reason for roaming-failure.

show policy-map interface wireless Displays information about the voice and video data packet

mac mac-address

statistics.

show wireless media-stream client Displays a summary of the media stream and video client

summary

information.

show controllers d0 | b queue

Displays which queue the packets are going through on an access point.

show platform qos queue stats interface

Displays which queue packets are going through from the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1940

System Management

Monitoring Voice and Video Parameters

You can monitor the video parameters using the following commands.
Table 175: Monitoring Video Parameters Commands

Command

Purpose

show ap join stats summary ap_mac

Displays the last join error detail for a specific access point.

show ip igmp snooping wireless mgid

Displays the TSM voice metrics and current status of MAC optimization for voice.

show wireless media-stream multicast-direct Displays the media stream multicast-direct parameters. state

show wireless media-stream group summary

Displays the summary of the media stream and client information.

show wireless media-stream group detail Displays the details of a specific media-stream group. group_name
show wireless media-stream client summary Displays the details for a set of media-stream clients.

show wireless media-stream client detail Displays the details for a set of media-stream clients. group_name
show ap dot11 {5ghz | 24ghz) media-stream Display the details of media stream. rrc
show wireless media-stream message details Displays information about the message configuration.

show ap name ap-name auto-rf dot11 5ghz Displays the details of channel utilization. | i Util

show controllers d0 | b queue

Displays which queue the packets are going through on an access point based on 2.4- and 5-GHz bands.

show controllers d1 | b queue

Displays which queue the packets are going through on an access point based on 2.4- and 5-GHz bands.

show cont d1 | b Media

Displays the video metric details on the band A or B.

show capwap mcast mgid all

Displays information about all of the multicast groups and their corresponding multicast group identifications (MGIDs) associated to the access point.

show capwap mcast mgid id id

Displays information about all of the video clients joined to the multicast group in a specific MGID.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1941

Additional References for Voice and Video Parameters

System Management

Additional References for Voice and Video Parameters

Related Documents

Related Topic Multicast configuration

Document Title
Multicast Configuration Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

VideoStream configuration

VideoStream Configuration Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1942

System Management

Feature History and Information For Performing Voice and Video Parameters Configuration

Feature History and Information For Performing Voice and Video Parameters Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1943

Feature History and Information For Performing Voice and Video Parameters Configuration

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1944

9 6 C H A P T E R

Configuring RFID Tag Tracking

· Finding Feature Information, on page 1945 · Information About Configuring RFID Tag Tracking, on page 1945 · How to Configure RFID Tag Tracking, on page 1945 · Monitoring RFID Tag Tracking Information, on page 1946 · Additional References RFID Tag Tracking, on page 1947 · Feature History and Information For Performing RFID Tag Tracking Configuration , on page 1948
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.

Information About Configuring RFID Tag Tracking
The Switch enables you to configure radio-frequency identification (RFID) tag tracking. RFID tags are small wireless devices that are affixed to assets for real-time location tracking. They operate by advertising their location using special 802.11 packets, which are processed by access points, the controller, and the location appliance.

How to Configure RFID Tag Tracking

Configuring RFID Tag Tracking (CLI)

SUMMARY STEPS

1. location rfid status 2. (Optional) no location rfid status

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1945

Monitoring RFID Tag Tracking Information

System Management

3. location rfid timeout seconds 4. location rfid mobility vendor-name name 5. (Optional) no location rfid mobility name

DETAILED STEPS

Step 1

Command or Action location rfid status Example:
Switch(config)# location rfid status

Purpose Enables RFID tag tracking. By default, RFID tag tracking is enabled.

Step 2

(Optional) no location rfid status Example:
Switch(config)# no location rfid status

Disables RFID tag tracking.

Step 3

location rfid timeout seconds Example:
Switch(config)# location rfid timeout 1500

Specifies a static timeout value (between 60 and 7200 seconds).
The static timeout value is the amount of time that the switch maintains tags before expiring them. For example, if a tag is configured to beacon every 30 seconds, we recommend that you set the timeout value to 90 seconds (approximately three times the beacon value). The default value is 1200 seconds.

Step 4

location rfid mobility vendor-name name

Enables RFID tag mobility for specific tags. When you

Example:

enter the location rfid mobility vendor-name command, tags are unable to obtain a DHCP address for client mode

Switch(config)# location rfid mobility vendor-name when attempting to select and/or download a configuration.
Aerosct

Note These commands can be used only for Pango

tags. Therefore, the only valid entry for

vendor_name is "pango" in all lowercase letters.

Step 5

(Optional) no location rfid mobility name Example:
Switch(config)# no location rfid mobility test

Disables RFID tag mobility for specific tags. When you enter the no location rfid mobility command , tags can obtain a DHCP address. If a tag roams from one subnet to another, it obtains a new address rather than retaining the anchor state.

Monitoring RFID Tag Tracking Information

This section describes the new commands for the RFID tag tracking Information. The following commands can be used to monitor the RFID tag tracking Information on the switch.
Table 176: Monitoring RFID Tag Tracking Information Commands

Command

Purpose

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1946

System Management

Additional References RFID Tag Tracking

show location rfid config

Displays the current configuration for RFID tag tracking.

show location rfid detail mac_address Displays the detailed information for a specific RFID tag.

show location rfid summary

Displays a list of all RFID tags currently connected to the switch.

show location rfid client

Displays a list of RFID tags that are associated to the switch as clients.

Additional References RFID Tag Tracking

Related Documents

Related Topic

Document Title

System management commands System Management Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1947

Feature History and Information For Performing RFID Tag Tracking Configuration

System Management

Feature History and Information For Performing RFID Tag Tracking Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1948

9 7 C H A P T E R
Configuring Location Settings
· Finding Feature Information, on page 1949 · Information About Configuring Location Settings, on page 1949 · How to Configure Location Settings, on page 1950 · Monitoring Location Settings and NMSP Settings, on page 1954 · Examples: Location Settings Configuration, on page 1955 · Examples: NMSP Settings Configuration, on page 1955 · Additional References for Location Settings, on page 1956 · Feature History and Information For Performing Location Settings Configuration, on page 1957
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring Location Settings
The switch determines the location of client devices by gathering Received Signal Strength Indication (RSSI) measurements from access points all around the client of interest. The switch can obtain location reports from up to 16 access points for clients, RFID tags, and rogue access points. You can configure the path loss measurement (S60) request for normal clients or calibrating clients to improve location accuracy.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1949

How to Configure Location Settings

System Management

How to Configure Location Settings

Configuring Location Settings (CLI)

SUMMARY STEPS

1. configure terminal 2. location plm {calibrating [multiband | uniband] | client burst_interval 3. location rssi-half-life {calibrating-client | client | rogue-aps | tags } seconds 4. location expiry {calibrating-client | client | rogue-aps | tags } timeout 5. location algorithm {rssi-average | simple} 6. location admin-tag string 7. location civic-location identifier {identifier | host} 8. location custom-location identifier {identifier | host} 9. location geo-location identifier {identifier | host} 10. location prefer {cdp | lldp-med | static} weight priority_value 11. location rfid {status | timeout | vendor-name} 12. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

location plm {calibrating [multiband | uniband] | client Configures the path loss measurement (S60) request for

burst_interval

calibrating clients or non-calibrating.

Example:
Switch(config)# location plm client 100

The path loss measurement request improves the location accuracy. You can configure the burst_interval parameter for the normal, noncalibrating client from zero through 3600 seconds, and the default value is 60 seconds.

You can configure the path loss measurement request for calibrating clients on the associated 802.11a or 802.11b/g radio or on the associated 802.11a/b/g radio.

If a client does not send probes often or sends them only on a few channels, its location cannot be updated or cannot be updated accurately. The location plm command forces clients to send more packets on all channels. When a CCXv4 (or higher) client associates, the Switch sends it a path loss measurement request, which instructs the client to transmit on the bands and channels that the access points are on (typically, channels 1, 6, and 11 for 2.4-GHz-only

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1950

System Management

Configuring Location Settings (CLI)

Step 3 Step 4 Step 5

Command or Action
location rssi-half-life {calibrating-client | client | rogue-aps | tags } seconds Example:
Switch(config)# location rssi-half-life calibrating-client 60

Purpose
access points) at a configurable interval (such as 60 seconds) indefinitely.
Configures the RSSI half life for the clients, calibrating clients, RFID tags, and rogue access points.
You can enter the location rssi-half-life parameter value for the clients, calibrating clients, RFID tags, and rogue access points as 0, 1, 2, 5, 10, 20, 30, 60, 90, 120, 180, or 300 seconds, and the default value is 0 seconds.
Some client devices transmit at reduced power immediately after changing channels, and RF is variable, so RSSI values might vary considerably from packet to packet. The location rssi-half-life command increases accuracy by averaging nonuniformly arriving data using a configurable forget period (or half life).
Note We recommend that you do not use or modify the location rssi-half-life command.

location expiry {calibrating-client | client | rogue-aps | Configures the RSSI timeout value for the clients,

tags } timeout

calibrating clients, RFID tags, and rogue access points.

Example:

You can enter the RSSI timeout value for the clients, RFID

Switch(config)# location expiry calibrating-client tags, and rogue access points from 5 through 3600 seconds,

50

and the default value is 5 seconds.

For the calibrating clients, you can enter the RSSI timeout value from 0 through 3600 seconds, and the default value is 5 seconds.

Ensuring that recent, strong RSSIs are retained by the CPU is critical to location accuracy. The location expiry command enables you to specify the length of time after which old RSSI averages expire.

Note We recommend that you do not use or modify the location expiry command.

location algorithm {rssi-average | simple} Example:
Switch(config)# location algorithm rssi-average

Configures the algorithm used to average RSSI and signal-to-noise ratio (SNR) values.
You can enter the location algorithm rssi-average command to specify a more accurate algorithm but requires more CPU overhead or the location algorithm simple command to specify a faster algorithm that requires low CPU overhead but provides less accuracy.

Note We recommend that you do not use or modify the location algorithm command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1951

Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues (CLI)

System Management

Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12

Command or Action location admin-tag string Example:
Switch(config)# location admin-tag

Purpose
Sets administrative tag or site information for the location of client devices.

location civic-location identifier {identifier | host}

Specifies civic location information.

Example:

You can set the civic location identifier either as a string

Switch(config)# location civic-location identifier or host.

host

location custom-location identifier {identifier | host}
Example:
Switch(config)# location custom-location identifier host

Specifies custom location information.
You can set the custom location identifier either as a string or host.

location geo-location identifier {identifier | host}

Specifies geographical location information of the client

Example:

devices.

Switch(config)# location geo-location identifier You can set the location identifier either as a string or host.

host

location prefer {cdp | lldp-med | static} weight priority_value
Example:
Switch(config)# location prefer weight cdp 50

Sets location information source priority. You can enter the priority weight from zero through 255.

location rfid {status | timeout | vendor-name} Example:
Switch(config)# location rfid timeout 100

Configures RFID tag tracking options such as RFID tag status, RFID timeout value, and RFID tag vendor name.
You can enter the RFID timeout value in a range from 60 and 7200 seconds.

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example
Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues (CLI)
The Network Mobility Services Protocol (NMSP) manages communication between the mobility services engine and the controller for incoming and outgoing traffic. If your application requires more frequent location updates, you can modify the NMSP notification interval (to a value between 1 and 180 seconds) for clients, active RFID tags, and rogue access points and clients.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1952

System Management

Modifying the NMSP Notification threshold for Clients, RFID Tags, and Rogues (CLI)

Note The TCP port (16113) that the controller and mobility services engine communicate over must be open (not blocked) on any firewall that exists between the controller and the mobility services engine for NMSP to function.

SUMMARY STEPS

1. configure terminal 2. nmsp notification interval {attachment seconds | location seconds | rssi [clients interval | rfid interval
| rogues [ap | client ] interval]} 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

nmsp notification interval {attachment seconds | location Sets the NMSP notification interval value for clients, RFID

seconds | rssi [clients interval | rfid interval | rogues [ap | tags, and rogue clients and access points.

client ] interval]}

You can enter the NMSP notification interval value for

Example:

RSSI measurement from 1 through 180 seconds.

Switch(config)# nmsp notification interval rssi rfid 50

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example

Modifying the NMSP Notification threshold for Clients, RFID Tags, and Rogues (CLI)

SUMMARY STEPS

1. configure terminal 2. location notify-threshold {clients | rogues ap | tags } threshold 3. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1953

Monitoring Location Settings and NMSP Settings

System Management

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

location notify-threshold {clients | rogues ap | tags } Configures the NMSP notification threshold for clients,

threshold

RFID tags, and rogue clients and access points.

Example:

You can enter the RSSI threshold value from zero through

Switch(config)# location notify-threshold clients 10 db.

5

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example

Monitoring Location Settings and NMSP Settings

Monitoring Location Settings (CLI)

This section describes the new commands for location settings. The following commands can be used to monitor location settings on the switch.
Table 177: Monitoring Location Settings Commands

Command

Purpose

show location summary

Displays the current location configuration values.

show location statistics rfid

Displays the location-based RFID statistics.

show location detail client_mac_addr Displays the RSSI table for a particular client.

Monitoring NMSP Settings (CLI)
This section describes the new commands for NMSP settings. The following commands can be used to monitor NMSP settings on the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1954

System Management

Examples: Location Settings Configuration

Table 178: Monitoring NMSP Settings Commands

Command

Purpose

show nmsp attachment suppress interfaces Displays the attachment suppress interfaces.

show nmsp capability

Displays the NMSP capabilities.

show nmsp notification interval

Displays the NMSP notification intervals.

show nmsp statistics connection

Displays the connection-specific NMSP counters.

show nmsp statistics summary

Displays the common NMSP counters.

show nmsp status

Displays the status of active NMSP connections.

show nmsp subscription detail

Displays all of the mobility services to which the switch is subscribed.

show nmsp subscription detail ip_addr Displays details only for the mobility services subscribed to by a specific IP address.

show nmsp subscription summary

Displays details for all of the mobility services to which the switch is subscribed.

Examples: Location Settings Configuration
This example shows how to configure the path loss measurement (S60) request for calibrating client on the associated 802.11a or 802.11b/g radio:
Switch# configure terminal Switch(config)# location plm calibrating uniband Switch(config)# end Switch# show location summary
This example shows how to configure the RSSI half life for a rouge access point:
Switch# configure terminal Switch(config)# location rssi-half-life rogue-aps 20 Switch(config)# end Switch# show location summary
Examples: NMSP Settings Configuration
This example shows how to configure the NMSP notification interval for RFID tags:
Switch# configure terminal Switch(config)# nmsp notification interval rssi rfid 50 Switch(config)# end Switch# show nmsp notification interval

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1955

Additional References for Location Settings

System Management

This example shows how to configure the NMSP notification threshold for clients:
Switch# configure terminal Switch(config)# nmsp notify-threshold 5 Switch(config)# end Switch# show nmsp statistics summary

Additional References for Location Settings

Related Documents

Related Topic

Document Title

System management commands System Management Command Reference, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1956

System Management

Feature History and Information For Performing Location Settings Configuration

Feature History and Information For Performing Location Settings Configuration

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1957

Feature History and Information For Performing Location Settings Configuration

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1958

9 8 C H A P T E R

Monitoring Flow Control

· Finding Feature Information, on page 1959 · Information About Flow Control, on page 1959 · Monitoring Flow Control, on page 1959 · Examples: Monitoring Flow Control, on page 1960 · Additional References for Monitoring Flow Control, on page 1961 · Feature History and Information For Monitoring Flow Control, on page 1961
Finding Feature Information
Your software release may not support all of the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.

Information About Flow Control
Flow control is enabled by default on the switch.
Flow control provides shim layers between WCM and Cisco IOS for a reliable IPC. Every component in WCM has a dedicated channel. Few of the components in WCM have leveraged flow control in that. There is no configuration of flow control from CLI. You can monitor the flow control for any channel.

Monitoring Flow Control

This section describes the new commands for flow control. The following commands can be used to monitor flow control on the switch.
Table 179: Monitoring Flow Control

Command

Purpose

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1959

Examples: Monitoring Flow Control

System Management

show wireless flow-control channel -id

Displays information about flow control on a particular channel.

show wireless flow-control channel-id statistics Displays statistical information about flow control on a particular channel.

Examples: Monitoring Flow Control

This example shows how to view information pertaining to any channel:

Switch# show wireless flow-control 3 Switch#

Channel Name

: CAPWAP

FC State

: Disabled

Remote Server State : Enabled

Pass-thru Mode

: Disabled

EnQ Disabled

: Disabled

Queue Depth

: 2048

Max Retries

:5

Min Retry Gap (mSec): 3

This example shows how to view flow control for a particular channel:

Switch# show wireless flow-control 3 Switch#
Channel Name # of times channel went into FC # of times channel came out of FC Total msg count received by the FC Infra Pass-thru msgs send count Pass-thru msgs fail count # of msgs successfully queued # of msgs for which queuing failed # of msgs sent thru after queuing # of msgs sent w/o queuing # of msgs for which send failed # of invalid EAGAINS received Highest watermark reached # of times Q hit max capacity Avg time channel stays in FC (mSec)

: CAPWAP :0 :0 :1 :0 :0 :0 :0 :0 :1 :0 :0 :0 :0 :0

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1960

System Management

Additional References for Monitoring Flow Control

Additional References for Monitoring Flow Control

Related Documents

Related Topic

Document Title

System management commands System Management Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For Monitoring Flow Control

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1961

Feature History and Information For Monitoring Flow Control

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1962

9 9 C H A P T E R
Configuring SDM Templates
· Finding Feature Information, on page 1963 · Information About Configuring SDM Templates, on page 1963 · How to Configure SDM Templates, on page 1965 · Monitoring and Maintaining SDM Templates, on page 1966 · Configuration Examples for Configuring SDM Templates, on page 1966 · Feature History and Information for Configuring SDM Templates, on page 1967
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring SDM Templates
SDM Templates
You can use SDM templates to configure system resources to optimize support for specific features, depending on how your device is used in the network. You can select a template to provide maximum system usage for some functions. These templates are supported on your device:
· Advanced--The advanced template is available on all supported images for this release. It maximizes system resources for features like netflow, multicast groups, security ACEs, QoS ACEs, and so on.
· VLAN--The VLAN template is available only on the LAN Base license. The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 device.
After you change the template and the system reboots, you can use the show sdm prefer privileged EXEC command to verify the new template configuration. If you enter the show sdm prefer command before you
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1963

SDM Templates

System Management

enter the reload privileged EXEC command, the show sdm prefer command shows the template currently in use and the template that will become active after a reload. The default is the advanced template.
Table 180: Approximate Number of Feature Resources Allowed by Templates

Resource

Advanced VLAN

Number of VLANs

4094 4094

Unicast MAC addresses

32 K 32 K

Overflow unicast MAC addresses

512 512

IGMP groups and multicast routes

4K 4K

Overflow IGMP groups and multicast routes 512 512

· Directly connected routes

32 K 32 K

· Indirectly connected IP hosts

8K 8K

Policy-based routing ACEs QoS classification ACEs Security ACEs Netflow ACEs Input Microflow policer ACEs: Output Microflow policer ACEs: FSPAN ACEs Tunnels: Control Plane Entries: Input Netflow flows: Output Netflow flows: SGT/DGT entries: SGT/DGT Overflow entries:

1024 0

3K 3K

3K 3K

1024 1024

256 K 0

256 K 0

256 256

256 0

512 512

8K 8K

16 K 16 K

4K 4K

0

512

Note When the switch is used as a Wireless Mobility Agent, the only template allowed is the advanced template.
The tables represent approximate hardware boundaries set when a template is selected. If a section of a hardware resource is full, all processing overflow is sent to the CPU, seriously impacting switch performance.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1964

System Management

SDM Templates and Switch Stacks

SDM Templates and Switch Stacks
In a switch stack, all stack members must use the same SDM template that is stored on the active switch. When a new switch is added to a stack, the SDM configuration that is stored on the active switch overrides the template configured on an individual switch.

How to Configure SDM Templates

Configuring SDM Templates

Configuring the Switch SDM Template

Setting the SDM Template

SUMMARY STEPS

1. configure terminal 2. sdm prefer { advanced | vlan } 3. end 4. reload

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch> configure terminal

Step 2

sdm prefer { advanced | vlan } Example:
Switch(config)# sdm prefer advanced

Step 3

end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Specifies the SDM template to be used on the switch. The keywords have these meanings:
· advanced --Supports advanced features such as Netflow.
· vlan --Maximizes VLAN configuration on the switch with no routing supported in hardware.
Note The no sdm prefer command and a default template is not supported.
Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1965

Monitoring and Maintaining SDM Templates

System Management

Step 4

Command or Action reload Example:
Switch# reload

Purpose Reloads the operating system.

Monitoring and Maintaining SDM Templates

Command show sdm prefer reload
no sdm prefer

Purpose Displays the SDM template in use.
Reloads the switch to activate the newly configured SDM template.
Sets the default SDM template.

Configuration Examples for Configuring SDM Templates

Examples: Configuring SDM Templates
This example shows how to configure the VLAN template:

Examples: Displaying SDM Templates
This is an example output showing the advanced template information:

Switch# show sdm prefer
Showing SDM Template Info
This is the Advanced template. Number of VLANs: Unicast MAC addresses: Overflow Unicast MAC addresses: IGMP and Multicast groups: Overflow IGMP and Multicast groups: Directly connected routes: Indirect routes: Security Access Control Entries: QoS Access Control Entries: Policy Based Routing ACEs: Netflow ACEs: Input Microflow policer ACEs: Output Microflow policer ACEs: Flow SPAN ACEs: Tunnels: Control Plane Entries:

4094 32768 512 8192 512 32768 8192 3072 2816 1024 1024 256 256 256 256 512

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1966

System Management

Feature History and Information for Configuring SDM Templates

Input Netflow flows:

8192

Output Netflow flows:

16384

These numbers are typical for L2 and IPv4 features.

Some features such as IPv6, use up double the entry size;

so only half as many entries can be created.

Switch#

This is an example output showing the VLAN template information:

Switch# show sdm prefer vlan

Showing SDM Template Info

This is the VLAN template for a typical Layer 2 network.

Number of VLANs:

4094

Unicast MAC addresses:

32768

Overflow Unicast MAC addresses:

512

IGMP and Multicast groups:

8192

Overflow IGMP and Multicast groups:

512

Directly connected routes:

32768

Indirect routes:

8192

Security Access Control Entries:

3072

QoS Access Control Entries:

3072

Policy Based Routing ACEs:

0

Netflow ACEs:

1024

Input Microflow policer ACEs:

0

Output Microflow policer ACEs:

0

Flow SPAN ACEs:

256

Tunnels:

0

Control Plane Entries:

512

Input Netflow flows:

16384

Output Netflow flows:

8192

These numbers are typical for L2 and IPv4 features.

Some features such as IPv6, use up double the entry size;

so only half as many entries can be created.

Switch#

Feature History and Information for Configuring SDM Templates

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1967

Feature History and Information for Configuring SDM Templates

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1968

1 0 0 C H A P T E R
Configuring System Message Logs
· Finding Feature Information, on page 1969 · Restrictions for Configuring System Message Logs, on page 1969 · Information About Configuring System Message Logs, on page 1969 · How to Configure System Message Logs, on page 1972 · Monitoring and Maintaining System Message Logs, on page 1981 · Configuration Examples for System Message Logs, on page 1981 · Additional References for System Message Logs, on page 1982 · Feature History and Information For System Message Logs, on page 1983
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Configuring System Message Logs
When the logging discriminator command is configured, the device may experience memory leak or crash. This usually happens during heavy syslog or debug output. The rate of the memory leak is dependent on the number of logs being produced. In extreme cases, the device may also crash. As a workaround, use the no logging discriminator command to disable the logging discriminator.
Information About Configuring System Message Logs
System Messsage Logging
By default, a switch sends the output from system messages and debug privileged EXEC commands to a logging process. Stack members can trigger system messages. A stack member that generates a system message appends its hostname in the form of hostname-n, where n is a switch , and redirects the output to the logging
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1969

System Log Message Format

System Management

process on the active switch. Though the active switch is a stack member, it does not append its hostname to system messages. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer, terminal lines, or a UNIX syslog server, depending on your configuration. The process also sends messages to the console.
When the logging process is disabled, messages are sent only to the console. The messages are sent as they are generated, so message and debug output are interspersed with prompts or output from other commands. Messages appear on the active consoles after the process that generated them has finished.
You can set the severity level of the messages to control the type of messages displayed on the consoles and each of the destinations. You can time-stamp log messages or set the syslog source address to enhance real-time debugging and management. For information on possible messages, see the system message guide for this release.
You can access logged system messages by using the switch command-line interface (CLI) or by saving them to a properly configured syslog server. The switch software saves syslog messages in an internal buffer on a standalone switch, and in the case of a switch stack, on the active switch. If a standalone switch or the stack master fails, the log is lost unless you had saved it to flash memory.
You can remotely monitor system messages by viewing the logs on a syslog server or by accessing the switch through Telnet, through the console port, or through the Ethernet management port. In a switch stack, all stack member consoles provide the same console output.

Note The syslog format is compatible with 4.3 BSD UNIX.

System Log Message Format
System log messages can contain up to 80 characters and a percent sign (%), which follows the optional sequence number or time-stamp information, if configured. Depending on the switch, messages appear in one of these formats:
· seq no:timestamp: %facility-severity-MNEMONIC:description (hostname-n) · seq no:timestamp: %facility-severity-MNEMONIC:description
The part of the message preceding the percent sign depends on the setting of these global configuration commands:
· service sequence-numbers · service timestamps log datetime · service timestamps log datetime [localtime] [msec] [show-timezone] · service timestamps log uptime

Table 181: System Log Message Elements

Element seq no:

Description
Stamps log messages with a sequence number only if the service sequence-numbers global configuration command is configured.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1970

System Management

Default System Message Logging Settings

Element timestamp formats: mm/dd h h:mm:ss or hh:mm:ss (short uptime) or d h (long uptime) facility severity MNEMONIC description hostname-n

Description Date and time of the message or event. This information appears only if the service timestamps log [datetime | log] global configuration command is configured.
The facility to which the message refers (for example, SNMP, SYS, and so forth). Single-digit code from 0 to 7 that is the severity of the message. Text string that uniquely describes the message. Text string containing detailed information about the event being reported. Hostname of a stack member and its switch number in the stack. Though the active switch is a stack member, it does not append its hostname to system messages.

Default System Message Logging Settings

Table 182: Default System Message Logging Settings

Feature

Default Setting

System message logging to the console Enabled.

Console severity

Debugging.

Logging file configuration

No filename specified.

Logging buffer size

4096 bytes.

Logging history size

1 message.

Time stamps

Disabled.

Synchronous logging

Disabled.

Logging server

Disabled.

Syslog server IP address

None configured.

Server facility

Local7

Server severity

Informational.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1971

Syslog Message Limits

System Management

Syslog Message Limits
If you enabled syslog message traps to be sent to an SNMP network management station by using the snmp-server enable trap global configuration command, you can change the level of messages sent and stored in the switch history table. You also can change the number of messages that are stored in the history table.
Messages are stored in the history table because SNMP traps are not guaranteed to reach their destination. By default, one message of the level warning and numerically lower levels are stored in the history table even if syslog traps are not enabled.
When the history table is full (it contains the maximum number of message entries specified with the logging history size global configuration command), the oldest message entry is deleted from the table to allow the new message entry to be stored.
The history table lists the level keywords and severity level. For SNMP usage, the severity level values increase by 1. For example, emergencies equal 1, not 0, and critical equals 3, not 2.
Enabling Syslog Trap Messages
You can enable Syslog traps using the snmp-server enable traps syslog command.
After enabling Syslog traps, you have to specify the trap message severity. Use the logging snmp-trap command to specify the trap level. By default, the command enables severity 0 to 4. To enable all the severity level, configure the logging snmp-trap 0 7 command.
To enable individual trap levels, configure the following commands:
· logging snmp-trap emergencies:Enables only severity 0 traps.
· logging snmp-trap alert Enables only severity 1 traps.
Note that, along with the Syslog traps, the Syslog history should also be applied. Without this configuration, Syslog traps are not sent.
Use the logging history informational command to enable the Syslog history.

How to Configure System Message Logs

Setting the Message Display Destination Device
If message logging is enabled, you can send messages to specific locations in addition to the console. This task is optional.

SUMMARY STEPS

1. configure terminal 2. logging buffered [size] 3. logging host 4. logging file flash: filename [max-file-size [min-file-size]] [severity-level-number | type] 5. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1972

System Management

Setting the Message Display Destination Device

6. terminal monitor

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2
Step 3 Step 4

logging buffered [size] Example:
Switch(config)# logging buffered 8192

Logs messages to an internal buffer on the switch or on a standalone switch or, in the case of a switch stack, on the active switch. The range is 4096 to 2147483647 bytes. The default buffer size is 4096 bytes.
If a standalone switch or the active switch fails, the log file is lost unless you previously saved it to flash memory. See Step 4.
Note Do not make the buffer size too large because the switch could run out of memory for other tasks. Use the show memory privileged EXEC command to view the free processor memory on the switch. However, this value is the maximum available, and the buffer size should not be set to this amount.

logging host Example:
Switch(config)# logging 125.1.1.100

Logs messages to a UNIX syslog server host.
host specifies the name or IP address of the host to be used as the syslog server.
To build a list of syslog servers that receive logging messages, enter this command more than once.

logging file flash: filename [max-file-size [min-file-size]] [severity-level-number | type] Example:
Switch(config)# logging file flash:log_msg.txt 40960 4096 3

Stores log messages in a file in flash memory on a standalone switch or, in the case of a switch stack, on the active switch.
· filename--Enters the log message filename.
· (Optional) max-file-size --Specifies the maximum logging file size. The range is 4096 to 2147483647. The default is 4096 bytes.

· (Optional) min-file-size--Specifies the minimum logging file size. The range is 1024 to 2147483647. The default is 2048 bytes.

· (Optional) severity-level-number | type--Specifies either the logging severity level or the logging type. The severity range is 0 to 7.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1973

Synchronizing Log Messages

System Management

Step 5

Command or Action end Example:
Switch(config)# end

Step 6

terminal monitor Example:
Switch# terminal monitor

Purpose Returns to privileged EXEC mode.
Logs messages to a nonconsole terminal during the current session. Terminal parameter-setting commands are set locally and do not remain in effect after the session has ended. You must perform this step for each session to see the debugging messages.

Synchronizing Log Messages
You can synchronize unsolicited messages and debug privileged EXEC command output with solicited device output and prompts for a specific console port line or virtual terminal line. You can identify the types of messages to be output asynchronously based on the level of severity. You can also configure the maximum number of buffers for storing asynchronous messages for the terminal after which messages are dropped.
When synchronous logging of unsolicited messages and debug command output is enabled, unsolicited device output appears on the console or printed after solicited device output appears or is printed. Unsolicited messages and debug command output appears on the console after the prompt for user input is returned. Therefore, unsolicited messages and debug command output are not interspersed with solicited device output and prompts. After the unsolicited messages appear, the console again displays the user prompt.
This task is optional.

SUMMARY STEPS

1. configure terminal 2. line [console | vty] line-number [ending-line-number] 3. logging synchronous [level [severity-level | all] | limit number-of-buffers] 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

line [console | vty] line-number [ending-line-number] Example:

Specifies the line to be configured for synchronous logging of messages.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1974

System Management

Disabling Message Logging

Step 3 Step 4

Command or Action
Switch(config)# line console

Purpose
· console --Specifies configurations that occur through the switch console port or the Ethernet management port.
· line vty line-number--Specifies which vty lines are to have synchronous logging enabled. You use a vty connection for configurations that occur through a Telnet session. The range of line numbers is from 0 to 15.

You can change the setting of all 16 vty lines at once by entering:
line vty 0 15
You can also change the setting of the single vty line being used for your current connection. For example, to change the setting for vty line 2, enter:
line vty 2
When you enter this command, the mode changes to line configuration.

logging synchronous [level [severity-level | all] | limit Enables synchronous logging of messages.

number-of-buffers]

· (Optional) level severity-level--Specifies the message

Example:

severity level. Messages with a severity level equal to

or higher than this value are printed asynchronously.

Switch(config)# logging synchronous level 3 limit

Low numbers mean greater severity and high numbers

1000

mean lesser severity. The default is 2.

· (Optional) level all--Specifies that all messages are printed asynchronously regardless of the severity level.

· (Optional) limit number-of-buffers--Specifies the number of buffers to be queued for the terminal after which new messages are dropped. The range is 0 to 2147483647. The default is 20.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Disabling Message Logging
Message logging is enabled by default. It must be enabled to send messages to any destination other than the console. When enabled, log messages are sent to a logging process, which logs messages to designated locations asynchronously to the processes that generated the messages.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1975

Enabling and Disabling Time Stamps on Log Messages

System Management

Disabling the logging process can slow down the switch because a process must wait until the messages are written to the console before continuing. When the logging process is disabled, messages appear on the console as soon as they are produced, often appearing in the middle of command output.
The logging synchronous global configuration command also affects the display of messages to the console. When this command is enabled, messages appear only after you press Return.
To reenable message logging after it has been disabled, use the logging on global configuration command.
This task is optional.

SUMMARY STEPS

1. configure terminal 2. no logging console 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

no logging console Example:
Switch(config)# no logging console

Disables message logging.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Enabling and Disabling Time Stamps on Log Messages
By default, log messages are not time-stamped. This task is optional.

SUMMARY STEPS

1. configure terminal 2. Use one of these commands:
· service timestamps log uptime · service timestamps log datetime[msec | localtime | show-timezone]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1976

System Management

Enabling and Disabling Sequence Numbers in Log Messages

3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

Use one of these commands:

Enables log time stamps.

· service timestamps log uptime · service timestamps log datetime[msec | localtime |
show-timezone]
Example:
Switch(config)# service timestamps log uptime

· log uptime--Enables time stamps on log messages, showing the time since the system was rebooted.
· log datetime--Enables time stamps on log messages. Depending on the options selected, the time stamp can include the date, time in milliseconds relative to the local time zone, and the time zone name.

or

Switch(config)# service timestamps log datetime

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Enabling and Disabling Sequence Numbers in Log Messages
If there is more than one log message with the same time stamp, you can display messages with sequence numbers to view these messages. By default, sequence numbers in log messages are not displayed. This task is optional.

SUMMARY STEPS

1. configure terminal 2. service sequence-numbers 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1977

Defining the Message Severity Level

System Management

Command or Action
Switch# configure terminal

Step 2

service sequence-numbers Example:
Switch(config)# service sequence-numbers

Step 3

end Example:
Switch(config)# end

Purpose Enables sequence numbers. Returns to privileged EXEC mode.

Defining the Message Severity Level
Limit messages displayed to the selected device by specifying the severity level of the message. This task is optional.

SUMMARY STEPS

1. configure terminal 2. logging console level 3. logging monitor level 4. logging trap level 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

logging console level Example:
Switch(config)# logging console 3

Limits messages logged to the console.
By default, the console receives debugging messages and numerically lower levels.

Step 3

logging monitor level Example:

Limits messages logged to the terminal lines.
By default, the terminal receives debugging messages and numerically lower levels.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1978

System Management

Limiting Syslog Messages Sent to the History Table and to SNMP

Command or Action
Switch(config)# logging monitor 3

Step 4

logging trap level Example:
Switch(config)# logging trap 3

Step 5

end Example:
Switch(config)# end

Purpose
Limits messages logged to the syslog servers. By default, syslog servers receive informational messages and numerically lower levels.
Returns to privileged EXEC mode.

Limiting Syslog Messages Sent to the History Table and to SNMP
This task explains how to limit syslog messages that are sent to the history table and to SNMP. This task is optional.

SUMMARY STEPS

1. configure terminal 2. logging history level 3. logging history size number 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

logging history level Example:
Switch(config)# logging history 3

Changes the default level of syslog messages stored in the history file and sent to the SNMP server.
By default, warnings, errors, critical, alerts, and emergencies messages are sent.

Step 3

logging history size number Example:

Specifies the number of syslog messages that can be stored in the history table.
The default is to store one message. The range is 0 to 500 messages.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1979

Logging Messages to a UNIX Syslog Daemon

System Management

Command or Action
Switch(config)# logging history size 200

Step 4

end Example:
Switch(config)# end

Purpose Returns to privileged EXEC mode.

Logging Messages to a UNIX Syslog Daemon
This task is optional.

Note Some recent versions of UNIX syslog daemons no longer accept by default syslog packets from the network. If this is the case with your system, use the UNIX man syslogd command to decide what options must be added to or removed from the syslog command line to enable logging of remote syslog messages.

Before you begin · Log in as root.
· Before you can send system log messages to a UNIX syslog server, you must configure the syslog daemon on a UNIX server.

SUMMARY STEPS

1. Add a line to the file /etc/syslog.conf. 2. Enter these commands at the UNIX shell prompt. 3. Make sure the syslog daemon reads the new changes.

DETAILED STEPS

Step 1

Command or Action Add a line to the file /etc/syslog.conf. Example:

local7.debug /usr/adm/logs/cisco.log

Purpose
· local7--Specifies the logging facility.
· debug--Specifies the syslog level. The file must already exist, and the syslog daemon must have permission to write to it.

Step 2

Enter these commands at the UNIX shell prompt. Example:
$ touch /var/log/cisco.log $ chmod 666 /var/log/cisco.log

Creates the log file. The syslog daemon sends messages at this level or at a more severe level to this file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1980

System Management

Monitoring and Maintaining System Message Logs

Step 3

Command or Action Make sure the syslog daemon reads the new changes. Example:
$ kill -HUP `cat /etc/syslog.pid`

Purpose
For more information, see the man syslog.conf and man syslogd commands on your UNIX system.

Monitoring and Maintaining System Message Logs

Monitoring Configuration Archive Logs

Command

Purpose

show archive log config {all | number

Displays the entire configuration log or the log for specified

[end-number] | user username [session number] parameters.

number [end-number] | statistics}

[provisioning]

Configuration Examples for System Message Logs
Example: Stacking System Message
This example shows a partial switch system message for active switch and a stack member (hostname Switch-2):
00:00:46: %LINK-3-UPDOWN: Interface Port-channel1, changed state to up 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/1, changed state to up 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/2, changed state to up 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/1, changed state to down 2 *Mar 1 18:46:11: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) 18:47:02: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) *Mar 1 18:48:50.483 UTC: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36)
00:00:46: %LINK-3-UPDOWN: Interface Port-channel1, changed state to up (Switch-2) 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet2/0/1, changed state to up (Switch-2) 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet2/0/2, changed state to up (Switch-2) 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down (Switch-2) 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0/1, changed state to down 2 (Switch-2)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1981

Example: Switch System Message

System Management

Example: Switch System Message
This example shows a partial switch system message on a switch:
00:00:46: %LINK-3-UPDOWN: Interface Port-channel1, changed state to up 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up 00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet0/2, changed state to up 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down 00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state
to down 2 *Mar 1 18:46:11: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) 18:47:02: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) *Mar 1 18:48:50.483 UTC: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36)

Additional References for System Message Logs

Related Documents Related Topic System management commands Platform-independent command references
Platform-independent configuration information

Document Title
System Management Command Reference (Catalyst 3650 Switches)
Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
IP Addressing Configuration Guide Library, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1982

System Management

Feature History and Information For System Message Logs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information For System Message Logs

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1983

Feature History and Information For System Message Logs

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1984

1 0 1 C H A P T E R
Configuring Online Diagnostics
· Finding Feature Information, on page 1985 · Information About Configuring Online Diagnostics, on page 1985 · How to Configure Online Diagnostics, on page 1986 · Monitoring and Maintaining Online Diagnostics, on page 1990 · Configuration Examples for Online Diagnostic Tests, on page 1991 · Additional References for Online Diagnostics, on page 1993 · Feature History and Information for Configuring Online Diagnostics, on page 1994
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Configuring Online Diagnostics
Online Diagnostics
With online diagnostics, you can test and verify the hardware functionality of the switch while the switch is connected to a live network. The online diagnostics contain packet switching tests that check different hardware components and verify the data path and the control signals. The online diagnostics detect problems in these areas:
· Hardware components · Interfaces (Ethernet ports and so forth) · Solder joints
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1985

How to Configure Online Diagnostics

System Management

Online diagnostics are categorized as on-demand, scheduled, or health-monitoring diagnostics. On-demand diagnostics run from the CLI; scheduled diagnostics run at user-designated intervals or at specified times when the switch is connected to a live network; and health-monitoring runs in the background with user-defined intervals. By default, the health-monitoring test runs for every 30 seconds.
After you configure online diagnostics, you can manually start diagnostic tests or display the test results. You can also see which tests are configured for the switch or switch stack and the diagnostic tests that have already run.

How to Configure Online Diagnostics

Starting Online Diagnostic Tests
After you configure diagnostic tests to run on the switch, use the diagnostic start privileged EXEC command to begin diagnostic testing. After starting the tests, you cannot stop the testing process. Use this privileged EXEC command to manually start online diagnostic testing:

SUMMARY STEPS

1. diagnostic start switch number test {name | test-id | test-id-range | all | basic | complete | minimal | non-disruptive | per-port}

DETAILED STEPS

Step 1

Command or Action
diagnostic start switch number test {name | test-id | test-id-range | all | basic | complete | minimal | non-disruptive | per-port}
Example:

Switch# diagnostic start switch 2 test basic

Purpose Starts the diagnostic tests. The switch number keyword is supported only on stacking switches. The range is from 1 to 4. You can specify the tests by using one of these options:
· name--Enters the name of the test. · test-id--Enters the ID number of the test. · test-id-range--Enters the range of test IDs by using
integers separated by a comma and a hyphen. · all--Starts all of the tests. · basic-- Starts the basic test suite. · complete--Starts the complete test suite. · minimal--Starts the minimal bootup test suite. · non-disruptive--Starts the non-disruptive test suite. · per-port--Starts the per-port test suite.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1986

System Management

Configuring Online Diagnostics

Example

Configuring Online Diagnostics
You must configure the failure threshold and the interval between tests before enabling diagnostic monitoring.

Scheduling Online Diagnostics
You can schedule online diagnostics to run at a designated time of day or on a daily, weekly, or monthly basis for a switch. Use the no form of this command to remove the scheduling.

SUMMARY STEPS

1. configure terminal 2. diagnostic schedule switch number test {name | test-id | test-id-range | all | basic | complete | minimal
| non-disruptive | per-port} {daily | on mm dd yyyy hh:mm | port inter-port-number port-number-list | weekly day-of-week hh:mm}

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal

Step 2

diagnostic schedule switch number test {name | test-id | Schedules on-demand diagnostic tests for a specific day

test-id-range | all | basic | complete | minimal |

and time.

non-disruptive | per-port} {daily | on mm dd yyyy hh:mm The switch number keyword is supported only on stacking

| port inter-port-number port-number-list | weekly day-of-week hh:mm}

switches. The range is from 1 to 4.

Example:

When specifying the tests to be scheduled, use these options:

· name--Name of the test that appears in the show

Switch(config)# diagnostic schedule switch 3 test

diagnostic content command output.

1-5 on July 3 2013 23:10

· test-id--ID number of the test that appears in the show

diagnostic content command output.

· test-id-range--ID numbers of the tests that appear in the show diagnostic content command output.

· all--All test IDs.

· basic--Starts the basic on-demand diagnostic tests.

· complete--Starts the complete test suite.

· minimal--Starts the minimal bootup test suite.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1987

Configuring Health-Monitoring Diagnostics

System Management

Command or Action

Purpose · non-disruptive--Starts the non-disruptive test suite. · per-port--Starts the per-port test suite.
You can schedule the tests as follows: · Daily--Use the daily hh:mm parameter. · Specific day and time--Use the on mm dd yyyy hh:mm parameter. · Weekly--Use the weekly day-of-week hh:mm parameter.

Configuring Health-Monitoring Diagnostics
You can configure health-monitoring diagnostic testing on a switch while it is connected to a live network. You can configure the execution interval for each health-monitoring test, enable the switch to generate a syslog message because of a test failure, and enable a specific test.
By default, health monitoring is disabled, but the switch generates a syslog message when a test fails.

SUMMARY STEPS

1. configure terminal 2. diagnostic monitor interval switch number test {name | test-id | test-id-range | all} hh:mm:ss milliseconds
day 3. diagnostic monitor syslog 4. diagnostic monitor threshold switch number test {name | test-id | test-id-range | all} failure count
count 5. diagnostic monitor switch number test {name | test-id | test-id-range | all} 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Step 2

Switch# configure terminal

diagnostic monitor interval switch number test {name | Configures the health-monitoring interval of the specified test-id | test-id-range | all} hh:mm:ss milliseconds day tests.

Example:

The switch number keyword is supported only on stacking

switches. The range is from 1 to 9.

Switch(config)# diagnostic 2 test 1 12:30:00 750 5

monitor

interval

switch

When

specifying the

tests, use one of these parameters:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1988

System Management

Configuring Health-Monitoring Diagnostics

Step 3 Step 4
Step 5

Command or Action

Purpose · name--Name of the test that appears in the show diagnostic content command output.
· test-id--ID number of the test that appears in the show diagnostic content command output.
· test-id-range--ID numbers of the tests that appear in the show diagnostic content command output.
· all--All of the diagnostic tests.
When specifying the interval, set these parameters:
· hh:mm:ss--Monitoring interval in hours, minutes, and seconds. The range for hh is 0 to 24, and the range for mm and ss is 0 to 60.
· milliseconds--Monitoring interval in milliseconds (ms). The range is from 0 to 999.
· day--Monitoring interval in the number of days. The range is from 0 to 20.

diagnostic monitor syslog Example:

(Optional) Configures the switch to generate a syslog message when a health-monitoring test fails.

Switch(config)# diagnostic monitor syslog

diagnostic monitor threshold switch number test {name (Optional) Sets the failure threshold for the

| test-id | test-id-range | all} failure count count

health-monitoring tests.

Example:

The switch number keyword is supported only on stacking switches. The range is from 1 to 9.

Switch(config)# diagnostic monitor 2 test 1 failure count 20

threshold

switch

When

specifying

the

tests,

use

one

of

these

parameters:

· name--Name of the test that appears in the show diagnostic content command output.

· test-id--ID number of the test that appears in the show diagnostic content command output.

· test-id-range--ID numbers of the tests that appear in the show diagnostic content command output.

· all--All of the diagnostic tests.

The range for the failure threshold count is 0 to 99.

diagnostic monitor switch number test {name | test-id | test-id-range | all}
Example:

Enables the specified health-monitoring tests.
The switch number keyword is supported only on stacking switches. The range is from 1 to 9.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1989

Monitoring and Maintaining Online Diagnostics

System Management

Step 6

Command or Action

Purpose

When specifying the tests, use one of these parameters:

Switch(config)# diagnostic monitor switch 2 test

1

· name--Name of the test that appears in the show

diagnostic content command output.

· test-id--ID number of the test that appears in the show diagnostic content command output.

· test-id-range--ID numbers of the tests that appear in the show diagnostic content command output.

· all--All of the diagnostic tests.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Monitoring and Maintaining Online Diagnostics

Displaying Online Diagnostic Tests and Test Results
You can display the online diagnostic tests that are configured for the switch ro switch stack and check the test results by using the privileged EXEC show commands in this table:
Table 183: Commands for Diagnostic Test Configuration and Results

Command

Purpose

show diagnostic content switch [number Displays the online diagnostics configured for a switch.

| all]

The switch [number | all] parameter is supported only on

stacking switches.

show diagnostic status

Displays the currently running diagnostic tests.

show diagnostic result switch [number | all] [detail | test {name | test-id | test-id-range | all} [detail]]

Displays the online diagnostics test results.
The switch [number | all] parameter is supported only on stacking switches.

show diagnostic switch [number | all] [detail]

Displays the online diagnostics test results.
The switch [number | all] parameter is supported only on stacking switches.

show diagnostic schedule switch [number Displays the online diagnostics test schedule.

| all]

The switch [number | all] parameter is supported only on

stacking switches.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1990

System Management

Configuration Examples for Online Diagnostic Tests

Command show diagnostic post

Purpose
Displays the POST results. (The output is the same as the show post command output.)

Configuration Examples for Online Diagnostic Tests
Examples: Start Diagnostic Tests
This example shows how to start a diagnostic test by using the test name:
Switch# diagnostic start switch 2 test TestInlinePwrCtlr
This example shows how to start all of the basic diagnostic tests:
Switch# diagnostic start switch 1 test all
Example: Configure a Health Monitoring Test
This example shows how to configure a health-monitoring test:
Switch(config)# diagnostic monitor threshold switch 1 test 1 failure count 50 Switch(config)# diagnostic monitor interval switch 1 test TestPortAsicStackPortLoopback

Examples: Schedule Diagnostic Test
This example shows how to schedule diagnostic testing for a specific day and time on a specific switch:
Switch(config)# diagnostic schedule test DiagThermalTest on June 3 2013 22:25
This example shows how to schedule diagnostic testing to occur weekly at a certain time on a specific switch:
Switch(config)# diagnostic schedule switch 1 test 1,2,4-6 weekly saturday 10:30
Examples: Displaying Online Diagnostics
This example shows how to display on demand diagnostic settings:
Switch# show diagnostic ondemand settings Test iterations = 1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1991

Examples: Displaying Online Diagnostics

System Management

Action on test failure = continue
This example shows how to display diagnostic events for errors:
Switch# show diagnostic events event-type error
Diagnostic events (storage for 500 events, 0 events recorded) Number of events matching above criteria = 0
No diagnostic log entry exists.
This example shows how to display the description for a diagnostic test:
Switch# show diagnostic description switch 1 test all
DiagGoldPktTest : The GOLD packet Loopback test verifies the MAC level loopback functionality. In this test, a GOLD packet, for which doppler provides the support in hardware, is sent. The packet loops back at MAC level and is matched against the stored packet. It is a non -disruptive test.
DiagThermalTest : This test verifies the temperature reading from the sensor is below the yellow temperature threshold. It is a non-disruptive test and can be run as a health
monitoring test.
DiagFanTest : This test verifies all fan modules have been inserted and working properly on the
board It is a non-disruptive test and can be run as a health monitoring test.
DiagPhyLoopbackTest : The PHY Loopback test verifies the PHY level loopback functionality. In this test, a packet is sent which loops back at PHY level and is matched against the stored packet. It is a disruptive test and cannot be run as a health monitoring test.
DiagScratchRegisterTest : The Scratch Register test monitors the health of application-specific integrated circuits (ASICs) by writing values into registers and reading back the values from these registers. It is a non-disruptive test and can be run as a health monitoring test.
DiagPoETest : This test checks the PoE controller functionality. This is a disruptive test and should not be performed during normal switch operation.
DiagStackCableTest : This test verifies the stack ring loopback functionality in the stacking environment. It is a disruptive test and cannot be run as a health monitoring test.
DiagMemoryTest : This test runs the exhaustive ASIC memory test during normal switch operation NG3K utilizes mbist for this test. Memory test is very disruptive in nature and requires switch reboot after the test.
Switch#

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1992

System Management

Additional References for Online Diagnostics

This example shows how to display the boot up level:
Switch# show diagnostic bootup level Current bootup diagnostic level: minimal Switch#

Additional References for Online Diagnostics

Related Documents Related Topic System management commands Platform-independent command reference
Platform-independent configuration information

Document Title
System Management Command Reference (Catalyst 3650 Switches)
Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1993

Feature History and Information for Configuring Online Diagnostics

System Management

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Configuring Online Diagnostics

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1994

1 0 2 C H A P T E R
Managing Configuration Files
· Prerequisites for Managing Configuration Files, on page 1995 · Restrictions for Managing Configuration Files, on page 1995 · Information About Managing Configuration Files, on page 1995 · How to Manage Configuration File Information, on page 2001 · Additional References, on page 2030
Prerequisites for Managing Configuration Files
· You should have at least a basic familiarity with the Cisco IOS environment and the command-line interface.
· You should have at least a minimal configuration running on your system. You can create a basic configuration file using the setup command.
Restrictions for Managing Configuration Files
· Many of the Cisco IOS commands described in this document are available and function only in certain configuration modes on the switch.
· Some of the Cisco IOS configuration commands are only available on certain switch platforms, and the command syntax may vary on different platforms.
Information About Managing Configuration Files
Types of Configuration Files
Configuration files contain the Cisco IOS software commands used to customize the functionality of your Cisco switch. Commands are parsed (translated and executed) by the Cisco IOS software when the system is booted (from the startup-config file) or when you enter commands at the CLI in a configuration mode. Startup configuration files (startup-config) are used during system startup to configure the software. Running configuration files (running-config) contain the current configuration of the software. The two configuration
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1995

Configuration Mode and Selecting a Configuration Source

System Management

files can be different. For example, you may want to change the configuration for a short time period rather than permanently. In this case, you would change the running configuration using the configure terminal EXEC command but not save the configuration using the copy running-config startup-config EXEC command.
To change the running configuration, use the configure terminal command, as described in the Modifying the Configuration File (CLI) section. As you use the Cisco IOS configuration modes, commands generally are executed immediately and are saved to the running configuration file either immediately after you enter them or when you exit a configuration mode.
To change the startup configuration file, you can either save the running configuration file to the startup configuration using the copy running-config startup-config EXEC command or copy a configuration file from a file server to the startup configuration (see the Copying a Configuration File from a TFTP Server to the Switch (CLI) section for more information).
Configuration Mode and Selecting a Configuration Source
To enter configuration mode on the switch, enter the configure command at the privileged EXEC prompt. The Cisco IOS software responds with the following prompt asking you to specify the terminal, memory, or a file stored on a network server (network) as the source of configuration commands:
Configuring from terminal, memory, or network [terminal]?
Configuring from the terminal allows you to enter configuration commands at the command line, as described in the following section. See the Re-executing the Configuration Commands in the Startup Configuration File (CLI) section for more information.
Configuring from the network allows you to load and execute configuration commands over the network. See the Copying a Configuration File from a TFTP Server to the Switch (CLI) section for more information.
Configuration File Changes Using the CLI
The Cisco IOS software accepts one configuration command per line. You can enter as many configuration commands as you want. You can add comments to a configuration file describing the commands you have entered. Precede a comment with an exclamation point (!). Because comments are not stored in NVRAM or in the active copy of the configuration file, comments do not appear when you list the active configuration with the show running-config or more system:running-config EXEC command. Comments are not displayed when you list the startup configuration with the show startup-config or more nvram:startup-config EXEC mode command. Comments are stripped out of the configuration file when it is loaded onto the switch. However, you can list the comments in configuration files stored on a File Transfer Protocol (FTP), Remote Copy Protocol (RCP), or Trivial File Transfer Protocol (TFTP) server. When you configure the software using the CLI, the software executes the commands as you enter them.
Location of Configuration Files
Configuration files are stored in the following locations:
· The running configuration is stored in RAM.
· On all platforms except the Class A Flash file system platforms, the startup configuration is stored in nonvolatile random-access memory (NVRAM).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1996

System Management

Copy Configuration Files from a Network Server to the Switch

· On Class A Flash file system platforms, the startup configuration is stored in the location specified by the CONFIG_FILE environment variable (see the Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI) section). The CONFIG_FILE variable defaults to NVRAM and can be a file in the following file systems:
· nvram: (NVRAM)
· bootflash: (internal flash memory)
· usbflash0: (flash file system)
Copy Configuration Files from a Network Server to the Switch
You can copy configuration files from a TFTP, rcp, or FTP server to the running configuration or startup configuration of the switch. You may want to perform this function for one of the following reasons:
· To restore a backed-up configuration file.
· To use the configuration file for another switch. For example, you may add another switch to your network and want it to have a similar configuration to the original switch. By copying the file to the new switch, you can change the relevant parts rather than recreating the whole file.
· To load the same configuration commands on to all of the switches in your network so that all of the switches have similar configurations.
The copy{ftp: | rcp: | tftp:system:running-config} EXEC command loads the configuration files into the switch as if you were typing the commands on the command line. The switch does not erase the existing running configuration before adding the commands. If a command in the copied configuration file replaces a command in the existing configuration file, the existing command is erased. For example, if the copied configuration file contains a different IP address in a particular command than the existing configuration, the IP address in the copied configuration is used. However, some commands in the existing configuration may not be replaced or negated. In this case, the resulting configuration file is a mixture of the existing configuration file and the copied configuration file, with the copied configuration file having precedence.
To restore a configuration file to an exact copy of a file stored on a server, you need to copy the configuration file directly to the startup configuration (using the copy ftp:| rcp:| tftp:} nvram:startup-config command) and reload the switch.
To copy configuration files from a server to a switch, perform the tasks described in the following sections.
The protocol that you use depends on which type of server you are using. The FTP and rcp transport mechanisms provide faster performance and more reliable delivery of data than TFTP. These improvements are possible because the FTP and rcp transport mechanisms are built on and use the TCP/IP stack, which is connection-oriented.
Copying a Configuration File from the Switch to a TFTP Server
In some implementations of TFTP, you must create a dummy file on the TFTP server and give it read, write, and execute permissions before copying a file over it. Refer to your TFTP documentation for more information.
Copying a Configuration File from the Switch to an RCP Server
You can copy a configuration file from the switch to an RCP server.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1997

Restrictions

System Management

Restrictions

One of the first attempts to use the network as a resource in the UNIX community resulted in the design and implementation of the remote shell protocol, which included the remote shell (rsh) and remote copy (rcp) functions. Rsh and rcp give users the ability to execute commands remotely and copy files to and from a file system residing on a remote host or server on the network. The Cisco implementation of rsh and rcp interoperates with standard implementations.
The rcp copy commands rely on the rsh server (or daemon) on the remote system. To copy files using rcp, you need not create a server for file distribution, as you do with TFTP. You need only to have access to a server that supports the remote shell (rsh). (Most UNIX systems support rsh.) Because you are copying a file from one place to another, you must have read permission on the source file and write permission on the destination file. If the destination file does not exist, rcp creates it for you.
Although the Cisco rcp implementation emulates the functions of the UNIX rcp implementation--copying files among systems on the network--the Cisco command syntax differs from the UNIX rcp command syntax. The Cisco rcp support offers a set of copy commands that use rcp as the transport mechanism. These rcp copy commands are similar in style to the Cisco TFTP copy commands, but they offer an alternative that provides faster performance and reliable delivery of data. These improvements are possible because the rcp transport mechanism is built on and uses the TCP/IP stack, which is connection-oriented. You can use rcp commands to copy system images and configuration files from the switch to a network server and vice versa.
You also can enable rcp support to allow users on remote systems to copy files to and from the switch.
To configure the Cisco IOS software to allow remote users to copy files to and from the switch, use the ip rcmd rcp-enable global configuration command.
The RCP protocol requires a client to send a remote username on each RCP request to a server. When you copy a configuration file from the switch to a server using RCP, the Cisco IOS software sends the first valid username it encounters in the following sequence:
1. The username specified in the copy EXEC command, if a username is specified.
2. The username set by the ip rcmd remote-username global configuration command, if the command is configured.
3. The remote username associated with the current tty (terminal) process. For example, if the user is connected to the switch through Telnet and was authenticated through the username command, the switch software sends the Telnet username as the remote username.
4. The switch host name.
For the RCP copy request to execute successfully, an account must be defined on the network server for the remote username. If the server has a directory structure, the configuration file or image is written to or copied from the directory associated with the remote username on the server. For example, if the system image resides in the home directory of a user on the server, you can specify that user name as the remote username.
Use the ip rcmd remote-username command to specify a username for all copies. (Rcmd is a UNIX routine used at the super-user level to execute commands on a remote machine using an authentication scheme based on reserved port numbers. Rcmd stands for "remote command"). Include the username in the copy command if you want to specify a username for that copy operation only.
If you are writing to the server, the RCP server must be properly configured to accept the RCP write request from the user on the switch. For UNIX systems, you must add an entry to the .rhosts file for the remote user on the RCP server. For example, suppose the switch contains the following configuration lines:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1998

System Management

Requirements for the RCP Username

hostname Switch1 ip rcmd remote-username User0
If the switch IP address translates to switch1.example.com, then the .rhosts file for User0 on the RCP server should contain the following line:
Switch1.example.com Switch1
Requirements for the RCP Username The RCP protocol requires a client to send a remote username on each RCP request to a server. When you copy a configuration file from the switch to a server using RCP, the Cisco IOS software sends the first valid username it encounters in the following sequence: 1. The username specified in the copy EXEC command, if a username is specified. 2. The username set by the ip rcmd remote-username global configuration command, if the command is configured. 3. The remote username associated with the current tty (terminal) process. For example, if the user is connected to the switch through Telnet and is authenticated through the username command, the switch software sends the Telnet username as the remote username. 4. The switch host name.
For the RCP copy request to execute, an account must be defined on the network server for the remote username. If the server has a directory structure, the configuration file or image is written to or copied from the directory associated with the remote username on the server. For example, if the system image resides in the home directory of a user on the server, specify that user name as the remote username. Refer to the documentation for your RCP server for more information.
Copying a Configuration File from the Switch to an FTP Server
You can copy a configuration file from the switch to an FTP server.
Understanding the FTP Username and Password The FTP protocol requires a client to send a remote username and password on each FTP request to a server. When you copy a configuration file from the switch to a server using FTP, the Cisco IOS software sends the first valid username it encounters in the following sequence: 1. The username specified in the copy EXEC command, if a username is specified. 2. The username set by the ip ftp username global configuration command, if the command is configured. 3. Anonymous.
The switch sends the first valid password it encounters in the following sequence: 1. The password specified in the copy command, if a password is specified. 2. The password set by the ip ftp password command, if the command is configured.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 1999

Configuration Files Larger than NVRAM

System Management

3. The switch forms a password username @switchname.domain . The variable username is the username associated with the current session, switchname is the configured host name, and domain is the domain of the switch.
The username and password must be associated with an account on the FTP server. If you are writing to the server, the FTP server must be properly configured to accept the FTP write request from the user on the switch.
If the server has a directory structure, the configuration file or image is written to or copied from the directory associated with the username on the server. For example, if the system image resides in the home directory of a user on the server, specify that user name as the remote username.
Refer to the documentation for your FTP server for more information.
Use the ip ftp username and ip ftp password global configuration commands to specify a username and password for all copies. Include the username in the copy EXEC command if you want to specify a username for that copy operation only.
Configuration Files Larger than NVRAM
To maintain a configuration file that exceeds the size of NVRAM, you should be aware of the information in the following sections.
Compressing the Configuration File
The service compress-config global configuration command specifies that the configuration file be stored compressed in NVRAM. Once the configuration file has been compressed, the switch functions normally. When the system is booted, it recognizes that the configuration file is compressed, expands it, and proceeds normally. The more nvram:startup-config EXEC command expands the configuration before displaying it.
Before you compress configuration files, refer to the appropriate hardware installation and maintenance publication. Verify that your system's ROMs support file compression. If not, you can install new ROMs that support file compression.
The size of the configuration must not exceed three times the NVRAM size. For a 128-KB size NVRAM, the largest expanded configuration file size is 384 KB.
The service compress-config global configuration command works only if you have Cisco IOS software Release 10.0 or later release boot ROMs. Installing new ROMs is a one-time operation and is necessary only if you do not already have Cisco IOS Release 10.0 in ROM. If the boot ROMs do not recognize a compressed configuration, the following message is displayed:
Boot ROMs do not support NVRAM compression Config NOT written to NVRAM
Storing the Configuration in Flash Memory on Class A Flash File Systems
On class A Flash file system switches, you can store the startup configuration in flash memory by setting the CONFIG_FILE environment variable to a file in internal flash memory or flash memory in a PCMCIA slot.
See the Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI) section for more information.
Care must be taken when editing or changing a large configuration. Flash memory space is used every time a copy system:running-config nvram:startup-config EXEC command is issued. Because file management for flash memory (such as optimizing free space) is not done automatically, you must pay close attention to

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2000

System Management

Loading the Configuration Commands from the Network

available flash memory. Use the squeeze command to reclaim used space. We recommend that you use a large-capacity Flash card of at least 20 MB.
Loading the Configuration Commands from the Network
You can also store large configurations on FTP, RCP, or TFTP servers and download them at system startup. To use a network server to store large configurations, see the Copying a Configuration File from the Switch to a TFTP Server (CLI) and Configuring the Switch to Download Configuration Files sections for more information on these commands.
Configuring the Switch to Download Configuration Files
You can configure the switch to load one or two configuration files at system startup. The configuration files are loaded into memory and read in as if you were typing the commands at the command line. Thus, the configuration for the switch is a mixture of the original startup configuration and the one or two downloaded configuration files.
Network Versus Host Configuration Files
For historical reasons, the first file the switch downloads is called the network configuration file. The second file the switch downloads is called the host configuration file. Two configuration files can be used when all of the switches on a network use many of the same commands. The network configuration file contains the standard commands used to configure all of the switches. The host configuration files contain the commands specific to one particular host. If you are loading two configuration files, the host configuration file should be the configuration file you want to have precedence over the other file. Both the network and host configuration files must reside on a network server reachable via TFTP, RCP, or FTP, and must be readable.

How to Manage Configuration File Information

Displaying Configuration File Information (CLI)
To display information about configuration files, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. show boot 3. more file-url 4. show running-config 5. show startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2001

Modifying the Configuration File (CLI)

System Management

Step 2 Step 3 Step 4 Step 5

Command or Action
Switch> enable
show boot Example:
Switch# show boot
more file-url Example:
Switch# more 10.1.1.1
show running-config Example:
Switch# show running-config
show startup-config Example:
Switch# show startup-config

Purpose
Lists the contents of the BOOT environment variable (if set), the name of the configuration file pointed to by the CONFIG_FILE environment variable, and the contents of the BOOTLDR environment variable.
Displays the contents of a specified file.
Displays the contents of the running configuration file. (Command alias for the more system:running-config command.)
Displays the contents of the startup configuration file. (Command alias for the more nvram:startup-config command.) On all platforms except the Class A Flash file system platforms, the default startup-config file usually is stored in NVRAM. On the Class A Flash file system platforms, the CONFIG_FILE environment variable points to the default startup-config file. The CONFIG_FILE variable defaults to NVRAM.

Modifying the Configuration File (CLI)
The Cisco IOS software accepts one configuration command per line. You can enter as many configuration commands as you want. You can add comments to a configuration file describing the commands you have entered. Precede a comment with an exclamation point (!). Because comments are not stored in NVRAM or in the active copy of the configuration file, comments do not appear when you list the active configuration with the show running-config or more system:running-config EXEC commands. Comments do not display when you list the startup configuration with the show startup-config or more nvram:startup-config EXEC mode commands. Comments are stripped out of the configuration file when it is loaded onto the switch. However, you can list the comments in configuration files stored on a File Transfer Protocol (FTP), Remote Copy Protocol (RCP), or Trivial File Transfer Protocol (TFTP) server. When you configure the software using the CLI, the software executes the commands as you enter them. To configure the software using the CLI, use the following commands in privileged EXEC mode:

SUMMARY STEPS

1. enable 2. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2002

System Management

Modifying the Configuration File (CLI)

3. configuration command 4. Do one of the following:
· end · ^Z
5. copy system:running-config nvram:startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
configure terminal Example:

Enters global configuration mode.

Step 3 Step 4

Switch# configure terminal
configuration command Example:
Switch(config)# configuration command
Do one of the following: · end · ^Z
Example:

Enter the necessary configuration commands. The Cisco IOS documentation set describes configuration commands organized by technology.
Ends the configuration session and exits to EXEC mode. Note When you press the Ctrl and Z keys
simultaneously, ^Z is displayed to the screen.

Step 5

Switch(config)# end
copy system:running-config nvram:startup-config Example:
Switch# copy system:running-config nvram:startup-config

Saves the running configuration file as the startup configuration file.
You may also use the copy running-config startup-config command alias, but you should be aware that this command is less precise. On most platforms, this command saves the configuration to NVRAM. On the Class A Flash file system platforms, this step saves the configuration to the location specified by the CONFIG_FILE environment variable (the default CONFIG_FILE variable specifies that the file should be saved to NVRAM).

Examples
In the following example, the switch prompt name of the switch is configured. The comment line, indicated by the exclamation mark (!), does not execute any command. The hostname command is

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2003

Copying a Configuration File from the Switch to a TFTP Server (CLI)

System Management

used to change the switch name from switch to new_name. By pressing Ctrl-Z (^Z) or entering the end command, the user quits configuration mode. The copy system:running-config nvram:startup-config command saves the current configuration to the startup configuration.
Switch# configure terminal Switch(config)# !The following command provides the switch host name. Switch(config)# hostname new_name new_name(config)# end new_name# copy system:running-config nvram:startup-config
When the startup configuration is NVRAM, it stores the current configuration information in text format as configuration commands, recording only non-default settings. The memory is checksummed to guard against corrupted data.

Note Some specific commands might not get saved to NVRAM. You need to enter these commands again if you reboot the machine. These commands are noted in the documentation. We recommend that you keep a list of these settings so that you can quickly reconfigure your switch after rebooting.

Copying a Configuration File from the Switch to a TFTP Server (CLI)
To copy configuration information on a TFTP network server, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. copy system:running-config tftp: [[[//location ]/directory ]/filename ] 3. copy nvram:startup-config tftp: [[[//location ]/directory ]/filename ]

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
copy system:running-config tftp: [[[//location ]/directory Copies the running configuration file to a TFTP server. ]/filename ] Example:

Step 3

Switch# copy system:running-config tftp: //server1/topdir/file10
copy nvram:startup-config tftp: [[[//location ]/directory Copies the startup configuration file to a TFTP server. ]/filename ] Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2004

System Management

What to Do Next

Command or Action
Switch# copy nvram:startup-config tftp: //server1/1stdir/file10

Purpose

Examples The following example copies a configuration file from a switch to a TFTP server:

Switch# copy system:running-config tftp://172.16.2.155/tokyo-confg Write file tokyo-confg on host 172.16.2.155? [confirm] Y Writing tokyo-confg!!! [OK]

What to Do Next
After you have issued the copy command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command.

Copying a Configuration File from the Switch to an RCP Server (CLI)
To copy a startup configuration file or a running configuration file from the switch to an RCP server, use the following commands beginning in privileged EXEC mode:

SUMMARY STEPS

1. enable 2. configure terminal 3. ip rcmd remote-username username 4. end 5. Do one of the following:
· copy system:running-config rcp: [[[//[username@]location ]/directory ]/filename ] · copy nvram:startup-config rcp: [[[//[username@]location ]/directory ]/filename ]

DETAILED STEPS

Step 1

Command or Action enable Example:

Step 2

Switch> enable
configure terminal Example:

Switch# configure terminal

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2005

Examples

System Management

Step 3 Step 4 Step 5

Command or Action ip rcmd remote-username username Example:

Purpose (Optional) Changes the default remote username.

Switch(config)# ip rcmd remote-username NetAdmin1

end Example:

(Optional) Exits global configuration mode.

Switch(config)# end
Do one of the following:
· copy system:running-config rcp: [[[//[username@]location ]/directory ]/filename ]
· copy nvram:startup-config rcp: [[[//[username@]location ]/directory ]/filename ]
Example:

· Specifies that the switch running configuration file is to be stored on an RCP server
or
· Specifies that the switch startup configuration file is to be stored on an RCP server

Switch# copy system:running-config rcp: //NetAdmin1@example.com/dir-files/file1

Examples
Storing a Running Configuration File on an RCP Server The following example copies the running configuration file named runfile2-confg to the netadmin1 directory on the remote host with an IP address of 172.16.101.101:
Switch# copy system:running-config rcp://netadmin1@172.16.101.101/runfile2-confg Write file runfile2-confg on host 172.16.101.101?[confirm] Building configuration...[OK] Connected to 172.16.101.101 Switch#
Storing a Startup Configuration File on an RCP Server The following example shows how to store a startup configuration file on a server by using RCP to copy the file:
Switch# configure terminal
Switch(config)# ip rcmd remote-username netadmin2
Switch(config)# end
Switch# copy nvram:startup-config rcp:
Remote host[]? 172.16.101.101
Name of configuration file to write [start-confg]? Write file start-confg on host 172.16.101.101?[confirm] ![OK]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2006

System Management

What to Do Next

What to Do Next
After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command.

Copying a Configuration File from the Switch to the FTP Server (CLI)
To copy a startup configuration file or a running configuration file from the switch to an FTP server, complete the following tasks:

SUMMARY STEPS

1. enable 2. configure terminal 3. ip ftp username username 4. ip ftp password password 5. end 6. Do one of the following:
· copy system:running-config ftp: [[[//[username [:password ]@]location]/directory ]/filename ] or
· copy nvram:startup-config ftp: [[[//[username [:password ]@]location]/directory ]/filename ]

DETAILED STEPS

Step 1

Command or Action enable Example:

Step 2

Switch> enable
configure terminal Example:

Step 3

Switch# configure terminal
ip ftp username username Example:

Step 4

Switch(config)# ip ftp username NetAdmin1
ip ftp password password Example:

Switch(config)# ip ftp password adminpassword

Purpose Enables privileged EXEC mode.
· Enter your password if prompted. Enters global configuration mode on the switch.
(Optional) Specifies the default remote username.
(Optional) Specifies the default password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2007

Examples

System Management

Step 5 Step 6

Command or Action end Example:
Switch(config)# end
Do one of the following: · copy system:running-config ftp: [[[//[username [:password ]@]location]/directory ]/filename ] or · copy nvram:startup-config ftp: [[[//[username [:password ]@]location]/directory ]/filename ]
Example:

Purpose (Optional) Exits global configuration mode. This step is required only if you override the default remote username or password (see Steps 2 and 3).
Copies the running configuration or startup configuration file to the specified location on the FTP server.

Switch# copy system:running-config ftp:

Examples
Storing a Running Configuration File on an FTP Server The following example copies the running configuration file named runfile-confg to the netadmin1 directory on the remote host with an IP address of 172.16.101.101:
Switch# copy system:running-config ftp://netadmin1:mypass@172.16.101.101/runfile-confg Write file runfile-confg on host 172.16.101.101?[confirm] Building configuration...[OK] Connected to 172.16.101.101 Switch#
Storing a Startup Configuration File on an FTP Server The following example shows how to store a startup configuration file on a server by using FTP to copy the file:
Switch# configure terminal
Switch(config)# ip ftp username netadmin2
Switch(config)# ip ftp password mypass
Switch(config)# end
Switch# copy nvram:startup-config ftp:
Remote host[]? 172.16.101.101
Name of configuration file to write [start-confg]? Write file start-confg on host 172.16.101.101?[confirm] ![OK]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2008

System Management

What to Do Next

What to Do Next
After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command.

Copying a Configuration File from a TFTP Server to the Switch (CLI)
To copy a configuration file from a TFTP server to the switch, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. copy tftp: [[[//location]/directory]/filename] system:running-config 3. copy tftp: [[[//location]/directory]/filename] nvram:startup-config 4. copy tftp: [[[//location]/directory]/filename]flash-[n]:/directory/startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
copy tftp: [[[//location]/directory]/filename] system:running-config Example:

Copies a configuration file from a TFTP server to the running configuration.

Step 3

Switch# copy tftp://server1/dir10/datasource system:running-config
copy tftp: [[[//location]/directory]/filename] nvram:startup-config Example:

Copies a configuration file from a TFTP server to the startup configuration.

Step 4

Switch# copy tftp://server1/dir10/datasource nvram:startup-config

copy tftp:

Copies a configuration file from a TFTP server to the startup

[[[//location]/directory]/filename]flash-[n]:/directory/startup-config configuration.

Example:

Switch# copy tftp://server1/dir10/datasource flash:startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2009

What to Do Next

System Management

Examples
In the following example, the software is configured from the file named tokyo-confg at IP address 172.16.2.155:

Switch# copy tftp://172.16.2.155/tokyo-confg system:running-config Configure using tokyo-confg from 172.16.2.155? [confirm] Y Booting tokyo-confg from 172.16.2.155:!!! [OK - 874/16000 bytes]

What to Do Next
After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command.

Copying a Configuration File from the rcp Server to the Switch (CLI)
To copy a configuration file from an rcp server to the running configuration or startup configuration, complete the following tasks:

SUMMARY STEPS

1. enable 2. configure terminal 3. ip rcmd remote-username username 4. end 5. Do one of the following:
· copy rcp:[[[//[username@]location]/directory]/filename]system:running-config
· copy rcp:[[[//[username@]location]/directory]/filename]nvram:startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Step 2

Switch> enable
configure terminal Example:

Step 3

Switch# configure terminal
ip rcmd remote-username username Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
(Optional) Enters configuration mode from the terminal. This step is required only if you override the default remote username (see Step 3).
(Optional) Specifies the remote username.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2010

System Management

Examples

Step 4 Step 5

Command or Action

Purpose

Switch(config)# ip rcmd remote-username NetAdmin1

end Example:

(Optional) Exits global configuration mode. This step is required only if you override the default remote username (see Step 2).

Switch(config)# end

Do one of the following:

Copies the configuration file from an rcp server to the

· copy

running configuration or startup configuration.

rcp:[[[//[username@]location]/directory]/filename]system:running-config

· copy rcp:[[[//[username@]location]/directory]/filename]nvram:startup-config

Example:

Switch# copy rcp://[user1@example.com/dir10/fileone] nvram:startup-config

Examples
Copy RCP Running-Config The following example copies a configuration file named host1-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101, and loads and runs the commands on the switch:
Switch# copy rcp://netadmin1@172.16.101.101/host1-confg system:running-config Configure using host1-confg from 172.16.101.101? [confirm] Connected to 172.16.101.101 Loading 1112 byte file host1-confg:![OK] Switch# %SYS-5-CONFIG: Configured from host1-config by rcp from 172.16.101.101
Copy RCP Startup-Config The following example specifies a remote username of netadmin1. Then it copies the configuration file named host2-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101 to the startup configuration.

Switch# configure terminal Switch(config)# ip rcmd remote-username netadmin1 Switch(config)# end Switch# copy rcp: nvram:startup-config Address of remote host [255.255.255.255]? 172.16.101.101 Name of configuration file[rtr2-confg]? host2-confg Configure using host2-confg from 172.16.101.101?[confirm] Connected to 172.16.101.101 Loading 1112 byte file host2-confg:![OK] [OK] Switch# %SYS-5-CONFIG_NV:Non-volatile store configured from host2-config by rcp from 172.16.101.101

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2011

What to Do Next

System Management

What to Do Next
After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command.

Copying a Configuration File from an FTP Server to the Switch (CLI)
To copy a configuration file from an FTP server to the running configuration or startup configuration, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. configure terminal 3. ip ftp username username 4. ip ftp password password 5. end 6. Do one of the following:
· copy ftp: [[[//[username[:password]@]location] /directory ]/filename]system:running-config
· copy ftp: [[[ //[username[:password]@]location]/directory]/filename]nvram:startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Step 2

Switch> enable
configure terminal Example:

Step 3

Switch# configure terminal
ip ftp username username Example:

Step 4

Switch(config)# ip ftp username NetAdmin1
ip ftp password password Example:

Switch(config)# ip ftp password adminpassword

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
(Optional) Allows you to enter global configuration mode. This step is required only if you want to override the default remote username or password (see Steps 3 and 4).
(Optional) Specifies the default remote username.
(Optional) Specifies the default password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2012

System Management

Examples

Step 5 Step 6

Command or Action

Purpose

end Example:

(Optional) Exits global configuration mode. This step is required only if you override the default remote username or password (see Steps 3 and 4).

Switch(config)# end

Do one of the following:
· copy ftp: [[[//[username[:password]@]location] /directory ]/filename]system:running-config

Using FTP copies the configuration file from a network server to running memory or the startup configuration.

· copy ftp: [[[ //[username[:password]@]location]/directory]/filename]nvram:startup-config

Example:

Switch# copy ftp:nvram:startup-config

Examples
Copy FTP Running-Config
The following example copies a host configuration file named host1-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101, and loads and runs the commands on the switch:
Switch# copy ftp://netadmin1:mypass@172.16.101.101/host1-confg system:running-config Configure using host1-confg from 172.16.101.101? [confirm] Connected to 172.16.101.101 Loading 1112 byte file host1-confg:![OK] Switch# %SYS-5-CONFIG: Configured from host1-config by ftp from 172.16.101.101
Copy FTP Startup-Config
The following example specifies a remote username of netadmin1. Then it copies the configuration file named host2-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101 to the startup configuration:
Switch# configure terminal Switch(config)# ip ftp username netadmin1 Switch(config)# ip ftp password mypass Switch(config)# end Switch# copy ftp: nvram:startup-config Address of remote host [255.255.255.255]? 172.16.101.101 Name of configuration file[host1-confg]? host2-confg Configure using host2-confg from 172.16.101.101?[confirm] Connected to 172.16.101.101 Loading 1112 byte file host2-confg:![OK] [OK] Switch# %SYS-5-CONFIG_NV:Non-volatile store configured from host2-config by ftp from 172.16.101.101

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2013

What to Do Next

System Management

What to Do Next
After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command.

Maintaining Configuration Files Larger than NVRAM
To maintain a configuration file that exceeds the size of NVRAM, perform the tasks described in the following sections:
Compressing the Configuration File (CLI)
To compress configuration files, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. configure terminal 3. service compress-config 4. end 5. Do one of the following:
· Use FTP, RCP, or TFTP to copy the new configuration. · configure terminal
6. copy system:running-config nvram:startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
configure terminal Example:

Enters global configuration mode.

Step 3

Switch# configure terminal
service compress-config Example:

Specifies that the configuration file be compressed.

Step 4

Switch(config)# service compress-config
end Example:

Exits global configuration mode.

Switch(config)# end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2014

System Management

Storing the Configuration in Flash Memory on Class A Flash File Systems (CLI)

Step 5 Step 6

Command or Action Do one of the following:
· Use FTP, RCP, or TFTP to copy the new configuration.
· configure terminal Example:
Switch# configure terminal
copy system:running-config nvram:startup-config Example:
Switch(config)# copy system:running-config nvram:startup-config

Purpose Enters the new configuration:
· If you try to load a configuration that is more than three times larger than the NVRAM size, the following error message is displayed:
"[buffer overflow - file-size /buffer-size bytes]."
When you have finished changing the running-configuration, save the new configuration.

Examples The following example compresses a 129-KB configuration file to 11 KB:
Switch# configure terminal Switch(config)# service compress-config Switch(config)# end Switch# copy tftp://172.16.2.15/tokyo-confg system:running-config Configure using tokyo-confg from 172.16.2.155? [confirm] y Booting tokyo-confg from 172.16.2.155:!!! [OK - 874/16000 bytes] Switch# copy system:running-config nvram:startup-config Building configuration... Compressing configuration from 129648 bytes to 11077 bytes [OK]

Storing the Configuration in Flash Memory on Class A Flash File Systems (CLI)
To store the startup configuration in flash memory, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. copy nvram:startup-config flash-filesystem:filename 3. configure terminal 4. boot config flash-filesystem: filename 5. end 6. Do one of the following:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2015

Storing the Configuration in Flash Memory on Class A Flash File Systems (CLI)

System Management

· Use FTP, RCP, or TFTP to copy the new configuration. If you try to load a configuration that is more than three times larger than the NVRAM size, the following error message is displayed: "[buffer overflow - file-size /buffer-size bytes]. "
· configure terminal
7. copy system:running-config nvram:startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
copy nvram:startup-config flash-filesystem:filename Example:

Copies the current startup configuration to the new location to create the configuration file.

Step 3

Switch# copy nvram:startup-config usbflash0:switch-config
configure terminal Example:

Enters global configuration mode.

Step 4

Switch# configure terminal
boot config flash-filesystem: filename Example:

Specifies that the startup configuration file be stored in flash memory by setting the CONFIG_FILE variable.

Switch(config)# boot config usbflash0:switch-config

Step 5 Step 6

end Example:

Exits global configuration mode.

Switch(config)# end

Do one of the following:

Enters the new configuration.

· Use FTP, RCP, or TFTP to copy the new configuration. If you try to load a configuration that is more than three times larger than the NVRAM size, the following error message is displayed: "[buffer overflow - file-size /buffer-size bytes]. "
· configure terminal

Example:

Switch# configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2016

System Management

Loading the Configuration Commands from the Network (CLI)

Step 7

Command or Action copy system:running-config nvram:startup-config Example:
Switch(config)# copy system:running-config nvram:startup-config

Purpose
When you have finished changing the running-configuration, save the new configuration.

Examples The following example stores the configuration file in usbflash0:
Switch# copy nvram:startup-config usbflash0:switch-config Switch# configure terminal Switch(config)# boot config usbflash0:switch-config Switch(config)# end Switch# copy system:running-config nvram:startup-config

Loading the Configuration Commands from the Network (CLI)
To use a network server to store large configurations, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. copy system:running-config {ftp: | rcp: | tftp:} 3. configure terminal 4. boot network {ftp:[[[//[username [:password ]@]location ]/directory ]/filename ] |
rcp:[[[//[username@]location ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ]} 5. service config 6. end 7. copy system:running-config nvram:startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
copy system:running-config {ftp: | rcp: | tftp:} Example:

Saves the running configuration to an FTP, RCP, or TFTP server.

Switch# copy system:running-config ftp:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2017

Copying Configuration Files from Flash Memory to the Startup or Running Configuration (CLI)

System Management

Step 3 Step 4
Step 5 Step 6 Step 7

Command or Action configure terminal Example:

Purpose Enters global configuration mode.

Switch# configure terminal
boot network {ftp:[[[//[username [:password ]@]location Specifies that the startup configuration file be loaded from ]/directory ]/filename ] | rcp:[[[//[username@]location the network server at startup. ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ]}
Example:

Switch(config)# boot network ftp://user1:guessme@example.com/dir10/file1
service config Example:

Enables the switch to download configuration files at system startup.

Switch(config)# service config
end Example:

Exits global configuration mode.

Switch(config)# end
copy system:running-config nvram:startup-config Example:

Saves the configuration.

Switch# copy system:running-config nvram:startup-config

Copying Configuration Files from Flash Memory to the Startup or Running Configuration (CLI)
To copy a configuration file from flash memory directly to your startup configuration in NVRAM or your running configuration, enter one of the commands in Step 2:

SUMMARY STEPS

1. enable 2. Do one of the following:
· copy filesystem: [partition-number:][filename ] nvram:startup-config · copy filesystem: [partition-number:][filename ] system:running-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2018

System Management

Copying Configuration Files Between Flash Memory File Systems (CLI)

DETAILED STEPS

Step 1

Command or Action enable Example:

Step 2

Switch> enable
Do one of the following:
· copy filesystem: [partition-number:][filename ] nvram:startup-config
· copy filesystem: [partition-number:][filename ] system:running-config
Example:

Switch# copy usbflash0:4:ios-upgrade-1 nvram:startup-config

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
· Loads a configuration file directly into NVRAM or · Copies a configuration file to your running
configuration

Examples The following example copies the file named ios-upgrade-1 from partition 4 of the flash memory PC Card in usbflash0 to the switch startup configurations:
Switch# copy usbflash0:4:ios-upgrade-1 nvram:startup-config Copy 'ios-upgrade-1' from flash device as 'startup-config' ? [yes/no] yes [OK]

Copying Configuration Files Between Flash Memory File Systems (CLI)
On platforms with multiple flash memory file systems, you can copy files from one flash memory file system, such as internal flash memory to another flash memory file system. Copying files to different flash memory file systems lets you create backup copies of working configurations and duplicate configurations for other switchs. To copy a configuration file between flash memory file systems, use the following commands in EXEC mode:

SUMMARY STEPS

1. enable 2. show source-filesystem: 3. copy source-filesystem: [partition-number:][filename ] dest-filesystem:[partition-number:][filename ]

DETAILED STEPS

Step 1

Command or Action enable

Purpose Enables privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2019

Copying Configuration Files Between Flash Memory File Systems (CLI)

System Management

Step 2 Step 3

Command or Action Example:

Purpose · Enter your password if prompted.

Switch> enable
show source-filesystem: Example:

Displays the layout and contents of flash memory to verify the filename.

Switch# show flash:
copy source-filesystem: [partition-number:][filename ] dest-filesystem:[partition-number:][filename ] Example:
Switch# copy flash: usbflash0:

Copies a configuration file between flash memory devices.
· The source device and the destination device cannot be the same. For example, the copy usbflash0: usbflash0: command is invalid.

Example
The following example copies the file named running-config from partition 1 on internal flash memory to partition 1 of usbflash0 on a switch. In this example, the source partition is not specified, so the switch prompts for the partition number:

Switch# copy flash: usbflash0:

System flash

Partition Size Used

Free

Bank-Size State

Copy Mode

1

4096K 3070K

1025K

4096K

Read/Write

Direct

2

16384K 1671K 14712K

8192K

Read/Write

Direct

[Type ?<no> for partition directory; ? for full directory; q to abort]

Which partition? [default = 1]

System flash directory, partition 1:

File Length Name/status

1 3142748 dirt/network/mars-test/c3600-j-mz.latest

2 850

running-config

[3143728 bytes used, 1050576 available, 4194304 total]

usbflash0 flash directory:

File Length Name/status

1 1711088 dirt/gate/c3600-i-mz

2 850

running-config

[1712068 bytes used, 2482236 available, 4194304 total]

Source file name? running-config

Destination file name [running-config]? Verifying checksum for 'running-config' (file # 2)... OK Erase flash device before writing? [confirm] Flash contains files. Are you sure you want to erase? [confirm] Copy 'running-config' from flash: device
as 'running-config' into usbflash0: device WITH erase? [yes/no] yes

Erasing device... eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee ...erased!

[OK - 850/4194304 bytes] Flash device copy took 00:00:30 [hh:mm:ss] Verifying checksum... OK (0x16)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2020

System Management

Copying a Configuration File from an FTP Server to Flash Memory Devices (CLI)

Copying a Configuration File from an FTP Server to Flash Memory Devices (CLI)
To copy a configuration file from an FTP server to a flash memory device, complete the task in this section:

SUMMARY STEPS

1. enable 2. configure terminal 3. ip ftp username username 4. ip ftp password password 5. end 6. copy ftp: [[//location]/directory ]/bundle_name flash:

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2 Step 3

Switch> enable
configure terminal Example:
Switch# configure terminal
ip ftp username username Example:

(Optional) Enters global configuration mode. This step is required only if you override the default remote username or password (see Steps 3 and 4).
(Optional) Specifies the remote username.

Step 4

Switch(config)# ip ftp username Admin01
ip ftp password password Example:

(Optional) Specifies the remote password.

Step 5 Step 6

Switch(config)# ip ftp password adminpassword
end Example:
Switch(config)# end
copy ftp: [[//location]/directory ]/bundle_name flash: Example:

(Optional) Exits configuration mode. This step is required only if you override the default remote username (see Steps 3 and 4).
Copies the configuration file from a network server to the flash memory device using FTP.

Switch>copy ftp:/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin
flash:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2021

What to Do Next

System Management

What to Do Next
After you have issued the copy EXEC command, you may be prompted for additional information or for confirmation of the action. The prompt displayed depends on how much information you provide in the copy command and the current setting of the file prompt global configuration command.

Copying a Configuration File from an RCP Server to Flash Memory Devices (CLI)
To copy a configuration file from an RCP server to a flash memory device, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. configure terminal 3. ip rcmd remote-username username 4. end 5. copy rcp: [[[//[username@]location ]/directory] /bundle_name] flash:

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2 Step 3

Switch> enable
configure terminal Example:
Switch# configure terminal
ip rcmd remote-username username Example:

(Optional) Enters global configuration mode. This step is required only if you override the default remote username or password (see Step 3).
(Optional) Specifies the remote username.

Step 4 Step 5

Switch(config)# ip rcmd remote-username Admin01

end Example:

(Optional) Exits configuration mode. This step is required only if you override the default remote username or password (see Step 3).

Switch(config)# end

copy rcp: [[[//[username@]location ]/directory]

Copies the configuration file from a network server to the

/bundle_name] flash:

flash memory device using RCP. Respond to any switch

Example:

prompts for additional information or confirmation. Prompting depends on how much information you provide

in the copy command and the current setting of the file

Switch# flash:

copy

rcp://netadmin@172.16.101.101/bundle1

prompt

command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2022

System Management

Copying a Configuration File from a TFTP Server to Flash Memory Devices (CLI)

Copying a Configuration File from a TFTP Server to Flash Memory Devices (CLI)
To copy a configuration file from a TFTP server to a flash memory device, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. copy tftp: [[[//location ]/directory ]/bundle_name flash:

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable

copy tftp: [[[//location ]/directory ]/bundle_name flash: Copies the file from a TFTP server to the flash memory

Example:

device. Reply to any switch prompts for additional information or confirmation. Prompting depends on how

Switch# copy

much information you provide in the copy command and the current setting of the file prompt command.

tftp:/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin

flash:

Examples The following example shows the copying of the configuration file named switch-config from a TFTP server to the flash memory card inserted in usbflash0. The copied file is renamed new-config.
Switch# copy tftp:switch-config usbflash0:new-config

Re-executing the Configuration Commands in the Startup Configuration File (CLI)
To re-execute the commands located in the startup configuration file, complete the task in this section:

SUMMARY STEPS

1. enable 2. configure memory

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2023

Clearing the Startup Configuration (CLI)

System Management

DETAILED STEPS

Step 1

Command or Action enable Example:

Step 2

Switch> enable
configure memory Example:

Switch# configure memory

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Re-executes the configuration commands located in the startup configuration file.

Clearing the Startup Configuration (CLI)
You can clear the configuration information from the startup configuration. If you reboot the switch with no startup configuration, the switch enters the Setup command facility so that you can configure the switch from scratch. To clear the contents of your startup configuration, complete the task in this section:

SUMMARY STEPS

1. enable 2. erase nvram

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
erase nvram Example:
Switch# erase nvram

Clears the contents of your startup configuration.
Note For all platforms except the Class A Flash file system platforms, this command erases NVRAM. The startup configuration file cannot be restored once it has been deleted. On Class A Flash file system platforms, when you use the erase startup-config EXEC command, the switch erases or deletes the configuration pointed to by the CONFIG_FILE environment variable. If this variable points to NVRAM, the switch erases NVRAM. If the CONFIG_FILE environment variable specifies a flash memory device and configuration filename, the switch deletes the configuration file. That is, the switch marks the file as "deleted," rather than erasing it. This feature allows you to recover a deleted file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2024

System Management

Deleting a Specified Configuration File (CLI)

Deleting a Specified Configuration File (CLI)
To delete a specified configuration on a specific flash device, complete the task in this section:

SUMMARY STEPS

1. enable 2. delete flash-filesystem:filename

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
delete flash-filesystem:filename Example:
Switch# delete usbflash0:myconfig

Deletes the specified configuration file on the specified flash device.
Note On Class A and B Flash file systems, when you delete a specific file in flash memory, the system marks the file as deleted, allowing you to later recover a deleted file using the undelete EXEC command. Erased files cannot be recovered. To permanently erase the configuration file, use the squeeze EXEC command. On Class C Flash file systems, you cannot recover a file that has been deleted. If you attempt to erase or delete the configuration file specified by the CONFIG_FILE environment variable, the system prompts you to confirm the deletion.

Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI)
On Class A flash file systems, you can configure the Cisco IOS software to load the startup configuration file specified by the CONFIG_FILE environment variable. The CONFIG_FILE variable defaults to NVRAM. To change the CONFIG_FILE environment variable, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. copy [flash-url | ftp-url | rcp-url | tftp-url | system:running-config | nvram:startup-config] dest-flash-url 3. configure terminal 4. boot config dest-flash-url 5. end 6. copy system:running-config nvram:startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2025

Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems (CLI)

System Management

7. show boot

DETAILED STEPS

Step 1

Command or Action enable Example:

Step 2

Switch> enable
copy [flash-url | ftp-url | rcp-url | tftp-url | system:running-config | nvram:startup-config] dest-flash-url Example:

Step 3

Switch# copy system:running-config nvram:startup-config
configure terminal Example:

Step 4

Switch# configure terminal
boot config dest-flash-url Example:

Step 5

Switch(config)# boot config 172.16.1.1
end Example:

Step 6

Switch(config)# end
copy system:running-config nvram:startup-config Example:

Step 7

Switch# copy system:running-config nvram:startup-config
show boot Example:

Switch# show boot

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.
Copies the configuration file to the flash file system from which the switch loads the file on restart.
Enters global configuration mode.
Sets the CONFIG_FILE environment variable. This step modifies the runtime CONFIG_FILE environment variable.
Exits global configuration mode.
Saves the configuration performed in Step 3 to the startup configuration.
(Optional) Allows you to verify the contents of the CONFIG_FILE environment variable.

Examples
The following example copies the running configuration file to the switch. This configuration is then used as the startup configuration when the system is restarted:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2026

System Management

What to Do Next

Switch# copy system:running-config usbflash0:config2 Switch# configure terminal Switch(config)# boot config usbflash0:config2 Switch(config)# end Switch# copy system:running-config nvram:startup-config [ok] Switch# show boot BOOT variable = usbflash0:rsp-boot-m CONFIG_FILE variable = nvram: Current CONFIG_FILE variable = usbflash0:config2 Configuration register is 0x010F
What to Do Next
After you specify a location for the startup configuration file, the nvram:startup-config command is aliased to the new location of the startup configuration file. The more nvram:startup-config EXEC command displays the startup configuration, regardless of its location. The erase nvram:startup-config EXEC command erases the contents of NVRAM and deletes the file pointed to by the CONFIG_FILE environment variable.
When you save the configuration using the copy system:running-config nvram:startup-config command, the switch saves a complete version of the configuration file to the location specified by the CONFIG_FILE environment variable and a distilled version to NVRAM. A distilled version is one that does not contain access list information. If NVRAM contains a complete configuration file, the switch prompts you to confirm your overwrite of the complete version with the distilled version. If NVRAM contains a distilled configuration, the switch does not prompt you for confirmation and proceeds with overwriting the existing distilled configuration file in NVRAM.
Note If you specify a file in a flash device as the CONFIG_FILE environment variable, every time you save your configuration file with the copy system:running-config nvram:startup-config command, the old configuration file is marked as "deleted," and the new configuration file is saved to that device. Eventually, Flash memory fills up as the old configuration files still take up memory. Use the squeeze EXEC command to permanently delete the old configuration files and reclaim the space.
Configuring the Switch to Download Configuration Files
You can specify an ordered list of network configuration and host configuration filenames. The Cisco IOS XE software scans this list until it loads the appropriate network or host configuration file.
To configure the switch to download configuration files at system startup, perform at least one of the tasks described in the following sections:
· Configuring the Switch to Download the Network Configuration File (CLI)
· Configuring the Switch to Download the Host Configuration File (CLI)
If the switch fails to load a configuration file during startup, it tries again every 10 minutes (the default setting) until a host provides the requested files. With each failed attempt, the switch displays the following message on the console terminal:
Booting host-confg... [timed out]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2027

Configuring the Switch to Download the Network Configuration File (CLI)

System Management

If there are any problems with the startup configuration file, or if the configuration register is set to ignore NVRAM, the switch enters the Setup command facility.
Configuring the Switch to Download the Network Configuration File (CLI)
To configure the Cisco IOS software to download a network configuration file from a server at startup, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. configure terminal 3. boot network {ftp:[[[//[username [:password ]@]location ]/directory ]/filename ] |
rcp:[[[//[username@]location ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ]} 4. service config 5. end 6. copy system:running-config nvram:startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
configure terminal Example:

Enters global configuration mode.

Step 3

Switch# configure terminal

boot network {ftp:[[[//[username [:password ]@]location Specifies the network configuration file to download at

]/directory ]/filename ] | rcp:[[[//[username@]location startup, and the protocol to be used (TFTP, RCP, or FTP).

]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ]}

· If you do not specify a network configuration filename, the Cisco IOS software uses the default filename

Example:

network-confg. If you omit the address, the switch

uses the broadcast address.

Switch(config)# boot network tftp:hostfile1

· You can specify more than one network configuration file. The software tries them in order entered until it loads one. This procedure can be useful for keeping files with different configuration information loaded on a network server.

Step 4

service config Example:

Enables the system to automatically load the network file on restart.

Switch(config)# service config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2028

System Management

Configuring the Switch to Download the Host Configuration File (CLI)

Step 5 Step 6

Command or Action end Example:
Switch(config)# end
copy system:running-config nvram:startup-config Example:
Switch# copy system:running-config nvram:startup-config

Purpose Exits global configuration mode.
Saves the running configuration to the startup configuration file.

Configuring the Switch to Download the Host Configuration File (CLI)
To configure the Cisco IOS software to download a host configuration file from a server at startup, complete the tasks in this section:

SUMMARY STEPS

1. enable 2. configure terminal 3. boot host {ftp:[[[//[username [:password ]@]location ]/directory ]/filename ] |
rcp:[[[//[username@]location ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ] } 4. service config 5. end 6. copy system:running-config nvram:startup-config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
configure terminal Example:

Enters global configuration mode.

Step 3

Switch# configure terminal
boot host {ftp:[[[//[username [:password ]@]location ]/directory ]/filename ] | rcp:[[[//[username@]location ]/directory ]/filename ] | tftp:[[[//location ]/directory ]/filename ] } Example:
Switch(config)# boot host tftp:hostfile1

Specifies the host configuration file to download at startup, and the protocol to be used (FTP, RCP, or TFTP):
· If you do not specify a host configuration filename, the switch uses its own name to form a host configuration filename by converting the name to all lowercase letters, removing all domain information, and appending "-confg." If no host name information

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2029

Additional References

System Management

Command or Action

Step 4 Step 5 Step 6

service config Example:
Switch(config)# service config
end Example:
Switch(config)# end
copy system:running-config nvram:startup-config Example:
Switch# copy system:running-config nvram:startup-config

Purpose is available, the software uses the default host configuration filename switch-confg. If you omit the address, the switch uses the broadcast address.
· You can specify more than one host configuration file. The Cisco IOS software tries them in order entered until it loads one. This procedure can be useful for keeping files with different configuration information loaded on a network server.
Enables the system to automatically load the host file upon restart.
Exits global configuration mode.
Saves the running configuration to the startup configuration file.

Example
In the following example, a switch is configured to download the host configuration file named hostfile1 and the network configuration file named networkfile1. The switch uses TFTP and the broadcast address to obtain the file:
Switch# configure terminal Switch(config)# boot host tftp:hostfile1 Switch(config)# boot network tftp:networkfile1 Switch(config)# service config Switch(config)# end Switch# copy system:running-config nvram:startup-config

Additional References
Related Documents Related Topic Cisco IOS commands

Document Title Cisco IOS Master Commands List, All Releases

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2030

System Management

Additional References

Related Topic

Document Title

Cisco IOS configuration commands Cisco IOS Configuration Fundamentals Command Reference

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards

Standard

Title

No new or modified standards are supported, and support for existing standards has not been modified --

MIBs

MIB

MIBs Link

· No new or modified MIBs are supported, To locate and download MIBs for selected platforms, Cisco

and support for existing MIBs has not software releases, and feature sets, use Cisco MIB Locator

been modified.

found at the following URL:

http://www.cisco.com/go/mibs

RFCs

RFC

Title

No new or modified RFCs are supported, and support for existing RFCs has not been modified. --

Technical Assistance

Description

Link

The Cisco Support and Documentation website provides http://www.cisco.com/cisco/web/support/index.html online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2031

Additional References

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2032

1 0 3 C H A P T E R
Configuration Replace and Configuration Rollback
· Prerequisites for Configuration Replace and Configuration Rollback, on page 2033 · Restrictions for Configuration Replace and Configuration Rollback, on page 2034 · Information About Configuration Replace and Configuration Rollback, on page 2034 · How to Use Configuration Replace and Configuration Rollback, on page 2037 · Configuration Examples for Configuration Replace and Configuration Rollback, on page 2043 · Additional References, on page 2045
Prerequisites for Configuration Replace and Configuration Rollback
The format of the configuration files used as input by the Configuration Replace and Configuration Rollback feature must comply with standard Cisco software configuration file indentation rules as follows:
· Start all commands on a new line with no indentation, unless the command is within a configuration submode.
· Indent commands within a first-level configuration submode one space. · Indent commands within a second-level configuration submode two spaces. · Indent commands within subsequent submodes accordingly. These indentation rules describe how the software creates configuration files for such commands as show running-config or copy running-config destination-url. Any configuration file generated on a Cisco device complies with these rules. Free memory larger than the combined size of the two configuration files (the current running configuration and the saved replacement configuration) is required.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2033

Restrictions for Configuration Replace and Configuration Rollback

System Management

Restrictions for Configuration Replace and Configuration Rollback
If the device does not have free memory larger than the combined size of the two configuration files (the current running configuration and the saved replacement configuration), the configuration replace operation is not performed.
Certain Cisco configuration commands such as those pertaining to physical components of a networking device (for example, physical interfaces) cannot be added or removed from the running configuration. For example, a configuration replace operation cannot remove the interface ethernet 0 command line from the current running configuration if that interface is physically present on the device. Similarly, the interface ethernet 1 command line cannot be added to the running configuration if no such interface is physically present on the device. A configuration replace operation that attempts to perform these types of changes results in error messages indicating that these specific command lines failed.
In very rare cases, certain Cisco configuration commands cannot be removed from the running configuration without reloading the device. A configuration replace operation that attempts to remove this type of command results in error messages indicating that these specific command lines failed.
Information About Configuration Replace and Configuration Rollback
Configuration Archive
The Cisco IOS configuration archive is intended to provide a mechanism to store, organize, and manage an archive of Cisco IOS configuration files to enhance the configuration rollback capability provided by the configure replace command. Before this feature was introduced, you could save copies of the running configuration using the copy running-config destination-url command, storing the replacement file either locally or remotely. However, this method lacked any automated file management. On the other hand, the Configuration Replace and Configuration Rollback feature provides the capability to automatically save copies of the running configuration to the Cisco IOS configuration archive. These archived files serve as checkpoint configuration references and can be used by the configure replace command to revert to previous configuration states.
The archive config command allows you to save Cisco IOS configurations in the configuration archive using a standard location and filename prefix that is automatically appended with an incremental version number (and optional timestamp) as each consecutive file is saved. This functionality provides a means for consistent identification of saved Cisco IOS configuration files. You can specify how many versions of the running configuration are kept in the archive. After the maximum number of files are saved in the archive, the oldest file is automatically deleted when the next, most recent file is saved. The show archive command displays information for all configuration files saved in the Cisco IOS configuration archive.
The Cisco IOS configuration archive, in which the configuration files are stored and available for use with the configure replace command, can be located on the following file systems: FTP, HTTP, RCP, TFTP.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2034

System Management

Configuration Replace

Configuration Replace
The configure replace privileged EXEC command provides the capability to replace the current running configuration with any saved Cisco IOS configuration file. This functionality can be used to revert to a previous configuration state, effectively rolling back any configuration changes that were made since the previous configuration state was saved.
When using the configure replace command, you must specify a saved Cisco IOS configuration as the replacement configuration file for the current running configuration. The replacement file must be a complete configuration generated by a Cisco IOS device (for example, a configuration generated by the copy running-config destination-url command), or, if generated externally, the replacement file must comply with the format of files generated by Cisco IOS devices. When the configure replace command is entered, the current running configuration is compared with the specified replacement configuration and a set of diffs is generated. The algorithm used to compare the two files is the same as that employed by the show archive config differences command. The resulting diffs are then applied by the Cisco IOS parser to achieve the replacement configuration state. Only the diffs are applied, avoiding potential service disruption from reapplying configuration commands that already exist in the current running configuration. This algorithm effectively handles configuration changes to order-dependent commands (such as access lists) through a multiple pass process. Under normal circumstances, no more than three passes are needed to complete a configuration replace operation, and a limit of five passes is performed to preclude any looping behavior.
The Cisco IOS copy source-url running-config privileged EXEC command is often used to copy a stored Cisco IOS configuration file to the running configuration. When using the copy source-url running-config command as an alternative to the configure replace target-url privileged EXEC command, the following major differences should be noted:
· The copy source-url running-config command is a merge operation and preserves all of the commands from both the source file and the current running configuration. This command does not remove commands from the current running configuration that are not present in the source file. In contrast, the configure replace target-url command removes commands from the current running configuration that are not present in the replacement file and adds commands to the current running configuration that need to be added.
· The copy source-url running-config command applies every command in the source file, whether or not the command is already present in the current running configuration. This algorithm is inefficient and, in some cases, can result in service outages. In contrast, the configure replace target-url command only applies the commands that need to be applied--no existing commands in the current running configuration are reapplied.
· A partial configuration file may be used as the source file for the copy source-url running-config command, whereas a complete Cisco IOS configuration file must be used as the replacement file for the configure replace target-url command.
A locking feature for the configuration replace operation was introduced. When the configure replace command is used, the running configuration file is locked by default for the duration of the configuration replace operation. This locking mechanism prevents other users from changing the running configuration while the replacement operation is taking place, which might otherwise cause the replacement operation to terminate unsuccessfully. You can disable the locking of the running configuration by using the no lock keyword when issuing the configure replace command.
The running configuration lock is automatically cleared at the end of the configuration replace operation. You can display any locks that may be currently applied to the running configuration using the show configuration lock command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2035

Configuration Rollback

System Management

Configuration Rollback
The concept of rollback comes from the transactional processing model common to database operations. In a database transaction, you might make a set of changes to a given database table. You then must choose whether to commit the changes (apply the changes permanently) or to roll back the changes (discard the changes and revert to the previous state of the table). In this context, rollback means that a journal file containing a log of the changes is discarded, and no changes are applied. The result of the rollback operation is to revert to the previous state, before any changes were applied.
The configure replace command allows you to revert to a previous configuration state, effectively rolling back changes that were made since the previous configuration state was saved. Instead of basing the rollback operation on a specific set of changes that were applied, the Cisco IOS configuration rollback capability uses the concept of reverting to a specific configuration state based on a saved Cisco IOS configuration file. This concept is similar to the database idea of saving a checkpoint (a saved version of the database) to preserve a specific state.
If the configuration rollback capability is desired, you must save the Cisco IOS running configuration before making any configuration changes. Then, after entering configuration changes, you can use that saved configuration file to roll back the changes (using the configure replace target-url command). Furthermore, because you can specify any saved Cisco IOS configuration file as the replacement configuration, you are not limited to a fixed number of rollbacks, as is the case in some rollback models.
Configuration Rollback Confirmed Change
The Configuration Rollback Confirmed Change feature allows configuration changes to be performed with an optional requirement that they be confirmed. If this confirmation is not received, the configuration is returned to the state prior to the changes being applied. The mechanism provides a safeguard against inadvertent loss of connectivity between a network device and the user or management application due to configuration changes.
Benefits of Configuration Replace and Configuration Rollback
· Allows you to revert to a previous configuration state, effectively rolling back configuration changes.
· Allows you to replace the current running configuration file with the startup configuration file without having to reload the switch or manually undo CLI changes to the running configuration file, therefore reducing system downtime.
· Allows you to revert to any saved Cisco IOS configuration state.
· Simplifies configuration changes by allowing you to apply a complete configuration file to the switch, where only the commands that need to be added or removed are affected.
· When using the configure replace command as an alternative to the copy source-url running-config command, increases efficiency and prevents risk of service outages by not reapplying existing commands in the current running configuration.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2036

System Management

How to Use Configuration Replace and Configuration Rollback

How to Use Configuration Replace and Configuration Rollback

Creating a Configuration Archive (CLI)
No prerequisite configuration is needed to use the configure replace command. Using the configure replace command in conjunction with the Cisco IOS configuration archive and the archive config command is optional but offers significant benefit for configuration rollback scenarios. Before using the archive config command, the configuration archive must be configured. Perform this task to configure the characteristics of the configuration archive.

SUMMARY STEPS

1. enable 2. configure terminal 3. archive 4. path url 5. maximum number 6. time-period minutes 7. end 8. archive config

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable
configure terminal Example:

Enters global configuration mode.

Step 3

Switch# configure terminal
archive Example:

Enters archive configuration mode.

Step 4

Switch(config)# archive
path url Example:

Specifies the location and filename prefix for the files in the Cisco IOS configuration archive.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2037

Creating a Configuration Archive (CLI)

System Management

Step 5
Step 6
Step 7 Step 8

Command or Action

Purpose

Note Switch(config-archive)# path flash:myconfiguration

If a directory is specified in the path instead of file, the directory name must be followed by a forward slash as follows: path flash:/directory/. The forward slash is not necessary after a filename; it is only necessary when specifying a directory.

maximum number Example:
Switch(config-archive)# maximum 14

(Optional) Sets the maximum number of archive files of the running configuration to be saved in the Cisco IOS configuration archive.
· The number argument is the maximum number of archive files of the running configuration to be saved in the Cisco IOS configuration archive. Valid values are from 1 to 14. The default is 10.
Note Before using this command, you must configure the path command to specify the location and filename prefix for the files in the Cisco IOS configuration archive.

time-period minutes Example:
Switch(config-archive)# time-period 1440

(Optional) Sets the time increment for automatically saving an archive file of the current running configuration in the Cisco IOS configuration archive.
· The minutes argument specifies how often, in minutes, to automatically save an archive file of the current running configuration in the Cisco IOS configuration archive.
Note Before using this command, you must configure the path command to specify the location and filename prefix for the files in the Cisco IOS configuration archive.

end Example:
Switch(config-archive)# end
archive config Example:
Switch# archive config

Exits to privileged EXEC mode.
Saves the current running configuration file to the configuration archive. Note The path command must be configured before
using this command.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2038

System Management

Performing a Configuration Replace or Configuration Rollback Operation (CLI)

Performing a Configuration Replace or Configuration Rollback Operation (CLI)
Perform this task to replace the current running configuration file with a saved Cisco IOS configuration file.

Note You must create a configuration archive before performing this procedure. See Creating a Configuration Archive (CLI) for detailed steps. The following procedure details how to return to that archived configuration in the event of a problem with the current running configuration.

SUMMARY STEPS

1. enable 2. configure replace target-url [nolock] [list] [force] [ignore case] [revert trigger [error ][timer
minutes] | time minutes] ] 3. configure revert { now | timer {minutes | idle minutes} } 4. configure confirm 5. exit

DETAILED STEPS

Step 1

Command or Action enable Example:

Purpose Enables privileged EXEC mode.
· Enter your password if prompted.

Step 2

Switch> enable

configure replace target-url [nolock] [list] [force] [ignore Replaces the current running configuration file with a saved

case] [revert trigger [error ][timer minutes] | time Cisco IOS configuration file.

minutes] ]

· The target - url argument is a URL (accessible by the

Example:

Cisco IOS file system) of the saved Cisco IOS

configuration file that is to replace the current running

Switch# configure replace flash: startup-config

configuration, such as the configuration file created

time 120

using the archive config command.

· The list keyword displays a list of the command lines applied by the Cisco IOS software parser during each pass of the configuration replace operation. The total number of passes performed is also displayed.

· The force keyword replaces the current running configuration file with the specified saved Cisco IOS configuration file without prompting you for confirmation.

· The time minutes keyword and argument specify the time (in minutes) within which you must enter the configure confirm command to confirm replacement of the current running configuration file. If the configure confirm command is not entered within the

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2039

Performing a Configuration Replace or Configuration Rollback Operation (CLI)

System Management

Step 3
Step 4 Step 5

Command or Action

Purpose
specified time limit, the configuration replace operation is automatically reversed (in other words, the current running configuration file is restored to the configuration state that existed prior to entering the configure replace command).
· The nolock keyword disables the locking of the running configuration file that prevents other users from changing the running configuration during a configuration replace operation.
· The revert trigger keywords set the following triggers for reverting to the original configuration:
· error --Reverts to the original configuration upon error.
· timer minutes --Reverts to the original configuration if specified time elapses.
· The ignore case keyword allows the configuration to ignore the case of the confirmation command.

configure revert { now | timer {minutes | idle minutes} }
Example:

(Optional) To cancel the timed rollback and trigger the rollback immediately, or to reset parameters for the timed rollback, use the configure revertcommand in privileged EXEC mode.

Switch# configure revert now

· now --Triggers the rollback immediately.

· timer --Resets the configuration revert timer.

· Use the minutes argument with the timer keyword to specify a new revert time in minutes.
· Use the idle keyword along with a time in minutes to set the maximum allowable time period of no activity before reverting to the saved configuration.

configure confirm Example:
Switch# configure confirm

(Optional) Confirms replacement of the current running configuration file with a saved Cisco IOS configuration file.
Note Use this command only if the time seconds keyword and argument of the configure replace command are specified.

exit Example:

Exits to user EXEC mode.

Switch# exit

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2040

System Management

Monitoring and Troubleshooting the Feature (CLI)

Monitoring and Troubleshooting the Feature (CLI)
Perform this task to monitor and troubleshoot the Configuration Replace and Configuration Rollback feature.

SUMMARY STEPS

1. enable 2. show archive 3. debug archive versioning 4. debug archive config timestamp 5. exit

DETAILED STEPS

Step 1 Step 2

enable Use this command to enable privileged EXEC mode. Enter your password if prompted. Example:

Switch> enable Switch#
show archive Use this command to display information about the files saved in the Cisco IOS configuration archive. Example:

Switch# show archive

There are currently 1 archive configurations saved.

The next archive file will be named flash:myconfiguration-2

Archive # Name

0

1

flash:myconfiguration-1 <- Most Recent

2

3

4

5

6

7

8

9

10

11

12

13

14

The following is sample output from the show archive command after several archive files of the running configuration have been saved. In this example, the maximum number of archive files to be saved is set to three.

Example:

Switch# show archive There are currently 3 archive configurations saved. The next archive file will be named flash:myconfiguration-8

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2041

Monitoring and Troubleshooting the Feature (CLI)

System Management

Step 3 Step 4
Step 5

Archive # Name

0

1

:Deleted

2

:Deleted

3

:Deleted

4

:Deleted

5

flash:myconfiguration-5

6

flash:myconfiguration-6

7

flash:myconfiguration-7 <- Most Recent

8

9

10

11

12

13

14

debug archive versioning
Use this command to enable debugging of the Cisco IOS configuration archive activities to help monitor and troubleshoot configuration replace and rollback. Example:

Switch# debug archive versioning Jan 9 06:46:28.419:backup_running_config Jan 9 06:46:28.419:Current = 7 Jan 9 06:46:28.443:Writing backup file flash:myconfiguration-7 Jan 9 06:46:29.547: backup worked
debug archive config timestamp
Use this command to enable debugging of the processing time for each integral step of a configuration replace operation and the size of the configuration files being handled.
Example:

Switch# debug archive config timestamp

Switch# configure replace flash:myconfiguration force

Timing Debug Statistics for IOS Config Replace operation:

Time to read file usbflash0:sample_2.cfg = 0 msec (0 sec)

Number of lines read:55

Size of file

:1054

Starting Pass 1

Time to read file system:running-config = 0 msec (0 sec)

Number of lines read:93

Size of file

:2539

Time taken for positive rollback pass = 320 msec (0 sec)

Time taken for negative rollback pass = 0 msec (0 sec)

Time taken for negative incremental diffs pass = 59 msec (0 sec)

Time taken by PI to apply changes = 0 msec (0 sec)

Time taken for Pass 1 = 380 msec (0 sec)

Starting Pass 2

Time to read file system:running-config = 0 msec (0 sec)

Number of lines read:55

Size of file

:1054

Time taken for positive rollback pass = 0 msec (0 sec)

Time taken for negative rollback pass = 0 msec (0 sec)

Time taken for Pass 2 = 0 msec (0 sec)

Total number of passes:1

Rollback Done

exit

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2042

System Management

Configuration Examples for Configuration Replace and Configuration Rollback

Use this command to exit to user EXEC mode. Example:
Switch# exit Switch>

Configuration Examples for Configuration Replace and Configuration Rollback
Creating a Configuration Archive
The following example shows how to perform the initial configuration of the Cisco IOS configuration archive. In this example, flash:myconfiguration is specified as the location and filename prefix for the files in the configuration archive and a value of 10 is set as the maximum number of archive files to be saved.
configure terminal ! archive
path flash:myconfiguration maximum 10 end
Replacing the Current Running Configuration with a Saved Cisco IOS Configuration File
The following example shows how to replace the current running configuration with a saved Cisco IOS configuration file named flash:myconfiguration. The configure replace command interactively prompts you to confirm the operation.
Switch# configure replace flash:myconfiguration This will apply all necessary additions and deletions to replace the current running configuration with the contents of the specified configuration file, which is assumed to be a complete configuration, not a partial configuration. Enter Y if you are sure you want to proceed. ? [no]: Y Total number of passes: 1 Rollback Done
In the following example, the list keyword is specified in order to display the command lines that were applied during the configuration replace operation:
Switch# configure replace flash:myconfiguration list This will apply all necessary additions and deletions to replace the current running configuration with the contents of the specified configuration file, which is assumed to be a complete configuration, not a partial configuration. Enter Y if you are sure you want to proceed. ? [no]: Y

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2043

Reverting to the Startup Configuration File

System Management

!Pass 1 !List of Commands: no snmp-server community public ro snmp-server community mystring ro
end Total number of passes: 1 Rollback Done
Reverting to the Startup Configuration File
The following example shows how to revert to the Cisco IOS startup configuration file using the configure replace command. This example also shows the use of the optional force keyword to override the interactive user prompt:
Switch# configure replace flash:startup-config force Total number of passes: 1 Rollback Done
Performing a Configuration Replace Operation with the configure confirm Command
The following example shows the use of the configure replace command with the time minutes keyword and argument. You must enter the configure confirm command within the specified time limit to confirm replacement of the current running configuration file. If the configure confirm command is not entered within the specified time limit, the configuration replace operation is automatically reversed (in other words, the current running configuration file is restored to the configuration state that existed prior to entering the configure replace command).
Switch# configure replace flash:startup-config time 120 This will apply all necessary additions and deletions to replace the current running configuration with the contents of the specified configuration file, which is assumed to be a complete configuration, not a partial configuration. Enter Y if you are sure you want to proceed. ? [no]: Y Total number of passes: 1 Rollback Done Switch# configure confirm
The following example shows the use of the configure revert command with the timer keyword. You must enter the configure revert command to cancel the timed rollback and trigger the rollback immediately, or to reset parameters for the timed rollback.
Switch# configure revert timer 100
Performing a Configuration Rollback Operation
The following example shows how to make changes to the current running configuration and then roll back the changes. As part of the configuration rollback operation, you must save the current running configuration before making changes to the file. In this example, the archive config command is used to save the current running configuration. The generated output of the configure replace command indicates that only one pass was performed to complete the rollback operation.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2044

System Management

Additional References

Note Before using the archive config command, you must configure the path command to specify the location and filename prefix for the files in the Cisco IOS configuration archive.
You first save the current running configuration in the configuration archive as follows:

archive config

You then enter configuration changes as shown in the following example:

configure terminal ! user netops2 password rain user netops3 password snow exit

After having made changes to the running configuration file, assume you now want to roll back these changes and revert to the configuration that existed before the changes were made. The show archive command is used to verify the version of the configuration to be used as a replacement file. The configure replace command is then used to revert to the replacement configuration file as shown in the following example:

Switch# show archive

There are currently 1 archive configurations saved.

The next archive file will be named flash:myconfiguration-2

Archive # Name

0

1

flash:myconfiguration-1 <- Most Recent

2

3

4

5

6

7

8

9

10

Switch# configure replace flash:myconfiguration-1

Total number of passes: 1

Rollback Done

Additional References

Related Documents Related Topic Configuration Locking
Commands for managing configuration files

Document Title
Exclusive Configuration Change Access and Access Session Locking
Cisco IOS Configuration Fundamentals Command Reference

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2045

Additional References

System Management

Related Topic

Document Title

Information about managing configuration files Managing Configuration Files

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards

Standards

Title

No new or modified standards are supported by this feature, and support for existing standards has not -been modified by this feature.

MIBs

MIBs

MIBs Link

No new or modified MIBs are supported by this To locate and download MIBs for selected platforms, Cisco

feature, and support for existing MIBs has not IOS releases, and feature sets, use Cisco MIB Locator

been modified by this feature.

found at the following URL:

http://www.cisco.com/go/mibs

RFCs

RFCs

Title

No new or modified RFCs are supported by this feature, and support for existing RFCs has not been -modified by this feature.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2046

System Management

Additional References

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

http://www.cisco.com/cisco/web/support/index.html

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2047

Additional References

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2048

1 0 4 C H A P T E R

Working with the Flash File System

· Information About the Flash File System, on page 2049 · Displaying Available File Systems, on page 2049 · Setting the Default File System, on page 2052 · Displaying Information About Files on a File System, on page 2052 · Changing Directories and Displaying the Working Directory (CLI), on page 2053 · Creating Directories (CLI), on page 2054 · Copying Files, on page 2055 · Creating, Displaying and Extracting Files (CLI), on page 2057 · Additional References, on page 2059
Information About the Flash File System
The flash file system is a single flash device on which you can store files. It also provides several commands to help you manage software bundles and configuration files. The default flash file system on the switch is named flash:.
As viewed from the active switch, or any stack member, flash: refers to the local flash device, which is the device attached to the same switch on which the file system is being viewed. In a switch stack, each of the flash devices from the various stack members can be viewed from the active switch. The names of these flash file systems include the corresponding switch member numbers. For example, flash-3:, as viewed from the active switch, refers to the same file system as does flash: on stack member 3. Use the show file systems privileged EXEC command to list all file systems, including the flash file systems in the switch stack.
Only one user at a time can manage the software bundles and configuration files for a switch stack.

Displaying Available File Systems
To display the available file systems on your switch, use the show file systems privileged EXEC command as shown in this example for a standalone switch:

Switch# show file systems

File Systems:

Size(b)

Free(b)

* 15998976

5135872

-

-

-

-

Type flash opaque opaque

Flags rw rw rw

Prefixes flash: bs: vb:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2049

Displaying Available File Systems

System Management

524288 -

520138

nvram

rw

nvram:

- network

rw

tftp:

-

opaque

rw

null:

-

opaque

rw

system:

-

opaque

ro

xmodem:

-

opaque

ro

ymodem:

This example shows a switch stack. In this example, the active switch is stack member 1; the file system on stack member 2 is displayed as flash-2:, the file system on stack member 3 is displayed as flash-3: and so on up to stack member 9, displayed as flash-9: for a 9-member stack. The example also shows the crashinfo directories and a USB flash drive plugged into the active switch:

Switch# show file systems

File Systems:

Size(b)

Free(b)

145898496

5479424

248512512

85983232

146014208

17301504

146014208

0

146014208

1572864

248512512

30932992

146014208

6291456

146276352

15728640

146276352

73400320

* 741621760

481730560

1622147072 1360527360

729546752

469762048

729546752

469762048

729546752

469762048

1622147072 1340604416

729546752

469762048

1749549056 1487929344

1749549056 1487929344

0

0

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

0

0

-

-

-

-

2097152

2055643

-

-

-

-

-

-

-

-

2097152

2055643

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

Type disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk disk opaque opaque nvram nvram opaque opaque network nvram opaque network network network network network opaque opaque

Flags rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw rw ro rw rw rw rw rw ro rw rw wo rw rw rw rw rw ro rw

Prefixes crashinfo:crashinfo-1: crashinfo-2:stby-crashinfo: crashinfo-3: crashinfo-4: crashinfo-5: crashinfo-6: crashinfo-7: crashinfo-8: crashinfo-9: flash:flash-1: flash-2:stby-flash: flash-3: flash-4: flash-5: flash-6: flash-7: flash-8: flash-9: unix: usbflash0:usbflash0-1: usbflash0-2: stby-usbflash0: usbflash0-3: usbflash0-4: usbflash0-5: usbflash0-6: usbflash0-7: usbflash0-8: usbflash0-9: webui: system: tmpsys: stby-nvram: stby-rcsf: null: tar: tftp: nvram: syslog: rcp: http: ftp: scp: https: cns: revrcsf:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2050

System Management

Displaying Available File Systems

Table 184: show file systems Field Descriptions

Field Size(b) Free(b) Type
Flags

Value
Amount of memory in the file system in bytes.
Amount of free memory in the file system in bytes.
Type of file system. disk--The file system is for a flash memory device, USB flash, and crashinfo file. network--The file system for network devices; for example, an FTP server or and HTTP server. nvram--The file system is for a NVRAM device. opaque--The file system is a locally generated pseudo file system (for example, the system) or a download interface, such as brimux. unknown--The file system is an unknown type.
Permission for file system. ro--read-only. rw--read/write. wo--write-only.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2051

Setting the Default File System

System Management

Field Prefixes

Value
Alias for file system. crashinfo:--Crashinfo file. flash:--Flash file system. ftp:--FTP server. http:--HTTP server. https:--Secure HTTP server. nvram:--NVRAM. null:--Null destination for copies. You can copy a remote file to null to find its size. rcp:--Remote Copy Protocol (RCP) server. scp:--Session Control Protocol (SCP) server. system:--Contains the system memory, including the running configuration. tftp:--TFTP network server. usbflash0:--USB flash memory. xmodem:--Obtain the file from a network machine by using the Xmodem protocol. ymodem:--Obtain the file from a network machine by using the Ymodem protocol.

Setting the Default File System
You can specify the file system or directory that the system uses as the default file system by using the cd filesystem: privileged EXEC command. You can set the default file system to omit the filesystem: argument from related commands. For example, for all privileged EXEC commands that have the optional filesystem: argument, the system uses the file system specified by the cd command.
By default, the default file system is flash:.
You can display the current default file system as specified by the cd command by using the pwd privileged EXEC command.
Displaying Information About Files on a File System
You can view a list of the contents of a file system before manipulating its contents. For example, before copying a new configuration file to flash memory, you might want to verify that the file system does not already contain a configuration file with the same name. Similarly, before copying a flash configuration file to another location, you might want to verify its filename for use in another command. To display information about files on a file system, use one of the privileged EXEC commands listed in the following table.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2052

System Management

Changing Directories and Displaying the Working Directory (CLI)

Table 185: Commands for Displaying Information About Files

Command
dir [/all] [filesystem:filename]
show file systems
show file information file-url
show file descriptors

Description Displays a list of files on a file system.
Displays more information about each of the files on a file system. Displays information about a specific file.
Displays a list of open file descriptors. File descriptors are the internal representations of open files. You can use this command to see if another user has a file open.

For example, to display a list of all files in a file system, use the dir privileged EXEC command:

switch# dir flash:

Directory of flash:/

7386 -rwx

2097152 Jan 23 2013 14:06:49 +00:00 nvram_config

7378 drwx

4096 Jan 23 2013 09:35:11 +00:00 mnt

7385 -rw- 221775876 Jan 23 2013 14:15:13 +00:00

cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin

7389 -rwx

556 Jan 21 2013 20:47:30 +00:00 vlan.dat

712413184 bytes total (445063168 bytes free)

switch#

Changing Directories and Displaying the Working Directory (CLI)
Beginning in privileged EXEC mode, follow these steps to change directories and to display the working directory:

SUMMARY STEPS

1. dir filesystem: 2. cd directory_name 3. pwd 4. cd

DETAILED STEPS

Step 1

Command or Action dir filesystem: Example:

Switch# dir flash:

Purpose
Displays the directories on the specified file system.
For filesystem:, use flash: for the system board flash device.
To access flash partitions of switch members in a stack, use flash-n where n is the stack member number. For example, flash-4.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2053

Creating Directories (CLI)

System Management

Step 2 Step 3 Step 4

Command or Action cd directory_name Example:
Switch# cd new_configs
pwd Example:
Switch# pwd
cd Example:
Switch# cd

Purpose Navigates to the specified directory. The command example shows how to navigate to the directory named new_configs. Displays the working directory.
Navigates to the default directory.

Creating Directories (CLI)
Beginning in privileged EXEC mode, follow these steps to create a directory:

SUMMARY STEPS

1. dir filesystem: 2. mkdir directory_name 3. dir filesystem:

DETAILED STEPS

Step 1

Command or Action dir filesystem: Example:

Purpose Displays the directories on the specified file system. For filesystem:, use flash: for the system board flash device.

Step 2 Step 3

Switch# dir flash:
mkdir directory_name Example:
Switch# mkdir new_configs
dir filesystem: Example:

Creates a new directory. Directory names are case sensitive and are limited to 45 characters between the slashes (/); the name cannot contain control characters, spaces, slashes, quotes, semicolons, or colons.
Verifies your entry.

Switch# dir flash:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2054

System Management

Removing Directories

Removing Directories
To remove a directory with all its files and subdirectories, use the delete /force /recursive filesystem:/file-url privileged EXEC command. Use the /recursive keyword to delete the named directory and all subdirectories and the files contained in it. Use the /force keyword to suppress the prompting that confirms a deletion of each file in the directory. You are prompted only once at the beginning of this deletion process. For filesystem, use flash: for the system board flash device. For file-url, enter the name of the directory to be deleted. All of the files in the directory and the directory are removed.
Caution When directories are deleted, their contents cannot be recovered.
Copying Files
To copy a file from a source to a destination, use the copy source-url destination-url privileged EXEC command. For the source and destination URLs, you can use running-config and startup-config keyword shortcuts. For example, the copy running-config startup-config command saves the currently running configuration file to the NVRAM section of flash memory to be used as the configuration during system initialization. You can also copy from special file systems (xmodem:, ymodem:) as the source for the file from a network machine that uses the Xmodem or Ymodem protocol. Network file system URLs include ftp:, rcp:, and tftp: and have these syntaxes:
· FTP--ftp:[[//username [:password]@location]/directory]/filename · RCP--rcp:[[//username@location]/directory]/filename · TFTP--tftp:[[//location]/directory]/filename
Local writable file systems include flash:. Some invalid combinations of source and destination exist. Specifically, you cannot copy these combinations:
· From a running configuration to a running configuration · From a startup configuration to a startup configuration · From a device to the same device (for example, the copy flash: flash: command is invalid)
Copying Files from One Switch in a Stack to Another Switch in the Same Stack
To copy a file from one switch in a stack to another switch in the same stack, use the flash-X: notation, where X is the switch number. To view all switches in a stack, use the show switch command in privileged EXEC mode, as in the following example of a 9-member switch stack:
Switch# show switch

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2055

Copying Files from One Switch in a Stack to Another Switch in the Same Stack

System Management

Switch/Stack Mac Address : 0006.f6b9.b580 - Local Mac Address Mac persistency wait time:

Indefinite

H/W Current

Switch# Role Mac Address

Priority Version State

------------------------------------------------------------

*1

Active 0006.f6b9.b580

15

P3B

Ready

2

Standby 0006.f6ba.0c80

14

P3B

Ready

3

Member 0006.f6ba.3300

7

P3B

Ready

4

Member 0006.f6b9.df80

6

P3B

Ready

5

Member 0006.f6ba.3880

13

P1A

Ready

6

Member 1ce6.c7b6.ef00

4

PP

Ready

7

Member 2037.06ce.2580

3

P2A

Ready

8

Member 2037.0653.7e00

2

P5A

Ready

9

Member 2037.0653.9280

1

P5B

Ready

To view all file systems available to copy on a specific switch, use the copy command as in the following example of a 5-member stack:

Switch# copy flash: ?

crashinfo-1:

Copy to crashinfo-1: file system

crashinfo-2:

Copy to crashinfo-2: file system

crashinfo-3:

Copy to crashinfo-3: file system

crashinfo-4:

Copy to crashinfo-4: file system

crashinfo-5:

Copy to crashinfo-5: file system

crashinfo:

Copy to crashinfo: file system

flash-1:

Copy to flash-1: file system

flash-2:

Copy to flash-2: file system

flash-3:

Copy to flash-3: file system

flash-4:

Copy to flash-4: file system

flash-5:

Copy to flash-5: file system

flash:

Copy to flash: file system

ftp:

Copy to ftp: file system

http:

Copy to http: file system

https:

Copy to https: file system

null:

Copy to null: file system

nvram:

Copy to nvram: file system

rcp:

Copy to rcp: file system

revrcsf:

Copy to revrcsf: file system

running-config Update (merge with) current system configuration

scp:

Copy to scp: file system

startup-config Copy to startup configuration

stby-crashinfo: Copy to stby-crashinfo: file system

stby-flash:

Copy to stby-flash: file system

stby-nvram:

Copy to stby-nvram: file system

stby-rcsf:

Copy to stby-rcsf: file system

stby-usbflash0: Copy to stby-usbflash0: file system

syslog:

Copy to syslog: file system

system:

Copy to system: file system

tftp:

Copy to tftp: file system

tmpsys:

Copy to tmpsys: file system

usbflash0-1:

Copy to usbflash0-1: file system

usbflash0-2:

Copy to usbflash0-2: file system

usbflash0-3:

Copy to usbflash0-3: file system

usbflash0-4:

Copy to usbflash0-4: file system

usbflash0-5:

Copy to usbflash0-5: file system

usbflash0:

Copy to usbflash0: file system

Switch#

This example shows how to copy a config file stored in the flash partition of switch 2 to the flash partition of switch 4. It assumes that switch 2 and switch 4 are in the same stack.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2056

System Management

Deleting Files

Switch# copy flash-2:config.txt flash-4:config.txt
Deleting Files
When you no longer need a file on a flash memory device, you can permanently delete it. To delete a file or directory from a specified flash device, use the delete [/force] [/recursive] [filesystem:]/file-url privileged EXEC command.
Use the /recursive keyword for deleting a directory and all subdirectories and the files contained in it. Use the /force keyword to suppress the prompting that confirms a deletion of each file in the directory. You are prompted only once at the beginning of this deletion process. Use the /force and /recursive keywords for deleting old software images that were installed by using the archive download-sw command but are no longer needed.
If you omit the filesystem: option, the switch uses the default device specified by the cd command. For file-url, you specify the path (directory) and the name of the file to be deleted.
When you attempt to delete any files, the system prompts you to confirm the deletion.

Caution When files are deleted, their contents cannot be recovered. This example shows how to delete the file myconfig from the default flash memory device:
Switch# delete myconfig

Creating, Displaying and Extracting Files (CLI)
You can create a file and write files into it, list the files in a file, and extract the files from a file as described in the next sections. Beginning in privileged EXEC mode, follow these steps to create a file, display the contents, and extract it:

SUMMARY STEPS

1. archive tar /create destination-url flash: /file-url 2. archive tar /table source-url 3. archive tar /xtract source-url flash:/file-url [dir/file...] 4. more [ /ascii | /binary | /ebcdic] /file-url

DETAILED STEPS

Step 1

Command or Action archive tar /create destination-url flash: /file-url Example:

switch# archive tar /create tftp:172.20.10.30/saved. flash:/new-configs

Purpose
Creates a file and adds files to it.
For destination-url, specify the destination URL alias for the local or network file system and the name of the file to create:
· Local flash file system syntax:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2057

Creating, Displaying and Extracting Files (CLI)

System Management

Step 2 Step 3

Command or Action
archive tar /table source-url Example:
switch# archive tar /table flash: /new_configs
archive tar /xtract source-url flash:/file-url [dir/file...] Example:
switch# archive tar /xtract tftp:/172.20.10.30/saved. flash:/new-configs

Purpose flash:
· FTP syntax:
ftp:[[//username[:password]@location]/directory]/-filename. · RCP syntax:
rcp:[[//username@location]/directory]/-filename. · TFTP syntax:
tftp:[[//location]/directory]/-filename.
For flash:/file-url, specify the location on the local flash file system in which the new file is created. You can also specify an optional list of files or directories within the source directory to add to the new file. If none are specified, all files and directories at this level are written to the newly created file.
Displays the contents of a file.
For source-url, specify the source URL alias for the local or network file system. The -filename. is the file to display. These options are supported:
· Local flash file system syntax:
flash: · FTP syntax:
ftp:[[//username[:password]@location]/directory]/-filename. · RCP syntax:
rcp:[[//username@location]/directory]/-filename. · TFTP syntax:
tftp:[[//location]/directory]/-filename.
You can also limit the file displays by specifying a list of files or directories after the file. Only those files appear. If none are specified, all files and directories appear.
Extracts a file into a directory on the flash file system.
For source-url, specify the source URL alias for the local file system. The -filename. is the file from which to extract files. These options are supported:
· Local flash file system syntax:
flash: · FTP syntax:
ftp:[[//username[:password]@location]/directory]/-filename. · RCP syntax:
rcp:[[//username@location]/directory]/-filename. · TFTP syntax:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2058

System Management

Additional References

Command or Action

Step 4

more [ /ascii | /binary | /ebcdic] /file-url Example:
switch# more flash:/new-configs

Purpose tftp:[[//location]/directory]/-filename.
For flash:/file-url [dir/file...], specify the location on the local flash file system from which the file is extracted. Use the dir/file... option to specify a list of files or directories within the file to be extracted. If none are specified, all files and directories are extracted.
Displays the contents of any readable file, including a file on a remote file system.

Additional References

Related Documents

Related Topic

Document Title

Commands for managing flash: file systems Cisco IOS Configuration Fundamentals Command Reference

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards

Standards

Title

No new or modified standards are supported by this feature, and support for existing standards has not -been modified by this feature.

MIBs

MIBs

MIBs Link

No new or modified MIBs are supported by this To locate and download MIBs for selected platforms, Cisco

feature, and support for existing MIBs has not IOS releases, and feature sets, use Cisco MIB Locator

been modified by this feature.

found at the following URL:

http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2059

Additional References

System Management

RFCs

RFCs

Title

No new or modified RFCs are supported by this feature, and support for existing RFCs has not been -modified by this feature.

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

http://www.cisco.com/cisco/web/support/index.html

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2060

1 0 5 C H A P T E R
Working with Cisco IOS XE Software Bundles
· About Software Bundles and Packages, on page 2061 · Bundle and Package File Location on the Switch, on page 2061 · Upgrading Cisco IOS XE Software, on page 2062 · Additional References, on page 2070
About Software Bundles and Packages
Cisco IOS XE software bundles include a set of Cisco IOS XE package (.pkg) files. You can install the package files on the switch or you can boot the switch from the IOS XE bundle itself. To display information about the contents of a Cisco IOS XE bundle (.bin file), use the show software package command in privileged EXEC mode. Use the command to display information about an individual IOS XE package (.pkg) file as well.
Bundle and Package File Location on the Switch
When the switch is running in installed mode, the Cisco IOS XE package (.pkg) files and provisioning file (packages.conf) are stored in the system board flash memory (flash:). When the switch is running in bundle mode, the booted Cisco IOS XE software bundle (.bin) file is stored in the system board flash memory (flash:) or USB flash memory (usbflash0:). To display information about the provisioning software that is currently running on the switch, use the show version privileged EXEC command. In the display, check the line that begins with
System bundle file is....
When the switch is running in installed mode, this line displays the name and location of the booted Cisco IOS XE provisioning file, typically flash:packages.conf. When the switch is running in bundle mode, this line displays the name and location of the booted Cisco IOS XE bundle file. To display information about the Cisco IOS XE package files that are running on the switch, use the show version running privileged EXEC command. When the switch is running in installed mode, this command displays information about the set of package files contained in the booted provisioning file.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2061

Upgrading Cisco IOS XE Software

System Management

When the switch is running in bundle mode, this command displays information about the set of package files contained in the booted Cisco IOS XE software bundle.
Note For usbflash0:, the default format is FAT16, while FAT32 format is also supported.
Switch# format usbflash0: ? FAT16 FAT16 filesystem type FAT32 FAT32 filesystem type
Upgrading Cisco IOS XE Software
The method that you use to upgrade Cisco IOS XE software depends on whether the switch is running in installed mode or in bundle mode.
Upgrading Cisco IOS XE Software: Install Mode
To upgrade the Cisco IOS XE software when the switch is running in installed mode, use the software install privileged EXEC command to install the packages from a new software bundle file. The software bundle can be installed from the local storage media or it can be installed over the network using TFTP or FTP. The software install command expands the package files from the specified source bundle file and copies them to the local flash: storage device. When the source bundle is specified as a tftp: or ftp: URL, the bundle file is first downloaded into the switch's memory (RAM); the bundle file is not copied to local storage media. After the package files are expanded and copied to flash: the running provisioning file (flash:packages.conf) is updated to reflect the newly installed packages, and the switch displays a reload prompt.
Note The software install command is not supported when the switch is running in bundle mode. Use the software expand privileged EXEC command to convert the switch from bundle mode to installed mode.
Upgrading Cisco IOS XE Software Install Mode Example
This example shows the software install file command being used to expand and copy the packages from a Cisco IOS XE bundle located on a TFTP server in order to upgrade to a new image:
Switch# software install file tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Preparing install operation ... [1]: Downloading file tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin
to active switch 1 [1]: Finished downloading file tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin
to active switch 1 [1]: Starting install operation [1]: Expanding bundle cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin [1]: Copying package files

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2062

System Management

Upgrading Cisco IOS XE Software: Bundle Mode

[1]: Package files copied [1]: Finished expanding bundle cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin [1]: Verifying and copying expanded package files to flash: [1]: Verified and copied expanded package files to flash: [1]: Starting compatibility checks [1]: Finished compatibility checks [1]: Starting application pre-installation processing [1]: Finished application pre-installation processing [1]: Old files list: Removed cat3k_caa-base.SSA.03.09.17.EMP.pkg Removed cat3k_caa-drivers.SSA.03.09.17.EMP.pkg Removed cat3k_caa-infra.SSA.03.09.17.EMP.pkg Removed cat3k_caa-iosd-universalk9.SSA.150-9.17.EMP.pkg Removed cat3k_caa-platform.SSA.03.09.17.EMP.pkg Removed cat3k_caa-wcm.SSA.03.09.17.EMP.pkg [1]: New files list: Added cat3k_caa-base.SPA.03.02.00.SE.pkg Added cat3k_caa-drivers.SPA.03.02.00.SE.pkg Added cat3k_caa-infra.SPA.03.02.00SE.pkg Added cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg Added cat3k_caa-platform.SPA.03.02.00.SE.pkg Added cat3k_caa-wcm.SPA.03.02.00.SE.pkg [1]: Creating pending provisioning file [1]: Finished installing software. New software will load on reboot. [1]: Setting rollback timer to 45 minutes [1]: Do you want to proceed with reload? [yes/no]:
Upgrading Cisco IOS XE Software: Bundle Mode
To upgrade the Cisco IOS XE software when the switch is running in bundle mode, follow these steps:
1. Download the bundle file to local storage media.
2. Configure the boot system global configuration command to point to the bundle file.
3. Reload the switch.
Upgrading Cisco IOS XE Software Bundle Mode Example
This example shows the steps to upgrade the Cisco IOS XE software on a switch that is running in bundle mode. It shows using the copy command to copy the bundle file to flash:, configuring the boot system variable to point to the bundle file, saving a copy of the running configuration, and finally, reloading the switch.
Switch# copy tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin
flash: Destination filename [cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin]? Accessing tftp://172.19.211.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin...Loading /tftpboot/cstohs/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin from 172.19.211.47 (via GigabitEthernet0/0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK - 220766688 bytes] 220766688 bytes copied in 124.330 secs (1775651 bytes/sec)
Switch# Switch#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch all

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2063

Converting from the Bundle Running Mode to the Install Running Mode

System Management

flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Switch(config)# end Switch#
*Nov 19 14:02:42.441: %SYS-5-CONFIG_I: Configured from console by console
Switch# Switch# write memory Building configuration... Compressed configuration from 4941 bytes to 2236 bytes[OK]
Switch# reload Reload command is being issued on Active unit, this will reload the whole stack Proceed with reload? [confirm]
Converting from the Bundle Running Mode to the Install Running Mode
To convert the running mode of a switch from bundle mode to installed mode, use the software expand running privileged EXEC command. This command expands the packages from the booted IOS XE software bundle and copies them and the provisioning file to the specified to destination.
When you use the software expand running command to convert the switch from bundle mode to installed mode, specify the to destination as flash:. After you execute the command, configure the boot system command to point to the expanded provisioning file (flash:packages.conf), then reload the switch to boot in installed mode.

Note The software expand running command is not supported when the switch is running in installed mode.

Converting from the Bundle Running Mode to the Install Running Mode Example

This example shows using the software expand running to command to convert the active switch in a switch stack from the bundle running mode to the installed running mode:

Switch# dir flash:

Directory of flash:/

7386 -rwx

2097152 Jan 23 2013 14:06:49 +00:00 nvram_config

7378 drwx

4096 Jan 23 2013 09:35:11 +00:00 mnt

7385 -rw- 221775876 Jan 23 2013 14:15:13 +00:00

cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin

7389 -rwx

556 Jan 21 2013 20:47:30 +00:00 vlan.dat

712413184 bytes total (445063168 bytes free)

Switch#

Switch# software expand running to flash:

Preparing expand operation ...

[2]: Expanding the running bundle

[2]: Copying package files

[2]: Package files copied

[2]: Finished expanding the running bundle

Switch#

Switch# dir flash:

Directory of flash:/

7386 -rwx

2097152 Jan 23 2013 14:06:49 +00:00 nvram_config

7378 drwx

4096 Jan 23 2013 09:35:11 +00:00 mnt

7385 -rw- 221775876 Jan 23 2013 14:15:13 +00:00

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2064

System Management

Copying IOS XE Package and Bundle Files from One Stack Member to Another

cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin

7391 -rw- 74410468 Jan 23 2013 14:16:57 +00:00 cat3k_caa-base.SPA.03.02.00SE.pkg

7392 -rw-

2773680 Jan 23 2013 14:16:57 +00:00 cat3k_caa-drivers.SPA.03.02.00.SE.pkg

7393 -rw- 32478044 Jan 23 2013 14:16:57 +00:00 cat3k_caa-infra.SPA.03.02.00SE.pkg

7394 -rw- 30393116 Jan 23 2013 14:16:57 +00:00 cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg

7389 -rwx

556 Jan 21 2013 20:47:30 +00:00 vlan.dat

7395 -rw- 18313952 Jan 23 2013 14:16:57 +00:00 cat3k_caa-platform.SPA.03.02.00.SE.pkg

7396 -rw- 63402700 Jan 23 2013 14:16:57 +00:00 cat3k_caa-wcm.SPA.10.0.100.0.pkg

7388 -rw-

1218 Jan 23 2013 14:17:43 +00:00 packages.conf

712413184 bytes total (223019008 bytes free)

Switch# Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch all flash:packages.conf Switch(config)# end Switch#

*Jan 23 14:28:47.722: %SYS-5-CONFIG_I: Configured from console by console

Switch# write memory Building configuration... Compressed configuration from 4851 bytes to 2187 bytes[OK]

Switch# Switch# reload Reload command is being issued on Active unit, this will reload the whole stack Proceed with reload? [confirm]

Copying IOS XE Package and Bundle Files from One Stack Member to Another
For switch stacks running in installed mode, use the software install source switch privileged EXEC command to install the running software packages from an existing stack member to one or more other stack members that are running different (but compatible) software packages.
Copying IOS XE Package and Bundle Files from One Stack Member to Another Example
This example shows a 2-member stack where each switch is running a different (but compatible) software package. The software install source switch command is used to install the packages that are currently running on the standby switch (switch 1) onto the active switch (switch 2):

Switch# show version running Package: Base, version: 03.02.00SE, status: active File: cat3k_caa-base.SPA.03.02.00SE.pkg, on: Switch1 Built: Wed Jan 09 21:59:52 PST 2013, by: gereddy
Package: Drivers, version: 03.02.00.SE, status: active File: cat3k_caa-drivers.SPA.03.02.00.SE.pkg, on: Switch1 Built: Wed Jan 09 22:03:41 PST 2013, by: gereddy
Package: Infra, version: 03.02.00SE, status: active File: cat3k_caa-infra.SPA.03.02.00SE.pkg, on: Switch1 Built: Wed Jan 09 22:00:56 PST 2013, by: gereddy
Package: IOS, version: 150-1.EX, status: active File: cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg, on: Switch1 Built: Wed Jan 09 22:02:23 PST 2013, by: gereddy
Package: Platform, version: 03.02.00.SE, status: active

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2065

Copying IOS XE Package and Bundle Files from One Stack Member to Another Example

System Management

File: cat3k_caa-platform.SPA.03.02.00.SE.pkg, on: Switch1 Built: Wed Jan 09 22:01:46 PST 2013, by: gereddy
Package: WCM, version: 10.0.100.0, status: active File: cat3k_caa-wcm.SPA.10.0.100.0.pkg, on: Switch1 Built: Wed Jan 09 22:03:05 PST 2013, by: gereddy
Switch# Switch# software install source switch 1 Preparing install operation ... [2]: Copying software from source switch 1 to switch 2 [2]: Finished copying software to switch 2 [2]: Starting install operation [2]: Starting compatibility checks [2]: Finished compatibility checks [2]: Starting application pre-installation processing [2]: Finished application pre-installation processing [2]: Old files list: Removed cat3k_caa-base.SSA.03.09.17.EMP.pkg Removed cat3k_caa-drivers.SSA.03.09.17.EMP.pkg Removed cat3k_caa-infra.SSA.03.09.17.EMP.pkg Removed cat3k_caa-iosd-universalk9.SSA.150-9.17.EMP.pkg Removed cat3k_caa-platform.SSA.03.09.17.EMP.pkg Removed cat3k_caa-wcm.SSA.03.09.17.EMP.pkg [2]: New files list: Added cat3k_caa-base.SPA.03.02.00.SE.pkg Added cat3k_caa-drivers.SPA.03.02.00.SE.pkg Added cat3k_caa-infra.SPA.03.02.00.SE.pkg Added cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg Added cat3k_caa-platform.SPA.03.02.00.SE.pkg Added cat3k_caa-wcm.SPA.10.0.100.0.pkg [2]: Creating pending provisioning file [2]: Finished installing software. New software will load on reboot. [2]: Committing provisioning file [2]: Do you want to proceed with reload? [yes/no]:
For switch stacks running in bundle mode, follow these steps to copy the bundle file from one stack member to another:
1. Use the copy privileged EXEC command to copy the running bundle from one switch in the stack to the other.
2. Configure the boot system global configuration command to point to the bundle file.
3. Reload the switch.
This example shows a 2-member stack where each switch is running a different (but compatible) software packages:
Switch# copy flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash-1: Destination filename [cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin]? Copy in progress... ... 220766688 bytes copied in 181.700 secs (1215007 bytes/sec) Switch# Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# boot system switch 1 flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2066

System Management

Upgrading a Switch Running Incompatible Software

Switch(config)# end Switch#
Upgrading a Switch Running Incompatible Software
To upgrade a switch that is running in installed mode with software packages that are incompatible with the switch stack (also running in installed mode), use the software auto-upgrade privileged EXEC command to install the software packages from an existing stack member to the stack member that is running incompatible software. Upon completion of the auto-upgrade installation, the incompatible switch automatically reloads and joins the stack as a fully functioning member.
Note If you configure the global software auto-upgrade enable command, the auto-upgrade functionality is initiated automatically when a switch with incompatible software running in installed mode joins the stack that is running in installed mode. For more information, see Cisco IOS Configuration Fundamentals Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches).
Upgrading a Switch Running Incompatible Software Example
This example shows a 2-member switch stack; switch 2 is the active switch and switch 1 is running incompatible software:
Switch# show switch Switch/Stack Mac Address : 6400.f125.1100 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State -----------------------------------------------------------1 Member 6400.f125.1a00 1 0 V-Mismatch *2 Active 6400.f125.1100 1 V01 Ready Switch# Switch# software auto-upgrade % Auto upgrade has been initiated for the following incompatible switches: 1
INFO level system messages will be generated to provide status information during the auto upgrade process
Switch# *Oct 19 06:59:14.521: %INSTALLER-6-AUTO_UPGRADE_SW_INITIATED: 2 installer: Auto upgrade initiated for switch 1 *Oct 19 06:59:14.522: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Searching stack for software
to upgrade switch 1 *Oct 19 06:59:14.523: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Found donor switch 2 to auto upgrade switch 1 *Oct 19 06:59:14.523: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Upgrading switch 1 with software from switch 2 *Oct 19 07:00:47.829: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Finished installing software
on switch 1 *Oct 19 07:00:47.829: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Reloading switch 1 to complete the auto upgrade
To upgrade a switch that is running in bundle mode with a software bundle that is incompatible with the switch stack (also running in bundle mode), follow these steps:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2067

Upgrading a Switch Running in Incompatible Running Mode

System Management

1. Use the copy privileged EXEC command to copy the running bundle from one switch in the stack to the other.
2. Configure the boot system global configuration command to point to the bundle file.
3. Reload the switch.
This example shows a 2-member switch stack running in bundle mode; switch 2 is the active switch and switch 1 is running an incompatible bundle:
Switch# show switch Switch/Stack Mac Address : 6400.f125.1100 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State -----------------------------------------------------------1 Member 6400.f125.1a00 1 0 V-Mismatch *2 Active 6400.f125.1100 1 V01 Ready Switch# Switch# copy flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash-1: Destination filename [cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin]? Copy in progress... ... 220766688 bytes copied in 181.700 secs (1215007 bytes/sec)
Switch# Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch 1 flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Switch(config)# end Switch# *Nov 19 16:08:14.857: %SYS-5-CONFIG_I: Configured from console by console Switch# reload slot 1 Stack is in Half ring setup; Reloading a switch might cause stack split Proceed with reload? [confirm]
Upgrading a Switch Running in Incompatible Running Mode
When a switch running in bundle mode tries to join a stack running in installed mode, use the software auto-upgrade privileged EXEC command to install the incompatible switch's running packages and convert the switch to installed mode. Upon completion of the auto-upgrade running mode conversion, the incompatible switch automatically reloads and attempts to join the stack in installed mode.
Note If you configure the global software auto-upgrade enable command, the auto-upgrade functionality is initiated automatically when a switch with incompatible software running in installed mode joins the stack that is running in installed mode. For more information, see Cisco IOS Configuration Fundamentals Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches).
Upgrading a Switch Running in Incompatible Running Mode Example
This example shows a 2-member switch stack running in installed mode; switch 2 is the active switch and switch1 is running in bundle mode:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2068

System Management

Upgrading a Switch Running in Incompatible Running Mode Example

Switch# show switch Switch/Stack Mac Address : 6400.f125.1100 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State -----------------------------------------------------------1 Member 6400.f125.1a00 1 0 V-Mismatch *2 Active 6400.f125.1100 1 V01 Ready
Switch# Switch# software auto-upgrade % Auto upgrade has been initiated for the following incompatible switches: 1
INFO level system messages will be generated to provide status information during the auto upgrade process
Switch# *Oct 19 07:17:16.694: %INSTALLER-6-AUTO_UPGRADE_SW_INITIATED: 2 installer: Auto upgrade initiated for switch 1 *Oct 19 07:17:16.694: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Converting switch 1 to installed mode by *Oct 19 07:17:16.694: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: installing its running software *Oct 19 07:18:50.488: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Setting the boot var on switch 1 *Oct 19 07:18:51.553: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Finished installing the running software on switch 1 *Oct 19 07:18:51.553: %INSTALLER-6-AUTO_UPGRADE_SW: 2 installer: Reloading switch 1 to boot
in installed mode
Note When you use the software auto-upgrade command to convert an incompatible switch to installed mode, the command installs the packages from the incompatible switch's running bundle. If, after you reload and boot the incompatible switch in installed mode, the switch's installed packages are found to be incompatible with the stack, you can use the software auto-upgrade command again. For more information, see Cisco IOS Configuration Fundamentals Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches).
To convert a switch that is running in installed mode and joining a stack that is running in bundle mode, follow these steps: 1. Use the copy privileged EXEC command to copy the running bundle from one switch in the stack to the
other.
2. Configure the boot system global configuration command to point to the bundle file.
3. Reload the switch.
After reloading, the incompatible switch boots in bundle mode and joins the stack as a fully functioning member. This example shows a 2-member switch stack running in bundle mode; switch 2 is the active switch and switch 1 is running in installed mode:
Switch# Switch# copy flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin flash-1: Destination filename [cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin]?
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2069

Additional References

System Management

Copy in progress... .... 220766688 bytes copied in 181.700 secs (1215007 bytes/sec) Switch# Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# boot system switch 1 flash:cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin Switch(config)# end Switch# *Nov 19 16:08:14.857: %SYS-5-CONFIG_I: Configured from console by console Switch# reload slot 1 Stack is in Half ring setup; Reloading a switch might cause stack split Proceed with reload? [confirm]

Additional References

Related Documents
Related Topic
Commands for managing software bundles and packages

Document Title
Cisco IOS Configuration Fundamentals Command Reference

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards

Standards

Title

No new or modified standards are supported by this feature, and support for existing standards has not -been modified by this feature.

MIBs

MIBs

MIBs Link

No new or modified MIBs are supported by this To locate and download MIBs for selected platforms, Cisco

feature, and support for existing MIBs has not IOS releases, and feature sets, use Cisco MIB Locator

been modified by this feature.

found at the following URL:

http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2070

System Management

Additional References

RFCs

RFCs

Title

No new or modified RFCs are supported by this feature, and support for existing RFCs has not been -modified by this feature.

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

http://www.cisco.com/cisco/web/support/index.html

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2071

Additional References

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2072

1 0 6 C H A P T E R
Troubleshooting the Software Configuration
This chapter describes how to identify and resolve software problems related to the Cisco IOS software on the switch. Depending on the nature of the problem, you can use the command-line interface (CLI), Device Manager, or Network Assistant to identify and solve problems. Additional troubleshooting information, such as LED descriptions, is provided in the hardware installation guide.
· Finding Feature Information, on page 2073 · Information About Troubleshooting the Software Configuration, on page 2073 · How to Troubleshoot the Software Configuration, on page 2081 · Verifying Troubleshooting of the Software Configuration, on page 2092 · Scenarios for Troubleshooting the Software Configuration, on page 2094 · Configuration Examples for Troubleshooting Software, on page 2096 · Additional References for Troubleshooting Software Configuration, on page 2098 · Feature History and Information for Troubleshooting Software Configuration, on page 2099
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Troubleshooting the Software Configuration
Software Failure on a Switch
Switch software can be corrupted during an upgrade by downloading the incorrect file to the switch, and by deleting the image file. In all of these cases, the switch does not pass the power-on self-test (POST), and there is no connectivity. Related Topics
Recovering from a Software Failure, on page 2081
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2073

Lost or Forgotten Password on a Switch

System Management

Lost or Forgotten Password on a Switch
The default configuration for the switch allows an end user with physical access to the switch to recover from a lost password by interrupting the boot process during power-on and by entering a new password. These recovery procedures require that you have physical access to the switch.
Note On these switches, a system administrator can disable some of the functionality of this feature by allowing an end user to reset a password only by agreeing to return to the default configuration. If you are an end user trying to reset a password when password recovery has been disabled, a status message reminds you to return to the default configuration during the recovery process.
Related Topics Recovering from a Lost or Forgotten Password, on page 2083
Power over Ethernet Ports
A Power over Ethernet (PoE) switch port automatically supplies power to one of these connected devices if the switch detects that there is no power on the circuit:
· a Cisco pre-standard powered device (such as a Cisco IP Phone or a Cisco Aironet Access Point)
· an IEEE 802.3af-compliant powered device
· an IEEE 802.3at-compliant powered device
A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power source. The device does not receive redundant power when it is only connected to the PoE port. After the switch detects a powered device, the switch determines the device power requirements and then grants or denies power to the device. The switch can also detect the real-time power consumption of the device by monitoring and policing the power usage. For more information, see the "Configuring PoE" chapter in the Interface and Hardware Component Configuration Guide (Catalyst 3650 Switches) . Related Topics
Scenarios to Troubleshoot Power over Ethernet (PoE), on page 2094
Disabled Port Caused by Power Loss
If a powered device (such as a Cisco IP Phone 7910) that is connected to a PoE switch port and powered by an AC power source loses power from the AC power source, the device might enter an error-disabled state. To recover from an error-disabled state, enter the shutdown interface configuration command, and then enter the no shutdown interface command. You can also configure automatic recovery on the switch to recover from the error-disabled state. On a switch, the errdisable recovery cause loopback and the errdisable recovery interval seconds global configuration commands automatically take the interface out of the error-disabled state after the specified period of time.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2074

System Management

Disabled Port Caused by False Link-Up

Disabled Port Caused by False Link-Up
If a Cisco powered device is connected to a port and you configure the port by using the power inline never interface configuration command, a false link-up can occur, placing the port into an error-disabled state. To take the port out of the error-disabled state, enter the shutdown and the no shutdown interface configuration commands.
You should not connect a Cisco powered device to a port that has been configured with the power inline never command.

Ping

The switch supports IP ping, which you can use to test connectivity to remote hosts. Ping sends an echo request packet to an address and waits for a reply. Ping returns one of these responses:
· Normal response--The normal response (hostname is alive) occurs in 1 to 10 seconds, depending on network traffic.
· Destination does not respond--If the host does not respond, a no-answer message is returned.
· Unknown host--If the host does not exist, an unknown host message is returned.
· Destination unreachable--If the default gateway cannot reach the specified network, a destination-unreachable message is returned.
· Network or host unreachable--If there is no entry in the route table for the host or network, a network or host unreachable message is returned.
Related Topics Executing Ping, on page 2089 Example: Pinging an IP Host, on page 2096

Layer 2 Traceroute
The Layer 2 traceroute feature allows the switch to identify the physical path that a packet takes from a source device to a destination device. Layer 2 traceroute supports only unicast source and destination MAC addresses. Traceroute finds the path by using the MAC address tables of the switches in the path. When the switch detects a device in the path that does not support Layer 2 traceroute, the switch continues to send Layer 2 trace queries and lets them time out.
The switch can only identify the path from the source device to the destination device. It cannot identify the path that a packet takes from source host to the source device or from the destination device to the destination host.
Layer 2 Traceroute Guidelines
· Cisco Discovery Protocol (CDP) must be enabled on all the devices in the network. For Layer 2 traceroute to function properly, do not disable CDP.
If any devices in the physical path are transparent to CDP, the switch cannot identify the path through these devices.
· A switch is reachable from another switch when you can test connectivity by using the ping privileged EXEC command. All switches in the physical path must be reachable from each other.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2075

IP Traceroute

System Management

· The maximum number of hops identified in the path is ten.
· You can enter the traceroute mac or the traceroute mac ip privileged EXEC command on a switch that is not in the physical path from the source device to the destination device. All switches in the path must be reachable from this switch.
· The traceroute mac command output shows the Layer 2 path only when the specified source and destination MAC addresses belong to the same VLAN. If you specify source and destination MAC addresses that belong to different VLANs, the Layer 2 path is not identified, and an error message appears.
· If you specify a multicast source or destination MAC address, the path is not identified, and an error message appears.
· If the source or destination MAC address belongs to multiple VLANs, you must specify the VLAN to which both the source and destination MAC addresses belong. If the VLAN is not specified, the path is not identified, and an error message appears.
· The traceroute mac ip command output shows the Layer 2 path when the specified source and destination IP addresses belong to the same subnet. When you specify the IP addresses, the switch uses the Address Resolution Protocol (ARP) to associate the IP addresses with the corresponding MAC addresses and the VLAN IDs.
· If an ARP entry exists for the specified IP address, the switch uses the associated MAC address and identifies the physical path.
· If an ARP entry does not exist, the switch sends an ARP query and tries to resolve the IP address. If the IP address is not resolved, the path is not identified, and an error message appears.
· When multiple devices are attached to one port through hubs (for example, multiple CDP neighbors are detected on a port), the Layer 2 traceroute feature is not supported. When more than one CDP neighbor is detected on a port, the Layer 2 path is not identified, and an error message appears.
· This feature is not supported in Token Ring VLANs.
IP Traceroute
You can use IP traceroute to identify the path that packets take through the network on a hop-by-hop basis. The command output displays all network layer (Layer 3) devices, such as routers, that the traffic passes through on the way to the destination.
Your switches can participate as the source or destination of the traceroute privileged EXEC command and might or might not appear as a hop in the traceroute command output. If the switch is the destination of the traceroute, it is displayed as the final destination in the traceroute output. Intermediate switches do not show up in the traceroute output if they are only bridging the packet from one port to another within the same VLAN. However, if the intermediate switch is a multilayer switch that is routing a particular packet, this switch shows up as a hop in the traceroute output.
The traceroute privileged EXEC command uses the Time To Live (TTL) field in the IP header to cause routers and servers to generate specific return messages. Traceroute starts by sending a User Datagram Protocol (UDP) datagram to the destination host with the TTL field set to 1. If a router finds a TTL value of 1 or 0, it drops the datagram and sends an Internet Control Message Protocol (ICMP) time-to-live-exceeded message to the sender. Traceroute finds the address of the first hop by examining the source address field of the ICMP time-to-live-exceeded message.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2076

System Management

Time Domain Reflector Guidelines

To identify the next hop, traceroute sends a UDP packet with a TTL value of 2. The first router decrements the TTL field by 1 and sends the datagram to the next router. The second router sees a TTL value of 1, discards the datagram, and returns the time-to-live-exceeded message to the source. This process continues until the TTL is incremented to a value large enough for the datagram to reach the destination host (or until the maximum TTL is reached). To learn when a datagram reaches its destination, traceroute sets the UDP destination port number in the datagram to a very large value that the destination host is unlikely to be using. When a host receives a datagram destined to itself containing a destination port number that is unused locally, it sends an ICMP port-unreachable error to the source. Because all errors except port-unreachable errors come from intermediate hops, the receipt of a port-unreachable error means that this message was sent by the destination port. Related Topics
Executing IP Traceroute, on page 2090 Example: Performing a Traceroute to an IP Host, on page 2097
Time Domain Reflector Guidelines
You can use the Time Domain Reflector (TDR) feature to diagnose and resolve cabling problems. When running TDR, a local device sends a signal through a cable and compares the reflected signal to the initial signal. TDR is supported on 10/100/1000 copper Ethernet ports and on Multigigabit Ethernet (100Mbps/1/2.5/5/10 Gbps) ports. It is not supported on SFP module ports. TDR can detect these cabling problems:
· Open, broken, or cut twisted-pair wires--The wires are not connected to the wires from the remote device.
· Shorted twisted-pair wires--The wires are touching each other or the wires from the remote device. For example, a shorted twisted pair can occur if one wire of the twisted pair is soldered to the other wire. If one of the twisted-pair wires is open, TDR can find the length at which the wire is open.
Note When using the feature with Multigigabit Ethernet ports, the cable length is displayed only when an open or short condition is detected.
Use TDR to diagnose and resolve cabling problems in these situations: · Replacing a Switch
· Setting up a wiring closet
· Troubleshooting a connection between two devices when a link cannot be established or when it is not operating properly
When you run TDR, the Switch reports accurate information in these situations: · The cable for the gigabit link is a solid-core cable.
· The open-ended cable is not terminated.
When you run TDR, the Switch does not report accurate information in these situations:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2077

Debug Commands

System Management

· The cable for the gigabit link is a twisted-pair cable or is in series with a solid-core cable. · The link is a 10-megabit or a 100-megabit link. · The cable is a stranded cable. · The link partner is a Cisco IP Phone. · The link partner is not IEEE 802.3 compliant.
Debug Commands

Caution

Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. It is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.

All debug commands are entered in privileged EXEC mode, and most debug commands take no arguments.
Related Topics Redirecting Debug and Error Message Output, on page 2091 Example: Enabling All System Diagnostics, on page 2098

Crashinfo Files
The crashinfo files save information that helps Cisco technical support representatives to debug problems that caused the Cisco IOS image to fail (crash). The switch generates two files at the time of the failure: full core and crashinfo.
The information in the crashinfo file includes the Cisco IOS image name and version that failed, a list of the processor registers, and a stack trace. You can provide this information to the Cisco technical support representative by using the show tech-support privileged EXEC command.
The file names have the following format:
[fullcore | crashinfo]_[process that crashed]_[date]-[timestamp]-UTC
From IOS, you can view the crashinfo files on each switch by using the following command:

Switch# dir crashinfo? crashinfo-1: crashinfo-2: crashinfo-3: crashinfo: Switch#
For example, to access the crashinfo directory for switch 1, enter
Switch dir crashinfo-1
From the ROMMON prompt, you can view the crashinfo files by using the dir command:
Switch: dir sda1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2078

System Management

System Reports

The following is sample output of a crashinfo file

Switch# dir crashinfo:

Directory of crashinfo:/

12 -rwx 15 -rwx 16 -rwx

2768 Dec 31 1969 16:00:15 -08:00 koops.dat 0 Jan 12 2000 22:53:40 -08:00 deleted_crash_files
4246576 Jan 12 2000 22:53:40 -08:00 crashinfo_stack-mgr_20000113-065250-UTC

17 -rwx 26 -rwx 18 -rwx

50 Oct 2 2012 03:18:42 -08:00 last_crashinfo 39 Jan 22 2013 14:14:14 -08:00 last_systemreport 2866565 Jan 12 2000 22:53:41 -08:00 fullcore_stack-mgr_20000113-065250-UTC

20 -rwx 4391796 Feb 1 2000 17:50:44 -08:00 crashinfo_stack-mgr_20000202-014954-UTC

21 -rwx 34817 -rw18434 -rw18435 -rw34821 -rw-

2920325 1050209 1016913 1136167 1094631

Feb 1 2000 17:50:45 -08:00 Jan 10 2013 20:26:23 -08:00 Jan 11 2013 10:35:28 -08:00 Jan 22 2013 14:14:11 -08:00
Jan 2 2013 17:59:23 -08:00

fullcore_stack-mgr_20000202-014954-UTC system-report_1_20130111-042535-UTC.gz system-report_1_20130111-183440-UTC.gz system-report_1_20130122-221322-UTC.gz system-report_1_20130103-015835-UTC.gz

6147 -rw34824 -rwx 6155 -rwx

967429 Jan 3 2013 10:32:44 -08:00 system-report_1_20130103-183156-UTC.gz 50 Jan 22 2013 14:14:14 -08:00 deleted_sysreport_files
373 Jan 22 2013 14:14:13 -08:00 last_systemreport_log

145898496 bytes total (18569216 bytes free) stack3#

The file name of the most recent crashinfo file is stored in last_crashinfo. The file name of the most recent system report is stored in last_systemreport.

Switch#

System Reports
When a switch crashes, a system report is automatically generated for each switch in the switch stack. The system report file captures all the trace buffers, and other system-wide logs found on the switch. System reports are located in the crashinfo directory in the following format:
system-report_[switch number]_[date]-[timestamp]-UTC.gz
After a switch crash, you should check if a system report file was generated. The name of the most recently generated system report file is stored in the last_systemreport file under the crashinfo directory. The system report and crashinfo files assist TAC when troubleshooting your issue.
Onboard Failure Logging on the Switch
You can use the onboard failure logging (OBFL) feature to collect information about the switch. The information includes uptime, temperature, and voltage information and helps Cisco technical support representatives to troubleshoot switch problems. We recommend that you keep OBFL enabled and do not erase the data stored in the flash memory.
By default, OBFL is enabled. It collects information about the switch and small form-factor pluggable (SFP) modules. The switch stores this information in the flash memory:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2079

Fan Failures

System Management

· CLI commands--Record of the OBFL CLI commands that are entered on a standalone switch or a switch stack member.
· Environment data--Unique device identifier (UDI) information for a standalone switch or a stack member and for all the connected FRU devices: the product identification (PID), the version identification (VID), and the serial number.
· Message--Record of the hardware-related system messages generated by a standalone switch or a stack member.
· Power over Ethernet (PoE)--Record of the power consumption of PoE ports on a standalone switch or a stack member.
· Temperature--Temperature of a standalone switch or a stack member. · Uptime data--Time when a standalone switch or a stack member starts, the reason the switch restarts,
and the length of time the switch has been running since it last restarted. · Voltage--System voltages of a standalone switch or a stack member.
You should manually set the system clock or configure it by using Network Time Protocol (NTP). When the switch is running, you can retrieve the OBFL data by using the show logging onboard privileged EXEC commands. If the switch fails, contact your Cisco technical support representative to find out how to retrieve the data. Related Topics
Configuring OBFL, on page 2091 Displaying OBFL Information, on page 2092
Fan Failures
By default, the feature is disabled. When more than one of the fans fails in a field-replaceable unit (FRU) or in a power supply, the switch does not shut down, and this error message appears:
Multiple fan(FRU/PS) failure detected. System may get overheated. Change fan quickly.
The switch might overheat and shut down. To enable the fan failures feature, enter the system env fan-fail-action shut privileged EXEC command. If more than one fan in the switch fails, the switch automatically shuts down, and this error message appears:
Faulty (FRU/PS) fans detected, shutting down system!
After the first fan shuts down, if the switch detects a second fan failure, the switch waits for 20 seconds before it shuts down. To restart the switch, it must be power cycled.
Possible Symptoms of High CPU Utilization
Excessive CPU utilization might result in these symptoms, but the symptoms might also result from other causes:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2080

System Management

How to Troubleshoot the Software Configuration

· Spanning tree topology changes · EtherChannel links brought down due to loss of communication · Failure to respond to management requests (ICMP ping, SNMP timeouts, slow Telnet or SSH sessions) · UDLD flapping · IP SLAs failures because of SLAs responses beyond an acceptable threshold · DHCP or IEEE 802.1x failures if the switch does not forward or respond to requests

How to Troubleshoot the Software Configuration

Recovering from a Software Failure
Before you begin This recovery procedure requires that you have physical access to the switch. This procedure uses boot loader commands and TFTP to recover from a corrupted or incorrect image file.

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

From your PC, download the software image file (image.bin) from Cisco.com. Load the software image to your TFTP server. Connect your PC to the switch Ethernet management port. Unplug the switch power cord. Press the Mode button, and at the same time, reconnect the power cord to the switch. From the bootloader (ROMMON) prompt, ensure that you can ping your TFTP server. a) Set the IP address switch: set IP_ADDR ip_address subnet_mask
Example:
switch: set IP_ADDR 192.0.2.123/255.255.255.0

b) Set the default router IP address switch: set DEFAULT_ROUTER ip_address Example:
switch: set DEFAULT_ROUTER 192.0.2.1

c) Verify that you can ping the TFTP server switch: ping ip_address_of_TFTP_server
Example:
switch: ping 192.0.2.15 ping 192.0.2.1 with 32 bytes of data... Host 192.0.2.1 is alive. switch:

Step 7 Verify that you have a recovery image in your recovery partition (sda9:).

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2081

Recovering from a Software Failure

System Management

This recovery image is required for recovery using the emergency-install feature. Example:

switch: dir sda9: Directory of sda9:/

2 drwx 1024 2 drwx 1024 11 -rw- 18923068

. .. c3850-recovery.bin

36939776 bytes available (20830208 bytes used) switch:

Step 8

From the bootloader (ROMMON) prompt, initiate the emergency-install feature that assists you in recovering the software image on your switch.
WARNING: The emergency install command will erase your entire boot flash!
Example:
Switch# emergency-install tftp://192.0.2.47/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin
The bootflash will be erased during install operation, continue (y/n)?y Starting emergency recovery (tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SPA.03.02.00.SE.150-1.EX.bin)... Reading full image into memory......................done Nova Bundle Image -------------------------------------Kernel Address : 0x6042e5cc Kernel Size : 0x318261/3244641 Initramfs Address : 0x60746830 Initramfs Size : 0xdb0fb9/14356409 Compression Format: .mzip
Bootable image at @ ram:0x6042e5cc Bootable image segment 0 address range [0x81100000, 0x81b80000] is in range [0x80180000, 0x90000000]. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ File "sda9:c3850-recovery.bin" uncompressed and installed, entry point: 0x811060f0 Loading Linux kernel with entry point 0x811060f0 ... Bootloader: Done loading app on core_mask: 0xf
### Launching Linux Kernel (flags = 0x5)

Initiating Emergency Installation of bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin
Downloading bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin... Validating bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin... Installing bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin... Verifying bundle tftp://192.0.2.47/cat3k/cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin... Package cat3k_caa-base..pkg is Digitally Signed Package cat3k_caa-drivers.SPA.03.02.00.SE.pkg is Digitally Signed Package cat3k_caa-infra.SPA.03.02.00.SE.pkg is Digitally Signed

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2082

System Management

Recovering from a Lost or Forgotten Password

Package cat3k_caa-iosd-universalk9.SPA.03.02.00.SE.pkg is Digitally Signed Package cat3k_caa-platform.SPA.03.02.00.SE.pkg is Digitally Signed Package cat3k_caa-wcm.SPA.03.02.00.SE.pkg is Digitally Signed Preparing flash... Syncing device... Emergency Install successful... Rebooting Restarting system.
Booting...(use DDR clock 667 MHz)Initializing and Testing RAM +++@@@@####...++@@++@@++@@++@

Related Topics Software Failure on a Switch, on page 2073
Recovering from a Lost or Forgotten Password
The default configuration for the switch allows an end user with physical access to the switch to recover from a lost password by interrupting the boot process during power-on and by entering a new password. These recovery procedures require that you have physical access to the switch.

Note On these switches, a system administrator can disable some of the functionality of this feature by allowing an end user to reset a password only by agreeing to return to the default configuration. If you are an end user trying to reset a password when password recovery has been disabled, a status message shows this during the recovery process.

SUMMARY STEPS

1. Connect a terminal or PC to the switch. 2. Set the line speed on the emulation software to 9600 baud. 3. Power off the standalone switch or the entire switch stack. 4. Reconnect the power cord to the or the active switch. Within 15 seconds, press the Mode button while
the System LED is still flashing green. Continue pressing the Mode button until all the system LEDs turn on and remain solid; then release the Mode button. 5. After recovering the password, reload the switch or the active switch . 6. Power on the remaining switches in the stack.

DETAILED STEPS

Step 1

Connect a terminal or PC to the switch.
· Connect a terminal or a PC with terminal-emulation software to the switch console port. If you are recovering the password for a switch stack, connect to the console port of the active switch or

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2083

Procedure with Password Recovery Enabled

System Management

Step 2 Step 3 Step 4

· Connect a PC to the Ethernet management port. If you are recovering the password for a switch stack, connect to the Ethernet management port of a stack member .
Set the line speed on the emulation software to 9600 baud. Power off the standalone switch or the entire switch stack. Reconnect the power cord to the or the active switch. Within 15 seconds, press the Mode button while the System LED is still flashing green. Continue pressing the Mode button until all the system LEDs turn on and remain solid; then release the Mode button.
·
Switch: Xmodem file system is available. Base ethernet MAC Address: 20:37:06:4d:e9:80 Verifying bootloader digital signature.

The system has been interrupted prior to loading the operating system software, console will be reset to 9600 baud rate.

Step 5

proceed to the Procedure with Password Recovery Enabled section, and follow the steps.
After recovering the password, reload the switch or the active switch . On a switch:
Switch> reload Proceed with reload? [confirm] y
On the active switch:
Switch> reload slot <stack-active-member-number> Proceed with reload? [confirm] y

Step 6 Power on the remaining switches in the stack.

Related Topics Lost or Forgotten Password on a Switch, on page 2074
Procedure with Password Recovery Enabled
If the password-recovery operation is enabled, this message appears:

Step 1 Step 2

Initialize the flash file system.
Switch: flash_init
Ignore the startup configuration with the following command:
Switch: SWITCH_IGNORE_STARTUP_CFG=1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2084

System Management

Procedure with Password Recovery Enabled

Step 3 Step 4 Step 5 Step 6
Step 7 Step 8 Step 9
Step 10 Step 11

Boot the switch with the packages.conf file from flash.
Switch: boot flash:packages.conf
Terminate the initial configuration dialog by answering No.
Would you like to enter the initial configuration dialog? [yes/no]: No
At the switch prompt, enter privileged EXEC mode.
Switch> enable Switch#
Copy the startup configuration to running configuration.
Switch# copy startup-config running-config Destination filename [running-config]?
Press Return in response to the confirmation prompts. The configuration file is now reloaded, and you can change the password. Enter global configuration mode and change the enable password.
Switch# configure terminal Switch(config)#
Write the running configuration to the startup configuration file.
Switch# copy running-config startup-config
Confirm that manual boot mode is enabled.
Switch# show boot BOOT variable = flash:packages.conf; Manual Boot = yes Enable Break = yes
Reload the switch.
Switch# reload
Return the Bootloader parameters (previously changed in Steps 2 and 3) to their original values.

Step 12

Switch: switch: SWITCH_IGNORE_STARTUP_CFG=0
Boot the switch with the packages.conf file from flash.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2085

Procedure with Password Recovery Disabled

System Management

Step 13

Switch: boot flash:packages.conf
After the switch boots up, disable manual boot on the switch.
Switch(config)# no boot manual

Procedure with Password Recovery Disabled
If the password-recovery mechanism is disabled, this message appears:
The password-recovery mechanism has been triggered, but is currently disabled. Access to the boot loader prompt through the password-recovery mechanism is disallowed at this point. However, if you agree to let the system be reset back to the default system configuration, access to the boot loader prompt can still be allowed.
Would you like to reset the system back to the default configuration (y/n)?

Caution Returning the switch to the default configuration results in the loss of all existing configurations. We recommend that you contact your system administrator to verify if there are backup switch and VLAN configuration files.
· If you enter n (no), the normal boot process continues as if the Mode button had not been pressed; you cannot access the boot loader prompt, and you cannot enter a new password. You see the message:
Press Enter to continue........
· If you enter y (yes), the configuration file in flash memory and the VLAN database file are deleted. When the default configuration loads, you can reset the password.

Step 1 Choose to continue with password recovery and delete the existing configuration:

Would you like to reset the system back to the default configuration (y/n)? Y

Step 2

Display the contents of flash memory:
Switch: dir flash:

The switch file system appears.

Directory of flash:/ . .

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2086

System Management

Preventing Switch Stack Problems

Step 3

.i'

15494 drwx

4096 Jan 1 2000 00:20:20 +00:00 kirch

15508 -rw- 258065648 Sep 4 2013 14:19:03 +00:00

cat3k_caa-universalk9.SSA.03.12.02.EZP.150-12.02.EZP.150-12.02.EZP.bin

162196684

Boot up the system:
Switch: boot

You are prompted to start the setup program. To continue with password recovery, enter N at the prompt:

Continue with the configuration dialog? [yes/no]: N

Step 4

At the switch prompt, enter privileged EXEC mode:
Switch> enable

Step 5

Enter global configuration mode:
Switch# configure terminal

Step 6 Step 7 Step 8 Step 9

Change the password:
Switch(config)# enable secret password
The secret password can be from 1 to 25 alphanumeric characters, can start with a number, is case sensitive, and allows spaces but ignores leading spaces. Return to privileged EXEC mode:
Switch(config)# exit Switch#
Note Before continuing to Step 9, power on any connected stack members and wait until they have completely initialized.
Write the running configuration to the startup configuration file:
Switch# copy running-config startup-config
The new password is now in the startup configuration. You must now reconfigure the switch. If the system administrator has the backup switch and VLAN configuration files available, you should use those.

Preventing Switch Stack Problems
To prevent switch stack problems, you should do the following:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2087

Preventing Autonegotiation Mismatches

System Management

· Make sure that the switches that you add to or remove from the switch stack are powered off. For all powering considerations in switch stacks, see the "Switch Installation" chapter in the hardware installation guide.
· Press the Mode button on a stack member until the Stack mode LED is on. The last two port LEDs on the switch should be green. Depending on the switch model, the last two ports are either 10/100/1000 ports or small form-factor pluggable (SFP) module. If one or both of the last two port LEDs are not green, the stack is not operating at full bandwidth.
· We recommend using only one CLI session when managing the switch stack. Be careful when using multiple CLI sessions to the active switch . Commands that you enter in one session are not displayed in the other sessions. Therefore, it is possible that you might not be able to identify the session from which you entered a command.
· Manually assigning stack member numbers according to the placement of the switches in the stack can make it easier to remotely troubleshoot the switch stack. However, you need to remember that the switches have manually assigned numbers if you add, remove, or rearrange switches later. Use the switch current-stack-member-number renumber new-stack-member-number global configuration command to manually assign a stack member number.
If you replace a stack member with an identical model, the new switch functions with the exact same configuration as the replaced switch. This is also assuming the new switch is using the same member number as the replaced switch.
Removing powered-on stack members causes the switch stack to divide (partition) into two or more switch stacks, each with the same configuration. If you want the switch stacks to remain separate, change the IP address or addresses of the newly created switch stacks. To recover from a partitioned switch stack, follow these steps:
1. Power off the newly created switch stacks.
2. Reconnect them to the original switch stack through their StackWise Plus ports.
3. Power on the switches.
Preventing Autonegotiation Mismatches
The IEEE 802.3ab autonegotiation protocol manages the switch settings for speed (10 Mb/s, 100 Mb/s, and 1000 Mb/s, excluding SFP module ports) and duplex (half or full). There are situations when this protocol can incorrectly align these settings, reducing performance. A mismatch occurs under these circumstances:
· A manually set speed or duplex parameter is different from the manually set speed or duplex parameter on the connected port.
· A port is set to autonegotiate, and the connected port is set to full duplex with no autonegotiation.
To maximize switch performance and ensure a link, follow one of these guidelines when changing the settings for duplex and speed:
· Let both ports autonegotiate both speed and duplex.
· Manually set the speed and duplex parameters for the ports on both ends of the connection.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2088

System Management

Troubleshooting SFP Module Security and Identification

Note If a remote device does not autonegotiate, configure the duplex settings on the two ports to match. The speed parameter can adjust itself even if the connected port does not autonegotiate.
Troubleshooting SFP Module Security and Identification
Cisco small form-factor pluggable (SFP) modules have a serial EEPROM that contains the module serial number, the vendor name and ID, a unique security code, and cyclic redundancy check (CRC). When an SFP module is inserted in the switch, the switch software reads the EEPROM to verify the serial number, vendor name and vendor ID, and recompute the security code and CRC. If the serial number, the vendor name or vendor ID, the security code, or CRC is invalid, the software generates a security error message and places the interface in an error-disabled state.
Note The security error message references the GBIC_SECURITY facility. The switch supports SFP modules and does not support GBIC modules. Although the error message text refers to GBIC interfaces and modules, the security messages actually refer to the SFP modules and module interfaces.
If you are using a non-Cisco SFP module, remove the SFP module from the switch, and replace it with a Cisco module. After inserting a Cisco SFP module, use the errdisable recovery cause gbic-invalid global configuration command to verify the port status, and enter a time interval for recovering from the error-disabled state. After the elapsed interval, the switch brings the interface out of the error-disabled state and retries the operation. If the module is identified as a Cisco SFP module, but the system is unable to read vendor-data information to verify its accuracy, an SFP module error message is generated. In this case, you should remove and reinsert the SFP module. If it continues to fail, the SFP module might be defective.
Monitoring SFP Module Status
You can check the physical or operational status of an SFP module by using the show interfaces transceiver privileged EXEC command. This command shows the operational status, such as the temperature and the current for an SFP module on a specific interface and the alarm status. You can also use the command to check the speed and the duplex settings on an SFP module.
Executing Ping
If you attempt to ping a host in a different IP subnetwork, you must define a static route to the network or have IP routing configured to route between those subnets. IP routing is disabled by default on all switches.
Note Though other protocol keywords are available with the ping command, they are not supported in this release.
Use this command to ping another device on the network from the switch:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2089

Monitoring Temperature

System Management

Command ping ip host | address

Purpose Pings a remote host through IP or by supplying the hostname or network address.

Switch# ping 172.20.52.3

Related Topics Ping, on page 2075 Example: Pinging an IP Host, on page 2096

Monitoring Temperature
The switch monitors the temperature conditions and uses the temperature information to control the fans.
Use the show env temperature status privileged EXEC command to display the temperature value, state, and thresholds. The temperature value is the temperature in the switch (not the external temperature).You can configure only the yellow threshold level (in Celsius) by using the system env temperature threshold yellow value global configuration command to set the difference between the yellow and red thresholds. You cannot configure the green or red thresholds.

Monitoring the Physical Path
You can monitor the physical path that a packet takes from a source device to a destination device.
Table 186: Monitoring the Physical Path

Command
tracetroute mac [interface interface-id] {source-mac-address} [interface interface-id] {destination-mac-address} [vlan vlan-id] [detail]
tracetroute mac ip {source-ip-address | source-hostname}{destination-ip-address | destination-hostname} [detail]

Purpose
Displays the Layer 2 path taken by the packets from the specified source MAC address to the specified destination MAC address.
Displays the Layer 2 path taken by the packets from the specified source IP address or hostname to the specified destination IP address or hostname.

Executing IP Traceroute

Note Though other protocol keywords are available with the traceroute privileged EXEC command, they are not supported in this release.

Command traceroute ip host
Switch# traceroute ip 192.51.100.1

Purpose
Traces the path that packets take through the network.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2090

System Management

Running TDR and Displaying the Results

Related Topics IP Traceroute , on page 2076 Example: Performing a Traceroute to an IP Host, on page 2097
Running TDR and Displaying the Results
When you run TDR on an interface, you can run it on the active switch or a stack member. To run TDR, enter the test cable-diagnostics tdr interface interface-id privileged EXEC command. To display the results, enter the show cable-diagnostics tdr interface interface-id privileged EXEC command.
Redirecting Debug and Error Message Output
By default, the network server sends the output from debug commands and system error messages to the console. If you use this default, you can use a virtual terminal connection to monitor debug output instead of connecting to the console port or the Ethernet management port. Possible destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server. The syslog format is compatible with 4.3 Berkeley Standard Distribution (BSD) UNIX and its derivatives.
Note Be aware that the debugging destination you use affects system overhead. When you log messages to the console, very high overhead occurs. When you log messages to a virtual terminal, less overhead occurs. Logging messages to a syslog server produces even less, and logging to an internal buffer produces the least overhead of any method.
Related Topics Debug Commands, on page 2078
Using the show platform forward Command
The output from the show platform forward privileged EXEC command provides some useful information about the forwarding results if a packet entering an interface is sent through the system. Depending upon the parameters entered about the packet, the output provides lookup table results and port maps used to calculate forwarding destinations, bitmaps, and egress information. Most of the information in the output from the command is useful mainly for technical support personnel, who have access to detailed information about the switch application-specific integrated circuits (ASICs). However, packet forwarding information can also be helpful in troubleshooting.
Configuring OBFL
Caution We recommend that you do not disable OBFL and that you do not remove the data stored in the flash memory.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2091

Verifying Troubleshooting of the Software Configuration

System Management

· To enable OBFL, use the hw-switch switch [switch-number] logging onboard [message level level] global configuration command. On switches, the range for switch-number is from 1 to 9. Use the message level level parameter to specify the severity of the hardware-related messages that the switch generates and stores in the flash memory.
· To copy the OBFL data to the local network or a specific file system, use the copy onboard switch switch-number url url-destination privileged EXEC command.
· To disable OBFL, use the no hw-switch switch [switch-number] logging onboard [message level] global configuration command.
· To clear all the OBFL data in the flash memory except for the uptime and CLI command information, use the clear onboard switch switch-number privileged EXEC command.
· In a switch stack, you can enable OBFL on a standalone switch or on all stack members by using the hw-switch switch [switch-number] logging onboard [message level level] global configuration command.
· You can enable or disable OBFL on a member switch from the active switch.
Related Topics Onboard Failure Logging on the Switch, on page 2079 Displaying OBFL Information, on page 2092

Verifying Troubleshooting of the Software Configuration

Displaying OBFL Information
Table 187: Commands for Displaying OBFL Information
Command show onboard switch switch-number clilog
Switch# show onboard switch 1 clilog
show onboard switch switch-number environment
Switch# show onboard switch 1 environment
show onboard switch switch-number message
Switch# show onboard switch 1 message
show onboard switch switch-number counter
Switch# show onboard switch 1 counter
show onboard switch switch-number temperature
Switch# show onboard switch 1 temperature

Purpose
Displays the OBFL CLI commands that were entered on a standalone switch or the specified stack members.
Displays the UDI information for a standalone switch or the specified stack members and for all the connected FRU devices: the PID, the VID, and the serial number.
Displays the hardware-related messages generated by a standalone switch or the specified stack members.
Displays the counter information on a standalone switch or the specified stack members.
Displays the temperature of a standalone switch or the specified switch stack members.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2092

System Management

Example: Verifying the Problem and Cause for High CPU Utilization

Command show onboard switch switch-number uptime
Switch# show onboard switch 1 uptime
show onboard switch switch-number voltage
Switch# show onboard switch 1 voltage
show onboard switch switch-number status
Switch# show onboard switch 1 status

Purpose
Displays the time when a standalone switch or the specified stack members start, the reason the standalone switch or specified stack members restart, and the length of time that the standalone switch or specified stack members have been running since they last restarted.
Displays the system voltages of a standalone switch or the specified stack members.
Displays the status of a standalone switch or the specified stack members.

Related Topics Onboard Failure Logging on the Switch, on page 2079 Configuring OBFL, on page 2091
Example: Verifying the Problem and Cause for High CPU Utilization
To determine if high CPU utilization is a problem, enter the show processes cpu sorted privileged EXEC command. Note the underlined information in the first line of the output example.
Switch# show processes cpu sorted CPU utilization for five seconds: 8%/0%; one minute: 7%; five minutes: 8% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 309 42289103 752750 56180 1.75% 1.20% 1.22% 0 RIP Timers 140 8820183 4942081 1784 0.63% 0.37% 0.30% 0 HRPC qos request 100 3427318 16150534 212 0.47% 0.14% 0.11% 0 HRPC pm-counters 192 3093252 14081112 219 0.31% 0.14% 0.11% 0 Spanning Tree 143 8 37 216 0.15% 0.01% 0.00% 0 Exec ... <output truncated>
This example shows normal CPU utilization. The output shows that utilization for the last 5 seconds is 8%/0%, which has this meaning:
· The total CPU utilization is 8 percent, including both time running Cisco IOS processes and time spent handling interrupts.
· The time spent handling interrupts is zero percent.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2093

Scenarios for Troubleshooting the Software Configuration

System Management

Table 188: Troubleshooting CPU Utilization Problems

Type of Problem

Cause

Corrective Action

Interrupt percentage value is almost as high as total CPU utilization value.

The CPU is receiving too many packets from the network.

Determine the source of the network packet. Stop the flow, or change the switch configuration. See the section on "Analyzing Network Traffic."

Total CPU utilization is greater One or more Cisco IOS process Identify the unusual event, and

than 50% with minimal time is consuming too much CPU time. troubleshoot the root cause. See the

spent on interrupts.

This is usually triggered by an section on "Debugging Active

event that activated the process. Processes."

Scenarios for Troubleshooting the Software Configuration

Scenarios to Troubleshoot Power over Ethernet (PoE)

Table 189: Power over Ethernet Troubleshooting Scenarios

Symptom or Problem

Possible Cause and Solution

Only one port does not have PoE. Verify that the powered device works on another PoE port.
Trouble is on only one switch port. Use the show run, or show interface status user EXEC commands PoE and non-PoE devices do not work to verify that the port is not shut down or error-disabled. on this port, but do on other ports. Note Most switches turn off port power when the port is shut
down, even though the IEEE specifications make this optional.

Verify that the Ethernet cable from the powered device to the switch port is good: Connect a known good non-PoE Ethernet device to the Ethernet cable, and make sure that the powered device establishes a link and exchanges traffic with another host.
Verify that the total cable length from the switch front panel to the powered device is not more than 100 meters.
Disconnect the Ethernet cable from the switch port. Use a short Ethernet cable to connect a known good Ethernet device directly to this port on the switch front panel (not on a patch panel). Verify that it can establish an Ethernet link and exchange traffic with another host, or ping the port VLAN SVI. Next, connect a powered device to this port, and verify that it powers on.
If a powered device does not power on when connected with a patch cord to the switch port, compare the total number of connected powered devices to the switch power budget (available PoE). Use the show inline power command to verify the amount of available power.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2094

System Management

Scenarios to Troubleshoot Power over Ethernet (PoE)

Symptom or Problem

Possible Cause and Solution

No PoE on all ports or a group of ports. If there is a continuous, intermittent, or reoccurring alarm related to

Trouble is on all switch ports. Nonpowered Ethernet devices cannot

power, replace the power supply if possible it is a field-replaceable unit. Otherwise, replace the switch.

establish an Ethernet link on any port, If the problem is on a consecutive group of ports but not all ports,

and PoE devices do not power on. the power supply is probably not defective, and the problem could

be related to PoE regulators in the switch.

Use the show log privileged EXEC command to review alarms or system messages that previously reported PoE conditions or status changes.

If there are no alarms, use the show interface status command to verify that the ports are not shut down or error-disabled. If ports are error-disabled, use the shut and no shut interface configuration commands to reenable the ports.

Use the show env power and show power inline privileged EXEC commands to review the PoE status and power budget (available PoE).

Review the running configuration to verify that power inline never is not configured on the ports.

Connect a nonpowered Ethernet device directly to a switch port. Use only a short patch cord. Do not use the existing distribution cables. Enter the shut and no shut interface configuration commands, and verify that an Ethernet link is established. If this connection is good, use a short patch cord to connect a powered device to this port and verify that it powers on. If the device powers on, verify that all intermediate patch panels are correctly connected.

Disconnect all but one of the Ethernet cables from switch ports. Using a short patch cord, connect a powered device to only one PoE port. Verify the powered device does not require more power than can be delivered by the switch port.

Use the show power inline privileged EXEC command to verify that the powered device can receive power when the port is not shut down. Alternatively, watch the powered device to verify that it powers on.

If a powered device can power on when only one powered device is connected to the switch, enter the shut and no shut interface configuration commands on the remaining ports, and then reconnect the Ethernet cables one at a time to the switch PoE ports. Use the show interface status and show power inline privileged EXEC commands to monitor inline power statistics and port status.

If there is still no PoE at any port, a fuse might be open in the PoE section of the power supply. This normally produces an alarm. Check the log again for alarms reported earlier by system messages.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2095

Configuration Examples for Troubleshooting Software

System Management

Symptom or Problem

Possible Cause and Solution

Cisco IP Phone disconnects or resets. Verify all electrical connections from the switch to the powered

After working normally, a Cisco phone or wireless access point intermittently reloads or disconnects from PoE.

device. Any unreliable connection results in power interruptions and irregular powered device functioning such as erratic powered device disconnects and reloads.

Verify that the cable length is not more than 100 meters from the

switch port to the powered device.

Notice what changes in the electrical environment at the switch location or what happens at the powered device when the disconnect occurs.

Notice whether any error messages appear at the same time a disconnect occurs. Use the show log privileged EXEC command to review error messages.

Verify that an IP phone is not losing access to the Call Manager immediately before the reload occurs. (It might be a network problem and not a PoE problem.)

Replace the powered device with a non-PoE device, and verify that the device works correctly. If a non-PoE device has link problems or a high error rate, the problem might be an unreliable cable connection between the switch port and the powered device.

Non-Cisco powered device does not Use the show power inline command to verify that the switch power

work on Cisco PoE switch.

budget (available PoE) is not depleted before or after the powered

A non-Cisco powered device is connected to a Cisco PoE switch, but

device is connected. Verify that sufficient power is available for the powered device type before you connect it.

never powers on or powers on and then Use the show interface status command to verify that the switch

quickly powers off. Non-PoE devices detects the connected powered device.

work normally.

Use the show log command to review system messages that reported

an overcurrent condition on the port. Identify the symptom precisely:

Does the powered device initially power on, but then disconnect? If

so, the problem might be an initial surge-in (or inrush) current that

exceeds a current-limit threshold for the port.

Related Topics Power over Ethernet Ports, on page 2074

Configuration Examples for Troubleshooting Software

Example: Pinging an IP Host
This example shows how to ping an IP host:
Switch# ping 172.20.52.3

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2096

System Management

Example: Performing a Traceroute to an IP Host

Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.20.52.3, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms Switch#
Table 190: Ping Output Display Characters

Character Description

!

Each exclamation point means receipt of a reply.

.

Each period means the network server timed out while waiting for a reply.

U

A destination unreachable error PDU was received.

C

A congestion experienced packet was received.

I

User interrupted test.

?

Unknown packet type.

&

Packet lifetime exceeded.

To end a ping session, enter the escape sequence (Ctrl-^ X by default). Simultaneously press and release the Ctrl, Shift, and 6 keys and then press the X key.
Related Topics Ping, on page 2075 Executing Ping, on page 2089

Example: Performing a Traceroute to an IP Host
This example shows how to perform a traceroute to an IP host:

Switch# traceroute ip 192.0.2.10
Type escape sequence to abort. Tracing the route to 192.0.2.10
1 192.0.2.1 0 msec 0 msec 4 msec 2 192.0.2.203 12 msec 8 msec 0 msec 3 192.0.2.100 4 msec 0 msec 0 msec 4 192.0.2.10 0 msec 4 msec 0 msec

The display shows the hop count, the IP address of the router, and the round-trip time in milliseconds for each of the three probes that are sent.
Table 191: Traceroute Output Display Characters

Character Description

*

The probe timed out.

?

Unknown packet type.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2097

Example: Enabling All System Diagnostics

System Management

Character Description

A

Administratively unreachable. Usually, this output means that an access list is blocking traffic.

H

Host unreachable.

N

Network unreachable.

P

Protocol unreachable.

Q

Source quench.

U

Port unreachable.

To end a trace in progress, enter the escape sequence (Ctrl-^ X by default). Simultaneously press and release the Ctrl, Shift, and 6 keys and then press the X key.
Related Topics IP Traceroute , on page 2076 Executing IP Traceroute, on page 2090

Example: Enabling All System Diagnostics

Caution Because debugging output takes priority over other network traffic, and because the debug all privileged EXEC command generates more output than any other debug command, it can severely diminish switch performance or even render it unusable. In virtually all cases, it is best to use more specific debug commands.
This command disables all-system diagnostics:
Switch# debug all
The no debug all privileged EXEC command disables all diagnostic output. Using the no debug all command is a convenient way to ensure that you have not accidentally left any debug commands enabled. Related Topics
Debug Commands, on page 2078

Additional References for Troubleshooting Software Configuration

Related Documents Related Topic System management commands

Document Title
System Management Command Reference (Catalyst 3650 Switches)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2098

System Management

Feature History and Information for Troubleshooting Software Configuration

Related Topic Platform-independent command reference
Platform_independent configuration information

Document Title
Configuration Fundamentals Command Reference, Cisco IOS XE Release 3S (Catalyst 3650 Switches)
Configuration Fundamentals Configuration Guide, Cisco IOS XE Release 3S (Catalyst 3650 Switches)

Standards and RFCs

Standard/RFC Title

None

--

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Troubleshooting Software Configuration

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2099

Feature History and Information for Troubleshooting Software Configuration
Related Topics Finding Feature Information, on page 19

System Management

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2100

X V I PA R T
VideoStream
· Configuring VideoStream, on page 2103 · Configuring VideoStream GUI, on page 2111

1 0 7 C H A P T E R
Configuring VideoStream
· Finding Feature Information, on page 2103 · Prerequisites for VideoStream, on page 2103 · Restrictions for Configuring VideoStream, on page 2103 · Information about VideoStream, on page 2104 · How to Configure VideoStream, on page 2104 · Monitoring Media Streams, on page 2109
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for VideoStream
Make sure that the multicast feature is enabled. We recommend configuring IP multicast on the controller with multicast-multicast mode. Check for the IP address on the client machine. The machine should have an IP address from the respective VLAN. Verify that the access points have joined the controllers.
Restrictions for Configuring VideoStream
IGMP snooping is required to switch ON for this MC2UC feature to be functional.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2103

Information about VideoStream

VideoStream

Information about VideoStream
The IEEE 802.11 wireless multicast delivery mechanism does not provide a reliable way to acknowledge lost or corrupted packets. The multicast frame packets are sent at a predetermined rate irrespective of the wireless client optimal data rate. As a result, if any multicast packet is lost in the air, it is not sent again which may cause an IP multicast stream unviewable. Also if the packets are delivered faster, the packets get congested.
The VideoStream feature makes the IP multicast stream delivery reliable over the air, by converting the multicast frame to a unicast frame over the air. Each VideoStream client acknowledges receiving a video IP multicast stream.

How to Configure VideoStream

Configuring Multicast-Direct Globally for Media-Stream

SUMMARY STEPS

1. configure terminal 2. wireless multicast 3. IP igmp snooping 4. IP igmp snooping querier 5. wireless media-stream multicast-direct 6. wireless media-stream message 7. wireless media-stream group<name><startIp><endIp> 8. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2 wireless multicast

Step 3 IP igmp snooping

Step 4 IP igmp snooping querier

Step 5

wireless media-stream multicast-direct Example:

Purpose Enters global configuration mode.
Enables multicast for wireless forwarding. Enables IGMP snooping on a per-VLAN basis. If the global setting is disabled, then all VLANs are treated as disabled, whether they are enabled or not. Configures a snooping querier on an interface when there is no multicast router in the VLAN to generate queries. Configures the global multicast-direct feature for the controller.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2104

VideoStream

Configuring Media-Stream for 802.11 bands

Step 6 Step 7
Step 8

Command or Action
Switch(config)#wireless media-stream multicast-direct

Purpose

wireless media-stream message
Example:
Switch(config)#wireless media-stream message ? Email Configure Session Announcement Email Notes Configure Session Announcement notes URL Configure Session Announcement URL phone Configure Session Announcement Phone
number <cr>

Configures various message configuration parameters like phone, URL, email and notes. That is, when a media stream is refused (due to bandwidth constraints), a message can be sent to the user. These parameters configure the messages to send IT support email address, notes (message to display explaining why the stream was refused), URL to which the user can be redirected and the phone number that the user can call about the refused stream.

wireless media-stream group<name><startIp><endIp>
Example:

configures each media stream and its parameters like expected multicast destination addresses, stream bandwidth consumption and stream priority parameters.

Switch(config)#wireless media-stream group grp1 231.1.1.1 239.1.1.3 Switch(config-media-stream)#?

avg-packet-size Configures average packet size

default

Set a command to its defaults

exit

Exit sub-mode

max-bandwidth Configures maximum Expected

Stream Bandwidth in Kbps

no

Negate a command or set its

defaults

policy

Configure media stream admission

policy

qos

Configure Over the AIR QoS

class, <'video'> ONLY

<cr>

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring Media-Stream for 802.11 bands

SUMMARY STEPS

1. configure terminal 2. ap dot11 24ghz | 5ghz media-stream multicast-direct 3. ap dot11 24ghz | 5ghz media-stream video-redirect 4. ap dot11 24ghz | 5ghz media-stream multicast-direct admission-besteffort 5. ap dot11 24ghz | 5ghz media-stream multicast-direct client-maximum [<value >] 6. ap dot11 24ghz | 5ghz media-stream multicast-direct radio-maximum 20 7. ap dot11 24ghz | 5ghz cac multimedia max-bandwidth [<bandwidth>] 8. ap dot11 24ghz | 5ghz cac media-stream multicast-direct min_client_rate [<dot11_rate> ]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2105

Configuring Media-Stream for 802.11 bands

VideoStream

9. ap dot11 5ghz cac media-stream 10. ap dot11 5ghz cac multimedia 11. ap dot11 5ghz cac video 12. ap dot11 5ghz cac voice 13. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

ap dot11 24ghz | 5ghz media-stream multicast-direct
Example:
Switch(config)#ap dot11 24ghz media-stream multicast-direct

Configures if media stream (mc2uc) is allowed for 802.11 band

Step 3

ap dot11 24ghz | 5ghz media-stream video-redirect
Example:
Switch(config)#ap dot11 24ghz media-stream video-redirect

Configures to redirect unicast video traffic to best effort queue.

Step 4

ap dot11 24ghz | 5ghz media-stream multicast-direct admission-besteffort
Example:
Switch(config)#ap dot11 24ghz media-stream multicast-direct admission-besteffort

Configures the media stream to still be sent through the best effort queue if a media stream cannot be prioritized due to bandwidth availability limitations. Add no in the command to drop the stream if the media stream cannot be prioritized due to bandwidth availability limitations.

Step 5

ap dot11 24ghz | 5ghz media-stream multicast-direct client-maximum [<value >]
Example:
Switch(config)#ap dot11 24ghz media-stream multicast-direct client-max 15

Configures maximum number of allowed media streams per individual client. The maximum is 15 and the default is 0. Value 0 denotes unlimited streams.

Step 6 Step 7

ap dot11 24ghz | 5ghz media-stream multicast-direct Configures maximum number of radio streams. The range

radio-maximum 20

is from 1 to 20. Default is 0. Value 0 denotes unlimited

streams.

ap dot11 24ghz | 5ghz cac multimedia max-bandwidth Configure maximum media (voice + video) bandwidth in

[<bandwidth>]

%. The range is between 5% and 85%.

Example:
Switch(config)#ap dot11 24ghz cac multimedia max-bandwidth 60

Step 8

ap dot11 24ghz | 5ghz cac media-stream multicast-direct Configures the minimum PHY rate needed for a client to

min_client_rate [<dot11_rate> ]

send media-stream as unicast. Clients communicating

Example:

below this rate will not receive the media stream as a

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2106

VideoStream

Configuring WLAN to Stream Video

Step 9 Step 10 Step 11 Step 12 Step 13

Command or Action
Switch(config)#ap dot11 24ghz cac media-stream multicast-direct min_client_rate

Purpose
unicast flow. Typically, this PHY rate is equal to or higher than the rate at which multicast frames are sent.

ap dot11 5ghz cac media-stream
ap dot11 5ghz cac multimedia
ap dot11 5ghz cac video
ap dot11 5ghz cac voice end Example:
Switch(config)# end

Configures CAC parameters for media stream access category.
Configures CAC parameters for media access category, used for voice and video.
Configures CAC parameters for video access category, used for voice signaling.
Configures CAC parameters for voice access category.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Configuring WLAN to Stream Video

SUMMARY STEPS

1. configure terminal 2. wlan wlan_name 3. shutdown 4. media-stream multicast-direct 5. no shutdown 6. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan wlan_name Example:
Switch(config)#wlan wlan50

Step 3

shutdown Example:
Switch(config-wlan)#shutdown

Step 4

media-stream multicast-direct Example:

Purpose Enters global configuration mode.
Enters the WLAN configuration mode.
Disables the WLAN for configuring it parameters.
Configures the multicast-direct feature on media-stream for the WLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2107

Deleting a Media-Stream

VideoStream

Step 5 Step 6

Command or Action
Switch(config)#media-stream multicast-direct
no shutdown Example:
Switch(config-wlan)#no shutdown
end Example:
Switch(config)# end

Purpose Enables the WLAN.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Deleting a Media-Stream

Before you begin The media-stream should be enabled and configured for it to be deleted.

SUMMARY STEPS

1. configure terminal 2. no wireless media-stream group media_stream_name 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

no wireless media-stream group media_stream_name Example:
Switch(config)#no wireless media-stream grp1

Deletes the media-stream which bears the name mentioned in the command.

Step 3

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2108

VideoStream

Monitoring Media Streams

Monitoring Media Streams

Table 192: Commands for monitoring media streams

Commands

Description

show wireless media-stream client detail group Displays media stream client details of the particular

name

group.

show wireless media-stream client summary Displays the media stream information of all the clients.

show wireless media-stream group detail group Displays the media stream configuration details of the

name

particular group.

show wireless media-stream group summary

Displays the media stream configuration details of all the groups.

show wireless media-stream message details Displays the session announcement message details.

show wireless multicast

Displays the multicast-direct configuration state.

show ap dot11 24ghz | 5ghz media-stream rrc Displays 802.11 media Resource-Reservation-Control configurations.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2109

Monitoring Media Streams

VideoStream

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2110

1 0 8 C H A P T E R

Configuring VideoStream GUI

· Configuring VideoStream (GUI), on page 2111
Configuring VideoStream (GUI)
Complete the following steps to configure VideoStream using GUI.

Step 1 Step 2

Configure the multicast feature by following these steps: a) Choose Wireless > MediaStream > General. b) Select or unselect the Multicast Direct feature check box. The default value is disabled.
Note Enabling the multicast direct feature does not automatically reset the existing client state. The wireless clients must rejoin the multicast stream after enabling the multicast direct feature on the controller.
c) In the Session Message Config area, select Session announcement State check box to enable the session announcement mechanism. If the session announcement state is enabled, clients are informed each time a controller is not able to serve the multicast direct data to the client.
d) In the Session announcement URL text box, enter the URL where the client can find more information when an error occurs during the multicast media stream transmission.
e) In the Session announcement e-mail text box, enter the e-mail address of the person who can be contacted. f) In the Session announcement Phone text box, enter the phone number of the person who can be contacted. g) In the Session announcement Note text box, enter a reason as to why a particular client cannot be served with a
multicast media. h) Click Apply.
Add a media stream by following these steps: a) Choose Wireless > Media Stream > Streams to open the Media Stream page. b) Click Add New to configure a new media stream. The Media Stream > New page appears.
Note The Stream Name, Multicast Destination Start IP Address (IPv4 or IPv6), and Multicast Destination End IP Address (IPv4 or IPv6) text boxes are mandatory. You must enter information in these text boxes.
c) In the Stream Name text box, enter the media stream name. The stream name can be up to 64 characters. d) In the Multicast Destination Start IP Address (IPv4 or IPv6) text box, enter the start (IPv4 or IPv6) address of
the multicast media stream. e) In the Multicast Destination End IP Address (IPv4 or IPv6) text box, enter the end (IPv4 or IPv6) address of
the multicast media stream.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2111

Configuring VideoStream (GUI)

VideoStream

Step 3

Example: Note Ensure that the Multicast Destination Start and End IP addresses are of the same type, that is both addresses
should be of either IPv4 or IPv6 type.
f) In the Maximum Expected Bandwidth text box, enter the maximum expected bandwidth that you want to assign to the media stream. The values can range between 1 to 35000 kbps. Example: Note We recommend that you use a template to add a media stream to the controller.
g) From the Select from Predefined Templates drop-down list under Resource Reservation Control (RRC) Parameters, choose one of the following options to specify the details about the resource reservation control: · Very Coarse (below 300 kbps)
· Coarse (below 500 kbps)
· Ordinary (below 750 kbps)
· Low (below 1 Mbps)
· Medium (below 3 Mbps)
· High (below 5 Mbps) Note When you select a predefined template from the drop-down list, the following text boxes under the Resource Reservation Control (RRC) Parameters list their default values that are assigned with the template.
· Average Packet Size (100-1500 bytes)--Specifies the average packet size. The value can be in the range of 100 to 1500 bytes. The default value is 1200.
· RRC Periodic update--Enables the RRC (Resource Reservation Control Check) Periodic update. By default, this option is enabled. RRC periodically updates the admission decision on the admitted stream according to the correct channel load. As a result, it may deny certain low priority admitted stream requests.
· RRC Priority (1-8)--Specifies the priority bit set in the media stream. The priority can be any number between 1 and 8. The larger the value means the higher the priority is. For example, a priority of 1 is the lowest value and a value of 8 is the highest value. The default priority is 4. The low priority stream may be denied in the RRC periodic update.
· Traffic Profile Violation--Specifies the action to perform in case of a violation after a re-RRC. Choose an action from the drop-down list. The possible values are as follows: Drop--Specifies that a stream is dropped on periodic revaluation. Fallback--Specifies that a stream is demoted to Best Effort class on periodic reevaluation. The default value is drop.
h) Click Apply. Enable the media stream for multicast-direct by following these steps: a) Choose WLANs > WLAN ID to open the WLANs > Edit page. b) Click the QoS tab and select Gold (Video) from the Quality of Service (QoS) drop-down list. c) Click Apply.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2112

VideoStream

Configuring VideoStream (GUI)

Step 4 Step 5 Step 6
Step 7

Set the EDCA parameters to voice and video optimized (optional) by following these steps: a) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > EDCA Parameters. b) From the EDCA Profile drop-down list, choose the Voice and Video Optimized option. c) Click Apply.
Enable the admission control on a band for video (optional) by following these steps:
Note Keep the voice bandwidth allocation to a minimum for better performance.
a) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > Media to open the 802.11a/n (5 GHZ) or 802.11b/g/n > Media page.
b) Click the Video tab. c) Select the Admission Control (ACM) check box to enable bandwidth-based CAC for this radio band. The default
value is disabled. d) Click Apply
Configure the video bandwidth by following these steps:
Note The template bandwidth that is configured for a media stream should be more than the bandwidth for the source media stream. The voice configuration is optional. Keep the voice bandwidth allocation to a minimum for better performance.
a) Disable all WMM WLANs. b) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > Media to open the 802.11a/n/ac (5 GHZ) or 802.11b/g/n >
Media page. c) Click the Video tab. d) Select the Admission Control (ACM) check box to enable the video CAC for this radio band. The default value
is disabled. e) In the Max RF Bandwidth field, enter the percentage of the maximum bandwidth allocated to clients for video
applications on this radio band. Once the client reaches the value specified, the access point rejects new requests on this radio band.
The range is 5 to 85%. The default value is 9%.
f) Click Apply. g) Reenable all WMM WLANs and click Apply.
Configure the media bandwidth by following these steps: a) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > Media to open the 802.11a (or 802.11b) > Media > Parameters
page. b) Click the Media tab to open the Media page. c) Select the Unicast Video Redirect check box to enable Unicast Video Redirect. The default value is disabled. d) In the Maximum Media Bandwidth (0-85%) text box, enter the percentage of the maximum bandwidth to be
allocated for media applications on this radio band. Once the client reaches a specified value, the access point rejects new calls on this radio band. The default value is 85%; valid values are from 0% to 85%.
e) In the Client Minimum Phy Rate text box, enter the minimum transmission data rate to the client. If the transmission data rate is below the phy rate, either the video will not start or the client may be classified as a bad client. The bad client video can be demoted for better effort QoS or subject to denial.
f) In the Maximum Retry Percent (0-100%) text box, enter the percentage of maximum retries that are allowed. The default value is 80. If it exceeds 80, either the video will not start or the client might be classified as a bad client. The bad client video can be demoted for better effort QoS or subject to denial.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2113

Configuring VideoStream (GUI)

VideoStream

Step 8 Step 9 Step 10

g) Select the Multicast Direct Enable check box to enable the Multicast Direct Enable field. The default value is enabled.
h) From the Max Streams per Radio drop-down list, choose the maximum number of streams allowed per radio from the range 0 to 20. The default value is set to No-limit. If you choose No-limit, there is no limit set for the number of client subscriptions.
i) From the Max Streams per Client drop-down list, choose the maximum number of streams allowed per client from the range 0 to 20. The default value is set to No-limit. If you choose No-limit, there is no limit set for the number of client subscriptions.
j) Select the Best Effort QoS Admission check box to enable best-effort QoS admission. k) Click Apply.
Enable a WLAN by following these steps: a) Choose WLANS > WLAN ID. The WLANs > Edit page appears. b) Select the Status check box. c) Click Apply.
Enable the 802.11 a/n/ac or 802.11 b/g/n network by following these steps: a) Choose Wireless > 802.11a/n/ac or 802.11b/g/n > Network. b) Select the 802.11a or 802.11b/g Network Status check box to enable the network status. c) Click Apply.
Verify that the clients are associated with the multicast groups and group IDs by following these steps: a) Choose Monitor > Clients. The Clients page appears. b) Check if the 802.11a/n/ac or 802.11b/g/n network clients have the associated access points. c) Choose Monitor > Multicast. The Multicast Groups page appears. d) Select the MGID check box for the VideoStream to the clients. e) Click MGID. The Multicast Group Detail page appears. Check the Multicast Status details.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2114

PART XVII
VLAN
· Configuring VTP, on page 2117 · Configuring VLANs, on page 2141 · Configuring VLAN Groups, on page 2161 · Configuring VLAN Trunks, on page 2169 · Configuring Voice VLANs, on page 2189

1 0 9 C H A P T E R
Configuring VTP
· Finding Feature Information, on page 2117 · Prerequisites for VTP, on page 2117 · Restrictions for VTP, on page 2118 · Information About VTP, on page 2118 · How to Configure VTP, on page 2128 · Monitoring VTP, on page 2137 · Configuration Examples for VTP, on page 2138 · Where to Go Next, on page 2138 · Additional References, on page 2139 · Feature History and Information for VTP, on page 2140
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for VTP
Before you create VLANs, you must decide whether to use the VLAN Trunking Protocol (VTP) in your network. Using VTP, you can make configuration changes centrally on one or more switches and have those changes automatically communicated to all the other switches in the network. Without VTP, you cannot send information about VLANs to other switches. VTP is designed to work in an environment where updates are made on a single switch and are sent through VTP to other switches in the domain. It does not work well in a situation where multiple updates to the VLAN database occur simultaneously on switches in the same domain, which would result in an inconsistency in the VLAN database. The switch supports a total of 4094 VLANs. However, the number of configured features affects the usage of the switch hardware. If the switch is notified by VTP of a new VLAN and the switch is already using the maximum available hardware resources, it sends a message that there are not enough hardware resources
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2117

Restrictions for VTP

VLAN

available and shuts down the VLAN. The output of the show vlan user EXEC command shows the VLAN in a suspended state.
You can enable or disable VTP per port by entering the [no] vtp interface configuration command. When you disable VTP on trunking ports, all VTP instances for that port are disabled. You cannot set VTP to off for the MST database and on for the VLAN database on the same port.
When you globally set VTP mode to off, it applies to all the trunking ports in the system. However, you can specify on or off on a per-VTP instance basis. For example, you can configure the switch as a VTP server for the VLAN database but with VTP off for the MST database.
Because trunk ports send and receive VTP advertisements, you must ensure that at least one trunk port is configured on the switch or switch stack and that this trunk port is connected to the trunk port of another switch. Otherwise, the switch cannot receive any VTP advertisements. Related Topics
VTP Advertisements, on page 2121 Adding a VTP Client Switch to a VTP Domain (CLI), on page 2135 VTP Domain, on page 2119 VTP Modes, on page 2120
Restrictions for VTP
The following are restrictions for a VTP:
· You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.

Caution

Before adding a VTP client switch to a VTP domain, always verify that its VTP configuration revision number is lower than the configuration revision number of the other switches in the VTP domain. Switches in a VTP domain always use the VLAN configuration of the switch with the highest VTP configuration revision number. If you add a switch that has a revision number higher than the revision number in the VTP domain, it can erase all VLAN information from the VTP server and VTP domain.

Information About VTP

VTP

VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations and configuration inconsistencies that can cause several problems, such as duplicate VLAN names, incorrect VLAN-type specifications, and security violations.
VTP functionality is supported across the stack, and all switches in the stack maintain the same VLAN and VTP configuration inherited from the active switch. When a switch learns of a new VLAN through VTP messages or when a new VLAN is configured by the user, the new VLAN information is communicated to all switches in the stack.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2118

VLAN

VTP Domain

When a switch joins the stack or when stacks merge, the new switches get VTP information from the active switch.
VTP Domain
A VTP domain (also called a VLAN management domain) consists of one switch or several interconnected switches or switch stacks under the same administrative responsibility sharing the same VTP domain name. A switch can be in only one VTP domain. You make global VLAN configuration changes for the domain.
By default, the switch is in the VTP no-management-domain state until it receives an advertisement for a domain over a trunk link (a link that carries the traffic of multiple VLANs) or until you configure a domain name. Until the management domain name is specified or learned, you cannot create or modify VLANs on a VTP server, and VLAN information is not propagated over the network.
If the switch receives a VTP advertisement over a trunk link, it inherits the management domain name and the VTP configuration revision number. The switch then ignores advertisements with a different domain name or an earlier configuration revision number.
Note Before adding a VTP client switch to a VTP domain, always verify that its VTP configuration revision number is lower than the configuration revision number of the other switches in the VTP domain. Switches in a VTP domain always use the VLAN configuration of the switch with the highest VTP configuration revision number. If you add a switch that has a revision number higher than the revision number in the VTP domain, it can erase all VLAN information from the VTP server and VTP domain.
When you make a change to the VLAN configuration on a VTP server, the change is propagated to all switches in the VTP domain. VTP advertisements are sent over all IEEE trunk connections, including IEEE 802.1Q. VTP dynamically maps VLANs with unique names and internal index associates across multiple LAN types. Mapping eliminates excessive device administration required from network administrators.
If you configure a switch for VTP transparent mode, you can create and modify VLANs, but the changes are not sent to other switches in the domain, and they affect only the individual switch. However, configuration changes made when the switch is in this mode are saved in the switch running configuration and can be saved to the switch startup configuration file.
Related Topics Adding a VTP Client Switch to a VTP Domain (CLI), on page 2135 Prerequisites for VTP, on page 2117

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2119

VTP Modes
VTP Modes
Table 193: VTP Modes
VTP Mode VTP server
VTP client

VLAN
Description
In VTP server mode, you can create, modify, and delete VLANs, and specify other configuration parameters (such as the VTP version) for the entire VTP domain. VTP servers advertise their VLAN configurations to other switches in the same VTP domain and synchronize their VLAN configurations with other switches based on advertisements received over trunk links. VTP server is the default mode. In VTP server mode, VLAN configurations are saved in NVRAM. If the switch detects a failure while writing a configuration to NVRAM, VTP mode automatically changes from server mode to client mode. If this happens, the switch cannot be returned to VTP server mode until the NVRAM is functioning.
A VTP client functions like a VTP server and transmits and receives VTP updates on its trunks, but you cannot create, change, or delete VLANs on a VTP client. VLANs are configured on another switch in the domain that is in server mode. In VTP versions 1 and 2 in VTP client mode, VLAN configurations are not saved in NVRAM. In VTP version 3, VLAN configurations are saved in NVRAM in client mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2120

VLAN

VTP Advertisements

VTP Mode VTP transparent
VTP off Related Topics
Prerequisites for VTP, on page 2117 Configuring VTP Mode (CLI), on page 2128

Description
VTP transparent switches do not participate in VTP. A VTP transparent switch does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, in VTP version 2 or version 3, transparent switches do forward VTP advertisements that they receive from other switches through their trunk interfaces. You can create, modify, and delete VLANs on a switch in VTP transparent mode.
When the switch is in VTP transparent mode, the VTP and VLAN configurations are saved in NVRAM, but they are not advertised to other switches. In this mode, VTP mode and domain name are saved in the switch running configuration, and you can save this information in the switch startup configuration file by using the copy running-config startup-config privileged EXEC command.
In a switch stack, the running configuration and the saved configuration are the same for all switches in a stack.
A switch in VTP off mode functions in the same manner as a VTP transparent switch, except that it does not forward VTP advertisements on trunks.

VTP Advertisements
Each switch in the VTP domain sends periodic global configuration advertisements from each trunk port to a reserved multicast address. Neighboring switches receive these advertisements and update their VTP and VLAN configurations as necessary. Because trunk ports send and receive VTP advertisements, you must ensure that at least one trunk port is configured on the switch stack and that this trunk port is connected to the trunk port of another switch. Otherwise, the switch cannot receive any VTP advertisements. VTP advertisements distribute this global domain information:
· VTP domain name
· VTP configuration revision number
· Update identity and update timestamp
· MD5 digest VLAN configuration, including maximum transmission unit (MTU) size for each VLAN

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2121

VTP Version 2

VLAN

· Frame format
VTP advertisements distribute this VLAN information for each configured VLAN: · VLAN IDs (including IEEE 802.1Q)
· VLAN name
· VLAN type
· VLAN state
· Additional VLAN configuration information specific to the VLAN type
In VTP version 3, VTP advertisements also include the primary server ID, an instance number, and a start index. Related Topics
Prerequisites for VTP, on page 2117
VTP Version 2
If you use VTP in your network, you must decide which version of VTP to use. By default, VTP operates in version 1. VTP version 2 supports these features that are not supported in version 1:
· Token Ring support--VTP version 2 supports Token Ring Bridge Relay Function (TrBRF) and Token Ring Concentrator Relay Function (TrCRF) VLANs.
· Unrecognized Type-Length-Value (TLV) support--A VTP server or client propagates configuration changes to its other trunks, even for TLVs it is not able to parse. The unrecognized TLV is saved in NVRAM when the switch is operating in VTP server mode.
· Version-Dependent Transparent Mode--In VTP version 1, a VTP transparent switch inspects VTP messages for the domain name and version and forwards a message only if the version and domain name match. Although VTP version 2 supports only one domain, a VTP version 2 transparent switch forwards a message only when the domain name matches.
· Consistency Checks--In VTP version 2, VLAN consistency checks (such as VLAN names and values) are performed only when you enter new information through the CLI or SNMP. Consistency checks are not performed when new information is obtained from a VTP message or when information is read from NVRAM. If the MD5 digest on a received VTP message is correct, its information is accepted.
Related Topics Enabling the VTP Version (CLI), on page 2131
VTP Version 3
VTP version 3 supports these features that are not supported in version 1 or version 2: · Enhanced authentication--You can configure the authentication as hidden or secret. When hidden, the secret key from the password string is saved in the VLAN database file, but it does not appear in plain text in the configuration. Instead, the key associated with the password is saved in hexadecimal format

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2122

VLAN

VTP Pruning

in the running configuration. You must reenter the password if you enter a takeover command in the domain. When you enter the secret keyword, you can directly configure the password secret key.
· Support for extended range VLAN (VLANs 1006 to 4094) database propagation--VTP versions 1 and 2 propagate only VLANs 1 to 1005.
Note VTP pruning still applies only to VLANs 1 to 1005, and VLANs 1002 to 1005 are still reserved and cannot be modified.
· Support for any database in a domain--In addition to propagating VTP information, version 3 can propagate Multiple Spanning Tree (MST) protocol database information. A separate instance of the VTP protocol runs for each application that uses VTP.
· VTP primary server and VTP secondary servers--A VTP primary server updates the database information and sends updates that are honored by all devices in the system. A VTP secondary server can only back up the updated VTP configurations received from the primary server to its NVRAM.
By default, all devices come up as secondary servers. You can enter the vtp primary privileged EXEC command to specify a primary server. Primary server status is only needed for database updates when the administrator issues a takeover message in the domain. You can have a working VTP domain without any primary servers. Primary server status is lost if the device reloads or domain parameters change, even when a password is configured on the switch.
Related Topics Enabling the VTP Version (CLI), on page 2131
VTP Pruning
VTP pruning increases network available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to reach the destination devices. Without VTP pruning, a switch floods broadcast, multicast, and unknown unicast traffic across all trunk links within a VTP domain even though receiving switches might discard them. VTP pruning is disabled by default.
VTP pruning blocks unneeded flooded traffic to VLANs on trunk ports that are included in the pruning-eligible list. Only VLANs included in the pruning-eligible list can be pruned. By default, VLANs 2 through 1001 are pruning eligible switch trunk ports. If the VLANs are configured as pruning-ineligible, the flooding continues. VTP pruning is supported in all VTP versions.
Figure 99: Flooding Traffic without VTP Pruning
VTP pruning is disabled in the switched network. Port 1 on Switch A and Port 2 on Switch D are assigned to the Red VLAN. If a broadcast is sent from the host connected to Switch A, Switch A floods the broadcast and every switch in the network receives it, even though Switches C, E, and F have no ports in the Red VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2123

VTP and Switch Stacks

VLAN

Figure 100: Optimized Flooded Traffic VTP Pruning
VTP pruning is enabled in the switched network. The broadcast traffic from Switch A is not forwarded to Switches C, E, and F because traffic for the Red VLAN has been pruned on the links shown (Port 5 on Switch B and Port 4 on Switch D).
Enabling VTP pruning on a VTP server enables pruning for the entire management domain. Making VLANs pruning-eligible or pruning-ineligible affects pruning eligibility for those VLANs on that trunk only (not on all switches in the VTP domain). VTP pruning takes effect several seconds after you enable it. VTP pruning does not prune traffic from VLANs that are pruning-ineligible. VLAN 1 and VLANs 1002 to 1005 are always pruning-ineligible; traffic from these VLANs cannot be pruned. Extended-range VLANs (VLAN IDs higher than 1005) are also pruning-ineligible. Related Topics
Enabling VTP Pruning (CLI), on page 2133
VTP and Switch Stacks
VTP configuration is the same in all members of a switch stack. When the switch stack is in VTP server, client, or transparent mode, all switches in the stack carry the same VTP configuration.
· When a switch joins the stack, it inherits the VTP and VLAN properties of the active switch. · All VTP updates are carried across the stack.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2124

VLAN

VTP Configuration Guidelines

· When VTP mode is changed in a switch in the stack, the other switches in the stack also change VTP mode, and the switch VLAN database remains consistent.
VTP version 3 functions the same on a standalone switch or a stack except when the switch stack is the primary server for the VTP database. In this case, the MAC address of the active switch is used as the primary server ID. If the active switch reloads or is powered off, a new active switch is elected.
· If you do not configure the persistent MAC address feature, when the new active switch is elected, it sends a takeover message using the current stack MAC address.

Note By default the persistent MAC address is on.

VTP Configuration Guidelines

VTP Configuration Requirements
When you configure VTP, you must configure a trunk port so that the switch can send and receive VTP advertisements to and from other switches in the domain.

VTP Settings

The VTP information is saved in the VTP VLAN database. When VTP mode is transparent, the VTP domain name and mode are also saved in the switch running configuration file, and you can save it in the switch startup configuration file by entering the copy running-config startup-config privileged EXEC command. You must use this command if you want to save VTP mode as transparent, even if the switch resets.
When you save VTP information in the switch startup configuration file and reboot the switch, the switch configuration is selected as follows:
· If the VTP mode is transparent in the startup configuration and the VLAN database and the VTP domain name from the VLAN database matches that in the startup configuration file, the VLAN database is ignored (cleared), and the VTP and VLAN configurations in the startup configuration file are used. The VLAN database revision number remains unchanged in the VLAN database.
· If the VTP mode or domain name in the startup configuration do not match the VLAN database, the domain name and VTP mode and configuration for VLAN IDs 1 to 1005 use the VLAN database information.

Related Topics Configuring VTP on a Per-Port Basis (CLI), on page 2134 Configuring a VTP Version 3 Primary Server (CLI), on page 2131

Domain Names for Configuring VTP
When configuring VTP for the first time, you must always assign a domain name. You must configure all switches in the VTP domain with the same domain name. Switches in VTP transparent mode do not exchange VTP messages with other switches, and you do not need to configure a VTP domain name for them.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2125

Passwords for the VTP Domain

VLAN

Note If the NVRAM and DRAM storage is sufficient, all switches in a VTP domain should be in VTP server mode.

Caution Do not configure a VTP domain if all switches are operating in VTP client mode. If you configure the domain, it is impossible to make changes to the VLAN configuration of that domain. Make sure that you configure at least one switch in the VTP domain for VTP server mode.
Related Topics Adding a VTP Client Switch to a VTP Domain (CLI), on page 2135
Passwords for the VTP Domain
You can configure a password for the VTP domain, but it is not required. If you do configure a domain password, all domain switches must share the same password and you must configure the password on each switch in the management domain. Switches without a password or with the wrong password reject VTP advertisements.
If you configure a VTP password for a domain, a switch that is booted without a VTP configuration does not accept VTP advertisements until you configure it with the correct password. After the configuration, the switch accepts the next VTP advertisement that uses the same password and domain name in the advertisement.
If you are adding a new switch to an existing network with VTP capability, the new switch learns the domain name only after the applicable password has been configured on it.

Caution When you configure a VTP domain password, the management domain does not function properly if you do not assign a management domain password to each switch in the domain.

Related Topics Configuring a VTP Version 3 Password (CLI), on page 2129 Example: Configuring a Switch as the Primary Server, on page 2138

VTP Version

Follow these guidelines when deciding which VTP version to implement:
· All switches in a VTP domain must have the same domain name, but they do not need to run the same VTP version.
· A VTP version 2-capable switch can operate in the same VTP domain as a switch running VTP version 1 if version 2 is disabled on the version 2-capable switch (version 2 is disabled by default).
· If a switch running VTP version 1, but capable of running VTP version 2, receives VTP version 3 advertisements, it automatically moves to VTP version 2.
· If a switch running VTP version 3 is connected to a switch running VTP version 1, the VTP version 1 switch moves to VTP version 2, and the VTP version 3 switch sends scaled-down versions of the VTP packets so that the VTP version 2 switch can update its database.
· A switch running VTP version 3 cannot move to version 1 or 2 if it has extended VLANs.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2126

VLAN

VTP Version

· Do not enable VTP version 2 on a switch unless all of the switches in the same VTP domain are version-2-capable. When you enable version 2 on a switch, all of the version-2-capable switches in the domain enable version 2. If there is a version 1-only switch, it does not exchange VTP information with switches that have version 2 enabled.
· Cisco recommends placing VTP version 1 and 2 switches at the edge of the network because they do not forward VTP version 3 advertisements.
· If there are TrBRF and TrCRF Token Ring networks in your environment, you must enable VTP version 2 or version 3 for Token Ring VLAN switching to function properly. To run Token Ring and Token Ring-Net, disable VTP version 2.
· VTP version 1 and version 2 do not propagate configuration information for extended range VLANs (VLANs 1006 to 4094). You must configure these VLANs manually on each device. VTP version 3 supports extended-range VLANs and support for extended range VLAN database propagation.
· When a VTP version 3 device trunk port receives messages from a VTP version 2 device, it sends a scaled-down version of the VLAN database on that particular trunk in VTP version 2 format. A VTP version 3 device does not send VTP version 2-formatted packets on a trunk unless it first receives VTP version 2 packets on that trunk port.
· When a VTP version 3 device detects a VTP version 2 device on a trunk port, it continues to send VTP version 3 packets, in addition to VTP version 2 packets, to allow both kinds of neighbors to coexist on the same trunk.
· A VTP version 3 device does not accept configuration information from a VTP version 2 or version 1 device.
· Two VTP version 3 regions can only communicate in transparent mode over a VTP version 1 or version 2 region.
· Devices that are only VTP version 1 capable cannot interoperate with VTP version 3 devices.
· VTP version 1 and version 2 do not propagate configuration information for extended range VLANs (VLANs 1006 to 4094). You must manually configure these VLANs on each device.
· If you configure the switch for VTP client mode, the switch does not create the VLAN database file (vlan.dat). If the switch is then powered off, it resets the VTP configuration to the default. To keep the VTP configuration with VTP client mode after the switch restarts, you must first configure the VTP domain name before the VTP mode.

Caution

If all switches are operating in VTP client mode, do not configure a VTP domain name. If you do, it is impossible to make changes to the VLAN configuration of that domain. Therefore, make sure you configure at least one switch as a VTP server.

Related Topics Enabling the VTP Version (CLI), on page 2131

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2127

How to Configure VTP

VLAN

How to Configure VTP

Configuring VTP Mode (CLI)
You can configure VTP mode as one of these:
· VTP server mode--In VTP server mode, you can change the VLAN configuration and have it propagated throughout the network.
· VTP client mode--In VTP client mode, you cannot change its VLAN configuration. The client switch receives VTP updates from a VTP server in the VTP domain and then modifies its configuration accordingly.
· VTP transparent mode--In VTP transparent mode, VTP is disabled on the switch. The switch does not send VTP updates and does not act on VTP updates received from other switch. However, a VTP transparent switch running VTP version 2 does forward received VTP advertisements on its trunk links.
· VTP off mode--VTP off mode is the same as VTP transparent mode except that VTP advertisements are not forwarded.
When you configure a domain name, it cannot be removed; you can only reassign a switch to a different domain.

SUMMARY STEPS

1. configure terminal 2. vtp domain domain-name 3. vtp mode {client | server | transparent | off} {vlan | mst | unknown} 4. vtp password password 5. end 6. show vtp status 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

vtp domain domain-name Example:
Switch(config)# vtp domain eng_group

Configures the VTP administrative-domain name. The name can be 1 to 32 characters. All switches operating in VTP server or client mode under the same administrative responsibility must be configured with the same domain name.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2128

VLAN

Configuring a VTP Version 3 Password (CLI)

Step 3 Step 4 Step 5

Command or Action

Purpose
This command is optional for modes other than server mode. VTP server mode requires a domain name. If the switch has a trunk connection to a VTP domain, the switch learns the domain name from the VTP server in the domain.
You should configure the VTP domain before configuring other VTP parameters.

vtp mode {client | server | transparent | off} {vlan | mst Configures the switch for VTP mode (client, server,

| unknown}

transparent, or off).

Example:
Switch(config)# vtp mode server

· vlan--The VLAN database is the default if none are configured.
· mst--The multiple spanning tree (MST) database.

· unknown--An unknown database type.

vtp password password Example:
Switch(config)# vtp password mypassword
end Example:
Switch(config)# end

(Optional) Sets the password for the VTP domain. The password can be 8 to 64 characters. If you configure a VTP password, the VTP domain does not function properly if you do not assign the same password to each switch in the domain.
Returns to privileged EXEC mode.

Step 6

show vtp status Example:
Switch# show vtp status

Verifies your entries in the VTP Operating Mode and the VTP Domain Name fields of the display.

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

Related Topics VTP Modes, on page 2120

(Optional) Saves the configuration in the startup configuration file.
Only VTP mode and domain name are saved in the switch running configuration and can be copied to the startup configuration file.

Configuring a VTP Version 3 Password (CLI)
You can configure a VTP version 3 password on the switch.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2129

Configuring a VTP Version 3 Password (CLI)

VLAN

SUMMARY STEPS

1. configure terminal 2. vtp password password [hidden | secret] 3. end 4. show vtp password 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2 Step 3

vtp password password [hidden | secret] Example:
Switch(config)# vtp password mypassword hidden

(Optional) Sets the password for the VTP domain. The password can be 8 to 64 characters.
· (Optional) hidden--Saves the secret key generated from the password string in the nvram:vlan.dat file. If you configure a takeover by configuring a VTP primary server, you are prompted to reenter the password.
· (Optional) secret--Directly configures the password. The secret password must contain 32 hexadecimal characters.

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 4

show vtp password Example:
Switch# show vtp password

Verifies your entries. The output appears like this: VTP password: 89914640C8D90868B6A0D8103847A733

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves the configuration in the startup configuration file.

Related Topics Passwords for the VTP Domain, on page 2126

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2130

VLAN

Configuring a VTP Version 3 Primary Server (CLI)

Example: Configuring a Switch as the Primary Server, on page 2138

Configuring a VTP Version 3 Primary Server (CLI)
When you configure a VTP server as a VTP primary server, the takeover operation starts.

SUMMARY STEPS

1. vtp primary [vlan | mst] [force]

DETAILED STEPS

Step 1

Command or Action vtp primary [vlan | mst] [force] Example:

Switch# vtp primary vlan force

Purpose
Changes the operational state of a switch from a secondary server (the default) to a primary server and advertises the configuration to the domain. If the switch password is configured as hidden, you are prompted to reenter the password.
· (Optional) vlan--Selects the VLAN database as the takeover feature. This is the default.
· (Optional) mst--Selects the multiple spanning tree (MST) database as the takeover feature.
· (Optional) force--Overwrites the configuration of any conflicting servers. If you do not enter force, you are prompted for confirmation before the takeover.

Related Topics VTP Settings, on page 2125
Enabling the VTP Version (CLI)
VTP version 2 and version 3 are disabled by default. · When you enable VTP version 2 on a switch , every VTP version 2-capable switch in the VTP domain enables version 2. To enable VTP version 3, you must manually configure it on each switch .
· With VTP versions 1 and 2, you can configure the version only on switches in VTP server or transparent mode. If a switch is running VTP version 3, you can change to version 2 when the switch is in client mode if no extended VLANs exist, and no hidden password was configured.

Caution VTP version 1 and VTP version 2 are not interoperable on switches in the same VTP domain. Do not enable VTP version 2 unless every switch in the VTP domain supports version 2.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2131

Enabling the VTP Version (CLI)

VLAN

· In TrCRF and TrBRF Token Ring environments, you must enable VTP version 2 or VTP version 3 for Token Ring VLAN switching to function properly. For Token Ring and Token Ring-Net media, disable VTP version 2.

Caution In VTP version 3, both the primary and secondary servers can exist on an instance in the domain.

SUMMARY STEPS

1. configure terminal 2. vtp version {1 | 2 | 3} 3. end 4. show vtp status 5. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

vtp version {1 | 2 | 3} Example:
Switch(config)# vtp version 2

Step 3

end Example:
Switch(config)# end

Step 4

show vtp status Example:
Switch# show vtp status

Step 5

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Enters the global configuration mode.
Enables the VTP version on the switch. The default is VTP version 1.
Returns to privileged EXEC mode.
Verifies that the configured VTP version is enabled.
(Optional) Saves the configuration in the startup configuration file.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2132

VLAN

Enabling VTP Pruning (CLI)

Related Topics VTP Version, on page 2126 VTP Version 2, on page 2122 VTP Version 3, on page 2122

Enabling VTP Pruning (CLI)
Pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the destination devices. You can only enable VTP pruning on a switch in VTP server mode.
With VTP versions 1 and 2, when you enable pruning on the VTP server, it is enabled for the entire VTP domain. In VTP version 3, you must manually enable pruning on each switch in the domain.
Only VLANs included in the pruning-eligible list can be pruned. By default, VLANs 2 through 1001 are pruning-eligible on trunk ports. Reserved VLANs and extended-range VLANs cannot be pruned.

Before you begin
VTP pruning is not designed to function in VTP transparent mode. If one or more switches in the network are in VTP transparent mode, you should do one of these actions:
· Turn off VTP pruning in the entire network.
· Turn off VTP pruning by making all VLANs on the trunk of the switch upstream to the VTP transparent switch pruning ineligible.
To configure VTP pruning on an interface, use the switchport trunk pruning vlan interface configuration command. VTP pruning operates when an interface is trunking. You can set VLAN pruning-eligibility, whether or not VTP pruning is enabled for the VTP domain, whether or not any given VLAN exists, and whether or not the interface is currently trunking.

SUMMARY STEPS

1. configure terminal 2. vtp pruning 3. end 4. show vtp status

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

vtp pruning Example:

Enables pruning in the VTP administrative domain.
By default, pruning is disabled. You need to enable pruning on only one switch in VTP server mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2133

Configuring VTP on a Per-Port Basis (CLI)

VLAN

Command or Action
Switch(config)# vtp pruning

Step 3

end Example:
Switch(config)# end

Step 4

show vtp status Example:
Switch# show vtp status

Purpose Returns to privileged EXEC mode.
Verifies your entries in the VTP Pruning Mode field of the display.

Related Topics VTP Pruning, on page 2123

Configuring VTP on a Per-Port Basis (CLI)
With VTP version 3, you can enable or disable VTP on a per-port basis. You can enable VTP only on ports that are in trunk mode. Incoming and outgoing VTP traffic are blocked, not forwarded.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. vtp 4. end 5. show running-config interface interface-id 6. show vtp status

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Identifies an interface, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2134

VLAN

Adding a VTP Client Switch to a VTP Domain (CLI)

Step 3

Command or Action vtp Example:
Switch(config)# vtp

Step 4

end Example:
Switch(config)# end

Step 5

show running-config interface interface-id Example:
Switch# show running-config interface gigabitethernet1/0/1

Step 6

show vtp status Example:
Switch# show vtp status

Purpose Enables VTP on the specified port. Returns to privileged EXEC mode. Verifies the change to the port.
Verifies the configuration.

Related Topics VTP Settings, on page 2125

Adding a VTP Client Switch to a VTP Domain (CLI)
Follow these steps to verify and reset the VTP configuration revision number on a switch before adding it to a VTP domain.

Before you begin
Before adding a VTP client to a VTP domain, always verify that its VTP configuration revision number is lower than the configuration revision number of the other switches in the VTP domain. Switches in a VTP domain always use the VLAN configuration of the switch with the highest VTP configuration revision number. With VTP versions 1 and 2, adding a switch that has a revision number higher than the revision number in the VTP domain can erase all VLAN information from the VTP server and VTP domain. With VTP version 3, the VLAN information is not erased.
You can use the vtp mode transparent global configuration command to disable VTP on the switch and then to change its VLAN information without affecting the other switches in the VTP domain.

SUMMARY STEPS

1. show vtp status 2. configure terminal

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2135

Adding a VTP Client Switch to a VTP Domain (CLI)

3. vtp domain domain-name 4. end 5. show vtp status 6. configure terminal 7. vtp domain domain-name 8. end 9. show vtp status

DETAILED STEPS

Step 1

Command or Action show vtp status Example:

Switch# show vtp status

Step 2

configure terminal Example:
Switch# configure terminal

Step 3

vtp domain domain-name Example:
Switch(config)# vtp domain domain123

Step 4

end Example:
Switch(config)# end

Step 5

show vtp status Example:
Switch# show vtp status

Step 6

configure terminal Example:

VLAN
Purpose Checks the VTP configuration revision number. If the number is 0, add the switch to the VTP domain. If the number is greater than 0, follow these substeps:
· Write down the domain name. · Write down the configuration revision number. · Continue with the next steps to reset the switch
configuration revision number. Enters the global configuration mode.
Changes the domain name from the original one displayed in Step 1 to a new name.
Returns to privileged EXEC mode. The VLAN information on the switch is updated and the configuration revision number is reset to 0.
Verifies that the configuration revision number has been reset to 0.
Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2136

VLAN

Monitoring VTP

Command or Action
Switch# configure terminal

Step 7

vtp domain domain-name Example:
Switch(config)# vtp domain domain012

Step 8

end Example:
Switch(config)# end

Step 9

show vtp status Example:
Switch# show vtp status

Purpose
Enters the original domain name on the switch
Returns to privileged EXEC mode. The VLAN information on the switch is updated.
(Optional) Verifies that the domain name is the same as in Step 1 and that the configuration revision number is 0.

Related Topics VTP Domain, on page 2119 Prerequisites for VTP, on page 2117 Domain Names for Configuring VTP, on page 2125

Monitoring VTP

This section describes commands used to display and monitor the VTP configuration.
You monitor VTP by displaying VTP configuration information: the domain name, the current VTP revision, and the number of VLANs. You can also display statistics about the advertisements sent and received by the switch.
Table 194: VTP Monitoring Commands

Command show vtp counters
show vtp devices [conflict]

Purpose
Displays counters about VTP messages that have been sent and received.
Displays information about all VTP version 3 devices in the domain. Conflicts are VTP version 3 devices with conflicting primary servers. The show vtp devices command does not display information when the switch is in transparent or off mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2137

Configuration Examples for VTP

VLAN

Command show vtp interface [interface-id] show vtp password
show vtp status

Purpose
Displays VTP status and configuration for all interfaces or the specified interface.
Displays the VTP password. The form of the password displayed depends on whether or not the hidden keyword was entered and if encryption is enabled on the switch.
Displays the VTP switch configuration information.

Configuration Examples for VTP

Example: Configuring a Switch as the Primary Server
This example shows how to configure a switch as the primary server for the VLAN database (the default) when a hidden or secret password was configured:

Switch# vtp primary vlan Enter VTP password: mypassword This switch is becoming Primary server for vlan feature in the VTP domain

VTP Database Conf Switch ID

Primary Server Revision System Name

------------ ---- -------------- -------------- -------- --------------------

VLANDB

Yes 00d0.00b8.1400=00d0.00b8.1400 1

stp7

Do you want to continue (y/n) [n]? y

Related Topics Configuring a VTP Version 3 Password (CLI), on page 2129 Passwords for the VTP Domain, on page 2126

Where to Go Next
After configuring VTP, you can configure the following: · VLANs · VLAN groups · VLAN trunking · Voice VLANs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2138

VLAN

Additional References

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage information VLAN Command Reference (Catalyst 3650 Switches)

for the commands used in this chapter.

Layer 2/3 Command Reference (Catalyst 3650 Switches)

Additional configuration commands and procedures.

LAN Switching Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
Layer 2/3 Configuration Guide (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2139

Feature History and Information for VTP

VLAN

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for VTP
Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2140

1 1 0 C H A P T E R
Configuring VLANs
· Finding Feature Information, on page 2141 · Prerequisites for VLANs, on page 2141 · Restrictions for VLANs, on page 2142 · Information About VLANs, on page 2142 · How to Configure VLANs, on page 2147 · Monitoring VLANs, on page 2158 · Where to Go Next, on page 2158 · Additional References, on page 2159 · Feature History and Information for VLANs, on page 2160
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for VLANs
The following are prerequisites and considerations for configuring VLANs: · Before you create VLANs, you must decide whether to use VLAN Trunking Protocol (VTP) to maintain global VLAN configuration for your network. · If you plan to configure many VLANs on the switch and to not enable routing, you can set the Switch Database Management (SDM) feature to the VLAN template, which configures system resources to support the maximum number of unicast MAC addresses. · Switches running the LAN Base feature set support only static routing on SVIs. · A VLAN should be present in the switch to be able to add it to the VLAN group.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2141

Restrictions for VLANs

VLAN

Restrictions for VLANs
The following are restrictions for VLANs: · The switch supports per-VLAN spanning-tree plus (PVST+) or rapid PVST+ with a maximum of 128 spanning-tree instances. One spanning-tree instance is allowed per VLAN.
· The switch supports IEEE 802.1Q trunking methods for sending VLAN traffic over Ethernet ports.
· Configuring an interface VLAN router's MAC address is not supported. The interface VLAN already has an MAC address assigned by default.
· Private VLANs are not supported on the switch.
· You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.
Information About VLANs
Logical Networks
A VLAN is a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment. Any switch port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to end stations in the VLAN. Each VLAN is considered a logical network, and packets destined for stations that do not belong to the VLAN must be forwarded through a router or a switch supporting fallback bridging. In a switch stack, VLANs can be formed with ports across the stack. Because a VLAN is considered a separate logical network, it contains its own bridge Management Information Base (MIB) information and can support its own implementation of spanning tree.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2142

VLAN

Figure 101: VLANs as Logically Defined Networks

Supported VLANs

VLANs are often associated with IP subnetworks. For example, all the end stations in a particular IP subnet belong to the same VLAN. Interface VLAN membership on the switch is assigned manually on an interface-by-interface basis. When you assign switch interfaces to VLANs by using this method, it is known as interface-based, or static, VLAN membership. Traffic between VLANs must be routed. The switch can route traffic between VLANs by using switch virtual interfaces (SVIs). An SVI must be explicitly configured and assigned an IP address to route traffic between VLANs.
Supported VLANs
The switch supports VLANs in VTP client, server, and transparent modes. VLANs are identified by a number from 1 to 4094. VLAN 1 is the default VLAN and is created during system initialization. VLAN IDs 1002 through 1005 are reserved for Token Ring and FDDI VLANs. All of the VLANs except 1002 to 1005 are available for user configuration. There are 3 VTP versions: VTP version 1, version 2, and version 3. All VTP versions support both normal and extended range VLANs, but only with VTP version 3, does the switch propagate extended range VLAN configuration information. When extended range VLANs are created in VTP versions 1 and 2, their configuration information is not propagated. Even the local VTP database entries on the switch are not updated, but the extended range VLANs configuration information is created and stored in the running configuration file. You can configure up to 4094 VLANs on the switch. Related Topics
Creating or Modifying an Ethernet VLAN (CLI), on page 2147 Deleting a VLAN (CLI), on page 2150
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2143

VLAN Port Membership Modes

VLAN

Assigning Static-Access Ports to a VLAN (CLI), on page 2151 Monitoring VLANs, on page 2158 Creating an Extended-Range VLAN (CLI), on page 2153 Creating an Extended-Range VLAN with an Internal VLAN ID

VLAN Port Membership Modes
You configure a port to belong to a VLAN by assigning a membership mode that specifies the kind of traffic the port carries and the number of VLANs to which it can belong. When a port belongs to a VLAN, the switch learns and manages the addresses associated with the port on a per-VLAN basis.
Table 195: Port Membership Modes and Characteristics

Membership Mode Static-access
Trunk (IEEE 802.1Q) : · IEEE 802.1Q-- Industry-standard trunking encapsulation.
Voice VLAN

VLAN Membership Characteristics VTP Characteristics

A static-access port can belong to one VLAN and is manually assigned to that VLAN.

VTP is not required. If you do not want VTP to globally propagate information, set the VTP mode to transparent. To participate in VTP, there must be at least one trunk port on the switch or the switch stack connected to a trunk port of a second switch or switch stack.

A trunk port is a member of all VTP is recommended but not

VLANs by default, including

required. VTP maintains VLAN

extended-range VLANs, but

configuration consistency by

membership can be limited by managing the addition, deletion,

configuring the allowed-VLAN list. and renaming of VLANs on a

You can also modify the

network-wide basis. VTP

pruning-eligible list to block

exchanges VLAN configuration

flooded traffic to VLANs on trunk messages with other switches over

ports that are included in the list. trunk links.

A voice VLAN port is an access VTP is not required; it has no effect port attached to a Cisco IP Phone, on a voice VLAN. configured to use one VLAN for voice traffic and another VLAN for data traffic from a device attached to the phone.

Related Topics Assigning Static-Access Ports to a VLAN (CLI), on page 2151 Monitoring VLANs, on page 2158

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2144

VLAN

VLAN Configuration Files

VLAN Configuration Files
Configurations for VLAN IDs 1 to 1005 are written to the vlan.dat file (VLAN database), and you can display them by entering the show vlan privileged EXEC command. The vlan.dat file is stored in flash memory. If the VTP mode is transparent, they are also saved in the switch running configuration file.
In a switch stack, the whole stack uses the same vlan.dat file and running configuration. On some switches, the vlan.dat file is stored in flash memory on the active switch.
You use the interface configuration mode to define the port membership mode and to add and remove ports from VLANs. The results of these commands are written to the running-configuration file, and you can display the file by entering the show running-config privileged EXEC command.
When you save VLAN and VTP information (including extended-range VLAN configuration information) in the startup configuration file and reboot the switch, the switch configuration is selected as follows:
· If the VTP mode is transparent in the startup configuration, and the VLAN database and the VTP domain name from the VLAN database matches that in the startup configuration file, the VLAN database is ignored (cleared), and the VTP and VLAN configurations in the startup configuration file are used. The VLAN database revision number remains unchanged in the VLAN database.
· If the VTP mode or domain name in the startup configuration does not match the VLAN database, the domain name and VTP mode and configuration for the VLAN IDs 1 to 1005 use the VLAN database information.
· In VTP versions 1 and 2, if VTP mode is server, the domain name and VLAN configuration for VLAN IDs 1 to 1005 use the VLAN database information. VTP version 3 also supports VLANs 1006 to 4094.
Normal-Range VLAN Configuration Guidelines
Normal-range VLANs are VLANs with IDs from 1 to 1005.
Follow these guidelines when creating and modifying normal-range VLANs in your network:
· Normal-range VLANs are identified with a number between 1 and 1001. VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs.
· VLAN configurations for VLANs 1 to 1005 are always saved in the VLAN database. If the VTP mode is transparent, VTP and VLAN configurations are also saved in the switch running configuration file.
· If the switch is in VTP server or VTP transparent mode, you can add, modify or remove configurations for VLANs 2 to 1001 in the VLAN database. (VLAN IDs 1 and 1002 to 1005 are automatically created and cannot be removed.)
· Extended-range VLANs created in VTP transparent mode are not saved in the VLAN database and are not propagated. VTP version 3 supports extended range VLAN (VLANs 1006 to 4094) database propagation in VTP server mode.
· Before you can create a VLAN, the switch must be in VTP server mode or VTP transparent mode. If the switch is a VTP server, you must define a VTP domain or VTP will not function.
· The switch does not support Token Ring or FDDI media. The switch does not forward FDDI, FDDI-Net, TrCRF, or TrBRF traffic, but it does propagate the VLAN configuration through VTP.
· The switch supports 128 spanning tree instances. If a switch has more active VLANs than supported spanning-tree instances, spanning tree can be enabled on 128 VLANs and is disabled on the remaining

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2145

Extended-Range VLAN Configuration Guidelines

VLAN

VLANs. If you have already used all available spanning-tree instances on a switch, adding another VLAN anywhere in the VTP domain creates a VLAN on that switch that is not running spanning-tree. If you have the default allowed list on the trunk ports of that switch (which is to allow all VLANs), the new VLAN is carried on all trunk ports. Depending on the topology of the network, this could create a loop in the new VLAN that would not be broken, particularly if there are several adjacent switches that all have run out of spanning-tree instances. You can prevent this possibility by setting allowed lists on the trunk ports of switches that have used up their allocation of spanning-tree instances.
If the number of VLANs on the switch exceeds the number of supported spanning-tree instances, we recommend that you configure the IEEE 802.1s Multiple STP (MSTP) on your switch to map multiple VLANs to a single spanning-tree instance.
· When a switch in a stack learns a new VLAN or deletes or modifies an existing VLAN (either through VTP over network ports or through the CLI), the VLAN information is communicated to all stack members.
· When a switch joins a stack or when stacks merge, VTP information (the vlan.dat file) on the new switches will be consistent with the active switch.
Related Topics Creating or Modifying an Ethernet VLAN (CLI), on page 2147 Deleting a VLAN (CLI), on page 2150 Assigning Static-Access Ports to a VLAN (CLI), on page 2151 Monitoring VLANs, on page 2158
Extended-Range VLAN Configuration Guidelines
Extended-range VLANs are VLANs with IDs from 1006 to 4094.
Follow these guidelines when creating extended-range VLANs:
· VLAN IDs in the extended range are not saved in the VLAN database and are not recognized by VTP unless the switch is running VTP version 3.
· You cannot include extended-range VLANs in the pruning eligible range.
· For VTP version 1 or 2, you can set the VTP mode to transparent in global configuration mode. You should save this configuration to the startup configuration so that the switch boots up in VTP transparent mode. Otherwise, you lose the extended-range VLAN configuration if the switch resets. If you create extended-range VLANs in VTP version 3, you cannot convert to VTP version 1 or 2.
· . When the maximum number of spanning-tree instances are on the switch, spanning tree is disabled on any newly created VLANs. If the number of VLANs on the switch exceeds the maximum number of spanning-tree instances, we recommend that you configure the IEEE 802.1s Multiple STP (MSTP) on your switch to map multiple VLANs to a single spanning-tree instance.
· In a switch stack, the whole stack uses the same running configuration and saved configuration, and extended-range VLAN information is shared across the stack.
Related Topics Creating an Extended-Range VLAN (CLI), on page 2153 Creating an Extended-Range VLAN with an Internal VLAN ID Monitoring VLANs, on page 2158

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2146

VLAN

How to Configure VLANs

How to Configure VLANs
How to Configure Normal-Range VLANs
You can set these parameters when you create a new normal-range VLAN or modify an existing VLAN in the VLAN database:
· VLAN ID · VLAN name · VLAN type
· Ethernet · Fiber Distributed Data Interface [FDDI] · FDDI network entity title [NET] · TrBRF or TrCRF · Token Ring · Token Ring-Net
· VLAN state (active or suspended) · Maximum transmission unit (MTU) for the VLAN · Security Association Identifier (SAID) · Bridge identification number for TrBRF VLANs · Ring number for FDDI and TrCRF VLANs · Parent VLAN number for TrCRF VLANs · Spanning Tree Protocol (STP) type for TrCRF VLANs · VLAN number to use when translating from one VLAN type to another
You can cause inconsistency in the VLAN database if you attempt to manually delete the vlan.dat file. If you want to modify the VLAN configuration, follow the procedures in this section.
Creating or Modifying an Ethernet VLAN (CLI)
Before you begin With VTP version 1 and 2, if the switch is in VTP transparent mode, you can assign VLAN IDs greater than 1006, but they are not added to the VLAN database. The switch supports only Ethernet interfaces. Because FDDI and Token Ring VLANs are not locally supported, you only configure FDDI and Token Ring media-specific characteristics for VTP global advertisements to other switches.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2147

Creating or Modifying an Ethernet VLAN (CLI)

VLAN

Although the switch does not support Token Ring connections, a remote device with Token Ring connections could be managed from one of the supported switches. Switches running VTP Version 2 advertise information about these Token Ring VLANs:
· Token Ring TrBRF VLANs
· Token Ring TrCRF VLANs

SUMMARY STEPS

1. configure terminal 2. vlan vlan-id 3. name vlan-name 4. media { ethernet | fd-net | fddi | tokenring | trn-net } 5. remote-span 6. end 7. show vlan {name vlan-name | id vlan-id}

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

vlan vlan-id Example:
Switch(config)# vlan 20

Step 3

name vlan-name Example:

Enters a VLAN ID, and enters VLAN configuration mode. Enter a new VLAN ID to create a VLAN, or enter an existing VLAN ID to modify that VLAN. Note The available VLAN ID range for this command
is 1 to 4094.
Additional vlan command options include: · access-map--Creates VLAN access-maps or enters the vlan access map command mode.
· configuration--Enters the vlan feature configuration mode.
· dot1q--Configures VLAN dot1q tag native parameters.
· filter--Applies a VLAN filter map to a VLAN list.
· group--Creates a VLAN group.
(Optional) Enters a name for the VLAN. If no name is entered for the VLAN, the default is to append the vlan-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2148

VLAN

Creating or Modifying an Ethernet VLAN (CLI)

Step 4

Command or Action
Switch(config-vlan)# name test20

Purpose value with leading zeros to the word VLAN. For example, VLAN0004 is a default VLAN name for VLAN 4. The following additional VLAN configuration command options are available:
· are--Sets the maximum number of All Router Explorer (ARE) hops for the VLAN.
· backupcrf--Enables or disables the backup concentrator relay function (CRF) mode for the VLAN.
· bridge--Sets the value of the bridge number for the FDDI net or Token Ring net type VLANs.
· exit--Applies changes, bumps the revision number, and exits.
· media--Sets the media type of the VLAN.
· no--Negates the command or default.
· parent--Sets the value of the ID for the parent VLAN for FDDI or Token Ring type VLANs.
· remote-span--Configures a remote SPAN VLAN.
· ring--Sets the ring number value for FDDI or Token Ring type VLANs.
· said--Sets the IEEE 802.10 SAID value.
· shutdown--Shuts down the VLAN switching.
· state--Sets the operational VLAN state to active or suspended.
· ste--Sets the maximum number of Spanning Tree Explorer (STE) hops for the VLAN.
· stp--Sets the Spanning Tree characteristics of the VLAN.

media { ethernet | fd-net | fddi | tokenring | trn-net } Example:
Switch(config-vlan)# media ethernet

Configures the VLAN media type. Command options include:
· ethernet--Sets the VLAN media type as Ethernet.
· fd-net--Sets the VLAN media type as FDDI net.
· fddi--Sets the VLAN media type as FDDI.
· tokenring--Sets the VLAN media type as Token Ring.
· trn-net--Sets the VLAN media type as Token Ring net.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2149

Deleting a VLAN (CLI)

VLAN

Step 5

Command or Action remote-span Example:
Switch(config-vlan)# remote-span

Step 6

end Example:
Switch(config)# end

Step 7

show vlan {name vlan-name | id vlan-id} Example:
Switch# show vlan name test20 id 20

Purpose (Optional) Configures the VLAN as the RSPAN VLAN for a remote SPAN session. For more information on remote SPAN, see the Catalyst 3650 Network Management Configuration Guide.
Returns to privileged EXEC mode.
Verifies your entries.

Related Topics Supported VLANs, on page 2143 Normal-Range VLAN Configuration Guidelines, on page 2145 Monitoring VLANs, on page 2158
Deleting a VLAN (CLI)
When you delete a VLAN from a switch that is in VTP server mode, the VLAN is removed from the VLAN database for all switches in the VTP domain. When you delete a VLAN from a switch that is in VTP transparent mode, the VLAN is deleted only on that specific switch or a switch stack.
You cannot delete the default VLANs for the different media types: Ethernet VLAN 1 and FDDI or Token Ring VLANs 1002 to 1005.

Caution When you delete a VLAN, any ports assigned to that VLAN become inactive. They remain associated with the VLAN (and thus inactive) until you assign them to a new VLAN.

SUMMARY STEPS

1. configure terminal 2. no vlan vlan-id 3. end 4. show vlan brief

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2150

VLAN

Assigning Static-Access Ports to a VLAN (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Step 2

no vlan vlan-id Example:
Switch(config)# no vlan 4

Step 3

end Example:
Switch(config)# end

Step 4

show vlan brief Example:
Switch# show vlan brief

Purpose Enters the global configuration mode.
Removes the VLAN by entering the VLAN ID.
Returns to privileged EXEC mode.
Verifies the VLAN removal.

Related Topics Supported VLANs, on page 2143 Normal-Range VLAN Configuration Guidelines, on page 2145 Monitoring VLANs, on page 2158

Assigning Static-Access Ports to a VLAN (CLI)
You can assign a static-access port to a VLAN without having VTP globally propagate VLAN configuration information by disabling VTP (VTP transparent mode).
If you assign an interface to a VLAN that does not exist, the new VLAN is created.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode access 4. switchport access vlan vlan-id 5. end 6. show running-config interface interface-id 7. show interfaces interface-id switchport

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2151

Assigning Static-Access Ports to a VLAN (CLI)

VLAN

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode

Step 2

interface interface-id Example:

Enters the interface to be added to the VLAN.

Switch(config)# interface gigabitethernet2/0/1

Step 3

switchport mode access Example:
Switch(config-if)# switchport mode access

Defines the VLAN membership mode for the port (Layer 2 access port).

Step 4

switchport access vlan vlan-id Example:
Switch(config-if)# switchport access vlan 2

Assigns the port to a VLAN. Valid VLAN IDs are 1 to 4094.

Step 5

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 6

show running-config interface interface-id Example:
Switch# show running-config interface gigabitethernet2/0/1

Verifies the VLAN membership mode of the interface.

Step 7

show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet2/0/1 switchport

Verifies your entries in the Administrative Mode and the Access Mode VLAN fields of the display.

Related Topics Supported VLANs, on page 2143 Normal-Range VLAN Configuration Guidelines, on page 2145

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2152

VLAN

How to Configure Extended-Range VLANs

Monitoring VLANs, on page 2158 VLAN Port Membership Modes, on page 2144

How to Configure Extended-Range VLANs
Extended-range VLANs enable service providers to extend their infrastructure to a greater number of customers. The extended-range VLAN IDs are allowed for any switchport commands that allow VLAN IDs.
With VTP version 1 or 2, extended-range VLAN configurations are not stored in the VLAN database, but because VTP mode is transparent, they are stored in the switch running configuration file, and you can save the configuration in the startup configuration file. Extended-range VLANs created in VTP version 3 are stored in the VLAN database.
You can change only the MTU size and the remote SPAN configuration state on extended-range VLANs; all other characteristics must remain at the default state.
Creating an Extended-Range VLAN (CLI)

SUMMARY STEPS

1. configure terminal 2. vlan vlan-id 3. remote-span 4. exit 5. interface vlan 6. ip mtu mtu-size 7. end 8. show vlan id vlan-id 9. copy running-config startup config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

vlan vlan-id Example:
Switch(config)# vlan 2000 Switch(config-vlan)#

Enters an extended-range VLAN ID and enters VLAN configuration mode. The range is 1006 to 4094.

Step 3

remote-span Example:

(Optional) Configures the VLAN as the RSPAN VLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2153

Creating an Extended-Range VLAN (CLI)

VLAN

Command or Action
Switch(config-vlan)# remote-span

Step 4

exit Example:
Switch(config-vlan)# exit Switch(config)#

Step 5

interface vlan Example:
Switch(config)# interface vlan 200 Switch(config-if)#

Step 6

ip mtu mtu-size Example:
Switch(config-if)# ip mtu 1024 Switch(config-if)#

Step 7

end Example:
Switch(config)# end

Step 8

show vlan id vlan-id Example:
Switch# show vlan id 2000

Step 9

copy running-config startup config Example:
Switch# copy running-config startup-config

Purpose
Returns to configuration mode.
Enters the interface configuration mode for the selected VLAN.
(Optional) Modifies the VLAN by changing the MTU size. You can configure the MTU size between 68 to 1500 bytes. Note Although all VLAN commands appear in the
CLI help, only the ip mtu mtu-size and remote-span commands are supported for extended-range VLANs. Returns to privileged EXEC mode.
Verifies that the VLAN has been created.
Saves your entries in the switch startup configuration file. To save an extended-range VLAN configuration, you need to save the VTP transparent mode configuration and the extended-range VLAN configuration in the switch startup configuration file. Otherwise, if the switch resets, it will default to VTP server mode, and the extended-range VLAN IDs will not be saved. Note This step is not required for VTP version 3
because VLANs are saved in the VLAN database.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2154

VLAN

How to Configure VLANs (GUI)

Related Topics Supported VLANs, on page 2143 Extended-Range VLAN Configuration Guidelines, on page 2146 Monitoring VLANs, on page 2158
How to Configure VLANs (GUI)
Creating Layer2 VLAN (GUI)
To create a Layer2 VLAN using the switch web UI, you must follow the steps defined in this procedure.

Step 1

To create a Layer2 VLAN, choose Configuration > Controller > System > VLAN > Layer2 VLAN. The VLAN Layer2 page appears. You must provide values for all parameters listed in the Layer2 page.

Parameter VLAN ID Name State

Description VLAN tag identifier, or 0 for no VLAN tag. VLAN name. VLAN state. Values are the following:
· Active

· Suspended

Step 2 Click Apply.

Creating Layer3 Interface (GUI)
To create a Layer3 interface using the switch web UI, you must follow the steps defined in this procedure.

Step 1

To create a Layer3 interface, choose Configuration > Controller > System > VLAN > Layer3 Interface. The Layer3 interface page appears. You must provide values for all parameters listed in the window.

Parameter Description DHCP Relay Information IP Address Mask Address IPv6 Address IPv4 DHCP Server IPv6 DHCP Server

Description Description for the Layer3 interface. Information on controller built-in DHCP relay agents.
IP address/subnet mask of the VLAN SVI (Switch Virtual Interface). Mask address of the DHCP server. IPv6 address of the DHCP server. IPv4 address of the DHCP server. IPv6 address of the DHCP server.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2155

Viewing Layer2 VLAN (GUI)

VLAN

Step 2 Click Apply.

Viewing Layer2 VLAN (GUI)
You can view the details of the Layer2 VLANs configured in the switch interface using the web UI.

Step 1

Procedure

Command or Action

Purpose

Choose Configuration > Controller > System > VLAN The Layer2 VLAN page appears, listing the following

> Layer2 VLAN .

details of the Layer2 VLANs in the switch.

Parameter Description

VLAN ID Displays VLAN tag identifier.

Name VLAN name.

State

VLAN state. Values are as follows:

· Active · Suspended

MTU Maximum transmission unit.

Viewing Layer3 Interface (GUI)
You can view the details of the Layer3 interfaces configured in the switch interface using the web UI.

Choose Configuration > Controller > System > VLAN > Layer3 Interface . The Layer2 VLAN page appears, listing the following details of the Layer3 interfaces in the switch.

Parameter Interface Name Status

Description Layer3 interface name. Status of the Layer3 interface. Values are the following:
· Up

· Down

Protocol IP Address

Protocol used for Layer3 interface. IP address used for Layer3 security and mobility managers.

Removing Layer2 VLAN (GUI)
To remove a Layer2 VLANs using the switch web UI, you must:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2156

VLAN

Removing Layer3 Interface (GUI)

Step 1
Step 2 Step 3

Choose Configuration > Controller > System > VLAN > Layer2 VLAN . The Layer2 VLAN page appears, listing the following details of the Layer2 VLANs associated with the switch.

Parameter VLAN ID Name State

Description Displays VLAN tag identifier. VLAN name. VLAN state. Values are as follows:
· Active · Suspended

MTU

Maximum transmission unit.

Check the checkbox of the Layer2 VLAN you need to delete from the Layer2 VLANs displayed in the Layer2 VLAN list . You will receive a confirmation message confirming deletion of the selected Layer2 VLAN.
Click Ok.

Removing Layer3 Interface (GUI)
To remove a Layer3 interface using the switch web UI, you must:

Step 1
Step 2 Step 3

Choose Configuration > Controller > System > VLAN > Layer3 Interface. The Layer3 interface page appears, listing the following details of the Layer3 interfaces associated with the switch.

Parameter Interface Name Status

Description Layer3 interface name. Status of the Layer3 interface. Values are the following:
· Up

· Down

Protocol IP Address

Protocol used for Layer3 interface. IP address used for Layer3 security and mobility managers.

Check the checkbox of the Layer3 interfaces you need to delete from the Layer3 interfaces displayed in the Layer3 interfaces. You will receive a confirmation message confirming deletion of the selected Layer3 interface.
Click Ok.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2157

Monitoring VLANs

VLAN

Monitoring VLANs

Table 196: Privileged EXEC show Commands

Command

Purpose

show interfaces [vlan vlan-id]

Displays characteristics for all interfaces or for the specified VLAN configured on the switch .

show vlan [ access-map name | brief Displays parameters for all VLANs or the specified VLAN on the

| dot1q { tag native } | filter [

switch. The following command options are available:

access-map | vlan ] | group [ group-name name ] | id vlan-id |

· access-map--Displays the VLAN access-maps.

ifindex | mtu | name name |

· brief--Displays VTP VLAN status in brief.

remote-span | summary ]

· dot1q--Displays the dot1q parameters.

· filter--Displays VLAN filter information.

· group--Displays the VLAN group with its name and the connected VLANs that are available.

· id--Displays VTP VLAN status by identification number.

· ifindex--Displays SNMP ifIndex.

· mtu--Displays VLAN MTU information.

· name--Displays the VTP VLAN information by specified name.

· remote-span­Displays the remote SPAN VLANs.

· summary--Displays a summary of VLAN information.

Related Topics Supported VLANs, on page 2143 Normal-Range VLAN Configuration Guidelines, on page 2145 Creating or Modifying an Ethernet VLAN (CLI), on page 2147 Deleting a VLAN (CLI), on page 2150 Assigning Static-Access Ports to a VLAN (CLI), on page 2151 Extended-Range VLAN Configuration Guidelines, on page 2146 Creating an Extended-Range VLAN (CLI), on page 2153 Creating an Extended-Range VLAN with an Internal VLAN ID VLAN Port Membership Modes, on page 2144

Where to Go Next
After configuring VLANs, you can configure the following: · VLAN groups

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2158

VLAN

Additional References

· VLAN Trunking Protocol (VTP) · VLAN trunks · Voice VLANs

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage VLAN Command Reference (Catalyst 3650 Switches)

information for the commands used in this chapter.

Layer 2/3 Command Reference (Catalyst 3650 Switches)

VLAN access-maps

Security Configuration Guide (Catalyst 3650 Switches) Security Command Reference (Catalyst 3650 Switches)

VLAN and Mobility Agents

Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Cisco Flexible NetFlow

Cisco Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
Flexible Netflow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

IGMP Snooping

IP Multicast Routing Command Reference (Catalyst 3650 Switches) IP Multicast Routing Configuration Guide (Catalyst 3650 Switches)

IPv6

IPv6 Configuration Guide (Catalyst 3650 Switches)

IPv6 Command Reference (Catalyst 3650 Switches)

SPAN

Network Management Command Reference (Catalyst 3650 Switches) Network Management Configuration Guide (Catalyst 3650 Switches)

Platform-independent configuration Identity Based Networking Services Configuration Guide, Cisco IOS

information

XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2159

Feature History and Information for VLANs

VLAN

Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for VLANs
Release Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE

Modification This feature was introduced. VLAN GUI support.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2160

1 1 1 C H A P T E R
Configuring VLAN Groups
· Finding Feature Information, on page 2161 · Prerequisites for VLAN Groups, on page 2161 · Restrictions for VLAN Groups, on page 2161 · Information About VLAN Groups, on page 2162 · How to Configure VLAN Groups, on page 2162 · Where to Go Next, on page 2166 · Additional References, on page 2166 · Feature History and Information for VLAN Groups, on page 2167
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for VLAN Groups
A VLAN should be present in the switch to be able to add it to the VLAN group.
Restrictions for VLAN Groups
The number of VLANs mapped to a VLAN group is not limited by Cisco IOS Software Release. But if the number of VLANs in a VLAN group exceed the recommended value of 32, the mobility behavior is unexpected and in the VLAN group, L2 multicast breaks for some VLANs. So it is the responsibility of the administrator to configure feasible number of VLANs in a VLAN group. When a VLAN is added to a VLAN group mapped to a WLAN which already has 32 VLANs, a warning is generated. But when a new VLAN group is mapped to a WLAN with more than 32 VLANs, an error is generated. For expected behavior of the VLAN group, the VLANs mapped in the group must be present in the switch. The static IP client behavior is not supported.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2161

Information About VLAN Groups

VLAN

Information About VLAN Groups
Whenever a wireless client connects to a wireless network (WLAN), the client is placed in a VLAN that is associated with the WLAN. In a large venue such as an auditorium, a stadium, or a conference room where there are numerous wireless clients, having only a single WLAN to accommodate many clients might be a challenge.
The VLAN group feature uses a single WLAN that can support multiple VLANs. The clients can get assigned to one of the configured VLANs. This feature maps a WLAN to a single VLAN or multiple VLANs using the VLAN groups. When a wireless client associates to the WLAN, the VLAN is derived by an algorithm based on the MAC address of the wireless client. A VLAN is assigned to the client and the client gets the IP address from the assigned VLAN. This feature also extends the current AP group architecture and AAA override architecture, where the AP groups and AAA override can override a VLAN or a VLAN group to which the WLAN is mapped.
Related Topics Creating VLAN Groups (CLI), on page 2162

How to Configure VLAN Groups

Creating VLAN Groups (CLI)

SUMMARY STEPS

1. configure terminal 2. vlan group WORD vlan-list vlan-ID 3. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global command mode.

Step 2

vlan group WORD vlan-list vlan-ID

Creates a VLAN group with the given group name

Example:

(vlangrp1) and adds all the VLANs listed in the command. The VLAN list ranges from 1 to 4096 and the recommended

Switch(config)#vlan group vlangrp1 vlan-list 91-95 number of VLANs in a group is 32.

Step 3

end Example:
Switch(config)#end

Exits the global configuration mode and returns to privileged EXEC mode. Alternatively, press CTRL-Z to exit the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2162

VLAN

Removing VLAN Group (CLI)

Related Topics Information About VLAN Groups, on page 2162

Removing VLAN Group (CLI)

SUMMARY STEPS

1. configure terminal 2. vlan group WORD vlan-list vlan-ID 3. no vlan group WORD vlan-list vlan-ID 4. end

DETAILED STEPS

Step 1 Step 2 Step 3 Step 4

configure terminal Example:
Switch# configure terminal
Enters global command mode.
vlan group WORD vlan-list vlan-ID Example:
Switch(config)#vlan group vlangrp1 vlan-list 91-95
Creates a VLAN group with the given group name (vlangrp1) and adds all the VLANs listed in the command. The VLAN list ranges from 1 to 4096 and the recommended number of VLANs in a group is 32.
no vlan group WORD vlan-list vlan-ID Example:
Switch(config)#no vlan group vlangrp1 vlan-list 91-95
Removes the VLAN group with the given group name (vlangrp1).
end Example:
Switch(config)#end
Exits the global configuration mode and returns to privileged EXEC mode. Alternatively, press CTRL-Z to exit the global configuration mode.

Creating VLAN Groups (GUI)
To create a VLAN group using the switch web UI, you must:
Step 1 Choose Configuration > Controller > System > VLAN > VLAN Group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2163

Adding a VLAN Group to WLAN (CLI)

VLAN

Step 2

The VLAN Group page appears. You must provide values for all parameters listed in the VLAN Group window.

Parameter VLAN Group Name VLAN List

Description Group name for the VLANs. The VLAN list to configure the mesh access point (MAP) access port.

Click Apply.

Adding a VLAN Group to WLAN (CLI)

SUMMARY STEPS

1. configure terminal 2. wlan WORD number 3. client vlan WORD 4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan WORD number Example:
Switch(config)#wlan wlanname 512

Step 3

client vlan WORD Example:
Switch(config-wlan)#client vlan vlangrp1

Step 4

end Example:
Switch(config-wlan)#end

Purpose Enters global command mode.
Enables the WLAN to map a VLAN group using an identifier. The WLAN identifier values range from 1 to 512.
Maps the VLAN group to the WLAN by entering the VLAN identifier, VLAN group, or the VLAN name.
Exits the global configuration mode and returns to privileged EXEC mode . Alternatively, press CTRL-Z to exit the global configuration mode.

Adding a VLAN Group to WLAN (GUI)
To add a VLAN group to WLAN using the switch web UI, you must follow the steps defined in this procedure.

Step 1

To add a VLAN group to a WLAN, choose Configuration > Wireless > WLANs > WLAN Profile > General. The general parameter page of the WLAN group appears.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2164

VLAN

Removing VLAN Groups (GUI)

Step 2 Step 3

Select the VLAN group values listed in the Interface/Interface Group drop-down list to associate the selected WLAN profile to a VLAN group.
Click Apply.

Removing VLAN Groups (GUI)
To remove a VLAN groups using the switch web UI, you must:

Step 1
Step 2 Step 3

Choose Configuration > Controller > System > VLAN > VLAN Group. The VLAN Group page appears, listing the following details of the VLAN groups associated with the switch.

Parameter

Description

VLAN Group Name Group name for the VLANs.

VLAN List

The VLAN list to configure the mesh access point (MAP) access port.

Check the checkbox of the VLAN group you need to delete from the VLAN group names displayed in the VLAN group list . You will receive a confirmation message confirming deletion of the selected VLAN group.
Click Ok.

Viewing VLANs in VLAN Groups (CLI)
Commands
show vlan group
show vlan group group-name <group_name> show wireless vlan group <group_name>

Description Displays the list of VLAN groups with its name and the VLANs that are available. Displays the specified VLAN group details. Displays the specified wireless VLAN group details.

Viewing VLAN Groups (GUI)
To view a VLAN groups using the switch web UI, you must:

Step 1

Choose Configuration > Controller > System > VLAN > VLAN Group. The VLAN Group page appears, listing the following details of the VLAN groups associated with the switch.

Parameter

Description

VLAN Group Name Group name for the VLANs.

VLAN List

The VLAN list to configure the mesh access point (MAP) access port.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2165

Where to Go Next

VLAN

Step 2 Click Apply.

Where to Go Next
After configuring VLAN groups, you can configure the following: · VLANs · VLAN Trunking Protocol (VTP) · VLAN trunks · Voice VLANs

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage VLAN Command Reference (Catalyst 3650 Switches)

information for the commands used in this chapter.

Layer 2/3 Command Reference (Catalyst 3650 Switches)

VLAN access-maps

Security Configuration Guide (Catalyst 3650 Switches) Security Command Reference (Catalyst 3650 Switches)

VLAN and Mobility Agents

Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Cisco Flexible NetFlow

Cisco Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
Flexible Netflow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

IGMP Snooping

IP Multicast Routing Command Reference (Catalyst 3650 Switches) IP Multicast Routing Configuration Guide (Catalyst 3650 Switches)

IPv6

IPv6 Configuration Guide (Catalyst 3650 Switches)

IPv6 Command Reference (Catalyst 3650 Switches)

SPAN

Network Management Command Reference (Catalyst 3650 Switches) Network Management Configuration Guide (Catalyst 3650 Switches)

Platform-independent configuration Identity Based Networking Services Configuration Guide, Cisco IOS

information

XE Release 3SE (Catalyst 3650 Switches)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2166

VLAN

Feature History and Information for VLAN Groups

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for VLAN Groups

Release Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE

Modification This feature was introduced. VLAN GUI support.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2167

Feature History and Information for VLAN Groups

VLAN

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2168

1 1 2 C H A P T E R
Configuring VLAN Trunks
· Finding Feature Information, on page 2169 · Prerequisites for VLAN Trunks, on page 2169 · Restrictions for VLAN Trunks, on page 2170 · Information About VLAN Trunks, on page 2170 · How to Configure VLAN Trunks, on page 2174 · Where to Go Next, on page 2187 · Additional References, on page 2187 · Feature History and Information for VLAN Trunks, on page 2188
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for VLAN Trunks
The IEEE 802.1Q trunks impose these limitations on the trunking strategy for a network: · In a network of Cisco switches connected through IEEE 802.1Q trunks, the switches maintain one spanning-tree instance for each VLAN allowed on the trunks. Non-Cisco devices might support one spanning-tree instance for all VLANs. When you connect a Cisco switch to a non-Cisco device through an IEEE 802.1Q trunk, the Cisco switch combines the spanning-tree instance of the VLAN of the trunk with the spanning-tree instance of the non-Cisco IEEE 802.1Q switch. However, spanning-tree information for each VLAN is maintained by Cisco switches separated by a cloud of non-Cisco IEEE 802.1Q switches. The non-Cisco IEEE 802.1Q cloud separating the Cisco switches is treated as a single trunk link between the switches. · Make sure the native VLAN for an IEEE 802.1Q trunk is the same on both ends of the trunk link. If the native VLAN on one end of the trunk is different from the native VLAN on the other end, spanning-tree loops might result.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2169

Restrictions for VLAN Trunks

VLAN

· Disabling spanning tree on the native VLAN of an IEEE 802.1Q trunk without disabling spanning tree on every VLAN in the network can potentially cause spanning-tree loops. We recommend that you leave spanning tree enabled on the native VLAN of an IEEE 802.1Q trunk or disable spanning tree on every VLAN in the network. Make sure your network is loop-free before disabling spanning tree.
Restrictions for VLAN Trunks
The following are restrictions for VLAN trunks: · Dynamic Trunking Protocol (DTP) is not supported on tunnel ports. · The switch does not support Layer 3 trunks; you cannot configure subinterfaces or use the encapsulation keyword on Layer 3 interfaces. The switch does support Layer 2 trunks and Layer 3 VLAN interfaces, which provide equivalent capabilities. · You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.
Information About VLAN Trunks
Trunking Overview
A trunk is a point-to-point link between one or more Ethernet switch interfaces and another networking device such as a router or a switch. Ethernet trunks carry the traffic of multiple VLANs over a single link, and you can extend the VLANs across an entire network. The following trunking encapsulations are available on all Ethernet interfaces:
· IEEE 802.1Q-- Industry-standard trunking encapsulation.
Trunking Modes
Ethernet trunk interfaces support different trunking modes. You can set an interface as trunking or nontrunking or to negotiate trunking with the neighboring interface. To autonegotiate trunking, the interfaces must be in the same VTP domain. Trunk negotiation is managed by the Dynamic Trunking Protocol (DTP), which is a Point-to-Point Protocol (PPP). However, some internetworking devices might forward DTP frames improperly, which could cause misconfigurations. Related Topics
Configuring a Trunk Port (CLI), on page 2174 Layer 2 Interface Modes, on page 2171

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2170

VLAN

Layer 2 Interface Modes

Layer 2 Interface Modes

Table 197: Layer 2 Interface Modes

Mode

Function

switchport mode access

Puts the interface (access port) into permanent nontrunking mode and negotiates to convert the link into a nontrunk link. The interface becomes a nontrunk interface regardless of whether or not the neighboring interface is a trunk interface.

switchport mode dynamic Makes the interface able to convert the link to a trunk link. The interface

auto

becomes a trunk interface if the neighboring interface is set to trunk or

desirable mode. The default switchport mode for all Ethernet interfaces is

dynamic auto.

switchport mode dynamic Makes the interface actively attempt to convert the link to a trunk link. The

desirable

interface becomes a trunk interface if the neighboring interface is set to trunk,

desirable, or auto mode.

switchport mode trunk

Puts the interface into permanent trunking mode and negotiates to convert the neighboring link into a trunk link. The interface becomes a trunk interface even if the neighboring interface is not a trunk interface.

switchport nonegotiate

Prevents the interface from generating DTP frames. You can use this command only when the interface switchport mode is access or trunk. You must manually configure the neighboring interface as a trunk interface to establish a trunk link.

Related Topics Configuring a Trunk Port (CLI), on page 2174 Trunking Modes, on page 2170

Allowed VLANs on a Trunk
By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to 4094, are allowed on each trunk. However, you can remove VLANs from the allowed list, preventing traffic from those VLANs from passing over the trunk.
To reduce the risk of spanning-tree loops or storms, you can disable VLAN 1 on any individual VLAN trunk port by removing VLAN 1 from the allowed list. When you remove VLAN 1 from a trunk port, the interface continues to send and receive management traffic, for example, Cisco Discovery Protocol (CDP), Port Aggregation Protocol (PAgP), Link Aggregation Control Protocol (LACP), DTP, and VTP in VLAN 1.
If a trunk port with VLAN 1 disabled is converted to a nontrunk port, it is added to the access VLAN. If the access VLAN is set to 1, the port will be added to VLAN 1, regardless of the switchport trunk allowed setting. The same is true for any VLAN that has been disabled on the port.
A trunk port can become a member of a VLAN if the VLAN is enabled, if VTP knows of the VLAN, and if the VLAN is in the allowed list for the port. When VTP detects a newly enabled VLAN and the VLAN is in the allowed list for a trunk port, the trunk port automatically becomes a member of the enabled VLAN. When

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2171

Load Sharing on Trunk Ports

VLAN

VTP detects a new VLAN and the VLAN is not in the allowed list for a trunk port, the trunk port does not become a member of the new VLAN. Related Topics
Defining the Allowed VLANs on a Trunk (CLI), on page 2176
Load Sharing on Trunk Ports
Load sharing divides the bandwidth supplied by parallel trunks connecting switches. To avoid loops, STP normally blocks all but one parallel link between switches. Using load sharing, you divide the traffic between the links according to which VLAN the traffic belongs. You configure load sharing on trunk ports by using STP port priorities or STP path costs. For load sharing using STP port priorities, both load-sharing links must be connected to the same switch. For load sharing using STP path costs, each load-sharing link can be connected to the same switch or to two different switches.
Network Load Sharing Using STP Priorities
When two ports on the same switch form a loop, the switch uses the STP port priority to decide which port is enabled and which port is in a blocking state. You can set the priorities on a parallel trunk port so that the port carries all the traffic for a given VLAN. The trunk port with the higher priority (lower values) for a VLAN is forwarding traffic for that VLAN. The trunk port with the lower priority (higher values) for the same VLAN remains in a blocking state for that VLAN. One trunk port sends or receives all traffic for the VLAN.
Figure 102: Load Sharing by Using STP Port Priorities
This figure shows two trunks connecting supported switches. · VLANs 8 through 10 are assigned a port priority of 16 on Trunk 1.
· VLANs 3 through 6 retain the default port priority of 128 on Trunk 1.
· VLANs 3 through 6 are assigned a port priority of 16 on Trunk 2.
· VLANs 8 through 10 retain the default port priority of 128 on Trunk 2.

Trunk 1 carries traffic for VLANs 8 through 10, and Trunk 2 carries traffic for VLANs 3 through 6. If the active trunk fails, the trunk with the lower priority takes over and carries the traffic for all of the VLANs. No duplication of traffic occurs over any trunk port. Related Topics
Configuring Load Sharing Using STP Port Priorities (CLI), on page 2180
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2172

VLAN

Network Load Sharing Using STP Path Cost

Network Load Sharing Using STP Path Cost
You can configure parallel trunks to share VLAN traffic by setting different path costs on a trunk and associating the path costs with different sets of VLANs, blocking different ports for different VLANs. The VLANs keep the traffic separate and maintain redundancy in the event of a lost link.
Figure 103: Load-Sharing Trunks with Traffic Distributed by Path Cost
Trunk ports 1 and 2 are configured as 100BASE-T ports. These VLAN path costs are assigned: · VLANs 2 through 4 are assigned a path cost of 30 on Trunk port 1. · VLANs 8 through 10 retain the default 100BASE-T path cost on Trunk port 1 of 19. · VLANs 8 through 10 are assigned a path cost of 30 on Trunk port 2. · VLANs 2 through 4 retain the default 100BASE-T path cost on Trunk port 2 of 19.

Related Topics Configuring Load Sharing Using STP Path Cost (CLI), on page 2184
Feature Interactions
Trunking interacts with other features in these ways: · A trunk port cannot be a secure port. · Trunk ports can be grouped into EtherChannel port groups, but all trunks in the group must have the same configuration. When a group is first created, all ports follow the parameters set for the first port to be added to the group. If you change the configuration of one of these parameters, the switch propagates the setting that you entered to all ports in the group: · Allowed-VLAN list. · STP port priority for each VLAN. · STP Port Fast setting. · Trunk status: If one port in a port group ceases to be a trunk, all ports cease to be trunks.
· We recommend that you configure no more than 24 trunk ports in Per VLAN Spanning Tree (PVST) mode and no more than 40 trunk ports in Multiple Spanning Tree (MST) mode.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2173

How to Configure VLAN Trunks

VLAN

· If you try to enable IEEE 802.1x on a trunk port, an error message appears, and IEEE 802.1x is not enabled. If you try to change the mode of an IEEE 802.1x-enabled port to trunk, the port mode is not changed.
· A port in dynamic mode can negotiate with its neighbor to become a trunk port. If you try to enable IEEE 802.1x on a dynamic port, an error message appears, and IEEE 802.1x is not enabled. If you try to change the mode of an IEEE 802.1x-enabled port to dynamic, the port mode is not changed.

How to Configure VLAN Trunks
To avoid trunking misconfigurations, configure interfaces connected to devices that do not support DTP to not forward DTP frames, that is, to turn off DTP.
· If you do not intend to trunk across those links, use the switchport mode access interface configuration command to disable trunking.
· To enable trunking to a device that does not support DTP, use the switchport mode trunk and switchport nonegotiate interface configuration commands to cause the interface to become a trunk but to not generate DTP frames.

Configuring an Ethernet Interface as a Trunk Port

Configuring a Trunk Port (CLI)
Because trunk ports send and receive VTP advertisements, to use VTP you must ensure that at least one trunk port is configured on the switch and that this trunk port is connected to the trunk port of a second switch. Otherwise, the switch cannot receive any VTP advertisements.

Before you begin
By default, an interface is in Layer 2 mode. The default mode for Layer 2 interfaces is switchport mode dynamic auto. If the neighboring interface supports trunking and is configured to allow trunking, the link is a Layer 2 trunk or, if the interface is in Layer 3 mode, it becomes a Layer 2 trunk when you enter the switchport interface configuration command.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode {dynamic {auto | desirable} | trunk} 4. switchport access vlan vlan-id 5. switchport trunk native vlan vlan-id 6. end 7. show interfaces interface-id switchport 8. show interfaces interface-id trunk 9. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2174

VLAN

Configuring a Trunk Port (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters the global configuration mode.

Step 2

interface interface-id Example:

Specifies the port to be configured for trunking, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2

Step 3 Step 4

switchport mode {dynamic {auto | desirable} | trunk} Configures the interface as a Layer 2 trunk (required only

Example:

if the interface is a Layer 2 access port or tunnel port or to specify the trunking mode).

Switch(config-if)# switchport mode dynamic desirable

· dynamic auto--Sets the interface to a trunk link if the neighboring interface is set to trunk or desirable mode. This is the default.

· dynamic desirable--Sets the interface to a trunk link if the neighboring interface is set to trunk, desirable, or auto mode.

· trunk--Sets the interface in permanent trunking mode and negotiate to convert the link to a trunk link even if the neighboring interface is not a trunk interface.

switchport access vlan vlan-id Example:

(Optional) Specifies the default VLAN, which is used if the interface stops trunking.

Switch(config-if)# switchport access vlan 200

Step 5

switchport trunk native vlan vlan-id Example:

Specifies the native VLAN for IEEE 802.1Q trunks.

Switch(config-if)# switchport trunk native vlan 200

Step 6

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2175

Defining the Allowed VLANs on a Trunk (CLI)

VLAN

Step 7

Command or Action show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet1/0/2 switchport

Purpose
Displays the switch port configuration of the interface in the Administrative Mode and the Administrative Trunking Encapsulation fields of the display.

Step 8

show interfaces interface-id trunk Example:

Displays the trunk configuration of the interface.

Switch# show interfaces gigabitethernet1/0/2 trunk

Step 9

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Related Topics Trunking Modes, on page 2170 Layer 2 Interface Modes, on page 2171
Defining the Allowed VLANs on a Trunk (CLI)
VLAN 1 is the default VLAN on all trunk ports in all Cisco switches, and it has previously been a requirement that VLAN 1 always be enabled on every trunk link. You can use the VLAN 1 minimization feature to disable VLAN 1 on any individual VLAN trunk link so that no user traffic (including spanning-tree advertisements) is sent or received on VLAN 1.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode trunk 4. switchport trunk allowed vlan { word | add | all | except | none | remove} vlan-list 5. end 6. show interfaces interface-id switchport 7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2176

VLAN

Defining the Allowed VLANs on a Trunk (CLI)

Command or Action
Switch# configure terminal

Purpose

Step 2

interface interface-id Example:

Specifies the port to be configured, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3

switchport mode trunk Example:
Switch(config-if)# switchport mode trunk

Configures the interface as a VLAN trunk port.

Step 4 Step 5

switchport trunk allowed vlan { word | add | all | except (Optional) Configures the list of VLANs allowed on the

| none | remove} vlan-list

trunk.

Example:
Switch(config-if)# switchport trunk allowed vlan remove 2

The vlan-list parameter is either a single VLAN number from 1 to 4094 or a range of VLANs described by two VLAN numbers, the lower one first, separated by a hyphen. Do not enter any spaces between comma-separated VLAN parameters or in hyphen-specified ranges.

All VLANs are allowed by default.

end Example:

Returns to privileged EXEC mode.

Switch(config)# end

Step 6

show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet1/0/1 switchport

Verifies your entries in the Trunking VLANs Enabled field of the display.

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Related Topics Allowed VLANs on a Trunk, on page 2171

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2177

Changing the Pruning-Eligible List (CLI)

VLAN

Changing the Pruning-Eligible List (CLI)
The pruning-eligible list applies only to trunk ports. Each trunk port has its own eligibility list. VTP pruning must be enabled for this procedure to take effect.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport trunk pruning vlan {add | except | none | remove} vlan-list [,vlan [,vlan [,,,]] 4. end 5. show interfaces interface-id switchport 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Selects the trunk port for which VLANs should be pruned, and enters interface configuration mode.

Switch(config)# interface gigabitethernet2/0/1

Step 3 Step 4

switchport trunk pruning vlan {add | except | none | remove} vlan-list [,vlan [,vlan [,,,]]
end Example:

Configures the list of VLANs allowed to be pruned from the trunk.
For explanations about using the add, except, none, and remove keywords, see the command reference for this release.
Separate non-consecutive VLAN IDs with a comma and no spaces; use a hyphen to designate a range of IDs. Valid IDs are 2 to 1001. Extended-range VLANs (VLAN IDs 1006 to 4094) cannot be pruned.
VLANs that are pruning-ineligible receive flooded traffic.
The default list of VLANs allowed to be pruned contains VLANs 2 to 1001.
Returns to privileged EXEC mode.

Switch(config)# end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2178

VLAN

Configuring the Native VLAN for Untagged Traffic (CLI)

Step 5

Command or Action show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet2/0/1 switchport

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies your entries in the Pruning VLANs Enabled field of the display.
(Optional) Saves your entries in the configuration file.

Configuring the Native VLAN for Untagged Traffic (CLI)
A trunk port configured with IEEE 802.1Q tagging can receive both tagged and untagged traffic. By default, the switch forwards untagged traffic in the native VLAN configured for the port. The native VLAN is VLAN 1 by default.
The native VLAN can be assigned any VLAN ID.
If a packet has a VLAN ID that is the same as the outgoing port native VLAN ID, the packet is sent untagged; otherwise, the switch sends the packet with a tag.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport trunk native vlan vlan-id 4. end 5. show interfaces interface-id switchport 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Defines the interface that is configured as the IEEE 802.1Q trunk, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2179

Configuring Trunk Ports for Load Sharing

VLAN

Step 3

Command or Action

Purpose

switchport trunk native vlan vlan-id

Configures the VLAN that is sending and receiving

Example:

untagged traffic on the trunk port.

For vlan-id, the range is 1 to 4094.

Switch(config-if)# switchport trunk native vlan 12

Step 4

end Example:
Switch(config-if)# end

Step 5

show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet1/0/2 switchport

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Returns to privileged EXEC mode.
Verifies your entries in the Trunking Native Mode VLAN field.
(Optional) Saves your entries in the configuration file.

Configuring Trunk Ports for Load Sharing

Configuring Load Sharing Using STP Port Priorities (CLI)
If your switch is a member of a switch stack, you must use the spanning-tree [vlan vlan-id] cost cost interface configuration command instead of the spanning-tree [vlan vlan-id] port-priority priority interface configuration command to select an interface to put in the forwarding state. Assign lower cost values to interfaces that you want selected first and higher cost values that you want selected last.
These steps describe how to configure a network with load sharing using STP port priorities.

SUMMARY STEPS

1. configure terminal 2. vtp domain domain-name 3. vtp mode server 4. end 5. show vtp status 6. show vlan 7. configure terminal 8. interface interface-id

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2180

VLAN

Configuring Load Sharing Using STP Port Priorities (CLI)

9. switchport mode trunk 10. end 11. show interfaces interface-id switchport 12. Repeat the above steps on Switch A for a second port in the switch or switch stack. 13. Repeat the above steps on Switch B to configure the trunk ports that connect to the trunk ports configured
on Switch A. 14. show vlan 15. configure terminal 16. interface interface-id 17. spanning-tree vlan vlan-range port-priority priority-value 18. exit 19. interface interface-id 20. spanning-tree vlan vlan-range port-priority priority-value 21. end 22. show running-config 23. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters global configuration mode on Switch A.

Switch# configure terminal

Step 2

vtp domain domain-name Example:
Switch(config)# vtp domain workdomain

Configures a VTP administrative domain. The domain name can be 1 to 32 characters.

Step 3

vtp mode server Example:
Switch(config)# vtp mode server

Configures Switch A as the VTP server.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode.

Step 5

show vtp status Example:

Verifies the VTP configuration on both Switch A and Switch B.
In the display, check the VTP Operating Mode and the VTP Domain Name fields.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2181

Configuring Load Sharing Using STP Port Priorities (CLI)

VLAN

Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13

Command or Action
Switch# show vtp status

Purpose

show vlan Example:
Switch# show vlan

Verifies that the VLANs exist in the database on Switch A.

configure terminal Example:
Switch# configure terminal

Enters global configuration mode.

interface interface-id Example:

Defines the interface to be configured as a trunk, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

switchport mode trunk Example:
Switch(config-if)# switchport mode trunk

Configures the port as a trunk port.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet1/0/1 switchport

Verifies the VLAN configuration.

Repeat the above steps on Switch A for a second port in the switch or switch stack.
Repeat the above steps on Switch B to configure the trunk ports that connect to the trunk ports configured on Switch A.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2182

VLAN

Configuring Load Sharing Using STP Port Priorities (CLI)

Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21

Command or Action show vlan Example:
Switch# show vlan

Purpose
When the trunk links come up, VTP passes the VTP and VLAN information to Switch B. This command verifies that Switch B has learned the VLAN configuration.

configure terminal Example:
Switch# configure terminal

Enters global configuration mode on Switch A.

interface interface-id Example:

Defines the interface to set the STP port priority, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

spanning-tree vlan vlan-range port-priority priority-value Example:
Switch(config-if)# spanning-tree vlan 8-10 port-priority 16
exit Example:
Switch(config-if)# exit

Assigns the port priority for the VLAN range specified. Enter a port priority value from 0 to 240. Port priority values increment by 16.
Returns to global configuration mode.

interface interface-id Example:

Defines the interface to set the STP port priority, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/2

spanning-tree vlan vlan-range port-priority priority-value Example:
Switch(config-if)# spanning-tree vlan 3-6 port-priority 16

Assigns the port priority for the VLAN range specified. Enter a port priority value from 0 to 240. Port priority values increment by 16.

end Example:

Returns to privileged EXEC mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2183

Configuring Load Sharing Using STP Path Cost (CLI)

VLAN

Step 22 Step 23

Command or Action
Switch(config-if)# end
show running-config Example:
Switch# show running-config
copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies your entries. (Optional) Saves your entries in the configuration file.

Related Topics Network Load Sharing Using STP Priorities, on page 2172
Configuring Load Sharing Using STP Path Cost (CLI)
These steps describe how to configure a network with load sharing using STP path costs.

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport mode trunk 4. exit 5. Repeat Steps 2 through 4 on a second interface in Switch A or in Switch A stack. 6. end 7. show running-config 8. show vlan 9. configure terminal 10. interface interface-id 11. spanning-tree vlan vlan-range cost cost-value 12. end 13. Repeat Steps 9 through 13 on the other configured trunk interface on Switch A, and set the spanning-tree
path cost to 30 for VLANs 8, 9, and 10. 14. exit 15. show running-config 16. copy running-config startup-config

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2184

VLAN

Configuring Load Sharing Using STP Path Cost (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Switch# configure terminal

Purpose Enters global configuration mode on Switch A.

Step 2

interface interface-id Example:

Defines the interface to be configured as a trunk, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3

switchport mode trunk Example:
Switch(config-if)# switchport mode trunk

Configures the port as a trunk port.

Step 4

exit Example:
Switch(config-if)# exit

Returns to global configuration mode.

Step 5 Step 6

Repeat Steps 2 through 4 on a second interface in Switch A or in Switch A stack.

end

Returns to privileged EXEC mode.

Example:

Switch(config)# end

Step 7

show running-config Example:
Switch# show running-config

Verifies your entries. In the display, make sure that the interfaces are configured as trunk ports.

Step 8

show vlan Example:
Switch# show vlan

When the trunk links come up, Switch A receives the VTP information from the other switches. This command verifies that Switch A has learned the VLAN configuration.

Step 9

configure terminal Example:

Enters global configuration mode.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2185

Configuring Load Sharing Using STP Path Cost (CLI)

VLAN

Step 10 Step 11

Command or Action
Switch# configure terminal

Purpose

interface interface-id Example:

Defines the interface on which to set the STP cost, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

spanning-tree vlan vlan-range cost cost-value Example:

Sets the spanning-tree path cost to 30 for VLANs 2 through 4.

Switch(config-if)# spanning-tree vlan 2-4 cost 30

Step 12 Step 13 Step 14 Step 15 Step 16

end Example:
Switch(config-if)# end

Returns to global configuration mode.

Repeat Steps 9 through 13 on the other configured trunk interface on Switch A, and set the spanning-tree path cost to 30 for VLANs 8, 9, and 10.

exit

Returns to privileged EXEC mode.

Example:

Switch(config)# exit

show running-config Example:
Switch# show running-config

Verifies your entries. In the display, verify that the path costs are set correctly for both trunk interfaces.

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Related Topics Network Load Sharing Using STP Path Cost, on page 2173

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2186

VLAN

Where to Go Next

Where to Go Next
After configuring VLAN trunks, you can configure the following: · VLANs · VLAN groups · Voice VLANs

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage information VLAN Command Reference (Catalyst 3650 Switches) for the commands used in this chapter. Layer 2/3 Command Reference (Catalyst 3650 Switches)

Spanning Tree Protocol (STP)

Network Management Command Reference (Catalyst 3650 Switches)
Network Management Configuration Guide (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2187

Feature History and Information for VLAN Trunks

VLAN

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for VLAN Trunks

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2188

1 1 3 C H A P T E R
Configuring Voice VLANs
· Finding Feature Information, on page 2189 · Prerequisites for Voice VLANs, on page 2189 · Restrictions for Voice VLANs, on page 2190 · Information About Voice VLAN, on page 2190 · How to Configure Voice VLAN, on page 2193 · Monitoring Voice VLAN, on page 2196 · Where to Go Next, on page 2196 · Additional References, on page 2197 · Feature History and Information for Voice VLAN, on page 2198
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Voice VLANs
The following are the prerequisites for voice VLANs: · Voice VLAN configuration is only supported on switch access ports; voice VLAN configuration is not supported on trunk ports.
Note Trunk ports can carry any number of voice VLANs, similar to regular VLANs. The configuration of voice VLANs is not supported on trunk ports.
· Before you enable voice VLAN, enable QoS on the switch by entering the trust device cisco-phone interface configuration command. If you use the auto QoS feature, these settings are automatically configured.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2189

Restrictions for Voice VLANs

VLAN

· You must enable CDP on the switch port connected to the Cisco IP Phone to send the configuration to the phone. (CDP is globally enabled by default on all switch interfaces.)
Restrictions for Voice VLANs
You cannot configure static secure MAC addresses in the voice VLAN.
Information About Voice VLAN
Voice VLANs
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. When the switch is connected to a Cisco 7960 IP Phone, the phone sends voice traffic with Layer 3 IP precedence and Layer 2 class of service (CoS) values, which are both set to 5 by default. Because the sound quality of an IP phone call can deteriorate if the data is unevenly sent, the switch supports quality of service (QoS) based on IEEE 802.1p CoS. QoS uses classification and scheduling to send network traffic from the switch in a predictable manner. The Cisco 7960 IP Phone is a configurable device, and you can configure it to forward traffic with an IEEE 802.1p priority. You can configure the switch to trust or override the traffic priority assigned by a Cisco IP Phone.
Figure 104: Cisco 7960 IP Phone Connected to aSwitch
This network configuration is one way to connect a Cisco 7960 IP Phone. The Cisco IP Phone contains an integrated three-port 10/100 switch. The ports provide dedicated connections to these devices:
· Port 1 connects to the switch or other voice-over-IP (VoIP) device. · Port 2 is an internal 10/100 interface that carries the IP phone traffic. · Port 3 (access port) connects to a PC or other device.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2190

VLAN

Cisco IP Phone Voice Traffic

Cisco IP Phone Voice Traffic
You can configure an access port with an attached Cisco IP Phone to use one VLAN for voice traffic and another VLAN for data traffic from a device attached to the phone. You can configure access ports on the switch to send Cisco Discovery Protocol (CDP) packets that instruct an attached phone to send voice traffic to the switch in any of these ways:
· In the voice VLAN tagged with a Layer 2 CoS priority value · In the access VLAN tagged with a Layer 2 CoS priority value · In the access VLAN, untagged (no Layer 2 CoS priority value)
Note In all configurations, the voice traffic carries a Layer 3 IP precedence value (the default is 5 for voice traffic and 3 for voice control traffic).
Related Topics Configuring Cisco IP Phone Voice Traffic (CLI), on page 2193 Monitoring Voice VLAN, on page 2196
Cisco IP Phone Data Traffic
The switch can also process tagged data traffic (traffic in IEEE 802.1Q or IEEE 802.1p frame types) from the device attached to the access port on the Cisco IP Phone. You can configure Layer 2 access ports on the switch to send CDP packets that instruct the attached phone to configure the phone access port in one of these modes:
· In trusted mode, all traffic received through the access port on the Cisco IP Phone passes through the phone unchanged.
· In untrusted mode, all traffic in IEEE 802.1Q or IEEE 802.1p frames received through the access port on the Cisco IP Phone receive a configured Layer 2 CoS value. The default Layer 2 CoS value is 0. Untrusted mode is the default.
Note Untagged traffic from the device attached to the Cisco IP Phone passes through the phone unchanged, regardless of the trust state of the access port on the phone.
Related Topics Configuring the Priority of Incoming Data Frames (CLI), on page 2195 Monitoring Voice VLAN, on page 2196
Voice VLAN Configuration Guidelines
· Because a Cisco 7960 IP Phone also supports a connection to a PC or other device, a port connecting the switch to a Cisco IP Phone can carry mixed traffic. You can configure a port to decide how the Cisco IP Phone carries voice traffic and data traffic.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2191

Voice VLAN Configuration Guidelines

VLAN

· The voice VLAN should be present and active on the switch for the IP phone to correctly communicate on the voice VLAN. Use the show vlan privileged EXEC command to see if the VLAN is present (listed in the display). If the VLAN is not listed, create the voice VLAN.
· The Power over Ethernet (PoE) switches are capable of automatically providing power to Cisco pre-standard and IEEE 802.3af-compliant powered devices if they are not being powered by an AC power source.
· The Port Fast feature is automatically enabled when voice VLAN is configured. When you disable voice VLAN, the Port Fast feature is not automatically disabled.
· If the Cisco IP Phone and a device attached to the phone are in the same VLAN, they must be in the same IP subnet. These conditions indicate that they are in the same VLAN: · They both use IEEE 802.1p or untagged frames. · The Cisco IP Phone uses IEEE 802.1p frames, and the device uses untagged frames. · The Cisco IP Phone uses untagged frames, and the device uses IEEE 802.1p frames. · The Cisco IP Phone uses IEEE 802.1Q frames, and the voice VLAN is the same as the access VLAN.
· The Cisco IP Phone and a device attached to the phone cannot communicate if they are in the same VLAN and subnet but use different frame types because traffic in the same subnet is not routed (routing would eliminate the frame type difference).
· Voice VLAN ports can also be these port types: · Dynamic access port. · IEEE 802.1x authenticated port.
Note If you enable IEEE 802.1x on an access port on which a voice VLAN is configured and to which a Cisco IP Phone is connected, the phone loses connectivity to the switch for up to 30 seconds.
· Protected port. · A source or destination port for a SPAN or RSPAN session. · Secure port.
Note When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to two plus the maximum number of secure addresses allowed on the access VLAN. When the port is connected to a Cisco IP Phone, the phone requires up to two MAC addresses. The phone address is learned on the voice VLAN and might also be learned on the access VLAN. Connecting a PC to the phone requires additional MAC addresses.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2192

VLAN

How to Configure Voice VLAN

How to Configure Voice VLAN

Configuring Cisco IP Phone Voice Traffic (CLI)
You can configure a port connected to the Cisco IP Phone to send CDP packets to the phone to configure the way in which the phone sends voice traffic. The phone can carry voice traffic in IEEE 802.1Q frames for a specified voice VLAN with a Layer 2 CoS value. It can use IEEE 802.1p priority tagging to give voice traffic a higher priority and forward all voice traffic through the native (access) VLAN. The Cisco IP Phone can also send untagged voice traffic or use its own configuration to send voice traffic in the access VLAN. In all configurations, the voice traffic carries a Layer 3 IP precedence value (the default is 5).

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. trust device cisco-phone 4. switchport voice vlan {vlan-id | dot1p | none | untagged} 5. end 6. Use one of the following:
· show interfaces interface-id switchport · show running-config interface interface-id
7. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the interface connected to the phone, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3

trust device cisco-phone Example:
Switch(config-if)# trust-device cisco-phone

Configures the interface to trust incoming traffic packets for the Cisco IP phone.

Step 4

switchport voice vlan {vlan-id | dot1p | none | untagged} Configures the voice VLAN. Example:

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2193

Configuring Cisco IP Phone Voice Traffic (CLI)

VLAN

Step 5

Command or Action
Switch(config-if)# switchport voice vlan dot1p

Purpose
· vlan-id--Configures the phone to forward all voice traffic through the specified VLAN. By default, the Cisco IP Phone forwards the voice traffic with an IEEE 802.1Q priority of 5. Valid VLAN IDs are 1 to 4094.
· dot1p--Configures the switch to accept voice and data IEEE 802.1p priority frames tagged with VLAN ID 0 (the native VLAN). By default, the switch drops all voice and data traffic tagged with VLAN 0. If configured for 802.1p the Cisco IP Phone forwards the traffic with an IEEE 802.1p priority of 5.
· none--Allows the phone to use its own configuration to send untagged voice traffic.
· untagged--Configures the phone to send untagged voice traffic.

end Example:
Switch(config-if)# end

Returns to privileged EXEC mode.

Step 6

Use one of the following: · show interfaces interface-id switchport · show running-config interface interface-id
Example:
Switch# show interfaces gigabitethernet1/0/1 switchport
or
Switch# show running-config interface gigabitethernet1/0/1

Verifies your voice VLAN entries or your QoS and voice VLAN entries.

Step 7

copy running-config startup-config Example:
Switch# copy running-config startup-config

(Optional) Saves your entries in the configuration file.

Related Topics Cisco IP Phone Voice Traffic, on page 2191 Monitoring Voice VLAN, on page 2196

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2194

VLAN

Configuring the Priority of Incoming Data Frames (CLI)

Configuring the Priority of Incoming Data Frames (CLI)
You can connect a PC or other data device to a Cisco IP Phone port. To process tagged data traffic (in IEEE 802.1Q or IEEE 802.1p frames), you can configure the switch to send CDP packets to instruct the phone how to send data packets from the device attached to the access port on the Cisco IP Phone. The PC can generate packets with an assigned CoS value. You can configure the phone to not change (trust) or to override (not trust) the priority of frames arriving on the phone port from connected devices.
Follow these steps to set the priority of data traffic received from the non-voice port on the Cisco IP Phone:

SUMMARY STEPS

1. configure terminal 2. interface interface-id 3. switchport priority extend {cos value | trust} 4. end 5. show interfaces interface-id switchport 6. copy running-config startup-config

DETAILED STEPS

Step 1

Command or Action configure terminal Example:

Purpose Enters the global configuration mode.

Switch# configure terminal

Step 2

interface interface-id Example:

Specifies the interface connected to the Cisco IP Phone, and enters interface configuration mode.

Switch(config)# interface gigabitethernet1/0/1

Step 3 Step 4

switchport priority extend {cos value | trust}

Sets the priority of data traffic received from the Cisco IP

Example:

Phone access port:

· cos value--Configures the phone to override the

Switch(config-if)# switchport priority extend trust

priority received from the PC or the attached device

with the specified CoS value. The value is a number

from 0 to 7, with 7 as the highest priority. The default

priority is cos 0.

· trust--Configures the phone access port to trust the priority received from the PC or the attached device.

end Example:

Returns to privileged EXEC mode.

Switch(config-if)# end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2195

Monitoring Voice VLAN

VLAN

Step 5

Command or Action show interfaces interface-id switchport Example:
Switch# show interfaces gigabitethernet1/0/1 switchport

Step 6

copy running-config startup-config Example:
Switch# copy running-config startup-config

Purpose Verifies your entries.
(Optional) Saves your entries in the configuration file.

Related Topics Cisco IP Phone Data Traffic, on page 2191 Monitoring Voice VLAN, on page 2196

Monitoring Voice VLAN
To display voice VLAN configuration for an interface, use the show interfaces interface-id switchport privileged EXEC command.
Related Topics Configuring Cisco IP Phone Voice Traffic (CLI), on page 2193 Cisco IP Phone Voice Traffic, on page 2191 Configuring the Priority of Incoming Data Frames (CLI), on page 2195 Cisco IP Phone Data Traffic, on page 2191

Where to Go Next
After configuring voice VLANs, you can configure the following: · VLANs · VLAN groups · VLAN Trunking · VTP

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2196

VLAN

Additional References

Additional References

Related Documents

Related Topic

Document Title

For complete syntax and usage information VLAN Command Reference (Catalyst 3650 Switches)

for the commands used in this chapter.

Layer 2/3 Command Reference (Catalyst 3650 Switches)

Additional configuration commands and procedures.

LAN Switching Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
Layer 2/3 Configuration Guide (Catalyst 3650 Switches)

Platform-independent configuration information

Identity Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

Standards and RFCs Standard/RFC Title RFC 1573 Evolution of the Interfaces Group of MIB-II RFC 1757 Remote Network Monitoring Management RFC 2021 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2197

Feature History and Information for Voice VLAN

VLAN

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature History and Information for Voice VLAN

Release Cisco IOS XE 3.3SE

Modification This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2198

PART XVIII
WLAN
· Configuring DHCP for WLANs, on page 2201 · Configuring WLAN Security, on page 2211 · Configuring Access Point Groups, on page 2223

1 1 4 C H A P T E R
Configuring DHCP for WLANs
· Finding Feature Information, on page 2201 · Prerequisites for Configuring DHCP for WLANs, on page 2201 · Restrictions for Configuring DHCP for WLANs, on page 2202 · Information About the Dynamic Host Configuration Protocol, on page 2202 · How to Configure DHCP for WLANs, on page 2206 · Additional References, on page 2209 · Feature Information for DHCP for WLANs, on page 2209
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring DHCP for WLANs
· To be able to use the DHCP option 82, you must configure DHCP on Cisco IOS software. By default, DHCP option 82 is enabled for all clients. You can control the wireless client behavior using the WLAN suboptions.
· It is recommended to enable dhcp snooping on the Switches irrespective of the DHCP address requirement being checked or unchecked on the WLAN. This avoids any client connectivity issues when DHCP snopping is not turned on. This example shows how to enable DHCP snooping on the Switches:
Switch(config)# ip dhcp snooping 136, 139 Switch(config)# ip dhcp snooping Switch(config)# ip dhcp snooping trust Switch(config)# ip dhcp snooping trust
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2201

Restrictions for Configuring DHCP for WLANs

WLAN

Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Information About the Dynamic Host Configuration Protocol, on page 2202 Internal DHCP Servers, on page 2203 External DHCP Servers, on page 2203 DHCP Assignments, on page 2204 Information About DHCP Option 82, on page 2204 Configuring DHCP Scopes, on page 2205 Information About DHCP Scopes, on page 2205
Restrictions for Configuring DHCP for WLANs
· If you override the DHCP server in a WLAN, you must ensure that you configure the underlying Cisco IOS configuration to make sure that the DHCP server is reachable.
· WLAN DHCP override works only if DHCP service is enabled on the switch. You can configure DHCP service in the following ways: · Configuring the DHCP pool on the switch.
· Configuring a DHCP relay agent on the SVI. Note: the VLAN of the SVI must be mapped to the WLAN where DHCP override is configured.
Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Information About the Dynamic Host Configuration Protocol, on page 2202 Internal DHCP Servers, on page 2203 External DHCP Servers, on page 2203 DHCP Assignments, on page 2204 Information About DHCP Option 82, on page 2204 Configuring DHCP Scopes, on page 2205 Information About DHCP Scopes, on page 2205
Information About the Dynamic Host Configuration Protocol
You can configure WLANs to use the same or different Dynamic Host Configuration Protocol (DHCP) servers or no DHCP server. Two types of DHCP servers are available: internal and external. Related Topics
Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2202

WLAN

Internal DHCP Servers

Internal DHCP Servers
The switches contain an internal DHCP server. This server is typically used in branch offices that do not already have a DHCP server. The wireless network generally contains a maximum of 10 access points or fewer, with the access points on the same IP subnet as the switch. The internal server provides DHCP addresses to wireless clients, direct-connect access points, and DHCP requests that are relayed from access points. Only lightweight access points are supported. When you want to use the internal DHCP server, you must set the management interface IP address of the switch as the DHCP server IP address. DHCP option 43 is not supported on the internal server. Therefore, the access point must use an alternative method to locate the management interface IP address of the switch, such as local subnet broadcast, Domain Name System (DNS), or priming. An internal DHCP server pool only serves the wireless clients of that switch, not clients of other switches. Also, an internal DHCP server can serve only wireless clients, not wired clients. When clients use the internal DHCP server of the switch, IP addresses are not preserved across reboots. As a result, multiple clients can be assigned with the same IP address. To resolve any IP address conflicts, clients must release their existing IP address and request a new one. Wired guest clients are always on a Layer 2 network connected to a local or foreign switch.
Note DHCPv6 is not supported in the internal DHCP servers.
Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202
External DHCP Servers
The operating system is designed to appear as a DHCP Relay to the network and as a DHCP server to clients with industry-standard external DHCP servers that support DHCP Relay, which means that each switch appears as a DHCP Relay agent to the DHCP server and as a DHCP server at the virtual IP address to wireless clients. Because the switch captures the client IP address that is obtained from a DHCP server, it maintains the same IP address for that client during intra switch, inter switch, and inter-subnet client roaming.
Note External DHCP servers can support DHCPv6.
Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2203

DHCP Assignments

WLAN

DHCP Assignments
You can configure DHCP on a per-interface or per-WLAN basis. We recommend that you use the primary DHCP server address that is assigned to a particular interface. You can assign DHCP servers for individual interfaces. You can configure the management interface, AP-manager interface, and dynamic interface for a primary and secondary DHCP server, and you can configure the service-port interface to enable or disable DHCP servers. You can also define a DHCP server on a WLAN. In this case, the server overrides the DHCP server address on the interface assigned to the WLAN.
Security Considerations For enhanced security, we recommend that you require all clients to obtain their IP addresses from a DHCP server. To enforce this requirement, you can configure all WLANs with a DHCP Addr. Assignment Required setting, which disallows client static IP addresses. If DHCP Addr. Assignment Required is selected, clients must obtain an IP address via DHCP. Any client with a static IP address is not allowed on the network. The switch monitors DHCP traffic because it acts as a DHCP proxy for the clients.
Note WLANs that support management over wireless must allow management (device-servicing) clients to obtain an IP address from a DHCP server.
If slightly less security is tolerable, you can create WLANs with DHCP Addr. Assignment Required disabled. Clients then have the option of using a static IP address or obtaining an IP address from a designated DHCP server.
Note DHCP Addr. Assignment Required is not supported for wired guest LANs.
You can create separate WLANs with DHCP Addr. Assignment Required configured as disabled. This is applicable only if DHCP proxy is enabled for the switch. You must not define the primary/secondary configuration DHCP server you should disable the DHCP proxy. These WLANs drop all DHCP requests and force clients to use a static IP address. These WLANs do not support management over wireless connections. Related Topics
Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202
Information About DHCP Option 82
DHCP option 82 provides additional security when DHCP is used to allocate network addresses. It enables the switch to act as a DHCP relay agent to prevent DHCP client requests from untrusted sources. You can configure the switch to add option 82 information to DHCP requests from clients before forwarding the requests to the DHCP server.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2204

WLAN

Figure 105: DHCP Option 82

Configuring DHCP Scopes

The access point forwards all DHCP requests from a client to the switch. The switch adds the DHCP option 82 payload and forwards the request to the DHCP server. The payload can contain the MAC address or the MAC address and SSID of the access point, depending on how you configure this option.
Note Any DHCP packets that already include a relay agent option are dropped at the switch.
For DHCP option 82 to operate correctly, DHCP proxy must be enabled. Related Topics
Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202
Configuring DHCP Scopes
Related Topics Configuring DHCP for WLANs (CLI), on page 2206 Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202
Information About DHCP Scopes
Switches have built-in DHCP relay agents. However, when you desire network segments that do not have a separate DHCP server, the switches can have built-in DHCP scopes that assign IP addresses and subnet masks to wireless clients. Typically, one switch can have one or more DHCP scopes that each provide a range of IP addresses. DHCP scopes are needed for internal DHCP to work. Once DHCP is defined on the switch, you can then point the primary DHCP server IP address on the management, AP-manager, and dynamic interfaces to the switch's management interface. Related Topics
Configuring DHCP for WLANs (CLI), on page 2206
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2205

How to Configure DHCP for WLANs

WLAN

Configuring Advanced WLAN Properties (GUI) Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202 Configuring DHCP Scopes (CLI), on page 2208

How to Configure DHCP for WLANs

Configuring DHCP for WLANs (CLI)
Use this procedure to configure the following DHCP parameters on a WLAN: · DHCP Option 82 Payload · DHCP Required · DHCP Override

Before you begin · You must have admin privileges for configuring the WLAN. · To configure the DHCP override, you must have the IP address of the DHCP server.

SUMMARY STEPS

1. configure terminal 2. shutdown 3. wlan profile-name 4. ip dhcp opt82 {ascii | format {add-ssid | ap-ethmac} | rid} 5. ip dhcp required 6. ip dhcp server ip-address 7. no shutdown 8. end 9. show wlan wlan-name

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

shutdown Example:
Switch(config)# shutdown

Purpose Enters global configuration mode.
Shut down the WLAN.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2206

WLAN

Configuring DHCP for WLANs (CLI)

Step 3 Step 4
Step 5 Step 6 Step 7 Step 8 Step 9

Command or Action

Purpose

wlan profile-name Example:
Switch# wlan test4

Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN.

ip dhcp opt82 {ascii | format {add-ssid | ap-ethmac} | rid} Specifies the DHCP82 payload on the WLAN. The keyword

Example:

and arguments are as follows:

Switch(config)# ip dhcp opt82 format add-ssid

· ascii--Configures ASCII for DHCP Option 82. If this is not configured, the option 82 format is set to ASCII

format.

· format--Specifies the DHCP option 82 format. The following options are available:
· add-ssid--Set RemoteID format that is the AP radio MAC address and SSID.

· ap-ethmac--Set RemoteID format that is the AP Ethernet MAC address.

Note If the format option is not configured, only the AP radio MAC address is used.

· rid--Adds the Cisco 2 byte RID for DHCP option 82.

ip dhcp required Example:
Switch(config-wlan)# ip dhcp required
ip dhcp server ip-address Example:
Switch(config-wlan)# ip dhcp server 200.1.1.2
no shutdown Example:
Switch(config-wlan)# no shutdown
end Example:
Switch(config)# end
show wlan wlan-name Example:
Switch(config-wlan)# show wlan test-wlan

Makes it mandatory for clients to get their IP address from the DHCP server. Static clients are not allowed.
Defines a DHCP server on the WLAN that overrides the DHCP server address on the interface assigned to the WLAN. Restarts the WLAN.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.
Verifies the DHCP configuration.

Related Topics Information About the Dynamic Host Configuration Protocol, on page 2202

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2207

Configuring DHCP Scopes (CLI)

WLAN

Internal DHCP Servers, on page 2203 External DHCP Servers, on page 2203 DHCP Assignments, on page 2204 Information About DHCP Option 82, on page 2204 Configuring DHCP Scopes, on page 2205 Information About DHCP Scopes, on page 2205 Prerequisites for Configuring DHCP for WLANs, on page 2201 Restrictions for Configuring DHCP for WLANs, on page 2202

Configuring DHCP Scopes (CLI)

SUMMARY STEPS

1. configure terminal 2. ip dhcp pool pool-name 3. network network-name mask-address 4. dns-server hostname 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ip dhcp pool pool-name Example:
Switch(config)#ip dhcp pool test-pool

Step 3

network network-name mask-address
Example:
Switch(dhcp-config)#network 209.165.200.224 255.255.255.0

Step 4

dns-server hostname Example:
Switch(dhcp-config)#dns-server example.com

Step 5

end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Configures the DHCP pool address.
Specifies the network number in dotted-decimal notation and the mask address.
Specifies the DNS name server. You can specify an IP address or a hostname.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Information About DHCP Scopes, on page 2205

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2208

WLAN

Additional References

Additional References

Related Documents

Related Topic
System Management

Document Title System Management Configuration Guide (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information for DHCP for WLANs

Feature Name DHCP functionality for WLAN

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2209

Feature Information for DHCP for WLANs

WLAN

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2210

1 1 5 C H A P T E R
Configuring WLAN Security
· Finding Feature Information, on page 2211 · Prerequisites for Layer 2 Security, on page 2211 · Information About AAA Override, on page 2212 · How to Configure WLAN Security, on page 2212 · Additional References, on page 2220 · Feature Information about WLAN Layer 2 Security, on page 2221
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Layer 2 Security
WLANs with the same SSID must have unique Layer 2 security policies so that clients can make a WLAN selection based on information advertised in beacon and probe responses. The available Layer 2 security policies are as follows:
· None (open WLAN) · Static WEP or 802.1X
Note Because static WEP and 802.1X are both advertised by the same bit in beacon and probe responses, they cannot be differentiated by clients. Therefore, they cannot both be used by multiple WLANs with the same SSID.
· WPA/WPA2
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2211

Information About AAA Override

WLAN

Note Although WPA and WPA2 cannot be used by multiple WLANs with the same SSID, you can configure two WLANs with the same SSID with WPA/TKIP with PSK and Wi-Fi Protected Access (WPA )/Temporal Key Integrity Protocol (TKIP) with 802.1X, or with WPA/TKIP with 802.1X or WPA/AES with 802.1X.
Related Topics Configuring Static WEP + 802.1X Layer 2 Security Parameters (CLI), on page 2212 Configuring Layer 2 Parameters (GUI), on page 2217 Configuring Static WEP Layer 2 Security Parameters (CLI), on page 2213 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI), on page 2214 Configuring 802.1X Layer 2 Security Parameters (CLI), on page 2216 Configuring Advanced WLAN Properties (CLI) Information About AAA Override, on page 2212

Information About AAA Override
The AAA Override option of a WLAN enables you to configure the WLAN for identity networking. It enables you to apply VLAN tagging, Quality of Service (QoS), and Access Control Lists (ACLs) to individual clients based on the returned RADIUS attributes from the AAA server.
Related Topics Configuring Advanced WLAN Properties (CLI) Prerequisites for Layer 2 Security, on page 2211

How to Configure WLAN Security

Configuring Static WEP + 802.1X Layer 2 Security Parameters (CLI)

Before you begin You must have administrator privileges.

SUMMARY STEPS

1. configure terminal 2. wlan profile-name 3. security static-wep-key {authentication {open | sharedkey} | encryption {104 | 40} [ascii | hex]
{0|8}} wep-key wep-key-index1-4 4. end

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2212

WLAN

Configuring Static WEP Layer 2 Security Parameters (CLI)

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

wlan profile-name Example:
Switch# wlan test4

Step 3

security static-wep-key {authentication {open | sharedkey} | encryption {104 | 40} [ascii | hex] {0|8}} wep-key wep-key-index1-4
Example:
Switch(config-wlan)# security static-wep-key encryption 40 hex 0 test 2

Purpose Enters global configuration mode.
Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN.
Configures static WEP security on a WLAN. The keywords and arguments are as follows:
· authentication--Configures 802.11 authentication. · encryption--Sets the static WEP keys and indices. · open--Configures open system authentication. · sharedkey--Configures shared key authentication. · 104, 40--Specifies the WEP key size. · hex, ascii--Specifies the input format of the key. · wep-key-index , wep-key-index1-4--Type of password
that follows. A value of 0 indicates that an unencrypted password follows. A value of 8 indicates that an AES encrypted follows.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Prerequisites for Layer 2 Security, on page 2211

Configuring Static WEP Layer 2 Security Parameters (CLI)

Before you begin You must have administrator privileges.

SUMMARY STEPS

1. configure terminal 2. wlan profile-name 3. security static-wep-key [authentication {open | shared} | encryption {104 | 40} {ascii | hex} [0 |
8]]

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2213

Configuring WPA + WPA2 Layer 2 Security Parameters (CLI)

WLAN

4. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

wlan profile-name Example:
Switch# wlan test4

Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN.

Step 3

security static-wep-key [authentication {open | shared} The keywords are as follows:

| encryption {104 | 40} {ascii | hex} [0 | 8]]

· static-wep-key--Configures Static WEP Key

Example:

authentication.

Switch(config-wlan)# security static-wep-key authentication open

· authentication--Specifies the authentication type you can set. The values are open and shared.

· encryption--Specifies the encryption type that you can set. The valid values are 104 and 40. 40-bit keys must contain 5 ASCII text characters or 10 hexadecimal characters. 104-bit keys must contain 13 ASCII text characters or 26 hexadecimal characters

· ascii--Specifies the key format as ASCII.

· hex--Specifies the key format as HEX.

Step 4

end Example:
Switch(config)# end

Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Prerequisites for Layer 2 Security, on page 2211

Configuring WPA + WPA2 Layer 2 Security Parameters (CLI)

Note The default security policy is WPA2.
Before you begin You must have administrator privileges.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2214

WLAN

Configuring WPA + WPA2 Layer 2 Security Parameters (CLI)

SUMMARY STEPS

1. configure terminal 2. wlan profile-name 3. security wpa 4. security wpa wpa1 5. security wpa wpa1 ciphers [aes | tkip] 6. security wpa wpa2 7. security wpa wpa2 ciphers [aes | tkip] 8. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

wlan profile-name Example:
Switch# wlan test4

Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN.

Step 3

security wpa Example:
Switch(config-wlan)# security wpa

Enables WPA.

Step 4

security wpa wpa1 Example:
Switch(config-wlan)# security wpa wpa1

Enables WPA1.

Step 5

security wpa wpa1 ciphers [aes | tkip]

Specifies the WPA1 cipher. Choose one of the following

Example:

encryption types:

Switch(config-wlan)# security wpa wpa1 ciphers aes · aes--Specifies WPA/AES support.

· tkip--Specifies WPA/TKIP support.

Step 6 Step 7

security wpa wpa2 Example:
Switch(config-wlan)# security wpa

Enables WPA 2.

security wpa wpa2 ciphers [aes | tkip]

Configure WPA2 cipher. Choose one of the following

Example:

encryption types:

Switch(config-wlan)# security wpa wpa2 ciphers tkip · aes--Specifies WPA/AES support.

· tkip--Specifies WPA/TKIP support.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2215

Configuring 802.1X Layer 2 Security Parameters (CLI)

WLAN

Step 8

Command or Action end Example:
Switch(config)# end

Purpose
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Prerequisites for Layer 2 Security, on page 2211

Configuring 802.1X Layer 2 Security Parameters (CLI)

Before you begin You must have administrator privileges.

SUMMARY STEPS

1. configure terminal 2. wlan profile-name 3. security dot1x 4. security [authentication-list auth-list-name | encryption {0 | 104 | 40} 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Purpose Enters global configuration mode.

Step 2

wlan profile-name Example:
Switch# wlan test4

Enters the WLAN configuration submode. The profile-name is the profile name of the configured WLAN.

Step 3

security dot1x Example:
Switch(config-wlan)# security dot1x

Specifies 802.1X security.

Step 4

security [authentication-list auth-list-name | encryption The keywords and arguments are as follows:

{0 | 104 | 40}

· authentication-list--Specifies the authentication list

Example:

for IEEE 802.1X.

Switch(config-wlan)# security encryption 104

· encryption--Specifies the length of the CKIP encryption key. The valid values are 0, 40, and 104. Zero (0) signifies no encryption. This is the default.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2216

WLAN

Configuring Layer 2 Parameters (GUI)

Step 5

Command or Action
end Example:
Switch(config)# end

Purpose Note All keys within a WLAN must be of the same
size.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Related Topics Prerequisites for Layer 2 Security, on page 2211

Configuring Layer 2 Parameters (GUI)

Before you begin · You must have administrator privileges.

Step 1 Step 2 Step 3

Click Configuration > WLAN > . The WLANs page appears.

Click the WLANs profile of the WLAN you want to configure. The WLANs > Edit > page appears.

Click the Security > Layer 2 > tab.

Parameter Layer2 Security

Description Layer2 security for the selected WLAN. Values are the following:
· None--No Layer 2 security selected.

· WPA+WPA2--Wi-Fi Protected Access.

· 802.1X--WEP 802.1X data encryption type. For information on these settings, see the Layer 2 802.1X Parameters topic.

· Static WEP--Static WEP encryption parameters.

· Static WEP + 802.1x--Both Static WEP and 802.1X parameters.

MAC Filtering

MAC address filtering. You can locally configure clients by their MAC addresses in the MAC Filters > New page . Otherwise, configure the clients on a RADIUS server.
Note MAC Filtering is also known as MAC Authentication By Pass (MAB).

Fast Transition

Check box to enable or disable a fast transition between access points.

Over the DS

Check box to enable or disable a fast transition over a distributed system.

Reassociation Timeout Time in seconds after which a fast transition reassociation times out.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2217

Configuring Layer 2 Parameters (GUI)

WLAN

To configure the WPA + WPA2 parameters, provide the following details:

Parameter WPA Policy

Description Check box to enable or disable WPA policy.

WPA Encryption

WPA2 encryption type: TKIP or AES. Available only if the WPA policy is enabled.

WPA2 Policy.

Check box to enable or disable WPA2 policy.

WPA2 Encryption WPA2 encryption type: TKIP or AES. Available only if the WPA2 policy is enabled.

Authentication Key Management

The rekeying mechanism parameter.. Values are the following: · 802.1X · CCKM · PSK · 802.1x + CCKM

PSK Format

Enabled when you select the PSK value for Authentication Key Management. Choose ASCII or the HEX format and enter the preshared key.

To configure 802.1x parameters, provide the following details:

Parameter

Description

802.11 data encryption WEP 802.11 data encryption type.

Type

Security type.

Key size

Key size. Values are the following: · None · 40 bits · 104 bits

The third-party AP WLAN (17) can only be configured with 802.1X encryption. Drop-down configurable 802.1X parameters are not available for this WLAN.

To specify Static WEP, configure the following parameters:

Parameter
802.11 Data Encryption

Description Static WEP encryption type.

Current Key

Displays the current selected key details.

Type

Security type.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2218

WLAN

Configuring Layer 2 Parameters (GUI)

Parameter Key size

Description Key size. Values are the following:
· Not set · 40 bits · 104 bits

Key Index
Encryption Key Key Format Allow Shared Key Authentication

Key index from 1 to 4. One unique WEP key index can be applied to each WLAN. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption.
Encryption key.
Encryption key format in ASCII or HEX.
Key authentication that you can enable or disable.

To configure Static WEP + 802.1X Parameters

Parameter

Description

Static WEP Parameters

802.11 Data Encryption

Static WEP encryption type.

Current Key

Displays the current selected key details.

Type

Security type.

Key size

Key size. Values are the following:

· Not set

· 40 bits

· 104 bits

Key Index
Encryption Key Key Format Allow Shared Key Authentication

Key index from 1 to 4. One unique WEP key index can be applied to each WLAN. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption.
Encryption key. Encryption key format in ASCII or HEX. Key authentication that you can enable or disable.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2219

Additional References

WLAN

Step 4

Parameter 802.1x Parameters 802.11 Data Encryption
Current Key
Type
Key size

Description
Static WEP encryption type.
Display Only. The current selected key details. Security type. Key size. Values are the following:
· Not set · 40 bits · 104 bits

Key Index
Encryption Key Key Format Allow Shared Key Authentication

Key index from 1 to 4. Note One unique WEP key index can be applied to each WLAN. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption.
Encryption key.
Encryption key format in ASCII or HEX.
Key authentication that you can enable or disable.

Click Apply.

Related Topics Prerequisites for Layer 2 Security, on page 2211

Additional References

Related Documents

Related Topic

Document Title

WLAN command reference WLAN Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Security configuration guide

Security Configuration Guide (Catalyst 3650 Switches)

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2220

WLAN

Feature Information about WLAN Layer 2 Security

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Feature Information about WLAN Layer 2 Security

This table lists the features in this module and provides links to specific configuration information.

Feature Name WLAN Security functionality

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2221

Feature Information about WLAN Layer 2 Security

WLAN

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2222

1 1 6 C H A P T E R
Configuring Access Point Groups
· Finding Feature Information, on page 2223 · Prerequisites for Configuring AP Groups, on page 2223 · Restrictions for Configuring Access Point Groups, on page 2224 · Information About Access Point Groups, on page 2224 · How to Configure Access Point Groups, on page 2225 · Additional References, on page 2228 · Feature History and Information for Access Point Groups, on page 2229
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring AP Groups
The following are the prerequisites for creating access point groups on a switch: · The required access control list (ACL) must be defined on the router that serves the VLAN or subnet. · Multicast traffic is supported with access point group VLANs. However, if the client roams from one access point to another, the client might stop receiving multicast traffic, unless IGMP snooping is enabled.
Related Topics Information About Access Point Groups, on page 2224 Restrictions for Configuring Access Point Groups, on page 2224
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2223

Restrictions for Configuring Access Point Groups

WLAN

Restrictions for Configuring Access Point Groups
· Suppose that the interface mapping for a WLAN in the AP group table is the same as the WLAN interface. If the WLAN interface is changed, the interface mapping for the WLAN in the AP group table also changes to the new WLAN interface.
Suppose that the interface mapping for a WLAN in the AP group table is different from the one defined for the WLAN. If the WLAN interface is changed, then the interface mapping for the WLAN in the AP group table does not change to the new WLAN interface.
· If you clear the configuration on the switch, all of the access point groups disappear except for the default access point group "default-group," which is created automatically.
· The default access point group can have up to 16 WLANs associated with it. The WLAN IDs for the default access point group must be less than or equal to 16. If a WLAN with an ID greater than 16 is created in the default access point group, the WLAN SSID will not be broadcasted. All WLAN IDs in the default access point group must have an ID that is less than or equal to 16. WLANs with IDs greater than 16 can be assigned to custom access point groups.
Related Topics Information About Access Point Groups, on page 2224 Prerequisites for Configuring AP Groups, on page 2223
Information About Access Point Groups
After you create up to 512 WLANs on the switch, you can selectively publish them (using access point groups) to different access points to better manage your wireless network. In a typical deployment, all users on a WLAN are mapped to a single interface on the switch. Therefore, all users that are associated with that WLAN are on the same subnet or VLAN. However, you can choose to distribute the load among several interfaces or to a group of users based on specific criteria such as individual departments (such as Marketing) by creating access point groups. Additionally, these access point groups can be configured in separate VLANs to simplify network administration.
Figure 106: Access Point Groups
In the figure, three configured dynamic interfaces are mapped to three different VLANs (VLAN 61, VLAN 62, and VLAN 63). Three access point groups are defined, and each is a member of a different VLAN, but all are members of the same SSID. A client within the wireless SSID is assigned an IP address from the VLAN subnet on which its access point is a member. For example, any user that associates with an access point that is a member of access point group VLAN 61 is assigned an IP address from that subnet.
In the figure, the switch internally treats roaming between access points as a Layer 3 roaming event. In this way, WLAN clients maintain their original IP addresses.
After all access points have joined the switch, you can create access point groups and assign up to 16 WLANs to each group. Each access point advertises only the enabled WLANs that belong to its access point group. The access point does not advertise disabled WLANs in its access point group or WLANs that belong to another group.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2224

WLAN

How to Configure Access Point Groups

Related Topics Creating Access Point Groups, on page 2225 Viewing Access Point Group, on page 2227 Assigning an Access Point to an AP Group, on page 2227 Prerequisites for Configuring AP Groups, on page 2223 Restrictions for Configuring Access Point Groups, on page 2224
How to Configure Access Point Groups
Creating Access Point Groups
Before you begin You must have administrator privileges to perform this operation.
Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2225

Creating Access Point Groups

WLAN

SUMMARY STEPS

1. configure terminal 2. ap group ap-group-name 3. wlan wlan-name 4. (Optional) vlan vlan-name 5. end

DETAILED STEPS

Step 1

Command or Action configure terminal Example:
Switch# configure terminal

Step 2

ap group ap-group-name Example:
Switch(config)# ap group my-ap-group

Step 3

wlan wlan-name Example:
Switch(config-apgroup)# wlan wlan-name

Step 4

(Optional) vlan vlan-name Example:
Switch(config-apgroup)# vlan test-vlan

Step 5

end Example:
Switch(config)# end

Purpose Enters global configuration mode.
Creates an access point group.
Associates the AP group to a WLAN.
Assigns the access point group to a VLAN.
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode.

Example This example shows how to create an AP group:
Switch# configure terminal Switch(config-apgroup)# ap group test-ap-group-16 Switch(config-wlan-apgroup)# wlan test-ap-group-16 Switch(config-wlan-apgroup)# vlan VLAN1300
Related Topics Information About Access Point Groups, on page 2224

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2226

WLAN

Assigning an Access Point to an AP Group

Assigning an Access Point to an AP Group

Before you begin You must have administrator privileges to perform this operation.

SUMMARY STEPS

1. ap name ap-name ap-group-name ap-group

DETAILED STEPS

Step 1

Command or Action

Purpose

ap name ap-name ap-group-name ap-group Example:
Switch# ap name 1240-101 ap-groupname apgroup_16

Assigns the access point to the access point group. The keywords and arguments are as follows:
· name--Specifies that the argument following this keyword is the name of an AP that is associated to the switch.

· ap-name--AP that you want to associate to the AP group.

· ap-group-name--Specifies that the argument following this keyword is the name of the AP group that is configured on the switch.

· ap-group--Name of the access point group that is configured on the switch.

Related Topics Information About Access Point Groups, on page 2224

Viewing Access Point Group

Before you begin You must have administrator privileges to perform this operation.

SUMMARY STEPS

1. show ap groups [extended ]

DETAILED STEPS

Step 1

Command or Action show ap groups [extended ] Example:
Switch# show ap groups

Purpose
Displays the AP groups configured on the switch. The extended keyword displays all AP Groups information defined in the system in detail.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2227

Additional References

WLAN

Related Topics Information About Access Point Groups, on page 2224

Additional References

Related Documents

Related Topic

Document Title

WLAN commands

WLAN Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Lightweight Access Point configuration Lightweight Access Point Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Lightweight Access Point commands Lightweight Access Point Command Reference, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Error Message Decoder

Description

Link

To help you research and resolve system https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi error messages in this release, use the Error Message Decoder tool.

MIBs
MIB All supported MIBs for this release.

MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support website provides extensive online resources, including http://www.cisco.com/support documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2228

WLAN

Feature History and Information for Access Point Groups

Feature History and Information for Access Point Groups

This table lists the features in this modules and provides links to specific configuration information.

Feature Name AP Groups

Release Cisco IOS XE 3.3SE

Feature Information This feature was introduced.

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2229

Feature History and Information for Access Point Groups

WLAN

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) 2230

INDEX
<$nopage>HTTP over SSL 1349, 1352 see HTTPS 1349, 1352
<$nopage>IEEE 802.3ad 584 See EtherChannel 584
<$nopage>PAgP 581 See EtherChannel 581
<$nopage>Port Aggregation Protocol 581 See EtherChannel 581
<$nopage>Secure Copy Protocol 1342
11n Mode parameter 1862 128-bit 354 802.11a (or 802.11b/g) Global Parameters page 1859 802.11a (or 802.11b/g) Network Status parameter 1859, 1865 802.11g Support parameter 1859 802.11h Global Parameters page 1865 802.11h, described 1855 802.11n 1854
devices 1854 802.1x 1447 802.1X authentication for access points 664
described 664
A
ABRs 1145 access control entries 1364
See ACEs 1364 access groups 1375
Layer 3 1375 access groups, applying IPv4 ACLs to interfaces 1386 access lists 1369
See ACLs 1369 Access Point Authentication 664 Access Point Communication Protocols 640 access point core dumps, uploading 675
using the GUI 675 Access Point Retransmission Interval 652 Access Point Retry Count 652 access points 640, 641, 683, 1881
assisted roaming 1881 priming 640 supporting oversized images 683

access points (continued) viewing join information 641 using the GUI 641
access template 1963 accounting 1281, 1290, 1315
with RADIUS 1315 with TACACS+ 1281, 1290 accounting, defined 1281 ACEs 1364 Ethernet 1364 IP 1364 ACLs 918, 1364, 1369, 1370, 1372, 1373, 1374, 1375, 1376, 1378, 1383,
1384, 1385, 1386, 1390, 1396, 1398, 1400, 1409, 1410, 1411 applying 918, 1384, 1386, 1409, 1410, 1411
on bridged packets 1410 on multicast packets 1411 on routed packets 1410 on switched packets 1409 time ranges to 1384 to an interface 1386 to QoS 918 comments in 1398 compiling 1400 defined 1369 examples of 1400 extended IPv4 1369, 1378 creating 1378 matching criteria 1369 interface 1375 IP 1369, 1370, 1376, 1383 implicit deny 1383 implicit masks 1370 matching criteria 1369 undefined 1376 IPv4 1369, 1375, 1385, 1386 applying to interfaces 1386 creating 1369 interfaces 1375 matching criteria 1369 numbers 1369 terminal lines, setting on 1385 unsupported features 1369 Layer 4 information in 1375 logging messages 1372 matching 1375

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-1

INDEX

ACLs (continued) monitoring 1396 port 1364 precedence of 1364 QoS 918 router 1364 router ACLs and VLAN map configuration guidelines 1374 standard IPv4 1369, 1376 creating 1376 matching criteria 1369 support in hardware 1372 time ranges to 1375 types supported 1364 unsupported features 1369 IPv4 1369 using router ACLs with VLAN maps 1374 VLAN maps 1373, 1390 configuration guidelines 1373 configuring 1390
acronyms 57 ACS 431 activation, AP-count 1836 activation, base 1835 active link 117, 614, 626 active links 612 adding 1447, 1449 Additional References 2139, 2159, 2166, 2187, 2197
VLAN trunks 2187 VLANs 2159, 2166 voice VLANs 2197 VTP 2139 address aliasing 170 address formats 354 address resolution 1776 Address Resolution Protocol 1117 See ARP 1117 addresses 168, 354, 500, 1775, 1776, 1788 dynamic 500, 1775
accelerated aging 500 default aging 500 defined 1775 learning 1775 IPv6 354 MAC, discovering 1776 multicast 168, 500 group address range 168 STP address management 500 static 1788 adding and removing 1788 adjacency tables, with CEF 1235 administrative distances 1147, 1253 defined 1253 OSPF 1147 aggregatable global unicast addresses 354 aggregate addresses, BGP 1193 aggregate-port learners 599

aging time 513, 545, 1783 accelerated 513, 545 for MSTP 545 for STP 513 MAC address table 1783
All APs page 1082 alternate 492
port 492 AnchorTime parameter 1074 and ARP 2075 and CDP 2075 and IPv6 354 and routing 117 and routing protocols 117 and SSH 1342 and switch stacks 359 AP Mode parameter 1082 applications 356 area border routers 1145
See ABRs 1145 area routing 1201
IS-IS 1201 ARP 1124, 1126, 1776
defined 1776 encapsulation 1126 static cache configuration 1124 table 1776
address resolution 1776 AS-path filters, BGP 1174 assigning address 360 assigning information 1722, 1723, 1724
member number 1722 priority value 1723 provisioning a new member 1724 assigning IPv4 and IPv6 addresses to 363 assigning IPv6 addresses to 360 attributes 1318, 1319 vendor-proprietary 1319 vendor-specific 1318 attributes, RADIUS 1318, 1319, 1324 vendor-proprietary 1319, 1324 vendor-specific 1318 authenticating to 1330, 1331 boundary switch 1330 KDC 1330 network services 1331 authentication 1168, 1281, 1285, 1286, 1308, 1310, 1335 EIGRP 1168 local mode with AAA 1335 RADIUS 1308, 1310
key 1308 login 1310 TACACS+ 1281, 1285, 1286 defined 1281 key 1285 login 1286

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-2

INDEX

authentication key 1285 authentication keys, and routing protocols 1255 authentication, defined 1281 authoritative time source, described 1772 authorization 1281, 1289, 1314
with RADIUS 1314 with TACACS+ 1281, 1289 authorization, defined 1281 auto mode 153 auto-advise 1717 auto-copy 1717 auto-extract 1717 auto-MDIX 112 configuring 112 described 112 auto-MDIX, configuring 112 auto-QoS 1016 Auto-QoS 1020 monitoring 1020 Auto-RP 242, 251 benefits 242 auto-upgrade 1717 autoconfiguration 356 automatic 1445 automatic advise (auto-advise) in switch stacks 1717 automatic copy (auto-copy) in switch stacks 1717 automatic creation of 581, 584 automatic extraction (auto-extract) in switch stacks 1717 automatic QoS 1014 See QoS 1014 automatic upgrades (auto-upgrade) in switch stacks 1717 automatic upgrades with auto-upgrade 1717 autonegotiation 2088 mismatches 2088 Autonomous Access Points Converted to Lightweight Mode 674 autonomous systems, in BGP 1172 average rate shaping 926
B
BackboneFast 560, 570 described 560 enabling 570
backup 492 port 492
backup interfaces 612 See Flex Links 612
bandwidth 927, 977 bandwidth percent 927 banners 1775, 1781, 1782
configuring 1781, 1782 login 1782 message-of-the-day login 1781
default configuration 1775 Beacon Period parameter 1859

Berkeley r-tools replacement 1342 BGP 1171, 1172, 1173, 1174, 1175, 1176, 1177, 1181, 1190, 1193, 1195
aggregate addresses 1193 CIDR 1176 community filtering 1190 default configuration 1177 described 1171 enabling 1181 multipath support 1173 neighbors, types of 1172 path selection 1173 prefix filtering 1175 resetting sessions 1172 route maps 1174 route reflectors 1176 routing domain confederation 1195 Version 4 1172 binding configuration 1445 automatic 1445 manual 1445 binding database 1428 address, DHCP server 1428
See DHCP, Cisco IOS server database 1428 binding physical and logical interfaces 580 binding table 1445 bindings 1428, 1445
address, Cisco IOS DHCP server 1428 IP source guard 1445 blocking 497 state 497 boot network command 2001, 2017 bootstrap router (BSR), described 242 boundary switch 1330 BPDU 492, 493, 533, 555 contents 493 filtering 555 RSTP format 533 bridge identifier (bridge ID) 494 bridge protocol data units 492 bridged NetFlow 40 bridged packets, ACLs on 1410 broadcast flooding 1118 broadcast packets 1118 directed 1118 flooded 1118 broadcast storms 1118 broadcast traffic 2075 BSRs 264 candidate 264 bundle files 2061 displaying contents of 2061 downloading 2061 uploading 2061

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-3

INDEX

C
CA trustpoint 1350, 1352 configuring 1352 defined 1350
Caching Source-Active State: Example command 1110 Call Admission Control 970 CCX 702
link test 702 CCX Layer 2 client roaming 1881
described 1881 CDP 123, 152, 933
and trusted boundary 933 defined with LLDP 123 power negotiation extensions 152 CDP with power consumption, described 152 CDP with power negotiation, described 152 CEF 367, 1235 distributed 1235 IPv6 367 CEFv6 367 Change Rules Priority parameter 1687 changing the default for lines 1273 Channel Announcement parameter 1865 Channel Assignment Leader parameter 1074 Channel Assignment Method parameter 1073 channel groups 580 binding physical and logical interfaces 580 numbering of 580 Channel Scan Duration parameter 1065 CipherSuites 1351 Cisco 3300 Series Mobility Services Engine (MSE), using with
wIPS 1693 Cisco 7960 IP Phone 2190 Cisco Discovery Protocol (CDP) 769 Cisco Express Forwarding 1235
See CEF 1235 Cisco Group Management Protocol 298
See CGMP 298 Cisco intelligent power management 152 Cisco IOS DHCP server 1428
See DHCP, Cisco IOS DHCP server 1428 Cisco IOS IP SLAs 804 Cisco IP Phone Data Traffic 2191 Cisco IP Phone Voice Traffic 2191 Cisco Networking Services 752 Cisco Workgroup Bridges 685 CIST regional root 524, 525
See MSTP 524, 525 CIST root 525
See MSTP 525 civic location 125 class 942 class maps for QoS 918, 919
described 918, 919 class-based unconditional packet marking 950

classification 915, 916, 918 device specific 916 Layer 2 915 Layer 3 915
classless routing 1115 CleanAir 55
components 55 clearing 313
caches 313 databases 313 tables 313 CLNS 1200 See ISO CLNS 1200 clock 1771 See system clock 1771 CNS 752 CoA Request Commands 1302 collect parameters 24 command modes 1996 global configuration 1996 commands, setting privilege levels 1272 comments 1996, 2002 adding to configuration file 1996 adding to configuration files 2002 communication, global 1308, 1317 communication, per-server 1308 CONFIG_FILE environment variable 2025 specifying 2025 configurable leave timer, IGMP 173 configuration archive 2037 creating 2037 configuration commands 2001, 2017 loading from the network 2001, 2017 Configuration Engine 750 restrictions 750 configuration examples 1328 Configuration Examples 77 Configuration Examples command 379 Configuration Examples for Configuring EtherChannels command 606 Configuration Examples for Configuring MLD Snooping Queries
command 351 Configuration Examples for Configuring MSDP command 1109 Configuration Examples for Configuring SDM Templates
command 1966 Configuration Examples for Setting Passwords and Privilege Levels
command 1275 configuration files 1269, 1995, 1996, 1997, 2000, 2001, 2004, 2005, 2007,
2009, 2014, 2017, 2018, 2019, 2021, 2025, 2027, 2029, 2055, 2145 compressing 2014 CONFIG_FILE environment variable 2025 copying 1997, 2004, 2009, 2018, 2019, 2021
between Flash memory devices 2019 from a network server 1997, 2021 from a TFTP server 2009 from Flash memory 2018 to a TFTP server 1997, 2004

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-4

INDEX

configuration files (continued) copying (continued) to an rcp server 1997 displaying 2001 information 2001 downloading 2001, 2029 host configuration files 2029 failing to load 2027 host 2029 See host configuration file 2029 invalid combinations when copying 2055 larger than NVRAM 2000, 2014 loading from the network 2001, 2017 location 1996 modifying 1996 network 2001 See network configuration file 2001 password recovery disable considerations 1269 running 2005, 2007 See also running configuration 2005, 2007 storing in Flash memory 2000 types 1995
configuration guidelines 375, 1352, 1447 configuration guidelines, multi-VRF CE 1218 Configure RF Group Mode 1066
Using GUI 1066 configuring 112, 147, 365, 592, 1285, 1286, 1289, 1290, 1308, 1310, 1314,
1315, 1317, 1331, 1342, 1352, 1355, 1358, 1722, 1723, 1965 accounting 1290, 1315 authentication 1310 authentication key 1285 authorization 1289, 1314 communication, global 1308, 1317 communication, per-server 1308 Layer 2 interfaces 592 login authentication 1286 member number 1722 multiple UDP ports 1308 on Layer 2 interfaces 592 priority value 1723 Configuring a Default MDSP Peer: Example command 1109 Configuring a Multicast Router Port: Example command 352 configuring a secure HTTP client 1358 configuring a secure HTTP server 1355 Configuring a static IP address 675 Configuring a Static Multicast Group: Example command 351 Configuring CleanAir 68 Using the GUI 68 Configuring Default Router Preference: Example command 379 Configuring Interference Reporting 62, 65 2.4-GHz devices 62 5-GHz devices 65 Configuring IPv4 and IPv6 Protocol Stacks: Example command 380 Configuring IPv6 Addressing and Enabling IPv6 Routing: Example
command 379 Configuring IPv6 ICMP Rate Limiting: Example command 381

Configuring LACP Hot-Standby Ports: Example 607 Configuring Layer 2 EtherChannels: Examples command 606 Configuring Layer 3 EtherChannels: Examples command 607 Configuring MLD Snooping Queries: Example command 352 configuring multicast VRFs 1225 Configuring RIP for IPv6: Example command 381 Configuring SDM templates: Examples: command 1966 Configuring Spectrum Expert 70
Using the GUI 70 Configuring Static Routing for IPv6: Example command 381 Configuring the Switch for Vendor-Proprietary RADIUS Server
Communication: Example command 1324 Configuring the Switch to Use Vendor-Specific RADIUS Attributes:
Examples command 1323 Configuring VACL Logging 1395 Control and Provisioning of Wireless Access Points protocol
(CAPWAP) 640 described 640 controllers 640 discovery process 640 Controlling Source Information that Your Switch Forwards: Example
command 1110 Controlling Source Information that Your Switch Originates: Example
command 1110 Controlling Source Information that Your Switch Receives: Example
command 1110 copy rcp command 2021 copy rcp running-config command 2010, 2012 copy rcp startup-config command 2010, 2012 copy running-config rcp command 2005 copy running-config tftp command 2004 copy startup-config command 2015 copy startup-config rcp command 2005, 2007 copy startup-config tftp command 2004 copy tftp startup-config command 2009 corrupted software, recovery steps with Xmodem 2081 CoS 913, 2195
in Layer 2 frames 913 override priority 2195 CoS-to-DSCP map for QoS 935 country codes 695 described 695 Country Codes 696 Coverage Exception Level per AP parameter 1077 coverage hole detection 1076, 1077 configuring per controller 1076, 1077
using the GUI 1076, 1077 coverage hole detection and correction 1062 crashinfo file 2078 crashinfo, description 2078 credentials 1328 cross-stack EtherChannel 578, 579, 590, 592, 595
configuring 592 on Layer 2 interfaces 592
described 578 illustration 578

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-5

INDEX

cross-stack UplinkFast, STP 558, 559 Fast Uplink Transition Protocol 558 normal-convergence events 559
cross-stack UplinkFast,STP 557, 559 described 557 fast-convergence events 559
custom location 125 customer edge devices 1215 customizeable web pages, web-based authentication 1564
D
Data Rates parameter 1859 daylight saving time 1778 DCA Channel Sensitivity parameter 1074 DCA Channels parameter 1074 debugging 2078, 2091, 2098
enabling all system diagnostics 2098 redirecting error message output 2091 using commands 2078 default configuration 127, 174, 175, 246, 301, 343, 344, 360, 375, 503,
535, 589, 616, 632, 835, 1177, 1217, 1264, 1285, 1305, 1352, 1774, 1775, 1776 banners 1775 BGP 1177 DNS 1774 EtherChannel 589 Flex Links 616 IGMP 174 IGMP filtering 175 IGMP snooping 175, 343, 344 IGMP throttling 175 IP multicast routing 301 IPv6 360 LLDP 127 MAC address table 1776 MAC address-table move update 616 MSTP 535 multi-VRF CE 1217 password and privilege level 1264 PIM 246 RADIUS 1305 RSPAN 835 SPAN 835 SSL 1352 STP 503 TACACS+ 1285 UDLD 632 default enable password 664 default gateway 1128 default networks 1240 default router preference 355 See DRP 355 default router preference (DRP) 355 default routes 1240

default routing 1113 default setting 117 default settings 31 default web-based authentication configuration 1567
802.1X 1567 default wireless QoS configuration 936 default-group access point group 2224 defined 353, 751, 752, 769, 1281, 1350
Event Service 751 NameSpace Mapper 752 defining AAA server groups 1312 definition 2142 VLAN 2142 deletion 2150 VLAN 2150 described 112, 117, 355, 356, 578, 581, 1328, 1349, 1352, 1445, 1985, 2075,
2079 designated 492
port 492 switch 492 desktop template 1719 destination-IP address-based forwarding 587 destination-IP address-based forwarding, EtherChannel 586 destination-MAC address forwarding 586 destination-MAC address forwarding, EtherChannel 586 Detect and Report Adhoc Networks parameter 1676 detecting indirect link failures,STP 560 device 499 root 499 device priority 511, 543 MSTP 543 STP 511 device stack 770 devices supported 87, 151 DHCP 356, 1423, 1431 DHCP for IPv6 356
See DHCPv6 356 enabling 1423, 1431
relay agent 1431 server 1423 DHCP for IPv6 356 See DHCPv6 356 dhcp option 43 674 dhcp option 60 674 DHCP option 82 1425, 1432, 1438, 2204, 2205 described 2204 displaying 1438 example 2205 forwarding address, specifying 1432 helper address 1432 overview 1425 DHCP server port-based address allocation 1439, 1441 default configuration 1439 enabling 1441 DHCP servers 2203 internal 2203

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-6

INDEX

DHCP snooping 1424, 1425, 1445 accepting untrusted packets form edge switch 1424 option 82 data insertion 1425 trusted interface 1424 untrusted messages 1424
DHCP snooping binding database 1428, 1429, 1434, 1439 adding bindings 1439 binding file 1428, 1429 format 1429 location 1428 configuration guidelines 1434 configuring 1439 described 1428 enabling 1439
DHCPv6 356, 375, 376, 378 configuration guidelines 375 default configuration 375 described 356 enabling client function 378 enabling DHCPv6 server function 376
Differentiated Services (Diff-Serv) architecture 912 Differentiated Services Code Point 914 Diffusing Update Algorithm (DUAL) 1160 directed roam request 1882 directories 2053, 2054, 2055
changing 2053 creating 2054 displaying the working 2053 removing 2055 disabled 498 state 498 disabling 350 disabling recovery of 1269 displaying 1359, 2092 displaying crash information 2078 Displaying IPv6: Example command 381 Displaying SDM Templates: Examples: command 1966 Distance Vector Multicast Routing Protocol 298 See DVMRP 298 distance-vector protocols 1113 distribute-list command 1253 DNS 355, 1774, 1780 default configuration 1774 in IPv6 355 overview 1774 setting up 1780 DNS-based SSM mapping 285 domain name server (DNS) discovery 640 Domain Name System 1774 See DNS 1774 domain names 1774, 2125 DNS 1774 domains, ISO IGRP routing 1201 DRP 355, 365 configuring 365 described 355

DRP (continued) IPv6 355
DSCP 914 DSCP maps 935 DSCP-to-CoS map for QoS 936 DTLS data encryption. See <Default Para Font>data encryption 648 DTPC Support parameter 1859 DUAL finite state machine, EIGRP 1161 dual-rate three-color policing 925 DVMRP 317
mrinfo requests, responding to 317 neighbors 317
displaying information 317 tunnels 317
displaying neighbor information 317 dynamic addresses 500
See addresses 500 dynamic channel assignment (DCA) 1061
described 1061 dynamic routing 1113 Dynamic Threshold and Scaling 930 dynamic transmit power control, configuring 1859
E
EDCA Profile parameter 1939 EDRRM 59 effects on 359
IPv6 routing 359 egress priority queues 929 EIGRP 1160, 1162, 1166, 1168, 1169
authentication 1168 components 1160 definition 1160 interface parameters, configuring 1166 monitoring 1169 stub routing 1162 EIGRP IPv6 357 EIGRP IPv6 Commands 357 ELIN location 125 enable 1266, 2091 Enable Coverage Hole Detection parameter 1076 Enable Low Latency MAC parameter 1939 enable password 1267 enable secret 1267 enable secret password 1267 enabling 348, 1447, 1449 enabling all system diagnostics 2098 enabling and disabling 344 Enabling CleanAir 60, 63 2.4-GHz 60 5-GHz 63 enabling client function 378 Enabling DHCPv6 Client Function: Example command 381 enabling DHCPv6 server function 376 Enabling DHCPv6 Server Function: Example command 380

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-7

INDEX

Enabling MLD Immediate Leave: Example command 352 encrypting 1267 encryption for passwords 1267 encryption methods 1341 encryption, CipherSuite 1351 Enhanced IGRP 1160
See EIGRP 1160 Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 357
EIGRP IPv6 Commands 357 Router ID 357 enhanced neighbor list 1881 described 1881 request (E2E) 1881 enhanced PoE 152 erase command 2025 erase startup-config command 2024 EtherChannel 578, 580, 581, 582, 583, 584, 585, 586, 588, 589, 590, 592,
595, 596, 598, 599, 600, 601, 602, 603, 604, 1119 automatic creation of 581, 584 channel groups 580
binding physical and logical interfaces 580 numbering of 580 configuration guidelines 590 configuring 592, 595 Layer 2 interfaces 592 Layer 3 595 default configuration 589 extended load balancing 598 forwarding methods 586, 596, 598 IEEE 802.3ad, described 584 interaction 590 with STP 590 LACP 584, 585, 600, 601, 602, 603, 604 hot-standby ports 600 interaction with other features 585 max bundles 601 min links 602 modes 584 port priority 604 system priority 603 Layer 3 interface 1119 load balancing 586, 596 logical interfaces, described 580 PAgP 581, 582, 583, 584, 599 about aggregate-port learners 583 about learn method and priority 583 aggregate-port learners 599 described 581 interaction with other features 584 learn method and priority configuration 599 modes 582 port-channel interfaces 580 numbering of 580 stack changes, effects of 588 EtherChannel | interaction 590 with VLANs 590

EtherChannel failover 580 EtherChannel guard 562, 571
described 562 enabling 571 EtherChannels 578, 592, 1447 Ethernet management port 117, 118, 119 active link 117 and routing 117 and routing protocols 117 default setting 117 described 117 for network management 117 supported features 119 unsupported features 119 Ethernet management port configuration 120 Ethernet management port, internal 117, 119 and routing 117 and routing protocols 117 unsupported features 119 Ethernet VLAN 2147 EUI 354 Event Service 751 Example for Configuring Auto-MDIX command 114 Example for Configuring Layer 3 Interfaces command 108 Example for Performing a Traceroute to an IP Host command 2097 Example for Pinging an IP Host command 2096 Examples 996, 997, 998, 999, 1004, 1006, 1007, 1008 acl classification 996 average rate shaping 1004 CoS Layer 2 classification 997 DSCP classification 997 hierarchical classification 998 IP precedence classification 997 policing 1006 policing supported units 1007 queue-limit policy 1004 single-rate two-color policing 1007 table map marking 1008 VLAN ID Layer 2 classification 997 voice and video classification 999 Examples for controlling switch access with RADIUS 1323 executing 2089, 2090 exiting 1274 Expiration Timeout for Rogue AP and Rogue Client Entries
parameter 1675 export formats 26 exporters 25 extended crashinfo file 2078 extended load balancing 598 extended system ID 494, 506, 522
MSTP 522 STP 494, 506 extended universal identifier 354 See EUI 354 extended-range VLAN 2153 extended-range VLAN configuration guidelines 2146

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-8

extended-range VLANs 2153 external neighbors, BGP 1172
F
Fa0 port 117 See Ethernet management port<$nopage> 117
fallback bridging 492, 502 STP 492 keepalive messages 492 VLAN-bridge STP 502
false RPs 257 FAQ 78 Fast Uplink Transition Protocol 558 fastethernet0 port 117
See Ethernet management port<$nopage> 117 feature history 1051
auto-QoS 1051 feature information 220, 279, 296, 319, 2140, 2160, 2188, 2198
IGMP 220 IP Multicast 319 PIM 279 SSM 296 VLAN trunks 2188 VLANs 2160 voice VLAN 2198 VTP 2140 feature limitations 359 features not supported 358 fiber-optic, detecting unidirectional links 630 file system 2049, 2052, 2055 displaying available file systems 2049 displaying file information 2052 local file system names 2049 network file system names 2055 setting the default 2052 files 2055, 2057, 2078 copying 2055 crashinfo, description 2078 deleting 2057 tar 2057
creating 2057 displaying the contents of 2057 extracting 2057 filtering 1388 non-IP traffic 1388 filters, IP 1363 See ACLs, IP [filters 1363 IP 1363
zzz] 1363 flash device, 2049
number of 2049 flash memory 2079 Flash memory 2000
storing configuration files 2000

INDEX
Flash memory devices 2019 files 2019 copying 2019
flash: file system 2049 Flex Links 612, 613, 616, 617, 619, 621, 622, 623
configuring 616, 617 configuring VLAN load balancing 619 default configuration 616 description 612 link load balancing 613 monitoring 621 preemption scheme 617 preferred VLAN example 623 switchport backup example 622
forced preemption mode example 622 VLAN load balancing examples 622 Flex Links failover 613 flow exporter 33 flow monitor 36 flow record 23, 32 for IPv6 357 for network management 117 forward-delay time 513, 545 MSTP 545 STP 513 forwarding 360, 498 state 498 forwarding methods 586, 596, 598 Fragmentation Threshold parameter 1859 FTP Server 2029 configuration files, downloading 2029
G
General (controller) page 1068 configuring an RF group 1068
general query 625 Generating IGMP Reports 614 geo location 125 global configuration mode 1996
entering 1996 Global configuration templates 1015 global leave, IGMP 206 Group Mode parameter 1084
H
hello time 512, 544 MSTP 544 STP 512
hierarchical classification 917 hierarchical policies 998 Hierarchical QoS 911 hierarchical shaping 926 high-power devices operating in low-power mode 152

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches) IN-9

INDEX

host configuration files 2001, 2011, 2013, 2029 comparison with network configuration files 2001 copying from an rcp server to startup configuration (example) 2011, 2013 description 2001 loading from a server 2029
host signalling 169 hot-standby ports 600 HTTP secure server 1349, 1352 HTTP(S) Over IPv6 358 HTTPS 1349, 1350, 1352, 1355
configuring 1355 described 1349, 1352 self-signed certificate 1350 hub 118
I
IBPG 1170 ICMP 355, 1362, 1373, 2076
IPv6 355 time-exceeded messages 2076 traceroute and 2076 unreachable messages 1362 unreachables and ACLs 1373 ICMP Echo operation 817 configuring 817 IP SLAs 817 ICMP ping 2075, 2089 executing 2089 overview 2075 ICMP Router Discovery Protocol 1128 See IRDP 1128 ICMPv6 355 Identifying the RADIUS Server Host: Examples command 1323 identifying the server 1285, 1308 IEEE 802.1Q tagging 2179 IEEE 802.1s 521 See MSTP 521 IEEE 802.3ad, described 584 IEEE power classification levels 152 IGMP 168, 169, 170, 171, 172, 173, 174, 176, 179, 181, 183, 185, 200, 203,
205, 206, 207, 211, 348, 350, 351 configurable last member query count 203
enabling 203 configurable leave timer 173, 200
described 173 enabling 200 configuring the switch 176, 185 as a member of a group 176 statically connected member 185 default configuration 174 flooded multicast traffic 205, 206, 207 controlling the length of time 205 disabling on an interface 207 global leave 206

IGMP (continued) flooded multicast traffic (continued) recovering from flood mode 206 host-query interval, modifying 179 join messages 170 leave processing, enabling 348 leaving multicast group 172 maximum query response time value 183 multicast reachability 176 pruning groups 183 queries 171 query timeout 181 query timeout 181 report suppression 173, 211, 350 described 173 disabling 211, 350 snooping 351 supported versions 168 Version 1 169 Version 2 169 Version 3 169
IGMP filtering 174, 175 default configuration 175 described 174
IGMP groups 190, 191 configuring filtering 191 setting the maximum number 190
IGMP Helper 241 IGMP Immediate Leave 199, 200
configuration guidelines 200 enabling 199 IGMP profile 187, 188 applying 188 configuration mode 187 IGMP robustness-variable 202 IGMP snooping 168, 169, 170, 172, 173, 175, 193, 194, 195, 209, 213, 343,
344, 351 and address aliasing 170 and stack changes 173 default configuration 175, 343, 344 definition 169 enabling and disabling 193, 344 global configuration 193 Immediate Leave 172 in the switch stack 173 method 195 monitoring 213, 351 querier 209
configuration guidelines 209 configuring 209 supported versions 168 VLAN configuration 194 IGMP throttling 174, 175, 191, 214 configuring 191 default configuration 175 described 174

IN-10

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IGMP throttling (continued) displaying action 214
IGMPv3 169 Immediate Leave, IGMP 172, 348
described 172 enabling 348 in IPv6 355 inline power 711 input, output parameters 960 inter-subnet roaming 1881 described 1881 Inter-Switch Link 824 See ISL 824 inter-VLAN routing 1112 interaction with other features 584, 585 interface 148, 159 interface configuration 39 interfaces 112 auto-MDIX, configuring 112 interference 1061 Interference threshold parameter 1064 Interior Gateway Protocol 1145 See IGP 1145 internal BGP 1170 See IBGP 1170 internal neighbors, BGP 1172 internal power supplies 147 See power supplies<$nopage> 147 Internet Group Management Protocol 298 See IGMP 298 Internet Protocol version 6 353 See IPv6 353 Interval parameter 1074 Intrusion Detection System 825 See IDS appliances 825 inventory management TLV 125 Invoke Channel Update Now button 1073 Invoke Power Update Now button 1070 IP ACLs 918, 1371 for QoS classification 918 named 1371 IP addresses 354, 1120, 1121, 1135, 1776 128-bit 354 classes of 1121 discovering 1776 for IP routing 1120 IPv6 354 monitoring 1135 IP addresses and subnets 2075 IP broadcast address 1133 IP directed broadcasts 1130 IP multicast boundaries 300 IP multicast boundary 262, 310 IP multicast group addresses 168

INDEX
IP multicast routing 168, 238, 241, 242, 243, 259, 267, 273, 298, 301, 303, 304, 305, 307, 309, 314
addresses 168 all-hosts 168 all-multicast-routers 168 host group address range 168
Auto-RP 267 using with BSR 267
bootstrap router 242, 267 overview 242 using with Auto-RP 267
configuring 301, 304, 305 basic multicast routing 301 IP multicast forwarding 304 IP static multicast route 305
default configuration 301 enabling 303
PIM mode 303 group-to-RP mappings 241, 242
Auto-RP 241 BSR 242 MBONE 307, 309 described 307 enabling sdr listener support 307 limiting sdr cache entry lifetime 309 SAP packets for conference session announcement 307 multicast forwarding, described 243 PIMv1 and PIMv2 interoperability 238 protocol interaction 298 RP 259, 267, 273 configuring PIMv2 BSR 259 monitoring mapping information 273 using Auto-RP and BSR 267 stacking 301 active switch functions 301 stack member functions 301 statistics, displaying system and network 314 IP phones 932 ensuring port security with QoS 932 trusted boundary for QoS 932 IP precedence 914 IP routing 1136 enabling 1136 IP SLA 805, 807, 808, 809, 820 configuration guidelines 808 monitoring 820 responder 805, 809 described 805 enabling 809 threshold monitoring 807 IP SLAs 804, 805, 806, 807, 809, 814, 817 benefits 804 configuration 809 ICMP echo operation 817 measuring network performance 805 multi-operations scheduling 806

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-11

INDEX

IP SLAs (continued) response time 806 SNMP support 804 supported metrics 804 UDP jitter operation 807, 814
IP source guard 1445, 1447, 1449 802.1x 1447 binding configuration 1445 automatic 1445 manual 1445 binding table 1445 configuration guidelines 1447 described 1445 DHCP snooping 1445 enabling 1447, 1449 EtherChannels 1447 port security 1447 routed ports 1447 static bindings 1447, 1449 adding 1447, 1449 static hosts 1449 TCAM entries 1447 trunk interfaces 1447 VRF 1447
IP traceroute 2076, 2090 executing 2090 overview 2076
IP unicast routing 354, 1112, 1113, 1115, 1117, 1118, 1119, 1120, 1121, 1123, 1128, 1130, 1133, 1136, 1234, 1238, 1240, 1241, 1251, 1253, 1255
administrative distances 1253 authentication keys 1255 broadcast 1118, 1133
address 1133 flooding 1118 packets 1118 storms 1118 classless routing 1115 configuring static routes 1238 default 1113, 1128, 1240 gateways 1128 networks 1240 routes 1240 routing 1113 directed broadcasts 1130 dynamic routing 1113 enabling 1136 EtherChannel Layer 3 interface 1119 inter-VLAN 1112 IP addressing 1120, 1121 classes 1121 configuring 1120 IPv6 354 IRDP 1117 Layer 3 interfaces 1119 MAC address and IP address 1117

IP unicast routing (continued) passive interfaces 1251 protocols 1113 distance-vector 1113 link-state 1113 proxy ARP 1117 redistribution 1241 routed ports 1119 See also RIP[IP unicast routing 1113 zzz] 1113 static routing 1113 steps to configure 1120 subnet mask 1121 subnet zero 1123 unicast reverse path forwarding 1234 with SVIs 1119
IP-precedence-to-DSCP map for QoS 935 IPv4 ACLs 1375, 1376, 1378, 1381, 1386
applying to interfaces 1386 extended, creating 1378 interfaces 1375 named 1381 standard, creating 1376 IPv6 339, 353, 354, 355, 356, 357, 358, 359, 360, 367, 374, 904 address formats 354 addresses 354 and switch stacks 359 applications 356 assigning address 360 autoconfiguration 356 CEFv6 367 default configuration 360 default router preference (DRP) 355 defined 353 Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 357
EIGRP IPv6 Commands 357 Router ID 357 feature limitations 359 features not supported 358 forwarding 360 ICMP 355 monitoring 374 neighbor discovery 355 OSPF 357 path MTU discovery 355 SDM templates 339 stack master functions 359 Stateless Autoconfiguration 356 supported features 354 switch limitations 359 understanding static routes 356 IPv6 on 359 IPv6 routing 359 IRDP 1117, 1128 configuring 1128 definition 1117

IN-12

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IS-IS 1201 area routing 1201 system routing 1201
ISL 354 and IPv6 354
ISO CLNS 1200, 1201 dynamic routing protocols 1201 OSI standard 1200
J
Japanese country codes 696 join messages, IGMP 170
K
KDC 1328, 1330 described 1328 See also Kerberos<$nopage>[KDC 1328 zzz] 1328
keepalive messages 492 Kerberos 1328, 1330, 1331
authenticating to 1330, 1331 boundary switch 1330 KDC 1330 network services 1331
configuration examples 1328 configuring 1331 credentials 1328 described 1328 KDC 1328 operation 1330 realm 1328 server 1328 switch as trusted third party 1328 terms 1328 TGT 1328 tickets 1328 key 1285, 1308 key distribution center 1328 See KDC<$nopage> 1328
L
LACP 579, 584, 585, 592, 600, 601, 602, 603, 604 hot-standby ports 600 interaction with other features 585 max bundles 601 min links 602 modes 584 port priority 604 system priority 603
Layer 2 916 Layer 2 EtherChannel configuration guidelines 591 Layer 2 interface modes 2171

INDEX
Layer 2 interfaces 592 Layer 2 NetFlow 41 Layer 2 traceroute 2075
and ARP 2075 and CDP 2075 broadcast traffic 2075 described 2075 IP addresses and subnets 2075 MAC addresses and VLANs 2075 multicast traffic 2075 multiple devices on a port 2075 unicast traffic 2075 usage guidelines 2075 Layer 3 915 Layer 3 EtherChannel configuration guidelines 592 Layer 3 interfaces 360, 363, 1119 assigning IPv4 and IPv6 addresses to 363 assigning IPv6 addresses to 360 types of 1119 Layer 3 packets, classification methods 914 Layer 4 915 Leaking IGMP Reports 614 learn method and priority configuration 599 leave processing, enabling 348 license ap-count activation 1836 license base image activation 1835 lightweight mode, reverting to autonomous mode 674 limiting the services to the user 1289, 1314 Link Failure, detecting unidirectional 528 Link Latency 702 link local unicast addresses 354 link redundancy 612 See Flex Links 612 link test 702 types of packets 702 link-state protocols 1113 listening 498 state 498 LLDP 123, 127, 129 configuring 127
default configuration 127 enabling 127 overview 123 switch stack considerations 123 transmission timer and holdtime, setting 129 LLDP-MED 124, 131 configuring 131
TLVs 131 overview 124 supported TLVs 124 load balancing 586, 596 load balancing advantages 587 load sharing 2172, 2180, 2184 trunk ports 2172 local mode with AAA 1335 local SPAN 826

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-13

INDEX
location TLV 125 logging into 1274 logging messages, ACL 1372 logical interfaces, described 580 login 1286, 1310 login authentication 1286, 1310
with RADIUS 1310 with TACACS+ 1286 login banners 1775 LWAPP-enabled access points 675, 677 reverting to autonomous mode 677 sending crash information to controller 675
M
MAC address of 1721 MAC address of access point 675
displayed on controller GUI 675 MAC address-table move update 614, 616, 619, 621
configuration guidelines 616 configuring 619 default configuration 616 description 614 obtain and process messages 621 MAC addresses 1117, 1775, 1776, 1783, 1788 aging time 1783 and VLAN association 1776 building the address table 1775 default configuration 1776 discovering 1776 dynamic 1775
learning 1775 IP address association 1117 static 1788
characteristics of 1788 MAC addresses and VLANs 2075 MAC extended access lists 1362, 1389
applying to Layer 2 interfaces 1362, 1389 MAC/PHY configuration status TLV 123 management address TLV 123 managing 147 managing switch stacks 1720 manual 1445 manual upgrades with auto-advise 1717 mapping tables for QoS 935, 936
configuring 935, 936 CoS-to-DSCP 935 DSCP-to-CoS 936 IP-precedence-to-DSCP 935
marking 922, 960 action in policy map 960 packet header 922 router specific information 922 table map 922

match 23 datalink 23 flow 23 interface 23 ipv4 23 ipv6 23 transport 23
match parameters 23 max bundles 601 maximum aging time 513, 546
MSTP 546 STP 513 maximum hop count, MSTP 547 maximum-paths command 1237 MBONE 307 MCS data rates 1862 mDNS 322 mDNS gateway 323 mDNS Gateway 323 mDNS-SD 322 mDNS-SD, wireless 322 member number 1722 merged 1711 messages, to users through banners 1775 metric translations, between routing protocols 1246 metrics, in BGP 1174 MFIB 299 Min Failed Client Count per AP parameter 1077 min links 602 mirroring traffic for analysis 825 mismatches 2088 mismatches, autonegotiation 2088 MLD Messages 340 MLD Queries 341 MLD Reports 342 MLD Snooping 340 MLDv1 Done message 342 mobility groups 1057 difference from RF groups 1057 modes 582, 584 Modular QoS CLI 914 monitor intervals, configuring using the GUI 1065 monitoring 44, 155, 212, 213, 214, 273, 294, 313, 316, 351, 374, 621, 820,
826, 994, 1135, 1158, 1169, 1236, 1359, 1396, 1397, 2089, 2137, 2196 access groups 1396 CEF 1236 EIGRP 1169 Flex Links 621 IGMP 212, 213, 351 snooping 213, 351 IP 313, 1135 address tables 1135 multicast routing 313 IP multicast routing 316 IP SLA operations 820

IN-14

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

INDEX

monitoring (continued) IPv4 ACL configuration 1396 IPv6 374 multicast router interfaces 214 network traffic for analysis with probe 826 OSPF 1158 QoS 994 RP mapping information 273 SFP status 2089 SSM mapping 294 VLAN 1397 filters 1397 maps 1397 voice VLAN 2196 VTP 2137
Monitoring CleanAir 73, 75 Using CLI 73 Using GUI 75
Monitoring Interference Devices 76 GUI 76
monitoring power 157 monitoring status of 2089 Monitoring Worst Air Quality of Radio Bands 77
Using the GUI 77 monitors 26 MQC 903 mrouter Port 613 MSDP 240, 1091
overview 1091 MST mode 2173 MSTP 501, 519, 520, 521, 522, 523, 524, 525, 526, 527, 529, 535, 536, 538,
539, 540, 542, 543, 544, 545, 546, 547, 548, 549, 550, 551, 554, 555, 562, 563, 564, 565, 566, 571, 572, 573 boundary ports 519, 527 configuration guidelines 519 described 527 BPDU filtering 555, 566 described 555 enabling 566 BPDU guard 554, 565 described 554 enabling 565 CIST regional root 524, 525 CIST root 525 CIST, described 523 configuration guidelines 521 configuring 536, 538, 539, 540, 542, 543, 544, 545, 546, 547, 548, 549 device priority 543 forward-delay time 545 hello time 544 link type for rapid convergence 548 maximum aging time 546 maximum hop count 547 MST region 536 neighbor type 549 path cost 542

MSTP (continued) configuring (continued) port priority 540 root device 538 secondary root device 539 CST 524 operations between regions 524 default configuration 535 displaying status 551 enabling the mode 536 EtherChannel guard 562, 571 described 562 enabling 571 extended system ID 522, 539 effects on root device 522 effects on secondary root device 539 unexpected behavior 522 IEEE 802.1s 525, 527 implementation 527 port role naming change 527 terminology 525 instances supported 501 interface state, blocking to forwarding 554 interoperability and compatibility among modes interoperability with IEEE 802.1D 529, 550 described 529 restarting migration process 550 IST 524 operations within a region 524 loop guard 563, 573 described 563 enabling 573 mapping VLANs to MST instance 536 MST region 523, 526, 536 CIST 523 configuring 536 described 523 hop-count mechanism 526 IST 523 supported spanning-tree instances 523 PortFast 554, 564 described 554 enabling 564 preventing root switch selection 562 root device 522 configuring 522 effects of extended system ID 522 unexpected behavior 522 root guard 562, 572 described 562 enabling 572 shutdown Port Fast-enabled port 554 stack changes, effects of 529 status, displaying 551
MTU 141 system 141

501, 520

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-15

INDEX

multi-operations scheduling, IP SLAs 806 multi-VRF CE 1214, 1216, 1217, 1218, 1230
configuration example 1230 configuration guidelines 1218 default configuration 1217 defined 1214 network components 1216 packet-forwarding process 1216 Multicast Client Aging Robustness 341 Multicast Fast Convergence 613, 624 multicast forwarding 243 Multicast group concept 300 multicast groups 170, 172, 198, 346 joining 170 leaving 172 static joins 198, 346 multicast packets 1411 ACLs on 1411 Multicast Router Discovery 341 multicast router interfaces, monitoring 214 multicast router ports, adding 197 Multicast Source Discovery Protocol 240 multicast traffic 2075 multiple devices on a port 2075 multiple UDP ports 1308 multiple VPN routing/forwarding in customer edge devices 1214 See multi-VRF CE 1214
N
NameSpace Mapper 752 native VLAN 2179 neighbor discovery 355 neighbor discovery, IPv6 355 neighbor discovery/recovery, EIGRP 1160 Neighbor Packet Frequency parameter 1065 NetFlow 1372 Network Assistant 1720
managing switch stacks 1720 network configuration files 2001
comparison with host configuration files 2001 description 2001 Network Load Sharing 2172, 2173 STP path cost 2173 STP priorities 2172 Network Mobility Services Protocol (NMSP) 1952 modifying the notification interval for clients, RFID tags, and
rogues 1952 network performance, measuring with IP SLAs 805 network policy TLV 124 network services 1331 Non-Cisco Workgroup Bridges 685 non-IP traffic filtering 1388 nonhierarchical policy maps 960
configuring 960

normal-range 2145 VLAN configuration guidelines 2145
NSAPs, as ISO IGRP addresses 1201 NSF Awareness 1202
IS-IS 1202 NTP 1772
associations 1772 defined 1772
overview 1772 time 1772
services 1772 number of 1963 numbering of 580 NVRAM 2014
file compression 2014
O
OBFL 2079, 2091, 2092 configuring 2091 described 2079 displaying 2092
offline configuration 1715, 1724 provisioned configuration, defined 1715 provisioned switch, defined 1715 provisioning a new member 1724
on Layer 2 interfaces 592 on-board failure logging 2079 online diagnostics 1985
described 1985 overview 1985 operation 1330 operation of 1283, 1298 optimizing system resources 1963 OSPF 357, 1147, 1148, 1150, 1158 area parameters, configuring 1147 configuring 1150 default configuration 1147
metrics 1147 route 1147 for IPv6 357 LSA group pacing 1148 monitoring 1158 route summarization 1147 router IDs 1148 virtual links 1147 overview 1091, 1261, 1265, 1281, 1297, 1985, 2075, 2076
P
PaGP 579 PAgP 581, 582, 584, 592, 599
aggregate-port learners 599 described 581 interaction with other features 584

IN-16

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

PAgP (continued) learn method and priority configuration 599 modes 582
parallel paths, in routing tables 1237 partitioned 1711, 2087 passive interfaces 1147, 1251
configuring 1251 OSPF 1147 password 2126 password and privilege level 1264 password recovery disable considerations 1269 passwords 1261, 1264, 1266, 1267, 1269, 1270, 1271, 2074 default configuration 1264 disabling recovery of 1269 encrypting 1267 overview 1261 recovery of 2074 setting 1266, 1267, 1270, 1271
enable 1266 enable secret 1267 Telnet 1270 with usernames 1271 path cost 492, 510, 542 MSTP 542 STP 510 path MTU discovery 355 PBR 1247, 1250, 1251 defined 1247 fast-switched policy-based routing 1250 local policy-based routing 1251 persistent self-signed certificate 1350 PIM 237, 238, 239, 244, 246, 268, 270, 272, 273, 303 default configuration 246 dense mode 244 RPF lookups 244 enabling a mode 303 monitoring 272 router-query message interval, modifying 270 shortest path tree, delaying the use of 268 sparse mode 239, 244 join messages and shared tree 239 prune messages 239 RPF lookups 244 versions 238, 273 interoperability 238 troubleshooting interoperability problems 273 v2 improvements 238 PIM DM 239 PIM domain border 259 PIM shared tree 244 PIM source tree 244 PIM stub routing 240, 246 ping 2075, 2089, 2096 character output description 2096 executing 2089 overview 2075

INDEX
ping link test 702 PoE 87, 151, 152, 153, 155, 157
auto mode 153 CDP with power consumption, described 152 CDP with power negotiation, described 152 Cisco intelligent power management 152 devices supported 87, 151 high-power devices operating in low-power mode 152 IEEE power classification levels 152 monitoring 155 monitoring power 157 policing power consumption 157 policing power usage 155 power management modes 153 power negotiation extensions to CDP 152 powered-device detection and initial power allocation 152 standards supported 152 static mode 153 supported watts per port 87, 151 PoE ports 2074 police 979 policer allocation for VLAN 1006 policing 917, 921, 924 described 917 physical ports 921 token-bucket algorithm 921 policing power consumption 157 policing power usage 155 policy 944, 956 interface attachment 956 policy map 944 Policy Map 1911 policy maps 964 configuring 964 policy maps for QoS 919, 960, 964 characteristics of 919 nonhierarchical on physical ports 960
configuring 960 on SVIs 964
configuring 964 policy-based routing 1247
See PBR 1247 port 492, 499
priority 492 root 499 port ACLs 1364, 1365 defined 1364 types of 1365 port description TLV 123 port priority 508, 540, 604 MSTP 540 STP 508 port security 1447 port VLAN ID TLV 123 port-based authentication 1560, 1567, 1568, 1569, 1573, 1574, 1581 configuration guidelines 1568

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-17

INDEX

port-based authentication (continued) configuring 1569, 1573, 1574 RADIUS server 1569, 1574 RADIUS server parameters on the switch 1573 default configuration 1567 device roles 1560 displaying statistics 1581 enabling 1573 802.1X authentication 1573 switch 1560 as proxy 1560
port-channel interfaces 580 numbering of 580
power management modes 153 power management TLV 125 power negotiation extensions 152 power negotiation extensions to CDP 152 Power Neighbor Count parameter 1071 Power over Ethernet 711 power supply 147
configuring 147 managing 147 Power Threshold parameter 1071 powered-device detection and initial power allocation 152 preemption delay, default configuration 616 preemption, default configuration 616 preferential treatment of traffic 903 See QoS 903 prefix lists, BGP 1175 prerequisites 235, 281, 297, 901, 1013, 2117, 2141, 2169, 2189 auto-QoS 1013 IP multicast routing 297 PIM 235 QoS 901 SSM 281 VLAN trunks 2169 VLANs 2141 voice VLANs 2189 VTP 2117 preventing unauthorized access 1261 prioritization 912 priority 982, 2195 overriding CoS 2195 priority value 1723 privilege levels 1265, 1272, 1273, 1274 changing the default for lines 1273 exiting 1274 logging into 1274 overview 1265 setting a command with 1272 probe request forwarding 689 probe requests, described 689 Protecting Enable and Enable Secret Passwords with Encryption:
Example command 1276 Protection Type parameter 1082 protocol-dependent modules, EIGRP 1161

Protocol-Independent Multicast Protocol 298 See PIM 298
provider edge devices 1215 provisioned configuration, defined 1715 provisioned switch, defined 1715 provisioning a new member 1724 provisioning new members for a switch stack 1715 proxy ARP 1117
definition 1117 with IP routing disabled 1117 proxy reports 614 pruning-eligible list 2178 PVST mode 2173 PVST+ 500, 501, 502 described 500 IEEE 802.1Q trunking interoperability 502 instances supported 501
Q
QoS 914, 917, 918, 919, 921, 927, 928, 932, 935, 936, 960, 964, 984, 1015, 1021, 1904
auto-QoS 1015, 1021 disabling 1021 effects on running configuration 1015
basic model 917 egress port 917 ingress port 917
classification 914, 917, 918, 919 class maps, described 918, 919 defined 917 forwarding treatment 914 IP ACLs, described 918 MAC ACLs, described 918
configuring 960, 964, 984 egress queue characteristics 984 policy maps on physical ports 960 policy maps, VLANs 964
egress queues 917 described 917
implicit deny 918 IP phones 932
detection and trusted settings 932 mapping tables 935, 936
CoS-to-DSCP 935 DSCP-to-CoS 936 IP-precedence-to-DSCP 935 marked-down actions 1904 marking, described 917 policers 1904 configuring 1904 policies, attaching to an interface 921 policing 917, 921 described 917 token bucket algorithm 921

IN-18

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

INDEX

QoS (continued) policy maps 919 characteristics of 919 nonhierarchical on physical ports 919 queues 927, 928, 984 configuring egress characteristics 984 location of 927 WTD, described 928
QoS components 902 QoS Policy, WLAN 993 queries, IGMP 171 queue buffer 929, 930
allocation 930 queue buffers 984 queue limit 987
R
radio resource management (RRM) 1059, 1062, 1065, 1070, 1073, 1074, 1076
configuring 1065 monitor intervals using the GUI 1065
coverage hole detection 1062, 1076 configuring per controller using the GUI 1076 described 1062
specifying channels 1073, 1074 update interval 1059 Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC
parameter 1070 RADIUS 1296, 1297, 1298, 1305, 1308, 1310, 1312, 1314, 1315, 1317,
1318, 1319, 1322, 1324 attributes 1318, 1319, 1324
vendor-proprietary 1319, 1324 vendor-specific 1318 configuring 1308, 1310, 1314, 1315, 1317 accounting 1315 authentication 1310 authorization 1314 communication, global 1308, 1317 communication, per-server 1308 multiple UDP ports 1308 default configuration 1305 defining AAA server groups 1312 identifying the server 1308 key 1308 limiting the services to the user 1314 login 1310 operation of 1298 overview 1297 server load balancing 1322 suggested network environments 1297 tracking services accessed by user 1315 RADIUS Change of Authorization 1299 rapid convergence 530 Rapid Spanning Tree Protocol 521 See RSTP 521

rcp (remote copy protocol) 1997 server 1997 configuration files, copying 1997
realm 1328 recovery of 2074 recovery procedures 2081 redirecting error message output 2091 redundancy 499, 557, 578
EtherChannel 578 STP 499, 557
backbone 499 multidrop backbone 557 redundant links and UplinkFast 568, 569 reference 528 references 1010, 1050 auto-QoS 1050 QoS 1010 reliable transport protocol, EIGRP 1160 remaining ratio 927 Remote Authentication Dial-In User Service 1296 See RADIUS 1296 remote SPAN 827 removing a provisioned member 1725 rendezvous point 248 replacing 1714 replacing a failed member 1714 report suppression 350 disabling 350 report suppression, IGMP 173, 211, 350 described 173 disabling 211, 350 resets, in BGP 1172 responder, IP SLA 805, 809 described 805 enabling 809 response time, measuring with IP SLAs 806 restricting access 1261, 1281, 1296 overview 1261 RADIUS 1296 TACACS+ 1281 restrictions 167, 236, 282, 298, 491, 520, 553, 750, 936, 1013, 2118, 2142, 2170, 2190 auto-QoS 1013 Auto-RP 236 Configuration Engine 750 IGMP 167 IP multicast routing 298 MSTP 520 Optional Spanning-Tree Features 553 PIM 236 SSM 282 STP 491 VLAN trunks 2170 VLANs 2142 voice VLANs 2190 VTP 2118

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-19

INDEX

restrictions (continued) wired targets 936
Reverse Address Resolution Protocol 1117 See RARP 1117
reverse path check 243 RF group leader 1057, 1058
described 1057, 1058 RF group name 1059
described 1059 RF groups 1058, 1059, 1084
cascading 1058 monitoring status 1084
using the GUI 1084 overview 1059 pinning 1058 viewing status 1084
using the GUI 1084 RF-Network Name parameter 1068 RFC 169, 1137, 1145, 1170, 1772
1058, RIP 1137 1112, IP multicast and IGMP 169 1163, BGP 1170 1267, BGP 1170 1305, NTP 1772 1587, NSSAs 1145 1771, BGP 1170 RFC 5176 Compliance 1300 RFID Tracking 691 Right-To-Use 1831, 1832, 1833, 1835, 1836 AP-count activation 1836 base image activation 1835 evaluation license 1832 image based licenses 1832 license overview 1832 license states 1832 permanent license 1832 restrictions 1831 switch stacks 1833 RIP 357, 1138, 1139, 1141, 1142 authentication 1141 configuring 1139 described 1138 for IPv6 357 hop counts 1138 split horizon 1142 summary addresses 1142 RLDP. See <Default Para Font>Rogue Location Discovery Protocol
(RLDP) 1673 roam reason report 1882 rogue access points 1082, 1676
alarm 1082 automatically containing 1676
using the GUI 1676 Rogue Detection parameter 1675 Rogue Location Discovery Protocol parameter 1675 Rogue Policies page 1675

rogue states 1681 role 492
port 492 root 492, 493
port 492 switch 492, 493 root device 506, 538 MSTP 538 STP 506 route calculation timers, OSPF 1148 route maps 1174, 1247 BGP 1174 policy-based routing 1247 route reflectors, BGP 1176 route selection, BGP 1173 route summarization, OSPF 1147 route targets, VPN 1216 route-map command 1249 routed packets, ACLs on 1410 routed ports 1119, 1120, 1447 configuring 1119 IP addresses on 1120 router ACLs 1364, 1366 defined 1364 types of 1366 Router ID 357 router ID, OSPF 1148 routing 118, 1113, 1241 default 1113 dynamic 1113 redistribution of information 1241 static 1113 routing domain confederation, BGP 1195 Routing Information Protocol 1113 See RIP 1113 RP 249, 254 sparse-mode cloud 254 RP announcement messages 257 RPs 265 candidate 265 rsh (remote shell) 1997 RSPAN 824, 825, 826, 827, 828, 829, 830, 831, 832, 833, 834, 835, 836,
842, 843, 845, 848 and stack changes 834 characteristics 832 configuration guidelines 836 default configuration 835 destination ports 831 in a device stack 826 interaction with other features 833 monitored ports 830 monitoring ports 831 overview 825 received traffic 829 session limits 824

IN-20

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

RSPAN (continued) sessions 828, 842, 843, 845, 848 creating 842, 843 defined 828 limiting source traffic to specific VLANs 845 specifying monitored ports 842, 843 with ingress traffic enabled 848 source ports 830 transmitted traffic 829 VLAN-based 831
RSTP 529, 530, 531, 532, 533, 534, 548, 550 active topology 530 BPDU 533, 534 format 533 processing 534 designated port, defined 530 designated switch, defined 530 interoperability with IEEE 802.1D 529, 534, 550 described 529 restarting migration process 550 topology changes 534 overview 529 port roles 530, 532 described 530 synchronized 532 rapid convergence 530, 531, 548 cross-stack rapid convergence 531 described 530 edge ports and Port Fast 530 point-to-point links 531, 548 root ports 531 root port, defined 530
running configuration 2005, 2008, 2011, 2013 copying 2005, 2008, 2011, 2013 from an rcp server (example) 2011, 2013 to an rcp server 2005, 2008
S
sampler 27, 37 SCP 1342
and SSH 1342 configuring 1342 SDM 1719, 1963, 1965 switch stack consideration 1719 templates 1963, 1965
configuring 1965 number of 1963 SDM template 1963, 1965 configuring 1965 types of 1963 SDM template selection 1965 SDM templates 339 sdr 307 SE-Connect 71

INDEX
secure HTTP client 1358, 1359 configuring 1358 displaying 1359
secure HTTP server 1355, 1359 configuring 1355 displaying 1359
Secure Shell 1340 Secure Socket Layer 1349
See SSL<$nopage> 1349 security and identification 2089 See also downloading and uploading[software images 2081 See also IP traceroute 2076 See also Kerberos<$nopage>[KDC 1328
zzz] 1328 See DHCPv6 356 See DRP 355 See EtherChannel 581, 584 See Ethernet management port<$nopage> 117 See EUI 354 see HTTPS 1349, 1352 See IPv6 353 See KDC<$nopage> 1328 See power supplies<$nopage> 147 See RADIUS 1296 See SCP 1342 See SSL<$nopage> 1349 See TACACS+<$nopage> 1281 self-signed certificate 1350 server 1328 server load balancing 1322 service compress-config command 2014 Service Discovery Gateway 324
filtering 324 query 324 service list 324 service list 325 service-provider network, MSTP and RSTP 521 services 752 networking 752 Set to Factory Default button 1065 setting 1266, 1267, 1270, 1271 enable 1266 enable secret 1267 Telnet 1270 with usernames 1271 setting a command with 1272 setting a password 1270 Setting a Telnet Password for a Terminal Line: Example
command 1276 Setting or Changing a Static Enable Password: Example
command 1275 setting packet forwarding 2091 Setting the Privilege Level for a Command: Example command 1276 SFP security and identification 2089 SFP status 2089

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-21

INDEX

SFPs 2089 monitoring status of 2089 security and identification 2089 status, displaying 2089
shaping 926, 989 show access-lists hw-summary command 1373 show forward command 2091 show interfaces switchport 624 show platform forward command 2091 Simple Network Management Protocol (SNMP) 769 single-switch EtherChannel 579 SNMP 804, 1784, 1785, 1787
and IP SLAs 804 traps 1784, 1785, 1787
enabling MAC address notification 1784, 1785, 1787 SNMP and Syslog Over IPv6 357 snooping 351 software images 2081
recovery procedures 2081 See also downloading and uploading[software images 2081 source-and-destination MAC address forwarding, EtherChannel 586 source-and-destination-IP address based forwarding, EtherChannel 586 source-IP address based forwarding, EtherChannel 586 source-IP address-based forwarding 587 source-MAC address forwarding 586 source-MAC address forwarding, EtherChannel 586 Source-specific multicast 286 See SSM 286 SPAN 824, 825, 828, 829, 830, 831, 833, 834, 835, 837, 839, 841, 850 and stack changes 834 configuration guidelines 835 default configuration 835 destination ports 831 interaction with other features 833 monitored ports 830 monitoring ports 831 overview 825 received traffic 829 session limits 824 sessions 828, 835, 837, 839, 841, 850
creating 837, 850 defined 828 limiting source traffic to specific VLANs 841 removing destination (monitoring) ports 835 specifying monitored ports 837, 850 with ingress traffic enabled 839 source ports 830 transmitted traffic 829 VLAN-based 831 SPAN traffic 829 Spanning Tree 496 states 496 spanning-tree 492 port priority 492 Spectrum Expert 72 configuring using CLI 72

split horizon, RIP 1142 SSH 1340, 1341
encryption methods 1341 user authentication methods, supported 1341 SSH server 1344 SSID and client policy statistics 1917 monitoring using GUI 1917 SSID policy 959 SSL 1349, 1352, 1355, 1358, 1359 configuration guidelines 1352 configuring a secure HTTP client 1358 configuring a secure HTTP server 1355 described 1349 monitoring 1359 SSM 283, 286, 293 differs from Internet standard multicast 283 IGMPv3 283 monitoring 293 PIM 283 SSM mapping 285, 288, 289, 291, 294 DNS-based 285, 289 monitoring 294 static traffic forwarding 291 SSM Mapping 284 SSM operations 284 stack changes 359 effects on 359
IPv6 routing 359 stack changes, effects of 588 stack changes, effects on 173, 301, 502, 588, 590, 834, 1114, 1368, 1776,
1965 ACL configuration 1368 cross-stack EtherChannel 590 EtherChannel 588 IGMP snooping 173 IP routing 1114 MAC address tables 1776 multicast routing 301 SDM template selection 1965 SPAN and RSPAN 834 STP 502 stack changes,effects on 529 MSTP 529 stack master 359 IPv6 359 stack master functions 359 stack member 359, 1714, 1722, 1723, 1724, 1725 configuring 1722, 1723
member number 1722 priority value 1723 IPv6 359 provisioning a new member 1724 removing a provisioned member 1725 replacing 1714 stacks 2065, 2067, 2068 copying a bundle file from one member to another 2065

IN-22

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

INDEX

stacks (continued) upgrading 2065 upgrading, incompatible running mode 2068 upgrading, incompatible software 2067
stacks switch 1714 replacing a failed member 1714
stacks, 493, 501 MSTP instances supported 501 STP 493 bridge ID 493 root port selection 493 switch 493, 501
stacks, switch 301, 359, 1715, 1717, 1721, 1723, 1724, 1774, 1776, 2087 assigning information 1723, 1724 priority value 1723 provisioning a new member 1724 auto-advise 1717 auto-extract 1717 auto-upgrade 1717 IPv6 on 359 MAC address considerations 1776 MAC address of 1721 multicast routing, active switch and member roles 301 offline configuration 1715, 1724 provisioned configuration, defined 1715 provisioned switch, defined 1715 provisioning a new member 1724 partitioned 2087 system prompt consideration 1774 version-mismatch (VM) mode 1717 automatic upgrades with auto-upgrade 1717 upgrades with auto-extract 1717
stacks, switch version-mismatch (VM) mode 1717 manual upgrades with auto-advise 1717
stacks,switch 1711, 1717, 1722, 1725 assigning information 1722 member number 1722 auto-copy 1717 merged 1711 offline configuration 1725 removing a provisioned member 1725 partitioned 1711
standards supported 152 startup configuration 1997, 2001, 2006, 2008, 2011, 2013, 2017, 2023,
2024 clearing 2024 copying configuration files to 1997 copying from an rcp server 2011, 2013
(example) 2011, 2013 copying to an rcp server (example) 2006, 2008 loading from the network 2001, 2017 re-executing configuration commands in 2023 Stateless Autoconfiguration 356 static addresses 1775 See addresses 1775

static bindings 1447, 1449 adding 1447, 1449
static hosts 1449 Static IP address 675
described 675 static joins 346 static mode 153 static routes 356, 1238
configuring 1238 understanding 356 static routing 1113 static SSM mapping 285 statistics 148, 159, 314, 1158, 1581 802.1X 1581 interface 148, 159 IP multicast routing 314 OSPF 1158 status, displaying 2089 STP 491, 492, 493, 494, 495, 496, 497, 498, 499, 500, 501, 502, 503, 504,
505, 506, 507, 508, 510, 511, 512, 513, 514, 515, 520, 555, 556, 557, 560, 562, 568, 569, 570, 571 accelerating root port selection 556 BackboneFast 560, 570 described 560 enabling 570 BPDU message exchange 492 configuring 504, 506, 507, 508, 510, 511, 512, 513, 514 device priority 511 forward-delay time 513 hello time 512 maximum aging time 513 path cost 510 port priority 508 root device 506 secondary root device 507 spanning-tree mode 504 transmit hold-count 514 cross-stack UplinkFast 557 described 557 default configuration 503 designated ,defined 494 switch 494 designated port,defined 494 detecting indirect link failures 560 disabling 505 displaying status 515 EtherChannel guard 562, 571 described 562 enabling 571 extended system ID 491, 494, 506, 507 effects on root device 506 effects on the secondary root device 507 overview 494 unexpected behavior 491 IEEE 802.1D and bridge ID 494 IEEE 802.1D and multicast addresses 500

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-23

INDEX

STP (continued) IEEE 802.1t and VLAN identifier 494 instances supported 501 interface states 496, 497, 498 blocking 497 disabled 498 forwarding 497, 498 learning 498 listening 498 interoperability and compatibility among modes keepalive messages 492 limitations with IEEE 802.1Q trunks 502 modes supported 500 overview 492 protocols supported 500 redundant connectivity 499 root 491, 493 election 493 switch 491, 493 unexpected behavior 491 root device 494, 495, 506 configuring 495 effects of extended system ID 494, 506 root port selection on a stack 493 root port, defined 493 stack changes, effects of 502 status, displaying 515 UplinkFast 555, 568, 569 described 555 disabling 569 enabling 568 VLAN-bridge 502
STP path cost 2184 STP port priorities 2180 stratum, NTP 1772 stub routing, EIGRP 1162 subnet mask 1121 subnet zero 1123 subnets 323 Subnetwork Access Protocol (SNAP) 769 suggested network environments 1297 summer time 1778 supported features 119, 354 supported watts per port 87, 151 SVIs 1119, 1366
and IP unicast routing 1119 and router ACLs 1366 Switch Access 1275 displaying 1275 switch as trusted third party 1328 switch limitations 359 switch stack 2091 switch stack consideration 1719 switch stack licenses 1833 switch stacks 343, 2124 switched packets, ACLs on 1409

501, 520

Switched Port Analyzer 823 See SPAN 823
switchport backup interface 625 system 141 system capabilities TLV 123 system clock 1771, 1777, 1778
configuring 1777, 1778 daylight saving time 1778 manually 1777 summer time 1778 time zones 1777
overview 1771 system description TLV 123 system MTU 141, 1202
and IS-IS LSPs 1202 System MTU 141 system name 1774, 1779
default configuration 1774 manual configuration 1779 system name TLV 123 system priority 603 system prompt, default setting 1774 system resources, optimizing 1963 system routing 1201 IS-IS 1201
T
table map marking 1009 CoS 1009
table maps 967 TACACS+ 1281, 1283, 1285, 1286, 1289, 1290, 1291
accounting, defined 1281 authentication, defined 1281 authorization, defined 1281 configuring 1285, 1286, 1289, 1290
accounting 1290 authentication key 1285 authorization 1289 login authentication 1286 default configuration 1285 defined 1281 displaying 1291 identifying the server 1285 key 1285 limiting the services to the user 1289 login 1286 operation of 1283 overview 1281 tracking services accessed by user 1290 tar files 2057 creating 2057 displaying the contents of 2057 extracting 2057 TCAM entries 1447

IN-24

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

INDEX

tcp mss 702 Telnet 1270
setting a password 1270 templates 1963, 1965
configuring 1965 number of 1963 temporary self-signed certificate 1350 Terminal Access Controller Access Control System Plus 1281 See TACACS+<$nopage> 1281 terminal lines, setting a password 1270 terminology 902 terms 1328 TFTP server 1997, 2004, 2009, 2029 configuration files 1997, 2004, 2009, 2029
copying from 2009 copying to 1997, 2004 downloading 2029 TGT 1328 threshold monitoring, IP SLA 807 tickets 1328 time 1771 See NTP and system clock 1771 time ranges in ACLs 1375, 1384 time zones 1777 time-exceeded messages 2076 time-range command 1375 TLVs 123 defined 123 Token Rings 2131 Topology Change Notification Processing 343 traceroute and 2076 traceroute command 2076 See also IP traceroute 2076 traceroute, Layer 2 2075 and ARP 2075 and CDP 2075 broadcast traffic 2075 described 2075 IP addresses and subnets 2075 MAC addresses and VLANs 2075 multicast traffic 2075 multiple devices on a port 2075 unicast traffic 2075 usage guidelines 2075 tracking services accessed by user 1290, 1315 traffic 1367 fragmented 1367 traffic conditioning 924 traffic shaping 926 traffic stream metrics (TSM) 1927 described 1927 traps 1784, 1785, 1787 configuring MAC address notification 1784, 1785, 1787 enabling 1784, 1785, 1787 troubleshooting 273, 1021, 2075, 2076, 2078, 2089, 2091 auto-QoS 1021

troubleshooting (continued) displaying crash information 2078 PIMv1 and PIMv2 interoperability problems 273 setting packet forwarding 2091 SFP security and identification 2089 show forward command 2091 with debug commands 2078 with ping 2075 with traceroute 2076
Troubleshooting Examples command 2096 troubleshooting join process 641 trunk 2174, 2176
configuration 2174 trunk interfaces 1447 trunk port 2174 trunking 2170 trunking modes 2170 trunks 2171
allowed VLANs 2171 trust 932 trust behavior 931
wired ports 931 wireless ports 931 trustpoints, CA 1350 twisted-pair, detecting unidirectional links 630 types of 1963
U
U-APSD 1926 described 1926
UDLD 629, 630, 631, 632, 634 aggressive 630 aggressive mode 632 message time 632 default configuration 632 disabling 634 per interface 634 echoing detection mechanism 631 enabling 632, 634 globally 632 per interface 634 fiber-optic links 630 neighbor database 631 neighbor database maintenance 631 normal 630 normal mode 630 overview 630 restrictions 629 twisted-pair links 630
UDP jitter operation, IP SLAs 807, 814 UDP jitter, configuring 814 understanding 356 understanding static routes 356 unicast MAC address filtering 1789
configuration 1789

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-25

INDEX

unicast traffic 2075 unsupported features 119 upgrades with auto-extract 1717 upgrading software 2062, 2063, 2067, 2068
bundle mode 2063 incompatible running mode 2068 incompatible software 2067 install mode 2062 UplinkFast 555, 568, 569 described 555 disabling 569 enabling 568 usage guidelines 2075 user authentication methods, supported 1341 User Datagram Protocol 1118, 1132 See UDP 1118, 1132 username-based authentication 1271 using commands 2078
V
Validate Rogue Clients Against AAA parameter 1675 VCI strings 674 vendor-proprietary 1319 vendor-specific 1318 version-mismatch (VM) mode 1717
automatic upgrades with auto-upgrade 1717 manual upgrades with auto-advise 1717 upgrades with auto-extract 1717 Virtual Private Network 1214 See VPN 1214 VLAN 2142 definition 2142 VLAN ACLs 1364 See VLAN maps 1364 VLAN filtering and SPAN 831 VLAN ID, discovering 1776 VLAN load balancing on Flex Links 613, 616 configuration guidelines 616 described 613 VLAN map entries, order of 1373 VLAN maps 1364, 1373, 1390, 1391, 1392, 1393, 1394, 1397, 1407, 1408 applying 1394 common uses for 1407 configuration guidelines 1373 configuring 1390 creating 1392 defined 1364 denying access to a server example 1408 denying and permitting packets 1391, 1393 displaying 1397 VLAN monitoring commands 2158 VLAN Port Membership Modes 2144 VLANs 500, 502, 841, 845 aging dynamic addresses 500

VLANs (continued) limiting source traffic with RSPAN 845 limiting source traffic with SPAN 841 STP and IEEE 802.1Q trunks 502 VLAN-bridge STP 502
Voice RSSI parameter 1076 voice VLAN 2191, 2193, 2195
configuration guidelines 2191 configuring IP phones for data traffic 2195
override CoS of incoming frame 2195 configuring ports for voice traffic in 2193
802.1p priority tagged frames 2193 voice VLANs 2190 voice-over-IP (VoIP) telephone roaming 1881 VPN 1214, 1216, 1227
configuring routing in 1227 forwarding 1216 in service provider networks 1214 VRF 1447 VRF-aware services 1220, 1221, 1222, 1223, 1224 ARP 1220 configuring 1220 ping 1221 RADIUS 1223 SNMP 1221 syslog 1223 tftp 1224 traceroute 1224 uRPF 1222 VRFs, configuring multicast 1225 VTP 2118, 2125, 2126 configuration requirements 2125 version 2126 VTP advertisements 2121 VTP domain 2119, 2135 VTP mode 2128 VTP modes 2120 VTP password 2129 VTP primary 2131 VTP pruning 2123, 2133 VTP settings 2125 VTP version 2131 VTP version 2 2122 VTP version 3 2122 VTP versions 2143
W
web-based authentication 1559, 1564 customizeable web pages 1564 description 1559
web-based authentication, interactions with other features 1566 wired access 905 wired location service 125, 126, 134
configuring 134 location TLV 125

IN-26

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

wired location service (continued) understanding 126
wireless access 905 wireless intrusion prevention system (wIPS) 1693
described 1693 with debug commands 2078 with ping 2075 with RADIUS 1310, 1314, 1315 with STP 590 with TACACS+ 1281, 1286, 1289, 1290

with traceroute 2076 with usernames 1271 WMM parameter 1939 world mode 1859 WTD 928
default 928
Z
zzz] 1328

INDEX

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)

IN-27

INDEX

IN-28

Consolidated Platform Configuration Guide, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)


DITA Open Toolkit XEP 4.9 build 20070312; modified using iText 2.1.7 by 1T3XT