Tải bản đầy đủ (.pdf) (411 trang)

Cisco CCIE Switching Black Book

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.76 MB, 411 trang )


Table of Contents
Cisco Switching Black Book...............................................................................................................................1
Introduction.........................................................................................................................................................4
Overview..................................................................................................................................................4
Is This Book for You?..............................................................................................................................4
How to Use This Book.............................................................................................................................4
The Black Book Philosophy....................................................................................................................5
Chapter 1: Network Switching Fundamentals.................................................................................................6
In Depth...................................................................................................................................................6
Physical Media and Switching Types......................................................................................................6
A Bit of History.......................................................................................................................................7
Networking Architectures.................................................................................................................7
The Pieces of Technology........................................................................................................................9
Repeaters.........................................................................................................................................10
Hubs.................................................................................................................................................10
Bridges.............................................................................................................................................11
Routers.............................................................................................................................................13
Switches...........................................................................................................................................13
Network Design.....................................................................................................................................14
Collision Domains...........................................................................................................................15
Broadcast Domains..........................................................................................................................16
Why Upgrade to Switches?.............................................................................................................16
Switched Forwarding......................................................................................................................19
Switched Network Bottlenecks.......................................................................................................20
The Rule of the Network Road........................................................................................................22
Switched Ethernet Innovations..............................................................................................................23
Full−Duplex Ethernet......................................................................................................................23
Fast Ethernet....................................................................................................................................23
Gigabit Ethernet..............................................................................................................................24
The Cisco IOS........................................................................................................................................24


Connecting to the Switch................................................................................................................25
Powering Up the Switch..................................................................................................................25
The Challenges.......................................................................................................................................27
Today’s Trend........................................................................................................................................27
Entering and Exiting Privileged EXEC Mode.......................................................................................28
Entering and Exiting Global Configuration Mode.................................................................................28
Entering and Exiting Interface Configuration Mode.............................................................................28
Entering and Exiting Subinterface Configuration Mode.......................................................................28
Saving Configuration Changes..............................................................................................................29
Chapter 2: Basic Switch Configuration..........................................................................................................30
In Depth.................................................................................................................................................30
Command−Line Interfaces....................................................................................................................30
Campus Hierarchical Switching Model.................................................................................................31
Access Layer...................................................................................................................................32
Distribution Layer...........................................................................................................................32
Core Layer.......................................................................................................................................33
Remote Network Monitoring.................................................................................................................33
Connecting to the Console Port.............................................................................................................34
Console Cable Pinouts.....................................................................................................................35
Console Connectors.........................................................................................................................36
i


Table of Contents
Chapter 2: Basic Switch Configuration
The RJ−45−to−AUX Port Console Connector Pinouts...................................................................36
Switch IOSs...........................................................................................................................................38
The IOS Configuration Modes........................................................................................................38
Limiting Telnet Access..........................................................................................................................39
Implementing Privilege Levels..............................................................................................................39

Configuring an IOS−Based CLI Switch................................................................................................39
Setting the Login Passwords...........................................................................................................40
Setting Privilege Levels...................................................................................................................40
Assigning Allowable Commands....................................................................................................40
Setting the Console Port Time−out Value.......................................................................................40
Configuring the Telnet Time−out Value.........................................................................................41
Configuring the Hostname..............................................................................................................41
Configuring the Date and Time.......................................................................................................41
Configuring an IP Address and Netmask........................................................................................41
Configuring a Default Route and Gateway.....................................................................................41
Configuring Port Speed and Duplex...............................................................................................42
Enabling SNMP Contact.................................................................................................................42
Configuring a Set/Clear−Based CLI Switch..........................................................................................42
Logging On to a Switch...................................................................................................................42
Setting the Login and Enable Passwords........................................................................................43
Changing the Console Prompt.........................................................................................................43
Entering a Contact Name and Location Information......................................................................44
Configuring System and Time Information....................................................................................44
Configuring an IP Address and Netmask........................................................................................44
Configuring a Default Route and Gateway.....................................................................................45
Viewing the Default Routes............................................................................................................45
Configuring Port Speed and Duplex...............................................................................................45
Enabling SNMP...............................................................................................................................46
Configuring Trap Message Targets.................................................................................................46
Configuring a Menu−Driven IOS..........................................................................................................47
Configuring the Console Port..........................................................................................................48
Configuring Telnet..........................................................................................................................48
Configuring the Password...............................................................................................................48
Configuring an IP Address and Default Gateway...........................................................................48
Configuring SNMP..........................................................................................................................49

Configuring ROM..................................................................................................................................50
Entering ROM Configuration Mode...............................................................................................50
Booting ROM Mode from a Flash Device......................................................................................50
Configuring SNMP..........................................................................................................................51
Configuring RMON........................................................................................................................51
Configuring RMON on a Set/Clear−Based Interface.....................................................................51
Using Set/Clear Command Set Recall Key Sequences..........................................................................52
Using IOS−Based Command Editing Keys and Functions...................................................................52
Chapter 3: WAN Switching.............................................................................................................................54
In Depth.................................................................................................................................................54
WAN Transmission Media....................................................................................................................55
Synchronous Transport Signal (STS)..............................................................................................56
Cisco WAN Switches............................................................................................................................57
MGX 8200 Series............................................................................................................................57
IGX 8400 Series..............................................................................................................................58
ii


Table of Contents
Chapter 3: WAN Switching
BPX 8600 Series Wide−Area Switches..........................................................................................58
MGX 8800 Series Wide−Area Edge Switches...............................................................................59
WAN Switch Hardware Overview........................................................................................................59
Cisco WAN Switch Network Topologies..............................................................................................60
Network Management............................................................................................................................61
The CLI...........................................................................................................................................61
WAN Manager................................................................................................................................61
Accessing and Setting Up IGX and BPX Switches...............................................................................62
Adding New Users..........................................................................................................................62
Displaying a User’s Password.........................................................................................................62

Changing a User’s Password...........................................................................................................62
Using the History Command...........................................................................................................63
Displaying a Summary of All Card Modules..................................................................................63
Displaying Detailed Information for a Card Module......................................................................63
Displaying the Power and Temperature of a Switch.......................................................................63
Displaying the ASM Statistics for BPX..........................................................................................63
Configuring the ASM Setting for BPX...........................................................................................63
Logging Out....................................................................................................................................63
Resetting the Switch........................................................................................................................63
Displaying Other Switches..............................................................................................................64
Setting the Switch Name.................................................................................................................64
Setting the Time Zone.....................................................................................................................64
Configuring the Time and Date.......................................................................................................64
Configuring the Control and Auxiliary Ports..................................................................................64
Modifying the Functions of the Control and Auxiliary Ports.........................................................64
Configuring the Printing Function..................................................................................................64
Configuring the LAN Interface.......................................................................................................64
Accessing the MGX 8850 and 8220......................................................................................................65
Adding New Users..........................................................................................................................65
Changing Passwords........................................................................................................................65
Assigning a Switch Hostname.........................................................................................................65
Displaying a Summary of All Modules...........................................................................................66
Displaying Detailed Information for the Current Card...................................................................66
Changing the Time and Date...........................................................................................................66
Displaying the Configuration of the Maintenance and Control Ports.............................................66
Displaying the IP Address...............................................................................................................66
Configuring the IP Interface............................................................................................................67
Displaying the Alarm Level of the Switch......................................................................................67
Chapter 4: LAN Switch Architectures............................................................................................................68
In Depth.................................................................................................................................................68

The Catalyst Crescendo Architecture....................................................................................................68
BUS.................................................................................................................................................68
ASICs..............................................................................................................................................69
The Crescendo Processors...............................................................................................................71
Crescendo Logic Units....................................................................................................................71
Other Cisco Switch Processors, Buses, ASICs, and Logic Units..........................................................72
CAM................................................................................................................................................72
AXIS Bus........................................................................................................................................72
CEF ASIC........................................................................................................................................73
Phoenix ASIC..................................................................................................................................75
iii


Table of Contents
Chapter 4: LAN Switch Architectures
LCP..................................................................................................................................................75
SAGE ASIC....................................................................................................................................75
QTP ASIC.......................................................................................................................................75
QMAC.............................................................................................................................................76
Bridging Types......................................................................................................................................76
Source Route Bridging....................................................................................................................76
Source Route Transparent Bridging................................................................................................77
Source Route Translational Bridging..............................................................................................77
Transparent Bridging.......................................................................................................................77
Source Route Switching..................................................................................................................77
Switching Paths......................................................................................................................................78
Process Switching............................................................................................................................78
Fast Switching.................................................................................................................................78
Autonomous Switching...................................................................................................................79
Silicon Switching............................................................................................................................79

Optimum Switching........................................................................................................................79
Distributed Switching......................................................................................................................79
NetFlow Switching..........................................................................................................................79
System Message Logging......................................................................................................................80
Loading an Image on the Supervisor Engine III....................................................................................80
Booting the Supervisor Engine III from Flash.......................................................................................81
Setting the Boot Configuration Register................................................................................................81
Configuring Cisco Express Forwarding.................................................................................................81
Enabling CEF..................................................................................................................................81
Disabling CEF.................................................................................................................................81
Enabling dCEF................................................................................................................................82
Disabling dCEF...............................................................................................................................82
Disabling CEF on an Individual Interface.......................................................................................82
Configuring CEF Load Balancing...................................................................................................82
Disabling CEF Load Balancing.......................................................................................................82
Enabling Network Accounting for CEF..........................................................................................82
Setting Network Accounting for CEF to Collect Packet Numbers.................................................82
Viewing Network Accounting for CEF Statistics...........................................................................82
Viewing CEF Packet−Dropped Statistics.......................................................................................83
Viewing Non−CEF Path Packets....................................................................................................83
Disabling Per−Destination Load Sharing..............................................................................................83
Viewing the Adjacency Table on the 8500 GSR...................................................................................83
Clearing the Adjacency Table on the 8500 GSR...................................................................................83
Enabling Console Session Logging on a Set/Clear Command−Based IOS..........................................83
Enabling Telnet Session Logging on a Set/Clear Command−Based IOS.............................................84
Disabling Console Session Logging on a Set/Clear Command−Based IOS.........................................84
Disabling Telnet Session Logging on a Set/Clear Command−Based IOS............................................84
Setting the System Message Severity Levels on a Set/Clear Command−Based IOS............................84
Enabling the Logging Time Stamp on a Set/Clear Command−Based Switch......................................84
Disabling the Logging Time Stamp on a Set/Clear Command−Based Switch.....................................85

Configuring the Logging Buffer Size on a Set/Clear Command−Based Switch...................................85
Clearing the Server Logging Table........................................................................................................85
Disabling Server Logging......................................................................................................................85
Displaying the Logging Configuration..................................................................................................86
Displaying System Logging Messages..................................................................................................86

iv


Table of Contents
Chapter 5: Virtual Local Area Networks.......................................................................................................88
In Depth.................................................................................................................................................88
The Flat Network of Yesterday..............................................................................................................88
Why Use VLANs?.................................................................................................................................89
VLAN Basics..................................................................................................................................90
A Properly Switched Network........................................................................................................90
Switched Internetwork Security......................................................................................................91
Scaling with VLANs..............................................................................................................................92
VLAN Boundaries...........................................................................................................................92
VLAN Membership Types..............................................................................................................93
Traffic Patterns Flowing through the Network...............................................................................93
Cisco’s VLAN Recommendations..................................................................................................93
VLAN Trunking.....................................................................................................................................94
Trunk Types....................................................................................................................................94
LAN Emulation (LANE).................................................................................................................97
VLAN Trunking Protocol (VTP)...........................................................................................................97
VTP Versions..................................................................................................................................98
VTP Advertisements.......................................................................................................................98
VTP Switch Modes.......................................................................................................................100
Methods for VLAN Identification.................................................................................................101

Dynamic Trunking Protocol..........................................................................................................101
InterVLAN Routing.............................................................................................................................101
Internal Route Processors..............................................................................................................102
How InterVLAN Routing Works..................................................................................................102
Configuring a Static VLAN on a Catalyst 5000 Series Switch...........................................................103
Configuring Multiple VLANs on a Catalyst 5000 Series Switch........................................................103
Creating VLANs on a Catalyst 1900EN Series...................................................................................103
Assigning a Static VLAN to an Interface on a 1900EN Series...........................................................104
Viewing the VLAN Configuration on a 1900 Series...........................................................................105
Viewing an Individual VLAN Configuration on a 1900 Series..........................................................105
Configuring a Trunk Port on a Cisco 5000 Series...............................................................................105
Mapping VLANs to a Trunk Port........................................................................................................107
Configuring a Trunk Port on a Cisco 1900EN Series..........................................................................107
Clearing VLANs from Trunk Links on a Cisco 5000 Series...............................................................107
Clearing VLANs from Trunk Links on a Cisco 1900EN Series.........................................................107
Verifying a Trunk Link Configuration on a 5000 Series.....................................................................108
Verifying a Trunk Link Configuration on a 1900EN Series................................................................108
Configuring the VTP Version on a Catalyst 5000 Switch...................................................................108
Configuring a VTP Domain on a Catalyst 1900 Switch......................................................................109
Setting a VTP Domain Password on a Catalyst Switch.......................................................................109
Configuring a Catalyst 1900 Switch as a VTP Server.........................................................................109
Configuring a Catalyst 1900 Switch as a VTP Client.........................................................................109
Configuring a Catalyst 1900 Switch for Transparent Mode................................................................109
Configuring VTP Pruning on a Catalyst 1900 Switch.........................................................................110
Configuring VTP on a Set/Clear CLI Switch......................................................................................110
Configuring VTP on a 1900 Cisco IOS CLI Switch...........................................................................110
Verifying the VTP Configuration on a Set/Clear CLI.........................................................................111
Displaying VTP Statistics....................................................................................................................111
Configuring VTP Pruning on a Set/Clear CLI Switch........................................................................112
Disabling Pruning for Unwanted VLANs............................................................................................112

Configuring IP InterVLAN Routing on an External Cisco Router......................................................112
Configuring IPX InterVLAN Routing on an External Router.............................................................113
v


Table of Contents
Chapter 6: InterVLAN and Basic Module Configuration..........................................................................114
In Depth...............................................................................................................................................114
Internal Route Processors....................................................................................................................114
Available Route Processors...........................................................................................................116
Routing Protocol Assignment.......................................................................................................120
Supervisor Engine Modules.................................................................................................................120
Supervisor Engines I and II...........................................................................................................120
Supervisor Engine III....................................................................................................................121
Using the Supervisor Engine.........................................................................................................122
Etherport Modules...............................................................................................................................122
Port Security..................................................................................................................................123
Manually Configured MAC Addresses.........................................................................................123
Determining the Slot Number in Which a Module Resides................................................................123
Accessing the Internal Route Processor from the Switch....................................................................124
Configuring a Hostname on the RSM..................................................................................................124
Assigning an IP Address and Encapsulation Type to an Ethernet Interface........................................125
Setting the Port Speed and Port Name on an Ethernet Interface.........................................................125
Configuring a Default Gateway on a Catalyst 5000............................................................................126
Verifying the IP Configuration on a Catalyst 5000.............................................................................126
Enabling RIP on an RSM.....................................................................................................................126
Viewing the RSM’s Running Configuration.......................................................................................127
Configuring InterVLAN Routing on an RSM.....................................................................................127
Configuring IPX InterVLAN Routing on the RSM.............................................................................128
Configuring AppleTalk InterVLAN Routing on an RSM...................................................................128

Viewing the RSM Configuration.........................................................................................................129
Assigning a MAC Address to a VLAN...............................................................................................129
Viewing the MAC Addresses..............................................................................................................129
Configuring Filtering on an Ethernet Interface....................................................................................130
Configuring Port Security on an Ethernet Module..............................................................................130
Clearing MAC Addresses....................................................................................................................131
Configuring the Catalyst 5000 Supervisor Engine Module.................................................................131
Setting the boot config−register on the Supervisor Engine Module....................................................132
Changing the Management VLAN on a Supervisor Engine................................................................133
Viewing the Supervisor Engine Configuration....................................................................................133
Configuring the Cisco 2621 External Router for ISL Trunking..........................................................134
Configuring Redundancy Using HSRP...............................................................................................135
Chapter 7: IP Multicast..................................................................................................................................137
In Depth...............................................................................................................................................137
IP Multicasting Overview....................................................................................................................137
Broadcast.......................................................................................................................................138
Unicast...........................................................................................................................................138
Multicast........................................................................................................................................139
IP Multicasting Addresses...................................................................................................................140
The Multicast IP Structure............................................................................................................140
Delivery of Multicast Datagrams..................................................................................................142
Multicast Distribution Tree...........................................................................................................142
Multicast Forwarding....................................................................................................................143
IGMP Protocols.............................................................................................................................143
Internet Group Management Protocol (IGMP)....................................................................................145
IGMPv1.........................................................................................................................................145
IGMPv2.........................................................................................................................................146
vi



Table of Contents
Chapter 7: IP Multicast
Time to Live..................................................................................................................................147
Multicast at Layer 2.............................................................................................................................147
IGMP Snooping.............................................................................................................................147
Cisco Group Management Protocol..............................................................................................148
Router Group Management Protocol............................................................................................148
GARP Multicast Registration Protocol.........................................................................................149
Configuring IP Multicast Routing.......................................................................................................149
Disabling IP Multicast Routing.....................................................................................................149
Enabling PIM on an Interface.......................................................................................................149
Disabling PIM on an Interface......................................................................................................149
Configuring the Rendezvous Point................................................................................................150
Adding a Router to a Multicast Group.................................................................................................150
Configuring a Router to Be a Static Multicast Group Member....................................................150
Restricting Access to a Multicast Group.......................................................................................150
Changing the IGMP Version...............................................................................................................150
Changing the IGMP Host−Query Message Interval............................................................................151
Configuring Multicast Groups.............................................................................................................151
Removing Multicast Groups................................................................................................................151
Configuring Multicast Router Ports.....................................................................................................151
Displaying Multicast Routers........................................................................................................151
Removing the Multicast Router....................................................................................................152
Configuring IGMP Snooping...............................................................................................................152
Disabling IGMP Snooping............................................................................................................152
Configuring IGMP Fast−Leave Processing.........................................................................................152
Disabling IGMP Fast−Leave Processing......................................................................................152
Displaying IGMP Statistics.................................................................................................................153
Displaying Multicast Routers Learned from IGMP.............................................................................153
Displaying IGMP Multicast Groups....................................................................................................153

Configuring CGMP..............................................................................................................................154
Disabling CGMP...........................................................................................................................154
Enabling CGMP Fast−Leave Processing......................................................................................154
Disabling CGMP Fast−Leave Processing.....................................................................................154
Displaying CGMP Statistics..........................................................................................................154
Configuring RGMP on the Switch.......................................................................................................155
Disabling RGMP on the Switch....................................................................................................155
Configuring RGMP on the Router.......................................................................................................155
Disabling RGMP on the Router....................................................................................................155
Displaying RGMP Groups...................................................................................................................155
Displaying RGMP−Capable Router Ports...........................................................................................156
Displaying RGMP VLAN Statistics....................................................................................................156
Configuring GMRP..............................................................................................................................156
Disabling GMRP...........................................................................................................................157
Enabling GMRP on Individual Ports.............................................................................................157
Disabling GMRP on Individual Ports...........................................................................................157
Enabling GMRP Forward−All......................................................................................................157
Disabling GMRP Forward−All.....................................................................................................157
Configuring GMRP Registration...................................................................................................157
Displaying the GMRP Configuration............................................................................................158
Setting GMRP Timers...................................................................................................................158
Displaying GMRP Timers.............................................................................................................158
Configuring Bandwidth−Based Suppression.......................................................................................159
vii


Table of Contents
Chapter 7: IP Multicast
Configuring Packet−Based Suppression..............................................................................................159
Disabling Multicast Suppression.........................................................................................................159

Chapter 8: WAN Cell Switching...................................................................................................................160
In Depth...............................................................................................................................................160
ATM Overview....................................................................................................................................160
LANE............................................................................................................................................161
ATM Protocols..............................................................................................................................162
ATM Circuit Switching.................................................................................................................162
ATM Cells.....................................................................................................................................162
The ATM Switch and ATM Endpoints.........................................................................................164
The ATM Reference Model..........................................................................................................164
Specifying ATM Connections.......................................................................................................166
ATM Addressing...........................................................................................................................167
Local Area Network Emulation (LANE).............................................................................................167
LANE Components.......................................................................................................................168
Integrated Local Management Interface (ILMI)...........................................................................172
LANE Communication..................................................................................................................172
LANE Configuration Guidelines...................................................................................................174
How LANE Works........................................................................................................................174
Implementing LANE.....................................................................................................................175
Configuring ATM on the 5000 Switch..........................................................................................175
Connecting in an ATM Network...................................................................................................177
Monitoring and Maintaining LANE....................................................................................................178
Accessing the ATM LANE Module....................................................................................................178
Displaying the Selector Field...............................................................................................................178
Configuring the LES/BUS...................................................................................................................179
Verifying the LES/BUS Configuration.........................................................................................179
Configuring a LEC for an ELAN.........................................................................................................179
Verifying a LEC Configuration on an ELAN...............................................................................180
Configuring the LECS...................................................................................................................181
Viewing the LANE Database........................................................................................................181
Binding the LECS Address to an Interface...................................................................................181

Verifying the LECS Configuration...............................................................................................182
Chapter 9: LightStream Switches.................................................................................................................183
In Depth...............................................................................................................................................183
LightStream 100..................................................................................................................................183
LightStream 1010................................................................................................................................184
LightStream 2020................................................................................................................................185
Neighborhood Discovery Function...............................................................................................186
Virtual Path Connections.....................................................................................................................186
LightStream Troubleshooting Tools....................................................................................................187
LightStream Boot Process.............................................................................................................187
Supported Troubleshooting Protocols...........................................................................................188
Snooping Mechanisms..................................................................................................................188
Multiprotocol Over ATM..............................................................................................................188
Configuring the Hostname...................................................................................................................189
Configuring an Enable Password.........................................................................................................189
Configuring the Processor Card Ethernet Interface.............................................................................189
Configuring Virtual Private Tunnels...................................................................................................190
viii


Table of Contents
Chapter 9: LightStream Switches
Verifying an ATM Interface Connection Status..................................................................................190
Viewing the Configured Virtual Connections.....................................................................................191
Configuring the LECS ATM Address on a LightStream 1010 Switch...............................................191
Configuring the Advertised LECS Address.........................................................................................191
Viewing the LANE Configuration.......................................................................................................191
Viewing the Installed Modules............................................................................................................192
Configuring the MPC...........................................................................................................................193
Configuring the MPS...........................................................................................................................193

Changing the MPS Variables........................................................................................................193
Monitoring the MPS......................................................................................................................194
Enabling ILMI Autoconfiguration.......................................................................................................194
Configuring LANE on a LightStream 1010.........................................................................................194
Powering on the LightStream 100 ATM Switch.................................................................................195
Configuring the LS100 Switch............................................................................................................195
Recovering a Lost Password................................................................................................................196
Chapter 10: Layer 2 Redundant Links.........................................................................................................199
In Depth...............................................................................................................................................199
Layer 2 Switching Overview...............................................................................................................199
Frames..................................................................................................................................................199
Broadcast and Multicast Frames...................................................................................................200
Unknown Unicasts........................................................................................................................200
Layer 2 Network Loops.......................................................................................................................200
Danger! Data Loops!.....................................................................................................................201
Edsger Dijkstra’s Graph Theory....................................................................................................201
STP Root Bridges..........................................................................................................................202
Bridge Protocol Data Units...........................................................................................................203
Root Bridge Selection...................................................................................................................205
Spanning Tree Convergence Time................................................................................................207
STP Port States..............................................................................................................................208
Per−VLAN Spanning Tree............................................................................................................209
EtherChannel........................................................................................................................................209
Link Failure...................................................................................................................................210
Port Aggregation Protocol.............................................................................................................210
Fast Convergence Components of STP...............................................................................................211
PortFast..........................................................................................................................................211
UplinkFast.....................................................................................................................................211
BackboneFast................................................................................................................................212
Enabling STP on a Set/Clear Command−Based Switch......................................................................212

Enabling STP on a Set/Clear Command−Based Switch for All VLANs............................................213
Disabling STP on a Set/Clear Command−Based Switch.....................................................................213
Disabling STP on a Set/Clear Command−Based Switch by VLAN...................................................213
Viewing the STP Configuration on a Set/Clear Command−Based Switch.........................................213
Configuring STP on an IOS Command−Based Switch.......................................................................214
Disabling STP on an IOS Command−Based Switch...........................................................................214
Viewing the STP Configuration on a Command Line Switch.............................................................215
Configuring the STP Root Switch.......................................................................................................215
Configuring the STP Secondary Root Switch.....................................................................................215
Setting the Root Bridge for More than One VLAN on a Set/Clear Command−Based Switch...........216
Assigning a Port Cost to a Port Using the Set/Clear Command−Based IOS......................................216
Assigning a Port Cost to a Port Using a CLI−Based Switch...............................................................216
ix


Table of Contents
Chapter 10: Layer 2 Redundant Links
Verifying the Port Cost Configuration on Both a Set/Clear Command− and CLI−Based Interface...217
Configuring the Port Priority on a Set/Clear Command−Based IOS..................................................217
Configuring the Port Priority on a CLI−Based IOS............................................................................217
Verifying the STP Port Priority on a Set/Clear Command−Based Switch..........................................218
Verifying the VLAN Priority Settings.................................................................................................218
Adjusting the FwdDelay Timer on a Set/Clear Command−Based IOS...............................................218
Adjusting the Hello Timer on a Set/Clear Command−Based IOS......................................................218
Adjusting the MaxAge Timer on a Set/Clear Command−Based IOS.................................................219
Preparing to Enable EtherChannel.......................................................................................................219
Viewing the Port Setting for EtherChannel on a Set/Clear Command−Based Switch........................219
Creating an EtherChannel on a Set/Clear Command−Based Switch..................................................220
Verifying the EtherChannel Configuration..........................................................................................221
Defining an EtherChannel Administrative Group...............................................................................221

Viewing an EtherChannel Administrative Group................................................................................221
Configuring EtherChannel on an IOS−Based Switch..........................................................................222
Identifying the Template Port..............................................................................................................222
Verifying the EtherChannel Configuration on a Command Line Interface IOS.................................222
Enabling PortFast on a Set/Clear Command−Based Switch...............................................................223
Disabling PortFast on a Set/Clear Command−Based Switch..............................................................223
Enabling PortFast on a CLI−Based IOS Switch..................................................................................223
Disabling PortFast on a CLI−Based IOS Switch.................................................................................224
Verifying the PortFast Configuration..................................................................................................224
Enabling UplinkFast on a Set/Clear Command−Based Switch...........................................................224
Disabling UplinkFast on a Set/Clear Command−Based Switch..........................................................224
Verifying the UplinkFast Configuration..............................................................................................225
Enabling UplinkFast on a Cisco IOS Command−Based Switch.........................................................225
Disabling UplinkFast on a Cisco IOS Command−Based Switch........................................................225
Viewing the UplinkFast Configuration on an IOS−Based Switch......................................................226
Viewing UplinkFast Statistics on an IOS−Based Switch....................................................................226
Enabling BackboneFast on a Set/Clear Command−Based Switch......................................................226
Disabling BackboneFast on a Set/Clear Command−Based Switch.....................................................226
Viewing the BackboneFast Configuration...........................................................................................226
Chapter 11: Multilayer Switching.................................................................................................................227
In Depth...............................................................................................................................................227
How MLS Works.................................................................................................................................227
MLS Components..........................................................................................................................228
MLS Flows....................................................................................................................................230
Access List Flow Masks................................................................................................................231
MLS Troubleshooting Notes...............................................................................................................232
Configuring MLS.................................................................................................................................233
MLS Cache....................................................................................................................................234
Aging Timers.................................................................................................................................234
VLAN ID.......................................................................................................................................235

VTP Domain..................................................................................................................................235
Management Interfaces.................................................................................................................235
Configuring an External MLS Route Processor..................................................................................235
Enabling MLSP on an MLS−RP for IP.........................................................................................236
Disabling MLSP on an MLS−RP for IP........................................................................................236
Enabling MLSP on an MLS−RP for IPX......................................................................................236
Disabling MLSP on an MLS−RP for IPX.....................................................................................236
x


Table of Contents
Chapter 11: Multilayer Switching
Assigning a VLAN ID...................................................................................................................236
Adding an MLS Interface to a VTP Domain................................................................................236
Enabling MLS on an Individual Interface.....................................................................................237
Disabling MLS on an External Router Interface...........................................................................237
Configuring the MLS Switch Engine..................................................................................................237
Re−enabling MLS on a Catalyst 6000..........................................................................................237
Re−enabling MLS on a Catalyst 5000..........................................................................................238
Disabling MLS on a Catalyst 6000...............................................................................................238
Disabling MLS on a Catalyst 5000...............................................................................................238
Configuring the MLS Cache on the Catalyst 5000.......................................................................238
Configuring Fast Aging on a Catalyst 5000..................................................................................238
Configuring Fast Aging on a Catalyst 6000..................................................................................238
Disabling Fast Aging on a Catalyst 6000......................................................................................238
Configuring Long Aging on the Catalyst 6000.............................................................................239
Disabling Long Aging on the Catalyst 6000.................................................................................239
Configuring Normal Aging on the Catalyst 6000.........................................................................239
Disabling Normal Aging on the Catalyst 6000.............................................................................239
Assigning MLS Management to an Interface on the Catalyst 5000..............................................239

Disabling MLS Management on an Interface on the Catalyst 5000.............................................239
Monitoring and Viewing the MLS Configuration...............................................................................240
Viewing the MLS Aging Configuration on a Catalyst 6000.........................................................240
Displaying the IP MLS Configuration..........................................................................................240
Viewing MLS−RPs.......................................................................................................................240
Viewing MLS−RP Specifics.........................................................................................................240
Displaying MLS VTP Domain Information..................................................................................241
Viewing the MLS VLAN Interface Information...........................................................................241
Viewing MLS Statistics on the Catalyst 5000...............................................................................241
Viewing MLS Statistics on the Catalyst 6000...............................................................................242
Viewing MLS Entries....................................................................................................................242
Chapter 12: Hot Standby Routing Protocol.................................................................................................243
In Depth...............................................................................................................................................243
Routing Problems................................................................................................................................243
Routing Information Protocol.......................................................................................................244
Proxy ARP.....................................................................................................................................244
ICMP Router Discovery Protocol.................................................................................................244
The Solution.........................................................................................................................................245
HSRP Message Format.................................................................................................................247
The HSRP States...........................................................................................................................247
HSRP Configuration............................................................................................................................248
HSRP Interface Tracking.....................................................................................................................248
Opening a Session on an Internal Route Processor.............................................................................249
Entering Configuration Mode on an RSM...........................................................................................249
Enabling HSRP and Assigning an IP Address to a Standby Group....................................................249
Assigning an HSRP Interface Priority.................................................................................................250
Assigning a Preempt Delay to a Standby Group.................................................................................250
Removing a Preempt Delay from a Standby Group............................................................................250
Setting the HSRP Hello and Hold Timers...........................................................................................250
Removing the HSRP Hello and Hold Timers......................................................................................251

Configuring a Clear−Text Password for HSRP Authentication..........................................................251
Configuring Two RSFC Interfaces as One HSRP Group....................................................................251
xi


Table of Contents
Chapter 12: Hot Standby Routing Protocol
Enabling Interface Tracking................................................................................................................252
Using the show standby Command.....................................................................................................252
Using the debug Command..................................................................................................................253
Chapter 13: Policy Networking.....................................................................................................................254
In Depth...............................................................................................................................................254
Access Security Policies......................................................................................................................254
Core Layer Policies.......................................................................................................................255
Distribution Layer Policies............................................................................................................255
Security at the Access Layer................................................................................................................261
Configuring Passwords..................................................................................................................261
Limiting Telnet Access.................................................................................................................261
Implementing Privilege Levels.....................................................................................................261
Configuring Banner Messages......................................................................................................262
Physical Device Security...............................................................................................................262
Port Security..................................................................................................................................262
VLAN Management......................................................................................................................263
Creating a Standard Access List..........................................................................................................263
Creating an Extended Access List.......................................................................................................264
Applying Access Lists Using access−class.........................................................................................266
Applying Access Lists Using distribute−list.......................................................................................266
Configuring a Telnet Session Time−Out Value..................................................................................267
Implementing Privilege Levels on a 1900EN......................................................................................267
Configuring Line Console Time−Out Values......................................................................................267

Configuring Banner Messages.............................................................................................................268
Enabling HTTP Access........................................................................................................................268
Enabling Port Security.........................................................................................................................269
Displaying the MAC Address Table....................................................................................................270
Chapter 14: Web Management......................................................................................................................272
In Depth...............................................................................................................................................272
Standard and Enterprise Edition CVSM..............................................................................................272
CVSM Client Requirements................................................................................................................272
CVSM Access Levels..........................................................................................................................273
CVSM Default Home Page..................................................................................................................273
The Switch Image..........................................................................................................................274
Configuring the Switch with an IP Address and Setting the Default Web Administration Port.........275
Connecting to the Web Management Console.....................................................................................276
Configuring the Switch Port Analyzer.................................................................................................281
Chapter 15: The Standard Edition IOS........................................................................................................283
In Depth...............................................................................................................................................283
The 1900 and 2820 Series Switches....................................................................................................283
Main Menu Choices......................................................................................................................283
[C] Console Settings......................................................................................................................284
[S] System Menu...........................................................................................................................285
[N] Network Management.............................................................................................................286
[P] Port Configuration...................................................................................................................289
[A] Port Addressing.......................................................................................................................292
[D] Port Statistics Detail................................................................................................................293
[M] Monitor...................................................................................................................................293
xii


Table of Contents
Chapter 15: The Standard Edition IOS

[V] Virtual LAN............................................................................................................................293
[R] Multicast Registration.............................................................................................................294
[F] Firmware..................................................................................................................................294
[I] RS−232 Interface......................................................................................................................295
[U] Usage Summaries...................................................................................................................296
Configuring Network Settings on the 1900 and 2820 Series...............................................................298
Configuring Broadcast Storm Control on Switch Ports.......................................................................299
Configuring SNMP on the 1900 Series...............................................................................................300
Configuring Port Monitoring on the Standard Edition IOS.................................................................303
Configuring VLANs on the Standard Edition IOS..............................................................................304
Configuring Spanning Tree Protocol...................................................................................................307
Chapter 16: Switch Troubleshooting............................................................................................................309
In Depth...............................................................................................................................................309
Hardware Troubleshooting..................................................................................................................309
No Power.......................................................................................................................................309
POST.............................................................................................................................................309
Indicator Lights.............................................................................................................................310
Switch Cabling.....................................................................................................................................311
Cable Problems..............................................................................................................................312
Cross−Over Cables........................................................................................................................312
Switch Troubleshooting Tools.............................................................................................................312
CiscoWorks for Switched Internetworks......................................................................................312
IOS Software Troubleshooting Commands..................................................................................313
Viewing the Set/Clear IOS Configuration...........................................................................................316
Viewing the CLI−Based IOS Configuration.......................................................................................320
Viewing the Software Version on a Set/Clear Command−Based IOS Module..................................321
Viewing the IOS Version Information on a CLI−Based IOS..............................................................321
Using the show flash Command on a Set/Clear Command−Based IOS.............................................321
Testing the Supervisor Engine Hardware on a Set/Clear Command−Based Switch...........................322
Testing External Module Hardware on a Set/Clear Command−Based Switch...................................323

Viewing the System Configuration on a Set/Clear Command−Based Switch....................................323
Viewing the VTP Domain Configuration on a Set/Clear IOS.............................................................324
Viewing the VTP Domain Configuration on a CLI−Based IOS.........................................................324
Viewing the VLAN Configuration on a Set/Clear Command−Based Switch.....................................324
Viewing the VLAN Configuration on a CLI−Based IOS....................................................................325
Viewing the Spanning Tree Configuration on a Set/Clear Command−Based IOS.............................325
Viewing the Spanning Tree Configuration on a CLI−Based IOS.......................................................326
Viewing the CAM (MAC Address) Table on a Set/Clear Command−Based IOS..............................328
Viewing the CAM (MAC Address) Table on a CLI−Based IOS........................................................328
Viewing the CDP Neighbors on a Set/Clear Command−Based IOS...................................................329
Viewing the CDP Neighbors on a CLI−Based IOS.............................................................................329
Viewing Individual Port CAM Tables on a CLI−Based IOS..............................................................330
Viewing Port Statistics on a Set/Clear IOS.........................................................................................330
Viewing Port Statistics on a CLI−Based IOS......................................................................................332
Using the Port Configuration on a Set/Clear Command−Based IOS..................................................333
Using the show port Command on a CLI−Based IOS.........................................................................333
Using the show vlan Command on a Set/Clear Command−Based IOS..............................................334
Using the show vlan Command on a CLI−Based IOS........................................................................334
Using the show interface Command on a Set/Clear Command−Based IOS.......................................335
Using the show interface Command on a CLI−Based IOS.................................................................335
xiii


Table of Contents
Chapter 16: Switch Troubleshooting
Using the show log Command on a Set/Clear Command−Based IOS................................................336
Configuring SPAN for Port Monitoring on a Set/Clear Command−Based IOS.................................337
Configuring SPAN for VLAN Monitoring on a Set/Clear Command−Based IOS.............................337
Launching the Diagnostic Console on a Cisco 1900 or 2820 Series Switch.......................................337
Using the Diagnostic Console to Upgrade the Firmware on a Cisco 1900 or 2820 Series Switch.....338

Using the Diagnostic Console for Debugging the Firmware and Hardware.......................................339
Appendix A: Study Resources.......................................................................................................................341
Books...................................................................................................................................................341
Cisco Group Study and Users Groups.................................................................................................341
Live Cisco Training/Internet−Based Labs/Study Resources...............................................................341
Online Resources.................................................................................................................................342
Asynchronous Transfer Mode.......................................................................................................342
Cisco IOS......................................................................................................................................342
Hot Standby Router Protocol........................................................................................................342
Inter−Switch Link.........................................................................................................................342
IP Multicast...................................................................................................................................342
Multilayer Switching.....................................................................................................................342
Quality of Service..........................................................................................................................343
Spanning Tree Protocol.................................................................................................................343
TACACS+.....................................................................................................................................343
VLANs..........................................................................................................................................343
Standards Organizations......................................................................................................................343
Cisco Job Search Sites.........................................................................................................................344
Appendix B: Basic IOS CLI−to−Set/Clear Commands..............................................................................345
Overview..............................................................................................................................................345
Appendix C: The Cisco Consultant...............................................................................................................347
Overview..............................................................................................................................................347
Establishing Credibility.......................................................................................................................347
Come Off As an Expert.................................................................................................................348
Designing a Solution............................................................................................................................348
Estimating the Cost.......................................................................................................................349
Presenting the Final Proposal and Creating Expectations.............................................................349
Contracting...........................................................................................................................................350
Document, Document, Document........................................................................................................350
The Way to Fail...................................................................................................................................350

Failing to Be There When Promised, or Rushing through the Job................................................350
Failing to Manage Your Time.......................................................................................................351
Assuming You Know What the Customer Needs.........................................................................351
Failing to Take Responsibility......................................................................................................352
Conclusion...........................................................................................................................................352
Appendix D: Cisco 1912EN and Catalyst 5000 Configuration Practice Lab............................................353
Required Equipment............................................................................................................................353
Lab Objectives.....................................................................................................................................354
Possible Solution..................................................................................................................................355
The 1912 Basic Configuration......................................................................................................355
The Catalyst 5000 Basic Configuration........................................................................................357
Configuring the Cisco 2621 Interface for ISL Trunking...............................................................358
xiv


Table of Contents
Appendix E: Switch Features........................................................................................................................359
Access Layer Switches........................................................................................................................359
Cisco Catalyst 1900.......................................................................................................................359
Cisco Catalyst 2820.......................................................................................................................360
Cisco Catalyst 2900.......................................................................................................................360
Cisco Catalyst 3000.......................................................................................................................362
Cisco Catalyst 3500 Series XL......................................................................................................362
Cisco Catalyst 3900 Series............................................................................................................363
Distribution Layer Switches................................................................................................................364
Cisco Catalyst 4000 Series............................................................................................................365
Catalyst 5000 Series......................................................................................................................365
Catalyst 6000 Series......................................................................................................................366
Core Layer/WAN Switches.................................................................................................................367
Cisco Catalyst 8400 Series............................................................................................................368

Cisco Catalyst 8500 Series............................................................................................................369
BPX 8600 Series...........................................................................................................................370
MGX 8800 Series..........................................................................................................................371
12000 Series Gigabit Switch Routers............................................................................................372
A....................................................................................................................................................373
B....................................................................................................................................................375
C....................................................................................................................................................376
D....................................................................................................................................................378
E−F................................................................................................................................................380
G−I................................................................................................................................................382
K−L...............................................................................................................................................385
M−N..............................................................................................................................................386
O−P................................................................................................................................................388
Q−R...............................................................................................................................................390
S.....................................................................................................................................................391
T.....................................................................................................................................................393
U−X...............................................................................................................................................395

xv


Cisco Switching Black Book
Sean Odom
Hanson Nottingham
© 2001 The Coriolis Group. All rights reserved.
This book may not be duplicated in any way without the express written consent of the publisher, except in
the form of brief excerpts or quotations for the purposes of review. The information contained herein is for the
personal use of the reader and may not be incorporated in any commercial programs, other books, databases,
or any kind of software without written consent of the publisher. Making copies of this book or any portion
for any purpose other than your own is a violation of United States copyright laws.

Limits of Liability and Disclaimer of Warranty
The author and publisher of this book have used their best efforts in preparing the book and the programs
contained in it. These efforts include the development, research, and testing of the theories and programs to
determine their effectiveness. The author and publisher make no warranty of any kind, expressed or implied,
with regard to these programs or the documentation contained in this book.
The author and publisher shall not be liable in the event of incidental or consequential damages in connection
with, or arising out of, the furnishing, performance, or use of the programs, associated instructions, and/or
claims of productivity gains.
Trademarks
Trademarked names appear throughout this book. Rather than list the names and entities that own the
trademarks or insert a trademark symbol with each mention of the trademarked name, the publisher states that
it is using the names for editorial purposes only and to the benefit of the trademark owner, with no intention of
infringing upon that trademark.
The Coriolis Group, LLC
14455 N. Hayden Road
Suite 220
Scottsdale, Arizona 85260
(480) 483−0192
FAX (480) 483−0193
/>Library of Congress Cataloging−in−Publication Data
Odom, Sean
Cisco switching black book / by Sean Odom.
p. cm.
Includes index.
ISBN 1−57610−706−X
1. Packet switching (Data transmission) I. Title.
TK5105.3 .O36 2000
004.6’6—dc21 00−064415
10 9 8 7 6 5 4 3 2 1
President and CEO

Keith Weiskamp
Publisher
1


Steve Sayre
Acquisitions Editor
Charlotte Carpentier
Product Marketing Manager
Tracy Rooney
Project Editor
Toni Zuccarini Ackley
Technical Reviewer
Deniss Suhanovs
Production Coordinator
Carla J. Schuder
Cover Designer
Jody Winkler
Layout Designer
April Nielsen
Dear Reader:
Coriolis Technology Press was founded to create a very elite group of books: the ones you keep closest to
your machine. Sure, everyone would like to have the Library of Congress at arm’s reach, but in the real world,
you have to choose the books you rely on every day very carefully.
To win a place for our books on that coveted shelf beside your PC, we guarantee several important qualities in
every book we publish. These qualities are:
•Technical accuracy—It’s no good if it doesn’t work. Every Coriolis Technology Press book is reviewed by
technical experts in the topic field, and is sent through several editing and proofreading passes in order to
create the piece of work you now hold in your hands.
•Innovative editorial design—We’ve put years of research and refinement into the ways we present

information in our books. Our books’ editorial approach is uniquely designed to reflect the way people learn
new technologies and search for solutions to technology problems.
•Practical focus—We put only pertinent information into our books and avoid any fluff. Every fact included
between these two covers must serve the mission of the book as a whole.
•Accessibility—The information in a book is worthless unless you can find it quickly when you need it. We
put a lot of effort into our indexes, and heavily cross−reference our chapters, to make it easy for you to move
right to the information you need.
Here at The Coriolis Group we have been publishing and packaging books, technical journals, and training
materials since 1989. We’re programmers and authors ourselves, and we take an ongoing active role in
defining what we publish and how we publish it. We have put a lot of thought into our books; please write to
us at and let us know what you think. We hope that you’re happy with the book in your
hands, and that in the future, when you reach for software development and networking information, you’ll
turn to one of our books first.
Keith Weiskamp President and CEO

2


Jeff Duntemann VP and Editorial Director
This book is dedicated to all those who endeavor to turn dreams into realities.
—Sean Odom
To my wife, Sonia, and my daughter, Sabrina.
—Hanson Nottingham
About the Authors
Sean Odom is a CCNP, MCSE, and CNX−Ethernet. He has been in the computer networking field for over
12 years and can be found instructing a number of Cisco courses, including the Switching and Remote Access
courses for Globalnet Training Solutions, Inc. ( Sean is a former
president and currently on the board of the Sacramento Placer County Cisco Users Group (SPCCUG). In
addition, Sean has been a consultant for many companies including Advanced Computer Systems, American
Licorice, CH2M Hill, The Money Store, NCR, Wells Fargo Bank, and Intel. Sean has authored and

co−authored many industry books, labs, and white papers. You can reach Sean by email at
() or see his Web site at />Hanson Nottingham is a CCNA, MCSE, and MCP+I. He is an experienced Windows NT Systems Engineer
with over eight years experience in the Information Systems industry. Hanson is currently working as a
systems manager on the E:Services NT Team at Hewlett−Packard Company. Prior to HP, Hanson helped
manage Vision Service Plan’s Web farm as an Internet systems engineer. He specializes in Web farm
management and integration, SOHO network designs, and e−commerce solutions. Hanson is currently
working to further his Cisco Certified Networking Professional certification.
Acknowledgments
It’s always exciting when you get to the acknowledgments because that means the book is almost done. First
off, I must thank Erin for putting up with me during the writing of this book. She is a wonderful person who is
as smart as she is good looking and puts up with a lot of extra responsibility while I am working on books. I
also need to thank Albert Ip and Hanson Nottingham for their defined knowledge of the Cisco switches.
Thanks to my favorite English teacher, Mr. Strange, for being the one who originally thought I would be a
great writer some day, and I guess it shows here in my third book. Coriolis deserves many thanks. A few
people in particular at Coriolis need to be thanked: Steve Sayre, for believing in my idea of a Cisco Switching
Black Book; my project editor for the second time, Toni Zuccarini Ackley; Tiffany Taylor for finding all my
mistakes; Charlotte Carpentier and Shari Jo Hehr for handling the many contract issues for this book; Jody
Winkler for making the cover; Carla Schuder for making the inside of the book look good; and Paul LoPresto
for all his help in acquisitions.
—Sean Odom
Sean, thank you for giving me the opportunity and the privilege to become a co−author on this book—I
appreciate all your help, assistance, and encouragement! To my wonderful wife, Sonia, and my beautiful
daughter, Sabrina, thank you for giving me the time—dealing with my complicated and difficult schedules I
know has not been easy and your support does not go unnoticed! To Toni and the rest of the Coriolis team,
thank you for this opportunity and your undying patience throughout my process development learning
curve—I owe you guys mochas!
—Hanson Nottingham

3



Introduction
Overview
For many years I have been a consultant for different companies and have written books on switch and router
configurations and troubleshooting. During my years as a consultant I have had to either install, administer, or
troubleshoot switching problems and configurations for switches without a good handbook. I have constantly
gone through bookstores looking for a book on Cisco switch troubleshooting and configurations that didn’t
deal with a Cisco curriculum. Guess what? I couldn’t find one!
I have written books related to the CCDP and CCNP curricula and always thought about writing a book that
concentrated on Cisco switches. One day I was walking through a bookstore and noticed a book from The
Coriolis Group called Cisco Routers for IP Routing Little Black Book. I immediately thought to myself that a
Cisco Switching Little Black Book would be a great configuration handbook for many people. After contacting
Coriolis and pitching them the idea for the book, I received a call from Steve Sayre, the publisher at Coriolis,
who was excited about publishing a book of this nature. As I pondered and started putting my idea into an
outline, I realized that I could not place everything that an administrator needed in a Little Black Book.
To make a long story short, a few months later, with a great big outline and help from Albert Ip and Hanson
Nottingham, the book became this Black Book—the most feature−packed handbook for Cisco switching an
administrator can buy. Not only do we cover the Cisco Catalyst switching line but we also cover the
LightStream ATM switch series, Gigabit Switch Router Series (GSR), and the IGX and MGX WAN switch
series.
Thanks for buying the Cisco Switching Black Book.

Is This Book for You?
The Cisco Switching Black Book was written with the intermediate or advanced user in mind. Among the
topics that are covered, are:
• Cisco Catalyst switch configuration and troubleshooting
• Cisco IGX and MGX switch configuration
• Cisco GSR switch configuration
• Cisco switch troubleshooting
• Cisco switch features

• ATM LightStream switch configuration and troubleshooting
• Switched network design issues

How to Use This Book
The examples in the Immediate Solutions are intended to teach you the basic steps in configuring Cisco
Catalyst switches and their interfaces. Primarily, the Immediate Solutions will cover the information discussed
in the In Depth section of each chapter. When we explain each scenario we will use the following notations:
• <Italics in angle brackets> will be used to denote command elements that have a specific value that
needs to be input, such as characters or numbers. Occasionally some other entry will be needed,
which will be explained in each individual instance.
• [Text in square brackets] is used to denote optional commands that can be configured.

4


• Words in brackets that are separated by bars are used when indicating that there are multiple choices
of commands. For example, when configuring VTP you can enable the trunk port to choose one
mode: on, off, desirable, or auto mode. This will be shown like this: [on|off|desirable|auto].
Knowledge of what configuration mode you are in and how to enter each configuration mode on the Cisco
Command Line Interface is important. Knowing what each mode configures will aid you in using the proper
configuration mode. The Set/Clear command−based IOS CLI uses similar command modes as the Cisco CLI
used on Cisco routers and switches, but uses mainly the enable, set, show, and clear commands. Chapter 1
will cover the different CLI command modes.

The Black Book Philosophy
Written by experienced professionals, Coriolis Black Books provide immediate solutions to global
programming and administrative challenges, helping you complete specific tasks, especially critical ones that
are not well documented in other books. The Black Book’s unique two−part chapter format—thorough
technical overviews followed by practical immediate solutions—is structured to help you use your knowledge,
solve problems, and quickly master complex technical issues to become an expert. By breaking down

complex topics into easily manageable components, this format helps you quickly find what you’re looking
for, with commands, jump tables, and step−by−step configurations located in the Immediate Solutions section.
I welcome your feedback on this book. You can either email The Coriolis Group at or
email me directly at Errata, updates, information on classes I teach, and more are
available at my Web site: />
5


Chapter 1: Network Switching Fundamentals
In Depth
Although writing the first paragraph of a book is probably the least important part, it’s invariably the most
difficult section to write. To get a good picture of the different parts of networking, readers need to know
where networking began and the history behind the networks of today. You may have seen a lot of what is in
the first section of this chapter in any basic networking course, such as Networking Essentials; or you may
have covered most of it in a CCNA class; but a refresher never hurt.
In this chapter, you will become acquainted with the history of networks and how networks evolved into those
you see in today’s corporate environments. I will also discuss the inventors of the different types of
networking equipment found at each layer of the network.
As we progress through the chapter I will also cover the different network architectures, from legacy networks
to the fast high−speed media types found in today’s networks. A clear understanding of the networking
technologies and challenges found at each layer of the network will aid you in assessing problems with the
switches you’ll deal with later.
I have a favorite quote that helps me to remember why I continuously study, so that I can better support my
customers’ equipment. It is a quote by Albert Einstein, and I remember it from one of my mentors: “The
significant [technical] problems we face cannot be solved by the same level of thinking that created them.”
This chapter will contain some of the following information:
• The history of networking
• The different pieces of networking equipment
• How to identify problems in a flat network topology
• The how to’s and the when to’s of upgrading to a switched network

• When to upgrade your flat topology network
• Network upgrade planning and basic strategies
Two terms to keep in mind when reading this chapter are resource nodes and demand nodes. A resource node
is a node on an interface attached to a device that provides resources to the network. These nodes can be
everything from printers, servers, and mainframes, to wide area network (WAN) routers. A demand node is an
interface on the network that makes requests or queries to the resource nodes. The interfaces can be devices
such as workstations, terminals, or even client applications. Network conversations occur when resource
nodes and demand nodes send a series of requests and responses through the network.

Physical Media and Switching Types
The following are the most popular types of physical media in use today:
• Ethernet—Based on the Institute of Electrical and Electronics Engineers (IEEE) 802.3 standard.
However, it doesn’t rely on the Carrier Sense Multiple Access Collision Detection (CSMA/CD)
technology. It includes 10Mbps LANs, as well as Fast Ethernet and Gigabit Ethernet.
• Token−Ring—Not as popular as Ethernet switching. Token−Ring switching can also be used to
improve LAN performance.
• FDDI—Rarely used, chiefly due to the high expense of Fiber Distributed Data Interface (FDDI)
equipment and cabling.
The following are some of the protocol and physical interface switching types in use today:
6


• Port switching—Takes place in the backplane of a shared hub. For instance, ports 1, 2, and 3 could be
connected to backplane 1, whereas ports 4, 5, and 6 could be connected to backplane 2. This method
is typically used to form a collapsed backbone and to provide some improvements in the network.
• Cell switching—Uses Asynchronous Transfer Mode (ATM) as the underlying technology. Switch
paths can be either permanent virtual circuits (PVCs) that never go away, or switched virtual circuits
(SVCs) that are built up, used, and torn down when you’re finished.

A Bit of History

The first local area networks (LANs) began as a result of the introduction of personal computers into the
workplace environment. As computers became more common, the need arose to share resources, such as
printers or files. These early networks were pretty simple, with a handful of computers sharing a few printers
and not much more. As more items such as servers, applications, and peripherals came along, the increasing
numbers of interfaces—along with application designs that could take advantage of the network—created a
weakness in the current network design.
The limitations of traditional Ethernet technology brought forth a number of innovations that soon became
standard in the Ethernet protocol. Innovations such as full duplexing, Fast Ethernet, and Gigabit Ethernet
began to appear—innovations that have also made possible a transition to switches from shared hubs.
Other limitations to the way networks operated in a shared environment created a need for alternative methods
to permit the use of bandwidth−intensive applications such as video and voice. Switches are one of these
alternative methods. In many respects, switches are relatively simple devices. A switch’s design and
self−learning features require very little manual configuration to get it up and running. To properly use these
devices in your network, you must have an in−depth knowledge of the issues involved in implementing
switching.
Knowing the basics of Ethernet technology can help you effectively troubleshoot and install switches in the
network. You also need a good grasp of the different technologies and how switches work, as well as the
constraints of each type of device you may use in the network. As you read the following sections, make sure
you get a clear understanding of the fundamentals and basics of Ethernet technology.
The types of devices you use in the network have important implications for network performance. For
example, bridges and routers are both devices that network administrators use to extend the capabilities of
their networks. Both of them have advantages and disadvantages.
Bridges, for example, can easily solve distance limitations and increase the number of stations you can have
on a network, but they can have real problems with broadcast traffic. Routers can be used to prevent this
problem, but they increase the time it takes to forward the traffic.
This has been the pattern throughout the history of networking. When a new product is introduced, problems
or bottlenecks are soon found that limit the product’s usefulness. Then, innovations are invented or
implemented to aid the product and allow it to perform better. To see this occurrence in action, let’s take a
look at some of the traditional network architectures. As you will see in upcoming sections, the pattern of new
innovation after new innovation started in the earliest days of networking and continues in today’s networks.


Networking Architectures
Network designers from the beginnings of networking were faced with the limitations of the LAN topologies.
In modern corporate networks, LAN topologies such as Ethernet, Token Ring, and FDDI are used to provide
network connectivity. Network designers often try to deploy a design that uses the fastest functionality that
can be applied to the physical cabling.

7


Many different types of physical cable media have been introduced over the years, such as Token Ring, FDDI,
and Ethernet. At one time, Token Ring was seen as a technically superior product and a viable alternative to
Ethernet. Many networks still contain Token Ring, but very few new Token Ring installations are being
implemented. One reason is that Token Ring is an IBM product with very little support from other vendors.
Also, the prices of Token Ring networks are substantially higher than those of Ethernet networks.
FDDI networks share some of the limitations of Token Ring. Like Token Ring, FDDI offers excellent benefits
in the area of high−speed performance and redundancy. Unfortunately, however, it has the same high
equipment and installation costs. More vendors are beginning to recognize FDDI and are offering support,
services, and installation for it—especially for network backbones.
Network backbones are generally high−speed links running between segments of the network. Normally,
backbone cable links run between two routers; but they can also be found between two switches or a switch
and a router.
Ethernet has by far overwhelmed the market and obtained the highest market share. Ethernet networks are
open−standards based, more cost−effective than other types of physical media, and have a large base of
vendors that supply the different Ethernet products. The biggest benefit that makes Ethernet so popular is the
large number of technical professionals who understand how to implement and support it.
Early networks were modeled on the peer−to−peer networking model. These worked well for the small
number of nodes, but as networks grew they evolved into the client/server network model of today. Let’s take
a look at these two models in more depth.
Peer−to−Peer Networking Model

A small, flat network or LAN often contains multiple segments connected with hubs, bridges, and repeaters.
This is an Open Systems Interconnection (OSI) Reference Model Layer 2 network that can actually be
connected to a router for access to a WAN connection. In this topology, every network node sees the
conversations of every other network node.
In terms of scalability, the peer−to−peer networking model has some major limitations—especially with the
technologies that companies must utilize to stay ahead in their particular fields. No quality of service,
prioritizing of data, redundant links, or data security can be implemented here, other than encryption. Every
node sees every packet on the network. The hub merely forwards the data it receives out of every port, as
shown in Figure 1.1.

Figure 1.1: A flat network topology.
Early networks consisted of a single LAN with a number of workstations running peer−to−peer networks and
sharing files, printers, and other resources. Peer−to−peer networks share data with one another in a
non−centralized fashion and can span only a very limited area, such as a room or building.
8


Client/Server Network Model
Peer−to−peer model networks evolved into the client/server model, in which the server shares applications
and data storage with the clients in a somewhat more centralized network. This setup includes a little more
security, provided by the operating system, and ease of administration for the multiple users trying to access
data.
A LAN in this environment consists of a physical wire connecting the devices. In this model, LANs enable
multiple users in a relatively small geographical area to exchange files and messages, as well as to access
shared resources such as file servers and printers. The isolation of these LANs makes communication between
different offices or departments difficult, if not impossible. Duplication of resources means that the same
hardware and software have to be supplied to each office or department, along with separate support staff for
each individual LAN.
WANs soon developed to overcome the limitations of LANs. WANs can connect LANs across normal
telephone lines or other digital media (including satellites), thereby ignoring geographical limitations in

dispersing resources to network clients.
In a traditional LAN, many limitations directly impact network users. Almost anyone who has ever used a
shared network has had to contend with the other users of that network and experienced the impacts. These
effects include such things as slow network response times, making for poor network performance. They are
due to the nature of shared environments.
When collision rates increase, the usefulness of the bandwidth decreases. As applications begin having to
resend data due to excessive collisions, the amount of bandwidth used increases and the response time for
users increases. As the number of users increases, the number of requests for network resources rises, as well.
This increase boosts the amount of traffic on the physical network media and raises the number of data
collisions in the network. This is when you begin to receive more complaints from the network’s users
regarding response times and timeouts. These are all telltale signs that you need a switched Ethernet network.
Later in this chapter, we will talk more about monitoring networks and solutions to these problems. But before
we cover how to monitor, design, and upgrade your network, let’s look at the devices you will find in the
network.

The Pieces of Technology
In 1980, a group of vendors consisting of Digital Equipment Corporation (DEC), Intel, and Xerox created
what was known as the DIX standard. Ultimately, after a few modifications, it became the IEEE 802.3
standard. It is the 802.3 standard that most people associate with the term Ethernet.
The Ethernet networking technology was invented by Robert M. Metcalfe while he was working at the Xerox
Palo Alto Research Center in the early 1970s. It was originally designed to help support research on the
“office of the future.” At first, the network’s speed was limited to 3Mbps.
Ethernet is a multiaccess, packet−switched system with very democratic principles. The stations themselves
provide access to the network, and all devices on an Ethernet LAN can access the LAN at any time. Ethernet
signals are transmitted serially, one bit at a time, over a shared channel available to every attached station.
To reduce the likelihood of multiple stations transmitting at the same time, Ethernet LANs use a mechanism
known as Carrier Sense Multiple Access Collision Detection (CSMA/CD) to listen to the network and see if it
is in use. If a station has data to transmit, and the network is not in use, the station sends the data. If two
stations transmit at the same time, a collision occurs. The stations are notified of this event, and they instantly
reschedule their transmissions using a specially designed back−off algorithm. As part of this algorithm, each

station involved chooses a random time interval to schedule the retransmission of the frame. In effect, this
process keeps the stations from making transmission attempts at the same time and prevents a collision.
9


Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×