Symbols Numerics A

Total Page:16

File Type:pdf, Size:1020Kb

Symbols Numerics A I N D E X GLOP, 484–485 Symbols IP multicast, 480 limited-scope, 484 ! (exclamation point) character, 105 MAC address notification, 317–318 # (pound sign) character, 105 NAT, 649 reserved link local, 483–484 Numerics source-specific multicast, 484 virtual MAC, 573 10-Gigabit, 54 adjacencies, 393–394, 408 10-Mbps Ethernet, 48 ADSL (asymmetric digital subscriber line), 56 802.1D, compatibility with RSTP, 230 agents, relay (DHCP), 379 802.1Q, 156–158 aggregate policers, 448 802.1X Aggressive mode UDLD (A-UDLD), 336–338, 604 configuration exercise, 663–669 configuration exercises, 354 network access security, 639–641 versus Loop Guard, 272 AppleTalk Remote, 624 applications A Auto QoS, 463 Cisco AVVID, 16 AAA statistics, 291 accounting, 625, 629 voice, 596 authentication, 173, 623–626 Application-Specific Integrated Circuits. See ASICs authorization, 624, 627 applying RACLs, 643 configuration exercise, 663–669 Architecture for Voice, Video and integrated Data. configuring, 630–631 See Cisco AVVID aaa authentication login command, 626 ARP (Address Resolution Protocol), 12 aaa new-model command, 87, 626 DAI, 654–658 access as a security feature, 658–659 firewalls, 647–648 throttling, 396–398 hopping attacks (VLAN), 660–661 ASICs (Application-Specific Integrated Circuits), physical, 619 5–6, 275 unauthorized, 77 assured forwarding, 431–432 access control lists. See ACLs asymmetric digital subscriber line (ADSL), 56 access layer, 18 attacks, 655, 660–661 access-layer switches, 50 attenuation, 720 accounting, 625, 629 A-UDLD (Aggressive mode UDLD), ACLs (access control lists), 4, 618, 643 336–338, 604 PACLs, 646 configuration exercises, 354 RACLs, 643 versus Loop Guard, 272 security, 642 authentication, 173, 623–626 VACLs, 644 authorization, 624, 627 vty lines, 619 auth-proxy, 627 active keyword, 513 Auto QoS, 463 adding switches, 186 auto-negotiation, 53, 767 Address Resolution Protocol. See ARP Auto-RP, 494–495 addresses availability (VoIP), 4 globally scoped, 484 AVVID. See Cisco AVVID 788 baby giants B C baby giants, 157, 326 C, 39, 78 BackboneFast, 260 cable plants, 597 configuration.exe, 281–286 CallManager. See Cisco CallManager configuring, 264 CAM (content addressable memory), 398 link failures, 261 Campus Backbone in RSTP, 227 layer, 66 backup ports, 225 submodule, 23, 26 backup root bridges, 211 Campus Infrastructure module, 57 black holes, preventing, 269–271 campus networks, 19, 132–133 blocking state, 206 Canonical Format Indicator boot system flash command, 102 (CFI), 156 bootstrap router (BSR), 495–496 case studies BPDUs (Bridge Protocol Data Units), 203 aggressive mode UDLD, filtering, 266 340–344 formats, 226–227 design (C language), 69–70 frames, 204 preventing VLAN hopping attacks, Guard, 258, 264 660–661 TCN, 213 Catalyst 2950 switches, 696–697 timers, 204 power redundancy, 552 bridge IDs, 202 reflector ports, 738 Bridge Protocol Data Units. See BPDUs WRR, 453 bridge virtual interface (BVI), 373 Catalyst 2955 switches, 738 bridging Catalyst 2970 switches, 453–454 backup/primary root, 211 Catalyst 3550 switches, 37–38, 694–696 loops, 198 power redundancy, 552 building loop-free networks, 200 security, 38–39 Loop Guard, 270 updating software versions, 105 preventing, 199–200 Catalyst 3560 switches, 37–39, 69, troubleshooting, 277 693–694 signaling topology changes, 213–215 Catalyst 3750 switches, 37–38, 691–693 study tips, 240–241 security, 38–39 broadcasting SRR, 453–454 domains, 7 Catalyst 4500 switches, 550–552, 688–691 packets, 480 high availability, 535 suppression, 324–325 redundancy, 534 BSR (bootstrap router), 495–496 security, 37 building, 462 SSO, 540–544 loop-free networks, 200 Catalyst 6500 modules, 686 networks (Layer 3), 16–17 Catalyst 6500 switches, 77, 679–682, 687 Building Access submodule, 23, 26 configuring, 452 Building Distribution submodule, 23, 26 deployment scenarios, 687 burst size, 447 features of, 34–35 BVI (bridge virtual interface), 373 high availability, 535 Cisco Firewall Services Module 789 hybrid-mode, 78 centralized/distributed switching, 395–396 line cards, 682 commands, 414 redundancy, 534 configuration, 404–406 redundant power supplies, 550–552 adjacency tables, 408–411 security, 36 CEF tables, 406 service modules, 681 distributed switching, 396 Supervisor Engine 720, 685 load sharing, 404 Supervisor Engine I, 682 sample operation, 402–403 Supervisor Engine II, 683–684 study tips, 412–414 VACL actions, 644 switching table architectures Catalyst QoS trust concept, 437 CAM, 398 Catalyst switches, 540–542, 549 TCAM, 399, 401 authorization, 624 troubleshooting BackboneFast, 263 configuration exercise, 415–418 bridge IDs, 202 debugging CEF on Layer 3 Engine, 410 Cisco IOS-based, 728 methodology, 411–412 configuring verification, 405 multilayer switching, 391 centralized switching, 395–396 voice VLANs, 608–612 CFI (Canonical Format Indicator), 156 as VTP servers, 174 channeling (EtherChannel), 298 EtherChannel, 298 chromatic dispersion, 720 L2 traceroute availability, 746 Cisco AVVID, 15, 41 multilayer, 369 applications, 16 policing, 448 IP, 597 pVLANs, 148 network topology, 16 QoS fundamentals, 433–443 supported components, 15 redundant Supervisor Engines, 533–542 Cisco CallManager, 165, 448, 596 RSPAN feature support, 738 Cisco Catalyst switches. See Catalyst switches security, 617 Cisco CatOS ACLs, 618 compared to Cisco IOS (Native Mode), 78 disabling, 620–621 configuring VLANs, 140 passwords, 618 converting to Cisco IOS (Native Mode), 106 physical access, 619 differences as compared to Cisco IOS, 79 software images, 96, 99–100 feature parity with Cisco IOS, 78–79 troubleshooting, 107 MDGs, 316–317 configuration commands, 109 switches, 82 connecting switches, 111 configuration changes, 94 debug commands, impact and use, 109 DNS lookup, 90 IP connectivity, 112 passwords, 86 show and debug commands, 108 Syslog destination, 91 updating software versions, 101–102, 105 time adjustments, 85 VMPS support, 135 Cisco CatOS-based switches wavelengths, 718 L2 traceroute command output, 748 CDP (Cisco Discovery Protocol), 311, 314, 621 SPAN configuration, 730 CEF (Cisco Express Forwarding), 4, 391–395, 539 Cisco Discovery Protocol (CDP), 311, 314, 621 CEF-based MLS, 391–395 Cisco Express Forwarding. See CEF ARP throttling, 396–398 Cisco Firewall Services Module, 34 790 Cisco IFS Cisco IFS, 96 performance management, 757 determining IFS size and contents, 98 QoS, 465 formatting and copying images, 96 redundancy, 584 prefix descriptions, 97–98 RSPAN, 738 Cisco IOS, 163–164 security, 663–664 Catalyst switches, 115–121 show, 516 configuring AAA authorization, 628 show catalyst6000 traffic-meter, 290 debug command, 108 show interface, 83, 112 differences as compared to Cisco CatOS, 79 show ip mroute, 513–514 feature parity with Cisco CatOS, 78–79 show ip route, 112 file system, 96 show logging, 288 determining size and contents, 98 show process cpu, 289 image naming, 99–100 show running-config interface, 143 global configuration mode, 137–139 show system, 290 naming conventions, 100 shutdown interface-level, 290 show command, 108 snmp-server user, 94 switches spanning-tree portfast, 285 DNS lookup, 90 srr-queue bandwidth shape, 454 NTP settings, 85 srr-queue bandwidth share, 454 Syslog destination, 91 STP, 281 time adjustments, 85 study tips, 114 VLAN database configuration mode, 137 switchport, 185 voice VLANs, 599 switchport host, 140 Cisco IOS Server Load Balancing (SLB), 578–583 VLANs, 179, 381 Cisco IOS-based switches, SPAN configuration, 731 vtp domain domain-name, 184 Cisco IP Phones, 596 vtp mode, 184 configuring, 599 vtp password, 184 daisy-chain topology, 598 vtp v2-mode, 174 Cisco LRE (Long-Reach Ethernet), 55–56 Common Spanning Tree (CST), 232 Cisco Metro solutions, 703–705 community VLANs, 147 classification, 444 comparing clear commands, 516 PIM versions, 496–497 clear vlan command, 141 shared/source trees, 490–491 CLI (command-line interface), 77 compatibility of PIM, 496–497 command-line interface (CLI), 77 components commands CEF, 393–395 bridging, 241 Cisco AVVID, 15 CEF-based MLS, 414 Internet Connectivity module, 29 clear, 516 IP telephony, 595–596 copy running-config startup-config, 102 Remote Access module, 30 debug ip cef, 411 VPN module, 30 enable secret, 618 configuration exercises encryption-type, 86 802.1X, 663, 665–669 IP telephony, 607 AAA, 663–669 line vty, 86 aggressive mode UDLD, 354 local SPN, 731 Cisco IOS-based Catalyst switches, multicast traffic deployment, 518 115–121 CWDM modules 791 configuring policy maps, 443 BackboneFast, 281–286 PortFast, 257, 285–286 QoS on Catalyst switches, 466–472 protocol filtering, 320 Root Guard, 285 PVST+ RPR+, 586–588 port cost, 220 spanning-tree, 242–248 root bridges, 219–220 UplinkFast, 284 Root Guard, 268, 285 VLANs, 181–185 RSPAN, 738 voice VLANs, 608–612 SNMP, 93–94 EtherChannel, 346–350 SPAN, 730 HSRP, 589–591 SRM, 547 inter-VLAN routing, 385 SSO, 542 configuring, 115–121, 570, 653–654 STP, 221–223, 244 AAA, 630–631 switches for SSH, 88 accounting, 629 Syslog destination, 91 authentication, 626 UDLD, 338–339 authorization, 627 UplinkFast, 259, 284 aggressive mode UDLD, 343 VACL with the capture option, 744 Auto QoS, 463 virtual servers (SLB), 582 baby giant and jumbo frame support, 329 VLANs, 138–139, 141 BackboneFast, 264, 281–286 private VLANs, 148–151, 188–189 BPDU filtering, 266 verifying configuration, 141–143 broadcast and multicast suppression, 325 VSPAN, 732 burst size, 447 VTP, 173–176 CEF, 406 WRED, 460 CEF-based MLS, 404–406 WRR on Catalyst 6500 switches, 452 debounce timer feature, 323 connecting DHCP snooping, 651
Recommended publications
  • Etherchannel & Highly Available Cluster Multiprocessing (HACMP) in AIX V5.2
    EtherChannel & Highly Available Cluster Multiprocessing (HACMP) in AIX V5.2 How-to and Test Experiences Abstract: This document gives tips and a working example of how to a Highly Available Cluster Multiprocessing (HACMP) user could implement EtherChannel with HACMP. Support for this combination was announced in May, 2004. Authors: Shawn Bodily (HACMP) and Cindy Young (EtherChannel) of IBM pSeries Advanced Technical Support and Michael Herrera (HACMP) of IBM pSeries AIX Support Introduction IBM AIX pSeries administrators have expressed interest in combining these components for several reasons. Those accustomed to other software availability solutions object to HACMP’s additional “standby” adapter. With EtherChannel, HACMP setups could mask the standby adapter giving an outward appearance familiar to these users. Other users like the aggregated bandwidth, load balancing, or high availability benefits of EtherChannel. The result is a lower cost, high performance network that is also popular as a high speed private (non-switch) interconnect between machines. In this test, we successfully implemented a “single adapter network” HACMP IP Address Takeover (IPAT) with the EtherChannel function included in AIX V 5.2. The EtherChannel was responsible for providing local adapter swapping – outside of HACMP. HACMP has no knowledge of EtherChannel and is completely independent. While a single adapter network is normally not ideal, EtherChannel makes this okay because there are multiple physical adapters within the single EtherChannel pseudo device. Thus, we could safely ignore the insufficient adapter warning messages posted during cluster synchronization. Our configuration consisted of a rotating resource group with a single adapter network using IP aliasing. Our testing proved to be beneficial in simplifying the HACMP setup.
    [Show full text]
  • Etherchannel Configuration Guide, Cisco IOS XE 17 (Cisco NCS 520 Series)
    EtherChannel Configuration Guide, Cisco IOS XE 17 (Cisco NCS 520 Series) First Published: 2019-11-26 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cisco NX-OS Software Virtual Portchannel: Fundamental Concepts
    Chapter 3: Cisco NX-OS Software Virtual PortChannel: Fundamental Concepts © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Design Guide Contents Virtual PortChannel Technology ................................................................................................................................3 vPC Topologies.........................................................................................................................................................3 Virtual PortChannel Components..............................................................................................................................5 Traffic Flows..............................................................................................................................................................6 Dual-Control Plane with Single Layer 2 Node Behavior............................................................................................7 The Link Aggregation Group Identifier..................................................................................................................7 System ID in a vPC System .................................................................................................................................9 Primary and Secondary vPC Roles ......................................................................................................................9 Spanning Tree....................................................................................................................................................10
    [Show full text]
  • Application Notes
    A Sample Configuration with Design Guidelines for Link Aggregation Between Avaya™ P580/P882 Gigabit Ethernet Switch Hunt Groups and Cisco EtherChannel - Issue 1.0 Abstract These Application Notes describe a sample Hunt Group/EtherChannel Link Aggregation Group (LAG) configuration between an Avaya™ P882 Gigabit Ethernet switch and a Cisco Catalyst 6509 switch. Design guidelines for deploying LAG in a mixed Avaya/Cisco infrastructure are included as an aid for network designers. A sample configuration diagram has been included along with provisioning notes. These Application Notes were created as a result of field requests for information on interoperability between Avaya P580/P882 Hunt group trunks and Cisco EtherChannel. GAK; Reviewed: Solution & Interoperability Test Lab Application Notes 1 of 15 WCH 7/18/2003 ©2003 Avaya Inc. All Rights Reserved. cislaginterop.doc 1. Introduction The Avaya™ P580/P882 Gigabit Ethernet Switch Hunt Group feature aggregates multiple switch ports together, combining the bandwidth into a single connection. This feature is normally deployed between switches to provide added bandwidth and fault tolerance. If one segment in a hunt group fails, the remaining active members will service the traffic for that segment. The Hunt Group Load-Sharing feature (enabled by default) distributes traffic load among the hunt group members for improved throughput performance. Hunt group member ports can be configured using various trunk modes including IEEE 802.1Q, Multi-layer, 3Com and Clear. Hunt group ports may also be assigned a router IP interface for layer 3 forwarding. The Avaya™ Hunt Group feature is a manual (or static) implementation of link aggregation. This means the feature does not support dynamic LAG configuration or binding via some standard or proprietary protocol.
    [Show full text]
  • Chapter 2 Lab 2-2, Configuring Etherchannel
    CCNPv6 SWITCH Chapter 2 Lab 2-2, Configuring EtherChannel Topology Objective • Configure EtherChannel. Background Four switches have just been installed. The distribution layer switches are Catalyst 3560 switches, and the access layer switches are Catalyst 2960 switches. There are redundant uplinks between the access layer and distribution layer. Usually, only one of these links could be used; otherwise, a bridging loop might occur. However, using only one link utilizes only half of the available bandwidth. EtherChannel allows up to eight redundant links to be bundled together into one logical link. In this lab, you configure Port Aggregation Protocol (PAgP), a Cisco EtherChannel protocol, and Link Aggregation Control Protocol (LACP), an IEEE 802.3ad open standard version of EtherChannel. Note: This lab uses Cisco WS-C2960-24TT-L switches with the Cisco IOS image c2960-lanbasek9-mz.122- 46.SE.bin, and Catalyst 3560-24PS with the Cisco IOS image c3560-advipservicesk9-mz.122-46.SE.bin. You can use other switches (such as a 2950 or 3550) and Cisco IOS Software versions if they have comparable capabilities and features. Depending on the switch model and Cisco IOS Software version, the commands available and output produced might vary from what is shown in this lab. Required Resources • 2 switches (Cisco 2960 with the Cisco IOS Release 12.2(46)SE C2960-LANBASEK9-M image or comparable) • 2 switches (Cisco 3560 with the Cisco IOS Release 12.2(46)SE C3560- ADVIPSERVICESK9-M image or comparable) All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
    [Show full text]
  • Chapter 4: Etherchannel and HSRP
    Chapter 4: EtherChannel and HSRP CCNA Routing and Switching Scaling Networks Chapter 4 - Sections & Objectives . 4.1 Link Aggregation Concepts • Explain link aggregation operation in a switched LAN environment. • Describe link aggregation. • Describe EtherChannel technology. 4.2 Link Aggregation Configuration • Implement link aggregation to improve performance on high-traffic switch links. • Configure link aggregation. • Troubleshoot a link aggregation implementation. 4.3 First Hop Redundancy Protocols • Implement HSRP • Explain the purpose and operation of first hop redundancy protocols. • Explain how HSRP operates. • Configure HSRP using Cisco IOS commands. • Troubleshoot HSRP. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 4.1 Link Aggregation Concepts © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Link Aggregation Introduction to Link Aggregation . It is possible to combine the number of physical links between switches to increase the overall speed of switch-to-switch communication. • STP will block redundant links to prevent routing loops. Redundant Links with STP (by default blocked) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Link Aggregation Advantages of EtherChannel . Most configuration tasks can be done on the EtherChannel interface instead of on each individual port. EtherChannel relies on existing switch ports. Load balancing takes place between links that are part of the same EtherChannel. EtherChannel creates an aggregation that is seen as one logical link. EtherChannel provides redundancy because the overall link is seen as one logical connection. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 EtherChannel Operation Implementation Restrictions . EtherChannel groups multiple physical ports into one or more logical EtherChannel links.
    [Show full text]
  • Configuring Etherchannels
    Configuring EtherChannels This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco NX-OS. It contains the following sections: • Information About EtherChannels, page 1 • Configuring EtherChannels, page 8 • Verifying EtherChannel Configuration, page 13 Information About EtherChannels An EtherChannel bundles up to 16 individual interfaces into a group to provide increased bandwidth and redundancy. Port channeling also load balances traffic across these physical interfaces. The EtherChannel stays operational as long as at least one physical interface within the EtherChannel is operational. You create an EtherChannel by bundling compatible interfaces. You can configure and run either static EtherChannels or EtherChannels running the Link Aggregation Control Protocol (LACP). Any configuration changes that you apply to the EtherChannel are applied to each member interface of that EtherChannel. For example, if you configure Spanning Tree Protocol (STP) parameters on the EtherChannel, the Cisco NX-OS applies those parameters to each interface in the EtherChannel. You can use static EtherChannels, with no associated protocol, for a simplified configuration. For more efficient use of the EtherChannel, you can use the Link Aggregation Control Protocol (LACP), which is defined in IEEE 802.3ad. When you use LACP, the link passes protocol packets. Related Topics • LACP Overview, page 5 Understanding EtherChannels Using EtherChannels, Cisco NX-OS provides wider bandwidth, redundancy, and load balancing across the channels. You can collect up to 16 ports into a static EtherChannel or you can enable the Link Aggregation Control Protocol (LACP). Configuring EtherChannels with LACP requires slightly different steps than configuring static EtherChannels.
    [Show full text]
  • Introduction to Scaling Networks
    CHAPTER 1 Introduction to Scaling Networks As a business grows, so does its networking requirements. To keep pace with a business’s expansion and new emerging technologies, a network must be designed to scale. A network that scales well is not only one that can handle growing traffic demands, but also one designed with the inevitable need to expand. This short chapter sets the stage for the rest of the course. This chapter covers the hierarchical network design model, the Cisco Enterprise Architecture modules, and appropriate device selections that you can use to systematically design a highly functional network. student.indb 1 3/19/14 3:09 PM 2 CCNA Routing and Switching Practice and Study Guide Implementing a Network Design An enterprise network must be designed to support the exchange of various types of network traffic, including data files, email, IP telephony, and video applications for multiple business units. Hierarchical Network Design Users expect enterprise networks to be up percent of the time. To provide this kind of reliability, enterprise class equipment uses power supplies and has failover capabilities. Describe what failover capability means for enterprise class equipment. Why should a network be organized so that traffic stays local and is not propagated unneces- sarily on to other portions of the network? Designing a network using the three-layer hierarchical design model helps optimize the net- work. In Figure 1-1, label the three layers of the hierarchical design model. Figure 1-1 Hierarchical Design Model Hierarchical Design Model Internet Internet student.indb 2 3/19/14 3:09 PM Chapter 1: Introduction to Scaling Networks 3 Briefly describe each layer of the hierarchical design model.
    [Show full text]
  • LAN Aggregation
    CHAPTER 3 LAN Aggregation Objectives Upon completion of this chapter, you will be able to answer the following questions: n What is link aggregation? n What are the commands to configure EtherChannel? n What is EtherChannel technology? n What are the methods to troubleshoot link aggregation with EtherChannel? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. Port Aggregation Protocol (PAgP) page 122 PAgP auto page 127 Link Aggregation Control Protocol LACP active page 129 (LACP) page 122 LACP passive page 129 PAgP desirable page 127 03_SNCG_3282_r2a.indd 121 2/12/14 3:19 PM 122 Scaling Networks Companion Guide Introduction (3.0.1.1) Link aggregation is the ability to create one logical link using multiple physical links between two devices. This allows load sharing among the physical links, rather than having STP block one or more of the links. EtherChannel is a form of link aggrega­ tion used in switched networks. This chapter describes EtherChannel and the methods used to create an Ether­ Channel. An EtherChannel can be manually configured or can be negotiated by using the Cisco­proprietary protocol Port Aggregation Protocol (PAgP) or the IEEE 802.3ad–defined protocol Link Aggregation Control Protocol (LACP). The configuration, verification, and troubleshooting of EtherChannel are discussed. Class Activity 3.0.1.2: Imagine This It is the end of the work day. In your small­ to medium­sized business, you are try­ ing to explain to the network engineers about EtherChannel and how it looks when it is physically set up.
    [Show full text]
  • Etherchannel Between a Cisco Catalyst Switch That Runs Cisco IOS and a Workstation Or Server Configuration Example
    EtherChannel Between a Cisco Catalyst Switch That Runs Cisco IOS and a Workstation or Server Configuration Example Document ID: 98469 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Background Information Design Guidelines EtherChannel Negotiation Protocols Configure Network Diagram Switch Configuration Server Configuration Verify Troubleshoot Related Information Introduction This configuration example describes how to establish EtherChannel between a Cisco Catalyst Switch that runs Cisco IOS software and a workstation or server. For Cisco Catalyst switches that run the Catalyst OS, refer to Configuring EtherChannel Between a Catalyst Switch Running CatOS and a Workstation or Server. EtherChannel allows multiple physical Ethernet links to combine into one logical channel, which allows the links in the channel to share traffic load, as well as redundancy in the event that one or more links in the channel fail. You can use EtherChannel to interconnect LAN switches, routers, servers, and clients via unshielded twisted pair (UTP) wiring or single−mode and multimode fiber. This document refers to Fast EtherChannel, Gigabit EtherChannel, Port Channel, Channel Group, and Port Group with a single term, EtherChannel. The information in the document applies to all of these EtherChannels. This document covers the configuration of Layer 2 EtherChannel between a Catalyst switch and a server. Prerequisites Requirements Ensure that you meet these requirements before you attempt this configuration: • Cisco Catalyst switch that meets the system requirements to implement EtherChannel. For more information, refer to System Requirements to Implement EtherChannel on Catalyst Switches. Here is a simple command to determine if the switch/module supports EtherChannel: Switch#show interfaces Gi2/0/23 capabilities GigabitEthernet2/0/23 Model: WS−C3750G−24T Type: 10/100/1000BaseTX Speed: 10,100,1000,auto Duplex: half,full,auto Trunk encap.
    [Show full text]
  • Inter-VLAN Routing Configuration
    Inter-VLAN Routing Configuration Table of Contents 5.1 Inter-VLAN Routing Configuration ............................................................................................ 2 Inter-VLAN Routing Operation What is Inter-VLAN routing? ......................................................... 3 Inter-VLAN Routing Operation Router-on-a-Stick Inter-VLAN Routing .......................................... 5 Inter-VLAN Routing Operation Multilayer Switch Inter-VLAN Routing .......................................... 6 Configure Router-on-a-Stick Preparation ....................................................................................... 7 Configure Router-on-a-Stick Switch Configuration ........................................................................ 8 Configure Router-on-a-Stick Router Subinterface Configuration ................................................... 9 Configure Router-on-a-Stick Switch Configuration ...................................................................... 10 Configure Router-on-a-Stick Router Subinterface Configuration ................................................. 11 Configure Router-on-a-Stick Verifying Subinterfaces (cont.) ....................................................... 16 Configure Router on a Stick Verifying Routing ............................................................................. 17 Inter-VLAN Configuration Issues Verify Router Configuration ..................................................... 18 IP Addressing Issues Errors with IP Address and Subnet Masks ..................................................
    [Show full text]
  • Grumpy Networkers Journal Documentation Release 0.0.7
    Grumpy Networkers Journal Documentation Release 0.0.7 Head In The Cloud Oct 21, 2019 Contents: 1 Networking 3 1.1 Virtual Private Networks.........................................3 1.2 Network Protocols............................................ 56 2 Security 59 2.1 Common Network Attacks........................................ 59 2.2 Securing the Switch Infrastructure.................................... 60 2.3 Segregating Networks using Firewalls.................................. 60 2.4 Cryptography Overview......................................... 65 2.5 Authentication Services......................................... 67 3 Cloud Services 69 3.1 Cloud Deployment Models........................................ 69 3.2 Cloud Service Models.......................................... 69 4 Documentation 71 4.1 Sphinx.................................................. 71 5 Study Notes 73 5.1 Cisco CCNP - Implementing Cisco Secure Mobility Solutions (300-209 SIMOS)........... 73 5.2 Cisco CCNP - Implementing Cisco Edge Network Security Solutions (300-206 SENSS)....... 74 5.3 Cisco CCNP - Implementing Cisco IP Switched Networks (300-115 SWITCH)............ 76 6 Vendor Implementations 163 6.1 Cisco Implementations.......................................... 163 7 To Do 209 8 Glossary of Terms 213 9 External References 215 9.1 PPTP................................................... 215 9.2 Sphinx.................................................. 215 10 Indices and tables 217 Bibliography 219 i Index 221 ii Grumpy Networkers Journal Documentation, Release
    [Show full text]