Avocent Acs 800acs 8000 Advanced Console System Command Reference Guide
Avocent Acs 800acs 8000 Advanced Console System Command Reference Guide
Objective
1) Introduction of CCNP 2.0 switching
2) What is new added 2.0 or removed
3) Connectivity to channel
Intro
(SWITCH 300-115) is a 120-minute qualifying exam with 45‒55 questions for the Cisco CCNP and CCDP
certifications
Note: - SDM templets type depends on switches model, may not support to all
switches.
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-
2_55_se/configuration/guide/scg3750/swsdm.html
Video 3
Objective of video
Managing MAC address table
Configuring and verifying MAC address table setting
Troubleshooting MAC address table setting
The MAC address table contains address information that the switch uses to forward traffic between ports. All MAC
addresses in the address table are associated with one or more ports. The address table includes these types of
addresses:
• Dynamic address: a source MAC address that the switch learns and then ages when it is not in use.
• Static address: a manually entered unicast address that does not age and that is not lost when the switch resets.
The address table lists the destination MAC address, the associated VLAN ID, and port number associated with the
address and the type (static or dynamic).
The following sections describe how to manage the MAC address table:
• Disabling MAC Address Learning on an Interface or VLAN
• Displaying Address Table Entries
Beginning in privileged EXEC mode, follow these steps to disable MAC address learning on a VLAN:
Command Purpose
To re-enable MAC address learning on an interface or VLAN, use the default mac address-
table learning global configuration command. You can also re-enable MAC address learning on a VLAN by
entering the mac address-table learning global configuration command. The first (default) command returns
to a default condition and therefore does not appear in the output from the show running-config command.
The second command causes the configuration to appear in the show running-config privileged EXEC
command display.
This example shows how to disable MAC address learning on VLAN 200:
Router(config)# no mac address-table learning vlan 200
This example shows how to `disable MAC-address learning` for all modules on a specific routed interface:
Command Description
show mac address-table Displays MAC address table information for the specified MAC
address address.
show mac address-table aging- Displays the aging time in all VLANs or the specified VLAN.
time
show mac address-table count Displays the number of addresses present in all VLANs or the
specified VLAN.
show mac address-table Displays only dynamic MAC address table entries.
dynamic
show mac address-table Displays the MAC address table information for the specified
interface interface.
show mac address-table Displays MAC address learning status of all VLANs or the specified
learning VLAN.
show mac address-table static Displays only static MAC address table entries.
show mac address-table vlan Displays the MAC address table information for the specified VLAN.
Function of Errdisable
If the configuration shows a port to be enabled, but software on the switch detects an error situation on the port,
the software shuts down that port. In other words, the port is automatically disabled by the switch operating
system software because of an error condition that is encountered on the port.
When a port is error disabled, it is effectively shut down and no traffic is sent or received on that port. The port
LED is set to the color orange and, when you issue the show interfaces command, the port status shows
err−disabled. Here is an example of what an error−disabled port looks like from the command−line interface
(CLI) of the switch:
Or, if the interface has been disabled because of an error condition, you can see messages that are similar to
these in both the console and the syslog:
• It lets the administrator know when and where there is a port problem.
• It eliminates the possibility that this port can cause other ports on the module (or the entire module) to
fail.
Causes of Errdisable
• A cable that is out of specification (either too long, the wrong type, or defective)
• A bad network interface card (NIC) card (with physical problems or driver problems)
• A port duplex misconfiguration
There are various reasons for the interface to go into errdisable. The reason can be:
Note: Error−disable detection is enabled for all of these reasons by default. In order to disable error−disable
detection, use the no errdisable detect cause command. The show errdisable detect command displays the
error−disable detection status.
If you have enabled errdisable recovery, you can determine the reason for the errdisable status if you issue the
show errdisable recovery command. Here is an example:
♦ A bad cable
• Loopback error
The errdisable recovery command allows you to choose the type of errors that automatically reenable the ports
after a specified amount of time. The show errdisable recovery command shows the default error−disable
recovery state for all the possible conditions.
cat6knative#show errdisable recovery ErrDisable Reason
Timer Status −−−−−−−−−−−−−−−−− −−−−−−−−−−−−−− udld
Disabled bpduguard Disabled security−violatio
Disabled channel−misconfig Disabled pagp−flap
Verify
• show interfaces interface interface_number status shows the current status of the switch port.
• show errdisable detect Displays the current settings of the errdisable timeout feature and, if any of the
ports are currently error disabled, the reason that they are error disabled.
Troubleshoot
• show interfaces status err−disabled Shows which local ports are involved in the errdisabled state.
• show etherchannel summary Shows the current status of the EtherChannel.
• show errdisable recovery Shows the time period after which the interfaces are enabled for errdisable
conditions.
• show errdisable detect Shows the reason for the errdisable status.
These notes takes from CISCO website then edited for this video
CDP (CISCO discovery protocol) is CISCO proprietary that use to discover neighbor along with other
information etc. It use 01-00-0c-cc-cc-cc multicast address at layer 3 independent.
Note: - 01-00-0c-cc-cc-cc address also used by VTP/DTP/PAgP/UDLD
CDP Configuration/Verification
Note. By default CDPv2 enable with 60/180 sec. keep live/dead timers
You can disable for privacy for share information to neighbor.
On entire device SW1(config)#no cdp run
On particular interface SW1(config-if)#no cdp enable
Changing the timers of CDP SW1(config)#no cdp timer [5-254] sec , SW1(config)#no cdp hold time [10-
255]
Changing the source IP address of CDP by default it use exit/egress interface ip address but you can
change it. SW1(config)#no cdp source-interface vlan 2
Can be enable disable log of duplex mismatch on global and particular interface SW1(config)# cdp log
mismatch duplex , SW1(config-if)# cdp log mismatch duplex
LLDP (link layer discovery protocol) IEEE 802.1AB is open standard protocol similar to CDP
LLD work on IP network only While CDP layer three independent
Information gathered
Information gathered with LLDP is stored in the device as a management information database (MIB) and can
be queried with the Simple Network Management Protocol (SNMP) as specified in RFC 2922. The topology of
an LLDP-enabled network can be discovered bycrawling the hosts and querying this database. Information that
may be retrieved include:
Auto-discovery of LAN policies (such as VLAN, Layer 2 Priority and Differentiated services (Diffserv)
settings) enabling plug and playnetworking.
Device location discovery to allow creation of location databases and, in the case of Voice over Internet
Protocol (VoIP), Enhanced 911 services.
Extended and automated power management of Power over Ethernet (PoE) end points.
Inventory management, allowing network administrators to track their network devices, and determine their
characteristics (manufacturer, software and hardware versions, serial or asset number).
The LLDP-MED protocol extension was formally approved and published as the standard ANSI/TIA-1057 by
the Telecommunications Industry Association (TIA) in April 2006.[3]
These notes takes from CISCO/Wikipedi.org website then edited for this video
Problem Definition
Spanning-Tree Protocol (STP) resolves redundant physical topology into a loop-free, tree-like
forwarding topology.
This is done by blocking one or more ports. By blocking one or more ports, there are no loops in the
forwarding topology. STP relies in its operation on reception and transmission of the Bridge Protocol
Data Units (BPDUs). If the STP process that runs on the switch with a blocking port stops receiving
BPDUs from its upstream (designated) switch on the port, STP eventually ages out the STP
information for the port and moves it to the forwarding state. This creates a forwarding loop or STP
loop.
Packets start to cycle indefinitely along the looped path, and consumes more and more bandwidth.
This leads to a possible network outage.
How is it possible for the switch to stop receiving BPDUs while the port is up? The reason is
unidirectional link. A link is considered unidirectional when this occurs:
The link is up on both sides of the connection. The local side is not receiving the packets sent by the
remote side while remote side receives packets sent by local side.
Consider this scenario. The arrows indicate the flow of STP BPDUs.
During normal operation, bridge B is designated on the link B-C. Bridge B sends BPDUs down to C,
which is blocking the port. The port is blocked while C sees BPDUs from B on that link. Now,
consider what happens if the link B-C fails in the direction of C. C stops receiving traffic from B,
however, B still receives traffic from C.C stops receiving BPDUs on the link B-C, and ages the
information received with the last BPDU. This takes up to 20 seconds, depending on the maxAge STP
timer. Once the STP information is aged out on the port, that port transitions from the blocking
state to the listening, learning, and eventually to the forwarding STP state. This creates a
forwarding loop, as there is no blocking port in the triangle A-B-C. Packets cycle along the path (B
still receives packets from C) taking additional bandwidth until the links are completely filled up. This
brings the network down.
Another possible issue that can be caused by a unidirectional link is traffic blackholing.
It is important to be able to choose the right message interval in order to ensure proper detection
time. The message interval should be fast enough to detect the unidirectional link before the
forwarding loop is created, however, it should not overload the switch CPU. The default message
interval is 15 seconds, and is fast enough to detect the unidirectional link before the forwarding loop
is created with default STP timers. The detection time is approximately equal to three times the
message interval.
In aggressive mode, once the information is aged, UDLD will make an attempt to re-establish the link
state by sending packets every second for eight seconds. If the link state is still not determined, the
link is disabled.
Aggressive mode adds additional detection of these situations:
The port is stuck (on one side the port neither transmits nor
receives, however, the link is up on both sides).
The link is up on one side and down on the other side. This is issue might be seen on fiber ports. When
transmit fiber is unplugged on the local port, the link remains up on the local side. However, it is down
on the remote side.
Most recently, fiber FastEthernet hardware implementations have Far End Fault Indication (FEFI)
functions in order to bring the link down on both sides in these situations. On Gigabit Ethernet, a
similar function is provided by link negotiation. Copper ports are normally not susceptible to this
type of issue, as they use Ethernet link pulses to monitor the link. It is important to mention that in
both cases, no forwarding loop occurs because there is no connectivity between the ports. If the link
is up on one side and down on the other, however, blackholing of traffic might occur. Aggressive UDLD
is designed to prevent this.
Configuration and Monitoring
These commands detail the UDLD configuration on Catalyst switches that run CatOS. UDLD needs to first be
enabled globally (default is disabled) with this command:
Vega> (enable) set udld enable
UDLD enabled globally
Issue the show udld port command to verify whether UDLD is enabled or disabled on the port and what the
link state is:
Vega> (enable) show udld port
UDLD : enabled
Message Interval : 15 seconds
Aggressive UDLD is enabled on a per-port basis with the set udld aggressive-mode enable <module/port>
command:
Vega> (enable) set udld aggressive-mode enable 1/2
Aggressive UDLD enabled on port 1/2.
Vega> (enable) show udld port 1/2
UDLD : enabled
Message Interval : 15 seconds
interval:
Vega> (enable) set udld interval 10
UDLD message interval set to 10 seconds
The interval can range from 7 to 90 seconds, with the default being 15 seconds.
These notes takes from CISCO website then edited for this video
For any assistance and query please visit https://www.youtube.com/user/adityakrgaur/about
Or e-mail us [email protected]
Video no. 7 (300-115)
VLAN is layer 2 isolation of traffic (1VLAN=1 broadcast domain=1subnet) for better resource utilization, QOS,
logically groups users and security.
VLAN no.: -
VLAN no. Usage Description
0,4094 Reserved Not show on VLAN database
1,1002-5 Default VLAN Can`t modified/delete, can use only
1006-4094 Extended range VTP modes must be transparent to use extended range of VLAN
2-1001, Use for Ethernet Can be used and modified/delete if necessary for Ethernet LAN
1006-4094 LAN
Note no. of VLAN also depend on switch model.
Type of VLAN: -
Type of VLAN Descriptions
Data Use for normal data
Voice/axillary Use for IP phone/Voice over IP
Private Use for security , it divided primary and secondary VLAN
Management A VLAN which for Telnet, SSH for configuration
Extended Nothing special but will usable if VTP mode is transparent on switches
Native VLAN For backward compatibility, frame are untagged send over trunk link (by default VLAN1)
Note: - On topic of infra security will discuss more for Private VLAN in this series
Note: - If port Administrative mode is Auto/dynamic/desirable then it can be work as access or trunk by
negotiation
Troubleshooting Trunk port
Switch#show interfaces f0/1 switchport
Switch#show interfaces trunk
.1q ISL
IEEE (802.1q) CISCO proprietary
Backward compatible (Native VLAN) No compatibility
Support 4095 no. of VLAN 1000 no. of VLAN
Header size 4 bytes 26 bytes
Trailer size N/A 4 bytes
FCS and recalculation required Not required
Problem) why port not shown while executed command SW1# show vlan
Solution: - Port may trunk or assign to deleted/removed VLAN from database
Problem) why VLAN automatic created after power recycle, even after deleted from database
& flash:
Solution: - Port may assign to VLAN so after rebooting switch find startup configuration with
VLAN that not exist will create automatically
These notes takes from CISCO website then edited for this video
For any assistance and query please visit https://www.youtube.com/user/adityakrgaur/about
Or e-mail us [email protected]
Video no. 8 (300-115)
SERVER
Creation and modification VLAN on entire VTP domain
By default switches operate on VTP server mode
Can be synchronize other server`s updates on same VTP domain based on configuration
reversion no.
Client
Cannot create or modifying the VLAN
Depended on server
Transparent
Creation and modification allowed but locally not entire domain
Doesn’t synchronize from servers
If server or client change as transparent it keep previous VLAN as it is but revert
configuration reversion no. to 0
These notes takes from CISCO/Wikipedia.org website then edited for this video
For any assistance and query please visit https://www.youtube.com/user/adityakrgaur/about
Or e-mail us [email protected]
VTP v 3 detail 300-115(v-9)
Objective of this video
Enhancement in VTP v3
Configuration & verification
VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition,
deletion, and renaming of VLANs within a VTP domain. A VTP domain (also called a VLAN management
domain) is made up of one or more network devices that share the same VTP domain name and that are
interconnected with trunks. VTP minimizes misconfigurations and configuration Inconsistencies that can result
in a number of problems, such as duplicate VLAN names, incorrect VLAN-type specifications, and security
violations. Before you create VLANs, you must decide whether
Extended-range VLANs are supported only in VTP version 3. If converting from VTP version 3 to VTP version 2, VLANs in the
range 1006 to 4094 are removed from VTP control.
VLANs 1002 to 1005 are reserved VLANs in VTP version 1, version 2, and version 3.
VTP mode Off—In VTP off mode, a network device functions in the same manner as a VTP transparent device except that it does not
forward VTP advertisements.
VTP version 3 regions can only communicate over a VTP version 1 or VTP version 2 region in transparent mode.
VTP 1, 2 and 3 not interoperable and domain name must be match to all device.
In VTP version 3, the information distributed in VTP version 1 and version 2 advertisements are supported, as well as the following
information:
• A primary server ID.
• An instance number
• A start index.
• An advertisement request is sent by a Client or a Server in these situations:
– On a trunk coming up on a switch with an invalid database.
– On all trunks when the database of a switch becomes invalid as a result of a configuration change or a takeover message.
– On a specific trunk where a superior database has been advertised.
• VTP version 3 adds the following fields to the subset advertisement request:
– A primary server ID.
– An instance number.
– A window size.
– A start index.
EtherChannel 300-115(v-10)
Technique to combine multiple physical link to make a single logical link for load balancing or load sharing
and fault tolerance, A.K.A Port channel, Channeling, Link aggregation and NIC teaming. Link aggregation can
be use with: Switch to switch, Server to switch and switch to router
Increased availability – failure of a single link within aggregation not cause other member
Auto Configuration – Configuration on EtherChannel port will also apply to member link
1) On
• No negotiation, manual configuration required
• Miss-configuration susceptible
• Better way first turn off link which going to be member of port Channel
2) PAgP
• Port aggregation protocol is CISCO proprietary
• Use CDP for negotiation
• Not interoperable with ON and LACP
• Miss-configuration resolution
• It has ‘Auto’ and ‘desirable’ mode
3) LACP
• LACP is IEEE 802.3ad standard
• It has ‘Active’ and ‘Passive’ mode
Compatibility Requirements
When you add an interface to a channel group, Cisco NX-OS checks certain interface attributes to
ensure that the interface is compatible with the channel group. Cisco NX-OS also checks a number
of operational attributes for an interface before allowing that interface to participate in the port-
channel aggregation.
The compatibility check includes the following operational attributes:
• Port mode
• Access VLAN
• Trunk native VLAN
• Allowed VLAN list
• Speed
• 802.3x flow control setting
• MTU
The Cisco Nexus 5000 Series switch only supports system level MTU. This attribute cannot be
changed on an individual port basis.
• Broadcast/Unicast/Multicast Storm Control setting
• Priority-Flow-Control
• Untagged CoS
When the interface joins an EtherChannel, the following individual parameters are replaced with the
values on the EtherChannel:
• Bandwidth
• MAC address
• Spanning Tree Protocol
The following interface parameters remain unaffected when the interface joins an EtherChannel:
• Description
• CDP
• LACP port priority
• Debounce
Cisco NX-OS load balances traffic across all operational interfaces in an EtherChannel by reducing
part of the binary pattern formed from the addresses in the frame to a numerical value that selects
one of the links in the channel. EtherChannels provide load balancing by default and the basic
configuration uses the following criteria to select the link:
• For a Layer 2 frame, it uses the source and destination MAC addresses.
• For a Layer 3 frame, it uses the source and destination MAC addresses and the source and
destination IP addresses.
• For a Layer 4 frame, it uses the source and destination MAC addresses, the source and
destination IP addresses, and the source and destination port number.
You can configure the switch to use one of the following methods to load balance across the
EtherChannel:
• Destination MAC address
• Source MAC address
• Source and destination MAC address
• Destination IP address
• Source IP address
• Source and destination IP address
• Destination TCP/UDP port number
• Source TCP/UDP port number
• Source and destination TCP/UDP port number
Command Purpose
Step 1 configure terminal Enter global configuration mode.
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file.
To disable the EtherChannel guard feature, use the no spanning-tree etherchannel guard misconfig global configuration
command.
You can use the show interfaces status err-disabled privileged EXEC command to show which switch ports are disabled because
of an EtherChannel misconfiguration. On the remote device, you can enter the show etherchannel summary privileged EXEC
command to verify the EtherChannel configuration.
After the configuration is corrected, enter the shutdown and no shutdown interface configuration commands on the port-channel
interfaces that were misconfigured.
Q: How many Channel-group can create?
http://www.cisco.com/c/en/us/support/docs/lan-switching/etherchannel/12023-4.html#cat2950_3550
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli_rel_4_0_1a/CLIC
o nfigurationGuide/EtherChannel.html
STP 300-115 (v-11)
The behavior of switch/bridge, they perform frame flooding in case of unknown unicasting, multicasting and
broadcasting so if there any redundant link available that can cause layer 2 loop.
In layer loops can cause these problem
Endlessly layer 2 loops
Unnecessary resources utilization and multiple frame transmission
Unstable MAC table
Unnecessary frame lookup by host
To prevent this problem spanning tree protocol used
STP/STA (spanning tree algorithm) written by “Radia Perlman” for detecting layer 2 loops casing link ,and
block it till first one link goes down or disconnected
To work STP every port send BPDU (bridge protocol data unit) every 2 second for preventing layer 2 loop
And send/receive topology changes
Note: - Root bridge switches all port is designated port and forwarding state
STP can not to turn off
Bridge priority increment use 4096 because no of VLAN can exist in switches
Bridge ID and system ID tie up by default so Lower MAC address switch/bridge selected as Root
Bridge
Root Bridge can changes timers of STP and advertised to all
Root Bridge is also responsible for propagate TCN (topology changes notification)
STP version
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/5234-5.html
Faster convergence
Port fast
By passing the listening and learning states for trunk and access port.
Better to connect work station or server
If connecting with switches it may cause loop
PVST+, rapid PVST+, or MSTP, support this feature
Can be enable on interface or globally [spanning-tree portfast |spanning-tree portfast default]
When running on globally it enable Portfast on interface that is edge port
It also not affects to MAC-address table
Switchport host
switchport mode will be set to access
spanning-tree portfast will be enabled
channel group will be disabled
Uplink fast
AlterNet port become root port immediately it bypass listening and learning states toward root Bridge,
The UplinkFast feature is supported only when the switch is running PVST+
Backbone fast
BackboneFast is a complementary technology to the UplinkFast feature
Supported only when the switch is running PVST+
Indirect failure detection in direction of root bridge
Cross-stack UplinkFast
Similar to Uplink fast but usage only GigaStack,
The UplinkFast feature is supported only when the switch is running PVST+
less than 1 second under normal network conditions)
Support to 2900/2950/3500/3550 switches that have the 1000BASE-X module installed.
STP security
BPDU filter
Prevent sending and receiving BPDU on enabled port
BPDU Guard
Interface that BPDU guard enable will keeps port error disable mode immediately if BPDU received
Root Guard
Root guard enabled interface cannot become root port
Loop prevention
MST region
Where every switches in a region agree to run MST with compatible parameters
Within the region, all switches must run the instance of MST that is defined by the following attributes:
If two switches have the same set of attributes, they belong to the same MST region. If not, they
belong to two independent regions.
MST BPDUs contain configuration attributes so that switches receiving BPDUs can compare them
against their local MST configurations. If the attributes match, the STP instances within MST can be
shared as part of the same region. If not, a switch is seen to be at the MST region boundary, where
one region meets another or one region meets traditional 802.1D STP
Intra Region
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.html
Basically FHRP (First hop redundancy protocol) provide redundancy and load balancing of default gateway
(first hop) by connecting multiple physical Router and treat as one or more logical router which work as
gateway for LAN devices.
http://en.wikipedia.org/wiki/First-hop_redundancy_protocols
Working of FHRP
Additional Feature
1) Adding IP SLA
2) Authentication
http://www.cisco.com/c/en/us/products/ios-nx-os-software/first-hop-redundancy-protocol-fhrp/index.html
http://meefirst.blogspot.in/2012/02/virtual-router-redundancy-protocol-
vrrp.html
Gateway Load Balancing Protocol
1) HSRPv2
2) GLBP
3) VRRPv3
VRRPv3
Support many type interface Ethernet family, Bridge Group Virtual Interface
(BVI), Multiprotocol Label Switching (MPLS) Virtual Private Networks
(VPNs), VRF-aware MPLS VPNs, and VLANs.
IPv6 address supported
Also support Secondary IP addresses
Multiple subnet can used Secondary IP
Need to define address-family first
Allow to configure both address-family on same group
VRRPv3 need to enabled globally not on interface
VRRPv3 not support authentication
Rest of thing are remain same
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-3s/fhp-xe-3s-book/fhrp-
vrrpv3-xe.html
For any assistance and query please visit https://www.youtube.com/user/adityakrgaur/about
Or e-mail us [email protected]
Switch port Analyzer (SPAN)
You can analyze network traffic passing through ports or VLANs by using SPAN to
send a copy of the traffic to another port on the local switch or on remote switch
that has been connected to a network analyzer or other monitoring or security
device
SPAN Types
2) Remote SPAN(RSPAN)
Source and destination ports can be remote switch or switch stack
It use a dedicated VLAN for transport (Remote-span VLAN)
Send over trunk, tag added
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/lanswitch/configuration/xe-
3s/lanswitch-xe-3s-book/lnsw-conf-erspan.html#GUID-4CAB13D7-0803-4D67-
B720-4AB56A978FEF
Shutdown
Default action after violation
Port send to err-disabled mode
For re-enable err-disabled recover or shutdown/no shutdown
MAC counter keeps history
Protect
Need to configure for violation action
Traffic not send to network from violator
Interface will be working even after violation
No MAC counter keeps history
Restrict
Need to configure for violation action
Traffic not send to network from violator
Generate log (SNMP/Syslog)
No MAC counter keeps history
Default configuration for port security
1) Disabled on every interface
2) 1 MAC address allow if port security enabled
3) Default violation is shutdown
4) No aging configured by default for recovery
DHCP snooping is a security feature that acts like a firewall between untrusted
hosts and trusted DHCP servers.
Use trusted source to reply DHCP offer message
Rate-limits DHCP traffic from trusted and untrusted sources.
If untrusted port exceed the limit interface sent to err-disable
Builds and maintains the DHCP snooping binding database, which contains information
about untrusted hosts with leased IP addresses.
Utilizes the DHCP snooping binding database to validate subsequent requests from
untrusted hosts.
Can be enable to disabled DHCP snooping per VLAN basis
By default, the feature is inactive on all VLANs
DHCP snooping device insert DHCP option no 82 (gateway & other information)
IP SOURCE Guard
Both use DHCP Snooping feature; DAI is protection against ARP Spoofing and IP
source guard is protection against IP Spoofing
Promiscuous port
Connects to the router/firewall/gateway device
For external or rest of networks access
Host port
Connected to the end host
Belong to either isolated or community ports
Host port that belong to same community can access each other
Isolated VLAN
Ports belong to same isolated sub-VLAN cannot access each other
Community VLAN
Device in same community VLAN can access each other
Basically use to connect same department
Define the primary VLAN that will provide the underlying private VLAN
connectivity
Switch(config)# vlan vlan-id
Switch(config-vlan)# private-vlan primary
Switch(config-vlan)# private-vlan association { secondary-vlan-list | add secondary-
vlan-list | remove secondary-vlan-list }
Port ACL
Port ACLs access-control traffic entering a Layer 2 interface.
The switch does not support port ACLs in the outbound direction
You can apply only one IP access list and one MAC access list to a Layer 2 Interface
Router ACLs are supported only on SVIs.
This example shows how to create a standard ACL to deny access to IP host 171.69.198.102, permit
access to any others, and display the results.
Switch (config)# access-list 2 deny host 171.69.198.102
Switch (config)# access-list 2 permit any
Switch(config)# end
Switch# show access-lists
Standard IP access list 2
10 deny 171.69.198.102
20 permit any
Applying ACL
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ip access-group 2 in
This example shows how to apply access list 3 to filter packets going to the CPU:
Switch(config)# interface vlan 1
Switch(config-if)# ip access-group 3 in
http://www.ciscopress.com/articles/article.asp?p=1181682&seqNum=4
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-
switches/prod_white_paper09186a00801b096a.html
AAA
Centralized management of users to access network (Telnet, SSH, VPN etc.)
Whenever user attempts to login it verify by AAA database
User management done on AAA database without the need to reconfigure each device
AAA can also control connections passing through switch/Router for access network resources
AAA can be RADIUS or TACACS+ where database located
Also need to configure local as fallback
Configuration of AAA
Step 1
Enable AAA on IOS
Switch(config)# aaa new-model
Step 2
Create user for fallback, if radius or tacacs down/not reachable
Switch(config)# username “ADITYA” password “CISCO”
Step 3
Adding RADIUS/TACACS servers. Multiple server may be exist for redundancy
Switch(config)#[radius|tacacs] server “SERVER-NAME” (support IPv4/v6 and more feature)
Or
Step 4
Creating group of radius/tacacs server & adding severs in it
Switch(config)#aaa group server [radius|tacacs+|ldap] “SERVER_GROUP1”
Step 5
Use the following global configuration command to define a method list:
Switch(config)# aaa authentication login { default | list-name } method1 [ method2 ...]
Note: - it could other than login (e.g. enable, dot1x etc.)
Step 6
Apply a method list to a switch line.
Switch(config)#line [vty|console]
Switch(config-line)#login authentication { default | list-name }
Switch(config-line)#authorization [arap|command|exec|reverse-access]