Cisco Systems Ie 2000 Users Manual
IE 2000 to the manual e03ff69a-d572-46f5-81fe-37b44ecb12c5
2015-01-05
: Cisco-Systems Cisco-Systems-Ie-2000-Users-Manual-203393 cisco-systems-ie-2000-users-manual-203393 cisco-systems pdf
Open the PDF directly: View PDF
Page Count: 924 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Cisco IE 2000 Switch Software Configuration Guide
- Preface
- Configuration Overview
- Using the Command-Line Interface
- Configuring Switch Alarms
- Finding Feature Information
- Information About Switch Alarms
- How to Configure Switch Alarms
- Monitoring and Maintaining Switch Alarms Status
- Configuration Examples for Switch Alarms
- Additional References
- Performing Switch Setup Configuration
- Restrictions for Performing Switch Setup Configuration
- Information About Performing Switch Setup Configuration
- Switch Boot Process
- Default Switch Boot Settings
- Switch Boot Optimization
- Switch Information Assignment
- Switch Default Settings
- DHCP-Based Autoconfiguration Overview
- DHCP-Based Autoconfiguration and Image Update
- DHCP Server Configuration Guidelines
- TFTP Server
- DNS Server
- Relay Device
- How to Obtain Configuration Files
- How to Control Environment Variables
- Scheduled Reload of the Software Image
- How to Perform Switch Setup Configuration
- Monitoring Switch Setup Configuration
- Configuration Examples for Performing Switch Setup Configuration
- Additional References
- Configuring Cisco IOS Configuration Engine
- Finding Feature Information
- Prerequisites for Configuring Cisco IOS Configuration Engine
- Information About Configuring Cisco IOS Configuration Engine
- How to Configure Cisco IOS Configuration Engine
- Configuring Cisco IOS Agents
- Monitoring and Maintaining Cisco IOS Configuration Engine
- Configuration Examples for Cisco IOS Configuration Engine
- Additional References
- Configuring Switch Clusters
- Finding Feature Information
- Prerequisites for Configuring Switch Clusters
- Restrictions for Configuring Switch Clusters
- Information About Configuring Switch Clusters
- How to Plan for Switch Clustering
- Managing Switch Clusters
- Additional References
- Performing Switch Administration
- Finding Feature Information
- Information About Performing Switch Administration
- How to Perform Switch Administration
- Monitoring and Maintaining Switch Administration
- Configuration Examples for Performing Switch Admininistration
- Setting the System Clock: Example
- Configuring Summer Time: Examples
- Configuring a MOTD Banner: Examples
- Configuring a Login Banner: Example
- Configuring MAC Address Change Notification Traps: Example
- Sending MAC Address Move Notification Traps: Example
- Configuring MAC Threshold Notification Traps: Example
- Adding the Static Address to the MAC Address Table: Example
- Configuring Unicast MAC Address Filtering: Example
- Additional References
- Configuring PTP
- Configuring PROFINET
- Configuring CIP
- Configuring SDM Templates
- Finding Feature Information
- Prerequisites for Configuring SDM Templates
- Restrictions for Configuring SDM Templates
- Information About Configuring SDM Templates
- How to Configure the Switch SDM Templates
- Monitoring and Maintaining SDM Templates
- Configuration Examples for Configuring SDM Templates
- Additional References
- Configuring Switch-Based Authentication
- Finding Feature Information
- Prerequisites for Configuring Switch-Based Authentication
- Restrictions for Configuring Switch-Based Authentication
- Information About Configuring Switch-Based Authentication
- Prevention for Unauthorized Switch Access
- Password Protection
- Switch Access with TACACS+
- Switch Access with RADIUS
- RADIUS
- RADIUS Operation
- Default RADIUS Configuration
- RADIUS Change of Authorization
- CoA Request Commands
- RADIUS Server Host
- RADIUS Login Authentication
- Radius Method List
- AAA Server Groups
- RADIUS Authorization for User Privileged Access and Network Services
- RADIUS Accounting
- Establishing a Session with a Router if the AAA Server is Unreachable
- Vendor-Specific RADIUS Attributes
- Vendor-Proprietary RADIUS Server Communication
- Switch Access with Kerberos
- Local Authentication and Authorization
- Secure Shell
- Switch for Secure Socket Layer HTTP
- Secure Copy Protocol
- How to Configure Switch-Based Authentication
- Configuring Password Protection
- Setting or Changing a Static Enable Password
- Protecting Enable and Enable Secret Passwords with Encryption
- Disabling Password Recovery
- Setting a Telnet Password for a Terminal Line
- Configuring Username and Password Pairs
- Setting the Privilege Level for a Command
- Changing the Default Privilege Level for Lines
- Logging Into and Exiting a Privilege Level
- Configuring TACACS+
- Configuring Radius Server Communication
- Defining AAA Server Groups
- Configuring RADIUS Login Authentication
- Configuring RADIUS Authorization for User Privileged Access and Network Services
- Starting RADIUS Accounting
- Configuring Settings for All RADIUS Servers
- Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
- Configuring CoA on the Switch
- Configuring the Switch for Local Authentication and Authorization
- Configuring Secure Shell
- Configuring Secure HTTP Servers and Clients
- Configuring Password Protection
- Monitoring and Maintaining Switch-Based Authentication
- Configuration Examples for Configuring Switch-Based Authentication
- Changing the Enable Password: Example
- Configuring the Encrypted Password: Example
- Setting the Telnet Password for a Terminal Line: Example
- Setting the Privilege Level for a Command: Example
- Configuring the RADIUS Server: Examples
- Defining AAA Server Groups: Example
- Configuring Vendor-Specific RADIUS Attributes: Examples
- Configuring a Vendor-Proprietary RADIUS Host: Example
- Sample Output for a Self-Signed Certificate: Example
- Verifying Secure HTTP Connection: Example
- Additional References
- Configuring IEEE 802.1x Port-Based Authentication
- Finding Feature Information
- Restrictions for Configuring IEEE 802.1x Port-Based Authentication
- Information About Configuring IEEE 802.1x Port-Based Authentication
- IEEE 802.1x Port-Based Authentication
- Device Roles
- Authentication Process
- Switch-to-RADIUS-Server Communication
- Authentication Initiation and Message Exchange
- Authentication Manager
- Ports in Authorized and Unauthorized States
- 802.1x Host Mode
- Multidomain Authentication
- 802.1x Multiple Authentication Mode
- MAC Move
- MAC Replace
- 802.1x Accounting
- 802.1x Accounting Attribute-Value Pairs
- 802.1x Readiness Check
- 802.1x Authentication with VLAN Assignment
- Voice Aware 802.1x Security
- 802.1x Authentication with Per-User ACLs
- 802.1x Authentication with Downloadable ACLs and Redirect URLs
- 802.1x Authentication with Guest VLAN
- 802.1x Authentication with Restricted VLAN
- 802.1x Authentication with Inaccessible Authentication Bypass
- 802.1x Authentication with Voice VLAN Ports
- 802.1x Authentication with Port Security
- 802.1x Authentication with Wake-on-LAN
- 802.1x Authentication with MAC Authentication Bypass
- 802.1x User Distribution
- Network Admission Control Layer 2 802.1x Validation
- Flexible Authentication Ordering
- Open1x Authentication
- 802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT)
- Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute
- Authentication Manager Common Session ID
- Default 802.1x Authentication Settings
- 802.1x Accounting
- 802.1x Authentication Guidelines
- VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass Guidelines
- MAC Authentication Bypass Guidelines
- Maximum Number of Allowed Devices Per Port Guidelines
- How to Configure IEEE 802.1x Port-Based Authentication
- 802.1x Authentication Configuration Process
- Configuring the Switch-to-RADIUS-Server Communication
- Configuring 802.1x Readiness Check
- Enabling Voice Aware 802.1x Security
- Configuring 802.1x Violation Modes
- Configuring the Host Mode
- Configuring Periodic Reauthentication
- Configuring Optional 802.1x Authentication Features
- Configuring 802.1x Accounting
- Configuring a Guest VLAN
- Configuring a Restricted VLAN
- Configuring the Maximum Number of Authentication Attempts
- Configuring Inaccessible Authentication Bypass
- Configuring 802.1x User Distribution
- Configuring NAC Layer 2 802.1x Validation
- Configuring an Authenticator and Supplicant
- Configuring a Supplicant Switch with NEAT
- Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs
- Configuring Open1x
- Resetting the 802.1x Authentication Configuration to the Default Values
- Monitoring and Maintaining IEEE 802.1x Port-Based Authentication
- Configuration Examples for Configuring IEEE 802.1x Port-Based Authentication
- Enabling a Readiness Check: Example
- Enabling 802.1x Authentication: Example
- Enabling MDA: Example
- Disabling the VLAN Upon Switch Violoation: Example
- Configuring the Radius Server Parameters: Example
- Configuring 802.1x Accounting: Example
- Enabling an 802.1x Guest VLAN: Example
- Displaying Authentication Manager Common Session ID: Examples
- Configuring Inaccessible Authentication Bypass: Example
- Configuring VLAN Groups: Examples
- Configuring NAC Layer 2 802.1x Validation: Example
- Configuring an 802.1x Authenticator Switch: Example
- Configuring an 802.1x Supplicant Switch: Example
- Configuring a Downloadable Policy: Example
- Configuring Open 1x on a Port: Example
- Additional References
- Configuring Web-Based Authentication
- Finding Feature Information
- Prerequisites for Configuring Web-Based Authentication
- Restrictions for Configuring Web-Based Authentication on the IE 2000 Switch
- Information About Configuring Web-Based Authentication
- Web-Based Authentication
- Device Roles
- Host Detection
- Session Creation
- Authentication Process
- Local Web Authentication Banner
- Web Authentication Customizable Web Pages
- Web-Based Authentication Interactions with Other Features
- Default Web-Based Authentication Settings
- Configuring Switch-to-RADIUS-Server Communication
- How to Configure Web-Based Authentication
- Monitoring and Maintaining Web-Based Authentication
- Configuration Examples for Configuring Web-Based Authentication
- Enabling and Displaying Web-Based Authentication: Examples
- Enabling AAA: Example
- Configuring the RADIUS Server Parameters: Example
- Configuring a Custom Authentication Proxy Web Page: Example
- Verifying a Custom Authentication Proxy Web Page: Example
- Configuring a Redirection URL: Example
- Verifying a Redirection URL: Example
- Configuring a Local Banner: Example
- Clearing the Web-Based Authentication Session: Example
- Additional References
- Configuring Interface Characteristics
- Finding Feature Information
- Restrictions for Configuring Interface Characteristics
- Information About Configuring Interface Characteristics
- How to Configure Interface Characteristics
- Configuring Ethernet Interfaces
- Monitoring and Maintaining Interface Characteristics
- Configuration Examples for Configuring Interface Characteristics
- Additional References
- Configuring Smartports Macros
- Configuring VLANs
- Finding Feature Information
- Information About Configuring VLANs
- VLANs
- Supported VLANs
- VLAN Port Membership Modes
- Normal-Range VLANs
- Extended-Range VLANs
- VLAN Trunks
- Trunking Overview
- IEEE 802.1Q Configuration Guidelines
- Default Layer 2 Ethernet Interface VLAN Settings
- Ethernet Interface as a Trunk Port
- Trunking Interaction with Other Features
- Allowed VLANs on a Trunk
- Native VLAN for Untagged Traffic
- Load Sharing Using Trunk Ports
- Load Sharing Using STP Port Priorities
- Load Sharing Using STP Path Cost
- VMPS
- How to Configure VLANs
- Monitoring and Maintaining VLANs
- Configuration Examples for Configuring VLANs
- Additional References
- Configuring VTP
- Configuring Voice VLAN
- Configuring STP
- Finding Feature Information
- Prerequisites for Configuring STP
- Restrictions for Configuring STP
- Information About Configuring STP
- STP
- Spanning-Tree Topology and BPDUs
- Bridge ID, Switch Priority, and Extended System ID
- Spanning-Tree Interface States
- How a Switch or Port Becomes the Root Switch or Root Port
- Spanning Tree and Redundant Connectivity
- Spanning-Tree Address Management
- Accelerated Aging to Retain Connectivity
- Spanning-Tree Modes and Protocols
- Supported Spanning-Tree Instances
- Spanning-Tree Interoperability and Backward Compatibility
- STP and IEEE 802.1Q Trunks
- VLAN-Bridge Spanning Tree
- Default Spanning-Tree Settings
- Disabling Spanning Tree
- Root Switch
- Secondary Root Switch
- Port Priority
- Path Cost
- Spanning-Tree Timers
- Spanning-Tree Configuration Guidelines
- How to Configure STP
- Monitoring and Maintaining STP
- Additional References
- Configuring MSTP
- Finding Feature Information
- Information About Configuring MSTP
- MSTP
- Multiple Spanning-Tree Regions
- IST, CIST, and CST
- Hop Count
- Boundary Ports
- IEEE 802.1s Implementation
- Interoperability with IEEE 802.1D STP
- RSTP
- Default MSTP Settings
- MSTP Configuration Guidelines
- Root Switch
- Secondary Root Switch
- Port Priority
- Path Cost
- Link Type to Ensure Rapid Transitions
- Neighbor Type
- Restarting the Protocol Migration Process
- How to Configure MSTP
- Monitoring and Maintaining MSTP
- Configuration Examples for Configuring MSTP
- Additional References
- Configuring Optional Spanning-Tree Features
- Finding Feature Information
- Prerequisites for the Optional Spanning-Tree Features
- Restrictions for the Optional Spanning-Tree Features
- Information About Configuring the Optional Spanning-Tree Features
- How to Configure the Optional Spanning-Tree Features
- Maintaining and Monitoring Optional Spanning-Tree Features
- Additional References
- Configuring Resilient Ethernet Protocol
- Configuring FlexLinks and the MAC Address-Table Move Update
- Finding Feature Information
- Restrictions for the FlexLinks and the MAC Address-Table Move Update
- Information About Configuring the FlexLinks and the MAC Address-Table Move Update
- How to Configure the FlexLinks and MAC Address-Table Move Update
- Maintaining and Monitoring the FlexLinks and MAC Address-Table Move Update
- Configuration Examples for the FlexLinks and MAC Address-Table Move Update
- Additional References
- Configuring DHCP
- Finding Feature Information
- Information About Configuring DHCP
- DHCP Snooping
- DHCP Server
- DHCP Relay Agent
- DHCP Snooping
- Option-82 Data Insertion
- Cisco IOS DHCP Server Database
- DHCP Snooping Binding Database
- Default DHCP Snooping Settings
- DHCP Snooping Configuration Guidelines
- DHCP Snooping Binding Database Guidelines
- Packet Forwarding Address
- DHCP Server Port-Based Address Allocation
- How to Configure DHCP
- Monitoring and Maintaining DHCP
- Configuration Examples for Configuring DHCP
- Additional References
- Configuring Dynamic ARP Inspection
- Finding Feature Information
- Prerequisites for Dynamic ARP Inspection
- Restrictions for Dynamic ARP Inspection
- Information About Dynamic ARP Inspection
- How to Configure Dynamic ARP Inspection
- Monitoring and Maintaining Dynamic ARP Inspection
- Configuration Examples for Dynamic ARP Inspection
- Additional References
- Configuring IP Source Guard
- Configuring IGMP Snooping and MVR
- Finding Feature Information
- Restrictions for IGMP Snooping and MVR
- Information About IGMP Snooping and MVR
- IGMP Snooping
- IGMP Versions
- Joining a Multicast Group
- Leaving a Multicast Group
- Immediate Leave
- IGMP Configurable-Leave Timer
- IGMP Report Suppression
- Default IGMP Snooping Configuration
- Snooping Methods
- Multicast Flooding Time After a TCN Event
- Flood Mode for TCN
- Multicast Flooding During a TCN Event
- IGMP Snooping Querier Guidelines
- IGMP Report Suppression
- Multicast VLAN Registration
- IGMP Filtering and Throttling
- IGMP Snooping
- How to Configure IGMP Snooping and MVR
- Monitoring and Maintaining IGMP Snooping and MVR
- Configuration Examples for IGMP Snooping
- Configuring IGMP Snooping: Example
- Disabling a Multicast Router Port: Example
- Statically Configuring a Host on a Port: Example
- Enabling IGMP Immediate Leave: Example
- Setting the IGMP Snoopng Querier Parameters: Examples
- Enabling MVR: Examples
- Creating an IGMP Profile: Example
- Applying an IGMP Profile: Example
- Limiting IGMP Groups: Example
- Additional References
- Configuring Port-Based Traffic Control
- Finding Feature Information
- Restrictions for Port-Based Traffic Control
- Information About Port-Based Traffic Control
- How to Configure Port-Based Traffic Control
- Monitoring and Maintaining Port-Based Traffic Control
- Configuration Examples for Port-Based Traffic Control
- Enabling Unicast Storm Control: Example
- Enabling Broadcast Address Storm Control on a Port: Example
- Enabling Small-Frame Arrival Rate: Example
- Configuring a Protected Port: Example
- Blocking Flooding on a Port: Example
- Configuring Port Security: Examples
- Configuring Port Security Aging: Examples
- Configuring Protocol Storm Protection: Example
- Additional References
- Configuring SPAN and RSPAN
- Finding Feature Information
- Prerequisites for SPAN and RSPAN
- Restrictions for SPAN and RSPAN
- Information About SPAN and RSPAN
- How to Configure SPAN and RSPAN
- Creating a Local SPAN Session
- Creating a Local SPAN Session and Configuring Incoming Traffic
- Specifying VLANs to Filter
- Configuring a VLAN as an RSPAN VLAN
- Creating an RSPAN Source Session
- Creating an RSPAN Destination Session
- Creating an RSPAN Destination Session and Configuring Incoming Traffic
- Specifying VLANs to Filter
- Monitoring and Maintaining SPAN and RSPAN
- Configuration Examples for SPAN and RSPAN
- Additional References
- Configuring LLDP, LLDP-MED, and Wired Location Service
- Finding Feature Information
- Restrictions for LLDP, LLDP-MED, and Wired Location Service
- Information About LLDP, LLDP-MED, and Wired Location Service
- How to Configure LLDP, LLDP-MED, and Wired Location Service
- Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service
- Configuration Examples for Configuring LLDP, LLDP-MED, and Wired Location Service
- Additional References
- Configuring CDP
- Configuring UDLD
- Configuring RMON
- Configuring System Message Logging
- Finding Feature Information
- Restrictions for System Message Logging
- Information About System Message Logging
- How to Configure System Message Logging
- Disabling Message Logging
- Setting the Message Display Destination Device
- Synchronizing Log Messages
- Enabling and Disabling Time Stamps on Log Messages
- Enabling and Disabling Sequence Numbers in Log Messages
- Defining the Message Severity Level
- Limiting Syslog Messages Sent to the History Table and to SNMP
- Enabling the Configuration-Change Logger
- Monitoring and Maintaining the System Message Log
- Configuration Examples for the System Message Log
- Additional References
- Configuring SNMP
- Configuring Network Security with ACLs
- Finding Feature Information
- Restrictions for Network Security with ACLs
- Information About Network Security with ACLs
- How to Configure Network Security with ACLs
- Monitoring and Maintaining Network Security with ACLs
- Configuration Examples for Network Security with ACLs
- Creating a Standard ACL: Example
- Creating an Extended ACL: Example
- Configuring Time Ranges: Examples
- Using Named ACLs: Example
- Including Comments in ACLs: Examples
- Applying ACL to a Port: Example
- Applying an ACL to an Interface: Example
- Routed ACLs: Examples
- Configuring Numbered ACLs: Example
- Configuring Extended ACLs: Examples
- Creating Named ACLs: Example
- Applying Time Range to an IP ACL: Example
- Creating Commented IP ACL Entries: Examples
- Configuring ACL Logging: Examples
- Applying a MAC ACL to a Layer 2 Interface: Examples
- Additional References
- Configuring Standard QoS
- Finding Feature Information
- Prerequisites for Standard QoS
- Restrictions for Standard QoS
- Information About Standard QoS
- Standard QoS Model
- Standard QoS Configuration Guidelines
- Default Standard QoS Configuration
- Classification
- Policing and Marking
- Mapping Tables
- Queueing and Scheduling Overview
- Packet Modification
- Classification Using Port Trust States
- QoS Policies
- DSCP Maps
- Ingress Queue Characteristics
- Egress Queue Characteristics
- How to Configure Standard QoS
- Enabling QoS Globally
- Enabling VLAN-Based QoS on Physical Ports
- Configuring Classification Using Port Trust States
- Configuring a QoS Policy
- Configuring DSCP Maps
- Configuring Ingress Queue Characteristics
- Configuring Egress Queue Characteristics
- Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
- Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID
- Configuring SRR Shaped Weights on Egress Queues
- Configuring SRR Shared Weights on Egress Queues
- Configuring the Egress Expedite Queue
- Limiting the Bandwidth on an Egress Interface
- Monitoring and Maintaining Standard QoS
- Configuration Examples for Standard QoS
- Configuring the SRR Scheduler: Example
- Configuring DSCP-Trusted State on a Port: Example
- Allowing ACL Permission for IP Traffic: Examples
- Configuring a Class Map: Examples
- Creating a Policy Map: Example
- Creating a Layer 2 MAC ACL: Example
- Creating an Aggregate Policer: Example
- Configuring COS-to-DSCP Map: Example
- Configuring DSCP Maps: Examples
- Configuring an Ingress Queue: Example
- Configuring the Egress Queue: Examples
- Creating a Layer 2 MAC ACL: Example
- Additional References
- Configuring Auto-QoS
- Configuring EtherChannels
- Finding Feature Information
- Restrictions for Configuring EtherChannels
- Information About Configuring EtherChannels
- How to Configure EtherChannels
- Monitoring and Maintaining EtherChannels on the IE 2000 Switch
- Configuration Examples for Configuring EtherChannels
- Additional References
- Configuring Static IP Unicast Routing
- Finding Feature Information
- Restrictions for Static IP Unicast Routing
- Information About Configuring Static IP Unicast Routing
- IP Routing
- How to Configure Static IP Unicast Routing
- Enabling IP Unicast Routing
- Assigning IP Addresses to SVIs
- Configuring Static Unicast Routes
- Monitoring and Maintaining the IP Network
- Additional References for Configuring IP Unicast Routing
- Configuring IPv6 Host Functions
- Finding Feature Information
- Prerequisites Configuring IPv6 Host Functions
- Information About Configuring IPv6 Host Functions
- How to Configure IPv6 Hosting
- Monitoring and Maintaining IPv6 Host Information
- Configuration Examples for IPv6 Host Functions
- Additional References
- Configuring Link State Tracking
- Finding Feature Information
- Restrictions for Configuring Link State Tracking
- Information About Configuring Link State Tracking
- Link State Tracking
- How to Configure Link State Tracking
- Monitoring and Maintaining Link State Tracking
- Configuration Examples for Configuring Link State Tracking
- Additional References
- Configuring IPv6 MLD Snooping
- Finding Feature Information
- Prerequisites for Configuring IPv6 MLD Snooping
- Restrictions for Configuring IPv6 MLD Snooping
- Information About Configuring IPv6 MLD Snooping
- IPv6 MLD Snooping
- MLD Messages
- MLD Queries
- Multicast Client Aging Robustness
- Multicast Router Discovery
- MLD Reports
- MLD Done Messages and Immediate-Leave
- Topology Change Notification Processing
- Default MLD Snooping Configuration
- MLD Snooping Configuration Guidelines
- Enabling or Disabling MLD Snooping
- Multicast Router Port
- MLD Immediate Leave
- MLD Snooping Queries
- IPv6 MLD Snooping
- How to Configure IPv6 MLD Snooping
- Monitoring and Maintaining IPv6 MLD Snooping
- Configuration Examples for Configuring IPv6 MLD Snooping
- Additional References
- Configuring Cisco IOS IP SLAs Operations
- Finding Feature Information
- Prerequisites for Configuring Cisco IOS IP SLAs Operations
- Restrictions for Configuring Cisco IOS IP SLAs Operations
- Information About Configuring Cisco IOS IP SLAs Operations
- Cisco IOS IP SLAs
- Cisco IOS IP SLAs to Measure Network Performance
- IP SLAs Responder and IP SLAs Control Protocol
- Response Time Computation for IP SLAs
- IP SLAs Operation Scheduling
- IP SLAs Operation Threshold Monitoring
- IP Service Levels by Using the UDP Jitter Operation
- IP Service Levels by Using the ICMP Echo Operation
- How to Configure Cisco IOS IP SLAs Operations
- Monitoring and Maintaining Cisco IP SLAs Operations
- Configuration Examples for Configuring Cisco IP SLAs Operations
- Additional References
- Troubleshooting
- Finding Feature Information
- Information for Troubleshooting
- How to Troubleshoot
- Recovering from Software Failures
- Recovering from a Lost or Forgotten Password
- Recovering from Lost Cluster Member Connectivity
- Executing Ping
- Executing IP Traceroute
- Running TDR and Displaying the Results
- Enabling Debugging on a Specific Feature
- Enabling All-System Diagnostics
- Redirecting Debug and Error Message Output
- Monitoring Information
- Troubleshooting Examples
- Additional References
- Working with the Cisco IOS File System, Configuration Files, and Software Images
- Working with the Flash File System
- Displaying Available File Systems
- Detecting an Unsupported SD Flash Memory Card
- Setting the Default File System
- Displaying Information About Files on a File System
- Changing Directories and Displaying the Working Directory
- Creating and Removing Directories
- Copying Files
- Deleting Files
- Creating, Displaying, and Extracting tar Files
- Displaying the Contents of a File
- Working with Configuration Files
- Guidelines for Creating and Using Configuration Files
- Configuration File Types and Location
- Creating a Configuration File By Using a Text Editor
- Copying Configuration Files By Using TFTP
- Copying Configuration Files By Using FTP
- Copying Configuration Files By Using RCP
- Clearing Configuration Information
- Replacing and Rolling Back Configurations
- Working with Software Images
- Working with the Flash File System
- Index