cc/td/doc/product/lan/cat3900
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring the Catalyst 3900

Configuring the Catalyst 3900

You might not have to configure the Catalyst 3900 for it to work in your network; it is shipped with default configuration parameters and can function with these defaults. However, if you want or need to alter the configuration of the Catalyst 3900, you can use a console session. This chapter provides information on the following:

Configuration Overview

To alter the configuration of your Catalyst 3900, follow these steps:


Step 1   If one has not already been established, establish a console session. For information about establishing a console session, refer to the "Planning for Configuration and Management" section.

Step 2   At the Main Menu, select Configuration. The Configuration Menu panel (Figure 6-1) is displayed.


Figure 6-1: Configuration Menu Panel

Step 3   Select the menu option you want.

Step 4   Change or enter values.

Step 5   When you have changed or entered all of the required configuration parameters, save the changes and return to the Cisco Catalyst 3900 Main Menu. Configuration is complete.

Guidelines for Using the Console Panels

As you move through the console panels, follow these guidelines:

Configuring Basic Switch and Stack Parameters

To view or change basic switch and stack information, such as the system name, system location, or system contact, select Switch Configuration on the Configuration Menu. The Switch Configuration panel (Figure 6-2) is displayed.


Figure 6-2: Switch Configuration Panel

The following information is displayed on this panel:


Note If this Catalyst 3900 is part of a stack, updates to the Address Format, System Name, System Location, and System Contact are propagated throughout the stack.
To Select Then

Change the current settings...

The appropriate parameter...

Specify the new value.

View additional information about the switch...

Stack Configuration

Refer to the "Configuring Stack Parameters" section.

Save your changes...

Return


Configuring Stack Parameters

To configure stack parameters, select Stack Configuration on the Switch Configuration panel. The Stack Configuration panel (Figure 6-3) is displayed.


Figure 6-3: Stack Configuration Panel

The following information is displayed on this panel:

Viewing Module Information

To view general information about the Catalyst 3900 and any expansion modules installed, select Module Information on the Configuration Menu. The Module Information panel (Figure 6-4) is displayed.


Figure 6-4: Module Information Panel

The following information is displayed on this panel:

You cannot change the information that appears on this panel.

Configuring VLANs and VTP

You can partition a single Catalyst 3900 into multiple VLANs. A VLAN can be configured with its own IP address and managed with SNMP. A VLAN can contain ports from multiple switches in the same stack. Any VLAN can participate independently in the Spanning-Tree Protocol. Once VLANs have been established, packets are forwarded between ports belonging to the same VLAN only.

You can use VTP to set up and manage VLANs across an entire administrative domain. When new VLANs are added to a Catalyst switch in an administrative domain, VTP can be used to automatically distribute the information to the trunk ports of all the devices in the administrative domain. This allows VLAN naming consistency and connectivity between all devices in the administrative domain.

An administrative or management domain is a logical grouping of VLANs used by the VLAN Trunking Protocol (VTP) for the purpose of administration and management. VTP parameters are propagated throughout the VLANs within a single management domain. While you can have duplicate VLAN names in a network, each VLAN name within a management domain must be unique. A management domain is not device specific. Different devices may belong to the same management domain if the VLANs defined for the devices belong to the same management domain. Likewise, a device may belong to multiple management domains if the VLANs defined for the device belong to different management domains.

For more information about Token Ring VLANs, refer to the "Token Ring VLANs" section of the "Understanding Token Ring Switching" appendix.

To configure VLANs and the VTP for the Catalyst 3900, select VLAN and VTP Configuration on the Configuration Menu. The VLAN and VTP Configuration panel (Figure 6-5) is displayed.


Figure 6-5: VLAN and VTP Configuration Panel

The following options are displayed on this panel:

Viewing VTP Parameters

To view parameters for the VTP, select VTP Administrative Configuration on the VLAN and VTP Configuration panel. The VTP Administrative Configuration panel (Figure 6-6) is displayed.


Figure 6-6: VTP Administrative Configuration Panel

The following information is displayed on this panel:

Configuring VLANs

You can define VLANs for the entire network from a single switch. The VLAN configuration is propagated to all switches in the same administrative domain using the VTP advertisement protocol. To define VLANs, select VTP VLAN Configuration on the VLAN and VTP Configuration panel. The VTP VLAN Configuration panel (Figure 6-7) is displayed. The panel lists the VLANs with respect to their parent-child relationships. Each TrBRF is followed by an indented list of the TrCRFs for which it is a parent. You can also sort the entries on the panel by VLAN ID. This is particularly useful when you are searching for a particular VLAN or when you want to add a VLAN and need to see the IDs that have already been assigned.


Note This panel displays all VLANs in the administrative domain regardless of whether they are a VLAN type that is supported by the Catalyst 3900.

Figure 6-7: VTP VLAN Configuration Panel

The following information is displayed on this panel:

  When setting the local state for a VLAN, keep the following in mind:

Note The VLAN with the VLAN name of "default" is an Ethernet VLAN and is the VLAN that will be used to transmit information for Cisco proprietary protocols, such as VTP and CDP.

Adding or Changing TrBRF VLAN Parameters

To add a new TrBRF, select Add on the VTP VLAN Configuration panel, enter the VLAN ID (2 through 1001) and select TrBRF. To change the definition of an existing TrBRF, select Change on the VTP VLAN Configuration panel and specify the VLAN ID. In either case, the VLAN Parameter Configuration for TrBRF panel (Figure 6-8) is displayed.


Figure 6-8: VLAN Parameter Configuration for TrBRF Panel

The following information is displayed on this panel:

Adding or Changing TrCRF VLAN Parameters

To add a new TrCRF, select Add on the VTP VLAN Configuration panel, enter the VLAN ID (2 through 1001) and select TrCRF. To change the definition of an existing TrCRF, select Change on the VTP VLAN Configuration panel and specify the VLAN ID. In either case, the VLAN Parameter Configuration for TrCRF panel (Figure 6-9) is displayed.


Note If you select View on the VTP VLAN Configuration panel and specify the VLAN ID of a TrCRF, this panel also displays a list of the ports assigned to the specified TrCRF.

As described in the "Token Ring VLANs and ISL" section of the "Understanding Token Ring Switching" appendix, you can configure a TrCRF as a backup path in the event that the ISL link fails. When configuring a backup TrCRF, keep the following in mind:


Figure 6-9: VLAN Parameter Configuration for TrCRF Panel

The following information is displayed on this panel:

Caution If the ports of the TrCRF VLAN are connected to a ring that contains only workstations, the port will be unable to learn the ring number. In this case, you must configure the ring number.

Changing Ethernet VLAN Parameters

To change the definition of an existing Ethernet VLAN, select Change on the VTP VLAN Configuration panel and specify the VLAN ID. The VLAN Parameter Configuration for Ethernet panel (Figure 6-10) is displayed. You can change the values of the security association identifier and the translationally bridged VLANs only.


Figure 6-10: VLAN Parameter Configuration for Ethernet Panel

The following information is displayed on this panel:

Viewing FDDI and FDDI-Net VLAN Parameters

To view the definition of an existing FDDI or FDDI-Net VLAN, select View on the VTP VLAN Configuration panel and specify the VLAN ID. The VLAN Parameter Configuration for FDDI (or the VLAN Parameter Configuration for FDDI-net) panel (Figure 6-11) is displayed. You can view the definition of an FDDI or FDDI-Net VLAN, but cannot change it.


Figure 6-11: VLAN Parameter Configuration for FDDI Panel

The following information is displayed on this panel:

FDDI VLANs

If the VLAN type is FDDI, the following additional information is displayed for FDDI VLANs:

FDDI-Net VLANs

If the VLAN type is FDDI-Net, the following additional information is displayed for FDDI-Net VLANs:

Displaying VLAN Port Assignments

To display a list of the TrCRFs and TrBRFs to which ports are assigned, select Local VLAN Port Configuration on the VLAN and VTP Configuration panel. The Local VLAN Port Configuration panel (Figure 6-12) is displayed.

By default, all local TrCRFs and TrBRFs that are defined on a switch when the switch is started (or restarted) are enabled for the ISL port. However, you can disable a TrCRF or TrBRF for the ISL port.


Figure 6-12: Local VLAN Port Configuration Panel

This panel displays the following information about the VLAN port assignments:

When changing VLAN assignments for an ISL module, keep the following in mind:

Configuring IP Information

To view or change IP information associated with a TrBRF, such as the IP address, subnet mask, or IP state, or to send PINGs, select IP Configuration on the Configuration Menu. The IP information that you can configure is associated with a TrBRF. Therefore, if the ports of the Catalyst 3900 are assigned to more than one TrBRF, when you select IP configuration you will be presented with a list of possible TrBRFs from which to choose. The IP Configuration panel (Figure 6-13) is displayed.


Figure 6-13: IP Configuration Panel

The following information is displayed on this panel:

When you select either of the BootP options for the IP state, the Catalyst 3900 repeats BootP requests at regular intervals, beginning at 1 second intervals and eventually decreasing to 5 minute intervals until it has received a valid response.

The following BootP response parameters are recognized and recorded in NVRAM:

The BootP requests will also cease if a valid IP address is configured via the console panels or if the IP state is set to IP Disabled. Once the Catalyst 3900 stops sending BootP requests on a domain, it does not resume sending requests or recognize BootP responses on that domain unless the Catalyst 3900 is reset.

For more information about BootP, refer to the appendix "Understanding BootP".

To Select Then

Change the current settings...

The appropriate parameter...

Specify the value.

Verify the network availability of a particular resource...

Send PING

Specify the IP address of the resource.

Save your changes...

Return


Note IP addresses are always entered in dotted-decimal notation (a set of 4 decimal numbers from 0 through 255 separated by periods). The default is 0.0.0.0. If the default is used, no SNMP management will be available until the switch learns its address.

Configuring SNMP Parameters

To allow the Catalyst 3900 to be managed by an SNMP manager, you must first configure the SNMP parameters. To view or set SNMP parameters, such as the community names, where traps are to be sent, and whether authentication failure traps should be sent, select SNMP Configuration on the Configuration Menu. The SNMP Configuration panel (Figure 6-14) is displayed.


Figure 6-14: SNMP Configuration Panel

The following information is displayed on this panel:

Specifying Community Names

A community name is a password that a set of SNMP managers use to manage a specified device. Each community name is associated with a specific privilege level of management. To view or change the community names for the domains of the Catalyst 3900, select Community Strings on the SNMP Configuration panel. The Community Strings panel (Figure 6-15) is displayed.


Figure 6-15: Community Strings Panel

The following information is displayed on this panel:

Entries are displayed in the order in which they are entered. Only five community names can be entered.

To Select Then

Add a community name

Add Entry

Specify the community name and privilege.

Delete a community name

Delete Entry

Specify the name to be deleted.

Change a community name or privilege

Change Entry

Specify the index number of the entry to be changed and enter the new information.

Delete all community names

Clear Table

Save your changes

Return

Specifying Trap Receivers

To view or change the list of SNMP managers to which traps are sent, select Trap Receivers on the SNMP Configuration panel. The SNMP Trap Receivers information that you can configure is associated with a TrBRF. Therefore, if the ports of the Catalyst 3900 are assigned to more than one TrBRF and you select Trap Receivers on the SNMP Configuration panel, you will be presented with a list of possible TrBRFs from which to choose. The Trap Receivers panel (Figure 6-16) is displayed.


Figure 6-16: Trap Receivers Panel

The following information is displayed on this panel:

The trap receivers list can contain a maximum of six entries.

To Select Then

Add an entry to the list

Add Entry

Specify the IP address, community name, and domain.

Delete an entry

Delete Entry

Specify the index number of the entry to be deleted.

Change an entry in the list

Change Entry

Specify the index number of the entry to be changed and enter the new information.

Delete all entries

Clear Table

Display the complete list of TrBRFs assigned to an IP address

Zoom

Specify the index number.

Save your changes

Return

Configuring Spanning-Tree Parameters

Enabling the Catalyst 3900 to participate in a spanning tree allows you to configure redundant (backup) paths in the switch topology and have the switch automatically disable redundant paths to prevent loops. If an active path is broken and a backup path is available, the switch will locate the redundant path and enable it. Without a spanning tree, a path failure means the loss of connectivity for the affected part of the network.

For more information about spanning tree, refer to the "Spanning-Tree Protocol" section of the "Understanding Token Ring Switching" appendix.

To view or change the spanning-tree parameters associated with a VLAN, such as the switch priority and the port path cost, select Spanning Tree on the Configuration Menu and then select the desired TrBRF. The Spanning Tree for TrBRF panel (Figure 6-17) is displayed.

When you configure spanning-tree parameters for a TrBRF, you:


Figure 6-17: Spanning Tree for TrBRF Panel

The following information is displayed on this panel:

  The valid range for this parameter is displayed when you select Switch Hello Time.
  The maximum cannot be more than the lower of 40 or 2 x (Switch Forward Delay - 1).
  The range limits that appear when you select this parameter are calculated using the values currently selected for Switch Hello Time and Switch Forward Delay.
  The lower range limit that appears when you select this parameter reflects the value currently selected for Switch Maximum Age.
To Select Then

Change the current settings

The appropriate parameter

Specify the value.

View or change the spanning-tree parameters for one of the TrCRFs associated with this TrBRF

TrCRF & Port Spanning Tree Parameters

Refer to the "Changing Spanning-Tree Parameters for a TrCRF" section.

Save your changes

Return

Changing Spanning-Tree Parameters for a TrCRF

To view or change the spanning-tree parameters for a TrCRF associated with the selected TrBRF, select TrCRF & Port Spanning Tree Parameters on the Spanning Tree panel and then select the desired TrCRF. The Spanning Tree for TrCRF panel (Figure 6-18) is displayed.

When you configure the spanning-tree parameters for a TrCRF, you:

The Spanning-Tree Protocol that is run on the ISL link depends on the type of TrCRF:


Figure 6-18: Spanning Tree for TrCRF Panel

The following information is displayed on this panel:

  To change individual port properties, select Port Spanning Tree Parameters.
  The valid range for this parameter is displayed when you select Switch Hello Time.
  The maximum cannot be more than the lower of 40 or 2 x (Switch Forward Delay - 1).
  The range limits that appear when you select this parameter are calculated using the values currently selected for Switch Hello Time and Switch Forward Delay.
  The lower range limit that appears when you select this parameter reflects the value currently selected for Switch Maximum Age.
To Select Then

Change the current settings

The appropriate parameter

Specify the value.

View or change the spanning-tree parameters for the ports that belong to this TrCRF...

Port Spanning Tree Parameters

Refer to the "Changing Spanning-Tree Parameters for a Port" section.

Save your changes

Return

Changing Spanning-Tree Parameters for a Port

To view or change the priority, path cost, and spanning-tree mode of a port, select Port Spanning Tree Parameters on the Spanning Tree panel. The Port Spanning Tree Parameters panel (Figure 6-19) is displayed.


Figure 6-19: Port Spanning Tree Parameters Panel

The following information is displayed on this panel:

Configuring Port Parameters

To view or change the configuration parameters of a port such as the mode, type, and speed, select Port Configuration on the Configuration Menu and specify the port number. The Port Configuration panel (Figure 6-20) is displayed. If you specify the port number of an ATM module, the ATM Configuration panel is displayed. See the "Configuring the ATM Port" section for more information. If you specify the port number of an ISL module, the ISL Port Configuration panel is displayed. See the "Configuring the ISL Port" section for more information.


Figure 6-20: Port Configuration Panel

The following information is displayed on this panel:


Note If you change any configuration parameters of a connected port, the port will close and reopen and you will lose all address information and statistics for that port.
To Select Then

Change the current settings...

The appropriate parameter...

Specify the new value.

Save your changes

Return


Configuring the ATM Port

To configure your ATM expansion module, select Port Configuration from the Configuration Menu panel. You are prompted to specify the port you want to configure. When you specify a port on an ATM module, the ATM Configuration panel (Figure 6-21) is displayed. The possible port numbers for the ATM module are 21 (if the module is installed in slot 1) and 25 (if the module is installed in slot 2).


Figure 6-21: ATM Configuration Panel

The following information is displayed on this panel:

The following options are displayed on this panel:

When you change a parameter on a panel and select Return, the change is saved in NVRAM. The change will not be implemented, however, until you restart the Catalyst 3900 or select Apply Changes.

Caution Selecting Apply Changes will cause all emulated LANs to close and could, therefore, disrupt the network.

Configuring ATM Network Parameters

To configure ATM physical-layer network parameters, select ATM Network Setup from the ATM Configuration panel. The ATM Network Setup panel (Figure 6-22) is displayed.


Figure 6-22: ATM Network Setup Panel

The following information is displayed on this panel:

Configuring Advanced ATM Parameters

To configure advanced ATM parameters, select Advanced Parameters on the ATM Network Setup panel. The Advanced Parameters panel (Figure 6-23) is displayed. We recommend only experienced users configure the parameters listed on this panel. Changing these parameters may impact your network, therefore, use caution when altering the values for these parameters.


Figure 6-23: Advanced Parameters Panel

The following information is displayed on this panel:

Configuring LEC Parameters

Before you can configure parameters for an LEC, you must first assign the module to a TrCRF and TrBRF. Only one TrCRF per TrBRF can contain an ATM port, therefore, you cannot bridge traffic between emulated LANs. For more information about defining TrCRFs and TrBRFs, refer to the "Configuring VLANs and VTP" section of the Catalyst 3900 Token Ring Switch User Guide.

To configure LEC parameters, select ATM LEC Setup from the Configuration panel. Select the TrCRF to which the module is assigned. The ATM LEC Setup panel (Figure 6-24) is displayed.


Figure 6-24: ATM LEC Setup Panel

The following information is displayed on this panel:

The following options are displayed on this panel:

Configuring Traffic Profile Mapping

To define the list of traffic profiles to be used for mapping outgoing traffic, select Traffic Profile Mapping on the ATM LEC Setup panel and specify the map number (0 through 9). The Traffic Profile Mapping panel (Figure 6-25) is displayed.


Figure 6-25: Traffic Profile Mapping Panel

The following information is displayed on this panel:

Configuring LANE Parameters

To configure LANE parameters for this LEC, select LANE Parameters on the ATM LEC Setup panel. The LANE Parameters panel (Figure 6-26) is displayed.


Figure 6-26: LANE Parameters Panel

The following information is displayed on this panel:

Configuring PVC Parameters

To configure the PVCs to be assigned to this LEC, select PVC Parameters on the ATM LEC Setup panel. The PVC Parameters panel (Figure 6-27) is displayed.


Figure 6-27: PVC Parameters Panel

The following information is displayed on this panel:

Configuring Traffic Profiles Tables

To configure the traffic profile table, select Traffic Profiles Table on the ATM Configuration panel. The Traffic Profiles Table panel (Figure 6-28) is displayed.


Figure 6-28: Traffic Profile Table Panel

The following information is displayed on this panel:

  Normally, traffic profiles used with LAN Emulation, Classical IP, or Multiprotocol Encapsulation over ATM are of type BestEffort (or UBR). For this type of traffic profile, the network does not guarantee any specific bandwidth.
  For a BestEffort traffic profile, the Peak Rate is the only valid parameter. The Peak Rate parameter can be used to limit the maximum transmission rate that the adapter will use to avoid congestion if the device at the other end of the connection is a slower device.

Configuring the ISL Port

To configure port parameters your ISL expansion module, select Port Configuration from the Configuration Menu panel. You are prompted to specify the port you want to configure. When you specify a port on an ISL module, the ISL Port Configuration panel (Figure 6-29) is displayed. The possible port values for the 2-port ISL expansion module are 21 and 23 (if the module is inserted in slot 1) and 25 and 27 (if the module is inserted in slot 2).


Figure 6-29: ISL Port Configuration Panel

The following information is displayed on this panel:

Configuring the Cisco Discovery Protocol Parameters

The CDP is used with Cisco IOS software to establish communication between different models of Cisco equipment (such as between a Cisco Catalyst 3900 switch and a Cisco 7000 router).

Each device configured for CDP sends periodic messages to a multicast address. Each device advertises at least one address at which it can receive SNMP messages. The advertisements also contain time-to-live, or holdtime, information, which indicates the length of time a receiving device should hold CDP information before discarding it.

To configure CDP parameters, select CDP Configuration on the Configuration Menu. The CDP Configuration panel (Figure 6-30) is displayed.


Figure 6-30: CDP Configuration Panel

The following information is displayed on this panel:

Monitoring Port Traffic

The Catalyst 3900 allows you to configure a Switched Port Analyzer (SPAN) port for monitoring port traffic. A SPAN port performs the function of port mirroring. Traffic on the monitored port is copied to the monitoring port, thereby allowing you to monitor traffic on any of the Token Ring ports.

An active port monitor allows you to use a customer-supplied trace tool, such as a Network General Sniffer, to monitor only the LLC traffic that is switched by the monitored port. The MAC frames are not monitored.


Note Before you can use a SPAN port to monitor traffic, the SPAN port must be in its own TrCRF and TrBRF. You cannot designate a port as a SPAN port if it is not isolated in it's own TrCRF and TrBRF. See "
Configuring VLANs and VTP" for more information about how to define a TrBRF and a TrCRF and how to assign a port to a TrCRF.

To configure a SPAN port, select Switched Port Analyzer on the Configuration Menu. The Switched Port Analyzer panel (Figure 6-31) is displayed.


Figure 6-31: Switched Port Analyzer Panel

The following information is displayed on this panel:

Using TokenChannels

To view or change the TokenChannel definitions, select TokenChannel on the Configuration Menu. The TokenChannel panel (Figure 6-32) is displayed.


Figure 6-32: TokenChannel Panel

The following options are displayed on this panel:

Configuring TokenChannels

To configure one or more TokenChannels, select TokenChannel Configuration on the TokenChannel panel. The TokenChannel Configuration panel (Figure 6-33) is displayed.

A single TokenChannel can consist of a combination of HDX and FDX connections. For example, a TokenChannel consisting of three connections can have one HDX and two FDX connections. However, both ports in each interconnected pair must be either HDX or FDX. In addition, all ports in a single TokenChannel must belong to the same TrCRF on the Catalyst 3900.

Neither ATM nor ISL ports cannot be used in a TokenChannel.

Caution While you can use TokenChannels to interconnect Catalyst 3900s and Catalyst 3920s, you cannot use TokenChannels to interconnect other different models of switches. For example, you cannot use a TokenChannel to interconnect a Catalyst 2600 and a Catalyst 3900. Likewise, you cannot use a TokenChannel to interconnect a Catalyst 3900 and a non-Cisco switch.

Figure 6-33: TokenChannel Configuration Panel

The following information is displayed on this panel:

You must define the TokenChannels for both connected Catalyst 3900s before physically connecting the linked ports. Therefore, make sure that you have either disabled the ports or disconnected the cables before you configure the TokenChannel. Otherwise, you will create loops.


Note When you physically connect the linked ports, make sure that the ports with the lowest port numbers are connected. For example, if a TokenChannel links ports 3, 6, and 7 of one Catalyst 3900 and ports 2, 4, and 5 of another Catalyst 3900, the ports must be connected to each other in the following manner: port 3 to port 2, port 6 to port 4, and port 7 to port 5.
To Select Then

Define a new TokenChannel

Add Entry

Specify the ports that compose the new TokenChannel. The port numbers must be entered from lowest to highest and be separated by spaces. You cannot specify more than 8 ports.

Delete the definition for a TokenChannel

Delete Entry

Specify the identifier of the TokenChannel to be deleted.

Change the definition of a TokenChannel

Change Entry

Specify the identifier of the TokenChannel to be changed and enter the new information. The ports associated with a TokenChannel must be disabled or disconnected before you change the TokenChannel definition.

Delete all TokenChannel definitions

Clear Table

Confirm the deletion of all TokenChannel definitions.

Save your changes

Return


Viewing Current TokenChannel Configuration

To view the configuration of currently defined TokenChannels, select Current TokenChannel Information on the TokenChannel panel. The Current TokenChannel Information panel (Figure 6-34) is displayed.


Figure 6-34: Current TokenChannel Information Panel

The following information is displayed on this panel:

Caution If one of the links in a TokenChannel goes down, the whole TokenChannel will become inoperative.

Limiting Scope and Access

For network security, you can isolate parts of your network by limiting the scope and access of your users. For example, you might want to limit access to a specific file server to a select group of users.

To limit access, you can do the following:

To limit the scope and access of users on segments attached to the Catalyst 3900, select Filters & Port Security from the Configuration Menu. The Filters & Port Security panel (Figure 6-35) is displayed.


Note The ISL module does not support Media Access Control (MAC) or protocol filtering.

Figure 6-35: Filters & Port Security Panel

The following options are displayed on this panel:

Filtering Data Based on MAC Address

To restrict certain users from communicating with other users or resources (such as printers or servers), select Configure Filters on the Filters & Port Security panel. The Configure Filters panel (Figure 6-36) is displayed.


Note When configuring MAC address filters for a port, you cannot configure multiple filters for a port that include the same MAC address. For example, you cannot specify the same MAC address in both a block destination address filter and a block source address filter for the same port. Also, you cannot specify the same MAC address in both an allow destination address filter and an allow source address filter for the same port.

Figure 6-36: Configure Filters Panel

The following information is displayed on this panel:

You can define up to 250 source or destination MAC addresses to be filtered at the port of entry into the Catalyst 3900. MAC addresses can be unicast, multicast (group), or broadcast. All 250 addresses can be associated with one port or divided among the available ports.

To Select Then

Display the complete list of Entry Ports and Exit Ports for a filter

Zoom

Specify the index number.

Add a filter

Add Entry

Specify the filter type, the MAC address, and the ports. The port numbers should be listed from lowest to highest and be separated by spaces. If you do not specify a port number, the filter will be applied to all ports.

Delete a filter

Delete Entry

Specify the index number of the filter to be deleted.

Delete all filters

Clear Table

Confirm the deletion of all filters.

Save your changes

Return


Note If you set up a filter for broadcast packets, hosts on the other side of the Catalyst 3900 will not see the ARP broadcast packets. To prevent this, allow time for the Catalyst 3900 to learn the host addresses before implementing the filter.

Note If you are defining a filter for a TokenChannel, the filter must be defined for all ports in the TokenChannel.

Securing Ports

The Catalyst 3900 also allows you to totally block (secure) communication at selected ports, unless explicitly allowed by a MAC filter. Addresses that have been allowed or forced by a configured filter are not blocked. To define the security attributes of each port, select Configure Port Security Mode on the Filters & Port Security panel. The Configure Port Security Mode panel (Figure 6-37) is displayed.


Figure 6-37: Configure Port Security Mode Panel

The following information is displayed on this panel:

Viewing Filters for a Specific Port

To display the defined filters for a specific port, select View Port Filters on the Filters & Port Security panel and specify the port number. The View Port Filters panel (Figure 6-38) is displayed.


Figure 6-38: View Port Filters Panel

The following information is displayed on this panel:

You cannot change any information on this panel.

Filtering Data Based on Protocol

To filter data based on protocol, you can define protocol classes and then assign filtering attributes to these classes on a per-port basis. In protocol filtering, each incoming frame is assigned to one of the protocol classes based on the DSAP or Ethertype of the frame. If the DSAP is 0xAA (which indicates SNAP), the assignment is based on the Ethertype of the SNAP header. The mapping from DSAP or Ethertype to protocol class is common for all switch ports in a stack.

To filter data based on protocol, select Protocol Filters on the Filters & Port Security panel. The Protocol Filters panel (Figure 6-39) is displayed.


Figure 6-39: Protocol Filters Panel

The following options are displayed on this panel:

Assigning Classes for Protocol Filtering

To use protocol filtering, you must first define the protocol classes. You can define up to 15 protocol classes for use in protocol filtering. To define the protocol classes, select Protocol Class Assignment on the Protocol Filters panel. The Protocol Class Assignment panel (Figure 6-40) is displayed.


Figure 6-40: Protocol Class Assignment Panel

The following information is displayed on this panel:


Note All DSAPs that are not specifically assigned to a protocol class are assigned to class 0.
To Select Then

Change the current settings

The appropriate port...

Specify the value.

Save your changes

Return


Defining Protocol Filter Behavior for a Port

After you have defined your protocol classes, you can define how a port handles frames for each protocol class. To define how each class is handled, select Port Filtering Attributes on the Protocol Filters panel and specify the port number. The Port Filtering Attributes panel (Figure 6-41) is displayed.


Figure 6-41: Filtering Attributes for a Port Panel

The following information is displayed on this panel:

  The default is None.

Note For protocol class 0, Block is set to None and SRT is set to Yes.
To Select Then

Change the current settings

The appropriate parameter...

Specify the value.

Save your changes

Return


Configuring Address Aging

To ensure that the address tables (per port and master) are kept to a minimum size, you can configure an aging limit. The aging limit is used to determine when inactive MAC addresses are removed from the address table. To define address table aging limits, select Address Aging from the Configuration Menu. The Address Aging panel (Figure 6-42) is displayed.


Figure 6-42: Address Aging Panel

The following options are displayed on this panel:


Note To completely disable address aging, you must disable address aging for the ports and the master address table.

Defining Address Aging Limits by Port

To define the address aging limits of each port, select Port Address Table Aging on the Address Aging panel. The Port Address Table Aging panel (Figure 6-43) is displayed.


Figure 6-43: Port Address Table Aging Panel

The following information is displayed on this panel:

Defining Address Aging Limits for the Master Address Table

To define the address aging limits of the master address table, select Master Address Table Aging on the Address Aging panel. The Master Address Table Aging panel (Figure 6-44) is displayed.


Figure 6-44: Master Address Table Aging Panel

The following information is displayed on this panel:

Setting a Password

The Catalyst 3900 allows you to set a password to protect its configuration. If you establish a password, users must enter it to obtain access to the Main Menu. To set a password, select Password on the Configuration Menu. The Password panel (Figure 6-45) is displayed.


Figure 6-45: Password Panel

To Select Then

Add a password

Set Password

Press Enter at the Old Password prompt and specify a new password.

Change the password

Set Password

Specify the current password and the new password.

Delete the password

Delete Password

Specify the current password.

Save your changes

Return


Note If you have forgotten your password, press the System Request button to access the System Request menu, and then select Clear the system password. This will clear only the system password. All other configuration parameters saved in NVRAM will be retained.

hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Oct 2 03:01:55 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.