This chapter describes MAC learning, MAC address limiting, and static MAC address. This chapter also describes the configuration procedures.

Size: px
Start display at page:

Download "This chapter describes MAC learning, MAC address limiting, and static MAC address. This chapter also describes the configuration procedures."

Transcription

1 This chapter describes MAC learning, MAC address limiting, and static MAC address. This chapter also describes the configuration procedures. Understanding, page 1 Understanding MAC Address Limiting, page 4 Understanding the Static MAC Address, page 6 Removing a MAC Address, page 8 Displaying Information About the MAC Address Table, page 9 Understanding A software MAC address table is maintained on the Cisco ME 2600X. This MAC address table contains the MAC addresses learned on all the interfaces of Cisco ME 2600X. By default, MAC address learning is enabled only for point to multipoint bridge domains and can also be disabled. MAC Address Aging Dynamically learned MAC addresses are deleted after the MAC address age out value. This frees up unused addresses from the MAC address table for other active subscribers. In Cisco ME 2600X, the default value for MAC address aging is 300 seconds and cannot be changed. The expected MAC address age out timer is between 300 to 600 seconds depending on the number of MAC addresses learned. Dynamic MAC Address Learning Dynamic MAC address learning occurs when the bridging data path encounters an ingress frame whose source address is not present in the MAC address table for the ingress service instance. The learned MAC addresses are distributed to the other cards with Ethernet Flow Points (EFPs) in the same bridge domain. OL

2 Actions MAC Move A MAC move occurs when the same MAC address is re-learned on a different port. When a MAC move is detected, a transient event is generated to inform the user about the MAC move. on LAG MAC learning is enabled on the LAG interface, if the Link Aggregation Group (LAG) interface is part of the point to multipoint bridge domain. The MAC addresses are learned on the LAG interface instead of the physical interface. Actions The table below describes the various scenarios and the actions taken on MAC addresses for each scenario. Table 1: Actions Scenario A bridge domain is created. A bridge domain is deleted. An EFP is added and is the first EFP on a bridge domain on an interface of Cisco ME 2600X. An EFP is added and is not the first EFP on a bridge domain. An EFP is deleted. An EFP admin state is UP. An EFP admin state is DOWN. The port goes down. Action The MAC learning is enabled by default in point to multipoint bridge domains. The MAC learning is not supported in point to point bridge domains. The MAC addresses learned on the bridge domain are removed from the software MAC address table that is maintained on the interface on Cisco ME 2600X. All the MAC addresses learned on the bridge domain are sent to this new interface on Cisco ME 2600X. Nothing needs to be done as the MAC addresses learned on the bridge domain are already present. All the MAC addresses learned on that EFP are deleted. When the EFP is the first EFP on the bridge domain on the Cisco ME 2600X, all the MAC addresses learned on the bridge domain are sent to this new interface on Cisco ME 2600X. When the EFP is not the first EFP on the bridge domain on the interface, nothing needs to be done as the MAC addresses learned on the bridge domain are already present. All the MAC addresses learned on that EFP are deleted. All the MAC addresses learned on the port on all the bridge domains are deleted. Configuration Procedures The following procedures can be performed using Cisco IOS commands to configure MAC learning and MAC address limiting: 2 OL

3 Re enabling or Disabling on a Bridge Domain Re enabling or Disabling on a Bridge Domain, on page 3 Configuring MAC Address Limit on a Bridge Domain, on page 5 Configuring a Static MAC Address on a Service Instance, on page 6 Removing a MAC Address, on page 8 Displaying Information About the MAC Address Table, on page 9 Re enabling or Disabling on a Bridge Domain MAC learning is enabled on the point to multipoint bridge domains by default. SUMMARY STEPS 1. enable 2. configure terminal 3. bridge-domain bridge-id 4. mac learning 5. no mac learning 6. end DETAILED STEPS Step 1 Step 2 Command or Action enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Step 3 Step 4 bridge-domain bridge-id Switch(config)# bridge-domain 100 mac learning Configures components on a bridge domain and enters bridge domain configuration mode. Re-enables MAC learning on this bridge domain. Switch(config-bdomain)# mac learning OL

4 Understanding MAC Address Limiting Step 5 Command or Action no mac learning Purpose Disables MAC learning on this bridge domain. Step 6 Switch(config-bdomain)# no mac learning end Switch(config-bdomain)# end Exits bridge domain configuration mode and returns to privileged EXEC mode. Re enable or Disable on a Bridge Domain The following example shows how to re-enable MAC learning on a bridge domain using Cisco IOS commands: Switch(config)# bridge-domain 100 Switch(config-bdomain)# mac learning Switch(config-bdomain)# end The following example shows how to disable MAC learning on a bridge domain using Cisco IOS commands: Switch(config)# bridge-domain 100 Switch(config-bdomain)# no mac learning Switch(config-bdomain)# end Understanding MAC Address Limiting The MAC Address Limiting for bridge domains provides the capability to control the MAC addresses learnt on the bridge domain. You can configure an upper limit on the number of MAC addresses that can be learnt in a bridge domain. If an Ethernet frame with an unknown MAC address is received, it is flooded in the bridge domain. The MAC address limiting commands are configured under the bridge domain. The maximum MAC address limit on a bridge domain is OL

5 Configuring MAC Address Limit on a Bridge Domain Configuring MAC Address Limit on a Bridge Domain SUMMARY STEPS 1. enable 2. configure terminal 3. bridge-domain bridge-id 4. mac limit maximum addresses maximum-addresses 5. end DETAILED STEPS Step 1 Step 2 Command or Action enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Step 3 Step 4 Step 5 bridge-domain bridge-id Switch(config)# bridge-domain 100 mac limit maximum addresses maximum-addresses Switch(config-bdomain)# mac limit maximum addresses 200 end Switch(config-bdomain)# end Configures components on a bridge domain and enters bridge domain configuration mode. Sets an upper limit on the number of MAC addresses that reside in a bridge domain. Use the no mac limit command to restore the default MAC address limit. Exits bridge domain configuration mode and returns to privileged EXEC mode. Configure MAC Address Limit on a Bridge Domain The following example shows how to configure MAC address limiting on a bridge domain using Cisco IOS commands: Switch(config)# bridge-domain 100 OL

6 Understanding the Static MAC Address Switch(config-bdomain)# mac limit maximum addresses 1000 Switch(config-bdomain)# end Understanding the Static MAC Address You can configure static MAC addresses on a service instance. Static MAC address configuration on service instances eliminates the need for MAC address learning, which is required for traffic forwarding. Without MAC address learning, MAC address table resources can be conserved and network resources can be optimized. Static MAC address configuration does not apply to the MVR bridge domain. Benefits Static MAC address support on service instances provides the following benefits: Facilitates optimization of network resources. Conserves MAC table resources when used for upstream traffic. Restrictions for Static MAC Address Multicast static MAC addresses are not allowed in MAC address configurations. Unicast MAC addresses can be statically configured. Configuring a Static MAC Address on a Service Instance Prerequisite Configuring an Ethernet Service Instance Use the no mac static address mac-addr command to remove the statically added unicast MAC address. SUMMARY STEPS 1. enable 2. configure terminal 3. interface type number 4. service instance id ethernet [evc-id] 5. mac static address mac-address 6. exit 7. end 6 OL

7 Configuring a Static MAC Address on a Service Instance DETAILED STEPS Step 1 Step 2 Command or Action enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Step 3 Step 4 Step 5 interface type number Switch(config)# interface TenGigabitEthernet 0/45 service instance id ethernet [evc-id] Switch(config-if)# service instance 1 ethernet mac static address mac-address Configures a Ten Gigabit Ethernet interface and enters interface configuration mode. Configures an Ethernet service instance on an interface and enters service instance configuration mode. Configures a static MAC address on a service instance. Step 6 Switch(config-if-srv)# mac static address 0000.bbbb.cccc exit Returns to interface configuration mode. Step 7 Switch(config-if-srv)# exit end Returns to privileged EXEC mode. Switch(config-if)# end Configure a Static MAC Address on a Service Instance The following example shows how to configure a static MAC address on a service instance using Cisco IOS commands: Switch(config)# interface TenGigabitEthernet 0/45 Switch(config-if)# service instance 1 ethernet Switch(config-if-srv)# encapsulation dot1q 100 Switch(config-if-srv)# bridge-domain 100 Switch(config-if-srv)# mac static address 0000.bbbb.cccc Switch(config-if-srv)# exit Switch(config-if)# end OL

8 Removing a MAC Address Removing a MAC Address This procedure removes only dynamically added MAC addresses. To remove the statically added MAC addresses, use the no mac static address mac-addr command. SUMMARY STEPS 1. enable 2. configure terminal 3. clear mac-address-table [address mac-address] [interface type number] [bridge-domain bridgedomain-id] 4. exit DETAILED STEPS Step 1 Step 2 Command or Action enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Step 3 Step 4 clear mac-address-table [address mac-address] [interface type number] [bridge-domain bridgedomain-id] Switch(config)# clear mac-address-table address 0000.bbbb.cccc interface TenGigabitEthernet 0/45 bridge-domain 100 exit Removes the dynamic MAC address from the MAC address table on a bridge domain. The bridgedomain-id is the bridge domain number. Exits global configuration mode. Switch(config)# exit Remove a MAC Address The following example shows how to remove a MAC address from the MAC address table on a bridge domain using Cisco IOS commands: 8 OL

9 Displaying Information About the MAC Address Table Switch(config)# clear mac-address-table address 0000.bbbb.cccc interface TenGigabitEthernet 0/45 bridge-domain 100 Switch(config)# exit The following example shows how to remove a MAC address from the MAC address table on all the bridge domains using Cisco IOS commands: Switch(config)# clear mac-address-table address 0000.bbbb.cccc Switch(config)# exit Displaying Information About the MAC Address Table SUMMARY STEPS 1. enable 2. show mac-address-table address mac-addr 3. show mac-address-table bridge-domain bridge-domain-id 4. show mac-address-table interface type number DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Command or Action enable show mac-address-table address mac-addr Switch# show mac-address-table address e8d.6400 show mac-address-table bridge-domain bridge-domain-id Switch# show mac-address-table bridge-domain 100 show mac-address-table interface type number Switch# show mac-address-table interface TenGigabitEthernet 0/45 Purpose Enables privileged EXEC mode. Enter your password if prompted. Displays information about the MAC address table for a specific MAC address. The mac-addr is a 48 bit MAC address and the valid format is H.H.H. Displays information about the MAC address table for a specific bridge domain. The bridge-domain-id is the bridge domain number. Displays information about the MAC address table for a specific interface. OL

10 Displaying Information About the MAC Address Table Display Information About the MAC Address Table The following example shows how to display the MAC address table information: Switch# show mac-address-table Bridge Domain Index MAC Address Type Ports e dynamic Te4/ d dynamic Te4/ c dynamic Te4/ e8d.6400 static Te4/ e8d.6400 static Te4/ e8d.6400 static Te4/ e8d.6400 static Te4/ e8d.6400 static Te4/1 The following example shows how to display the MAC address table information for a specific MAC address: Switch# show mac-address-table address Bridge Domain Index MAC Address Type Ports dynamic Te4/2 The following example shows how to display the MAC address table information for a specific bridge domain: Switch# show mac-address-table bridge-domain 2 Bridge Domain Index MAC Address Type Ports e dynamic Te4/ d dynamic Te4/ c dynamic Te4/ b dynamic Te4/ a dynamic Te4/ dynamic Te4/2 The following example shows how to display the MAC address table information for a specific interface: Switch# show mac-address-table interface tengigabitethernet 0/45 Bridge Domain Index MAC Address Type Ports e dynamic Te4/ d dynamic Te4/ c dynamic Te4/ b dynamic Te4/ a dynamic Te4/ dynamic Te4/2 The following example shows how to display the MAC address table information for a LAG interface (Po9): Switch# show mac-address-table 10 OL

11 Displaying Information About the MAC Address Table Bridge Domain Index MAC Address Type Ports dynamic Te4/ dynamic Po9 OL

12 Displaying Information About the MAC Address Table 12 OL

MAC Learning Command Reference

MAC Learning Command Reference MAC Learning Reference This chapter describes commands to configure MAC learning. clear mac-address-table, page 2, page 3 mac limit maximum addresses, page 5 mac static address, page 6 show mac-address-table,

More information

Storm Control over EVC

Storm Control over EVC This chapter describes and procedures to configure., page 1 Restrictions for, page 1 Configuring, page 2 Examples, page 3 Verification, page 5 Storm control prevents traffic on a LAN from being disrupted

More information

How to Configure MAC Address Limiting on Service Instances Bridge Domains and EVC Port Channels,

How to Configure MAC Address Limiting on Service Instances Bridge Domains and EVC Port Channels, Configuring MAC Address Limiting on Service Instances Bridge Domains and EVC Port Channels The MAC Address Limiting on Service Instances, Bridge Domains, and EVC Port Channels feature addresses port security

More information

IGMP Snooping Command Reference

IGMP Snooping Command Reference This chapter describes commands used to configure Internet Group Management Protocol (IGMP) snooping., page 2 immediate-leave, page 3 mrouter, page 4 report-suppression, page 5 show, page 6 show querier,

More information

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Ethernet virtual circuit (EVC) infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Layer 2 Access Control Lists on EVCs

Layer 2 Access Control Lists on EVCs The ability to filter packets in a modular and scalable way is important for both network security and network management. Access Control Lists (ACLs) provide the capability to filter packets at a fine

More information

Cisco CSR 1000V VxLAN Support 2

Cisco CSR 1000V VxLAN Support 2 Cisco CSR 1000V VxLAN Support Cisco CSR 1000V VxLAN Support 2 Finding Feature Information 2 Introduction 2 Prerequisites for Cisco CSR 1000V VxLAN Support 2 Configuring the Cisco CSR 1000V as a VxLAN Layer

More information

Transparent CFM. Information About Transparent CFM. EFP (Q-in-Q interfaces with dot1q or dot1ad C-UNI)

Transparent CFM. Information About Transparent CFM. EFP (Q-in-Q interfaces with dot1q or dot1ad C-UNI) CFM support on a customer VLAN (C-VLAN) allows a customer to provision maintenance intermediate points (MIPs) and Up maintenance endpoints (MEPs) on a C-VLAN component for EFP (Q-in-Q interfaces with dot1q

More information

Configuring MAC Address Tables

Configuring MAC Address Tables This chapter contains the following sections: Information About MAC Addresses, page 1 Configuring MAC Addresses, page 2 Configuring MAC Move Loop Detection, page 4 Verifying the MAC Address Configuration,

More information

Configuring Resilient Ethernet Protocol

Configuring Resilient Ethernet Protocol This chapter describes Resilient Ethernet Protocol (REP), REP configuration guidelines, VLAN load balancing, REP timers, and REP over EVC. This chapter also describes procedures to configure REP. Understanding

More information

IEEE 802.1ah on Provider Backbone Bridges

IEEE 802.1ah on Provider Backbone Bridges IEEE 802.1ah on Provider Backbone Bridges First Published: November 25, 2009 Last Updated: February 8, 2011 The IEEE 802.1ah on Provider Backbone Bridges feature enables MAC-in-MAC tunneling on Ethernet

More information

EVC Command Reference

EVC Command Reference EVC Command Reference This chapter describes commands used to configure an Ethernet Virtual Circuit (EVC). bridge-domain, page 2 clear ethernet service instance, page 3 encapsulation, page 5 l2protocol,

More information

Port-Shaper and LLQ in the Presence of EFPs

Port-Shaper and LLQ in the Presence of EFPs The feature allows network designers to configure port and class policies on ports that contain Ethernet Flow Points (EFPs). These policies support Low Latency Queueing (LLQ) and traffic prioritization

More information

Ethernet Virtual Connections Configuration

Ethernet Virtual Connections Configuration An Ethernet Virtual Connection (EVC) is defined by the Metro-Ethernet Forum (MEF) as an association between two or more user network interfaces that identifies a point-to-point or multipoint-to-multipoint

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN Finding Feature Information, page 1 Prerequisites for SPAN and RSPAN, page 1 Restrictions for SPAN and RSPAN, page 2 Information About SPAN and RSPAN, page 3 How to Configure SPAN and RSPAN, page 14 Monitoring

More information

Configuring Switched Port Analyzer

Configuring Switched Port Analyzer This document describes how to configure local Switched Port Analyzer (SPAN) and remote SPAN (RSPAN) on the router. Finding Feature Information, page 1 Prerequisites for Configuring Local Span and RSPAN,

More information

MAC Address Configuration Commands

MAC Address Configuration Commands Table of Contents Table of Contents Chapter 1...1 1.1...1 1.1.1 mac address-table static...1 1.1.2 mac address-table aging-time...1 1.1.3 show mac address-table...2 1.1.4 clear mac address-table...3 -

More information

BFD on BDI Interfaces

BFD on BDI Interfaces The Cisco feature alleviates limitations on the maximum number of interfaces per system that switched virtual interfaces (SVI) impose. This document describes how to configure the Bidirectional Forwarding

More information

ITU-T G.8032 Ethernet Ring Protection Switching

ITU-T G.8032 Ethernet Ring Protection Switching The feature implements protection switching mechanisms for Ethernet layer ring topologies. This feature uses the G.8032 Ethernet Ring Protection (ERP) protocol, defined in ITU-T G.8032, to provide protection

More information

EVC Quality of Service

EVC Quality of Service This document contains information about how to enable quality of service (QoS) features (such as traffic classification and traffic policing) for use on an Ethernet virtual circuit (EVC). An EVC as defined

More information

Configuring Private VLANs

Configuring Private VLANs Finding Feature Information, on page 1 Prerequisites for Private VLANs, on page 1 Restrictions for Private VLANs, on page 1 Information About Private VLANs, on page 2 How to Configure Private VLANs, on

More information

EVC Quality of Service

EVC Quality of Service First Published: March 28, 2011 Last Updated: March 28, 2011 This document contains information about how to enable quality of service (QoS) features (such as traffic classification and traffic policing)

More information

Flow-Based per Port-Channel Load Balancing

Flow-Based per Port-Channel Load Balancing Flow-Based per Load Balancing The Flow-Based per Load Balancing feature allows different flows of traffic over a Ten Gigabit EtherChannel (GEC) interface to be identified based on the packet header and

More information

Classifying and Marking MPLS EXP

Classifying and Marking MPLS EXP The QoS EXP Matching feature allows you to classify and mark network traffic by modifying the Multiprotocol Label Switching (MPLS) experimental bits (EXP) field in IP packets. This module contains conceptual

More information

Configuring Routed Pseudowire and VPLS

Configuring Routed Pseudowire and VPLS Routed Pseudowire and VPLS feature routes Layer 3 traffic and Layer 2 frames for pseudowire connections between provider edge (PE) devices using Virtual Private LAN Services (VPLS) multipoint PE. Prerequisites

More information

ITU-T G.8032 Ethernet Ring Protection Switching

ITU-T G.8032 Ethernet Ring Protection Switching The feature implements protection switching mechanisms for Ethernet layer ring topologies. This feature uses the G.8032 Ethernet Ring Protection (ERP) protocol, defined in ITU-T G.8032, to provide protection

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 41 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network

More information

Resilient Ethernet Protocol (REP)

Resilient Ethernet Protocol (REP) The is a Cisco proprietary protocol that provides an alternative to the Spanning Tree Protocol (STP). REP provides a way to control network loops, handle link failures, and improve convergence time. It

More information

Basic IGMP v3 snooping support (BISS) is supported. Bridge domain (BD) interfaces from 1 to 4094 support IGMP snooping.

Basic IGMP v3 snooping support (BISS) is supported. Bridge domain (BD) interfaces from 1 to 4094 support IGMP snooping. This module describes how to enable and configure the Ethernet Virtual Connection (EVC)-based IGMP Snooping feature both globally and on bridge domains. Finding Feature Information, on page 1 Prerequisites

More information

Link Aggregation Control Protocol (IEEE 802.3ad) Support for Cisco ubr10012 Routers

Link Aggregation Control Protocol (IEEE 802.3ad) Support for Cisco ubr10012 Routers Link Aggregation Control Protocol (IEEE 802.3ad) Support for Cisco ubr10012 Routers This document describes the features, benefits and configuration of Link Aggregation Control Protocol (IEEE 802.3ad)

More information

Configuring Private Hosts

Configuring Private Hosts CHAPTER 25 This chapter describes how to configure the private hosts feature in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

VLANs over IP Unnumbered SubInterfaces

VLANs over IP Unnumbered SubInterfaces The VLANs over IP Unnumbered Subinterfaces feature allows IP unnumbered interface support to be configured on Ethernet VLAN subinterfaces. This feature also provides support for DHCP on VLAN subinterfaces.

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 34 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network

More information

Configuring IP Unnumbered on IEEE 802.1Q VLANs

Configuring IP Unnumbered on IEEE 802.1Q VLANs CHAPTER 7 Configuring IP Unnumbered on IEEE 802.1Q VLANs Service providers continuously seek ways in which they can make their networks less complex and less expensive, and reduce the cost of provisioning

More information

EVC Quality of Service

EVC Quality of Service EVC Quality of Service Finding Feature Information EVC Quality of Service Last Updated: June 07, 2011 This document contains information about how to enable quality of service (QoS) features (such as traffic

More information

Configuring Private VLANs

Configuring Private VLANs 36 CHAPTER This chapter describes private VLANs (PVLANs) on Catalyst 4500 series switches. It also provides restrictions, procedures, and configuration examples. This chapter includes the following major

More information

Configuring Private VLANs

Configuring Private VLANs CHAPTER 15 This chapter describes how to configure private VLANs on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco

More information

IP SLA Service Performance Testing

IP SLA Service Performance Testing This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data

More information

Using the Command-Line Interface

Using the Command-Line Interface CHAPTER 1 The Cisco Metro Ethernet (ME) 3400E Series Ethernet Access switch is supported by Cisco IOS software. This chapter describes how to use the switch command-line interface (CLI) to configure software

More information

Multi-tenancy. Feature Information for Multi-tenancy

Multi-tenancy. Feature Information for Multi-tenancy Feature Information for, page 1, page 2 Bridge-Domain, page 3 VN-Segment, page 5 Bridge-Domain Interface, page 8 Configuring Multiple Leaf, page 10 Feature Information for Table 1: Feature Information

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 2 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Finding Feature Information, page 9 Information

More information

Configuring Traffic Mirroring

Configuring Traffic Mirroring This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release

More information

Configuring Traffic Mirroring

Configuring Traffic Mirroring This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release

More information

Configuring Traffic Mirroring

Configuring Traffic Mirroring This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release

More information

Configuring DHCP Features

Configuring DHCP Features CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and the option-82 data insertion features on the Catalyst 3750 switch. Unless otherwise noted, the

More information

ASR 9000 Series Common Problems with Spanning Tree Protocols

ASR 9000 Series Common Problems with Spanning Tree Protocols ASR 9000 Series Common Problems with Spanning Tree Protocols Document ID: 116514 Contributed by Bryan Garland and David Powers, Cisco TAC Engineers. Sep 19, 2013 Contents Introduction Problem Port VLAN

More information

Network Edge Authentication Topology

Network Edge Authentication Topology The Network Edge Access Topology (NEAT) feature enables extended secure access in areas outside the wiring closet (such as conference rooms). This secure access allows any type of device to authenticate

More information

FSOS. Ethernet Configuration Guide

FSOS. Ethernet Configuration Guide FSOS Ethernet Configuration Guide Contents 1 Configuring Interface... 1 1.1 Overview...1 1.2 Configuring Interface State...1 1.2.1 Configurations...1 1.2.2 Validation...1 1.3 Configuring Interface Speed...

More information

H-VPLS N-PE Redundancy for MPLS Access

H-VPLS N-PE Redundancy for MPLS Access The feature enables two network provider edge (N-PE) devices to provide failover services to a user provider edge (U-PE) device in a hierarchical virtual private LAN service (H-VPLS). Having redundant

More information

Configuring Switch Latency Monitoring

Configuring Switch Latency Monitoring This chapter contains the following sections: Information About Switch Latency Monitoring, page 1 How to Configure Switch Latency Monitoring, page 3 Configuration Examples for Switch Latency Monitoring,

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page

More information

IP SLA Service Performance Testing

IP SLA Service Performance Testing This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 6 Displaying

More information

Configuring SPAN. Understanding SPAN CHAPTER. This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch.

Configuring SPAN. Understanding SPAN CHAPTER. This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch. CHAPTER 23 This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN Prerequisites for SPAN and RSPAN, page 1 Restrictions for SPAN and RSPAN, page 1 Information About SPAN and RSPAN, page 3 How to Configure SPAN and RSPAN, page 14 Monitoring SPAN and RSPAN Operations,

More information

Configuring Ethernet CFM and E-LMI

Configuring Ethernet CFM and E-LMI 36 CHAPTER Metro Ethernet service providers in particular require certain management capability within the context of the overall Ethernet infrastructure (EI). Ethernet operation, administration, and maintenance

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control CHAPTER 18 This chapter describes how to configure port-based traffic control features on the Catalyst 3750 Metro switch. For complete syntax and usage information for the commands used in this chapter,

More information

Configuring Local SPAN and ERSPAN

Configuring Local SPAN and ERSPAN This chapter contains the following sections: Information About ERSPAN, page 1 Licensing Requirements for ERSPAN, page 5 Prerequisites for ERSPAN, page 5 Guidelines and Limitations for ERSPAN, page 5 Guidelines

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information

More information

Configuring IP Unnumbered Interface

Configuring IP Unnumbered Interface CHAPTER 14 This chapter discusses the IP Unnumbered Interface feature, which allows you to enable IP processing on an interface without assigning an explicit IP address. This chapter contains these sections:

More information

Configuring Layer 2 Switching

Configuring Layer 2 Switching Configuring Layer 2 Switching This chapter describes how to configure Layer 2 switching using Cisco NX-OS. This chapter includes the following sections: Information About Layer 2 Switching, page 1 Licensing

More information

BFD on BDI Interfaces

BFD on BDI Interfaces The Cisco feature alleviates limitations on the maximum number of interfaces per system that switched virtual interfaces (SVI) impose. This document describes how to configure the Bidirectional Forwarding

More information

Ethernet Local Management Interface

Ethernet Local Management Interface This chapter provides conceptual and configuration information of the protocol., on page 1 E-LMI Communication, on page 1 E-LMI Operation, on page 2 Supported Functions, on page 3 Limitations, on page

More information

Configuring DHCP for WLANs

Configuring DHCP for WLANs Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions for, page 1 Information About the Dynamic Host Configuration Protocol, page 2 How to Configure DHCP for WLANs, page 4 Additional

More information

With 802.1X port-based authentication, the devices in the network have specific roles.

With 802.1X port-based authentication, the devices in the network have specific roles. This chapter contains the following sections: Information About 802.1X, page 1 Licensing Requirements for 802.1X, page 9 Prerequisites for 802.1X, page 9 802.1X Guidelines and Limitations, page 9 Default

More information

Private Hosts (Using PACLs)

Private Hosts (Using PACLs) CHAPTER 35 This chapter describes the Private Hosts feature, which is being introduced for the Cisco 7600 series router in Cisco IOS Release 12.2SRB. This chapter contains the following sections: Overview,

More information

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 7 Monitoring VLANs, page 19 Where to Go Next,

More information

Configuring EtherChannels

Configuring EtherChannels Configuring EtherChannels This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco

More information

Configuring MAC Address Tables

Configuring MAC Address Tables This chapter contains the following sections: Information About MAC Addresses, page 1 Guidelines for Configuring the MAC Address Tables, page 2 MAC Address Movement, page 2 Configuring MAC Addresses, page

More information

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN CHAPTER 32 This chapter describes how to configure Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 3750-X or 3560-X switch. Unless otherwise noted, the term switch refers to a Catalyst

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 24 CHAPTER This chapter describes how to configure Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on your Catalyst 2950 or Catalyst 2955 switch. Note For complete syntax and usage information for

More information

Configuring Access Point Groups

Configuring Access Point Groups Finding Feature Information, page 1 Prerequisites for Configuring AP Groups, page 1 Restrictions for, page 2 Information About Access Point Groups, page 2 How to Configure Access Point Groups, page 4 Additional

More information

Configuring Interfaces

Configuring Interfaces CHAPTER 9 This chapter defines the types of interfaces on the Cisco ME 3400 Ethernet Access switch and describes how to configure them. Understanding Interface Types, page 9-1 Using Interface Configuration

More information

Cisco IOS Commands. abort CHAPTER

Cisco IOS Commands. abort CHAPTER CHAPTER 2 abort Use the abort VLAN database command to abandon the proposed new VLAN database, exit VLAN database mode, and return to privileged EXEC mode. abort This command has no arguments or keywords.

More information

Configuring Port Channels

Configuring Port Channels This chapter contains the following sections: Information About Port Channels, page 1, page 9 Verifying Port Channel Configuration, page 16 Verifying the Load-Balancing Outgoing Port ID, page 17 Feature

More information

Configuring Cisco StackWise Virtual

Configuring Cisco StackWise Virtual Finding Feature Information, page 1 Restrictions for Cisco StackWise Virtual, page 1 Prerequisites for Cisco StackWise Virtual, page 3 Information About Cisco Stackwise Virtual, page 3 Cisco StackWise

More information

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling 9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the

More information

Switches running the LAN Base feature set support only static routing on SVIs.

Switches running the LAN Base feature set support only static routing on SVIs. Finding Feature Information, on page 1 Prerequisites for VLANs, on page 1 Restrictions for VLANs, on page 2 Information About VLANs, on page 2 How to Configure VLANs, on page 6 Monitoring VLANs, on page

More information

IP Multicast Optimization: IGMP State Limit

IP Multicast Optimization: IGMP State Limit Finding Feature Information, page 1 Prerequisites for IGMP State Limit, page 1 Restrictions for IGMP State Limit, page 2 Information About IGMP State Limit, page 2 How to Configure IGMP State Limit, page

More information

With 802.1X port-based authentication, the devices in the network have specific roles.

With 802.1X port-based authentication, the devices in the network have specific roles. This chapter contains the following sections: Information About 802.1X, page 1 Licensing Requirements for 802.1X, page 8 Prerequisites for 802.1X, page 8 802.1X Guidelines and Limitations, page 9 Default

More information

Configuring Layer 3 Interfaces

Configuring Layer 3 Interfaces This chapter contains the following sections: Information About Layer 3 Interfaces, page 1 Licensing Requirements for Layer 3 Interfaces, page 4 Guidelines and Limitations for Layer 3 Interfaces, page

More information

QoS: Policing and Shaping Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)

QoS: Policing and Shaping Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series) QoS: Policing and Shaping Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series) First Published: 2014-07-29 Last Modified: 2014-11-22 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Configuring MAC Address Tables

Configuring MAC Address Tables This chapter contains the following sections: Information About MAC Addresses, page 1 Configuring MAC Addresses, page 1 Verifying the MAC Address Configuration, page 4 Information About MAC Addresses To

More information

UniDirectional Link Detection (UDLD) Protocol

UniDirectional Link Detection (UDLD) Protocol The UniDirectional Link Detection protocol is a Layer 2 protocol that detects and disables one-way connections before they create undesired situation such as Spanning Tree loops. Information About the

More information

ethernet cfm mep crosscheck through location prefer

ethernet cfm mep crosscheck through location prefer ethernet cfm mep crosscheck through location prefer ethernet cfm mep crosscheck, page 4 ethernet cfm mep crosscheck start-delay, page 7 ethernet cfm mep domain mpid, page 9 ethernet cfm mep level mpid

More information

Configuring SDM Templates

Configuring SDM Templates Finding Feature Information, page 1 Information About, page 1 How to Configure SDM Templates, page 4 Configuration Examples for SDM Templates, page 5 Additional References for SDM Templates, page 7 Feature

More information

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing

More information

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections:

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections: This chapter contains the following sections: Information About sflow, page 1 Licensing Requirements, page 2 Prerequisites, page 2 Guidelines and Limitations for sflow, page 2 Default Settings for sflow,

More information

Port-Level Shaping and Minimum Bandwidth Guarantee

Port-Level Shaping and Minimum Bandwidth Guarantee Port-Level Shaping and Minimum Bandwidth Guarantee This document explains the Port-Level Shaping and Minimum Bandwidth Guarantee feature. The port-level shaping part of this feature allows you to configure

More information

Configuring Pseudowire

Configuring Pseudowire This chapter provides information about configuring pseudowire features on the Cisco ASR 920 Series Router. Pseudowire Overview, on page 1 CEM Configuration, on page 2 CEM Configuration Guidelines and

More information

Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM

Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM This document describes the implementation of the ITU-Y.1731 fault management functions Ethernet Alarm Indication Signal (ETH-AIS) and Ethernet

More information

Configuring VLAN Trunks

Configuring VLAN Trunks Finding Feature Information, page 1 Prerequisites for VLAN Trunks, page 1 Information About VLAN Trunks, page 2 How to Configure VLAN Trunks, page 5 Configuration Examples for VLAN Trunking, page 20 Where

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control CHAPTER 22 This chapter describes how to configure the port-based traffic control features on the Cisco ME 3400 Ethernet Access switch. For complete syntax and usage information for the commands used in

More information

Configuring the Catalyst 3750G Integrated Wireless LAN Controller Switch

Configuring the Catalyst 3750G Integrated Wireless LAN Controller Switch APPENDIXA Configuring the Catalyst 3750G Integrated Wireless LAN Controller Switch The Catalyst 3750G Integrated Wireless LAN Controller Switch is an integrated Catalyst 3750 switch and Cisco 4400 series

More information

CDP Command Reference

CDP Command Reference This chapter describes commands used to monitor the router and network using Cisco Discovery Protocol (CDP). cdp enable, page 2 cdp run, page 3, page 4 entry, page 5 interface, page 7 neighbors, page 8

More information

Configuring StackWise Virtual

Configuring StackWise Virtual Finding Feature Information, page 1 Restrictions for Cisco StackWise Virtual, page 1 Prerequisites for Cisco StackWise Virtual, page 2 Information About Cisco Stackwise Virtual, page 2 Cisco StackWise

More information

Configuring Bridge Domain Interfaces

Configuring Bridge Domain Interfaces The Cisco ASR 1000 Series Aggregation Services Routers support the bridge domain interface (BDI) feature for packaging Layer 2 Ethernet segments into Layer 3 IP. Restrictions for Bridge Domain Interfaces,

More information

Configuring Access and Trunk Interfaces

Configuring Access and Trunk Interfaces Configuring Access and Trunk Interfaces Ethernet interfaces can be configured either as access ports or trunk ports. Trunks carry the traffic of multiple VLANs over a single link and allow you to extend

More information