Professional Documents
Culture Documents
“show sdm prefer (template name)” - shows template name and memory for items
“no sdm prefer” – default sdm profile, must be reloaded after, in a stack must use the same
template. IF a new switch is added, it is overridden by the master switch
Stores learnt mac address information. Mac address learnt are time framed, renews each frame,
removes idle mac address after 300 seconds, works at layer 2.
Layer 3 version of CAM, works at wire speeds, uses a chip “ASICS” with CAM to route, ACL’s and
QoS via hardware.
Error-disable recovery
If port has an error, IOS will shut it down and port led will turn orange. A shut/no shut will reset
the port.
“show interface status err-disabled” shows effected ports and the reason of error
“errdisable recovery cause (name of issue)” – sets errdisable to occur on specified condition
“errdisable recovery interval (30)” – sets automatic way of upping a port. Default timer is 300
seconds, or you can specify a timer
1.2 – Configure and verify layer 2 protocols.
Allows you to see directly connected devices, cisco proprietary, enabled by default. Sends
out updates to multicast address every 60 seconds, used in PoE negotiations. Version 2
shows more info such as native vlan.
“show cdp neighbours” – shows device ID, local interface, device name
“show cdp neighbours detail” – shows device ID, ip address, device name, local interface
“show cdp entry (device ID)” – shows device ID, ip address, device name, local interface
“no cdp run” – disables cdp globally
“no cdp enable” – disables cdp on interface
Mainly used on fibre cable and sometimes copper, to detect physical damage. Not part of
STP, cisco proprietary, works at layer 2. Sends pings to the other switch and vice versa as a
keep alive every 15 seconds, if one side stops sending port is err-disabled. Fibre optic cable
has 2 strands, one for receive and one for sending. Sends ping to fake max address
0100.0CCC.CCCC
TX----------RX
RX----------TX
VLAN data base – when the switch is in VTP server or transparent mode, you can configure
vlans in database mode. Information is saved in vlan.dat.
Trunking
“show interface (name) switchport” shows all aspects of trunking on the interface
2 main modes: auto – port is passive and will accept trunking is asked to
desirable – will trunk if asked to and will try to initiate
“switchport trunk allowed vlan add …” – must be added on both sides of connection
Native vlan
Native vlan by default is vlan 1. If a packet is received with no tag, then it goes to native vlan.
VTP is used to exchange vlan information with other switches within the same VTP domain.
Cisco proprietary.
Null domain – switches must use the same domain name, a null domain will accept whatever
VTP domain if port if configured
VTP pruning – If a switch is in a VTP domain but the switch doesn’t have any interfaces in the
vlan, then that specific vlan info will not be sent to it
VTP Configuration:
“vtp domain (name)”
“vtp version (#)”
“vtp password (#)”
“vtp mode (#)”
“show vlan”
“show vtp status”
“show vtp counters”
1) Put all switches in same VTP domain
2) Create vlan 60 on SW1
3) VTP creates vlan on SW2 and SW3 and saves it as rev 1
4) Anytime you create a vlan, rev number increases and replaces whole vlan.dat
5) SW4 has rev 18, since this rev is higher, all switches will accept SW4 vlan data. Therefor
when adding a switch to a VTP domain, make sure vlan.dat is empty
EtherChannel
EtherChannel allows you to bundle up to 8 ports into a single channel, which allows for
increased redundancy and bandwidth.
It will use up the bandwidth on the first link and then forward the traffic onto the second
link and so on. Will appear as 1 link in STP. Virtual interface is called port-channel.
Cisco proprietary
Port modes: Desirable – will initiate
Auto – will respond but not initiate
Layer 2 config:
“int range (#)”
“channel group 1 mode (desirable/active…)”
Layer 3 config:
“int range (#)”
“no switchport”
“channel group 1 mode (desirable/active…)”
“interface port-channel 1”
“ip address 192.168.0.1 255.255.255.0”
Load balancing
Can define what port to use. Ie: a source mac address will always use the same port
“port-channel load balance (#)”
STP process:
1) A root bridge is elected by: switch with lowest priority between 0 – 65533, default value is
32768 and or lowest mac address.
All ports are marked as designated and BPDUs are sent out of all ports
Port states:
Blocking – 20 seconds, receives BPDU but does not act on them
Listening – 15 seconds, receives and transmits BPDU but does not update MAC address table
Learning – 15 seconds, begins populating the MAC address table
Forwarding – regular traffic resumes
Disabled – port not participating in STP
“spanning-tree vlan (#) priority (#)” or “spanning-tree vlan (#) root (primary/secondary)”
“interface (#)”
“spanning-tree vlan (#) cost (#)” – To set the path cost of the interface for STP calculations
“show spanning-tree”
“show spanning-tree vlan (#)”
“show spanning-tree interface (#)
Uplink fast
Uplink fast deals with direct failures, cisco proprietary. The alternate/backup port does not
go through listening or learning phase. A group called “uplink group” is created in which root
ports are in. If the root port goes down, another port from the “uplink group” is instantly up
“spanning-tree uplinkfast”
Backbone fast
Backbone fast deals with indirect failures, cisco proprietary. IF a non-root switch has a link
failure to the root, it will send a BPDU stating it’s the Root. Backbone fast nulls out the max
age timer so that the convergence time is shorter. Listening + learning = 30 secs
“spanning-tree backbonefast”
Portfast
PortFast causes a switch or trunk port to enter the spanning tree forwarding state
immediately, bypassing the listening and learning states.
“spanning-tree portfast”
BPDU guard
If a port which should not be receiving any BPDU ie: access port, somehow receives a BPDU,
it will go into err-disabled. Port first must be under portfast”
Root guard
If a superior BPDU comes on the port, it will go into root inconsistent until the BPDU stops
“spanning-tree guard root” – Under interface
Loop guard
If a blocking port stops receiving BPDU’s, instead of transitioning into a designated port it
goes into “loop inconsistent”
“spanning-tree guard loop” – Under interface
STP instance is run for each VLAN, bridge ID: 2-byte priority. 6-byte mac address
VLANs are grouped into regions allowing for less STP instances. Therefore, its less resource
intensive
“spanning-tree mode mst”
“spanning-tree mst config”
“name harries”
“revision 1”
“instance 1 vlan 1-3”
“instance 2 vlan 4-7”
“spanning-tree mst 2 root primary”
Instance 0 is used to communicate with common STP, all vlans not assigned in mst instances
are assigned to instance 0
1.7 – SPAN: switch port analysis
“show monitor”
SW1:
“vlan 999”
“remote span”
“monitor session 1 source remote vlan 999”
“monitor session 1 destination int (#)”
SW2:
“vlan 999”
“remote span”
“monitor session 1 source int (#)”
“monitor session 1 destination remote vlan 999”
1.8 – cisco switchwise
Cisco switchwise connects up to 9 switches to act as 1 virtual switch. It allows for better
redundancy. It is a feature of the catalyst 3750 switches; cascade cables are used between
the switches.
A master switch handles all the configuration. All switches must use the same SDM
template, if a new switch is added to the stack its config is overridden
Priority order:
1) Priority – highest
2) Switch uses use the non-default Interface config
3) Ios version
4) Uptime
5) Lowest mac address
“switch number 1”
“switch priority (1-15)”
“show switch”
“show switch detail”
“show switch stack-ring speed” – Shows cable status
DHCP uses an ip-helper address to forward a broadcast to a DHCP server, only specific UDP
port traffic is sent. An ip helper address coverts a UDP broadcast to a unicast
DHCP server
“ip helper-address 10.10.8.1”
10.10.8.1
To not forward specific UDP protocols, you have to rule them out.
“no ip forward-protocol udp 69”
Broadcast from the user is converted to unicast on the L3 switch. The source is IP of the
interface ip, destination IP is the DHCP IP. Which is how the DHCP server decides which pool
of IP’s to use.
2.1 – Switch security
DHCP – snooping
Host A DHCP SERVER
DHCP DISCOVER ->
<- DHCP OFFER
DHCP REQUEST ->
<- DHCP ACK
DHCP DISCOVER (broadcast) – used to locate DHCP server
DHCP OFFER (unicast) – server sends an offer with configured parameters (IP address,
MAC address, domain name, ETC)
DHCP REQUEST (broadcast) – client sends a request for the parameters/offer
DHCP ACK (unicast) – DHCP sends a confirmation that the IP address has been assigned
DHCP snooping – only allows trusted ports to allow DHCP OFFER packets
IPDHCP snooping binding table – creates a table of all the MAC address’s that it has seen
DHCP REQUESTS for and the IP address they have been assigned
DAI determines the validity of an ARP packet based on valid IP-to-MAC address bindings
stored in the DHCP snooping binding database.
“ip arp inspection vlan (#)”
Port security
3 modes:
Shutdown – port is err-disabled
Protect – packets with unknown source addresses are dropped until you remove a
sufficient number of secure MAC addresses to drop below the maximum value.
Restrict – same as protect but also logs it by incrementing the security violation
counter
“int (#)”
“switchport mode access”
“switchport port-security”
“switchport port-security maximum (#)”
“switchport port-security violation (mode)”
Cisco switch control allows you to control broadcast, unicast and multicast by limiting it
Is it configured per interface. Percentage of all traffic on a port or specific limits are used to
control it, while using rising and falling threshold. Measured on a timer interval of 1 second.
“int (#)”
“storm-control (broadcast/multicast/unicast) level (%value) or (bps/pps)
(value(rising))(value(falling))”
Vlan 10
Isolated 50 50 Promiscuous
port
20
Community 22
20
Community – 205
Isolated - 210
“vlan 205”
“private-vlan community”
“vlan 210”
“private-vlan isolated”
“vlan 200”
“private-vlan association add 205, 210”
“int 0/4”
“switchport mode private-vlan host”
“switchport private-vlan host association 200 205”
“int 0/3”
“switchport mode private-vlan host”
“switchport private-vlan host association 200 205”
“int fa0/2”
“switchport mode private-vlan host”
“switchport private-vlan host association 200 210”
“int fa0/1”
“switchport mode private-vlan promiscuous”
“switchport private-vlan mapping 200 205 210”
Access control allows you to control who is allowed access to the network server and what
services they are allowed to use. Supported by ACS server by default
“aaa new-model”
“aaa authentication login default group radius” – uses radius group to authenticate
HSRP is cisco proprietary. The router with the highest priority becomes the active and the
rest become standby. The routers share a virtual IP address and a virtual MAC address
[00:00:0C]:[07:AC]:[00-FF]
00:00:0C = Cisco id 07:AC = HSRP id v1 00-FF = standby group number 0 – 255
SW1
“int vlan 1”
“standby 1 ip 172.30.70.1”
“standby 1 priority 110”
L2 “standby 1 track fa0/1 20” – if int goes down priority minuses 20
“standby 1 preempt”
SW2
“int vlan 1”
“standby 1 ip 172.30.70.1”
“standby 1 preempt”
“show standby 1”
3.2 – VRRP: virtual router redundancy protocol
VRRP is open standard. The router with the highest priority becomes the master and the rest
become backups. The master can be configured with a virtual IP and always remain master
or it can share it
“int fa0/1”
“vrrp 1 192.168.16.20”
“vrrp 1 prioirty 110”
“vrrp 1 preempt”
“track 1 interface fa0/1 line protocol”
“vrrp 1 track 1 decrement 20”
“show vrrp”
GLBP is cisco proprietary and available on high end switches. 1 VIP but there are multiple
MACS.
All switches are active gateways. Each gateway has a unique MAC, if a gateway goes down
another gateway will take over its MAC
AVG – active virtual gateway: servers as the master and assigns MAC’s to AVF’s
AVF – active virtual forwarding: all other gateways
Load balancing:
Host dependent: use source mac
Route-robin: alternate routers
Weighted: distribute according to weight
“int fa0/1”
“glbp 1 ip 192.168.10.1”
“glbp 1 load balancing weighted”
“glbp 1 weighted 100 lower 85 upper 95”
“glbp 1 track 1 decrement 0”
“show glbp”