Banner
HomeTOCPrevNextGlossSearchHelp

PDF

Table of Contents

Configuring the Software

Configuring the Software

Configuring the Software

This chapter discusses the initial configuration of the Catalyst 5000 series switch and describes how you configure such functions as IP addressing and SNMP management. An IP address must be assigned if you need to use Telnet to connect to the switch or use SNMP network management for the switch. Up to eight simultaneous Telnet sessions are possible. If your Telnet station or SNMP network management workstation is on a different network from the switch, a static routing table entry must also be added to the routing table. Use the set ip route command to set the static routing table entry.


Note For definitions of all commands discussed in this chapter, refer to the "Command Reference" chapter of the publication Catalyst 5000 Series Configuration Guide and Command Reference.


Default Configuration

The Catalyst 5000 features you can customize have default values that will most likely suit your environment, and you will probably not need to change them. The default values of these features are set as follows:


Customizing the Configuration

The sections listed below describe how to initially configure the Catalyst 5000 series switch:

You configure the switch through the command line using three basic types of commands: set, show, and clear. Use the set commands to establish switch parameters. After each set command, use the show command to verify that you have entered the correct values and configured the switch correctly. If you make errors, use the set or clear command to overwrite or erase the parameter.

For a list of available commands, type set help, show help, or clear help. To display the command usage, type the command and the word help, as the following example shows:

Console> (enable) set spantree hello help
Usage: set spantree hello <interval> [vlan]
      (interval = 1..10, vlan = 1..1000)


Getting Ready to Install

Before you begin your configuration, you will need the following information:


Note After SLIP is enabled and attached on the console port, an EIA/TIA-232 terminal cannot access the Catalyst 5000 series switch through this port.


Establishing the Console Port Connection

After installing and connecting the switch, perform the following steps to start up and access the switch.

Task Command
Turn ON the power to the switch and the console terminal. The information shown in Figure 5-1 appears on the screen. None
Access the console port using the console terminal. None
At the Enter password prompt, press Return. None
Enter privileged mode. enable
At the Enter password prompt, press Return. None

Figure 5-1 : Initial Bootup Example


ATE0
ATS0=1
 
Catalyst 5000 Power Up Diagnostics
 
Init NVRAM Log 
LED Test 
ROM CHKSUM 
DUAL PORT RAM r/w 
RAM r/w 
RAM address test 
Byte/Word Enable test 
RAM r/w 55aa 
RAM r/w aa55 
EARL test 

BOOTROM Version 1.4, Dated Dec  5 1995 16:49:40
BOOT date: 00/00/00 BOOT time: 03:18:57
SIMM RAM address test 
SIMM Ram r/w 55aa 
SIMM Ram r/w aa55 
Start to Uncompress Image ...
IP address for Catalyst not configured
BOOTP will commence after the ports are online
Ports are coming online ...
Cisco Systems Console


Enter password:
Thu Mar 21 1996  03:20:41    Module 1 is online
 
Enter Password: 
Thu Mar 21 1996  03:20:41    Module 2 is online
 
Enter Password: 

Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff

Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Sending RARP request with address 00:40:0b:6c:2b:ff
Sending bootp request with address: 00:40:0b:6c:2b:ff
Console>
Console> enable
Enter password:
Console> (enable)


Note The system only initiates a BOOTP or RARP request when the sc0 interface is set to 0.0.0.0 or when you use the command clear config all.


Setting the System Information

Although not required, several system parameters should be set as part of the initial system setup. To set the system parameters, perform the following steps in privileged mode:

Task Command
Set the system contact. set system contact contact_string
Set the system location string. set system location location_string
Set the system name. set system name name_string
Set the system clock. set time day_of_week mm/dd/yy hh:mm:ss
Set the system prompt. set prompt prompt_string
Set password protection for accessing the command line in normal mode. set password
Set password protection for accessing the command line in privileged mode. set enablepass


Setting the Interface Type

To set the interface type, perform the following steps in privileged mode:

Task Command
If you are using a local network connection to the console port, set the logical port sc0. Assign the Catalyst 5000 IP address to a VLAN. See Figure 5-2 for an example. set interface sc0 up
set interface sc0 ip_address [netmask [broadcast]]
set interface sc0 vlan_num ip_address
If you are using a SLIP connection to the console port, set the slip port sl0. Figure 5-2 for an example. set interface sl0 up
set interface slip_address dest_address
Configure static routes. For example, you need to configure static routes if your Telnet station or SNMP network management workstation is on a different network from the switch. set ip route destination gateway [metric]
Configure a default route, if desired. See Figure 5-2 for an example. set ip route default gateway metric
Check the status of the configuration of the switch. See Figure 5-3 for an example. show interface
Display the route table entries of the configuration. See Figure 5-4 for an example. show ip route

Figure 5-2 : set interface and set ip route Commands Example


Console> (enable) set interface sc0 up
Interface sc0 administratively up.
Console> (enable) set interface sc0 192.200.11.44 255.255.255.0 \

  192.200.11.255
Interface sc0 IP address and netmask set.
Console> (enable) set interface sl0 up 
Interface sl0 administratively up.
Console> (enable) set interface sl0 192.200.10.45 192.200.10.103
Interface sl0 SLIP and destination address set.

Console> (enable) set interface sc0 5 1
Interface sc0 vlan set.
Console> (enable) set ip route default 192.122.173.42

Route added.

Figure 5-3 : show interface Command Examples

The default configuration is as follows:

Console> (enable) show interface
sl0:  flags=10<DOWN,POINTOPOINT>
        vlan1 inet 0.0.0.0 netmask 0.0.0.0 broadcast 0.0.0.0
sc0:  flags=863<UP,BROADCAST,RUNNING>
         inet 0.0.0.0 netmask 0.0.0.0 broadcast 0.0.0.0 
Console> (enable)

After the set interface command has been executed, the show interface command shows the following configuration:

Console> (enable) show interface
sl0:  flags=10<DOWN,POINTOPOINT>
         inet 192.200.10.45 netmask 192.200.10.103 broadcast 192.200.10.103
sc0:  flags=863<UP,BROADCAST,RUNNING>
         inet 192.200.11.44 netmask 255.255.255.0 broadcast 192.200.11.255 
Console> (enable)

Figure 5-4 : show route Command Example


Console> (enable) show ip route
Redirect
--------
enabled

Destination     Gateway         Flags   Use         Interface
--------------- --------------- ------  ----------  ---------
default         192.22.74.102   UG           59444  sc0
192.22.74.0     192.22.74.223   U                5  sc0
Console> (enable)


Configuring SLIP on the Console Port

To configure the console port for SLIP, perform the following steps:

Task Command
Access the switch from a remote host with Telnet. None
Set the IP address of the console port. set interface slip_address dest_address
Enable the SLIP for the console port. slip attach

fig_1.gif Caution The SLIP connection must use the console port; while this connection is active, it will cause you to lose your console port connection. If you are connected to the command line through the console port and you enter the slip attach command, you will lose the console port connection. In that case, use Telnet to access the command line, enter privileged mode, and type slip detach to restore the console port connection, or reset the switch.


Note The command line is not accessible from a direct local terminal. You must use the SLIP to access it.


Creating a BOOTP Server

IP address information can be set using BOOTP protocol. You can configure a BOOTP server with the MAC and IP addresses of the switch. When the switch boots, it automatically retrieves the IP address from the BOOTP server.

The switch performs a BOOTP request only if the current IP address is set to 0.0.0.0. (This is the default for a new switch or a switch that has had its configuration file cleared using the clear config all command.)

To configure a workstation as a BOOTP server, you must determine the MAC address of the switch and add that MAC address to the BOOTP configuration file on the server. The following steps provide an example of creating a BOOTP server on a Sun workstation:

Task Command
Install the BOOTP server code on the workstation, if it is not already installed. None
Obtain the first address in the MAC address range for module 1 (the supervisor module). Figure 5-5 shows an example of the show config command output. In this example, the first MAC address shown for module 1 is 00-04-0b-90-b5-00. show module
Add an entry in the BOOTP configuration file (usually /usr/etc/bootptab) for each Catalyst 5000 series switch. Press Return after each entry to create a blank line between each entry. In the example in Figure 5-6, ht is hardware type, ha is hardware address (use the first address in the MAC address range), sm is the network subnet mask, and ip is IP address. None

Figure 5-5 : show module Command Example

Console> (enable) show module
Mod Module-Name     Ports  Model    Serial-Num Hw     Fw     Sw     Status
--- --------------- ------ -------- ---------- ------ ------ -----  ------
1                   2      WS-X5009 000102691  1.40   1.12   1.12   ok
2                   24     WS-X5010 000095702  1.302  1.12   1.12   ok
3                   24     WS-X5010 000124907  1.304  1.12   1.12   ok

Mod MAC-Address(es)
--- ----------------------------------------
1   00-40-0b-90-b5-00 thru 00-40-0b-90-b8-ff
2   00-40-0b-30-04-f8 thru 00-40-0b-30-05-0f
3   00-40-0b-30-04-08 thru 00-40-0b-30-04-1f
Console> (enable) 

Figure 5-6 : BOOTP Tab File on a Sun Workstation Example


catalyst-1:\


ht=ether:\


ha=0040b90b500:\

sm=255.255.255.0:\


ip=197.22.74.223


Configuring SNMP Management

Simple Network Management Protocol (SNMP), an application-layer protocol, facilitates the exchange of management information bases (MIBs) between network devices. SNMP community strings authenticate access to the MIB and function as embedded "passwords." For an SNMP message to be processed, the community string must match one of following three community-string modes configured in the switch:

  • Read-only---This mode gives read access to all objects in the MIB except the community strings, but does not allow write access.

  • Read-write---This mode gives read and write access to all objects in the MIB, but doesn't allow access to the community strings.

  • Read-write all---This mode gives read and write access to all objects in the MIB, including the community strings.

The switch sends a trap to the receiver (such as an SNMP manager or workstation) under the following conditions:

  • When a port or module goes up or down.

  • When temperature limitations are exceeded.

  • When there are spanning-tree topology changes.

  • When there are authentication failures.

  • When power supply errors occur.

The set snmp trap command enters the IP address of the receiving station into the trap receiver table, which can hold up to ten addresses. When you enter addresses in the table, you must specify the community string that will appear in the trap message. You can control whether or not the switch issues a trap by using the set snmp trap enable or set snmp trap disable command.

To configure the switch to be managed using an SNMP network management workstation, perform the following steps:

Task Command
Configure the SNMP community strings. See Figure 5-7 for an example. set snmp community read-only | read-write |
read-write-all
community_string
Assign a trap receiver address and community. If you enter incorrect information, use the clear snmp trap command to delete the entry. Then reenter the set snmp trap command again. set snmp trap rcvr_address rcvr_community
If desired, configure the switch so that it issues an authentication trap. set snmp trap enable
Check the SNMP settings using the show snmp command. See Figure 5-8 for an example. show snmp

Figure 5-7 : set snmp Command Example


Console> (enable) set snmp community read-only public
SNMP read-only community string set.
Console> (enable) set snmp community read-write private
SNMP read-write community string set.
Console> (enable) set snmp community read-write-all secret
SNMP read-write-all community string set.

To enable RMON on the Catalyst please use the following command:
Console> (enable) set snmp rmon enable
SNMP RMON support enabled.


Console> (enable) set snmp 
Set snmp commands:
----------------------------------------------------------------------
set snmp community       Set SNMP community string
set snmp help            Show this message
set snmp rmon            Set SNMP RMON
set snmp trap            Set SNMP trap information
Console> (enable) set snmp trap
Usage:
set snmp trap <enable|disable> 
[all|module|chassis|bridge|repeater|auth|vtp]
set snmp trap <rcvr_address> <rcvr_community>
    (rcvr_address is ipalias or IP address, rcvr_community is string)
Console> (enable) set snmp trap enable all
All SNMP traps enabled.
Console> (enable) 

Figure 5-8 : show snmp Command Example


Console> show snmp
RMON: Enabled
Traps Enabled: Chassis
Port Traps Enabled: None

Community-Access     Community-String    
----------------     --------------------
read-only            public

Trap-Rec-Address     Trap-Rec-Community
----------------     --------------------
192.122.173.42       public
Console>


Setting Up Remote Monitoring (RMON)

To configure the switch for remote monitoring (RMON perform the following steps:

Task Command
Activate SNMP remote monitoring support. See Figure 5-9 for an example. set snmp rmon enable
Check the SNMP settings using the show snmp command. Refer to Figure 5-10 for an example. show snmp


Note For a detailed explanation of the RMON feature, refer to the section "Embedded Remote Monitoring (RMON)."

Figure 5-9 : set snmp rmon Command Example


Console> (enable) set snmp rmon enable
SNMP RMON support enabled.

Figure 5-10 : show snmp Command Example


Console> show snmp
RMON: Enabled
Traps Enabled: Chassis
Port Traps Enabled: None

Community-Access     Community-String    
----------------     --------------------
read-only            public

Trap-Rec-Address     Trap-Rec-Community
----------------     --------------------
192.122.173.42       public
Console>


Setting Virtual LANs (VLANs)

VLANs allow ports on the same or different switches to be grouped so that traffic is confined to members of that group only. This feature restricts broadcast, unicast, and multicast traffic (flooding) to only ports included in a certain VLAN. You can set up VLANs for an entire management domain from a single Catalyst 5000 series switch. A maximum of 250 VLANs can be active at any time.

Setting up VLANs for a management domain requires two tasks, as follows:


Creating VLANs in a Management Domain

The set vtp and set vlan commands use Virtual Trunk Protocol (VTP) to set up VLANs across an entire management domain. The default configuration has all switched Ethernet ports and Ethernet repeater ports grouped as VLAN 1.

By default, Catalyst 5000 switches are in a no-management domain state. They remain in this state until they are configured with a management domain or receive an advertisement for a domain. If a switch receives an advertisement, it inherits the management domain name and configuration revision number; it ignores advertisements with a different management domain or a smaller configuration revision number and checks all received advertisements with the same domain for consistency. While a Catalyst 5000 series switch is in the no-management domain state it is a VTP server that learns from received advertisements.

The set vtp command sets up the management domain. It establishes a management domain name, VLAN trunk protocol mode of operation (server, client, or transparent), interval between VLAN advertisements, and password value. There is no default domain name (the value is set to null). The default advertisement interval is five minutes. The default VLAN trunk protocol mode of operation is set to server.

By default, management domains are set to non-secure mode without a password. Adding a password sets the management domain to secure mode. A password must be configured on each Catalyst 5000 series switch in the management domain to use secure mode.

fig_2.gif Caution A management domain does not function properly if the management domain password is not assigned from each Catalyst 5000 series switch in the domain.

The set vlan command uses the following parameters to create a VLAN in the management domain:

  • The VLAN number

  • A VLAN name

  • The VLAN type (Ethernet, FDDI, Token Ring, FDDI NET, or TR NET)

  • The maximum transmission unit (packet size, in bytes) that the VLAN can use

  • A security association identifier (SAID)

  • The state of the VLAN (active or suspended)

  • The ring number for FDDI and Token Ring VLANs

  • A bridge identification number

  • A parent VLAN number

  • A Spanning Tree Protocol (STP) type

  • The VLAN number to use for translation when translating from one VLAN type to another

The Catalyst 5000 uses the security association identifier (SAID) parameter of the set vlan command to identify each VLAN.The default SAID for VLAN 1 is 100001, for VLAN 2 is 100002, for VLAN 3 is 100003, and so on. The default maximum transmission unit (mtu) is 1,500 bytes. The default state is active on an 802.10 trunk.

When translating from one VLAN type (Ethernet, FDDI, Token Ring, FDDI NET, or TR NET) to another, the Catalyst 5000 series switch requires a different VLAN number for each media type.

To create a VLAN across a networking domain, perform the following steps in privileged mode:

Task Command
Define the VLAN management domain, indicating the domain name, VLAN trunk protocol mode of operation, interval between VLAN advertisements, and password value. Figure 5-13 shows an example of the set vtp command. set vtp [domain name] [mode mode] [interval interval] [passwd passwd]
Verify that the VLAN management domain configuration is correct. Figure 5-12 shows a sample display of the show vtp domain command. show vtp domain
Define the VLAN, indicating the parameters described above: VLAN number, name, type, maximum transmission unit, SAID, state, ring number, bridge identification number, and number to indicate whether source routing should be set to transparent or bridging. A maximum of 250 VLANs can be active at any time. Figure 5-13 shows an example of the set vlan command. Figure 5-14 shows a diagram of the established VLANs, illustrating how VTP can traverse trunk connections using the ISL and 802.10 protocols and ATM LAN emulation (LANE). In Figure 5-14, Ethernet VLAN 1 is translated to FDDI VLAN 4 on the FDDI module, Ethernet VLAN 2 is translated to FDDI VLAN 5, and so on. set vlan vlan_num [name name] [type type] [mtu mtu] [said said] [state state] [ring ring_number] [bridge bridge_number] [parent vlan_num] [stp stp_type] [translation vlan_num]
Verify that the VLAN configuration is correct. Figure 5-15 shows a sample display of the show vlan command. show vlan

Figure 5-11 : set vtp Command Example


Console (enable) set vtp
Usage:
set vtp [domain <name>][mode <mode>][interval <interval>]

  [passwd <passwd>]
(name: 1-32 characters, mode = (client, server, transparent), 
  interval = 120-600 sec, passwd : 0-64 characters)
Console> (enable) set vtp domain engineering mode client interval 160
VTP: domain engineering modified
Console> (enable)

Figure 5-12 : show vtp domain Command Example


Console> show vtp domain
Domain Name                    Domain Index VTP Version Local Mode
------------------------------ ------------ ----------- -----------
engineering                    1            1           client      

Last Updater    Vlan-count Max-vlan-storage Config Revision Notifications
--------------- ---------- ---------------- --------------- -------------
172.20.25.130   5          256              0               disabled

Figure 5-13 : set vlan Command Example


Console> (enable) set vlan
Usage:
set vlan <vlan_num> <mod/ports...>
set vlan <vlan_num> [name <name>][type <type>][mtu <mtu>][said <said>]
         [state <state>] [ring <ring_number>]
         [bridge <bridge_number>] [parent <vlan_num>]
         [stp <stp_type>] [translation <vlan_num>]
         (An example of mod/ports is 1/1,2/1-12,3/1-2,4/1-12 
          type = (ethernet, fddi, token_ring, fddi_net, tr_net) 
          name = 1..32 characters, status = (active, suspend) 
          vlan_num = 1..1005)
Console> (enable) set vlan 3 name engineering type ethernet
VTP: vlan addition successful
Console> (enable)

Figure 5-14 : VLAN Configuration Across a Management Domain

s4690.gif

Figure 5-15 : show vlan Command Display Sample


Console> (enable) show vlan
VLAN Name                       Type  Status    Mod/Ports
---- -------------------------- ----- --------- ----------------
1    default                    enet  active    2/1-24
                                                3/1-12
                                                4/13-48
3    vlan3                      enet  active    
55   vlan55                     enet  active    
66   vlan66                     fddi  active    
88   vlan88                     tring active    
99   vlan99                     fddi  active    
1002 fddi-default               fddi  active    
1003 token-ring-default         tring active    
1004 fddinet-default            fdnet active    
1005 trnet-default              trnet active    


VLAN SAID       MTU   RingNo BridgeNo StpNo Parent Trans1 Trans2
---- ---------- ----- ------ -------- ----- ------ ------ ------
1    100001     1500  0      0        0     0      0      0
3    100003     1500  0      0        0     0      0      0
55   100055     1500  0      0        0     0      0      0
66   100066     4500  5000   0        0     5000   0      0
88   100088     1500  0      0        0     0      0      0

99   100099     1500  0      0        0     0      0      0
1002 101002     4500  0      0        0     0      1      1003
1003 101003     4500  0      0        0     0      1      1002
1004 101004     4500  0      1004     0     0      0      0
1005 101005     4500  0      1005     0     0      0      0


Grouping Switch Ports to VLANs

A VLAN that is created in a management domain remains unused until it is mapped to Catalyst 5000 switch ports. The set vlan command maps VLANs to ports.


Note When assigning a VLAN for FDDI ports, you can designate port 1 or port 2 of the FDDI port; both will automatically be assigned to the same VLAN. However, when viewing the VLAN configuration, for example, using the show port command, only port 1 is displayed. Keep in mind that port 2 belongs to the same VLAN.

The default configuration has all Ethernet ports on VLAN 1. However, you can enter groups of ports as individual entries, for example, 2/1,3/3,3/4,3/5. You can also use a hyphenated format, for example, 2/1,3/3-5.

To create a VLAN, perform the following steps in privileged mode:

Task Command
Define the VLAN and indicate the included ports. Figure 5-16 shows an example of the set vlan command. Figure 5-17 show a diagram of the established VLANs. In the example in Figure 5-16, VLAN 10, the engineering department, includes module 2, Ethernet ports 1 through 4. VLAN 20, the accounting department, includes module 2, Ethernet ports 5 through 24. The accounting and engineering departments are totally isolated from each other in this configuration. set vlan vlan_num mod/ports
Verify that the VLAN configuration is correct. Figure 5-18 shows a sample display of the show vlan command. show vlan

Figure 5-16 : set vlan Command Example


system1> (enable) set vlan 10 2/1-4
VLAN 10 modified.
VLAN 1 modified.
VLAN    Mod/Ports
10      2/1-4
system1> (enable) set vlan 20 2/5-24
VLAN 20 modified.
VLAN 1 modified.
VLAN    Mod/Ports
20      2/5-24

Figure 5-17 : Local VLAN Configuration

h3065.gif

Figure 5-18 : show vlan Command Display Sample


system1> (enable) show vlan
VLAN    Mod/Ports
----    -----------------------------------------------------------------
1       1/1-2
10      2/1-4
20      2/5-24
system1> (enable) 


Note To set up an FDDI 802.10 VLAN configuration, see the section "Setting Up an FDDI 802.10 Configuration" in the chapter "CDDI and FDDI Module Software Configuration."


Setting Trunks

Use the set trunk command to configure trunks on ports and to configure the mode for the trunk: on, off, desirable, or auto. To establish a trunk, the port on each Catalyst 5000 series switch must be configured as a trunk port. To establish trunks, perform the following steps in privileged mode:

Task Command
Establish trunks on specific ports. Set the trunk to on to make it a trunk port, off to make it a non-trunk port, desirable to make it a trunk port if the port it is connected to allows trunking, or auto to make it a trunk port if the port it is connected to becomes set for trunking. Figure 5-19 shows an example of the set trunk command. Port 1 on module 1 is configured as a trunk. set trunk mod_num/port_num
[ on | off | desirable | auto ] [vlans]
Verify that the trunk configuration is correct. Figure 5-20 shows a sample display of the show trunk command. show trunk

Figure 5-19 : set trunk Command Example

Console> (enable) set trunk 1/2 5
Port 1/2 allowed vlans modified to 1-5.
Console> (enable) set trunk 1/1 desirable
Port 1/1 mode set to desirable.
Port 1/1 has become a trunk.

Figure 5-20 : show trunk Command Display Sample


Console> (enable) show trunk
Port     Mode       Status        
-------  ---------  ------------  
1/1      desirable  trunking      
1/2      auto       not-trunking  
3/1      auto       not-trunking  
3/2      auto       not-trunking  
3/3      auto       not-trunking  
3/4      auto       not-trunking  

3/5      auto       not-trunking  
3/6      auto       not-trunking  
3/7      auto       not-trunking  
3/8      auto       not-trunking  
3/9      auto       not-trunking  
3/10     auto       not-trunking  
3/11     auto       not-trunking  
3/12     auto       not-trunking  

Port     Vlans allowed
-------  ---------------------------------------------------------------
1/1      1-1000
1/2      1-5
3/1      1-1000
3/2      1-1000
3/3      1-1000
3/4      1-1000
3/5      1-1000
3/6      1-1000
3/7      1-1000
3/8      1-1000
3/9      1-1000
3/10     1-1000
3/11     1-1000
3/12     1-1000

Port     Vlans active
-------  ---------------------------------------------------------------
1/1      1,55
1/2      1
3/1      1
3/2      1
3/3      1
3/4      1
3/5      1
3/6      1
3/7      1
3/8      1
3/9      1
3/10     1
3/11     1
3/12     1
Console> (enable)


Testing the Configuration

After you have configured the IP address(es), test for connectivity between the switch and a host. The host can reside anywhere in your network. To test for connectivity, perform the following steps:

Task Command
Test the configuration using the ping command. The ping command sends an echo request to the host specified in the command line. ping host
If necessary, reset the configuration to its default values and reenter the configuration information. clear config


Note The host must be connected to a port with an address on the same IP network, or you must configure a static route entry to reach the host network. Refer to the set ip route command in the "Command Reference" chapter of the publication Catalyst 5000 Series Configuration Guide and Command Reference.

For example, to test connectivity from the switch to a workstation with an IP address of 192.34.56.5, enter the command ping 192.34.56.5. If the switch receives a response, the following message is displayed:

192.34.56.5 is alive


Note Parameters set using the command line remain set even if you disconnect power to the switch. The clear config all command returns all parameters to their default values.

HomeTOCPrevNextGlossSearchHelp
-

Copyright 1988-1996 © Cisco Systems Inc.