Interface and Hardware Configuration Guide, Cisco IOS Release 15.2 (7) Ex (Catalyst 1000 Switches)
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2 (7) Ex (Catalyst 1000 Switches)
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com
go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any
other company. (1721R)
© 2019 Cisco Systems, Inc. All rights reserved.
CONTENTS
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
iii
Contents
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
iv
Contents
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
v
Contents
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
vi
CHAPTER 1
Configuring Interface Characteristics
• Restrictions for Configuring Interface Characteristics, on page 1
• Information About Configuring Interface Characteristics, on page 1
• How to Configure Interface Characteristics, on page 9
• Monitoring Interface Characteristics, on page 19
• Configuration Examples for Interface Characteristics, on page 20
• Feature History and Information for Configuring Interface Characteristics, on page 22
Port-Based VLANs
A VLAN is a switched network that is logically segmented by function, team, or application, without regard
to the physical location of the users. Packets received on a port are forwarded only to ports that belong to the
same VLAN as the receiving port. Network devices in different VLANs cannot communicate with one another
without a Layer 3 device to route traffic between the VLANs.
VLAN partitions provide hard firewalls for traffic in the VLAN, and each VLAN has its own MAC address
table. A VLAN comes into existence when a local port is configured to be associated with the VLAN, when
the VLAN Trunking Protocol (VTP) learns of its existence from a neighbor on a trunk, or when a user creates
a VLAN.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
1
Configuring Interface Characteristics
Switch Ports
To configure VLANs, use the vlan vlan-id global configuration command to enter VLAN configuration mode.
The VLAN configurations for normal-range VLANs (VLAN IDs 1 to 1005) are saved in the VLAN database.
If VTP is version 1 or 2, to configure extended-range VLANs (VLAN IDs 1006 to 4094), you must first set
VTP mode to transparent. Extended-range VLANs created in transparent mode are not added to the VLAN
database but are saved in the switch running configuration. With VTP version 3, you can create extended-range
VLANs in client or server mode. These VLANs are saved in the VLAN database.
Add ports to a VLAN by using the switchport interface configuration commands:
• Identify the interface.
• For a trunk port, set trunk characteristics, and, if desired, define the VLANs to which it can belong.
• For an access port, set and define the VLAN to which it belongs.
Switch Ports
Switch ports are Layer 2-only interfaces associated with a physical port. Switch ports belong to one or more
VLANs. A switch port can be an access port or a trunk port. You can configure a port as an access port or
trunk port or let the Dynamic Trunking Protocol (DTP) operate on a per-port basis to set the switchport mode
by negotiating with the port on the other end of the link. Switch ports are used for managing the physical
interface and associated Layer 2 protocols and do not handle routing or bridging.
Configure switch ports by using the switchport interface configuration commands.
Access Ports
An access port belongs to and carries the traffic of only one VLAN (unless it is configured as a voice VLAN
port). Traffic is received and sent in native formats with no VLAN tagging. Traffic arriving on an access port
is assumed to belong to the VLAN assigned to the port.
The types of access ports supported are:
• Static access ports are manually assigned to a VLAN (or through a RADIUS server for use with IEEE
802.1x.
• VLAN membership of dynamic access ports is learned through incoming packets. By default, a dynamic
access port is not a member of any VLAN, and forwarding to and from the port is enabled only when
the VLAN membership of the port is discovered.
You can also configure an access port with an attached Cisco IP Phone to use one VLAN for voice traffic and
another VLAN for data traffic from a device attached to the phone.
Trunk Ports
A trunk port carries the traffic of multiple VLANs and by default is a member of all VLANs in the VLAN
database.
The switch supports only IEEE 802.1Q trunk ports. An IEEE 802.1Q trunk port supports simultaneous tagged
and untagged traffic. An IEEE 802.1Q trunk port is assigned a default port VLAN ID (PVID), and all untagged
traffic travels on the port default PVID. All untagged traffic and tagged traffic with a NULL VLAN ID are
assumed to belong to the port default PVID. A packet with a VLAN ID equal to the outgoing port default
PVID is sent untagged. All other traffic is sent with a VLAN tag.
Although by default, a trunk port is a member of every VLAN known to the VTP, you can limit VLAN
membership by configuring an allowed list of VLANs for each trunk port. The list of allowed VLANs does
not affect any other port but the associated trunk port. By default, all possible VLANs (VLAN ID 1 to 4094)
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
2
Configuring Interface Characteristics
Routed Ports
are in the allowed list. A trunk port can become a member of a VLAN only if VTP knows of the VLAN and
if the VLAN is in the enabled state. If VTP learns of a new, enabled VLAN and the VLAN is in the allowed
list for a trunk port, the trunk port automatically becomes a member of that VLAN and traffic is forwarded
to and from the trunk port for that VLAN. If VTP learns of a new, enabled VLAN that is not in the allowed
list for a trunk port, the port does not become a member of the VLAN, and no traffic for the VLAN is forwarded
to or from the port.
Routed Ports
A routed port is a physical port that acts like a port on a router; it does not have to be connected to a router.
A routed port is not associated with a particular VLAN, as is an access port. A routed port behaves like a
regular router interface, except that it does not support VLAN subinterfaces. Routed ports can be configured
with a Layer 3 routing protocol. A routed port is a Layer 3 interface only and does not support Layer 2
protocols, such as DTP and STP.
Configure routed ports by putting the interface into Layer 3 mode with the no switchport interface configuration
command. Then assign an IP address to the port, enable routing, and assign routing protocol characteristics
by using the ip routing and router protocol global configuration commands.
Note Entering a no switchport interface configuration command shuts down the interface and then re-enables it,
which might generate messages on the device to which the interface is connected. When you put an interface
that is in Layer 2 mode into Layer 3 mode, the previous configuration information related to the affected
interface might be lost.
The number of routed ports that you can configure is not limited by software. However, the interrelationship
between this number and the number of other features being configured might impact CPU performance
because of hardware limitations.
SVIs provide IP host connectivity only to the system. SVIs are created the first time that you enter the vlan
interface configuration command for a VLAN interface. The VLAN corresponds to the VLAN tag associated
with data frames on an IEEE 802.1Q encapsulated trunk or the VLAN ID configured for an access port.
Configure a VLAN interface for each VLAN for which you want to route traffic, and assign it an IP address.
You can also use the interface range command to configure existing VLAN SVIs within the range. The
commands entered under the interface range command are applied to all existing VLAN SVIs within the
range. You can enter the command interface range create vlan x - y to create all VLANs in the specified
range that do not already exist. When the VLAN interface is created, interface range vlan id can be used to
configure the VLAN interface.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
3
Configuring Interface Characteristics
EtherChannel Port Groups
When you create an SVI, it does not become active until it is associated with a physical port.
Note Dual-purpose uplink ports are supported on C1000-8T, C1000-8P, C1000-8FP, C1000FE-24T, C1000FE-24P,
C1000FE-48T and C1000FE-48P models of the Cisco Catalyst 1000 Series Switches
Catalyst switches support dual-purpose uplink ports. Each uplink port is considered as a single interface with
dual front ends—an RJ-45 connector and an small form-factor pluggable (SFP) module connector. The dual
front ends are not redundant interfaces, and the switch activates only one connector of the pair.
By default, the switch dynamically selects the interface type that first links up. However, you can use the
media-type interface configuration command to manually select the RJ-45 connector or the SFP module
connector. For information about configuring speed and duplex settings for a dual-purpose uplink, see the
Setting the Interface Speed and Duplex Parameters, on page 14 section.
Each uplink port has one LED which is located below the SFP module connector. The port LED is on for
whichever uplink port is active. For more information about the LEDs, see the hardware installation guide.
A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power
source. The device does not receive redundant power when it is only connected to the PoE port.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
4
Configuring Interface Characteristics
Using the Switch USB Ports
Note This is not supported on Cisco Catalyst 1000 Fast Ethernet Series
Switches.
Console output appears on devices connected to both ports, but console input is active on only one port at a
time. By default, the USB connector takes precedence over the RJ-45 connector.
Note Windows PCs require a driver for the USB port. See the hardware installation guide for driver installation
instructions.
Use the supplied USB Type A-to-USB mini-Type B cable to connect a PC or other device to the switch. The
connected device must include a terminal emulation application. When the switch detects a valid USB
connection to a powered-on device that supports host functionality (such as a PC), input from the RJ-45
console is immediately disabled, and input from the USB console is enabled. Removing the USB connection
immediately reenables input from the RJ-45 console connection. An LED on the switch shows which console
connection is in use.
Interface Connections
Devices within a single VLAN can communicate directly through any switch. Ports in different VLANs cannot
exchange data without going through a routing device.
In the following configuration example, when Host A in VLAN 20 sends data to Host B in VLAN 30, the
data must go from Host A to the switch, to the router, back to the switch, and then to Host B.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
5
Configuring Interface Characteristics
Interface Configuration Mode
With a standard Layer 2 switch, ports in different VLANs have to exchange information through a router.
You can identify physical interfaces by physically checking the interface location on the switch. You can also
use the show privileged EXEC commands to display information about a specific interface or all the interfaces
on the switch. The remainder of this chapter primarily provides physical interface configuration procedures.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
6
Configuring Interface Characteristics
Default Ethernet Interface Configuration
Flow control Flow control is set to receive: off. It is always off for sent
packets.
Auto-MDIX Enabled.
Note The switch might not support a pre-standard
powered device—such as Cisco IP phones and
access points that do not fully support IEEE
802.3af—if that powered device is connected to the
switch through a crossover cable. This is regardless
of whether auto-MIDX is enabled on the switch
port.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
7
Configuring Interface Characteristics
Interface Speed and Duplex Mode
Keepalive messages Disabled on SFP module ports; enabled on all other ports.
Caution Changing the interface speed and duplex mode configuration might shut down and re-enable the interface
during the reconfiguration.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
8
Configuring Interface Characteristics
How to Configure Interface Characteristics
Note The switch ports can receive, but not send, pause frames.
Use the flowcontrol interface configuration command to set the interface’s ability to receive pause frames
to on, off, or desired. The default state is on.
When set to desired, an interface can operate with an attached device that is required to send flow-control
packets or with an attached device that is not required to but can send flow-control packets.
These rules apply to flow control settings on the device:
• receive on (or desired): The port cannot send pause frames but can operate with an attached device that
is required to or can send pause frames; the port can receive pause frames.
• receive off: Flow control does not operate in either direction. In case of congestion, no indication is given
to the link partner, and no pause frames are sent or received by either device.
Note For details on the command settings and the resulting flow control resolution on local and remote ports, see
the flowcontrol interface configuration command in the command reference for this release.
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
9
Configuring Interface Characteristics
Adding a Description for an Interface
Step 4 Follow each interface command with the Defines the protocols and applications that will
interface configuration commands that the run on the interface. The commands are
interface requires. collected and applied to the interface when you
enter another interface command or enter end
to return to privileged EXEC mode.
Step 5 interface range or interface range macro (Optional) Configures a range of interfaces.
Note Interfaces configured in a range must
be the same type and must be
configured with the same feature
options.
Step 3 interface interface-id Specifies the interface for which you are adding
a description, and enter interface configuration
Example:
mode.
Device(config)# interface gigabitethernet
1/0/2
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
10
Configuring Interface Characteristics
Configuring a Range of Interfaces
Device(config-if)# end
Procedure
Step 3 interface range {port-range | macro Specifies the range of interfaces (VLANs or
macro_name} physical ports) to be configured, and enter
interface-range configuration mode.
Example:
• You can use the interface range command
Device(config)# interface range macro to configure up to five port ranges or a
previously defined macro.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
11
Configuring Interface Characteristics
Configuring and Using Interface Range Macros
Device(config)# end
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
12
Configuring Interface Characteristics
Configuring and Using Interface Range Macros
Step 3 define interface-range macro_name Defines the interface-range macro, and save it
interface-range in NVRAM.
Example: • The macro_name is a 32-character
maximum character string.
Device(config)# define interface-range
enet_list gigabitethernet 1/0/1 - 2 • A macro can contain up to five
comma-separated interface ranges.
Or
Device(config)# define interface-range • Each interface-range must consist of the
enet_list fastethernet 1/0/1 - 2
same port type.
Step 4 interface range macro macro_name Selects the interface range to be configured
using the values saved in the interface-range
Example:
macro called macro_name.
Device(config)# interface range macro You can now use the normal configuration
enet_list commands to apply the configuration to all
interfaces in the defined macro.
Device(config)# end
Step 6 show running-config | include define Shows the defined interface range macro
configuration.
Example:
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
13
Configuring Interface Characteristics
Configuring Ethernet Interfaces
Procedure
Step 3 interface interface-id Specifies the interface for which you are adding
a description, and enter interface configuration
Example:
mode.
Device(config)# interface gigabitethernet
1/0/3
Or
Device(config)# interface fastethernet
1/0/3
Step 4 speed {10 | 100 | 1000} Enter the appropriate speed parameter for the
interface:
Example:
• Enter 10, 100, 1000 to set a specific speed
Device(config-if)# speed 10 for the interface.
Step 5 duplex {auto | full | half} This command is not available on a 10-Gigabit
Ethernet interface.
Example:
Enter the duplex parameter for the interface.
Device(config-if)# duplex half
Enable half-duplex mode (for interfaces
operating only at 10 or 100 Mb/s). You cannot
configure half-duplex mode for interfaces
operating at 1000 Mb/s.
You can configure the duplex setting when the
speed is set to auto.
Device(config-if)# end
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
14
Configuring Interface Characteristics
Configuring IEEE 802.3x Flow Control
Step 3 interface interface-id Specifies the interface for which you are adding
a description, and enter interface configuration
Example:
mode.
Device(config)# interface gigabitethernet
1/0/1
Or
Device(config)# interface fastethernet
1/0/1
Step 4 flowcontrol {receive} {on | off | desired} Configures the flow control mode for the port.
Example:
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
15
Configuring Interface Characteristics
Shutting Down and Restarting the Interface
Device(config-if)# end
Step 6 show interfaces interface-id Verifies the interface flow control settings.
Example:
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
16
Configuring Interface Characteristics
Configuring the Console Media Type
Device(config-if)# shutdown
Device(config-if)# no shutdown
Device(config-if)# end
Note This procedure is not applicable to Cisco Catalyst 1000 Fast Ethernet Series Switches.
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
17
Configuring Interface Characteristics
Configuring the USB Inactivity Timeout
Device(config-if)# end
Note This procedure is not applicable to Cisco Catalyst 1000 Fast Ethernet Series Switches.
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
18
Configuring Interface Characteristics
Monitoring Interface Characteristics
Command Purpose
show interfaces interface-number downshift Displays the downshift status details of the specified interfaces
modulemodule-number and modules.
show interfaces interface-id status Displays interface status or a list of interfaces in the
[err-disabled] error-disabled state.
show interfaces [interface-id] switchport Displays administrative and operational status of switching
(nonrouting) ports. You can use this command to find out if
a port is in routing or in switching mode.
show interfaces [interface-id] description Displays the description configured on an interface or all
interfaces and the interface status.
show ip interface [interface-id] Displays the usability status of all interfaces configured for
IP routing or the specified interface.
show interface [interface-id] stats Displays the input and output packets by the switching path
for the interface.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
19
Configuring Interface Characteristics
Clearing and Resetting Interfaces and Counters
Command Purpose
show interfaces interface-id (Optional) Displays speed and duplex on the interface.
show interfaces transceiver (Optional) Displays Digital Optical Monitoring (DOM) status
dom-supported-list on the connect SFP modules.
show interfaces transceiver properties (Optional) Displays temperature, voltage, or amount of current
on the interface.
show interfaces [interface-id] [{transceiver Displays physical and operational status about an SFP module.
properties | detail}] module number]
show running-config interface [interface-id] Displays the running configuration in RAM for the interface.
show controllers ethernet-controller Displays the operational state of the auto-MDIX feature on
interface-id phy the interface.
Command Purpose
clear line [number | console 0 | vty number] Resets the hardware logic on an asynchronous serial line.
Note The clear counters privileged EXEC command does not clear counters retrieved by using Simple Network
Management Protocol (SNMP), but only those seen with the show interface privileged EXEC command.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
20
Configuring Interface Characteristics
Configuring and Using Interface Range Macros: Examples
If you enter multiple configuration commands while you are in interface-range mode, each command is
executed as it is entered. The commands are not batched and executed after you exit interface-range mode. If
you exit interface-range configuration mode while the commands are being executed, some commands might
not be executed on all interfaces in the range. Wait until the command prompt reappears before exiting
interface-range configuration mode.
This example shows how to enter interface-range configuration mode for the interface-range macro enet_list:
This example shows how to delete the interface-range macro enet_list and to verify that it was deleted.
This example shows how to set the interface speed to 100 Mb/s on a 10/100/1000 Mb/s port:
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
21
Configuring Interface Characteristics
Configuring the USB Inactivity Timeout: Example
This example reverses the previous configuration and immediately activates any USB console that is connected.
If there is no (input) activity on a USB console port for the configured number of minutes, the inactivity
timeout setting applies to the RJ-45 port, and a log shows this occurrence:
At this point, the only way to reactivate the USB console port is to disconnect and reconnect the cable.
When the USB cable on the switch has been disconnected and reconnected, a log similar to this appears:
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
22
Configuring Interface Characteristics
Feature History and Information for Configuring Interface Characteristics
Configuring Interface Cisco IOS Release 15.2(7)E1 This feature was introduced.
Characteristics
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
23
Configuring Interface Characteristics
Feature History and Information for Configuring Interface Characteristics
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
24
CHAPTER 2
Configuring Auto-MDIX
• Prerequisites for Auto-MDIX, on page 25
• Restrictions for Auto-MDIX, on page 25
• Information About Auto-MDIX, on page 25
• How to Configure Auto-MDIX, on page 26
• Feature History and Information for Auto-MDIX, on page 27
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
25
Configuring Auto-MDIX
How to Configure Auto-MDIX
workstations, or routers and crossover cables to connect to other devices or repeaters. With auto-MDIX
enabled, you can use either type of cable to connect to other devices, and the interface automatically corrects
for any incorrect cabling. For more information about cabling requirements, see the hardware installation
guide.
This feature is enabled by default.
The following table shows the link states that result from auto-MDIX settings and correct and incorrect cabling.
Local Side Auto-MDIX Remote Side Auto-MDIX With Correct Cabling With Incorrect Cabling
On On Link up Link up
Procedure
Device> enable
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
26
Configuring Auto-MDIX
Feature History and Information for Auto-MDIX
Device(config-if)# end
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
27
Configuring Auto-MDIX
Feature History and Information for Auto-MDIX
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
28
CHAPTER 3
Configuring LLDP, LLDP-MED, and Wired
Location Service
• Information About LLDP, LLDP-MED, and Wired Location Service, on page 29
• How to Configure LLDP, LLDP-MED, and Wired Location Service, on page 32
• Configuration Examples for LLDP, LLDP-MED, and Wired Location Service, on page 38
• Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service, on page 38
• Feature History and Information for LLDP, LLDP-MED, and Wired Location Service, on page 39
InformationAboutLLDP,LLDP-MED,andWiredLocationService
LLDP
The Cisco Discovery Protocol (CDP) is a device discovery protocol that runs over Layer 2 (the data link layer)
on all Cisco-manufactured devices (routers, bridges, access servers, switches, and controllers). CDP allows
network management applications to automatically discover and learn about other Cisco devices connected
to the network.
To support non-Cisco devices and to allow for interoperability between other devices, the device supports the
IEEE 802.1AB Link Layer Discovery Protocol (LLDP). LLDP is a neighbor discovery protocol that is used
for network devices to advertise information about themselves to other devices on the network. This protocol
runs over the data-link layer, which allows two systems running different network layer protocols to learn
about each other.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
29
Configuring LLDP, LLDP-MED, and Wired Location Service
LLDP and Cisco Medianet
These organizationally specific LLDP TLVs are also advertised to support LLDP-MED.
• Port VLAN ID TLV (IEEE 802.1 organizationally specific TLVs)
• MAC/PHY configuration/status TLV (IEEE 802.3 organizationally specific TLVs)
LLDP-MED
LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint
devices such as IP phones and network devices. It specifically provides support for voice over IP (VoIP)
applications and provides additional TLVs for capabilities discovery, network policy, Power over Ethernet,
inventory management and location information. By default, all LLDP-MED TLVs are enabled.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
30
Configuring LLDP, LLDP-MED, and Wired Location Service
Default LLDP Configuration
message, and updates the power budget. If LLDP-MED is disabled or if the endpoint does not support
the LLDP-MED power TLV, the initial allocation value is used throughout the duration of the connection.
You can change power settings by entering the power inline {auto [max max-wattage] | never | static
[max max-wattage]} interface configuration command. By default the PoE interface is in auto mode; If
no value is specified, the maximum is allowed (30 W).
• Inventory management TLV
Allows an endpoint to send detailed inventory information about itself to the device, including information
hardware revision, firmware version, software version, serial number, manufacturer name, model name,
and asset ID TLV.
• Location TLV
Provides location information from the device to the endpoint device. The location TLV can send this
information:
• Civic location information
Provides the civic address information and postal information. Examples of civic location information
are street address, road name, and postal community name information.
• ELIN location information
Provides the location information of a caller. The location is determined by the Emergency location
identifier number (ELIN), which is a phone number that routes an emergency call to the local public
safety answering point (PSAP) and which the PSAP can use to call back the emergency caller.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
31
Configuring LLDP, LLDP-MED, and Wired Location Service
Restrictions for LLDP
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
32
Configuring LLDP, LLDP-MED, and Wired Location Service
Configuring LLDP Characteristics
Note Steps 3 through 6 are optional and can be performed in any order.
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
33
Configuring LLDP, LLDP-MED, and Wired Location Service
Configuring LLDP-MED TLVs
Step 5 lldp timer rate (Optional) Sets the sending frequency of LLDP
updates in seconds.
Example:
Device(config)# lldp timer 30 The range is 5 to 65534 seconds; the default
is 30 seconds.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
34
Configuring LLDP, LLDP-MED, and Wired Location Service
Configuring LLDP-MED TLVs
By using the lldp interface configuration command, you can configure the interface not to send the TLVs
listed in the following table.
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
35
Configuring LLDP, LLDP-MED, and Wired Location Service
Configuring Network-Policy TLV
Step 3 network-policy profile profile number Specifies the network-policy profile number,
and enter network-policy configuration mode.
Example:
The range is 1 to 4294967295.
Device(config)# network-policy profile
1
Step 4 {voice | voice-signaling} vlan [vlan-id {cos Configures the policy attributes:
cvalue | dscp dvalue}] | [[dot1p {cos cvalue |
• voice—Specifies the voice application
dscp dvalue}] | none | untagged]
type.
Example:
• voice-signaling—Specifies the
Device(config-network-policy)# voice
vlan 100 cos 4
voice-signaling application type.
• vlan—Specifies the native VLAN for
voice traffic.
• vlan-id—(Optional) Specifies the VLAN
for voice traffic. The range is 1 to 4094.
• cos cvalue—(Optional) Specifies the
Layer 2 priority class of service (CoS) for
the configured VLAN. The range is 0 to
7; the default is 5.
• dscp dvalue—(Optional) Specifies the
differentiated services code point (DSCP)
value for the configured VLAN. The
range is 0 to 63; the default is 46.
• dot1p—(Optional) Configures the
telephone to use IEEE 802.1p priority
tagging and use VLAN 0 (the native
VLAN).
• none—(Optional) Do not instruct the IP
telephone about the voice VLAN. The
telephone uses the configuration from the
telephone key pad.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
36
Configuring LLDP, LLDP-MED, and Wired Location Service
Configuring Network-Policy TLV
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
37
Configuring LLDP, LLDP-MED, and Wired Location Service
Configuration Examples for LLDP, LLDP-MED, and Wired Location Service
This example shows how to configure the voice application type for the native VLAN with priority tagging:
Command Description
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
38
Configuring LLDP, LLDP-MED, and Wired Location Service
Feature History and Information for LLDP, LLDP-MED, and Wired Location Service
Command Description
show lldp interface [interface-id] Displays information about interfaces with LLDP
enabled.
You can limit the display to a specific interface.
show lldp neighbors [interface-id] [detail] Displays information about neighbors, including
device type, interface type and number, holdtime
settings, capabilities, and port ID.
You can limit the display to neighbors of a specific
interface or expand the display for more detailed
information.
show location admin-tag string Displays the location information for the specified
administrative tag or site.
show location civic-location identifier id Displays the location information for a specific global
civic location.
show location elin-location identifier id Displays the location information for an emergency
location
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
39
Configuring LLDP, LLDP-MED, and Wired Location Service
Feature History and Information for LLDP, LLDP-MED, and Wired Location Service
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
40
CHAPTER 4
Configuring System MTU
• Information About the MTU, on page 41
• How to Configure System MTU Sizes, on page 41
• Configuration Examples for System MTU, on page 42
• Feature Information for MTU, on page 42
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
41
Configuring System MTU
Configuration Examples for System MTU
Step 4 copy running-config startup-config Saves your entries in the configuration file.
Example:
Device# copy running-config
startup-config
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
42
CHAPTER 5
Configuring Power over Ethernet
• Information About PoE, on page 43
• How to Configure PoE, on page 48
• Monitoring Power Status, on page 56
• Configuration Examples for Configuring PoE, on page 56
• Feature Information for PoE, on page 56
A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power
source. The device does not receive redundant power when it is only connected to the PoE port.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
43
Configuring Power over Ethernet
Powered-Device Detection and Initial Power Allocation
Cisco intelligent power management is backward-compatible with CDP with power consumption; the
switch responds according to the CDP message that it receives. CDP is not supported on third-party
powered devices; therefore, the switch uses the IEEE classification to determine the power usage of the
device.
• IEEE 802.3af and IEEE 802.3at: The major features of this standard are powered-device discovery,
power administration, disconnect detection, and optional powered-device power classification. For more
information, see the standard.
1 4W
2 7W
3 15.4 W
The device monitors and tracks requests for power and grants power only when it is available. The device
tracks its power budget (the amount of power available on the device for PoE). The device performs
power-accounting calculations when a port is granted or denied power to keep the power budget up to date.
After power is applied to the port, the device uses CDP to determine the CDP-specific power consumption
requirement of the connected Cisco powered devices, which is the amount of power to allocate based on the
CDP messages. The device adjusts the power budget accordingly. This does not apply to third-party PoE
devices. The device processes a request and either grants or denies power. If the request is granted, the device
updates the power budget. If the request is denied, the device ensures that power to the port is turned off,
generates a syslog message, and updates the LEDs. Powered devices can also negotiate with the device for
more power.
With PoE+, powered devices use IEEE 802.3at and LLDP power with media dependent interface (MDI) type,
length, and value descriptions (TLVs), Power-via-MDI TLVs, for negotiating power up to 30 W. Cisco
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
44
Configuring Power over Ethernet
Power Management Modes
pre-standard devices and Cisco IEEE powered devices can use CDP or the IEEE 802.3at power-via-MDI
power negotiation mechanism to request power levels up to 30 W.
Note The initial allocation for Class 0, Class 3, and Class 4 powered devices is 15.4 W. When a device starts up
and uses CDP or LLDP to send a request for more than 15.4 W, it can be allocated up to the maximum of 30
W.
Note The CDP-specific power consumption requirement is referred to as the actual power consumption requirement
in the software configuration guides and command references.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
45
Configuring Power over Ethernet
Power Monitoring and Power Policing
However, if the powered-device IEEE class is greater than the maximum wattage, the device does not
supply power to it. If the device learns through CDP messages that the powered device is consuming
more than the maximum wattage, the device shuts down the powered device.
If you do not specify a wattage, the device pre-allocates the maximum value. The device powers the port
only if it discovers a powered device. Use the static setting on a high-priority interface.
• never—The device disables powered-device detection and never powers the PoE port even if an unpowered
device is connected. Use this mode only when you want to make sure that power is never applied to a
PoE-capable port, making the port a data-only port.
For most situations, the default configuration (auto mode) works well, providing plug-and-play operation. No
further configuration is required. However, perform this task to configure a PoE port for a higher priority, to
make it data only, or to specify a maximum wattage to disallow high-power powered devices on a port.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
46
Configuring Power over Ethernet
Maximum Power Allocation (Cutoff Power) on a PoE Port
Use the first or second method in the previous list to manually configure the cutoff-power value by entering
the power inline consumption default wattage or the power inline [auto | static max] max-wattage command.
If you do not manually configure the cutoff-power value, the device automatically determines it by using CDP
power negotiation or the device IEEE classification and LLDP power negotiation. If CDP or LLDP are not
enabled, the default value of 30 W is applied. However without CDP or LLDP, the device does not allow
devices to consume more than 15.4 W of power because values from 15400 to 30000 mW are only allocated
based on CDP or LLDP requests. If a powered device consumes more than 15.4 W without CDP or LLDP
negotiation, the device might be in violation of the maximum current (Imax) limitation and might experience
an Icut fault for drawing more current than the maximum. The port remains in the fault state for a time before
attempting to power on again. If the port continuously draws more than 15.4 W, the cycle repeats.
Note When a powered device connected to a PoE+ port restarts and sends a CDP or LLDP packet with a power
TLV, the device locks to the power-negotiation protocol of that first packet and does not respond to power
requests from the other protocol. For example, if the device is locked to CDP, it does not provide power to
devices that send LLDP requests. If CDP is disabled after the device has locked on it, the device does not
respond to LLDP power requests and can no longer power on any accessories. In this case, you should restart
the powered device.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
47
Configuring Power over Ethernet
Persistent PoE
Note In interface mode, the power consumption of a device cannot exceed the power supplied to the static port.
For example, if you configure power supply to the port at 6000 mW (power inline static6000 interface
configuration command), do not configure power consumption by a device at 8000 mW on the same port
(power inline consumption8000 interface configuration command).
Persistent PoE
Persistent PoE provides uninterrupted power to connected devices even when the switch is booting.
Note When you make PoE configuration changes, the port being configured drops power. Depending on the new
configuration, the state of the other PoE ports, and the state of the power budget, the port might not be powered
up again. For example, port 1 is in the auto and on state, and you configure it for static mode. The device
removes power from port 1, detects the powered device, and repowers the port. If port 1 is in the auto and on
state and you configure it with a maximum wattage of 10 W, the device removes power from the port and
then redetects the powered device. The device repowers the port only if the powered device is a class 1, class
2, or a Cisco-only powered device.
Procedure
Device> enable
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
48
Configuring Power over Ethernet
Configuring a Power Management Mode on a PoE Port
Step 6 show power inline [interface-id | module Displays PoE status for a device for the
switch-number] specified interface.
Example:
Device# show power inline
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
49
Configuring Power over Ethernet
Configuring Persistent PoE
Note You will need to configure the poe-ha command before connecting the PD, or you will need to manually
shut/unshut the port after configuring poe-ha.
If you want to reload the switch, ensure that the persistent PoE configuration is first saved. This is necessary
to preserve the configuration.
Procedure
Device> enable
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
50
Configuring Power over Ethernet
Budgeting Power for Devices Connected to a PoE Port
Device(config-if)# end
Caution You should carefully plan your device power budget, enable the power monitoring feature, and make certain
not to oversubscribe the power supply.
Note When you manually configure the power budget, you must also consider the power loss over the cable between
the device and the powered device.
Note In interface mode, the power consumption of a device cannot exceed the power supplied to the static port.
For example, if you configure power supply to the port at 6000 mW (power inline static6000 interface
configuration command), do not configure power consumption by a device at 8000 mW on the same port
(power inline consumption8000 interface configuration command).
Procedure
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
51
Configuring Power over Ethernet
Budgeting Power to a Specific PoE Port
Device> enable
Step 4 power inline consumption default wattage Configures the power consumption of powered
devices connected to each PoE port.
Example:
Device(config)# power inline consumption The range for each device is 4000 to 15400 mW
default 5000 (PoE+). The default is 15400 mW.
Step 6 show power inline consumption Displays the power consumption status.
Example:
Device# show power inline consumption
Procedure
Device> enable
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
52
Configuring Power over Ethernet
Configuring Power Policing
Step 7 show power inline consumption Displays the power consumption data.
Example:
Device# show power inline consumption
Note The power consumption is displayed in units of 0.5 W. For example, if a connected device draws 3.9 W, this
feature will display 4.0 W power drawn.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
53
Configuring Power over Ethernet
Configuring Power Policing
Procedure
Device> enable
Step 4 power inline police [action{log | errdisable}] If the real-time power consumption exceeds the
maximum power allocation on the port,
Example:
configures the device to take one of these
Device(config-if)# power inline police actions:
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
54
Configuring Power over Ethernet
Configuring Power Policing
Step 6 Use one of the following: (Optional) Enables error recovery from the PoE
error-disabled state, and configures the PoE
• errdisable detect cause inline-power
recover mechanism variables.
• errdisable recovery cause inline-power
• errdisable recovery interval interval By default, the recovery interval is 300 seconds.
Step 8 Use one of the following: Displays the power monitoring status, and
verify the error recovery settings.
• show power inline police
• show errdisable recovery
Example:
Device# show power inline police
Device# show errdisable recovery
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
55
Configuring Power over Ethernet
Monitoring Power Status
Command Purpose
show env power (Optional) Displays the status of the internal power supplies for the switch.
Note Use thedebug ilpower controller privileged EXEC command to enable debugging of the platform-specific
Power over Ethernet (PoE) software module on the switch in long message format. These messages include
the Power Controller register reading. Use the no form of this command to disable debugging.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
56
Configuring Power over Ethernet
Feature Information for PoE
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
57
Configuring Power over Ethernet
Feature Information for PoE
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
58
CHAPTER 6
Configuring 2-event Classification
• Information about 2-event Classification, on page 59
• Configuring 2-event Classification, on page 59
• Example: Configuring 2-Event Classification, on page 60
• Additional References, on page 60
• Feature History and Information for 2-event Classification, on page 61
Procedure
Device> enable
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
59
Configuring 2-event Classification
Example: Configuring 2-Event Classification
Step 4 power inline port 2-event Configures 2-event classification on the switch.
Example:
Device(config-if)# end
Additional References
Related Documents
For complete syntax and usage information for Consolidated Platform Command Reference, Cisco IOS
the commands used in this chapter. Release 15.2(7)Ex (Catalyst 1000 Switches)
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
60
Configuring 2-event Classification
Feature History and Information for 2-event Classification
MIBs
Technical Assistance
Description Link
The Cisco Support website provides extensive online resources, including http://www.cisco.com/support
documentation and tools for troubleshooting and resolving technical issues
with Cisco products and technologies.
To receive security and technical information about your products, you can
subscribe to various services, such as the Product Alert Tool (accessed from
Field Notices), the Cisco Technical Services Newsletter, and Really Simple
Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a Cisco.com user
ID and password.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
61
Configuring 2-event Classification
Feature History and Information for 2-event Classification
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
62
CHAPTER 7
Configuring EEE
• Prerequisites for EEE, on page 63
• Restrictions for EEE, on page 63
• Information About EEE, on page 63
• How to Configure EEE, on page 64
• Monitoring EEE, on page 65
• Configuration Examples for EEE, on page 65
• Feature History and Information for EEE, on page 65
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
63
Configuring EEE
How to Configure EEE
Procedure
Step 3 power efficient-ethernet auto Enables EEE on the specified interface. When
EEE is enabled, the device advertises and
Example:
autonegotiates EEE to its link partner.
Device(config-if)# power Enter the no form of the command to disable
efficient-ethernet auto EEE.
Device(config-if)# end
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
64
Configuring EEE
Monitoring EEE
Monitoring EEE
Table 11: Commands for Displaying EEE Settings
Command Purpose
show eee capabilities interface interface-id Displays EEE capabilities for the specified interface.
show eee status interface interface-id Displays EEE status information for the specified
interface.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
65
Configuring EEE
Feature History and Information for EEE
Energy Efficient Ethernet (EEE) Cisco IOS Release 15.2(7)E1 This feature was introduced
Energy Efficient Ethernet (EEE)
is an IEEE 802.3az standard that
is designed to reduce power
consumption in Ethernet
networks during idle periods.
Interface and Hardware Configuration Guide, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches)
66