Do you have a question about the Cisco Catalyst 3550 Series and is the answer not in the manual?
Form Factor | Rack-mountable |
---|---|
Manageable | Yes |
RAM | 64 MB |
Device Type | Switch |
MAC Address Table Size | 12000 entries |
Routing Protocol | RIP |
Features | VLAN support |
Power Supply | AC 120/230 V (50/60 Hz) |
Ports | 24 or 48 x 10/100Base-TX, 1 x GBIC, 2 x 10/100/1000Base-T |
Operating Temperature | 32 to 113°F (0 to 45°C) |
Describes the hardware and software features supported in this release, including ease of use, performance, and manageability aspects.
Explains how to configure and monitor switches and switch clusters using CMS and CLI interfaces, as well as IE2100 and SNMP.
Provides concepts and examples of using the switch to create dedicated network segments and interconnect them through Fast Ethernet and Gigabit Ethernet.
Explains the different modes within the Cisco IOS user interface and how commands available depend on the current mode.
Describes how to use the question mark (?) at the system prompt to display a list of commands and associated keywords and arguments.
Details editing features that help manipulate the command line, including keystroke editing and handling command line wraps.
Explains the features of CMS for managing switch clusters and individual switches from web browsers, including views and interactive modes.
Explains the two levels of CMS access: read-write and read-only, and how privilege levels affect feature availability.
Covers requirements for running CMS, cross-platform considerations, and launching the CMS application.
Details the normal boot process involving the boot loader software, CPU initialization, power-on self-test, and loading of the operating system image.
Describes how to assign IP information through the switch setup program, DHCP server, or CLI, including host name and enable secret password.
Explains how DHCP provides configuration information to hosts and internetworking devices, including address allocation and parameter delivery.
Describes the IE2100 Series Configuration Registrar as a network management device that automates device deployment and management.
Details the procedures for connecting and automatically configuring switches using embedded CNS agents, including initial and partial configurations.
Defines a switch cluster as a group of connected Catalyst switches managed as a single entity, highlighting benefits like centralized management and IP address conservation.
Outlines guidelines, requirements, and caveats for managing switches through a cluster, including automatic discovery and compatibility issues.
Details managing switch time and date using automatic configuration (NTP) or manual methods, including understanding the system clock.
Describes how to configure the system name and prompt, including default settings and rules for host names.
Details how the MAC address table is used for traffic forwarding, including dynamic and static address entries and their association with ports.
Describes methods to prevent unauthorized users from reconfiguring the switch or viewing configuration information, such as passwords and privilege levels.
Explains how to use passwords and privilege levels to control terminal access and command entry for network devices.
Details how to enable and configure TACACS+ for authentication, authorization, and accounting (AAA) services.
Explains how to enable and configure RADIUS for authentication and authorization processes, facilitated through AAA commands.
Defines the IEEE 802.1X standard as a client-server access control and authentication protocol that restricts unauthorized clients from LAN access.
Explains the specific roles of devices in 802.1X port-based authentication: Client, Authentication Server, and Switch.
Provides guidelines and procedures for configuring 802.1X authentication, including default settings, guidelines, and enabling the feature.
Describes different interface types supported by the switch, including physical ports, SVIs, and EtherChannel port groups.
Defines a VLAN as a logically segmented network, explaining packet forwarding within and between VLANs and the creation of VLANs.
Explains switch ports as Layer 2 interfaces that can be access ports, trunk ports, or tunnel ports, and their association with Layer 2 protocols.
Details the default interface configuration and optional features that can be configured on most physical interfaces.
Explains that SmartPort macros provide a convenient way to save and share common configurations for enabling features and settings based on switch location.
Details the steps to create a macro definition, apply it to an interface, add a description, and verify the configuration.
Defines a VLAN as a logically segmented network, explaining packet forwarding within and between VLANs and the creation of VLANs.
Describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) using config-vlan mode or VLAN database mode.
Covers trunking overview, encapsulation types (ISL, 802.1Q), default Layer 2 Ethernet interface VLAN configuration, and interaction with other features.
Defines VTP as a Layer 2 messaging protocol for maintaining VLAN configuration consistency, minimizing misconfigurations, and propagating changes across the network.
Covers default VTP configuration, options, guidelines, configuring VTP server, client, disabling VTP, enabling version 2, and adding a VTP client switch.
Explains how the voice VLAN feature enables access ports to carry IP voice traffic from an IP phone, supporting QoS and prioritizing voice traffic.
Provides procedures for configuring voice VLAN on access ports, including default configuration, guidelines, and configuring ports for Cisco IP Phones.
Describes VPNs and how 802.1Q tunneling segregates customer traffic within an SP network using a VLAN-in-VLAN hierarchy.
Details the default configuration, guidelines, features, and procedures for configuring an 802.1Q tunneling port.
Explains how Layer 2 protocol tunneling helps scale topologies, supports STP, CDP, and VTP, and can enhance 802.1Q tunneling.
Provides procedures for configuring Layer 2 protocol tunneling on access ports or tunnel ports, including support for CDP, STP, and VTP.
Describes basic spanning-tree features, including STP overview, topology, BPDUs, interface states, root switch/port selection, and redundancy.
Explains the supported spanning-tree modes (PVST+, Rapid PVST+, MSTP) and protocols, and their interoperability.
Covers default configuration, guidelines, changing the mode, disabling STP, configuring root switches, port priority, path cost, and timers.
Explains MSTP, which uses RSTP for rapid convergence, enabling VLANs to be grouped into spanning-tree instances for load balancing and fault tolerance.
Details how RSTP provides rapid convergence by assigning port roles and determining the active topology, improving on 802.1D STP.
Covers default MSTP configuration, guidelines, specifying MST region configuration, enabling MSTP, root switch configuration, port priority, path cost, and timers.
Describes optional spanning-tree features like Port Fast, BPDU Guard, BPDU Filtering, UplinkFast, BackboneFast, EtherChannel Guard, Root Guard, and Loop Guard.
Explains how Port Fast immediately brings an interface to the forwarding state from blocking, bypassing listening and learning states, for end stations.
Details how BPDU guard can be enabled globally or per interface to shut down ports that receive BPDUs, preventing invalid configurations.
Explains how BPDU filtering can be enabled globally or per interface to prevent ports in a Port Fast-operational state from sending or receiving BPDUs.
Explains DHCP's role in dynamically assigning IP addresses, reducing administration overhead, and conserving IP address space.
Describes DHCP snooping as a security feature that filters untrusted DHCP messages and builds a binding table.
Covers default configuration, guidelines, upgrading from previous releases, enabling DHCP snooping and Option 82.
Explains how to display DHCP snooping binding table and configuration information for all interfaces using privileged EXEC commands.
Explains how Layer 2 switches use IGMP snooping to constrain multicast traffic flooding by dynamically configuring interfaces and tracking group memberships.
Details how to configure IGMP snooping, including default settings, enabling/disabling, snooping method, multicast router ports, and static joins.
Describes MVR for applications using multicast traffic across networks, allowing subscribers in separate VLANs to share a single multicast VLAN.
Covers configuring MVR global parameters, interfaces, default configuration, guidelines, and examples.
Explains how to control multicast group membership by filtering joins and configuring throttling actions based on IGMP profiles.
Describes how storm control prevents switchport disruption from broadcast, multicast, or unicast storms by monitoring traffic and suppressing it when thresholds are reached.
Details how protected ports prevent traffic forwarding between ports on the same switch to enhance security and isolate traffic.
Describes how to restrict input to an interface by limiting and identifying MAC addresses of allowed stations, covering static, dynamic, and sticky MAC addresses.
Defines CDP as a device discovery protocol for learning about neighbors, device types, and SNMP agent addresses.
Details how to configure CDP characteristics, including timer, holdtime, and advertisement type, and how to disable/enable CDP globally and per interface.
Explains UDLD as a Layer 2 protocol for monitoring physical cable configuration and detecting unidirectional links on fiber-optic or twisted-pair Ethernet.
Covers default UDLD configuration, guidelines, enabling UDLD globally and on an interface, and resetting interfaces shut down by UDLD.
Explains how to analyze network traffic using SPAN to send copies of traffic to ports or VLANs for monitoring, and how RSPAN extends this for remote monitoring.
Defines concepts like SPAN session, destination port, source port, traffic types, and RSPAN VLANs.
Provides guidelines and procedures for creating SPAN sessions, specifying source and destination ports, and enabling ingress traffic.
Details how to configure RSPAN sessions, including creating sessions, destination sessions, and specifying VLANs to monitor or filter.
Defines RMON as an IETF standard for network monitoring, using network agents and console systems to exchange data for fault diagnosis and performance tuning.
Describes how to configure RMON alarms and events using CLI or SNMP-compatible network management stations.
Details how to collect group history statistics and group Ethernet statistics on an interface using RMON commands.
Explains how switches send system messages and debug output to a logging process for distribution to various destinations like consoles or syslog servers.
Describes the format of system log messages, including sequence number, timestamp, facility, severity, and description.
Covers default configuration, enabling/disabling logging, setting message display destinations, synchronizing logs, and configuring UNIX syslog servers.
Defines SNMP as an application-layer protocol for communication between managers and agents, using MIB variables for device parameters and network data.
Details how to configure SNMP, including default settings, guidelines, disabling the agent, community strings, groups, users, and notifications.
Explains ACLs as packet filters to limit network traffic and restrict network use by applying sequential permit or deny conditions.
Describes how to configure IP ACLs on Layer 2/3 switch or VLAN interfaces, including hardware/software handling and unsupported features.
Details how to filter non-IP traffic on VLANs and physical Layer 2 interfaces using MAC addresses and named MAC extended ACLs.
Explains how VLAN maps control filtering within a VLAN, using ACLs for specific traffic direction and applying maps to VLANs.
Covers combining router ACLs and VLAN maps for access control on bridged and routed traffic, with guidelines for merging them.
Explains QoS's role in prioritizing traffic, managing congestion, and improving network performance by classifying, policing, and marking packets.
Describes the process of distinguishing traffic types by examining packet fields and using ACLs, class maps, and policy maps for classification.
Details how to create policers to specify bandwidth limits and actions for out-of-profile traffic, including passing, marking down, or dropping packets.
Covers default standard QoS configuration, guidelines, enabling QoS globally, configuring classification, policing, marking, and egress queues.
Defines EtherChannel as bundling individual links into a single logical link for fault tolerance and high-bandwidth connections, with automatic recovery from link failures.
Provides procedures for configuring EtherChannel on Layer 2 and Layer 3 interfaces, including default configuration, guidelines, and Layer 2/3 configurations.
Explains how to display EtherChannel, PAgP, and LACP status information using privileged EXEC commands.
Explains IP routing basics, including VLAN association with networks, inter-VLAN routing, and routing between VLANs using SVIs or routed ports.
Outlines the general procedures for configuring routing, including enabling IP routing, configuring IP addressing, and enabling routing protocols.
Describes how to assign IP addresses to Layer 3 interfaces, including default addressing, static assignment, and use of subnet zero.
Details the process to enable IP routing on the switch, including configuring the router for RIP, IGRP, OSPF, EIGRP, or BGP.
Defines HSRP as a method for providing high network availability through first-hop redundancy for IP hosts, using virtual MAC and IP addresses.
Covers default HSRP configuration, guidelines, enabling HSRP, configuring group attributes, and groups and clustering.
Explains WCCP's role in localizing web-traffic patterns by redirecting content requests to cache engines, supporting WCCPv2 and clustering.
Details default WCCP configuration, guidelines, and enabling the web cache service, setting passwords, and redirecting traffic.
Outlines Cisco's implementation of IP multicast routing, supporting IGMP, PIM, and DVMRP protocols, and explains the roles of different devices.
Covers default multicast routing configuration, guidelines, basic configuration, advanced PIM features, optional IGMP features, and optional multicast routing features.
Describes advanced PIM features such as shared and source trees, delaying SPT use, and modifying router-query message intervals.
Details optional IGMP features, including changing IGMP version, query timeout, maximum query response time, and configuring multicast groups.
Covers features like CGMP server support, SDR listener support, TTL threshold, and IP multicast boundary configuration.
Explains MSDP's role in connecting PIM-SM domains to discover multicast sources, relying on BGP or MBGP for interdomain operation.
Provides procedures for configuring MSDP, including default configuration, default MSDP peer, caching SA state, requesting source information, and controlling source information.
Explains fallback bridging for forwarding non-IP packets between VLANs or routed ports, connecting multiple VLANs into one bridge domain.
Covers default configuration, guidelines, creating bridge groups, preventing dynamic station forwarding, configuring bridge table aging, and filtering frames.
Details how to adjust spanning-tree parameters like switch priority, interface priority, path cost, BPDU intervals, and disabling spanning tree on an interface.
Describes procedures for identifying and resolving Catalyst 3550 software problems, including corrupted software, lost passwords, and connectivity issues.
Covers methods for troubleshooting connectivity problems, including using Ping, IP Traceroute, and Layer 2 Traceroute.
Explains how to use debug commands to diagnose and resolve internetworking problems, including enabling debugging on specific features and redirecting output.
Lists the Catalyst 3550 supported management information base (MIB) objects for this release.
Provides procedures for obtaining MIB files by using FTP to access the server ftp.cisco.com.
Describes how to manage software image and configuration files using commands like dir, cd, and mkdir.
Details how to create, load, and maintain configuration files, including guidelines, types, locations, and copying via TFTP, FTP, or RCP.
Explains how to archive, download, and upload software images, including using TFTP, FTP, or RCP for these operations.