EasyManua.ls Logo

Cisco Catalyst 9500 User Manual

Cisco Catalyst 9500
360 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
System Management Configuration Guide, Cisco IOS XE Amsterdam
17.2.x (Catalyst 9500 Switches)
First Published: 2020-03-30
Last Modified: 2020-05-08
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883

Table of Contents

Other manuals for Cisco Catalyst 9500

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 9500 and is the answer not in the manual?

Cisco Catalyst 9500 Specifications

General IconGeneral
SoftwareCisco IOS XE
Energy EfficiencyEnergy Efficient Ethernet (EEE)
WarrantyLimited Lifetime Hardware Warranty
SeriesCatalyst 9500
PortsUp to 48 ports (varies by model)
Power SupplyRedundant power supplies
Operating Temperature0°C to 40°C
WeightUp to 35 lbs (varies by model)
Memory16 GB DRAM, 16 GB Flash
ModularityModular uplinks and power supplies
SecurityCisco TrustSec, MACsec
RedundancyPower supply redundancy
ManagementCLI, SNMP, NETCONF
LatencySub-microsecond

Summary

Administering the Device

System Time and Date Management

Manages system time and date using automatic or manual configuration methods.

Network Time Protocol

Details the Network Time Protocol (NTP) for synchronizing device time across a network.

MAC Address Table

Contains address information used by the device to forward traffic between ports.

Configuring the Time and Date Manually

Provides steps to manually configure the system clock and date after a restart.

Boot Integrity Visibility

Information About Boot Integrity Visibility

Explains how platform identity and software integrity information is made visible and actionable.

Verifying Platform Identity and Software Integrity

Describes how to verify platform identity and software integrity using SUDI chain.

Performing Device Setup Configuration

Device Boot Process

Details the sequence of operations during the normal device boot process.

Software Install Overview

Provides an overview of the Software Install feature for upgrades and downgrades.

Software Boot Modes

Describes the two supported modes for booting software packages: Installed and Bundle.

DHCP-Based Autoconfiguration Overview

Explains DHCP's role in providing configuration information to devices.

Purpose of the TFTP Server

Details the function of the TFTP server in downloading configuration files.

Configuring Smart Licensing

Prerequisites for Configuring Smart Licensing

Lists requirements for configuring Smart Licensing, including a Smart Account.

Introduction to Smart Licensing

Describes Cisco Smart Licensing as a flexible and secure licensing model.

Overview of CSSM

Explains Cisco Smart Software Manager (CSSM) for managing licenses.

Registering a Device on CSSM

Provides steps to register a device on CSSM using a unique token.

Monitoring Smart Licensing Configuration

Details commands to monitor smart licensing compliance and status.

Configuring Application Visibility and Control in a Wired Network

Information About Application Visibility and Control in a Wired Network

Introduces Application Visibility and Control (AVC) for classifying applications.

Restrictions for Wired Application Visibility and Control

Outlines limitations and unsupported configurations for wired AVC.

How to Configure Application Visibility and Control

Provides steps for configuring application visibility and control on wired ports.

Enabling Application Recognition on an interface

Details how to enable application recognition using NBAR2 engine.

Creating AVC QoS Policy

Explains how to create AVC QoS policies using class maps and policy maps.

Configuring SDM Templates

Information About SDM Templates

Explains how SDM templates configure system resources for specific features.

Overview of Customizable SDM Template

Describes customizable SDM templates for optimizing system resources.

How to Configure SDM Templates

Provides steps to configure SDM templates to maximize feature usage.

Examples: Displaying SDM Templates

Shows example outputs for displaying SDM template information.

Configuring System Message Logs

System Messsage Logging

Details how switches send system messages and debug output to a logging process.

System Log Message Format

Describes the format and elements of system log messages.

How to Configure System Message Logs

Explains how to send messages to specific locations in addition to the console.

Monitoring and Maintaining System Message Logs

Provides methods for monitoring and maintaining system message logs.

Configuring Online Diagnostics

Information About Configuring Online Diagnostics

Introduces online diagnostics for testing hardware functionality on a live network.

Generic Online Diagnostics (GOLD) Tests

Details various GOLD tests for diagnosing hardware and software issues.

How to Configure Online Diagnostics

Provides procedures for configuring and starting online diagnostic tests.

Scheduling Online Diagnostics

Explains how to schedule online diagnostics to run at designated times.

Configuring Health-Monitoring Diagnostics

Details how to configure health-monitoring tests and enable syslog messages.

Managing Configuration Files

Prerequisites for Managing Configuration Files

Lists requirements for managing configuration files, including familiarity with CLI.

Restrictions for Managing Configuration Files

Highlights limitations and platform-specific availability of configuration commands.

Configuration Mode and Selecting a Configuration Source

Explains how to enter configuration mode and select command sources.

Copy Configuration Files from a Network Server to the Device

Provides procedures for copying configuration files from TFTP, RCP, or FTP servers.

Configuring the Device to Download Configuration Files

Details how to specify ordered lists of network and host configuration filenames.

Secure Copy

Prerequisites for Secure Copy

Lists requirements for Secure Copy, including SSH and RSA key pair.

Information About Secure Copy

Explains Secure Copy feature for secure file copying using SSH.

How to Configure Secure Copy

Provides steps to configure Secure Copy server-side functionality.

Enabling Secure Copy on the SSH Server

Details how to configure server-side functionality for secure file transfer.

Configuration Examples for Secure Copy

Provides examples for configuring Secure Copy using local and network authentication.

Configuration Replace and Configuration Rollback

Prerequisites for Configuration Replace and Configuration Rollback

Describes indentation rules for configuration files and memory requirements.

Restrictions for Configuration Replace and Configuration Rollback

Details limitations related to memory and specific Cisco commands.

Information About Configuration Replace and Configuration Rollback

Explains the Configuration Archive feature for managing configuration states.

Performing a Configuration Replace or Configuration Rollback Operation

Provides tasks to replace running configuration with a saved Cisco IOS configuration.

Monitoring and Troubleshooting the Feature

Details commands to monitor and troubleshoot configuration replace and rollback.

BIOS Protection

Introduction to BIOS Protection

Explains the BIOS protection feature for secure ROMMON image upgrades.

ROMMON Upgrade

Details the process of upgrading ROMMON images stored on SPI flash.

Capsule Upgrade

Describes the capsule upgrade process for the golden ROMMON.

Software Maintenance Upgrade

Restrictions for Software Maintenance Upgrade

Notes that SMU supports patching using install mode only.

SMU Overview

Defines SMU as a package for system fixes or security resolutions.

How to Manage Software Maintenance Updates

Provides information on installing, activating, and committing SMU packages.

Installing an SMU Package

Shows how to use the 'install add file activate commit' command for SMU installation.

Working with the Flash File System

Information About the Flash File System

Describes the flash file system for storing software bundles and configuration files.

Displaying Available File Systems

Shows how to display available file systems using the 'show file systems' command.

Setting the Default File System

Explains how to specify the default file system using the 'cd' command.

Copying Files

Details how to copy files between source and destination using the 'copy' command.

Performing Factory Reset

Prerequisites for Performing a Factory Reset

Ensures software images, configurations, and power are backed up and stable.

Restrictions for Performing a Factory Reset

Notes limitations on software patches and VTY sessions during factory reset.

Information About Performing a Factory Reset

Explains that factory reset erases customer data and restores original configuration.

How to Perform a Factory Reset

Provides procedures for performing a factory reset on standalone and stacked devices.

Configuring Secure Storage

Information About Secure Storage

Describes Secure Storage for encrypting critical configuration information.

Enabling Secure Storage

Provides steps to enable the Secure Storage feature on the device.

Disabling Secure Storage

Details how to disable Secure Storage, storing user data in plain text.

Verifying the Status of Encryption

Explains how to verify encryption status using 'show parser encrypt file status'.

Conditional Debug and Radioactive Tracing

Introduction to Conditional Debugging

Allows selective debugging and logging for specific features based on conditions.

Introduction to Radioactive Tracing

Provides ability to stitch execution chains for operations with increased verbosity.

Location of Tracefiles

Details where tracefile logs are generated and saved.

Configuring Conditional Debugging

Provides steps to configure conditional debugging for MAC addresses.

Consent Token

Restrictions for Consent Token

Notes that Consent Token is enabled by default and cannot be disabled.

Information About Consent Token

Describes Consent Token as a security feature for authenticating administrators.

Consent Token Authorization Process for System Shell Access

Details the process of Consent Token authorization for accessing system shell.

Troubleshooting the Software Configuration

Software Failure on a Switch

Describes issues arising from corrupted software or deleted image files.

Lost or Forgotten Password on a Device

Explains recovery procedures for lost passwords via boot process interruption.

Ping

Details how to use IP ping to test connectivity to remote hosts.

Layer 2 Traceroute

Allows the switch to identify the physical path of a packet using MAC addresses.

IP Traceroute

Identifies the path packets take through the network on a hop-by-hop basis.

Related product manuals