Users Guide
Enabling Layer 2 Protocol Tunneling.......................................................................................................... 866
Specifying a Destination MAC Address for BPDUs....................................................................................867
Setting Rate-Limit BPDUs...............................................................................................................................867
Debugging Layer 2 Protocol Tunneling......................................................................................................868
Provider Backbone Bridging................................................................................................................................868
51 sFlow................................................................................................................................................................... 869
Overview..................................................................................................................................................................869
Implementation Information...............................................................................................................................869
Important Points to Remember.................................................................................................................... 870
Enabling and Disabling sFlow..............................................................................................................................870
Enabling and Disabling sFlow on an Interface.................................................................................................870
sFlow Show Commands.......................................................................................................................................870
Displaying Show sFlow Global.......................................................................................................................871
Displaying Show sFlow on an Interface....................................................................................................... 871
Displaying Show sFlow on a Line Card........................................................................................................872
Configuring Specify Collectors........................................................................................................................... 872
Changing the Polling Intervals............................................................................................................................ 872
Back-Off Mechanism.............................................................................................................................................873
sFlow on LAG ports................................................................................................................................................873
Enabling Extended sFlow......................................................................................................................................873
Important Points to Remember.................................................................................................................... 874
52 Simple Network Management Protocol (SNMP).........................................................................................875
Protocol Overview................................................................................................................................................. 875
Implementation Information............................................................................................................................... 876
Configuration Task List for SNMP.......................................................................................................................876
Related Configuration Tasks..........................................................................................................................876
Important Points to Remember.......................................................................................................................... 876
Set up SNMP............................................................................................................................................................876
Creating a Community....................................................................................................................................877
Setting Up User-Based Security (SNMPv3)..................................................................................................877
Reading Managed Object Values........................................................................................................................878
Writing Managed Object Values..........................................................................................................................879
Configuring Contact and Location Information using SNMP...................................................................... 879
Configuring the CPU Utilization for SNMP Traps........................................................................................... 880
Configuring Threshold Memory Utilization for SNMP Traps........................................................................ 881
Subscribing to Managed Object Value Updates using SNMP.......................................................................882
Enabling a Subset of SNMP Traps.......................................................................................................................883
Enabling an SNMP Agent to Notify Syslog Server Failure..............................................................................886
Copy Configuration Files Using SNMP.............................................................................................................. 887
Copying a Configuration File.........................................................................................................................888
Copying Configuration Files via SNMP........................................................................................................889
Copying the Startup-Config Files to the Running-Config......................................................................889
Copying the Startup-Config Files to the Server via FTP.......................................................................... 890
Copying the Startup-Config Files to the Server via TFTP........................................................................890
Copy a Binary File to the Startup-Configuration...................................................................................... 890
Contents
27