Users Guide

Mapping C-Tag to S-Tag dot1p Values................................................................................................................ 833
Layer 2 Protocol Tunneling...........................................................................................................................................834
Implementation Information................................................................................................................................... 835
Enabling Layer 2 Protocol Tunneling.....................................................................................................................836
Specifying a Destination MAC Address for BPDUs............................................................................................ 836
Setting Rate-Limit BPDUs......................................................................................................................................836
Debugging Layer 2 Protocol Tunneling.................................................................................................................837
Provider Backbone Bridging.........................................................................................................................................837
49 sFlow.......................................................................................................................................................838
Overview.........................................................................................................................................................................838
Implementation Information......................................................................................................................................... 838
Important Points to Remember.............................................................................................................................839
Enabling Extended sFlow..............................................................................................................................................839
Enabling and Disabling sFlow on an Interface............................................................................................................840
Enabling sFlow Max-Header Size Extended.............................................................................................................. 840
sFlow Show Commands................................................................................................................................................841
Displaying Show sFlow Global.................................................................................................................................841
Displaying Show sFlow on an Interface................................................................................................................ 842
Displaying Show sFlow on a Stack-unit................................................................................................................842
Configuring Specify Collectors.................................................................................................................................... 843
Changing the Polling Intervals......................................................................................................................................843
Back-Off Mechanism....................................................................................................................................................843
sFlow on LAG ports.......................................................................................................................................................844
Enabling Extended sFlow..............................................................................................................................................844
Important Points to Remember.............................................................................................................................845
50 Simple Network Management Protocol (SNMP).....................................................................................846
Protocol Overview.........................................................................................................................................................847
Implementation Information..........................................................................................................................................847
SNMPv3 Compliance With FIPS................................................................................................................................. 847
Configuration Task List for SNMP.............................................................................................................................. 848
Related Configuration Tasks.................................................................................................................................. 848
Important Points to Remember...................................................................................................................................849
Set up SNMP.................................................................................................................................................................849
Creating a Community............................................................................................................................................ 849
Setting Up User-Based Security (SNMPv3)....................................................................................................... 849
Reading Managed Object Values................................................................................................................................. 851
Writing Managed Object Values...................................................................................................................................851
Configuring Contact and Location Information using SNMP.................................................................................. 852
Subscribing to Managed Object Value Updates using SNMP.................................................................................852
Enabling a Subset of SNMP Traps..............................................................................................................................853
Enabling an SNMP Agent to Notify Syslog Server Failure.......................................................................................855
Copy Configuration Files Using SNMP.......................................................................................................................856
Copying a Configuration File.................................................................................................................................. 858
Copying Configuration Files via SNMP.................................................................................................................858
26
Contents