Users Guide
Debugging Layer 2 Protocol Tunneling......................................................................................................................779
Provider Backbone Bridging........................................................................................................................................... 780
54 sFlow......................................................................................................................... 781
Overview.........................................................................................................................................................................781
Implementation Information............................................................................................................................................782
Important Points to Remember................................................................................................................................ 782
Enabling and Disabling sFlow..........................................................................................................................................782
Enabling and Disabling sFlow on an Interface................................................................................................................. 782
Enabling sFlow Max-Header Size Extended....................................................................................................................783
sFlow Show Commands.................................................................................................................................................784
Displaying Show sFlow Global...................................................................................................................................784
Displaying Show sFlow on an Interface.....................................................................................................................784
Displaying Show sFlow on a Stack-unit.................................................................................................................... 785
Conguring Specify Collectors....................................................................................................................................... 785
Changing the Polling Intervals........................................................................................................................................ 785
Back-O Mechanism..................................................................................................................................................... 786
sFlow on LAG ports........................................................................................................................................................786
55 Simple Network Management Protocol (SNMP)....................................................... 787
Protocol Overview..........................................................................................................................................................787
Implementation Information............................................................................................................................................ 787
Conguration Task List for SNMP...................................................................................................................................787
Related Conguration Tasks......................................................................................................................................787
Important Points to Remember................................................................................................................................ 788
Set up SNMP.................................................................................................................................................................788
Creating a Community..............................................................................................................................................788
Setting Up User-Based Security (SNMPv3).............................................................................................................788
Reading Managed Object Values....................................................................................................................................790
Writing Managed Object Values..................................................................................................................................... 790
Conguring Contact and Location Information using SNMP........................................................................................... 791
Subscribing to Managed Object Value Updates using SNMP..........................................................................................791
Enabling a Subset of SNMP Traps..................................................................................................................................792
Enabling an SNMP Agent to Notify Syslog Server Failure.............................................................................................. 794
Copy Conguration Files Using SNMP........................................................................................................................... 795
Copying a Conguration File.....................................................................................................................................796
Copying Conguration Files via SNMP..................................................................................................................... 797
Copying the Startup-Cong Files to the Running-Cong......................................................................................... 798
Copying the Startup-Cong Files to the Server via FTP.......................................................................................... 798
Copying the Startup-Cong Files to the Server via TFTP........................................................................................ 798
Copy a Binary File to the Startup-Conguration.......................................................................................................799
Additional MIB Objects to View Copy Statistics....................................................................................................... 799
Obtaining a Value for MIB Objects................................................................................................................................. 800
MIB Support to Display the Available Memory Size on Flash..........................................................................................800
Viewing the Available Flash Memory Size................................................................................................................. 801
MIB Support to Display the Software Core Files Generated by the System.................................................................... 801
27










