Manualios.com

Cisco Catalyst 6500-E Series Manual 

Cisco Catalyst 6500-E Series Manual Online:

4.45, 2365 votes
Cisco Catalyst 6500-E Series User Manual
Cisco Catalyst 6500-E Series User Guide
Cisco Catalyst 6500-E Series Online Manual

Text of Cisco Catalyst 6500-E Series User Guide:

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 28 Where MEC delivers the biggest effect is in response to a link failure. Flows in an MEC are assigned according to a hashing mechanism determined by the hardware of the device sending the flow into the MEC. If a link in the MEC fails, the convergence time is in the order of milliseconds. Even the most advanced Spanning Tree Protocol, Rapid Spanning Tree, takes a few seconds (

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 28 Engine 2T will take over via a subsecond SSO failover. None of the modules in the chassis will go offline, and the available bandwidth for the VSS will be affected only during the subsecond SSO failover. In the case in which all DFC4s are used in a chassis and traffic is being locally switched on the module, there might be no traffic effect at all. Conclusion The trends of BYOD, video, and collaboration are forcing IT organ

  • © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 28 Network Device Admission Control (NDAC) One of the challenges faced by network administrators in any environment is guaranteeing that the physical infrastructure is secure. The Cisco Catalyst 6500-E with Supervisor Engine 2T supports the NDAC capabilit

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 28 With Cisco IOS Software Release 15.0(1)SY1 and newer software, the Cisco Catalyst 6500-E with Supervisor Engine 2T supports the EVN feature. EVN simplifies deployment and management of MPLS VPNs and VRF-Lite to allow network administrators to more easily and quickly adopt these technologies, which can sometimes seem daunting to implement. The primary piece of EVN is the virtual network trunk (VNET trunk) capability, which vastly

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 28 Figure 18. CoPP with the Supervisor Engine 2T In this example, 410,000 bits per second are being sent toward the CPU. However, the CoPP policy is configured to allow only 10,000 bps of this type of traffic to reach the CPU. This rate is enforced across all forwarding engines (PFC4s/DFC4s) in the system, thereby making sure that the maximum amount of traffic that will reach the CPU is 10,000 bps. CoPP can also be configured to enforce limitations based on the number of packet

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 28 Figure 10. SGTs at the Access Layer Figure 10 shows how the Cisco ISE can communicate with the access layer switch to apply SGTs based on user and device type. After the SGTs are assigned by the access layer switch, the Cisco Catalyst 6500-E with Supervisor Engine 2T can enforce the access policies that the network administrator configures in the Cisco ISE. If the access layer switch is unable to apply the SGTs, then the Cisco Catalyst 6500-E with Supervisor Engine 2T has the ability to apply SGTs in the backbone based on

  • © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 28 Figure 19. Use Cases for Application Visibility and Control Figure 19 shows many of the reasons why application visibility and control are so crucial to maintaining the unified access campus architecture. Whether it is for capacity planning, security, corporate com

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 28 Figure 14. MACsec Encryption in the Campus This example of video surveillance traffic is one of the many use cases where MACsec encryption plays a vital role in the backbone of the unified access campus architecture. If this were a medical organization, financial institution, government agency, or any other organization whose data is highly confidential, then encrypting the traffic traversing the publ

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 28 Overview The Cisco ® Catalyst ® 6500-E Series Switch has been a strategic platform for more than a decade, traditionally providing services in the access, distribution, and core areas of campus, data center, and WAN networks for companies in every possible vertical. As market trends have changed to meet evolving customer demands, the Cisco Catalyst 6500-E Series Switch has adapted to support these new trends. The influx of mobile devices, both corporately and personally owned, into the corporate campus network environment has forced IT departme

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 28 utilization information for incoming and outgoing interfaces, CPUs, memory, and any changes to IP routes or the Cisco Mediatrace monitoring state. Mediatrace is enabled on each network node from which flow information is collected. The Mediatrace Initiator is enabled on the network node that will be used to control the Mediatrace sessions or polls. The Mediatrace Responder is enabled on each of the network nodes from which information will be collected. Figure 24 shows an ex

  • © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 28 Figure 2. Campus Wireless Deployment Scenarios In the hybrid deployment model, an organization will have a mix of Cisco Catalyst 3850 Series (shown as the two switches on the left) in addition to Cisco Catalyst 4500-E (shown) or 3750-X Series i

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 28 Figure 21. The Flexible NetFlow Model As Figure 21 shows, the Flexible NetFlow model is composed of three main components: flow exporters, flow records, and flow monitors. The flow exporter is simply the destination to which the NetFlow V9 encapsulated records will be sent. Notice that multiple flow exporters can be defined for the system, that multiple flow exporters can be used with a single flow monitor, and that flow expor

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 28 Figure 22. Flexible NetFlow Operation After the first packet, the NetFlow cache has one entry that is built based upon the primary fields (source IP, destination IP, source port, destination port, Layer 3 protocol, and TOS byte) in the flow record definition. When the second packet enters the system, the forwarding engine sees that it is identical to the first packet, so it simply increments the packet count to 2 fo

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 28 The Cisco Catalyst 6500-E with Supervisor Engine 2T is capable of supporting up to 4 terabits per second of data forwarding in a virtual switching system (VSS) configuration while maintaining a level of availability that can deliver 99.999 percent uptime to make sure of operational continuity. The Supervisor Engine 2T supports advanced features that allow an organization to build a highly scalable, secure, converged wired and wirele

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 28 Cisco Catalyst 6500-E Series Switch as the Backbone of a Unified Access Campus Architecture Guide Guide

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 28 In Figure 16, every subinterface on every switch carrying the VRF-Lite VPNs must be manually configured, so as the number of VRFs grows, the interface configuration becomes harder to work with and more prone to errors. An infrastructure with 6 nodes and 20 VRFs would require 6 main interface and 120 subinterface configurations. In Figure 17 the benefits of the VNET trunk can be plainly seen in the massive reduction and simplicity of the interface configuration. When the

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 28 Figure 3. Virtual Firewall Contexts to Support a BYOD Infrastructure As Figure 3 demonstrates, the ASA-SM working in a virtualized mode works in conjunction with other network elements to provide isolated domains for trusted and untrusted devices and users. If you have ever been to a Cisco office and requested access to the wireless network, this is how it is done. The wireless infrastructure presents different Service Set Identifiers (SSIDs) based upon user type. After the

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 28 Figure 20. Mini-Protocol Analyzer Configuration Options Flexible NetFlow (FnF) Flexible NetFlow is the next generation in flow analysis technology. It optimizes the network infrastructure, reducing operation costs and improving capacity planning and security incident detection with increased flexibility and scalability. It gives the network administrator the ability to characterize IP traffic and identify its source,

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 28 After the SGT is assigned either at the access layer or in the backbone, the tagged traffic is passed through the network to an enforcement point. Figure 11 shows an example of an SGACL where traffic with SGT 1110 has access to resources in group 3200 on the allowed TCP ports, whereas any other IP traffic is denied. Because the SGACL is based on group memberships, changes in the underlying IP infrastructure do not requires changes in the SGACL. For e

  • © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 28 Figure 5 shows that more than half of the average network administrator’s time is spent with network configuration, troubleshooting, monitoring, and installation. The tools offered as part of smart operations are meant to reduce that time so that network adminis

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 28 capabilities applicable to that area of the network and will continue to add new medianet functions as they become available. This section will focus on two of the major medianet functions that are critical to the assessment of the network infrastructure’s ability to handle rich media services: Performance Monitor and Mediatrace. Performance Monitor Cisco Performance Monitor provides the ability to monitor the flow of packets in the network and to become

  • Cisco Catalyst 6500-E Series, © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 28 Virtual Switching System (VSS) The VSS combines a pair of physical switches into a single logical network element. VSS was developed to address the ever-increasing adoption of delay-sensitive applications, for example, voice, 2video, and collaboration, that are appearing in enterprise networks. Traditional network topologies relied protocols such as Spanning Tree Protocol and HSRP to manage loops and first-hop gateway implementa

Related Products and Documents (Switch):

Comparable Devices:

# Manufacturer Model Document Type File Updated Pages Size
1 Armytek Optoelectronics Viking PRO Manual  armytek-optoelectronics/viking-pro-P3R.pdf 09 Mar 2023 2
2 IKEA BASISK PENDENT LAMP 8" Instructions ikea/basisk-pendent-lamp-8-98S.pdf 11 Sep 2022 4
3 Valcom V9992 Datasheet valcom/v9992-K3Y.pdf 09 Oct 2023 1 0.15 Mb
4 Kohler K-3394 Owner's manual kohler/k-3394-ZZZ.pdf 30 Jan 2024 12
5 VIA Technologies EPIA ME6000 - VIA Motherboard - Mini ITX Operation & user’s manual via-technologies/epia-me6000-via-motherboard-mini-itx-175.pdf 06 Sep 2022 79 1.76 Mb
6 Torgun TB-20 Instruction manual torgun/tb-20-YKG.pdf 04 May 2023 12

Similar Resources:

  • Cisco

    CallManager Release 3.0(10

    (104 pages)
    Corporate Headquarters:Copyright © 2001. Cisco Systems, Inc. All rights reserved.Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USARelease Notes for Cisco CallManagerRelease 3.0(10)Original CCO appearance: June 20, 2001Revised: July 2, 2001These release notes describe the new features and caveats for Cisco CallManagerRelease 3.0(10).For …
  • Techly

    A/V Series

    (12 pages)
    P/N: IADAP MDP-HDMIF128057685309791EN User's ManualIT Manuale d’istruzioneWWW.TECHLY.COMMINI DISPLAYPORT V.1.2TO HDMI ADAPTERTechnical featuresa/v seriesINOUT …
  • Icos

    FA14B02-M12

    (2 pages)
    20m 40m{L2A1A2Reed SwitchK8*2K2 - 2WA1+A2-Reed SwitchKD*++ D = 20 ~ 40m22R 5WRK8*220R 5WRThe sensors work in all voltage and current ranges displayed in the table bellow:Operating Voltage Max. Switching Power Max. Switching Current Peak Current110Vac 20VA 0.2A 0.5A @20ms220Vac 20VA 0.1A 0.5A @20ms5Vdc 2.5W 0.5A 1A @20ms12Vdc 5W 0.5A 1A @20ms24Vdc 10W 0.5A 1A …
  • ORiNG

    IPS-1080-24V

    (2 pages)
    P1 P2 Faul tIPS-1080-24V3410/1 00TX127856Quick Installation GuideVersion 1.5Quick Installation GuideIntroductionPRINTED ON RECYCLED PAPERPreparationBefore you begin installing the switch, make sure you have all of the packagecontents available and a PC with Microsoft Internet Explorer 6.0 or later, forusing web-based system management tools.Elevated Opera …
  • Logitech

    Harmony One

    (39 pages)
    Logitech Harmony afstandsbediening toepassen op Nikobus nv Niko sa Industriepark West 40, BE-9100 Sint-Niklaas, Belgium — tel. +32 3 778 90 00 — fax +32 3 777 71 20 — e-mail: [email protected] — www.niko.be PHlogitechR10113Een volledig overzicht van het gamma Logitech Harmony afstandsbedieningen en hun onderlinge verschillen vindt u op www.logitec …
  • HP

    12500 Series

    (154 pages)
    HP 12500 Routing Switch Series Layer 2 - LAN Switching Command Reference Part number: 5998-3424 Document version: 6W710-20121130 Software version: 12500-CMW710-R7128 …

Comments, Questions and Opinions: