Index
double-tagged packets
IEEE 802.1Q tunneling
Layer 2 protocol tunneling
downloading
configuration files
preparing
B-11, B-13, B-17
reasons for
B-9
using FTP
B-14
using RCP
B-17
using TFTP
B-12
image files
deleting old image
preparing
B-26, B-29, B-33
reasons for
B-24
using FTP
B-30
using HTTP
B-23
using RCP
B-34
using TFTP
B-26
using the device manager or Network
Assistant
B-23
drop threshold for Layer 2 protocol packets
DSCP
1-8, 32-2
DSCP input queue threshold map for QoS
DSCP output queue threshold map for QoS
DSCP-to-CoS map for QoS
DSCP-to-DSCP-mutation map for QoS
DSCP transparency
32-40
DTP
1-6, 11-17
Dual IPv4-and-IPv6 SDM Templates
dual IPv4 and IPv6 templates
dual protocol stacks
IPv4 and IPv6
35-12
SDM templates supporting
dual-purpose uplink ports
dual-purpose uplinks
defined
9-6
setting the type
9-13
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
IN-10
15-2
15-10
B-27
15-11
32-16
32-19
32-63
32-64
35-12
6-2, 35-1, 35-12
35-12
9-6
dynamic access ports
characteristics
11-3
configuring
11-30
defined
9-3
dynamic addresses
See addresses
dynamic ARP inspection
ARP cache poisoning
ARP requests, described
ARP spoofing attack
clearing
log buffer
21-15
statistics
21-15
configuration guidelines
configuring
ACLs for non-DHCP environments
in DHCP environments
log buffer
21-13
rate limit for incoming ARP packets
default configuration
denial-of-service attacks, preventing
described
21-1
DHCP snooping binding database
displaying
ARP ACLs
21-14
configuration and operating state
log buffer
21-15
statistics
21-15
trust state and rate limit
error-disabled state for exceeding rate limit
function of
21-2
interface trust states
log buffer
clearing
21-15
configuring
21-13
displaying
21-15
logging of dropped packets, described
man-in-the middle attack, described
network security issues and interface trust states
21-1
21-1
21-1
21-6
21-8
21-7
21-4, 21-10
21-5
21-10
21-2
21-14
21-14
21-4
21-3
21-4
21-2
OL-8915-03
21-3