hit counter script

Cisco WS-C3020 Software Configuration Manual page 944

Catalyst blade switch for hp
Table of Contents

Advertisement

Index
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
and SDM template
14-4
and SVIs
14-5
benefits of
14-1
community ports
14-2
community VLANs
configuration guidelines
configuration tasks
configuring
14-9
default configuration
end station access to
IP addressing
14-3
isolated port
14-2
isolated VLANs
14-2, 14-3
mapping
14-13
monitoring
14-14
ports
community
14-2
configuration guidelines
configuring host ports
configuring promiscuous ports
described
11-4
isolated
14-2
promiscuous
14-2
primary VLANs
14-1, 14-3
promiscuous ports
14-2
secondary VLANs
14-2
subdomains
14-1
traffic in
14-5
privileged EXEC mode
2-2
privilege levels
changing the default for lines
exiting
7-9
logging into
7-9
overview
7-2, 7-7
setting a command with
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
IN-28
14-4
14-2, 14-3
14-6, 14-8
14-6
14-6
14-3
14-8
14-11
14-12
7-9
7-8
promiscuous ports
configuring
14-12
defined
14-2
protected ports
1-7, 23-6
Protocol-Independent Multicast Protocol
See PIM
proxy ARP
configuring
34-9
definition
34-7
with IP routing disabled
pruning, VTP
disabling
in VTP domain
on a port
11-23
enabling
in VTP domain
on a port
11-23
examples
12-5
overview
12-4
pruning-eligible list
changing
11-23
for VTP pruning
12-4
VLANs
12-14
PVST+
described
16-9
IEEE 802.1Q trunking interoperability
instances supported
Q
QoS
and MQC commands
auto-QoS
categorizing traffic
configuration and defaults display
configuration guidelines
described
32-20
disabling
32-27
displaying generated commands
34-10
12-14
12-14
16-10
16-9
32-1
32-21
32-30
32-25
32-27
OL-8915-03

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3020

Table of Contents