Index
K
KDC
described
9-32
See also Kerberos
keepalive messages
17-2
Kerberos
authenticating to
boundary switch
9-35
KDC
9-35
network services
9-35
configuration examples
configuring
9-36
credentials
9-32
cryptographic software image
described
9-32
KDC
9-32
operation
9-34
realm
9-33
server
9-33
support for
1-7
switch as trusted third party
terms
9-33
TGT
9-34
tickets
9-32
key distribution center
See KDC
L
LACP
See EtherChannel
Layer 2 frames, classification with CoS
Layer 2 interfaces, default configuration
Layer 2 traceroute
and ARP
39-17
and CDP
39-16
broadcast traffic
39-16
described
39-16
Catalyst 3750 Switch Software Configuration Guide
IN-22
9-32
9-32
9-32
32-2
11-12
Layer 2 traceroute (continued)
IP addresses and subnets
MAC addresses and VLANs
multicast traffic
39-16
multiple devices on a port
unicast traffic
39-16
usage guidelines
39-16
Layer 2 trunks
13-17
Layer 3 features
1-8
Layer 3 interfaces
assigning IP addresses to
changing from Layer 2 mode
types of
34-4
Layer 3 packets, classification methods
LEDs, switch
See hardware installation guide
line configuration mode
Link Aggregation Control Protocol
See EtherChannel
link redundancy
See Flex Links
links, unidirectional
26-1
link state advertisements (LSAs)
link-state protocols
34-3
load balancing
35-6
logging messages, ACL
login authentication
with RADIUS
9-23
with TACACS+
9-14
login banners
7-18
log messages
See system message logging
Long-Reach Ethernet (LRE) technology
loop guard
described
19-11
enabling
19-18
support for
1-6
LRE profiles, considerations in switch clusters
39-17
39-16
39-17
34-6
34-6
32-2
2-2
34-29
31-10
1-14, 1-21
6-17
78-16180-02