hit counter script

Design Concepts For Using The Switch - Cisco 3020 - Catalyst Blade Switch Configuration Manual

Cisco catalyst blade switch 3020 for hp software configuration guide, rel. 12.2(25)sef1
Hide thumbs Also See for 3020 - Cisco Catalyst Blade Switch:
Table of Contents

Advertisement

Design Concepts for Using the Switch

Design Concepts for Using the Switch
As your network users compete for network bandwidth, it takes longer to send and receive data. When
you configure your network, consider the bandwidth required by your network users and the relative
priority of the network applications that they use.
Table 1-1
network to increase the bandwidth available to your network users.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
1-10
The IGMP snooping querier feature is disabled. For more information, see
IGMP Snooping and MVR."
MVR is disabled. For more information, see
Port-based traffic
Broadcast, multicast, and unicast storm control is disabled. For more information, see
Chapter 19, "Configuring Port-Based Traffic Control."
No protected ports are defined. For more information, see
Traffic Control."
Unicast and multicast traffic flooding is not blocked. For more information, see
"Configuring Port-Based Traffic Control."
No secure ports are configured. For more information, see
Traffic Control."
CDP is enabled. For more information, see
UDLD is disabled. For more information, see
SPAN and RSPAN are disabled. For more information, see
RSPAN."
RMON is disabled. For more information, see
Syslog messages are enabled and appear on the console. For more information, see
"Configuring System Message Logging."
SNMP is enabled (Version 1). For more information, see
No ACLs are configured. For more information, see
with ACLs."
QoS is disabled. For more information, see
No EtherChannels are configured. For more information, see
EtherChannels and Layer 2 Trunk Failover."
describes what can cause network performance to degrade and how you can configure your
Chapter 18, "Configuring IGMP Snooping and MVR."
Chapter 19, "Configuring Port-Based
Chapter 19, "Configuring Port-Based
Chapter 20, "Configuring CDP."
Chapter 21, "Configuring UDLD."
Chapter 22, "Configuring SPAN and
Chapter 23, "Configuring RMON."
Chapter 25, "Configuring SNMP."
Chapter 26, "Configuring Network Security
Chapter 27, "Configuring QoS."
Chapter 28, "Configuring
Chapter 1
Overview
Chapter 18, "Configuring
Chapter 19,
Chapter 24,
OL-8915-01

Advertisement

Table of Contents
loading

Table of Contents