Design Concepts for Using the Switch
•
•
•
•
•
•
•
•
•
•
•
•
Design Concepts for Using the Switch
As your network users compete for network bandwidth, it takes longer to send and receive data. When
you configure your network, consider the bandwidth required by your network users and the relative
priority of the network applications that they use.
Table 1-1
network to increase the bandwidth available to your network users.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
1-10
The IGMP snooping querier feature is disabled. For more information, see
IGMP Snooping and MVR."
MVR is disabled. For more information, see
Port-based traffic
Broadcast, multicast, and unicast storm control is disabled. For more information, see
–
Chapter 19, "Configuring Port-Based Traffic Control."
No protected ports are defined. For more information, see
–
Traffic Control."
Unicast and multicast traffic flooding is not blocked. For more information, see
–
"Configuring Port-Based Traffic Control."
No secure ports are configured. For more information, see
–
Traffic Control."
CDP is enabled. For more information, see
UDLD is disabled. For more information, see
SPAN and RSPAN are disabled. For more information, see
RSPAN."
RMON is disabled. For more information, see
Syslog messages are enabled and appear on the console. For more information, see
"Configuring System Message Logging."
SNMP is enabled (Version 1). For more information, see
No ACLs are configured. For more information, see
with ACLs."
QoS is disabled. For more information, see
No EtherChannels are configured. For more information, see
EtherChannels and Layer 2 Trunk Failover."
describes what can cause network performance to degrade and how you can configure your
Chapter 18, "Configuring IGMP Snooping and MVR."
Chapter 19, "Configuring Port-Based
Chapter 19, "Configuring Port-Based
Chapter 20, "Configuring CDP."
Chapter 21, "Configuring UDLD."
Chapter 22, "Configuring SPAN and
Chapter 23, "Configuring RMON."
Chapter 25, "Configuring SNMP."
Chapter 26, "Configuring Network Security
Chapter 27, "Configuring QoS."
Chapter 28, "Configuring
Chapter 1
Overview
Chapter 18, "Configuring
Chapter 19,
Chapter 24,
OL-8915-01