Cisco 3032 Software Configuration Manual page 1334

Hide thumbs Also See for 3032:
Table of Contents

Advertisement

Index
priority
HSRP
40-8
overriding CoS
15-6
trusting CoS
15-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
and SDM template
16-4
and SVIs
16-5
and switch stacks
16-5
benefits of
16-1
community ports
16-2
community VLANs
configuration guidelines
configuration tasks
16-6
configuring
16-10
default configuration
end station access to
IP addressing
16-3
isolated port
16-2
isolated VLANs
16-2, 16-3
mapping
16-14
monitoring
16-15
ports
community
16-2
configuration guidelines
configuring host ports
configuring promiscuous ports
described
13-4
isolated
16-2
promiscuous
16-2
primary VLANs
16-1, 16-3
promiscuous ports
16-2
secondary VLANs
16-2
subdomains
16-1
traffic in
16-5
privileged EXEC mode
2-2
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
IN-36
16-4
16-2, 16-3
16-7, 16-8
16-6
16-3
16-8
16-11
16-13
privilege levels
changing the default for lines
exiting
7-9
logging into
7-9
overview
7-2, 7-7
setting a command with
promiscuous ports
configuring
16-13
defined
16-2
protected ports
1-10, 26-6
protocol-dependent modules, EIGRP
Protocol-Independent Multicast Protocol
See PIM
provider edge devices
38-78
provisioning new members for a switch stack
proxy ARP
configuring
38-12
definition
38-10
with IP routing disabled
proxy reports
21-3
pruning, VTP
disabling
in VTP domain
on a port
13-22
enabling
in VTP domain
on a port
13-22
examples
14-7
overview
14-6
pruning-eligible list
changing
13-22
for VTP pruning
14-6
VLANs
14-16
PVST+
described
18-10
IEEE 802.1Q trunking interoperability
instances supported
7-9
7-8
38-38
5-9
38-12
14-16
14-16
18-11
18-10
OL-12247-04

Advertisement

Table of Contents
loading

This manual is also suitable for:

3130

Table of Contents