Cisco WS-C3020 Software Configuration Manual page 935

Catalyst blade switch for hp
Table of Contents

Advertisement

IRDP
configuring
34-11
definition
34-11
support for
1-9
ISL
and trunk ports
9-3
encapsulation
1-6, 11-16
trunking with IEEE 802.1 tunneling
isolated port
14-2
isolated VLANs
14-2, 14-3
J
join messages, IGMP
22-3
K
KDC
described
7-32
See also Kerberos
Kerberos
authenticating to
boundary switch
KDC
7-34
network services
configuration examples
configuring
7-35
credentials
7-32
cryptographic software image
described
7-32
KDC
7-32
operation
7-34
realm
7-33
server
7-33
support for
1-8
switch as trusted third party
terms
7-33
OL-8915-03
15-5
7-34
7-35
7-32
7-32
7-32
Kerberos (continued)
TGT
7-34
tickets
7-32
key distribution center
See KDC
L
l2protocol-tunnel command
LACP
Layer 2 protocol tunneling
See EtherChannel
Layer 2 frames, classification with CoS
Layer 2 interfaces, default configuration
Layer 2 protocol tunneling
configuring
configuring for EtherChannels
default configuration
defined
15-8
guidelines
Layer 2 traceroute
and ARP
40-11
and CDP
40-11
broadcast traffic
described
IP addresses and subnets
MAC addresses and VLANs
multicast traffic
multiple devices on a port
unicast traffic
usage guidelines
Layer 2 trunk failover
described
Layer 3 features
Layer 3 interfaces
assigning IP addresses to
assigning IPv6 addresses to
changing from Layer 2 mode
types of
34-3
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
15-13
15-9
32-2
15-10
15-14
15-11
15-12
40-10
40-10
40-11
40-11
40-11
40-11
40-10
40-11
33-20
1-9
34-5
35-14
34-5
Index
9-12
IN-19

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3020

Table of Contents