Index
IN-11
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
DHCP snooping (continued)
untrusted interface
22-2
untrusted messages 22-2
DHCP snooping binding database
adding bindings
22-15
binding entries, displaying 22-16
binding file
format
22-7
location 22-6
bindings 22-6
clearing agent statistics 22-15
configuration guidelines 22-10
configuring 22-15
default configuration 22-8, 22-9
deleting
binding file
22-15
bindings 22-16
database agent 22-15
described 22-6
displaying 22-16
binding entries 22-16
status and statistics 22-16
displaying status and statistics 22-16
enabling 22-15
entry 22-6
renewing database 22-15
resetting
delay value
22-15
timeout value 22-15
DHCP snooping binding table
See DHCP snooping binding database
DHCPv6
configuration guidelines
39-16
default configuration 39-16
described 39-6
enabling client function 39-19
enabling DHCPv6 server function 39-17
diagnostic schedule command 48-2
Differentiated Services architecture, QoS 36-2
Differentiated Services Code Point 36-2
Diffusing Update Algorithm (DUAL) 38-37
directed unicast requests 1-6
directories
changing
B-4
creating and removing B-5
displaying the working B-4
Distance Vector Multicast Routing Protocol
See DVMRP
distance-vector protocols
38-3
distribute-list command 38-105
DNS
and DHCP-based autoconfiguration
3-8
default configuration 6-16
displaying the configuration 6-17
in IPv6 39-4
overview 6-15
setting up 6-16
support for 1-6
DNS-based SSM mapping 44-19, 44-21
domain names
DNS
6-15
VTP 14-9
Domain Name System
See DNS
domains, ISO IGRP routing
38-67
dot1q-tunnel switchport mode 13-17
double-tagged packets
IEEE 802.1Q tunneling
17-2
Layer 2 protocol tunneling 17-10
downloadable ACL 9-18, 9-19, 9-60
downloading
configuration files
preparing
B-11, B-14, B-17
reasons for B-9
using FTP B-14
using RCP B-18
using TFTP B-12