Index
IN-25
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
Kerberos (continued)
KDC
7-40
operation 7-42
realm 7-41
server 7-41
support for 1-12
switch as trusted third party 7-40
terms 7-40
TGT 7-42
tickets 7-40
key distribution center
See KDC
L
l2protocol-tunnel command 17-13
LACP
Layer 2 protocol tunneling
17-9
See EtherChannel
Layer 2 frames, classification with CoS
36-2
Layer 2 interfaces, default configuration 11-17
Layer 2 protocol tunneling
configuring
17-10
configuring for EtherChannels 17-14
default configuration 17-11
defined 17-8
guidelines 17-12
Layer 2 traceroute
and ARP
47-13
and CDP 47-13
broadcast traffic 47-12
described 47-12
IP addresses and subnets 47-13
MAC addresses and VLANs 47-13
multicast traffic 47-13
multiple devices on a port 47-13
unicast traffic 47-12
usage guidelines 47-13
Layer 3 features 1-14
Layer 3 interfaces
assigning IP addresses to
38-7
assigning IPv4 and IPv6 addresses to 39-15
assigning IPv6 addresses to 39-13
changing from Layer 2 mode 38-7, 38-83, 38-84
types of 38-5
Layer 3 packets, classification methods 36-2
LDAP 4-2
Leaking IGMP Reports 21-4
LEDs, switch
See hardware installation guide
Lightweight Directory Access Protocol
See LDAP
line configuration mode
2-2
Link Aggregation Control Protocol
See EtherChannel
Link Failure, detecting unidirectional
19-7
Link Layer Discovery Protocol
See CDP
link local unicast addresses
39-4
link redundancy
See Flex Links
links, unidirectional
28-1
link state advertisements (LSAs) 38-32
link-state protocols 38-3
link-state tracking
configuring
37-24
described 37-22
LLDP
configuring
29-4
characteristics 29-5
default configuration 29-4
enabling 29-5
monitoring and maintaining 29-10
overview 29-1
supported TLVs 29-2
switch stack considerations 29-2
transmission timer and holdtime, setting 29-5