Index
IN-36
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
priority
HSRP
40-8
overriding CoS 15-6
trusting CoS 15-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
16-4
and SDM template 16-4
and SVIs 16-5
and switch stacks 16-5
benefits of 16-1
community ports 16-2
community VLANs 16-2, 16-3
configuration guidelines 16-7, 16-8
configuration tasks 16-6
configuring 16-10
default configuration 16-6
end station access to 16-3
IP addressing 16-3
isolated port 16-2
isolated VLANs 16-2, 16-3
mapping 16-14
monitoring 16-15
ports
community
16-2
configuration guidelines 16-8
configuring host ports 16-11
configuring promiscuous ports 16-13
described 13-4
isolated 16-2
promiscuous 16-2
primary VLANs 16-1, 16-3
promiscuous ports 16-2
secondary VLANs 16-2
subdomains 16-1
traffic in 16-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines
7-9
exiting 7-9
logging into 7-9
overview 7-2, 7-7
setting a command with 7-8
promiscuous ports
configuring
16-13
defined 16-2
protected ports 1-10, 26-6
protocol-dependent modules, EIGRP 38-38
Protocol-Independent Multicast Protocol
See PIM
provider edge devices
38-78
provisioning new members for a switch stack 5-9
proxy ARP
configuring
38-12
definition 38-10
with IP routing disabled 38-12
proxy reports 21-3
pruning, VTP
disabling
in VTP domain
14-16
on a port 13-22
enabling
in VTP domain
14-16
on a port 13-22
examples 14-7
overview 14-6
pruning-eligible list
changing
13-22
for VTP pruning 14-6
VLANs 14-16
PVST+
described
18-10
IEEE 802.1Q trunking interoperability 18-11
instances supported 18-10