Index
IN-24
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
IPv6 traffic, filtering 38-4
IRDP
configuring
35-13
definition 35-12
support for 1-11
ISL
and IPv6
36-3
and trunk ports 11-3
encapsulation 1-7, 13-16
trunking with IEEE 802.1 tunneling 17-5
isolated port 16-2
isolated VLANs 16-2, 16-3
J
join messages, IGMP 24-3
K
KDC
described
9-32
See also Kerberos
keepalive messages
18-2
Kerberos
authenticating to
boundary switch
9-34
KDC 9-34
network services 9-35
configuration examples 9-32
configuring 9-35
credentials 9-32
cryptographic software image 9-32
described 9-32
KDC 9-32
operation 9-34
realm 9-33
server 9-33
support for 1-9
Kerberos (continued)
switch as trusted third party
9-32
terms 9-33
TGT 9-34
tickets 9-32
key distribution center
See KDC
L
l2protocol-tunnel command 17-13
LACP
Layer 2 protocol tunneling
17-9
See EtherChannel
Layer 2 frames, classification with CoS
33-2
Layer 2 interfaces, default configuration 11-15
Layer 2 protocol tunneling
configuring
17-10
configuring for EtherChannels 17-14
default configuration 17-11
defined 17-8
guidelines 17-12
Layer 2 traceroute
and ARP
43-17
and CDP 43-16
broadcast traffic 43-16
described 43-16
IP addresses and subnets 43-17
MAC addresses and VLANs 43-16
multicast traffic 43-16
multiple devices on a port 43-17
unicast traffic 43-16
usage guidelines 43-16
Layer 3 features 1-11