Index
IN-35
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
primary links 21-2
primary VLANs 16-1, 16-3
priority
HSRP
39-7
overriding CoS 15-6
trusting CoS 15-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
16-4
and SDM template 16-4
and SVIs 16-5
and switch stacks 16-6
benefits of 16-1
community ports 16-2
community VLANs 16-2, 16-3
configuration guidelines 16-7, 16-8
configuration tasks 16-6
configuring 16-10
default configuration 16-7
end station access to 16-3
IP addressing 16-3
isolated port 16-2
isolated VLANs 16-2, 16-3
mapping 16-14
monitoring 16-15
ports
community
16-2
configuration guidelines 16-8
configuring host ports 16-12
configuring promiscuous ports 16-13
described 13-4
isolated 16-2
promiscuous 16-2
primary VLANs 16-1, 16-3
promiscuous ports 16-2
secondary VLANs 16-2
subdomains 16-1
traffic in 16-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines
9-9
command switch 6-17
exiting 9-9
logging into 9-9
mapping on member switches 6-17
overview 9-2, 9-7
setting a command with 9-8
promiscuous ports
configuring
16-13
defined 16-2
protected ports 1-8, 25-5
protocol-dependent modules, EIGRP 35-36
Protocol-Independent Multicast Protocol
See PIM
provider edge devices
35-65
provisioning new members for a switch stack 5-7
proxy ARP
configuring
35-11
definition 35-9
with IP routing disabled 35-12
pruning, VTP
disabling
in VTP domain
14-14
on a port 13-23
enabling
in VTP domain
14-14
on a port 13-22
examples 14-5
overview 14-4
pruning-eligible list
changing
13-22
for VTP pruning 14-5
VLANs 14-14
PVST+
described
18-10
IEEE 802.1Q trunking interoperability 18-11
instances supported 18-10