EasyManua.ls Logo

Cisco Catalyst 3750-X - Page 1390

Cisco Catalyst 3750-X
1438 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Index
IN-14
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
dual protocol stacks
IPv4 and IPv6 43-6
SDM templates supporting 43-6
DVMRP
autosummarization
configuring a summary address
48-59
disabling 48-61
connecting PIM domain to DVMRP router 48-51
enabling unicast routing 48-54
interoperability
with Cisco devices
48-49
with Cisco IOS software 48-9
mrinfo requests, responding to 48-54
neighbors
advertising the default route to
48-53
discovery with Probe messages 48-49
displaying information 48-54
prevent peering with nonpruning 48-57
rejecting nonpruning 48-55
overview 48-9
routes
adding a metric offset
48-61
advertising all 48-61
advertising the default route to neighbors 48-53
caching DVMRP routes learned in report
messages
48-55
changing the threshold for syslog messages 48-58
deleting 48-62
displaying 48-63
favoring one over another 48-61
limiting the number injected into MBONE 48-58
limiting unicast route advertisements 48-49
routing table 48-9
source distribution tree, building 48-9
support for 1-14
tunnels
configuring
48-51
displaying neighbor information 48-54
dynamic access ports
characteristics
15-3
configuring 15-28
defined 13-3
dynamic addresses
See addresses
dynamic ARP inspection
ARP cache poisoning
25-1
ARP requests, described 25-1
ARP spoofing attack 25-1
clearing
log buffer
25-15
statistics 25-15
configuration guidelines 25-6
configuring
ACLs for non-DHCP environments
25-8
in DHCP environments 25-7
log buffer 25-13
rate limit for incoming ARP packets 25-4, 25-10
default configuration 25-5
denial-of-service attacks, preventing 25-10
described 25-1
DHCP snooping binding database 25-2
displaying
ARP ACLs
25-14
configuration and operating state 25-14
statistics 25-15
trust state and rate limit 25-14
error-disabled state for exceeding rate limit 25-4
function of 25-2
interface trust states 25-3
log buffer
clearing
25-15
configuring 25-13
logging of dropped packets, described 25-5
man-in-the middle attack, described 25-2
network security issues and interface trust states 25-3
priority of ARP ACLs and DHCP snooping
entries
25-4

Table of Contents

Other manuals for Cisco Catalyst 3750-X

Related product manuals