Contents
xiv
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
Configuring and Associating VLANs in a Private VLAN 14-9
Configuring a Layer 2 Interface as a Private-VLAN Host Port 14-11
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port 14-12
Mapping Secondary VLANs to a Primary VLAN Layer 3 VLAN Interface 14-13
Monitoring Private VLANs 14-14
CHAPTER
15 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling 15-1
Understanding IEEE 802.1Q Tunneling 15-1
Configuring IEEE 802.1Q Tunneling 15-4
Default IEEE 802.1Q Tunneling Configuration 15-4
IEEE 802.1Q Tunneling Configuration Guidelines 15-4
Native VLANs 15-4
System MTU 15-5
IEEE 802.1Q Tunneling and Other Features 15-6
Configuring an IEEE 802.1Q Tunneling Port 15-6
Understanding Layer 2 Protocol Tunneling 15-7
Configuring Layer 2 Protocol Tunneling 15-10
Default Layer 2 Protocol Tunneling Configuration 15-11
Layer 2 Protocol Tunneling Configuration Guidelines 15-12
Configuring Layer 2 Protocol Tunneling 15-13
Configuring Layer 2 Tunneling for EtherChannels 15-14
Configuring the SP Edge Switch 15-14
Configuring the Customer Switch 15-16
Monitoring and Maintaining Tunneling Status 15-18
CHAPTER
16 Configuring STP 16-1
Understanding Spanning-Tree Features 16-1
STP Overview 16-2
Spanning-Tree Topology and BPDUs 16-3
Bridge ID, Switch Priority, and Extended System ID 16-4
Spanning-Tree Interface States 16-4
Blocking State 16-5
Listening State 16-6
Learning State 16-6
Forwarding State 16-6
Disabled State 16-7
How a Switch or Port Becomes the Root Switch or Root Port 16-7
Spanning Tree and Redundant Connectivity 16-8
Spanning-Tree Address Management 16-8