Index
IN-10
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
double-tagged packets
IEEE 802.1Q tunneling
15-2
Layer 2 protocol tunneling 15-10
downloading
configuration files
preparing
B-11, B-13, B-17
reasons for B-9
using FTP B-14
using RCP B-17
using TFTP B-12
image files
deleting old image
B-27
preparing B-26, B-29, B-33
reasons for B-24
using FTP B-30
using HTTP B-23
using RCP B-34
using TFTP B-26
using the device manager or Network
Assistant
B-23
drop threshold for Layer 2 protocol packets 15-11
DSCP 1-8, 32-2
DSCP input queue threshold map for QoS 32-16
DSCP output queue threshold map for QoS 32-19
DSCP-to-CoS map for QoS 32-63
DSCP-to-DSCP-mutation map for QoS 32-64
DSCP transparency 32-40
DTP 1-6, 11-17
Dual IPv4-and-IPv6 SDM Templates 35-12
dual IPv4 and IPv6 templates 6-2, 35-1, 35-12
dual protocol stacks
IPv4 and IPv6
35-12
SDM templates supporting 35-12
dual-purpose uplink ports 9-6
dual-purpose uplinks
defined
9-6
setting the type 9-13
dynamic access ports
characteristics
11-3
configuring 11-30
defined 9-3
dynamic addresses
See addresses
dynamic ARP inspection
ARP cache poisoning
21-1
ARP requests, described 21-1
ARP spoofing attack 21-1
clearing
log buffer
21-15
statistics 21-15
configuration guidelines 21-6
configuring
ACLs for non-DHCP environments
21-8
in DHCP environments 21-7
log buffer 21-13
rate limit for incoming ARP packets 21-4, 21-10
default configuration 21-5
denial-of-service attacks, preventing 21-10
described 21-1
DHCP snooping binding database 21-2
displaying
ARP ACLs
21-14
configuration and operating state 21-14
log buffer 21-15
statistics 21-15
trust state and rate limit 21-14
error-disabled state for exceeding rate limit 21-4
function of 21-2
interface trust states 21-3
log buffer
clearing
21-15
configuring 21-13
displaying 21-15
logging of dropped packets, described 21-4
man-in-the middle attack, described 21-2
network security issues and interface trust states 21-3