EasyManua.ls Logo

Cisco WS-C3020 - Page 926

Cisco WS-C3020
960 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Index
IN-10
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
double-tagged packets
IEEE 802.1Q tunneling
15-2
Layer 2 protocol tunneling 15-10
downloading
configuration files
preparing
B-11, B-13, B-17
reasons for B-9
using FTP B-14
using RCP B-17
using TFTP B-12
image files
deleting old image
B-27
preparing B-26, B-29, B-33
reasons for B-24
using FTP B-30
using HTTP B-23
using RCP B-34
using TFTP B-26
using the device manager or Network
Assistant
B-23
drop threshold for Layer 2 protocol packets 15-11
DSCP 1-8, 32-2
DSCP input queue threshold map for QoS 32-16
DSCP output queue threshold map for QoS 32-19
DSCP-to-CoS map for QoS 32-63
DSCP-to-DSCP-mutation map for QoS 32-64
DSCP transparency 32-40
DTP 1-6, 11-17
Dual IPv4-and-IPv6 SDM Templates 35-12
dual IPv4 and IPv6 templates 6-2, 35-1, 35-12
dual protocol stacks
IPv4 and IPv6
35-12
SDM templates supporting 35-12
dual-purpose uplink ports 9-6
dual-purpose uplinks
defined
9-6
setting the type 9-13
dynamic access ports
characteristics
11-3
configuring 11-30
defined 9-3
dynamic addresses
See addresses
dynamic ARP inspection
ARP cache poisoning
21-1
ARP requests, described 21-1
ARP spoofing attack 21-1
clearing
log buffer
21-15
statistics 21-15
configuration guidelines 21-6
configuring
ACLs for non-DHCP environments
21-8
in DHCP environments 21-7
log buffer 21-13
rate limit for incoming ARP packets 21-4, 21-10
default configuration 21-5
denial-of-service attacks, preventing 21-10
described 21-1
DHCP snooping binding database 21-2
displaying
ARP ACLs
21-14
configuration and operating state 21-14
log buffer 21-15
statistics 21-15
trust state and rate limit 21-14
error-disabled state for exceeding rate limit 21-4
function of 21-2
interface trust states 21-3
log buffer
clearing
21-15
configuring 21-13
displaying 21-15
logging of dropped packets, described 21-4
man-in-the middle attack, described 21-2
network security issues and interface trust states 21-3

Table of Contents