Index
IN-19
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
IRDP
configuring
34-11
definition 34-11
support for 1-9
ISL
and trunk ports
9-3
encapsulation 1-6, 11-16
trunking with IEEE 802.1 tunneling 15-5
isolated port 14-2
isolated VLANs 14-2, 14-3
J
join messages, IGMP 22-3
K
KDC
described
7-32
See also Kerberos
Kerberos
authenticating to
boundary switch
7-34
KDC 7-34
network services 7-35
configuration examples 7-32
configuring 7-35
credentials 7-32
cryptographic software image 7-32
described 7-32
KDC 7-32
operation 7-34
realm 7-33
server 7-33
support for 1-8
switch as trusted third party 7-32
terms 7-33
Kerberos (continued)
TGT
7-34
tickets 7-32
key distribution center
See KDC
L
l2protocol-tunnel command 15-13
LACP
Layer 2 protocol tunneling
15-9
See EtherChannel
Layer 2 frames, classification with CoS
32-2
Layer 2 interfaces, default configuration 9-12
Layer 2 protocol tunneling
configuring
15-10
configuring for EtherChannels 15-14
default configuration 15-11
defined 15-8
guidelines 15-12
Layer 2 traceroute
and ARP
40-11
and CDP 40-11
broadcast traffic 40-10
described 40-10
IP addresses and subnets 40-11
MAC addresses and VLANs 40-11
multicast traffic 40-11
multiple devices on a port 40-11
unicast traffic 40-10
usage guidelines 40-11
Layer 2 trunk failover
described
33-20
Layer 3 features 1-9
Layer 3 interfaces
assigning IP addresses to
34-5
assigning IPv6 addresses to 35-14
changing from Layer 2 mode 34-5
types of 34-3