EasyManua.ls Logo

Cisco WS-C3020 - Page 935

Cisco WS-C3020
960 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Index
IN-19
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
IRDP
configuring
34-11
definition 34-11
support for 1-9
ISL
and trunk ports
9-3
encapsulation 1-6, 11-16
trunking with IEEE 802.1 tunneling 15-5
isolated port 14-2
isolated VLANs 14-2, 14-3
J
join messages, IGMP 22-3
K
KDC
described
7-32
See also Kerberos
Kerberos
authenticating to
boundary switch
7-34
KDC 7-34
network services 7-35
configuration examples 7-32
configuring 7-35
credentials 7-32
cryptographic software image 7-32
described 7-32
KDC 7-32
operation 7-34
realm 7-33
server 7-33
support for 1-8
switch as trusted third party 7-32
terms 7-33
Kerberos (continued)
TGT
7-34
tickets 7-32
key distribution center
See KDC
L
l2protocol-tunnel command 15-13
LACP
Layer 2 protocol tunneling
15-9
See EtherChannel
Layer 2 frames, classification with CoS
32-2
Layer 2 interfaces, default configuration 9-12
Layer 2 protocol tunneling
configuring
15-10
configuring for EtherChannels 15-14
default configuration 15-11
defined 15-8
guidelines 15-12
Layer 2 traceroute
and ARP
40-11
and CDP 40-11
broadcast traffic 40-10
described 40-10
IP addresses and subnets 40-11
MAC addresses and VLANs 40-11
multicast traffic 40-11
multiple devices on a port 40-11
unicast traffic 40-10
usage guidelines 40-11
Layer 2 trunk failover
described
33-20
Layer 3 features 1-9
Layer 3 interfaces
assigning IP addresses to
34-5
assigning IPv6 addresses to 35-14
changing from Layer 2 mode 34-5
types of 34-3

Table of Contents