Index
IN-28
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
14-4
and SDM template 14-4
and SVIs 14-5
benefits of 14-1
community ports 14-2
community VLANs 14-2, 14-3
configuration guidelines 14-6, 14-8
configuration tasks 14-6
configuring 14-9
default configuration 14-6
end station access to 14-3
IP addressing 14-3
isolated port 14-2
isolated VLANs 14-2, 14-3
mapping 14-13
monitoring 14-14
ports
community
14-2
configuration guidelines 14-8
configuring host ports 14-11
configuring promiscuous ports 14-12
described 11-4
isolated 14-2
promiscuous 14-2
primary VLANs 14-1, 14-3
promiscuous ports 14-2
secondary VLANs 14-2
subdomains 14-1
traffic in 14-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines
7-9
exiting 7-9
logging into 7-9
overview 7-2, 7-7
setting a command with 7-8
promiscuous ports
configuring
14-12
defined 14-2
protected ports 1-7, 23-6
Protocol-Independent Multicast Protocol
See PIM
proxy ARP
configuring
34-9
definition 34-7
with IP routing disabled 34-10
pruning, VTP
disabling
in VTP domain
12-14
on a port 11-23
enabling
in VTP domain
12-14
on a port 11-23
examples 12-5
overview 12-4
pruning-eligible list
changing
11-23
for VTP pruning 12-4
VLANs 12-14
PVST+
described
16-9
IEEE 802.1Q trunking interoperability 16-10
instances supported 16-9
Q
QoS
and MQC commands
32-1
auto-QoS
categorizing traffic
32-21
configuration and defaults display 32-30
configuration guidelines 32-25
described 32-20
disabling 32-27
displaying generated commands 32-27