Index
IN-16
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
overview 22-4
login passwords
recovering
39-16
setting 39-14
loop guard
configuring
9-19
multiple spanning tree 7-17
overview 9-6
LOU
description
15-24
determining maximum number of 15-24
M
MAC addresses
address table
4-2
allocation 7-14
blocking 38-2
blocking unicast flood packets 45-1
CAM table, duplication indicator 20-5
configuring move counters 20-62
designating 2-6
port security and 38-2
MAC-address monitoring
clearing
configuration
38-17
configuring 38-14
global monitoring 38-14
displaying
configuration
38-18
global configuration 38-18
specifying
lower threshold
38-16
MAC addresses 38-15
polling interval 38-16
upper threshold 38-17
MAC address move counters, configuring 20-62
MAC address reduction 7-15
MAC authentication bypass
ACL assignments
41-13
agentless hosts, auditing 41-14
bypass events 41-4
bypass states 41-3
configuration guidelines and restrictions 41-4
configuring 41-6
device tracking 43-1, 43-4
host aging 43-1, 43-4
overview 41-2
QoS ACLs, configuring 41-13
reauthentication of MAC addresses 41-2
MAC utilization
clearing counters
20-9
overview 20-7
setting the load interval 20-7
viewing statistics 20-7
mapping VLANs 11-9
markdown (QoS) 51-24
marking (QoS) 51-29
MDI/MDIX 4-7
MDIX 4-7
Melody Compact Flash memory 3-5
memory use
monitoring
20-21
message-of-the-day
See login banner
message processing subsystem
46-8
SNMP entity 46-7, 46-8
metric values, switch TopN reports (table) 49-2
metro Ethernet CFM 20-38
MIBs
RMON/RMON2 support (table)
47-3
microflow policing rule 51-24
Mini Protocol Analyzer
configuration guidelines
48-20
configuring from CLI 48-21
hardware requirements 48-19
overview 48-19
session limits 48-5