Index
IN-8
Ethernet Card Software Feature and Configura tion Guide, R7.2
January 2009
IRB
BVIs 12-1
configuration considerations 12-1
configuring 12-2
description 12-1
displaying information about 12-5
monitoring and verifying 12-4
IS, AINS 25-5
J
J1 bytes 2-5, 25-8
K
keepalive command 5-6
Kermit protocol C-3
L
Layer 2 feature list 1-2
Layer 2 protocol tunneling 9-10
configuring 9-10
default configuration 9-10
defined 9-10
guidelines 9-11
Layer 3 feature list 1-5
LCAS 24-14
LEX encapsulation 20-5, 25-7
line vty command 3-9
link integrity 24-3, 25-4
link state advertisements (LSAs) 11-14
logging command C-3
logging router output C-2
login authentication with RADIUS 19-11
login enhancements 19-2
M
MAC addresses 4-2
management options, SNMP 22-1
management ports
See also console ports
configuring 3-8
match any command 14-12
match cos command 14-13
match ip dscp command 14-13
match ip precedence command 14-13
Media Access Control addresses. See MAC addresses
message logging C-3
metro tags 9-2
MIBs 22-5
overview 22-1
SNMP interaction with 22-4
microcode image 3-12
ML-100T-8 card, configuring SDM 15-1
Modular QoS Command-Line Interface
configuration (example) 14-18
configuration, verifying 14-17
configuring 14-12
monitoring
EIGRP 11-26
IEEE 802.1Q tunneling 9-12
IP routes 11-33
Layer 2 protocol tunneling 9-12
OSPF 11-19, 11-32
traffic flow 21-1
tunneling 9-12
MPLS
configuring 18-1
VCs A-83
MSTP, interoperability with IEEE 802.1D 7-15
MST protocol tunneling 9-10
MTU 5-5
multicast, IP. See IP multicast routing
Multicast priority queuing 14-24