Index
IN-9
Catalyst 2940 Switch Software Configuration Guide
78-15507-02
Intrusion Detection System
See IDS
inventory, cluster 5-21
IP addresses
candidate or member 5-3, 5-12
cluster access 5-2
command switch 5-2, 5-9, 5-12
discovering 6-26
management VLAN 5-14
redundant clusters 5-9
standby command switch 5-9, 5-12
See also IP information
ip igmp profile command 16-22
IP information
assigned
manually 4-9
through DHCP-based autoconfiguration 4-3
default configuration 4-2
IP multicast routing and IGMP snooping 16-1, 16-6
IP phones
and QoS 15-1
configuring 15-3
trusted boundary for QoS 24-6
IPv4 1-1
IPv6 1-1
IP version 4 1-1
IP version 6 1-1
J
Java plug-in configuration 5-1, 5-3
join messages, IGMP 16-3
L
LACP
See EtherChannel
Layer 2 frames, classification with CoS 24-1
Layer 2 interfaces, default configuration 9-10
Layer 2 traceroute
and ARP 26-11
and CDP 26-10
described 26-10
IP addresses and subnets 26-11
MAC addresses and VLANs 26-10
multicast traffic 26-10
multiple devices on a port 26-11
unicast traffic 26-10
usage guidelines 26-10
Layer 2 trunks 13-12
leave processing, IGMP 16-10
line configuration mode 2-3
links, unidirectional 18-1
login authentication
with RADIUS 7-22
with TACACS+ 7-13
login banners 6-18
log messages
See system message logging
loop guard
described 12-9
enabling 12-15
support for 1-3
LRE profiles, considerations in switch clusters 5-15
M
MAC addresses
adding
sticky secure 17-5
aging time 6-22
and VLAN association 6-21
building the address table 6-21
default configuration 6-22
discovering 6-26
displaying 6-26
dynamic