Index
IN-35
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
port-shutdown response, VMPS 12-29
power management TLV 27-6
preemption, default configuration 20-5
preemption delay, default configuration 20-5
preferential treatment of traffic
See QoS
prefix lists, BGP 38-57
preventing unauthorized access 7-1
primary links 20-2
primary VLANs 15-1, 15-3
priority
HSRP 40-7
overriding CoS 14-6
trusting CoS 14-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches 15-4
and SDM template 15-4
and SVIs 15-5
and switch stacks 15-5
benefits of 15-1
community ports 15-2
community VLANs 15-2, 15-3
configuration guidelines 15-7, 15-8
configuration tasks 15-6
configuring 15-10
default configuration 15-6
end station access to 15-3
IP addressing 15-3
isolated port 15-2
isolated VLANs 15-2, 15-3
mapping 15-14
monitoring 15-15
ports
community 15-2
configuration guidelines 15-8
configuring host ports 15-11
configuring promiscuous ports 15-13
isolated 15-2
promiscuous 15-2
primary VLANs 15-1, 15-3
promiscuous ports 15-2
secondary VLANs 15-2
subdomains 15-1
traffic in 15-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines 7-9
exiting 7-9
logging into 7-9
overview 7-2, 7-7
setting a command with 7-8
promiscuous ports
configuring 15-13
defined 15-2
protected ports 1-9, 25-5
protocol-dependent modules, EIGRP 38-37
Protocol-Independent Multicast Protocol
See PIM
provider edge devices 38-66
provisioning new members for a switch stack 5-9
proxy ARP
configuring 38-12
definition 38-10
with IP routing disabled 38-12