1-22
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 1 Overview
Network Configuration Examples
per-user basis. The switch ports are configured as either trusted or untrusted. You can configure a trusted
port to trust the CoS value, the DSCP value, or the IP precedence. If you configure the port as untrusted,
you can use an ACL to mark the frame in accordance with the network policy.
Each switch provides inter-VLAN routing. They provide proxy ARP services to get IP and MAC address
mapping, thereby removing this task from the routers and decreasing this type of traffic on the WA N
links. These switches also have redundant uplink connections to the backbone switches, with each uplink
port configured as a trusted routed uplink to provide faster convergence in case of an uplink failure.
The routers and backbone switches have HSRP enabled for load balancing and redundant connectivity
to guarantee mission-critical traffic.
Figure 1-4 Catalyst 3560 Switches in Wiring Closets in a Backbone Configuration
Cisco 7x00 routers
Catalyst 6500
multilayer switches
Cisco IP Phones
with workstations
WAN
IP IP IP
Aironet wireless
access points
IEEE 802.3af-compliant
powered device
(such as a web cam)
Cisco IP Phones
with workstations
IP
IP IP
101389
Aironet wireless
access points
IEEE 802.3af-compliant
powered device
(such as a web cam)