Index
IN-27
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Kerberos
authenticating to
boundary switch 10-42
KDC 10-42
network services 10-42
configuration examples 10-39
configuring 10-42
credentials 10-40
described 10-39
KDC 10-39
operation 10-41
realm 10-41
server 10-41
support for 1-11
switch as trusted third party 10-39
terms 10-40
TGT 10-41
tickets 10-40
key distribution center
See KDC
L
l2protocol-tunnel command 19-13
LACP
Layer 2 protocol tunneling 19-9
See EtherChannel
Layer 2 frames, classification with CoS 39-2
Layer 2 interfaces, default configuration 13-27
Layer 2 protocol tunneling
configuring 19-10
configuring for EtherChannels 19-14
default configuration 19-11
defined 19-8
guidelines 19-12
Layer 2 traceroute
and ARP 51-17
and CDP 51-17
broadcast traffic 51-16
described 51-16
IP addresses and subnets 51-17
MAC addresses and VLANs 51-17
multicast traffic 51-17
multiple devices on a port 51-17
unicast traffic 51-16
usage guidelines 51-17
Layer 3 features 1-14
Layer 3 interfaces
assigning IP addresses to 42-7
assigning IPv4 and IPv6 addresses to 43-14
assigning IPv6 addresses to 43-12
changing from Layer 2 mode 42-7, 42-80, 42-81
types of 42-5
Layer 3 packets, classification methods 39-2
LDAP 4-2
Leaking IGMP Reports 23-4
LEDs, switch
See hardware installation guide
Lightweight Directory Access Protocol
See LDAP
line configuration mode 2-2
Link Aggregation Control Protocol
See EtherChannel
Link Failure, detecting unidirectional 21-7
Link Layer Discovery Protocol
See CDP
link local unicast addresses 43-3
link redundancy
See Flex Links
links, unidirectional 31-1
link state advertisements (LSAs) 42-31
link-state protocols 42-3