Index
IN-39
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
port security (continued)
configuring 28-13
default configuration 28-11
described 28-8
displaying 28-19
enabling 28-18
on trunk ports 28-14
sticky learning 28-9
violations 28-10
port-shutdown response, VMPS 15-26
port VLAN ID TLV 30-2
power management TLV 30-2, 30-7
Power over Ethernet
See PoE
power supply
configuring 13-44
managing 13-44
preemption, default configuration 23-8
preemption delay, default configuration 23-8
preferential treatment of traffic
See QoS
prefix lists, BGP 42-56
preventing unauthorized access 10-1
primary interface for object tracking, DHCP,
configuring 46-11
primary interface for static routing, configuring 46-10
primary links 23-2
primary VLANs 18-1, 18-3
priority
HSRP 44-8
overriding CoS 17-6
trusting CoS 17-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches 18-4
and SDM template 18-4
and SVIs 18-5
and switch stacks 18-5
benefits of 18-1
community ports 18-2
community VLANs 18-2, 18-3
configuration guidelines 18-6, 18-8
configuration tasks 18-6
configuring 18-9
default configuration 18-6
end station access to 18-3
IP addressing 18-3
isolated port 18-2
isolated VLANs 18-2, 18-3
mapping 18-13
monitoring 18-14
ports
community 18-2
configuration guidelines 18-8
configuring host ports 18-11
configuring promiscuous ports 18-12
isolated 18-2
promiscuous 18-2
primary VLANs 18-1, 18-3
promiscuous ports 18-2
secondary VLANs 18-2
subdomains 18-1
traffic in 18-4
privileged EXEC mode 2-2
privilege levels
changing the default for lines 10-9
command switch 6-17
exiting 10-9
logging into 10-9
mapping on member switches 6-17
overview 10-2, 10-7
setting a command with 10-8