IRDP

 

configuring

38-13

definition

38-13

support for

1-12

ISL

 

and IPv6 39-3

and trunk ports 11-3

encapsulation 1-8,13-16

trunking with IEEE 802.1 tunneling 17-5

isolated port 16-2isolated VLANs 16-2,16-3

J

join messages, IGMP 24-3

K

KDC

 

 

 

described

9-32

 

See also Kerberos

 

keepalive messages 18-2

 

Kerberos

 

 

 

authenticating to

 

boundary switch

9-34

KDC

9-34

 

network services

9-35

configuration examples 9-32

configuring

9-35

 

credentials

9-32

 

cryptographic software image 9-32

described

9-32

 

KDC

9-32

 

 

operation

9-34

 

realm

9-33

 

 

Index

Kerberos (continued)

server

9-33

support for 1-10

switch as trusted third party 9-32

terms

9-33

TGT

9-34

tickets

9-32

key distribution center See KDC

L

l2protocol-tunnel command

17-13

 

LACP

 

 

 

 

 

 

Layer 2 protocol tunneling

17-9

 

See EtherChannel

 

 

 

 

Layer 2 frames, classification with CoS

36-2

Layer 2 interfaces, default configuration

11-21

Layer 2 protocol tunneling

 

 

 

configuring

17-10

 

 

 

configuring for EtherChannels 17-14

 

default configuration 17-11

 

 

defined 17-8

 

 

 

 

 

guidelines

17-12

 

 

 

 

Layer 2 traceroute

 

 

 

 

 

and ARP

45-18

 

 

 

 

and CDP

45-17

 

 

 

 

broadcast traffic

45-17

 

 

 

described

45-17

 

 

 

 

IP addresses and subnets

45-18

 

MAC addresses and VLANs

45-17

 

multicast traffic

45-17

 

 

 

multiple devices on a port

45-18

 

unicast traffic

45-17

 

 

 

usage guidelines

45-17

 

 

 

 

 

Catalyst 3750-E and 3560-E Switch Software Configuration Guide

 

 

 

 

 

 

 

OL-9775-02

 

 

IN-25

 

 

 

 

 

Page 1203
Image 1203
Cisco Systems 3750E manual Isl, IN-25