Index
IN-16
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
described 35-4
response time 35-4
scheduling 35-5
SNMP support 35-2
supported metrics 35-2
threshold monitoring 35-6
UDP jitter operation 35-8
IP source guard
and 802.1x 21-18
and DHCP snooping 21-15
and EtherChannels 21-18
and port security 21-18
and private VLANs 21-18
and routed ports 21-17
and TCAM entries 21-18
and trunk interfaces 21-18
and VRF 21-18
binding configuration
automatic 21-16
manual 21-16
binding table 21-16
configuration guidelines 21-17
default configuration 21-17
described 21-15
disabling 21-19
displaying
active IP or MAC bindings 21-26
bindings 21-26
configuration 21-26
enabling 21-18, 21-19
filtering
source IP address 21-16
source IP and MAC address 21-16
source IP address filtering 21-16
source IP and MAC address filtering 21-16
static bindings
adding 21-18, 21-19
deleting 21-19
static hosts 21-19
IP traceroute
executing 36-9
overview 36-8
IPv4 ACLs
applying to interfaces 32-17
extended, creating 32-8
named 32-12
standard, creating 32-7
J
join messages, IGMP 23-3
K
KDC
described 9-41
See also Kerberos
Kerberos
authenticating to
boundary switch 9-43
KDC 9-43
network services 9-44
configuration examples 9-40
configuring 9-44
credentials 9-41
cryptographic software image 9-40
described 9-41
KDC 9-41
operation 9-43
realm 9-42
server 9-42
support for 1-8
switch as trusted third party 9-40
terms 9-41
TGT 9-42
tickets 9-41
key distribution center