Index
IN-57
Catalyst 3750 SwitchSoftware Configuration Guide
OL-8550-09
port security
aging 25-18
and private VLANs 25-19
and QoS trusted boundary 35-43
and stacking 25-19
configuring 25-13
default configuration 25-12
described 25-9
displaying 25-20
enabling 25-19
on trunk ports 25-15
sticky learning 25-10
violations 25-11
with other features 25-12
port-shutdown response, VMPS 13-28
port VLAN ID TLV 27-2
power management TLV 27-2, 27-8
Power over Ethernet
See PoE
preemption, default configuration 21-8
preemption delay, default configuration 21-8
preferential treatment of traffic
See QoS
prefix lists, BGP 38-57
preventing unauthorized access 9-1
primary interface for object tracking, DHCP,
configuring 44-10
primary interface for static routing, configuring 44-10
primary links 21-2
primary VLANs 16-1, 16-3
priority
HSRP 42-8
overriding CoS 15-7
trusting CoS 15-7
private VLAN edge ports
See protected ports
private VLANs
across multiple switches 16-4
and SDM template 16-4
and SVIs 16-5
and switch stacks 16-6
benefits of 16-1
community ports 16-2
community VLANs 16-2, 16-3
configuration guidelines 16-7, 16-9
configuration tasks 16-6
configuring 16-10
default configuration 16-7
end station access to 16-3
IP addressing 16-3
isolated port 16-2
isolated VLANs 16-2, 16-3
mapping 16-14
monitoring 16-15
ports
community 16-2
configuration guidelines 16-9
configuring host ports 16-12
configuring promiscuous ports 16-13
described 13-4
isolated 16-2
promiscuous 16-2
primary VLANs 16-1, 16-3
promiscuous ports 16-2
secondary VLANs 16-2
subdomains 16-1
traffic in 16-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines 9-9
command switch 6-18
exiting 9-10
logging into 9-10
mapping on member switches 6-18
overview 9-2, 9-8
setting a command with 9-8
promiscuous ports
configuring 16-13