1-27
Catalyst 3750 SwitchSoftware Configuration Guide
OL-8550-09
Chapter1 Overview
Network Configuration Examples
per-user basis. The switch ports are configured as either trusted or untrusted. You can configure a trusted
port to trust the CoS value, the DSCP value, or the IP precedence. If you configure the port as untrusted,
you can use an ACL to mark the frame in accordance with the network policy.
Each stack provides inter-VLAN routing. They provide proxy ARP services to get IP and MAC address
mapping, thereby removing this task from the routers and decreasing this type of traffic on the WAN
links. These stacks also have redundant uplink connections to the backbone switches, with each uplink
port configured as a trusted routed uplink to provide faster convergence in case of an uplink failure.
The routers and backbone switches have HSRP enabled for load balancing and redundant connectivity
to guarantee mission-critical traffic.
Figure1-7 Switches in Wiring Closets in a Backbone Configuration
Cisco 7x00 routers
Catalyst 6500
multilayer switches
Cisco IP Phones
with workstations
Aironet wireless
access points
IEEE 802.3af-compliant
powered device
(such as a web cam)
Cisco IP Phones
with workstations
WAN
IP IP
IP
IP IP
IP
86930
Catalyst 3750
multilayer
StackWise
switch stack
Catalyst 3750
multilayer
StackWise
switch stack
Aironet wireless
access points
IEEE 802.3af-compliant
powered device
(such as a web cam)