Index
IN-19
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
IRDP
configuring
34-11
definition
34-11
support for
1-9
ISL
and trunk ports
9-3
encapsulation
1-6, 11-16
trunking with IEEE 802.1 tunneling
15-5
isolated port
14-2
isolated VLANs
14-2, 14-3
J
join messages, IGMP
22-3
K
KDC
described
7-32
See also Kerberos
Kerberos
authenticating to
boundary switch
7-34
KDC
7-34
network services
7-35
configuration examples
7-32
configuring
7-35
credentials
7-32
cryptographic software image
7-32
described
7-32
KDC
7-32
operation
7-34
realm
7-33
server
7-33
support for
1-8
switch as trusted third party
7-32
terms
7-33
Kerberos (continued)
TGT
7-34
tickets
7-32
key distribution center
See KDC
L
l2protocol-tunnel command
15-13
LACP
Layer 2 protocol tunneling
15-9
See EtherChannel
Layer 2 frames, classification with CoS
32-2
Layer 2 interfaces, default configuration
9-12
Layer 2 protocol tunneling
configuring
15-10
configuring for EtherChannels
15-14
default configuration
15-11
defined
15-8
guidelines
15-12
Layer 2 traceroute
and ARP
40-11
and CDP
40-11
broadcast traffic
40-10
described
40-10
IP addresses and subnets
40-11
MAC addresses and VLANs
40-11
multicast traffic
40-11
multiple devices on a port
40-11
unicast traffic
40-10
usage guidelines
40-11
Layer 2 trunk failover
described
33-20
Layer 3 features
1-9
Layer 3 interfaces
assigning IP addresses to
34-5
assigning IPv6 addresses to
35-14
changing from Layer 2 mode
34-5
types of
34-3