Index
IN-28
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
14-4
and SDM template
14-4
and SVIs
14-5
benefits of
14-1
community ports
14-2
community VLANs
14-2, 14-3
configuration guidelines
14-6, 14-8
configuration tasks
14-6
configuring
14-9
default configuration
14-6
end station access to
14-3
IP addressing
14-3
isolated port
14-2
isolated VLANs
14-2, 14-3
mapping
14-13
monitoring
14-14
ports
community
14-2
configuration guidelines
14-8
configuring host ports
14-11
configuring promiscuous ports
14-12
described
11-4
isolated
14-2
promiscuous
14-2
primary VLANs
14-1, 14-3
promiscuous ports
14-2
secondary VLANs
14-2
subdomains
14-1
traffic in
14-5
privileged EXEC mode
2-2
privilege levels
changing the default for lines
7-9
exiting
7-9
logging into
7-9
overview
7-2, 7-7
setting a command with
7-8
promiscuous ports
configuring
14-12
defined
14-2
protected ports
1-7, 23-6
Protocol-Independent Multicast Protocol
See PIM
proxy ARP
configuring
34-9
definition
34-7
with IP routing disabled
34-10
pruning, VTP
disabling
in VTP domain
12-14
on a port
11-23
enabling
in VTP domain
12-14
on a port
11-23
examples
12-5
overview
12-4
pruning-eligible list
changing
11-23
for VTP pruning
12-4
VLANs
12-14
PVST+
described
16-9
IEEE 802.1Q trunking interoperability
16-10
instances supported
16-9
Q
QoS
and MQC commands
32-1
auto-QoS
categorizing traffic
32-21
configuration and defaults display
32-30
configuration guidelines
32-25
described
32-20
disabling
32-27
displaying generated commands
32-27