Index
IN-19
Catalyst 3560 Switch Software Configuration Guide
78-16156-01
J
join messages, IGMP
19-3
K
KDC
described
8-32
See also Kerberos
Kerberos
authenticating to
boundary switch
8-35
KDC
8-35
network services
8-35
configuration examples
8-32
configuring
8-36
credentials
8-32
cryptographic software image
8-32
described
8-32
KDC
8-32
operation
8-34
realm
8-33
server
8-33
support for
1-7
switch as trusted third party
8-32
terms
8-33
TGT
8-34
tickets
8-32
key distribution center
See KDC
L
LACP
See EtherChannel
Layer 2 frames, classification with CoS
28-2
Layer 2 interfaces, default configuration
10-11
Layer 2 traceroute
and ARP
35-15
and CDP
35-15
described
35-14
IP addresses and subnets
35-15
MAC addresses and VLANs
35-15
multicast traffic
35-15
multiple devices on a port
35-15
unicast traffic
35-14
usage guidelines
35-15
Layer 2 trunks
12-17
Layer 3 features
1-8
Layer 3 interfaces
assigning IP addresses to
30-5
changing from Layer 2 mode
30-5
types of
30-3
Layer 3 packets, classification methods
28-2
leave processing, IGMP
19-10
LEDs, switch
See hardware installation guide
line configuration mode
2-2
Link Aggregation Control Protocol
See EtherChannel
See LACP
links, unidirectional
22-1
link state advertisements (LSAs)
30-32
link-state protocols
30-3
load balancing, IGRP
30-25
logging messages, ACL
27-9
login authentication
with RADIUS
8-23
with
8-14
login banners
6-18
log messages
See system message logging
Long-Reach Ethernet (LRE) technology
1-13