Index
IN-35
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
primary links
21-2
primary VLANs
16-1, 16-3
priority
HSRP
39-7
overriding CoS
15-6
trusting CoS
15-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
16-4
and SDM template
16-4
and SVIs
16-5
and switch stacks
16-6
benefits of
16-1
community ports
16-2
community VLANs
16-2, 16-3
configuration guidelines
16-7, 16-8
configuration tasks
16-6
configuring
16-10
default configuration
16-7
end station access to
16-3
IP addressing
16-3
isolated port
16-2
isolated VLANs
16-2, 16-3
mapping
16-14
monitoring
16-15
ports
community
16-2
configuration guidelines
16-8
configuring host ports
16-12
configuring promiscuous ports
16-13
described
13-4
isolated
16-2
promiscuous
16-2
primary VLANs
16-1, 16-3
promiscuous ports
16-2
secondary VLANs
16-2
subdomains
16-1
traffic in
16-5
privileged EXEC mode
2-2
privilege levels
changing the default for lines
9-9
command switch
6-17
exiting
9-9
logging into
9-9
mapping on member switches
6-17
overview
9-2, 9-7
setting a command with
9-8
promiscuous ports
configuring
16-13
defined
16-2
protected ports
1-8, 25-5
protocol-dependent modules, EIGRP
35-36
Protocol-Independent Multicast Protocol
See PIM
provider edge devices
35-65
provisioning new members for a switch stack
5-7
proxy ARP
configuring
35-11
definition
35-9
with IP routing disabled
35-12
pruning, VTP
disabling
in VTP domain
14-14
on a port
13-23
enabling
in VTP domain
14-14
on a port
13-22
examples
14-5
overview
14-4
pruning-eligible list
changing
13-22
for VTP pruning
14-5
VLANs
14-14
PVST+
described
18-10
IEEE 802.1Q trunking interoperability
18-11
instances supported
18-10