Index
IN-10
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
double-tagged packets
IEEE 802.1Q tunneling
15-2
Layer 2 protocol tunneling
15-10
downloading
configuration files
preparing
B-11, B-13, B-17
reasons for
B-9
using FTP
B-14
using RCP
B-17
using TFTP
B-12
image files
deleting old image
B-27
preparing
B-26, B-29, B-33
reasons for
B-24
using FTP
B-30
using HTTP
B-23
using RCP
B-34
using TFTP
B-26
using the device manager or Network
Assistant
B-23
drop threshold for Layer 2 protocol packets
15-11
DSCP
1-8, 32-2
DSCP input queue threshold map for QoS
32-16
DSCP output queue threshold map for QoS
32-19
DSCP-to-CoS map for QoS
32-63
DSCP-to-DSCP-mutation map for QoS
32-64
DSCP transparency
32-40
DTP
1-6, 11-17
Dual IPv4-and-IPv6 SDM Templates
35-12
dual IPv4 and IPv6 templates
6-2, 35-1, 35-12
dual protocol stacks
IPv4 and IPv6
35-12
SDM templates supporting
35-12
dual-purpose uplink ports
9-6
dual-purpose uplinks
defined
9-6
setting the type
9-13
dynamic access ports
characteristics
11-3
configuring
11-30
defined
9-3
dynamic addresses
See addresses
dynamic ARP inspection
ARP cache poisoning
21-1
ARP requests, described
21-1
ARP spoofing attack
21-1
clearing
log buffer
21-15
statistics
21-15
configuration guidelines
21-6
configuring
ACLs for non-DHCP environments
21-8
in DHCP environments
21-7
log buffer
21-13
rate limit for incoming ARP packets
21-4, 21-10
default configuration
21-5
denial-of-service attacks, preventing
21-10
described
21-1
DHCP snooping binding database
21-2
displaying
ARP ACLs
21-14
configuration and operating state
21-14
log buffer
21-15
statistics
21-15
trust state and rate limit
21-14
error-disabled state for exceeding rate limit
21-4
function of
21-2
interface trust states
21-3
log buffer
clearing
21-15
configuring
21-13
displaying
21-15
logging of dropped packets, described
21-4
man-in-the middle attack, described
21-2
network security issues and interface trust states
21-3