
Index
IN-20
Catalyst 3550 Multilayer Switch Software Configuration Guide
78-11194-09
Kerberos
authenticating to
boundary switch
KDC
network services
configuration examples
configuring
credentials
cryptographic software image
described
KDC
operation
realm
server
switch as trusted third party
terms
TGT
tickets
key distribution center
L
l2protocol-tunnel command
LACP
Layer 2 protocol tunneling
Layer 2 frames, classification with CoS
Layer 2 interfaces, default configuration
Layer 2 protocol tunneling
configuring
configuring for EtherChannels
default configuration
defined
guidelines
Layer 2 traceroute
and ARP
and CDP
described
IP addresses and subnets
MAC addresses and VLANs
multicast traffic
multiple devices on a port
unicast traffic
usage guidelines
Layer 2 trunks
Layer 3 features
Layer 3 interfaces
assigning IP addresses to
changing from Layer 2 mode
types of
Layer 3 packets, classification methods
LDAP
leave processing, IGMP
lightweight directory access protocol
line configuration mode
Link Aggregation Control Protocol
links, unidirectional
link state advertisements (LSAs)
link-state protocols
load balancing, IGRP
logging messages, ACL
login authentication
with RADIUS
with
login banners
log messages
long-distance, high-bandwidth transport configuration
example
Long-Reach Ethernet (LRE) technology
loop guard
described
enabling
support for
LRE profiles, considerations in switch clusters