Cisco Field Manual. Catalyst Switch Configuration

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

packets

     tracing 2nd 3rd

         example 2nd

passwords

    privileged

         configuring

     recovering 2nd

         on IOS devices 2nd 3rd

     setting for VTP 2nd

    user-level

         configuring

path costs

     STP 2nd

pause frames

permanently deleting files from Flash

permit lists

     configuring 2nd

     example 2nd

PHBs (per-hop behavior)

ping command

     verifying packet reachability 2nd 3rd

pinouts

policers

     creating 2nd 3rd 4th 5th 6th

policies

     QoS 2nd 3rd 4th 5th 6th

         applying 2nd 3rd 4th 5th 6th

         COPS 2nd 3rd 4th

         defining 2nd 3rd 4th

policing traffic

port authentication

     configuring 2nd 3rd

port numbers

     well-known 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

port security

     configuring 2nd

     example 2nd

     verifying configuration

     violations

port-based traffic classification 2nd 3rd 4th 5th 6th 7th 8th

ports

    Layer 2

         selecting 2nd 3rd 4th

     trunking 2nd 3rd 4th

ports (VLAN)

     dynamic assignment 2nd 3rd 4th

         verifying

     static assignment 2nd

         example 2nd 3rd

         verifying

POS interfaces

     configuring 2nd

power allocations

     voice ports 2nd

power-supply redundancy

     configuring 2nd

     displaying information

powering modules on/off

Prefix field (NSAP addresses)

primary Supervisor

     changing backup Supervisor configuration 2nd

private edge VLANs

     creating 2nd

private VLANs

     configuring 2nd 3rd

     example configuration 2nd 3rd 4th

     verifying operation

privileged EXEC mode (IOS)

privileged mode (COS)

privileged passwords

     configuring

     recovering

probes

     traceroute 2nd 3rd

prompts

     configuring

     example configuration

protected ports

     creating private edge VLANs 2nd

protocol filtering

     example 2nd 3rd

     verifying configuration

pruning

     VTP 2nd

Категории