Cisco Catalyst LAN Switching

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

packet filtering

    Layer 3 

    MLS  2nd  3rd  4th  5th 

packet-by-packet switching 

packets

    candidate packets  2nd  3rd 

    comparing to frames  2nd 

    CPU processing  2nd 

    dropping 

    enable packets  2nd 

PAgP (Port Aggregation Protocol)

    disabling  2nd  3rd 

paper documentation

    maintaining 

parameters

    default value

        restoringcommands 

partitions

    Layer 3

        MLS  2nd 

    Layer 3 switching

        modularity  2nd 

passwords

    Catalysts 

    enable

        setting 

    recovering  2nd 

    RSM

        recovering 

    security  2nd  3rd  4th 

path cost 

Path Cost 

path cost 

paths

    load balancing

        ATM 

        campus networks  2nd  3rd 

        EtherChannel  2nd 

        HSRP  2nd 

        IP routing protocols 

        Layer 3 switching 

        MHSRP  2nd  3rd 

        requirements  2nd 

        Root Bridge placement  2nd 

        SPT 

        STP  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th 

    selection

        campus networks 

pattern-based VLAN numbers 

patterns

    SPT

        evaluating  2nd 

    traffic  2nd  3rd 

        STP 

pause frames 

PCM (pulse code modulation) 

peak utilization

    traffic 

peers

    restricting 

performance

    bandwidth

        100BaseX systems  2nd 

        EtherChannel  2nd 

    bridges

        80/20 rule 

    CPU

        monitoring 

        packet processing  2nd 

    Ethernet 

    Spanning tree timers

        tuning  2nd 

    STP

        tuning  2nd  3rd  4th  5th 

    switching

        throughput  2nd 

    throughput

        ATM cells  2nd 

        bridged VLANs  2nd 

    workstations 

permit list

    activating 

PFC (Policy Feature Card) 

philosophies

    troubleshooting

        bucket approach  2nd  3rd  4th  5th  6th  7th 

        comparing 

        documentation, maintaining 

        OSI model approach  2nd  3rd 

physical security 

pinging

    RSM troubleshooting utility 

pinout

    Catalyst 6000

        selecting 

placement

    ATM LANE components  2nd 

    HSRP active peer  2nd  3rd 

    LECs  2nd 

    Root Bridges

        flat networks  2nd 

        hierarchical networks 

    server farms 

planning

    VLAN configuration (Catalyst)  2nd  3rd  4th 

    VLAN membership 

PLANs (physical LANs)  2nd 

PLECs (Proxy LECs) 

PNNI (Private Network-Network Interface)  2nd 

point-to-multipoint virtual circuits

    ATM 

point-to-point technologies

    SONET 

point-to-point VCs 

point-to-point virtual circuits

    ATM 

policies

    VMPS database groups 

Port-Channel interface 

port/VLAN cost load balancing  2nd  3rd  4th  5th  6th  7th  8th 

port/VLAN priority load balancing  2nd  3rd  4th  5th  6th  7th  8th  9th 

PortFast  2nd  3rd  4th  5th  6th  7th 

ports

    assigning to VLAN  2nd 

    BPDUs 

        processing  2nd  3rd  4th 

    bundling  2nd  3rd  4th  5th 

        PAgP  2nd 

    Catalyst

        VLAN configuration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 

    configuring 

    Designated Ports

        election  2nd 

    dynamic configuration 

    EtherChannel

        EBC (Ethernet Bundling Controller)  2nd 

        selecting 

    load balancing  2nd 

    MDIX 

    non-Designated 

    redundant uplink

        configuring 

    RI (ring-in) 

    RO (ring-out) 

    Root Port 

positioning

    Root Bridges

        flat networks  2nd 

        hierarchical networks 

power overloads

    HSSI port adapters 

prefixes

    NSAP addresses 

PRIVILEGED mode (Catalyst 5000 series) 

Process Switching 

processing

    BPDUs  2nd  3rd  4th 

        Configuration BPDUs  2nd  3rd  4th 

        TCN BPDUs  2nd 

    Spanning Tree

        isolation  2nd 

propagation

    Configuration BPDUs 

propagation delay

    ATM cells 

Protected header (802.10) 

Protocol Filtering 

protocol filtering

    MLS 

protocols

    filtering  2nd 

    non-routable 

    segregating 

    trunking

        comparing 

pruning

    VLANs  2nd 

    VLANs from trunks 

pruning (VTP)  2nd  3rd 

PSVT (per-VLAN spanning tree)  2nd 

PVCs

    ATM 

        traffic shaping 

PVST (Per-VLAN Spanning Tree)  2nd 

PVST+ 

    BPDUs

        flooding 

    load balancing  2nd  3rd  4th  5th 

    mapping 

    network regions  2nd 

    tunneling 

Категории