Specifications

Index
IN-13
Catalyst 2970 Switch Software Configuration Guide
78-15462-03
Kerberos
authenticating to
boundary switch
7-35
KDC 7-35
network services 7-35
configuration examples 7-32
configuring 7-36
credentials 7-32
cryptographic software image 7-32
described 7-32
KDC 7-32
operation 7-34
realm 7-33
server 7-33
support for 1-6
switch as trusted third party 7-32
terms 7-33
TGT 7-34
tickets 7-32
key distribution center
See KDC
L
LACP
See EtherChannel
Layer 2 frames, classification with CoS
27-2
Layer 2 interfaces, default configuration 9-9
Layer 2 traceroute
and ARP
29-15
and CDP 29-14
described 29-14
IP addresses and subnets 29-15
MAC addresses and VLANs 29-15
multicast traffic 29-15
multiple devices on a port 29-15
unicast traffic 29-14
usage guidelines 29-14
Layer 2 trunks 11-15
Layer 3 packets, classification methods 27-2
leave processing, IGMP 18-10
LEDs, switch
See hardware installation guide
line configuration mode
2-3
Link Aggregation Control Protocol
See EtherChannel
See LACP
links, unidirectional
21-1
login authentication
with RADIUS
7-23
with TACACS+ 7-14
login banners 6-19
log messages
See system message logging
Long-Reach Ethernet (LRE) technology
1-11
loop guard
described
16-8
enabling 16-15
support for 1-5
LRE profiles, considerations in switch clusters 5-15
M
MAC addresses
aging time
6-23
and VLAN association 6-23
building the address table 6-22
default configuration 6-23
discovering 6-29
displaying 6-28
displaying in DHCP snooping binding table 17-5
dynamic
learning
6-22
removing 6-24
in ACLs 26-20
static
adding
6-27
allowing 6-28