Specifications
Index
IN-19
Catalyst 2970 Switch Software Configuration Guide
78-15462-03
protected 19-5
secure 19-7
static-access 11-3, 11-11
switch 9-2
trunks 11-3, 11-15
VLAN assignments 11-11
port security
aging
19-13
and QoS trusted boundary 27-34
configuring 19-10
default configuration 19-9
described 19-7
displaying 19-15
on trunk ports 19-11
sticky learning 19-8
violations 19-8
with other features 19-9
port-shutdown response, VMPS 11-26
preferential treatment of traffic
See QoS
preventing unauthorized access
7-1
priority
overriding CoS
13-5
trusting CoS 13-5
private VLAN edge ports
See protected ports
privileged EXEC mode
2-2
privilege levels
changing the default for lines
7-9
command switch 5-21
exiting 7-10
logging into 7-10
mapping on member switches 5-21
overview 7-2, 7-8
setting a command with 7-8
protected ports 1-6, 19-5
pruning, VTP
enabling
12-13
enabling on a port 11-21
examples 12-5
overview 12-4
pruning-eligible list
changing
11-21
for VTP pruning 12-4
VLANs 12-14
PVST+
802.1Q trunking interoperability
14-10
described 14-9
instances supported 14-9
Q
QoS
auto-QoS
categorizing traffic
27-18
configuration and defaults display 27-26
configuration guidelines 27-22
described 27-18
disabling 27-23
displaying generated commands 27-23
displaying the initial configuration 27-26
effects on running configuration 27-22
egress queue defaults 27-19
enabling for VoIP 27-23
example configuration 27-24
ingress queue defaults 27-19
list of generated commands 27-20
basic model 27-3
classification
class maps, described
27-7
defined 27-3
flowchart 27-6
forwarding treatment 27-3
in frames and packets 27-2
IP ACLs, described 27-5, 27-7
MAC ACLs, described 27-5, 27-7
options for IP traffic 27-5
options for non-IP traffic 27-5