Cisco Catalyst Blade Switch 3120 for HP Software Configuration Guide

Index
IN-34
Cisco Catalyst Blade Switch 3120 for HP Software Configuration Guide
OL-12247-01
port security (continued)
enabling
25-17
on trunk ports 25-13
sticky learning 25-8
violations 25-9
with other features 25-10
port-shutdown response, VMPS 12-29
power management TLV 27-6
preemption, default configuration 20-5
preemption delay, default configuration 20-5
preferential treatment of traffic
See QoS
prefix lists, BGP
38-57
preventing unauthorized access 7-1
primary links 20-2
primary VLANs 15-1, 15-3
priority
HSRP
40-7
overriding CoS 14-6
trusting CoS 14-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
15-4
and SDM template 15-4
and SVIs 15-5
and switch stacks 15-5
benefits of 15-1
community ports 15-2
community VLANs 15-2, 15-3
configuration guidelines 15-7, 15-8
configuration tasks 15-6
configuring 15-10
default configuration 15-6
end station access to 15-3
IP addressing 15-3
isolated port 15-2
isolated VLANs 15-2, 15-3
mapping 15-14
private VLANs (continued)
monitoring
15-15
ports
community
15-2
configuration guidelines 15-8
configuring host ports 15-11
configuring promiscuous ports 15-13
isolated 15-2
promiscuous 15-2
primary VLANs 15-1, 15-3
promiscuous ports 15-2
secondary VLANs 15-2
subdomains 15-1
traffic in 15-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines
7-9
exiting 7-9
logging into 7-9
overview 7-2, 7-7
setting a command with 7-8
promiscuous ports
configuring
15-13
defined 15-2
protected ports 1-8, 25-5
protocol-dependent modules, EIGRP 38-37
Protocol-Independent Multicast Protocol
See PIM
provider edge devices
38-66
provisioning new members for a switch stack 5-9
proxy ARP
configuring
38-12
definition 38-10
with IP routing disabled 38-12
pruning, VTP
disabling
in VTP domain
13-14
on a port 12-24