|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration |
|
|
Предметный указатель |
(*, G) common shared tree structure
(S, G) shortest path tree structure
56/64-kbps CSU/DSU back-to-back connections
802.1Q trunking, native VLAN, switching
802.1Q trunks, voice traffic transport
802.1Q, GVRP, configuring 2nd
802.1Q, GVRP, dynamic VLAN creation 2nd
802.1Q, GVRP, example configuration 2nd
802.1X port authentication, configuring 2nd 3rd
abbreviated commands, typing
Access layer functionality
access layer, QoS, applying to voice traffic 2nd 3rd 4th 5th
access ports
accessing switches, permit lists 2nd 3rd 4th
accessing, modules
accessing, switch devices, authentication 2nd 3rd 4th 5th 6th
accessing, switch devices, SSH 2nd 3rd
ACEs (Access Control Entries)
ACLs, VLAN ACLs 2nd
ACLs, VLAN ACLs, COS configuration 2nd
ACLs, VLAN ACLs, IOS configuration 2nd 3rd
activating, MISTP instances 2nd
active commands, disabling
adding, entries to switching table
addresses, IP multicast, well-known 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
adjacency table (CEF)
adjacency table, displaying contents
AF (Assured Forwarding) service levels
aggressive mode (UDLD)
aging time (switching table), setting
alias commands
applying, QoS policies 2nd 3rd 4th 5th 6th
assigned ICMP type codes 2nd 3rd 4th 5th 6th 7th 8th
assigned IP protocol numbers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
assigning VLAN ports, dynamic 2nd 3rd 4th
assigning VLAN ports, static 2nd
assigning VLAN ports, verifying
assigning, IP management address
assigning, static switching table entries
assigning, traffic to QoS policies 2nd 3rd 4th 5th 6th
assigning, traffic to QoS policies, class maps 2nd
asynchronous back-to-back connections
ATM LANE, configuring 2nd 3rd 4th 5th 6th
ATM LANE, displaying information 2nd
ATM LANE, example configuration 2nd
Authentication 2nd 3rd
authentication, configuring 2nd
authentication, example configuration 2nd
authentication, RADIUS, configuring 2nd
authentication, TACACSconfiguring 2nd
authorization, passwords, recovering 2nd
authorization, privileged passwords, configuring
authorization, user-level passwords, configuring
auto trunking mode (COS)
autoconfig
automatic IP management address assignment
back-to-back connections, 56/64-kbps CSU/DSU
back-to-back connections, asynchronous
back-to-back connections, Ethernet
back-to-back connections, T1/E1 CSU/DSU 2nd
backward compatibility, alias commands
banners, character limitations
banners, configuring 2nd
banners, example configuraiton
BID (bridge ID)
blocking state (STP)
boot parameters, synchronizing 2nd
booting from ROM Monitor
booting, images from Flash 2nd
BPDU Filtering
BPDU Skewing
BPDUs, TC bit set
bridged virtual interfaces, configuring 2nd 3rd
bridged virtual interfaces, subinterfaces:configuring 2nd 3rd
bridged virtual interfaces, verifying configuration
broadcast domains, design principles
broadcast suppression 2nd
broadcast suppression, configuring 2nd 3rd
broadcast suppression, time-based
broadcast suppression, verifying configuration
building blocks of network design 2nd
building blocks of network design, redundancy 2nd
BUS (Broadcast and Unknown Server)
cabling, maximum distances 2nd
card modules, Supervisor redundancy
Catalyst 2900MXLseries switches
Catalyst 2950 series switch 2nd
Catalyst 3500XL
Catalyst 3500XL switches, private edge VLANs, creating 2nd
Catalyst 3550 series switch
Catalyst 4000 series switch 2nd
Catalyst 5000 series switches
Catalyst 6000 series switch
CDP (Cisco Discovery Protocol), configuring 2nd 3rd
CEF, configuring 2nd 3rd
CEF, displaying information 2nd 3rd 4th
CEF, tables 2nd 3rd
CGMP (Cisco Group Management Protocol), configuring 2nd
CGMP (Cisco Group Management Protocol), displaying information 2nd
CGMP (Cisco Group Management Protocol), example
changing VTP versions 2nd
character limitations of banners
Cisco IOS, trunking modes 2nd
class maps, QoS 2nd
classification, Layer 2 frames 2nd
classification, Layer 3 frames 2nd
clearing modules
clearing, module configurations
closing, Telnet sessions
collapsed core design
collecting, RMON statistics 2nd
command history 2nd
command line (IOS), regular expressions 2nd
command set (ROM Monitor) 2nd 3rd
commands, editing
commands, help
commands, output, filtering
commands, ping, verifying packet reachability 2nd 3rd
commands, recalling 2nd
commands, session, accessing modules
commands, set length 2nd
commands, show modules
commands, switchport trunk encapsulation
commands, traceroute, router discovery 2nd 3rd 4th
community string values, configurign SNMP access
community VLANs, creating
compact mode (SFM)
config-sync mode (MSFC) 2nd 3rd 4th 5th 6th
config-sync mode (MSFC), displaying information 2nd
configuration mode (IOS)
configuring, broadcast suppression 2nd 3rd
configuring, broadcast suppression, verification
configuring, CDP 2nd 3rd
configuring, CEF 2nd 3rd
configuring, CGMP 2nd
configuring, default gateways
configuring, DNS services 2nd
configuring, FlexWAN module 2nd
configuring, GMRP 2nd 3rd
configuring, GVRP 2nd
configuring, GVRP, dynamic VLAN creation 2nd
configuring, GVRP, example 2nd
configuring, HSRP 2nd 3rd
configuring, HTTP services 2nd
configuring, IDSM 2nd 3rd 4th 5th 6th 7th 8th
configuring, IGMP snooping 2nd 3rd
configuring, IOS, Web browser interface 2nd
configuring, IP management address 2nd
configuring, Layer 2 interface, EtherChannel 2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, Layer 2 interface, Ethernet 2nd 3rd 4th 5th 6th 7th 8th 9th
| configuring, Layer 2 interface, port selection 2nd 3rd 4th
configuring, Layer 2 interface, switching table 2nd 3rd 4th 5th 6th 7th 8th
configuring, Layer 2 interface, Token Ring 2nd 3rd 4th 5th 6th
configuring, Layer 2 interfaces, ATM LANE 2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, Layer 3 EtherChannels 2nd 3rd 4th
configuring, Layer 3 Ethernet interfaces 2nd 3rd 4th
configuring, Layer 3 routing tables 2nd
configuring, Layer 3 routing tables, route verification
configuring, Layer 3 switching 2nd 3rd
configuring, MLS 2nd 3rd
configuring, MLS, external routers 2nd 3rd
configuring, MSFC, config-sync mode 2nd 3rd 4th 5th 6th
configuring, MSFC, SRM 2nd 3rd 4th
configuring, NAM 2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, NDE 2nd
configuring, packet tracing 2nd 3rd
configuring, passwords, privileged
configuring, passwords, user-lvel
configuring, permit lists 2nd
configuring, permit lists, example 2nd
configuring, port authentication 2nd 3rd
configuring, port security 2nd
configuring, port security, verifying configuration
configuring, power-supply redundancy 2nd 3rd
configuring, private VLANs 2nd 3rd
configuring, protocol filtering, verifying configuration
configuring, QoS, class maos 2nd
configuring, QoS, congestion avoidance 2nd
configuring, QoS, data exports 2nd 3rd 4th
configuring, QoS, example 2nd 3rd 4th 5th 6th
configuring, QoS, ingress port queues 2nd 3rd 4th 5th
configuring, QoS, on Catalyst 2900XL/3500XL 2nd
configuring, QoS, policers 2nd 3rd 4th 5th 6th
configuring, QoS, policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
configuring, QoS, port-based traffic classification 2nd 3rd 4th 5th 6th 7th 8th
configuring, RGMP 2nd
configuring, SFM 2nd
configuring, SLB 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
configuring, SLB firewall load balancing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
configuring, SLB firewall load balancing, example 2nd 3rd 4th 5th 6th
configuring, SLB, DFP 2nd 3rd
configuring, SLB, example 2nd 3rd 4th 5th 6th
configuring, SLB, probes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
configuring, SLB, sticky connections 2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, SNMP 2nd
configuring, SNMP, access 2nd 3rd 4th 5th 6th 7th
configuring, SNMP, example 2nd
configuring, SNMP, notifications 2nd 3rd
configuring, SNMP, RMON support 2nd
configuring, SPAN 2nd
configuring, SPAN, destination port
configuring, SPAN, example 2nd
configuring, SPAN, RSPAN 2nd 3rd 4th 5th
configuring, SPAN, source 2nd
configuring, SSH 2nd 3rd
configuring, STP 2nd 3rd 4th 5th 6th 7th
configuring, STP, timers 2nd 3rd 4th 5th
configuring, Supervisor Engine, banners 2nd
configuring, Supervisor Engine, prompts
configuring, switch authentication 2nd
configuring, switch authentication, RADIUS 2nd
configuring, switch authentication, TACACS 2nd
configuring, system time 2nd 3rd 4th
configuring, terminal screen length 2nd
configuring, trunking 2nd 3rd
configuring, trunking, example 2nd
configuring, trunks, encapsulation method 2nd
configuring, trunks, identifying trunk link
configuring, trunks, removing VLANs from trunk link 2nd
configuring, VLAN ACLs 2nd
configuring, VLAN ACLs, COS configuration 2nd
configuring, VLAN ACLs, IOS configuration 2nd 3rd
configuring, VLAN interfaces 2nd 3rd 4th
configuring, VLAN interfaces, bridged virtual interfaces 2nd 3rd 4th 5th 6th
configuring, VLANs, dynamic port assignment 2nd 3rd 4th
configuring, VLANs, example port assignment 2nd 3rd
configuring, VLANs, static port assignment 2nd
configuring, VLANs, verifying port assignment 2nd
configuring, voice 2nd 3rd 4th 5th
configuring, voice modules on Catalyst 4000/4224 2nd
configuring, voice modules on Catalyst 6000 2nd
configuring, voice, access layer 2nd 3rd 4th 5th 6th
configuring, voice, core layer 2nd 3rd
configuring, voice, distribution layer 2nd 3rd
configuring, voice, IP phone support 2nd
configuring, VTP 2nd 3rd 4th 5th
configuring, VTP, changing versions 2nd
configuring, VTP, example 2nd
configuring, VTP, modes 2nd
configuring, VTP, pruning 2nd
configuring, VTP, setting passwords 2nd
configuring, VTP, verifying operation
configuring, WAN interfaces, FlexWAN 2nd
configuring, WAN interfaces, Gigabit Ethernet 2nd
configuring, WAN interfaces, POS 2nd
configuring, WAN interfaces, VIP2 2nd 3rd
congestion avoidance, thresholds 2nd
connections, back-to-back, 56/64-kbps CSU/DSU
connections, back-to-back, asynchronous
connections, back-to-back, Ethernet
connections, back-to-back, T1/E1 CSU/DSU 2nd
connector pinouts
context-sensitive help, IOS 2nd
controlling traffic, protocol filtering, verifying configuration
COPS (Common Open Policy Service) 2nd 3rd 4th
copying, system files 2nd
Core layer functionality
core layer, QoS, applying to voice traffic 2nd 3rd
COS (Catalyst Operating System) 2nd
COS switches, ATM LANE, configuring 2nd 3rd 4th 5th 6th 7th
COS switches, ATM LANE, displaying information 2nd
COS switches, ATM LANE, example 2nd
COS switches, EtherChannel, configuring 2nd 3rd 4th 5th 6th 7th
COS switches, EtherChannel, displaying information
COS switches, Layer 2 port selection 2nd
COS switches, Layer 2 port selection, example
COS switches, Token Ring, configuring 2nd 3rd 4th 5th 6th
COS switches, Token Ring, displaying information
COS, command history 2nd
COS, commands, editing
COS, context-sensitive help
COS, GVRP, configuring 2nd
COS, GVRP, dynamic VLAN creation 2nd
COS, GVRP, example configuration 2nd
COS, modes 2nd
COS, refreshing input
COS, session timeout values, configuring
COS, STP, configuring 2nd 3rd 4th 5th 6th 7th
COS, syntax checking 2nd
COS, Telnet sessions, closing
COS, trunking modes 2nd
COS, VLANs, creating
COS, VTP off mode
COS-based switches, Ethernet, configuring 2nd 3rd 4th 5th 6th 7th
COS-based switches, Ethernet, displaying information 2nd
creating, community VLANs
creating, isolated VLANs
creating, private edge VLANs 2nd
creating, traffic policers 2nd 3rd 4th 5th 6th
creating, VLANs 2nd 3rd 4th 5th
creating, VLANs, example 2nd
creating, VLANs, extended range 2nd
creating, VLANs, standard range 2nd
databases, VTP, configuring 2nd
databases, VTP, domain name, specifying
databases, VTP, dynamic VLAN configuration 2nd 3rd 4th
date and time, system calendar configuration
debouncing, port state changes
default destination port, defining for switching table
default gateways, configuring
|
|
|
Реклама |
|
|
|