|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration |
|
|
Предметный указатель |
SLB, sticky connections, configuring 2nd 3rd 4th 5th 6th 7th 8th 9th
SNMP, access, configuring 2nd 3rd 4th 5th 6th
SNMP, configuration files, saving
SNMP, configuring 2nd
SNMP, displaying information
SNMP, example 2nd
SNMP, notifications, traps 2nd
SNMP, RMON support 2nd
SPAN (Switched Port Analyzer), configuring 2nd
SPAN (Switched Port Analyzer), destination port, configuring
SPAN (Switched Port Analyzer), displaying information 2nd
SPAN (Switched Port Analyzer), example 2nd
SPAN (Switched Port Analyzer), RSPAN, configuring 2nd 3rd 4th 5th
SPAN (Switched Port Analyzer), source, configuring 2nd
Spanning Tree MAC reduction, enabling on extended range VLANs 2nd
SRM (single router mode), configuring 2nd 3rd
SRM (single router mode), displaying information
SSH (Secure Shell), configuring 2nd 3rd
SSRP (Simple Server Redundancy Protocol)
standard VLANs, creating 2nd
standby Supervisor, system redundancy
state parameter, Ethernet VLANs, configuring
static port assignment (VLANs) 2nd
static port assignment, example 2nd 3rd
static port assignment, verifying
static switching table entries, assigning
statistics, QoS, exporting 2nd 3rd 4th
sticky connections 2nd 3rd 4th 5th 6th 7th 8th 9th
STP (Spanning Tree Protocol)
STP Root Guard, enabling
STP, BID
STP, BPDUs, TC bit set
STP, configuring 2nd 3rd 4th 5th 6th 7th
STP, convergence tuning 2nd 3rd 4th 5th
STP, displaying information
STP, election processes
STP, example 2nd
STP, examples
STP, improving stability
STP, load balancing, examples 2nd
STP, path costs 2nd
STP, port states
STP, tiebreakers 2nd
STP, topology changes 2nd
STP, topology navigation 2nd 3rd 4th 5th
Supervisor Engine, banners, configuring 2nd
Supervisor Engine, boot parameter, synchronizing 2nd
Supervisor Engine, forcing changes in backup Supervisor 2nd
Supervisor Engine, high availability, versioning 2nd 3rd
Supervisor Engine, IOS images, synchronizing 2nd
Supervisor Engine, prompts, configuring
Supervisor Engine, system redundancy
suppressing, broadcasts 2nd 3rd 4th 5th
suppressing, broadcasts, time-based
suppressing, broadcasts, verifying configuration
switch authentication, configuring 2nd
switch authentication, example 2nd
switch authentication, RADIUS, configuring 2nd
switch authentication, TACACS, configuring 2nd
switch operating systems, Cisco IOS
switch operating systems, COS 2nd
switch ports, path costsshortmode, default port cost 2nd
switch ports, STP states
switched networks, design principles 2nd 3rd 4th 5th 6th
switches, booting in rommon mode
switching table, aging time, configuring
switching table, configuring
switching table, default destination port, defining
switching table, displaying information
switching table, example configuration 2nd 3rd
switching table, removing entries
switching VTP versions 2nd
switchport trunk encapsulation command
synchronizing, boot parameters 2nd
synchronizing, IOS images 2nd
synchronous logging
syntax checking (COS) 2nd
syntax, show commands
syslog server, message logging 2nd 3rd 4th
syslog server, message logging, displaying information 2nd
syslog server, message logging, rate-limiting
syslog server, message logging, severity level 2nd
syslog server, message logging, severity levels 2nd
syslog server, message logging, time stamping
syslog server, message logging, to terminal sessions 2nd
system time, example configuration
system time, manual configuration 2nd 3rd 4th
T1/E1 CSU/DSU back-to-back connections 2nd
TACACS, configuring 2nd
TCN BPDUs 2nd
Telnet, closing sessions
Telnet, SSH, configuring 2nd 3rd
temperature monitoring 2nd
terminal screen length, configuring 2nd
terminal sessions, IOS 2nd
terminal sessions, IOS, configuring timeout values 2nd
terminal sessions, IOS, displaying
terminal sessions, IOS, ending
terminal sessions, IOS, resuming
terminal sessions, IOS, screen format
tiebreakers (STP) 2nd
time stamping, syslog messages
time zone, configuring
time-based broadcast suppression
timeout values, IOS terminal sessions, configuring 2nd
timers, GARP
timers, STP convergence tuning 2nd 3rd 4th 5th
token bucket algorithm
Token Ring, configuring 2nd 3rd 4th
Token Ring, displaying information
Token Ring, example configuration 2nd
topology changes (STP) 2nd
ToS (Type of Service) byte
traceroute command, router discovery 2nd 3rd 4th
tracing packets, example 2nd
tracing, packets 2nd 3rd
traffic, broadcast suppression 2nd
traffic, broadcast suppression, configuring 2nd 3rd
traffic, broadcast suppression, time-based
traffic, broadcast suppression, verifying configuration
traffic, controlling with protocol filtering, verifying configuration
traffic, load balancing, SLB 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th
traffic, out-of-profile
traffic, policing 2nd 3rd 4th 5th 6th 7th
traffic, QoS policies 2nd 3rd 4th 5th 6th
traffic, QoS policies, applying 2nd 3rd 4th 5th 6th
traffic, QoS policies, class maps 2nd
traffic, QoS policies, defining 2nd 3rd 4th
traffic, restricting with VLAN ACLs 2nd
traffic, restricting with VLAN ACLs, COS configuration 2nd
traffic, restricting with VLAN ACLs, IOS configuration 2nd 3rd
transferring, system files 2nd
traps (SNMP) 2nd
truncated mode (SFM)
trunking, configuring 2nd 3rd
trunking, DTP, disabling
trunking, encapsulation method, specifying 2nd
trunking, example 2nd
trunking, identifying trunk link
trunking, removing VLANs from trunk lins 2nd
trunking, verifying VLAN port assignments
trunking, VTP, changing modes 2nd
trunking, VTP, changing versions 2nd
trunking, VTP, configuring 2nd 3rd
| trunking, VTP, example 2nd
trunking, VTP, pruning 2nd
trunking, VTP, server mode
trunking, VTP, setting passwords 2nd
trunking, VTP, verifying operation
trunks, 802.1Q, voice traffic transport
trunks, scaling
tuning, egress scheduling 2nd
tuning, ingress port queues 2nd 3rd 4th 5th
type codes, Ethernet 2nd 3rd 4th 5th 6th 7th 8th 9th
UDLD (Unidirectional Link Detection)
unicast packets, flooding suppression
upgrading, IDSM hardware 2nd 3rd
uplink failover of switched networks
usage errors (COS) 2nd
user interface, COS, features
user interface, IOS, features 2nd
user mode (COS)
user modes, IOS Software 2nd
user-level passwords, configuring
user-level passwords, recovering 2nd
VACLs, example 2nd
verifying, broadcast suppression configuration
verifying, Layer 3 EtherChannel configuration 2nd
verifying, Layer 3 Ethernet interface configuration
verifying, Layer 3 routing table routes
verifying, port security
verifying, private VLAN operation
verifying, STP operation 2nd 3rd 4th 5th
verifying, VLAN interface configuration
verifying, VLAN port assignments
verifying, VTP operation
verifying, WAN interface configuration
versioning Supervisor Engine 2nd 3rd
versions of VTP, switching 2nd
viewing, ATM LANE information 2nd
viewing, CEF information 2nd 3rd 4th
viewing, CGMP information 2nd
viewing, EtherChannel information 2nd
viewing, file system devices 2nd 3rd
viewing, GMRP information 2nd
viewing, HSRP information
viewing, IDSM information 2nd
viewing, IGMP snooping information 2nd
viewing, installed modules
viewing, Layer 2 information 2nd
viewing, MLS information 2nd 3rd
viewing, module configurations
viewing, MSFC config-sync mode information 2nd
viewing, NAM information
viewing, NDE information
viewing, QoS information 2nd
viewing, QoS management information
viewing, RGMP information
viewing, SFM information
viewing, SLB information 2nd
viewing, SNMP information
viewing, SPAN information 2nd
viewing, SRM information
viewing, STP information
viewing, switching table information
viewing, Token Ring information
viewing, voice module information
viewing, voice port information
VIP2 WAN interfaces, configuring 2nd 3rd
VLAN database mode (IOS)
VLAN interfaces, bridged virtual interfaces, configuring 2nd 3rd
VLAN interfaces, bridged virtual interfaces, subinterface configuration 2nd 3rd
VLAN interfaces, configuring 2nd 3rd
VLAN interfaces, example configuration
VLAN interfaces, verifying configuration
VLAN, ACLs 2nd
VLAN, ACLs, COS configuration 2nd
VLAN, ACLs, IOS configuration 2nd 3rd
VLANs, creating 2nd 3rd 4th 5th
VLANs, creating for COS devices
VLANs, creating, example 2nd
VLANs, Ethernet, configurable parameters
VLANs, extended range, creating 2nd
VLANs, extending with IRB 2nd 3rd 4th
VLANs, ports, dynamic assignment 2nd 3rd 4th
VLANs, ports, static assignment 2nd
VLANs, ports, verifying assignment 2nd
VLANs, private edge VLANs, creating 2nd
VLANs, private VLANs, configuring 2nd 3rd
VLANs, private VLANs, example configuration 2nd 3rd 4th
VLANs, private VLANs, verifying operation
VLANs, standard range, creating 2nd
VLANs, trunking, configuring 2nd 3rd
VLANs, trunking, example 2nd
VLANs, trunking, identifying trunk link
VLANs, trunking, removing VLANs from trunk link 2nd
VLANs, trunking, specifying encapsulation method 2nd
VLANs, VTP, changing versions 2nd
VLANs, VTP, configuring 2nd 3rd 4th 5th
VLANs, VTP, example configuration 2nd
VLANs, VTP, pruning 2nd
VLANs, VTP, server mode
VLANs, VTP, setting passwords 2nd
VLANs, VTP, smodes 2nd
VLANs, VTP, verifying operation
VMPS (VLAN Membership Policy Server), client configuration 2nd
VMPS (VLAN Membership Policy Server), server configuration 2nd
voice modules, Catalyst 4000 access gateway, configuring 2nd
voice modules, Catalyst 6000, configuring 2nd
voice modules, displaying information
voice ports, displaying information
voice ports, power allocations 2nd
voice, access layer configuration
voice, configuring 2nd 3rd 4th 5th
voice, IP phone support, example 2nd
voice, over 802.1Q trunks
voice, QoS 2nd
voice, QoS, access layer configuration 2nd 3rd 4th 5th
voice, QoS, core layer configuration 2nd 3rd
voice, QoS, distribution layer configuration 2nd 3rd
VTP (VLAN Trunking Protocol), configuring 2nd 3rd 4th 5th
VTP (VLAN Trunking Protocol), example configuration 2nd
VTP (VLAN Trunking Protocol), modes 2nd
VTP (VLAN Trunking Protocol), pruning 2nd
VTP (VLAN Trunking Protocol), setting passwords 2nd
VTP (VLAN Trunking Protocol), verifying operation
VTP (VLAN Trunking Protocol), versions, changing 2nd
VTP, domain name, specifying
VTP, domain names
VTP, off mode (COS)
VTP, server mode
WAN interfaces, configuring
WAN interfaces, example configuration 2nd
WAN interfaces, FlexWAN, configuring 2nd
WAN interfaces, Gigabit Ethernet, configuring 2nd
WAN interfaces, POS, configuring 2nd
WAN interfaces, verifying configuration
WAN interfaces, VIP2, configuring 2nd 3rd
Web browser interface, configuring 2nd
well-known numbers, Ethernet type codes 2nd 3rd 4th 5th 6th 7th 8th 9th
well-known numbers, ICMP type codes 2nd 3rd 4th 5th 6th 7th 8th
well-known numbers, IP multicast addresses 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
well-known numbers, IP port numbers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
well-known numbers, IP protocol numbers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
XOR (exclusive-OR) operation
xtocid162851
xtocid171941
xtocid275601
xtocid48951
|
|
|
Реклама |
|
|
|
|
|
|