A SERVICE OF

logo

Index
IN-25
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
IRDP
configuring
38-13
definition 38-13
support for 1-12
ISL
and IPv6
39-3
and trunk ports 11-3
encapsulation 1-8, 13-16
trunking with IEEE 802.1 tunneling 17-5
isolated port 16-2
isolated VLANs 16-2, 16-3
J
join messages, IGMP 24-3
K
KDC
described
9-32
See also Kerberos
keepalive messages
18-2
Kerberos
authenticating to
boundary switch
9-34
KDC 9-34
network services 9-35
configuration examples 9-32
configuring 9-35
credentials 9-32
cryptographic software image 9-32
described 9-32
KDC 9-32
operation 9-34
realm 9-33
Kerberos (continued)
server
9-33
support for 1-10
switch as trusted third party 9-32
terms 9-33
TGT 9-34
tickets 9-32
key distribution center
See KDC
L
l2protocol-tunnel command 17-13
LACP
Layer 2 protocol tunneling
17-9
See EtherChannel
Layer 2 frames, classification with CoS
36-2
Layer 2 interfaces, default configuration 11-21
Layer 2 protocol tunneling
configuring
17-10
configuring for EtherChannels 17-14
default configuration 17-11
defined 17-8
guidelines 17-12
Layer 2 traceroute
and ARP
45-18
and CDP 45-17
broadcast traffic 45-17
described 45-17
IP addresses and subnets 45-18
MAC addresses and VLANs 45-17
multicast traffic 45-17
multiple devices on a port 45-18
unicast traffic 45-17
usage guidelines 45-17