Specifications

Comparing VC and VMware Networking Technology...........................................................................32
Virtual Connect’s Loop Prevention Technology.......................................................................................35
Stacking Virtual Connect Ethernet Modules.............................................................................................35
Optimizing Virtual Connect Stacking Links............................................................................................36
VC Managed MAC Addresses....................................................................................................................37
Spanning Tree.....................................................................................................................................................38
PortFast.............................................................................................................................................................39
BPDU Guard ....................................................................................................................................................39
Unidirectional Link Detection (UDLD)..........................................................................................................39
Quality of Service ...............................................................................................................................................40
Security.................................................................................................................................................................40
ACLs & VLAN ACLs.........................................................................................................................................40
Port Security.....................................................................................................................................................41
Private VLANs..................................................................................................................................................42
Multicast & IGMP Snooping..............................................................................................................................43
SPAN (Port Monitoring)......................................................................................................................................43
Logging................................................................................................................................................................44
Centralized User Access Control (LDAP)........................................................................................................44
Cisco Discovery Protocol (CDP) ......................................................................................................................44
Additional Resources.........................................................................................................................................45
About the Author ...............................................................................................................................................45
Appendixes .........................................................................................................................................................46
Appendix A: Description of VC Network Diagram...................................................................................46
Appendix B: c3000 Port Mapping Diagram ..............................................................................................47
Appendix C: Frequently Asked Questions.................................................................................................48