Configuration manual
Index
IN-32
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
passwords
default configuration 8-2
disabling recovery of 8-5
encrypting 8-3
for security 1-9
overview 8-1
recovery of 47-3
setting
enable 8-3
enable secret 8-3
Telnet 8-6
with usernames 8-6
VTP domain 14-8
path cost
MSTP 19-21
STP 18-20
path MTU discovery 39-4
PBR
defined 38-100
enabling 38-102
fast-switched policy-based routing 38-103
local policy-based routing 38-103
peers, BGP 38-60
percentage thresholds in tracked lists 42-6
performance, network design 1-18
performance features 1-4
persistent self-signed certificate 8-43
per-user ACLs and Filter-Ids 10-8
per-VLAN spanning-tree plus
See PVST+
PE to CE routing, configuring 38-86
physical ports 11-2
PIM
default configuration 44-11
dense mode
overview 44-4
rendezvous point (RP), described 44-5
RPF lookups 44-9
displaying neighbors 44-62
PIM (continued)
enabling a mode 44-14
overview 44-4
router-query message interval, modifying 44-38
shared tree and source tree, overview 44-35
shortest path tree, delaying the use of 44-37
sparse mode
join messages and shared tree 44-5
overview 44-5
prune messages 44-5
RPF lookups 44-9
stub routing
enabling 44-23
overview 44-5
support for 1-13
versions
interoperability 44-11
troubleshooting interoperability problems 44-35
v2 improvements 44-4
PIM-DVMRP, as snooping method 24-9
ping
character output description 47-12
executing 47-11
overview 47-11
policed-DSCP map for QoS 36-62
policers
configuring
for each matched traffic class 36-48
for more than one traffic class 36-58
described 36-4
displaying 36-78
number of 36-33
types of 36-9
policing
described 36-4
hierarchical
See hierarchical policy maps
token-bucket algorithm 36-9