Configuration manual

Index
IN-35
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
port VLAN ID TLV 28-2
power management TLV 28-2, 28-7
preemption, default configuration 21-8
preemption delay, default configuration 21-8
preferential treatment of traffic
See QoS
prefix lists, BGP 38-57
preventing unauthorized access 8-1
primary links 21-2
primary VLANs 16-1, 16-3
priority
HSRP 40-8
overriding CoS 15-6
trusting CoS 15-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches 16-4
and SDM template 16-4
and SVIs 16-5
and switch stacks 16-5
benefits of 16-1
community ports 16-2
community VLANs 16-2, 16-3
configuration guidelines 16-7, 16-8
configuration tasks 16-6
configuring 16-10
default configuration 16-6
end station access to 16-3
IP addressing 16-3
isolated port 16-2
isolated VLANs 16-2, 16-3
mapping 16-14
monitoring 16-15
ports
community 16-2
configuration guidelines 16-8
configuring host ports 16-11
configuring promiscuous ports 16-13
private VLANs (continued)
isolated 16-2
promiscuous 16-2
primary VLANs 16-1, 16-3
promiscuous ports 16-2
secondary VLANs 16-2
subdomains 16-1
traffic in 16-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines 8-9
exiting 8-9
logging into 8-9
overview 8-2, 8-7
setting a command with 8-8
promiscuous ports
configuring 16-13
defined 16-2
protected ports 1-9, 26-6
protocol-dependent modules, EIGRP 38-37
Protocol-Independent Multicast Protocol
See PIM
provider edge devices 38-77
provisioning new members for a switch stack 6-9
proxy ARP
configuring 38-12
definition 38-10
with IP routing disabled 38-13
proxy reports 21-3
pruning, VTP
disabling
in VTP domain 14-14
on a port 13-24
enabling
in VTP domain 14-14
on a port 13-23
examples 14-5
overview 14-4