Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide, Rel. 12.2(25)SEF1

8-10
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Chapter 8 Configuring Interface Characteristics
Configuring Ethernet Interfaces
This example shows how to delete the interface-range macro enet_list and to verify that it was deleted.
Switch# configure terminal
Switch(config)# no define interface-range enet_list
Switch(config)# end
Switch# show run | include define
Switch#
Configuring Ethernet Interfaces
These sections contain this configuration information:
Default Ethernet Interface Configuration, page 8-10
Configuring Interface Speed and Duplex Mode, page 8-11
Configuring IEEE 802.3x Flow Control, page 8-15
Configuring Auto-MDIX on an Interface, page 8-16
Adding a Description for an Interface, page 8-17
Default Ethernet Interface Configuration
Table 8-1 shows the Ethernet interface default configuration. For more details on the VLAN parameters
listed in the table, see Chapter 10, “Configuring VLANs.” For details on controlling traffic to the port,
see Chapter 19, “Configuring Port-Based Traffic Control.”
Table 8-1 Default Layer 2 Ethernet Interface Configuration
Feature Default Setting
Allowed VLAN range VLANs 1 to 4094.
Default VLAN (for access ports) VLAN 1.
Native VLAN (for IEEE 802.1Q
trunks)
VLAN 1.
VLAN trunking Switchport mode dynamic auto (supports DTP).
Port enable state All ports are enabled.
Port description None defined.
Speed Autonegotiate.
Duplex mode Autonegotiate.
Flow control Flow control is set to receive: off. It is always off for sent packets.
EtherChannel (PAgP) Disabled on all Ethernet ports. See Chapter 28, “Configuring
EtherChannels and Layer 2 Trunk Failover.”
Port blocking (unknown multicast
and unknown unicast traffic)
Disabled (not blocked). See the “Configuring Port Blocking”
section on page 19-6.
Broadcast, multicast, and unicast
storm control
Disabled. See the “Default Storm Control Configuration” section
on page 19-3.
Protected port Disabled. See the “Configuring Protected Ports” section on
page 19-5.