Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide, Rel. 12.2(25)SEF1
Index
IN-12
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
management 1-3
monitoring 8-19
naming 8-17
physical, identifying 8-6
range of 8-7
restarting 8-20
shutting down 8-20
speed and duplex, configuring 8-14
status 8-19
supported 8-6
types of 8-1
interfaces range macro command 8-8
interface types 8-6
Inter-Switch Link
See ISL
Intrusion Detection System
See IDS appliances
IP ACLs
for QoS classification
27-7
implicit deny 26-8, 26-12
implicit masks 26-8
named 26-13
undefined 26-18
IP addresses
discovering
5-26
ip igmp profile command 18-24
IP information
assigned
manually
3-10
through DHCP-based autoconfiguration 3-3
default configuration 3-3
IP phones
and QoS
12-1
automatic classification and queueing 27-20
configuring 12-4
ensuring port security with QoS 27-37
trusted boundary for QoS 27-37
IP precedence 27-2
IP-precedence-to-DSCP map for QoS 27-60
IP traceroute
executing
29-13
overview 29-12
IPv4 ACLs
applying to interfaces
26-18
extended, creating 26-9
named 26-13
standard, creating 26-8
ISL
and trunk ports
8-3
encapsulation 1-5, 10-14
J
join messages, IGMP 18-3
K
KDC
described
6-32
See also Kerberos
Kerberos
authenticating to
boundary switch
6-34
KDC 6-34
network services 6-35
configuration examples 6-32
configuring 6-35
credentials 6-32
cryptographic software image 6-32
described 6-32
KDC 6-32
operation 6-34
realm 6-33
server 6-33
support for 1-6
switch as trusted third party 6-32