Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] EAPOL (Extensible Authentication Protocol over LAN edge ports, RSTP 2nd EF (Expedited Forwarding) election processes Designated Ports Root Bridges Root Ports enable mode (CatOS) enabling BPDU guard as default GLBP loop guard as default MST PortFast root guard UDLD VTP pruning end-to-end VLANs, deploying enterprise composite network model core block collapsed core block dual core block enterprise edge block network management block server farm block service provider edge block switch block distribution layer sizing enterprise edge block 2nd enterprise networks, designing erase flash command erasing startup-config files errdisable detect cause command errisable state EtherChannel active parameters, displaying bundled ports configuring hashing algorithm LACP load balancing configuring verifying effectiveness of negotiation protocols LACP PAgP PAgP redundancy traffic distribution troubleshooting XOR operation Ethernet 10 Gigabit Ethernet 10 Mbps Ethernet cabling, distance limitations CSMA/CD Fast Ethernet autonegotiation backward-compatibility cabling specifications FEC FibreChannel full-duplex full-duplex operation GbE, port cables Gigabit Ethernet half-duplex operation switch block connections examples TCAM tables VTP configuration exploits, VLAN hopping extended-range VLANs |