Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] packets tracing 2nd 3rd example 2nd passwords privileged configuring recovering 2nd on IOS devices 2nd 3rd setting for VTP 2nd user-level configuring path costs STP 2nd pause frames permanently deleting files from Flash permit lists configuring 2nd example 2nd PHBs (per-hop behavior) ping command verifying packet reachability 2nd 3rd pinouts policers creating 2nd 3rd 4th 5th 6th policies QoS 2nd 3rd 4th 5th 6th applying 2nd 3rd 4th 5th 6th COPS 2nd 3rd 4th defining 2nd 3rd 4th policing traffic port authentication configuring 2nd 3rd port numbers well-known 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th port security configuring 2nd example 2nd verifying configuration violations port-based traffic classification 2nd 3rd 4th 5th 6th 7th 8th ports Layer 2 selecting 2nd 3rd 4th trunking 2nd 3rd 4th ports (VLAN) dynamic assignment 2nd 3rd 4th verifying static assignment 2nd example 2nd 3rd verifying POS interfaces configuring 2nd power allocations voice ports 2nd power-supply redundancy configuring 2nd displaying information powering modules on/off Prefix field (NSAP addresses) primary Supervisor changing backup Supervisor configuration 2nd private edge VLANs creating 2nd private VLANs configuring 2nd 3rd example configuration 2nd 3rd 4th verifying operation privileged EXEC mode (IOS) privileged mode (COS) privileged passwords configuring recovering probes traceroute 2nd 3rd prompts configuring example configuration protected ports creating private edge VLANs 2nd protocol filtering example 2nd 3rd verifying configuration pruning VTP 2nd |