Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] AAA clients creating verifying configuring confirming management access configuring optimizing 2nd servers connecting hosts support configuring 2nd switches configuring AAA (authentication, authorization, and accounting) configuring 2nd aaa accounting command aaa authentication command aaa authentication dot1x command aaa authorization command accelerated CEF (aCEF). [See also CEF] access confirming devices 2nd configuring 2nd interfaces VLANs management 2nd 3rd AAA 2nd 3rd configuring 2nd protcols 2nd reducing vulnerabilities 2nd restricting 2nd networks 2nd ports connecting privileged mode Telnet restricting 2nd testing traffic filtering 2nd VLAN configuration mode VLANs configuring Access layer 2nd configuring 2nd QoS 2nd switches 2nd access layer configuration 2nd 3rd 4th Access port (VLAN) accounting planning aCEF (accelerated CEF). [See also CEF] ACLs MLS architecture adding static routes USA addresses BIA IP 12trace command configuring load sharing MAC 12trace command enabling reduction 2nd load sharing addressing GDA multicast adjacency tables viewing administration VLAN 2nd administrative groups advertisements VTP 2nd agents mapping configuring aggregate basis aggregate policers, creating aggregation bandwidth 2nd 3rd PAgP 2nd aging algorithms STA transparent bridging 2nd allocation internal bandwidth application-specific integrated circuits (ASICs) 2nd applications prerequisites 2nd QoS 2nd DiffServ model functions 2nd implementing 2nd models architecture Catalyst 4000 router module Catalyst 6000/6500 switches 2nd collapsed backbone 2nd inter-VLAN routing 2nd Layer 3 hardware-based 2nd MLS point-to-point architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th 106th 107th 108th 109th 110th 111th 112th 113th 114th 115th 116th 117th 118th 119th 120th 121st 122nd 123rd 124th 125th 126th 127th 128th 129th 130th 131st 132nd 133rd 134th 135th 136th 137th 138th 139th 140th 141st 142nd 143rd 144th 145th 146th 147th 148th 149th 150th 151st 152nd 153rd 154th 155th 156th 157th 158th 159th 160th 161st 162nd 163rd 164th 165th 166th 167th 168th 169th 170th 171st 172nd 173rd 174th 175th 176th 177th 178th 179th 180th 181st 182nd 183rd 184th 185th 186th 187th 188th router-on-a-stick 2nd selecting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th 106th 107th 108th 109th 110th 111th 112th 113th 114th 115th 116th 117th 118th 119th 120th 121st 122nd 123rd 124th 125th 126th 127th 128th 129th 130th 131st 132nd 133rd 134th 135th 136th 137th 138th 139th 140th 141st 142nd 143rd 144th 145th 146th 147th 148th 149th 150th 151st 152nd 153rd 154th 155th 156th 157th 158th 159th 160th 161st 162nd 163rd 164th 165th 166th 167th 168th 169th 170th 171st 172nd 173rd 174th 175th 176th 177th 178th 179th 180th 181st 182nd 183rd 184th 185th 186th 187th 188th ASICs (application-specific integrated circuits) 2nd asserts PIM dense mode assignment ports VLAN router ports asymmetric routing. [See also routing] attacks DoS VTP audio multicast routing 2nd addressing forwarding 2nd IGMP IP 2nd LAN 2nd 3rd 4th auditing exec events authentication 802.1x configuring 2nd planning login configuring NTP configuring switches AAA user-leve authentication, authorization, and accounting. [See AAA] authenticaton planning authorization levels defining planning privilege levels TACACS+ servers testing auto mode auto-negotiation 2nd 3rd Ethernet delays trunking 2nd Auto-RP configuring 2nd autosensing availability collapsed backbone architecture EtherChannel LAN multilayer LAN |