Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] identifying loops identity idle sessions disconnecting 2nd timeouts configuring IEEE 802.1d version of STP. [See also STP] IGMP fast-leave processing 2nd multicasting Querier snooping 2nd 3rd IGMP Membership Report message images EMI operating system downlaoding operating systems recovering corrupt upgrading SMI implementation CEF control planes data planes QoS 2nd redundant multilayer topology 2nd VLAN Catalyst switches 2nd CatOS implementing VLAN 2nd in-band management interfaces indirect failures STP infrastructure Layer 2 configuring connecting 2nd inter-VLAN routing 2nd management 2nd ports 2nd QoS 2nd security 2nd spanning tree 2nd switching 2nd VLAN 2nd switching security. [See also security] VLAN 2nd ingress port queues, viewing initial management access installation Catalyst switches 2nd instances CST Inter-Switch Link. [See ISL] inter-VLAN Layer 2 infrastructure configuring inter-VLAN routing architecture 2nd configuring 2nd 3rd 4th Layer 2 configuring 2nd packet flow 2nd 3rd 4th Switch-A/Switch-B 2nd interconnections switches 2nd trunking 2nd VTP 2nd interconnections. [See also connections] interface FastEthernet 0/0.x command interface global configuration command interface range command 2nd interface vlan 1 global configuration command interface VLAN 200 command interface VLAN 300 command interface vlan global configuration command interface VLAN x global configuration mode command interfaces Cisco IOS creating VLANs 2nd CLI in-band management IOS disabling 2nd verifying transparent bridging 2nd VLAN Layer 2 configuring Layer 3 configuring management configuring management. [See also management] MLS configuring out-of-band managment physical ping command ping connectivity verifying 2nd ranges routed configuring 2nd 3rd 4th sc0 security 2nd configuring 2nd optimizing AAA 2nd SVI 2nd 3rd SVU Switch-A switchport interface configuration VLANs internal bandwidth allocation interoperability snooping interswitch trunks configuring interval keyword Intrusion detection system module (WS-SVC-IDS2BUNK9) IOS 2nd disabling DTP/PAgP DNS configuring 2nd EtherChannel 2nd file management flow control Gigabit Ethernet hard coding speed and duplex settings IP addressing configuring IP telephony service 2nd NTP authentication password recovery 2nd passwords configuring PortFast RSPAN secure management protocols SNMP SPAN spanning tree delays speed switches security switchport host interface configuration macro 2nd SYSLOG traceroute mac command traceroute mac ip command VTP disabling 2nd IOS interfaces transparent bridging verifying 2nd VLAN IP addresses 12trace command connections verifying IOS telephony service 2nd multicast addressing multicasting 2nd parameters configuring routing configuring 2nd MSFC Switch-A routing tables verifying tools 2nd CDP Layer 2 traceroute 2nd ping utility traceroute 2nd IP addressing configuring ip default-gateway command ip default-gateway global configuration command ip domain-lookup command ip igmp join-group command ip igmp snooping global configuration command 2nd ip multicast-routing global configuration command ip name-server command IP Phones connecting ip pim dense-mode command ip pim interface configuration command 2nd ip pim rp-address command ip pim send-rp-announce global configuration command ip pim send-rp-discovery global configuration command ip route global configuration command ip routing command IPSec virtual private network (VPN) services module (WS-SVC-IPSEC-1) isers creating ISL encapsulations 2nd ISL (Inter-Switch Link) |