Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] packets flow inter-VLAN routing 2nd 3rd 4th unicast PAgP disabling negotiation 2nd negotiation delays PAgP (Port Aggregation Protocol) 2nd parameters booting configuring dia hello IP configuring Layer 2 configuring 2nd 3rd 4th 5th lockout login MLS configuring physical ports 2nd portvlancost QoS configuring secondary security configuring timeout VLAN 2nd passwords configuring 2nd creating encryption recovery 2nd VTP paths RPF peers PAgP Per-VLAN spanning tree (Cisco PVST +) performance collapsed backbone architecture EtherChannel LAN LAN segmentation 2nd Layer 3 switching multilayer LAN permanent keyword permit lists, configuring PFC configuring PFC (Policy feature card) PFC (policy feature card) Catalyst 6000/6500 switches physical interfaces 2nd Switch-A physical site surveys perfroming 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th 106th 107th 108th 109th 110th 111th 112th 113th 114th 115th 116th 117th 118th 119th 120th 121st 122nd 123rd 124th 125th 126th 127th 128th 129th 130th 131st 132nd 133rd 134th 135th 136th 137th 138th 139th 140th 141st 142nd 143rd 144th 145th 146th 147th 148th 149th 150th 151st 152nd 153rd 154th 155th 156th 157th 158th 159th 160th 161st 162nd 163rd 164th 165th 166th 167th 168th 169th 170th 171st 172nd 173rd 174th 175th 176th 177th 178th 179th 180th 181st 182nd 183rd 184th 185th 186th 187th 188th physical trunks Switch-B PIM dense mode configuring 2nd neighbor discovery tasks 2nd trees 2nd unicasting PIM sparse mode configuring 2nd tasks 2nd trees 2nd PIM sparse-dense mode configuring pimdvmrp option ping connectivity testing 2nd verifying 2nd ping command 2nd interfaces starting ping ip command ping utility pirts disabling placement root bridge 2nd 3rd secondary planning 802.1x authentication accounting authentication authorization EtherChannel configuration 2nd inter-VLAN routing configuration 2nd 3rd 4th port security trunk configuration 2nd VTP configuration 2nd platforms Catalyst switches 2nd MLS support point-to-point architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th 106th 107th 108th 109th 110th 111th 112th 113th 114th 115th 116th 117th 118th 119th 120th 121st 122nd 123rd 124th 125th 126th 127th 128th 129th 130th 131st 132nd 133rd 134th 135th 136th 137th 138th 139th 140th 141st 142nd 143rd 144th 145th 146th 147th 148th 149th 150th 151st 152nd 153rd 154th 155th 156th 157th 158th 159th 160th 161st 162nd 163rd 164th 165th 166th 167th 168th 169th 170th 171st 172nd 173rd 174th 175th 176th 177th 178th 179th 180th 181st 182nd 183rd 184th 185th 186th 187th 188th policies QoS. [See also QoS] Policy feature card (PFC) policy feature card (PFC) Catalyst 6000/6500 switches Port Aggregation Protocol (PAgP) 2nd port-channel load-balance global configuration mode command PortFast BPDU Filter configuring 2nd BPDU guard configuring 2nd configuring 2nd enabling ports access connnecting auto-negotiation 2nd cost 2nd density (Layer 3 switching) designating disabling errDisable status 2nd forwarding state gigabit Switch-B Gigabit Ethernet configuring ingress queues viewing Layer 2 configuring 2nd Layer 2 infrastructure configuring 2nd LEDs testing physical parameters 2nd priorities 2nd routers assigning security configuring 2nd enabling planning spanning tree listening/learning 2nd spanning tree states startup delays 2nd VLAN assigning portvlancost value prerequisites configuration 2nd priorities ports 2nd private keys creating private VLANs configuring privilege command privileged access mode 2nd privileges levels configuring propagation CDP messages protocols CDP 2nd 3rd CGMP configuring 2nd DISL DTP 2nd 3rd 4th GVRP HSRP 2nd 3rd configuring 2nd IGMP multicasting snooping 2nd 3rd IP multicast addressing multicasting 2nd management access 2nd MLSP negotiation delays 2nd NTP PAgP 2nd RSTP security configuring SNMP STP 2nd BackboneFast 2nd BPDU Filter 2nd BPDUs 2nd configuring root bridges 2nd creating loop-free topologies 2nd load sharing 2nd multilayer design 2nd new features 2nd PortFast 2nd root guard 2nd troubleshooting 2nd Uplinkfast 2nd SYSLOG configuring 2nd TFTP VRRP VTP 2nd 3rd configuring 2nd protocolsHSRP proxy reporting prune eligible lists configuring pruning PIM dense mode VTP 2nd pruning trunks 2nd public keys creating punt adjacency |