Index
IN-34
Cisco Catalyst Blade Switch 3120 for HP Software Configuration Guide
OL-12247-01
port security (continued)
enabling
25-17
on trunk ports
25-13
sticky learning
25-8
violations
25-9
with other features
25-10
port-shutdown response, VMPS
12-29
power management TLV
27-6
preemption, default configuration
20-5
preemption delay, default configuration
20-5
preferential treatment of traffic
See QoS
prefix lists, BGP
38-57
preventing unauthorized access
7-1
primary links
20-2
primary VLANs
15-1, 15-3
priority
HSRP
40-7
overriding CoS
14-6
trusting CoS
14-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches
15-4
and SDM template
15-4
and SVIs
15-5
and switch stacks
15-5
benefits of
15-1
community ports
15-2
community VLANs
15-2, 15-3
configuration guidelines
15-7, 15-8
configuration tasks
15-6
configuring
15-10
default configuration
15-6
end station access to
15-3
IP addressing
15-3
isolated port
15-2
isolated VLANs
15-2, 15-3
mapping
15-14
private VLANs (continued)
monitoring
15-15
ports
community
15-2
configuration guidelines
15-8
configuring host ports
15-11
configuring promiscuous ports
15-13
isolated
15-2
promiscuous
15-2
primary VLANs
15-1, 15-3
promiscuous ports
15-2
secondary VLANs
15-2
subdomains
15-1
traffic in
15-5
privileged EXEC mode
2-2
privilege levels
changing the default for lines
7-9
exiting
7-9
logging into
7-9
overview
7-2, 7-7
setting a command with
7-8
promiscuous ports
configuring
15-13
defined
15-2
protected ports
1-8, 25-5
protocol-dependent modules, EIGRP
38-37
Protocol-Independent Multicast Protocol
See PIM
provider edge devices
38-66
provisioning new members for a switch stack
5-9
proxy ARP
configuring
38-12
definition
38-10
with IP routing disabled
38-12
pruning, VTP
disabling
in VTP domain
13-14
on a port
12-24