Index
IN-13
Catalyst 2940 Switch Software Configuration Guide
78-15507-02
ports
access
9-2
dynamic access 13-3
priority 24-2
protected 17-4
secure 17-5
static-access 13-3, 13-10
switch 9-1
trunks 13-11
VLAN assignments 13-10
port security
aging
17-10
configuring 17-7
default configuration 17-7
described 17-5
displaying 17-12
sticky learning 17-5
violations 17-6
with other features 17-7
port-shutdown response, VMPS 13-22
preferential treatment of traffic
See QoS
preventing unauthorized access
7-1
priority
overriding CoS
15-5
port, described 24-2
trusting CoS 15-5
private VLAN edge ports
See protected ports
privileged EXEC mode
2-2
privilege levels
changing the default for lines
7-8
command switch 5-22
exiting 7-9
logging into 7-9
mapping on member switches 5-22
overview 7-2, 7-7
setting a command with 7-7
protected ports 1-2, 17-4
pruning, VTP
enabling
14-13
enabling on a port 13-17
examples 14-5
overview 14-4
pruning-eligible list
changing
13-17
for VTP pruning 14-4
VLANs 14-13
PSTN 1-10
publications, related xxi
PVST+ 13-2
802.1Q trunking interoperability 11-10
described 11-9
instances supported 11-9
Q
QoS
classification
in frames and packets
24-2
pass-through mode, described 24-8
trusted boundary, described 24-6
configuring
CoS and WRR
24-8
default port CoS value 24-6
egress queues 24-8
port trust states within the domain 24-4
trusted boundary 24-7
default configuration 24-3
ingress port scheduling 24-3
IP phones, detection and trusted settings 24-6
overview 24-1
pass-through mode 24-8
support for 1-4
trusted boundary 24-6
understanding 24-1
quality of service
See QoS