HP 6125G HP 6125G & 6125G/XG Blade Switches Layer 2 - LAN Switching Co - Page 229

Index

Page 229 highlights

Index A B C D E G I L M O P Q R S T V A Assigning a port to the isolation group,48 B BPDU tunneling configuration examples,96 C Configuration guidelines,18 Configuration prerequisites,134 Configuration procedure,213 Configuration procedure,18 Configuration procedure,126 Configuration restrictions and guidelines,126 Configuration restrictions and guidelines,213 Configuration restrictions and guidelines,35 Configuring a loopback interface,15 Configuring a null interface,16 Configuring a port to operate in automatic voice VLAN assignment mode,135 Configuring a port to operate in manual voice VLAN assignment mode,136 Configuring an aggregate interface,38 Configuring an aggregation group,35 Configuring an MST region,66 Configuring basic QinQ,158 Configuring basic settings of a VLAN interface,102 Configuring basic settings of an Ethernet interface,2 Configuring basic VLAN settings,101 Configuring CDP compatibility,203 Configuring cut-through forwarding,216 Configuring destination multicast MAC address for BPDUs,95 Configuring Digest Snooping,79 Configuring edge ports,72 Configuring flow control on an Ethernet interface,4 Configuring GVRP functions,146 Configuring IP subnet-based VLANs,121 Configuring jumbo frame support,7 Configuring link change suppression on an Ethernet interface,5 Configuring LLDP to advertise a specific voice VLAN,204 Configuring LLDP trapping,206 Configuring load sharing for link aggregation groups,40 Configuring loopback testing on an Ethernet interface,6 Configuring MAC Information mode,27 Configuring MAC-based VLANs,110 Configuring No Agreement Check,81 Configuring one-to-one VLAN mapping,179 Configuring one-to-two VLAN mapping,181 Configuring path costs of ports,73 Configuring port-based VLANs,104 Configuring protection functions,84 Configuring protocol-based VLANs,117 Configuring QoS priority settings for voice traffic on an interface,134 Configuring selective QinQ,159 Configuring spanning tree timers,70 Configuring static, dynamic, and blackhole MAC address table entries,20 Configuring storm control on an Ethernet interface,12 Configuring storm suppression,8 Configuring TC snooping,83 Configuring the aging timer for dynamic MAC address entries,22 Configuring the device priority,68 Configuring the GARP timers,147 Configuring the interval for sending Syslog or trap messages,27 Configuring the MAC Information queue length,27 Configuring the management Ethernet interface,1 Configuring the maximum hops of an MST region,69 Configuring the maximum port rate,71 Configuring the mode a port uses to recognize or send MSTP packets,76 220

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231

220
Index
A
B
C
D
E
G
I
L
M
O
P
Q
R
S
T
V
A
Assigning a port to the isolation group,
48
B
BPDU tunneling configuration examples,
96
C
Configuration guidelines,
18
Configuration prerequisites,
134
Configuration procedure,
213
Configuration procedure,
18
Configuration procedure,
126
Configuration restrictions and guidelines,
126
Configuration restrictions and guidelines,
213
Configuration restrictions and guidelines,
35
Configuring a loopback interface,
15
Configuring a null interface,
16
Configuring a port to operate in automatic voice VLAN
assignment mode,
135
Configuring a port to operate in manual voice VLAN
assignment mode,
136
Configuring an aggregate interface,
38
Configuring an aggregation group,
35
Configuring an MST region,
66
Configuring basic QinQ,
158
Configuring basic settings of a VLAN interface,
102
Configuring basic settings of an Ethernet interface,
2
Configuring basic VLAN settings,
101
Configuring CDP compatibility,
203
Configuring cut-through forwarding,
216
Configuring destination multicast MAC address for
BPDUs,
95
Configuring Digest Snooping,
79
Configuring edge ports,
72
Configuring flow control on an Ethernet interface,
4
Configuring GVRP functions,
146
Configuring IP subnet-based VLANs,
121
Configuring jumbo frame support,
7
Configuring link change suppression on an Ethernet
interface,
5
Configuring LLDP to advertise a specific voice
VLAN,
204
Configuring LLDP trapping,
206
Configuring load sharing for link aggregation
groups,
40
Configuring loopback testing on an Ethernet
interface,
6
Configuring MAC Information mode,
27
Configuring MAC-based VLANs,
110
Configuring No Agreement Check,
81
Configuring one-to-one VLAN mapping,
179
Configuring one-to-two VLAN mapping,
181
Configuring path costs of ports,
73
Configuring port-based VLANs,
104
Configuring protection functions,
84
Configuring protocol-based VLANs,
117
Configuring QoS priority settings for voice traffic on an
interface,
134
Configuring selective QinQ,
159
Configuring spanning tree timers,
70
Configuring static, dynamic, and blackhole MAC
address table entries,
20
Configuring storm control on an Ethernet interface,
12
Configuring storm suppression,
8
Configuring TC snooping,
83
Configuring the aging timer for dynamic MAC address
entries,
22
Configuring the device priority,
68
Configuring the GARP timers,
147
Configuring the interval for sending Syslog or trap
messages,
27
Configuring the MAC Information queue length,
27
Configuring the management Ethernet interface,
1
Configuring the maximum hops of an MST region,
69
Configuring the maximum port rate,
71
Configuring the mode a port uses to recognize or send
MSTP packets,
76