beautypg.com

Blade ICE G8000 User Manual

Page 145

background image

RackSwitch G8000 Application Guide

Index

„

145

BMD00041, November 2008

RSA keys

........................................................... 35

RSTP

................................................................. 80

S

security

port mirroring

............................................. 140

RADIUS authentication

................................. 26

TACACS+ authentication

.............................. 30

VLANs

....................................................... 47

segmentation. See IP subnets.
segments. See IP subnets.
service ports

........................................................ 97

SNMP

................................................................ 20

HP-OpenView

.............................................. 20

Source-Specific Multicast

.................................. 131

spanning tree

configuration rules

........................................ 65

Spanning-Tree Protocol

multiple instances

......................................... 84

SSH

configuring

.................................................. 34

RSA host and server keys

.............................. 35

statistical load distribution

.................................... 64

switch ports VLANs membership

......................... 50

T

TACACS+

.......................................................... 30

authentication

............................................... 30

tagging. See VLANs tagging.
TCP

................................................................... 97

technical terms

port VLAN identifier (PVID)

......................... 51

tagged frame

................................................ 51

tagged member

............................................. 51

untagged frame

............................................. 51

untagged member

......................................... 51

VLAN identifier (VID)

.................................. 51

text conventions

................................................... 13

Trunk Hash algorithm

.......................................... 69

Trunking

configuration rules

........................................ 65

typographic conventions

....................................... 13

U

UDP

................................................................... 97

UFD

................................................................. 136

Uplink Failure Detection

.................................... 136

user account

........................................................ 29

V

Virtual Local Area Networks. See VLANs.
VLANs

broadcast domains

......................................... 47

configuration rules

........................................ 65

default PVID

................................................ 50

example showing multiple VLANs

.................. 56

ID numbers

.................................................. 49

IP interface configuration

............................. 126

multiple spanning trees

.................................. 74

multiple VLANs

........................................... 51

port members

................................................ 50

PVID

........................................................... 50

routing

....................................................... 124

security

........................................................ 47

Spanning-Tree Protocol

................................. 74

tagging

............................................... 50 to 57

topologies

.................................................... 55