This document describes how to use the command-line interface of Cisco switches to configure features. It discusses the different command modes for accessing commands, including user EXEC mode, privileged EXEC mode, global configuration mode, and interface configuration mode. It provides examples of commands used to move between modes and lists some common commands in each mode.
The document discusses management and configuration tools for the AT-8000S device, including:
- The CLI, telnet, EWS, and SNMP can be used to connect and manage the device locally or remotely.
- The CLI has a hierarchical structure with different command modes for general, interface-specific, and other configurations. Help commands are available to view valid commands in each mode.
- System information like uptime, MAC address, temperature sensors can be displayed using the "show system" command.
- The flash memory stores software images and configuration files that can be managed through the file system.
The document provides instructions for configuring Cisco 2600 routers, including:
- Describing the Cisco IOS operation modes and how to navigate between them.
- Explaining how to configure IP addresses and interfaces.
- Detailing how to configure the RIP and OSPF routing protocols, including commands to specify parameters.
- Providing guidance on configuration files, router IDs, and virtual links.
Switching devices can be connected and configured using various cable types and ports. The console port allows local configuration, while auxiliary ports allow remote configuration via modem connections. Network ports use straight-through or crossover cables depending on the device type at each end. The Cisco IOS software uses modes like user EXEC, privileged EXEC, global configuration, and interface configuration to manage and monitor devices. Basic commands show running configurations, interface details, MAC addresses, and switch status.
This document provides a guide to the command line interface (CLI) for the AP 7181 Access Point. It describes how to connect to the CLI through the serial port or Telnet, lists common admin and network commands, and covers configuration of network, system, and statistical settings and features through the CLI.
Cisco routers have different command modes including user EXEC, privileged EXEC, global configuration, and interface configuration modes. Each mode provides access to different commands. Common routing protocols like RIP, OSPF, IGRP, and BGP can be configured through commands in global and router configuration modes. The status of router interfaces and links can be checked using LED indicators on the router and connected transceivers.
HKG15-400: Next steps in KVM enablement on ARMLinaro
HKG15-400: Next steps in KVM enablement on ARM
---------------------------------------------------
Date: February 12, 2015
---------------------------------------------------
★ Session Summary ★
Next steps in KVM enablement on ARM
--------------------------------------------------
★ Resources ★
Pathable: https://hkg15.pathable.com/meetings/250827
Video: https://www.youtube.com/watch?v=g8noeSpWVDY
Etherpad: http://pad.linaro.org/p/hkg15-400
---------------------------------------------------
★ Event Details ★
Linaro Connect Hong Kong 2015 - #HKG15
February 9-13th, 2015
Regal Airport Hotel Hong Kong Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
This document provides an overview of the Cisco IOS Release 12.0(5)XP Enterprise Edition Software. The Enterprise Edition Software provides advanced VLAN, QoS, and other features compared to the standard edition. It supports up to 250 VLANs on 3500 XL and 2900 XL modular switches, and 64 VLANs on 2900 XL fixed switches. The Enterprise Edition Software features include IEEE 802.1p QoS, VTP Version 2, trunking protocols, dynamic VLANs, load sharing, STP UplinkFast, and TACACS+. Supported switches can be upgraded to the Enterprise Edition Software by purchasing an upgrade kit. The Enterprise features can be managed through the Cisco IOS CLI, Cisco
The document discusses management and configuration tools for the AT-8000S device, including:
- The CLI, telnet, EWS, and SNMP can be used to connect and manage the device locally or remotely.
- The CLI has a hierarchical structure with different command modes for general, interface-specific, and other configurations. Help commands are available to view valid commands in each mode.
- System information like uptime, MAC address, temperature sensors can be displayed using the "show system" command.
- The flash memory stores software images and configuration files that can be managed through the file system.
The document provides instructions for configuring Cisco 2600 routers, including:
- Describing the Cisco IOS operation modes and how to navigate between them.
- Explaining how to configure IP addresses and interfaces.
- Detailing how to configure the RIP and OSPF routing protocols, including commands to specify parameters.
- Providing guidance on configuration files, router IDs, and virtual links.
Switching devices can be connected and configured using various cable types and ports. The console port allows local configuration, while auxiliary ports allow remote configuration via modem connections. Network ports use straight-through or crossover cables depending on the device type at each end. The Cisco IOS software uses modes like user EXEC, privileged EXEC, global configuration, and interface configuration to manage and monitor devices. Basic commands show running configurations, interface details, MAC addresses, and switch status.
This document provides a guide to the command line interface (CLI) for the AP 7181 Access Point. It describes how to connect to the CLI through the serial port or Telnet, lists common admin and network commands, and covers configuration of network, system, and statistical settings and features through the CLI.
Cisco routers have different command modes including user EXEC, privileged EXEC, global configuration, and interface configuration modes. Each mode provides access to different commands. Common routing protocols like RIP, OSPF, IGRP, and BGP can be configured through commands in global and router configuration modes. The status of router interfaces and links can be checked using LED indicators on the router and connected transceivers.
HKG15-400: Next steps in KVM enablement on ARMLinaro
HKG15-400: Next steps in KVM enablement on ARM
---------------------------------------------------
Date: February 12, 2015
---------------------------------------------------
★ Session Summary ★
Next steps in KVM enablement on ARM
--------------------------------------------------
★ Resources ★
Pathable: https://hkg15.pathable.com/meetings/250827
Video: https://www.youtube.com/watch?v=g8noeSpWVDY
Etherpad: http://pad.linaro.org/p/hkg15-400
---------------------------------------------------
★ Event Details ★
Linaro Connect Hong Kong 2015 - #HKG15
February 9-13th, 2015
Regal Airport Hotel Hong Kong Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
This document provides an overview of the Cisco IOS Release 12.0(5)XP Enterprise Edition Software. The Enterprise Edition Software provides advanced VLAN, QoS, and other features compared to the standard edition. It supports up to 250 VLANs on 3500 XL and 2900 XL modular switches, and 64 VLANs on 2900 XL fixed switches. The Enterprise Edition Software features include IEEE 802.1p QoS, VTP Version 2, trunking protocols, dynamic VLANs, load sharing, STP UplinkFast, and TACACS+. Supported switches can be upgraded to the Enterprise Edition Software by purchasing an upgrade kit. The Enterprise features can be managed through the Cisco IOS CLI, Cisco
The document provides information on Cisco IOS modes of operation including:
- User EXEC mode allows basic commands and is the initial mode when connecting. Privileged EXEC requires a password and has additional commands.
- Global configuration mode allows modifying system-wide settings and is accessed from privileged EXEC. Interface configuration customizes individual interfaces.
- IP addresses are configured by entering interface configuration mode and using the ip address command. Routing protocols like RIP and OSPF are configured in global mode by specifying networks and other options.
Cisco routers have different command modes including user EXEC, privileged EXEC, global configuration, and interface configuration modes. Each mode provides access to different commands. Common routing protocols like RIP, OSPF, IGRP, and BGP can be configured through commands in global and router configuration modes. The status of router interfaces and links can be checked using LED indicators on the router and connected transceivers.
The document provides information on Cisco IOS modes of operation including:
- User EXEC mode allows basic commands and is the initial mode when connecting. Privileged EXEC requires a password and has additional commands.
- Global configuration mode allows modifying system-wide settings and is accessed from privileged EXEC. Interface configuration customizes individual interfaces.
- IP addresses are configured by entering interface configuration mode and using the ip address command. Routing protocols like RIP and OSPF are configured in global mode by specifying router commands and network numbers.
The document provides an overview of configuring a network operating system using Cisco IOS. It discusses accessing Cisco IOS devices through the console port or remotely using Telnet or SSH. It describes the command line interface and command structure of Cisco IOS, including different modes like privileged EXEC mode, global configuration mode, and interface configuration mode. It also covers setting the hostname, limiting access, saving configurations, and verifying connectivity between devices on the network.
The document describes configuring and managing the MAC address table on a switch. Key steps include:
1. Configuring the switch with a hostname, passwords, and IP address.
2. Viewing the MAC addresses learned by the switch and clearing the dynamic addresses.
3. Determining that pinging hosts causes their MAC addresses to be relearned by the switch, increasing the number of dynamic addresses in the MAC table.
General lab documentation~cisco router configurationsayedatif
The document provides information about Cisco router configuration including:
- Cisco IOS software uses different command modes like user EXEC, privileged EXEC, global configuration, and interface configuration modes to access commands.
- It describes how to configure IP addresses, routing protocols like RIP, OSPF, IGRP, and BGP.
- It also covers getting help, working with configuration files, and monitoring router and link status using LED indicators.
Router connects different networks located at geographical locations. It has various interfaces like Ethernet, Serial and supports protocols like RIP, OSPF for dynamic routing. The document provides details about Cisco router components, configuration, interfaces, routing protocols, troubleshooting commands and backup/restoration process using TFTP server.
The document provides information on configuring Cisco routers, including:
- Cisco IOS software uses different command modes to access groups of commands, including user EXEC, privileged EXEC, and configuration modes.
- IP addresses, routing protocols, and other settings are configured in privileged EXEC or configuration modes using commands like interface, ip address, router rip/ospf/eigrp, and more.
- Router and link status can be checked using LED indicators on ports and transceiver modules.
This document provides information about the Cisco IOS command "cluster order". It begins by explaining that this command is used to arrange the order of cluster members as displayed in the Cluster Manager application. The syntax of the command is described, noting that it takes a "line" argument followed by member numbers separated by commas without spaces. Default behavior and usage guidelines are also provided, along with an example of how to change the order of members using this command.
The document introduces Cisco IOS software which controls routing and switching functions on Cisco routers and switches. It describes the purpose of IOS which provides basic routing, switching, security and scalability. It also outlines the command line interface environment and modes, and how to establish connections and configure router interfaces such as Ethernet, serial and ISDN interfaces.
The document provides instructions for configuring initial settings on a Cisco network device using Cisco IOS software, including configuring hostnames, limiting access to device configurations through passwords, and saving the running configuration. It describes assigning a unique hostname, securing privileged EXEC mode with the enable secret password, securing the console and virtual terminal lines with passwords and login, and using the service password-encryption command to encrypt passwords.
This chapter describes how to configure VLAN trunking on Fast Ethernet and Gigabit Ethernet ports to transmit VLAN traffic between switches. It discusses the different trunking methods (ISL and 802.1Q), how to configure a port as a trunk port and define the allowed VLANs on the trunk, and considerations for 802.1Q trunking. The chapter also contains sections on how VLAN trunks work and using STP for load sharing on trunk links.
The document provides instructions for configuring a Cisco network device using Cisco IOS. It discusses setting the hostname, limiting access by configuring passwords for privileged EXEC, console, and VTY lines. It also covers encrypting passwords in the startup-config and running-config files using the service password-encryption command and adding banner messages.
IBM Easy-Connect provides simplified networking capabilities for IBM PureFlex systems. It operates in either transparent mode or multi-chassis mode. Transparent mode makes the system appear as a "dumb" switch to the edge switch, eliminating the need for spanning tree protocol. Multi-chassis mode allows traffic consolidation across chassis. Easy-Connect supports both intra-chassis and inter-chassis switching for high performance without requiring complex network integration or configuration. Customer examples show how it can provide simple, redundant, or dedicated uplink connectivity for various workloads.
operating and configuring cisco a cisco IOS devicescooby_doo
The document provides an overview of starting up and configuring a Cisco Catalyst switch and Cisco router. It describes the bootup processes, command modes, and basic configuration steps for each device, including viewing status information, setting the hostname and IP address, and using command-line help features.
This document provides an overview of Cisco router basics including the Cisco IOS, router components, boot sequence, configuration register, router interfaces, passwords, banners, hostname configuration, and commands for checking network connectivity such as ping and traceroute. It describes how to connect to routers via the console port or Telnet, use the command-line interface, and view configurations.
Ch2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptxRIFQIABDULAZIZ6
This document provides an overview of Cisco IOS access methods, navigation, command structure, configuration, and ports/addresses. It discusses the Cisco IOS shell and kernel, access methods like console and SSH, navigating between command modes, command syntax, configuration topics like passwords and banners, saving configurations, and IP addressing fundamentals.
The document discusses Cisco routers and routing concepts. It provides details about Cisco router components, configuration, interfaces, routing protocols like RIP and IGRP, and autonomous systems. Cisco routers range from small access layer routers like the 700 series to large core routers like the 12000 series. Configuration is done through the console port initially and involves tasks like setting the hostname, passwords, interfaces and routing.
The document discusses Cisco IOS user interface functions and configuration modes. It introduces the Cisco IOS command line interface (CLI) which uses commands, modes like user EXEC and privileged EXEC, and configuration modes to configure and manage Cisco devices. The CLI provides help facilities and commands are used to configure devices with settings like hostnames, passwords, and IP addresses. The document concludes with instructions for an introductory lab activity.
El documento describe los contenidos de un curso sobre JDBC y URM. Explica que JDBC se utiliza para el acceso a bases de datos y URM para mapeadores de objetos relacionales. Detalla los conceptos clave de JDBC como drivers, conexión a la base de datos mediante DriverManager, ejecución de sentencias SQL y uso de ResultSet.
El documento describe los contenidos de un curso sobre JDBC y URM. Incluye dos bloques: JDBC para el acceso a bases de datos, y URM para mapeadores de objetos relacionales. Detalla los conceptos clave de JDBC como drivers, operaciones con JDBC, y ejemplos de código para conectarse a una base de datos, enviar consultas y cerrar la conexión. También cubre procedimientos almacenados, transacciones y otras funcionalidades avanzadas de JDBC.
The document provides information on Cisco IOS modes of operation including:
- User EXEC mode allows basic commands and is the initial mode when connecting. Privileged EXEC requires a password and has additional commands.
- Global configuration mode allows modifying system-wide settings and is accessed from privileged EXEC. Interface configuration customizes individual interfaces.
- IP addresses are configured by entering interface configuration mode and using the ip address command. Routing protocols like RIP and OSPF are configured in global mode by specifying networks and other options.
Cisco routers have different command modes including user EXEC, privileged EXEC, global configuration, and interface configuration modes. Each mode provides access to different commands. Common routing protocols like RIP, OSPF, IGRP, and BGP can be configured through commands in global and router configuration modes. The status of router interfaces and links can be checked using LED indicators on the router and connected transceivers.
The document provides information on Cisco IOS modes of operation including:
- User EXEC mode allows basic commands and is the initial mode when connecting. Privileged EXEC requires a password and has additional commands.
- Global configuration mode allows modifying system-wide settings and is accessed from privileged EXEC. Interface configuration customizes individual interfaces.
- IP addresses are configured by entering interface configuration mode and using the ip address command. Routing protocols like RIP and OSPF are configured in global mode by specifying router commands and network numbers.
The document provides an overview of configuring a network operating system using Cisco IOS. It discusses accessing Cisco IOS devices through the console port or remotely using Telnet or SSH. It describes the command line interface and command structure of Cisco IOS, including different modes like privileged EXEC mode, global configuration mode, and interface configuration mode. It also covers setting the hostname, limiting access, saving configurations, and verifying connectivity between devices on the network.
The document describes configuring and managing the MAC address table on a switch. Key steps include:
1. Configuring the switch with a hostname, passwords, and IP address.
2. Viewing the MAC addresses learned by the switch and clearing the dynamic addresses.
3. Determining that pinging hosts causes their MAC addresses to be relearned by the switch, increasing the number of dynamic addresses in the MAC table.
General lab documentation~cisco router configurationsayedatif
The document provides information about Cisco router configuration including:
- Cisco IOS software uses different command modes like user EXEC, privileged EXEC, global configuration, and interface configuration modes to access commands.
- It describes how to configure IP addresses, routing protocols like RIP, OSPF, IGRP, and BGP.
- It also covers getting help, working with configuration files, and monitoring router and link status using LED indicators.
Router connects different networks located at geographical locations. It has various interfaces like Ethernet, Serial and supports protocols like RIP, OSPF for dynamic routing. The document provides details about Cisco router components, configuration, interfaces, routing protocols, troubleshooting commands and backup/restoration process using TFTP server.
The document provides information on configuring Cisco routers, including:
- Cisco IOS software uses different command modes to access groups of commands, including user EXEC, privileged EXEC, and configuration modes.
- IP addresses, routing protocols, and other settings are configured in privileged EXEC or configuration modes using commands like interface, ip address, router rip/ospf/eigrp, and more.
- Router and link status can be checked using LED indicators on ports and transceiver modules.
This document provides information about the Cisco IOS command "cluster order". It begins by explaining that this command is used to arrange the order of cluster members as displayed in the Cluster Manager application. The syntax of the command is described, noting that it takes a "line" argument followed by member numbers separated by commas without spaces. Default behavior and usage guidelines are also provided, along with an example of how to change the order of members using this command.
The document introduces Cisco IOS software which controls routing and switching functions on Cisco routers and switches. It describes the purpose of IOS which provides basic routing, switching, security and scalability. It also outlines the command line interface environment and modes, and how to establish connections and configure router interfaces such as Ethernet, serial and ISDN interfaces.
The document provides instructions for configuring initial settings on a Cisco network device using Cisco IOS software, including configuring hostnames, limiting access to device configurations through passwords, and saving the running configuration. It describes assigning a unique hostname, securing privileged EXEC mode with the enable secret password, securing the console and virtual terminal lines with passwords and login, and using the service password-encryption command to encrypt passwords.
This chapter describes how to configure VLAN trunking on Fast Ethernet and Gigabit Ethernet ports to transmit VLAN traffic between switches. It discusses the different trunking methods (ISL and 802.1Q), how to configure a port as a trunk port and define the allowed VLANs on the trunk, and considerations for 802.1Q trunking. The chapter also contains sections on how VLAN trunks work and using STP for load sharing on trunk links.
The document provides instructions for configuring a Cisco network device using Cisco IOS. It discusses setting the hostname, limiting access by configuring passwords for privileged EXEC, console, and VTY lines. It also covers encrypting passwords in the startup-config and running-config files using the service password-encryption command and adding banner messages.
IBM Easy-Connect provides simplified networking capabilities for IBM PureFlex systems. It operates in either transparent mode or multi-chassis mode. Transparent mode makes the system appear as a "dumb" switch to the edge switch, eliminating the need for spanning tree protocol. Multi-chassis mode allows traffic consolidation across chassis. Easy-Connect supports both intra-chassis and inter-chassis switching for high performance without requiring complex network integration or configuration. Customer examples show how it can provide simple, redundant, or dedicated uplink connectivity for various workloads.
operating and configuring cisco a cisco IOS devicescooby_doo
The document provides an overview of starting up and configuring a Cisco Catalyst switch and Cisco router. It describes the bootup processes, command modes, and basic configuration steps for each device, including viewing status information, setting the hostname and IP address, and using command-line help features.
This document provides an overview of Cisco router basics including the Cisco IOS, router components, boot sequence, configuration register, router interfaces, passwords, banners, hostname configuration, and commands for checking network connectivity such as ping and traceroute. It describes how to connect to routers via the console port or Telnet, use the command-line interface, and view configurations.
Ch2(1)-Konfigurasi Dasar Perangkat, Protokol dan Model-MRL.pptxRIFQIABDULAZIZ6
This document provides an overview of Cisco IOS access methods, navigation, command structure, configuration, and ports/addresses. It discusses the Cisco IOS shell and kernel, access methods like console and SSH, navigating between command modes, command syntax, configuration topics like passwords and banners, saving configurations, and IP addressing fundamentals.
The document discusses Cisco routers and routing concepts. It provides details about Cisco router components, configuration, interfaces, routing protocols like RIP and IGRP, and autonomous systems. Cisco routers range from small access layer routers like the 700 series to large core routers like the 12000 series. Configuration is done through the console port initially and involves tasks like setting the hostname, passwords, interfaces and routing.
The document discusses Cisco IOS user interface functions and configuration modes. It introduces the Cisco IOS command line interface (CLI) which uses commands, modes like user EXEC and privileged EXEC, and configuration modes to configure and manage Cisco devices. The CLI provides help facilities and commands are used to configure devices with settings like hostnames, passwords, and IP addresses. The document concludes with instructions for an introductory lab activity.
El documento describe los contenidos de un curso sobre JDBC y URM. Explica que JDBC se utiliza para el acceso a bases de datos y URM para mapeadores de objetos relacionales. Detalla los conceptos clave de JDBC como drivers, conexión a la base de datos mediante DriverManager, ejecución de sentencias SQL y uso de ResultSet.
El documento describe los contenidos de un curso sobre JDBC y URM. Incluye dos bloques: JDBC para el acceso a bases de datos, y URM para mapeadores de objetos relacionales. Detalla los conceptos clave de JDBC como drivers, operaciones con JDBC, y ejemplos de código para conectarse a una base de datos, enviar consultas y cerrar la conexión. También cubre procedimientos almacenados, transacciones y otras funcionalidades avanzadas de JDBC.
El documento describe conceptos clave de seguridad en aplicaciones Java como criptografía, PKI, control de acceso, SSL y seguridad web. Explica la evolución del modelo de seguridad de Java desde JDK 1.1 hasta la introducción de ficheros de políticas de seguridad y JAAS, y cómo estos definen los permisos de acceso. También cubre temas como la implementación y localización por defecto de los ficheros de políticas de seguridad.
Este documento describe la administración de claves y certificados en aplicaciones Java. Explica las herramientas keytool y JarSigner para gestionar claves y firmar archivos JAR. También describe la infraestructura de clases clave KeyStore para la gestión programática de almacenes de claves.
Este documento describe los conceptos básicos de la criptografía en aplicaciones Java, incluyendo certificados digitales, autoridades certificadoras, el estándar X.509 para certificados y sus extensiones. Explica el formato de los certificados X.509, las funciones de las autoridades certificadoras y algunos ejemplos como FNMT.
Este documento describe la criptografía en aplicaciones Java. Explica el cálculo de huellas digitales usando la clase MessageDigest y los algoritmos hash. También cubre firmas digitales mediante el uso de claves públicas y privadas, describiendo las clases Signature, Mac, SignedObject y excepciones como SignatureException.
Este documento describe la criptografía en aplicaciones Java. Explica los conceptos clave de la arquitectura criptográfica de Java (JCA) y la extensión criptográfica de Java (JCE), incluidos los proveedores, clases engine, claves criptográficas, generación de claves y servicios criptográficos. También cubre temas como la encriptación, firma digital y seguridad en aplicaciones web.
Este documento describe la criptografía en aplicaciones Java. Explica conceptos clave como la seguridad, la evolución del modelo de seguridad de Java, y las características de seguridad en J2EE. También define la criptografía y los sistemas criptográficos simétricos y asimétricos, así como la confidencialidad y la integridad.
Este documento establece las medidas de seguridad que deben aplicarse a los ficheros automatizados que contengan datos personales de acuerdo con tres niveles: básico, medio y alto. Define conceptos clave como sistema de información, usuario, recursos, accesos autorizados, e incidencia. Determina que todos los ficheros deben cumplir como mínimo el nivel básico y especifica cuales deben cumplir nivel medio u alto dependiendo del tipo de datos. Describe las medidas de seguridad de nivel básico como la elaboración de un document
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Your Skill Boost Masterclass: Strategies for Effective Upskilling
21
1. C H A P TER 1
Using the Command-Line Interface
The 2900 and 3500 XL switches are supported by Cisco IOS software. These switches currently
support Cisco IOS Release 12.0(5)XP. This chapter describes how to use the switch command-line
interface (CLI) to configure features added for the switch. For a complete description of the
commands that support these features, see Chapter 2, “Cisco IOS Commands.” For more
information on Cisco IOS Release 12.0, refer to the Cisco IOS Release 12.0 Command Summary.
The switches are preconfigured and begin forwarding packets as soon as they are attached to
compatible devices.
All ports belong by default to virtual LAN (VLAN) 1. Access to the switch itself is also through
VLAN 1, which is the default management VLAN. The management VLAN is configurable. For
management purposes, only devices connected to ports assigned to the management VLAN can
communicate with the switch. This applies to Telnet, web-based management, and SNMP.
Note This manual describes commands used in the standard and Enterprise Edition Software
packages. Commands and features that are available only in the Enterprise Edition Software are
identified; otherwise, the command and feature is supported in both the standard and Enterprise
Edition Software.
Configuration Tasks
You can perform the following configuration tasks on your switches:
• Assign IP information to the switch
• Configure the management VLAN
• Set port features, including creating Fast EtherChannel and Gigabit EtherChannel port groups
• Manage the switch MAC-address table
• Enable the Spanning-Tree Protocol (STP) Port Fast feature
• Enable the Cisco Group Management Protocol (CGMP) Fast Leave feature
• Assign ports for static-access VLAN membership
• Assign ports for multi-VLAN membership
• Configure a command switch
• Build a cluster
• Configure Network Time Protocol (NTP)
Using the Command-Line Interface 1-1
2. Type of Memory
Using the Enterprise Edition Software, you can complete the following configuration tasks:
• Classify traffic and provide preferential treatment to certain types of traffic by following 802.1p
Quality of Service (QoS)
• Authenticate user access
• Configure a method for an accelerated backup root port (STP Uplink Fast)
• Configure VLAN Trunk Protocol (VTP)
• Add a VLAN to the database
• Modify a VLAN in the database
• Remove a VLAN from the database
• Configure a VLAN trunk
• Assign ports for dynamic VLAN membership
For detailed information about completing these tasks, see the Cisco IOS Desktop Switching
Configuration Guide and Cisco IOS Desktop Switching Enterprise Edition Software Configuration
Guide.
Type of Memory
The switch Flash memory stores the Cisco IOS software image, the startup configuration file, and
helper files.
Platforms
Cisco IOS Release 12.0(5)XP-A (standard edition software) and XP-EN (Enterprise Edition
Software) run on a variety of 2900 and 3500 XL switches and modules. For a complete list, see the
Release Notes for Catalyst 2900 Series XL and Catalyst 3500 Series XL, Cisco IOS Release
12.0(5)XP.
CLI Command Modes
This section describes the CLI command mode structure. Command modes support specific
Cisco IOS commands. For example, the interface type_number command works only when entered
in global configuration mode. The Cisco IOS command modes are as follows:
• User EXEC mode
• Privileged EXEC mode
• VLAN database mode
• Global configuration mode
• Interface configuration mode
• Line configuration mode
Table 1-1 lists the command modes, how to access each mode, the prompt you will see in that mode,
and how to exit that mode. The prompts listed assume the default names Switch and ATM.
1-2 Cisco IOS Desktop Switching Command Reference
3. User EXEC Mode
Table 1-1 Command Modes Summary
Command
Mode Access Method Prompt Exit or Access Next Mode
User EXEC This is the first level of Switch> Enter the logout command.
access. ATM>
(For the switch) Change
terminal settings, perform
basic tasks, and list system
information.
(For ATM) Begin a session
with the ATM module.
Privileged From user EXEC mode, Switch# To exit to user EXEC mode, enter the
EXEC enter the enable user ATM# disable command.
EXEC command. To enter global configuration mode, enter
the configure command.
VLAN From user EXEC mode, Switch(vlan)# To exit to user EXEC mode, enter the exit
database enter the vlan database command.
command.
Global From privileged EXEC Switch (config)# To exit to privileged EXEC mode, enter
configuration mode, enter the configure ATM (config)# the exit or end command, or press
privileged EXEC Ctrl-Z.
command. To enter interface configuration mode,
enter the interface configuration
command.
Interface From global configuration Switch (config-if)# To exit to privileged EXEC mode, enter
configuration mode, specify an interface ATM (config-if)# the end command, or press Ctrl-Z.
by entering the interface To exit to global configuration mode,
command. enter the exit command.
To enter subinterface configuration mode,
specify a subinterface with the interface
command. On the ATM module, the
LANE client is considered a subinterface.
Line From global configuration Switch (config-line)# To exit to global configuration mode,
configuration mode, specify a line by ATM (config-line)# enter the exit command.
entering the line command. To return to privileged EXEC mode, enter
the end command, or press Ctrl-Z.
User EXEC Mode
After you access the device, you are automatically in user EXEC command mode. The EXEC
commands available at the user level are a subset of those available at the privileged level. In general,
the user EXEC commands allow you to change terminal settings temporarily, perform basic tests,
and list system information.
The supported commands can vary depending on the version of IOS software in use. To view a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch> ?
ATM> ?
Using the Command-Line Interface 1-3
4. CLI Command Modes
Privileged EXEC Mode
Because many of the privileged commands configure operating parameters, privileged access should
be password-protected to prevent unauthorized use. The privileged command set includes those
commands contained in user EXEC mode, as well as the configure command through which you
access the remaining command modes.
If your system administrator has set a password, you are prompted to enter it before being granted
access to privileged EXEC mode. The password is not displayed on the screen and is case sensitive.
The privileged EXEC mode prompt consists of the device name followed by the pound sign (#).
Switch#
ATM#
Enter the enable command to access privileged EXEC mode:
Switch> enable
Switch#
ATM> enable
ATM#
The supported commands can vary depending on the version of IOS software in use. To view a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch# ?
ATM# ?
To return to user EXEC mode, enter the disable command.
VLAN Database Mode
This command mode is available only in the Enterprise Edition Software. The VLAN database
commands allow you to modify VLAN parameters. Enter the vlan database command to access
VLAN database mode:
Switch> vlan database
Switch(vlan)#
The supported commands can vary depending on the version of IOS software in use. To view a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(vlan)# ?
To return to privileged EXEC mode, enter the abort command to abandon the proposed database.
Otherwise, enter exit to implement the proposed new VLAN database and return to privileged EXEC
mode.
Global Configuration Mode
Global configuration commands apply to features that affect the device as a whole. Use the
configure privileged EXEC command to enter global configuration mode. The default is to enter
commands from the management console.
1-4 Cisco IOS Desktop Switching Command Reference
5. Interface Configuration Mode
When you enter the configure command, the console prompts you for the source of the configuration
commands:
Switch# configure
Configuring from terminal, memory, or network [terminal]?
ATM# configure
Configuring from terminal, memory, or network [terminal]?
You can specify either the terminal or NVRAM as the source of configuration commands.
The following example shows you how to access global configuration mode:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
ATM# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
The supported commands can vary depending on the version of IOS software in use. To view a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config)# ?
Switch(config)#
ATM(config)# ?
ATM(config)#
To exit global configuration command mode and return to privileged EXEC mode, enter the end or
exit command, or press Ctrl-Z.
Interface Configuration Mode
Interface configuration commands modify the operation of the interface. Interface configuration
commands always follow a global configuration command, which defines the interface type.
Use the interface type_number.subif command to access interface configuration mode. The new
prompt indicates interface configuration mode.
Switch(config-if)#
ATM(config-if)#
In the following example, ATM interface 1 is about to be configured.
Note The interface number for Slot A is 1, and the interface number for Slot B is 2.
The following example shows you how to access interface configuration mode by using the int
command:
ATM(config-subif)# int atm1.1 multipoint
Using the Command-Line Interface 1-5
6. Command Summary
The supported commands can vary depending on the version of IOS software in use. To view a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-subif)# ?
Switch(config-if)#
ATM(config-subif)# ?
ATM(config-if)#
To exit interface configuration mode and return to global configuration mode, enter the exit
command. To exit interface configuration mode and return to privileged EXEC mode, enter the end
command, or press Ctrl-Z.
Line Configuration Mode
Line configuration commands modify the operation of a terminal line. Line configuration commands
always follow a line command, which defines a line number. These commands are used to change
terminal parameter settings line-by-line or for a range of lines.
Use the line vty line_number [ending_line_number] command to enter line configuration mode. The
new prompt indicates line configuration mode. The following examples shows how to enter line
configuration mode for virtual terminal line 7:
Switch(config)# line vty 0 7
ATM(config)# line vty 0 7
The supported commands can vary depending on the version of IOS software in use. To view a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-line)# ?
ATM(config-line)# ?
To exit line configuration mode and return to global configuration mode, use the exit command. To
exit line configuration mode and return to privileged EXEC mode, enter the end command, or press
Ctrl-Z.
Command Summary
Table 1-2 lists and describes the Cisco IOS commands for the 2900 and 3500 XL switches. The
commands are sorted by the command modes from which they are entered.
Table 1-2 Command Summary
Commands Description
User EXEC mode
clear mac-address-table Deletes all addresses in the MAC address table.
show cluster Displays the cluster status and a summary of the cluster to which the switch
belongs.
show cluster candidates Displays switches that are not currently members of the cluster but could be.
show cluster members Displays information about all members in a cluster.
show cluster view Displays a list of neighbors in a cluster.
1-6 Cisco IOS Desktop Switching Command Reference
7. Command Summary
Table 1-2 Command Summary (continued)
Commands Description
show ntp associations Displays the status of NTP associations
show ntp status Displays the status of NTP.
show spanning-tree Displays Spanning-Tree Protocol (STP) information.
show vlan Displays information about a VLAN.
show version Displays the firmware version for the switch or module.
show vtp Displays general information about the VTP management domain, status,
and counters.
Privileged EXEC mode
clear cgmp Deletes the multicast addresses and router ports maintained by Cisco Group
Management Protocol (CGMP).
clear ip address Deletes the IP address without disabling the IP processing.
clear mac-address-table Deletes all addresses in the MAC address table.
clear vmps statistics Clears the statistics maintained by the VLAN Query Protocol (VQP) client.
clear vtp counters Clears the VLAN Trunk Protocol (VTP) counters.
cluster setup Automatically builds a cluster.
copy tftp Downloads a new Flash image for the ATM module.
delete Deletes a file from the file system.
rcommand Executes commands on a cluster member from the command switch.
session Logs into an ATM module.
show cgmp Displays the current state of the CGMP-learned multicast groups and routers.
show file systems Displays information about local and remote file systems.
show interface Displays the administrative and operational status of a switching
(nonrouting) port.
show mac-address-table Displays the MAC address table.
show port block Displays the blocking of unicast and multicast filtering for the port.
show port group Displays the ports that are assigned to groups.
show port monitor Displays the ports that have port monitoring enabled.
show port network Displays the network ports on the switch.
show port security Displays the ports that have port security enabled.
show port storm-control Displays the setting of broadcast-storm control.
show tacacs Displays various TACACS+ server statistics.
show vmps Displays the VQP version, reconfirmation interval, retry count, server IP
addresses, and current and primary servers.
show vmps statistics Displays the VQP client-side statistics.
vlan database Enters VLAN database mode.
vmps reconfirm Sends VQP queries to reconfirm all dynamic VLAN assignments with the
VLAN Membership Policy Server (VMPS).
Global configuration mode
cgmp Enables CGMP.
Using the Command-Line Interface 1-7
8. Command Summary
Table 1-2 Command Summary (continued)
Commands Description
cluster commander-address Automatically provides the command switch MAC address to member
switches. This command is automatically issued.
cluster enable Enables the cluster command switch and names the cluster.
cluster member Adds members to the cluster.
cluster order Arranges the order of cluster members displayed in Cluster Manager.
enable last-resort Specifies what happens if the TACACS and Extended TACACS servers used
by the enable command do not respond.
enable use-tacacs Enables the use of TACACS to determine whether a user can access the
privileged command level.
interface Selects an interface to configure. Creates a new management VLAN
interface.
mac-address-table aging-time Sets the length of time that a dynamic entry remains in the address table.
mac-address-table dynamic Adds a dynamic address entry to the address table.
mac-address-table secure Adds a secure address entry to the address table.
mac-address-table static Adds a static address entry to the address table.
ntp access-group Controls access to the system's NTP services.
ntp authenticate Enables NTP authentication.
ntp authentication-key Defines an authentication key for NTP.
ntp broadcastdelay Sets the estimated round-trip delay between the Cisco IOS software and an
NTP broadcast server.
ntp clock-period Determines the clock error.
ntp max-associations Sets the maximum number of NTP associations that are allowed on a server.
ntp peer Configures the router's system clock to synchronize a peer or to be
synchronized by a peer.
ntp server Allows the router's system clock to be synchronized by a time server.
ntp source Uses a particular source address in NTP packets.
ntp trusted-key Authenticates the identity of a system to which NTP will synchronize.
shutdown vlan Shuts down local traffic on the specified VLAN.
snmp-server enable traps Enables SNMP notification for VMPS changes.
vlan-membership
snmp-server enable traps vtp Enables SNMP notification for VTP changes.
snmp-server host Specifies the host that receives SNMP traps.
spanning-tree Enables an instance of STP.
spanning-tree forward-time Specifies the forward delay interval for the switch.
spanning-tree hello-time Specifies the interval between hello Bridge Protocol Data Units (BPDUs).
spanning-tree max-age Changes the interval the switch waits to receive BPDUs from the root switch.
spanning-tree priority Configures the bridge priority for the specified spanning-tree instance.
spanning-tree protocol Defines the type of STP.
spanning-tree uplinkfast Accelerates the choice of a new root port when a link or switch fails or when
STP reconfigures itself.
1-8 Cisco IOS Desktop Switching Command Reference
9. Command Summary
Table 1-2 Command Summary (continued)
Commands Description
tacacs-server attempts Controls the number of login attempts that can be made on a line set up for
TACACS, Extended TACACS, or TACACS+ verification.
tacacs-server directed-request Sends only a username to a specified server when a direct request is issued in
association with TACACS, Extended TACACS, and TACACS+.
tacacs-server dns-alias-lookup Enables IP Domain Name System alias lookup for TACACS+.
tacacs-server extended Enables an extended TACACS mode.
tacacs-server host Specifies a TACACS, Extended TACACS, or TACACS+ host.
tacacs-server key Sets the authentication encryption key used for all TACACS+
communications between the access server and the TACACS+ daemon.
tacacs-server last-resort Causes the network access server to request the privileged password as
verification for TACACS or Extended TACACS or to allow successful login
without further input from the user.
tacacs-server login-timeout Specifies the maximum amount of time in seconds to wait for a TACACs
login.
tacacs-server Specifies that the first TACACS request to a TACACS or Extended TACACS
optional-passwords server be made without password verification.
tacacs-server retransmit Specifies the number of times the Cisco IOS software searches the list of
TACACS or Extended TACACS server hosts before giving up.
tacacs-server timeout Sets the interval that the server waits for a TACACS, Extended TACACS, or
TACACS+ server to reply.
vmps reconfirm Changes the reconfirmation interval for the VQP client.
vmps retry Configures the per-server retry count for the VQP client.
vmps server Configures the primary VMPS and up to three secondary servers.
vtp file Modify the VTP configuration storage filename.
VLAN database mode
abort Abandons the proposed new VLAN database, and return to privileged EXEC
mode.
apply Implements the proposed new VLAN database, propagate it throughout the
administrative domain, and remain in VLAN database mode.
exit Implements the proposed new VLAN database, propagate it throughout the
administrative domain, and return to privileged EXEC mode.
reset Abandons the proposed new VLAN database, and remain in VLAN database
mode.
show changes Displays the differences between the currently implemented VLAN database
on the switch and the proposed new VLAN database.
show current Displays the currently implemented VLAN database on the switch or a
single selected VLAN from it.
show proposed Displays the proposed new VLAN database or a single selected VLAN from
it.
vlan Configures a VLAN by its VLAN ID.
vtp Configures the VTP mode.
vtp domain Configures the VTP administrative domain.
vtp password Configures the VTP password.
Using the Command-Line Interface 1-9
10. Command Summary
Table 1-2 Command Summary (continued)
Commands Description
vtp pruning Enables pruning in the VTP administrative domain.
vtp v2-mode Enables VTP version 2 mode in the administrative domain.
Interface configuration mode
duplex Specifies the duplex mode of operation for a port.
flowcontrol Controls traffic rates during congestion.
management Shuts down the current management VLAN interface.
ntp broadcast client Allows the system to receive NTP broadcast packets on an interface.
ntp broadcast destination Configures an NTP server or peer to restrict broadcast of NTP frames to the
IP address of a designated client or a peer.
ntp broadcast key Configures an NTP server or peer to broadcast NTP frames with the
authentication key embedded into the NTP packet.
ntp broadcast version Specifies an interface to send NTP broadcast packets.
ntp disable Prevents an interface from receiving NTP packets.
ip address Sets a primary or secondary IP address of a port.
port block Prevents the flooding of unknown destination MAC addresses and multicast
addresses on this port.
port group Places a port into a port aggregation group.
port monitor Implements port monitoring on this port.
port network Enables a port as the network port for a VLAN.
port security Enables port security on a port.
port storm-control Disables broadcast traffic if too many broadcast packets are seen on this port.
shutdown Disables a port.
spanning-tree cost Sets a different path cost.
spanning-tree portfast Enables the Port Fast option on the switch.
spanning-tree port-priority Configures the STP priority of a port.
speed Specifies the speed of a port.
switchport access Configures a port as an access or dynamic VLAN port.
switchport mode Configures the VLAN membership mode of a port.
switchport multi Configures a port to be a multi-VLAN port.
switchport priority default Configures a port priority for untagged (native Ethernet) frames to provide
quality of service (QoS).
switchport trunk allowed vlan Controls which VLANs can receive and transmit traffic on the trunk.
switchport trunk encapsulation Sets the encapsulation format on the trunk.
switchport trunk native Sets the native VLAN for untagged traffic when in IEEE 802.1Q trunking
mode.
Line configuration mode
login authentication Applies the authentication list to a line or set of lines.
login local Changes a login username.
login tacacs Configures your switch to use TACACS user authentication.
1-10 Cisco IOS Desktop Switching Command Reference
11. Command Summary
For detailed command syntax and descriptions, see Chapter 2, “Cisco IOS Commands.” For
task-oriented configuration steps, see the software configuration documentation that came with the
product.
Using the Command-Line Interface 1-11