Table of Contents
INDEX
- administrative access, configuring 2-4
- baud rate, for terminal emulation 1-1
- BUS 4-3, 4-8
- card/subcard/port, defined 1-3
- changes, saving 1-9
- CLI, using 1-1 to 1-10
- command modes, understanding 1-2
- CPU card 2-4
- data bits, for terminal emulation 1-1
- disabling a command or feature 1-8
- displaying the configuration 1-8
- ELAN 4-2
- ESI 4-3
- Ethernet
- LANE support 4-3
- switch configuration, LANE 4-13
- example configurations
- LANE 4-9
- PVCs 3-9
- PVPs 3-19, 3-21
- soft PVCs 3-14
- SVCs 3-2
- tag switching 5-7
- help
- online command-line interface 1-2
- using the question mark 1-2
- interface numbering 1-3
- IP address, configuring for remote Telnet access 2-4
- LANE
- addressing considerations 4-3
- BUS 4-3
- components 4-2
- configuration examples 4-9
- Ethernet and Token Ring support 4-3
- example configurations 4-9
- LEC 4-2
- LECS 4-2
- LES 4-3
- router and LAN switch requirements 4-4
- rules for configuration 4-4
- LE_ARP 4-3
- LEC 4-2, 4-5
- LECS 4-2, 4-6
- LES 4-3, 4-8
- LES/BUS 4-8
- MAC addresses 4-2
- modes, command 1-2
- naming the ATM switch router 2-1
- numbering, card/subcard/port 1-3
- OSPF 5-1
- parity, for terminal emulation 1-1
- password, creating 2-3
- port numbering 1-3
- processor card 2-4
- prompt, changing 2-1
- PVCs
- ATM switch router configuration 3-10
- router configuration 3-12
- PVPs 3-19, 3-21
- remote administrative access, configuring 2-4
- restricting access, creating a password 2-3
- router configuration
- LANE 4-12
- PVCs 3-12
- soft PVCs 3-17
- SVCs 3-2
- tag switching 5-6, 5-7, 5-8, 5-9
- saving changes 1-9
- security, creating a password 2-3
- slot numbering 1-3
- soft PVCs
- ATM switch router configuration 3-14
- router configuration 3-17
- SSRP 4-3
- stop bits, for terminal emulation 1-1
- SVCs
- ATM switch router configuration 3-1
- router configuration 3-2
- tag switching
- ATM switch router configuration 5-2 to 5-5
- example configuration 5-7
- requirements, hardware and software 5-1
- router configuration 5-6
- TDP 5-2
- Telnet access, configuring 2-4
- terminal emulation, recommended settings 1-1
- Token Ring, LANE support 4-3
- tunnels, VP 3-21
- unauthorized access, preventing 2-3
- undo
- See disabling
- viewing the configuration 1-8
- VP tunnels 3-21







Posted: Tue Feb 22 16:37:43 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.