Index
IN-42
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
SDM
described
8-1
switch stack consideration 5-12
templates
configuring
8-5
number of 8-1
SDM template
configuring
8-4
dual IPv4 and IPv6 8-2
types of 8-1
secondary VLANs 16-2
secure HTTP client
configuring
7-56
displaying 7-56
secure HTTP server
configuring
7-54
displaying 7-56
secure MAC addresses
and switch stacks
26-18
deleting 26-16
maximum number of 26-10
types of 26-9
secure ports
and switch stacks
26-18
configuring 26-9
secure remote connections 7-46
Secure Shell
See SSH
Secure Socket Layer
See SSL
security, port
26-8
security features 1-10
sequence numbers in log messages 32-8
server mode, VTP 14-3
service-provider network, MSTP and RSTP 19-1
service-provider networks
and customer VLANs
17-2
and IEEE 802.1Q tunneling 17-1
Layer 2 protocols across 17-8
Layer 2 protocol tunneling for EtherChannels 17-9
set-request operation 33-4
severity levels, defining in system messages 32-9
SFPs
monitoring status of
11-28, 47-10
numbering of 11-9
security and identification 47-9
status, displaying 47-10
shaped round robin
See SRR
show access-lists hw-summary command
34-22
show and more command output, filtering 2-9
show cdp traffic command 27-5
show configuration command 11-23
show forward command 47-18
show interfaces command 11-20, 11-23
show interfaces switchport 21-4
show l2protocol command 17-13, 17-15, 17-16
show lldp traffic command 29-11
show platform forward command 47-18
show running-config command
displaying ACLs
34-20, 34-21, 34-32, 34-35
interface description in 11-23
shutdown command on interfaces 11-29
shutdown threshold for Layer 2 protocol packets 17-11
Simple Network Management Protocol
See SNMP
small-frame arrival rate, configuring
26-5
Smartports macros
applying Cisco-default macros
12-6
applying global parameter values 12-5, 12-6
applying macros 12-5
applying parameter values 12-5, 12-7
configuration guidelines 12-2
creating 12-4
default configuration 12-2