Index
IN-44
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
SPAN
and stack changes
30-10
configuration guidelines 30-12
default configuration 30-11
destination ports 30-8
displaying status 30-28
interaction with other features 30-9
monitored ports 30-6
monitoring ports 30-8
overview 1-16, 30-1
ports, restrictions 26-12
received traffic 30-5
session limits 30-12
sessions
configuring ingress forwarding
30-16, 30-23
creating 30-13, 30-25
defined 30-4
limiting source traffic to specific VLANs 30-16
removing destination (monitoring) ports 30-14
specifying monitored ports 30-13, 30-25
with ingress traffic enabled 30-15
source ports 30-6
transmitted traffic 30-6
VLAN-based 30-7
spanning tree and native VLANs 13-18
Spanning Tree Protocol
See STP
SPAN traffic
30-5
split horizon, RIP 38-25
SRR
configuring
shaped weights on egress queues
36-82
shared weights on egress queues 36-83
shared weights on ingress queues 36-75
described 36-15
shaped mode 36-15
shared mode 36-15
support for 1-14
SSH
configuring
7-47
described 1-7, 7-46
encryption methods 7-46
switch stack considerations 5-18, 7-46
user authentication methods, supported 7-46
SSL
configuration guidelines
7-53
configuring a secure HTTP client 7-56
configuring a secure HTTP server 7-54
cryptographic software image 7-50
described 7-50
monitoring 7-56
SSM
address management restrictions
44-16
CGMP limitations 44-17
components 44-14
configuration guidelines 44-16
configuring 44-14, 44-17
differs from Internet standard multicast 44-14
IGMP snooping 44-17
IGMPv3 44-14
IGMPv3 Host Signalling 44-16
IP address range 44-15
monitoring 44-17
operations 44-15
PIM 44-14
state maintenance limitations 44-17
SSM mapping 44-18
configuration guidelines 44-18
configuring 44-18, 44-20
DNS-based 44-19, 44-21
monitoring 44-23
overview 44-18
restrictions 44-18
static 44-19, 44-21
static traffic forwarding 44-22