Index
IN-43
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
source-and-destination MAC address forwarding,
EtherChannel
34-8
source-IP address based forwarding, EtherChannel 34-9
source-MAC address forwarding, EtherChannel 34-8
SPAN
and stack changes
28-10
configuration guidelines 28-11
default configuration 28-11
destination ports 28-8
displaying status 28-25
interaction with other features 28-9
monitored ports 28-6
monitoring ports 28-8
overview 1-12, 28-1
ports, restrictions 25-11
received traffic 28-5
session limits 28-11
sessions
configuring ingress forwarding
28-16, 28-23
creating 28-12
defined 28-4
limiting source traffic to specific VLANs 28-16
removing destination (monitoring) ports 28-14
specifying monitored ports 28-12
with ingress traffic enabled 28-15
source ports 28-6
transmitted traffic 28-6
VLAN-based 28-7
spanning tree and native VLANs 13-19
Spanning Tree Protocol
See STP
SPAN traffic
28-5
split horizon, RIP 35-23
SRR
configuring
shaped weights on egress queues
33-76
shared weights on egress queues 33-77
shared weights on ingress queues 33-69
SRR (continued)
described
33-14
shaped mode 33-14
shared mode 33-14
support for 1-10
SSH
configuring
9-39
cryptographic software image 9-37
described 1-6, 9-38
encryption methods 9-38
switch stack considerations 5-16, 9-38
user authentication methods, supported 9-39
SSL
configuration guidelines
9-45
configuring a secure HTTP client 9-47
configuring a secure HTTP server 9-46
cryptographic software image 9-42
described 9-42
monitoring 9-48
stack, switch
MAC address of
5-19
stack changes
effects on
IPv6 routing
36-8
stack changes, effects on
802.1x port-based authentication
10-8
ACL configuration 32-7
CDP 26-2
cross-stack EtherChannel 34-13
EtherChannel 34-10
fallback bridging 42-3
HSRP 39-4
IGMP snooping 24-7
IP routing 35-4
IPv6 ACLs 38-3
MAC address tables 7-21
MSTP 19-8
multicast routing 40-8
MVR 24-18