Index
IN-33
Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE
OL-26520-01
interaction with other features 27-9
monitored ports 27-6
monitoring ports 27-8
overview 1-15, 27-1
ports, restrictions 23-12
received traffic 27-5
sessions
configuring ingress forwarding
27-15, 27-22
creating 27-12
defined 27-4
limiting source traffic to specific VLANs 27-16
removing destination (monitoring) ports 27-13
specifying monitored ports 27-12
with ingress traffic enabled 27-14
source ports 27-6
transmitted traffic 27-6
VLAN-based 27-7
spanning tree and native VLANs 13-15
Spanning Tree Protocol
See STP
SPAN traffic
27-5
SRR
configuring
shaped weights on egress queues
33-78
shared weights on egress queues 33-79
shared weights on ingress queues 33-72
described 33-14
shaped mode 33-14
shared mode 33-14
support for 1-14
SSH
configuring
9-43
cryptographic software image 9-42
described 1-7, 9-42
encryption methods 9-43
switch stack considerations 7-15
user authentication methods, supported 9-43
SSL
configuration guidelines
9-49
configuring a secure HTTP client 9-51
configuring a secure HTTP server 9-50
cryptographic software image 9-46
described 9-46
monitoring 9-52
stack, switch
MAC address of
7-6, 7-17
stack changes, effects on
802.1x port-based authentication
10-11
ACL configuration 31-6
CDP 25-2
cross-stack EtherChannel 38-13
EtherChannel 38-10
IGMP snooping 21-6
IP routing 34-2
MAC address tables 5-15
MSTP 17-8
MVR 21-18
port security 23-18
SDM template selection 8-3
SNMP 30-2
SPAN and RSPAN 27-10
STP 16-12
switch clusters 6-13
system message log 29-2
VLANs 13-7
VTP 14-8
stack master
bridge ID (MAC address)
7-6
defined 7-1
election 7-5
IPv6 35-6
See also stacks, switch
stack member
accessing CLI of specific member
7-22
configuring
member number
7-20
priority value 7-21
defined 7-1