Index
IN-43
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
defined 1-9
negotiation 1-9
support 1-1
SC (standby command switch) 1-10
scheduled reloads 1-23
scheduling, IP SLAs operations 1-5
SCP
and SSH
1-55
configuring 1-55
SDM
described
1-1
switch stack consideration 1-11
templates
configuring
1-6
number of 1-1
SDM template
configuring
1-5
dual IPv4 and IPv6 1-3
types of 1-1
secondary edge port, REP 1-4
secondary VLANs 1-2
Secure Copy Protocol
secure HTTP client
configuring
1-54
displaying 1-54
secure HTTP server
configuring
1-52
displaying 1-54
secure MAC addresses
and switch stacks
1-18
deleting 1-16
maximum number of 1-10
types of 1-9
secure ports
and switch stacks
1-18
configuring 1-9
secure remote connections 1-44
Secure Shell
See SSH
Secure Socket Layer
See SSL
security, port
1-8
Security Exchange Protocol
See SXP
Security Exchange Protocol
See SAP
Security Exchange Protocol (SXP)
1-2
security features 1-10
Security Group Access Control List (SGACL) 1-2
Security Group Tag (SGT) 1-2
See SCP
sequence numbers in log messages
1-8
server mode, VTP 1-3
service-provider network, MSTP and RSTP 1-1
service-provider networks
and customer VLANs
1-2
and IEEE 802.1Q tunneling 1-1
Layer 2 protocols across 1-8
Layer 2 protocol tunneling for EtherChannels 1-10
session keys, MKA 1-2
set-request operation 1-4
setup program
failed command switch replacement
1-11
replacing failed command switch 1-9
severity levels, defining in system messages 1-9
SFPs
monitoring status of
1-14
numbering of 1-21
security and identification 1-14
status, displaying 1-14
SGACL 1-2
SGT 1-2
shaped round robin
See SRR
show access-lists hw-summary command
1-23
show and more command output, filtering 1-9
show cluster members command 1-16
show configuration command 1-39