EasyManua.ls Logo

Cisco Catalyst 3560-X - Page 1525

Cisco Catalyst 3560-X
1538 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Index
IN-45
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
tar file format, described 1-26
See also downloading and uploading
software images in mixed stacks
See the Cisco Software Activation and Compatibility
Document
source-and-destination-IP address based forwarding,
EtherChannel
1-9
source-and-destination MAC address forwarding,
EtherChannel
1-9
source-IP address based forwarding, EtherChannel 1-9
source-MAC address forwarding, EtherChannel 1-8
Source-specific multicast
See SSM
SPAN
and stack changes
1-10
configuration guidelines 1-12
default configuration 1-12
destination ports 1-8
displaying status 1-28
interaction with other features 1-9
monitored ports 1-7
monitoring ports 1-8
overview 1-18, 1-1
ports, restrictions 1-12
received traffic 1-6
session limits 1-12
sessions
configuring ingress forwarding
1-16, 1-23
creating 1-13, 1-25
defined 1-4
limiting source traffic to specific VLANs 1-16
removing destination (monitoring) ports 1-14
specifying monitored ports 1-13, 1-25
with ingress traffic enabled 1-15
source ports 1-7
transmitted traffic 1-6
VLAN-based 1-7
spanning tree and native VLANs 1-17
Spanning Tree Protocol
See STP
SPAN traffic
1-6
split horizon, RIP 1-24
SRR
configuring
shaped weights on egress queues
1-88
shared weights on egress queues 1-89
shared weights on ingress queues 1-81
described 1-15
shaped mode 1-15
shared mode 1-16
support for 1-15, 1-16
SSH
configuring
1-45
described 1-8, 1-44
encryption methods 1-45
switch stack considerations 1-18
user authentication methods, supported 1-45
SSL
configuration guidelines
1-51
configuring a secure HTTP client 1-54
configuring a secure HTTP server 1-52
described 1-48
monitoring 1-54
SSM
address management restrictions
1-16
CGMP limitations 1-16
components 1-14
configuration guidelines 1-16
configuring 1-14, 1-17
differs from Internet standard multicast 1-14
IGMP snooping 1-16
IGMPv3 1-14
IGMPv3 Host Signalling 1-15
IP address range 1-15
monitoring 1-17
operations 1-15
PIM 1-14
state maintenance limitations 1-16
SSM mapping 1-17

Table of Contents

Related product manuals