Index
IN-43
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-08
topology changes 19-13
overview 19-9
port roles
described
19-9
synchronized 19-11
proposal-agreement handshake process 19-10
rapid convergence
cross-stack rapid convergence
19-11
described 19-10
edge ports and Port Fast 19-10
point-to-point links 19-10, 19-25
root ports 19-10
root port, defined 19-9
See also MSTP
running configuration
replacing
B-20, B-21
rolling back B-20, B-22
saving 3-16
S
SC (standby command switch) 6-10
scheduled reloads 3-24
scheduling, IP SLAs operations 43-5
SCP
and SSH
9-55
configuring 9-56
SDM
described
8-1
switch stack consideration 5-10
templates
configuring
8-5
number of 8-1
SDM template
configuring
8-4
dual IPv4 and IPv6 8-2
types of 8-1
secondary VLANs 16-2
Secure Copy Protocol
secure HTTP client
configuring
9-54
displaying 9-55
secure HTTP server
configuring
9-53
displaying 9-55
secure MAC addresses
and switch stacks
26-18
deleting 26-16
maximum number of 26-10
types of 26-9
secure ports
and switch stacks
26-18
configuring 26-9
secure remote connections 9-45
Secure Shell
See SSH
Secure Socket Layer
See SSL
security, port
26-8
security features 1-9
See SCP
sequence numbers in log messages
32-8
server mode, VTP 14-3
service-provider network, MSTP and RSTP 19-1
service-provider networks
and customer VLANs
17-2
and IEEE 802.1Q tunneling 17-1
Layer 2 protocols across 17-8
Layer 2 protocol tunneling for EtherChannels 17-9
set-request operation 33-4
setup program
failed command switch replacement
49-11
replacing failed command switch 49-9
severity levels, defining in system messages 32-9
SFPs
monitoring status of
12-41, 49-14
numbering of 12-13
security and identification 49-14