EasyManua.ls Logo

Cisco WS-C3020 - Page 950

Cisco WS-C3020
960 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Index
IN-34
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
Secure Socket Layer
See SSL
security, port
23-9
security features 1-6
sequence numbers in log messages 29-8
server mode, VTP 12-3
service-provider network, MSTP and RSTP 17-1
service-provider networks
and customer VLANs
15-2
and IEEE 802.1Q tunneling 15-1
Layer 2 protocols across 15-8
Layer 2 protocol tunneling for EtherChannels 15-9
set-request operation 30-4
severity levels, defining in system messages 29-8
SFPs
monitoring status of
9-23, 40-8
security and identification 40-8
status, displaying 40-8
shaped round robin
See SRR
show access-lists hw-summary command
31-21
show and more command output, filtering 2-10
show cdp traffic command 24-5
show configuration command 9-19
show forward command 40-16
show interfaces command 9-16, 9-19
show l2protocol command 15-13, 15-15, 15-16
show lldp traffic command 25-7
show platform forward command 40-16
show running-config command
displaying ACLs
31-19, 31-20, 31-30, 31-33
interface description in 9-19
shutdown command on interfaces 9-24
shutdown threshold for Layer 2 protocol packets 15-11
Simple Network Management Protocol
See SNMP
small-frame arrival rate, configuring
23-5
Smartports macros
applying Cisco-default macros
10-6
applying global parameter values 10-5, 10-6
applying macros 10-5
applying parameter values 10-5, 10-7
configuration guidelines 10-3
creating 10-4
default configuration 10-2
defined 10-1
displaying 10-8
tracing 10-3
website 10-2
SNAP 24-1
SNMP
accessing MIB variables with
30-4
agent
described
30-4
disabling 30-7
and IP SLAs 39-2
authentication level 30-10
community strings
configuring
30-8
overview 30-4
configuration examples 30-16
default configuration 30-6
engine ID 30-7
groups 30-6, 30-9
host 30-6
ifIndex values 30-5
in-band management 1-4
informs
and trap keyword
30-11
described 30-5
differences from traps 30-5
disabling 30-14
enabling 30-14
limiting access by TFTP servers 30-15
limiting system log messages to NMS 29-10
manager functions 1-3, 30-3

Table of Contents