Configuration manual

Index
IN-43
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
SPAN
and stack changes 30-10
configuration guidelines 30-12
default configuration 30-11
destination ports 30-8
displaying status 30-28
interaction with other features 30-9
monitored ports 30-6
monitoring ports 30-8
overview 1-14, 30-1
ports, restrictions 26-12
received traffic 30-5
session limits 30-12
sessions
configuring ingress forwarding 30-16, 30-23
creating 30-13, 30-25
defined 30-4
limiting source traffic to specific VLANs 30-16
removing destination (monitoring) ports 30-14
specifying monitored ports 30-13, 30-25
with ingress traffic enabled 30-15
source ports 30-6
transmitted traffic 30-6
VLAN-based 30-7
spanning tree and native VLANs 13-19
Spanning Tree Protocol
See STP
SPAN traffic 30-5
split horizon, RIP 38-24
SRR
configuring
shaped weights on egress queues 36-75
shared weights on egress queues 36-76
shared weights on ingress queues 36-68
described 36-14
shaped mode 36-14
shared mode 36-14
support for 1-12
SSH
configuring 8-39
described 1-6, 8-38
encryption methods 8-38
switch stack considerations 6-18, 8-38
user authentication methods, supported 8-38
SSL
configuration guidelines 8-45
configuring a secure HTTP client 8-48
configuring a secure HTTP server 8-46
cryptographic software image 8-42
described 8-42
monitoring 8-48
SSM
address management restrictions 44-16
CGMP limitations 44-17
components 44-14
configuration guidelines 44-16
configuring 44-14, 44-17
differs from Internet standard multicast 44-15
IGMP snooping 44-17
IGMPv3 44-14
IGMPv3 Host Signalling 44-16
IP address range 44-15
monitoring 44-17
operations 44-15
PIM 44-14
state maintenance limitations 44-17
SSM mapping 44-18
configuration guidelines 44-18
configuring 44-18, 44-20
DNS-based 44-19, 44-21
monitoring 44-23
overview 44-18
restrictions 44-18
static 44-19, 44-21
static traffic forwarding 44-22