Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide, Rel. 12.2(25)SEF1

Index
IN-25
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
MIBs
location of
A-3
supported A-1
notifications 25-5
overview 25-1, 25-4
security levels 25-3
status, displaying 25-16
system contact and location 25-14
trap manager, configuring 25-13
traps
described
25-3, 25-5
differences from informs 25-5
disabling 25-14
enabling 25-11
enabling MAC address notification 5-22
overview 25-1, 25-4
types of 25-11
users 25-6, 25-9
versions supported 25-2
SNMPv1 25-2
SNMPv2C 25-2
SNMPv3 25-2
snooping, IGMP 18-1
software images
location in flash
B-20
recovery procedures 29-2
scheduling reloads 3-18
tar file format, described B-20
See also downloading and uploading
source addresses, in IPv4 ACLs
26-10
source-and-destination-IP address based forwarding,
EtherChannel
28-7
source-and-destination MAC address forwarding,
EtherChannel
28-6
source-IP address based forwarding, EtherChannel 28-7
source-MAC address forwarding, EtherChannel 28-6
SPAN
configuration guidelines
22-10
default configuration 22-9
destination ports 22-6
displaying status 22-23
interaction with other features 22-8
monitored ports 22-5
monitoring ports 22-6
overview 1-8, 22-1
ports, restrictions 19-11
received traffic 22-4
sessions
configuring ingress forwarding
22-14, 22-21
creating 22-10
defined 22-3
limiting source traffic to specific VLANs 22-14
removing destination (monitoring) ports 22-12
specifying monitored ports 22-10
with ingress traffic enabled 22-13
source ports 22-5
transmitted traffic 22-5
VLAN-based 22-6
spanning tree and native VLANs 10-17
Spanning Tree Protocol
See STP
SPAN traffic
22-4
SRR
configuring
shaped weights on egress queues
27-74
shared weights on egress queues 27-75
shared weights on ingress queues 27-67
described 27-14
shaped mode 27-14
shared mode 27-14
support for 1-7
SSH
configuring
6-39
cryptographic software image 6-37
described 1-4, 6-38
encryption methods 6-38
user authentication methods, supported 6-38