Index
IN-34
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
SPAN (continued)
sessions
configuring ingress forwarding
creating
defined
limiting source traffic to specific VLANs
removing destination (monitoring) ports
specifying monitored ports
with ingress traffic enabled
source ports
transmitted traffic
VLAN-based
spanning tree and native VLANs
Spanning Tree Protocol
SPAN traffic
SRR
configuring
shaped weights on egress queues
shared weights on egress queues
shared weights on ingress queues
described
shaped mode
support for
SSH
configuring
cryptographic software image
described
encryption methods
switch stack considerations
user authentication methods, supported
SSL
configuration guidelines
configuring a secure HTTP client
configuring a secure HTTP server
cryptographic software image
described
monitoring
stack, switch
MAC address of
stack changes, effects on
802.1x port-based authentication
ACL configuration
CDP
cross-stack EtherChannel
EtherChannel
IGMP snooping
IP routing
MAC address tables
MSTP
port security
SDM template selection
STP
switch clusters
system message log
VLANs
VTP
stack master
bridge ID (MAC address)
defined
election
IPv6
stack member
accessing CLI of specific member
configuring
member number
priority value
defined
displaying information of
number
priority value
provisioning a new member
replacing