Index
SPAN
and stack changes
30-10
configuration guidelines
default configuration
destination ports
30-8
displaying status
30-28
interaction with other features
monitored ports
30-6
monitoring ports
30-8
overview
1-16, 30-1
ports, restrictions
26-12
received traffic
30-5
session limits
30-12
sessions
configuring ingress forwarding
creating
30-13, 30-25
defined
30-4
limiting source traffic to specific VLANs
removing destination (monitoring) ports
specifying monitored ports
with ingress traffic enabled
source ports
30-6
transmitted traffic
30-6
VLAN-based
30-7
spanning tree and native VLANs
Spanning Tree Protocol
See STP
SPAN traffic
30-5
split horizon, RIP
38-25
SRR
configuring
shaped weights on egress queues
shared weights on egress queues
shared weights on ingress queues
described
36-15
shaped mode
36-15
shared mode
36-15
support for
1-14
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
IN-44
30-12
30-11
30-9
30-16, 30-23
30-16
30-14
30-13, 30-25
30-15
13-18
36-82
36-83
36-75
SSH
configuring
7-47
described
1-7, 7-46
encryption methods
switch stack considerations
user authentication methods, supported
SSL
configuration guidelines
configuring a secure HTTP client
configuring a secure HTTP server
cryptographic software image
described
7-50
monitoring
7-56
SSM
address management restrictions
CGMP limitations
44-17
components
44-14
configuration guidelines
configuring
44-14, 44-17
differs from Internet standard multicast
IGMP snooping
44-17
IGMPv3
44-14
IGMPv3 Host Signalling
IP address range
44-15
monitoring
44-17
operations
44-15
PIM
44-14
state maintenance limitations
SSM mapping
44-18
configuration guidelines
configuring
44-18, 44-20
DNS-based
44-19, 44-21
monitoring
44-23
overview
44-18
restrictions
44-18
static
44-19, 44-21
static traffic forwarding
7-46
5-18, 7-46
7-46
7-53
7-56
7-54
7-50
44-16
44-16
44-14
44-16
44-17
44-18
44-22
OL-12247-04