Index
IN-26
Catalyst2950 and Catalyst2955 Switch Software Configuration Guide
78-11380-10
SNMP (continued)
groups 28-9
in clusters 7-15
informs
and trap keyword 28-11
described 28-5
differences from traps 28-5
enabling 28-14
limiting access by TFTP servers 28-14
limiting system log messages to NMS 27-10
manager functions 28-3
managing clusters with 7-24
MIBs
location of A-3
supported A-1
notifications 28-5
overview 28-1, 28-4
status, displaying 28-16
system contact and location 28-14
trap manager, configuring 28-12
traps
described 28-3, 28-5
differences from informs 28-5
enabling 28-11
enabling MAC address notification 8-24
overview 28-1, 28-4
types of 28-11
users 28-9
versions supported 28-2
snooping, IGMP 21-1
SNR
definition of 13-16
downstream rate requirements 13-16, 13-18
margins 13-16
upstream rate requirements 13-17, 13-18
software, VLAN considerations 18-8
software images
location in flash B-20
recovery procedures 32-2
scheduling reloads 5-16
tar file format, described B-20
See also downloading and uploading
source addresses, in ACLs 29-12
SPAN
configuration guidelines 25-7
default configuration 25-7
destination ports 25-4
displaying status 25-17
IDS 25-2
interaction with other features 25-5
monitored ports 25-4
monitoring ports 25-4
overview 1-7, 25-1
received traffic 25-3
session limits 25-6
sessions
creating 25-8
defined 25-3
removing destination (monitoring) ports 25-11
removing source (monitored) ports 25-11
specifying monitored ports 25-8
source ports 25-4
transmitted traffic 25-3
spanning tree and native VLANs 17-17
Spanning Tree Protocol
See STP
speed
configuring on interfaces 11-10
setting on CPE devices 13-11
SSH
configuring 9-34
cryptographic software image 9-33
described 9-33
encryption methods 9-33
user authentication methods, supported 9-34