Index
IN-33
Catalyst 2960 and 2960-S Switch Software Configuration Guide
OL-8603-09
received traffic 27-5
sessions
configuring ingress forwarding 27-15, 27-22
creating 27-12
defined 27-4
limiting source traffic to specific VLANs 27-16
removing destination (monitoring) ports 27-13
specifying monitored ports 27-12
with ingress traffic enabled 27-14
source ports 27-6
transmitted traffic 27-6
VLAN-based 27-7
spanning tree and native VLANs 13-14
Spanning Tree Protocol
See STP
SPAN traffic 27-5
SRR
configuring
shaped weights on egress queues 33-76
shared weights on egress queues 33-77
shared weights on ingress queues 33-70
described 33-14
shaped mode 33-14
shared mode 33-14
support for 1-14
SSH
configuring 9-43
cryptographic software image 9-41
described 1-7, 9-42
encryption methods 9-42
switch stack considerations 7-14
user authentication methods, supported 9-42
SSL
configuration guidelines 9-49
configuring a secure HTTP client 9-51
configuring a secure HTTP server 9-50
cryptographic software image 9-46
described 9-46
monitoring 9-52
stack, switch
MAC address of 7-6, 7-17
stack changes, effects on
802.1x port-based authentication 10-12
ACL configuration 31-6
CDP 25-2
cross-stack EtherChannel 37-13
EtherChannel 37-10
IGMP snooping 22-6
IP routing 34-3
MAC address tables 5-22
MSTP 17-9
MVR 22-17
port security 23-18
SDM template selection 8-2
SNMP 30-1
SPAN and RSPAN 27-10
STP 16-12
switch clusters 6-14
system message log 29-2
VLANs 13-6
VTP 14-8
stack master
bridge ID (MAC address) 7-6
defined 7-1
election 7-5
IPv6 35-6
See also stacks, switch
stack member
accessing CLI of specific member 7-21
configuring
member number 7-19
priority value 7-20
defined 7-1
displaying information of 7-22
number 7-6
priority value 7-7
provisioning a new member 7-20
replacing 7-13