Index
IN-44
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
SSH
configuring 7-39
described 1-6, 7-38
encryption methods 7-38
switch stack considerations 5-18, 7-38
user authentication methods, supported 7-39
SSL
configuration guidelines 7-45
configuring a secure HTTP client 7-48
configuring a secure HTTP server 7-46
cryptographic software image 7-42
described 7-42
monitoring 7-49
stack changes, effects on
ACL configuration 34-7
CDP 26-2
cross-stack EtherChannel 37-12
EtherChannel 37-9
fallback bridging 46-3
HSRP 40-4
IEEE 802.1x port-based authentication 9-7
IGMP snooping 23-7
IP routing 38-4
IPv6 ACLs 35-4
IPv6 routing 39-10
MAC address tables 6-21
MSTP 18-8
multicast routing 44-10
MVR 23-18
port security 25-17
SDM template selection 8-3
SNMP 32-1
SPAN and RSPAN 29-10
STP 17-12
system message log 31-2
VLANs 12-6
VTP 13-6
stack master
bridge ID (MAC address) 5-8
defined 5-1
election 5-6
IPv6 39-10
re-election 5-6
See also stacks, switch
stack member
accessing CLI of specific member 5-25
configuring
member number 5-23
priority value 5-23
defined 5-1
displaying information of 5-25
IPv6 39-10
number 5-8
priority value 5-9
provisioning a new member 5-24
replacing 5-16
See also stacks, switch
stack member number 10-7
stack protocol version 5-12
stacks, switch
accessing CLI of specific member 5-25
assigning information
member number 5-23
priority value 5-23
provisioning a new member 5-24
auto-advise 5-13
auto-copy 5-13
auto-extract 5-13
auto-upgrade 5-13
bridge ID 5-8
CDP considerations 26-2
compatibility, software 5-11
configuration file 5-16
configuration scenarios 5-19
copying an image file from one member to
another B-39