Cisco Field Manual. Catalyst Switch Configuration

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

saving

     ROM Monitor configuration variables

scaling

     trunks

SCCP (Skinny Client Control Protocol)

screen format

     IOS terminal sessions

searching

     IOS command output 2nd

security

    firewalls

         SLB load balancing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

     IDSM

         configuring 2nd 3rd 4th 5th 6th 7th 8th

         displaying information 2nd

         performing hardware upgrades 2nd 3rd

    permit lists

         configuring 2nd

         example configuration 2nd

    port authentication

         configuring 2nd 3rd

    port security

         configuring 2nd

         example 2nd

         verifying configuration

         violations

    SNMP

         defining policies 2nd

    SSH

         configuring 2nd 3rd

     switch authentication 2nd

         example configuration 2nd

         RADIUS 2nd

         TACACS 2nd

     VLAN ACLs 2nd

         COS configuration 2nd

         IOS configuration 2nd 3rd

selecting

     IDSM service packs

     Layer 2 ports 2nd 3rd

         example

Selector field (NSAP addresses)

server farms

     load balancing

         configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th

         DFP 2nd 3rd

         SLB 2nd 3rd 4th 5th 6th 7th 8th

    SLB

         probes 2nd 3rd 4th 5th

server mode (VTP)

service contact ports

service packs

    IDSM

         selecting

session command

     accessing modules

session timeout values

     configuring

set length command 2nd

setting

     switch buffer size

severity level

    of syslog messages

         setting 2nd

SFM (Switch Fabric Module)

     configuring 2nd

     displaying information

show commands

     syntax

show modules command

SLB

     configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

    DFP

         configuring 2nd 3rd

     displaying information 2nd

     example 2nd 3rd 4th 5th 6th

     firewall load balancing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

         displaying information 2nd

         example 2nd 3rd 4th 5th 6th

    probes

         configuring 2nd 3rd 4th 5th

    sticky connections

         configuring 2nd 3rd 4th 5th 6th 7th 8th 9th

SNMP

    access

         configuring 2nd 3rd 4th 5th 6th

    configuration files

         saving

     configuring 2nd

     displaying information

     example 2nd

     notifications

         traps 2nd

     RMON support 2nd

SPAN (Switched Port Analyzer)

     configuring 2nd

    destination port

         configuring

     displaying information 2nd

     example 2nd

    RSPAN

         configuring 2nd 3rd 4th 5th

    source

         configuring 2nd

Spanning Tree MAC reduction

     enabling on extended range VLANs 2nd

SRM (single router mode)

     configuring 2nd 3rd

     displaying information

SSH (Secure Shell)

     configuring 2nd 3rd

SSRP (Simple Server Redundancy Protocol)

standard VLANs

     creating 2nd

standby Supervisor

     system redundancy

state parameter

    Ethernet VLANs

         configuring

static port assignment

     example 2nd 3rd

     verifying

static port assignment (VLANs) 2nd

static switching table entries

     assigning

statistics

    QoS

         exporting 2nd 3rd 4th

sticky connections 2nd 3rd 4th 5th 6th 7th 8th 9th

STP

     BID

     BPDUs

         TC bit set

     configuring 2nd 3rd 4th 5th 6th 7th

     convergence tuning 2nd 3rd 4th 5th

     displaying information

     election processes

     example 2nd

     examples

     improving stability

    load balancing

         examples 2nd

     path costs 2nd

     port states

     tiebreakers 2nd

     topology changes 2nd

     topology navigation 2nd 3rd 4th 5th

STP (Spanning Tree Protocol)

STP Root Guard

     enabling

Supervisor Engine

    banners

         configuring 2nd

    boot parameter

         synchronizing 2nd

     forcing changes in backup Supervisor 2nd

    high availability

         versioning 2nd 3rd

    IOS images

         synchronizing 2nd

    prompts

         configuring

     system redundancy

suppressing

     broadcasts 2nd 3rd 4th 5th

         time-based

         verifying configuration

switch authentication

     configuring 2nd

     example 2nd

    RADIUS

         configuring 2nd

    TACACS

         configuring 2nd

switch operating systems

     Cisco IOS

     COS 2nd

switch ports

    path costsshortmode

         default port cost 2nd

     STP states

switched networks

     design principles 2nd 3rd 4th 5th 6th

switches

     booting in rommon mode

switching table

    aging time

         configuring

     configuring

    default destination port

         defining

     displaying information

     example configuration 2nd 3rd

     removing entries

switching VTP versions 2nd

switchport trunk encapsulation command

synchronizing

     boot parameters 2nd

     IOS images 2nd

synchronous logging

syntax

     show commands

syntax checking (COS) 2nd

syslog server

     message logging 2nd 3rd 4th

         displaying information 2nd

         rate-limiting

         severity level 2nd

         severity levels 2nd

         time stamping

         to terminal sessions 2nd

system time

     example configuration

     manual configuration 2nd 3rd 4th

Категории