SNMP (continued)
in-band management
in clusters
6-13
informs
and trap keyword
described
29-5
differences from traps
disabling
29-15
enabling
29-15
limiting access by TFTP servers
limiting system log messages to NMS
manager functions
1-4, 29-3
managing clusters with
MIBs
location of
A-3
supported
A-1
notifications
29-5
overview
29-1, 29-4
security levels
29-3
status, displaying
29-17
system contact and location
trap manager, configuring
traps
described
29-3, 29-5
differences from informs
disabling
29-15
enabling
29-11
enabling MAC address notification
overview
29-1, 29-4
types of
29-11
users
29-6, 29-9
versions supported
29-2
SNMPv1
29-2
SNMPv2C
29-2
SNMPv3
29-2
snooping, IGMP
21-1
OL-13018-01
1-5
29-11
29-5
29-15
28-10
6-15
29-15
29-13
29-5
7-21
software images
location in flash
B-23
recovery procedures
scheduling reloads
4-20
tar file format, described
See also downloading and uploading
source addresses
in IPv4 ACLs
30-9
source-and-destination-IP address based forwarding,
EtherChannel
33-7
source-and-destination MAC address forwarding,
EtherChannel
33-6
source-IP address based forwarding, EtherChannel
source-MAC address forwarding, EtherChannel
SPAN
configuration guidelines
default configuration
destination ports
26-6
displaying status
26-22
interaction with other features
monitored ports
26-5
monitoring ports
26-6
overview
1-9, 26-1
ports, restrictions
22-12
received traffic
26-4
sessions
configuring ingress forwarding
creating
26-10
defined
26-3
limiting source traffic to specific VLANs
removing destination (monitoring) ports
specifying monitored ports
with ingress traffic enabled
source ports
26-5
transmitted traffic
26-5
VLAN-based
26-6
spanning tree and native VLANs
Spanning Tree Protocol
See STP
Cisco IE 3000 Switch Software Configuration Guide
Index
34-2
B-24
33-6
26-10
26-9
26-8
26-14, 26-21
26-14
26-12
26-10
26-13
13-15
IN-29
33-7