SRR
configuring
shaped weights on egress queues
shared weights on egress queues
shared weights on ingress queues
described
32-12
shaped mode
32-12
shared mode
32-12
support for
1-8
SSH
configuring
9-39
cryptographic software image
described
1-5, 9-38
encryption methods
9-38
switch stack considerations
user authentication methods, supported
stack changes, effects on
802.1x port-based authentication
ACL configuration
31-6
CDP
25-2
cross-stack EtherChannel
EtherChannel
33-9
fallback bridging
38-3
HSRP
35-2
IGMP snooping
23-6
IP routing
34-3
MAC address tables
7-22
MSTP
18-6
multicast routing
36-8
MVR
23-13
port security
24-15
SDM template selection
SNMP
30-1
SPAN and RSPAN
27-10
STP
17-12
switch clusters
6-14
system message log
29-2
VLANs
13-7
VTP
14-6
78-16180-02
32-64
32-65
32-58
9-37
5-14, 9-38
9-38
10-10
33-12
8-2
stack master
bridge ID (MAC address)
defined
5-1
election
5-4
re-election
5-4
See also stacks, switch
stack member
accessing CLI of specific member
configuring
member number
5-17
priority value
5-18
defined
5-1
displaying information of
number
5-6
priority value
5-7
provisioning a new member
replacing
5-13
See also stacks, switch
stack member number
11-7
stack protocol version
5-11
stacks, switch
accessing CLI of specific member
assigning information
member number
5-17
priority value
5-18
provisioning a new member
benefits
1-2
bridge ID
5-5
CDP considerations
25-2
compatibility, software
configuration file
5-12
configuration scenarios
copying an image file from one member to another
default configuration
5-17
description of
5-1
displaying information of
HSRP considerations
35-2
in clusters
6-14
incompatible software and image upgrades
Catalyst 3750 Switch Software Configuration Guide
Index
5-5
5-19
5-20
5-18
5-19
5-18
5-10
5-15
5-20
5-11, B-34
IN-39
B-34