Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] saving ROM Monitor configuration variables scaling trunks SCCP (Skinny Client Control Protocol) screen format IOS terminal sessions searching IOS command output 2nd security firewalls SLB load balancing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st IDSM configuring 2nd 3rd 4th 5th 6th 7th 8th displaying information 2nd performing hardware upgrades 2nd 3rd permit lists configuring 2nd example configuration 2nd port authentication configuring 2nd 3rd port security configuring 2nd example 2nd verifying configuration violations SNMP defining policies 2nd SSH configuring 2nd 3rd switch authentication 2nd example configuration 2nd RADIUS 2nd TACACS 2nd VLAN ACLs 2nd COS configuration 2nd IOS configuration 2nd 3rd selecting IDSM service packs Layer 2 ports 2nd 3rd example Selector field (NSAP addresses) server farms load balancing configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th DFP 2nd 3rd SLB 2nd 3rd 4th 5th 6th 7th 8th SLB probes 2nd 3rd 4th 5th server mode (VTP) service contact ports service packs IDSM selecting session command accessing modules session timeout values configuring set length command 2nd setting switch buffer size severity level of syslog messages setting 2nd SFM (Switch Fabric Module) configuring 2nd displaying information show commands syntax show modules command SLB configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th DFP configuring 2nd 3rd displaying information 2nd example 2nd 3rd 4th 5th 6th firewall load balancing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th displaying information 2nd example 2nd 3rd 4th 5th 6th probes configuring 2nd 3rd 4th 5th sticky connections configuring 2nd 3rd 4th 5th 6th 7th 8th 9th SNMP access configuring 2nd 3rd 4th 5th 6th configuration files saving configuring 2nd displaying information example 2nd notifications traps 2nd RMON support 2nd SPAN (Switched Port Analyzer) configuring 2nd destination port configuring displaying information 2nd example 2nd RSPAN configuring 2nd 3rd 4th 5th source configuring 2nd Spanning Tree MAC reduction enabling on extended range VLANs 2nd SRM (single router mode) configuring 2nd 3rd displaying information SSH (Secure Shell) configuring 2nd 3rd SSRP (Simple Server Redundancy Protocol) standard VLANs creating 2nd standby Supervisor system redundancy state parameter Ethernet VLANs configuring static port assignment example 2nd 3rd verifying static port assignment (VLANs) 2nd static switching table entries assigning statistics QoS exporting 2nd 3rd 4th sticky connections 2nd 3rd 4th 5th 6th 7th 8th 9th STP BID BPDUs TC bit set configuring 2nd 3rd 4th 5th 6th 7th convergence tuning 2nd 3rd 4th 5th displaying information election processes example 2nd examples improving stability load balancing examples 2nd path costs 2nd port states tiebreakers 2nd topology changes 2nd topology navigation 2nd 3rd 4th 5th STP (Spanning Tree Protocol) STP Root Guard enabling Supervisor Engine banners configuring 2nd boot parameter synchronizing 2nd forcing changes in backup Supervisor 2nd high availability versioning 2nd 3rd IOS images synchronizing 2nd prompts configuring system redundancy suppressing broadcasts 2nd 3rd 4th 5th time-based verifying configuration switch authentication configuring 2nd example 2nd RADIUS configuring 2nd TACACS configuring 2nd switch operating systems Cisco IOS COS 2nd switch ports path costsshortmode default port cost 2nd STP states switched networks design principles 2nd 3rd 4th 5th 6th switches booting in rommon mode switching table aging time configuring configuring default destination port defining displaying information example configuration 2nd 3rd removing entries switching VTP versions 2nd switchport trunk encapsulation command synchronizing boot parameters 2nd IOS images 2nd synchronous logging syntax show commands syntax checking (COS) 2nd syslog server message logging 2nd 3rd 4th displaying information 2nd rate-limiting severity level 2nd severity levels 2nd time stamping to terminal sessions 2nd system time example configuration manual configuration 2nd 3rd 4th |