Cisco Systems 2950 Telephone User Manual


 
Index
IN-22
Catalyst 2950 Desktop Switch Software Configuration Guide
78-11380-05
SNMP (continued)
configuration examples
23-14
default configuration 23-6
groups 23-8
in clusters 6-17
informs
and trap keyword
23-10
described 23-5
differences from traps 23-5
enabling 23-12
limiting access by TFTP servers 23-13
limiting system log messages to NMS 22-10
manager functions 23-3
managing clusters with 6-27
MIBs
location of
A-2
supported A-1
notifications 23-5
overview 23-1, 23-4
status, displaying 23-15
system contact and location 23-13
trap manager, configuring 23-11
traps
described
23-3, 23-5
differences from informs 23-5
enabling 23-10
enabling MAC address notification 7-54
overview 23-1, 23-4
types of 23-10
users 23-8
versions supported 23-2
snooping, IGMP 16-1
software, VLAN considerations 14-8
software images
recovery procedures
27-2
See also downloading and uploading
source addresses, in ACLs
24-12
SPAN
configuration guidelines
20-7
default configuration 20-6
destination ports 20-4
displaying status 20-14
interaction with other features 20-5
monitored ports 20-4
monitoring ports 20-4
overview 1-5, 20-1
received traffic 20-3
session limits 20-6
sessions
creating
20-7
defined 20-3
removing destination (monitoring) ports 20-9
removing source (monitored) ports 20-9
specifying monitored ports 20-7
source ports 20-4
transmitted traffic 20-3
spanning tree and native VLANs 13-17
Spanning Tree Protocol
See STP
speed, configuring on interfaces
9-10
Stack Membership Discovery Protocol 12-6
Standby Command Configuration window 6-24
standby command switch
configuring
6-23
considerations 6-14
defined 6-2
priority 6-13
requirements 6-3
virtual IP address 6-14
See also cluster standby group and HSRP
standby group, cluster
See cluster standby group and HSRP
static access mode
3-8