Index
IN-49
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
authorization 7-16
login authentication 7-14
default configuration 7-13
displaying the configuration 7-17
identifying the server 7-13
limiting the services to the user 7-16
operation of 7-12
overview 7-10
support for 1-10
tracking services accessed by user 7-17
tagged packets
IEEE 802.1Q 16-3
Layer 2 protocol 16-7
tar files
creating B-7
displaying the contents of B-7
extracting B-8
image file format B-25
TCL script, registering and defining with embedded event
manager 33-6
TDR 1-13
Telnet
accessing management interfaces 2-11
number of connections 1-6
setting a password 7-6
templates, SDM 8-1
temporary self-signed certificate 7-43
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password 7-6
TFTP
configuration files
downloading B-12
preparing the server B-11
uploading B-12
configuration files in base directory 3-6
configuring for autoconfiguration 3-6
image files
deleting B-29
downloading B-27
preparing the server B-27
uploading B-29
limiting access by servers 32-15
TFTP server 1-6
threshold, traffic level 25-2
threshold monitoring, IP SLAs 41-6
time
See NTP and system clock
Time Domain Reflector
See TDR
time-range command 34-17
time ranges in ACLs 34-17
time stamps in log messages 31-8
time zones 6-12
TLVs
defined 27-2
LLDP 27-2
LLDP-MED 27-2
Token Ring VLANs
support for 12-6
VTP support 13-4
ToS 1-11
traceroute, Layer 2
and ARP 47-13
and CDP 47-12
broadcast traffic 47-12
described 47-12
IP addresses and subnets 47-13
MAC addresses and VLANs 47-12
multicast traffic 47-12
multiple devices on a port 47-13
unicast traffic 47-12
usage guidelines 47-12
traceroute command 47-14
See also IP traceroute
tracked lists
configuring 42-3
types 42-3