Index
IN-50
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
tracked objects
by Boolean expression 42-4
by threshold percentage 42-6
by threshold weight 42-5
tracking interface line-protocol state 42-2
tracking IP routing state 42-2
tracking objects 42-1
tracking process 42-1
track state, tracking IP SLAs 42-9
traffic
blocking flooded 25-7
fragmented 34-5
fragmented IPv6 35-3
unfragmented 34-5
traffic policing 1-11
traffic suppression 25-1
transmit hold-count
see STP
transparent mode, VTP 13-3, 13-12
trap-door mechanism 3-2
traps
configuring MAC address notification 6-22
configuring managers 32-11
defined 32-3
enabling 6-22, 32-11
notification types 32-11
overview 32-1, 32-4
troubleshooting
connectivity problems 47-10, 47-12, 47-13
detecting unidirectional links 28-1
displaying crash information 47-20
PIMv1 and PIMv2 interoperability problems 44-27
setting packet forwarding 47-18
SFP security and identification 47-9
show forward command 47-18
with CiscoWorks 32-4
with debug commands 47-16
with ping 47-10
with system message logging 31-1
with traceroute 47-13
trunk failover
See link-state tracking
trunking encapsulation 1-8
trunk ports
configuring 12-21
defined 10-3, 12-3
encapsulation 12-21, 12-26, 12-27
trunks
allowed-VLAN list 12-22
configuring 12-21, 12-26, 12-27
ISL 12-16
load sharing
setting STP path costs 12-27
using STP port priorities 12-25, 12-26
native VLAN for untagged traffic 12-24
parallel 12-27
pruning-eligible list 12-23
to non-DTP device 12-18
trusted boundary for QoS 36-38
trusted port states
between QoS domains 36-40
classification options 36-5
ensuring port security for IP phones 36-38
support for 1-11
within a QoS domain 36-35
trustpoints, CA 7-4 3
tunneling
defined 16-1
IEEE 802.1Q 16-1
Layer 2 protocol 16-8