Index
IN-39
Software Configuration Guide—Release 15.0(2)SG
OL-23818-01
configuring access VLANs 15-6
configuring allowed VLANs 15-6
default interface configuration 15-6
different VTP domains 15-3
enabling to non-DTP device 15-4
encapsulation 15-3
specifying native VLAN 15-6
understanding 15-3
trusted boundary for QoS 37-21
trustpoint 59-3
Trust State of interfaces, configuring
trust states
configuring 37-48
tunneling
defined 25-1
tunnel ports
802.1Q, configuring 25-6
described 25-2
incompatibilities with other features 25-5
TwinGig Convertors
limitations on using 6-14
port numbering 6-13
selecting X2/TwinGig Convertor mode 6-14
type length value
See TLV
type of service
See TOS
U
UDLD
configuring probe message interval
per-interface 28-8
default configuration 28-4
disabling on fiber-optic interfaces 28-7
disabling on non-fiber-optic interfaces 28-7
displaying link status 28-9
enabling globally 28-5
enabling per-interface 28-6
modes of operation 28-3
resetting disabled LAN interfaces 28-8
use case 28-2
UDLD, overview 28-1
UDP jitter, configuring 60-9
UDP jitter operation, IP SLAs 60-9
unauthorized ports with 802.1X 40-5
unicast
See IP unicast
unicast flood blocking
configuring 49-1
unicast MAC address filtering
and adding static addresses 4-29
and broadcast MAC addresses 4-28
and CPU packets 4-28
and multicast addresses 4-28
and router MAC addresses 4-28
configuration guidelines 4-28
described 4-28
unicast MAC address filtering, configuring
ACLs
configuring unicast MAC address filtering 47-20
Unicast RPF (Unicast Reverse Path Forwarding)
applying 32-5
BGP attributes
caution 32-5
CEF
requirement 32-2
tables 32-7
configuring 32-9
(examples) ?? to 32-12
BOOTP 32-8
DHCP 32-8
enterprise network (figure) 32-6
prerequisites 32-9
routing table requirements 32-7
tasks 32-9
verifying 32-10
deploying 32-5