Index
IN-22
Software Configuration Guide—Release 12.2(25)SG
OL-7659-03
See TDR
time exceeded messages 5-8
timer
See login timer
Token Ring
media not supported (note) 10-4, 10-10
TOS
description 27-4
trace command 5-9
traceroute
See IP traceroute
See Layer 2 Traceroute
traceroute mac command 5-10
traceroute mac ip command 5-11
traffic
blocking flooded 35-2
traffic control
using ACLs (figure) 33-4
using VLAN maps (figure) 33-5
traffic shaping 27-15
translational bridge numbers (defaults) 10-4
transmit queues
See QoS transmit queues
transmit rate 27-50
troubleshooting
with traceroute 5-8
trunk ports
802.1X authentication not supported on 29-15
configuring PVLAN 34-9 to 34-11
trunk port security
configuring 30-7
trunks
802.1Q restrictions 11-5
configuring 11-6
configuring access VLANs 11-6
configuring allowed VLANs 11-6
default interface configuration 11-6
different VTP domains 11-3
enabling to non-DTP device 11-4
encapsulation 11-3
specifying native VLAN 11-6
understanding 11-3
trusted boundary for QoS 27-26
trust states
configuring 27-46
tunneling
defined 18-1
Layer 2 protocol 18-7
tunnel ports
802.1Q, configuring 18-6
described 18-2
incompatibilities with other features 18-5
type of service
See TOS
U
UDLD
default configuration 20-2
disabling 20-3
enabling 20-3
overview 20-1
unauthorized ports with 802.1X 29-4
unicast
See IP unicast
unicast flood blocking
configuring 35-1
unicast traffic
blocking 35-2
unidirectional ethernet
enabling 21-2
example of setting 21-2
overview 21-1
UniDirectional Link Detection Protocol
See UDLD
UplinkFast
and MST 15-2
enabling 14-15