trusted boundary for QoS
trusted port states
between QoS domains
classification options
ensuring port security for IP phones
support for
1-8
within a QoS domain
trustpoints, CA
7-42
tunneling
defined
15-1
IEEE 802.1Q
15-1
Layer 2 protocol
15-8
tunnel ports
defined
11-4
described
9-4, 15-1
IEEE 802.1Q, configuring
incompatibilities with other features
twisted-pair Ethernet, detecting unidirectional links
type of service
See ToS
U
UDLD
configuration guidelines
default configuration
disabling
globally
26-5
on fiber-optic interfaces
per interface
26-5
echoing detection mechanism
enabling
globally
26-5
per interface
26-5
Layer 2 protocol tunneling
link-detection mechanism
neighbor database
26-2
overview
26-1
resetting an interface
OL-8915-03
32-38
32-40
32-5
32-38
32-36
15-6
15-6
26-4
26-4
26-5
26-3
15-10
26-1
26-6
UDLD (continued)
status, displaying
support for
UDP, configuring
unauthorized ports with IEEE 802.1x
unicast MAC address filtering
and adding static addresses
and broadcast MAC addresses
and CPU packets
and multicast addresses
and router MAC addresses
configuration guidelines
described
unicast storm
unicast storm control command
unicast traffic, blocking
UniDirectional Link Detection protocol
See UDLD
26-1
UNIX syslog servers
daemon configuration
facilities supported
message logging configuration
unrecognized Type-Length-Value (TLV) support
upgrading information
See release notes
upgrading software images
See downloading
UplinkFast
described
disabling
enabling
support for
uploading
configuration files
preparing
reasons for
using FTP
using RCP
using TFTP
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
26-6
1-5
34-14
8-7
1-4
5-25
5-25
5-25
5-25
5-25
5-25
5-25
23-1
23-4
23-8
29-12
29-13
29-12
18-3
18-13
18-13
1-5
B-11, B-13, B-17
B-9
B-15
B-18
B-12
Index
12-4
IN-41