Index
IN-41
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
trusted boundary for QoS
32-38
trusted port states
between QoS domains
32-40
classification options
32-5
ensuring port security for IP phones
32-38
support for
1-8
within a QoS domain
32-36
trustpoints, CA
7-42
tunneling
defined
15-1
IEEE 802.1Q
15-1
Layer 2 protocol
15-8
tunnel ports
defined
11-4
described
9-4, 15-1
IEEE 802.1Q, configuring
15-6
incompatibilities with other features
15-6
twisted-pair Ethernet, detecting unidirectional links
26-1
type of service
See ToS
U
UDLD
configuration guidelines
26-4
default configuration
26-4
disabling
globally
26-5
on fiber-optic interfaces
26-5
per interface
26-5
echoing detection mechanism
26-3
enabling
globally
26-5
per interface
26-5
Layer 2 protocol tunneling
15-10
link-detection mechanism
26-1
neighbor database
26-2
overview
26-1
resetting an interface
26-6
UDLD (continued)
status, displaying
26-6
support for
1-5
UDP, configuring
34-14
unauthorized ports with IEEE 802.1x
8-7
unicast MAC address filtering
1-4
and adding static addresses
5-25
and broadcast MAC addresses
5-25
and CPU packets
5-25
and multicast addresses
5-25
and router MAC addresses
5-25
configuration guidelines
5-25
described
5-25
unicast storm
23-1
unicast storm control command
23-4
unicast traffic, blocking
23-8
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration
29-12
facilities supported
29-13
message logging configuration
29-12
unrecognized Type-Length-Value (TLV) support
12-4
upgrading information
See release notes
upgrading software images
See downloading
UplinkFast
described
18-3
disabling
18-13
enabling
18-13
support for
1-5
uploading
configuration files
preparing
B-11, B-13, B-17
reasons for
B-9
using FTP
B-15
using RCP
B-18
using TFTP
B-12