Index
IN-39
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
system message logging (continued)
UNIX syslog servers
configuring the daemon
29-12
configuring the logging facility
29-12
facilities supported
29-13
system MTU and IEEE 802.1Q tunneling
15-5
system name
default configuration
5-15
default setting
5-15
manual configuration
5-15
See also DNS
system prompt, default setting
5-14, 5-15
system resources, optimizing
6-1
T
accounting, defined
7-11
authentication, defined
7-11
authorization, defined
7-11
configuring
accounting
7-17
authentication key
7-13
authorization
7-16
login authentication
7-14
default configuration
7-13
displaying the configuration
7-17
identifying the server
7-13
limiting the services to the user
7-16
operation of
7-12
overview
7-10
support for
1-8
tracking services accessed by user
7-17
tagged packets
IEEE 802.1Q
15-3
Layer 2 protocol
15-8
tar files
creating
B-6
displaying the contents of
B-6
extracting
B-8
image file format
B-24
TDR
1-10
Telnet
accessing management interfaces
2-10
number of connections
1-4
setting a password
7-6
templates, SDM
6-1
temporary self-signed certificate
7-42
Terminal Access Controller Access Control System Plus
See
terminal lines, setting a password
7-6
TFTP
configuration files
downloading
B-12
preparing the server
B-11
uploading
B-12
configuration files in base directory
3-7
configuring for autoconfiguration
3-7
image files
deleting
B-27
downloading
B-26
preparing the server
B-26
uploading
B-28
limiting access by servers
30-15
TFTP server
1-4
threshold, traffic level
23-2
time
See NTP and system clock
Time Domain Reflector
See TDR
time-range command
31-16
time ranges in ACLs
31-16
time stamps in log messages
29-7
time zones
5-12