Index
IN-38
Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE
OL-26520-01
limiting the services to the user 9-16
operation of 9-12
overview 9-10
support for 1-12
tracking services accessed by user 9-17
tar files
creating
A-6
displaying the contents of A-7
extracting A-7
image file format A-25
TCAM
memory consistency check errors
example
39-27
memory consistency check routines 1-5, 39-26
memory consistency integrity 1-5, 39-26
space
HFTM
39-26
HQATM 39-26
unassigned 39-26
TDR 1-16
Telnet
accessing management interfaces
2-10
number of connections 1-7
setting a password 9-6
temporary self-signed certificate 9-47
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password
9-6
ternary content addressable memory
See TCAM
TFTP
configuration files
downloading
A-11
preparing the server A-11
uploading A-12
configuration files in base directory 3-7
configuring for autoconfiguration 3-7
image files
deleting
A-28
downloading A-27
preparing the server A-26
uploading A-29
limiting access by servers 30-17
TFTP server 1-6
threshold, traffic level 23-2
time
See NTP and system clock
Time Domain Reflector
See TDR
time-range command
31-15
time ranges in ACLs 31-15
time stamps in log messages 29-8
time zones 5-6
TLVs
defined
26-2
LLDP 26-2
LLDP-MED 26-2
Token Ring VLANs
support for
13-6
VTP support 14-5
ToS 1-13
traceroute, Layer 2
and ARP
39-16
and CDP 39-16
broadcast traffic 39-16
described 39-16
IP addresses and subnets 39-16
MAC addresses and VLANs 39-16
multicast traffic 39-16
multiple devices on a port 39-17
unicast traffic 39-16
usage guidelines 39-16
traceroute command 39-18
See also IP traceroute
traffic
blocking flooded
23-8
fragmented 31-4
fragmented IPv6 37-2