Index
IN-53
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
trusted boundary for QoS 1-45
trusted port states
between QoS domains
1-47
classification options 1-5
ensuring port security for IP phones 1-45
support for 1-15
within a QoS domain 1-43
trustpoints, CA 1-49
tunneling
defined
1-1
IEEE 802.1Q 1-1
Layer 2 protocol 1-8
tunnel ports
described
1-4, 1-2
IEEE 802.1Q, configuring 1-7
incompatibilities with other features 1-6
twisted-pair Ethernet, detecting unidirectional links 1-1
type of service
See ToS
U
UDLD
configuration guidelines
1-4
default configuration 1-4
disabling
globally
1-5
on fiber-optic interfaces 1-5
per interface 1-6
echoing detection mechanism 1-3
enabling
globally
1-5
per interface 1-6
Layer 2 protocol tunneling 1-11
link-detection mechanism 1-1
neighbor database 1-2
overview 1-1
resetting an interface 1-6
status, displaying 1-7
support for 1-9
UDP, configuring 1-16
UDP jitter, configuring 1-9
UDP jitter operation, IP SLAs 1-8
unauthorized ports with IEEE 802.1x 1-10
unicast MAC address filtering 1-7
and adding static addresses 1-21
and broadcast MAC addresses 1-21
and CPU packets 1-21
and multicast addresses 1-21
and router MAC addresses 1-21
configuration guidelines 1-21
described 1-21
unicast storm 1-1
unicast storm control command 1-4
unicast traffic, blocking 1-8
UniDirectional Link Detection protocol
See UDLD
universal software image
1-1
feature set
IP base
1-1, 1-2
IP services 1-2
UNIX syslog servers
daemon configuration
1-12
facilities supported 1-14
message logging configuration 1-13
unrecognized Type-Length-Value (TLV) support 1-5
upgrading software images
See downloading
UplinkFast
described
1-3
disabling 1-16
enabling 1-15
support for 1-9
uploading
configuration files
preparing
1-11, 1-14, 1-17
reasons for 1-9
using FTP 1-16