Index
IN-39
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
system message logging (continued)
UNIX syslog servers
configuring the daemon
29-12
configuring the logging facility 29-12
facilities supported 29-13
system MTU and IEEE 802.1Q tunneling 15-5
system name
default configuration
5-15
default setting 5-15
manual configuration 5-15
See also DNS
system prompt, default setting
5-14, 5-15
system resources, optimizing 6-1
T
TACACS+
accounting, defined
7-11
authentication, defined 7-11
authorization, defined 7-11
configuring
accounting
7-17
authentication key 7-13
authorization 7-16
login authentication 7-14
default configuration 7-13
displaying the configuration 7-17
identifying the server 7-13
limiting the services to the user 7-16
operation of 7-12
overview 7-10
support for 1-8
tracking services accessed by user 7-17
tagged packets
IEEE 802.1Q
15-3
Layer 2 protocol 15-8
tar files
creating
B-6
displaying the contents of B-6
extracting B-8
image file format B-24
TDR 1-10
Telnet
accessing management interfaces
2-10
number of connections 1-4
setting a password 7-6
templates, SDM 6-1
temporary self-signed certificate 7-42
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password
7-6
TFTP
configuration files
downloading
B-12
preparing the server B-11
uploading B-12
configuration files in base directory 3-7
configuring for autoconfiguration 3-7
image files
deleting
B-27
downloading B-26
preparing the server B-26
uploading B-28
limiting access by servers 30-15
TFTP server 1-4
threshold, traffic level 23-2
time
See NTP and system clock
Time Domain Reflector
See TDR
time-range command
31-16
time ranges in ACLs 31-16
time stamps in log messages 29-7
time zones 5-12