Index
IN-41
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
trusted boundary for QoS 32-38
trusted port states
between QoS domains
32-40
classification options 32-5
ensuring port security for IP phones 32-38
support for 1-8
within a QoS domain 32-36
trustpoints, CA 7-42
tunneling
defined
15-1
IEEE 802.1Q 15-1
Layer 2 protocol 15-8
tunnel ports
defined
11-4
described 9-4, 15-1
IEEE 802.1Q, configuring 15-6
incompatibilities with other features 15-6
twisted-pair Ethernet, detecting unidirectional links 26-1
type of service
See ToS
U
UDLD
configuration guidelines
26-4
default configuration 26-4
disabling
globally
26-5
on fiber-optic interfaces 26-5
per interface 26-5
echoing detection mechanism 26-3
enabling
globally
26-5
per interface 26-5
Layer 2 protocol tunneling 15-10
link-detection mechanism 26-1
neighbor database 26-2
overview 26-1
resetting an interface 26-6
UDLD (continued)
status, displaying
26-6
support for 1-5
UDP, configuring 34-14
unauthorized ports with IEEE 802.1x 8-7
unicast MAC address filtering 1-4
and adding static addresses 5-25
and broadcast MAC addresses 5-25
and CPU packets 5-25
and multicast addresses 5-25
and router MAC addresses 5-25
configuration guidelines 5-25
described 5-25
unicast storm 23-1
unicast storm control command 23-4
unicast traffic, blocking 23-8
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration
29-12
facilities supported 29-13
message logging configuration 29-12
unrecognized Type-Length-Value (TLV) support 12-4
upgrading information
See release notes
upgrading software images
See downloading
UplinkFast
described
18-3
disabling 18-13
enabling 18-13
support for 1-5
uploading
configuration files
preparing
B-11, B-13, B-17
reasons for B-9
using FTP B-15
using RCP B-18
using TFTP B-12