Configuration manual
Index
IN-49
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
TACACS+ (continued)
configuring
accounting 8-17
authentication key 8-13
authorization 8-16
login authentication 8-14
default configuration 8-13
displaying the configuration 8-17
identifying the server 8-13
limiting the services to the user 8-16
operation of 8-12
overview 8-10
support for 1-11
tracking services accessed by user 8-17
tagged packets
IEEE 802.1Q 17-3
Layer 2 protocol 17-7
tar files
creating B-7
displaying the contents of B-7
extracting B-8
image file format B-25
TDR 1-14
Telnet
accessing management interfaces 2-11
number of connections 1-6
setting a password 8-6
templates, SDM 9-2
temporary self-signed certificate 8-43
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password 8-6
TFTP
configuration files
downloading B-12
preparing the server B-11
uploading B-12
configuration files in base directory 3-7
configuring for autoconfiguration 3-7
TFTP (continued)
image files
deleting B-29
downloading B-27
preparing the server B-26
uploading B-29
limiting access by servers 33-16
TFTP server 1-6
threshold, traffic level 26-2
threshold monitoring, IP SLAs 41-5
time
See NTP and system clock
Time Domain Reflector
See TDR
time-range command 34-17
time ranges in ACLs 34-17
time stamps in log messages 32-8
time zones 7-12
TLVs
defined 28-1
LLDP 28-2
LLDP-MED 28-2
Token Ring VLANs
support for 13-6
VTP support 14-4
ToS 1-11
traceroute, Layer 2
and ARP 47-13
and CDP 47-12
broadcast traffic 47-12
described 47-12
IP addresses and subnets 47-13
MAC addresses and VLANs 47-13
multicast traffic 47-13
multiple devices on a port 47-13
unicast traffic 47-12
usage guidelines 47-12
traceroute command 47-14
See also IP traceroute