Configuration manual

Index
IN-50
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
tracked lists
configuring 42-3
types 42-3
tracked objects
by Boolean expression 42-4
by threshold percentage 42-6
by threshold weight 42-5
tracking interface line-protocol state 42-2
tracking IP routing state 42-2
tracking objects 42-1
tracking process 42-1
track state, tracking IP SLAs 42-9
traffic
blocking flooded 26-8
fragmented 34-5
fragmented IPv6 35-2
unfragmented 34-5
traffic policing 1-11
traffic suppression 26-1
transmit hold-count
see STP
transparent mode, VTP 14-3, 14-12
trap-door mechanism 3-2
traps
configuring MAC address notification 7-22
configuring managers 33-11
defined 33-3
enabling 7-22, 33-11
notification types 33-11
overview 33-1, 33-4
troubleshooting
connectivity problems 47-10, 47-12, 47-13
CPU utilization 47-23
detecting unidirectional links 29-1
displaying crash information 47-20
PIMv1 and PIMv2 interoperability problems 44-35
setting packet forwarding 47-18
SFP security and identification 47-9
show forward command 47-18
troubleshooting (continued)
with CiscoWorks 33-4
with debug commands 47-16
with ping 47-11
with system message logging 32-1
with traceroute 47-14
trunk failover
See link-state tracking
trunking encapsulation 1-8
trunk ports
configuring 13-21
defined 11-3, 13-3
encapsulation 13-21, 13-26, 13-27
trunks
allowed-VLAN list 13-22
configuring 13-21, 13-26, 13-27
ISL 13-16
load sharing
setting STP path costs 13-27
using STP port priorities 13-25, 13-26
native VLAN for untagged traffic 13-24
parallel 13-27
pruning-eligible list 13-23
to non-DTP device 13-18
trusted boundary for QoS 36-38
trusted port states
between QoS domains 36-40
classification options 36-5
ensuring port security for IP phones 36-38
support for 1-11
within a QoS domain 36-35
trustpoints, CA 8-43
tunneling
defined 17-1
IEEE 802.1Q 17-1
Layer 2 protocol 17-8