Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide, Rel. 12.2(25)SEF1

Index
IN-30
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
pruning-eligible list 10-20
to non-DTP device 10-15
trusted boundary for QoS 27-37
trusted port states
between QoS domains
27-39
classification options 27-5
ensuring port security for IP phones 27-37
support for 1-7
within a QoS domain 27-35
trustpoints, CA 6-42
twisted-pair Ethernet, detecting unidirectional links 21-1
type of service
See ToS
U
UDLD
configuration guidelines
21-4
default configuration 21-4
disabling
globally
21-5
on fiber-optic interfaces 21-5
per interface 21-5
echoing detection mechanism 21-2
enabling
globally
21-5
per interface 21-5
link-detection mechanism 21-1
neighbor database 21-2
overview 21-1
resetting an interface 21-6
status, displaying 21-6
support for 1-4
unauthorized ports with IEEE 802.1x 7-7
unicast MAC address filtering 1-3
and adding static addresses 5-25
and broadcast MAC addresses 5-25
and CPU packets 5-25
and multicast addresses 5-25
and router MAC addresses 5-25
configuration guidelines 5-25
described 5-25
unicast storm 19-1
unicast storm control command 19-4
unicast traffic, blocking 19-7
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration
24-10
facilities supported 24-11
message logging configuration 24-11
unrecognized Type-Length-Value (TLV) support 11-4
upgrading information
See release notes
upgrading software images
See downloading
UplinkFast
described
15-3
disabling 15-13
enabling 15-13
support for 1-4
uploading
configuration files
preparing
B-11, B-13, B-16
reasons for B-9
using FTP B-14
using RCP B-18
using TFTP B-12
image files
preparing
B-21, B-25, B-29
reasons for B-19
using FTP B-27
using RCP B-32
using TFTP B-24
user EXEC mode 2-2
username-based authentication 6-6