Cisco Field Manual. Catalyst Switch Configuration

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

T1/E1 CSU/DSU back-to-back connections 2nd

TACACS

     configuring 2nd

TCN BPDUs 2nd

Telnet

     closing sessions

    SSH

         configuring 2nd 3rd

temperature monitoring 2nd

terminal screen length

     configuring 2nd

terminal sessions

     IOS 2nd

         configuring timeout values 2nd

         displaying

         ending

         resuming

         screen format

tiebreakers (STP) 2nd

time stamping

     syslog messages

time zone

     configuring

time-based broadcast suppression

timeout values

    IOS terminal sessions

         configuring 2nd

timers

     GARP

     STP convergence tuning 2nd 3rd 4th 5th

token bucket algorithm

Token Ring

     configuring 2nd 3rd 4th

     displaying information

     example configuration 2nd

topology changes (STP) 2nd

ToS (Type of Service) byte

traceroute command

     router discovery 2nd 3rd 4th

tracing

     packets 2nd 3rd

tracing packets

     example 2nd

traffic

     broadcast suppression 2nd

         configuring 2nd 3rd

         time-based

         verifying configuration

     controlling with protocol filtering

         verifying configuration

    load balancing

         SLB 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th

     out-of-profile

     policing 2nd 3rd 4th 5th 6th 7th

     QoS policies 2nd 3rd 4th 5th 6th

         applying 2nd 3rd 4th 5th 6th

         class maps 2nd

         defining 2nd 3rd 4th

     restricting with VLAN ACLs 2nd

         COS configuration 2nd

         IOS configuration 2nd 3rd

transferring

     system files 2nd

traps (SNMP) 2nd

truncated mode (SFM)

trunking

     configuring 2nd 3rd

    DTP

         disabling

    encapsulation method

         specifying 2nd

     example 2nd

     identifying trunk link

     removing VLANs from trunk lins 2nd

     verifying VLAN port assignments

    VTP

         changing modes 2nd

         changing versions 2nd

         configuring 2nd 3rd

         example 2nd

         pruning 2nd

         server mode

         setting passwords 2nd

         verifying operation

trunks

    802.1Q

         voice traffic transport

     scaling

tuning

     egress scheduling 2nd

     ingress port queues 2nd 3rd 4th 5th

type codes

     Ethernet 2nd 3rd 4th 5th 6th 7th 8th 9th

Категории