Red Hat Fedora 5 Unleashed

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

tagging

     IEEE 802.1Q

     ISL

TC (topology change) messages

TCAM (Ternary Content Addressable Memory) 2nd

     tables

         example of

         port operations

         structure of

         VMR combinations

TCI (Tag Control Information) field

TCN BPDUs

Telnet, remote access

text descriptions, adding to switch ports

throttling adjacencies

thwarting VLAN hopping

tie conditions of Root Path Cost

timers (STP)

     automatic configuration

     manual configuration

     modifying

Token Ring

     collisions, susceptibility to

     support on VTP version 2

topologies

    changes

         direct

         indirect

         insignificant

         RSTP, detecting

     flat network

topology-based MLS

ToS (type of service)

traffic

     core block

     flooding, VTP pruning

     multicast

     patterns, 20/80 rule

transparent bridges

     redundancy

     versus Ethernet switches

transparent mode (VTP)

     configuring

     version-dependent

troubleshooting

     CAM table operation

    CatOS

         debug commands

         show commands

     EtherChannel

     STP 2nd

    switch ports

         connectivity

         error conditions

     TCAM table operation

     trunks

     VLANs

     VTP

trunk links

trunking

     client mode, configuring

     configuring

     configuring management domains

     configuring transparent mode

     configuring version

     DTP, disabling

     example configuration

     IEEE 802.1Q, CST

     management domains 2nd

     pruning

     server mode

     server mode, configuring

     status, displaying

     subset advertisements

     summary advertisements

     transparent mode 2nd

     troubleshooting

     VTP 2nd 3rd

         advertisements

         client mode

trunks

     accessing with switch spoofing

     configuring

     DTP

     example configuration

     troubleshooting

     VLAN hopping

trust boundaries

Категории