Cisco Catalyst LAN Switching

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

TACACS+ 

tag schemes

    802.1Q 

tatic multiplexing

    ATM 

TCN BPDUs  2nd  3rd  [See also Configuration BPDUs]

    bridge tables, updating  2nd  3rd  4th 

    processing  2nd 

TCN retransmit timers 

TDM (time-division multiplexing) 

technologies

    baseband 

    broadband 

    cloud

        ATM 

    combining  2nd 

Telnet

    Catalyst configuration  2nd 

    TACACS+ authentication 

termination points

    legacy networks  2nd 

testing

    EARL 

    ELANs

        connectivity  2nd  3rd  4th 

    HSRP 

    LANE configuration  2nd  3rd  4th 

text

    commands

        editing 

TFTP

    Catalyst configuration 

    Catalyst, configuring 

TFTP servers

    files

        retrieving 

    security 

thoughput

    ATM cells  2nd 

three-layer model

    campus network design  2nd 

throughput

    bridged VLANs  2nd 

    switching  2nd 

timers

    Max Age

        tuning   2nd 

    SPT

        tuning  2nd 

    STP  2nd  3rd  4th  5th  6th 

Token Ring 

    comparing to Ethernet  2nd  3rd  4th 

    components 

    early token release 

    hub architecture 

    migrating to Ethernet 

    ring monitor 

    SR-TLB (source-route translational bridging)  2nd  3rd  4th 

    SRB (source-route bridging)  2nd  3rd 

    SRT (source-route transparent bridging)  2nd  3rd 

    switching

        DRiP 

        source-route  2nd 

        TrBRF  2nd 

        TrCRF  2nd 

    VLANs 

    VTP version 2 

topologies

    back-to-back switches

        load balancing 

    convergence

        Designated Ports, electing  2nd 

        improving  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th 

        Root Bridge, electing  2nd 

        Root Ports, electing  2nd 

        TCN BPDUs  2nd  3rd  4th  5th 

    loop-free 

        management VLANs 

    SPT

        designing 

        Root Bridge, positioning  2nd  3rd  4th 

    STP

        domains 

        reachability  2nd  3rd 

    STP convergence  2nd  3rd  4th  5th  6th 

tracking

    VTP activity 

traffic

    80/20 rule 

    broadcasts

        ARP frames 

        over LANE  2nd 

        over legacy networks 

        simulating 

        suppressing  2nd  3rd  4th  5th  6th 

    capturing 

    collisions

        5/3/1 rule 

        late 

        runt frames 

    combining types  2nd 

    control traffic 

    end-user 

    Ethernet LANE

        frame format  2nd 

    filtering  2nd 

    flow control 

    flows

        HSRP, optimizing  2nd 

    Gigabit Ethernet

        monitoring 

    ISL encapsulation  2nd 

    isochronous 

    management traffic 

    multicast  2nd 

        IGMP Snooping  2nd 

        routing 

    multiplexing

        IEEE 802.1Q  2nd 

    multiplexing over VLANs 

    multiservice

        ATM 

    packets

        comparing to frames  2nd 

    patterns  2nd  3rd 

        STP 

    peak utilization 

    unicasts 

    VLANs

        separating  2nd 

    VTP pruning  2nd  3rd 

traffic shaping

    ATM 

translational bridging

    Catalyst Token Ring modules 

transparent bridging  2nd 

    aging timers  2nd 

    filtering 

    flooding 

    flow chart  2nd 

    forwarding 

    learning process 

transparent devices

    VLANs

        removing 

traps

    SNMP

        enabling 

TrBRF (Token Ring Bridge Relay Function)  2nd 

TrCRF

    undistributed 

TrCRF (Token Ring Concentrator Relay Function) 

triangles (SPT)

    evaluating  2nd 

triangular connectivity

    distribution blocks 

    MDF switches  2nd  3rd 

    MLS  2nd 

trigger point

    switching modes 

TRISL (Token Ring ISL)  2nd 

troubleshooting

    "broken" subnets  2nd  3rd  4th  5th  6th  7th  8th 

    bucket approach 

        cabling  2nd 

        configuration  2nd 

        miscellaneous problems  2nd 

    documentation 

    hardware, manufacturing flaws 

    load balancing

        campus networks  2nd  3rd 

    MPOA 

    OSI model approach  2nd  3rd 

    STP  2nd  3rd 

    utilities

        Catalyst  2nd  3rd  4th  5th  6th 

        RSM  2nd 

        SPAN  2nd 

trunk switchport interfaces  2nd 

trunking  [See also VTP]2nd  3rd 

    bandwidth requirements  2nd 

    Catalyst switches  2nd  3rd  4th 

    cost-effectiveness 

    multiple VLANs  2nd 

    router-on-a-stick design  2nd  3rd  4th  5th  6th 

trunking protocols

    comparing 

trunks

    ATM  2nd  3rd 

        LANE  2nd  3rd  4th 

        MPOA  2nd  3rd 

    DISL

        configuration, verifying 

    DISL (Dynamic ISL)  2nd  3rd 

    DTP (Dynamic Trunk Protocol)  2nd  3rd 

    EtherChannel  2nd 

        bundling ports  2nd  3rd  4th  5th 

    FDDI  2nd  3rd  4th  5th 

    ISL encapsulation  2nd  3rd 

    Layer 3 switching

        8500s 

    MLS

        design scenario 

    selecting  2nd  3rd  4th  5th  6th  7th  8th 

tuning

    Forward Delay  2nd  3rd  4th 

    Hello Time  2nd 

    Max Age  2nd  3rd  4th  5th  6th  7th 

    SPT

        timers  2nd 

    STP

        guidelines  2nd  3rd  4th  5th 

tunneling

    PVST+ 

two-level tagging encapsulation 

Категории