A SERVICE OF

logo

Index
IN-35
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
accounting, defined 9-11
authentication, defined 9-11
authorization, defined 9-11
configuring
accounting 9-17
authentication key 9-13
authorization 9-16
login authentication 9-14
default configuration 9-13
displaying the configuration 9-18
identifying the server 9-13
in clusters 5-12
limiting the services to the user 9-16
operation of 9-12
overview 9-10
support for 1-8
tracking services accessed by user 9-17
tar files
creating B-7
displaying the contents of B-7
extracting B-8
image file format B-23
TDR 1-10
Telnet
accessing management interfaces 2-10
number of connections 1-4
setting a password 9-6
temperature alarms, configuring 7-7, 7-8
temporary self-signed certificate 9-51
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password 9-6
TFTP
configuration files
downloading B-11
preparing the server B-10
uploading B-12
configuration files in base directory 3-7
configuring for autoconfiguration 3-7
image files
deleting B-26
downloading B-25
preparing the server B-24
uploading B-27
limiting access by servers 31-16
TFTP server 1-4
threshold, traffic level 24-2
threshold monitoring, IP SLAs 35-6
time
See NTP and system clock
Time Domain Reflector
See TDR
time-range command 32-14
time ranges in ACLs 32-14
time stamps in log messages 30-7
time zones 6-12
TLVs
defined 26-1
LLDP 26-1
LLDP-MED 26-2
Token Ring VLANs
support for 14-5
VTP support 15-4
ToS 1-9
traceroute, Layer 2
and ARP 36-7
and CDP 36-7
broadcast traffic 36-7
described 36-7
IP addresses and subnets 36-7
MAC addresses and VLANs 36-7
multicast traffic 36-7
multiple devices on a port 36-8
unicast traffic 36-7
usage guidelines 36-7
traceroute command 36-9
See also IP traceroute
traffic