EasyManua.ls Logo

Cisco 3032 - Page 1333

Cisco 3032
1354 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Index
IN-35
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
port-based authentication (continued)
stack changes, effects of
9-12
statistics, displaying 9-65
switch
as proxy
9-3, 10-2
RADIUS client 9-3
switch supplicant
configuring
9-58
overview 9-30
user distribution
guidelines
9-26
overview 9-26
VLAN assignment
AAA authorization
9-37
characteristics 9-16
configuration tasks 9-17
described 9-16
voice aware 802.1x security
configuring
9-40
described 9-30, 9-40
voice VLAN
described
9-24
PVID 9-24
VVID 9-24
wake-on-LAN, described 9-25
port-based authentication methods, supported 9-9
port blocking 1-4, 26-7
port-channel
See EtherChannel
port description TLV
29-2
Port Fast
described
20-2
enabling 20-12
mode, spanning tree 13-28
support for 1-8
port membership modes, VLAN 13-3
port priority
MSTP
19-19
STP 18-18
ports
10-Gigabit Ethernet
11-6
access 11-3
blocking 26-7
dynamic access 13-3
IEEE 802.1Q tunnel 13-4
protected 26-6
routed 11-4
secure 26-9
static-access 13-3, 13-10
switch 11-2
trunks 13-3, 13-15
VLAN assignments 13-10
port security
aging
26-17
and private VLANs 26-18
and QoS trusted boundary 36-39
and stacking 26-18
configuring 26-13
default configuration 26-11
described 26-8
displaying 26-19
enabling 26-18
on trunk ports 26-14
sticky learning 26-9
violations 26-10
with other features 26-11
port-shutdown response, VMPS 13-27
port VLAN ID TLV 29-2
power management TLV 29-2, 29-7
preemption, default configuration 21-8
preemption delay, default configuration 21-8
preferential treatment of traffic
See QoS
prefix lists, BGP
38-58
preventing unauthorized access 7-1
primary links 21-2
primary VLANs 16-1, 16-3

Table of Contents

Related product manuals