Index
IN-35
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
port-based authentication (continued)
stack changes, effects of
9-12
statistics, displaying 9-65
switch
as proxy
9-3, 10-2
RADIUS client 9-3
switch supplicant
configuring
9-58
overview 9-30
user distribution
guidelines
9-26
overview 9-26
VLAN assignment
AAA authorization
9-37
characteristics 9-16
configuration tasks 9-17
described 9-16
voice aware 802.1x security
configuring
9-40
described 9-30, 9-40
voice VLAN
described
9-24
PVID 9-24
VVID 9-24
wake-on-LAN, described 9-25
port-based authentication methods, supported 9-9
port blocking 1-4, 26-7
port-channel
See EtherChannel
port description TLV
29-2
Port Fast
described
20-2
enabling 20-12
mode, spanning tree 13-28
support for 1-8
port membership modes, VLAN 13-3
port priority
MSTP
19-19
STP 18-18
ports
10-Gigabit Ethernet
11-6
access 11-3
blocking 26-7
dynamic access 13-3
IEEE 802.1Q tunnel 13-4
protected 26-6
routed 11-4
secure 26-9
static-access 13-3, 13-10
switch 11-2
trunks 13-3, 13-15
VLAN assignments 13-10
port security
aging
26-17
and private VLANs 26-18
and QoS trusted boundary 36-39
and stacking 26-18
configuring 26-13
default configuration 26-11
described 26-8
displaying 26-19
enabling 26-18
on trunk ports 26-14
sticky learning 26-9
violations 26-10
with other features 26-11
port-shutdown response, VMPS 13-27
port VLAN ID TLV 29-2
power management TLV 29-2, 29-7
preemption, default configuration 21-8
preemption delay, default configuration 21-8
preferential treatment of traffic
See QoS
prefix lists, BGP
38-58
preventing unauthorized access 7-1
primary links 21-2
primary VLANs 16-1, 16-3