Index
IN-33
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
policing
described
33-4
hierarchical
See hierarchical policy maps
token-bucket algorithm
33-9
policy-based routing
See PBR
policy maps for QoS
characteristics of
33-49
described 33-7
displaying 33-80
hierarchical 33-8
hierarchical on SVIs
configuration guidelines
33-33
configuring 33-53
described 33-11
nonhierarchical on physical ports
configuration guidelines
33-33
configuring 33-49
described 33-9
POP 1-25
port ACLs
defined
32-2
types of 32-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting
10-9
authentication server
defined
10-2
RADIUS server 10-3
client, defined 10-2
configuration guidelines 10-23
configuring
802.1x authentication
10-26
guest VLAN 10-34
host mode 10-29
inaccessible authentication bypass 10-37
port-based authentication (continued)
configuring
manual re-authentication of a client
10-30
periodic re-authentication 10-30
quiet period 10-31
RADIUS server 10-28
RADIUS server parameters on the switch 10-27
restricted VLAN 10-35
switch-to-client frame-retransmission number 10-32
switch-to-client retransmission time 10-31
default configuration 10-22
described 10-1
device roles 10-2
displaying statistics 10-46
EAPOL-start frame 10-5
EAP-request/identity frame 10-5
EAP-response/identity frame 10-5
encapsulation 10-3
guest VLAN
configuration guidelines
10-13, 10-14
described 10-13
host mode 10-8
inaccessible authentication bypass
configuring
10-37
described 10-15
guidelines 10-25
initiation and message exchange 10-5
magic packet 10-18
method lists 10-26
multiple-hosts mode, described 10-8
per-user ACLs
AAA authorization
10-26
configuration tasks 10-12
described 10-11
RADIUS server attributes 10-12