Index
IN-34
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
port-based authentication (continued)
ports
authorization state and dot1x port-control
command
10-7
authorized and unauthorized 10-7
critical 10-15
voice VLAN 10-16
port security
and voice VLAN
10-17
described 10-17
interactions 10-17
multiple-hosts mode 10-9
resetting to default values 10-45
stack changes, effects of 10-8
statistics, displaying 10-46
switch
as proxy
10-3
RADIUS client 10-3
upgrading from a previous release 10-26, 33-26
VLAN assignment
AAA authorization
10-26
characteristics 10-11
configuration tasks 10-11
described 10-10
voice VLAN
described
10-16
PVID 10-16
VVID 10-16
wake-on-LAN, described 10-18
port blocking 1-4, 25-7
port-channel
See EtherChannel
Port Fast
described
20-2
enabling 20-12
mode, spanning tree 13-29
support for 1-7
port membership modes, VLAN 13-3
port priority
MSTP
19-19
STP 18-18
ports
10-Gigabit Ethernet module
11-6
access 11-3
blocking 25-7
dynamic access 13-3
IEEE 802.1Q tunnel 13-4
protected 25-5
routed 11-4
secure 25-8
static-access 13-3, 13-11
switch 11-2
trunks 13-3, 13-16
VLAN assignments 13-11
port security
aging
25-15
and QoS trusted boundary 33-39
and stacking 25-17
configuring 25-12
default configuration 25-10
described 25-8
displaying 25-17
on trunk ports 25-13
sticky learning 25-9
violations 25-9
with other features 25-10
port-shutdown response, VMPS 13-28
Power over Ethernet
See PoE
preemption
default configuration
21-4
preemption delay
default configuration
21-4
preferential treatment of traffic
See QoS
prefix lists, BGP
35-55
preventing unauthorized access 9-1