Index
IN-34
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
support for 1-17
versions
interoperability
1-11
troubleshooting interoperability problems 1-35
v2 improvements 1-4
PIM-DVMRP, as snooping method 1-9
ping
character output description
1-16
executing 1-15
overview 1-15
PoE
auto mode
1-10
CDP with power consumption, described 1-8
CDP with power negotiation, described 1-8
Cisco intelligent power management 1-8
configuring 1-35
devices supported 1-7
high-power devices operating in low-power
mode
1-8
IEEE power classification levels 1-9
monitoring 1-11
monitoring power 1-38
policing power consumption 1-38
policing power usage 1-11
power budgeting 1-37
power consumption 1-37
powered-device detection and initial power
allocation
1-8
power management modes 1-10
power negotiation extensions to CDP 1-8
standards supported 1-8
static mode 1-10
troubleshooting 1-13
policed-DSCP map for QoS 1-75
policers
configuring
for each matched traffic class
1-58
for more than one traffic class 1-71
described 1-4
number of 1-41
types of 1-10
policing
described
1-4
hierarchical
See hierarchical policy maps
token-bucket algorithm
1-10
policy-based routing
See PBR
policy maps for QoS
characteristics of
1-59
described 1-8
hierarchical 1-9
hierarchical on SVIs
configuration guidelines
1-40
configuring 1-63
described 1-12
nonhierarchical on physical ports
configuration guidelines
1-40
configuring 1-58
described 1-10
POP 1-35
port ACLs
defined
1-3
types of 1-4
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting
1-14
authentication server
defined
1-3, 1-2
RADIUS server 1-3
client, defined 1-3, 1-2
configuration guidelines 1-39, 1-9
configuring
802.1x authentication
1-44
guest VLAN 1-60
host mode 1-47
inaccessible authentication bypass 1-63