Index
IN-26
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
policing
described
32-4
hierarchical
See hierarchical policy maps
token-bucket algorithm
32-9
policy maps for QoS
characteristics of
32-48
described 32-7
displaying 32-79
hierarchical 32-8
hierarchical on SVIs
configuration guidelines
32-33
configuring 32-52
described 32-11
nonhierarchical on physical ports
configuration guidelines
32-33
configuring 32-48
described 32-9
port ACLs
defined
31-2
types of 31-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting
8-8
authentication server
defined
8-2
RADIUS server 8-3
client, defined 8-2
configuration guidelines 8-22
configuring
802.1x authentication
8-26
guest VLAN 8-34
host mode 8-29
inaccessible authentication bypass 8-36
manual re-authentication of a client 8-30
periodic re-authentication 8-29
quiet period 8-30
RADIUS server 8-28
port-based authentication (continued)
configuring (continued)
RADIUS server parameters on the switch
8-27
restricted VLAN 8-35
switch-to-client frame-retransmission
number
8-32
switch-to-client retransmission time 8-31
default configuration 8-20
described 8-1
device roles 8-2
displaying statistics 8-45
EAPOL-start frame 8-5
EAP-request/identity frame 8-5
EAP-response/identity frame 8-5
encapsulation 8-3
guest VLAN
configuration guidelines
8-12, 8-13
described 8-12
host mode 8-7
inaccessible authentication bypass
configuring
8-36
described 8-14
guidelines 8-23
initiation and message exchange 8-5
magic packet 8-16
method lists 8-26
multiple-hosts mode, described 8-8
per-user ACLs
AAA authorization
8-26
configuration tasks 8-11
described 8-11
RADIUS server attributes 8-11
ports
authorization state and dot1x port-control
command
8-7
authorized and unauthorized 8-7
critical 8-14
voice VLAN 8-15