Index
IN-27
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
port-based authentication (continued)
port security
and voice VLAN
8-16
described 8-15
interactions 8-16
multiple-hosts mode 8-8
readiness check
configuring
8-24
described 8-9, 8-24
resetting to default values 8-44
statistics, displaying 8-45
switch
as proxy
8-3
RADIUS client 8-3
VLAN assignment
AAA authorization
8-26
characteristics 8-10
configuration tasks 8-10
described 8-10
voice aware 802.1x security
configuring
8-25
described 8-18, 8-25
voice VLAN
described
8-15
PVID 8-15
VVID 8-15
wake-on-LAN, described 8-16
port blocking 1-2, 23-8
port-channel
See EtherChannel
Port Fast
described
18-2
enabling 18-10
mode, spanning tree 11-29
support for 1-5
port membership modes, VLAN 11-3
port priority
MSTP
17-19
STP 16-16
ports
access
9-3
blocking 23-8
dual-purpose uplink 9-6
dynamic access 11-3
IEEE 802.1Q tunnel 11-4
protected 23-6
routed 9-4
secure 23-9
static-access 11-3, 11-11
switch 9-2
trunks 11-3, 11-16
VLAN assignments 11-11
port security
aging
23-17
and private VLANs 23-19
and QoS trusted boundary 32-38
configuring 23-13
default configuration 23-11
described 23-9
displaying 23-20
enabling 23-19
on trunk ports 23-14
sticky learning 23-10
violations 23-10
with other features 23-11
port-shutdown response, VMPS 11-28
power-management TLV 25-6
preemption, default configuration 19-5
preemption delay, default configuration 19-5
preferential treatment of traffic
See QoS
preventing unauthorized access
7-1
primary links 19-2
primary VLANs 14-1, 14-3
priority
HSRP
38-7
overriding CoS 13-6
trusting CoS 13-6