EasyManua.ls Logo

Cisco WS-C3020 - Page 943

Cisco WS-C3020
960 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Index
IN-27
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
port-based authentication (continued)
port security
and voice VLAN
8-16
described 8-15
interactions 8-16
multiple-hosts mode 8-8
readiness check
configuring
8-24
described 8-9, 8-24
resetting to default values 8-44
statistics, displaying 8-45
switch
as proxy
8-3
RADIUS client 8-3
VLAN assignment
AAA authorization
8-26
characteristics 8-10
configuration tasks 8-10
described 8-10
voice aware 802.1x security
configuring
8-25
described 8-18, 8-25
voice VLAN
described
8-15
PVID 8-15
VVID 8-15
wake-on-LAN, described 8-16
port blocking 1-2, 23-8
port-channel
See EtherChannel
Port Fast
described
18-2
enabling 18-10
mode, spanning tree 11-29
support for 1-5
port membership modes, VLAN 11-3
port priority
MSTP
17-19
STP 16-16
ports
access
9-3
blocking 23-8
dual-purpose uplink 9-6
dynamic access 11-3
IEEE 802.1Q tunnel 11-4
protected 23-6
routed 9-4
secure 23-9
static-access 11-3, 11-11
switch 9-2
trunks 11-3, 11-16
VLAN assignments 11-11
port security
aging
23-17
and private VLANs 23-19
and QoS trusted boundary 32-38
configuring 23-13
default configuration 23-11
described 23-9
displaying 23-20
enabling 23-19
on trunk ports 23-14
sticky learning 23-10
violations 23-10
with other features 23-11
port-shutdown response, VMPS 11-28
power-management TLV 25-6
preemption, default configuration 19-5
preemption delay, default configuration 19-5
preferential treatment of traffic
See QoS
preventing unauthorized access
7-1
primary links 19-2
primary VLANs 14-1, 14-3
priority
HSRP
38-7
overriding CoS 13-6
trusting CoS 13-6

Table of Contents