CoS............................................................................................................................................................................................... 90
IEEE 802.1p Priority.....................................................................................................................................................................................90
The Advantages of CoS ................................................................................................................................................................................91
Understanding CoS .......................................................................................................................................................................................92
Bandwidth Control........................................................................................................................................................................................93
802.1p Default Priority .................................................................................................................................................................................94
802.1p User Priority......................................................................................................................................................................................95
CoS Scheduling Mechanism .........................................................................................................................................................................95
CoS Output Scheduling.................................................................................................................................................................................96
Priority Settings ............................................................................................................................................................................................97
TOS Priority Settings....................................................................................................................................................................................98
DSCP Priority Settings..................................................................................................................................................................................99
Port Mapping Priority CoS..........................................................................................................................................................................100
MAC Priority Setting..................................................................................................................................................................................101
CPU Interface Filtering...............................................................................................................................102
CPU Interface Filtering State Settings ........................................................................................................................................................102
CPU Interface Filtering Table.....................................................................................................................................................................102
Security .........................................................................................................................................................113
Traffic Control ........................................................................................................................................................................... 113
Port Security............................................................................................................................................................................... 116
Port Lock Entries ....................................................................................................................................................................... 117
802.1X........................................................................................................................................................................................ 118
802.1x Port-Based and MAC-Based Access Control ..................................................................................................................................118
Authentication Server ............................................................................................................................................................................119
Authenticator .........................................................................................................................................................................................119
Client .....................................................................................................................................................................................................120
Authentication Process ..........................................................................................................................................................................121
Understanding 802.1x Port-based and MAC-based Network Access Control ............................................................................................122
Port-Based Network Access Control...........................................................................................................................................................122
MAC-Based Network Access Control ........................................................................................................................................................123
802.1X Authenticator Settings ....................................................................................................................................................................124
Local Users............................................................................................................................................................................................126
Port Capability.......................................................................................................................................................................................126
Guest VLANs..............................................................................................................................................................................................127
Limitations Using the Guest VLAN ......................................................................................................................................................127
Guest VLAN...............................................................................................................................................................................................128
Initializing Ports for Port Based 802.1x.................................................................................................................................................129
Initializing Ports for MAC Based 802.1x ..............................................................................................................................................130
Reauthenticate Port(s) for Port Based 802.1x ........................................................................................................................................130
Reauthenticate Port(s) for MAC-based 802.1x......................................................................................................................................131
RADIUS Server.....................................................................................................................................................................................132
Trusted Host............................................................................................................................................................................... 133
Traffic Segmentation.................................................................................................................................................................. 134
Monitoring....................................................................................................................................................136
CPU Utilization.......................................................................................................................................................................... 136