CoS............................................................................................................................................................................................... 90
IEEE 802.1p Priority.....................................................................................................................................................................................90
The Advantages of CoS ................................................................................................................................................................................91
Understanding CoS .......................................................................................................................................................................................92
Bandwidth Control........................................................................................................................................................................................93
802.1p Default Priority .................................................................................................................................................................................94
802.1p User Priority......................................................................................................................................................................................95
CoS Scheduling Mechanism .........................................................................................................................................................................95
CoS Output Scheduling.................................................................................................................................................................................96
Priority Settings ............................................................................................................................................................................................97
TOS Priority Settings ....................................................................................................................................................................................98
DSCP Priority Settings..................................................................................................................................................................................99
Port Mapping Priority CoS..........................................................................................................................................................................100
MAC Priority Setting ..................................................................................................................................................................................101
CPU Interface Filtering...............................................................................................................................102
CPU Interface Filtering State Settings ........................................................................................................................................................102
CPU Interface Filtering Table .....................................................................................................................................................................102
Security .........................................................................................................................................................113
Traffic Control ........................................................................................................................................................................... 113
Port Security............................................................................................................................................................................... 116
Port Lock Entries ....................................................................................................................................................................... 117
Authentication Server ............................................................................................................................................................................119
Authenticator .........................................................................................................................................................................................119
Client .....................................................................................................................................................................................................120
Authentication Process ..........................................................................................................................................................................121
Port-Based Network Access Control...........................................................................................................................................................122
MAC-Based Network Access Control ........................................................................................................................................................123
802.1X Authenticator Settings ....................................................................................................................................................................124
Local Users ............................................................................................................................................................................................126
Port Capability .......................................................................................................................................................................................126
Guest VLANs..............................................................................................................................................................................................127
Limitations Using the Guest VLAN ......................................................................................................................................................127
Guest VLAN ...............................................................................................................................................................................................128
RADIUS Server .....................................................................................................................................................................................132
Trusted Host............................................................................................................................................................................... 133
Traffic Segmentation.................................................................................................................................................................. 134
Monitoring ....................................................................................................................................................136
CPU Utilization.......................................................................................................................................................................... 136