Cisco 3032 Software Configuration Manual page 1333

Hide thumbs Also See for 3032:
Table of Contents

Advertisement

port-based authentication (continued)
stack changes, effects of
statistics, displaying
switch
as proxy
9-3, 10-2
RADIUS client
switch supplicant
configuring
9-58
overview
9-30
user distribution
guidelines
9-26
overview
9-26
VLAN assignment
AAA authorization
characteristics
9-16
configuration tasks
described
9-16
voice aware 802.1x security
configuring
9-40
described
9-30, 9-40
voice VLAN
described
9-24
PVID
9-24
VVID
9-24
wake-on-LAN, described
port-based authentication methods, supported
port blocking
1-4, 26-7
port-channel
See EtherChannel
port description TLV
29-2
Port Fast
described
20-2
enabling
20-12
mode, spanning tree
support for
1-8
port membership modes, VLAN
port priority
MSTP
19-19
STP
18-18
OL-12247-04
9-12
9-65
9-3
9-37
9-17
9-25
9-9
13-28
13-3
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
ports
10-Gigabit Ethernet
access
11-3
blocking
26-7
dynamic access
13-3
IEEE 802.1Q tunnel
protected
26-6
routed
11-4
secure
26-9
static-access
13-3, 13-10
switch
11-2
trunks
13-3, 13-15
VLAN assignments
port security
aging
26-17
and private VLANs
and QoS trusted boundary
and stacking
26-18
configuring
26-13
default configuration
described
26-8
displaying
26-19
enabling
26-18
on trunk ports
26-14
sticky learning
26-9
violations
26-10
with other features
26-11
port-shutdown response, VMPS
port VLAN ID TLV
29-2
power management TLV
preemption, default configuration
preemption delay, default configuration
preferential treatment of traffic
See QoS
prefix lists, BGP
38-58
preventing unauthorized access
primary links
21-2
primary VLANs
16-1, 16-3
Index
11-6
13-4
13-10
26-18
36-39
26-11
13-27
29-2, 29-7
21-8
21-8
7-1
IN-35

Advertisement

Table of Contents
loading

This manual is also suitable for:

3130

Table of Contents