Configuration manual

Index
IN-33
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
policy-based routing
See PBR
policy maps for QoS
characteristics of 36-48
described 36-7
displaying 36-79
hierarchical 36-8
hierarchical on SVIs
configuration guidelines 36-32
configuring 36-52
described 36-11
nonhierarchical on physical ports
configuration guidelines 36-32
configuring 36-48
described 36-9
port ACLs
defined 34-2
types of 34-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting 10-13
authentication server
defined 10-3
RADIUS server 10-3
client, defined 10-3
configuration guidelines 10-33
configuring
802.1x authentication 10-36
guest VLAN 10-48
host mode 10-42
inaccessible authentication bypass 10-51
manual re-authentication of a client 10-44
periodic re-authentication 10-43
quiet period 10-44
RADIUS server 10-41
RADIUS server parameters on the switch 10-40
restricted VLAN 10-49
port-based authentication (continued)
switch-to-client frame-retransmission
number
10-46
switch-to-client retransmission time 10-45
violation mode 10-23
violation modes 10-36
default configuration 10-32
described 10-1
device roles 10-2
displaying statistics 10-67
downloadable ACLs and redirect URLs
configuring 10-58 to 10-61
overview 10-17 to 10-18
EAPOL-start frame 10-5
EAP-request/identity frame 10-5
EAP-response/identity frame 10-5
encapsulation 10-3
flexible authentication ordering
configuring 10-61
overview 10-25
guest VLAN
configuration guidelines 10-19, 10-20
described 10-18
host mode 10-11
inaccessible authentication bypass
configuring 10-51
described 10-20
guidelines 10-35
initiation and message exchange 10-5
magic packet 10-23
maximum number of allowed devices per port 10-35
method lists 10-36
multiple authentication 10-12
multiple-hosts mode, described 10-11
per-user ACLs
AAA authorization 10-36
configuration tasks 10-17
described 10-16
RADIUS server attributes 10-16