Configuration manual

Index
IN-34
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
port-based authentication (continued)
ports
authorization state and dot1x port-control
command
10-10
authorized and unauthorized 10-10
critical 10-20
voice VLAN 10-21
port security
and voice VLAN 10-23
described 10-22
interactions 10-22
multiple-hosts mode 10-12
readiness check
configuring 10-38
described 10-14, 10-38
resetting to default values 10-66
stack changes, effects of 10-11
statistics, displaying 10-67
switch
as proxy 10-3
RADIUS client 10-3
switch supplicant
configuring 10-57
overview 10-30
VLAN assignment
AAA authorization 10-36
characteristics 10-15
configuration tasks 10-15
described 10-14
voice aware 802.1x security
configuring 10-39
described 10-27, 10-39
voice VLAN
described 10-21
PVID 10-21
VVID 10-21
wake-on-LAN, described 10-23
port-based authentication methods, supported 10-8
port blocking 1-4, 26-7
port-channel
See EtherChannel
port description TLV 28-2
Port Fast
described 20-2
enabling 20-12
mode, spanning tree 13-30
support for 1-8
port membership modes, VLAN 13-3
port priority
MSTP 19-19
STP 18-18
ports
10-Gigabit Ethernet 11-6
access 11-3
blocking 26-7
dynamic access 13-4
protected 26-6
routed 11-4
secure 26-8
static-access 13-3, 13-11
switch 11-2
trunks 13-3, 13-16
VLAN assignments 13-11
port security
aging 26-17
and private VLANs 26-18
and QoS trusted boundary 36-38
and stacking 26-18
configuring 26-13
default configuration 26-11
described 26-8
displaying 26-19
enabling 26-18
on trunk ports 26-14
sticky learning 26-9
violations 26-10
with other features 26-11
port-shutdown response, VMPS 13-29