Index
IN-26
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
policing
described
32-4
hierarchical
See hierarchical policy maps
token-bucket algorithm
32-9
policy maps for QoS
characteristics of
32-48
described
32-7
displaying
32-79
hierarchical
32-8
hierarchical on SVIs
configuration guidelines
32-33
configuring
32-52
described
32-11
nonhierarchical on physical ports
configuration guidelines
32-33
configuring
32-48
described
32-9
port ACLs
defined
31-2
types of
31-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting
8-8
authentication server
defined
8-2
RADIUS server
8-3
client, defined
8-2
configuration guidelines
8-22
configuring
802.1x authentication
8-26
guest VLAN
8-34
host mode
8-29
inaccessible authentication bypass
8-36
manual re-authentication of a client
8-30
periodic re-authentication
8-29
quiet period
8-30
RADIUS server
8-28
port-based authentication (continued)
configuring (continued)
RADIUS server parameters on the switch
8-27
restricted VLAN
8-35
switch-to-client frame-retransmission
number
8-32
switch-to-client retransmission time
8-31
default configuration
8-20
described
8-1
device roles
8-2
displaying statistics
8-45
EAPOL-start frame
8-5
EAP-request/identity frame
8-5
EAP-response/identity frame
8-5
encapsulation
8-3
guest VLAN
configuration guidelines
8-12, 8-13
described
8-12
host mode
8-7
inaccessible authentication bypass
configuring
8-36
described
8-14
guidelines
8-23
initiation and message exchange
8-5
magic packet
8-16
method lists
8-26
multiple-hosts mode, described
8-8
per-user ACLs
AAA authorization
8-26
configuration tasks
8-11
described
8-11
RADIUS server attributes
8-11
ports
authorization state and dot1x port-control
command
8-7
authorized and unauthorized
8-7
critical
8-14
voice VLAN
8-15