Index
IN-27
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
port-based authentication (continued)
port security
and voice VLAN
8-16
described
8-15
interactions
8-16
multiple-hosts mode
8-8
readiness check
configuring
8-24
described
8-9, 8-24
resetting to default values
8-44
statistics, displaying
8-45
switch
as proxy
8-3
RADIUS client
8-3
VLAN assignment
AAA authorization
8-26
characteristics
8-10
configuration tasks
8-10
described
8-10
voice aware 802.1x security
configuring
8-25
described
8-18, 8-25
voice VLAN
described
8-15
PVID
8-15
VVID
8-15
wake-on-LAN, described
8-16
port blocking
1-2, 23-8
port-channel
See EtherChannel
Port Fast
described
18-2
enabling
18-10
mode, spanning tree
11-29
support for
1-5
port membership modes, VLAN
11-3
port priority
MSTP
17-19
STP
16-16
ports
access
9-3
blocking
23-8
dual-purpose uplink
9-6
dynamic access
11-3
IEEE 802.1Q tunnel
11-4
protected
23-6
routed
9-4
secure
23-9
static-access
11-3, 11-11
switch
9-2
trunks
11-3, 11-16
VLAN assignments
11-11
port security
aging
23-17
and private VLANs
23-19
and QoS trusted boundary
32-38
configuring
23-13
default configuration
23-11
described
23-9
displaying
23-20
enabling
23-19
on trunk ports
23-14
sticky learning
23-10
violations
23-10
with other features
23-11
port-shutdown response, VMPS
11-28
power-management TLV
25-6
preemption, default configuration
19-5
preemption delay, default configuration
19-5
preferential treatment of traffic
See QoS
preventing unauthorized access
7-1
primary links
19-2
primary VLANs
14-1, 14-3
priority
HSRP
38-7
overriding CoS
13-6
trusting CoS
13-6