Index
IN-19
Catalyst2950 Desktop Switch Software Configuration Guide
78-11380-05
QoS (continued)
classification (continued)
trusted boundary, described 25-13
trusted CoS, described 25-4
types for IP traffic 25-5
types for non-IP traffic 25-4
class maps
configuring 25-20
displaying 25-28
configuration examples
common wiring closet 25-30
intelligent wiring closet 25-30
configuration guidelines 25-10
configuring
class maps 25-20
CoS and WRR 25-27
default port CoS value 25-13
IP extended ACLs 25-18
IP standard ACLs 25-16
MAC ACLs 25-19
policy maps 25-21
port trust states within the domain 25-11
QoS policy 25-16
trusted boundary 25-14
default configuration 25-9
displaying statistics 25-28
egress port scheduling 25-8
ingress port scheduling 25-8
IP phones, detection and trusted settings 25-13
mapping tables
CoS-to-DSCP 25-25
displaying 25-28
DSCP-to-CoS 25-26
types of 25-5
marked-down actions 25-23
marking, described 25-4, 25-6
overview 25-2
pass-through mode 25-15
QoS (continued)
policers
configuring 25-23
described 25-6
number of 25-7
types of 25-6
policing, described 25-3, 25-6
policy maps
characteristics of 25-21
configuring 25-21
displaying 25-28
queueing, defined 25-4
scheduling, defined 25-4
support for 1-4
trusted bounday 25-13
trust states 25-4
understanding 25-2
quality of service
See QoS
queries, IGMP 16-3
R
RADIUS
attributes
vendor-proprietary 7-29
vendor-specific 7-28
configuring
accounting 7-27
authentication 7-22
authorization 7-26
communication, global 7-20, 7-28
communication, per-server 7-19, 7-20
multiple UDP ports 7-20
default configuration 7-19
defining AAA server groups 7-24
displaying the configuration 7-30
identifying the server 7-19