Index
IN-30
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
N
NAC
AAA down policy 1-10
critical authentication 9-15, 9-37
IEEE 802.1x authentication using a RADIUS
server 9-41
IEEE 802.1x validation using RADIUS server 9-41
inaccessible authentication bypass 1-10, 9-37
Layer 2 IEEE 802.1x validation 1-10, 9-41
Layer 2 IP validation 1-10
named IPv4 ACLs 34-15
named IPv6 ACLs 35-3
NameSpace Mapper
See NSM
native VLAN
and IEEE 802.1Q tunneling 16-4
configuring 12-24
default 12-24
neighbor discovery, IPv6 39-4
neighbor discovery/recovery, EIGRP 38-37
neighbors, BGP 38-59
Network Admission Control
See NAC
Network Assistant
benefits 1-3
described 1-5
downloading image files 1-3
guide mode 1-3
management options 1-3
managing switch stacks 5-2, 5-17
requirements xliv
upgrading a switch B-24
wizards 1-3
network configuration examples
data center 1-18
expanded data center 1-18
increasing network performance 1-16
providing network services 1-17
small to medium-sized network 1-19
network design
performance 1-17
services 1-17
network management
CDP 26-1
RMON 30-1
SNMP 32-1
network performance, measuring with IP SLAs 41-3
network policy TLV 27-6
Network Time Protocol
See NTP
no commands 2-4
nonhierarchical policy maps
configuration guidelines 36-32
configuring 36-48
described 36-9
non-IP traffic filtering 34-27
nontrunking mode 12-18
normal-range VLANs 12-4
configuration guidelines 12-6
configuration modes 12-7
configuring 12-4
defined 12-1
no switchport command 10-4
note, described xliv
not-so-stubby areas
See NSSA
NSM 4-3
NSSA, OSPF 38-31