Index
IN-33
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
policers
configuring
for each matched traffic class 36-48
for more than one traffic class 36-58
described 36-4
displaying 36-78
number of 36-33
types of 36-9
policing
described 36-4
hierarchical
See hierarchical policy maps
token-bucket algorithm 36-9
policy-based routing
See PBR
policy maps for QoS
characteristics of 36-48
described 36-7
displaying 36-78
hierarchical 36-8
hierarchical on SVIs
configuration guidelines 36-32
configuring 36-52
described 36-11
nonhierarchical on physical ports
configuration guidelines 36-32
configuring 36-48
described 36-9
port ACLs
defined 34-2
types of 34-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting 9-9
authentication server
defined 9-2
RADIUS server 9-3
client, defined 9-2
configuration guidelines 9-24
configuring
802.1x authentication 9-26
guest VLAN 9-34
host mode 9-29
inaccessible authentication bypass 9-37
manual re-authentication of a client 9-30
periodic re-authentication 9-30
quiet period 9-31
RADIUS server 9-29
RADIUS server parameters on the switch 9-28
restricted VLAN 9-35
switch-to-client frame-retransmission
number 9-32, 9-33
switch-to-client retransmission time 9-31
default configuration 9-23
described 9-1
device roles 9-2
displaying statistics 9-45
EAPOL-start frame 9-5
EAP-request/identity frame 9-5
EAP-response/identity frame 9-5
encapsulation 9-3
guest VLAN
configuration guidelines 9-14, 9-15
described 9-13
host mode 9-8
inaccessible authentication bypass
configuring 9-37
described 9-15
guidelines 9-26
initiation and message exchange 9-5
magic packet 9-18