Index
IN-34
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
method lists 9-26
multiple-hosts mode, described 9-8
per-user ACLs
AAA authorization 9-26
configuration tasks 9-13
described 9-12
RADIUS server attributes 9-12
ports
authorization state and dot1x port-control
command 9-7
authorized and unauthorized 9-7
critical 9-15
voice VLAN 9-16
port security
and voice VLAN 9-18
described 9-17
interactions 9-17
multiple-hosts mode 9-8
resetting to default values 9-45
stack changes, effects of 9-7
statistics, displaying 9-45
switch
as proxy 9-3
RADIUS client 9-3
VLAN assignment
AAA authorization 9-26
characteristics 9-11
configuration tasks 9-11
described 9-10
voice VLAN
described 9-16
PVID 9-16
VVID 9-16
wake-on-LAN, described 9-18
port blocking 1-4, 25-6
port-channel
See EtherChannel
Port Fast
described 19-2
enabling 19-12
mode, spanning tree 12-30
support for 1-7
port membership modes, VLAN 12-3
port priority
MSTP 18-20
STP 17-18
ports
10-Gigabit Ethernet 10-6
access 10-3
blocking 25-6
dynamic access 12-4
protected 25-5
routed 10-4
secure 25-7
static-access 12-3, 12-11
switch 10-2
trunks 12-3, 12-16
VLAN assignments 12-11
port security
aging 25-16
and private VLANs 25-17
and QoS trusted boundary 36-38
and stacking 25-17
configuring 25-12
default configuration 25-10
described 25-7
displaying 25-18
enabling 25-17
on trunk ports 25-13
sticky learning 25-8
violations 25-9
with other features 25-10