Index
IN-55
Catalyst 3750 SwitchSoftware Configuration Guide
OL-8550-09
configuring
for each matched traffic class 35-53
for more than one traffic class 35-64
described 35-4
displaying 35-85
number of 35-39
types of 35-10
policing
described 35-4
hierarchical
See hierarchical policy maps
token-bucket algorithm 35-10
policy-based routing
See PBR
policy maps for QoS
characteristics of 35-53
described 35-8
displaying 35-86
hierarchical 35-9
hierarchical on SVIs
configuration guidelines 35-38
configuring 35-57
described 35-12
nonhierarchical on physical ports
configuration guidelines 35-38
described 35-10
POP 1-28
port ACLs
defined 34-2
types of 34-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting 10-17
authentication server
defined 10-3, 11-2
RADIUS server 10-3
client, defined 10-3, 11-2
configuration guidelines 10-38, 11-9
configuring
802.1x authentication 10-43
guest VLAN 10-54
host mode 10-46
inaccessible authentication bypass 10-57
manual re-authentication of a client 10-48
periodic re-authentication 10-47
quiet period 10-49
RADIUS server 10-46, 11-13
RADIUS server parameters on the switch 10-45,
11-11
restricted VLAN 10-55
switch-to-client frame-retransmission
number 10-50, 10-51
switch-to-client retransmission time 10-49
violation modes 10-42to 10-43
default configuration 10-37, 11-9
described 10-1
device roles 10-3, 11-2
displaying statistics 10-70, 11-17
downloadable ACLs and redirect URLs
configuring 10-64to 10-66, ?? to 10-67
overview 10-21to 10-23
EAPOL-start frame 10-6
EAP-request/identity frame 10-6
EAP-response/identity frame 10-6
enabling
802.1X authentication 11-11
encapsulation 10-3
flexible authentication ordering
configuring 10-67
overview 10-32
guest VLAN
configuration guidelines 10-24, 10-25
described 10-23
host mode 10-13
inaccessible authentication bypass
configuring 10-57
described 10-25