Index
IN-19
Catalyst 2960 Switch SoftwareConfiguration Guide
78-16881-01
port-based authentication (continued)
ports
authorization state and dot1x port-control
command 9-4
authorized and unauthorized 9-4
voice VLAN 9-8
port security
and voice VLAN 9-8
described 9-7
interactions 9-7
multiple-hosts mode 9-7
resetting to default values 9-20
statistics, displaying 9-22
switch
as proxy 9-2
RADIUS client 9-2
VLAN assignment
AAA authorization 9-13
characteristics 9-9
configuration tasks 9-9
described 9-8
voice VLAN
described 9-8
PVID 9-8
VVID 9-8
port blocking 1-3, 21-6
port-channel
See EtherChannel
Port Fast
described 17-2
enabling 17-10
mode, spanning tree 12-25
support for 1-5
port membership modes, VLAN 12-3
port priority
MSTP 16-16
STP 15-16
ports
access 10-2
blocking 21-6
dual-purpose uplink 10-4
dynamic access 12-3
protected 21-5
secure 21-7
static-access 12-3, 12-10
switch 10-2
trunks 12-3, 12-14
VLAN assignments 12-10
port security
aging 21-15
and QoS trusted boundary 29-35
configuring 21-11
default configuration 21-10
described 21-7
displaying 21-16
on trunk ports 21-12
sticky learning 21-8
violations 21-9
with other features 21-10
port-shutdown response, VMPS 12-24
preferential treatment of traffic
See QoS
preventing unauthorized access 8-1
primary links 18-1
priority
overriding CoS 14-6
trusting CoS 14-6
private VLAN edge ports
See protected ports
privileged EXEC mode 2-2
privilege levels
changing the default for lines 8-9
command switch 5-4
exiting 8-10