Index
IN-37
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
policy maps for QoS
characteristics of 39-57
described 39-8
displaying 39-88
hierarchical 39-9
hierarchical on SVIs
configuration guidelines 39-37
configuring 39-61
described 39-12
nonhierarchical on physical ports
configuration guidelines 39-37
configuring 39-57
described 39-10
POP 1-31
port ACLs
defined 37-2
types of 37-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting 11-13
authentication server
defined 11-3, 12-2
RADIUS server 11-3
client, defined 11-3, 12-2
configuration guidelines 11-36, 12-9
configuring
802.1x authentication 11-41
guest VLAN 11-51
host mode 11-44
inaccessible authentication bypass 11-53
manual re-authentication of a client 11-46
periodic re-authentication 11-45
quiet period 11-47
RADIUS server 11-44, 12-12
RADIUS server parameters on the switch 11-43,
12-11
restricted VLAN 11-52
port-based authentication (continued)
switch-to-client frame-retransmission
number 11-48, 11-49
switch-to-client retransmission time 11-47
violation mode 11-24
violation modes 11-41
default configuration 11-35, 12-9
described 11-1
device roles 11-3, 12-2
displaying statistics 11-69, 12-17
downloadable ACLs and redirect URLs
configuring 11-61 to 11-63, ?? to 11-64
overview 11-17 to 11-18
EAPOL-start frame 11-6
EAP-request/identity frame 11-6
EAP-response/identity frame 11-6
enabling
802.1X authentication 12-11
encapsulation 11-3
flexible authentication ordering
configuring 11-64
overview 11-27
guest VLAN
configuration guidelines 11-19, 11-20
described 11-19
host mode 11-12
inaccessible authentication bypass
configuring 11-53
described 11-20
guidelines 11-37
initiation and message exchange 11-6
magic packet 11-24
maximum number of allowed devices per port 11-38
method lists 11-41
multiple authentication 11-12
multiple-hosts mode, described 11-12