Index
IN-14
Cisco Systems IntelligentGigabit Ethernet Switch Modules for the IBM BladeCenter, Software Configuration Guide
24R9746
port-based authentication (continued)
ports
authorization state and dot1x port-control
command 6-4
authorized and unauthorized 6-4
port security, multiple-hosts mode 6-6
resetting to default values 6-22
switch
as proxy 6-2
RADIUS client 6-3
VLAN assignment, AAA authorization 6-22
wake-on-LAN, described 6-10
port-channel
See EtherChannel
Port Fast
described 11-2
enabling 11-10
mode, spanning tree 12-27
support for 1-3
port membership modes, VLAN 12-3
port priority
MSTP 10-15
STP 9-17
ports
dynamic access 12-3
priority 23-7
protected 15-3
secure 15-4
static-access 12-3, 12-10
switch 7-1, 7-5
trunks 12-14
VLAN assignments 12-10
port scheduling 23-8
port security
aging 15-9
configuration guidelines 15-6
configuring 15-7
default configuration 15-6
described 15-4
displaying 15-11
sticky learning 15-5
violations 15-5
with other features 15-6
port-shutdown response, VMPS 12-26
preferential treatment of traffic
See QoS
preventing unauthorized access 5-1
priority
port, described 23-7
private VLAN edge ports
See protected ports
privileged EXEC mode 2-2
privilege levels
changing the default for lines 5-8
exiting 5-8
logging into 5-8
overview 5-2, 5-6
setting a command with 5-7
protected ports 1-2, 15-3
pruning, VTP
enabling 13-13
enabling on a port 12-20
examples 13-5
overview 13-4
pruning-eligible list
changing 12-20
for VTP pruning 13-5
VLANs 13-13
publications, related xxv
PVST+
described 9-9
IEEE 802.1Q trunking interoperability 9-10
instances supported 9-9