Dell POWEREDGE M1000E User Manual

Page 1294

Advertising
background image

Index

IN-34

Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide

OL-13270-03

port-based authentication (continued)

ports

authorization state and dot1x port-control
command

10-10

authorized and unauthorized

10-10

critical

10-20

voice VLAN

10-21

port security

and voice VLAN

10-23

described

10-22

interactions

10-22

multiple-hosts mode

10-12

readiness check

configuring

10-38

described

10-14, 10-38

resetting to default values

10-66

stack changes, effects of

10-11

statistics, displaying

10-67

switch

as proxy

10-3

RADIUS client

10-3

switch supplicant

configuring

10-57

overview

10-30

VLAN assignment

AAA authorization

10-36

characteristics

10-15

configuration tasks

10-15

described

10-14

voice aware 802.1x security

configuring

10-39

described

10-27, 10-39

voice VLAN

described

10-21

PVID

10-21

VVID

10-21

wake-on-LAN, described

10-23

port-based authentication methods, supported

10-8

port blocking

1-4, 26-7

port-channel

See EtherChannel

port description TLV

28-2

Port Fast

described

20-2

enabling

20-12

mode, spanning tree

13-30

support for

1-8

port membership modes, VLAN

13-3

port priority

MSTP

19-19

STP

18-18

ports

10-Gigabit Ethernet

11-6

access

11-3

blocking

26-7

dynamic access

13-4

protected

26-6

routed

11-4

secure

26-8

static-access

13-3, 13-11

switch

11-2

trunks

13-3, 13-16

VLAN assignments

13-11

port security

aging

26-17

and private VLANs

26-18

and QoS trusted boundary

36-38

and stacking

26-18

configuring

26-13

default configuration

26-11

described

26-8

displaying

26-19

enabling

26-18

on trunk ports

26-14

sticky learning

26-9

violations

26-10

with other features

26-11

port-shutdown response, VMPS

13-29

Advertising