A SERVICE OF

logo

Index
IN-36
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
port-based authentication (continued)
port security
and voice VLAN
10-17
described 10-16
interactions 10-16
multiple-hosts mode 10-8
resetting to default values 10-44
stack changes, effects of 10-7
statistics, displaying 10-44
switch
as proxy
10-3
RADIUS client 10-3
VLAN assignment
AAA authorization
10-25
characteristics 10-10
configuration tasks 10-11
described 10-10
voice VLAN
described
10-15
PVID 10-15
VVID 10-15
wake-on-LAN, described 10-17
port blocking 1-4, 26-6
port-channel
See EtherChannel
Port Fast
described
20-2
enabling 20-12
mode, spanning tree 13-29
support for 1-7
port membership modes, VLAN 13-3
port priority
MSTP
19-20
STP 18-18
ports
10-Gigabit Ethernet
11-6
access 11-3
blocking 26-6
dynamic access 13-4
protected 26-5
routed 11-4
secure 26-7
static-access 13-3, 13-11
switch 11-2
trunks 13-3, 13-16
VLAN assignments 13-11
port security
aging
26-16
and private VLANs 26-17
and QoS trusted boundary 36-41
and stacking 26-17
configuring 26-12
default configuration 26-10
described 26-7
displaying 26-18
enabling 26-17
on trunk ports 26-13
sticky learning 26-8
violations 26-9
with other features 26-10
port-shutdown response, VMPS 13-28
Power over Ethernet
See PoE
power supply
configuring
11-37
managing 11-37
preemption, default configuration 21-5
preemption delay, default configuration 21-5
preferential treatment of traffic
See QoS