Software Configuration Guide
Page 1
Catalyst 3560 Switch Software Configuration Guide Cisco IOS Release 12.1(19)EA1 January 2004 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7816156= Text Part Number: 78-16156-01
Catalyst 3560 Switch Software Configuration Guide Cisco IOS Release 12.1(19)EA1 January 2004 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7816156= Text Part Number: 78-16156-01
Software Configuration Guide
Page 36
... 526-7208 or, elsewhere in North America, by calling Cisco Systems Corporate Headquarters (California, USA) at this URL: http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm You can order Cisco documentation in these ways: • Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace: http://www...
... 526-7208 or, elsewhere in North America, by calling Cisco Systems Corporate Headquarters (California, USA) at this URL: http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm You can order Cisco documentation in these ways: • Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace: http://www...
Software Configuration Guide
Page 197
Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through the port to the network. After authentication is connected. This ...each client connected to configure IEEE 802.1X port-based authentication on the Catalyst 3560 switch. As LANs extend to hotels, airports, and corporate lobbies, creating insecure environments, 802.1X prevents unauthorized devices (clients) from connecting to the command reference for the commands used in Authorized...
Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through the port to the network. After authentication is connected. This ...each client connected to configure IEEE 802.1X port-based authentication on the Catalyst 3560 switch. As LANs extend to hotels, airports, and corporate lobbies, creating insecure environments, 802.1X prevents unauthorized devices (clients) from connecting to the command reference for the commands used in Authorized...
Software Configuration Guide
Page 679
For example, you could transfer stock records to a corporate office on routes derived from routing protocols. With PBR, you classify traffic using PBR, you can have more information about PBR commands and keywords, refer to the Cisco IOS IP and IP Routing Command Reference for a short time while transmitting ...and the packets do not match any route map statements, all set clause to specify the IP addresses identifying the next hop router in Cisco IOS Release 12.1(19)EA1." 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 30-71 You can use policy-based routing (PBR)...
For example, you could transfer stock records to a corporate office on routes derived from routing protocols. With PBR, you classify traffic using PBR, you can have more information about PBR commands and keywords, refer to the Cisco IOS IP and IP Routing Command Reference for a short time while transmitting ...and the packets do not match any route map statements, all set clause to specify the IP addresses identifying the next hop router in Cisco IOS Release 12.1(19)EA1." 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 30-71 You can use policy-based routing (PBR)...