Software Guide
Page 60
... the MAC address of the sending station with the port on both ends of a link must have the same setting. Port negotiation exchanges flow-control parameters, remote fault information, and duplex information. Building the Address Table Catalyst 6000 family switches build the address table by using the source address of seconds, it...
... the MAC address of the sending station with the port on both ends of a link must have the same setting. Port negotiation exchanges flow-control parameters, remote fault information, and duplex information. Building the Address Table Catalyst 6000 family switches build the address table by using the source address of seconds, it...
Software Guide
Page 64
... full, the port transmits a "pause" packet that tells remote ports to the port for a specified period of time; Table 4-3 Ethernet-Flow Control Keyword Functions Keywords Function receive on Gigabit Ethernet ports. Step 2 Verify the flow-control configuration. Enter the set port flow control command to flow-control requests. other devices. Supported only on The port...
... full, the port transmits a "pause" packet that tells remote ports to the port for a specified period of time; Table 4-3 Ethernet-Flow Control Keyword Functions Keywords Function receive on Gigabit Ethernet ports. Step 2 Verify the flow-control configuration. Enter the set port flow control command to flow-control requests. other devices. Supported only on The port...
Software Guide
Page 414
RADIUS uses UDP for more information about how the RADIUS protocol operates, refer to RFC 2138, "Remote Authentication Dial In User Service (RADIUS)." The RADIUS clients and servers use the key to encrypt all other authentication methods, local authentication...which method to use Kerberos, passwords are not stored on the switch: • Enable or disable RADIUS authentication to control login access • Enable or disable RADIUS authentication to control enable access • Specify the IP addresses and UDP ports of electronic credentials that issued the ticket. You can configure...
RADIUS uses UDP for more information about how the RADIUS protocol operates, refer to RFC 2138, "Remote Authentication Dial In User Service (RADIUS)." The RADIUS clients and servers use the key to encrypt all other authentication methods, local authentication...which method to use Kerberos, passwords are not stored on the switch: • Enable or disable RADIUS authentication to control login access • Enable or disable RADIUS authentication to control enable access • Specify the IP addresses and UDP ports of electronic credentials that issued the ticket. You can configure...
Software Guide
Page 418
...PAE, whether the supplicant PAE is authorized to pass. Both Bidirectional flow control, incoming and outgoing, at one end of attachment to as a pass-through for the authentication exchange. RADIUS Remote Access Dial-In User Service. EAPOL=Extensible Authorization Protocol over LAN 2. ...One access point is a controlled port. All traffic through the uncontrolled port, which is authorized. Table 21-2 ...
...PAE, whether the supplicant PAE is authorized to pass. Both Bidirectional flow control, incoming and outgoing, at one end of attachment to as a pass-through for the authentication exchange. RADIUS Remote Access Dial-In User Service. EAPOL=Extensible Authorization Protocol over LAN 2. ...One access point is a controlled port. All traffic through the uncontrolled port, which is authorized. Table 21-2 ...
Software Guide
Page 419
... 802.1x standard. You can use other protocols, but we recommend RADIUS for authentication, particularly when the authentication server is located remotely, because RADIUS has extensions that support encapsulation of frames retransmitted from the back-end authenticator to supplicant • Specify the automatic... Family Software Configuration Guide-Releases 6.3 and 6.4 21-9 Chapter 21 Configuring Switch Access Using AAA Configuring Authentication Traffic Control You can configure these 802.1x parameters on the switch: • Force-Authorized, Force-Unauthorized, or Automatic 802.1x port...
... 802.1x standard. You can use other protocols, but we recommend RADIUS for authentication, particularly when the authentication server is located remotely, because RADIUS has extensions that support encapsulation of frames retransmitted from the back-end authenticator to supplicant • Specify the automatic... Family Software Configuration Guide-Releases 6.3 and 6.4 21-9 Chapter 21 Configuring Switch Access Using AAA Configuring Authentication Traffic Control You can configure these 802.1x parameters on the switch: • Force-Authorized, Force-Unauthorized, or Automatic 802.1x port...
Software Guide
Page 572
... from an rcp server to the running configuration to a TFTP server for storage: Console> (enable) copy config tftp IP address or name of remote host []? 172.20.52.3 Name of downloading, uploading, and copying configuration files between subnets. If the destination file does not exist, rcp creates... and the server must be copying files must have a router to route traffic between remote hosts and the switch. Unlike TFTP which uses User Datagram Protocol (UDP), a connectionless protocol, rcp uses Transmission Control Protocol (TCP), which you will be in the same subnetwork if you do not ...
... from an rcp server to the running configuration to a TFTP server for storage: Console> (enable) copy config tftp IP address or name of remote host []? 172.20.52.3 Name of downloading, uploading, and copying configuration files between subnets. If the destination file does not exist, rcp creates... and the server must be copying files must have a router to route traffic between remote hosts and the switch. Unlike TFTP which uses User Datagram Protocol (UDP), a connectionless protocol, rcp uses Transmission Control Protocol (TCP), which you will be in the same subnetwork if you do not ...
Software Guide
Page 582
...mls pagp protfilt pruning privatevlan qos radius rsvp security snmp spantree sys tac tcp Definition All facilities ACL facility Cisco Discovery Protocol Common Open Policy Server Dynamic Trunking Protocol Dynamic VLAN Enhanced Address Recognition Logic File System GARP ... Protocol Filter VTP pruning Private VLAN facility Quality of Service Remote Access Dial-In User Service ReSerVation Protocol Security Simple Network Management Protocol Spanning Tree Protocol System Terminal Access Controller Transmission Control Protocol 27-2 Catalyst 6000 Family Software Configuration Guide-Releases 6.3...
...mls pagp protfilt pruning privatevlan qos radius rsvp security snmp spantree sys tac tcp Definition All facilities ACL facility Cisco Discovery Protocol Common Open Policy Server Dynamic Trunking Protocol Dynamic VLAN Enhanced Address Recognition Logic File System GARP ... Protocol Filter VTP pruning Private VLAN facility Quality of Service Remote Access Dial-In User Service ReSerVation Protocol Security Simple Network Management Protocol Spanning Tree Protocol System Terminal Access Controller Transmission Control Protocol 27-2 Catalyst 6000 Family Software Configuration Guide-Releases 6.3...
Software Guide
Page 666
do not assign access ports to selectively filter specific flows. Tip You can apply an output access control list (ACL) to RSPAN traffic to these VLANs. With RSPAN, the traffic is forwarded to the destination switch through an uplink port that you reserve a ...few VLANs across multiple switches. • For RSPAN, trunking is connected to remote switches in the RSPAN VLAN. The RSPAN VLAN is configured only on trunk ports and not on page 38-4. • For RSPAN configuration, you can...
do not assign access ports to selectively filter specific flows. Tip You can apply an output access control list (ACL) to RSPAN traffic to these VLANs. With RSPAN, the traffic is forwarded to the destination switch through an uplink port that you reserve a ...few VLANs across multiple switches. • For RSPAN, trunking is connected to remote switches in the RSPAN VLAN. The RSPAN VLAN is configured only on trunk ports and not on page 38-4. • For RSPAN configuration, you can...