Software Guide
Page 60
... segment. Ports on both ends of the sending station with the port on which workstations or servers connect to the hub. Port negotiation exchanges flow-control parameters, remote fault information, and duplex information. To reduce degradation, the switch treats each end of the frames received. When the destination station replies, the switch...
... segment. Ports on both ends of the sending station with the port on which workstations or servers connect to the hub. Port negotiation exchanges flow-control parameters, remote fault information, and duplex information. To reduce degradation, the switch treats each end of the frames received. When the destination station replies, the switch...
Software Guide
Page 64
... 6.3 and 6.4 4-6 78-13315-02 To configure flow control, perform this task in privileged mode: Task Step 1 Set the flow-control parameters. If a Gigabit Ethernet port receive buffer becomes full, the port transmits a "pause" packet that tells remote ports to delay sending more packets for a period of time...; The port sends flow-control frames to the port if the neighboring port...
... 6.3 and 6.4 4-6 78-13315-02 To configure flow control, perform this task in privileged mode: Task Step 1 Set the flow-control parameters. If a Gigabit Ethernet port receive buffer becomes full, the port transmits a "pause" packet that tells remote ports to delay sending more packets for a period of time...; The port sends flow-control frames to the port if the neighboring port...
Software Guide
Page 414
...-02 The NAS functions as the one configured on the switch: • Enable or disable RADIUS authentication to control login access • Enable or disable RADIUS authentication to control enable access • Specify the IP addresses and UDP ports of the RADIUS servers • Specify the RADIUS...RADIUS servers. If the standard user password method is disabled by the NAS to authenticate users attempting to connect to RFC 2138, "Remote Authentication Dial In User Service (RADIUS)." Kerberos also guards against intruders who might pick up the encrypted tickets from one or more ...
...-02 The NAS functions as the one configured on the switch: • Enable or disable RADIUS authentication to control login access • Enable or disable RADIUS authentication to control enable access • Specify the IP addresses and UDP ports of the RADIUS servers • Specify the RADIUS...RADIUS servers. If the standard user password method is disabled by the NAS to authenticate users attempting to connect to RFC 2138, "Remote Authentication Dial In User Service (RADIUS)." Kerberos also guards against intruders who might pick up the encrypted tickets from one or more ...
Software Guide
Page 418
...method and functions only as the "supplicant") entity that requests access to the LAN/switch services and responds to pass. Controlled port Secured access point. Protocol object associated with the supplicant, submits the information from the authenticator. PAE=port access entity... and authorizes the supplicant when instructed to do so by the authentication server. Both Bidirectional flow control, incoming and outgoing, at an unauthorized switch port. RADIUS Remote Access Dial-In User Service. Uncontrolled port Unsecured access point that can be handled directly by ...
...method and functions only as the "supplicant") entity that requests access to the LAN/switch services and responds to pass. Controlled port Secured access point. Protocol object associated with the supplicant, submits the information from the authenticator. PAE=port access entity... and authorizes the supplicant when instructed to do so by the authentication server. Both Bidirectional flow control, incoming and outgoing, at an unauthorized switch port. RADIUS Remote Access Dial-In User Service. Uncontrolled port Unsecured access point that can be handled directly by ...
Software Guide
Page 419
You can use other protocols, but we recommend RADIUS for authentication, particularly when the authentication server is located remotely, because RADIUS has extensions that support encapsulation of frames retransmitted from the back-end authenticator to supplicant • Specify the automatic supplicant... mechanism, so they are not defined by the 802.1x standard. Chapter 21 Configuring Switch Access Using AAA Configuring Authentication Traffic Control You can configure these 802.1x parameters on the switch: • Force-Authorized, Force-Unauthorized, or Automatic 802.1x port...
You can use other protocols, but we recommend RADIUS for authentication, particularly when the authentication server is located remotely, because RADIUS has extensions that support encapsulation of frames retransmitted from the back-end authenticator to supplicant • Specify the automatic supplicant... mechanism, so they are not defined by the 802.1x standard. Chapter 21 Configuring Switch Access Using AAA Configuring Authentication Traffic Control You can configure these 802.1x parameters on the switch: • Force-Authorized, Force-Unauthorized, or Automatic 802.1x port...
Software Guide
Page 572
...Configuration Guide-Releases 6.3 and 6.4 78-13315-02 Unlike TFTP which uses User Datagram Protocol (UDP), a connectionless protocol, rcp uses Transmission Control Protocol (TCP), which you do with Configuration Files This example shows how to upload the running configuration or to a Flash device: •... files between subnets. To copy files using rcp, you do not need only to have a router to route traffic between remote hosts and the switch. Working with Configuration Files on the Switch Chapter 26 Working with TFTP. y Configuration has been copied successfully...
...Configuration Guide-Releases 6.3 and 6.4 78-13315-02 Unlike TFTP which uses User Datagram Protocol (UDP), a connectionless protocol, rcp uses Transmission Control Protocol (TCP), which you do with Configuration Files This example shows how to upload the running configuration or to a Flash device: •... files between subnets. To copy files using rcp, you do not need only to have a router to route traffic between remote hosts and the switch. Working with Configuration Files on the Switch Chapter 26 Working with TFTP. y Configuration has been copied successfully...
Software Guide
Page 582
...mls pagp protfilt pruning privatevlan qos radius rsvp security snmp spantree sys tac tcp Definition All facilities ACL facility Cisco Discovery Protocol Common Open Policy Server Dynamic Trunking Protocol Dynamic VLAN Enhanced Address Recognition Logic File System GARP ... Protocol Filter VTP pruning Private VLAN facility Quality of Service Remote Access Dial-In User Service ReSerVation Protocol Security Simple Network Management Protocol Spanning Tree Protocol System Terminal Access Controller Transmission Control Protocol 27-2 Catalyst 6000 Family Software Configuration Guide-Releases 6.3...
...mls pagp protfilt pruning privatevlan qos radius rsvp security snmp spantree sys tac tcp Definition All facilities ACL facility Cisco Discovery Protocol Common Open Policy Server Dynamic Trunking Protocol Dynamic VLAN Enhanced Address Recognition Logic File System GARP ... Protocol Filter VTP pruning Private VLAN facility Quality of Service Remote Access Dial-In User Service ReSerVation Protocol Security Simple Network Management Protocol Spanning Tree Protocol System Terminal Access Controller Transmission Control Protocol 27-2 Catalyst 6000 Family Software Configuration Guide-Releases 6.3...
Software Guide
Page 666
... RSPAN, the traffic is also in VLAN 2. do not assign access ports to selectively filter specific flows. Tip You can apply an output access control list (ACL) to RSPAN traffic to these VLANs. Specify these ACLs on the RSPAN VLAN in the RSPAN source switches. • All the ...can configure quality of service (QoS) parameters for example) and it is connected to the destination switch through an uplink port that is forwarded to remote switches in the RSPAN VLAN. Configuring RSPAN Chapter 38 Configuring SPAN and RSPAN Figure 38-2 RSPAN Configuration Switch D D1 Layer 2 trunk C3 Switch ...
... RSPAN, the traffic is also in VLAN 2. do not assign access ports to selectively filter specific flows. Tip You can apply an output access control list (ACL) to RSPAN traffic to these VLANs. Specify these ACLs on the RSPAN VLAN in the RSPAN source switches. • All the ...can configure quality of service (QoS) parameters for example) and it is connected to the destination switch through an uplink port that is forwarded to remote switches in the RSPAN VLAN. Configuring RSPAN Chapter 38 Configuring SPAN and RSPAN Figure 38-2 RSPAN Configuration Switch D D1 Layer 2 trunk C3 Switch ...