Software Guide
Page 60
...Negotiation Works Note Port negotiation does not involve negotiating port speed. Understanding How Ethernet Works Chapter 4 Configuring Ethernet, Fast Ethernet, and Gigabit Ethernet Switching These sections describe Ethernet: • Switching Frames Between Segments, page 4-2 • Building the Address Table, page 4-2... port on a Catalyst 6000 family switch can store at each port as an individual segment. Port negotiation exchanges flow-control parameters, remote fault information, and duplex information. Ports on a typical Ethernet hub all devices attached to the network. If two ...
...Negotiation Works Note Port negotiation does not involve negotiating port speed. Understanding How Ethernet Works Chapter 4 Configuring Ethernet, Fast Ethernet, and Gigabit Ethernet Switching These sections describe Ethernet: • Switching Frames Between Segments, page 4-2 • Building the Address Table, page 4-2... port on a Catalyst 6000 family switch can store at each port as an individual segment. Port negotiation exchanges flow-control parameters, remote fault information, and duplex information. Ports on a typical Ethernet hub all devices attached to the network. If two ...
Software Guide
Page 64
...Mbps, and 10 Mbps) can receive and act upon "pause" packets from other Ethernet ports use flow control to respond to send flow control Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 4-6 78-13315-02 Enter the set port flow control command to the...control requests. Table 4-3 Ethernet-Flow Control Keyword Functions Keywords Function receive on The port uses flow control dictated by the neighboring port. Step 2 Verify the flow-control configuration. If a Gigabit Ethernet port receive buffer becomes full, the port transmits a "pause" packet that tells remote...
...Mbps, and 10 Mbps) can receive and act upon "pause" packets from other Ethernet ports use flow control to respond to send flow control Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 4-6 78-13315-02 Enter the set port flow control command to the...control requests. Table 4-3 Ethernet-Flow Control Keyword Functions Keywords Function receive on The port uses flow control dictated by the neighboring port. Step 2 Verify the flow-control configuration. If a Gigabit Ethernet port receive buffer becomes full, the port transmits a "pause" packet that tells remote...
Software Guide
Page 414
... for a particular service. If you configure a key on the switch: • Enable or disable RADIUS authentication to control login access • Enable or disable RADIUS authentication to control enable access • Specify the IP addresses and UDP ports of the RADIUS servers • Specify the RADIUS key ... on the RADIUS servers. These tickets have a limited life span and can specify which method to use the key to RFC 2138, "Remote Authentication Dial In User Service (RADIUS)." The NAS permits or denies network access to both services and users. When you disable all RADIUS...
... for a particular service. If you configure a key on the switch: • Enable or disable RADIUS authentication to control login access • Enable or disable RADIUS authentication to control enable access • Specify the IP addresses and UDP ports of the RADIUS servers • Specify the RADIUS key ... on the RADIUS servers. These tickets have a limited life span and can specify which method to use the key to RFC 2138, "Remote Authentication Dial In User Service (RADIUS)." The NAS permits or denies network access to both services and users. When you disable all RADIUS...
Software Guide
Page 418
...It communicates with a specific system port. PAE=port access entity 21-8 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 78-13315-02 Controlled port Secured access point. One access point is authorized. EAP EAPOL1 Extensible Authentication Protocol. It checks the credentials of the supplicant PAE and then ...of a point-to information requests from the supplicant to the authentication server, and authorizes the supplicant when instructed to pass. In Flow control only on incoming frames in 802.1x. RADIUS Remote Access Dial-In User Service.
...It communicates with a specific system port. PAE=port access entity 21-8 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 78-13315-02 Controlled port Secured access point. One access point is authorized. EAP EAPOL1 Extensible Authentication Protocol. It checks the credentials of the supplicant PAE and then ...of a point-to information requests from the supplicant to the authentication server, and authorizes the supplicant when instructed to pass. In Flow control only on incoming frames in 802.1x. RADIUS Remote Access Dial-In User Service.
Software Guide
Page 419
...21 Configuring Switch Access Using AAA Configuring Authentication Traffic Control You can configure these 802.1x parameters on the switch: • Force... but we recommend RADIUS for authentication, particularly when the authentication server is located remotely, because RADIUS has extensions that support encapsulation of frames retransmitted from the back...sections describe how to configure the different authentication methods: • Authentication Default Configuration, page 21-10 • Authentication Configuration Guidelines, page 21-11 • Configuring Login Authentication, page 21-...
...21 Configuring Switch Access Using AAA Configuring Authentication Traffic Control You can configure these 802.1x parameters on the switch: • Force... but we recommend RADIUS for authentication, particularly when the authentication server is located remotely, because RADIUS has extensions that support encapsulation of frames retransmitted from the back...sections describe how to configure the different authentication methods: • Authentication Default Configuration, page 21-10 • Authentication Configuration Guidelines, page 21-11 • Configuring Login Authentication, page 21-...
Software Guide
Page 572
...the rcp server. If the destination file does not exist, rcp creates it for storage: Console> (enable) copy config tftp IP address or name of remote host []? 172.20.52.3 Name of downloading, uploading, and copying configuration files between subnets. Working with Configuration Files on the Switch Chapter 26 Working ... rely on the rsh server (or daemon) on the destination file. Unlike TFTP which uses User Datagram Protocol (UDP), a connectionless protocol, rcp uses Transmission Control Protocol (TCP), which you do not have read permission on the source file and write permission on the...
...the rcp server. If the destination file does not exist, rcp creates it for storage: Console> (enable) copy config tftp IP address or name of remote host []? 172.20.52.3 Name of downloading, uploading, and copying configuration files between subnets. Working with Configuration Files on the Switch Chapter 26 Working ... rely on the rsh server (or daemon) on the destination file. Unlike TFTP which uses User Datagram Protocol (UDP), a connectionless protocol, rcp uses Transmission Control Protocol (TCP), which you do not have read permission on the source file and write permission on the...
Software Guide
Page 582
... pagp protfilt pruning privatevlan qos radius rsvp security snmp spantree sys tac tcp Definition All facilities ACL facility Cisco Discovery Protocol Common Open Policy Server Dynamic Trunking Protocol Dynamic VLAN Enhanced Address Recognition Logic File System GARP ... Protocol Filter VTP pruning Private VLAN facility Quality of Service Remote Access Dial-In User Service ReSerVation Protocol Security Simple Network Management Protocol Spanning Tree Protocol System Terminal Access Controller Transmission Control Protocol 27-2 Catalyst 6000 Family Software Configuration Guide-Releases 6.3...
... pagp protfilt pruning privatevlan qos radius rsvp security snmp spantree sys tac tcp Definition All facilities ACL facility Cisco Discovery Protocol Common Open Policy Server Dynamic Trunking Protocol Dynamic VLAN Enhanced Address Recognition Logic File System GARP ... Protocol Filter VTP pruning Private VLAN facility Quality of Service Remote Access Dial-In User Service ReSerVation Protocol Security Simple Network Management Protocol Spanning Tree Protocol System Terminal Access Controller Transmission Control Protocol 27-2 Catalyst 6000 Family Software Configuration Guide-Releases 6.3...
Software Guide
Page 666
... "SPAN Configuration Guidelines" section on page 38-6 apply to RSPAN. • RSPAN sessions can apply an output access control list (ACL) to RSPAN traffic to remote switches in VLAN 2. The RSPAN VLAN is also in the RSPAN VLAN. do not assign access ports to RSPAN destination... ports only. • RSPAN does not support monitoring of the participating source, intermediate, or destination switches. 38-10 Catalyst 6000 Family Software Configuration...
... "SPAN Configuration Guidelines" section on page 38-6 apply to RSPAN. • RSPAN sessions can apply an output access control list (ACL) to RSPAN traffic to remote switches in VLAN 2. The RSPAN VLAN is also in the RSPAN VLAN. do not assign access ports to RSPAN destination... ports only. • RSPAN does not support monitoring of the participating source, intermediate, or destination switches. 38-10 Catalyst 6000 Family Software Configuration...