Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] aaa authentication dot1x command network default group radius command access control lists (ACLs) 2nd access layer access switches authentication client-based Layer 2 authentication clientless authentication definition of authorization hierarchical WAN architecture sample virtualized access layer access ports, assigning to VLAN access switches CAM enforcing security policies with hierarchical campus design private VLANs QoS deployment stacking VLANs wiring closet deployment access-distribution blocks, Layer 2 h2h architectures access-distribution data path virtualization, Layer 2 h2h architectures access-distribution segmentation, Layer 2 h2h architectures ACL (access control lists) 2nd h2h architectures Layer 3 h2h architectures acquisitions, virtualization Active Directory (AD) AD (Active Directory) Address Resolution Protocol (ARP) 2nd adjacencies (FIBs) AF PHB (assured forwarding per-hop behaviors) aggregation routers, hierarchical WAN architecture AH headers (IPsec) airports, virtualization any-to-any VPN (Virtual Private Networks), unprotected shared services architecture (QoS) ARP (Address Resolution Protocol) 2nd auth-fail VLANs authentication 2nd authentication failure client-based Layer 2 authentication 802.1x protocols 802.1x roles dot1x implementation clientless authentication centralized dynamic clientless authentication Layer 3 clientless authentication MAC authentication static clientless authentication definition of failure guest access servers (802.1x networks) authenticators (802.1x networks) authorization 2nd definition of guest access auto-discovery, tunnel-based L2VPN architectures auto-provisioning, tunnel-based L2VPN architectures auto-rp feature awareness (VRF) |