3-6QoS VolumeTable 3-5 Features in the QoS volumeFeatures DescriptionQoSThis document describes:z QoS overviewz QoS policy configurationz Priority mapping configurationz Traffic policing Configurationz Traffic shaping Configurationz Line rate configurationz Congestion managementz Traffic mirroring configurationUser ProfileUser profile provides a configuration template to save predefinedconfigurations. This document describes:z Creating a User Profilez Configuring a User Profilez Enabling a User ProfileSecurity VolumeTable 3-6 Features in the Security volumeFeatures DescriptionAAAAuthentication, Authorization and Accounting (AAA) provide a uniformframework used for configuring these three security functions toimplement the network security management. This document describes:z Introduction to AAA, RADIUS and HWTACACSz AAA configurationz RADIUS configurationz HWTACACS configuration802.1XIEEE 802.1X (hereinafter simplified as 802.1X) is a port-based networkaccess control protocol that is used as the standard for LAN user accessauthentication. This document describes:z 802.1X overviewz 802.1X configurationz 802.1X Guest-VLAN configurationHABPOn an HABP-capable switch, HABP packets can bypass 802.1Xauthentication and MAC authentication, allowing communication amongswitches in a cluster. This document describes:z Introduction to HABPz HABP configurationMAC AuthenticationMAC authentication provides a way for authenticating users based onports and MAC addresses; it requires no client software to be installed onthe hosts. This document describes:z RADIUS-Based MAC Authenticationz Local MAC AuthenticationPortalPortal authentication, as its name implies, helps control access to theInternet. This document describes:z Portal overviewz Portal configuration