Numerics
3DES … 6-3, 7-3
802.1X
See port-based access control. …8-1
A
aaa authentication … 4-8
aaa port-access
See Web or MAC Authentication.
access levels, authorized IP managers … 11-3
accounting
See RADIUS.
address
authorized for port security … 9-3
applicable switches … 1-2
authentication
See TACACS.
authorized addresses
for IP management security … 11-4
for port security … 9-3
authorized IP managers
access levels … 11-3
building IP masks … 11-9
configuring in browser interface … 11-7, 11-9
configuring in console … 11-5
definitions of single and multiple … 11-4
effect of duplicate IP addresses … 11-13
IP mask for multiple stations … 11-11
IP mask for single station … 11-9
IP mask operation … 11-4
operating notes … 11-13
overview … 11-1
precedence over other security … 11-2
troubleshooting … 11-13
certificate
CA-signed … 7-4
root … 7-4
self-signed … 7-4
Clear button
to delete password protection … 2-5
configuration
port security … 9-5
RADIUS
See RADIUS.
SSH
See SSH.
connection inactivity time … 2-3
console, for configuring
authorized IP managers … 11-5
D
DES … 6-3, 7-3
disclaimer … 1-ii
duplicate IP address
effect on authorized IP managers … 11-13
E
event log
intrusion alerts … 9-35
F
filter, source-port
applicable models … 10-2
configuring … 10-5
editing … 10-9
filter indexing … 10-8
filter type … 10-7
idx … 10-7, 10-8
index … 10-7, 10-8
multinetted VLAN … 10-3
operating rules … 10-4
operation … 10-2
port-trunk operation … 10-2, 10-6
show … 10-7
value … 10-7
viewing … 10-7
G
GVRP, static VLAN not advertised … 8-47
I
inconsistent value, message … 9-14
intrusion alarms
entries dropped from log … 9-36
event log … 9-35
prior to … 9-36
Intrusion Log
prior to … 9-31, 9-34
Index – 1
C