
address count … 10-23, 14-1
reserved port numbers … 7-18
IP attribute …5-36
IP masks
building … 14-10
for multiple authorized manager
stations … 14-10
operation … 14-4
IP routing
dynamic ARP protection, enabling … 10-15
validation checks on ARP packets,
configuring … 10-20
IP-to-MAC binding … 10-19
IPv4, ACL
vendor-specific attribute … 6-18
IPv6, ACL
vendor-specific attribute … 6-18
K
key chain
See KMS key chain.
key management system
See KMS.
KMS
accept key time … 15-5, 15-7, 15-5, 15-4
generating a key chain … 15-3, 15-5, 15-4
key chain … 15-2, 15-3
overview … 15-2
send key time … 15-5
time protocol … 15-6, 15-2, 15-5, 15-6, 15-2, 15-4
L
LACP
802.1X not allowed … 12-13, 12-20, 12-75
login attempts, monitoring … 10-23
M
MAC address
count, monitoring … 10-23
inconsistent value … 13-20
moves, monitoring … 10-23
MAC authentication
authenticator operation … 3-5
blocked traffic … 3-2
CHAP
defined … 3-10
usage…3-2
client status … 3-42, 3-3, 3-33
on the switch … 3-32
switch for RADIUS access … 3-16
the RADIUS server … 3-15
general setup … 3-13
hierarchy of precedence in authentication
session … 1-19
LACP not allowed … 3-12
overview … 1-6
port access … 12-4
rules of operation … 3-11
show status and configuration … 3-36
terminology … 3-10
MAC Lockdown … 13-3
MAC Lockout … 13-3
manager password … 2-4, 2-6, 2-7
recommended … 4-7
saving to configuration file … 2-12
MD5
See RADIUS.
message
inconsistent value … 13-20
MIB
SNMP access … 1-16
MSCHAPv2 …5-11
multicast address, spanning tree
protocol … 11-16
multicast filter … 11-3, 11-15
multicast MAC address, STP
N
named source port filters
configuring … 11-7
displaying … 11-9
operating rules … 11-6
See also source port filters.
NAS …6-10
Network Immunity Manager (NIM)
hierarchy of precedence in authentication
session … 1-19
overview … 1-19
network management applications …6-3
6 – Index