A SERVICE OF

logo

6 – Index
E
Eavesdrop Protection … 11-4
encryption key
RADIUS … 2-11, 2-15
TACACS … 2-11, 2-15
event log
alerts for monitored events … 8-34
intrusion alerts … 11-36
F
filetransfer, SSH …6-17
filter, source-port
editing … 9-18
filter indexing … 9-19
filter type … 9-8
idx … 9-8, 9-19
index … 9-8, 9-19
named … 9-6
operating rules … 9-4, 9-6
port-trunk operation … 9-2, 9-17
show … 9-8
value … 9-8
viewing … 9-8
filtering MAC addresses …8-25
filters
overview … 9-2
source port … 9-4
source-port filter value … 9-19
static…9-2
types … 9-3
Framed-IP-Address …5-38
G
guest VLAN … 10-7, 10-8, 10-29
GVRP
dynamic VLANs … 10-71
effect on client authentication … 10-65, 10-67
static VLAN not advertised … 10-68, 10-72
H
hierarchy of precedence, used by DCA …1-17
I
IDM
overview … 1-21
RADIUS-based security classifiers … 1-21
include credentials command …2-11
See also security credentials.
interface
unknown-vlans command … 10-72
intrusion alarms
entries dropped from log … 11-38
event log … 11-36
prior to … 11-38
Intrusion Log
prior to … 11-34, 11-35
IP
address count … 8-33
authorized IP managers … 12-1
reserved port numbers … 6-19
IP attribute …5-38
IP masks
building … 12-10
for multiple authorized manager
stations … 12-11
for single authorized manager station … 12-10
operation … 12-4
IP routing
dynamic ARP protection, enabling … 8-16
validation checks on ARP packets,
configuring … 8-21
ip source-binding …8-29
ip source-lockdown … 8-26, 8-27
ip source-lockdown bindings … 8-30, 8-31
IP spoofing
protection against … 8-24
IP-to-MAC binding … 8-20, 8-28
ip-version, ipv4or6 …6-17
L
LACP
802.1X not allowed … 10-13, 10-19, 10-73
login attempts, monitoring …8-33
M
MAC address
count, monitoring … 8-33
inconsistent value … 11-20
moves, monitoring…8-33
MAC authentication