DHCP snooping binding database (continued)
described 214
enabling 227
disabling recovery of 26
displaying 135
E
enable 22
enable password 24
enable secret 24
enable secret password 24
enabling 238, 239
encrypting 24
encryption for passwords 24
encryption methods 115
encryption, CipherSuite 127
EtherChannels 237
Examples for controlling switch access with RADIUS 102
exiting 34
F
filtering 168
non-IP traffic 168
filters, IP 141
See ACLs, IP [filters 141
IP 141
zzz] 141
H
HTTP over SSL 125
see HTTPS 125
HTTP secure server 125
HTTPS 125, 126, 131
configuring 131
described 125
self-signed certificate 126
I
ICMP 140, 151
unreachable messages 140
unreachables and ACLs 151
Identifying the RADIUS Server Host 102
Examples command 102
identifying the server 45, 83
IP ACLs 150
named 150
IP source guard 235, 237, 238, 239
802.1x 237
binding configuration 235
automatic 235
manual 235
binding table 235
configuration guidelines 237
described 235
DHCP snooping 235
enabling 238, 239
EtherChannels 237
port security 237
routed ports 237
static bindings 238, 239
adding 238, 239
static hosts 239
TCAM entries 237
trunk interfaces 237
VRF 237
IPv4 ACLs 153, 154, 156, 160, 167
applying to interfaces 167
extended, creating 156
interfaces 153
named 160
standard, creating 154
K
key 45, 83
L
limiting the services to the user 50, 90
local mode with AAA 107
logging into 34
logging messages, ACL 150
login 47, 86
login authentication 47, 86
with RADIUS 86
with TACACS+ 47
M
MAC extended access lists 140, 170
applying to Layer 2 interfaces 140, 170
manual 235
monitoring 135, 179
access groups 179
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01 IN-3
Index