Index – 11
See also source port filters.
filtering MAC addresses …11-24
filters
effect of IGMP … 12-15
multicast … 12-14
overview … 12-2
protocol … 12-15
source port … 12-3
source-port filter value … 12-21
static … 12-2
types … 12-3
Framed-IP-Address …6-49
G
guest VLAN … 13-5, 13-6, 13-32
GVRP
dynamic VLANs … 13-75
effect on client authentication … 13-69, 13-71
static VLAN not advertised … 13-72, 13-76
H
hierarchy of precedence, used by DCA …1-17
HP E-PCM Plus
IDM as a plug-in to … 1-20
port security alerts … 14-2
HP Switch
RADIUS server support … 7-2
switch documentation … -xxi
HTTP registration, MAC authentication …4-61
I
IANA … 10-68
IANA, protocol numbers … 10-64, 10-70
IDM …7-2
overview … 1-20
RADIUS-based security classifiers … 1-20
RADIUS-based sessions … 7-42
IGMP
effect on filters … 12-15
IP multicast address range … 12-15
include credentials command …2-11
See also security credentials.
interface
unknown-vlans command … 13-75
intrusion alarms
entries dropped from log … 14-40
event log … 14-38
prior to … 14-40
Intrusion Log
prior to … 14-37
IP
address count … 11-33
authorized IP managers … 15-1
reserved port numbers … 8-19
IP attribute …6-49
IP masks
building … 15-11
for multiple authorized manager
stations … 15-11
for single authorized manager station … 15-11
operation … 15-4
IP routing
dynamic ARP protection, enabling … 11-15
required for ACLs … 10-3
validation checks on ARP packets,
configuring … 11-20
ip source-binding … 11-28
ip source-lockdown … 11-25, 11-26
bindings … 11-29, 11-30
IP spoofing
protection against … 11-23
IP-to-MAC binding … 11-19, 11-27
IPv4, ACL
vendor-specific attribute … 7-23, 7-24
IPv6
ACL
vendor-specific attribute … 7-23, 7-24
IPv6, ACL
vendor-specific attribute … 7-23
ip-version, ipv4or6 …8-17
K
key chain
See KMS key chain.
key management system
See KMS.
KMS
accept key time … 16-5, 16-6
assigning a time-dependent key … 16-5
assigning a time-independent key … 16-3
generating a key chain … 16-2
generating a time-dependent key … 16-5