12 – Index
generating a time-independent key … 16-3
key chain … 16-1
key chain entry … 16-2
key chain generation … 16-2
overview … 16-1
send key time … 16-5
time protocol … 16-6
time-dependent key … 16-2, 16-5, 16-6
time-independent key … 16-1, 16-3
L
LACP
802.1X not allowed … 13-12, 13-18
listening …8-18
login attempts, monitoring … 11-33
M
MAC address
count, monitoring … 11-33
inconsistent value … 14-20
moves, monitoring … 11-33
MAC authentication
address limit … 4-52
authenticator operation … 4-5
blocked traffic … 4-1
CHAP
defined … 4-9
usage … 4-1
client status … 4-71
concurrent with Web … 4-3
configuration commands … 4-49
configuring
on the switch … 4-48
switch for RADIUS access … 4-15
the RADIUS server … 4-15
general setup … 4-12
hierarchy of precedence in authentication
session … 1-17
http redirect … 4-59
http registration steps … 4-61
LACP not allowed … 4-12
overview … 1-6
port access … 13-2
reauthentication client … 4-63
restrictive filter … 4-63
rules of operation … 4-10
show status and configuration … 4-65
terminology … 4-9
unauth-redirect command … 4-59, 4-60
unconfigure registration server … 4-64
web registration … 4-59
MAC Lockdown … 14-1
MAC lockout … 14-1
number of vlans … 14-32
manager password … 2-2, 2-4, 2-5
recommended … 5-6
saving to configuration file … 2-12
MD5
See RADIUS.
message
inconsistent value … 14-20
messages
custom when not authenticated … 4-54
MIB
SNMP access … 1-14
SNMP access to authentication MIB … 1-14
mirroring … 10-14
MSCHAPv2 …6-10
multicast
filter … 12-3, 12-14
multicast address, spanning tree
protocol … 12-15
multicast MAC address, STP
N
named source port filters
configuring … 12-6
displaying … 12-8
operating rules … 12-6
See also source port filters.
Network Immunity Manager (NIM)
hierarchy of precedence in authentication
session … 1-17
overview … 1-17
network management applications …7-2
no switch access …2-9
O
oobm
copy tftp pub-key-file … 8-28
listen … 8-18
radius host … 13-25, 13-45