424
mode
802.1X EAP relay/termination comparison, 67
8
02.1X multicast trigger, 83
8
02.1X multicast trigger mode, 65
8
02.1X unicast trigger, 83
8
02.1X unicast trigger mode, 65
FI
PS, 385
I
Psec ACL-based implementation
aggregation, 253
I
Psec ACL-based implementation per-host, 253
I
Psec ACL-based implementation standard, 253
I
Psec application-based implementation, 254
I
Psec encapsulation transport, 251
I
Psec encapsulation tunnel, 251
IP
sec IKE negotiation, 252
I
Psec IKE negotiation (time-based lifetime), 252
IP
sec IKE negotiation (traffic-based lifetime), 252
MA
C authentication multi-VLAN, 108
PK
I offline, 222
PK
I online, 222
por
t security, 178
por
t security authentication control, 173
por
t security autoLearn MAC learning
control, 175
por
t security MAC learning control, 173
por
t security MAC learning control
autoLearn, 173
por
t security MAC learning control secure, 173
por
t security macAddressWithRadius
authentication, 176
por
t security secure MAC learning control, 175
sec
urity portal authentication, 12 0
sec
urity portal authentication (cross-subnet), 121
sec
urity portal authentication (direct), 12 0
sec
urity portal authentication (re-DHCP), 12 0
u
serLogin 802.1X authentication, 175
u
serLoginSecure 802.1X authentication, 175
u
serLoginSecureExt 802.1X authentication, 175
u
serLoginWithOUI 802.1X authentication, 175
mu
lticast
802.1X multicast trigger mode, 65, 83
N
NA
S
AAA configuration, 16
AAA de
vice implementation, 11
AAA HW
TACACS implementation, 7
AAA LD
AP implementation, 9
AAA N
AS-ID profile configuration, 47
AAA R
ADIUS implementation, 2
AAA
RADIUS security policy server IP address, 30
a
pplying interface NAS-ID profile (RADIUS), 13 5
NA
T
IPsec IKE keepalive function, 289
ND at
tack defense
configuration, 402
co
nfiguring source MAC consistency check, 402
IP
v6. See
need to know. Use
negotiating
IPsec IKE negotiation, 281
IP
sec IKE negotiation mode, 252
NE
TCONF
Secure Telnet client user line configuration, 305
S
SH client user line configuration, 305
S
SH+password authentication
configuration, 337, 339
net
work
802.1X access control method, 81
8
02.1X architecture, 62
8
02.1X authentication request attempts max
number, 82
8
02.1X authentication server timeout timer, 82
8
02.1X authentication trigger, 83
8
02.1X Auth-Fail VLAN, 87
8
02.1X authorization state, 81
8
02.1X critical VLAN, 88
80
2.1X EAD assistant, 89
8
02.1X EAP relay authentication, 67
8
02.1X EAP relay enable, 80
8
02.1X EAP termination enable, 80
8
02.1X guest VLAN, 86
8
02.1X online user handshake, 83
8
02.1X periodic online user reauthentication, 85
8
02.1X port users max number, 81
AAA de
vice implementation, 11
AAA HW
TACACS implementation, 7
AAA HW
TACACS scheme, 32
AAA HW
TACACS server SSH user, 48
AAA I
SP domain accounting method, 45
AAA I
SP domain attribute, 42