16 – Index
RADIUS ingress … 7-6
RADIUS server specified … 7-7
RADIUS server support … 7-1
RADIUS-assigned … 7-8
RADIUS-assigned vs. applied … 7-5
RADIUS-assigned, increments … 7-5
remote-id
changing … 11-11
snooping … 11-10
reserved port numbers … 8-19, 9-17
Reset-on-clear
disabled when saving security credentials to
configuration file … 2-27
resource monitor
See Management and Configuration Guide.
RFCs
RFC 2548 … 6-48
RFC 3580 … 6-48
RFC 4675 … 6-47
routing
source-routing, caution … 7-18, 10-24, 10-40
RSA key, cert …8-11
S
SA … 10-11
security
authorized IP managers … 15-1
per port … 14-1
security credentials
802.1X credentials saved to configuration
file … 2-18, 2-28
copying configurations on the switch … 2-27
copying startup configuration … 2-26
disabling Reset-on-clear option … 2-27
downloading a configuration file … 2-26
downloading from a server … 2-11
enabling storage in configuration file … 2-12
manager username and password … 2-15
operator username and password … 2-15
RADIUS … 2-19
saving to running configuration with include-
credentials … 2-26
saving to startup configuration … 2-26
saving to startup configuration with write
memory … 2-26
SNMPv3 … 2-17
SSH … 2-21
SSH private keys not saved … 2-28
TACACS … 2-18
viewing in running configuration … 2-12
viewing in startup configuration … 2-26
when SNMPv3 credentials in downloaded file
are not supported … 2-28
security violations
detecting … 11-34
notices of … 14-35
security, ACL, IPv4
See ACL, security use.
security, password
See SSH.
setting a password …2-4
shared secret key
RADIUS … 2-13, 2-19
TACACS … 2-13, 2-18
single sign-on …5-10
SNMP
authentication failures … 11-34
disabling access to authentication MIB … 1-14
password and username configuration … 2-1
RADIUS access to auth config MIB … 6-3
trap generation … 11-36
SNMPv3
saving security credentials to configuration
file … 2-13, 2-17
security credentials not supported in download-
ed file … 2-28
snooping
authorized server … 11-5
authorized server address … 11-8
binding database … 11-12
changing remote-id … 11-11
DHCP … 11-3
disable MAC check … 11-11
Option 82 … 11-5, 11-9
statistics … 11-6
untrusted-policy … 11-10
verify … 11-5
source port filters
configuring … 12-3
named … 12-5
operating rules … 12-3
See also named source port filters.
selection criteria … 12-3
source-routing, caution … 7-18, 10-24, 10-40
spanning tree