K
key chain
See KMS key chain.
key management system
See KMS.
KMS
accept key time … 13-5, 13-7
assigning a time-dependent key … 13-5
assigning a time-independent key … 13-4
generating a key chain … 13-3
generating a time-dependent key … 13-5
generating a time-independent key … 13-4
key chain … 13-2
key chain entry … 13-3
key chain generation … 13-3
overview … 1-11, 13-2
send key time … 13-5
time protocol … 13-6
time-dependent key … 13-2, 13-5, 13-6
time-independent key … 13-2, 13-4
LACP
802.1X not allowed … 10-13, 10-17, 10-58
license, software … 1-9
M
MAC auth
port access … 10-4
MAC Authentication
authenticator operation … 4-5
blocked traffic … 4-4
CHAP
defined … 4-9
usage … 4-4
client status … 4-29
configuration commands … 4-23
configuring
on the switch … 4-22
switch for RADIUS access … 4-14
the RADIUS server … 4-13
features … 4-3
general setup … 4-12
LACP not allowed … 4-12
rules of operation … 4-10
show status and configuration … 4-27
terminology … 4-9
MAC Lockdown … 11-3
MAC Lockout … 11-3
manager password … 2-3, 2-5, 2-6
manager password recommended … 5-7
MD5
See RADIUS.
message
inconsistent value … 11-21
multicast address, spanning tree protocol … 9-16
multicast filter … 9-3, 9-15
multicast MAC address, STP
N
named source port filter
viewing … 9-8
named source port filters
configuring … 9-7
operating rules … 9-6
O
open VLAN mode
See 802.1X access control.
OpenSSH … 7-3
OpenSSL … 8-2
operating notes
authorized IP managers … 12-12
port security … 11-42
operator password … 2-3, 2-5, 2-6
P
password
browser/console access … 2-4
case-sensitive … 2-5
caution … 2-4
delete … 2-6
deleting with the Clear button … 2-6
if you lose the password … 2-6
incorrect … 2-4
length … 2-5
operator only, caution … 2-4
pair … 2-2
setting … 2-5
password pair … 2-2
password security … 7-18
Index – 5
L