Index
Numerics
3DES … 6-3, 7-3
802.1x
See port-based access control.
A
aaa authentication … 4-8
aaa port-access
See Web or MAC Authentication.
access levels, authorized IP managers … 10-3
accounting
See RADIUS.
ACL
general application … 1-4
policy application points … 1-4
security use … 1-4
address
authorized for port security … 9-3
authentication
See TACACS.
authorized addresses
for IP management security … 10-4
for port security … 9-3
authorized IP managers
access levels … 10-3
building IP masks … 10-9
configuring in browser interface … 10-7, 10-8
configuring in console … 10-5
definitions of single and multiple … 10-4
effect of duplicate IP addresses … 10-12
IP mask for multiple stations … 10-10
IP mask for single station … 10-9
IP mask operation … 10-4
operating notes … 10-12
overview … 10-1
troubleshooting … 10-12
C
certificate
CA-signed … 7-4
root … 7-4
self-signed … 7-3
Clear button
to delete password protection … 2-6
configuration
port security … 9-5
RADIUS
See RADIUS.
SSH
See SSH.
connection inactivity time … 2-3
console, for configuring
authorized IP managers … 10-5
D - I
DES … 6-3, 7-3
duplicate IP address
effect on authorized IP managers … 10-12
event log
intrusion alerts … 9-35
GVRP, static VLAN not advertised … 8-46
inconsistent value, message … 9-16
intrusion alarms
entries dropped from log … 9-37
event log … 9-35
prior to … 9-37
Intrusion Log
prior to … 9-33, 9-34
IP
authorized IP managers … 10-1
reserved port numbers … 6-17
IP masks
building … 10-9
for multiple authorized manager
stations … 10-10
for single authorized manager station … 10-9
operation … 10-4
K
key chain
See KMS key chain.
key management system
See KMS.
KMS
Index – 1