unauthorized-client, caution … 12-40
unauthorized-client, on different
ports … 12-42
untagged … 12-33, 12-36, 12-37
untagged membership … 12-21
VLAN operation … 12-68
VLAN use, multiple clients … 12-8
VLAN, assignment conflict … 5-43, 12-13
VLAN, membership priority … 12-11, 12-33
VLAN, priority, RADIUS … 12-37
VLAN, tagged membership … 12-37
Wake-on-LAN traffic … 12-28
Web/MAC auth effect … 12-14
A
aaa
gvrp-vlans … 12-74, 12-75
port-access gvrp-vlans … 12-74, 12-75
aaa authentication …4-8
authorized … 12-25
chap-radius … 5-11
peap-mschapv2 … 5-11
privilege-mode … 4-11
privilege-mode defined … 4-12
web browser … 5-11
aaa port-access
See Web or MAC authentication.
AC
CIDR, mask … 9-42
access
methods, determining … 5-7
access levels
authorized IP managers … 14-3
accounting
See RADIUS.
ACL
ACE sequence … 9-39
ACE, after match not used … 9-37
ACE, defined … 9-7
ACE, duplicates … 9-39
ACE, limit … 9-25
ACE, order in list
See sequence, ACEs.
ACL ID, defined … 9-8
ACL log message
See ACL, logging.
ACL mask … 9-21
ACL, defined … 9-7
application planning … 9-17
application, recommended … 9-4
applied to open connection … 9-72
assign to VLAN … 9-38
basic structure … 9-34
broadcasts, effect on … 9-72
CIDR, mask … 9-39
command summary … 9-6
command syntax … 9-41
configuration planning … 9-12
configured but not used … 9-38
configured, not used … 9-38
configuring offline … 9-11
copy operation appends … 9-65
create, CLI method … 9-39
DA, defined … 9-8, 9-9
definitions … 9-7
deny any, implicit … 9-11, 9-13, 9-14, 9-16, 9-23,
9-24, 9-25, 9-34, 9-37, 9-38
deny any, implicit, supersede … 9-34
deny any, implicit, switched packets … 9-15
deny any, rule use … 9-18
deny, defined … 9-8
editing … 9-39
end … 9-38
exit statement … 9-38
extended ACL, resource use … 9-18
extended, defined … 9-8, 9-33
extended, numeric I.D. range … 9-33
extended, structure … 9-35
extended, use … 9-10
filtering criteria … 9-10
filtering process … 9-14, 9-15, 9-24
host option … 9-30
i.d. range, 1-99 … 9-40
implicit deny
See deny any, implicit.
implicit deny, defined … 9-8
inbound traffic, defined … 9-9
logging … 9-11, 9-12
logging described … 9-68
logging, ACLs … 9-42
logging, performance impact … 9-12
logging, session … 9-11
managing resource use … 9-19
mask … 9-11, 9-28
mask bit overlap … 9-21
Index – 3