mask usage … 9-17
mask, ACL … 9-21
mask, CIDR … 9-39
mask, defined … 9-8
mask, multiple IP addresses … 9-31
mask, one IP address … 9-30
match, always … 9-38
match, criteria … 9-29
match, example … 9-30
match, ignored … 9-24
maximum allowed … 9-25
name string, maximum characters … 9-33, 9-40
number of entries … 9-11
offline creation … 9-64
operator, comparison … 9-47
outbound traffic, defined … 9-9
oversubscribing resources … 9-19
packet match, defining … 9-21
performance degraded … 9-12
permit, defined … 9-9
planning … 9-12, 9-17
policies … 9-17
policy application points … 9-5
prioritizing feature usage … 9-17
purpose … 9-5
recommended use … 9-4
replacing … 9-25
resource usage … 9-17
resource usage, help display … 9-19
resource use, example … 9-20
resource use, troubleshooting … 9-19
resource, display current use … 9-19
routed traffic … 9-26
rule and mask usage … 9-17
rules, configuration … 9-25
rules, operation … 9-25
SA, defined … 9-9
security use … 9-5, 9-23
security use, caution … 9-24
sequence, ACEs … 9-39
source routing, caution … 9-12, 9-33
standard ACL, resource use … 9-18
standard, defined … 9-9, 9-33
standard, example … 9-43
standard, structure … 9-35
standard, use … 9-10, 9-40
static VLAN requirement … 9-12, 9-25, 9-26
supernetting … 9-28
supersede implicit deny any … 9-37
switched packets … 9-15
syntax
See command syntax.
Syslog
See ACL logging.
TCP or UDP port number, IANA … 9-48
terms … 9-7
traffic types filtered … 9-5, 9-12
types, defined … 9-33
VLAN assignment … 9-13
VLANs … 9-25
where applied to traffic … 9-13, 9-26
wildcard … 9-29, 9-30
wildcard, defined … 9-9
ACL, standard numeric I.D. range …9-33
ACLs
See also RADIUS-assigned ACLs.
address
authorized for port security … 13-5
alerts
generating for monitored events … 10-34
ARP
adding IP-to-MAC binding … 10-20, 10-28
debugging … 10-23
displaying statistics … 10-22
dynamic ARP protection … 10-16
requests … 10-33
trusted ports … 10-18
validation checks on ARP packets,
configuring … 10-21
authentication
concurrent Web/MAC … 3-4
DCA-applied parameters to non-authenticated
client sessions … 1-18
display all 802.1X, Web, and MAC
configurations … 3-14
NIM override … 1-18
RADIUS override … 1-19, 6-6
RADIUS server groups … 5-21
authentication failures … 10-33
authentication session
client-specific configuration applied with
DCA … 1-17
authorized addresses
for IP management security … 14-4
for port security … 13-5
authorized IP managers
4 – Index