I
effect on client authentication … 12-68, 12-70
static VLAN not advertised … 12-71, 12-75
H
hierarchy of precedence, used by DCA …1-17
IANA …9-48
Identity Driven Manager
See IDM.
IDM … 6-9, 6-30, 9-5
authentication control features … 6-3
overview … 1-21
RADIUS-based security classifiers … 1-21
See also RADIUS-assigned ACLs
RADIUS-assigned ACLs.
include credentials command …2-11
See also security credentials.
interface
unknown-vlans command … 12-75
intrusion alarms
entries dropped from log … 13-40
event log … 13-38
prior to … 13-40
Intrusion Log
prior to … 13-36, 13-37
IP
address count … 10-33
authorized IP managers … 14-1
reserved port numbers … 7-19
IP attribute …5-48
IP masks
building … 14-10
for multiple authorized manager
stations … 14-11
for single authorized manager station … 14-10
operation … 14-4
IP routing
dynamic ARP protection, enabling … 10-16
validation checks on ARP packets,
configuring … 10-21
ip source-binding … 10-29
ip source-lockdown … 10-26, 10-27
ip source-lockdown bindings … 10-30, 10-31
IP spoofing
protection against … 10-24
IP-to-MAC binding … 10-20, 10-28
IPv4, ACL
vendor-specific attribute … 6-18
IPv6, ACL
vendor-specific attribute … 6-18
ip-version, ipv4or6 …7-17
L
LACP
802.1X not allowed … 12-14, 12-20, 12-76
login attempts, monitoring … 10-33
M
MAC address
count, monitoring … 10-33
inconsistent value … 13-22
moves, monitoring … 10-33
MAC authentication
authenticator operation … 3-6
blocked traffic … 3-3
CHAP
defined … 3-11
usage…3-3
client status … 3-62
concurrent with Web … 3-4
configuration commands … 3-51
configuring
on the switch … 3-50
switch for RADIUS access … 3-17
the RADIUS server … 3-17
general setup … 3-14
hierarchy of precedence in authentication
session … 1-18
LACP not allowed … 3-13
overview … 1-6
port access … 12-5
rules of operation … 3-12
show status and configuration … 3-55
terminology … 3-11
MAC Lockdown … 13-3
MAC Lockout … 13-3
manager password … 2-4, 2-6, 2-7
recommended … 4-7
saving to configuration file … 2-12
MD5
See RADIUS.
8 – Index