I
filter type … 9-8
idx … 9-8, 9-21
index … 9-8, 9-21
operating rules … 9-4, 9-6
port-trunk operation … 9-3, 9-18
show … 9-8
value … 9-8
viewing … 9-8
filters … 9-2
effect of IGMP … 9-14
multicast … 9-14
protocol … 9-15
source port … 9-4
source-port filter value … 9-20
static … 9-3
types … 9-3
G
GVRP … 10-49
GVRP, static VLAN not advertised … 10-52
Identity-Driven management … 6-21
IDM … 6-21
IGMP
effect on filters … 9-14
IP multicast address range … 9-14
inconsistent value, message … 11-19
intrusion alarms
entries dropped from log … 11-40
event log … 11-38
prior to … 11-40
Intrusion Log
prior to … 11-36, 11-37
IP
authorized IP managers … 12-1
reserved port numbers … 7-17
IP masks
building … 12-9
for multiple authorized manager
stations … 12-10
for single authorized manager station … 12-9
operation … 12-4
K
key chain
See KMS key chain.
key management system
See KMS.
KMS
accept key time … 13-5, 13-7
assigning a time-dependent key … 13-5
assigning a time-independent key … 13-4
generating a key chain … 13-3
generating a time-dependent key … 13-5
generating a time-independent key … 13-4
key chain … 13-2
key chain entry … 13-3
key chain generation … 13-3
overview … 1-10, 13-2
send key time … 13-5
time protocol … 13-6
time-dependent key … 13-2, 13-5, 13-6
time-independent key … 13-2, 13-4
L
LACP
802.1x not allowed … 10-12, 10-15, 10-53
M
MAC auth
port access … 10-4
MAC Authentication
authenticator operation … 4-5
blocked traffic … 4-4
CHAP
defined … 4-9
usage … 4-4
client status … 4-28
configuration commands … 4-22
configuring
on the switch … 4-21
switch for RADIUS access … 4-14
the RADIUS server … 4-13
features … 4-4
general setup … 4-12
LACP not allowed … 4-12
rules of operation … 4-10
show status and configuration … 4-26
terminology … 4-9
MAC Lockdown … 11-3
MAC Lockout … 11-3
Index – 3