I 
filter type … 9-8 
idx … 9-8, 9-21 
index … 9-8, 9-21 
operating rules … 9-4, 9-6 
port-trunk operation … 9-3, 9-18 
show … 9-8 
value … 9-8 
viewing … 9-8 
filters … 9-2 
effect of IGMP … 9-14 
multicast … 9-14 
protocol … 9-15 
source port … 9-4 
source-port filter value … 9-20 
static … 9-3 
types … 9-3 
G 
GVRP … 10-49 
GVRP, static VLAN not advertised … 10-52 
Identity-Driven management … 6-21 
IDM … 6-21 
IGMP 
effect on filters … 9-14 
IP multicast address range … 9-14 
inconsistent value, message … 11-19 
intrusion alarms 
entries dropped from log … 11-40 
event log … 11-38 
prior to … 11-40 
Intrusion Log 
prior to … 11-36, 11-37 
IP 
authorized IP managers … 12-1 
reserved port numbers … 7-17 
IP masks 
building … 12-9 
for multiple authorized manager  
stations … 12-10 
for single authorized manager station … 12-9 
operation … 12-4 
K 
key chain 
See KMS key chain. 
key management system
 See KMS. 
KMS 
accept key time … 13-5, 13-7 
assigning a time-dependent key … 13-5 
assigning a time-independent key … 13-4 
generating a key chain … 13-3 
generating a time-dependent key … 13-5 
generating a time-independent key … 13-4 
key chain … 13-2 
key chain entry … 13-3 
key chain generation … 13-3 
overview … 1-10, 13-2 
send key time … 13-5 
time protocol … 13-6 
time-dependent key … 13-2, 13-5, 13-6 
time-independent key … 13-2, 13-4 
L 
LACP 
802.1x not allowed … 10-12, 10-15, 10-53 
M 
MAC auth 
port access … 10-4 
MAC Authentication 
authenticator operation … 4-5 
blocked traffic … 4-4 
CHAP 
defined … 4-9 
usage … 4-4 
client status … 4-28 
configuration commands … 4-22 
configuring 
on the switch … 4-21 
switch for RADIUS access … 4-14 
the RADIUS server … 4-13 
features … 4-4 
general setup … 4-12 
LACP not allowed … 4-12 
rules of operation … 4-10 
show status and configuration … 4-26 
terminology … 4-9 
MAC Lockdown … 11-3 
MAC Lockout … 11-3 
Index – 3