505
802.1X MAC-based access control, 72
802.1X port-based access control, 72
AAA for MPLS L3VPNs, 13
AAA HWTACACS, 6
AAA LDAP, 9
AAA on device, 11
AAA RADIUS, 2
security ACL-based IPsec, 262, 264
security application-based IPsec, 263
security IPsec, 262
importing
peer host public key from file, 220
PKI certificate import/export, 248
public key from file, 223
SSH client host public key, 335
troubleshooting PKI CA certificate import
failure, 256
troubleshooting PKI local certificate import
failure, 257
initiating
802.1X authentication, 67, 68
interface
security portal authentication Web server
reference, 132
Internet
SSL configuration, 393, 394
Internet Key Exchange. Use IKE
intrusion detection/protection
port security blockmac mode, 191
port security disableport mode, 191
port security disableport-temporarily mode,
191
port security feature, 185
IP
security. Use IPsec
uRPF configuration, 442
uRPF enable, 441
IP addressing
AAA HWTACACS outgoing packet source IP
address, 37
AAA LDAP server IP address, 40
AAA RADIUS outgoing packet source IP
address, 29
AAA RADIUS security policy server IP
address, 32
ARP attack detection configuration
(user+packet validity check), 423
ARP attack detection ip validity check, 421
ARP attack detection restricted forwarding
configuration, 424
ARP attack protection (unresolvable IP
attack), 411, 413
ARP attack protection configuration, 411
ARP filtering configuration, 429
ARP gateway protection, 428
authorized ARP configuration (DHCP relay
agent), 419
authorized ARP configuration (DHCP server), 418
MFF server IP address, 434
SSH Secure Telnet packet source IP address,
338
SSH SFTP packet source IP address, 342
uRPF configuration, 438
IP source guard
IPv4. See IPv4 source guard
IPv6. See IPv6 source guard
IP source guard (IPSG)
configuration, 400, 401, 405
display, 405
dynamic binding, 401
maintain, 405
static binding, 400
IPoE
security user profile configuration, 454
IPsec
ACL configuration, 265
ACL de-encapsulated packet check, 273
ACL IPsec anti-replay, 274
ACL rule keywords, 265
ACL-based implementation, 264
ACL-based IPsec, 262
application-based IPsec, 263
authentication, 262
authentication algorithms, 262
configuration, 259, 280
configuration restrictions, 267
displaying, 280
encapsulation modes, 260
encryption, 262
encryption algorithms, 262
FIPS compliance, 263
IKE (main mode/pre-shared key authentication),
301
IKE configuration, 290, 292, 301
IKE DPD, 298
IKE global identity information, 297
IKE identity authentication, 291
IKE invalid SPI recovery, 299
IKE keepalive, 298
IKE keychain, 296
IKE NAT keepalive, 298
IKE negotiation, 290
IKE negotiation mode, 261