untagged membership … 9-21
VLAN operation … 9-64
VLAN use, multiple clients … 9-8
VLAN, assignment conflict … 5-31, 9-13
VLAN, membership priority … 9-11, 9-31
VLAN, priority, RADIUS … 9-35
VLAN, tagged membership … 9-35
Wake-on-LAN traffic … 9-28
Web/MAC Auth effect … 9-72
A
aaa
gvrp-vlans … 9-70, 9-71
port-access gvrp-vlans … 9-70, 9-71
aaa authentication … 4-8
authorized … 9-25
chap-radius … 5-11
peap-mschapv2 … 5-11
privilege-mode … 4-11
privilege-mode defined … 4-11
web browser … 5-11
aaa port-access
See Web or MAC Authentication.
access levels, authorized IP managers … 11-3
accounting
See RADIUS.
address
authorized for port security … 10-5
authentication
DCA-applied parameters to non-authenticated
client sessions … 1-12
display all 802.1X, Web, and MAC
configurations … 3-14
RADIUS override … 1-14
authentication session
client-specific configuration applied with
DCA … 1-12
authentication, NIM override … 1-13
authorized … 5-11, 9-25
authorized addresses
for IP management security … 11-4
for port security … 10-5
authorized IP managers
access levels … 11-3
building IP masks … 11-10
configuring in browser interface … 11-7, 11-9
configuring in console … 11-5
definitions of single and multiple … 11-4
effect of duplicate IP addresses … 11-13
IP mask for multiple stations … 11-11
IP mask for single station … 11-10
IP mask operation … 11-4
operating notes … 11-13
overview … 11-1
troubleshooting … 11-13
C
certificate
CA-signed … 7-3
root … 7-4
self-signed … 7-3
CHAP … 5-11
chap-radius … 5-11
Clear button … 1-6
to delete password protection … 2-7
configuration
filters … 8-2
port security … 10-7
RADIUS
See RADIUS.
saving security credentials in multiple
files … 2-20
SSH
See SSH.
storage of security credentials … 2-11
console, for configuring
authorized IP managers … 11-5
CoS
priority assignment … 5-4
CoS override … 9-61
D
default configuration and security … 1-4
DES … 6-3, 7-3
duplicate IP address
effect on authorized IP managers … 11-13
Dynamic Configuration Arbiter (DCA)
applying settings to non-authenticated
clients … 1-12
hierarchy of precedence in authentication
sessions … 1-14
overview … 1-12
Index – 3