E
Eavesdrop Protection … 10-4
encryption key
RADIUS … 2-12, 2-16
TACACS … 2-12, 2-15
event log
intrusion alerts … 10-38
F
filter, source-port
applicable models … 8-2
editing … 8-20
filter indexing … 8-22
filter type … 8-9
idx … 8-9, 8-22
index … 8-9, 8-22
operating rules … 8-4, 8-6
port-trunk operation … 8-3, 8-19
show … 8-9
value … 8-9
viewing … 8-9
filters … 8-2
effect of IGMP … 8-16
multicast … 8-15
protocol … 8-16
source port … 8-4
source-port filter value … 8-22
static…8-3
types … 8-3
front-panel access … 1-6
G
guest VLAN … 9-8, 9-9, 9-30
GVRP … 9-64, 9-66
GVRP dynamic VLANs … 9-70
GVRP, static VLAN not advertised … 9-67, 9-71
H
hierarchy of precedence, used by DCA … 1-12
IDM … 1-11
IGMP
effect on filters … 8-16
IP multicast address range … 8-16
include credentials
See security credentials … 2-11
inconsistent value, message … 10-19
interface
unknown-vlans command … 9-71
intrusion alarms
entries dropped from log … 10-40
event log … 10-38
prior to … 10-40
Intrusion Log
prior to … 10-36, 10-37
IP
authorized IP managers … 11-1
reserved port numbers … 6-17
IP masks
building … 11-10
for multiple authorized manager
stations … 11-11
for single authorized manager station … 11-10
operation … 11-4
K
key chain
See KMS key chain.
key management system
See KMS.
KMS
accept key time … 12-5, 12-7
assigning a time-dependent key … 12-5
assigning a time-independent key … 12-4
generating a key chain … 12-3
generating a time-dependent key … 12-5
generating a time-independent key … 12-4
key chain … 12-2
key chain entry … 12-3
key chain generation … 12-3
overview … 1-11, 12-2
send key time … 12-5
time protocol … 12-6
time-dependent key … 12-2, 12-5, 12-6
time-independent key … 12-2, 12-4
L
LACP
802.1X not allowed … 9-14, 9-20, 9-73
4 – Index
I