E

Eavesdrop Protection 11-4encryption key

RADIUS … 2-11,2-15

TACACS … 2-11,2-15

event log

alerts for monitored events … 8-34 intrusion alerts … 11-36

F

filetransfer, SSH 6-17filter, source-port

editing … 9-18

filter indexing … 9-19 filter type … 9-8

idx … 9-8,9-19 index … 9-8,9-19 named … 9-6 operating rules … 9-4,9-6

port-trunk operation … 9-2,9-17 show … 9-8

value … 9-8 viewing … 9-8

filtering MAC addresses 8-25filters

overview … 9-2 source port … 9-4

source-port filter value … 9-19 static … 9-2

types … 9-3Framed-IP-Address5-38

G

guest VLAN 10-7,10-8,10-29

GVRP

dynamic VLANs … 10-71

effect on client authentication … 10-65,10-67 static VLAN not advertised … 10-68,10-72

H

hierarchy of precedence, used by DCA 1-17

I

IDM

overview … 1-21

RADIUS-based security classifiers … 1-21include credentials command 2-11

See also security credentials.

interface

unknown-vlans command … 10-72

intrusion alarms

entries dropped from log … 11-38 event log … 11-36

prior to … 11-38

Intrusion Log

prior to … 11-34,11-35

IP

address count … 8-33 authorized IP managers … 12-1 reserved port numbers … 6-19

IP attribute 5-38

IP masks

building … 12-10

for multiple authorized manager stations … 12-11

for single authorized manager station … 12-10 operation … 12-4

IP routing

dynamic ARP protection, enabling … 8-16 validation checks on ARP packets,

configuring … 8-21ip source-binding8-29

ip source-lockdown 8-26,8-27

ip source-lockdown bindings 8-30,8-31

IP spoofing

protection against … 8-24IP-to-MAC binding 8-20,8-28ip-version, ipv4or6 6-17

L

LACP

802.1X not allowed … 10-13,10-19,10-73login attempts, monitoring 8-33

M

MAC address

count, monitoring … 8-33 inconsistent value … 11-20 moves, monitoring … 8-33

MAC authentication

6 – Index