VLAN use, multiple clients … 8-7

A

aaaauthentication … 4-8aaa port-access

See Web or MAC Authentication. access levels, authorized IP managers … 10-3accounting

See RADIUS. address

authorized for port security … 9-3authentication

See TACACS. authorized addresses

for IP management security … 10-4 for port security … 9-3

authorized IP managers access levels … 10-3 building IP masks … 10-9

configuring in browser interface … 10-7,10-9 configuring in console … 10-5

definitions of single and multiple … 10-4 effect of duplicate IP addresses … 10-12 IP mask for multiple stations … 10-10 IP mask for single station … 10-9

IP mask operation … 10-4 operating notes … 10-12 overview … 10-1

precedence over other security … 10-2 troubleshooting … 10-12

C

certificate CA-signed7-4 root … 7-4self-signed7-4

Clear button

to delete password protection … 2-5configuration

port security … 9-5

RADIUS

See RADIUS.

SSH

See SSH. connection inactivity time … 2-3

console, for configuring authorized IP managers … 10-5

D

DES … 6-3,7-3 disclaimer … 1-iiduplicate IP address

effect on authorized IP managers … 10-12

E

event log

intrusion alerts … 9-24

G

guest VLAN … 8-7,8-8

GVRP, static VLAN not advertised … 8-57

I

inconsistent value, message … 9-15intrusion alarms

entries dropped from log … 9-25 event log … 9-24

prior to … 9-25Intrusion Log

prior to … 9-21,9-23

IP

authorized IP managers … 10-1 reserved port numbers … 6-17

IP masks building … 10-9

for multiple authorized manager stations … 10-10

for single authorized manager station … 10-9 operation … 10-4

K

kill command … 6-11

L

LACP

802.1X not allowed … 8-13,8-17,8-58

2 – Index