state … 12-62

authorized addresses

for IP management security … 14-3,13-5

authorized IP managers

access levels … 14-3 building IP masks … 14-10 configuring … 14-6,14-8,14-5 definitions of single and multiple … 14-3 effect of duplicate IP addresses … 14-13

IP mask for multiple stations … 14-10,14-4 operating notes … 14-13,14-1 troubleshooting … 14-13

authorized server 10-4

authorized server address, configuring 10-8authorized, option for authentication 5-11,

7-20,7-21,12-26

autorun

autorun-key7-10autorun-key7-10

B

binding database 10-11BPDU filtering 1-9BPDU protection 1-9

C

cert, RSA key 7-10certificate

CA-signed8-3 root … 8-4self-signed8-3

CHAP 5-11chap-radius5-11cipher,SSH 7-17

Class of Service

See CoS.

Clear button

to delete password protection … 2-7

configuration

filters … 11-2

port security … 13-7

RADIUS

See RADIUS.

saving security credentials in multiple files … 2-20

SSH

See SSH.

storage of security credentials

console

authorized IP managers, configuring … 14-5

CoS

configuring using RADIUS server … 6-4non-default priority … 6-8

override … 6-4,12-62 priority assignment … 5-4 RADIUS override … 6-7 viewing per-port config … 6-6

crypto

babble … 7-11 fingerprint … 7-11

D

DA, defined 6-10,9-11,9-12database, snooping 10-4debug logging

DHCP snooping … 10-12

default configuration and security 1-16denial-of-service

avoid attacks using DHCP snooping … 10-3 monitoring system resources … 10-23

DES 8-3

DHCP Option 82

IP-to-MAC binding database … 10-19

DHCP protection

See DHCP snooping. DHCP snooping 10-3

authorized server … 10-4 binding database … 10-11 changing remote-id10-10,10-8 database … 10-4,10-3 DHCPACK … 10-4

disable MAC check … 10-10,10-4 enabling … 10-4

debug logging … 10-12

on trusted ports … 10-7,10-5,10-6IP-to-MAC binding database … 10-19 log messages … 10-13

Option 82 … 10-8 option parameter … 10-5remote-id10-9

show configuration … 10-5 trust … 10-5untrusted-policy10-9

4 – Index