verify … 10-5

documentation

feature matrix … -xx latest versions … -xix

printed in-box publications … -xix release notes … -xix

duplicate IP address

effect on authorized IP managers … 14-13

dynamic ARP protection

additional validation checks on ARP packets … 10-20

ARP packet debugging … 10-22 displaying ARP statistics … 10-21 enabling … 10-15

IP-to-MAC binding, adding to DHCP database … 10-19

trusted ports, configuring … 10-17 verifying configuration … 10-20

Dynamic Configuration Arbiter (DCA)

applying settings to non-authenticated clients … 1-19

hierarchy of precedence in authentication sessions … 1-20

overview … 1-18

E

Eavesdrop Protection 13-4encryption key

RADIUS … 2-12,2-16

TACACS … 2-12,2-15enhancing network security 6-13event log

alerts for monitored events … 10-24 intrusion alerts … 13-39

F

filetransfer, SSH 7-17filter, source-port

applicable models … 11-2 editing … 11-20

filter indexing … 11-22,11-9 idx … 11-9,11-22,11-9,11-22 named … 11-6

operating rules … 11-4,11-6port-trunk operation … 11-3,11-19 show … 11-9

value … 11-9

See also source port filters.

filters

effect of IGMP … 11-16 multicast … 11-15 overview … 11-2 protocol … 11-16

source port … 11-4,11-22,11-3 types … 11-3

Framed-IP-Address 5-36

G

guest VLAN 12-7,12-8,12-31

GVRP

dynamic VLANs … 12-73

effect on client authentication … 12-67,12-69 static VLAN not advertised … 12-70,12-74

H

hierarchy of precedence, used by DCA 1-19

I

IANA 9-62

IANA, protocol numbers 9-58,9-63

Identity Driven Manager

See IDM. IDM 6-9,6-30

authentication control features … 6-3 overview … 1-22

RADIUS-based security classifiers … 1-22See also RADIUS-assigned ACLs

RADIUS-assigned ACLs.

IGMP

effect on filters … 11-16

IP multicast address range … 11-16include credentials command 2-11

See also security credentials.

interface

unknown-vlans command … 12-74

intrusion alarms

entries dropped from log … 13-41,13-39 prior to … 13-41

Intrusion Log

prior to … 13-37,13-38

IP

Index – 5