address count … 10-23,14-1 reserved port numbers … 7-18

IP attribute 5-36

IP masks

building … 14-10

for multiple authorized manager stations … 14-10

operation … 14-4

IP routing

dynamic ARP protection, enabling … 10-15 validation checks on ARP packets,

configuring … 10-20IP-to-MAC binding 10-19

IPv4, ACL

vendor-specific attribute … 6-18

IPv6, ACL

vendor-specific attribute … 6-18

K

key chain

See KMS key chain.

key management system

See KMS.

KMS

accept key time … 15-5,15-7,15-5,15-4 generating a key chain … 15-3,15-5,15-4 key chain … 15-2,15-3

overview … 15-2 send key time … 15-5

time protocol … 15-6,15-2,15-5,15-6,15-2,15-4

defined … 3-10 usage … 3-2

client status … 3-42,3-3,3-33 on the switch … 3-32

switch for RADIUS access … 3-16 the RADIUS server … 3-15

general setup … 3-13

hierarchy of precedence in authentication session … 1-19

LACP not allowed … 3-12 overview … 1-6

port access … 12-4

rules of operation … 3-11

show status and configuration … 3-36 terminology … 3-10

MAC Lockdown 13-3

MAC Lockout 13-3

manager password 2-4,2-6,2-7 recommended … 4-7

saving to configuration file … 2-12

MD5

See RADIUS.

message

inconsistent value … 13-20

MIB

SNMP access … 1-16

MSCHAPv2 5-11

multicast address, spanning tree protocol 11-16

multicast filter 11-3,11-15multicast MAC address, STP

L

LACP

802.1X not allowed … 12-13,12-20,12-75login attempts, monitoring 10-23

M

MAC address

count, monitoring … 10-23 inconsistent value … 13-20 moves, monitoring … 10-23

MAC authentication

authenticator operation … 3-5 blocked traffic … 3-2

CHAP

N

named source port filters

configuring … 11-7 displaying … 11-9 operating rules … 11-6See also source port filters.

NAS 6-10

Network Immunity Manager (NIM)

hierarchy of precedence in authentication session … 1-19

overview … 1-19

network management applications 6-3

6 – Index