
verify … 10-5
documentation
feature matrix … -xx
latest versions … -xix
printed in-box publications … -xix
release notes … -xix
duplicate IP address
effect on authorized IP managers … 14-13
dynamic ARP protection
additional validation checks on ARP
packets … 10-20
ARP packet debugging … 10-22
displaying ARP statistics … 10-21
enabling … 10-15
IP-to-MAC binding, adding to DHCP
database … 10-19
trusted ports, configuring … 10-17
verifying configuration … 10-20
Dynamic Configuration Arbiter (DCA)
applying settings to non-authenticated
clients … 1-19
hierarchy of precedence in authentication
sessions … 1-20
overview … 1-18
E
Eavesdrop Protection … 13-4
encryption key
RADIUS … 2-12, 2-16
TACACS … 2-12, 2-15
enhancing network security …6-13
event log
alerts for monitored events … 10-24
intrusion alerts … 13-39
F
filetransfer, SSH …7-17
filter, source-port
applicable models … 11-2
editing … 11-20
filter indexing … 11-22, 11-9
idx … 11-9, 11-22, 11-9, 11-22
named … 11-6
operating rules … 11-4, 11-6
port-trunk operation … 11-3, 11-19
show … 11-9
value … 11-9
See also source port filters.
filters
effect of IGMP … 11-16
multicast … 11-15
overview … 11-2
protocol … 11-16
source port … 11-4, 11-22, 11-3
types … 11-3
Framed-IP-Address …5-36
G
guest VLAN … 12-7, 12-8, 12-31
GVRP
dynamic VLANs … 12-73
effect on client authentication … 12-67, 12-69
static VLAN not advertised … 12-70, 12-74
H
hierarchy of precedence, used by DCA …1-19
I
IANA …9-62
IANA, protocol numbers … 9-58, 9-63
Identity Driven Manager
See IDM.
IDM … 6-9, 6-30
authentication control features … 6-3
overview … 1-22
RADIUS-based security classifiers … 1-22
See also RADIUS-assigned ACLs
RADIUS-assigned ACLs.
IGMP
effect on filters … 11-16
IP multicast address range … 11-16
include credentials command …2-11
See also security credentials.
interface
unknown-vlans command … 12-74
intrusion alarms
entries dropped from log … 13-41, 13-39
prior to … 13-41
Intrusion Log
prior to … 13-37, 13-38
IP
Index – 5