
state … 12-62
authorized addresses
for IP management security … 14-3, 13-5
authorized IP managers
access levels … 14-3
building IP masks … 14-10
configuring … 14-6, 14-8, 14-5
definitions of single and multiple … 14-3
effect of duplicate IP addresses … 14-13
IP mask for multiple stations … 14-10, 14-4
operating notes … 14-13, 14-1
troubleshooting … 14-13
authorized server … 10-4
authorized server address, configuring … 10-8
authorized, option for authentication … 5-11,
7-20, 7-21, 12-26
autorun
autorun-key … 7-10
autorun-key …7-10
B
binding database … 10-11
BPDU filtering …1-9
BPDU protection …1-9
C
cert, RSA key …7-10
certificate
CA-signed … 8-3
root … 8-4
self-signed … 8-3
CHAP …5-11
chap-radius …5-11
cipher,SSH …7-17
Class of Service
See CoS.
Clear button
to delete password protection … 2-7
configuration
filters … 11-2
port security … 13-7
RADIUS
See RADIUS.
saving security credentials in multiple
files … 2-20
SSH
See SSH.
storage of security credentials
console
authorized IP managers, configuring … 14-5
CoS
configuring using RADIUS server … 6-4
non-default priority … 6-8
override … 6-4, 12-62
priority assignment … 5-4
RADIUS override … 6-7
viewing per-port config … 6-6
crypto
babble … 7-11
fingerprint … 7-11
D
DA, defined … 6-10, 9-11, 9-12
database, snooping … 10-4
debug logging
DHCP snooping … 10-12
default configuration and security …1-16
denial-of-service
avoid attacks using DHCP snooping … 10-3
monitoring system resources … 10-23
DES …8-3
DHCP Option 82
IP-to-MAC binding database … 10-19
DHCP protection
See DHCP snooping.
DHCP snooping … 10-3
authorized server … 10-4
binding database … 10-11
changing remote-id … 10-10, 10-8
database … 10-4, 10-3
DHCPACK … 10-4
disable MAC check … 10-10, 10-4
enabling … 10-4
debug logging … 10-12
on trusted ports … 10-7, 10-5, 10-6
IP-to-MAC binding database … 10-19
log messages … 10-13
Option 82 … 10-8
option parameter … 10-5
remote-id … 10-9
show configuration … 10-5
trust … 10-5
untrusted-policy … 10-9
4 – Index