Product guide

6 – Index
ACL, connection-rate
See connection-rate filtering
ACLs
management access protection … 1-8
See also RADIUS-assigned ACLs.
address
authorized for port security … 14-5
alerts
generating for monitored events … 11-23
ARP
adding IP-to-MAC binding … 11-18
debugging … 11-21
displaying statistics … 11-21
dynamic ARP protection … 11-15
requests … 11-22
trusted ports … 11-17
validation checks on ARP packets,
configuring … 11-19
authentication failures … 11-23
authentication, RADIUS override … 7-4
authenticator
backend state … 13-51
state … 13-51
authorized addresses
for IP management security … 15-4
for port security … 14-5
authorized IP managers
access levels … 15-3
building IP masks … 15-9
configuring in browser interface … 15-7, 15-9
configuring in console … 15-5
definitions of single and multiple … 15-4
effect of duplicate IP addresses … 15-12
IP mask for multiple stations … 15-10
IP mask for single station … 15-9
IP mask operation … 15-4
operating notes … 15-12
overview … 15-1
troubleshooting … 15-12
authorized server … 11-4
authorized server address, configuring … 11-8
B
binding database … 11-11
BPDU filtering … 1-12
BPDU protection … 1-12
broadcast traffic
effect of ACL … 10-113
C
certificate
CA-signed … 9-3
root … 9-4
self-signed … 9-3
Class of Service … 7-3, 7-5, 7-6
RADIUS … 7-4
Clear button … 1-6
to delete password protection … 2-6
configuration
filters … 12-2
port security … 14-7
RADIUS
See RADIUS.
SSH
See SSH.
connection-rate ACL … 3-6
connection-rate filtering … 3-31
access-control list … 3-6
ACL
ACE mask … 3-26
application to port … 3-21
applying … 3-26
CIDR notation … 3-26
configuring … 3-19
example … 3-27, 3-28
filter … 3-20, 3-22, 3-23, 3-30
ignore … 3-20, 3-22, 3-23, 3-29
implicit filter … 3-20, 3-30
operation … 3-20
source IP … 3-21
UDP/TCP … 3-23
UDP/TCP options … 3-24
UDP/TCP port data … 3-25
VLAN effect … 3-20
activation … 3-4, 3-7
benefits … 3-4
block … 3-12
blocked host … 3-5, 3-7, 3-18
blocked host, re-enable … 3-5, 3-9
configuration, example … 3-14
configuring per-port … 3-12
edge of network … 3-3
enabling, commands … 3-11
event log notice … 3-5