Index

Contents

8 - A - C - D - E - F - G - I - L - M - N - P - R - S - T - U - V

Index

8

802.1X
authenticator PAEs 1
configuration process 1
configuring 1
configuring AAA accounting methods 1
configuring AAA authentication methods 1
configuring on member ports 1
controlling on interfaces 1
default settings 1
description 1
disabling authentication 1
disabling feature 1
enabling feature 1
enabling MAC authentication bypass 1
enabling mulitple hosts mode 1
enabling periodic reauthentication on interfaces 1
enabling single host mode 1
example configuration 1
guidelines 1
licensing requirements 1
limitations 1
MAC authenication bypass 1
monitoring 1
multiple host support 1
prerequisites 1
setting interface maximum retransmission retry count 1
single host support 1
supported topologies 1
verifying configuration 1
802.1X authentication
authorization states for ports 1
changing timers on interfaces 1
enabling RADIUS accounting 1
initiation 1
manually initializing 1
802.1X reauthentication
setting maximum retry count on interfaces 1
802.1X supplicants
manually reauthenticating 1

A

AAA
accounting 1
authentication 1
benefits 1
configuring authentication methods for 802.1X 1
configuring console login 1
configuring for Cisco TrustSec 1
configuring for RADIUS servers 1
configuring seed device for Cisco TrustSec 1
default settings 1
description 1
enabling MSCHAP authentication 1
example configuration 1
prerequisites 1
user login process 1
verifying configurations 1
AAA accounting
configuring default methods 1
configuring methods for 802.1X 1
AAA accounting logs
clearing 1
displaying 1
AAA authorization
configuring on TACACS+ servers 1
AAA logins
enabling authentication failure messages 1
AAA protocols
RADIUS 1
TACACS+ 1
AAA server groups
description 1
AAA servers
specifying SNMPv3 parameters 1 2
specifying user roles 1
specifying user roles in VSAs 1
AAA services
configuration options 1
remote 1
accounting
description 1
ACL
processing order 1
sequence numbers 1
ACL implicit rules 1
ACLs
applications 1
creating log entries for 1
guidelines 1
identifying traffic by protocols 1
licensing 1
limitations 1
prerequisites 1
types 1
VLAN 1
authentication
802.1X 1
description 1
local 1
methods 1
remote 1
user login 1
authenticator PAEs
creating on an interface 1
description 1
removing from an interface 1
authorization
user login 1
verifying commands 1

C

Cisco
vendor ID 1 2
Cisco TrustSec 1
architecture 1
configuring 1
configuring AAA on seed device 1
configuring device credentials 1
configuring pause frame encryption and decryption on interfaces 1
default values 1
description 1
enabling 1
enabling (example) 1
environment data download 1
example configurations 1
guidelines 1
licensing 1
limitations 1
manually configuring SXP 1
prerequisites 1
SGACLs 1 2
SGTs 1
verifying configuration 1
Cisco TrustSec authentication
configuring 1
configuring in manual mode 1
description 1
manual mode configuration examples 1
Cisco TrustSec authorization
configuring 1
Cisco TrustSec device credentials
description 1
Cisco TrustSec device identities
description 1
Cisco TrustSec environment data
download 1
Cisco TrustSec policies
example enforcement configuration 1
Cisco TrustSec seed devices
description 1 2
example configuration 1
Cisco TrustSec user credentials
description 1
cisco-av-pair
specifying AAA user parameters 1 2
class maps
CoPP 1
clearing statistics
CoPP 1
commands
disabing authorization verification 1
enabing authorization verification 1
configuration status
CoPP 1
control plane
policies
applying 1
control plane class maps
verifying the configuration 1
control plane policy maps
verifying the configuration 1
control plane protection
CoPP 1
packet types 1
control plane protection, classification 1
control plane protection, CoPP
rate controlling mechanisms 1
CoPP 1
class maps 1
clearing statistics 1
configuration status 1
control plane protection 1
control plane protection, classification 1
default settings 1
feature history 1
guidelines 1
information about 1
licensing 1
limitations 1
monitoring 1
policy templates 1
restrictions for management interfaces 1
verifying the configuration 1
CoPP policies
applying 1
customized 1
default 1
scaled Layer 2 1
scaled Layer 3 1
CoPP policy
customized
modifying 1
CTS 1
See Cisco TrustSec 1
customized CoPP policy 1
modifying 1

D

DAI
default settings 1
guidelines 1
limitations 1
deafult settings
port security 1
default CoPP policy 1
default settings
802.1X 1
AAA 1
CoPP 1
DAI 1
IP Source Guard 1
device roles
description for 802.1X 1
DHCP binding database 1
See DHCP snooping binding database 1
DHCP Option 82
description 1
DHCP relay agent
enabling or disabling 1
enabling or disabling Option 82 1
enabling or disabling subnet broadcast support on a Layer 3 Interface 1
enabling or disabling VRF support 1
VRF support 1
DHCP relay binding database
description 1
DHCP snooping
binding database 1
default settings 1
description 1
guidelines 1
in a vPC environment 1
limitations 1
message exchange process 1
Option 82 1
overview 1
DHCP snooping binding database 1
described 1
description 1
entries 1
See DHCP snooping binding database 1
dynamic ARP inspection
ARP cache poisoning 1
ARP requests 1
ARP spoofing attack 1
DHCP snooping binding database 1
function of 1
interface trust states 1
logging of dropped packets 1
network security issues and interface trust states 1
Dynamic Host Configuration Protocol snooping 1
See DHCP snooping 1

E

examples
AAA configurations 1

F

feature history
CoPP 1

G

guidelines
ACLs 1
CoPP 1
DAI 1
DHCP snooping 1
port security 1

I

IDs
Cisco vendor ID 1 2
IP ACL implicit rules 1
IP ACL statistics
clearing 1
monitoring 1
IP ACLs
applications 1
applying as a Router ACL 1
applying as port ACLs 1
changing 1
changing sequence numbers in 1
description 1
logical operation units 1
logical operators 1
removing 1
types 1
IP Source Guard
default settings 1

L

licensing
802.1X 1
ACLs 1
Cisco TrustSec 1
CoPP 1
limitations
ACLs 1
CoPP 1
DAI 1
DHCP snooping 1
port security 1
logging
creating ACL for 1
logical operation units
IP ACLs 1
logical operators
***
IP ACLs 1
login
RADIUS servers 1
LOU 1
See logical operation units 1

M

MAC ACL implicit rules 1
MAC ACLs
ACLs
MAC
creating 1
MAC addresses
learning 1
MAC authentication
bypass for 802.1X 1
enabling bypass in 802.1X 1
management interfaces
CoPP restrictions 1
monitoring
CoPP 1
RADIUS 1
RADIUS servers 1
MSCHAP
enabling authentication 1

N

new in this release 1

P

policy templates
description 1
port ACL 1
port security
default settings 1
guidelines 1
limitations 1
MAC address learning 1
MAC move 1
violations 1
ports
authorization states for 802.1X 1
preshared keys
TACACS+ 1
privilege level support for TACACS+ authorization
configuring 1
privilege roles
permitting or denying commands for 1

R

RADIUS
configuring servers 1
configuring timeout intervals 1
configuring transmission retry counts 1
default settings 1
description 1
example configurations 1
monitoring 1
network environments 1
operations 1
prerequisites 1
statistics, displaying 1
RADIUS accounting
enabling for 802.1X authentication 1
RADIUS server groups
global source interfaces 1
RADIUS server preshared keys 1
RADIUS servers
allowing users to specify at login 1
configuring AAA for 1
configuring timeout interval 1
configuring transmission retry count 1
deleting hosts 1
displaying statistics 1
example configurations 1
manually monitoring 1
RADIUS statistics
clearing 1
RADIUS, global preshared keys 1
RADIUS, periodic server monitoring 1
RADIUS, server hosts
configuring 1
rate controlling mechanisms
control plane protection, CoPP 1
RBACL
clearing statistics 1
displaying statistics 1
enabling statistics 1
RBACL logging
enabling 1
remote devices
connecting to using SSH 1
router ACLs 1
rules
implicit 1

S

scaled Layer 2 CoPP policy 1
scaled Layer 3 CoPP policy 1
secure MAC addresses
learning 1
security
policies
applying 1
port
MAC address learning 1
security group access lists 1
See SGACLs 1
security group tag 1
See SGT 1
server groups 1
servers
RADIUS 1
SGACL policies
clearing 1
displaying downloaded policies 1
manually configuring 1
SGACL policy enforcement
enabling on VLANs 1
SGACLs
configuring 1
description 1
example manual configuration 1
example SGT mapping configuration 1 2
SGACLs policies
refreshing downloaded policies 1
SGT Exchange Protocol 1
See SXP 1
SGTs
description 1
example mapping configuration 1 2
manually configuring 1
manually configuring address-to-SGACL mapping 1 2
propagation with SXP 1
SNMPv3
specifying AAA parameters 1
specifying parameters for AAA servers 1
source interfaces
RADIUS server groups 1
TACACS+ server groups 1
SSH
description 1
SSH clients 1
SSH server keys 1
SSH servers 1
SSH sessions
clearing 1
connecting to remote devices 1
statistics
clearing 1
for RBACL 1
monitoring 1
TACACS+ 1
SXP
changing retry periods 1
configuration process 1
configuring default passwords 1
configuring default source IP addresses 1
configuring manually 1
configuring peer connections 1
enabling 1
SGT propagation 1
SXP connections
example manual configuration 1

T

TACACS+
advantages over RADIUS 1
configuring 1
configuring global timeout interval 1
description 1 2
displaying statistics 1
example configurations 1
field descriptions 1
global preshared keys 1
limitations 1
prerequisites 1
preshared key 1
user login operation 1
verifying command authorization 1
verifying configuration 1
TACACS+ command authorization
configuring 1
testing 1
TACACS+ server groups
global source interfaces 1
TACACS+ servers
configuring hosts 1
configuring TCP ports 1
configuring timeout interval 1
displaying statistics 1
field descriptions 1
manually monitoring 1
verifying configuration 1
TCP ports
TACACS+ servers 1
Telnet
description 1
Telnet server
enabling 1
reenabling 1
Telnet servers 1
Telnet sessions
clearing 1
connecting to remote devices 1

U

user login
authentication process 1
authorization process 1
user roles
specifying on AAA servers 1 2

V

vendor-specific attributes 1
VLAN ACLs
information about 1
vPCs
and DHCP snooping 1
VSAs
format 1
protocol options 1
support description 1