Security Configuration Guide, Cisco DCNM for LAN, Release 5.x
Index
Downloads: The complete bookPDF (PDF - 4.35MB) | Feedback

Contents

8 - A - B - C - D - F - G - I - K - L - M - N - O - P - R - S - T - U - V -

Index

8

802.1X
configuration process 1
configuring 2
configuring AAA accounting methods 3
controlling on interfaces 4
description 1 2
disabling authenticaiton 6
disabling feature 7
enabling global periodic reauthentication 8
enabling MAC address authentication bypass 9
enabling mulitple hosts mode 10
enabling on interfaces 11
enabling periodic reauthentication on interfaces 12
enabling service 13
enabling single host mode 14
field descriptions 15
licensing requirements 16
MAC authenication bypass 17
multiple host support 18
platform support 19
prerequisites 20
setting global maximum retransmission retry count 21
setting interface maximum retransmission retry count 22
single host support 23
supported topologies 24
802.1X authentication
authorization states for ports 1
changing global timers 2
changing timers on interfaces 3
enabling RADIUS accounting 4
initiation 5
802.1X reauthentication
setting maximum retry count on interfaces 1
802.1X statistics
displaying 1

A

AAA
accounting 1
authentication 2
authorization 3
benefits 4
configuring 5
description 1 2
enabling or disabling MSCHAP authentication 7
enabling or disabling MSCHAP V2 authentication 8
field descriptions 9
licensing requirements 10
monitoring TACACS+ servers 11
platform support 12
prerequisites 13
user login process 14
AAA accounting
adding rule methods 1
changing rule methods 2
configuring methods for 802.1X 3
deleting rule methods 4
rearranging rule methods 5
AAA authentication
adding a rule method 1
changing rule methods 2
deleting rule methods 3
enabling or disabling 4
enabling or disabling default user roles 5
enabling or disabling login authentication failure messages 6
rearranging rule methods 7
AAA protocols
RADIUS 1
TACACS+ 2
AAA server groups
description 1
AAA servers
FreeRADIUS VSA format 1
specifying SNMPv3 parameters 1 2
specifying user roles 3
AAA services
configuration options 1
remote 2
security 3
AAAservers
specifying user roles in VSAs 1
access control lists
description 1
order of application 2
See also ARP ACLs 3
See also IP ACLs 4
See also MAC ACLs 5
See also policy-based ACLs 6
See also port ACLs 7
See also router ACLs 8
See also VLAN ACLs 9
types of 10
accounting
description 1
ARP ACLs
description 1
platform support 2
priority of ARP ACLs and DHCP snooping entries 3
ARP inspection
See dynamic ARP inspection 1
authentication
802.1X 1
description 2
methods 3
user logins 4
authentication, authorization, and accounting
See AAA 1
authorization
description 1
user logins 2

B

broadcast storms.
See traffic storm control 1

C

CFS
TACACS+ support 1
changed information
description 1
Cisco
vendor ID 1 2
cisco-av-pair
specifying AAA user parameters 1 2

D

DAI
description 1
platform support 2
device roles
description for 802.1X 1
DHCP
description 1
platform support 2
DHCP binding database
See DHCP snooping binding database 1
DHCP Option 82
description 1
DHCP snooping
binding database 1
description 2
message exchange process 3
Option 82 4
overview 5
DHCP snooping binding database
described 1
description 2
entries 3
See DHCP snooping binding database 4
documentation
additional publications 1
dynamic ARP inspection
ARP cache poisoning 1
ARP requests 2
ARP spoofing attack 3
description 4
DHCP snooping binding database 5
function of 6
interface trust states 7
logging of dropped packets 8
network security issues and interface trust states 9
priority of ARP ACLs and DHCP snooping entries 10
Dynamic Host Configuration Protocol
See DHCP 1

F

field descriptions
802.1X 1
AAA 2
Security Audit Wizard 3
TACACS+ 4
fields descriptions
RADIUS 1
FreeRADIUS
VSA format for role attributes 1 2

G

global source interface
configuring for RADIUS server groups 1
configuring for TACACS+ server groups 2

I

IDs
Cisco vendor ID 1 2
interface policies
changing in user roles 1
IP ACLs
configuring 1
description 1 2
licensing 3
platform support 4
IP source guard
platform support 1
IP Source Guard
description 1 2

K

key chain
end-time 1
lifetime 2
start-time 3
keychain management
description 1 2
platform support 2
keys
TACACS+ 1

L

Layer 2 security
configuring using the Security Audit Wizard 1
licensing
802.1X 1
AAA 2
IP ACLs 3
RADIUS 4
roles 5
Security Audit Wizard 6
TACACS+ 7
traffic storm control 8
user accounts 9
login authentication failure messages
enabling or disabling 1

M

MAC ACLs
description 1 2
platform support 2
MAC addresses
enabling authentication bypass in 802.1X 1
MAC authentication
bypass for 802.1X 1
MSCHAP
enabling or disabling authentication 1
MSCHAP V2
enabling or disabling authentication 1
multicast storms.
See traffic storm control 1

N

network-admin user role
description 1
network-operator user role
description 1
new information
description 1

O

object groups
configuring 1

P

passwords
changing for user accounts 1
strong characteristics 2
port ACLs
definition 1
port security
description 1 2
MAC move 2
platform support 3
violations 4
ports
authorization states for 802.1X 1

R

RADIUS
configuring dead-time intervals 1
configuring global transmission retry count 2
configuring global transmission timeout interval 3
configuring servers 4
description 1 2
field descriptions 6
licensing 7
network environments 8
operation 9
platform support 10
prerequisites 11
process for configuring 12
VSAs 13
RADIUS accounting
enabling for 802.1X authentication 1
RADIUS server group
configuring a source interface 1
RADIUS server groups
adding 1
adding server hosts 2
configuring the global source interface 3
deleting 4
RADIUS server hosts
copying 1
RADIUS servers
adding 1
adding to server groups 2
allowing specifying at login 3
configuring accounting attributes 4
configuring authentication attributes 5
configuring global keys 6
configuring periodic monitoring 7
configuring transminssion timeout intervals 8
configuring transmission retry counts 9
deleting 10
displaying statistics 11
monitoring 12
RBAC
description 1 2
field descriptions 2
related documents 1
roles
deleting from user accounts 1
licensing 2
router ACLs
definition 1
rules
adding to roles 1
changing 2
changing VRF policies 3
deleting 4
rearranging 5
rules.
See user role rules 1

S

Security Audit Wizard
description 1
field descriptions 2
licensing requirements 3
platform support 4
prerequisites 5
using to configure Layer 2 security 6
server groups.
See AAA server groups 1
SNMPv3
specifying AAA parameters 1
specifying parameters for AAA servers 2
source interface
configuring for a specific RADIUS server group 1
configuring for a specific TACACS+ server group 2
statistics
displaying for TACACS+ 1
superuser role.
See network-admin user role 1

T

TACACS+
advantages over RADIUS 1
configuration distribution 2
configuration process 3
configuring 4
configuring dead-time intervals 5
configuring global keys 6
configuring global timeout interval 7
configuring TCP ports 8
description 1 2
disabling 10
enabling 11
field descriptions 12
keys 13
licensing requirements 14
platform support 15
prerequisites 16
user login operation 17
VSAs 18
TACACS+ groups
adding 1
adding servers 2
deleting 3
deleting servers 4
TACACS+ server group
configuring a source interface 1
TACACS+ server groups
configuring global source interface 1
TACACS+ server hosts
copying 1
TACACS+ servers
adding 1
adding to groups 2
configuring keys 3
configuring periodic monitoring 4
configuring timeout intervals 5
deleting from groups 6
field descriptions 7
hosts 8
monitoring 9
TACACS+ statistics
displaying 1
TCP ports
configuring for TACACS+ 1
time range
description 1
time ranges
absolute 1
configuring 2
description 3
field descriptions 4
periodic 5
traffic storm control
description 1 2
displaying statistics 2
field descriptions 3
licensing 4
platform support 5

U

unicast storms.
See traffic storm control 1
user accounts
changing expiry date 1
changing passwords 2
configuring 3
copying 4
creating 5
deleting 6
deleting roles 7
description 8
licensing 9
password characteristics 10
user accounts and RBAC
platform support 1
user logins
authentication process 1
authorization process 2
user role rules
description 1
user roles
adding rules 1
changing interface policies 2
changing rules 3
changing VLAN policies 4
configuring 5
copying 6
creating 7
defaults 8
deleting rules 9
description 10
rearranging rules 11
specifying on AAA servers 1 2

V

VACLs
description 1
platform support 2
vdc-admin user role
description 1
vdc-operator user role
description 1
vendor-specific attributes.
See VSAs 1
VLAN ACLs
definition 1
description 2
VLAN policies
changing in user roles 1
VRF policies
changing in user roles 1
VSAs
format 1
protocol options 1 2 3
support description 3