Security Configuration Guide, Cisco DCNM for LAN, Release 6.x
Index
Downloads: The complete bookPDF (PDF - 4.66MB) | The complete bookePub (ePub - 1.6MB) | Feedback

Contents

8 - A - B - C - D - F - G - I - K - L - M - N - O - P - R - S - T - U - V -

Index

8

802.1X
configuration process 1
configuring 1
configuring AAA accounting methods 1
controlling on interfaces 1
description 1 2
disabling authenticaiton 1
disabling feature 1
enabling global periodic reauthentication 1
enabling MAC address authentication bypass 1
enabling mulitple hosts mode 1
enabling on interfaces 1
enabling periodic reauthentication on interfaces 1
enabling service 1
enabling single host mode 1
field descriptions 1
licensing requirements 1
MAC authenication bypass 1
multiple host support 1
platform support 1
prerequisites 1
setting global maximum retransmission retry count 1
setting interface maximum retransmission retry count 1
single host support 1
supported topologies 1
802.1X authentication
authorization states for ports 1
changing global timers 1
changing timers on interfaces 1
enabling RADIUS accounting 1
initiation 1
802.1X reauthentication
setting maximum retry count on interfaces 1
802.1X statistics
displaying 1

A

AAA
accounting 1
authentication 1
authorization 1
benefits 1
configuring 1
description 1 2
enabling or disabling MSCHAP authentication 1
enabling or disabling MSCHAP V2 authentication 1
field descriptions 1
licensing requirements 1
monitoring TACACS+ servers 1
platform support 1
prerequisites 1
user login process 1
AAA accounting
adding rule methods 1
changing rule methods 1
configuring methods for 802.1X 1
deleting rule methods 1
rearranging rule methods 1
AAA authentication
adding a rule method 1
changing rule methods 1
deleting rule methods 1
enabling or disabling 1
enabling or disabling default user roles 1
enabling or disabling login authentication failure messages 1
rearranging rule methods 1
AAA protocols
RADIUS 1
TACACS+ 1
AAA server groups
description 1
AAA servers
FreeRADIUS VSA format 1
specifying SNMPv3 parameters 1 2
specifying user roles 1
specifying user roles in VSAs 1
AAA services
configuration options 1
remote 1
security 1
access control lists 1
description 1
order of application 1
See also ARP ACLs 1
See also IP ACLs 1
See also MAC ACLs 1
See also policy-based ACLs 1
See also port ACLs 1
See also router ACLs 1
See also VLAN ACLs 1
types of 1
accounting
description 1
ACLs
VLAN 1
ARP ACLs
description 1
platform support 1
priority of ARP ACLs and DHCP snooping entries 1
ARP inspection 1
See dynamic ARP inspection 1
authentication
802.1X 1
description 1
methods 1
user logins 1
authentication, authorization, and accounting 1
See AAA 1
authorization
description 1
user logins 1

B

broadcast storms. 1
See traffic storm control 1

C

CFS
TACACS+ support 1
changed information
description 1
Cisco
vendor ID 1 2
cisco-av-pair
specifying AAA user parameters 1 2

D

DAI
description 1
platform support 1
device roles
description for 802.1X 1
DHCP
description 1
platform support 1
DHCP binding database 1
See DHCP snooping binding database 1
DHCP Option 82
description 1
DHCP snooping
binding database 1
description 1
message exchange process 1
Option 82 1
overview 1
DHCP snooping binding database 1
described 1
description 1
entries 1
See DHCP snooping binding database 1
documentation
additional publications 1
dynamic ARP inspection
ARP cache poisoning 1
ARP requests 1
ARP spoofing attack 1
description 1
DHCP snooping binding database 1
function of 1
interface trust states 1
logging of dropped packets 1
network security issues and interface trust states 1
priority of ARP ACLs and DHCP snooping entries 1
Dynamic Host Configuration Protocol 1
See DHCP 1

F

field descriptions
802.1X 1
AAA 1
Security Audit Wizard 1
TACACS+ 1
fields descriptions
RADIUS 1
FreeRADIUS
VSA format for role attributes 1 2

G

global source interface
configuring for RADIUS server groups 1
configuring for TACACS+ server groups 1

I

IDs
Cisco vendor ID 1 2
interface policies
changing in user roles 1
IP ACLs
configuring 1
description 1 2
licensing 1
platform support 1
IP source guard
platform support 1
IP Source Guard
description 1 2

K

key chain
end-time 1
lifetime 1
start-time 1
keychain management
description 1 2
platform support 1
keys
TACACS+ 1

L

Layer 2 security
configuring using the Security Audit Wizard 1
licensing
802.1X 1
AAA 1
IP ACLs 1
RADIUS 1
roles 1
Security Audit Wizard 1
TACACS+ 1
traffic storm control 1
user accounts 1
login authentication failure messages
enabling or disabling 1

M

MAC ACLs
description 1 2
platform support 1
MAC addresses
enabling authentication bypass in 802.1X 1
learning 1
MAC authentication
bypass for 802.1X 1
MSCHAP
enabling or disabling authentication 1
MSCHAP V2
enabling or disabling authentication 1
multicast storms. 1
See traffic storm control 1

N

network-admin user role
description 1
network-operator user role
description 1
new information
description 1

O

object groups
configuring 1

P

passwords
changing for user accounts 1
strong characteristics 1
port ACLs
definition 1
port security
description 1 2
MAC address learning 1
MAC move 1
platform support 1
violations 1
ports
authorization states for 802.1X 1

R

RADIUS
configuring dead-time intervals 1
configuring global transmission retry count 1
configuring global transmission timeout interval 1
configuring servers 1
description 1 2
field descriptions 1
licensing 1
network environments 1
operation 1
platform support 1
prerequisites 1
process for configuring 1
VSAs 1
RADIUS accounting
enabling for 802.1X authentication 1
RADIUS server group
configuring a source interface 1
RADIUS server groups
adding 1
adding server hosts 1
configuring the global source interface 1
deleting 1
RADIUS server hosts
copying 1
RADIUS servers
adding 1
adding to server groups 1
allowing specifying at login 1
configuring accounting attributes 1
configuring authentication attributes 1
configuring global keys 1
configuring periodic monitoring 1
configuring transminssion timeout intervals 1
configuring transmission retry counts 1
deleting 1
displaying statistics 1
monitoring 1
RBAC
description 1 2
field descriptions 1
related documents 1
roles
deleting from user accounts 1
licensing 1
router ACLs
definition 1
rules
adding to roles 1
changing 1
changing VRF policies 1
deleting 1
rearranging 1
rules. 1
See user role rules 1

S

secure MAC addresses
learning 1
security
port
MAC address learning 1
Security Audit Wizard
description 1
field descriptions 1
licensing requirements 1
platform support 1
prerequisites 1
using to configure Layer 2 security 1
server groups. 1
See AAA server groups 1
SNMPv3
specifying AAA parameters 1
specifying parameters for AAA servers 1
source interface
configuring for a specific RADIUS server group 1
configuring for a specific TACACS+ server group 1
statistics
displaying for TACACS+ 1
superuser role. 1
See network-admin user role 1

T

TACACS+
advantages over RADIUS 1
configuration distribution 1
configuration process 1
configuring 1
configuring dead-time intervals 1
configuring global keys 1
configuring global timeout interval 1
configuring TCP ports 1
description 1 2
disabling 1
enabling 1
field descriptions 1
keys 1
licensing requirements 1
platform support 1
prerequisites 1
user login operation 1
VSAs 1
TACACS+ groups
adding 1
adding servers 1
deleting 1
deleting servers 1
TACACS+ server group
configuring a source interface 1
TACACS+ server groups
configuring global source interface 1
TACACS+ server hosts
copying 1
TACACS+ servers
adding 1
adding to groups 1
configuring keys 1
configuring periodic monitoring 1
configuring timeout intervals 1
deleting from groups 1
field descriptions 1
hosts 1
monitoring 1
TACACS+ statistics
displaying 1
TCP ports
configuring for TACACS+ 1
time range
description 1
time ranges
absolute 1
configuring 1
description 1
field descriptions 1
periodic 1
traffic storm control
description 1 2
displaying statistics 1
field descriptions 1
licensing 1
platform support 1

U

unicast storms. 1
See traffic storm control 1
user accounts
changing expiry date 1
changing passwords 1
configuring 1
copying 1
creating 1
deleting 1
deleting roles 1
description 1
licensing 1
password characteristics 1
user accounts and RBAC
platform support 1
user logins
authentication process 1
authorization process 1
user role rules
description 1
user roles
adding rules 1
changing interface policies 1
changing rules 1
changing VLAN policies 1
configuring 1
copying 1
creating 1
defaults 1
deleting rules 1
description 1
rearranging rules 1
specifying on AAA servers 1 2

V

VACLs
description 1
platform support 1
vdc-admin user role
description 1
vdc-operator user role
description 1
vendor-specific attributes. 1
See VSAs 1
VLAN ACLs
definition 1
description 1
information about 1
VLAN policies
changing in user roles 1
VRF policies
changing in user roles 1
VSAs
format 1
protocol options 1 2 3
support description 1