System information
prior to … 10-35, 10-36, 10-39
Privacy Enhanced Mode (PEM)
See SSH.
protocol filters … 8-8
proxy
web server … 10-39
Q - R
quick start … 1-11
RADIUS
accounting … 5-2, 5-16
accounting, configuration outline … 5-18
accounting, configure server access … 5-19
accounting, configure types on switch … 5-21
accounting, exec … 5-17, 5-21
accounting, interim updating … 5-23
accounting, network … 5-21
accounting, operating rules … 5-18
accounting, server failure … 5-18
accounting, session-blocking … 5-23
accounting, start-stop method … 5-22
accounting, statistics terms … 5-25
accounting, stop-only method … 5-22
accounting, system … 5-17, 5-21
authentication options … 5-2
authentication, local … 5-15
bypass RADIUS server … 5-9
commands, accounting … 5-16
commands, switch … 5-6
configuration outline … 5-6
configure server access … 5-10
configuring switch global parameters … 5-12
general setup … 5-5
local authentication … 5-9
MD5…5-4
messages … 5-30
network accounting … 5-17
operating rules, switch … 5-4
security … 5-9
security note … 5-2
server access order … 5-18
server access order, changing … 5-28
servers, multiple … 5-13
show accounting … 5-27
show authentication … 5-26
SNMP access security not supported … 5-2
statistics, viewing … 5-24
terminology … 5-3
TLS … 5-4
web-browser access controls … 5-16
web-browser security not supported … 5-2, 5-16
RADIUS accounting
See RADIUS.
reserved port numbers … 6-17, 7-20
S
security
authorized IP managers … 11-1
per port … 10-2
security violations
notices of … 10-31
security, password
See SSH.
setting a password … 2-5
setup screen … 1-11
source port filter … 8-3
source port filters … 8-4
spanning tree
caution about filtering … 8-7
spanning tree protocol
See STP.
SSH
authenticating switch to client … 6-3
authentication, client public key … 6-2
authentication, user password … 6-2
caution, restricting access … 6-20
caution, security … 6-18
CLI commands … 6-9
client behavior … 6-15, 6-16
client public-key authentication … 6-19, 6-22
client public-key, clearing … 6-25
client public-key, creating file … 6-23
client public-key, displaying … 6-25
configuring authentication … 6-18
crypto key … 6-11
disabling … 6-11
enable … 6-16, 7-19
enabling … 6-15
erase host key pair … 6-11
generate host key pair … 6-11
generating key pairs … 6-10
host key pair … 6-11
key, babble … 6-11
key, fingerprint … 6-11
4 – Index