System information

keys, zeroing 6-11
key-size … 6-17
known-host file … 6-13, 6-15
man-in-the-middle spoofing … 6-16
messages, operating … 6-27
OpenSSH 6-3
operating rules 6-8
outbound SSH not secure … 6-8
password security … 6-18
password-only authentication … 6-18
passwords, assigning 6-9
PEM 6-4
prerequisites 6-5
public key … 6-5, 6-13
public key, displaying … 6-14
reserved IP port numbers 6-17
security … 6-18
SSHv1 … 6-2
SSHv2 … 6-2
steps for configuring … 6-6
supported encryption methods … 6-3
switch key to client … 6-12
terminology … 6-3, 12-2
unauthorized access … 6-20, 6-26
version … 6-2
zeroing a key … 6-11
zeroize … 6-11
SSL
zeroize … 7-12
CA-signed … 7-3, 7-15
CA-signed certificate 7-3, 7-15
CLI commands … 7-7
client behavior … 7-17, 7-18
crypto key … 7-10
disabling … 7-10, 7-17
enabling … 7-17
erase certificate key pair … 7-10
erase host key pair … 7-10
generate CA-signed certificate … 7-15
generate host key pair … 7-10
generate self-signed 7-13
generate self-signed certificate … 7-10, 7-13
generate server host certificate … 7-10
generateCA-signed … 7-15
generating Host Certificate 7-9
host key pair … 7-10
key, babble … 7-12
key, fingerprint 7-12
man-in-the-middle spoofing 7-18
OpenSSL … 7-2
operating notes … 7-6
operating rules … 7-6
passwords, assigning … 7-7
prerequisites … 7-5
remove self-signed certificate … 7-10
remove server host certificate 7-10
reserved TCP port numbers … 7-20
root … 7-4
root certificate … 7-4
self-signed 7-3, 7-13
self-signed certificate … 7-3, 7-10, 7-13
server host certificate … 7-10
SSL server … 7-3
SSLv3 … 7-2
steps for configuring … 7-5
supported encryption methods 7-3
terminology … 7-3
TLSv1 7-2
troubleshooting, operating … 7-21
unsecured web browser access 7-18
version … 7-2
zeroize 7-10
static filter limit 8-3
STP
STP multicast MAC address
T
TACACS
3400cl switches … 4-3
aaa parameters … 4-12
authentication 4-4
authentication process 4-20
authentication, local … 4-22
authorized IP managers, effect … 4-25
configuration, authentication 4-11
configuration, encryption key … 4-19
configuration, server access 4-15
configuration, timeout … 4-20
configuration, viewing 4-10
encryption key 4-6, 4-15, 4-16, 4-19
encryption key, general operation 4-23
encryption key, global 4-20
general operation 4-2
IP address, server … 4-15
local manager password requirement 4-26
Index – 5