Product guide
12 – Index
notices of … 14-34
security, ACL
See ACL, security use.
security, password
See SSH.
setting a password … 2-5
SFTP … 1-6
SNMP
authentication failures … 11-23
disabling access to authentication MIB … 1-5
password and username configuration … 2-2,
2-8
RADIUS access to auth config MIB … 6-4
trap generation … 11-25
snooping
authorized server … 11-4
authorized server address … 11-8
binding database … 11-11
changing remote-id … 11-10
DHCP … 11-3
disable MAC check … 11-10
Option 82 … 11-5, 11-8
statistics … 11-5
untrusted-policy … 11-9
verify … 11-5
source port filter … 12-3
source port filters … 12-4
named … 12-6
source-routing, caution … 7-14, 10-25, 10-41
spanning tree
caution about filtering … 12-16
edge port configuration … 4-22, 4-35, 13-24
security features … 1-12
spanning tree protocol
See STP.
SSH
authenticating switch to client … 8-3
authentication, client public key … 8-2
authentication, user password … 8-2
caution, security … 8-18
CLI commands … 8-9
client behavior … 8-15, 8-16
client public-key authentication … 8-19, 8-22
client public-key, clearing … 8-26
client public-key, creating file … 8-23
client public-key, displaying … 8-25
configuring authentication … 8-18
crypto key … 8-11
disabling … 8-11
enable … 8-16, 9-19
enabling … 8-15
erase host key pair … 8-11
generate host key pair … 8-11
generating key pairs … 8-10
host key pair … 8-11
key, babble … 8-11
key, fingerprint … 8-11
keys, zeroing … 8-11
key-size … 8-17
known-host file … 8-13, 8-15
man-in-the-middle spoofing … 8-16
messages, operating … 8-27
OpenSSH … 8-3
operating rules … 8-8
outbound SSH not secure … 8-8
overview … 1-9
password security … 8-18
password-only authentication … 8-18
passwords, assigning … 8-9
PEM … 8-4
prerequisites … 8-5
public key … 8-5, 8-13
public key, displaying … 8-14
reserved IP port numbers … 8-17
security … 8-18
SSHv2…8-2
steps for configuring … 8-6
supported encryption methods … 8-3
switch key to client … 8-12
terminology … 8-3, 16-2
unauthorized access … 8-27
version … 8-2
zeroing a key … 8-11
zeroize … 8-11
SSL
CA-signed … 9-3, 9-15
CA-signed certificate … 9-3, 9-15
CLI commands … 9-7
client behavior … 9-17, 9-18
crypto key … 9-10
disabling … 9-10, 9-17
enabling … 9-17
erase certificate key pair … 9-10
erase host key pair … 9-10
generate CA-signed … 9-15
generate CA-signed certificate … 9-15