accounting, system … 5-18, 5-22 authentication options … 5-2 authentication, local … 5-16

authorized IP managers, precedence … 11-2 bypass RADIUS server … 5-9 commands, accounting … 5-17 commands, switch … 5-6

configuration outline … 5-7 configure server access … 5-10 configuring switch global parameters … 5-12 general setup … 5-5

local authentication … 5-9 MD5 … 5-4

messages … 5-31

network accounting … 5-18 operating rules, switch … 5-4 security … 5-9

security note … 5-2

server access order … 5-19

server access order, changing … 5-29 servers, multiple … 5-13

show accounting … 5-28 show authentication … 5-27

SNMP access security not supported … 5-2 statistics, viewing … 5-25

terminology … 5-3 TLS … 5-4

Web browser authentication … 5-7 web-browser access controls … 5-17 web-browser security not supported … 5-2, 5-17

RADIUS accounting See RADIUS.

reserved port numbers … 6-17, 7-20

S

security

authorized IP managers … 11-1 per port … 9-2

security violations notices of … 9-29

security, password See SSH.

setting a password … 2-4 setup screen … 1-8 show

locked down MAC addresses … 9-25 locked out MAC addresses … 9-26

SSH

authenticating switch to client … 6-3 authentication, client public key … 6-2 authentication, user password … 6-2 caution, security … 6-18

CLI commands … 6-9 client behavior … 6-15, 6-16

client public-key authentication … 6-19, 6-21 client public-key, clearing … 6-25

client public-key, creating file … 6-23 client public-key, displaying … 6-25 configuring authentication … 6-18 crypto key … 6-11

disabling … 6-11 enable … 6-16, 7-19 enabling … 6-15

erase host key pair … 6-11 generate host key pair … 6-11 generating key pairs … 6-10 host key pair … 6-11

key, babble … 6-11 key, fingerprint … 6-11 keys, zeroing … 6-11 key-size6-17 known-host file … 6-13, 6-15

man-in-the-middle spoofing … 6-16 messages, operating … 6-27 OpenSSH … 6-3

operating rules … 6-8 outbound SSH not secure … 6-8 password security … 6-18 password-only authentication … 6-18 passwords, assigning … 6-9

PEM … 6-4 prerequisites … 6-5 public key … 6-5, 6-13 public key, displaying … 6-14 reserved IP port numbers … 6-17 security … 6-18

SSHv1 … 6-2

SSHv2 … 6-2

stacking, security … 6-8 steps for configuring … 6-6 supported encryption methods … 6-3 switch key to client … 6-12 terminology … 6-4

unauthorized access … 6-26 version … 6-2

4 – Index