Option 82 … 8-6,8-9

operating rules … 6-8

statistics … 8-6

outbound SSH not secure … 6-8

untrusted-policy8-10

password security … 6-20

verify … 8-6

password-only authentication … 6-20

source port filters

passwords, assigning … 6-9

configuring … 9-4

PEM … 6-3

named … 9-6

prerequisites … 6-5

operating rules … 9-4

private keys not saved to configuration

See also named source port filters.

file … 2-21

selection criteria … 9-3

public key … 6-5,6-14

spanning tree

public key, displaying … 6-14

edge port configuration … 3-22,10-26

public key, saving to configuration file … 2-11,

security features … 1-8

2-16

spoofing

reserved IP port numbers … 6-19

protection against … 8-24

security … 6-19

SSH

SSHv2 … 6-2

authenticating switch to client … 6-3

steps for configuring … 6-6

authentication, client public key … 6-2

switch key to client … 6-13

authentication, user password … 6-2

terminology … 6-3

caution, security … 6-19

unauthorized access … 6-30

cipher … 6-17

version … 6-2

CLI commands … 6-9

zeroing a key … 6-11

client behavior … 6-15,6-16

zeroize … 6-11

client public-key authentication … 6-21,6-24

SSL

client public-key, clearing … 6-29

CA-signed7-3,7-15

client public-key, creating file … 6-26

CA-signed certificate … 7-3,7-15

client public-key, displaying … 6-28

CLI commands … 7-7

configuring authentication … 6-20

client behavior … 7-17,7-18

configuring key lengths … 6-13

crypto key … 7-10

crypto key … 6-11

disabling … 7-9,7-17

disabling … 6-11

enabling … 7-17

enable … 6-16,7-19

erase certificate key pair … 7-9

enabling … 6-15

erase host key pair … 7-9

erase host key pair … 6-11

generate CA-signed7-15

filetransfer … 6-17

generate CA-signed certificate … 7-15

generate host key pair … 6-11

generate host key pair … 7-9

generating key pairs … 6-10

generate self-signed7-12

host key pair … 6-11

generate self-signed certificate … 7-9,7-12

ip-version6-17

generate server host certificate … 7-9

key, babble … 6-12

generating Host Certificate … 7-8

key, fingerprint … 6-12

host key pair … 7-9

keys, zeroing … 6-11

key, babble … 7-12

keysize … 6-13

key, fingerprint … 7-12

known-host file … 6-14,6-15

man-in-the-middle spoofing … 7-18

mac selection … 6-18

OpenSSL … 7-2

man-in-the-middle spoofing … 6-16

operating notes … 7-6

messages, operating … 6-30

operating rules … 7-6

OpenSSH … 6-3

passwords, assigning … 7-7

10 – Index