SNMP access security not supported … 5-2 statistics, viewing … 5-25

terminology … 5-3 TLS … 5-4

Web browser authentication … 5-7web-browser access controls … 5-17web-browser security not supported … 5-2,5-17

RADIUS accounting See RADIUS.

reserved port numbers … 6-17,7-20

S

security

authorized IP managers … 10-1 per port … 9-2

security violations notices of … 9-17

security, password See SSH.

setting a password … 2-4 setup screen … 1-8

SSH

authenticating switch to client … 6-3 authentication, client public key … 6-2 authentication, user password … 6-2 caution, restricting access … 6-20 caution, security … 6-18

CLI commands … 6-9 client behavior … 6-15,6-16

client public-key authentication … 6-19,6-23 client public-key, clearing … 6-27

client public-key, creating file … 6-24 client public-key, displaying … 6-26 configuring authentication … 6-18 crypto key … 6-11

disabling … 6-11 enable … 6-16,7-19 enabling … 6-15

erase host key pair … 6-11 generate host key pair … 6-11 generating key pairs … 6-10 host key pair … 6-11

key, babble … 6-11 key, fingerprint … 6-11 keys, zeroing … 6-11known-host file … 6-13,6-15

man-in-the-middle spoofing … 6-16

messages, operating … 6-29 OpenSSH … 6-3 operating rules … 6-8 outbound SSH not secure … 6-8 password security … 6-18password-only authentication … 6-18 passwords, assigning … 6-9

PEM … 6-4 prerequisites … 6-5 public key … 6-5,6-13 public key, displaying … 6-14 reserved IP port numbers … 6-17 security … 6-18

SSHv1 … 6-2

SSHv2 … 6-2

stacking, security … 6-8 steps for configuring … 6-6 supported encryption methods … 6-3 switch key to client … 6-12 terminology … 6-4

unauthorized access … 6-20,6-28 version … 6-2

zeroing a key … 6-11 zeroize … 6-11

SSL

CA-signed7-4,7-15CA-signed certificate … 7-4,7-15 CLI commands … 7-7

client behavior … 7-17,7-18 crypto key … 7-10 disabling … 7-9

enabling … 7-17

erase certificate key pair … 7-9 erase host key pair … 7-9

generate CA-signed certificate … 7-15 generate host key pair … 7-9 generate self-signed7-12

generate self-signed certificate … 7-9,7-12 generate server host certificate … 7-9 generating Host Certificate … 7-8

host key pair … 7-9 key, babble … 7-12 key, fingerprint … 7-12

man-in-the-middle spoofing … 7-18 OpenSSL … 7-2

operating notes … 7-6 operating rules … 7-6 passwords, assigning … 7-7

Index – 5