saving security credentials to configuration

terminology … 7-3,15-2

file … 2-12,2-14,2-21

unauthorized access … 7-28

snooping

version … 7-2

authorized server … 10-4,10-8

zeroing a key … 7-10

binding database … 10-11

SSL

changing remote-id10-10

CA-signed8-3,8-15,8-3,8-15,8-7

DHCP … 10-3

client behavior … 8-17,8-18,8-10

disable MAC check … 10-10

disabling … 8-9,8-17

Option 82 … 10-5,10-8

enabling … 8-17,8-9

statistics … 10-5

generate CA-signed8-15,8-9,8-12,8-9,8-12,

untrusted-policy10-9

8-9,8-8

verify … 10-5

host key pair … 8-9

source port filters

key, babble … 8-12

configuring … 11-4

man-in-the-middle spoofing … 8-18

named … 11-6

OpenSSL … 8-2

operating rules … 11-4

operating notes … 8-6

See also named source port filters.

passwords, assigning … 8-7,8-5

selection criteria … 11-3

remove self-signed certificate … 8-9,8-20,8-4

source-routing, caution 6-14,9-19,9-34

self-signed8-3,8-12,8-3,8-9,8-12,8-9

spanning tree

SSL server … 8-3,8-2

caution about filtering … 11-16

steps for configuring … 8-5,8-3

edge port configuration … 3-20,12-28

terminology … 8-3

security features … 1-9

TLSv1 … 8-2

spanning tree protocol

troubleshooting, operating … 8-21

See STP.

unsecured web browser access … 8-18

SSH

version … 8-2

authenticating switch to client … 7-3,7-2

zeroize … 8-10,8-11

caution, security … 7-19,7-17

ssl

CLI commands … 7-8

cert … 7-10

client behavior … 7-15,7-16,7-20,7-23,7-27,

static ACL 9-6

7-25,7-26,7-19,7-12,7-10

static filter limit 11-3

disabling … 7-10

static multicast filter 11-15

enable … 7-16,8-19,7-15,7-10

STP

filetransfer … 7-17

prerequisite for 802.1X controlled

generate host key pair … 7-10,7-9

directions … 12-29,3-20

host key pair … 7-10

STP multicast MAC address

key, babble … 7-11,7-10,7-12,7-13,7-15

supernetting 9-30

mac selection … 7-17,7-16,7-29

supersede implicit deny any 9-36

OpenSSH … 7-2

Syslog

operating rules … 7-7

See ACL, logging.

password security … 7-19,7-20,7-8

system delay 10-23

PEM … 7-3

system resource usage 10-23

prerequisites … 7-4,2-21,7-4,7-13,7-14,2-12,

 

2-16

T

reserved IP port numbers … 7-18

TACACS

security … 7-19

SSHv2 … 7-2

aaa parameters … 4-13,4-3,4-24,4-25,4-29

steps for configuring … 7-5,7-12

 

Index – 9