Dil ID: 9
Dil Adı: germany
Dil Kodu: de7tayfun Produkte der Marke HP
Dünyanın En Büyük
Elektronik Bilgi Kütüphanesi



configuring switch global parameters … 5-12
general setup … 5-5
local authentication … 5-9
MD5…5-4
messages … 5-31
network accounting 5-18
operating rules, switch … 5-4
security … 5-9
security note … 5-2
server access order 5-19
server access order, changing … 5-29
servers, multiple … 5-13
show accounting 5-28
show authentication … 5-27
SNMP access security not supported … 5-2
statistics, viewing 5-25
terminology…5-3
TLS … 5-4
web-browser access controls … 5-17
web-browser security not supported 5-2, 5-17
RADIUS accounting
See RADIUS.
reserved port numbers 6-17, 7-20
S
security
authorized IP managers 11-1
per port … 9-2
security violations
notices of … 9-28
security, password
See SSH.
setting a password … 2-4
setup screen … 1-11
show
locked down MAC addresses 9-25
locked out MAC addresses 9-26
SSH
authenticating switch to client … 6-3
authentication, client public key 6-2
authentication, user password … 6-2
caution, restricting access 6-20
caution, security … 6-18
CLI commands … 6-9
client behavior … 6-15, 6-16
client public-key authentication 6-19, 6-21
client public-key, clearing … 6-25
client public-key, creating file … 6-23
client public-key, displaying … 6-25
configuring authentication 6-18
crypto key 6-11
disabling 6-11
enable … 6-16, 7-19
enabling 6-15
erase host key pair … 6-11
generate host key pair … 6-11
generating key pairs 6-10
host key pair … 6-11
key, babble … 6-11
key, fingerprint 6-11
keys, zeroing 6-11
key-size … 6-17
known-host file … 6-13, 6-15
man-in-the-middle spoofing 6-16
messages, operating … 6-27
OpenSSH … 6-3
operating rules … 6-8
outbound SSH not secure … 6-8
password security … 6-18
password-only authentication 6-18
passwords, assigning … 6-9
PEM 6-4
prerequisites … 6-5
public key … 6-5, 6-13
public key, displaying … 6-14
reserved IP port numbers 6-17
security … 6-18
SSHv1…6-2
SSHv2…6-2
stacking, security … 6-8
steps for configuring … 6-6
supported encryption methods 6-3
switch key to client … 6-12
terminology … 6-4
unauthorized access … 6-20, 6-26
version … 6-2
zeroing a key … 6-11
zeroize 6-11
SSL
zeroize … 7-12
CA-signed … 7-4, 7-15
CA-signed certificate … 7-4, 7-15
CLI commands … 7-7
client behavior … 7-17, 7-18
crypto key 7-10
4 – Index