HP 2800 User Manual

Page 296

Advertising
background image

configuring switch global parameters … 5-12
general setup … 5-5
local authentication … 5-9
MD5 … 5-4
messages … 5-31
network accounting … 5-18
operating rules, switch … 5-4
security … 5-9
security note … 5-2
server access order … 5-19
server access order, changing … 5-29
servers, multiple … 5-13
show accounting … 5-28
show authentication … 5-27
SNMP access security not supported … 5-2
statistics, viewing … 5-25
terminology … 5-3
TLS … 5-4
web-browser access controls … 5-17
web-browser security not supported … 5-2, 5-17

RADIUS accounting

See RADIUS.

reserved port numbers … 6-17, 7-20

S

security

authorized IP managers … 11-1
per port … 9-2

security violations

notices of … 9-28

security, password

See SSH.

setting a password … 2-4
setup screen … 1-11
show

locked down MAC addresses … 9-25
locked out MAC addresses … 9-26

SSH

authenticating switch to client … 6-3
authentication, client public key … 6-2
authentication, user password … 6-2
caution, restricting access … 6-20
caution, security … 6-18
CLI commands … 6-9
client behavior … 6-15, 6-16
client public-key authentication … 6-19, 6-21
client public-key, clearing … 6-25

client public-key, creating file … 6-23
client public-key, displaying … 6-25
configuring authentication … 6-18
crypto key … 6-11
disabling … 6-11
enable … 6-16, 7-19
enabling … 6-15
erase host key pair … 6-11
generate host key pair … 6-11
generating key pairs … 6-10
host key pair … 6-11
key, babble … 6-11
key, fingerprint … 6-11
keys, zeroing … 6-11
key-size … 6-17
known-host file … 6-13, 6-15
man-in-the-middle spoofing … 6-16
messages, operating … 6-27
OpenSSH … 6-3
operating rules … 6-8
outbound SSH not secure … 6-8
password security … 6-18
password-only authentication … 6-18
passwords, assigning … 6-9
PEM … 6-4
prerequisites … 6-5
public key … 6-5,
6-13
public key, displaying … 6-14
reserved IP port numbers … 6-17
security … 6-18
SSHv1 … 6-2
SSHv2 … 6-2
stacking, security … 6-8
steps for configuring … 6-6
supported encryption methods … 6-3
switch key to client … 6-12
terminology … 6-4
unauthorized access … 6-20, 6-26
version … 6-2
zeroing a key … 6-11
zeroize … 6-11

SSL

zeroize … 7-12

CA-signed … 7-4, 7-15
CA-signed certificate … 7-4, 7-15
CLI commands … 7-7
client behavior … 7-17, 7-18
crypto key … 7-10

4 – Index

Advertising
This manual is related to the following products: