Cisco Catalyst 2960-XR Security Configuration Manual page 403

Ios release 15.0 2 ex1
Hide thumbs Also See for Catalyst 2960-XR:
Table of Contents

Advertisement

Index
SCP (continued)
configuring
88
Secure Copy Protocol
secure HTTP client
102, 103
configuring
102
displaying
103
secure HTTP server
99, 103
configuring
99
displaying
103
Secure Shell
86
Secure Socket Layer
93
See SSL
93
see HTTPS
93, 96
See RADIUS
53
See SCP
88
See SSL
93
See TACACS+
39
self-signed certificate
94
setting
24, 25, 28, 30
enable
24
enable secret
25
Telnet
28
with usernames
30
setting a command with
31
setting a password
28
Setting a Telnet Password for a Terminal Line
Example command
35
Setting or Changing a Static Enable Password
Example command
35
Setting the Privilege Level for a Command
Example command
35
show access-lists hw-summary command
SSH
86, 87
encryption methods
87
user authentication methods, supported
SSH server
90
SSL
93, 96, 99, 102, 103
configuration guidelines
configuring a secure HTTP client
configuring a secure HTTP server
described
93
monitoring
103
stack changes, effects on
112
ACL configuration
112
static bindings
188, 189
adding
188, 189
static hosts
189
statistics
323
802.1X
323
suggested network environments
SVIs
110
and router ACLs
110
Switch Access
34
displaying
34
OL-29434-01
35
35
35
116
87
96
102
99
53
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
switched packets, ACLs on
T
TACACS+
39, 41, 43, 45, 47, 48, 50
accounting, defined
39
authentication, defined
authorization, defined
39
configuring
43, 45, 47, 48
accounting
48
authentication key
authorization
47
login authentication
default configuration
43
defined
39
displaying
50
identifying the server
43
key
43
limiting the services to the user
login
45
operation of
41
overview
39
tracking services accessed by user
TCAM entries
187
Telnet
28
setting a password
28
temporary self-signed certificate
Terminal Access Controller Access Control System Plus
See TACACS+
39
terminal lines, setting a password
time ranges in ACLs
119, 128
time-range command
119
tracking services accessed by user
traffic
111
fragmented
111
trunk interfaces
187
trustpoints, CA
94
U
user authentication methods, supported
username-based authentication
V
vendor-proprietary
75
vendor-specific
75
VLAN ACLs
108
See VLAN maps
108
VLAN map entries, order of
151
39
43
45
47
48
94
28
48, 72
87
30
117
39
IN-5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents