HP 3500yl Series Access Security Manual page 773

Switch software
Hide thumbs Also See for 3500yl Series:
Table of Contents

Advertisement

caution about filtering ... 12-15
edge port configuration ... 4-20, 13-28
security features ... 1-8
spanning tree protocol
See STP.
spoofing
protection against ... 11-24
SSH
authenticating switch to client ... 8-2
authentication, client public key ... 8-1
authentication, user password ... 8-1
caution, security ... 8-19
cipher ... 8-17
CLI commands ... 8-8
client
copy client-known-hosts file ... 8-34
copy host public key ... 8-36
copy private key ... 8-33
initiate session ... 8-32
remove client key pair ... 8-36
remove client known hosts file ... 8-37
view open sessions ... 8-37
client behavior ... 8-15
client public-key authentication ... 8-21, 8-25
client public-key, clearing ... 8-30
client public-key, creating file ... 8-26
client public-key, displaying ... 8-29
configuring authentication ... 8-20
configuring key lengths ... 8-12
crypto key ... 8-10
disabling ... 8-10
enable ... 8-16, 9-16
enabling ... 8-15
erase host key pair ... 8-10
filetransfer ... 8-17
generate host key pair ... 8-10
generating key pairs ... 8-9
host key pair ... 8-10
ip-version ... 8-17
key, babble ... 8-11
key, fingerprint ... 8-11
keys, zeroing ... 8-10
keysize ... 8-12
known-host file ... 8-13, 8-15
mac selection ... 8-18
man-in-the-middle spoofing ... 8-16
messages, operating ... 8-39
OpenSSH ... 8-2
operating rules ... 8-7
password security ... 8-20
password-only authentication ... 8-20
passwords, assigning ... 8-8
PEM ... 8-3
prerequisites ... 8-4
private keys not saved to configuration
file ... 2-28
public key ... 8-4, 8-13
public key, displaying ... 8-14
public key, saving to configuration file ... 2-13,
2-21
reserved IP port numbers ... 8-19
security ... 8-19
SSHv2 ... 8-1
steps for configuring ... 8-5
switch key to client ... 8-13
terminology ... 8-3, 16-2
unauthorized access ... 8-31
version ... 8-1
view open sessions ... 8-37
zeroing a key ... 8-10
zeroize ... 8-11
SSL
CA-signed ... 9-3, 9-13
CA-signed certificate ... 9-3, 9-13
cert ... 8-11
CLI commands ... 9-6
client behavior ... 9-15
crypto key ... 9-8
disabling ... 9-7, 9-15
enabling ... 9-15
erase certificate key pair ... 9-7
erase host key pair ... 9-7
generate CA-signed ... 9-13
generate CA-signed certificate ... 9-13
generate host key pair ... 9-7
generate self-signed ... 9-12
generate self-signed certificate ... 9-7, 9-12
generate server host certificate ... 9-7
generating Host Certificate ... 9-6
host key pair ... 9-7
key, babble ... 9-10
key, fingerprint ... 9-10
man-in-the-middle spoofing ... 9-15
OpenSSL ... 9-1
operating notes ... 9-5
operating rules ... 9-5
Index – 17

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents