HP 3500yl Series Access Security Manual page 774

Switch software
Hide thumbs Also See for 3500yl Series:
Table of Contents

Advertisement

passwords, assigning ... 9-6
prerequisites ... 9-4
remove self-signed certificate ... 9-7
remove server host certificate ... 9-7
reserved TCP port numbers ... 9-17
root ... 9-3
root certificate ... 9-3
self-signed ... 9-3, 9-12
self-signed certificate ... 9-3, 9-7, 9-12
server host certificate ... 9-7
SSL server ... 9-3
SSLv3 ... 9-1
steps for configuring ... 9-4
supported encryption methods ... 9-2
terminology ... 9-3
TLSv1 ... 9-1
troubleshooting, operating ... 9-18
unsecured web browser access ... 9-15
version ... 9-1
zeroize ... 9-8, 9-9
static ACL ... 10-3
static filter limit ... 12-2
static multicast filter ... 12-14
STP
prerequisite for 802.1X controlled
directions ... 13-28
prerequisite for web-based controlled
directions ... 4-20
STP multicast MAC address
supernetting ... 10-36
supersede implicit deny any ... 10-42
system delay ... 11-34
system resource usage ... 11-34
T
TACACS
aaa parameters ... 5-12
authentication ... 5-2
authentication process ... 5-24
authentication, local ... 5-25
authorized IP managers, effect ... 5-30
configuration, authentication ... 5-10
configuration, encryption key ... 5-22
configuration, server access ... 5-17
configuration, timeout ... 5-23
configuration, viewing ... 5-9
encrypted-key ... 5-18
18 – Index
encryption key ... 5-5, 5-17, 5-18, 5-22
encryption key exclusion ... 5-30
encryption key, general operation ... 5-26
encryption key, global ... 5-23
encryption key, saving to configuration
file ... 2-13
general operation ... 5-1
IP address, server ... 5-17
local manager password requirement ... 5-30
messages ... 5-29
NAS ... 5-2
precautions ... 5-4
preparing to configure ... 5-7
preventing switch lockout ... 5-17
privilege level code ... 5-6
server access ... 5-17
server priority ... 5-21
setup, general ... 5-4
shared secret key, saving to configuration
file ... 2-18
show authentication ... 5-7
single login ... 5-12
single sign-on ... 5-12
system requirements ... 5-4
TACACS+ server ... 5-2, 5-7
testing ... 5-4
TFTP, configuration ... 5-30
timeout ... 5-17
troubleshooting ... 5-5
unauthorized access, preventing ... 5-6
web access, controlling ... 5-28
web access, no effect on ... 5-4
tacacs
oobm ... 5-18
TACACS+
key string with tilde character ... 5-20
TCP
reserved port numbers ... 9-17
TCP control bits ... 10-69
TCP/UDP
monitoring packets to closed ports ... 11-34
test ... 5-17
TLS
See RADIUS.
troubleshooting
authentication via Telnet ... 5-17
authorized IP managers ... 15-14
trunk

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents