HP ProCurve 2600-PWR Series Manual page 296

Access security guide
Hide thumbs Also See for ProCurve 2600-PWR Series:
Table of Contents

Advertisement

configuring switch global parameters ... 5-12
general setup ... 5-5
local authentication ... 5-9
MD5 ... 5-4
messages ... 5-31
network accounting ... 5-18
operating rules, switch ... 5-4
security ... 5-9
security note ... 5-2
server access order ... 5-19
server access order, changing ... 5-29
servers, multiple ... 5-13
show accounting ... 5-28
show authentication ... 5-27
SNMP access security not supported ... 5-2
statistics, viewing ... 5-25
terminology ... 5-3
TLS ... 5-4
web-browser access controls ... 5-17
web-browser security not supported ... 5-2, 5-17
RADIUS accounting
See RADIUS.
reserved port numbers ... 6-17, 7-20
S
security
authorized IP managers ... 11-1
per port ... 9-2
security violations
notices of ... 9-28
security, password
See SSH.
setting a password ... 2-4
setup screen ... 1-11
show
locked down MAC addresses ... 9-25
locked out MAC addresses ... 9-26
SSH
authenticating switch to client ... 6-3
authentication, client public key ... 6-2
authentication, user password ... 6-2
caution, restricting access ... 6-20
caution, security ... 6-18
CLI commands ... 6-9
client behavior ... 6-15, 6-16
client public-key authentication ... 6-19, 6-21
client public-key, clearing ... 6-25
4 – Index
client public-key, creating file ... 6-23
client public-key, displaying ... 6-25
configuring authentication ... 6-18
crypto key ... 6-11
disabling ... 6-11
enable ... 6-16, 7-19
enabling ... 6-15
erase host key pair ... 6-11
generate host key pair ... 6-11
generating key pairs ... 6-10
host key pair ... 6-11
key, babble ... 6-11
key, fingerprint ... 6-11
keys, zeroing ... 6-11
key-size ... 6-17
known-host file ... 6-13, 6-15
man-in-the-middle spoofing ... 6-16
messages, operating ... 6-27
OpenSSH ... 6-3
operating rules ... 6-8
outbound SSH not secure ... 6-8
password security ... 6-18
password-only authentication ... 6-18
passwords, assigning ... 6-9
PEM ... 6-4
prerequisites ... 6-5
public key ... 6-5, 6-13
public key, displaying ... 6-14
reserved IP port numbers ... 6-17
security ... 6-18
SSHv1 ... 6-2
SSHv2 ... 6-2
stacking, security ... 6-8
steps for configuring ... 6-6
supported encryption methods ... 6-3
switch key to client ... 6-12
terminology ... 6-4
unauthorized access ... 6-20, 6-26
version ... 6-2
zeroing a key ... 6-11
zeroize ... 6-11
SSL
zeroize ... 7-12
CA-signed ... 7-4, 7-15
CA-signed certificate ... 7-4, 7-15
CLI commands ... 7-7
client behavior ... 7-17, 7-18
crypto key ... 7-10

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents