ProCurve 2610 Manual page 450

2610 / 2610-pwr series
Table of Contents

Advertisement

rate-limiting ... 6-3
Rate-Limiting, RADIUS override ... 6-4
reserved port numbers ... 7-17, 8-20
routing
source-routing, caution ... 6-12, 9-11, 9-32
S
security
authorized IP managers ... 13-1
per port ... 12-2
security violations
notices of ... 12-28
security, ACL
See ACL, security use.
security, password
See SSH.
setting a password ... 2-4
setup screen ... 1-8
show
locked down MAC addresses ... 12-25
locked out MAC addresses ... 12-26
single sign-on ... 4-11
source-routing, caution ... 6-12, 9-11, 9-32
spanning tree
edge port configuration ... 11-27
SSH
authenticating switch to client ... 7-3
authentication, client public key ... 7-2
authentication, user password ... 7-2
caution, restricting access ... 7-20
caution, security ... 7-18
CLI commands ... 7-9
client behavior ... 7-15, 7-16
client public-key authentication ... 7-19, 7-22
client public-key, clearing ... 7-26
client public-key, creating file ... 7-23
client public-key, displaying ... 7-25
configuring authentication ... 7-18
crypto key ... 7-11
disabling ... 7-11
enable ... 7-16, 8-19
enabling ... 7-15
erase host key pair ... 7-11
generate host key pair ... 7-11
generating key pairs ... 7-10
host key pair ... 7-11
key, babble ... 7-11
8 – Index
key, fingerprint ... 7-11
keys, zeroing ... 7-11
key-size ... 7-17
known-host file ... 7-13, 7-15
man-in-the-middle spoofing ... 7-16
messages, operating ... 7-28
OpenSSH ... 7-3
operating rules ... 7-8
outbound SSH not secure ... 7-8
password security ... 7-18
password-only authentication ... 7-18
passwords, assigning ... 7-9
PEM ... 7-4
prerequisites ... 7-5
public key ... 7-5, 7-13
public key, displaying ... 7-14
reserved IP port numbers ... 7-17
security ... 7-18
SSHv1 ... 7-2
SSHv2 ... 7-2
stacking, security ... 7-8
steps for configuring ... 7-6
supported encryption methods ... 7-3
switch key to client ... 7-12
terminology ... 7-4
unauthorized access ... 7-20, 7-27
version ... 7-2
zeroing a key ... 7-11
zeroize ... 7-11
SSL
CA-signed ... 8-4, 8-15
CA-signed certificate ... 8-4, 8-15
CLI commands ... 8-7
client behavior ... 8-17, 8-18
crypto key ... 8-10
disabling ... 8-10
enabling ... 8-17
erase certificate key pair ... 8-10
erase host key pair ... 8-10
generate CA-signed certificate ... 8-15
generate host key pair ... 8-10
generate self-signed ... 8-13
generate self-signed certificate ... 8-10, 8-13
generate server host certificate ... 8-10
generating Host Certificate ... 8-9
host key pair ... 8-10
key, babble ... 8-12
key, fingerprint ... 8-12

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 2610 and is the answer not in the manual?

Questions and answers

Table of Contents