HP (Hewlett-Packard) 2600 Switch User Manual


 
configuring switch global parameters … 5-12
general setup … 5-5
local authentication … 5-9
MD5…5-4
messages … 5-31
network accounting … 5-18
operating rules, switch … 5-4
security … 5-9
security note … 5-2
server access order … 5-19
server access order, changing … 5-29
servers, multiple … 5-13
show accounting 5-28
show authentication … 5-27
SNMP access security not supported … 5-2
statistics, viewing … 5-25
terminology…5-3
TLS … 5-4
web-browser access controls … 5-17
web-browser security not supported 5-2, 5-17
RADIUS accounting
See RADIUS.
reserved port numbers … 6-17, 7-20
S
security
authorized IP managers … 11-1
per port … 9-2
security violations
notices of … 9-28
security, password
See SSH.
setting a password … 2-4
setup screen … 1-11
show
locked down MAC addresses … 9-25
locked out MAC addresses … 9-26
SSH
authenticating switch to client … 6-3
authentication, client public key 6-2
authentication, user password … 6-2
caution, restricting access … 6-20
caution, security … 6-18
CLI commands … 6-9
client behavior … 6-15, 6-16
client public-key authentication … 6-19, 6-21
client public-key, clearing … 6-25
client public-key, creating file … 6-23
client public-key, displaying … 6-25
configuring authentication … 6-18
crypto key … 6-11
disabling … 6-11
enable … 6-16, 7-19
enabling … 6-15
erase host key pair … 6-11
generate host key pair … 6-11
generating key pairs 6-10
host key pair … 6-11
key, babble … 6-11
key, fingerprint … 6-11
keys, zeroing … 6-11
key-size … 6-17
known-host file … 6-13, 6-15
man-in-the-middle spoofing 6-16
messages, operating … 6-27
OpenSSH … 6-3
operating rules … 6-8
outbound SSH not secure … 6-8
password security … 6-18
password-only authentication … 6-18
passwords, assigning … 6-9
PEM 6-4
prerequisites … 6-5
public key … 6-5, 6-13
public key, displaying … 6-14
reserved IP port numbers … 6-17
security … 6-18
SSHv1…6-2
SSHv2…6-2
stacking, security … 6-8
steps for configuring … 6-6
supported encryption methods … 6-3
switch key to client … 6-12
terminology … 6-4
unauthorized access … 6-20, 6-26
version … 6-2
zeroing a key … 6-11
zeroize … 6-11
SSL
zeroize … 7-12
CA-signed … 7-4, 7-15
CA-signed certificate … 7-4, 7-15
CLI commands … 7-7
client behavior … 7-17, 7-18
crypto key … 7-10
4 – Index