16 – Index
downloading a configuration file … 2-19
downloading from a server … 2-10
enabling storage in configuration file … 2-11
manager username and password … 2-12
operator username and password … 2-12
RADIUS … 2-16
saving to running configuration with include-
credentials … 2-19
saving to startup configuration … 2-19
saving to startup configuration with write
memory … 2-19
SNMPv3 … 2-14
SSH … 2-16
SSH private keys not saved … 2-21
TACACS … 2-15
viewing in running configuration … 2-11
viewing in startup configuration … 2-19
when SNMPv3 credentials in downloaded file
are not supported … 2-21
security violations
detecting … 11-33
notices of … 14-34
security, ACL, IPv4
See ACL, security use.
security, password
See SSH.
setting a password …2-4
shared secret key
RADIUS … 2-12, 2-16
TACACS … 2-12, 2-15
single sign-on …5-10
SNMP
authentication failures … 11-33
disabling access to authentication MIB … 1-15
password and username configuration … 2-1
RADIUS access to auth config MIB … 6-2
trap generation … 11-35
SNMPv3
saving security credentials to configuration
file … 2-12, 2-14
security credentials not supported in download-
ed file … 2-21
snooping
authorized server … 11-4
authorized server address … 11-7
binding database … 11-11
changing remote-id … 11-10
DHCP … 11-2
disable MAC check … 11-10
Option 82 … 11-4, 11-8
statistics … 11-5
untrusted-policy … 11-9
verify … 11-4
source port filters
configuring … 12-3
named … 12-5
operating rules … 12-3
See also named source port filters.
selection criteria … 12-3
source-routing, caution … 7-17, 10-24, 10-40
spanning tree
caution about filtering … 12-15
edge port configuration … 4-20, 13-28
security features … 1-9
spanning tree protocol
See STP.
spoofing
protection against … 11-23
SSH
authenticating switch to client … 8-2
authentication, client public key … 8-2
authentication, user password … 8-2
caution, security … 8-19
cipher … 8-17
CLI commands … 8-8
client behavior … 8-15, 8-16
client public-key authentication … 8-21, 8-25
client public-key, clearing … 8-30
client public-key, creating file … 8-26
client public-key, displaying … 8-29
configuring authentication … 8-20
configuring key lengths … 8-12
crypto key … 8-10
disabling … 8-10
enable … 8-16, 9-14
enabling … 8-15
erase host key pair … 8-10
filetransfer … 8-17
generate host key pair … 8-10
generating key pairs … 8-9
host key pair … 8-10
ip-version … 8-17
key, babble … 8-11
key, fingerprint … 8-11
keys, zeroing … 8-10
keysize … 8-12