Index – 17
known-host file … 8-13, 8-15
mac selection … 8-18
man-in-the-middle spoofing … 8-16
messages, operating … 8-31
OpenSSH … 8-2
operating rules … 8-7
outbound SSH not secure … 8-7
password security … 8-20
password-only authentication … 8-20
passwords, assigning … 8-8
PEM … 8-3
prerequisites … 8-4
private keys not saved to configuration
file … 2-21
public key … 8-4, 8-13
public key, displaying … 8-14
public key, saving to configuration file … 2-12,
2-16
reserved IP port numbers … 8-19
security … 8-19
SSHv2 … 8-1
steps for configuring … 8-5
switch key to client … 8-12
terminology … 8-3, 16-1
unauthorized access … 8-30
version … 8-1
zeroing a key … 8-10
zeroize … 8-11
SSL
CA-signed … 9-2, 9-11
CA-signed certificate … 9-2, 9-11
cert … 8-10
CLI commands … 9-6
client behavior … 9-13
crypto key … 9-8
disabling … 9-7, 9-13
enabling … 9-13
erase certificate key pair … 9-7
erase host key pair … 9-7
generate CA-signed … 9-11
generate CA-signed certificate … 9-11
generate host key pair … 9-7
generate self-signed … 9-10
generate self-signed certificate … 9-7, 9-10
generate server host certificate … 9-7
generating Host Certificate … 9-6
host key pair … 9-7
key, babble … 9-10
key, fingerprint … 9-10
man-in-the-middle spoofing … 9-13
OpenSSL … 9-1
operating notes … 9-5
operating rules … 9-5
passwords, assigning … 9-6
prerequisites … 9-4
remove self-signed certificate … 9-7
remove server host certificate … 9-7
reserved TCP port numbers … 9-15
root … 9-3
root certificate … 9-3
self-signed … 9-2, 9-10
self-signed certificate … 9-2, 9-7, 9-10
server host certificate … 9-7
SSL server … 9-2
SSLv3 … 9-1
steps for configuring … 9-4
supported encryption methods … 9-2
terminology … 9-2
TLSv1 … 9-1
troubleshooting, operating … 9-16
unsecured web browser access … 9-13
version … 9-1
zeroize … 9-8, 9-9
static ACL … 10-3
static filter limit … 12-2
static multicast filter …12-14
STP
prerequisite for 802.1X controlled
directions … 13-28
prerequisite for web-based controlled
directions … 4-20
STP multicast MAC address
supernetting … 10-36
supersede implicit deny any … 10-42
system delay …11-33
system resource usage … 11-33
T
TACACS
aaa parameters … 5-12
authentication … 5-2
authentication process … 5-24
authentication, local … 5-25
authorized IP managers, effect … 5-30
configuration, authentication … 5-10