Index – 17
caution about filtering … 12-15
edge port configuration … 4-20, 13-28
security features … 1-8
spanning tree protocol
See STP.
spoofing
protection against … 11-24
SSH
authenticating switch to client … 8-2
authentication, client public key … 8-1
authentication, user password … 8-1
caution, security … 8-19
cipher … 8-17
CLI commands … 8-8
client
copy client-known-hosts file … 8-34
copy host public key … 8-36
copy private key … 8-33
initiate session … 8-32
remove client key pair … 8-36
remove client known hosts file … 8-37
view open sessions … 8-37
client behavior … 8-15
client public-key authentication … 8-21, 8-25
client public-key, clearing … 8-30
client public-key, creating file … 8-26
client public-key, displaying … 8-29
configuring authentication … 8-20
configuring key lengths … 8-12
crypto key … 8-10
disabling … 8-10
enable … 8-16, 9-16
enabling … 8-15
erase host key pair … 8-10
filetransfer … 8-17
generate host key pair … 8-10
generating key pairs … 8-9
host key pair … 8-10
ip-version … 8-17
key, babble … 8-11
key, fingerprint … 8-11
keys, zeroing … 8-10
keysize … 8-12
known-host file … 8-13, 8-15
mac selection … 8-18
man-in-the-middle spoofing … 8-16
messages, operating … 8-39
OpenSSH … 8-2
operating rules … 8-7
password security … 8-20
password-only authentication … 8-20
passwords, assigning … 8-8
PEM … 8-3
prerequisites … 8-4
private keys not saved to configuration
file … 2-28
public key … 8-4, 8-13
public key, displaying … 8-14
public key, saving to configuration file … 2-13,
2-21
reserved IP port numbers … 8-19
security … 8-19
SSHv2…8-1
steps for configuring … 8-5
switch key to client … 8-13
terminology … 8-3, 16-2
unauthorized access … 8-31
version … 8-1
view open sessions … 8-37
zeroing a key … 8-10
zeroize … 8-11
SSL
CA-signed … 9-3, 9-13
CA-signed certificate … 9-3, 9-13
cert … 8-11
CLI commands … 9-6
client behavior … 9-15
crypto key … 9-8
disabling … 9-7, 9-15
enabling … 9-15
erase certificate key pair … 9-7
erase host key pair … 9-7
generate CA-signed … 9-13
generate CA-signed certificate … 9-13
generate host key pair … 9-7
generate self-signed … 9-12
generate self-signed certificate … 9-7, 9-12
generate server host certificate … 9-7
generating Host Certificate … 9-6
host key pair … 9-7
key, babble … 9-10
key, fingerprint … 9-10
man-in-the-middle spoofing … 9-15
OpenSSL … 9-1
operating notes … 9-5
operating rules … 9-5