saving to startup configuration with write
memory … 2-19
SNMPv3 … 2-13
SSH … 2-16
SSH private keys not saved … 2-21
TACACS … 2-15
viewing in running configuration … 2-11
viewing in startup configuration … 2-19
when SNMPv3 credentials in downloaded file
are not supported … 2-21
security violations
detecting … 10-33
notices of … 13-32
security, ACL
See ACL, security use.
security, password
See SSH.
setting a password …2-6
shared secret key
RADIUS … 2-11, 2-15
TACACS … 2-11, 2-15
single sign-on …4-11
SNMP
authentication failures … 10-33
disabling access to authentication MIB … 1-15
password and username configuration … 2-3
RADIUS access to auth config MIB … 5-4
trap generation … 10-35
SNMPv3
saving security credentials to configuration
file … 2-11, 2-13
security credentials not supported in download-
ed file … 2-21
snooping
authorized server … 10-5
authorized server address … 10-9
binding database … 10-12
changing remote-id … 10-11
DHCP … 10-4
disable MAC check … 10-11
Option 82 … 10-6, 10-9
statistics … 10-6
untrusted-policy … 10-10
verify … 10-6
source port filters
configuring … 11-4
named … 11-6
operating rules … 11-4
See also named source port filters.
selection criteria … 11-3
source-routing, caution … 6-14, 9-12, 9-33
spanning tree
edge port configuration … 3-22, 12-27
security features … 1-8
spoofing
protection against … 10-24
SSH
authenticating switch to client … 7-3
authentication, client public key … 7-2
authentication, user password … 7-2
caution, security … 7-19
cipher … 7-17
CLI commands … 7-9
client behavior … 7-15, 7-16
client public-key authentication … 7-21, 7-24
client public-key, clearing … 7-29
client public-key, creating file … 7-26
client public-key, displaying … 7-28
configuring authentication … 7-20
configuring key lengths … 7-13
crypto key … 7-11
disabling … 7-11
enable … 7-16, 8-19
enabling … 7-15
erase host key pair … 7-11
filetransfer … 7-17
generate host key pair … 7-11
generating key pairs … 7-10
host key pair … 7-11
ip-version … 7-17
key, babble … 7-12
key, fingerprint … 7-12
keys, zeroing … 7-11
keysize … 7-13
known-host file … 7-14, 7-15
mac selection … 7-18
man-in-the-middle spoofing … 7-16
messages, operating … 7-30
OpenSSH … 7-3
operating rules … 7-8
outbound SSH not secure … 7-8
password security … 7-20
password-only authentication … 7-20
passwords, assigning … 7-9
PEM … 7-3
prerequisites … 7-5
12 – Index