private keys not saved to configuration
file … 2-21
public key … 7-5, 7-14
public key, displaying … 7-14
public key, saving to configuration file … 2-11,
2-16
reserved IP port numbers … 7-19
security … 7-19
SSHv2 … 7-2
steps for configuring … 7-6
switch key to client … 7-13
terminology…7-3
unauthorized access … 7-30
version … 7-2
zeroing a key … 7-11
zeroize … 7-11
SSL
CA-signed … 8-3, 8-15
CA-signed certificate … 8-3, 8-15
CLI commands … 8-7
client behavior … 8-17, 8-18
crypto key … 8-10
disabling … 8-9, 8-17
enabling … 8-17
erase certificate key pair … 8-9
erase host key pair … 8-9
generate CA-signed … 8-15
generate CA-signed certificate … 8-15
generate host key pair … 8-9
generate self-signed … 8-12
generate self-signed certificate … 8-9, 8-12
generate server host certificate … 8-9
generating Host Certificate … 8-8
host key pair … 8-9
key, babble … 8-12
key, fingerprint … 8-12
man-in-the-middle spoofing … 8-18
OpenSSL … 8-2
operating notes … 8-6
operating rules … 8-6
passwords, assigning … 8-7
prerequisites … 8-5
remove self-signed certificate … 8-9
remove server host certificate … 8-9
reserved TCP port numbers … 8-20
root … 8-4
root certificate … 8-4
self-signed … 8-3, 8-12
self-signed certificate … 8-3, 8-9, 8-12
server host certificate … 8-9
SSL server … 8-3
SSLv3 … 8-2
steps for configuring … 8-5
supported encryption methods … 8-3
terminology … 8-3
TLSv1 … 8-2
troubleshooting, operating … 8-21
unsecured web browser access … 8-18
version … 8-2
zeroize … 8-10, 8-11
ssl
cert … 7-11
static filter limit … 11-2
STP
prerequisite for 802.1X controlled
directions … 12-28
prerequisite for web-based controlled
directions … 3-22
supernetting …9-28
supersede implicit deny any …9-34
Syslog
See ACL, logging.
system delay …10-33
system resource usage … 10-33
T
TACACS
aaa parameters … 4-12
authentication … 4-3
authentication process … 4-24
authentication, local … 4-26
authorized IP managers, effect … 4-29
configuration, authentication … 4-11
configuration, encryption key … 4-22
configuration, server access … 4-18
configuration, timeout … 4-23
configuration, viewing … 4-10
encryption key … 4-6, 4-18, 4-19, 4-22
encryption key exclusion … 4-30
encryption key, general operation … 4-27
encryption key, global … 4-23
encryption key, saving to configuration
file … 2-11
general operation … 4-2
IP address, server … 4-18
Index – 13