CA-signed certificate … 8-3, 8-15
CLI commands … 8-7
client behavior … 8-17, 8-18
crypto key … 8-10
disabling … 8-10, 8-17
enabling … 8-17
erase certificate key pair … 8-10
erase host key pair … 8-10
generate CA-signed … 8-15
generate CA-signed certificate … 8-15
generate host key pair … 8-10
generate self-signed … 8-13
generate self-signed certificate … 8-10, 8-13
generate server host certificate … 8-10
generating Host Certificate … 8-9
host key pair … 8-10
key, babble … 8-12
key, fingerprint … 8-12
man-in-the-middle spoofing … 8-18
OpenSSL … 8-2
operating notes … 8-6
operating rules … 8-6
passwords, assigning … 8-7
prerequisites … 8-5
remove self-signed certificate … 8-10
remove server host certificate … 8-10
reserved TCP port numbers … 8-20
root … 8-4
root certificate … 8-4
self-signed … 8-3, 8-13
self-signed certificate … 8-3, 8-10, 8-13
server host certificate … 8-10
SSL server … 8-3
SSLv3 … 8-2
steps for configuring … 8-5
supported encryption methods … 8-3
terminology … 8-3
TLSv1 … 8-2
troubleshooting, operating … 8-21
unsecured web browser access … 8-18
version … 8-2
zeroize … 8-10
static filter limit … 9-3
static multicast filter … 9-14
STP
STP multicast MAC address
T
TACACS
3400cl switches … 5-3
aaa parameters … 5-12
authentication … 5-4
authentication process … 5-20
authentication, local … 5-22
authorized IP managers, effect … 5-25
configuration, authentication … 5-11
configuration, encryption key … 5-19
configuration, server access … 5-15
configuration, timeout … 5-20
configuration, viewing … 5-10
encryption key … 5-6, 5-15, 5-16, 5-19
encryption key, general operation … 5-23
encryption key, global … 5-20
general operation … 5-2
IP address, server … 5-15
local manager password requirement … 5-26
messages … 5-25
NAS … 5-3
overview … 1-9
precautions … 5-5
preparing to configure … 5-8
preventing switch lockout … 5-15
privilege level code … 5-7
server access … 5-15
server priority … 5-18
setup, general … 5-5
show authentication … 5-8
supported features … 5-3
system requirements … 5-5
TACACS+ server … 5-3
testing … 5-5
timeout … 5-15
troubleshooting … 5-6
unauthorized access, preventing … 5-7
web access, controlling … 5-24
web access, no effect on … 5-5
tacacs-server … 5-8
TCP
reserved port numbers … 8-20
Telnet … 5-15
test … 5-15
TLS
See RADIUS.
troubleshoot … 5-15
troubleshooting
8 – Index