Index – 3
Index
R
RADIUS
accounting … 3-2, 3-16
accounting, configuration outline … 3-18
accounting, configure server access … 3-19
accounting, configure types on switch … 3-20
accounting, exec … 3-17, 3-20
accounting, interim updating … 3-22
accounting, network … 3-20
accounting, operating rules … 3-17
accounting, server failure … 3-18
accounting, session-blocking … 3-22
accounting, start-stop method … 3-21
accounting, statistics terms … 3-24
accounting, stop-only method … 3-21
accounting, system … 3-17, 3-20
authentication options … 3-2
authentication, local … 3-14, 3-15
bypass RADIUS server … 3-9
commands, accounting … 3-16
commands, switch … 3-6
configuration outline … 3-6
configure server access … 3-10
configuring switch global parameters … 3-12
general setup … 3-5
local authentication … 3-9
MD5 … 3-4
messages … 3-29
network accounting … 3-16
operating rules, switch … 3-4
security … 3-9
security note … 3-2
server access order … 3-17
server access order, changing … 3-27
servers, multiple … 3-13
show accounting … 3-26
show authentication … 3-25
SNMP access security not supported … 3-2
statistics, viewing … 3-23
terminology … 3-3
TLS … 3-4
web-browser access controls … 3-15
web-browser security not supported … 3-2, 3-15
RADIUS accounting
See RADIUS.
reserved port numbers … 4-17
S
security
authorized IP managers … 7-1
per port … 6-2
security violations
notices of … 6-15
security, password
See SSH.
setting a password … 1-4
setup screen … 1-xvii
SSH
authenticating switch to client … 4-3
authentication, client public key … 4-2
authentication, user password … 4-2
caution, restricting access … 4-19
caution, security … 4-17
CLI commands … 4-9
client behavior … 4-15
client public-key authentication … 4-18, 4-21
client public-key, clearing … 4-25
client public-key, creating file … 4-23
client public-key, displaying … 4-24
configuring authentication … 4-18
crypto key … 4-11
disabling … 4-11
enable … 4-16
enabling … 4-15
erase host key pair … 4-11
generate host key pair … 4-11
generating key pairs … 4-10
host key pair … 4-11
key, babble … 4-11
key, fingerprint … 4-11
keys, zeroizing … 4-11
key-size … 4-17
known-host file … 4-13, 4-14
man-in-the-middle spoofing … 4-12, 4-16
messages, operating … 4-26
OpenSSH … 4-3
operating rules … 4-8
outbound SSH not secure … 4-8
password security … 4-18
password-only authentication … 4-18
passwords, assigning … 4-9
PEM … 4-2, 4-4, 4-8, 4-14
prerequisites … 4-5
public key … 4-5, 4-13
public key, displaying … 4-14
!FishSecurity.book Page 3 Thursday, October 10, 2002 9:19 PM