4 – Index
Index
reserved IP port numbers … 4-17
security … 4-12, 4-17
SSHv1 … 4-2, 4-3
SSHv1 compatibility … 4-12
SSHv2 … 4-2
steps for configuring … 4-6
supported encryption methods … 4-3
switch key to client … 4-12
terminology … 4-4
unauthorized access … 4-19, 4-26
version … 4-2
zeroize … 4-11
zeroizing a key … 4-11
T
TACACS
aaa parameters … 2-12
authentication … 2-4
authentication process … 2-20
authentication, local … 2-22
authorized IP managers, effect … 2-25
configuration, authentication … 2-11
configuration, encryption key … 2-19
configuration, server access … 2-15
configuration, timeout … 2-20
configuration, viewing … 2-10
encryption key … 2-7, 2-15, 2-16, 2-19
encryption key, general operation … 2-23
encryption key, global … 2-20
general operation … 2-2
IP address, server … 2-15
local manager password requirement … 2-26
messages … 2-25
NAS … 2-4
overview … 1-x
precautions … 2-6
preparing to configure … 2-9
preventing switch lockout … 2-15
privilege level code … 2-7
server access … 2-15
server priority … 2-18
setup, general … 2-6
show authentication … 2-9
supported features … 2-3
system requirements … 2-5
TACACS+ server … 2-4
testing … 2-6
timeout … 2-15
troubleshooting … 2-6
unauthorized access, preventing … 2-8
web access, controlling … 2-24
web access, no effect on … 2-6
tacacs-server … 2-9
Telnet … 2-15
test … 2-15
TLS
See RADIUS. … 3-4
troubleshoot … 2-15
troubleshooting
authorized IP managers … 7-12
U
user name
cleared … 1-5
V
value, inconsistent … 6-12
VLAN
802.1x … 5-24
802.1x, ID changes … 5-27
W
warranty … 1-ii
web browser interface, for configuring
authorized IP managers … 7-7, 7-8
port security … 6-15, 6-22
web server, proxy … 6-22
!FishSecurity.book Page 4 Thursday, October 10, 2002 9:19 PM