SNMP access security not supported … 5-4
statistics, viewing … 5-42
terminology…5-5
TLS … 5-6
Tunnel-Type atttribute … 5-32
vendor specific attributes … 5-25, 5-33
VSAs … 5-26
web browser security not supported … 5-7
web-browser access controls … 5-22
web-browser security not supported … 5-4, 5-22
Rate-Limit override … 9-61
remote access security … 1-4
reserved port numbers … 6-17, 7-20
Reset button … 1-6
Reset-on-clear
disabled when saving security credentials to
configuration file … 2-20
S
secure copy … 1-6
secure file transfers … 1-6
secure management VLAN … 1-7
security
authorized IP managers … 11-1
per port … 10-3
security credentials
802.1X credentials saved to configuration
file … 2-14, 2-21
copying configurations on the switch … 2-20
copying startup configuration … 2-19
disabling Reset-on-clear option … 2-20
downloading a configuration file … 2-19
downloading from a server … 2-10
enabling storage in configuraiton file … 2-11
manager username and password … 2-12
operator username and password … 2-12
RADIUS … 2-16
saving to running configuration with include-
credentials … 2-19
saving to startup configuration … 2-19
saving to startup configuration with write
memory … 2-19
SNMPv3 … 2-14
SSH … 2-16
SSH private keys not saved … 2-21
TACACS … 2-15
viewing in running configuration … 2-11
viewing in startup configuration … 2-19
when SNMPv3 credentials in downloaded file
are not supported … 2-21
security violations
notices of … 10-32
security, password
See SSH.
setting a password … 2-6
SFTP … 1-6
shared secret key
RADIUS … 2-12, 2-16
TACACS … 2-12, 2-15
single sign-on … 4-11
SNMPv3
saving security credentials to configuration
file … 2-12, 2-14
security credentials not supported in download-
ed file … 2-21
source port filter … 8-3
source port filters … 8-4
named … 8-6
spanning tree
caution about filtering … 8-16
edge port configuration … 3-33, 9-27
spanning tree protocol
See STP.
SSH
authenticating switch to client … 6-3
authentication, client public key … 6-2
authentication, user password … 6-2
caution, security … 6-18
CLI commands … 6-9
client behavior … 6-15, 6-16
client public-key authentication … 6-19, 6-22
client public-key, clearing … 6-26
client public-key, creating file … 6-24
client public-key, displaying … 6-25
configuring authentication … 6-18
crypto key … 6-11
disabling … 6-11
enable … 6-16, 7-19
enabling … 6-15
erase host key pair … 6-11
generate host key pair … 6-11
generating key pairs … 6-10
host key pair … 6-11
key, babble … 6-11
key, fingerprint … 6-11
Index – 7