HP 6120G/XG HP ProCurve Series 6120 Blade Switches Access Security Guide - Page 600
source port filters, source-routing, caution
View all HP 6120G/XG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 600 highlights
saving to startup configuration with write memory ... 2-19 SNMPv3 ... 2-13 SSH ... 2-16 SSH private keys not saved ... 2-21 TACACS ... 2-15 viewing in running configuration ... 2-11 viewing in startup configuration ... 2-19 when SNMPv3 credentials in downloaded file are not supported ... 2-21 security violations detecting ... 10-33 notices of ... 13-32 security, ACL See ACL, security use. security, password See SSH. setting a password ... 2-6 shared secret key RADIUS ... 2-11, 2-15 TACACS ... 2-11, 2-15 single sign-on ... 4-11 SNMP authentication failures ... 10-33 disabling access to authentication MIB ... 1-15 password and username configuration ... 2-3 RADIUS access to auth config MIB ... 5-4 trap generation ... 10-35 SNMPv3 saving security credentials to configuration file ... 2-11, 2-13 security credentials not supported in download ed file ... 2-21 snooping authorized server ... 10-5 authorized server address ... 10-9 binding database ... 10-12 changing remote-id ... 10-11 DHCP ... 10-4 disable MAC check ... 10-11 Option 82 ... 10-6, 10-9 statistics ... 10-6 untrusted-policy ... 10-10 verify ... 10-6 source port filters configuring ... 11-4 named ... 11-6 operating rules ... 11-4 See also named source port filters. selection criteria ... 11-3 source-routing, caution ... 6-14, 9-12, 9-33 spanning tree edge port configuration ... 3-22, 12-27 security features ... 1-8 spoofing protection against ... 10-24 SSH authenticating switch to client ... 7-3 authentication, client public key ... 7-2 authentication, user password ... 7-2 caution, security ... 7-19 cipher ... 7-17 CLI commands ... 7-9 client behavior ... 7-15, 7-16 client public-key authentication ... 7-21, 7-24 client public-key, clearing ... 7-29 client public-key, creating file ... 7-26 client public-key, displaying ... 7-28 configuring authentication ... 7-20 configuring key lengths ... 7-13 crypto key ... 7-11 disabling ... 7-11 enable ... 7-16, 8-19 enabling ... 7-15 erase host key pair ... 7-11 filetransfer ... 7-17 generate host key pair ... 7-11 generating key pairs ... 7-10 host key pair ... 7-11 ip-version ... 7-17 key, babble ... 7-12 key, fingerprint ... 7-12 keys, zeroing ... 7-11 keysize ... 7-13 known-host file ... 7-14, 7-15 mac selection ... 7-18 man-in-the-middle spoofing ... 7-16 messages, operating ... 7-30 OpenSSH ... 7-3 operating rules ... 7-8 outbound SSH not secure ... 7-8 password security ... 7-20 password-only authentication ... 7-20 passwords, assigning ... 7-9 PEM ... 7-3 prerequisites ... 7-5 12 - Index