HP 6120XG HP ProCurve Series 6120 Blade Switches Access Security Guide - Page 466

source port filters, spanning tree, spoofing, private keys not saved to configuration

Page 466 highlights

Option 82 ... 8-6, 8-9 statistics ... 8-6 untrusted-policy ... 8-10 verify ... 8-6 source port filters configuring ... 9-4 named ... 9-6 operating rules ... 9-4 See also named source port filters. selection criteria ... 9-3 spanning tree edge port configuration ... 3-22, 10-26 security features ... 1-8 spoofing protection against ... 8-24 SSH authenticating switch to client ... 6-3 authentication, client public key ... 6-2 authentication, user password ... 6-2 caution, security ... 6-19 cipher ... 6-17 CLI commands ... 6-9 client behavior ... 6-15, 6-16 client public-key authentication ... 6-21, 6-24 client public-key, clearing ... 6-29 client public-key, creating file ... 6-26 client public-key, displaying ... 6-28 configuring authentication ... 6-20 configuring key lengths ... 6-13 crypto key ... 6-11 disabling ... 6-11 enable ... 6-16, 7-19 enabling ... 6-15 erase host key pair ... 6-11 filetransfer ... 6-17 generate host key pair ... 6-11 generating key pairs ... 6-10 host key pair ... 6-11 ip-version ... 6-17 key, babble ... 6-12 key, fingerprint ... 6-12 keys, zeroing ... 6-11 keysize ... 6-13 known-host file ... 6-14, 6-15 mac selection ... 6-18 man-in-the-middle spoofing ... 6-16 messages, operating ... 6-30 OpenSSH ... 6-3 operating rules ... 6-8 outbound SSH not secure ... 6-8 password security ... 6-20 password-only authentication ... 6-20 passwords, assigning ... 6-9 PEM ... 6-3 prerequisites ... 6-5 private keys not saved to configuration file ... 2-21 public key ... 6-5, 6-14 public key, displaying ... 6-14 public key, saving to configuration file ... 2-11, 2-16 reserved IP port numbers ... 6-19 security ... 6-19 SSHv2 ... 6-2 steps for configuring ... 6-6 switch key to client ... 6-13 terminology ... 6-3 unauthorized access ... 6-30 version ... 6-2 zeroing a key ... 6-11 zeroize ... 6-11 SSL CA-signed ... 7-3, 7-15 CA-signed certificate ... 7-3, 7-15 CLI commands ... 7-7 client behavior ... 7-17, 7-18 crypto key ... 7-10 disabling ... 7-9, 7-17 enabling ... 7-17 erase certificate key pair ... 7-9 erase host key pair ... 7-9 generate CA-signed ... 7-15 generate CA-signed certificate ... 7-15 generate host key pair ... 7-9 generate self-signed ... 7-12 generate self-signed certificate ... 7-9, 7-12 generate server host certificate ... 7-9 generating Host Certificate ... 7-8 host key pair ... 7-9 key, babble ... 7-12 key, fingerprint ... 7-12 man-in-the-middle spoofing ... 7-18 OpenSSL ... 7-2 operating notes ... 7-6 operating rules ... 7-6 passwords, assigning ... 7-7 10 - Index

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469

10 – Index
Option 82 … 8-6, 8-9
statistics … 8-6
untrusted-policy … 8-10
verify … 8-6
source port filters
configuring … 9-4
named … 9-6
operating rules … 9-4
See also
named source port filters.
selection criteria … 9-3
spanning tree
edge port configuration … 3-22, 10-26
security features … 1-8
spoofing
protection against … 8-24
SSH
authenticating switch to client … 6-3
authentication, client public key … 6-2
authentication, user password … 6-2
caution, security … 6-19
cipher … 6-17
CLI commands … 6-9
client behavior … 6-15, 6-16
client public-key authentication … 6-21, 6-24
client public-key, clearing … 6-29
client public-key, creating file … 6-26
client public-key, displaying … 6-28
configuring authentication … 6-20
configuring key lengths … 6-13
crypto key … 6-11
disabling … 6-11
enable … 6-16, 7-19
enabling … 6-15
erase host key pair … 6-11
filetransfer … 6-17
generate host key pair … 6-11
generating key pairs … 6-10
host key pair … 6-11
ip-version … 6-17
key, babble … 6-12
key, fingerprint … 6-12
keys, zeroing … 6-11
keysize … 6-13
known-host file … 6-14, 6-15
mac selection … 6-18
man-in-the-middle spoofing … 6-16
messages, operating … 6-30
OpenSSH … 6-3
operating rules … 6-8
outbound SSH not secure … 6-8
password security … 6-20
password-only authentication … 6-20
passwords, assigning … 6-9
PEM … 6-3
prerequisites … 6-5
private keys not saved to configuration
file … 2-21
public key … 6-5, 6-14
public key, displaying … 6-14
public key, saving to configuration file … 2-11,
2-16
reserved IP port numbers … 6-19
security … 6-19
SSHv2 … 6-2
steps for configuring … 6-6
switch key to client … 6-13
terminology … 6-3
unauthorized access … 6-30
version … 6-2
zeroing a key … 6-11
zeroize … 6-11
SSL
CA-signed … 7-3, 7-15
CA-signed certificate … 7-3, 7-15
CLI commands … 7-7
client behavior … 7-17, 7-18
crypto key … 7-10
disabling … 7-9, 7-17
enabling … 7-17
erase certificate key pair … 7-9
erase host key pair … 7-9
generate CA-signed … 7-15
generate CA-signed certificate … 7-15
generate host key pair … 7-9
generate self-signed … 7-12
generate self-signed certificate … 7-9, 7-12
generate server host certificate … 7-9
generating Host Certificate … 7-8
host key pair … 7-9
key, babble … 7-12
key, fingerprint … 7-12
man-in-the-middle spoofing … 7-18
OpenSSL … 7-2
operating notes … 7-6
operating rules … 7-6
passwords, assigning … 7-7