16 – Index
downloading a configuration file … 2-19
downloading from a server … 2-10
enabling storage in configuration file … 2-11
manager username and password … 2-12
operator username and password … 2-12
RADIUS … 2-16
saving to running configuration with include-
saving to startup configuration … 2-19
saving to startup configuration with write
SNMPv3 … 2-14
SSH … 2-16
SSH private keys not saved … 2-21
TACACS … 2-15
viewing in running configuration … 2-11
viewing in startup configuration … 2-19
when SNMPv3 credentials in downloaded file
security violations
detecting … 11-33
notices of … 14-34
security, ACL, IPv4
ACL, security use.
security, password
SSH.
setting a password
shared secret key
RADIUS … 2-12, 2-16
TACACS … 2-12, 2-15
single sign-on
SNMP
authentication failures … 11-33
disabling access to authentication MIB … 1-15
password and username configuration … 2-1
RADIUS access to auth config MIB … 6-2
trap generation … 11-35
SNMPv3
saving security credentials to configuration
security credentials not supported in download-
snooping
authorized server … 11-4
authorized server address … 11-7
binding database … 11-11
changing remote-id … 11-10
DHCP … 11-2
disable MAC check … 11-10
Option 82 … 11-4, 11-8
statistics … 11-5
untrusted-policy … 11-9
verify … 11-4
source port filters
configuring … 12-3
named … 12-5
operating rules … 12-3
named source port filters.
source-routing, caution
spanning tree
caution about filtering … 12-15
edge port configuration … 4-20, 13-28
security features … 1-9
spanning tree protocol
spoofing
SSH
authenticating switch to client … 8-2
authentication, client public key … 8-2
authentication, user password … 8-2
caution, security … 8-19
cipher … 8-17
CLI commands … 8-8
client behavior … 8-15, 8-16
client public-key authentication … 8-21, 8-25
client public-key, clearing … 8-30
client public-key, creating file … 8-26
client public-key, displaying … 8-29
configuring authentication … 8-20
configuring key lengths … 8-12
crypto key … 8-10
disabling … 8-10
enable … 8-16, 9-14
enabling … 8-15
erase host key pair … 8-10
filetransfer … 8-17
generate host key pair … 8-10
generating key pairs … 8-9
host key pair … 8-10
ip-version … 8-17
key, babble … 8-11
key, fingerprint … 8-11
keys, zeroing … 8-10
keysize … 8-12
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......