7-6
Configuring Secure Socket Layer (SSL)
General Operating Rules and Notes
General Operating Rules and Notes
■
Once you generate a certificate on the switch you should avoid re-
generating the certificate without a compelling reason. Otherwise,
you will have to re-introduce the switch’s certificate on all manage-
ment stations (clients) you previously set up for SSL access to the
switch. In some situations this can temporarily allow security
breaches.
■
The switch's own public/private certificate key pair and certificate
are stored in the switch's flash memory and are not affected by
reboots or the erase startup-config command
■
The public/private certificate key pair is not be confused with the SSH
public/private key pair. The certificate key pair and the SSH key pair
are independent of each other, which means a switch can have two
keys pairs stored in flash
■
On ProCurve switches that support stacking, when stacking is
enabled, SSL provides security only between an SSL client and the
stack manager. Communications between the stack commander and
stack members is not secure.
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......