7-6
Configuring Secure Socket Layer (SSL)
General Operating Rules and Notes
General Operating Rules and Notes
■
Once you generate a certificate on the switch you should avoid re-
generating the certificate without a compelling reason. Otherwise,
you will have to re-introduce the switch’s certificate on all manage-
ment stations (clients) you previously set up for SSL access to the
switch. In some situations this can temporarily allow security
breaches.
■
The switch's own public/private certificate key pair and certificate
are stored in the switch's flash memory and are not affected by
reboots or the erase startup-config command
■
The public/private certificate key pair is not be confused with the SSH
public/private key pair. The certificate key pair and the SSH key pair
are independent of each other, which means a switch can have two
keys pairs stored in flash
■
On ProCurve switches that support stacking, when stacking is
enabled, SSL provides security only between an SSL client and the
stack manager. Communications between the stack commander and
stack members is not secure.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......