A SERVICE OF

logo

Index – 11
prerequisites … 7-5
remove self-signed certificate … 7-9
remove server host certificate … 7-9
reserved TCP port numbers … 7-20
root … 7-4
root certificate … 7-4
self-signed … 7-3, 7-12
self-signed certificate … 7-3, 7-9, 7-12
server host certificate … 7-9
SSL server … 7-3
SSLv3 … 7-2
steps for configuring … 7-5
supported encryption methods … 7-3
terminology…7-3
TLSv1…7-2
troubleshooting, operating … 7-21
unsecured web browser access … 7-18
version … 7-2
zeroize … 7-10, 7-11
ssl
cert … 6-11
static filter limit …9-2
STP
prerequisite for 802.1X controlled
directions … 10-27
prerequisite for web-based controlled
directions … 3-22
system delay …8-33
system resource usage …8-33
T
TACACS
aaa parameters … 4-12
authentication … 4-3
authentication process … 4-24
authentication, local … 4-26
authorized IP managers, effect … 4-29
configuration, authentication … 4-11
configuration, encryption key … 4-22
configuration, server access … 4-18
configuration, timeout … 4-23
configuration, viewing … 4-10
encryption key … 4-6, 4-18, 4-19, 4-22
encryption key exclusion … 4-30
encryption key, general operation … 4-27
encryption key, global … 4-23
encryption key, saving to configuration
file … 2-11
general operation … 4-2
IP address, server … 4-18
local manager password requirement … 4-30
messages … 4-29
NAS … 4-3
precautions … 4-5
preparing to configure … 4-8
preventing switch lockout … 4-18
privilege level code … 4-7
server access … 4-18
server priority … 4-21
setup, general … 4-5
shared secret key, saving to configuration
file … 2-15
show authentication … 4-8
single login … 4-13
single sign-on … 4-13
system requirements … 4-5
TACACS+ server … 4-3, 4-8
testing … 4-5
TFTP, configuration … 4-30
timeout … 4-18
troubleshooting … 4-6
unauthorized access, preventing … 4-7
web access, controlling … 4-28
web access, no effect on … 4-5
TCP
reserved port numbers … 7-20
TCP/UDP
monitoring packets to closed ports … 8-33
test …4-18
TLS
See RADIUS.
troubleshooting
authentication via Telnet … 4-18
authorized IP managers … 12-13
trunk
filter, source-port … 9-2, 9-17
LACP, 802.1X not allowed … 10-19
See also LACP.
trusted port
defined … 8-18
enabling … 8-18
trusted ports …8-6
enabling snooping … 8-8