Security Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
Index
Downloads: The complete bookPDF (PDF - 7.72MB) | The complete bookePub (ePub - 1.49MB) | Feedback

Contents

8 - < - A - B - C - D - E - F - H - I - K - L - M - N - O - P - R - S - T - U - V - W - Z -

Index

8

802.1x 1

<

<$nopage>HTTP over SSL
see HTTPS 1 2
<$nopage>Secure Copy Protocol 1

A

access control entries
See ACEs 1
access groups
Layer 3 1
access groups, applying IPv4 ACLs to interfaces 1
access lists
See ACLs 1
accounting 1 2
with RADIUS 1
with TACACS+ 1 2
accounting, defined 1
ACEs
Ethernet 1
IP 1
ACLs
applying
on bridged packets 1
on multicast packets 1
on routed packets 1
on switched packets 1
time ranges to 1
to an interface 1
comments in 1
compiling 1
defined 1
examples of 1
extended IPv4
creating 1
matching criteria 1
interface 1
IP
implicit deny 1
implicit masks 1
matching criteria 1
undefined 1
IPv4
applying to interfaces 1
creating 1
interfaces 1
matching criteria 1
numbers 1
terminal lines, setting on 1
unsupported features 1
Layer 4 information in 1
logging messages 1
matching 1
monitoring 1
port 1
precedence of 1
router 1
router ACLs and VLAN map configuration guidelines 1
standard IPv4
creating 1
matching criteria 1
support in hardware 1
time ranges to 1
types supported 1
unsupported features
IPv4 1
using router ACLs with VLAN maps 1
VLAN maps
configuration guidelines 1
configuring 1
adding 1 2
and SSH 1
attributes
vendor-proprietary 1
vendor-specific 1
attributes, RADIUS
vendor-proprietary 1 2
vendor-specific 1
authenticating to
boundary switch 1
KDC 1
network services 1
authentication 1
local mode with AAA 1
RADIUS
key 1
login 1
TACACS+
defined 1
key 1
login 1
authentication key 1
authentication, defined 1
authorization 1 2
with RADIUS 1
with TACACS+ 1 2
authorization, defined 1
automatic 1

B

Berkeley r-tools replacement 1
binding configuration
automatic 1
manual 1
binding database
address, DHCP server
See DHCP, Cisco IOS server database 1
binding table 1
bindings
address, Cisco IOS DHCP server 1
IP source guard 1
boundary switch 1
bridged packets, ACLs on 1

C

CA trustpoint
configuring 1
defined 1
changing the default for lines 1
CipherSuites 1
Cisco IOS DHCP server
See DHCP, Cisco IOS DHCP server 1
CoA Request Commands 1
commands, setting privilege levels 1
communication, global 1 2
communication, per-server 1
configuration examples 1
Configuration Examples for Setting Passwords and Privilege Levels command 1
configuration files
password recovery disable considerations 1
configuration guidelines 1 2
configuring 1 2 3 4 5
accounting 1 2
authentication 1
authentication key 1
authorization 1 2
communication, global 1 2
communication, per-server 1
login authentication 1
multiple UDP ports 1
configuring a secure HTTP client 1
configuring a secure HTTP server 1
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication: Example command 1
Configuring the Switch to Use Vendor-Specific RADIUS Attributes: Examples command 1
credentials 1
customizeable web pages, web-based authentication 1

D

default configuration 1 2 3
password and privilege level 1
RADIUS 1
SSL 1
TACACS+ 1
default web-based authentication configuration
802.1X 1
defined 1 2
defining AAA server groups 1
described 1 2 3 4
Detect and Report Adhoc Networks parameter 1
DHCP
enabling
relay agent 1
server 1
DHCP option 82
displaying 1
forwarding address, specifying 1
helper address 1
overview 1
DHCP server port-based address allocation
default configuration 1
enabling 1
DHCP snooping 1
accepting untrusted packets form edge switch 1
option 82 data insertion 1
trusted interface 1
untrusted messages 1
DHCP snooping binding database
adding bindings 1
binding file
format 1
location 1
configuration guidelines 1
configuring 1
described 1
enabling 1
disabling recovery of 1
displaying 1

E

enable 1
enable password 1
enable secret 1
enable secret password 1
enabling 1 2
encrypting 1
encryption for passwords 1
encryption methods 1
encryption, CipherSuite 1
EtherChannels 1
Examples for controlling switch access with RADIUS 1
exiting 1
Expiration Timeout for Rogue AP and Rogue Client Entries parameter 1

F

filtering
non-IP traffic 1
filters, IP
See ACLs, IP [filters
IP 1

H

HTTP secure server 1 2
HTTPS
configuring 1
described 1 2
self-signed certificate 1

I

ICMP
unreachable messages 1
unreachables and ACLs 1
Identifying the RADIUS Server Host: Examples command 1
identifying the server 1 2
IP ACLs
named 1
IP source guard 1 2
802.1x 1
binding configuration
automatic 1
manual 1
binding table 1
configuration guidelines 1
described 1
DHCP snooping 1
enabling 1 2
EtherChannels 1
port security 1
routed ports 1
static bindings
adding 1 2
static hosts 1
TCAM entries 1
trunk interfaces 1
VRF 1
IPv4 ACLs
applying to interfaces 1
extended, creating 1
interfaces 1
named 1
standard, creating 1

K

KDC 1 2
described 1
See also Kerberos<$nopage>[KDC
zzz] 1
Kerberos
authenticating to
boundary switch 1
KDC 1
network services 1
configuration examples 1
configuring 1
credentials 1
described 1
KDC 1
operation 1
realm 1
server 1
switch as trusted third party 1
terms 1
TGT 1
tickets 1
key 1 2
key distribution center
See KDC<$nopage> 1

L

limiting the services to the user 1 2
local mode with AAA 1
logging into 1
logging messages, ACL 1
login 1 2
login authentication 1
with RADIUS 1
with TACACS+ 1

M

MAC extended access lists
applying to Layer 2 interfaces 1 2
manual 1
monitoring 1
access groups 1
IPv4 ACL configuration 1
VLAN
filters 1
maps 1
multicast packets
ACLs on 1
multiple UDP ports 1

N

network services 1
non-IP traffic filtering 1

O

operation 1
operation of 1 2
overview 1 2 3 4

P

password and privilege level 1
password recovery disable considerations 1
passwords
default configuration 1
disabling recovery of 1
encrypting 1
overview 1
setting
enable 1
enable secret 1
Telnet 1
with usernames 1
persistent self-signed certificate 1
port ACLs
defined 1
types of 1
port security 1
port-based authentication
configuration guidelines 1
configuring
RADIUS server 1
RADIUS server parameters on the switch 1
default configuration 1
device roles 1
displaying statistics 1
enabling
802.1X authentication 1
switch
as proxy 1
preventing unauthorized access 1
privilege levels
changing the default for lines 1
exiting 1
logging into 1
overview 1
setting a command with 1
Protecting Enable and Enable Secret Passwords with Encryption: Example command 1

R

RADIUS 1 2
attributes
vendor-proprietary 1 2
vendor-specific 1
configuring
accounting 1
authentication 1
authorization 1
communication, global 1 2
communication, per-server 1
multiple UDP ports 1
default configuration 1
defining AAA server groups 1
identifying the server 1
key 1
limiting the services to the user 1
login 1
operation of 1
overview 1
suggested network environments 1
tracking services accessed by user 1
RADIUS Change of Authorization 1
realm 1
Remote Authentication Dial-In User Service
See RADIUS 1
restricting access
overview 1
RADIUS 1
TACACS+ 1
RFC 5176 Compliance 1
RLDP. See <Default Para Font>Rogue Location Discovery Protocol (RLDP) 1
rogue access points
automatically containing
using the GUI 1
Rogue Detection parameter 1
Rogue Location Discovery Protocol parameter 1
Rogue Policies page 1
routed packets, ACLs on 1
routed ports 1
router ACLs
defined 1
types of 1

S

SCP
and SSH 1
configuring 1
secure HTTP client
configuring 1
displaying 1
secure HTTP server
configuring 1
displaying 1
Secure Shell 1
Secure Socket Layer
See SSL<$nopage> 1
See also Kerberos<$nopage>[KDC
zzz] 1
see HTTPS 1 2
See KDC<$nopage> 1
See RADIUS 1
See SCP 1
See SSL<$nopage> 1
See TACACS+<$nopage> 1
self-signed certificate 1
server 1
setting
enable 1
enable secret 1
Telnet 1
with usernames 1
setting a command with 1
setting a password 1
Setting a Telnet Password for a Terminal Line: Example command 1
Setting or Changing a Static Enable Password: Example command 1
Setting the Privilege Level for a Command: Example command 1
show access-lists hw-summary command 1
SSH 1
encryption methods 1
user authentication methods, supported 1
SSH server 1
SSL 1
configuration guidelines 1
configuring a secure HTTP client 1
configuring a secure HTTP server 1
described 1
monitoring 1
stack changes, effects on
ACL configuration 1
static bindings
adding 1 2
static hosts 1
statistics
802.1X 1
suggested network environments 1
SVIs
and router ACLs 1
Switch Access
displaying 1
switch as trusted third party 1
switched packets, ACLs on 1

T

TACACS+ 1 2
accounting, defined 1
authentication, defined 1
authorization, defined 1
configuring
accounting 1
authentication key 1
authorization 1
login authentication 1
default configuration 1
defined 1
displaying 1
identifying the server 1
key 1
limiting the services to the user 1
login 1
operation of 1
overview 1
tracking services accessed by user 1
TCAM entries 1
Telnet 1
setting a password 1
temporary self-signed certificate 1
Terminal Access Controller Access Control System Plus
See TACACS+<$nopage> 1
terminal lines, setting a password 1
terms 1
TGT 1
tickets 1
time ranges in ACLs 1 2
time-range command 1
tracking services accessed by user 1 2
traffic
fragmented 1 2
trunk interfaces 1
trustpoints, CA 1

U

user authentication methods, supported 1
username-based authentication 1

V

Validate Rogue Clients Against AAA parameter 1
vendor-proprietary 1
vendor-specific 1
VLAN ACLs
See VLAN maps 1
VLAN map entries, order of 1
VLAN maps
applying 1
common uses for 1
configuration guidelines 1
configuring 1
creating 1
defined 1
denying access to a server example 1
denying and permitting packets 1 2
displaying 1
VRF 1

W

web-based authentication
customizeable web pages 1
description 1
web-based authentication, interactions with other features 1
with RADIUS 1 2 3
with TACACS+ 1 2 3 4
with usernames 1

Z

zzz] 1