Contents
* - 3 - A - C - D - E - F - G - H - I - L - M - N - O - P - R - S - T - U - V - W
Index
*
* (asterisk)
port security wildcard* (asterisk)
port security wildcards
1
3
3DES encryption
A
AAA
configuring accounting services
1 2
displaying error-enabled status
1
distributing with CFS (procedure)
1 2
enabling server distribution
1 2
local servicesAAA
starting a distribution sessionTACACS+
starting a distribution session
1
AAA authentication
enabling default user roles
1
AAA servers
Access Control Lists. See IPv4-ACLs\
1
accounting
administrator passwords
Advanced Encrypted Standard encryption. See AES encryption
1
AES encryption
AES-XCBC-MAC
authentication
C
CAs
certificate download example
1
deleting digital certificates
1
displaying configuration
1
enrollment using cut-and-paste
1
certificate authorities. See CAs
1
certificate revocation lists. See CRLs
1
Cisco Access Control Server. See Cisco ACS
1
Cisco ACS
configuring for TACACS+
1
Cisco vendor ID
cisco-av-pair
common roles
common users
CRLs
configuring revocation checking methods
1
crypto IPv4-ACLs
configuration guidelines
1
creating crypto map entries
1
crypto map entries
configuring global lifetime values
1
crypto map sets
crypto maps
configuration guidelines
1
configuring autopeer option
1
configuring perfect forward secrecy
1
perfect forward secrecy
1
SA lifetime negotiations
1
D
Data Encryption Standard encryption. See DES encryption
1
DES encryption
DH
DHCHAP
AAA authenticationDHCHAP
configuring AAA authentication
1
compatibility with other SAN-OS features
1
displaying security information
1
passwords for local switches
1
passwords for remote devices
1
See also FC-SP[DHCHAP
Diffie-Hellman Challenge Handshake Authentication Protocol. See DHCHAP
1
Diffie-Hellman protocol. See DH
1
digital certificates
generating requests for identity certificates
1
installing identity certificates
1
requesting identity certificate example
1
digital signature algorithm. See DSA key pairs
1
dsa key pairs
generatingDSA key-pairs
E
E ports
fabric binding checking
1
EFMD
encrypted passwords
Exchange Fabric Membership Data. See EFMD
1
F
fabric binding
compatibility with DHCHAP
1
port security comparison
1
verifying configuration
1
fabric security
FC-SP
See also DHCHAP[FC-SP
FCIP
compatibility with DHCHAP
1
sample IPsec configuration
1
Federal Information Processing Standards. See FIPS
1
Fibre Channel
sWWNs for fabric binding
1
Fibre Channel Security Protocol. See FC-SP
1
FICON
fabric binding requirements
1
sWWNs for fabric binding
1
configuration guidelines
1
G
global keys
H
high availability
compatibility with DHCHAP
1
host keys
host names
configuring for digital certificates
1
I
ICMP packets
IDs
IKE
algorithms for authentication
1
default settingsdigital certificates
displaying configurations
1
transforms for encryption
1
IKE domains
IKE initiators
displaying configuration
1
IKE peers
configuring keepalive times
1
displaying keepalive configuration
1
IKE policies
configuring lifetime associations
1
configuring negotiation parameters
1
displaying current policies
1
IKE tunnels
Internet Key Exchange. See IKE
1
IP domain names
configuring for digital certificates
1
IP filters
IPsec
algorithms for authentication
1
digital certificate support
1 2
displaying configurations
1
fabric setup requirements
1
sample FCIP configuration
1
sample iSCSI configuration
1
transforms for encryption
1
IPv4-ACLs
applying to interfaces
1 2 3
configuration guidelines
1
displaying configuration
1
verifying interface configuration
1
iSCSI
sample IPsec configuration
1
L
logins
M
MD5 authentication
Message Authentication Code using AES. See AES-XCBC-MAC
1
Message Digest 5. See MD5 authentication
1
Microsoft Challenge Handshake Authentication Protocol. See MSCHAP
1
MSCHAP
N
network administrators
network operators
O
Open UDP and TCP Ports on Cisco MDS 9000 Series Platforms
1
P
passwords
persistent domain ID
PKI
port security
adding authorized pairs
1
cleaning up databasesport security databases
compatibility with DHCHAP
1
configuration guidelines
1
configuring CFS distribution
1 2
copying databasesport security databases
data scenariosport security databases
database interactionsport security databases
database merge guidelinesport security databases
deleting databasesport security databases
displaying configuration
1 2
displaying configurationport security
displaying configuration
1 2
fabric binding comparison
1
manual configuration guidelinesport security databases
manual configuration guidelines
1
unauthorized accesses preventedport security
preventing unauthorized accesses
1
port security auto-learning
distributing configuration
1
guidelines for configuring with CFS
1
port security databases
displaying configuration
1 2
PortChannels
compatibility with DHCHAP
1
preshared keys
profiles
Public Key Infrastructure. See PKI
1
R
RADIUS
clearing configuration distribution sessions
1
configuring server groups
1
configuring server monitoring parameters
1
configuring test idle timer
1
configuring test user name
1
discarding configuration distribution changes
1 2
displaying configured parameters
1
enabling configuration distribution
1 2
sending test messages for monitoring
1
specifying server timeout
1
starting a distribution session
1
role databases
clearing distribution sessions
1
committing changes to fabric
1
discarding database changes
1
viewing with Fabric Manager
1
roles
distributing configurations
1 2
See also command roles[roles
roles database
roles databases
rsa key pairs
RSA key-pairs
displaying configuration
1
rules
S
SAs
displaying global lifetime values
1
establishing between IPsec peers
1
security
security associations. See SAs
1
security control
server groups
SHA-1
SNMP
SNMPv3
specifying cisco-av-pair
1
SSH
digital certificate authentication
1
generating server key-pairs
1 2
overwriting server key-pairs
1
SSH clients
support on NX-OS devices
1
SSH key pairs
SSH login attempts
SSH servers
support on NX-OS devices
1
switch security
sWWNs
configuring for fabric binding
1 2
T
TACACS+
clearing configuration distribution sessions
1
configuring server groups
1
discarding configuration distribution changes
1 2
enabling configuration distribution
1 2
sending test messages for monitoring
1
setting default server timeout
1
setting global secret keys
1
setting server addresses
1 2
setting server monitoring parameters
1
specifying server at login
1
TCP ports
TE ports
fabric binding checking
1
Telnet
Telnet servers
support on NX-OS devices
1
transform sets
creating crypto map entries
1
Triple DES. See 3DEC encryption
1
trust points
saving configuration across reboots
1
TrustSec FC Link Encryption
1
Security Association Parameters
1
U
UDP ports
user accounts
password characteristics
1
user IDs
user profiles
users
displaying account information
1
logging out other users
1
V
vendor-specific attributes. See VSAs
1
VSAN policies
licensingVSANs
VSANs
compatibility with DHCHAP
1
VSAs
communicating attributes
1
W
WWNs