Configuration manual
Contents
x
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 8-31
Configuring RADIUS Server Load Balancing 8-31
Displaying the RADIUS Configuration 8-32
Controlling Switch Access with Kerberos 8-32
Understanding Kerberos 8-32
Kerberos Operation 8-34
Authenticating to a Boundary Switch 8-35
Obtaining a TGT from a KDC 8-35
Authenticating to Network Services 8-35
Configuring Kerberos 8-35
Configuring the Switch for Local Authentication and Authorization 8-36
Configuring the Switch for Secure Shell 8-37
Understanding SSH 8-38
SSH Servers, Integrated Clients, and Supported Versions 8-38
Limitations 8-39
Configuring SSH 8-39
Configuration Guidelines 8-39
Setting Up the Switch to Run SSH 8-40
Configuring the SSH Server 8-41
Displaying the SSH Configuration and Status 8-42
Configuring the Switch for Secure Socket Layer HTTP 8-42
Understanding Secure HTTP Servers and Clients 8-42
Certificate Authority Trustpoints 8-43
CipherSuites 8-44
Configuring Secure HTTP Servers and Clients 8-45
Default SSL Configuration 8-45
SSL Configuration Guidelines 8-45
Configuring a CA Trustpoint 8-45
Configuring the Secure HTTP Server 8-46
Configuring the Secure HTTP Client 8-48
Displaying Secure HTTP Server and Client Status 8-48
Configuring the Switch for Secure Copy Protocol 8-48
Information About Secure Copy 8-49
CHAPTER
9 Configuring SDM Templates 9-1
Understanding the SDM Templates 9-1
Dual IPv4 and IPv6 SDM Templates 9-2
SDM Templates and Switch Stacks 9-3