Users Guide
Role Accounting.......................................................................................................................................................868
Display Information About User Roles.................................................................................................................. 869
AAA Accounting.............................................................................................................................................................870
Configuration Task List for AAA Accounting....................................................................................................... 870
AAA Authentication....................................................................................................................................................... 872
Configuration Task List for AAA Authentication..................................................................................................872
AAA Authorization......................................................................................................................................................... 876
Privilege Levels Overview.......................................................................................................................................876
Configuration Task List for Privilege Levels.........................................................................................................876
RADIUS............................................................................................................................................................................881
RADIUS Authentication and Authorization........................................................................................................... 881
Configuration Task List for RADIUS......................................................................................................................882
TACACS+....................................................................................................................................................................... 885
Configuration Task List for TACACS+..................................................................................................................885
TACACS+ Remote Authentication and Authorization........................................................................................887
Command Authorization.........................................................................................................................................888
Protection from TCP Tiny and Overlapping Fragment Attacks.............................................................................. 888
Enabling SCP and SSH................................................................................................................................................. 888
Using SCP with SSH to Copy a Software Image................................................................................................889
Removing the RSA Host Keys and Zeroizing Storage .......................................................................................890
Configuring When to Re-generate an SSH Key .................................................................................................890
Configuring the SSH Server Cipher List............................................................................................................... 891
Configuring the HMAC Algorithm for the SSH Server........................................................................................891
Configuring the HMAC Algorithm for the SSH Client........................................................................................ 892
Configuring the SSH Server Cipher List...............................................................................................................892
Configuring the SSH Client Cipher List................................................................................................................ 893
Secure Shell Authentication...................................................................................................................................893
Troubleshooting SSH.............................................................................................................................................. 896
Telnet.............................................................................................................................................................................. 896
VTY Line and Access-Class Configuration................................................................................................................. 897
VTY Line Local Authentication and Authorization...............................................................................................897
VTY Line Remote Authentication and Authorization.......................................................................................... 898
VTY MAC-SA Filter Support.................................................................................................................................. 898
Two Factor Authentication (2FA)...............................................................................................................................898
Handling Access-Challenge Message...................................................................................................................899
Configuring Challenge Response Authentication for SSHv2.............................................................................899
SMS-OTP Mechanism............................................................................................................................................899
Configuring the System to Drop Certain ICMP Reply Messages........................................................................... 900
50 Service Provider Bridging........................................................................................................................902
VLAN Stacking...............................................................................................................................................................902
Important Points to Remember.............................................................................................................................903
Configure VLAN Stacking...................................................................................................................................... 904
Creating Access and Trunk Ports......................................................................................................................... 904
Enable VLAN-Stacking for a VLAN.......................................................................................................................905
Configuring the Protocol Type Value for the Outer VLAN Tag........................................................................ 905
Contents
27