Reference Guide

Table Of Contents
Influencing RSTP Root Selection................................................................................................................................ 787
Configuring an EdgePort............................................................................................................................................... 787
Configuring Fast Hellos for Link State Detection................................................................................................... 788
Chapter 49: Software-Defined Networking (SDN)..................................................................... 789
Chapter 50: Security................................................................................................................. 790
AAA Accounting.............................................................................................................................................................. 790
Configuration Task List for AAA Accounting......................................................................................................790
RADIUS Accounting..................................................................................................................................................792
AAA Authentication.........................................................................................................................................................797
Configuration Task List for AAA Authentication................................................................................................797
Obscuring Passwords and Keys.................................................................................................................................. 800
AAA Authorization.......................................................................................................................................................... 800
Privilege Levels Overview.......................................................................................................................................800
Configuration Task List for Privilege Levels........................................................................................................801
RADIUS..............................................................................................................................................................................804
RADIUS Authentication........................................................................................................................................... 805
Configuration Task List for RADIUS.....................................................................................................................806
Support for Change of Authorization and Disconnect Messages packets................................................. 808
TACACS+...........................................................................................................................................................................818
Configuration Task List for TACACS+..................................................................................................................818
TACACS+ Remote Authentication........................................................................................................................820
Command Authorization...........................................................................................................................................821
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................... 821
Enabling SCP and SSH................................................................................................................................................... 821
Using SCP with SSH to Copy a Software Image.............................................................................................. 822
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 823
Configuring When to Re-generate an SSH Key ............................................................................................... 823
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 823
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 824
Configuring the HMAC Algorithm for the SSH Client......................................................................................824
Configuring the SSH Server Cipher List..............................................................................................................825
Configuring the SSH Client Cipher List............................................................................................................... 825
Configuring DNS in the SSH Server.....................................................................................................................826
Secure Shell Authentication................................................................................................................................... 826
Troubleshooting SSH............................................................................................................................................... 829
Telnet.................................................................................................................................................................................829
VTY Line and Access-Class Configuration................................................................................................................829
VTY Line Local Authentication and Authorization.............................................................................................829
VTY Line Remote Authentication and Authorization........................................................................................830
VTY MAC-SA Filter Support...................................................................................................................................830
Role-Based Access Control...........................................................................................................................................831
Overview of RBAC.....................................................................................................................................................831
User Roles...................................................................................................................................................................833
AAA Authentication and Authorization for Roles.............................................................................................. 836
Role Accounting........................................................................................................................................................ 839
Display Information About User Roles..................................................................................................................840
Two Factor Authentication (2FA)............................................................................................................................... 841
Contents
23