White Papers

Table Of Contents
AAA Accounting...............................................................................................................................................................736
Configuration Task List for AAA Accounting......................................................................................................736
RADIUS Accounting..................................................................................................................................................738
AAA Authentication........................................................................................................................................................ 743
Configuration Task List for AAA Authentication................................................................................................743
Obscuring Passwords and Keys...................................................................................................................................746
AAA Authorization...........................................................................................................................................................746
Privilege Levels Overview....................................................................................................................................... 746
Configuration Task List for Privilege Levels....................................................................................................... 747
RADIUS...............................................................................................................................................................................751
RADIUS Authentication............................................................................................................................................ 751
Configuration Task List for RADIUS..................................................................................................................... 752
TACACS+..........................................................................................................................................................................755
Configuration Task List for TACACS+................................................................................................................. 755
TACACS+ Remote Authentication........................................................................................................................ 757
Command Authorization..........................................................................................................................................758
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................758
Enabling SCP and SSH.................................................................................................................................................. 758
Using SCP with SSH to Copy a Software Image.............................................................................................. 759
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 760
Configuring When to Re-generate an SSH Key ............................................................................................... 760
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 760
Configuring the HMAC Algorithm for the SSH Server..................................................................................... 761
Configuring the HMAC Algorithm for the SSH Client.......................................................................................761
Configuring the SSH Server Cipher List..............................................................................................................762
Configuring the SSH Client Cipher List............................................................................................................... 762
Secure Shell Authentication................................................................................................................................... 763
Troubleshooting SSH............................................................................................................................................... 765
Telnet.................................................................................................................................................................................765
VTY Line and Access-Class Configuration................................................................................................................766
VTY Line Local Authentication and Authorization.............................................................................................766
VTY Line Remote Authentication and Authorization........................................................................................ 767
VTY MAC-SA Filter Support...................................................................................................................................767
Support for Change of Authorization and Disconnect Messages packets....................................................... 767
Change of Authorization (CoA) packets............................................................................................................. 768
Disconnect Messages.............................................................................................................................................. 768
Attributes.................................................................................................................................................................... 768
Error-cause Values.....................................................................................................................................................771
CoA Packet Processing............................................................................................................................................ 771
CoA or DM Discard................................................................................................................................................... 772
Disconnect Message Processing........................................................................................................................... 772
Configuring DAC........................................................................................................................................................ 773
Configuring the port number.................................................................................................................................. 773
Configuring shared key............................................................................................................................................ 773
Disconnecting administrative users logged in through RADIUS.....................................................................773
Configuring CoA to bounce 802.1x enabled ports.............................................................................................774
Configuring CoA to re-authenticate 802.1x sessions....................................................................................... 774
Terminating the 802.1x user session.....................................................................................................................775
Disabling 802.1x enabled port.................................................................................................................................776
Important points to remember............................................................................................................................... 776
22
Contents