White Papers

Table Of Contents
Configuring an EdgePort...............................................................................................................................................785
Configuring Fast Hellos for Link State Detection................................................................................................... 786
Chapter 49: Software-Defined Networking (SDN)..................................................................... 787
Chapter 50: Security................................................................................................................. 788
AAA Accounting...............................................................................................................................................................788
Configuration Task List for AAA Accounting......................................................................................................788
RADIUS Accounting..................................................................................................................................................790
AAA Authentication........................................................................................................................................................ 795
Configuration Task List for AAA Authentication............................................................................................... 795
Obscuring Passwords and Keys.................................................................................................................................. 798
AAA Authorization...........................................................................................................................................................798
Privilege Levels Overview....................................................................................................................................... 798
Configuration Task List for Privilege Levels....................................................................................................... 799
RADIUS..............................................................................................................................................................................802
RADIUS Authentication........................................................................................................................................... 803
Configuration Task List for RADIUS.....................................................................................................................804
Support for Change of Authorization and Disconnect Messages packets.................................................806
TACACS+...........................................................................................................................................................................816
Configuration Task List for TACACS+..................................................................................................................816
TACACS+ Remote Authentication........................................................................................................................ 818
Command Authorization...........................................................................................................................................819
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................... 819
Enabling SCP and SSH................................................................................................................................................... 819
Using SCP with SSH to Copy a Software Image.............................................................................................. 820
Removing the RSA Host Keys and Zeroizing Storage ..................................................................................... 821
Configuring When to Re-generate an SSH Key ................................................................................................ 821
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 821
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 822
Configuring the HMAC Algorithm for the SSH Client......................................................................................822
Configuring the SSH Server Cipher List..............................................................................................................823
Configuring the SSH Client Cipher List............................................................................................................... 823
Configuring DNS in the SSH Server.....................................................................................................................824
Secure Shell Authentication................................................................................................................................... 824
Troubleshooting SSH................................................................................................................................................827
Telnet................................................................................................................................................................................. 827
VTY Line and Access-Class Configuration................................................................................................................827
VTY Line Local Authentication and Authorization.............................................................................................827
VTY Line Remote Authentication and Authorization........................................................................................828
VTY MAC-SA Filter Support...................................................................................................................................828
Role-Based Access Control..........................................................................................................................................829
Overview of RBAC....................................................................................................................................................829
User Roles....................................................................................................................................................................831
AAA Authentication and Authorization for Roles.............................................................................................. 834
Role Accounting.........................................................................................................................................................837
Display Information About User Roles..................................................................................................................838
Two Factor Authentication (2FA)...............................................................................................................................839
Handling Access-Challenge Message...................................................................................................................839
Contents
23