Connectivity Guide

Table Of Contents
Configuring Fast Hellos for Link State Detection................................................................................................... 780
Chapter 49: Software-Defined Networking (SDN)......................................................................781
Chapter 50: Security................................................................................................................. 782
AAA Accounting...............................................................................................................................................................782
Configuration Task List for AAA Accounting......................................................................................................782
AAA Authentication........................................................................................................................................................ 784
Configuration Task List for AAA Authentication................................................................................................784
Obscuring Passwords and Keys...................................................................................................................................787
AAA Authorization...........................................................................................................................................................787
Privilege Levels Overview....................................................................................................................................... 787
Configuration Task List for Privilege Levels....................................................................................................... 788
RADIUS...............................................................................................................................................................................791
RADIUS Authentication............................................................................................................................................792
Configuration Task List for RADIUS..................................................................................................................... 793
Support for Change of Authorization and Disconnect Messages packets................................................. 795
TACACS+..........................................................................................................................................................................805
Configuration Task List for TACACS+.................................................................................................................805
TACACS+ Remote Authentication........................................................................................................................807
Command Authorization..........................................................................................................................................808
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................... 808
Enabling SCP and SSH.................................................................................................................................................. 808
Using SCP with SSH to Copy a Software Image.............................................................................................. 809
Removing the RSA Host Keys and Zeroizing Storage .....................................................................................810
Configuring When to Re-generate an SSH Key ................................................................................................ 810
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 810
Configuring the HMAC Algorithm for the SSH Server......................................................................................811
Configuring the HMAC Algorithm for the SSH Client....................................................................................... 811
Configuring the SSH Server Cipher List.............................................................................................................. 812
Configuring the SSH Client Cipher List................................................................................................................812
Configuring DNS in the SSH Server......................................................................................................................813
Secure Shell Authentication.................................................................................................................................... 813
Troubleshooting SSH................................................................................................................................................ 816
Telnet..................................................................................................................................................................................816
VTY Line and Access-Class Configuration................................................................................................................ 816
VTY Line Local Authentication and Authorization............................................................................................. 816
VTY Line Remote Authentication and Authorization.........................................................................................817
VTY MAC-SA Filter Support....................................................................................................................................817
Role-Based Access Control...........................................................................................................................................818
Overview of RBAC.....................................................................................................................................................818
User Roles...................................................................................................................................................................820
AAA Authentication and Authorization for Roles.............................................................................................. 823
Role Accounting........................................................................................................................................................ 826
Display Information About User Roles..................................................................................................................827
Two Factor Authentication (2FA)...............................................................................................................................828
Handling Access-Challenge Message...................................................................................................................828
Configuring Challenge Response Authentication for SSHv2..........................................................................828
SMS-OTP Mechanism............................................................................................................................................. 829
Contents
23