Users Guide

Table Of Contents
Configuration Task List for AAA Accounting......................................................................................................735
RADIUS Accounting.................................................................................................................................................. 737
AAA Authentication........................................................................................................................................................ 742
Configuration Task List for AAA Authentication................................................................................................742
Obscuring Passwords and Keys.................................................................................................................................. 745
AAA Authorization...........................................................................................................................................................745
Privilege Levels Overview....................................................................................................................................... 745
Configuration Task List for Privilege Levels....................................................................................................... 746
RADIUS..............................................................................................................................................................................749
RADIUS Authentication........................................................................................................................................... 750
Configuration Task List for RADIUS......................................................................................................................751
TACACS+..........................................................................................................................................................................754
Configuration Task List for TACACS+................................................................................................................. 754
TACACS+ Remote Authentication........................................................................................................................755
Command Authorization..........................................................................................................................................756
Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................756
Enabling SCP and SSH...................................................................................................................................................757
Using SCP with SSH to Copy a Software Image...............................................................................................757
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 758
Configuring When to Re-generate an SSH Key ............................................................................................... 758
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 759
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 759
Configuring the HMAC Algorithm for the SSH Client......................................................................................760
Configuring the SSH Server Cipher List..............................................................................................................760
Configuring the SSH Client Cipher List................................................................................................................ 761
Secure Shell Authentication.................................................................................................................................... 761
Troubleshooting SSH................................................................................................................................................764
Telnet................................................................................................................................................................................. 764
VTY Line and Access-Class Configuration................................................................................................................764
VTY Line Local Authentication and Authorization.............................................................................................764
VTY Line Remote Authentication and Authorization........................................................................................765
VTY MAC-SA Filter Support...................................................................................................................................765
Role-Based Access Control.......................................................................................................................................... 766
Overview of RBAC....................................................................................................................................................766
User Roles...................................................................................................................................................................768
AAA Authentication and Authorization for Roles............................................................................................... 771
Role Accounting.........................................................................................................................................................774
Display Information About User Roles..................................................................................................................775
Two Factor Authentication (2FA)...............................................................................................................................776
Handling Access-Challenge Message................................................................................................................... 776
Configuring Challenge Response Authentication for SSHv2..........................................................................776
SMS-OTP Mechanism.............................................................................................................................................. 777
Configuring the System to Drop Certain ICMP Reply Messages........................................................................ 777
SSH Lockout Settings....................................................................................................................................................779
Chapter 47: Service Provider Bridging.......................................................................................780
VLAN Stacking.................................................................................................................................................................780
Configure VLAN Stacking........................................................................................................................................ 781
Creating Access and Trunk Ports..........................................................................................................................782
Enable VLAN-Stacking for a VLAN.......................................................................................................................782
22
Contents