Addendum
tacacs-server key..............................................................................................................................232
timeout login response.....................................................................................................................233
Understanding Banner Settings........................................................................................................233
AAA Authentication...........................................................................................................................234
Configuration Task List for AAA Authentication........................................................................ 234
RADIUS.............................................................................................................................................. 236
RADIUS Authentication and Authorization.................................................................................237
Configuration Task List for RADIUS............................................................................................238
TACACS+...........................................................................................................................................241
Configuration Task List for TACACS+........................................................................................ 241
TACACS+ Remote Authentication and Authorization...............................................................242
Command Authorization............................................................................................................244
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 244
Enabling SCP and SSH......................................................................................................................244
Using SCP with SSH to Copy a Software Image........................................................................245
Secure Shell Authentication....................................................................................................... 246
Troubleshooting SSH..................................................................................................................248
Telnet................................................................................................................................................ 249
VTY Line and Access-Class Configuration...................................................................................... 249
VTY Line Local Authentication and Authorization.....................................................................249
VTY Line Remote Authentication and Authorization.................................................................250
VTY MAC-SA Filter Support.........................................................................................................251
17 Simple Network Management Protocol (SNMP)........................................ 253
SNMPv3 Compliance With FIPS........................................................................................................253
snmp-server user (for AES128-CFB Encryption)............................................................................. 254
Z-Series S4810 S4820T S6000 MXL I/O Aggregator................................................................ 254
18 Stacking.................................................................................................................257
Configuring the Uplink Speed of Interfaces as 40 Gigabit Ethernet...............................................257
stack-unit iom-mode uplink-speed.................................................................................................258
show system stack-unit iom-uplink-speed.....................................................................................259
stack-unit priority............................................................................................................................. 260
stack-unit renumber.........................................................................................................................260
19 Virtual Link Trunking (VLT).............................................................................. 263
Specifying VLT Nodes in a PVLAN....................................................................................................263
Association of VLTi as a Member of a PVLAN............................................................................264
MAC Synchronization for VLT Nodes in a PVLAN..................................................................... 264
PVLAN Operations When One VLT Peer is Down..................................................................... 265
PVLAN Operations When a VLT Peer is Restarted.....................................................................265
Interoperation of VLT Nodes in a PVLAN with ARP Requests...................................................265