Setup Guide
Enabling SNMP Traps for Root Elections and Topology Changes.................................................................... 699
Modifying Interface Parameters.................................................................................................................................. 699
Enabling SNMP Traps for Root Elections and Topology Changes.......................................................................... 699
Inuencing RSTP Root Selection.................................................................................................................................699
Conguring an EdgePort.............................................................................................................................................. 700
Conguring Fast Hellos for Link State Detection....................................................................................................... 701
43 Software-Dened Networking (SDN)...................................................................................................... 702
44 Security................................................................................................................................................... 703
AAA Accounting.............................................................................................................................................................703
Conguration Task List for AAA Accounting........................................................................................................ 703
AAA Authentication.......................................................................................................................................................705
Conguration Task List for AAA Authentication.................................................................................................. 706
Obscuring Passwords and Keys...................................................................................................................................709
AAA Authorization......................................................................................................................................................... 709
Privilege Levels Overview.......................................................................................................................................709
Conguration Task List for Privilege Levels...........................................................................................................710
RADIUS............................................................................................................................................................................ 714
RADIUS Authentication............................................................................................................................................714
Conguration Task List for RADIUS....................................................................................................................... 715
Support for Change of Authorization and Disconnect Messages packets....................................................... 719
TACACS+........................................................................................................................................................................ 728
Conguration Task List for TACACS+................................................................................................................... 728
TACACS+ Remote Authentication.........................................................................................................................730
Command Authorization..........................................................................................................................................731
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................ 731
Enabling SCP and SSH.................................................................................................................................................. 731
Using SCP with SSH to Copy a Software Image.................................................................................................732
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................733
Conguring When to Re-generate an SSH Key ..................................................................................................733
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 734
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 734
Conguring the HMAC Algorithm for the SSH Client.........................................................................................735
Conguring the SSH Server Cipher List............................................................................................................... 735
Conguring the SSH Client Cipher List.................................................................................................................736
Secure Shell Authentication................................................................................................................................... 736
Troubleshooting SSH............................................................................................................................................... 739
Telnet...............................................................................................................................................................................739
VTY Line and Access-Class Conguration................................................................................................................. 739
VTY Line Local Authentication and Authorization............................................................................................... 740
VTY Line Remote Authentication and Authorization...........................................................................................740
VTY MAC-SA Filter Support................................................................................................................................... 741
Role-Based Access Control........................................................................................................................................... 741
Overview of RBAC...................................................................................................................................................742
User Roles.................................................................................................................................................................744
Contents
23