Administrator Guide
Influencing RSTP Root Selection.................................................................................................................................... 744
Configuring an EdgePort.................................................................................................................................................. 744
Configuring Fast Hellos for Link State Detection..........................................................................................................745
49 Software-Defined Networking (SDN)....................................................................................... 747
50 Security.................................................................................................................................748
AAA Accounting.................................................................................................................................................................748
Configuration Task List for AAA Accounting........................................................................................................... 748
RADIUS Accounting.................................................................................................................................................... 750
AAA Authentication...........................................................................................................................................................755
Configuration Task List for AAA Authentication..................................................................................................... 755
Obscuring Passwords and Keys...................................................................................................................................... 757
AAA Authorization.............................................................................................................................................................758
Privilege Levels Overview...........................................................................................................................................758
Configuration Task List for Privilege Levels.............................................................................................................758
RADIUS...............................................................................................................................................................................762
RADIUS Authentication...............................................................................................................................................762
Configuration Task List for RADIUS..........................................................................................................................763
Support for Change of Authorization and Disconnect Messages packets..........................................................766
TACACS+........................................................................................................................................................................... 775
Configuration Task List for TACACS+......................................................................................................................775
TACACS+ Remote Authentication............................................................................................................................776
Command Authorization............................................................................................................................................. 777
Protection from TCP Tiny and Overlapping Fragment Attacks.................................................................................. 778
Enabling SCP and SSH..................................................................................................................................................... 778
Using SCP with SSH to Copy a Software Image.................................................................................................... 778
Removing the RSA Host Keys and Zeroizing Storage ...........................................................................................779
Configuring When to Re-generate an SSH Key ..................................................................................................... 779
Configuring the SSH Server Key Exchange Algorithm...........................................................................................780
Configuring the HMAC Algorithm for the SSH Server...........................................................................................780
Configuring the HMAC Algorithm for the SSH Client............................................................................................. 781
Configuring the SSH Server Cipher List....................................................................................................................781
Configuring the SSH Client Cipher List.................................................................................................................... 782
Configuring DNS in the SSH Server......................................................................................................................... 782
Secure Shell Authentication....................................................................................................................................... 782
Troubleshooting SSH.................................................................................................................................................. 784
Telnet..................................................................................................................................................................................785
VTY Line and Access-Class Configuration.....................................................................................................................785
VTY Line Local Authentication and Authorization...................................................................................................785
VTY Line Remote Authentication and Authorization.............................................................................................. 786
VTY MAC-SA Filter Support...................................................................................................................................... 786
Role-Based Access Control............................................................................................................................................. 786
Overview of RBAC...................................................................................................................................................... 787
User Roles.................................................................................................................................................................... 789
AAA Authentication and Authorization for Roles.................................................................................................... 792
Role Accounting...........................................................................................................................................................794
Display Information About User Roles...................................................................................................................... 795
Two Factor Authentication (2FA)...................................................................................................................................796
Contents
23