Concept Guide
Conguring an EdgePort.............................................................................................................................................. 839
Conguring Fast Hellos for Link State Detection...................................................................................................... 840
48 Software-Dened Networking (SDN).......................................................................................................841
49 Security...................................................................................................................................................842
AAA Accounting.............................................................................................................................................................842
Conguration Task List for AAA Accounting........................................................................................................ 842
AAA Authentication.......................................................................................................................................................844
Conguration Task List for AAA Authentication.................................................................................................. 845
Obscuring Passwords and Keys...................................................................................................................................848
AAA Authorization......................................................................................................................................................... 848
Privilege Levels Overview.......................................................................................................................................848
Conguration Task List for Privilege Levels..........................................................................................................849
RADIUS........................................................................................................................................................................... 853
RADIUS Authentication...........................................................................................................................................853
Conguration Task List for RADIUS...................................................................................................................... 854
Support for Change of Authorization and Disconnect Messages packets...................................................... 858
TACACS+........................................................................................................................................................................869
Conguration Task List for TACACS+...................................................................................................................869
TACACS+ Remote Authentication..........................................................................................................................871
Command Authorization......................................................................................................................................... 872
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 872
Enabling SCP and SSH..................................................................................................................................................872
Using SCP with SSH to Copy a Software Image.................................................................................................873
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................874
Conguring When to Re-generate an SSH Key .................................................................................................. 874
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 875
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 875
Conguring the SSH Server Cipher List............................................................................................................... 876
Conguring DNS in the SSH Server......................................................................................................................876
Secure Shell Authentication....................................................................................................................................877
Troubleshooting SSH............................................................................................................................................... 879
Telnet............................................................................................................................................................................... 879
VTY Line and Access-Class Conguration................................................................................................................. 880
VTY Line Local Authentication and Authorization............................................................................................... 880
VTY Line Remote Authentication and Authorization........................................................................................... 881
VTY MAC-SA Filter Support................................................................................................................................... 881
Role-Based Access Control...........................................................................................................................................881
Overview of RBAC.................................................................................................................................................. 882
User Roles.................................................................................................................................................................884
AAA Authentication and Authorization for Roles.................................................................................................887
Role Accounting.......................................................................................................................................................890
Display Information About User Roles....................................................................................................................891
Two Factor Authentication (2FA)................................................................................................................................ 892
Handling Access-Challenge Message................................................................................................................... 892
26
Contents