Setup Guide
Inuencing RSTP Root Selection.................................................................................................................................845
Conguring an EdgePort.............................................................................................................................................. 846
Conguring Fast Hellos for Link State Detection.......................................................................................................847
48 Software-Dened Networking (SDN)...................................................................................................... 848
49 Security...................................................................................................................................................849
AAA Accounting.............................................................................................................................................................849
Conguration Task List for AAA Accounting........................................................................................................849
RADIUS Accounting................................................................................................................................................. 851
AAA Authentication....................................................................................................................................................... 857
Conguration Task List for AAA Authentication.................................................................................................. 857
Obscuring Passwords and Keys...................................................................................................................................860
AAA Authorization.........................................................................................................................................................860
Privilege Levels Overview........................................................................................................................................861
Conguration Task List for Privilege Levels...........................................................................................................861
RADIUS...........................................................................................................................................................................865
RADIUS Authentication.......................................................................................................................................... 865
Conguration Task List for RADIUS.......................................................................................................................867
Support for Change of Authorization and Disconnect Messages packets.......................................................870
TACACS+.........................................................................................................................................................................881
Conguration Task List for TACACS+....................................................................................................................881
TACACS+ Remote Authentication.........................................................................................................................883
Command Authorization.........................................................................................................................................884
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 884
Enabling SCP and SSH................................................................................................................................................. 884
Using SCP with SSH to Copy a Software Image................................................................................................ 885
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 886
Conguring When to Re-generate an SSH Key ..................................................................................................886
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 887
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 887
Conguring the SSH Server Cipher List...............................................................................................................888
Conguring DNS in the SSH Server..................................................................................................................... 888
Secure Shell Authentication................................................................................................................................... 889
Troubleshooting SSH................................................................................................................................................891
Telnet...............................................................................................................................................................................892
VTY Line and Access-Class Conguration................................................................................................................. 892
VTY Line Local Authentication and Authorization............................................................................................... 892
VTY Line Remote Authentication and Authorization...........................................................................................893
VTY MAC-SA Filter Support.................................................................................................................................. 893
Role-Based Access Control..........................................................................................................................................894
Overview of RBAC.................................................................................................................................................. 894
User Roles................................................................................................................................................................ 896
AAA Authentication and Authorization for Roles................................................................................................ 900
Role Accounting.......................................................................................................................................................902
Display Information About User Roles...................................................................................................................903
26
Contents