Administrator Guide

Conguring Interfaces for Layer 2 Mode....................................................................................................................788
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................790
Adding and Removing Interfaces........................................................................................................................... 792
Modifying Global Parameters................................................................................................................................. 792
Modifying Interface Parameters.............................................................................................................................794
Conguring an EdgePort........................................................................................................................................ 794
Inuencing RSTP Root Selection...........................................................................................................................795
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................795
50 Software-Dened Networking (SDN)...................................................................................................... 797
51 Security....................................................................................................................................................798
AAA Accounting.............................................................................................................................................................798
Conguration Task List for AAA Accounting........................................................................................................ 798
AAA Authentication.......................................................................................................................................................800
Conguration Task List for AAA Authentication...................................................................................................801
Obscuring Passwords and Keys...................................................................................................................................804
AAA Authorization.........................................................................................................................................................804
Privilege Levels Overview.......................................................................................................................................804
Conguration Task List for Privilege Levels..........................................................................................................805
RADIUS...........................................................................................................................................................................809
RADIUS Authentication and Authorization...........................................................................................................809
Conguration Task List for RADIUS....................................................................................................................... 810
TACACS+.........................................................................................................................................................................814
Conguration Task List for TACACS+....................................................................................................................814
Command Authorization..........................................................................................................................................816
Protection from TCP Tiny and Overlapping Fragment Attacks................................................................................816
Enabling SCP and SSH.................................................................................................................................................. 816
Using SCP with SSH to Copy a Software Image................................................................................................. 817
Secure Shell Authentication.................................................................................................................................... 818
Enabling SSH Authentication by Password...........................................................................................................818
Using RSA Authentication of SSH......................................................................................................................... 819
Conguring Host-Based SSH Authentication.......................................................................................................819
Using Client-Based SSH Authentication...............................................................................................................820
Conguring the HMAC Algorithm for the SSH Server.......................................................................................820
Conguring the HMAC Algorithm for the SSH Client......................................................................................... 821
Conguring the SSH Server Cipher List............................................................................................................... 822
Conguring the SSH Client Cipher List.................................................................................................................822
Troubleshooting SSH...............................................................................................................................................823
Telnet...............................................................................................................................................................................823
VTY Line and Access-Class Conguration................................................................................................................. 823
VTY Line Local Authentication and Authorization............................................................................................... 823
VTY Line Remote Authentication and Authorization...........................................................................................824
VTY MAC-SA Filter Support.................................................................................................................................. 825
Two Factor Authentication (2FA)................................................................................................................................ 825
Handling Access-Challenge Message................................................................................................................... 825
26
Contents