Concept Guide
Modifying Interface Parameters...................................................................................................................................799
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................799
Inuencing RSTP Root Selection.................................................................................................................................799
Conguring an EdgePort.............................................................................................................................................. 800
Conguring Fast Hellos for Link State Detection....................................................................................................... 801
44 Software-Dened Networking (SDN)...................................................................................................... 802
45 Security...................................................................................................................................................803
AAA Accounting.............................................................................................................................................................803
Conguration Task List for AAA Accounting........................................................................................................803
AAA Authentication.......................................................................................................................................................805
Conguration Task List for AAA Authentication.................................................................................................. 806
Obscuring Passwords and Keys...................................................................................................................................809
AAA Authorization.........................................................................................................................................................809
Privilege Levels Overview.......................................................................................................................................809
Conguration Task List for Privilege Levels...........................................................................................................810
RADIUS............................................................................................................................................................................814
RADIUS Authentication........................................................................................................................................... 814
Conguration Task List for RADIUS....................................................................................................................... 815
Support for Change of Authorization and Disconnect Messages packets.......................................................819
TACACS+........................................................................................................................................................................830
Conguration Task List for TACACS+...................................................................................................................830
TACACS+ Remote Authentication.........................................................................................................................832
Command Authorization.........................................................................................................................................833
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 833
Enabling SCP and SSH................................................................................................................................................. 833
Using SCP with SSH to Copy a Software Image................................................................................................ 834
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 835
Conguring When to Re-generate an SSH Key ..................................................................................................835
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 836
Conguring the HMAC Algorithm for the SSH Server.......................................................................................836
Conguring the HMAC Algorithm for the SSH Client.........................................................................................837
Conguring the SSH Server Cipher List............................................................................................................... 837
Conguring the SSH Client Cipher List................................................................................................................ 838
Conguring DNS in the SSH Server......................................................................................................................838
Secure Shell Authentication................................................................................................................................... 839
Troubleshooting SSH................................................................................................................................................841
Telnet...............................................................................................................................................................................842
VTY Line and Access-Class Conguration................................................................................................................. 842
VTY Line Local Authentication and Authorization............................................................................................... 842
VTY Line Remote Authentication and Authorization...........................................................................................843
VTY MAC-SA Filter Support.................................................................................................................................. 843
Role-Based Access Control..........................................................................................................................................844
Overview of RBAC.................................................................................................................................................. 844
User Roles.................................................................................................................................................................846
Contents
25










