Setup Guide
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................808
Modifying Interface Parameters.................................................................................................................................. 808
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................808
Inuencing RSTP Root Selection.................................................................................................................................808
Conguring an EdgePort.............................................................................................................................................. 809
Conguring Fast Hellos for Link State Detection....................................................................................................... 810
44 Software-Dened Networking (SDN)....................................................................................................... 811
45 Security....................................................................................................................................................812
AAA Accounting..............................................................................................................................................................812
Conguration Task List for AAA Accounting.........................................................................................................812
RADIUS Accounting................................................................................................................................................. 814
AAA Authentication.......................................................................................................................................................820
Conguration Task List for AAA Authentication.................................................................................................. 820
Obscuring Passwords and Keys...................................................................................................................................823
AAA Authorization......................................................................................................................................................... 823
Privilege Levels Overview....................................................................................................................................... 824
Conguration Task List for Privilege Levels.......................................................................................................... 824
RADIUS........................................................................................................................................................................... 828
RADIUS Authentication...........................................................................................................................................828
Conguration Task List for RADIUS...................................................................................................................... 830
Support for Change of Authorization and Disconnect Messages packets...................................................... 833
TACACS+........................................................................................................................................................................844
Conguration Task List for TACACS+................................................................................................................... 844
TACACS+ Remote Authentication.........................................................................................................................846
Command Authorization......................................................................................................................................... 847
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 847
Enabling SCP and SSH..................................................................................................................................................847
Using SCP with SSH to Copy a Software Image................................................................................................ 848
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 849
Conguring When to Re-generate an SSH Key ..................................................................................................849
Conguring the SSH Server Key Exchange Algorithm.......................................................................................850
Conguring the HMAC Algorithm for the SSH Server.......................................................................................850
Conguring the HMAC Algorithm for the SSH Client......................................................................................... 851
Conguring the SSH Server Cipher List...............................................................................................................852
Conguring the SSH Client Cipher List................................................................................................................ 852
Conguring DNS in the SSH Server..................................................................................................................... 853
Secure Shell Authentication................................................................................................................................... 853
Troubleshooting SSH...............................................................................................................................................856
Telnet...............................................................................................................................................................................856
VTY Line and Access-Class Conguration................................................................................................................. 856
VTY Line Local Authentication and Authorization...............................................................................................856
VTY Line Remote Authentication and Authorization...........................................................................................857
VTY MAC-SA Filter Support.................................................................................................................................. 857
Role-Based Access Control..........................................................................................................................................858
Contents
25










