Setup Guide
Modifying Global Parameters....................................................................................................................................... 823
Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................825
Modifying Interface Parameters.................................................................................................................................. 825
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................825
Inuencing RSTP Root Selection.................................................................................................................................826
Conguring an EdgePort.............................................................................................................................................. 826
Conguring Fast Hellos for Link State Detection.......................................................................................................827
46 Software-Dened Networking (SDN)...................................................................................................... 828
47 Security................................................................................................................................................... 829
AAA Accounting.............................................................................................................................................................829
Conguration Task List for AAA Accounting........................................................................................................829
RADIUS Accounting................................................................................................................................................. 831
AAA Authentication....................................................................................................................................................... 837
Conguration Task List for AAA Authentication...................................................................................................837
Obscuring Passwords and Keys...................................................................................................................................840
AAA Authorization.........................................................................................................................................................840
Privilege Levels Overview........................................................................................................................................841
Conguration Task List for Privilege Levels...........................................................................................................841
RADIUS........................................................................................................................................................................... 845
RADIUS Authentication...........................................................................................................................................845
Conguration Task List for RADIUS.......................................................................................................................847
Support for Change of Authorization and Disconnect Messages packets...................................................... 849
TACACS+........................................................................................................................................................................ 861
Conguration Task List for TACACS+....................................................................................................................861
TACACS+ Remote Authentication.........................................................................................................................862
Command Authorization.........................................................................................................................................863
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 864
Enabling SCP and SSH................................................................................................................................................. 864
Using SCP with SSH to Copy a Software Image................................................................................................ 865
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 866
Conguring When to Re-generate an SSH Key ..................................................................................................866
Conguring the SSH Server Key Exchange Algorithm.......................................................................................866
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 867
Conguring the SSH Server Cipher List............................................................................................................... 867
Conguring DNS in the SSH Server..................................................................................................................... 868
Secure Shell Authentication................................................................................................................................... 868
Troubleshooting SSH................................................................................................................................................871
Telnet................................................................................................................................................................................871
VTY Line and Access-Class Conguration.................................................................................................................. 871
VTY Line Local Authentication and Authorization................................................................................................872
VTY Line Remote Authentication and Authorization...........................................................................................872
VTY MAC-SA Filter Support...................................................................................................................................873
Role-Based Access Control.......................................................................................................................................... 873
Overview of RBAC...................................................................................................................................................874
26
Contents










