Reference Guide
Configuring an EdgePort..................................................................................................................744
Configuring Fast Hellos for Link State Detection............................................................................ 745
42 Software-Defined Networking (SDN).........................................................747
43 Security............................................................................................................ 748
AAA Accounting................................................................................................................................ 748
Configuration Task List for AAA Accounting..............................................................................748
AAA Authentication...........................................................................................................................750
Configuration Task List for AAA Authentication........................................................................ 750
Obscuring Passwords and Keys........................................................................................................753
AAA Authorization.............................................................................................................................754
Privilege Levels Overview............................................................................................................754
Configuration Task List for Privilege Levels............................................................................... 754
RADIUS.............................................................................................................................................. 758
RADIUS Authentication............................................................................................................... 759
Configuration Task List for RADIUS............................................................................................760
TACACS+...........................................................................................................................................763
Configuration Task List for TACACS+........................................................................................ 763
TACACS+ Remote Authentication............................................................................................. 765
Command Authorization............................................................................................................766
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 766
Enabling SCP and SSH...................................................................................................................... 766
Using SCP with SSH to Copy a Software Image........................................................................ 767
Removing the RSA Host Keys and Zeroizing Storage ...............................................................768
Configuring When to Re-generate an SSH Key ........................................................................769
Configuring the SSH Server Key Exchange Algorithm...............................................................769
Configuring the HMAC Algorithm for the SSH Server............................................................... 770
Configuring the SSH Server Cipher List......................................................................................770
Secure Shell Authentication........................................................................................................ 771
Troubleshooting SSH.................................................................................................................. 773
Telnet.................................................................................................................................................774
VTY Line and Access-Class Configuration.......................................................................................774
VTY Line Local Authentication and Authorization..................................................................... 774
VTY Line Remote Authentication and Authorization................................................................. 775
VTY MAC-SA Filter Support.........................................................................................................776
Role-Based Access Control..............................................................................................................776
Overview of RBAC....................................................................................................................... 777
User Roles....................................................................................................................................779
AAA Authentication and Authorization for Roles.......................................................................783
Role Accounting..........................................................................................................................786
Display Information About User Roles....................................................................................... 787
25










