Administrator Guide

Enabling SNMP Traps for Root Elections and Topology Changes...........................................690
Modifying Interface Parameters.......................................................................................................690
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 691
Influencing RSTP Root Selection......................................................................................................691
Configuring an EdgePort.................................................................................................................. 691
Configuring Fast Hellos for Link State Detection............................................................................692
42 Software-Defined Networking (SDN)...........................................................694
43 Security.................................................................................................................695
AAA Accounting................................................................................................................................695
Configuration Task List for AAA Accounting............................................................................. 695
AAA Authentication...........................................................................................................................697
Configuration Task List for AAA Authentication........................................................................698
AAA Authorization.............................................................................................................................700
Privilege Levels Overview........................................................................................................... 700
Configuration Task List for Privilege Levels................................................................................701
RADIUS.............................................................................................................................................. 706
RADIUS Authentication............................................................................................................... 707
Configuration Task List for RADIUS............................................................................................707
TACACS+...........................................................................................................................................710
Configuration Task List for TACACS+........................................................................................ 710
TACACS+ Remote Authentication..............................................................................................712
Command Authorization.............................................................................................................713
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................713
Enabling SCP and SSH.......................................................................................................................714
Using SCP with SSH to Copy a Software Image.........................................................................715
Removing the RSA Host Keys and Zeroizing Storage ............................................................... 716
Configuring When to Re-generate an SSH Key ........................................................................ 716
Configuring the SSH Server Key Exchange Algorithm............................................................... 716
Configuring the HMAC Algorithm for the SSH Server................................................................717
Configuring the SSH Server Cipher List......................................................................................718
Secure Shell Authentication........................................................................................................718
Troubleshooting SSH...................................................................................................................721
Telnet................................................................................................................................................. 721
VTY Line and Access-Class Configuration.......................................................................................722
VTY Line Local Authentication and Authorization..................................................................... 722
VTY Line Remote Authentication and Authorization.................................................................723
VTY MAC-SA Filter Support.........................................................................................................723
Role-Based Access Control..............................................................................................................724
Overview of RBAC.......................................................................................................................724
User Roles....................................................................................................................................727