Administrator Guide

Table Of Contents
Modifying Global Parameters.......................................................................................................................................592
Enabling SNMP Traps for Root Elections and Topology Changes................................................................593
Modifying Interface Parameters................................................................................................................................. 593
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... 593
Influencing RSTP Root Selection................................................................................................................................ 594
Configuring an EdgePort...............................................................................................................................................594
Configuring Fast Hellos for Link State Detection................................................................................................... 595
Chapter 42: Software-Defined Networking (SDN)..................................................................... 596
Chapter 43: Security................................................................................................................. 597
AAA Accounting.............................................................................................................................................................. 597
Configuration Task List for AAA Accounting......................................................................................................597
AAA Authentication........................................................................................................................................................ 599
Configuration Task List for AAA Authentication............................................................................................... 599
Obscuring Passwords and Keys................................................................................................................................... 601
AAA Authorization.......................................................................................................................................................... 602
Privilege Levels Overview....................................................................................................................................... 602
Configuration Task List for Privilege Levels.......................................................................................................602
RADIUS..............................................................................................................................................................................606
RADIUS Authentication............................................................................................................................................607
Configuration Task List for RADIUS..................................................................................................................... 607
TACACS+.......................................................................................................................................................................... 610
Configuration Task List for TACACS+..................................................................................................................610
TACACS+ Remote Authentication......................................................................................................................... 611
Command Authorization...........................................................................................................................................612
Protection from TCP Tiny and Overlapping Fragment Attacks........................................................................... 612
Enabling SCP and SSH................................................................................................................................................... 612
Using SCP with SSH to Copy a Software Image............................................................................................... 613
Removing the RSA Host Keys and Zeroizing Storage .....................................................................................613
Configuring When to Re-generate an SSH Key ................................................................................................ 614
Configuring the SSH Server Key Exchange Algorithm..................................................................................... 614
Configuring the HMAC Algorithm for the SSH Server..................................................................................... 614
Configuring the SSH Server Cipher List.............................................................................................................. 615
Secure Shell Authentication....................................................................................................................................616
Troubleshooting SSH................................................................................................................................................ 618
Telnet..................................................................................................................................................................................618
VTY Line and Access-Class Configuration................................................................................................................ 618
VTY Line Local Authentication and Authorization............................................................................................. 619
VTY Line Remote Authentication and Authorization.........................................................................................619
VTY MAC-SA Filter Support...................................................................................................................................620
Role-Based Access Control..........................................................................................................................................620
Overview of RBAC.....................................................................................................................................................621
User Roles...................................................................................................................................................................623
AAA Authentication and Authorization for Roles.............................................................................................. 626
Role Accounting........................................................................................................................................................ 628
Display Information About User Roles..................................................................................................................629
Chapter 44: Service Provider Bridging....................................................................................... 631
Contents
19