Concept Guide

Conguring an EdgePort.............................................................................................................................................. 735
Conguring Fast Hellos for Link State Detection.......................................................................................................736
44 Software-Dened Networking (SDN)...................................................................................................... 737
45 Security................................................................................................................................................... 738
AAA Accounting.............................................................................................................................................................738
Conguration Task List for AAA Accounting........................................................................................................ 738
AAA Authentication....................................................................................................................................................... 740
Conguration Task List for AAA Authentication................................................................................................... 741
Obscuring Passwords and Keys................................................................................................................................... 744
AAA Authorization..........................................................................................................................................................744
Privilege Levels Overview....................................................................................................................................... 744
Conguration Task List for Privilege Levels.......................................................................................................... 745
RADIUS........................................................................................................................................................................... 749
RADIUS Authentication...........................................................................................................................................749
Conguration Task List for RADIUS...................................................................................................................... 750
Support for Change of Authorization and Disconnect Messages packets...................................................... 754
TACACS+........................................................................................................................................................................765
Conguration Task List for TACACS+................................................................................................................... 765
TACACS+ Remote Authentication.........................................................................................................................767
Command Authorization......................................................................................................................................... 768
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 768
Enabling SCP and SSH..................................................................................................................................................768
Using SCP with SSH to Copy a Software Image.................................................................................................769
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................770
Conguring When to Re-generate an SSH Key .................................................................................................. 770
Conguring the SSH Server Key Exchange Algorithm........................................................................................ 771
Conguring the HMAC Algorithm for the SSH Server........................................................................................ 771
Conguring the HMAC Algorithm for the SSH Client.........................................................................................772
Conguring the SSH Server Cipher List............................................................................................................... 772
Conguring the SSH Client Cipher List.................................................................................................................773
Conguring DNS in the SSH Server......................................................................................................................773
Secure Shell Authentication....................................................................................................................................774
Troubleshooting SSH............................................................................................................................................... 776
Telnet............................................................................................................................................................................... 777
VTY Line and Access-Class Conguration..................................................................................................................777
VTY Line Local Authentication and Authorization................................................................................................777
VTY Line Remote Authentication and Authorization...........................................................................................778
VTY MAC-SA Filter Support...................................................................................................................................778
Role-Based Access Control.......................................................................................................................................... 779
Overview of RBAC...................................................................................................................................................779
User Roles..................................................................................................................................................................781
AAA Authentication and Authorization for Roles.................................................................................................785
Role Accounting....................................................................................................................................................... 787
Display Information About User Roles...................................................................................................................788
24
Contents