Users Guide

Enabling Rapid Spanning Tree Protocol Globally...........................................................................................................587
Adding and Removing Interfaces.................................................................................................................................... 589
Modifying Global Parameters.......................................................................................................................................... 589
Enabling SNMP Traps for Root Elections and Topology Changes.......................................................................590
Modifying Interface Parameters..................................................................................................................................... 590
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................590
Influencing RSTP Root Selection.....................................................................................................................................591
Configuring an EdgePort.................................................................................................................................................. 591
Configuring Fast Hellos for Link State Detection......................................................................................................... 592
Chapter 44: Software-Defined Networking (SDN)......................................................................... 593
Chapter 45: Security................................................................................................................... 594
AAA Accounting................................................................................................................................................................ 594
Configuration Task List for AAA Accounting...........................................................................................................594
AAA Authentication.......................................................................................................................................................... 596
Configuration Task List for AAA Authentication..................................................................................................... 596
Obscuring Passwords and Keys......................................................................................................................................598
AAA Authorization.............................................................................................................................................................598
Privilege Levels Overview.......................................................................................................................................... 599
Configuration Task List for Privilege Levels.............................................................................................................599
RADIUS...............................................................................................................................................................................602
RADIUS Authentication.............................................................................................................................................. 603
Configuration Task List for RADIUS......................................................................................................................... 604
TACACS+...........................................................................................................................................................................606
Configuration Task List for TACACS+..................................................................................................................... 606
TACACS+ Remote Authentication............................................................................................................................607
Command Authorization.............................................................................................................................................608
Protection from TCP Tiny and Overlapping Fragment Attacks..................................................................................608
Enabling SCP and SSH.....................................................................................................................................................608
Using SCP with SSH to Copy a Software Image....................................................................................................609
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................... 610
Configuring When to Re-generate an SSH Key ......................................................................................................610
Configuring the SSH Server Key Exchange Algorithm............................................................................................ 611
Configuring the HMAC Algorithm for the SSH Server............................................................................................ 611
Configuring the SSH Server Cipher List.................................................................................................................... 611
Secure Shell Authentication........................................................................................................................................612
Troubleshooting SSH...................................................................................................................................................614
Telnet...................................................................................................................................................................................614
VTY Line and Access-Class Configuration..................................................................................................................... 615
VTY Line Local Authentication and Authorization................................................................................................... 615
VTY Line Remote Authentication and Authorization...............................................................................................615
VTY MAC-SA Filter Support.......................................................................................................................................616
Role-Based Access Control..............................................................................................................................................616
Overview of RBAC.......................................................................................................................................................617
User Roles..................................................................................................................................................................... 618
AAA Authentication and Authorization for Roles.....................................................................................................621
Role Accounting...........................................................................................................................................................624
Display Information About User Roles...................................................................................................................... 625
20
Contents