Connectivity Guide

VXLAN EVPN commands.......................................................................................................................................734
Example: VXLAN with BGP EVPN......................................................................................................................... 741
Controller-provisioned VXLAN......................................................................................................................................761
Conguration notes................................................................................................................................................. 762
Controller-provisioned VXLAN operations............................................................................................................762
Steps to congure controller-provisioned VXLAN...............................................................................................763
Congure and control VXLAN from VMware vCenter....................................................................................... 766
Example: VXLAN with a controller conguration.................................................................................................769
VXLAN Controller commands................................................................................................................................ 773
9 UFT modes................................................................................................................................................ 780
Congure UFT modes................................................................................................................................................... 782
IPv6 extended prex routes....................................................................................................................................782
UFT commands..............................................................................................................................................................783
hardware forwarding-table mode...........................................................................................................................783
hardware l3 ipv6-extended-prex .........................................................................................................................783
show hardware forwarding-table mode................................................................................................................ 784
show hardware forwarding-table mode all............................................................................................................784
show hardware l3.....................................................................................................................................................784
10 Security....................................................................................................................................................786
User re-authentication...................................................................................................................................................787
Password strength.........................................................................................................................................................787
Role-based access control............................................................................................................................................ 787
Assign user role.............................................................................................................................................................. 788
Bootloader Protection................................................................................................................................................... 788
Linuxadmin User Conguration.................................................................................................................................... 789
RADIUS authentication................................................................................................................................................. 790
RADIUS over TLS authentication................................................................................................................................. 791
TACACS+ authentication..............................................................................................................................................792
Unknown user role......................................................................................................................................................... 793
SSH server......................................................................................................................................................................793
Virtual terminal line........................................................................................................................................................ 794
Control access to VTY............................................................................................................................................ 794
Enable AAA accounting.................................................................................................................................................795
Enable user lockout....................................................................................................................................................... 795
Limit concurrent login sessions.................................................................................................................................... 796
Enable login statistics....................................................................................................................................................796
Privilege levels overview................................................................................................................................................797
Congure privilege levels for users........................................................................................................................ 797
Congure enable password.................................................................................................................................... 798
Audit log..........................................................................................................................................................................799
Security commands.......................................................................................................................................................800
aaa accounting.........................................................................................................................................................800
aaa authentication login...........................................................................................................................................801
aaa re-authenticate enable......................................................................................................................................801
16
Contents