Administrator Guide

Influencing RSTP Root Selection................................................................................................................................. 791
Configuring an EdgePort................................................................................................................................................791
Configuring Fast Hellos for Link State Detection................................................................................................... 792
Chapter 49: Software-Defined Networking (SDN)..................................................................... 793
Chapter 50: Security................................................................................................................. 794
AAA Accounting...............................................................................................................................................................794
Configuration Task List for AAA Accounting......................................................................................................794
RADIUS Accounting..................................................................................................................................................796
AAA Authentication.........................................................................................................................................................801
Configuration Task List for AAA Authentication................................................................................................ 801
Obscuring Passwords and Keys.................................................................................................................................. 804
AAA Authorization.......................................................................................................................................................... 804
Privilege Levels Overview.......................................................................................................................................805
Configuration Task List for Privilege Levels.......................................................................................................805
RADIUS..............................................................................................................................................................................809
RADIUS Authentication........................................................................................................................................... 809
Configuration Task List for RADIUS......................................................................................................................810
Support for Change of Authorization and Disconnect Messages packets.................................................. 813
TACACS+..........................................................................................................................................................................823
Configuration Task List for TACACS+................................................................................................................. 823
TACACS+ Remote Authentication........................................................................................................................825
Command Authorization..........................................................................................................................................826
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................................... 826
Enabling SCP and SSH.................................................................................................................................................. 826
Using SCP with SSH to Copy a Software Image...............................................................................................827
Removing the RSA Host Keys and Zeroizing Storage .................................................................................... 828
Configuring When to Re-generate an SSH Key ............................................................................................... 828
Configuring the SSH Server Key Exchange Algorithm.................................................................................... 828
Configuring the HMAC Algorithm for the SSH Server.................................................................................... 829
Configuring the HMAC Algorithm for the SSH Client......................................................................................829
Configuring the SSH Server Cipher List..............................................................................................................830
Configuring the SSH Client Cipher List............................................................................................................... 830
Configuring DNS in the SSH Server......................................................................................................................831
Secure Shell Authentication.................................................................................................................................... 831
Troubleshooting SSH................................................................................................................................................833
Telnet.................................................................................................................................................................................834
VTY Line and Access-Class Configuration................................................................................................................834
VTY Line Local Authentication and Authorization.............................................................................................834
VTY Line Remote Authentication and Authorization........................................................................................835
VTY MAC-SA Filter Support...................................................................................................................................835
Role-Based Access Control.......................................................................................................................................... 836
Overview of RBAC....................................................................................................................................................836
User Roles...................................................................................................................................................................838
AAA Authentication and Authorization for Roles............................................................................................... 841
Role Accounting.........................................................................................................................................................844
Display Information About User Roles..................................................................................................................845
Two Factor Authentication (2FA)...............................................................................................................................846
Contents
23