Concept Guide

Inuencing RSTP Root Selection.................................................................................................................................844
Conguring an EdgePort.............................................................................................................................................. 845
Conguring Fast Hellos for Link State Detection...................................................................................................... 846
48 Software-Dened Networking (SDN)...................................................................................................... 847
49 Security...................................................................................................................................................848
AAA Accounting.............................................................................................................................................................848
Conguration Task List for AAA Accounting........................................................................................................848
RADIUS Accounting................................................................................................................................................ 850
AAA Authentication.......................................................................................................................................................856
Conguration Task List for AAA Authentication.................................................................................................. 856
Obscuring Passwords and Keys...................................................................................................................................859
AAA Authorization......................................................................................................................................................... 859
Privilege Levels Overview.......................................................................................................................................860
Conguration Task List for Privilege Levels..........................................................................................................860
RADIUS........................................................................................................................................................................... 864
RADIUS Authentication...........................................................................................................................................864
Conguration Task List for RADIUS...................................................................................................................... 866
Support for Change of Authorization and Disconnect Messages packets...................................................... 869
TACACS+........................................................................................................................................................................880
Conguration Task List for TACACS+...................................................................................................................880
TACACS+ Remote Authentication.........................................................................................................................882
Command Authorization.........................................................................................................................................883
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 883
Enabling SCP and SSH................................................................................................................................................. 883
Using SCP with SSH to Copy a Software Image................................................................................................ 884
Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 885
Conguring When to Re-generate an SSH Key ..................................................................................................885
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 886
Conguring the HMAC Algorithm for the SSH Server.......................................................................................886
Conguring the SSH Server Cipher List............................................................................................................... 887
Conguring DNS in the SSH Server......................................................................................................................887
Secure Shell Authentication................................................................................................................................... 888
Troubleshooting SSH...............................................................................................................................................890
Telnet................................................................................................................................................................................891
VTY Line and Access-Class Conguration..................................................................................................................891
VTY Line Local Authentication and Authorization................................................................................................891
VTY Line Remote Authentication and Authorization...........................................................................................892
VTY MAC-SA Filter Support.................................................................................................................................. 892
Role-Based Access Control..........................................................................................................................................893
Overview of RBAC.................................................................................................................................................. 893
User Roles................................................................................................................................................................ 895
AAA Authentication and Authorization for Roles................................................................................................ 899
Role Accounting....................................................................................................................................................... 901
Display Information About User Roles...................................................................................................................902
26
Contents